It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by lokdog
I operate now with the understanding that my phone calls are listened to and my e-mails are read. So i'm allready carefull about what i say. In that sense the NSA won't get anything on me and this won't change the way i live my life. I'd like to someday go off the grid and dump all of these hightech devices, then there's no way you'll be spied on.
Originally posted by bekod
reply to post by Imightknow
2005 ? you do know this is 2012 and the NDAA2012 over steps this with the 1020-1026, not to mention some other laws that say yes it is ok for the DHS to spy on you by your neighbor doing for them, with no proof just hear say.
now I wonder how many despitiful neighbors will use this on each other just to get rid of them?
Originally posted by jtap66
Oh, so now it's 2013?
Because it was supposed to be several times already in 2012, and we're only a few months in.
Before that the NWO was to enact their nefarious plan about 13 times in 2011, 26 times in 2010, and 19 times in 2009.
How many times are a bunch of paranoids quoting other paranoids going to trumpet the coming totalitarian state and have it not come to pass before you finally accept that it's the ramblings of deluded people with too much time on their hands?
Originally posted by calnorak
Very interesting. I was under the impression, at least back in 2006 that most of this was already done in the name of "National Security".
The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.”