It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Anonymous: 'We have access to every classified database in the US

page: 3
21
<< 1  2    4  5 >>

log in

join
share:

posted on May, 14 2012 @ 08:51 PM
link   
Doesn't it seem strange to anybody that we have put so much trust in electronics that we have downloaded critical information onto computers in this country so it can be accessed by others? Does it sound sensible that this could even occur? Does it seem sensible that all the Power generation companies can be accessed externally? Is all this real or is it a lie to cover up something that is intended to happen and shift the blame to someone else? Either we have the stupidest people running things or it's all a coverup.



posted on May, 14 2012 @ 08:51 PM
link   

Originally posted by bo12au
If anon. has top secret info. from within the intelligence cabal, show the 911 file. You have a service to humanity to show us that, and if you do, they will love you for it. Until that time. zzzzzzzzzzz


If THIS 'anon' has them.



posted on May, 14 2012 @ 09:00 PM
link   
One must think, does one need to advertise...not..!



posted on May, 14 2012 @ 09:02 PM
link   

Originally posted by Anonymous404

Originally posted by tkwasny
You guys are so funny. TRUE high secure FedGov machines don't have LAN, USB ports, e-SATA ports, or wifi adapters. All the bait machines have just enough security to provide confidence to the hacker that they really, really broke in to something important. You can't even wear a watch or rings when entering the space where the REAL high security machines are. Hollywood makes real security so easy. Read "The Art of War".


If you think they haven't thought of that you're naive.


Yes, but can you also truly tell us, that the collective does not enjoy excessively exaggerating its' importance, and generally blowing smoke?


Before you retort, I know of Project Mayhem. I sincerely hope to see it come to fruition; but will we?

Time will tell.



posted on May, 14 2012 @ 09:03 PM
link   
reply to post by rickymouse
 


ANY system can be accessed externally by the right person.

The foolish thing was ever putting them all on the network in the first place.



posted on May, 14 2012 @ 09:09 PM
link   
reply to post by stanguilles7
 


I agree, A virus can get imputed anywhere in the system, it's too easy to sabotage. A seemingly blank part can be installed from a reputable firm with viruses in it. When they had manual shutoffs things were better.



posted on May, 14 2012 @ 09:14 PM
link   
Guy Fawkes was working with the Jesuits in order to kill King James and restore Catholic rule. V for Vendetta uses symbolism from the Jesuits point of view as they see themselves as the good guys. As they arose from the Inquisition (By Way of the Fire) 'suffered oppression' (Dominus ac Redemptor Noster) and come back to get revenge. The fireworks at the end representing the victory of Illumination, the 1812 Overture representing how they got back into Europe as Napoleon defeated all of their enemies in Europe was stopped at the one place the Jesuits were allowed, Russia. The Jesuits were then allowed to go back to Europe in 1814...Napoleon was no longer needed as a puppet and was defeated in 1815. And the story of Edmond Dante's representing that comeback that they made during the time of Napoleon.

"I do not like the reappearance of the Jesuits...Shall we not have regular swarms of them here, in as many disguises as only a king of the gypsies can assume, dressed as printers, publishers, writers and school masters? If ever there was a body of men who merited eternal damnation on earth and in hell, it is this Society of Loyola's." -Thomas Jefferson

"Strength through unity unity through faith"

Wake up Anon, every time I see you guys wearing a Guy Fawkes mask and thinking V was cool it makes me do a facepalm.
edit on 14-5-2012 by The_Phantom because: (no reason given)



posted on May, 14 2012 @ 09:16 PM
link   

Originally posted by stanguilles7

Originally posted by bo12au
If anon. has top secret info. from within the intelligence cabal, show the 911 file. You have a service to humanity to show us that, and if you do, they will love you for it. Until that time. zzzzzzzzzzz


If THIS 'anon' has them.



Right you are, I'm sure you have seen the vids. Of individuals claiming to be 'anon' on the net.lmao



posted on May, 14 2012 @ 09:27 PM
link   
reply to post by bo12au
 


For the record, I have nothing.


I'm simply someone who likes the idea of a mask to hide my identity from a state that loves to spy.

My AVI isn't even a picture of me.



posted on May, 14 2012 @ 09:28 PM
link   

Originally posted by The_Phantom

Wake up Anon, every time I see you guys wearing a Guy Fawkes mask and thinking V was cool it makes me do a facepalm.


Anonymous are trying to play the game of taking the material which the cabal have given them; the only thing which for them, has immediately come to hand, and turning it back against the cabal itself, for their own purposes. At this point, it's really all that many of us can do.

Tell me, friend; and be honest, now. How much exists inside your own head, that was not put there by someone else? We're all in the same boat, in that regard. Some will call me a brainwashed little sheeple, and indeed I am; but what I do with my mind control; that in itself is the only choice I have left.

You don't get to exist without brainwashing, in this day and age. None of us do. To take the pieces and re-arrange them into our own puzzle, however...that is an activity which we can still aspire to.

I just did what I do best. I took your little plan and I turned it on itself.

Another movie quote.


I acknowledge your point, however, that when we use symbols, it's always a very good idea to know where they've been. Some pre-loved sigils can come with all manner of existing muck, which can be extremely dangerous. Anonymous, I think, do tend to fall into this trap. They very often do not know context, and do not necessarily attempt to find it; they just rush on, doing what they do, without always knowing who their conductor is.

You might call it an occupational hazard.

edit on 14-5-2012 by petrus4 because: (no reason given)



posted on May, 14 2012 @ 09:52 PM
link   

Originally posted by petrus4
They very often do not know context, and do not necessarily attempt to find it; they just rush on, doing what they do, without always knowing who their conductor is.

You might call it an occupational hazard.

edit on 14-5-2012 by petrus4 because: (no reason given)


I 100% agree with with that.

But if they want to fight for a particular 'side' they really need to figure out what side that is, why they are fighting for it, and if their methods take them to where to they want to go. Otherwise, they will do more harm than good by following the wrong people.
edit on 14-5-2012 by The_Phantom because: (no reason given)



posted on May, 14 2012 @ 10:05 PM
link   

Originally posted by stanguilles7
reply to post by rickymouse
 


ANY system can be accessed externally by the right person.

The foolish thing was ever putting them all on the network in the first place.


Totally false. There are some systems (and most that contain ultra sensitive data) that can only be accessed by a number of people simultaneously entering a public key, and then the system queries each for a private key while verifying their GPS coordinate profile, then, if at a location that is deemed acceptable, the user enters another key, which is a sequence of digits from a personal RSA fob that change every 10 seconds, that has a key master server unique from any one else in the same security level, and all without ever divulging the master keys.

Do you really think that the security that holds premium financial and governmental data would ever be trusted by the authentication capabilities of a single entity?

You do not break into systems like this, these types of systems are hack proof, and most are on networks you would never be able to get on anyway, as they have no access to the internet, by design. Don't believe it?, well it's true, but you are certainly free to believe the anonymous crap if you want.

edit on 14-5-2012 by charlyv because: spelling , where caught

edit on 14-5-2012 by charlyv because: (no reason given)



posted on May, 14 2012 @ 10:08 PM
link   

Originally posted by The_Phantom
If they want to fight for a particular 'side' they really need to figure out what side that is, why they are fighting for it, and if their methods take them to where to they want to go. Otherwise, they will do more harm than good by following the wrong people.


You can identify certain methods as having entirely positive, practical applications, independent of their source. I like things such as this, for instance:-

Applied Metaphysics For Beginners

Sounds like so much white fluff, you might say; but it is very positive, and I've found that it has had some very good effects on my own thinking.

I Am A Lazy Man - This one is probably even better.

My point is that Anonymous primarily get themselves into trouble, when they mainly focus on smashing things. Destruction and pandering to/wallowing in entropy has its' own rewards. I'm not saying I don't enjoy a little entropy myself, now and then; I had some last night, and it was therapeutic.

The point, however, is balance.

Very, very many more of Anonymous' members, I suspect, would do well to consider the value of equipoise. Clearing space needed for new things to grow is a necessary part of the process, and I will not argue the point; but creation, expansion, warmth, light; all of these things are needed in equal measure to destruction, contraction, cold, and darkness.



posted on May, 14 2012 @ 10:09 PM
link   
if this was true, could you imagine how many threads on here could finally get true closer, I seriously hope this is true, if this is true i forgive you anonymous for the playstation hack



posted on May, 14 2012 @ 10:28 PM
link   

Originally posted by charlyv


You do not break into systems like this, these types of systems are hack proof, and most are on networks you would never be able to get on anyway, as they have no access to the internet, by design. Don't believe it?, well it's true, but you are certainly free to believe the anonymous crap if you want.


It's odd you think you are disagreeing with me, when you are actually agreeing with me.



posted on May, 14 2012 @ 10:42 PM
link   
reply to post by charlyv
 


Hack proof? if it is written in 101010100101010101010010101 there is no hack proof. Maybe no exploits found yet, but that doesn't mean one won't be found tomorrow, or a year from now. New exploits are found daily, which is why bigtime companies and governments keep skilled hackers on their payrolls. They pay people to try to break in, to try to make the odds better that they find exploits, before the "badguys" do.



posted on May, 14 2012 @ 11:17 PM
link   

Originally posted by TKDRL
reply to post by charlyv
 


Hack proof? if it is written in 101010100101010101010010101 there is no hack proof. Maybe no exploits found yet, but that doesn't mean one won't be found tomorrow, or a year from now. New exploits are found daily, which is why big time companies and governments keep skilled hackers on their payrolls. They pay people to try to break in, to try to make the odds better that they find exploits, before the "bad guys" do.


They're called "Grey Hats" (at least they were) and don't think for a second that even just one out of the thousands on corporate payrolls around the world isn't a "member" of anonymous.

I could go on and give everyone a rough profile of the type of person who would be in an "organization" like this, but it would fall on deaf ears I'm afraid. "Pics or it didn't happen" sort of thing. Proof comes out on a daily basis regarding what this group does, they are only vocal about themselves 2 or 3 times a month, yet most people just think they're all talk, 13 year old pranksters, or CIA hacks.

Most people just can't wrap their heads around what they do. Or better still, when Anon doesn't disclose things when people want them to, then they don't have anything at all.


What if I told you that the lead story you read on Yahoo News 4 days ago was manipulated 2 minutes after the AP released it? You know those 5 paragraphs that made up the story? The AP only released 4. Two minutes after it hit the wires, someone cracked the system and added a paragraph of their own. Just made it up out of thin air and changed the whole meaning of the story. Much the same way I can go into Wikipedia and alter any entry I want to, only a LOT more technical.




posted on May, 14 2012 @ 11:41 PM
link   

Originally posted by Taupin Desciple

Originally posted by TKDRL
reply to post by charlyv
 


I could go on and give everyone a rough profile of the type of person who would be in an "organization" like this, but it would fall on deaf ears I'm afraid. "Pics or it didn't happen" sort of thing. Proof comes out on a daily basis regarding what this group does, they are only vocal about themselves 2 or 3 times a month, yet most people just think they're all talk, 13 year old pranksters, or CIA hacks.


I wrote such a profile five years ago.

edit on 14-5-2012 by petrus4 because: (no reason given)



posted on May, 15 2012 @ 12:01 AM
link   
reply to post by charlyv
 


You can load a virus through hardware upgrades or additional software that is added to the system on a regular basis A fluctuation of the frequency of the power grid that supplies power can disrupt service. Computers can be disrupted in many ways.



posted on May, 15 2012 @ 12:09 AM
link   
reply to post by Taupin Desciple
 

Yahoo news?

Sorry, not a big fan at all. If they called it what it was, yahoo blogs, I might have a tiny bit of respect. Hell, the "sports experts" there can't even get half of what they say right, and even a meathead can follow sports.

I see better reporting in the comment sections than the actual article on yahoo.



new topics

top topics



 
21
<< 1  2    4  5 >>

log in

join