It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by denynothing
Wow that does sound like an absolute mess, could legal action be pursued in this matter?
Depending on the manufacturer of the converter box, some work better than others when using indoor antennas such as rabbit ears. However, keep in mind that most of the digital signals are in the UHF band, and very few will remain in the VHF upper band..ie Ch 7 thru 13.
“A silent communications system in which nonaural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum, are amplitude- or frequency-modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener.”
US Patent #5,159,703 — Silent Subliminal Presentation System
Another CNN press release from September 3, 1999 reveals that Microsoft operating systems include a back door that allows the National Security Agency to enter systems without permission of the owner. Andrew Fernandes, a cryptography expert that works for Cryptonym, says, “It turns out that there are really two keys used by Windows; the first belongs to Microsoft, and it allows them to securely load (the cryptography services), the second belongs to the NSA. That means that the NSA can also securely load (the services) on your machine, and without your authorization.”
7. The operational requirements in respect of transmission apparatus are that the telecommunications service provider operating the apparatus have the capability, in accordance with any regulations, to do the following:
(a) enable the interception of communications generated by or transmitted through the apparatus to or from any temporary or permanent user of the provider’s telecommunications services;
(b) isolate the communication that is authorized to be intercepted from other information and provide the intercepted communication to authorized persons, including
(i) isolating the communications of the person whose communications are authorized to be intercepted from those of other persons, and
(ii) isolating the transmission data of the person whose communications are authorized to be intercepted from the rest of the person’s communications;
(c) provide information that permits the accurate correlation of all elements of intercepted communications; and
(d) enable simultaneous interceptions by authorized persons from multiple national security and law enforcement agencies of communications of multiple users, including enabling
(i) at least the minimum number of those interceptions, and
(ii) any greater number of those interceptions — up to the maximum number and within the time provided for in the regulations — for the period that an agency requests in accordance with any regulations.