Menu
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Vault
Time Travel Schematics
T.E.C. Time Archive
The Why Files
Have You Seen...?
Chronovisor
TimeTravelForum.tk
TimeTravelForum.net
ParanormalNetwork.net
Paranormalis.com
ConspiracyCafe.net
Streams
Live streams
Featured streams
Multi-Viewer
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Navigation
Install the app
Install
More options
Contact us
Close Menu
Forums
Time Travel Forum
John Titor's Legacy
JT Foundation/Oliver Williams Research
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="HuntTech" data-source="post: 10217" data-attributes="member: 147"><p><strong>JT Foundation/Oliver Williams Research</strong></p><p></p><p></p><p></p><p>Paul,</p><p> I think it is a two-fold problem for them. It is my opinion that the admins that do the monitoring, or at least drill down traffic logs when a bell or whistle goes off, are not trained very well (at the worker-bee level) and have a lot of data to weed through. There is a lot of automation to tip off admins, but the next step requires human intervention. If you have government folks using government computing resources at all hours of the day, that means there are a lot of data packets to sniff... Of course, that's the 'outgoing traffic' argument; meaning users on their networks going to the outside world.</p><p></p><p> As far as 'reaching into outside networks' for an investigation or to keep a finger on the pulse of things that they consider suspect, I would say it is a staffing issue. The closest analog I can draw for this is the amount of un-translated communications from the Middle East. A big pile of data and not enough people to parse the information.</p><p></p><p> It has been my observation that since the DHS came into being that there are more focused attempts at reaching out and monitoring. But even those efforts can be construed as 'lazy' and 'incompetent' because there isn't much usable data from those crews. (IMHO, of course... ) I say 'lazy' and 'incompetent' because I have an example.</p><p></p><p> Early on in the 'War on Terrorism' an online porn merchant in Maryland (I think - near Ocean City) used his usual methods of hijacking domains and actually wanted to hand a domain that was actively used by terrorist networks over to the government as a 'gift' to be used as a tool. Before his hijack attempt, he copied all of the content he could before he changed the registration info and assumed ownership. That way, his newly hosted site of the same domain name looked and felt exactly like the old one. His gamble was that most people visiting wouldn't know the difference and they would potentially post juicy information for us to use.</p><p></p><p> Why did I tell you this? He made repeated calls to intelligence agencies to give them this gift and actually pleaded for them to pay attention. He met with resistance and came to the conclusion (after many conversations) that they didn't even understand what he did for them nor what they could do with it. The final straw was that he was told to give it back because what he did was not legal. (Technically, at the time it was... the laws for registering domains that expired was really fuzzy and untested in court.)</p><p></p><p> So, in my opinion, there are some efforts being made to do the kind of snooping that we're discussing, but I would doubt the effectiveness. Furthermore, I would think that their collective foci would be on other subject matter.... but then again... <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite38" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p><p></p><p> (sorry for being long-winded. I'll try to dig up the article about this guy. It drove techies like me nuts!)</p><p></p><p><edit></p><p></p><p>I found a short link to the guy's story at Wired. Here's the link:</p><p></p><p><a href="http://www.wired.com/news/print/0,1294,54455,00.html" target="_blank">How Al-Qaida Site Was Hijacked</a></p><p></p><p>The local news here was talking to the guy a lot. This story doesn't talk much about what he and the FBI discussed. He talked much more freely about their inability to handle what he was explaining to them in those other news reports.</p><p></p><p></edit></p></blockquote><p></p>
[QUOTE="HuntTech, post: 10217, member: 147"] [b]JT Foundation/Oliver Williams Research[/b] Paul, I think it is a two-fold problem for them. It is my opinion that the admins that do the monitoring, or at least drill down traffic logs when a bell or whistle goes off, are not trained very well (at the worker-bee level) and have a lot of data to weed through. There is a lot of automation to tip off admins, but the next step requires human intervention. If you have government folks using government computing resources at all hours of the day, that means there are a lot of data packets to sniff... Of course, that's the 'outgoing traffic' argument; meaning users on their networks going to the outside world. As far as 'reaching into outside networks' for an investigation or to keep a finger on the pulse of things that they consider suspect, I would say it is a staffing issue. The closest analog I can draw for this is the amount of un-translated communications from the Middle East. A big pile of data and not enough people to parse the information. It has been my observation that since the DHS came into being that there are more focused attempts at reaching out and monitoring. But even those efforts can be construed as 'lazy' and 'incompetent' because there isn't much usable data from those crews. (IMHO, of course... ) I say 'lazy' and 'incompetent' because I have an example. Early on in the 'War on Terrorism' an online porn merchant in Maryland (I think - near Ocean City) used his usual methods of hijacking domains and actually wanted to hand a domain that was actively used by terrorist networks over to the government as a 'gift' to be used as a tool. Before his hijack attempt, he copied all of the content he could before he changed the registration info and assumed ownership. That way, his newly hosted site of the same domain name looked and felt exactly like the old one. His gamble was that most people visiting wouldn't know the difference and they would potentially post juicy information for us to use. Why did I tell you this? He made repeated calls to intelligence agencies to give them this gift and actually pleaded for them to pay attention. He met with resistance and came to the conclusion (after many conversations) that they didn't even understand what he did for them nor what they could do with it. The final straw was that he was told to give it back because what he did was not legal. (Technically, at the time it was... the laws for registering domains that expired was really fuzzy and untested in court.) So, in my opinion, there are some efforts being made to do the kind of snooping that we're discussing, but I would doubt the effectiveness. Furthermore, I would think that their collective foci would be on other subject matter.... but then again... :) (sorry for being long-winded. I'll try to dig up the article about this guy. It drove techies like me nuts!) <edit> I found a short link to the guy's story at Wired. Here's the link: [url=http://www.wired.com/news/print/0,1294,54455,00.html]How Al-Qaida Site Was Hijacked[/url] The local news here was talking to the guy a lot. This story doesn't talk much about what he and the FBI discussed. He talked much more freely about their inability to handle what he was explaining to them in those other news reports. </edit> [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Time Travel Forum
John Titor's Legacy
JT Foundation/Oliver Williams Research
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top