It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: abago71
a reply to: IAMTAT
Navin R. Johnson is the title character from Steve Martin's "The Jerk".
My favorite quote from Navin:
I know we've only known each other four weeks and three days, but to me it seems like nine weeks and five days. The first day seemed like a week and the second day seemed like five days. And the third day seemed like a week again and the fourth day seemed like eight days. And the fifth day you went to see your mother and that seemed just like a day, and then you came back and later on the sixth day, in the evening, when we saw each other, that started seeming like two days, so in the evening it seemed like two days spilling over into the next day and that started seeming like four days, so at the end of the sixth day on into the seventh day, it seemed like a total of five days. And the sixth day seemed like a week and a half. I have it written down, but I can show it to you tomorrow if you want to see it.
originally posted by: Vasa Croe
originally posted by: MotherMayEye
a reply to: IAMTAT
The HAM radio info is great.
BTW, I have had HAM radio licenses come up for me before when researching some interesting people...like, Obama's uncle Cecil Goeldner.
...You might remember him from this thread:
PRISM, PROMIS, Politics, and Pia -- the mummified woman found dead in Pontiac, Michigan
Might be a good idea to go back and search HAM database for the aliases used by officials from the wikileaks emails.
originally posted by: IAMTAT
originally posted by: Vasa Croe
originally posted by: MotherMayEye
a reply to: IAMTAT
The HAM radio info is great.
BTW, I have had HAM radio licenses come up for me before when researching some interesting people...like, Obama's uncle Cecil Goeldner.
...You might remember him from this thread:
PRISM, PROMIS, Politics, and Pia -- the mummified woman found dead in Pontiac, Michigan
Might be a good idea to go back and search HAM database for the aliases used by officials from the wikileaks emails.
Wouldn't be surprised if a lot of these guys had HAM licenses registered under their WIVES names.
Amateur Radio is regulated by the Federal Communications Commission (FCC) under the Communications Act of 1934. It is also subject to numerous international agreements. All Amateur Radio operators must be licensed. In the U.S., there are three license classes. The higher the class of license, the more frequencies are available. Earning each higher class license requires passing a more difficult examination. Although regulated by the FCC, license exams are given by volunteer groups of Amateur Radio operators. Operating under organizations called Volunteer Examiner Coordinators, volunteers administer and grade tests and report results to the FCC, which then issues the license. U.S. licenses are good for 10 years before renewal, and anyone may hold one except a representative of a foreign government.
Reposting Nellie Ohr and Open Sources.
I think these open source hacking teams are the Crowdstrike “Bears” teams. About a dozen teams. Five Eyes liaison for the NATO program - run out of GCHQ. Station chief doles out Vault7 hacking tools by project. Cambridge had a Alpha Bank.
originally posted by: IAMTAT
Looks like others are on to this idea:
twitter.com...
originally posted by: pavil
originally posted by: IAMTAT
Looks like others are on to this idea:
twitter.com...
If there are multiple Ham Radio Licensees that can be tied down to figures in this......... it's game over.
They are smart enough not to use their name, think wifes and kids.
originally posted by: pavil
originally posted by: IAMTAT
Looks like others are on to this idea:
twitter.com...
They are smart enough not to use their name, think wifes and kids.
originally posted by: butcherguy
originally posted by: pavil
originally posted by: IAMTAT
Looks like others are on to this idea:
twitter.com...
They are smart enough not to use their name, think wifes and kids.
I guess.
John Podesta had 'password' for a password for a while. When he found out that it wasn't that secure, he changed it to 'p@ssword'.
originally posted by: Grambler
originally posted by: butcherguy
originally posted by: pavil
originally posted by: IAMTAT
Looks like others are on to this idea:
twitter.com...
They are smart enough not to use their name, think wifes and kids.
I guess.
John Podesta had 'password' for a password for a while. When he found out that it wasn't that secure, he changed it to 'p@ssword'.
They all thought they were above the law or any criticism.
So they didn't have to worry about trying to cover their tracks very hard.
WASHINGTON — A member of President Donald Trump's legal team said today, that it's time to create a second special counsel to start investigating the FBI and Department of Justice.
Jay Sekulow confirmed his remarks, which were first reported by Axios, in which he said the DOJ and FBI can no longer ignore the "multiple problems" created by "obvious conflicts of interest" while a special counsel investigates allegations of collusion between Russia and Trump's presidential campaign. Robert Mueller, a former FBI director, began leading that federal probe in May.
"These new revelations require the appointment of a special counsel to investigate," Sekulow said. He said the call for another special counsel "has nothing to do with Bob Mueller or Mueller's team."
originally posted by: butcherguy
originally posted by: pavil
originally posted by: IAMTAT
Looks like others are on to this idea:
twitter.com...
They are smart enough not to use their name, think wifes and kids.
I guess.
John Podesta had 'password' for a password for a while. When he found out that it wasn't that secure, he changed it to 'p@ssword'.
04:30 ”The FBI has created a new counterintelligence unit to manage these [leak] cases”
08:17 ”these National Security breaches do not just originate from within the Intelligence Community. They come from a wide range of sources within the government, including the Congress."
00:50 “we’re responding appropriately. We’re going to devote more resources, re-evaluate our procedures and make sure we investigate every one of those leaks in an appropriate way.”
1:07 “We have seen a surge in referrals (of leaks). We’ve seen an increase in the number of leaks. And we’re going to respond appropriately and try to establish an effective deterrent. Criminal prosecution isn’t the only way to prevent leaks but it’s an important part of the solution.”
1:43 “That significant increase has necessitated an increase in resources. And so we have re-prioritized our cases within the National Security Division, we’re providing appropriate supervision at a high level, we’ve created a new unit within the FBI to focus on those leaks, and we’re going to devote whatever resources are necessary to get them under control.”
originally posted by: AndyFromMichigan
a reply to: jadedANDcynical
ETA: I find it funny how the FBI was happy to leak like a colander when the leaks were hurting Trump, but now that the leaks are hurting them, well by God they're going to hunt down those leakers and punish them
08:17 ”these National Security breaches do not just originate from within the Intelligence Community. They come from a wide range of sources within the government, including the Congress."