It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: onehuman
I don't know how many of you are fans of Tore Says, but she just released one hell of an article. Even comes with wonderful little e-mails proofs, quite the cast of characters, and sooo much more. This one is going to be on fire, so get ahead of it!
EXCLUSIVE| Obama Admin Talks About How They Beat Romney Before The Elections
originally posted by: 13Kiwi20qYes
The feeling when finding out that all wars are orchestrated, devastation and huge anger, lol then more rabbit holes, but for some time after i still held hope this was incorrect, quietly within, feel many are doing this at present.
originally posted by: PillarOfFire
a reply to: MountainLaurel
I don't anyone will think much of Hanks or Roger's once this movie readies it finale. Most will want to see them hanged.
During the technical exercise, participants will hone their practical skills in mitigating a targeted supply chain attack on a corporate ecosystem in real time.
Unfortunately, today’s internet architecture is ill-equipped to accommodate such user preferences. The path-discovery mechanism that is used nowadays (a protocol called BGP) provides only a single path between any two points in the internet, offering neither transparency nor choice to users.
To resolve these drawbacks, researchers have been working for over a decade to create a viable alternative. This alternative, the SCION next-generation internet architecture, allows service providers (ISPs) to offer multiple paths to their customers, to augment these paths with valuable information (such as the carbon footprint of the path), and to forward traffic based on their customers’ path choice.
At ETH Zurich, we have been working on a modern replacement to the ageing BGP. The next generation SCION Internet is designed to be provably stable in the face of major disruptions and even hackers. By “provably” we mean that our researchers, aided by state-of-the-art software, applied “formal verification” to devise mathematical proofs of SCION’s stability.
SCION FAQ
Does SCION make it easier to censor the Internet?
No, SCION makes it strictly harder for a government to censor networks. We are not aware of an attack that a government could perform on SCION that could not be performed on today's Internet. On the other hand, many attacks that are possible in today's Internet, do not work in SCION, for example route hijacking attacks — a SCION path cannot be diverted due to the separation of control and data planes.
For two hours on June 6, a large portion of mobile device traffic in Europe was diverted through systems controlled by China Telecom. According to ZDNet, the technical error was caused after the Border Gateway Protocol (BGP), which reroutes traffic at the internet service provider level, at Swiss data center company Safe Host leaked more than 70,000 routes to the Chinese internet service provider.
China Telecom May Have Revealed a New Hacking Method (June 11, 2019)
“We don’t believe that the Internet will be compromised within a matter of hours or days,” said Brent Woodworth, worldwide manager for IBM’s Crisis Response Team, which does consulting on disaster preparedness. “Most Internet traffic is reroutable, and as different areas are affected at different rates by a pandemic, the networks could anticipate increased traffic and adjust accordingly — with the caveat that critical components will be maintained.”
originally posted by: onehuman
I don't know how many of you are fans of Tore Says, but she just released one hell of an article. Even comes with wonderful little e-mails proofs, quite the cast of characters, and sooo much more. This one is going to be on fire, so get ahead of it!
EXCLUSIVE| Obama Admin Talks About How They Beat Romney Before The Elections
originally posted by: EndtheMadnessNow
Just to get everything straight:
1. Colonial pipeline "hacked"
2. Fuel prices go up, panic stricken long lines ensue
3. We need renewables, now! Infrastructure!!
4. Ransom paid
5. Pipeline reopened
6. Nearly all bitcoin ransom recovered*
7. Bitcoin was on a "bitcoin server" in northern CA
8. FBI obtained the “private key” for the wallet address. No explanation how the FBI got the key.
9. FBI saves the day
*No bitcoin wallet was hacked, nor is even known to be possible. Ransom hackers used a rented cloud server. FBI got a subpoena and took control of it and recovered coins. That's it.
Thank you alphabet agency for saving America's freedoms, and you can have a 30% budget increase next fiscal year.🙄🤡
The FBI in cooperation with Australian police has been secretly operating encrypted chat app ANOM, which was popular among criminal gangs. The criminals had no idea that they were being surveilled while using the app. The covert operation eventually evolved into a joint effort by 16 countries to crack down on organized crime.
More than 12,000 mobile phones with the app were used by over 300 criminal syndicates, including Italian mafia, across roughly 100 nations, Europol said in a statement on Tuesday
Europol Deputy Executive Director Jean-Philippe Lecouffe said the takedown was “exceptional by its global outcomes.”
To date, 155 people have been detained in Sweden, the country’s police said. Linda Staaf, the head of intelligence at the Swedish Police Authority, said that many suspects were linked to the drug market. She added that five “Swedish criminal actors” were arrested in Spain.
The FBI and Australian police have been secretly reading a secure chat app popular with organized crime for several years. The operation, dubbed ‘the sting of the century’ in the media, resulted in hundreds of arrests.
Criminals have been using the supposedly highly secure encrypted chat app ANOM, which was installed on mobile phones bought on the black market, the Australian Federal Police (AFP) said in a statement on Tuesday. The devices were stripped of all other functions and could only send messages via ANOM, which was becoming increasingly popular in criminal circles.
The sting – called Operation Ironside and which ran for three years – has led to 224 arrests by the AFP. The suspects were linked to Australian-based Italian mafia, Asian and Albanian crime syndicates, as well as motorcycle gangs.
a reply to: crankyoldman
Voting is toooooooooooo important to be left up the people. Your vote, my vote, their vote NEVER MATTERED. To think otherwise is to be a fool of one's own making.
Why would people of power, whose entire life about getting more power, just give up power to those they have total contempt for???
When an explanation for this ^^^ arrives in my inbox I'll start talking fair voting for the people by the people, until then anyone who occupies the fair voting position just doesn't get it.
“Egyptian media: John McCain is real Supreme Guide of the Muslim Brotherhood,” Middle East Monitor, September 3, 2018 (thanks to Lookmann):
Egyptian media has accused the late US senator and presidential nominee John McCain of being the ‘Godfather’, ‘leader’, and ‘real Supreme Guide’ of the Muslim Brotherhood organisation.
In remarks, he made during a talk show aired on Sada El-Balad TV, the Egyptian media personality and TV host Ahmed Moussa claimed that McCain, recognised in the US as a national war hero and longtime senator, was, in fact, the ‘real Supreme Guide’ of the Muslim Brotherhood."
“John McCain is the real Supreme Guide of the terrorist Muslim Brotherhood, not Badee and not Akef,” Moussa said.
originally posted by: crankyoldman
originally posted by: Caled
I'm confused. When did the IRS get statutory authority to regulate currencies?
The IRS Mission
Provide America's taxpayers top quality service by helping them understand and meet their tax responsibilities and enforce the law with integrity and fairness to all.
This mission statement describes our role and the public’s expectation about how we should perform that role.
In the United States, the Congress passes tax laws and requires taxpayers to comply.
The taxpayer’s role is to understand and meet his or her tax obligations.
The IRS role is to help the large majority of compliant taxpayers with the tax law, while ensuring that the minority who are unwilling to comply pay their fair share.
originally posted by: crankyoldman
originally posted by: aFrayedknot2
I guess I don't know how to post videos. I will try again.
Priory of Sion guy :Interview with Nicolas Haywood
Angel on Earth woman: Amanda Lorence
(just in case this next attempt fails too)
www.youtube.com...
www.youtube.com...
originally posted by: EndtheMadnessNow
originally posted by: CrazyFox
a reply to: EndtheMadnessNow
from tele pwc. I think Paul Revere just rode past.
Q day is coming soon! (fried PS)
Thanks for pic & link.
Q-Day: The day quantum computers can render all current encryption methods meaningless.
originally posted by: MetalThunder
In other news now we know who runs Ghislaine Maxwells Twitter Account - Ghisla ine Maxwell’s family complains prison breaching UN’s ‘Nelson Mandela’ rules of dignity
The Twitter account run by the siblings of Ms Maxwell — with the name “Real Ghislaine” — said the conditions she faced in jail are so inhuman that they violate the 2015 rules adopted by the US.
“Under the United Nations Standard Minimal Rules adopted in 2015 for the treatment of prisoners – ‘The Nelson Mandela Rules’ — to which the US is a party, Ghislaine has been subjected to cruel, inhuman or degrading treatment,” the family said.
In case you have not seen... Real Ghislaine by the 'Family'.