It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by AnonymousVan
reply to post by TinfoilTP
Evidence your group is being steered by the very governments
prove it , seriously, prove it
You're amusing, dont you see you're just ridiculizing yourself with your anti Anonymous hatred ?
Originally posted by TinfoilTP
Originally posted by AnonymousVan
reply to post by TinfoilTP
Evidence your group is being steered by the very governments
prove it , seriously, prove it
You're amusing, dont you see you're just ridiculizing yourself with your anti Anonymous hatred ?
You proved it for me, you said an inside police contact phoned and gave you info. You have no way of knowing what that persons real agenda is, and there is no way for you to know who that persons controller is, but the effect is the same. The message you got was it's ok continue on.
When the internet regulation laws get passed and if you guys are still relevant after that, then I will consider myself proven wrong. The way I see it, when the laws get passed anonymous will be dismantled and thrown to the wolves, to prove how effective the new laws are and why we must keep them.
Originally posted by TinfoilTP
reply to post by Dimitri Dzengalshlevi
No, my logic is you are the tool being used by the enemy.
Many layers of denial, with one certain outcome.
A locked down controlled internet.
Nothing is black and white, just shades of grey. Having contacts within the ranks of your enemy proves more useful than not, regardless of what their intentions are. Look at how intelligence groups operate. Obviously they make contact with enemy intel operatives, if not just to try to buy them out. With you're logic, you are the enemy if you talk with the enemy. Do we still live in Locke's "all vs all' mentality? "Your enemy is never a villain in his own eyes. Keep this in mind; it may offer a way to make him your friend. If not, you can kill him without hate -- and quickly." [don't know the source of this saying]
No, my logic is you are the tool being used by the enemy. Many layers of denial, with one certain outcome. A locked down controlled internet.
Originally posted by Dimitri Dzengalshlevi
Originally posted by TinfoilTP
reply to post by Dimitri Dzengalshlevi
No, my logic is you are the tool being used by the enemy.
Many layers of denial, with one certain outcome.
A locked down controlled internet.
Don't you get it?
The internet would be getting locked down without this movement. This movement is making people aware.
Originally posted by AnonymousVan
In any case, im done wasting my time talking to you
Originally posted by Laokin
Originally posted by SpringHeeledJack
As I suggested before, Anonymous most certainly DOES have a "gelatinous" core. Everyone is not pulling off ops on an equal level.
Everyone that posted last made a lot of good points.
SIPRNET would be a great challenge indeed. From what I know from the military, anyone wishing to access it must connect directly to their cables. Although for the trickiest among the tricky, I'm sure there are other ways. As Anon stands right now, I wouldn't ask them to do this. There is way too much information that is really mundane but could kill thousands if released irresponsibly. Things like aircraft combat entry tactics and technologies used by the military to... I can't say, but prevent certain attacks. The technology the Army uses could be VERY easily defeated. Anyway, no more on that subject.
I think we're all arguing two sides of the same coin here.
There is no other way... Our internet works on public cisco routers... SIPRNET runs on private government ones... Unless you plug into one of their routers there is no way to access their network.... It's self contained.
Do you think they are Jason Bourne or something? Jesus.... I doubt anyone is breaking into government facilities to plug in so they can hax boxes....
This is real life... not Mission Impossible: Ghost Protocol.
P.S.
Topiary isn't really a hacker... he's an Activist with a Bank Roll and a good public speaker. When reviewing the evidence it's clear the Scotland Yard made a mistake and nabbed the wrong guy... There is more than one Topiary.... The real topiary... the one they wanted is really the fake topiary... He cloned the name.
P.P.S.
He's also has done video interviews before... and he is NOT the guy they arrested... LOL. He also speaks swedish natively which is why his talking sounds so funny... it's a fake british accent... which sometimes slips off back to a more casual swedish accent.
The interview he did with RT was pretty bad... and the video interviews were in sweden... in which he spoke swedish with an anon mask strapped to the top of his head.edit on 2-8-2011 by Laokin because: (no reason given)
Originally posted by TinfoilTP
Originally posted by AnonymousVan
In any case, im done wasting my time talking to you
Funny because you only came here to talk in this thread by your post history.
It's disapointing to see one give up so easily, but if you don't have a leg to stand on I can understand.
Funny because you only came here to talk in this thread by your post history. It's disapointing to see one give up so easily, but if you don't have a leg to stand on I can understand.
It's disapointing to see one give up so easily
Originally posted by BIGPoJo
Calm down man. Also, lets not attack our fellow ATS'ers.
Originally posted by AnonymousVan
PS: remember, acting like you actualy won a debat on the internet only make the situation patheticedit on 2-8-2011 by AnonymousVan because: (no reason given)
Originally posted by BIGPoJo
Originally posted by Laokin
Originally posted by SpringHeeledJack
First rule of SIPRNET is we do not talk about SIPRNET!
They could easily hack SIPRNET if they have people in the military. FACT. Its not a challenge, its like banging a drunk bar slut in a bathroom. I doubt they would ever attempt a SIPRNET hack because it would not generate any media attention. The military would keep it quiet.
The investigation into the criminal activity of so-called "hacktivist" groups #Anonymous and #LulzSec continues. We want to remind people of the law in this area: The Law Against Computer Misuse
The purpose of Law is to limit and contain harm-to-others.
This is done by:
1. Providing specified formats for contracts, treaties, deals and agreements, then providing registries of these to resolve arguments about opposed memories or interpretations of them later on with these recorded facts from which unbiased third-party arbitration can pronounce final sentence on disputes before they degenerate into violent conflicts.
2. Establishing what constitutes 'harm-to-others' and whether it has occurred; logically and implicitly from the fact that that all conflict starts with, at least, a perception that another or others are violating a plaintiff's life, liberty or property or, at most, clearly doing or having done so.
(Unfortunately Law is exploited by legislators to advance their own interests and agendas. This too frequently violates the life, liberty or property of others and, in effect, generates new grounds for conflicts where none previously existed in diametric contradiction of the purpose of Law.)
jury of one's peers n. a guaranteed right of criminal defendants, in which "peer" means an "equal." This has been interpreted by courts to mean that the available jurors include a broad spectrum of the population, particularly of race, national origin and gender. Jury selection may include no process which excludes those of a particular race or intentionally narrows the spectrum of possible jurors. It does not mean that women are to be tried by women, Asians by Asians, or African Americans by African Americans.