Homeland Security Internet Watch List Leak | |
Awakened one User ID: 1545886 United States 01/14/2012 03:16 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 8226049 United States 01/14/2012 03:17 PM Report Abusive Post Report Copyright Violation | Hidden code in the OS...? Quoting: Future Viewer That doesn't make much sense, as anyone can go buy the OS software and install it on any machine they choose and register it to whoever they like, meaning that ID number would be pointless for the most part. If there is something like you say, it would have to be integrated with the hardware itself, not software. ^^^ Probably so ^^^ Embedded in the I.C. Chips that run the software, like a backdoor, that very few people know about, except top dogs, at Intel and AMD. Touche' So, this ID number system would more likely be firmware if it does exist...but there would still be a lot more variables getting something like that to work effectively, and more importantly, accurately. |
Future Viewer User ID: 1344660 United States 01/14/2012 03:18 PM Report Abusive Post Report Copyright Violation | Like I said, this was a fake giveaway. Homeland Security aren't stupid to be monitoring sites like those lol. Umm... I respectfully disagree. Homeland security agents are stupid. Very stupid. No! 2 things: #1 They have to justify their jobs. It gets pretty boring twiddling your fingers for a long time, when nothing happens. #2 They live by the motto "Human Stupidity is Job Security", not so much on the people they arrest and monitor, more for themselves. (Truth be known). The Real "Kronos"..(1957 Movie) |
Anonymous Coward (OP) User ID: 8226049 United States 01/14/2012 03:19 PM Report Abusive Post Report Copyright Violation | This is old news. Facebook made the list what a surprise. Everyone knows facebook is linked to the CIA. Quoting: twiztid.lotus I think someone got bored made this list to try and scare people. I don't even think the memo looks real. It's on DHS' own site, cryptome.org just decided to host the document itself...here you go, [link to www.dhs.gov] the watch list, along with the "search term" watch list, and a lot more. |
Future Viewer User ID: 1344660 United States 01/14/2012 03:26 PM Report Abusive Post Report Copyright Violation | Hidden code in the OS...? Quoting: Future Viewer That doesn't make much sense, as anyone can go buy the OS software and install it on any machine they choose and register it to whoever they like, meaning that ID number would be pointless for the most part. If there is something like you say, it would have to be integrated with the hardware itself, not software. ^^^ Probably so ^^^ Embedded in the I.C. Chips that run the software, like a backdoor, that very few people know about, except top dogs, at Intel and AMD. Touche' So, this ID number system would more likely be firmware if it does exist...but there would still be a lot more variables getting something like that to work effectively, and more importantly, accurately. ^^ Oh it works trust me, with today's hidden camouflaged, and "Hidden Advanced Black Op Shadow Technology" (non "sheeple" disclosed) (probably 20->50 years ahead of what you know about), it works very well indeed, in identifying people on internet and whose where and using what computer, as far as Computer Terminal, Computer Location and what particular Computer on ISP (wherever it might be). Just like the quick database (9 databases that Cops/Police pull up with your car back license plate that goes to the "NCIC" within seconds. A Police/Cop Officer is just playing (toying) with you, when he asks for license, insurance card, registration, etc.., He (or she-The Cop/Police) Officer already knows all this stuff before you get out of car (or approaches car), and whose suppose to drive, and your violence level number, if you ever been locked up. Truth be known. The Real "Kronos"..(1957 Movie) |
Anonymous Coward User ID: 8009759 United States 01/14/2012 03:30 PM Report Abusive Post Report Copyright Violation | [link to www.grc.com] Use "Shields UP" For this test use just the "File Sharing" and "Common Ports" tests. Run with your security software first Now run with all security software off Shields UP will show you your "Private Number" Did you get "TRUE STEALTH" across the board with security software running ? |
Anonymous Coward (OP) User ID: 8226049 United States 01/14/2012 03:33 PM Report Abusive Post Report Copyright Violation | Hidden code in the OS...? Quoting: Future Viewer That doesn't make much sense, as anyone can go buy the OS software and install it on any machine they choose and register it to whoever they like, meaning that ID number would be pointless for the most part. If there is something like you say, it would have to be integrated with the hardware itself, not software. ^^^ Probably so ^^^ Embedded in the I.C. Chips that run the software, like a backdoor, that very few people know about, except top dogs, at Intel and AMD. Touche' So, this ID number system would more likely be firmware if it does exist...but there would still be a lot more variables getting something like that to work effectively, and more importantly, accurately. ^^ Oh it works trust me, with today's hidden camouflaged, and "Hidden Advanced Black Op Shadow Technology" (non "sheeple" disclosed) (probably 20->50 years ahead of what you know about), it works very well indeed, in identifying people on internet and whose where and using what computer, as far as Computer Terminal, Computer Location and what particular Computer on ISP (wherever it might be). Just like the quick database (9 databases that Cops/Police pull up with your car back license plate that goes to the "NCIC" within seconds. A Police/Cop Officer is just playing (toying) with you, when he asks for license, insurance card, registration, etc.., He (or she-The Cop/Police) Officer already knows all this stuff before you get out of car (or approaches car), and whose suppose to drive, and your violence level number, if you ever been locked up. Truth be known. Right, but anonymous connection/usage can be achieved with the computers the public uses nowadays...it's just most people don't know how to get that anonymity or don't care... |
SGSR1 User ID: 8036939 United States 01/14/2012 03:33 PM Report Abusive Post Report Copyright Violation | hulu Quoting: Anonymous Coward 8226049 liveleak youtube myspace myspace abcnews computerworld DRUDGEREPORT huffingtonpost just to name a few... This is total Homeland security KNOW which sites they are monitoring, this is just fake bait to lure in the sheeple to support Anonymous... Infiltration? |
Future Viewer User ID: 1344660 United States 01/14/2012 03:39 PM Report Abusive Post Report Copyright Violation | Goto this website; Quoting: Anonymous Coward 8009759 [link to www.grc.com] Use "Shields UP" For this test use just the "File Sharing" and "Common Ports" tests. Run with your security software first Now run with all security software off Shields UP will show you your "Private Number" Did you get "TRUE STEALTH" across the board with security software running ? Trust me, if the Government want to, they would use www.grc.com as a trojan horse, say its one thing that its not, but in actuality is the "mother lode" via the "Government (Bankers, USA and World Mafia) surveillance" . The Real "Kronos"..(1957 Movie) |
Anonymous Coward (OP) User ID: 8226049 United States 01/14/2012 03:40 PM Report Abusive Post Report Copyright Violation | Goto this website; Quoting: Anonymous Coward 8009759 [link to www.grc.com] Use "Shields UP" For this test use just the "File Sharing" and "Common Ports" tests. Run with your security software first Now run with all security software off Shields UP will show you your "Private Number" Did you get "TRUE STEALTH" across the board with security software running ? "Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet." |
Anonymous Coward User ID: 4494441 United States 01/14/2012 03:46 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 8226049 United States 01/14/2012 03:49 PM Report Abusive Post Report Copyright Violation | Goto this website; Quoting: Anonymous Coward 8009759 [link to www.grc.com] Use "Shields UP" For this test use just the "File Sharing" and "Common Ports" tests. Run with your security software first Now run with all security software off Shields UP will show you your "Private Number" Did you get "TRUE STEALTH" across the board with security software running ? "Your Internet port 139 does not appear to exist! One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion. Unable to connect with NetBIOS to your computer. All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet. " |
Anonymous Coward User ID: 923589 United States 01/14/2012 03:54 PM Report Abusive Post Report Copyright Violation | |
Future Viewer User ID: 1344660 United States 01/14/2012 04:00 PM Report Abusive Post Report Copyright Violation | Anonymous = Homeland Security/CIA A good hacker would be rotting in prison by now... leave it to someone outside the states to get this! lol you are correct. ^^^ ^^^ CIA/DHS/FBI/NSA/KGB works with Microsoft, Lynx, Android, Apple OS, and other Operating System designers along with the I.C. Chip Manufactures (Intel, AMD) , this is as old as the hill! (or "As Old as the Crust Marks in your Underwear"). Truth be told... The Real "Kronos"..(1957 Movie) |
Anonymous Coward (OP) User ID: 8226049 United States 01/14/2012 04:02 PM Report Abusive Post Report Copyright Violation | Anonymous = Homeland Security/CIA A good hacker would be rotting in prison by now... leave it to someone outside the states to get this! lol you are correct. ^^^ ^^^ CIA/DHS/FBI/NSA/KGB works with Microsoft, Lynx, Android, Apple OS, and other Operating System designers along with the I.C. Chip Manufactures (Intel, AMD) , this is as old as the hill! (or "As Old as the Crust Marks in your Underwear"). Truth be told... Of course they do, but they don't work with the user, and the user remains the unknown variable. |
Anonymous Coward User ID: 8818392 United States 01/14/2012 04:14 PM Report Abusive Post Report Copyright Violation | |
LORIEN User ID: 8396810 India 01/14/2012 04:15 PM Report Abusive Post Report Copyright Violation | |
Future Viewer User ID: 1344660 United States 01/14/2012 04:31 PM Report Abusive Post Report Copyright Violation | ... Quoting: Anonymous Coward 8830883 Anonymous = Homeland Security/CIA A good hacker would be rotting in prison by now... leave it to someone outside the states to get this! lol you are correct. ^^^ ^^^ CIA/DHS/FBI/NSA/KGB works with Microsoft, Lynx, Android, Apple OS, and other Operating System designers along with the I.C. Chip Manufactures (Intel, AMD) , this is as old as the hill! (or "As Old as the Crust Marks in your Underwear"). Truth be told... Of course they do, but they don't work with the user, and the user remains the unknown variable. Until they arrest him (like me-from my bogus, lied to about 10-31-1989 Federal Case in Eastern District Court, Brooklyn, NY), whereupon a Federal Judge and Federal Prosecutor broke about 25 Federal Laws, withheld/suppressed/doctored evidence, usurped Federal Laws given to a defendant, besmirched and slandered me in the U.S. Media and News, plus broke every "Constitutional Laws afforded to a Defendant" (from 10-31-1989). But however, everything flipped on "Uncle Scam/Uncle Sham/Uncle Boris" when I beat out the Feds (all Intelligence Agencies/Law Enforcements) in the Federal Prisons. Too embarrassing, for a 1st time offender, never been in Federal Jail before. With my case (10-31-1989) with all the illegal stuff done by both the Federal Judge and Federal Prosecutor, they both can be locked in a bad ass (with the real bad ass Jails/Prisons) Federal Jail for a long time. Plus with my original case, I can take down the "scam ass" USDOJ Federal System with Courts and Prisons, and that's my plan, if its the last thing I do on this "Planet Earth". And perhaps it will be! The (scam ass) "Whole House of Cards" of the USDOJ (Federal Courts and Federal Prisons) will come "Tumbling Down", once my case is ever totally released with all the illegality done on it. (from 10-31-1989) The Real "Kronos"..(1957 Movie) |
Anonymous Coward User ID: 3023778 United States 01/14/2012 04:47 PM Report Abusive Post Report Copyright Violation | |
lazlopanaflex User ID: 8675575 United States 01/14/2012 04:59 PM Report Abusive Post Report Copyright Violation | And after someone supports Anonymous, what happens next? Quoting: Anonymous Coward Well, your personal file will reflect just that. You will be classified as a sympathist at the least. But don't try to hide who YOU are, because THAT is also a trait they monitor for. Just be yourself and hope THEY like who you are. I just hope they accept me for who i am........ |
DivineTruth User ID: 8655307 United States 01/14/2012 05:19 PM Report Abusive Post Report Copyright Violation | |
Cerberuscx User ID: 8799269 Australia 01/14/2012 05:27 PM Report Abusive Post Report Copyright Violation | Anonymous = Homeland Security/CIA A good hacker would be rotting in prison by now... So True and if anyone is after solid proof should read Kevin Poulsen's latest book.... A cog in the machine, a part of the process and im here to express that we need some progress... |
Anonymous Coward User ID: 4121276 Norway 01/14/2012 05:37 PM Report Abusive Post Report Copyright Violation | |
infoho3 User ID: 2077299 United Kingdom 01/14/2012 06:14 PM Report Abusive Post Report Copyright Violation | Html (Clickable) List of Sites DHS Monitors [link to 12160.info] |
Blue Skies User ID: 1337548 United States 01/14/2012 06:16 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1459863 United Kingdom 01/14/2012 06:17 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1127413 United States 01/14/2012 06:20 PM Report Abusive Post Report Copyright Violation | hulu Quoting: Anonymous Coward 8226049 liveleak youtube myspace myspace abcnews computerworld DRUDGEREPORT huffingtonpost just to name a few... This is total Homeland security KNOW which sites they are monitoring, this is just fake bait to lure in the sheeple to support Anonymous... Ding ding ding |
Anonymous Coward User ID: 4304788 United States 01/14/2012 06:21 PM Report Abusive Post Report Copyright Violation | I think this may be a memo about the websites that the DHS is allowed to watch from its computers in the offices. So at any time their employees are on those websites and happen to find something, they gave people fair warning. This is the overt list. There is a covert list you know it. The DIA, CIA, NSA, and FBI watch other websites. Team effort? |
Anonymous Coward User ID: 8847932 United States 01/14/2012 06:26 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1868091 United States 01/14/2012 06:43 PM Report Abusive Post Report Copyright Violation | |