It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Evidence that ALL computers are under GOVERNMENT SURVEILLANCE.

page: 2
12
<< 1    3  4  5 >>

log in

join
share:

posted on Apr, 6 2010 @ 09:14 PM
link   

Originally posted by tnangela
Damian. I love you bra. Really I do. But I wanted to let you know. I do NOT run ANY p2p nor have I downloaded ANYTHING copyright or illegal (since I've been with AT&T anyways). Y'all can't try and scare me there, gonna have to use different tactics than that.


I beg your Pardon, I thought it came up with Limewire, not Limelight..

My bad..

I would like to know how you came to the conclusion that the Govements are watching you.. Your pictures of the IP's are really not that convincing..

I'd really like to know..



posted on Apr, 6 2010 @ 09:15 PM
link   
Maybe a bit paranoid then again who knows
Although many times this is a dillusion to feel more important than we really are. That someone is taking the time to spy on us.

Air, food, socialize, fixed



posted on Apr, 6 2010 @ 09:15 PM
link   
My understanding of the Govt Surviellance is the fact that all network traffic (and also cell, landline comms) is all channelled through several main network backbones (AT&T etc). A data splitter channels off a copy of all the comms to a little broom cupboard where the data is filtered for keywords the govt want to look out for. Any flags raised are onforwarded for further (manual) analysis.

there have been a couple of tv doco's mentioning this.

you have more to worry about as to what you search for etc on the net. eg; young fanatics searching the internet for al-quaida info/videos and terrorist instructions. these are the things that raise the flags and get them watched/investigated.

A descent firewall app on your PC/laptop can lock it down. all you need is a few outbound ports open and block most/all incoming.

If you want the CIA to work for their money, get everyone you know to include obvious keywords in all your emails/SMS/conversations etc. then they will have a mass of crap to sift through. Just end every one of the above with "... well dude, i have to go to the john and drop a bomb. cya".

Any luck and if you spread that news, the govt agencies will have 280Million SMS and phone calls to filter through to find anything worth a 2nd look.



posted on Apr, 6 2010 @ 09:17 PM
link   
Our firewalls at work log hundreds of attacks a week. You can generally see a pattern - someone will do a port scan sweep and hit one machine after the other (we have several feeds).

A few hours later, I guess they look at their results and you see them start pounding at different ports trying simple attacks. Sometimes they'll crank away at it for hours with badly formed packets and whatnot.

If any particular kiddie keeps at it for more than a day, we report them on Tattle Tale Thursday, when we file complaints with the ISPs. So far, most of the attacks have been Italian or Scandinavian, generally Finland. You see Chinese from time to time, and the occasional script kiddie off in Joisey.



posted on Apr, 6 2010 @ 09:17 PM
link   
My understanding is that all Networks monitor certain keywords. If any of these keywords or sites come up on the network, The IP along with the pertining data is then palmed off to the revelant "Watchers".



posted on Apr, 6 2010 @ 09:20 PM
link   
well lets be honest you dont know what government or who is in your computer. Remember it is is ILLEGAL to make programs that are unbreakable by the NSA. Bill gates was forced to leave backdoors all of this is public knowledge. Even if they were in your computer dont sweat it there is not enough processing power on earth yet to do successful data mining. All in good time we will figure out how to use the data for now it is just mirrored creating a copy, but its really not useful for more then flagging under echelon which is also public knowledge. None of this is secret and its done to protect you from looking up information you shouldnt know about and talking to people who are not american enough.



posted on Apr, 6 2010 @ 09:20 PM
link   
several years ago I always did reverse lookups on everyone that hit my firewall (back then it was port 1025/26). I saw many entities, the ones from China normally came from 'Network Information Centers', From France it was their Aerospace division, US from Halliburton, los alamos. I can also tell you that Akamai Technologies and level 3 communications are big players in the computer surveillance field. If you do enough reverse lookups (there's a complete list of IP's...), you will begin to notice a PATTERN on who is involved in this....



posted on Apr, 6 2010 @ 09:25 PM
link   
I imagine myself already nanochipped and gps`d, available to whatever government insult and invasion of privacy they want. The technology is already in place, they have only to legalize it. Paranoid by choice, yet, I can`t deny that culture has enforced that feeling for years. `Be cool`, `master the scene`, ``camera could be on you``, ``smile, you`re on candid camera``. That`s just a cultural layer of fear, bourne of the possibility that tptb could make example of anyone in the news, smear them in accordance to a grain of their truth, and let society tear them apart with their conditioned methods of labelling, knee-jerk judgements, and will then let them throw the tomatoes. Stygmatized, secularized, quarantined and demonized, sometimes all you can do is consider the source. The devil rules culture. Lady gaga the illuminati puppet, over a billion hits (wtg JZ!!! almost 33!!!). Injustice and terror are the weapons of the socialists above them. Look above them for your true safe haven, which will never falter.



posted on Apr, 6 2010 @ 09:32 PM
link   

Originally posted by tigpoppaEven if they were in your computer dont sweat it there is not enough processing power on earth yet to do successful data mining.


Oh, no, they data mine all the time. I guess it depends on what you mean.

There are a number of projects in place that scan the net for information. AFAIK they don't actually break in to your private systems, but they do scan any web content. Different branches look for different types of data.

Army's ABLE series looks for relationships between people and organizations. That one runs 24/7. Navy's got two, I don't know their focus. AF's got one. There's another one that Army runs near Ft Bragg that's probably a CAG system. The one in Tampa is shared between Army and SOCOM out of MacDill.

I'm pretty sure DIA has one now of their own. I'm not privy to the civilian intel agencies but I would expect the CIA has at least one.



posted on Apr, 6 2010 @ 09:38 PM
link   
reply to post by tnangela
 


So I WhoIs'd 10.1.1.12 IP from:



Ok, notice at 06:45:04 the OUTGOING attempts to ports 1935 and 8080? ... That's a government backdoor in VISTA.


...and got this


IP Location: Private Ip Address Lan
IP Address: 10.1.1.12
OrgName: Internet Assigned Numbers Authority
OrgID: IANA
Address: 4676 Admiralty Way, Suite 330
City: Marina del Rey
StateProv: CA PostalCode: 90292-6695
Country: US
NetRange: 10.0.0.0 - 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED NetHandle: NET-10-0-0-0-1
Parent:
NetType: IANA Special Use
NameServer: BLACKHOLE-1.IANA.ORG
NameServer: BLACKHOLE-2.IANA.ORG
Comment: This block is used as private address space.
Comment: Addresses from this block can be used by
Comment: anyone without any need to coordinate with
Comment: IANA or an Internet registry. Addresses from
Comment: this block are used in multiple, separately
Comment: operated networks.
Comment: This block was assigned by the IETF in the
Comment: Best Current Practice document, RFC 1918
Comment: which can be found at:
Comment: www.rfc-editor.org...
RegDate:
Updated: 2010-03-15
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: Internet Corporation for Assigned Names and Number OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail:
OrgTechHandle: IANA-IP-ARIN
OrgTechName: Internet Corporation for Assigned Names and Number OrgTechPhone: +1-310-301-5820
OrgTechEmail:


So then I went here: www.iana.org... then saw something on there front page.

Think we're attacking you?


Does it look like we're attacking you?

Some of the most common things we hear are "My network is under attack by IANA!" and "IANA is spamming me!" If you think this is the case, please take a few moments to read this page.

The Internet Assigned Numbers Authority, or IANA, is responsible for the global coordination of IP addresses. Most of the used numbers are allocated via a regional allocation system to your ISP, which then automatically assigns one or more to you.

There are, however, special sets of numbers that are designed not to be assigned to any particular person. Instead, they are general allocations that are either used in special ways, or designed for people to use internally within local networks.


Dis-Info? you be the judge. I'll reserve my right to remain silent on this one


I would like to add though, when I did the WhoIs look-up I got a zilch return when attempting to do a Reverse IP Look Up, Ping, DNS Query, and a Trace Route.



posted on Apr, 6 2010 @ 09:38 PM
link   
reply to post by tigpoppa
 





Remember it is is ILLEGAL to make programs that are unbreakable by the NSA.


It would be illegal to sell a cryptographic product that could not be broken but you are free to write your own cipher. They used to ask people to notify the NSA if they planned to distribute a new cipher algo but I don't think that is required anymore. An unbreakable cipher requires a steady source of random entropy and the key handling gets tricky when you sync multiple users.

If weird notes start to show up in your Boo wrapper you might want to reconsider your entropy source.

[edit on 6-4-2010 by Bordon81]



posted on Apr, 6 2010 @ 09:46 PM
link   
reply to post by UberL33t
 


Re the 10.1.x.x network - no conspiracy.

see en.wikipedia.org...

these are local network ip addresses set aside for your own private use.
start up a PC without connecting to the network, and MS will use the 192.168 network to assign your pc an ip address.

they are set aside for people to run there own little networks at home and do development work. These IP addresses cannot be routed into the Wide-Area-Network (WAN, Big Wide World).

[edit on 6-4-2010 by CitizenNum287119327]



posted on Apr, 6 2010 @ 09:49 PM
link   
There is a good program called peerblock 1.0 www.peerblock.com...

It blocks over a billion addresses including every government agency in the world, all 50 states, etc.
you can even block microsoft if you want.

I suggest this program because if the government really is watching you, you will know about it for sure using this program and it will also be blocking that traffic from happening. you can use this program in addition to your regular firewall application.
cheers



posted on Apr, 6 2010 @ 10:00 PM
link   

Originally posted by UberL33t
reply to post by tnangela
 


So I WhoIs'd 10.1.1.12 IP from:



Ok, notice at 06:45:04 the OUTGOING attempts to ports 1935 and 8080? ... That's a government backdoor in VISTA.


...and got this


IP Location: Private Ip Address Lan
IP Address: 10.1.1.12
OrgName: Internet Assigned Numbers Authority
OrgID: IANA

Dis-Info? you be the judge. I'll reserve my right to remain silent on this one


I would like to add though, when I did the WhoIs look-up I got a zilch return when attempting to do a Reverse IP Look Up, Ping, DNS Query, and a Trace Route.


Wow, I'm like astonished at the amount of sheer ignorance going on in this thread. Where to even begin.... Your "back door" for port 8080 is a well known proxy port. These are servers that allow you to redirect through them to either attack others or to visit web pages anonymously.The fact that someone was probing for it means... your on the internet..

The 10.x.x.x Ip mask is similar to the 192.168.x.x ip mask in that they should not actually be on the internet. Usually you will find these addresses behind NAT routers. These addresses are often spoofed by people that want you to think it's IANA.

If your system is hitting outgoing ports looking for a proxy, either you have some malware, or your intentionally scanning for proxies.

Yes, the government is probably watching you, but they really don't need to hit your system to do so. IP cop is fun to play with, but useless for any real diagnostics, and it certainly isn't a real firewall.

Ping and traceroute are often blocked (icmp type 0) IP reversals are almost never put in when dealing with lazy admins...and dns query?? No idea what you think you might be doing with that one...

If your really interested in what is going on around you, try Kismet. That will open your eyes, and show you that you really don't need to be actually connecting to a persons system to see what their doing.

..Ex



posted on Apr, 6 2010 @ 10:19 PM
link   
simply put if your an American citizen your under surveillance. that was the whole point of the patriot act.

there are programs available that block known government IP address's and updates daily. peer guardian comes to mind. i know theres a better one but i forgot the name.



posted on Apr, 6 2010 @ 10:26 PM
link   
reply to post by Pimpish
 


Oh, it's definitely them. I get way nastier stuff than that on my recursive queries. Israeli intelligence, Halliburton for like one day, KBR, various local courthouses, and yes, some which are just viruses, which means commercial corporations. Maybe you guys just don't say naughty enough things. I don't even have a criminal record.
Mine also switch ports and things, then come back on the same ports. However, while I agree with the OPs conclusion, I disagree with his reasoning. That kind of behavior isn't really very advanced. Anyone could probably buy something to do that for cheap, at least it seems to me. It is the government. The OP doesn't seem to be able to get them by name on his recursive queries, but I definitely can, several times a day. And a lot of their contract companies. Being an admitted anarchist will do that for ya.

Using a hosts file (look it up, everyone) helped clean my traffic quite a bit, which makes the internet faster and safer, not only for me, but for everyone. Uh, ATS would like me to say though, to make sure your host file allows their ads. Hell, U2u me and I'll even tell you how to modify a hosts file to do it.



posted on Apr, 6 2010 @ 10:44 PM
link   
Sorry to interrupt the flow, but most of the evidence was concealed eons before the internet, my pro experience dates from 1974, let that year sink in. The basic facts are that none of the worthwhile monitoring techniques were developed with content surveillence in mind so much as analysis of network performance errors and such. The user based software engines for filtering, phrase recognition, IP spoofing detection/avoidance are all predated by operational feedback and monitoring systems that helped develop the infrastructure from what Spock referred to as "stone knives and bear skins". Satcom and digital switching layers were obvious data portals if you knew what to do with the data, manual and mechanical switch networks required physical access to monitor. Nothing even remotely classified much before those days except secured, private carrier networks and encrypted military/government subnets.

So my point is that at the core of the network there are monitoring facilities built in that have access to every bit and byte, network managers use this information every day but ignore content. "Developers" use content all the time for application debugging. Nowadays the folks that use these tools and techniques have been mythically transformed to super hacker geeks (mostly associated with Fed Law enforcement on TV).

Fortunately, the old school dates about to 1985-1995 in contemporary jargon so the upcomers have only really seen slick user interfaces and easy-to-use query data extraction tools. And I'd have to admit that anything on the software platform is highly suspect for tampering. But to reiterate definitively there is no piece of data or traffic on the internet that cannot be monitored by far more people than the government.

gj

gj



posted on Apr, 6 2010 @ 10:53 PM
link   
reply to post by tnangela
 


We already know the government has given themselves permission to look up any piece of info on any of our electronic devices that they deem of interest to "national security"...

So given that they've already come out and given themselves permission to tap our phones and access our files I don't think this is news to anyone. I just pity the people who's job it is to sit there looking for terrorists in every computer in the country... Can you imagine? It might be a good way to find people who download music/movies illegally (like 90% of internet users) but as for finding terrorists, well... how many terrorists have facebook accounts?



posted on Apr, 6 2010 @ 11:15 PM
link   
reply to post by tnangela
 



The port 1935 story is that it's adobe flash. It's just that- a cover up story/red herring


Well, you did have adobe updater running in the screenshots, so that one makes perfect sense.



posted on Apr, 6 2010 @ 11:28 PM
link   
Hi, puter users.

If you want a very good firewall, use PORTSENTRY.

I use Linux Ubuntu AND Portsentry.

I "think" there is an EXE version for you
poor exclusively Win$loz users. . . B-0

Blue skies.




top topics



 
12
<< 1    3  4  5 >>

log in

join