It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

ATS IS A Conspiracy!!!

page: 1
3

log in

join
share:

posted on May, 14 2008 @ 04:56 PM
link   
Since we've looked at everything else in the world, let's take a look at ATS and what actually lies behind it.

ATS was first created on: 17-May-97 when the internet was still fairly new..
the domain was registered on this date to a William Irvine in Comanche, Oklahoma. What's interesting is the fact that we come here to spill out our theories detail by detail, but who's really paying attention?

The United Stated Federal Government!

We know that within walking distance of Comanche, OK is Oklahoma City. We know what's in Oklahoma City, an FBI headquarters with an elite cyber unit possessing some of the worlds most sophisticated internet tracking and sniffing software.


The FBI has just celebrated 10 years with special cybercrime units like the Innocent Images National Initiative, which has now gone international in scope. In the past 10 years, the FBI has developed the Computer Intrusion Unit, the Computer Crime Task Force, Cyber Action Teams, IC3 (Internet Criminal Complaint Center), and ECAP (Endangered Child Alert Program). As a result of these specialized units, the federal goverment has increased the investigative presence on the Internet, investigating more than 15,000 crimes and filing criminal charges or indicting in more than 6,000 cases which resulted in nearly 4,800 convictions in the past 10 years.


Yes, this is in Oklahoma City!

Next we'll take a look at the server itself:

ATS was registered through godaddy.com which isn't unusual, however.. After taking a closer look at the configuration of this domain you will see that Update, Transfer, Renew, and Delete have been prohobited by the registrant. Hmm...

Next let's take a look at the domain servers routing and powering this thing:

Domain servers in listed order:
NS4.DNSMADEEASY.COM
NS3.DNSMADEEASY.COM
NS2.DNSMADEEASY.COM
NS1.DNSMADEEASY.COM
NS0.DNSMADEEASY.COM

DNS made easy is exactly how it sounds. The true identity of your web server can be effectively masked to a government server without anyone ever knowing any different.

Moving right along let's take a look at what happens when attempting to reach the destination host of these servers:

10 47 ms 46 ms 47 ms nlayer.xe-1-3-0.cr1.sjc1.us.scnet.net [69.22.153.170]
11 47 ms 46 ms 46 ms v52.ar1.sjc1.us.scnet.net [216.246.103.2]
12 48 ms 47 ms 47 ms ge0-1.aggr20.sjc1.us.scnet.net [66.225.245.66]
13 * * * Request timed out.


Interesting how once we hit the *.us* extension the trace seems to start timing out.

You can do this for yourself by going to a shell window by clicking on run and typing: cmd once at the command prompt type tracert followed by any one of the listed DNS servers.

Maybe we're revealing our thoughts to deep undercover federal agents and they're using this as a tool to weed out the good ones.

Let's see how many minutes this thread lasts...


[edit on 14-5-2008 by Quarantine]



posted on May, 14 2008 @ 05:21 PM
link   
I thought I'd drop by and correct just a SLIGHT FEW of the holes in what you've typed up.

1) ATS was started in 1997 by Simon Gray. William was not even a member yet.

2) Bill does not live in Oklahoma, that's a different partner.

Perhaps factor that into your statement?

Don't worry about the thread, there's no reason to delete it.

[edit on 5/14/2008 by Djarums]



posted on May, 14 2008 @ 05:41 PM
link   
"After taking a closer look at the configuration of this domain you will see that Update, Transfer, Renew, and Delete have been prohobited by the registrant."

Will someone explain that bit to me? I don't understand the threat of having these things being prohibited but maybe i just don't understand them fully



posted on May, 14 2008 @ 05:47 PM
link   
Lmao, i see someone's been having some fun exploring the capabilities of DOS.


The true identity of your web server can be effectively masked to a government server without anyone ever knowing any different.


So what exactly is it that makes your theory, that ATS is a conspiracy, Correct?

Maybe they just like having a bit of extra security - did that occur to you as a possibility?



posted on May, 14 2008 @ 05:54 PM
link   

Originally posted by Quarantine
ATS was first created on: 17-May-97 when the internet was still fairly new..
the domain was registered on this date to a William Irvine in Comanche, Oklahoma.

Hello... Bill here.

The administrative contact is:

Administrative Contact:
Irvine, William [email protected]
The Above Network
P.O. Box 118
Comanche, Oklahoma 73529
United States

The P.O. box is the official mailing address of our company, The Above Network, LLC. I'm not in Comanche... Springer/Mark is.



After taking a closer look at the configuration of this domain you will see that Update, Transfer, Renew, and Delete have been prohobited by the registrant.

That's normal for "domain locking" which means only I can make any changes to our domain information.




DNS made easy is exactly how it sounds. The true identity of your web server can be effectively masked to a government server without anyone ever knowing any different.

No, you're wrong. The multiple DNS servers is a "distributed DNS" system that we pay for to help improve the overall performance of our site. The general idea is that globally distributed DNS servers improves the "look up" performance of our domain name for a broad global audience.



Moving right along let's take a look at what happens when attempting to reach the destination host of these servers:

10 47 ms 46 ms 47 ms nlayer.xe-1-3-0.cr1.sjc1.us.scnet.net [69.22.153.170]
11 47 ms 46 ms 46 ms v52.ar1.sjc1.us.scnet.net [216.246.103.2]
12 48 ms 47 ms 47 ms ge0-1.aggr20.sjc1.us.scnet.net [66.225.245.66]
13 * * * Request timed out.

Something is wrong with your traceroute or you're making this up. That data is no where near correct. Anyone can use DNSstuff.com to trace our domain to: 75.126.76.151-static.reverse.softlayer.com (75.126.76.151)
(Soft Layer is our hardware and bandwidth provider)




Maybe we're revealing our thoughts to deep undercover federal agents and they're using this as a tool to weed out the good ones.

No such thing is happening.



Let's see how many minutes this thread lasts...

This thread will remain, however, please use the ATS Issues thread for any additional follow-up on this subject.



new topics

top topics
 
3

log in

join