It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by JohnPhoenix
Interesting. Where is your source?
My source is from my own personal life experiences. Back in the early 1980's, I learned about some of this while building hardware circuits at Bell Labs. At that time, I also was friends with an old man who work for Battelle, in Columbus, Ohio. It was this man who taught me how to use an oscilloscope to view modulated data on a line.
The computer power supply deliver's DC power, via many individual wires, to the motherboard. Modulation circuits on the motherboard, fed by the operating system, provides a serial link through one or more of those DC power feeds to the power supply. Then inside the power supply itself, repeater circuits convert the modulation into a form that can be carried back out along the AC lines into the grid itself.
The only way to detect this is using an oscilloscope, and the data appears as "line noise".
Originally posted by Gold_Bug
Originally posted by JohnPhoenix
Interesting. Where is your source?
My source is from my own personal life experiences. Back in the early 1980's, I learned about some of this while building hardware circuits at Bell Labs. At that time, I also was friends with an old man who work for Battelle, in Columbus, Ohio. It was this man who taught me how to use an oscilloscope to view modulated data on a line.
The computer power supply deliver's DC power, via many individual wires, to the motherboard. Modulation circuits on the motherboard, fed by the operating system, provides a serial link through one or more of those DC power feeds to the power supply. Then inside the power supply itself, repeater circuits convert the modulation into a form that can be carried back out along the AC lines into the grid itself.
The only way to detect this is using an oscilloscope, and the data appears as "line noise".
So.. let me get this straight.. Every power supply company builds these "repeater circuits that convert the modulation" into their power supply knowingly and willingly?
That's kinda far fetched.. Every electronics company on earth would have to be in on the jig.
[edit on 23-6-2010 by JohnPhoenix]
Originally posted by airspoon
reply to post by Gold_Bug
Also, you seem to be forgetting those grocery store shopper discount cards. Every time you shop at the grocery store and swipe that card to get the advertised price, all of the information about your purchases and payment method is going into a database somewhere. Whether or not the government has access to this data, I have no idea but I don't see why they wouldn't.
--airspoon
Originally posted by JohnPhoenix
That's kinda far fetched.. Every electronics company on earth would have to be in on the jig.
Originally posted by Gold_Bug
#1. CELL PHONE. On or off, you phone's microphone is hot. Everything it picks up is compressed and reported to the TIA database using periodic signal burst. New cell phones that have imbedded cameras can also report a stream of snap shot video back in the same manor. ONLY DEFENSE: pull the battery out.
#2. DESKTOP COMPUTER...a power supply back door was developed to permit intelligence agencies to sneak into any computer via the a/c power grid and access the operation system and system data.
#3. TELECOMMUNICATIONS. It has been documented for years, in many sources, that the TIA database collects info from the telecommunication networks...Also, assume that every hotel room, public space, and even street corners, are bugged and surveyed by hidden microphones and cameras.
#4. TELEVISION. It has been presumed that modern digital televisions have embedded micro-cameras and microphones, that feed snapshots and sound data to the TIA via the power-grid.
Of a more personal concern, you should wonder if it even possible to have some privacy in a public bathroom? For years now, strangers have been known to snoop inside of stalls with hidden phone cameras. Such creeps can post your most private moments on underground porn sites without your knowledge or consent. Many ladies know all about these dangers, but for the men reading this article, when was the last time you looked over your shoulder while standing at a public urinal?
READER'S BEWARE: The disclosure of this information is bound to spook the intel agencies that rely on the TIA stream of electronic data, so beware of disinfo agents bashing this article or the concepts that it conveys.
There are tens of thousand of electronics companies on earth. How many of them do you honestly think participated in the circuit board and embedded software driver designs?
(c) Copyright 2010 SJR -
Originally posted by Gold_Bug
#2. DESKTOP COMPUTER. Back in the 1980's, worldwide intelligence agencies were freaked out by the encryption power of the simple desktop computer. To counter this threat, a power supply back door was developed to permit intelligence agencies to sneak into any computer via the a/c power grid and access the operation system and system data. This is the ultimate back door that works wether the computer is connected to the internet or not. ONLY DEFENSE: Operate stand alone systems from back up power supplies that are in no way connected to the power grid. Generators and clean sign wave inverters can defeat this snoop. However, every computer connected to the internet in any manor is compromised by other network back doors embedded in the operating systems for the benefit of the TIA database.
[edit on 23-6-2010 by Gold_Bug]
A powerful set of tools specifically designed to circumvent security on computers running the Microsoft Windows operating systems was released to law enforcement and military intelligence staff in the U.S and other foreign countries by Microsoft in the summer of 2007.
The USB device was dubbed COFEE which stands for Computer Online Forensic Evidence Extractor. COFEE is said to contain over 100 software programs that allow the holder to quickly discover passwords, decrypt files and folders, view recent Internet activity and a great deal more. On piece of functionality allows evidence to be gathered while the computer is still connected to the Internet or other network. All you have to do is plug COFEE into a USB port of a running computer and the data extraction begins with the click of a mouse. Some security professionals and privacy advocates are concerned that Microsoft has created a secret back door within Windows. This is a concern the Microsoft has denied.
ignoranceisfutile.wordpress.com...
Originally posted by AntiNWO
Originally posted by Gold_Bug
#1. CELL PHONE. On or off, you phone's microphone is hot. Everything it picks up is compressed and reported to the TIA database using periodic signal burst. New cell phones that have imbedded cameras can also report a stream of snap shot video back in the same manor. ONLY DEFENSE: pull the battery out.
This is true, as far as audio, but not video. Very simple technology in use by the various alphabet agencies.
In the United States, in 2009 actions were taken by the telecommunication industry that led many to believe that price fixing was taking place. Every provider (AT&T, Verizon, Sprint, and T-Mobile) all offered the same mobile broadband plan at the same price. 5GB max at $60 a month. Under the Sherman Act,[1] July 2, 1890 this would be illegal, and allows for any individual the right to sue under the antitrust laws. As evident in the network outage on April 9, 2009 in Santa Clara, Santa Cruz, and San Benito counties in California many of these companies are interlinked and some share the same network (depending on area), which might constitute monopoly or cartel practices.
en.wikipedia.org...