It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Eilasvaleleyn
Also, does your experience involve working on the specific software involved in the case, or do you have its exact specifications that make the claimed story impossible? If not, your opinion is as worthless as mine from a technological perspective. If I know all about one type of piano... Well, not all pianos are exactly the same.
Actually, I don't even know why I'm responding to this... It's obviously some sort of bait.
The above screenshot is, at first glance, an audit trail of actions taken by a particular user within the NGP-VAN system. To a layman, this appears very much as one might think a system produced audit trail would. It has all the features we associate with technical mumbo-jumbo, including highly specific timestamps (down to the second), consistency among description (searches preceded with “Searched:”), etc.
This sample alone, however, gives us pretty clear indications that this is not an actual log. What you’re seeing in Exhibit A is, at best, a human interpretation of a more technical log, at worst, a complete fabrication. As with most things, the reality probably lies somewhere in the middle. That is to say, I’m not claiming that these are complete fabrications, but rather, likely a reduction of information contained in multiple logs which are not necessarily as clear about what is going on as are the descriptions we see here.
originally posted by: AlaskanDad
.
The above screenshot is, at first glance, an audit trail of actions taken by a particular user within the NGP-VAN system