It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

300 words That Make CIA, FBI, and NSA to Look at Your Site

page: 2
1
<< 1   >>

log in

join
share:

posted on Mar, 7 2004 @ 09:57 PM
link   

Originally posted by Ocelot

Originally posted by Agent47
Thats a shame he was accosted, what did they say their purpose was? What was your friend interested in with Tesla anyways?


He's a member here so I'll get him to answer that question.



Guess that would be my cue... The agents never did explain there purpose probably because they were to embarrased of the situation they got them selves in or were sent unknowingly.(Might be due to the very lousy agency services here in P.R. too.)



posted on Mar, 7 2004 @ 09:58 PM
link   

Originally posted by Xephyre
Guess that would be my cue... The agents never did explain there purpose probably because they were to embarrased of the situation they got them selves in or were sent unknowingly.(Might be due to the very lousy agency services here in P.R. too.)


What did they ask you?



posted on Mar, 7 2004 @ 10:35 PM
link   

Originally posted by Agent47

Originally posted by Xephyre
Guess that would be my cue... The agents never did explain there purpose probably because they were to embarrased of the situation they got them selves in or were sent unknowingly.(Might be due to the very lousy agency services here in P.R. too.)


What did they ask you?



Well first of all they didn't exactly get to talk to me though i did saw them. My mother did the talking since at the moment i was around 6 years old. They came to my grandmothers house (cause that was the delivery address on the package). As is sort of custamary here in P.R. they arrived during the most bothersome hours while one is eating around 2:00pm (after school here in P.R. [Private school time just in case]).

They came looking for the "fellow" to whom the package was addressed (me). They wanted to "chat" with him sadly as i remebered my mother saying there was no man on that house by the name they were looking for, although there was her son A SIX year old by that name. They were not convinced (my mother is a most intimmidating woman and it did not help that at the moment she knew quite a few influential people in the gov.(She was the secretary of the cultural institute of PR (yep you get to meet certain types of individuals there)).

They kept on asking question on still she got a bit flared and yelled at them what the heck was the point of there visit, they then asked her if the it was afterall the blabbering if the package had been ordered by someone of her household. To which she answered yes which was me. Then they wanted to know why to which she said "what do u care he is a six year old " (aarrently they still did not beleive her so she just presented them to me as "officers" they asked me a few dumb questions like "was i the one who wanted the book?" "did i know what it was " "why did i wanted it?" etc. (using that hypocrit smile and goo, googa voices" after they confirmed it was me and i told em' i was no idiot to be talked that way they left not to happy aparrently to be sent for such a stupid thing.

If your wondering at that time i was going through this mad scientist wanna be phase so i bought a lot of technical books on all sorts of weird stuff. I also was very ahead in my science courses, I was the type that signed up first for the science fairs and usually swept the competition ( I do not mean to boast but i just want to clear up on what level of commitment i was in)(I am a most proficient reader. The partial library at my house including those books stored away at my grandmas' surpass the QTY you might find in our towns public library and i'm not joking.)

[Edited on 7/3/2004 by Xephyre]



posted on Mar, 7 2004 @ 11:23 PM
link   
lets start an email group that makes stories up using atleast 100 of these words in each story, and mass spam them to each member each day. thatll b fun.

or if anyone can make a program that generates paragraphs using random combinations(that make sense) using thses words that'll be great.

[Edited on 7-3-2004 by quiksilver]



posted on Mar, 8 2004 @ 09:36 PM
link   
This is somewhat related to what we were talking about.

Student says he's being investigated for terrorism
A physics student at the University of Nevada Las Vegas alleged today that he has been marked as a suspicious by University offi cials and his name turned over to the Federal Bureau of Investigation for his research into rocket propulsion.

According to the student, one of his requests to a aerospace library, Linda Hall, coincided with the first anniversary of the 9/11 terrorist attacks. This apparently raised eyebrows at the university.



posted on Sep, 23 2006 @ 11:59 AM
link   
pay for your book purchases with cash and don't use your book discount card and you can stay off their radar (at least for your reading material). learn sign language and you can avoid being listened in on while having coffee at the local cafe with your friends. there are always ways around the snoopers.



posted on Sep, 24 2006 @ 02:59 PM
link   

Originally posted by whitewave
pay for your book purchases with cash and don't use your book discount card and you can stay off their radar (at least for your reading material). learn sign language and you can avoid being listened in on while having coffee at the local cafe with your friends. there are always ways around the snoopers.


I dont think they are going to reply dude, this was 2 years ago. Its a dead thread.



posted on Sep, 24 2006 @ 03:22 PM
link   

Originally posted by cyberdude78
If this were true this site would be detected on just about everyword 10 times a day. You would think that the NSA would have shut down sites like this already.


Hmm... weird.. now when i click on the website i get this...


We cannot proceed.
We encountered a problem. The reason reported was:

There was a problem looking up the post in our database.

This is not necessarily an error. If you feel this is an error then it could be something as simple as your browser not being set to accept cookies. If you feel this error is a problem with the server then please contact [email protected] and let us know what exactly went wrong so it can be fixed as soon as possible. Otherwise, please use your back button to return to the previous page.


[edit on 24-9-2006 by DoNotBelieveThem]



posted on Sep, 25 2006 @ 02:01 PM
link   
Hey TTIN,
You replied. How dead could the thread be if the voices of the "dead" reply?

Sorry, dude. Just yanking your chain. Besides, that list sounds a little hokey. There probably is a list of trigger words for getting your conversations/emails listened to/looked at but I doubt it's the one provided.



posted on Sep, 25 2006 @ 02:55 PM
link   
The site doesn't work for me.

Maybe it was shut down



posted on Jun, 3 2008 @ 09:12 AM
link   



posted on Nov, 29 2008 @ 09:23 AM
link   



posted on Nov, 29 2008 @ 09:43 AM
link   
i think this site might get a cursory look-see, but seriously, if you were a terriost, why would you possibly use this site? oh, they might, maybe might look at it, but actually write something here? wouldn't that be a no-no in terriost manual 1? the FBI,CIA,NSA, and the rest of the alphabet agencies are looking at the more serious, clandistine sites. our I.P's can be tracked back to all the subscribers here, and even dumb terriosts know that. and if you want to really freak out, take about 20 minutes and check out who the "advisors", " contributors", are at the TRUSTe company at the bottom right of each of these pages. gets interesting the more in-depth you go.



posted on Nov, 29 2008 @ 09:47 AM
link   
Shoot! I'm guilty of at least 95% OF THEM


These are rather comical



posted on Aug, 10 2009 @ 07:25 AM
link   
reply to post by Ocelot
 


That list would only be level one security protocol word flag list.You should see the level three security protocol word flag list.Most of thoses words,names ,places and phone numbers would never ever appear anywhere on the internet.No one with that type of infomation would ever get the chance to place that kind of infomation on the internet anyway.They would be stopped at the post before they could do that..Any way phone numbers can be changed.Names can be changed and placed can be moved by cia rapid deployment extraction teams.No job is too big for the cia rapid deployment extraction teams.They can replace the population of a small town within hours with the help of fema.

[edit on 10-8-2009 by GORGANTHIUM]



posted on Aug, 10 2009 @ 09:00 AM
link   

Originally posted by Cutwolf

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, coc aine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC,UFO.



I win


But do you ......!?



posted on Jan, 24 2012 @ 05:53 AM
link   
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, ping me!



new topics

top topics



 
1
<< 1   >>

log in

join