It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Evidence that ALL computers are under GOVERNMENT SURVEILLANCE.

page: 1
12
<<   2  3  4 >>

log in

join
share:

posted on Apr, 6 2010 @ 08:04 PM
link   
The amount of ORGANIZATION that I see in attempts to access my computer can only spell government. Here's the evidence to support that.
i102.photobucket.com...
i102.photobucket.com...
i102.photobucket.com...

Ok, notice at 06:45:04 the OUTGOING attempts to ports 1935 and 8080?
i102.photobucket.com...
That's a government backdoor in VISTA.

In case there are any doubts, this piece of evidence implicates them in this surveillance operation.
i102.photobucket.com...
notice at 09:24:01 the incoming attempts by 8.18.43.x ?
then at 09:27:45 OUTGOING to the same block.

Here's more of the same.
i102.photobucket.com...
14:07:19 there's incoming from 8.19.18.x
outgoing to the same at 14:16:38

Yet more. Check out the ICMP OUT to the 74.125.67.x block at the top.
i102.photobucket.com...
amazingly enough there's input attempts by the same group at the bottom.

From what I can tell, they're are using ICMP outs to try and punch a hole through any firewalls to which they can masquerade through. and in 'They', I mean GOVERNMENT.



posted on Apr, 6 2010 @ 08:09 PM
link   
reply to post by tnangela
 


For those of us who are not very computer savvy ... could you tell us how you deduced this is the government as opposed to let's say spyware/adware?

Which one of those IPs corresponds to a government agency?



posted on Apr, 6 2010 @ 08:15 PM
link   
Mhmm, could you kind of give us some more info.

E.g. you say backdoor is vista, what backdoor? what does it allow? what evidence do you have.

Because i know about computers, well enough to say that just because you have blocked incoming connections all the time dont mean it is the goverment, it could just be someone attempting a DDoS or a hack.



posted on Apr, 6 2010 @ 08:15 PM
link   
If you look at the first three pictures. You will notice ENTIRE net blocks being used. These are all government. You're welcome to perform reverse lookups if you like to get a better picture of who has been given contracts to spy on us.

The port 1935 story is that it's adobe flash. It's just that- a cover up story/red herring.
I've also noticed that when VISTA can't get out on port 1935 or 8080 it JUMPS TO OTHER PORTS (like some of the sophisticated IM clients).



posted on Apr, 6 2010 @ 08:18 PM
link   

Originally posted by tnangela
If you look at the first three pictures. You will notice ENTIRE net blocks being used. These are all government. You're welcome to perform reverse lookups if you like to get a better picture of who has been given contracts to spy on us.


Okay ... this is what I got:

[atsimg]http://files.abovetopsecret.com/images/member/f0fa200a9b86.png[/atsimg]


OrgName: BellSouth.net Inc.
OrgID: BELL
Address: 575 Morosgo Drive
City: Atlanta
StateProv: GA
PostalCode: 30324
Country: US

ReferralServer: rwhois://rwhois.eng.bellsouth.net:4321

NetRange: 98.64.0.0 - 98.95.255.255
CIDR: 98.64.0.0/11
OriginAS: AS6380, AS6381, AS6382, AS6383
OriginAS: AS6384, AS6385, AS6386, AS6387
OriginAS: AS6388, AS6389, AS7891, AS7892
OriginAS: AS7893, AS7894, AS8060, AS8061
OriginAS: AS8062, AS8063
NetName: BELLSNET-BLK19
NetHandle: NET-98-64-0-0-1
Parent: NET-98-0-0-0-0
NetType: Direct Allocation
NameServer: AUTH-DNS.ASM.BELLSOUTH.NET
NameServer: AUTH-DNS.MIA.BELLSOUTH.NET
NameServer: AUTH-DNS.MSY.BELLSOUTH.NET
Comment:
Comment: For Abuse Issues, email [email protected]. NO ATTACHMENTS. Include IP
Comment: address, time/date, message header, and attack logs.
Comment: For Subpoena Request, email [email protected] with "SUBPOENA"
Comment: in the subject line. Law Enforcement Agencies ONLY, please.
RegDate: 2008-01-07
Updated: 2009-02-10

RAbuseHandle: ABUSE81-ARIN
RAbuseName: Abuse Group
RAbusePhone: +1-919-319-8265
RAbuseEmail: [email protected]

RTechHandle: JG726-ARIN
RTechName: Geurin, Joe
RTechPhone: +1-404-499-5240
RTechEmail: [email protected]

OrgAbuseHandle: ABUSE81-ARIN
OrgAbuseName: Abuse Group
OrgAbusePhone: +1-919-319-8265
OrgAbuseEmail: [email protected]

OrgTechHandle: JG726-ARIN
OrgTechName: Geurin, Joe
OrgTechPhone: +1-404-499-5240
OrgTechEmail: [email protected]

CustName: TYS ADSL CBB
Address: 575 Morosgo Dr. NE
City: Atlanta
StateProv: GA
PostalCode: 30324
Country: US
RegDate: 2010-03-03
Updated: 2010-03-03

NetRange: 98.70.96.0 - 98.70.127.255
CIDR: 98.70.96.0/19
NetName: BLS-98-70-96-0-1003020950
NetHandle: NET-98-70-96-0-1
Parent: NET-98-64-0-0-1
NetType: Reassigned
Comment:
RegDate: 2010-03-03
Updated: 2010-03-03

RAbuseHandle: ABUSE81-ARIN
RAbuseName: Abuse Group
RAbusePhone: +1-919-319-8265
RAbuseEmail: [email protected]

RTechHandle: JG726-ARIN
RTechName: Geurin, Joe
RTechPhone: +1-404-499-5240
RTechEmail: [email protected]

OrgAbuseHandle: ABUSE81-ARIN
OrgAbuseName: Abuse Group
OrgAbusePhone: +1-919-319-8265
OrgAbuseEmail: [email protected]

OrgTechHandle: JG726-ARIN
OrgTechName: Geurin, Joe
OrgTechPhone: +1-404-499-5240
OrgTechEmail: [email protected]


I'm confused!


[edit on 6 Apr 2010 by schrodingers dog]



posted on Apr, 6 2010 @ 08:23 PM
link   
Yeah, that's me. Wow you really ARE good at computers!!!



posted on Apr, 6 2010 @ 08:25 PM
link   
reply to post by tnangela
 


I just did what you said.

I also ran the other IP address on the same line and it said:


208.111.185.135 - Whois Information

OrgName: Limelight Networks, Inc.
OrgID: LLNW
Address: 2220 W. 14th Street
City: Tempe
StateProv: AZ
PostalCode: 85281
Country: US

ReferralServer: rwhois://rwhois.llnw.net:4321/

NetRange: 208.111.128.0 - 208.111.191.255
CIDR: 208.111.128.0/18
OriginAS: AS22822
NetName: LLNW-3
NetHandle: NET-208-111-128-0-1
Parent: NET-208-0-0-0-0
NetType: Direct Allocation
NameServer: DNS.LAX.LLNS.NET
NameServer: DNS.LGA.LLNS.NET
NameServer: DNS.SJC.LLNS.NET
NameServer: DNS.IAD.LLNS.NET
Comment: *** All abuse complaints must go to abuse (at)
Comment: limelightnetworks.com
Comment: Network reassignments available via rwhois.llnw.net:4321
RegDate: 2006-03-30
Updated: 2009-02-18

RAbuseHandle: LNAD-ARIN
RAbuseName: Limelight Networks Abuse Dept
RAbusePhone: +1-602-850-5095
RAbuseEmail: [email protected]

RTechHandle: LNAA-ARIN
RTechName: Limelight Networks ARIN Admin
RTechPhone: +1-602-850-5095
RTechEmail: [email protected]

OrgAbuseHandle: LNAD-ARIN
OrgAbuseName: Limelight Networks Abuse Dept
OrgAbusePhone: +1-602-850-5095
OrgAbuseEmail: [email protected]

OrgTechHandle: LNAA-ARIN
OrgTechName: Limelight Networks ARIN Admin
OrgTechPhone: +1-602-850-5095
OrgTechEmail: [email protected]

# ARIN WHOIS database, last updated 2010-04-06 20:00
# Enter ? for additional hints on searching ARIN's WHOIS database.
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at www.arin.net...


Which is these guys: www.limelightnetworks.com...

So I'm still confused as to why you say the government is involved.

[edit on 6 Apr 2010 by schrodingers dog]



posted on Apr, 6 2010 @ 08:29 PM
link   
interesting.
you can of course choose to block ports there..joe

oh, and btw...dont give schrodingers dog your IP...he is a government agent.

aww crap, you already did.



posted on Apr, 6 2010 @ 08:32 PM
link   
reply to post by SaturnFX
 


[atsimg]http://files.abovetopsecret.com/images/member/390064c15318.jpg[/atsimg]

I don't even know what I'm looking at with all those numbers in those pictures.


Where iz teh government?



posted on Apr, 6 2010 @ 08:35 PM
link   
"So I'm still confused as to why you say the government is involved."

Because of the amount of ORGANIZATION involved- and I'm sorry but if you don't see that, then I just can't really help you further. The amount of ORGANIZATION from the same ENTIRE IP blocks day in and day out with just a few attempts from each individual IP can only spell GOVERNMENT. Then just to cinch it all up I showed how they are using ICMP outs to try and punch holes to come back through on TO THE SAME IP's.

Actually I'm fairly hip to several of the surveillance 'features'. Port 135 is one of them. DHCP also has some secrets (port 67/68, & broadcast host). UDP ports 1025/1026 was used in XP. Lately DNS spoofing is being used in attempted surveillance.



posted on Apr, 6 2010 @ 08:38 PM
link   
wake the hail up....yes they see us.....a huge azz computer trackin us
my lap top from 2009 has this little hole on the lid where a video camera would be, but it's really small but well formed, i know what that is. when i toss this laptop, i'll bust open and see what.!



posted on Apr, 6 2010 @ 08:39 PM
link   

Originally posted by tnangela

Because of the amount of ORGANIZATION involved- and I'm sorry but if you don't see that, then I just can't really help you further.


Fair enough ... didn't realize I had to have an IT degree to get clued in.

Though I venture to say that many members who do not possess your computer aptitude might be interested in your epiphany.



posted on Apr, 6 2010 @ 08:46 PM
link   
There's really only two outcomes to this story.
1.) We are under government computer surveillance.
2.) We are NOT under government computer surveillance.

I KNOW that #1 is the correct answer. You are welcome to continue to believe in #2- that doesn't bother me. This IS a conspiracy forum correct? If you've got some better evidence to contradict the facts I would be glad for you to share. Discussion and dialog are great things!!!



posted on Apr, 6 2010 @ 08:48 PM
link   
reply to post by GBP/JPY
 


haha, that post cracked me up.

At any rate, I don't see how this is any proof that the government is doing that, its a reach at best. There are plenty of ways to mask IP's and anyone who is any good at not getting caught will not be using their own IP's, probably using blocks of other IP's that belong to other people. Also, organization has nothing to do with it, its more than likely just a program that scans for vulnerabilities...just someone running the program and logging open IP's, not some government agent manually hacking into your PC.



posted on Apr, 6 2010 @ 08:51 PM
link   

Originally posted by tnangela

I KNOW that #1 is the correct answer. You are welcome to continue to believe in #2- that doesn't bother me. This IS a conspiracy forum correct? If you've got some better evidence to contradict the facts I would be glad for you to share. Discussion and dialog are great things!!!


Dude, I never said I didn't believe you, I only said I didn't understand!

I asked you to explain it in lay terms and you said if I didn't understand "you can't help me any further" ...

Good luck to you!



*man, that "Nick Burns, your company's computer guy" sketch was spot on*



[edit on 6 Apr 2010 by schrodingers dog]



posted on Apr, 6 2010 @ 08:52 PM
link   
so if this is true, does that mean that they can turn on my built-in webcamera on my laptop?

i know that there was a news story / controversy over a school which remotely activated the student's laptops not long ago?



posted on Apr, 6 2010 @ 08:59 PM
link   

Originally posted by tnangela
"So I'm still confused as to why you say the government is involved."

Because of the amount of ORGANIZATION involved- and I'm sorry but if you don't see that, then I just can't really help you further. The amount of ORGANIZATION from the same ENTIRE IP blocks day in and day out with just a few attempts from each individual IP can only spell GOVERNMENT. Then just to cinch it all up I showed how they are using ICMP outs to try and punch holes to come back through on TO THE SAME IP's.

Actually I'm fairly hip to several of the surveillance 'features'. Port 135 is one of them. DHCP also has some secrets (port 67/68, & broadcast host). UDP ports 1025/1026 was used in XP. Lately DNS spoofing is being used in attempted surveillance.


I'm confused to.

Why do you think it's government? Do you have any other facts other than your So called Picture Facts to tell us that it's government?

We need more Proof to to understand it...


Oh, you might want to stop dowloading Music and Software from P2P networks next time you use pictures to show your Firewalls Logged IP Adresses..

That wasn't really smart either..

Just Sayin'

[edit on 6-4-2010 by Damian-007]



posted on Apr, 6 2010 @ 09:06 PM
link   
Good job on keeping tabs on your traffic. Although I fired MS 6 months ago and went to Linux, I have noticed on more than one occasion port scan warnings show up and there have been more than a couple of them when I looked them up on Who.is originated from China. I just blacklist them and do not have any further issues.

I also have a couple of websites and that is where I have noticed more suspicious probes. A couple of months ago, I noticed what appeared to be a bot that was making rapid and stupid requests, so I checked the IP's (block of IP's) that were recorded in my server logs and by the time I was finished tracing, the IP lead back to a company out of VA that come to find out has a track record for SPAM. I'm guessing it's bot was a harvester looking for email addresses, and when it couldn't find any, it moved on. I'm sure it will return.

I do not doubt the government has people and bots patrolling the web, especially with the cyber policies that were put into place in recent times, but everything that hits our computers and servers does not originate from a government source. You would be amazed at the bots that are crawling the web.



posted on Apr, 6 2010 @ 09:07 PM
link   
Damian. I love you bra. Really I do. But I wanted to let you know. I do NOT run ANY p2p nor have I downloaded ANYTHING copyright or illegal (since I've been with AT&T anyways). Y'all can't try and scare me there, gonna have to use different tactics than that.



posted on Apr, 6 2010 @ 09:10 PM
link   
The site that SD posted gets blocked by peerblock when I am surfing the net. I you want, peerblock is the best blocking software I have come across.

Give it a try.




top topics



 
12
<<   2  3  4 >>

log in

join