originally posted by: pryingopen3rdeye
a reply to: StargateSG7
so this is really strange, back when this thread first popped i went ahead and saved a copy of this thread into the wayback machine archives at
cause i figured what if it got censored, just in case,
well now i went to double check and it is no longer archived, believe the only ones capable of having something removed from the archive would be ats
themselves, or University of Toronto after confirming to the archives the press release was real,
so this could be an indicator.
i have just saved this thread to the archives AGAIN, lets see if it sticks this time
youll have to quote my post and copy past the url into browser to see it, ats wont allow it to format correctly in the post
ATS Posts not being posted!
Web Archives NOT being archived!
Messages being lost between U2U users!
There are a NUMBER of reasons for these events
but here is a VERY GENERAL POSSIBLE EXPLANATION
for SOME of the issues you have experienced.
This web archives issue is a common problem with
ATS because the client connections between the
servers owned and operated on behalf
of AboveTopSecret by:
Staminus Communications, Inc,
4695 Macarthur Court,
Newport Beach, USA
have had numerous issues with hackers!
His hosted websites have had MORE THAN
A FEW PROBLEMS with agency hackers
(USA, Russia, China, UK, etc. etc.)
AND criminal hackers:
And based upon the surrounding offices, I can
SUSPICIOUSLY INFER where he gets his probably
gets his OWN AGENCY secret funding from:
Bank of America?
NOTE: Copy above link to Google maps MINUS THE DOUBLE QUOTES
Who knows? I smell an ATS Multi-Agency Slush Fund Conspiracy here !!!!!!!
There are NUMEROUS Man-in-The-Middle server connections
operated by MANY agencies and groups which INTERCEPT and decrypt
your SSL2/SSL3/TLS/etc encrypted ATS connections and the sent/received
IP packets are almost always saved to local hard disks and /or also forwarded
onto UTAH, Langley VA, Ft. Meade, etc. where something called
an "Array Processor" does deep packet inspections to find text
containing one of the "Dictionary Keywords" that is requested
by the "Five Eyes" Echelon partnership (USA, UK, Canada,
Australia, New Zealand). The first 5-Eyes keyword search
is done ON ALL ATS packets to search for the usual ATS oddballs
who might be contemplating terrorist acts or are part of domestic
groups (aka gun owners, survivalists, anti-government types, etc)
that ANY of the 5-eyes partners wants to keep tabs on.
If a hit is made on any of the "Dictionary Entries" the
data packets obtained from ATS get sent to
FBI/CSIS/CSE/MI5/MI6, etc for possible criminal
activities intelligence action.
The 2nd Layer Text search is for Metadata (packet times,
IP address, discernable phone numbers, email and social
media addresses and other identifiable person, time and
place data) which goes into the NSA's SearchBook database
which is its own version of Facebook running on an SQL backend
and I think an Oracle or DB2 database engine (not sure which
one anymore!) which takes all the man-in-the-middle packets
taken from various telco datamining intercepts and creates an
internal-only online profile of a person-of-interest. It's pretty
much identical to Facebook (even the front end user interface!)
and allows NSA employees the ability to correlate ALL current
who/date/time/place CONNECTIONS between all persons of
interest within a given geographic area, calendar period
and/or social media and email communications criteria.
The NSA SearchBook system allows NSA to have a
timeline-like graph/chart that shows how many
degrees of separation are between any given group
of individuals so that a determination may be obtained
if the actions and/or words of a single person of a group
of people are actionable and related!
The 2nd layer text search/metadata correlation
is for NSA-internal use only for mostly internal-to-USA
and SOME foreign intelligence agency sharing! The CIA
his its own version of SearchBook for Foreign Policy/StateCraft/Spy
use by its external affairs area staff in various countries but both
agencies HATE SHARING their own databases with each other
in fact, BLATANTLY interfering and delaying requests for each
other's data! --- STUPID STUPID STUPID !!!!
The 3rd Layer Deep Packet inspection is
DIA (Defence Intelligence Agency) use
internal to SPECIFIC SUBGROUPS who need
to find certain political and technological
activities/personnel/systems and for
use by SOCOM/Joint Chiefs perusal.
Military operations oriented and
for protection of Services property
The 4th Layer Search of ATS communications
and postings...is for us and if you find out
about it then we (Me?) gets to come and
hunt y'all down in your office be it at
McLean, VA 22101 or at 9800 Savage Road
or at 20 20 MacDill Blvd and trust me on this
YOU DO NOT WANT TO SEE ME IN YOUR BUILDING
accompanied by my Oakley-sunglass-wearing-and-
Oakley-booted force of 250 lbs+ black-badged goons! ;-) :-)
Dat's fer da Spooks!
After the above explanation, I can say ATS is also slow PARTLY
because Microsoft hasn't got folder, file and communications
permissions down correctly on Windows 2012/SQL server which
means too many retries for packet requests that are being made
between the man-and-the-middle servers and the client and
ATS main servers. In addition to STOOOPID DNS (Domain Name
System) timeouts caused by improperly configured DNS lists,
bad packet forwarding setups and any number of simple
MUST BE DONE server administration tasks that well...
JUST WEREN'T DONE by the people intercepting
all our ATS communications!
This means updates to user interfaces, whois requests,
internet archive requests are all screwy. Plus this breaking
AES-256 keys is VERY INTERESTING to NSA crypto personnel
and a lot of requests are coming into ATS for further website
searches which also slows thing.
For the spooks:
P.S. Replace all file/folder permissions with System, Services, Network Services,
Domain Admins, Enterprise Admins and Administrators (set all to Full Control)
then add Trusted Installer (partial control --- u cn figure which ones out!)
and add the LOCAL MACHINE Admin account on the server or client
(full control) and finally the actual account (i.e. NSA_Sweeper_Account)
that the software is running under (full control) --- Disable all inheritance
use explicit permissions only --- Take ownership as Administrators on all
files and folders so you can remove inheritance. GO THROUGH EVERY FLDER
in C:Windows --- do it by hand! Permissions ARE the problem!
Now back to ATS....ATS is monitored DAILY even HOURLY or more!
My crypto subject area is interesting --- And soon I WILL have the
Wikileaks insurance file broken by the University of Toronto
algorithm and then will post the password here once I break it!
P.S. It is SO EASY to determine whether a
man-in-the-middle server is being used
it's not funny....
edit on 2016/6/20 by StargateSG7 because: sp