User Panel
Posted: 6/21/2002 11:00:44 PM EDT
After reading Bendovers thread about who was watching him.[url]http://www.ar15.com/forums/topic.html?id=126331[/url] I also did a traceroute but I did it on ar15.com The results are eye-opening to me. 1]12.124.87.233?Middletown,NJ,AT&T,ITS 2]12.123.200.106,gbr1-p51.ormfl.ip.att.net,Orlando,FL,AT&T,ITS 3]12.122.5.125,gbr4-p70.ormfl.ip.att.net,Orlando,FL,AT&T,ITS 4]12.122.2.129,gbr3-p10.attga.ip.att.net,Atlanta,GA,AT&T,ITS 5]12.122.1.142,gbr4-p60.attga.ip.att.net,Atlanta,GA,AT&T,ITS 6]12.122.2.178,gbr4-p80.wswdc.ip.att.net,Washington,DC,AT&T,ITS 7]12.123.9.53,ggr1-p370.wswdc.ip.att.netWashington,DC,AT&T,ITS 8]208.51.74.181,so2-1-0-622M.br1.WDC2.gblx.netWashington,DC,GCInternal 9]208.178.174.53,pos2-0-155M.cr1.WDC2.gblx.netWashington,DC,GCInternalDepartment 10]206.132.249.253,pos4-0-622M.cr2.BOS1.gblx.netBoston,MA,GlobalCrossing 11]206.132.247.74,so7-0-0-622m.ar2.BOS1.gblx.netBoston,MA,GlobalCrossing 12]64.215.248.2,Choice-One.s0-1-3-0.ar2.BOS1.gblx.netBoston,MA??????? 13]64.65.210.162,tr-5-1004-roch-shasta.choiceone.net?Rochester,NY,ChoiceOneCommunications I deleted a few hops in the beginning and the end for mine and ar15.coms privacy. All other entries are true and can be found by anyone with a wish to find such info. This was a traceroute from my computer to ar15.com |
|
Whats you're point? If I did a tracroute frommy comp to a website or server I could get close to the same results. Now the question : Is Big Bro watchin this site? Most likely.
|
|
It is a damn good thing they are watching this site too. There are more than just a few disloyalists on here who, by questioning the actions of the President, are threats to the freedoms of this great democracy.
|
|
Quoted: It is a damn good thing they are watching this site too. There are more than just a few disloyalists on here who, by questioning the actions of the President, are threats to the freedoms of this great democracy. View Quote |
|
The only thing traceroute tell you is the path taken to connect to another computer.
For example which gateways/routers/switches connected your computer to the computer(s) at AR15.com This may change at any moment, depending upon the amount of traffic, as this is dynamic. The routers & switches typically will route your packets (data) to the network with the least amount of traffic. |
|
The point is I find it educational to find out where the internet process takes me. In my above tracer route it is obvious it pinged around Washington DC more than a few times like it did every other relay state. Maybe this is the tinfoil hat disease I hear discussed ocassionally. I guess that is why my firewall picks up so many port probes from Herndon, Va. Isn't that the area where alot of gov't and DOD software is managed and developed? After doing a little more research into Herndon, Va. I think it calls for re-formatting the old hard-drive and maybe making a trip to Circuit City for a new hard drive. I should probably stop on the way and pump about 5 12ga #8's into the old hard drive.......... Any brand tinfoil will do right? |
|
I don't see anything to worry about.
AT&T is a major network provider. The traffic from your machine to AR15.com is bouncing around in the att.net network, from Orlando to Georgia to DC. Lots of telecom providers have offices in DC, so there are interconnects there. At DC it switches to a different ISP, gblx.net,aka Global Crossing (a major backbone provider), where it goes to Boston. It looks like it gets handed off to ChoiceOne communications at Rochester. Probably that's the ISP directly serving AR15.com. Traceroutes from my own machine show no traffic to DC, just a hop to Global Crossing in Boston then to ChoiceOne. So it looks like Global Crossing is the backbone provider to the ISP ChoiceOne. If they wanted to tap the traffic it would make a lot more sense to do it at the ChoiceOne or Global Crossing sites. |
|
Quoted: Quoted: It is a damn good thing they are watching this site too. There are more than just a few disloyalists on here who, by questioning the actions of the President, are threats to the freedoms of this great democracy. View Quote View Quote I got guns...guns don't hurt anybody! It's those damn bullets that cause all the damage...... |
|
Quoted: Is Big Bro watching AR15.com?? Is the Pope Polish??? View Quote Is Big Bro watching AR15.com?? Does a fat baby fart??? |
|
Quoted: It is a damn good thing they are watching this site too. There are more than just a few disloyalists on here who, by questioning the actions of the President, are threats to the freedoms of this great democracy. View Quote Shit no more freedom of speech? When and how did this happen.[}:D] |
|
If Big Brother is really watching, you won't see it in a traceroute. The way a sniffer is put in-line to capture traffic is transparent if done properly.
Remember the Alamo, and God Bless Texas... |
|
Hell yes they are. Where do you think they go to get the answers to question about all those gun laws?? [;)]
|
|
Quoted: Hell yes they are. Where do you think they go to get the answers to question about all those gun laws?? [;)] View Quote LOL! Sad thing is your probably right. |
|
[b]Originally posted by Doublefeed[/b]
[b]It's a damn good thing none of the people here have guns.[/b] If we ever get to vote on the funniest and smarta#$ posts to the site, you'll get my vote!! [b]Originally posted by misterhemi[/b] [b]For example which gateways/routers/switches connected your computer to the computer(s) at AR15.com This may change at any moment, depending upon the amount of traffic, as this is dynamic. The routers & switches typically will route your packets (data) to the network with the least amount of traffic.[/b] This is exactly right, since I do this for a living, I can tell you that they can remote span any port on a router on the internet, and catch and view all, or any specific traffic passing that port (depending on how they set the filter), and we will never know through honest means. Anyone with access to the router that is spanned could tell if the port is spanned, but since I don't have access (user id or passwords) to internet routers, I couldn't tell ya'. Also, don't think that you are safe using secure websites for purchases or anything else. Any decent hacker can get in on just about any server. Some advice to protect yourself!! I use a $300 limit on my card that I do use over the internet. This way if someone does get my CC # they won't get much. Any amount larger I call in the order. [shock] |
|
Quoted:This is exactly right, since I do this for a living, I can tell you that they can remote span any port on a router on the internet, and catch and view all, or any specific traffic passing that port (depending on how they set the filter), and we will never know through honest means. View Quote Pray tell, How do they do this? If this were true, anyone with the right software could do what you have described. |
|
entropy,
Yes, that is 100% correct. Anyone with the right software and access to the routers and switches on the internet can do this. The sniffer is a great troubleshooting tool for my job. It is also a great spy program/device if anyone wants to use it that way. I do not have access to the internet routers and switches, but they are for the most part all CISCO products. The network that we maintain is also mainly CISCO, and I do have admin access to all the routers and switches, and we remote span ports, filter and catch traffic all the time, for troubleshooting reasons. It is really easier than you would think. starsil9 [50] [shock] |
|
Hell yes they are watching, when the SHTF they need to know who to contact to pull there asses out of the fire. for in America, there is no single , civilian (mostly) fighting force more prepaired to fight off the evil forces of communism and camel ridin than the fine members of AR15.com......haleluya
[:)>] |
|
entropy,
To give you a few details on how this could be done on say - uh, ar15.com, or any other site. The trace route on the post shows you all the hops traffic takes from one point to the next across the network. If some of the hops were not deleted, you would be able to tell from the trace route the IP address of the router closest to the ar15.com server. Telnet into the router, and show the ports, and routing table, and you can see which port the ar15 website uses to access the internet. The sniffer would then be connected to another port on a router or switch at your location. A simple remote span command to tell the port that the sniffer is hooked up to, to monitor the desired port, and you are ready to go. Open up your sniffer program, and you can define filters for any IP address that is either sending or receiving traffic, or both, and start the capture. The sniffer program we have will decode the hex for you, and in a column to the right, you can read line by line everything that is being sent. If it is encrypted you would need a de-encryption program, but that's another story. BTW the sniffer program we use costs $75K. Believe me, it is easy to do!!! starsil9 [sex] |
|
Yes, but that assumes that you have password access to the routers, right? Do you think Sprint/ATT et all, give the feds this access to their routers?
|
|
Yes, that is assuming you have access to the routers and switches.
But come on, do you think that the feds really need to ask AT&T, Sprint, MCI etc. for those passwords. They can be easily hacked out of the router or switch if necessary. Being CISCO certified, we are taught how to hack into a router or switch if we loose the password, or the security file becomes corrupt. The feds employ better techs than me, do you honestly think that anytime they want access they have to ask? |
|
The misinformation here is starting to get a bit out of hand.
First of all, The feds can, at their will obtain any data they deem necessary right up to your actual bitstream. Second, you don't "span" a router. That command- and the function of port mirroring is performed at switch level. Third, switches do not show up in a trace route! There could be a hundred switches in the systems interconnecting the routers/router interfaces you do see. Fourth, only an idiot would assume that what you state on a message board would need sophisticated protocol decoder software to be read- they could simply READ THE BOARD!! And finally, you could never obtain my Router or switch passwords from an externally connected device, or hack into a service provider network- many have tried, all day everyday, and fail. Its not that simple. So relax, your data is safe, and its what you write that you should review, and not worry about someone spending precious resources trying to "decode" your Public posts! [-=(_)=-] |
|
Quoted: It is a damn good thing they are watching this site too. There are more than just a few disloyalists on here who, by questioning the actions of the President, are threats to the freedoms of this great democracy. View Quote We, er I mean Big Brother mirrors this site using freeware. We, er I mean big Brother then cross references for common illegal behaviors and indications of gun caches. We, er I mean government agents know that it will only take a small split in the support of the present GOP government and voila it will be President Clinton again. Hee haw! We, er I mean the BATF will be hiring 100,000 gangbangers to collect guns from uppity Republicans who actually believe they have rights. Hahahaha. I, er I mean BATF agents will be prepared for all this new power including new offices towers instead of sharing buildings with those other agencies, and never having to drive myself; er I mean the evil BATF will have new agents to chauffeur them and we will have POWER... This is a certainty because of the short memories of the common American and because Americans really don't WANT the burden of freedom and responsibilities for their own actions. Imbroglio is a good example as he offers no leadership, only doubt, and encourages armed insurrection in an unorganized manner, rather than recognize that there are leaders in power that can make difference if they are supported now. The future President Clinton is actually a big fan of Imbroglio... Any slip I made in reference to me being a agent is due to a hangover and you all don't actually read past the eighth word anyways...HAHAHAHAHA |
|
Quoted: Hell yes they are. Where do you think they go to get the answers to question about all those gun laws?? [;)] View Quote LOL! I remember someone saying (forgot who) that when the a person calls the ATF asking about AR-15s, they tell them the best thing they can do is visit AR15.com! That may freak some of you out, but in my opinion, that says we have a damn good reputation! |
|
[b][size=6]ATTENTION BIG BRO WATCHING AR15.COM[/b][/size=6]
I would like a massive raise in my pathetic NYPD salary, that's all I ask. Have a nice day! |
|
-----BEGIN PGP MESSAGE-----
Version: PGPfreeware 6.5.3 for non-commercial use hQEMA6vmghQ49JJHAQf+KiuLLAceUT3UNBqKpW5A2H/QDBW0 RwMWW7gSWRTyPW/wJiBG30l/hE+61M7wrW1txhxwVRs7xMR3 eUqNzbOYgxJn5luyFGcY0KL4kPssdOusKrbkVCrvUtoeXONV rlv1CJ//eXkEUK9B+dNDM9rlaqacz3yASp7hDikVp2MYanT6 Dog6B8nAlLtYj0aFQcX+1g8nGo8qWfTFv+ILNmmyeFUjUG1k Y0CbYIUeMDhzbPqsUPgDB4Kqp2yvpl4SuUnv4WzXfnFysRcK PyhnZiA8tMwmWfxmzT6YjyjM8zmyQYoeqYDlUGcMANJre0Tf -----END PGP MESSAGE----- [}:D] |
|
Echelon keywords:
Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, The Artful Dodger, NAIA, SAPM, ASU, ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Ermes, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, CUN, CISU, CUSI, M.A.R.E., MARE, UFO, IFO, Pacini, Angela, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, SAMU, COSMOS, DATTA, Furbys, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, Aldergrove, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, Europol, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, FRU, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, LLNL, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT, GIGN, Exon Shell, radint, MB, CQB, TECS, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, DF, ZARK, SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM. SUKLO, Schengen, SUSLO, TELINT, fake, TEXTA. ELF, LF, MF, Mafia, JASSM, CALCM, TLAM, Wipeout, GII, SIW, MEII, C2W, Burns, Tomlinson, Ufologico Nazionale, Centro, CICAP, MIR, Belknap, Tac, rebels, BLU-97 A/B, 007, nowhere.ch, bronze, Rubin, Arnett, BLU, SIGS, VHF, Recon, peapod, PA598D28, Spall, dort, 50MZ, 11Emc Choe, |
|
SATCOMA, UHF, The Hague, SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Enemy of the State, SARA, Rapid Reaction, JSOFC3IP, Corporate Security, 192.47.242.7, Baldwin, Wilma, ie.org, cospo.osis.gov, Police, Dateline, Tyrell, KMI, 1ee, Pod, 9705 Samford Road, 20755-6000, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, M-x spook, Z-150T, Steak Knife, High Security, Security Evaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT, NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Tony Poe, MJ-12, JASON, Society, Hmong, Majic, evil, zipgun, tax, bootleg, warez, TRV, ERV, rednoise, mindwar, nailbomb, VLF, ULF, Paperclip, Chatter, MKULTRA, MKDELTA, Bluebird, MKNAOMI, White Yankee, MKSEARCH, 355 ML, Adriatic, Goldman, Ionosphere, Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, BLU-114/B, quarter, Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Tarawa, COSMOS-2224, COSTIND, hit word, hitword, Hitwords, Regli, VBS, Leuken-Baden, number key, Zimmerwald, DDPS, GRS, AGT. AMME, ANDVT, Type I, Type II, VFCT, VGPL, WHCA, WSA, WSP, WWABNCP, ZNI1, FSK, FTS2000, GOSIP, GOTS, SACS STU-III, PRF, PMSP, PCMT, I&A, JRSC, ITSDN, Keyer, KG-84C, KWT-46, KWR-46, KY-75, KYV-5, LHR, PARKHILL, LDMX, LEASAT, SNS, SVN, TACSAT, TRANSEC, DONCAF, EAM, DSCS, DSNET1, DSNET2, DSNET3, ECCM, EIP, EKMS, EKMC, DDN, DDP, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay,
|
|
redheads, RX-7, explicit, FLAME, J-6, Pornstars, AVN, Playboy, ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, N-ISDN, NLSP, OTAR, OTAT, OTCIXS, MISSI, MOSAIC, NAVCOMPARS, NCTS, NESP, MILSATCOM, AUTODIN, BLACKER, C3I, C4I, CMS, CMW, CP, SBU, SCCN, SITOR, SHF/DOD, Finksburg MD, Link 16, LATA, NATIA, NATOA, sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, nowhere, .ch, hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA-DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale, IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, Phon-e, Chicago Posse, NSDM, l0ck, beanpole, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, Jiang Zemin, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, Yucca Mountain, FARC, Toth, Xu Yongyue, Bach, Razor, AC, cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51, SABC, basement, ISWG, $@, data-haven, NSDD, black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, ISAF,
|
|
unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump, joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani, Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $, imapct, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assasinate, virus, ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF, DC7, Glock 26, snuffle, Patel, package, ISI, INR, INS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF, Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD, package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF, J-Star, PRIME, SURVIAC, telex, Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, Alex, EPL, SPINTCOM, FOUO, ISS-ADP, Merv, Mexico, SUR, blocks, SO13, Rojdykarna, RSOC, USS Banner, S511, 20755, airframe, jya.com, Furby, PECSENC, football, Agfa, 3210, Crowell, moore, 510, OADR, Smith, toffee, FIS, N5P6, EuroFed, SP4, shelter, Crypto AG Croatian nuclear FBI colonel plutonium Ortega Waco,
|
|
Texas Panama CIA DES jihad fissionable quiche terrorist World Trade Center assassination DES NORAD Delta Force Waco, Texas SDI explosion Serbian Panama Uzi Ft. Meade SEAL Team 6 Honduras PLO NSA terrorist Ft. Meade strategic supercomputer $400 million in gold bullion quiche Honduras BATF colonel Treasury domestic disruption SEAL Team 6 class struggle smuggle M55 M51 Physical Security Division Room 2A0120, OPS 2A building 688-6911(b), 963-3371(s). Security Awareness Division (M56) Field Security Division (M52) Al Amn al-Askari Supreme Assembly of the Islamic Revolution in Iraq (SAIRI) Binnenlandse Veiligheidsdienst Komitet Gosudarstvennoi Bezopasnosti Federalnaia sluzhba besopasnosti GCHQ MI5 Kill the president
There. That ought to keep them busy for awhile. [;)] |
|
Quoted: There. That ought to keep them busy for awhile. [;)] View Quote You forgot Booty. Sgtar15 |
|
Quoted: This is exactly right, since I do this for a living, I can tell you that they can remote span any port on a router on the internet, and catch and view all, or any specific traffic passing that port (depending on how they set the filter), and we will never know through honest means. View Quote You can span a port remotely via configuration, but you still have to put a monitoring device on the spanned port to get anything. So the government can't just do it as they please. Equipment must be deployed at the minimum. Some vendors support remote spanning, but it is only supported in higher end equipment. Also, don't think that you are safe using secure websites for purchases or anything else. Any decent hacker can get in on just about any server. View Quote Yes, and no. While the connection between you and the server can be made safe, provided the encryption keys are made long enough and a secure algorithm is used, it's generally the back end where your credit card or other information is stored that is poorly protected. But not all of them. It's analogous to the "weakest link" theory. Much like a chain is only as strong as it's weakest link, a network is only as secure as it's least secure host. Most IT people don't get this. So, yes, they go after the host, which is generally wide open, as opposed to trying to intercept the encrypted session. Some advice to protect yourself!! I use a $300 limit on my card that I do use over the internet. This way if someone does get my CC # they won't get much. Any amount larger I call in the order. View Quote I just cancelled another credit card and soon won't have any. It's far too easy to track my spending habits with a credit card, plus credit is a suckers game. Only the credit card company wins when you use plastic. If I can't buy it with cash, I don't buy it at all. The only exceptions to that are our house and cars, which are financed. Remember the Alamo, and God Bless Texas. |
|
Quoted: First of all, The feds can, at their will obtain any data they deem necessary right up to your actual bitstream. View Quote Indeed, though with the increasing speed of backbone traffic it's more advantageous to obtain the data as close to the edges of the connection as possible, which tend to be slower in speed. Second, you don't "span" a router. That command- and the function of port mirroring is performed at switch level. View Quote Bingo! Also, remote port spanning, where all traffic from multiple switches can be forwarded to a remote location, at least in the Cisco world, is only available on the Catalyst 6500 and up unless that's changed recently. Third, switches do not show up in a trace route! There could be a hundred switches in the systems interconnecting the routers/router interfaces you do see. View Quote That's not entirely true. Switches that perform load balancing are aware of Layer 3-Layer 7, and some even act as routers. Cisco Catalyst swtiches with the routing modules will show up in a traceroute since they effectively route packets as well as just switch them, but it could be argued that the addition of the routing module turns them from a switch, which is traditionally a layer 2 device, into a layer 3 device. Either way, it's picking nits. Fourth, only an idiot would assume that what you state on a message board would need sophisticated protocol decoder software to be read- they could simply READ THE BOARD!! View Quote Exactly. This is a public board. If Big Brother wants the info, he just puts some trained monkeys on here to read it daily. It's no harder than that. He only has to remove stuff from the bitstream if he wants to see where certain individuals are coming from. And finally, you could never obtain my Router or switch passwords from an externally connected device, or hack into a service provider network- many have tried, all day everyday, and fail. View Quote As someone who worked for a service provider network doing network security, I can state that hacking in can be done. I've seen people take control of the actual devices themselves by flaws in the security implementation, generally where something is simply misconfigured or isn't secured at all. Nothing like finding out that all those SOP docs on security are ignored by field engineers because they have got a piece of equipment in that will only be there for a month "so there's no reason to secure it." The problem, ultimately, is people. Remember the Alamo, and God Bless Texas... |
|
Quoted: Texas Panama CIA DES jihad fissionable quiche terrorist World Trade Center assassination DES NORAD Delta Force Waco, Texas SDI explosion Serbian Panama Uzi Ft. Meade SEAL Team 6 Honduras PLO NSA terrorist Ft. Meade strategic supercomputer $400 million in gold bullion quiche Honduras BATF colonel Treasury domestic disruption SEAL Team 6 [red]thebeekeeper1[/red] class struggle smuggle M55 M51 Physical Security Division Room 2A0120, OPS 2A building 688-6911(b), 963-3371(s). Security Awareness Division (M56) Field Security Division (M52) Al Amn al-Askari Supreme Assembly of the Islamic Revolution in Iraq (SAIRI) Binnenlandse Veiligheidsdienst Komitet Gosudarstvennoi Bezopasnosti Federalnaia sluzhba besopasnosti GCHQ MI5 Kill the president There. That ought to keep them busy for awhile. [;)] View Quote [shock] |
|
So what if they are? I don't think there are any whacked out bad guys hanging out here, well except that Blazin Saddles Glory guy or something like that. I shoot with a bunch of Gun Nut feds and Cops. They think the gun laws are silly. Offically they enforce them and it's just a job.
|
|
Big Beat, explain? what was that? Echelon keywords:?? what the heck are you talkin about?
|
|
i am the government hacker bent on taking away your guns. step away from the computer with your hands up.
seriously, if they want to know what is being said, wouldn't they just read the post? [whacko] |
|
Quoted: Also, don't think that you are safe using secure websites for purchases or anything else. Any decent hacker can get in on just about any server. [shock] View Quote I haven't heard that SSH has been broken in the last couple of weeks that I've been away at training but something might be waiting me in my inbox. Wouldn't be about a million times easier to root some lame e-business server rather than trying to intercept a few billion packets to reassemble a CC transaction. As far as I know there is still yet to be a single case of a credit card being intercepted in route over SSH. My credit cards ALL have a zero liablity on Internet fraud. I had one of my accounts hacked from egghead.com a couple years ago. I spend a quarter million dollars (give or take a few ten thousand) on my (government) credit card every year for the past eight years and haven't been taken one red cent. |
|
trace routes can change each time you run them. I just did it and all the ops appeared to be in NY except for the last 1 or 2 which didn't have anything in the name indictating the location (the other ones were stuff like rochester. syracuse. albany. ) it makes sense that person in florida connecting to a site that (I assume) is hosted in NY would go through DC.
I'm sure the alphabet agencies come here, but it wouldn't be detected by a trace route, they'd just have a bot download all the text just like a webbrowser does and then do keyword searches on it. the easiest way to detect it would be to check the server logs and see if any of IP addresses that connected matched gov't owned networks |
|
Hi Feds [img]http://www.stopstart.fsnet.co.uk/smilie/wavey.gif[/img]
|
|
Quoted: Quoted: Also, don't think that you are safe using secure websites for purchases or anything else. Any decent hacker can get in on just about any server. [shock] View Quote I haven't heard that SSH has been broken in the last couple of weeks that I've been away at training but something might be waiting me in my inbox. Wouldn't be about a million times easier to root some lame e-business server rather than trying to intercept a few billion packets to reassemble a CC transaction. As far as I know there is still yet to be a single case of a credit card being intercepted in route over SSH. View Quote I think you're confusing SSH (Secure Shell, an encrypted remote access protocol similar to telnet) and SSL (secure socket layer, which is what's used to encrpyt web sessions among others). SSH protocol 1 has been broken several times in the past because of a failure in the implementation of certain encryption algorithms. SSH protocol 1.5 and 2 are much better. As far as SSL being broken, SSL has been broken on several occasions, the first time I know of being in 1995 with the RC4-128-Export-40 algorithm. 128bit RC4 can be brute forced for a very modest investment in hardware in less than 24 hours. And both SSL and SSH are succeptable to "man in the middle" attacks. The key is fooling the client that the server certificates or keys have changed legitimately, which is not hard to do with your average internet user. Remember the Alamo, and God Bless Texas... |
|
Quoted: I'm sure the alphabet agencies come here, but it wouldn't be detected by a trace route, they'd just have a bot download all the text just like a webbrowser does and then do keyword searches on it. the easiest way to detect it would be to check the server logs and see if any of IP addresses that connected matched gov't owned networks View Quote I had a friend who did some research back in 1996 on analyzing text from e-mails, IRC, and USENET. He was able to analyze text from these various messages and was actually able to find the identities of several people who posted under different names and aliases with amazing results based on common phrases, misspelled words, etc. If some caffeined out security geek like my friend can do it on his own with modest resourcse in 1996, I have no delusions about the government not being able to do the same thing on a much larger scale. Remember the Alamo, and God Bless Texas. |
|
Quoted: Hi Feds [img]http://www.stopstart.fsnet.co.uk/smilie/wavey.gif[/img] View Quote Lotboy, that is WAY too funny!!! ROFLMAO!!! |
|
Quoted: Hell yes they are watching, when the SHTF they need to know who to contact to pull there asses out of the fire. for in America, there is no single , civilian (mostly) fighting force more prepaired to fight off the evil forces of communism and camel ridin than the fine members of AR15.com......haleluya [:)>] View Quote Um, excuse me, but the only reason the government will EVER contact civilians who own guns would be to remove them from the civilians. There is NO outside threat other than terrorism, which will only be controlled by PROFILING "radical" Islamists...But, since that is "racism" we cannot do it well. I knew that Islam was going to be a problem in the United States ever since Louis Farakhan raised his ugly little head. I gaurantee you tenfold that he will be behind a future act of terrorism. I digress... Of course the Feds are reading darn near every post on here. They are looking for signs of unrest and possible regrouping of militae. |
|
Quoted: Quoted: Hell yes they are watching, when the SHTF they need to know who to contact to pull there asses out of the fire. for in America, there is no single , civilian (mostly) fighting force more prepaired to fight off the evil forces of communism and camel ridin than the fine members of AR15.com......haleluya [:)>] View Quote Um, excuse me, but the only reason the government will EVER contact civilians who own guns would be to remove them from the civilians. View Quote I think you should check to see if you're sense of humor is enabled. I would have thought protecting us from "communism and camel ridin" would have been a giveaway. That, and the [b]SMILEY[/b]! [}:D] Remember the Alamo, and God Bless Texas... |
|
I honestly don't think anyone here (well, maybe all but a couple) has anything to be worried about if you are watched! Most people here aren't nuts hell bent on killing people and burning stuff. If that was the kind of people that hang out, I for one would not be here. Taking this a step farther, I would bet we have BATF, FBI, US Marshals, etc here anyway...not as spies but as regular posters! Heck, these people are just people like anyone else and probably enjoy firearms on average more than the average civilian.
I generally post about these things: firearm related stuff (the meaty details about what makes a particular gun tick), self defense stuff such as what is the best gun for this or that and ammo related stuff, the latest news about the terrorism threat and the war which is fighting it, and accessories. Most other people talk about this stuff as well and a few get into political discussions. It isn't any crime to say you are a conservative/libertarian and support those views. There are countless political ideaology websites out there. Are all these people being monitored? No way! All of this is just conversation and in no way constitutes a threat to anyone. If people were here posting stuff about how to make explosives and crap like that, then yes, their actions would probably put them under the microscope. As it should. Again, this is a public website and can be accessed by anyone. I know that. I also do not worry about my posts because I don't talk about or have any interest in the type of stuff that would naturally draw attention. Not once have I ever read anything here that would point toward an AR-15.com member constituting a threat to anyone......everything related to firearms and shootings is geared toward self defense. Some people discuss SHTF scenarios, but if you will look all of these refer to terrorism, natural disasters or some type of riot or something. SHTF isn't used as something related to fighting off the government and stuff. Merely "how do I defend myself and family" type stuff. I'm sure the federal agents themselves value info such as that, afterall they have loved ones to worry about and care for themselves. All of that being said, I will continue to post on the topics I mentioned which interest me. It isn't illegal or radical. And as I have said, nearly everyone here posts stuff that is also harmless..except maybe to a home invader who breaks down your door at 3 am and wants to take your life as well as your tv set! So what's to worry about? Afterall, this isn't Assweb here! If you aren't doing or discussing something that's illegal, then stop worrying! Some people are becoming so paranoid that they actually think of themselves as criminals or something. Lighten up! There are millions of gun owners across America just like you. That isn't anything to be ashamed or fearful of. If it is then rush and cancel your subscription to Guns And Ammo, Guns, American Handgunner and burn your NRA membership card, as these things will identify you as a lunatic, radical, rightwing extremist! See my point? LOL. Relax! |
|
Quoted: Big Bear, explain? what was that? Echelon keywords:?? what the heck are you talkin about? View Quote [url]http://www.aclu.org/echelonwatch/[/url] [url]http://www.fas.org/irp/program/process/echelon.htm[/url] |
|
Unless you're doing something wrong, i can't imagine how it matters, but then again, I through my foil hat away when I started posting my name here! I guess my belief in the constitution and its amendments gives me faith that nothing unjust will happen to myself or my family. Then again, if things unjust started happening, it wouldn't make a goddamn difference if they knew my name or not, they'd have to FIND me first!
(I do keep a tinfoil hat for my cell phone though.) |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.