It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Here it is..... My First Post. [HOAX]

page: 7
80
<< 4  5  6    8  9  10 >>

log in

join
share:

posted on Dec, 2 2009 @ 12:30 PM
link   
I have thought long and hard about what I might add to this
monumental information. Check it out:........




[edit on 2-12-2009 by randyvs]

[edit on 2-12-2009 by randyvs]

[edit on 2-12-2009 by randyvs]

edit just to be a serial copycat ..............................lmao

[edit on 2-12-2009 by randyvs]



posted on Dec, 2 2009 @ 12:44 PM
link   
reply to post by gunsmoke
 


Correct, but there is a difference between a company and an agency there mister.



posted on Dec, 2 2009 @ 12:45 PM
link   

Originally posted by LenGXV6
Nice video, pity about the black background, if it was a well lite room as you said, you should be able to see things near and around the monitor.

Also - how exactly did you manage to use a mobile in a secured area that would be alarmed for mobile transmissions????

And yes - I have/do work in high security areas, and I have been inside US secure areas. They all have these alarms.


The black background does not negate this being taken in a brightly lit room. Contrast, screen brightness and poor cell phone cameras will take care of this quite nicely.

Secondly, although I'm not saying this is the case with the OP, there are ways to boot cells without SIM cards and without them transmitting or recieving. Having said that though there are still other measures that could easily pick up the click of a cell button or camera shutter.

I do worry for the OP, because I feel his/her faith in remaining safe and anonymous through hiding in a massive crowd of data, somewhat naive. His story concurs with what I know but he/she is absolutely wrong in suggesting this project has only been running since 2006. This sort of surveillance has been ongoing since at least 1998.

It is true that the intelligent services are drowning in data and as good as software systems are as flagging keywords etc, eyes on are still amongst the quickest, most efficient and most effective means for the final evaluation.

The OP is also naive to believe that he/she and the rest of his co-workers are not under constant surveillance. Cameras are far from the only way to spy on people. For example, for many years software has existed that can extrapolate, infer and predict what a persons actions and intent are based on their thermal data. Such sensors could be invisibly installed within any object or within the walls of the OPs office and could guess from his/her behaviour and thermal patterns that he was surreptiously attempting to use a camera to record data. For years there's even been equipment that can analyse and decifer conversations in a room by shining lasers at that rooms window from as far away as the laser is able to shine from.

OP, unless you have permission or have been ordered to divulge such info I strongly suggest you rethink your position. The info itself may not be sensitive but the line you are crossing could be enough to put you on the domestic terrorist, domestic enemy combatant lists.

NB: 'Crowdthink' in its many guises has been used for hundreds of years, even since the priest class first began. African Bison employ a form of this when crossing rivers during their migrations.

[edit on 2-12-2009 by spookfish]



posted on Dec, 2 2009 @ 12:54 PM
link   
My guess is that the op is someone involved with ATS.

20 post count before you can even start a new thread, right?

This is the OP's first post.

How does that happen if you are not logged in as admin of this site?



posted on Dec, 2 2009 @ 01:16 PM
link   
Thanks OP, I will be sending you good vibrations so you can be protected by the beings that are protecting all the lightworkers out there.

I know that many other guys in the intelligence community work every day and night from the inside knowing they are working for humanity and not the corporates, although they do it on the dl.

If anything, you're post will bring other whistleblowers forward, and that is really what they need, encouragement to do it.



posted on Dec, 2 2009 @ 01:17 PM
link   
reply to post by LenGXV6
 


Wouldn't Airplane mode that most mobiles nowadays have escape detection?



posted on Dec, 2 2009 @ 01:30 PM
link   
reply to post by krystalice
 


Roger that, the OP did state agency, so if that were the case he would have been subjected to a security clearence in addition to taking a oath to defend the U.S. Consitution aganist all enemys whether foreign or domestic.

The oath would place his job description in direct opposition to the 1st. amendment to the Consitution making him and his alleged employer a enemy.
Non disclosure agreements would be for a private company.

Not to mention the fact that all the government computers I've seen run Microsoft XP.

[edit on 2-12-2009 by gunsmoke]



posted on Dec, 2 2009 @ 01:40 PM
link   
Well if the OP was worried about losing his job, after they monitor this thread through his job, He'll definitely be looking for a new job.

I dont get it, it was a useless post. this is a very minor thing that is done in IT companies.

I remember a few years back, a while back actually, that people run through sites to check if they are unsuitable for children, such as pornography sites, sites with with profanity, or anything thats not suitable for children. i think they called these people the internet nannies. this is what i see the OP as. it doesn't seem like its a DB to check for threats, but rather filter sites, so children cannot access them easily, or mark them down for parental control programs.



posted on Dec, 2 2009 @ 01:41 PM
link   

Originally posted by LenGXV6
Nice video, pity about the black background, if it was a well lite room as you said, you should be able to see things near and around the monitor.

Also - how exactly did you manage to use a mobile in a secured area that would be alarmed for mobile transmissions????

And yes - I have/do work in high security areas, and I have been inside US secure areas. They all have these alarms.


Bah! I can put my phone into "Flight Mode" which allows it to function completely without transmitting. In other words, I can use any of the apps - like camera, video, etc... I just cannot connect to the network. If this guy is for real, I'm sure that is all he did.



posted on Dec, 2 2009 @ 01:49 PM
link   
just my few cents...

first, when it comes to detecting cell phone activity, simple switch of cell phone to plane/fly mode should take care of that. they should monitor people's activity, but obviously security there is pretty loose... maybe perhaps they don't care about 'not working as supposed' project that much.

second thing, i'm surprised noone did any analysis of this video, and people are so fast to say it's a hoax...

video can be downloaded from v6.tinypic.com...
grab mplayer, and try mplayer -ao null -ac null -vo png 2s0zlp0.flv
it can be clearly seen in title bar of a window around frame 62 - "Freedom - Workstation" - and then goes too blured to be readable workstation ID i guess. video frames may be used for further analysis with tools like gimp.

it's less than probable that they're using windows 7, so my guess is that it's windows vista. under vista, window borders are opaque when window is maximized - by the looks of that window title bar, it's rather obvious it's non-maximized window, and the darkness around is just a black desktop background - if you would be creating such video, would you show any part of your office, when every detail may lead you into trouble? think about it. also, this pretty much debunks a theory that someone was using web browser running in fullscreen - that's not the case, at least not if it's running under vista. and about firefox extensions - any urls? i never saw one looking like that - sure, it can be done - but google search for "immediate review" "further review needed" returns no results.
www.google.com...
if it would be some ready-to-use web browser extension, you can bet google would find something.

and about using windows for such a thing - if the system itself is pretty locked and the only thing they can do is to use their app, everything can be done within intranet network without direct internet access. sites may be cached or watched via proxy, so such workstation doesn't really need direct internet connection.

i'm not sure what to think about it - but i would be just carefull with claiming it's a hoax. it's much less obvious than you think.



posted on Dec, 2 2009 @ 01:51 PM
link   
First of all, to the best of my knowledge there is no such thing as a "former" agent in any of the alphabet agencies, once in, in for life. That being said what you have to say in very informative, and correlates with some information I have been given concerning this matter from people like yourself, tired of all the secrecy and lies. Keep it coming, friend, but be aware, you will find both friends and enemies here.



posted on Dec, 2 2009 @ 02:02 PM
link   
From my point of view, I am not yet too concerned about the validity or falsification/fabrication of this story as it remains fresh and without the OP being present. I'll wait until more unfolds.

Is it possible the "terrorists" (I chuckled to myself writing that in quotes) are now creating websites that do not use KEYWORDS but in fact scanned documents/images to relay their messages; thus negating the entire keyword monitoring system? I've read many posts on this thread where members are saying that govermental/corporate keyword monitoring systems and also parental web-blockers scan for words.

Possibly the United States Government needs a human oversight organization that reviews the overall appearance and imaging on websites to insure safety and monitor constant activity going on throughout the world?

Heck if anyone wanted to secretly communicate to someone else across state or borders, you simply create an email account, create an email with your Above Top Secret message, and then save the email as a Draft. The other person just needs to log onto that email account and open the draft. Presto! No data transmitted and your message is kept from outside forces.

I don't know. But whatever the case is, it wouldn't surprise me if the government has outside contractors working on this type of project. Makes total sense to me ... because our government certainly knows how to waste our tax paying dollars.



posted on Dec, 2 2009 @ 02:03 PM
link   
They say you shouldn't wrestle with a pig in the mud because sooner or later you will realize the pig likes it.....

This is a hoax and you boys are wrestling the pig....ha



posted on Dec, 2 2009 @ 02:08 PM
link   

Originally posted by kozmo

Originally posted by LenGXV6
Nice video, pity about the black background, if it was a well lite room as you said, you should be able to see things near and around the monitor.

Also - how exactly did you manage to use a mobile in a secured area that would be alarmed for mobile transmissions????

And yes - I have/do work in high security areas, and I have been inside US secure areas. They all have these alarms.


Bah! I can put my phone into "Flight Mode" which allows it to function completely without transmitting. In other words, I can use any of the apps - like camera, video, etc... I just cannot connect to the network. If this guy is for real, I'm sure that is all he did.


Indeed, I said the exact same thing in the previous page.

I think I know what the OP meant when he said "The clue is in my name"... He is not FORMERSPOOK, instead this guy is actually FARMER SPOCK!

*Runs and checks the white pages for Farmers listed as Spock...*



posted on Dec, 2 2009 @ 02:08 PM
link   
As other posters may have already indicated,
the system you describe is called Echelon.

See background:

en.wikipedia.org...

and the general location of the systems are mostly in places like
Ft. Meade, Maryland deep down in "The Dungeon" where they have
more than a few DSP (Digital Signal Processing)-based Array
Processors for Voice recognition and OCR (Optical Character
Recognition) and Boolean Searches & categorization of incoming
Signals Intelligence and photographic data.

And if you go into that ridiculous underground chamber across
the highway underneath the burnt grass knolls, you'll enter
"The Chamber Room" full of nothing but hard drives,
IBM SMP MP systems (aka Blue Gene-style) and AMD/Intel
Server & DSP farms doing nothing but NSA SigInt/HumInt
and NRO (National Recon Office) Imaging tasks.

Then back in one of what many people would understand is a
CIC (Combat Information Centre) but is normally called an
Interpretation & Presentation Room, the office drones will
ponder how much electrostatically glued lint to keep scraping
off their 310 pound Sony 2048 by 2048 pixel Square CRT monitors
which sorely need replacing with those 52" 3400+ by 2400+ pixel
flatscreens and ponder how best to bypass that meddlesome
restriction of having no CD/DVD/Flash drives on the workstations.

They then irk themselves silly at having no cell phones/iPods/
whatever pod gizmo allowed in the main interpretation offices.
After which they wonder what's on today's menu in the
"The Dungeon Cafeteria" (And if I have to eat one more
damn mushy Sloppy Joe in that Dungeon cafeteria, I will
swab the equally horrendous Cole Slaw upon every one of
those darkened EM-hardened, photo-phobic above-ground windows!)

Whilst all this is going on, cell phone data, emails, ftp transfers,
screen shots and EWF data come in from the NYNEX switching
exchanges in New York, The Verizon switches in Seattle & Portland
and from that underground massive data centre in Nevada
that has recently become a general Internet Traffic Hub,
keeps coming in for "Dictionary" searches and further
investigation & monitoring.

In addition, all that "Dictionary" data coming in from Pine Gap
Australia, New Zealand, from the far North in Alert, Canada
and other more esoteric places such as Guam, Japan, South Korea,
Puerto Rico & Florida, Deigo Garcia, Tierra Del Fuego, Chile,
Colombia, Kuwait, Saudi Arabia, etc. needs to be sorted through
and assigned to operators who'll dig a little deeper for
further meaning.

Otherwise it's another bland day in darkened room.

Look it up ECHELON ... it's COOL ;-)

P.S. The rooms are EMP and EM hardened there ain't
no cell signal getting out PERIOD! All the cables are fibre optic
aka FDDI/ATM/10 GB Ethernet to prevent EM/RF snooping


[edit on 2009/12/2 by StargateSG7]

[edit on 2009/12/3 by StargateSG7]



posted on Dec, 2 2009 @ 02:12 PM
link   

Originally posted by StargateSG7

Look it up ECHELON ... it's COOL ;-)


Also, watch the film "Echelon Conspiracy" (IMDB Link), its a really great show...kinda like "Eagle Eye".



posted on Dec, 2 2009 @ 02:14 PM
link   
Well,,,,,,,,,,,,,,,,,Howdy.



posted on Dec, 2 2009 @ 02:24 PM
link   
Mods:

As the OP negligently broke forum rules on the 20 post introduction policy, I would like to file a motion to have this thread erased and formerspook placed on administrative leave pending further internal investigation.

Yeah? Yeah? ....Yeah!!






[edit on 2-12-2009 by NewWorldDisorder]



posted on Dec, 2 2009 @ 02:31 PM
link   

Originally posted by william.gauncents
My guess is that the op is someone involved with ATS.

20 post count before you can even start a new thread, right?

This is the OP's first post.

How does that happen if you are not logged in as admin of this site?


Good question.

From the way the OP read I thought he'd spammed 20 posts in order to make this, and unless every post made was deleted, I can't see how.

hrmmm.



posted on Dec, 2 2009 @ 02:42 PM
link   
Anybody else sense a familiar theme in this thread?

It's like Hoax 101, it has all the parts, the OP:

-Works somewhere, knows someone, or is otherwise connected to something so secret, that it cannot be divulged.

-Has damning information that cannot be kept to him/herself any longer

-Is willing to "risk it" for the greater good of mankind.

-offers only soft, fuzzy proof

-wants to answer all the questions, but usually has limited time, so only certain "choice" questions get responded to.

I didn't read through all the pages, are we at the "letting-tension-build-by-not-replying-for-an-inordinately-long-period-of-time" stage yet?

I'm not accusing the OP of perpetrating a hoax, I'm just saying to me it reads like hoax boilerplate. Seen a hundred of these threads on this site.








[edit on 2-12-2009 by tjack]



new topics

top topics



 
80
<< 4  5  6    8  9  10 >>

log in

join