It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Ear-Responsible
That's not true, at all. That I can promise you. A good hacker can get in and out without leaving a trace Anywho. This is definitely interesting to say the least. Wish there was some other source other than a direct pdf file. .gov is pretty convincing though. Let's see what happens..
P.S. [sarcasm]Glad to see the supermod adding so much useful insight to the topic[/sarcasm]edit on 23-4-2011 by Ear-Responsible because: (no reason given)
Originally posted by superluminal11
Originally posted by NuclearMitochondria
reply to post by superluminal11
Dont know if this is trolling him by using huge sarcasm or not , but if it isn't: IIRC some guy bought the domain name to troll conspiracy theorists.
Its the NSA for christ sake...some of the greatest network engineers and mathmeticians on the planet...why cant they cut the misdirect??
I thought the NSA were professionals and dont believe in all that illuminati crap they say dont exist.
Originally posted by Skallagrimsson
This came in my mind when reading this; The story of Wes Bateman and the descifering of the SETI messages...
www.jerrypippin.com...
These make an interesting read regarding the alien messages...
THE RODS of AMON RA (PDF)
SETI Messages Part 1 (PDF)
Originally posted by MissingRonnieR
Hogwash. No data relayed to spatial relationship of point of origion. This is jibberish, Federal employees do not alter font for dramatic presentation. This is hoax materal. NAS.gov would not link to a pdf, ignore.
Originally posted by AnthraAndromda
Originally posted by Ear-Responsible
That's not true, at all. That I can promise you. A good hacker can get in and out without leaving a trace Anywho. This is definitely interesting to say the least. Wish there was some other source other than a direct pdf file. .gov is pretty convincing though. Let's see what happens..
Really?!!! No "hacker" could get into my system without leaving tracks, so just how are they doing it to a system with security that makes mine look like an "open door"?
P.S. [sarcasm]Glad to see the supermod adding so much useful insight to the topic[/sarcasm]edit on 23-4-2011 by Ear-Responsible because: (no reason given)
Just 'cause he a staff member, doesn't make him all-knowing, Personally, I found his remardk; rather uneducated.