It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by dune_mister
this is the main reason why sites like abovetopsecret.com should be shut down by the law enforcement for spreading rumors and fake politics.The owners just want to make money.
Come on guys... "My password cannot be cracked. It would take longer to crack an 8096 bit RSA encryption key, than my self-made encryption system." Yeah, right... 8096 is not a power of 2... it would be 8192... "I have created a virus that will spread on a massive scale and automatically upload all the evidence I have against them to the victims PC" A virus that will spread on a massive scale on random computers? Yeah, right... Quoting: Anonymous Coward 908254
You are absolutely right it would be 8192 bit. That is rather embarrassing. In my defence, it had been well over 24 hours since I last slept, and I'm one of those that really needs it.
OP in your opinion what can we, the citizens, do to regain more control of our situation? Quoting: Anonymous Coward 749245
I've been brainstorming this question and it is really hard to say. They can see our actions 27 hours before they occur, so it really makes it difficult. What ideas do you have?
why did stack fly his plane into the building or did he? why not just come out with the truth and be set free? Quoting: Anonymous Coward 908106
Absolutely not. I believe the CIA shoved him in the plane against his will, and then somehow guided it into the building. Joe would never do something like that.
do you think they uploaded his manifesto as well? seems like "they" could upload child porn into anyone's computer then raid their homme and perp walk you out in front of the cameras showing the porn.....everyone hates a pedophile so its easy to destroy you and your credibility. all the while, you have never looked at child porn in your life. i am seeing this "destroy the perp" moving towards anti gov, dissident type behavior......certainly interesting for sure as their agenda is changing. i am an attorney, you should hire one and spill the beans into his or her file....privileged....lock it up sealed tight and put away forever....then if something happens to you, then you know that the truth can be revealed if that is your wish.....hire one you can trust.... Quoting: Anonymous Coward 908106
They did upload his manifesto, but parts of his manifesto were legitimately written by him. They modified the "manifesto" significantly. He was going to go public with all this info, and had a letter typed up explaining everything. Strangely enough, a few hours before he was going to go public, he flies his plane into the building, and the letter that once had the truth, had been turned into a rant about the IRS.
I'm going to type up two reports: The first one is going to the details pertaining to how this system works. The second will my best analysis of effects and implications this has had on society so far.
First, we are going to need a few definitions: For the purpose this essay, the definition of energy is: a necessary condition for a particle to exist in time. Therefore we can say: a particle has energy if and only if it exists in time. Time will be casually defined as a "release valve" for energy. So, time allows particles to release energy. Definition of a Vector Space: A vector space defined over a field K is a set V with two operations: vector addition, which we will denote as +, and scalar multiplication, denoted using concatenation, satisfying the following axioms: 1.) V is an Abelian group with operation vector addition 2.) V is closed under scalar multiplication. Also, if a and b are in K and v is in V, then 1v = v (where 1 is the identity vector) and (ab)v = a(bv) 3.) the distributive law holds Definition of Linear Subspace If V is a vector space over a field K and W is a non-empty subset of V, then W is called a linear subspace of V (over K) if and if W is a vector space using the same operations as those in V. Definition of span Given a set of vectors S = [ v in V : i in I], where V is a vector space and I is some index set, then the collection of all finite linear combinations of elements of S is called the span of S, and is denoted by span(S). That concludes our definitions, now on to theorems we will need. Theorem 1.1 The subset W1 = [0] is a subspace of all V vector spaces. Let the vector space V represent all possible permutations of time that a particle may exist in, then, assuming the present is the 0 vector, the energy of a particle represents the subspace S of time. All of the actual instances of time we exist in is represented by span(S). So let us say a particles energy level is relatively low and only includes the subspace 0, then the span(0) = 0 which means we only exist in the present. The linear subspace S increases as energy is added, therefore increasing span(S), which means the instances of time a particle exists in is increasing. As a particle begins to lose energy, the cardinality of span(S) decreases. This means that whenever a particle loses enough energy it span(S) will collapse back to the 0 vector. This explains the twin paradox. The man returns younger than his twin because his span(S) collapses back to a span(S) = [0] at an earlier point than his brothers span(S) = [0 sub(1)] (note: sub(1) denotes subscript 1). The problem of locality has long escaped quantum physicists, and it is no different for me. For some unknown reason, a particle whose |span(S)| > 0 is able to communicate with itself instantaneously over its different components of span(S). Hence, when the satellite exists in more than one subspace S, the satellite of time 0 (present) retains all information of the same satellite at the component 1 (future) of subspace S. So in layman's terms, as the satellite's energy speed continues to increase, it's mass does not change as it is described in mainstream physics, but the time frames in which it exists increases. At the mid level energy spaces, this makes the satellite appear to gain more mass, but once it reaches high energy levels this effect is exonerated. The satellite then "exists" in more than one instance of time, but retains all the information that all the other replicas of itself in different time frames hold due to locality. This makes it possible to exert information from the future. Note: this is not meant to be a formal proof and it is my hope that anyone with a simple understanding of linear algebra may be able to interpret this.
Originally posted by dune_mister
this is the main reason why sites like abovetopsecret.com should be shut down by the law enforcement for spreading rumors and fake politics.The owners just want to make money.
Moderator's note -- later information posted by the original poster on GLP was easily discredited by that group, and when an attempt to tie it into the Norway Spiral (which the poster mis-located to another country) and time travel, the incident unraveled as a hoax.
Originally posted by Pocky
reply to post by kdial1
Yea kdial. I checked and didn't see the reply the moderator is talking about. They need to find it and cite it cause I definitely didn't see any such thing, and if it exist, they should cite exactly what was said.
Zero; TTM to open as it did over Norway
President Clinton appoints Cylink CEO William Crowell to a special committee on encryption. William Crowell releases publicity statements on new recommendations about United States encryption policy and certain export regulations are relaxed, waiving Cylink's earlier export violations.
Since February 2003, Mr. Crowell has worked as an independent consultant in the areas of information technology, security and intelligence systems and serves as Chairman of the Senior Advisory Group to the Director of National Intelligence. He served as President and Chief Executive Officer of Cylink Corporation, a provider of network security solutions, from 1998 until its acquisition by SafeNet, Inc. in February 2003. Prior to Cylink, Mr. Crowell worked at the National Security Agency, where he held a series of senior executive positions, including Deputy Director of Operations and Deputy Director of the NSA.
Here's an archive of Joe Stack's customers. Who's the first customer listed?
Cylink Corporation
Project: The Cylink CY8300 IPSec high-performance security processor
Write an IPSec Datagram generation/encryption utility for packet generation, encryption/decryption (using DES, TDES, & SHA-1) and authentication (using SHA-1, MD5, HMAC-SHA1, HMAC-MD5, & DES-MAC)
Seems like he would have needed an encryption guru to help him with the encryption/decryption algorithms (every software developer is not a math expert, contrary to popular opinion). Someone like a math professor, who specializes in cryptology? This adds credibility to the OP's story.
Originally posted by kerazeesicko
Can we say suckers.... I cannot believe this thread has gone on for as long as it has. Oh well...just goes to show why hoaxers do what they do....always the gullible ready and willing to believe anything posted out there. I will not reply back...due to the fact it is very clear you will continue to believe whatever it is.
[edit on 6-3-2010 by kerazeesicko]