It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.
lol
originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.
lol
originally posted by: imthegoat
originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.
lol
Wikileaks doesn't hack either. The latest releases (including the DNC drops, and many others) aren't hacked. They're leaked to Wikileaks, who then leaks them to the public.
originally posted by: Annee
originally posted by: imthegoat
originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.
lol
Wikileaks doesn't hack either. The latest releases (including the DNC drops, and many others) aren't hacked. They're leaked to Wikileaks, who then leaks them to the public.
Cracks me up when "they" try to justify Leaked - - - as not hacked.
Apparently, receiving stolen property absolves you.
originally posted by: Annee
originally posted by: imthegoat
originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.
lol
Wikileaks doesn't hack either. The latest releases (including the DNC drops, and many others) aren't hacked. They're leaked to Wikileaks, who then leaks them to the public.
Cracks me up when "they" try to justify Leaked - - - as not hacked.
Apparently, receiving stolen property absolves you.
originally posted by: StargateSG7
a reply to: IAMTAT
Well Duhhhh !!!!!
Of COURSE ATS is a honeypot!
As a former member (kinda, sorta, maybe past and present)
of the intelligence community, can tell you that the NSA,
DIA, and a few other 3, 4 and 5 letter agencies around the
world have targeted websites such as ATS, RENSE,
ZERO HEDGE, HOTMAIL, OUTLOOK, GMAIL, etc,
for YEARS (if not decades now!).
Since SSL2 was broken a few years back, man-in-the-middle
servers have been put on almost all major telcos, Cable-Co's,
and Edge Servers so that basic metadata (and sometimes
full interception) can be gathered and datamined for
connections, associations, and technical data.
In the USA, for the most part, only a general sweep
of emails that look for the specified "FIVE EYES"
dictionary terms are run through on an automated
basis. When found terms trigger a secondary examination
by rather advanced datamining software, the systems do
a more specific associative dig into the data before it
EVER gets flagged for a look by a human SIGINT/HUMINT analyst.
Only SPECIFICALLY TARGETED individuals get a long-term,
continuous datamining software assignment on ALL their
communications. If foreign, the person simply gets monitored
from the get go. If US born or a citizen and resident in-country,
GENERALLY a court order is obtained (although I have seen that
NOT happen a few times!) before a SIGINT/HUMINT person/team
is assigned.
And those targets are assigned threat levels that take into account
personality traits (is he/she violent or passive?), connections to other
persons (do they have relatives in Syria or Yemen), types of activities
(are they an ATS blogger or Patriot Website operator?) or their education
and expertise level (i.e. are they a chemist, bioligist or nuclear tech or ex-military?).
Only after about 10-15 steps is ANY targeted individual scanned
on a continuous basis and since the current ACTIVE Person-of-Interest
database is about 600,000 persons in size even that gets whittled
down to less than 20,000 and then about 2500 to 10,000 depending
upon year, that get personal teams of SIGINT/HUMINT operators to
take a closer more personal look!
The CIA and NSA don't like to share their almost IDENTICIAL SearchBook
databases (user interfaces are nearly identical to Facebook but designed
for Persons of Interest!). And the turf wars EVEN IN 2016 are RIDICULOUS !!!!
I just goto the DIA one...it's much easier to deal with a self-discliplined
Major or Captain! No BS from any idiot cement-condo-sucking urbanite
barely-post-millennial managers!
So don't flatter yourselves, thinking you're being scanned by the NSA!
A machine does that mostly for time, date, location, to/from data
and any subject matter keywords metadata and only a FEW lucky
ones get any real-world human attention!
The blackouts you saw today LIKELY started from Virginia and New Jersey
and went on from there! Possibly internal-to-USA agency started this
because of Wikileaks but you can't TOTALLY discount Russia, North Korea,
China and Eastern European Criminal Organization IN THAT ORDER being
the cause...my bet is this is an exercise by NSA to test disruption software
BEFORE giving it a full Cyberwarfare Whack at Russia by Early-to-Mid December!
TOUCHE !!!!!
P.S. Fer Da Spooks: Don't Mess With Me!
My Friends Can Send Your Planet into the Sun!
Don't Tick Them Off !!!!
warning: "the wikileaks account has be compromised" is a psyop.
I wasn't sure before so I posted some evidence that assange was never running the wikileaks account that you can see from well before he lost internet, a normal person who was just being hysteric and believing assange was truly dead would have accepted this evidence and moved on, but instead CTR continues pushing these threads constantly all day. they're scared of the new information that's about to drop, and so they want people questioning wikileaks and dogpiling them instead of looking at their leaks
what CTR wants you to believe:
>assange was running the wikileaks account up until he lost internet
the truth:
>assange wasn't running the account, it was someone else from wikileaks who sometimes issued quotes from assange and ALWAYS talked about him in the third person [I've also seen CTR trying to debunk my posts by claiming this is similar to how trump refers to himself in the third person, not true because wikileaks literally prefaces quotes from assange himself with "#Assange:"
what CTR wants you to believe:
>wikileaks always tweeted with the utmost professionalism, they only started acting strange after assange lost internet
the truth:
>they've always engaged in bantz and the retweeting of all sorts of obscure news sources as long as they were talking about wikileaks
what CTR wants you to believe:
>wikileaks is being uncharacteristically hostile towards clinton and her campaign
the truth:
>wikileaks has always been hostile to people who lie about wikileaks, which right now is mostly clinton's campaign and her shills
remember, CTR wants you to waste the last weeks of the campaign attacking wikileaks and believing they're now a shill operation. what they DO NOT want you to do is to continue digging wikileaks emails and prompting evidence of corruption
CTR's main strategy these days seems to be distract because they know they can't actually convince anyone on /pol/ to vote for hillary
originally posted by: Annee
originally posted by: Realtruth
originally posted by: Annee
Apparently, receiving stolen property absolves you.
Clinton Foundation tenet and principles. And lying about it too.
Deflection.