It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by bo12au
If anon. has top secret info. from within the intelligence cabal, show the 911 file. You have a service to humanity to show us that, and if you do, they will love you for it. Until that time. zzzzzzzzzzz
Originally posted by Anonymous404
Originally posted by tkwasny
You guys are so funny. TRUE high secure FedGov machines don't have LAN, USB ports, e-SATA ports, or wifi adapters. All the bait machines have just enough security to provide confidence to the hacker that they really, really broke in to something important. You can't even wear a watch or rings when entering the space where the REAL high security machines are. Hollywood makes real security so easy. Read "The Art of War".
If you think they haven't thought of that you're naive.
Originally posted by stanguilles7
Originally posted by bo12au
If anon. has top secret info. from within the intelligence cabal, show the 911 file. You have a service to humanity to show us that, and if you do, they will love you for it. Until that time. zzzzzzzzzzz
If THIS 'anon' has them.
Originally posted by The_Phantom
Wake up Anon, every time I see you guys wearing a Guy Fawkes mask and thinking V was cool it makes me do a facepalm.
Originally posted by petrus4
They very often do not know context, and do not necessarily attempt to find it; they just rush on, doing what they do, without always knowing who their conductor is.
You might call it an occupational hazard.edit on 14-5-2012 by petrus4 because: (no reason given)
Originally posted by stanguilles7
reply to post by rickymouse
ANY system can be accessed externally by the right person.
The foolish thing was ever putting them all on the network in the first place.
Originally posted by The_Phantom
If they want to fight for a particular 'side' they really need to figure out what side that is, why they are fighting for it, and if their methods take them to where to they want to go. Otherwise, they will do more harm than good by following the wrong people.
Originally posted by charlyv
You do not break into systems like this, these types of systems are hack proof, and most are on networks you would never be able to get on anyway, as they have no access to the internet, by design. Don't believe it?, well it's true, but you are certainly free to believe the anonymous crap if you want.
Originally posted by TKDRL
reply to post by charlyv
Hack proof? if it is written in 101010100101010101010010101 there is no hack proof. Maybe no exploits found yet, but that doesn't mean one won't be found tomorrow, or a year from now. New exploits are found daily, which is why big time companies and governments keep skilled hackers on their payrolls. They pay people to try to break in, to try to make the odds better that they find exploits, before the "bad guys" do.
Originally posted by Taupin Desciple
Originally posted by TKDRL
reply to post by charlyv
I could go on and give everyone a rough profile of the type of person who would be in an "organization" like this, but it would fall on deaf ears I'm afraid. "Pics or it didn't happen" sort of thing. Proof comes out on a daily basis regarding what this group does, they are only vocal about themselves 2 or 3 times a month, yet most people just think they're all talk, 13 year old pranksters, or CIA hacks.