It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Klein says he collected 120 pages of technical documents left around the San Francisco office showing how the NSA was installing "splitters" that would allow it to copy both domestic and international Internet traffic moving through AT&T connections with 16 other trunk lines.
Originally posted by Biigs
One question i like to ask paranoid individuals regarding big brother:
What makes you think you are so interesting in the first place?
Big brother must be having a pretty damned quiet week if they have nothing more important to do and also, just how close can anyone really watch or follow you? Its like the old security camera debate, you can have as many cameras as you like, you still need somone to watch them all, right?
Originally posted by Biigs
reply to post by forevertruepatriot
So are these people scared by a computer algorithm? Or the poeple behind it?
Theres only one thing that i guess that im scared of with big brother and thats being falsy accused of somthing, but it doesnt keep me up at night because i am for the most part a normal person, who does normal person things.
Even though this says data. How easy would it be to track and monitor phone also.
Originally posted by Ittabena
reply to post by TRILL
Whenever I relocate to a new place I make friends with computer geeks in the area. While in MS I made friends with a guy who had done nothing all his life but study and work with computers. Hacker? Yes. GD wizard was what he was.
The laws, the technology, and the software is all in place. The fairy stories you speak of about key words triggering automatic recording of the conversation or email are true. Indeed I heard a story on NPR (National Propaganda Radio) where they told how hackers could listen in to what was being said in a room even if the cell phone was turned off. I called my bud because I knew that this was half the truth. He informed me that yes it would be possible, but not for hackers unless they could break into the computer that has the software, connections, etc. In other words the NSA computer.
He went on to tell me that he could do this as well but he would have to have physical possession of the cell phone for a minute or two before he could accomplish this.
But perhaps you are right, they have installed this capability in each and every cell phone because they have no intention of using it, nor any desire to use it.
I used to work for WCom (WorldCom) and have listened in on telephone conversations myself. The last time it was done in the switch house in New Orleans with the super high tech hardware called an "alligator clip". I was not listening to listen, I was listening to find a clear line - one with no conversation ongoing - so that I could test a problem the locals were having. I did not reveal my presence, and cannot be sued or otherwise litigated against for this, it was the normal performance of my job. I was waiting for the two women to shut up and get off the line. At the time there were three of us standing there listening.
Meanwhile about 50 to 90 miles away, depending there was a Regen (Regenerator) sitting by the side of a RR track in which part of the shelter was cordoned off by a steel locked gate. Only those with Federal clearance could step into that side of the shelter. I, not having gone through the clearance process could be in the shelter and stand next to the steel door while it was opened but I could not go through it. What was in it? The Feds own little network? The Feds own little listening equipment?
I cannot say for certain what was in it, because I could not examine the fiber labels to see what came in and went out and where, but I can tell you it was not the normal Nortel/Siemens/Pirelli equipment that carried all our other networks. That stuff was on the side of the gate that I was allowed into and the stuff on the "secret" side rode on our normal equipment and fibers. So what was going on on the Fed side of the Gate? You tell me. My educated guess is that I was looking at part of the hardware that supported the Echelon software. Every Regen in the country is not set up this way, but there are an awful lot that are, and they are usually a little ways outside of major metropolitan areas.
Don't be too sure the sky is not falling until you talk to folks from the technical side of things, because we aren't that sure.
I am one of those tech people you speak of. I develop software for big companies and have, with the support of my team written several algorithms and programs that do similar things for companies that mine for research. All of the info is collected passively, people don't know they are being data mined. Then all of a sudden the whole picture come together. This is evident on a VERY small scale with tracking cookies on the web. It pops ads up for similar things that you have been shopping for. Think of this, only a tracking cookies on where you go, who you interact with, what you drive, how you drive etc.
Originally posted by Biigs
reply to post by forevertruepatriot
People do way too much on computers, things that life interactions should be covering.
in my opinion computers should not be used for finacial, relationship or otherwise sensitive information ever.
We dont make avatars and alter-egos online just because its fun you know