It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
You are expecting too much from the requiremt to enact of a warrant and way too little from the power of a threat of a warrant. Way too much from your ISP in terms of the privacy of your location and way too little from the ultimate resolution of a dynamic address lookup...if you know where to look.
What information "they" receive from ATS could very well be, and I suspect that it is, unknown to the Owners of ATS
Originally posted by Druid42
I may be expecting too much, but then again, I'm not doing anything wrong, so I feel quite safe. Now, perhaps, IF I was going to partake of something unsavory, I would take the necessary precautions accordingly. There are ways to mask your IP address, anonymize your browser, and of course proxy servers to use. I've "heard" of "some people" embedding themselves seven proxies deep before partaking in anything unsavory. There's no reason to do that UNLESS you are doing something illegal, and then, you should expect a warrant.
What information "they" receive from ATS could very well be, and I suspect that it is, unknown to the Owners of ATS
Originally posted by Druid42
Information that is publicly available anyway? Or, are you talking about information obtained without a properly executed warrant, which would be inadmissible in court also?
Originally posted by abe froman
...and if so were warrants ever issued? Has there ever been a "Garry Mckinnnen" type case where memebers "secret identities" were asked for by TPTB?
Originally posted by holywar666
Originally posted by SplitInfinity
Very interesting. Would you mind posting some proof of this system and how it works? Its not that i dont believe you, i'm just curious. I had a feeling it was that sensitive of a process.edit on 14-4-2012 by holywar666 because: (no reason given)
Just Google NSA super computing world data collection system. Split Infinity
Echelon (signals intelligence)
From Wikipedia, the free encyclopedia.
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UK–USA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, known as AUSCANNZUKUS or Five Eyes).[1][2] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[3]
ECHELON was reportedly[citation needed] created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.
The system has been reported in a number of public sources.[4] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[3]
In a report published in 2001, the European Parliament stated that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
Originally posted by Gemwolf
reply to post by abe froman
It's a lot to explain but this and this should get you started.edit on 14-4-2012 by Gemwolf because: Spelling
Originally posted by zorgon
reply to post by EarthCitizen07
When ever someone asks for my phone number or password... I automatically stop and hunt the fine print
Unfortunately many people just click away mindlessly then have to email friends to apologized for their stupidity. My email is one I use as a catch all for everything with really good crap filters so I don't really care who gets that
Originally posted by brice
Originally posted by Gemwolf
reply to post by abe froman
It's a lot to explain but this and this should get you started.edit on 14-4-2012 by Gemwolf because: Spelling
HA, Ha , Ha I'm busting a gut, best sarcasim I've seen on ATS yet. If I could star you I would!
Good one,
brice
Originally posted by Gemwolf
There are several threads on Jared Loughner. And see also Jeff Weise. Many people have dug through their posts and found nothing worth mentioning. We're not proud of it, but then as with anything else in life, ATS cannot be held responsible for what our members do. With quarter of a million members, there are bound to be a few nuts in the mix.edit on 14-4-2012 by Gemwolf because: Spelling
Originally posted by abe froman
...and if so were warrants ever issued? Has there ever been a "Garry Mckinnnen" type case where memebers "secret identities" were asked for by TPTB?
Originally posted by EarthCitizen07
Then in tiny, and I mean REALLY TINY script, it says skip for now, only to be harrased again in the near future. Am I the only one that has noticed this or is everyone really indifferent about basic security protocol??
Originally posted by PulsusMeusGallo
They were not caught by a global surveillance system, but by dedicated detectives who exploited various mistakes.
Originally posted by PulsusMeusGallo
They were not caught by a global surveillance system, but by dedicated detectives who exploited various mistakes.
Originally posted by Bedlam
I can tell you from bitter experience that unless you really go out of your way to hide or obfuscate details, enough communication and you will provide sufficient info to be identified, given a good analyst with access to data and people, even if you don't do obviously stupid things.
Originally posted by SplitInfinity
reply to post by holywar666
I agree with others in that this is a highly controvertial program...and it has a great ability for misuse...but with the asymetrical warfare being waged...it is needed. But it is like the ultimate Big Brother System.
Split Infinity