It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Nans DESMICHELS
nffnffvangvba
ASSASS-N/AT--N
(Probably ASSASSIN ATI-N)
Any idea about the word ATI*N ?
Originally posted by Valhall
It kind of makes sense to me that this board might be checked on every once in awhile.
And some times there are posts here that are pretty, well, violent and threatening! But they are also fairly rare.
One would hope that just being a member of a very public and broad community such as this wouldn't make you a target.
But then one never knows either. I know I'm not a party to any jicky stuff, so I'm not going to worry
Originally posted by The Blade Runner
i think thats fake...
Originally posted by William
mere links to the content were not enough?
From the site: "The U.S. government is making it known that they can and do sift through all the data packets on the internet, using Carnivore and Echelon, hoping to find some terrorist's email in the process.� As long as they're looking for words like these, let's give them the satisfaction of finding a few."
Simply put, not possible. The hardware and manpower required for the task described is beyond extraordinary. We calculated the required hard drive storage space to manage the tracking of one-day's worth of e-mail a couple months ago here. The figure came to a couple-thousand terrabytes (1,000 gigabytes) of storage... for one day. This is because the nature of TCP/IP technology does not allow for "stream watching" as some people think, each packet would need to be duplicated and routed to the monitoring station somehow... also requiring an immediate doubling of bandwidth utilization... again cost prohibitive.
What can be done is the monitoring of packets to and packets from a given location (server), once monitoring devices are put in place.