It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by tnangela
If you look at the first three pictures. You will notice ENTIRE net blocks being used. These are all government. You're welcome to perform reverse lookups if you like to get a better picture of who has been given contracts to spy on us.
OrgName: BellSouth.net Inc.
OrgID: BELL
Address: 575 Morosgo Drive
City: Atlanta
StateProv: GA
PostalCode: 30324
Country: US
ReferralServer: rwhois://rwhois.eng.bellsouth.net:4321
NetRange: 98.64.0.0 - 98.95.255.255
CIDR: 98.64.0.0/11
OriginAS: AS6380, AS6381, AS6382, AS6383
OriginAS: AS6384, AS6385, AS6386, AS6387
OriginAS: AS6388, AS6389, AS7891, AS7892
OriginAS: AS7893, AS7894, AS8060, AS8061
OriginAS: AS8062, AS8063
NetName: BELLSNET-BLK19
NetHandle: NET-98-64-0-0-1
Parent: NET-98-0-0-0-0
NetType: Direct Allocation
NameServer: AUTH-DNS.ASM.BELLSOUTH.NET
NameServer: AUTH-DNS.MIA.BELLSOUTH.NET
NameServer: AUTH-DNS.MSY.BELLSOUTH.NET
Comment:
Comment: For Abuse Issues, email [email protected]. NO ATTACHMENTS. Include IP
Comment: address, time/date, message header, and attack logs.
Comment: For Subpoena Request, email [email protected] with "SUBPOENA"
Comment: in the subject line. Law Enforcement Agencies ONLY, please.
RegDate: 2008-01-07
Updated: 2009-02-10
RAbuseHandle: ABUSE81-ARIN
RAbuseName: Abuse Group
RAbusePhone: +1-919-319-8265
RAbuseEmail: [email protected]
RTechHandle: JG726-ARIN
RTechName: Geurin, Joe
RTechPhone: +1-404-499-5240
RTechEmail: [email protected]
OrgAbuseHandle: ABUSE81-ARIN
OrgAbuseName: Abuse Group
OrgAbusePhone: +1-919-319-8265
OrgAbuseEmail: [email protected]
OrgTechHandle: JG726-ARIN
OrgTechName: Geurin, Joe
OrgTechPhone: +1-404-499-5240
OrgTechEmail: [email protected]
CustName: TYS ADSL CBB
Address: 575 Morosgo Dr. NE
City: Atlanta
StateProv: GA
PostalCode: 30324
Country: US
RegDate: 2010-03-03
Updated: 2010-03-03
NetRange: 98.70.96.0 - 98.70.127.255
CIDR: 98.70.96.0/19
NetName: BLS-98-70-96-0-1003020950
NetHandle: NET-98-70-96-0-1
Parent: NET-98-64-0-0-1
NetType: Reassigned
Comment:
RegDate: 2010-03-03
Updated: 2010-03-03
RAbuseHandle: ABUSE81-ARIN
RAbuseName: Abuse Group
RAbusePhone: +1-919-319-8265
RAbuseEmail: [email protected]
RTechHandle: JG726-ARIN
RTechName: Geurin, Joe
RTechPhone: +1-404-499-5240
RTechEmail: [email protected]
OrgAbuseHandle: ABUSE81-ARIN
OrgAbuseName: Abuse Group
OrgAbusePhone: +1-919-319-8265
OrgAbuseEmail: [email protected]
OrgTechHandle: JG726-ARIN
OrgTechName: Geurin, Joe
OrgTechPhone: +1-404-499-5240
OrgTechEmail: [email protected]
208.111.185.135 - Whois Information
OrgName: Limelight Networks, Inc.
OrgID: LLNW
Address: 2220 W. 14th Street
City: Tempe
StateProv: AZ
PostalCode: 85281
Country: US
ReferralServer: rwhois://rwhois.llnw.net:4321/
NetRange: 208.111.128.0 - 208.111.191.255
CIDR: 208.111.128.0/18
OriginAS: AS22822
NetName: LLNW-3
NetHandle: NET-208-111-128-0-1
Parent: NET-208-0-0-0-0
NetType: Direct Allocation
NameServer: DNS.LAX.LLNS.NET
NameServer: DNS.LGA.LLNS.NET
NameServer: DNS.SJC.LLNS.NET
NameServer: DNS.IAD.LLNS.NET
Comment: *** All abuse complaints must go to abuse (at)
Comment: limelightnetworks.com
Comment: Network reassignments available via rwhois.llnw.net:4321
RegDate: 2006-03-30
Updated: 2009-02-18
RAbuseHandle: LNAD-ARIN
RAbuseName: Limelight Networks Abuse Dept
RAbusePhone: +1-602-850-5095
RAbuseEmail: [email protected]
RTechHandle: LNAA-ARIN
RTechName: Limelight Networks ARIN Admin
RTechPhone: +1-602-850-5095
RTechEmail: [email protected]
OrgAbuseHandle: LNAD-ARIN
OrgAbuseName: Limelight Networks Abuse Dept
OrgAbusePhone: +1-602-850-5095
OrgAbuseEmail: [email protected]
OrgTechHandle: LNAA-ARIN
OrgTechName: Limelight Networks ARIN Admin
OrgTechPhone: +1-602-850-5095
OrgTechEmail: [email protected]
# ARIN WHOIS database, last updated 2010-04-06 20:00
# Enter ? for additional hints on searching ARIN's WHOIS database.
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at www.arin.net...
Originally posted by tnangela
Because of the amount of ORGANIZATION involved- and I'm sorry but if you don't see that, then I just can't really help you further.
Originally posted by tnangela
I KNOW that #1 is the correct answer. You are welcome to continue to believe in #2- that doesn't bother me. This IS a conspiracy forum correct? If you've got some better evidence to contradict the facts I would be glad for you to share. Discussion and dialog are great things!!!
Originally posted by tnangela
"So I'm still confused as to why you say the government is involved."
Because of the amount of ORGANIZATION involved- and I'm sorry but if you don't see that, then I just can't really help you further. The amount of ORGANIZATION from the same ENTIRE IP blocks day in and day out with just a few attempts from each individual IP can only spell GOVERNMENT. Then just to cinch it all up I showed how they are using ICMP outs to try and punch holes to come back through on TO THE SAME IP's.
Actually I'm fairly hip to several of the surveillance 'features'. Port 135 is one of them. DHCP also has some secrets (port 67/68, & broadcast host). UDP ports 1025/1026 was used in XP. Lately DNS spoofing is being used in attempted surveillance.