It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by ADVISOR
Originally posted by MDDoxs
THIS IS ATS!!..
*queue Sparta scene*
Also for those who may not have read the linked article, here is another quote mentioning ATS;
Technique #2 - 'CONSENSUS CRACKING'
A second highly effective technique (which you can see in operation all the time at www.abovetopsecret.com) is 'consensus cracking.' To develop a consensus crack, the following technique is used.
Everyone has an IP, and only the very savvy know how to run a proxy successfully.
I noticed in the anti-US post that was started earlier that the first 10 responders were bashing America. That seemed a bit heavy handed and possibly faked.
To the agents of dis-information and of malicious intent, I wish you luck, be prepared for close scrutiny and critical opinions.
THIS IS ATS!!..
At that time, I was shown a white, three-ring binder with Obama’s circular campaign logo imprinted on the outside of the binder with the name “Cyber-Warriors for Obama” printed in blue across the top. Inside were the names and e-mail addresses of 3,575 “cyber assets,” or “warriors,” listed in alphabetical order under about a dozen or so “team leaders.” From a separate sheet I was shown, most of these “assets” are being paid just over minimum wage, but as I understand it, they work from home and have no overhead. I believe there are about two dozen supervisors who make substantially more.
Now I only had the binder for a minute, and could not take it from the room I was in, so this is strictly from memory.
It was tabbed, and one section with the word “targets” ............
..........RB: The instructions seemed very specific. Infiltrate web forums, collect screen names, avatars, and posters’ tag lines, and attempt to resolve these to their actual identities. I read one paragraph that listed circumstances when the “asset” was only to monitor but do not disrupt without authorization. There was another section titled “Divert, Disrupt and Destroy,” listing “how to’s” in certain cases.
There was also a section on maintaining a social media presence, and another on the most effective use of Twitter.
Lastly, there was a “reference section,” which included statistics, specific language to use to marginalize different posters, and effective methods to discredit people while maintaining a sense of legitimacy.
But from the beginning, campaign manager Jim Messina had promised a totally different, metric-driven kind of campaign in which politics was the goal but political instincts might not be the means. “We are going to measure every single thing in this campaign,” he said after taking the job. He hired an analytics department five times as large as that of the 2008 operation, with an official “chief scientist” for the Chicago headquarters named Rayid Ghani, who in a previous life crunched huge data sets to, among other things, maximize the efficiency of supermarket sales promotions.
Exactly what that team of dozens of data crunchers was doing, however, was a closely held secret. “They are our nuclear codes,” campaign spokesman Ben LaBolt would say when asked about the efforts.
Originally posted by OccamAssassin
Someone needs to make a list in reply to this one.
"The Gentle-persons guide to online paranoia".
"The Gentle-persons guide to finding a shrink".
"The Gentle-persons guide to delusions that the government actually cares about you beyond your tax contribution".
I agree with those who have questioned the validity of this document.
My respect for ATS mods has been seriously damaged.
If the mods are bringing this kind of crap to the table, what hope has logic?
Originally posted by Hefficide
reply to post by LoveFurther
Two way debate is dialogue. One way debate is propaganda.
Sadly that answer would actually lead to much more of an ability for special interests to muddy the waters.