It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

ThinThread spy system secretly tested on New Zealand population

page: 2
19
<< 1   >>

log in

join
share:

posted on May, 30 2013 @ 05:18 AM
link   
reply to post by CIAGypsy
 


Where do I send my dollar?




posted on May, 30 2013 @ 06:23 AM
link   
reply to post by roadgravel
 


wow they must have some really good language recognition software cos im a kiwi and I still don't understand the far southerners , hahahahahah



posted on May, 30 2013 @ 06:59 AM
link   
With the advent of nanotechnology, and advanced computing in support of it, it really isn't necassary to 'tap in' to a communications stream to eavesdrop...i remember an image from the late 80's / early 90's that showed a CPU imaged using an electron microscope, that was so small it was easily being carried in the pincer-like jaws of a common ant...that was back then.

Nowdays we have advances in power harvesting, whether we're talking about metamaterials like Carbon nanotubes, graphene supercaps, or solar on a roll, we have the ability to create at the atomic scale, and have done for quite some time...a machine, incorporating a comms transciever, power generation and storage and autonomous movement would be a simple thing to build into something the size of a common household fly or similar.

And that is what is publicly known, not what is being put together in places like DARPA and similar establishments both public and private.

Not wanting to 'paranoid people out' too much or generally freak you out, but you could be surveilled without you ever realising it, even if you are off grid, never use comms or the net and live in the middle of the desert, away from everything...apart from swatting or squashing them...how much attention does the average person give to the myriad bugs that share our living space?

Not much is probably the answer for most people. It only takes one or two fake nanotech 'bugs' among hundreds of real ones to look over your shoulder online, or watch you everyday of your life.



posted on May, 30 2013 @ 08:36 AM
link   
reply to post by CIAGypsy
 
Way back in the 80's when everyone had the "cordless" telephones, and most still do, my Father in Law who is a big HAM operator, told me "if you are on a cordless, assume you are being listened to". All you needed back then was a scanner and you could listen to your neighbor on the phone. Even though cell phones are "encrypted", assume you are being listened to, or monitered by some computer algorythm.



posted on May, 30 2013 @ 09:22 AM
link   

Originally posted by bekod
and this is what is most likely is being built in Utah for the NSA, and thye say say there is NWO yea right and there was no 2 Bushes in the POTUS either.


This is what I believe also. The whole purpose of the NSA is intelligence gathering. You can bet this new facility will have all of the latest toys.

As for the NWO, even if there isn't one, there certainly is a universally intrusive dictatorship in the making. Otherwise why is all the "anti-terrorism" legislation worded to define Americans as terrorists, and why is it all designed to allow unlimited, unconstitutional spying on Americans? Why does legislation like NDAA pass through Congress in a matter of days, or even hours, when anything that actually improves the lives of Americans can't find the light of day?

And even worse, why is the government so inept at stopping "terrorism" despite all the concessions we've made to our freedoms?



posted on May, 30 2013 @ 09:34 AM
link   
You know that horrible future of corporate logistics everywhere, whee everyone is a robot and emotions are illegal, where no free time means a good worker bee. No free thoughts means a good clean mind.

We'll be there someday if we don't have the genitals to stand up and make ourselves new means to replace these outdated PoS(s).

There's a new motto brewing, the Maker's Motto... If it's broken or nonfunctional, let's rebuild it.


edit on 30-5-2013 by Tranceopticalinclined because: Explosions, Lots of Explosions...



posted on May, 30 2013 @ 10:49 AM
link   
It's part of the system they developed to do their own Judgement Day.

The physicists can use the wireless power meters on your homes along with cellphone towers and use that energy to target a person.....and have them no longer walk this Earth.


Why do you think they started putting those round domes over all the Satellite dishes now? So people can't see those satellite dishes are aimed at......peoples homes.

All part of the directed energy systems they are using for their own Judgement Day.....they're deciding now WHO walks the Earth.
edit on 30-5-2013 by Pervius because: (no reason given)



posted on May, 30 2013 @ 11:29 AM
link   
My opinion? The internet was designed from the ground up for this. It was intended to be an all seeing eye at least as far back as TPTB really understood the potential (and maybe even before that). The phone system was probably just an innocent invention that was intended to make communication easier and better.

By the time the internet really got going, there was enough motive for people who push these kinds of ideas to realize what computers and the internet were really capable of. All they needed to do was control a few key corporations (or better yet, simply plant operatives in them).

We (those of us who are always worried about privacy and such things) have been inadvertently helping them develop the instrument that will be used to scrutinize our every move even as we protest. We can talk about privacy tools and such. These things are nothing to them. You can't encrypt everything and even if you tried, most people just aren't going to bother. You can't pay a company that's basically owned and/or controlled by the government to protect your privacy.

The real tragedy is going to be the loss of privacy on a vast scale. It's bad enough if 1 individual has his/her privacy destroyed. But their aim is much greater than that. Their goal is for every living person to feel like they are being watched at every moment of every day. The majority of people will not see this coming (and more importantly, will not see the significance of it or why they should care) until it's too late.

This is a pessimistic view but it's realistic. It's a matter of time.
edit on 30-5-2013 by BrianFlanders because: (no reason given)



posted on May, 30 2013 @ 12:48 PM
link   
reply to post by RomeByFire
 
Oh i know all to well the dynamics of it , real time gathering deciphering, and decoding of text, sound, pix and numbers. all in one site. lets say you send an pic with a encoded message , well they will see this and will be able to lock on you and the one meant to receive it. how far will it go well we already know some things you can not say with out getting in deep doo doo.
I did not intend to direct it to you but to the reader i hit reply not post, my fault on that one but here i am replying to you .

It is not easy describing how this will work , but the implications‎ are far reaching the smallest word or sentence pic or email or conversation could get you or any one on a watch list , ie [ lets blow this place, she is such a bomb] pic of your kid in the bath tub or the first dipper change sent to grand parents email of business contract [failure to meet dead line will result in termination of said agreement].

now none of that is threatening but take out the sentence or the context you get: blow... bomb... child porn... dead... termination... this in self will send up flags.[ I am sure i am being flag for my views of this for more than reason. ] does it bother me no why should it it is still free speech, and my name on a list , so what i do not fly nor intend to ill be darned if ill let some TSA get his hers jolly's off on me. There will be time when they are so flood with with teenage jargon that they will need to correct some path ways and trigger words.

What i posted are just a few of 100,000 words or text structures they seek out and flag for further tracking, now i am sure of one was to do this on purpose to flood a pathway then they would be in the same deep doo doo as calling in a false shooter such as happening in schools now. kids will be kids but the law nor Them see it that way.



posted on May, 30 2013 @ 12:50 PM
link   
So instead of having a name, the New Zealand subjects get treated like just a number. Just a number that never changes. Totally anonymized, like a bingo game. The probers don't know who is who, they just probe everybody and hope enough numbers line up. After the snoopers find a Bingo, they follow the trail to a box somewhere in New Zealand and open up their prize.

Why, it's a house, and the prize is.. a shiny new prisoner! Yaaaay.

Wait, what? They are gold mining computers. The mirror use of the catch-the-bad-guy technique also goes, anonymously, after the good guy stuff too. Inventors, stock traders, you know, the water engine types of people.

Computer back doors. They have been around since computers had dial up modems. I just never thought it was so sinister back then because I wasn't doing anything big-money like trading stocks or drafting inventions. Just a few military types instituting security to keep internet use polished like they do with regulating movies so kids don't have to see the wrong things.

Fifteen years later the safety line isn't a thread but a fat rope tied to a branch with bait in the middle, and they think it's okay to string up their civilians before they get any big ideas. They are hunting hackers, they claim, but their traps don't distinguish the difference between animals. I see what they did there.

Well for New Zealand their taxes are huge but their medical is fair, and through those controls can you ever expect a government like theirs to let them pass a computer class line now that the thin thread is there?



posted on May, 30 2013 @ 03:26 PM
link   
Same old thing for a new age. Panopticon



posted on May, 31 2013 @ 05:28 PM
link   

Originally posted by winofiend
A rather vague wordpress blog article which details something that happened over 10 years ago.

I'd be more interested in knowing how they intercept email or other private data? At which point are they interfering and intercepting?

and more importantly was it in collaboration with an internet service provider. Which I can guess the answer to already.

However, as it reads here, and from a cursory glance of the article, then NZ was snooped on by a secret agenda to wiretap their private data and they never even knew... so job done, I guess.


Consider the Internet to be like a road network with devices like servers (shopping malls, office blocks and airports), bridges (connecting two local networks together), gateways (between a local network and a national network), routers (road intersections), and hosts (your PC or other PC's and servers).

Cable networks (DSL, ADSL, fibre-optic) have the concept of a "head-end" simply because their network looks like an octopus. At the head-end are the e-mail servers that allow local sending and receiving of e-mail as well as the gateway that connects them to the rest of the internet. This is the best place to copy network traffic.
Sometimes different ISP's put all their hardware in the same location (a co-location center) in order to boost performance and eliminate the costs of long-distance carriers. That's an even better place to intercept traffic.

When internet traffic is sent from a PC (like a large file being sent through E-mail), the file is chopped up into small pieces, each numbered and checksummed. These are called packets and are sent to the IP address of the destination. The surveillance hardware gathers up all these packets, reassembles them, and reconstructs the original file. Depending on its type (ASCII text, PDF file, spreadsheets), it can be analyzed for keywords. Images can be identified through image processing (colour histograms, silhouettes, file matching). Even encrypted files can be decrypted through brute force cracking of passwords (sometimes the passwords are hashed and saved at the end of the file to make things easier). Speech analysis can also be performed, they use voice recognition to detect keywords.

The source and destination addresses can be saved to construct a graph network of who-talks-to-who. Imagine you had a number of parents who pick up their kids from school. Alice talks to Brenda, Brenda sees Charlene at church, Charlene talks to Debra at the supermarket and Elizabeth at the chemists. Debra has a pen-friend called Freda, and Gina who is presently abroad also speaks to Alice.

The hardware to do this usually consists of a super-computer with gigabytes of memory and thousands of custom processors to do the signal processing.



new topics

top topics



 
19
<< 1   >>

log in

join