It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by worldwatcher
While I may be in the minority here on ATS in regards to the our military spying on us, others are paying attention so there
Originally posted by dgtempe
... true, true...
Originally posted by magnito_student
Their car following behavior isnt the best either.
[edit on 13-12-2005 by magnito_student]
And then there's always the car parked down the street..... I stop and think, lets see, what did i post recently that would....Nah!
Peering thru the curtains as i post my dislike for the fairies at the White House...
Coming home and asking my husband "Anyone come'?
Thats what they want, paranoid citizens.
That year, following the Sept. 11 attacks, Bush authorized the NSA to monitor the international phone calls and international e-mails of hundreds — perhaps thousands — of people inside the United States, the Times reported.
The administration had briefed congressional leaders about the NSA program and notified the judge in charge of the Foreign Intelligence Surveillance Court, the secret Washington court that handles national security issues.
We found exploitable vulnerabilities present in virtually all analog "loop extender" or "dialup slave" wiretap systems and in at least some systems based on the newer J-STD-025A CALEA interfaces. These systems depend on unsecured "in-band" signals that can be spoofed or manipulated by an interception target via his or her own telephone line.
In the most serious countermeasures we discovered, a wiretap subject superimposes a continuous low-amplitude "C-tone" audio signal over normal call audio on the monitored line. The tone is misinterpreted by the wiretap system as an "on-hook" signal, which mutes monitored call audio and suspends audio recording. Most loop extender systems, as well as at least some CALEA systems, appear to be vulnerable to this countermeasure. Audio examples (in MP3 format) of this countermeasure can be found below.