Topic: A MUST watch for ALL! | |
---|---|
This Needs To Go Viral. Frontline. The United States of Secrets Parts 1 & 2! http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/#part-one---the-program PRISM: Solving for X http://ashkansoltani.org/2013/06/14/prism-solving-for-x/ |
|
|
|
This Needs To Go Viral. Frontline. The United States of Secrets Parts 1 & 2! http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/#part-one---the-program PRISM: Solving for X http://ashkansoltani.org/2013/06/14/prism-solving-for-x/ Interesting concept, but it is much more simplistic than that. At one time I was an employee of BellSouth in South Florida. Didn't last long, way too political for me, so I started my own company and became as agent, no politics and way better pay. As an agent, I sold BellSouth services to anyone willing to buy them. Selling voice services was ok and the pay good especially in volume, but the big money was on data, my specialty and the reason they hired me in the first place. Therefore, I spend a lot of time in Internet Hotels making sure my clients circuits were delivered on time and provisioned correctly. It is these hotels that are the basis of collection. First, Internet Hotels are located directly on the main fiber rings that run around a major metropolitan area. These runs pass through underground vaults, were they are tapped and delivered to the hotel. All the fibers entering the hotel go into this little secure room, you guessed it, belonging to the federal government. They were concrete rooms with heavy security doors and even phone company techs were not allowed inside the room without clearance and escort. Once they left that room, they went to the telco fiber distribution panels, but nobody would openly discuss what was in that room, forbidden, but that room did have massive power requirements. Oh and speaking of internet, you haven't experienced speed until you plug directly into an internet backbone router at DS3 or higher speeds. It can smoke your PC, literally of course. |
|
|
|
Edited by
Sojourning_Soul
on
Fri 05/23/14 12:48 PM
|
|
This Needs To Go Viral. Frontline. The United States of Secrets Parts 1 & 2! http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/#part-one---the-program PRISM: Solving for X http://ashkansoltani.org/2013/06/14/prism-solving-for-x/ Interesting concept, but it is much more simplistic than that. At one time I was an employee of BellSouth in South Florida. Didn't last long, way too political for me, so I started my own company and became as agent, no politics and way better pay. As an agent, I sold BellSouth services to anyone willing to buy them. Selling voice services was ok and the pay good especially in volume, but the big money was on data, my specialty and the reason they hired me in the first place. Therefore, I spend a lot of time in Internet Hotels making sure my clients circuits were delivered on time and provisioned correctly. It is these hotels that are the basis of collection. First, Internet Hotels are located directly on the main fiber rings that run around a major metropolitan area. These runs pass through underground vaults, were they are tapped and delivered to the hotel. All the fibers entering the hotel go into this little secure room, you guessed it, belonging to the federal government. They were concrete rooms with heavy security doors and even phone company techs were not allowed inside the room without clearance and escort. Once they left that room, they went to the telco fiber distribution panels, but nobody would openly discuss what was in that room, forbidden, but that room did have massive power requirements. Oh and speaking of internet, you haven't experienced speed until you plug directly into an internet backbone router at DS3 or higher speeds. It can smoke your PC, literally of course. There's no way you watched the video really. I posted the links 1/2 way thru the 1st part (a couple hours ago) and I have only just finished watching it.... without pauses. It plays both sides without judgement to either, both represented. I, of course, found it most disturbing both in scope and govt presumption of justification, but the video takes no sides, only reveals the thoughts and actions of both parties, how it came about, how it continues, the scope of the breach to individual privacy and constitutional issues, and the BILLIONS made by the providers to collect your private data for sale to advertisers..... which the govt steals, collects, and uses for its own purposes.... often without the knowledge of even the provider. Watching it, or simply listening to it as I did in parts, you'll find why I don't use Google, twitter, facebook or any of the other programs, why I use a secure, anonymous browser, reject cookies, constantly clear my history, and encrypt my files. Anyone watching this will look at things much differently when done watching the video....... guaranteed! It's long..... but I suggest you take the time for anyone thinking to talk intelligently on the subject.... no matter which view you hold! |
|
|
|
This Needs To Go Viral. Frontline. The United States of Secrets Parts 1 & 2! http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/#part-one---the-program PRISM: Solving for X http://ashkansoltani.org/2013/06/14/prism-solving-for-x/ Interesting concept, but it is much more simplistic than that. At one time I was an employee of BellSouth in South Florida. Didn't last long, way too political for me, so I started my own company and became as agent, no politics and way better pay. As an agent, I sold BellSouth services to anyone willing to buy them. Selling voice services was ok and the pay good especially in volume, but the big money was on data, my specialty and the reason they hired me in the first place. Therefore, I spend a lot of time in Internet Hotels making sure my clients circuits were delivered on time and provisioned correctly. It is these hotels that are the basis of collection. First, Internet Hotels are located directly on the main fiber rings that run around a major metropolitan area. These runs pass through underground vaults, were they are tapped and delivered to the hotel. All the fibers entering the hotel go into this little secure room, you guessed it, belonging to the federal government. They were concrete rooms with heavy security doors and even phone company techs were not allowed inside the room without clearance and escort. Once they left that room, they went to the telco fiber distribution panels, but nobody would openly discuss what was in that room, forbidden, but that room did have massive power requirements. Oh and speaking of internet, you haven't experienced speed until you plug directly into an internet backbone router at DS3 or higher speeds. It can smoke your PC, literally of course. There's no way you watched the video really. I posted the links 1/2 way thru the 1st part (a couple hours ago) and I have only just finished watching it.... without pauses. It plays both sides without judgement to either, both represented. I, of course, found it most disturbing both in scope and govt presumption of justification, but the video takes no sides, only reveals the thoughts and actions of both parties, how it came about, how it continues, the scope of the breach to individual privacy and constitutional issues, and the BILLIONS made by the providers to collect your private data for sale to advertisers..... which the govt steals, collects, and uses for its own purposes.... often without the knowledge of even the provider. Watching it, or simply listening to it as I did in parts, you'll find why I don't use Google, twitter, facebook or any of the other programs, why I use a secure, anonymous browser, reject cookies, constantly clear my history, and encrypt my files. Anyone watching this will look at things much differently when done watching the video....... guaranteed! It's long..... but I suggest you take the time for anyone thinking to talk intelligently on the subject.... no matter which view you hold! What video, first link was a failure that couldn't be finagled to anything. The second link was the text on Prism, which I responded to. As to the rest, I wouldn't mind watching, I enjoy the different views but couldn't get there from here. As to your description, there are thousands of angles out there besides PBS. And like you, I have never used twitter or facebook, but I am on google, but not like the masses, I am fully aware and accept the risks. Google is a government sponsored outfit, they traded away their customers for access to the satellites. Secure browser, using TOR? I looked but just wasn't happy with what I saw. But for now I'm using google and windows so what difference does it make? I need to rebuild and switch to Unbutu, then I will secure my system. No need to do that now as the IP would be a dead give away. Will be moving soon, then I will go secure, new IP, using proxy's, with secure browser. If you are using TOR, would you drop me a line on email about your experience? |
|
|
|
Edited by
Sojourning_Soul
on
Sat 05/24/14 05:57 AM
|
|
This Needs To Go Viral. Frontline. The United States of Secrets Parts 1 & 2! http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/#part-one---the-program PRISM: Solving for X http://ashkansoltani.org/2013/06/14/prism-solving-for-x/ Interesting concept, but it is much more simplistic than that. At one time I was an employee of BellSouth in South Florida. Didn't last long, way too political for me, so I started my own company and became as agent, no politics and way better pay. As an agent, I sold BellSouth services to anyone willing to buy them. Selling voice services was ok and the pay good especially in volume, but the big money was on data, my specialty and the reason they hired me in the first place. Therefore, I spend a lot of time in Internet Hotels making sure my clients circuits were delivered on time and provisioned correctly. It is these hotels that are the basis of collection. First, Internet Hotels are located directly on the main fiber rings that run around a major metropolitan area. These runs pass through underground vaults, were they are tapped and delivered to the hotel. All the fibers entering the hotel go into this little secure room, you guessed it, belonging to the federal government. They were concrete rooms with heavy security doors and even phone company techs were not allowed inside the room without clearance and escort. Once they left that room, they went to the telco fiber distribution panels, but nobody would openly discuss what was in that room, forbidden, but that room did have massive power requirements. Oh and speaking of internet, you haven't experienced speed until you plug directly into an internet backbone router at DS3 or higher speeds. It can smoke your PC, literally of course. There's no way you watched the video really. I posted the links 1/2 way thru the 1st part (a couple hours ago) and I have only just finished watching it.... without pauses. It plays both sides without judgement to either, both represented. I, of course, found it most disturbing both in scope and govt presumption of justification, but the video takes no sides, only reveals the thoughts and actions of both parties, how it came about, how it continues, the scope of the breach to individual privacy and constitutional issues, and the BILLIONS made by the providers to collect your private data for sale to advertisers..... which the govt steals, collects, and uses for its own purposes.... often without the knowledge of even the provider. Watching it, or simply listening to it as I did in parts, you'll find why I don't use Google, twitter, facebook or any of the other programs, why I use a secure, anonymous browser, reject cookies, constantly clear my history, and encrypt my files. Anyone watching this will look at things much differently when done watching the video....... guaranteed! It's long..... but I suggest you take the time for anyone thinking to talk intelligently on the subject.... no matter which view you hold! What video, first link was a failure that couldn't be finagled to anything. The second link was the text on Prism, which I responded to. As to the rest, I wouldn't mind watching, I enjoy the different views but couldn't get there from here. As to your description, there are thousands of angles out there besides PBS. And like you, I have never used twitter or facebook, but I am on google, but not like the masses, I am fully aware and accept the risks. Google is a government sponsored outfit, they traded away their customers for access to the satellites. Secure browser, using TOR? I looked but just wasn't happy with what I saw. But for now I'm using google and windows so what difference does it make? I need to rebuild and switch to Unbutu, then I will secure my system. No need to do that now as the IP would be a dead give away. Will be moving soon, then I will go secure, new IP, using proxy's, with secure browser. If you are using TOR, would you drop me a line on email about your experience? OOPS! Sorry about that. I'll try again. If the link doesn't work search for the link by the header. It sure brings Gen Hayden and that slimeball Cheney to light! It exposes with facts how Cheney bypassed Bush in most decisions coming from the Bush WH with Hayden implementing them, and Gonzales playing the role of Obozos' AG Holder! It will surprise you how many actually fought against Cheneys unconstitutional actions, the NDAA and "The Program" and actually quit their jobs rather than be a party to it....calling it "CRIMINAL".... and how Cheney and Gonzales actually went after them to discredit them..... and how Obozo has taken it from there..... ![]() Actual interviews with those involved..... in their own words! Hard to say it's not a fact in this case! It MUST be watched! Very revealing! The United States of Secrets Parts 1 & 2 http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/ This link seems to work BTW.... I use "waterfox" (for 64 bit.... "Palemoon" is the 32 bit version) with "ghostery" and all the securities enabled.... and a few other tricks as well... as my general browser |
|
|
|
Edited by
alnewman
on
Sat 05/24/14 03:20 PM
|
|
OOPS! Sorry about that. I'll try again. If the link doesn't work search for the link by the header. It sure brings Gen Hayden and that slimeball Cheney to light! It exposes with facts how Cheney bypassed Bush in most decisions coming from the Bush WH with Hayden implementing them, and Gonzales playing the role of Obozos' AG Holder! It will surprise you how many actually fought against Cheneys unconstitutional actions, the NDAA and "The Program" and actually quit their jobs rather than be a party to it....calling it "CRIMINAL".... and how Cheney and Gonzales actually went after them to discredit them..... and how Obozo has taken it from there..... ![]() Actual interviews with those involved..... in their own words! Hard to say it's not a fact in this case! It MUST be watched! Very revealing! The United States of Secrets Parts 1 & 2 http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/ This link seems to work BTW.... I use "waterfox" (for 64 bit.... "Palemoon" is the 32 bit version) with "ghostery" and all the securities enabled.... and a few other tricks as well... as my general browser Thank you, that worked. Also found it on YouTube so I can watch later this evening on my smart TV, direct connect to YouTube and Netflix the only thing TV good for. I'll comment on the content tomorrow. I can't watch anything on this PC, I changed motherboard and processor and forced windows to accept, lost audio. I need to rebuild but all my stuff is in storage as I'm in transit. This PC older 32 bit where I run modified Firefox. Waterfox major issue, only for Windows that is a security risk unto itself. Getting away from Windows, can't stand. I looked at Palemoon for Unix and there is a question about Debian and Ubuntu, my Unix preference. Seems like Xubuntu works, may have to use that version. Thanks for the tip, firefox getting unstable. And I use DoNotTrack, according to sources, about the same as ghostery. Privacy plug-in showdown: Do Not Track Plus vs. Ghostery Like I'm not sure of your results but right now there are four trackers on this site. |
|
|
|
I have just finished watching the program, both parts. This is nothing new to me. What I described in my first post, that was the start of the 2nd part, the room with a door and no handles. I did find some of the details very interesting though, well worth the time to watch.
But William Binney, he is part of the problem. His pleading after being framed is just what they want, he should have pushed forward even if just to get a judgement for the return of all his legal fees and expenses, a forfeit when you plead out to a no sentence plea. The spoils go to the victor, the debts to the loser. Here they unjustly attacked and ruined this guy and he pays the penalty, a warning for those to come, you'll lose even if you win. And then there is the still cage, that was the operating company, in my case BellSouth. That was the fiber distribution frames, some were terminated into the Optical Channel fiber modems some were sent to other floors as raw fiber for use by AT&T, MCI and other long haul network backbone routers. That cage is also where I got my hand-off for my clients to connect to their backbone routers. Now I'm talking late 90s early 2000s. In case you haven't guessed, my specialty was communications, data communications. I used to work for a company out of Miami, later Ft. Lauderdale called Racal Datacom. Yeah, we had encryption products where I was introduced to NSA. Back then I could give you ca copy of the certificate that had the NSA embalym but we were restricted from saying their name verbally during a presentation. And unlike Al gore, I was involved. My first access to the internet was a dial up connection to Mae East. It was nothing more that a text messaging system but it gave us access to all the Universities. My engineering team was the top graduates we recruited from all the ivy league schools, being in South Florida was a great draw and we paid real good. I also worked for a real short time for BellSouth before becoming a private contractor representing BellSouth and many other vendors. I used to have access to all the Internet hotels in the south Florida area including that massive BellSouth Hosting center in Miami. Now with that said, let me tell you that what you have seen is only scratching the surface. They talked about Quantum computers, those are not new. Back in the 90s, they used Cray. There was a mention of being able to crack encryption, they have been doing that for a long time. NSA unrestricted our sales of encryption devices to foreign nations in the early 90s. Believe me, it wasn't being generous, they could crack but for bank networks, it made hacking very expensive. You say you don't use google, why not, they use you. And even with Ghostery, do you still get cookies? Yeah it slows down some things but you're still there. There used to be a site out of the Netherlands that you could connect to that would read all your browser info and give it back to you. And I'll tell you that Windows, not Explorer, gives away so much information on your system, it doesn't matter what browser you hide behind, Windows gives you up. |
|
|
|
Edited by
Sojourning_Soul
on
Sun 05/25/14 04:05 AM
|
|
I have just finished watching the program, both parts. This is nothing new to me. What I described in my first post, that was the start of the 2nd part, the room with a door and no handles. I did find some of the details very interesting though, well worth the time to watch. But William Binney, he is part of the problem. His pleading after being framed is just what they want, he should have pushed forward even if just to get a judgement for the return of all his legal fees and expenses, a forfeit when you plead out to a no sentence plea. The spoils go to the victor, the debts to the loser. Here they unjustly attacked and ruined this guy and he pays the penalty, a warning for those to come, you'll lose even if you win. And then there is the still cage, that was the operating company, in my case BellSouth. That was the fiber distribution frames, some were terminated into the Optical Channel fiber modems some were sent to other floors as raw fiber for use by AT&T, MCI and other long haul network backbone routers. That cage is also where I got my hand-off for my clients to connect to their backbone routers. Now I'm talking late 90s early 2000s. In case you haven't guessed, my specialty was communications, data communications. I used to work for a company out of Miami, later Ft. Lauderdale called Racal Datacom. Yeah, we had encryption products where I was introduced to NSA. Back then I could give you ca copy of the certificate that had the NSA embalym but we were restricted from saying their name verbally during a presentation. And unlike Al gore, I was involved. My first access to the internet was a dial up connection to Mae East. It was nothing more that a text messaging system but it gave us access to all the Universities. My engineering team was the top graduates we recruited from all the ivy league schools, being in South Florida was a great draw and we paid real good. I also worked for a real short time for BellSouth before becoming a private contractor representing BellSouth and many other vendors. I used to have access to all the Internet hotels in the south Florida area including that massive BellSouth Hosting center in Miami. Now with that said, let me tell you that what you have seen is only scratching the surface. They talked about Quantum computers, those are not new. Back in the 90s, they used Cray. There was a mention of being able to crack encryption, they have been doing that for a long time. NSA unrestricted our sales of encryption devices to foreign nations in the early 90s. Believe me, it wasn't being generous, they could crack but for bank networks, it made hacking very expensive. You say you don't use google, why not, they use you. And even with Ghostery, do you still get cookies? Yeah it slows down some things but you're still there. There used to be a site out of the Netherlands that you could connect to that would read all your browser info and give it back to you. And I'll tell you that Windows, not Explorer, gives away so much information on your system, it doesn't matter what browser you hide behind, Windows gives you up. My version of Windoze Sleven ![]() Internet Exploder is not a browser I would ever use, and if people knew exactly what Google Chrome (with its 41 inherent malware and back doors), Facebook, toolbars, cookies and all their other favorite programs and tools were actually designed to do.... let's just say they weren't designed to make ANYTHING faster, "easier" or "user friendly" for the common PC user as they are told.... Mingle is one of my very few PC vices... and runs from a dedicated machine behind a Linux server... which also hosts my Magic Jack. THAT was some interesting code to make work properly. Some might call it paranoia.... I call it common sense or "preparedness" in a coded world of secrecy and privacy abuses. Four years of military training in communications working mostly with message center operations opened my eyes... even if my MOS was only defined and rated by humping a PRIC 25 for most of my 15 months in Nam. Have a safe holiday ![]() |
|
|
|
Edited by
alnewman
on
Sun 05/25/14 10:52 AM
|
|
I have just finished watching the program, both parts. This is nothing new to me. What I described in my first post, that was the start of the 2nd part, the room with a door and no handles. I did find some of the details very interesting though, well worth the time to watch. But William Binney, he is part of the problem. His pleading after being framed is just what they want, he should have pushed forward even if just to get a judgement for the return of all his legal fees and expenses, a forfeit when you plead out to a no sentence plea. The spoils go to the victor, the debts to the loser. Here they unjustly attacked and ruined this guy and he pays the penalty, a warning for those to come, you'll lose even if you win. And then there is the still cage, that was the operating company, in my case BellSouth. That was the fiber distribution frames, some were terminated into the Optical Channel fiber modems some were sent to other floors as raw fiber for use by AT&T, MCI and other long haul network backbone routers. That cage is also where I got my hand-off for my clients to connect to their backbone routers. Now I'm talking late 90s early 2000s. In case you haven't guessed, my specialty was communications, data communications. I used to work for a company out of Miami, later Ft. Lauderdale called Racal Datacom. Yeah, we had encryption products where I was introduced to NSA. Back then I could give you ca copy of the certificate that had the NSA embalym but we were restricted from saying their name verbally during a presentation. And unlike Al gore, I was involved. My first access to the internet was a dial up connection to Mae East. It was nothing more that a text messaging system but it gave us access to all the Universities. My engineering team was the top graduates we recruited from all the ivy league schools, being in South Florida was a great draw and we paid real good. I also worked for a real short time for BellSouth before becoming a private contractor representing BellSouth and many other vendors. I used to have access to all the Internet hotels in the south Florida area including that massive BellSouth Hosting center in Miami. Now with that said, let me tell you that what you have seen is only scratching the surface. They talked about Quantum computers, those are not new. Back in the 90s, they used Cray. There was a mention of being able to crack encryption, they have been doing that for a long time. NSA unrestricted our sales of encryption devices to foreign nations in the early 90s. Believe me, it wasn't being generous, they could crack but for bank networks, it made hacking very expensive. You say you don't use google, why not, they use you. And even with Ghostery, do you still get cookies? Yeah it slows down some things but you're still there. There used to be a site out of the Netherlands that you could connect to that would read all your browser info and give it back to you. And I'll tell you that Windows, not Explorer, gives away so much information on your system, it doesn't matter what browser you hide behind, Windows gives you up. My version of Windoze Sleven ![]() Internet Exploder is not a browser I would ever use, and if people knew exactly what Google Chrome (with its 41 inherent malware and back doors), Facebook, toolbars, cookies and all their other favorite programs and tools were actually designed to do.... let's just say they weren't designed to make ANYTHING faster, "easier" or "user friendly" for the common PC user as they are told.... Mingle is one of my very few PC vices... and runs from a dedicated machine behind a Linux server... which also hosts my Magic Jack. THAT was some interesting code to make work properly. Some might call it paranoia.... I call it common sense or "preparedness" in a coded world of secrecy and privacy abuses. Four years of military training in communications working mostly with message center operations opened my eyes... even if my MOS was only defined and rated by humping a PRIC 25 for most of my 15 months in Nam. Have a safe holiday ![]() There's still a lot of hidden meta tags in Windows that you just can't hide, that is why I prefer to run Unix. I only have two Windows programs that I like and when my system is back to normal, I will run an old, old PC with XP even though I prefer WIN2K, and it will not be connected to outside world. I already have my server for Internet development and that is built around Ubuntu with Apache, PHP5, and MySQL, I use Drupal on top of that. I'm not really a code guy but I started with machine code at Motorola microprocessor school in Phoenix. I used to sell a Motorola Micropressor development system, precursor to the PC. You had to develop your own operating system, the machine supported Basic, Fortran and COBOL, loved COBOL. But still my fortey was communications, became very proficient in Cisco's IOS, was an authorized reseller and I have earned my Converged Telephony Professional certification, but that is history, haven't kept up, quit in 2005 to concentrate on woodworking, my passion. Rustien and Tollier, don't ring a bell off the top of my head. At the time I was involved in encryption, the company was called Racal Milgo and we had developed our own priority system and algorithms. We received certification #2 from NSA, reluctantly. Our algorithm was grandfathered and very restricted where we could sell it, mainly US banks. We developed another generation using the NSA guidelines and that had no control except for export licensing. Our algorithm was build around a 64 byte seed key that was mixed with the incoming data to result in a rolling key. We worked with RSA out of Israel to develop Public Key, which we used to communicate key change updates to remote locations, normally once every 24 hours. Normally we used random key generation with automatic rejection of known weak key algorithms. I have given numerous presentations at industry trade shows during those years, all over the US, except Vegas, the company refused to participate in any trade show in Vegas, considered it to be waste of money, which we normally threw around like water. I remember one show in New Orleans for all the state governments senior IT people where we had 3000 people for dinner and open bar, my boss (it was his budget) signed the dinner off to his hotel room, to get the Marriott points, $250,000 worth. He checked out right before me, ah the look on that young girls face when she printed his bill and told him the total, interesting, when AMEX approved it, priceless. But security in today's world, doesn't really matter. The only protection is from the whack jobs, except the biggest whackos of them all, governments. And securing your PC, what kind of phone do you have? As a matter of fact, your PC itself is against you, all the newer processors have back doors. In fact during the video, did you notice the part where someone bought a smart phone near Snowden in Hong Kong, he became very alarmed and demanded it's removal. The old flip phones are much better but even the newer ones of those aren't secure, they do and tell. And I'm retired, every day is a holiday. And a happy and fulfilling Memorial Day to you. And may all the people in this country remember the significance of this day and pledge to help prevent it's propagation. Our young people should never have to die on foreign soil to support tyranny against people that have not done anything to us. |
|
|
|
Edited by
Sojourning_Soul
on
Mon 05/26/14 05:12 AM
|
|
I have just finished watching the program, both parts. This is nothing new to me. What I described in my first post, that was the start of the 2nd part, the room with a door and no handles. I did find some of the details very interesting though, well worth the time to watch. But William Binney, he is part of the problem. His pleading after being framed is just what they want, he should have pushed forward even if just to get a judgement for the return of all his legal fees and expenses, a forfeit when you plead out to a no sentence plea. The spoils go to the victor, the debts to the loser. Here they unjustly attacked and ruined this guy and he pays the penalty, a warning for those to come, you'll lose even if you win. And then there is the still cage, that was the operating company, in my case BellSouth. That was the fiber distribution frames, some were terminated into the Optical Channel fiber modems some were sent to other floors as raw fiber for use by AT&T, MCI and other long haul network backbone routers. That cage is also where I got my hand-off for my clients to connect to their backbone routers. Now I'm talking late 90s early 2000s. In case you haven't guessed, my specialty was communications, data communications. I used to work for a company out of Miami, later Ft. Lauderdale called Racal Datacom. Yeah, we had encryption products where I was introduced to NSA. Back then I could give you ca copy of the certificate that had the NSA embalym but we were restricted from saying their name verbally during a presentation. And unlike Al gore, I was involved. My first access to the internet was a dial up connection to Mae East. It was nothing more that a text messaging system but it gave us access to all the Universities. My engineering team was the top graduates we recruited from all the ivy league schools, being in South Florida was a great draw and we paid real good. I also worked for a real short time for BellSouth before becoming a private contractor representing BellSouth and many other vendors. I used to have access to all the Internet hotels in the south Florida area including that massive BellSouth Hosting center in Miami. Now with that said, let me tell you that what you have seen is only scratching the surface. They talked about Quantum computers, those are not new. Back in the 90s, they used Cray. There was a mention of being able to crack encryption, they have been doing that for a long time. NSA unrestricted our sales of encryption devices to foreign nations in the early 90s. Believe me, it wasn't being generous, they could crack but for bank networks, it made hacking very expensive. You say you don't use google, why not, they use you. And even with Ghostery, do you still get cookies? Yeah it slows down some things but you're still there. There used to be a site out of the Netherlands that you could connect to that would read all your browser info and give it back to you. And I'll tell you that Windows, not Explorer, gives away so much information on your system, it doesn't matter what browser you hide behind, Windows gives you up. My version of Windoze Sleven ![]() Internet Exploder is not a browser I would ever use, and if people knew exactly what Google Chrome (with its 41 inherent malware and back doors), Facebook, toolbars, cookies and all their other favorite programs and tools were actually designed to do.... let's just say they weren't designed to make ANYTHING faster, "easier" or "user friendly" for the common PC user as they are told.... Mingle is one of my very few PC vices... and runs from a dedicated machine behind a Linux server... which also hosts my Magic Jack. THAT was some interesting code to make work properly. Some might call it paranoia.... I call it common sense or "preparedness" in a coded world of secrecy and privacy abuses. Four years of military training in communications working mostly with message center operations opened my eyes... even if my MOS was only defined and rated by humping a PRIC 25 for most of my 15 months in Nam. Have a safe holiday ![]() There's still a lot of hidden meta tags in Windows that you just can't hide, that is why I prefer to run Unix. I only have two Windows programs that I like and when my system is back to normal, I will run an old, old PC with XP even though I prefer WIN2K, and it will not be connected to outside world. I already have my server for Internet development and that is built around Ubuntu with Apache, PHP5, and MySQL, I use Drupal on top of that. I'm not really a code guy but I started with machine code at Motorola microprocessor school in Phoenix. I used to sell a Motorola Micropressor development system, precursor to the PC. You had to develop your own operating system, the machine supported Basic, Fortran and COBOL, loved COBOL. But still my fortey was communications, became very proficient in Cisco's IOS, was an authorized reseller and I have earned my Converged Telephony Professional certification, but that is history, haven't kept up, quit in 2005 to concentrate on woodworking, my passion. Rustien and Tollier, don't ring a bell off the top of my head. At the time I was involved in encryption, the company was called Racal Milgo and we had developed our own priority system and algorithms. We received certification #2 from NSA, reluctantly. Our algorithm was grandfathered and very restricted where we could sell it, mainly US banks. We developed another generation using the NSA guidelines and that had no control except for export licensing. Our algorithm was build around a 64 byte seed key that was mixed with the incoming data to result in a rolling key. We worked with RSA out of Israel to develop Public Key, which we used to communicate key change updates to remote locations, normally once every 24 hours. Normally we used random key generation with automatic rejection of known weak key algorithms. I have given numerous presentations at industry trade shows during those years, all over the US, except Vegas, the company refused to participate in any trade show in Vegas, considered it to be waste of money, which we normally threw around like water. I remember one show in New Orleans for all the state governments senior IT people where we had 3000 people for dinner and open bar, my boss (it was his budget) signed the dinner off to his hotel room, to get the Marriott points, $250,000 worth. He checked out right before me, ah the look on that young girls face when she printed his bill and told him the total, interesting, when AMEX approved it, priceless. But security in today's world, doesn't really matter. The only protection is from the whack jobs, except the biggest whackos of them all, governments. And securing your PC, what kind of phone do you have? As a matter of fact, your PC itself is against you, all the newer processors have back doors. In fact during the video, did you notice the part where someone bought a smart phone near Snowden in Hong Kong, he became very alarmed and demanded it's removal. The old flip phones are much better but even the newer ones of those aren't secure, they do and tell. And I'm retired, every day is a holiday. And a happy and fulfilling Memorial Day to you. And may all the people in this country remember the significance of this day and pledge to help prevent it's propagation. Our young people should never have to die on foreign soil to support tyranny against people that have not done anything to us. Working in the message center I had to "sign the papers and take the pledge"...TSSC3 rating. 45 years ago, but I don't trust this govt would say it's "old news" in a trial. I'm not Sen John McShame, a millionaire (or married to one), and my father was no Admiral..... I couldn't get away with it My old cell phone makes and receives calls.... that's it! I have refused to upgrade as long as it still works for that, and if you ask anyone, getting me to use a phone is like pulling teeth on a tiger! My business would be booming if I did, but being retired myself, it's as big as it needs to be, and my weekend shop is where I do my customer interaction though I do most of my work at home. I even refuse remote repairs and advise customers to turn off the capability along with auto updates, installers, and transmission accepts. Even the big anti-virus programs (They're worthless!). I recommend Malwarebytes in "safe" and "chameleon" mode. The PC I use for my "net" transmissions is behind a Linux server, but even then, searching it will only find a basic OS with my photobucket acct, an anonymous IP (of course that's only a surface ruse) and old location and contact info. There is no "net" safety any more, so I simply supply nothing, or as little as possible. Only a fool believes they can totally beat todays technology without millions of dollars working for them. The best anyone can hope for is that our govt fails in its attempt at totalitarianism..... and that voters will grow a brain somewhere in the process to slow the elections of leaders who allow or seek to justify it. Sadly, elections fueled by bankers and corporate media are merely a dog and pony show for the masses. It's far past "repairing" it in hopes of fixing it. We the people have let it go too far already. Freedom and rights are merely an illusion we're allowed as long as it fits a narrative or an oligarchic agenda. We who wish to believe in constitutional rights and our republic based on them are a dying breed. |
|
|
|
Working in the message center I had to "sign the papers and take the pledge"...TSSC3 rating. 45 years ago, but I don't trust this govt would say it's "old news" in a trial. I'm not Sen John McShame, a millionaire (or married to one), and my father was no Admiral..... I couldn't get away with it [/quote} Yeah, I was in the Air Farce, crew member, Radio Maintenance, on the flying command post, first for SAC then Armed Forces Europe. Had two radio operators and a crypto operator on board but that was child's play. In the back, we had a 24 man battle staff, two of which were missileers, Minutemen. Now that was encryption. It took the pilot, one of the radio operators, my function and the two millileers to launch, but in reality the two millileers could have done everything themselves if they wanted, all the rest of us did was confirm the setup. But I could have prevented any launch from my aircraft, all I had to do was pop a certain breaker that would cause the missile encryption keys to destroy themselves. The keys were gold circuits painted on tempered glass, armed solenoids on loss of power would release and shatter that glass into a million pieces. Sometimes, I would get bored and relieve one of the radio operators. Took and passed secure traffic on clear communications using one time keys, masked forms, etc. If you handled traffic then you are probably familiar with Outway. Our general call sign for open traffic was "SkyKing", our specific call sign when flying for headquarters SAC was "Looking Glass", a code word given up long ago in favor of classified call signs. The powers to be finally figured out that transmitting one message with unclassified call sign and the next with a classified one compromised the whole concept. Skyking was still used because the messages where never acknowledged by the receiving party. My old cell phone makes and receives calls.... that's it! I have refused to upgrade as long as it still works for that, and if you ask anyone, getting me to use a phone is like pulling teeth on a tiger! My business would be booming if I did, but being retired myself, it's as big as it needs to be, and my weekend shop is where I do my customer interaction though I do most of my work at home. I even refuse remote repairs and advise customers to turn off the capability along with auto updates, installers, and transmission accepts. Even the big anti-virus programs (They're worthless!). I recommend Malwarebytes in "safe" and "chameleon" mode. Same here, I have a piece of crap SamDung. Get text on it a lot but not very much voice. If talking on it, I use headset or speaker, don't like the radiation near my head. Once settled, I will get rid of it, no more radiation devices. I will have either IP or land line depending on how I get internet service. But I will still maintain a 3G connection from my vehicle for streaming video. My mission is to destroy the corrupt court system, especially traffic court. I do not have my full support system in place but still have been stopped twice since coming to Virginia. Both officers, one a sheriff the other a state trooper, have ran back to their cruiser and took off in less than 5 minutes of our discussion, they always have something more important to do. The last one, the trooper offered me over 80 in a 60, illegal lane change, aggressive driving, tailgating and he could throw in reckless driving but then decided he had to go on up the road and the next time he would take care of it. Anyway the traffic court system steals more than $8 Billion a year from the ignorant motoring masses. The PC I use for my "net" transmissions is behind a Linux server, but even then, searching it will only find a basic OS with my photobucket acct, an anonymous IP (of course that's only a surface ruse) and old location and contact info. There is no "net" safety any more, so I simply supply nothing, or as little as possible. Only a fool believes they can totally beat todays technology without millions of dollars working for them. The best anyone can hope for is that our govt fails in its attempt at totalitarianism..... and that voters will grow a brain somewhere in the process to slow the elections of leaders who allow or seek to justify it. Sadly, elections fueled by bankers and corporate media are merely a dog and pony show for the masses. It's far past "repairing" it in hopes of fixing it. We the people have let it go too far already. Freedom and rights are merely an illusion we're allowed as long as it fits a narrative or an oligarchic agenda. We who wish to believe in constitutional rights and our republic based on them are a dying breed. When I am settled, then I will use an IP proxy to bounce my IP around but otherwise I don't care. During the years spend in product management at Racal and getting to have highly paid engineers on my team, we had access to the newest technologies. My guys helped to debug and get new chips ready for production applications. They did complete analysis of the chips, believe me there is nothing you can do, it's all there. So I really don't care about that, just the insane hackers. But I do avoid the new technologies as much as possible. The most radical processor I use is a dual processor, dual core Xenon machine with 48 GB of ram. Currently I have it running as an Apache, PHP, SQL server and when rendering PHP pages from Drupal can experience so slowdown. But yes, love the Unix/Linux based world, so much faster, so much cleaner and it never expires, always the newest code and the code writers don't care much for governments. The governments done, it is indeed surprising they are still standing but they have experienced some real setbacks in their agenda. First Egypt, that didn't go too well, not just complete failure but a real uprising as people started to see their agenda. Also the Boston bombing didn't work too well, yeah they had the people cheering in the street over warrantless searches and martial law but then the next step, a riot to again declare martial law from Zimmerman failed, totally failed. Then there is the good old QE. Supposed down to 45 billion a month until that neat little story on Denmark. At this point they are supposed to be at a point of everybody cheering for a new world central bank and a new world currency. But BRICS, especially Russia keeps throwing a monkey wrench in the works out in the open and China gumming up the works in the background. Most of the real, non-government owned, economist that I have been hearing from are all in awe that this house of cards hasn't collapsed. With the Denmark story coming out in the open so fast, where will they try and hide the debt next? When will Russia and China start to dump US Treasuries in earnest? All I have to say is gird your loins, it's going to be an interesting ride. And my friend, a little slip of the vernacular, there is no such thing as constitutional rights, if the constitution has to grant rights, they are privileges, not rights. Rights are from our creator and inalienable. And I am of the republic and deny all else irregardless of the consequences up to and including death. If it is a choice to bow to slavery in any form or to die, then kick my remains into the gutter, I'm done. |
|
|