View Single Post
Old 05.29.2007, 10:25 AM   #10
floatingslowly
invito al cielo
 
floatingslowly's Avatar
 
Join Date: Feb 2007
Posts: 21,165
floatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's assesfloatingslowly kicks all y'all's asses
Quote:
Originally Posted by atari 2600
Now, to get back to the subject, the method by which these monitored calls would help intelligence agencies and law enforcement fight terrorism has, to my knowledge, never been explained and expounded upon to the general public, at least. I suppose that would be letting the terrorists know too many of our supposed secrets haha.


my guess is that the answer lies under a few hundred feet of concrete at the Sandia Labs bunker in White Sands. I would also guess that this has been going on for a long time before the government sought out legitimacy.

they have the ability to soak up and sift though mountains of microwave transmissions from all over the world and I don't think they ever would discount information recieved from a domestic source.

anyone remember that Navy E-3 that China forced down a few years back? these planes are one of the first capture points of data collection and you can bet that there is an aircraft with similar capabilities in range of every cellular call you make.

STAY TUNED for our next installment where we discuss cutting edge A.I. Crypto-breakers and the men who love them.


 
floatingslowly is offline   |QUOTE AND REPLY|