It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by the hype
"it was developed by the military in secrecy for an event of a 3rd World War to make the computer infrastructure practicly invurnerable from an nuclear attack"
Not sure if this is the case. I think it was to deliver the ability to sync and network military units and command posts, weapon systems etc..
these back doors you speak of most likely exist. we can already be monitored through ip addresses through local service providers. if people are getting sued for downloading illegal copyrighted mp3 files clearly if one with power desired to watch your tracks they most certainly could.
Originally posted by Durabys
Originally posted by the hype
"it was developed by the military in secrecy for an event of a 3rd World War to make the computer infrastructure practicly invurnerable from an nuclear attack"
Not sure if this is the case. I think it was to deliver the ability to sync and network military units and command posts, weapon systems etc..
these back doors you speak of most likely exist. we can already be monitored through ip addresses through local service providers. if people are getting sued for downloading illegal copyrighted mp3 files clearly if one with power desired to watch your tracks they most certainly could.
It was developed because if the enemy hit one main comp ... with all access data station that receive or send informatios or commands connected across a whole country to an one super-super-super computer ... the enemy would simly search for it by his agents and then destroy the damn thing and send the whole country into stoneage.
edit: But if you have many small ones, each with a smaller number of data access stations that could relinked to an another computer if their one had problems or was destroyed, you have to as an enemy to wipe out a biger percentage of harware to shut down the network.
Here you have my answer.
[edit on 12/08/09 by Durabys]
Early history:
The USSR's launch of Sputnik spurred the United States to create the Advanced Research Projects Agency, known as ARPA, in February 1958 to regain a technological lead. ARPA created the Information Processing Technology Office (IPTO) to further the research of the Semi Automatic Ground Environment (SAGE) program, which had networked country-wide radar systems together for the first time. J. C. R. Licklider was selected to head the IPTO. Licklider moved from the Psycho-Acoustic Laboratory at Harvard University to MIT in 1950, after becoming interested in information technology. At MIT, he served on a committee that established Lincoln Laboratory and worked on the SAGE project. In 1957 he became a Vice President at BBN, where he bought the first production PDP-1 computer and conducted the first public demonstration of time-sharing.
At the IPTO, Licklider got Lawrence Roberts to start a project to make a network, and Roberts based the technology on the work of Paul Baran, who had written an exhaustive study for the U.S. Air Force that recommended packet switching (as opposed to circuit switching) to make a network highly robust and survivable. After much work, the first two nodes of what would become the ARPANET were interconnected between UCLA and SRI International (SRI) in Menlo Park, California, on October 29, 1969. The ARPANET was one of the "eve" networks of today's Internet. Following on from the demonstration that packet switching worked on the ARPANET, the British Post Office, Telenet, DATAPAC and TRANSPAC collaborated to create the first international packet-switched network service. In the UK, this was referred to as the International Packet Switched Service (IPSS), in 1978. The collection of X.25-based networks grew from Europe and the US to cover Canada, Hong Kong and Australia by 1981. The X.25 packet switching standard was developed in the CCITT (now called ITU-T) around 1976.
Originally posted by the hype
if you want to argue about the internet start another thread. the answer to your question about backdoors within the system is absolutely yes, and with all your knowledge of the internet you should already have known the answer to this question. which makes the thread in its entirety completely unnecessary.