THE OFFICIAL 147.450 FLAMEBOOK! THEFLAMEBOOK.COM

 

Retard Ron Foster

W0RKF / AA0IN - THE RETARD Ron Foster

 

 

 

450 Sunday Night Trivia
With your host Sue KD6UVD
8PM Pacific



Listen to 147.450 LIVE:







23,034 Entries
YDO 
06/28/18

Comments:
I need money real bad! That nutty bitch Ashley has stranded RJI and me in the desert at her trailor. We think she believes she is the female version of Charlie Manson. She keeps calling her yard and trailor the Ashley Family Compound. Help us get some money for gas and food so we can slip out of here when she is taking her morning nap. Donate to our paypal account. We need your help! She won't allow us hurricanes or weed. Its all kinds of fucked up. Help! Help! Help!


KE6YDO 
06/28/18

Comments:
SOS SOS !!! HELP
The passenger windshield has a crack. Since my brother is too lazy to work and make money it is the duty of 435 and Roger to buy me a new windshield. AGAIN!!!
Send to my PayPal. You guys bought it the last time, it's only right that you buy it again.


Operation sparc 
06/28/18

Comments:
*************operation SPARC ***************
Call to all operation SPARC will officially commence again this weekend holiday. All squeakies. Sound effect types. Jammers crossbanders and freedom lovers are invited to let the SPARC ANTIFA types know that we will not allow them to go unpunished this holiday season.
Join us on our 435 freedom celebration on the SPARC repeater this weekend. Invite all to participate.
SPARC
Tx in 441.640
Pl 77.0
Rx 446.640
See you all there!!!!


.. 
06/28/18

Comments:
we have confirmation that YDO was on a 4-day tweak binge when he wrecked the van. Will he ever put that pookie pipe down?


... 
06/28/18

Comments:
Those asshats left piles of garbage behind when they left Ashley's property.
Fucking dirtbags!!


Makes Sense Now!!! 
06/27/18

Comments:
That is the van Robert Kurt and Richard Martin used to haul Henry's body out to Joshuaa Tree!!!! The cops better get a DNA swab of that van STAT! No wonder they have said nothing about it. And they are very familiar with Joshua Tree. Maybe they should drive their coach out to Henry's Hole in the desert and set-up camp next to it and piss on his grave. After all, they know exactly where that hole is. WINK!! WINK!!! Get a clue dumb fucks... Ashley is your alibi for the day Henry was murdered, don't piss her off or she will tell the cops the truth and you fuckers will die in Pelican Bay! But just keep telling yourselves "DON"T WORRY ABOOOOUT ITTT!!!!


FUCK Youuuuuuu KA6JMM 
06/27/18

Comments:
We are the Flea Circus that torment JMM and We Are Legion. We are the Dark Forces, the Black Hats of the amateur radio multiverse.
You too can be a JMM flea on your own. If we judge you to be determined and effective we will reach out to you. JMM can't find us and neither can you.
SnitchBoy, Beware the Dark Forces, the Ninja Flea Circus that enacts the death of a thousand squeakies, the whispering voices and the haunting heterodynes.
JMM feels he is clever by borrowing other people's cars to spy on BB since we outed him and his crappy '94 Heap Cherokee. We know what you are driving SnitchBoy when you go out to spy on and harass innocent ham operators. A nutjob like you shouldn't be illegally carrying firearms either.
JMM brags about his enemy's getting "a brick in the mouth" but our Flea-Bots are a brick up his fat ass.
After FIVE MONTHS he still cannot locate any of the dozens of RF Flea-bots deployed in abandoned warehouses, on city buses, Santiago Peak or Uber cars. He talks constantly about his crappy Chi-knees toy analyzer or those stupid TDOA kits. Each of our Flea-bots is equipped with dual antennas and a 555 timer switching real pin diodes to create a rotating null pattern for those geriatric ham club wannabe DF'ers to chase all over town.
Each and every one of the Flea-bots says to the amateur radio world
"JMM FUCK Youuuuuuuu"
Just listen to Elsinore Peak 144.895 at night. SnitchBoy tries to jam them and fails miserably, just like his silly beam on the roof, TDOA kits and sextant fantasy failures.
Fuck You JMM


435 
06/27/18

Comments:
Drunk Brian telling ydo and rji off ; die ydo and rji


435 
06/27/18

Comments:
http://garchives1.broadcastify.com/14747/20180627/201806272046-400858-14747.mp3


Ashley and ydo and rji 
06/27/18

Comments:
On the outs!!!!


Rji lies about the school!!!!! 
06/27/18

Comments:
Rji lies about the school!!!!!


Crazy Bitch!!! 
06/27/18

Comments:
Damn that bitch Ashley is one crazy cunt. No wonder she lives alone out in the desert. What did she expect from the Martins? Some sense of responsibility? HAHAHA!!!! She invites two loser parasites to live on her property then complains they are fuck-ups. The Martins and Ashley deserve each other. I hope she beats the fuck out of both of them!!!! Hey BREGAL, you still want fuck Ashley??


N6ZKZ 
06/27/18

Comments:
Remember all those times YDO called or texted you asking for money for food or for a repair or beer? You idiots got SWINDLED. They lied. The money was used to buy a a Chevy van which they kept under wraps for several months. They even had wnough money to register smog and insure the van all while you dummies thought they were hungry. Then one night on a trip to meet the connection <wink> <wink>, they wrecked the van beyond repair and have abandoned it in the desert. But don't worry the tax payers will pick up the bill for hauling it away.


Tommy Bragger 
06/27/18

Comments:
After Tammy gets done pulling her she cock out of her dusty hole I like to sniff the end of it it smells like an old lady and gets me hi!


Richard Bebout KA6JMM 
06/27/18

Comments:
As I sit here in Reagan International Airport I reflect on my actions to set things right once and for all. First of all, I confessed to forging the document changing KB6BUZ to N6UZS and showed them how I signed Richard Clark’s name. Next I confessed to jamming the Sparc machine and also faking the P25 signal that has plagued 435 lately.
After that I admitted to submitting falsified paperwork accusing numerous other hams of jamming the 144 Elsinore Peak repeater when in fact it was me performing the jamming. I surrendered my original ham license to the FCC and prepaid the $38,652 NAL fines
Richard A. Bebout
Ex-ham
That trailer on Walnut in Wildomar


435 
06/27/18

Comments:
Why are the Martin Brothers radio silent right now? Did something happen? Are they hiding again?


Buzz off BUZZ 
06/27/18

Comments:
"I've been listening for a year and I cannot stand this buzz jackass. If I ever run across him I'm going to beat the holy shit out of him!"
Buzz isn't worth the effort or the assault charge.


Truth 
06/27/18

Comments:
In case anyone noticed, the Broadcastify listener audience has dramatically decreased since the passing of Henry. Not much going on anymore on 435. Just Buzz's babbling, Jimmy's malarky and a few cameos by the BUTTFUCK BROTHERS!
Henry is sorely missed by the listenership!


Some one is listening 
06/27/18

Comments:
https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/
The secrets are hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program.
Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.
The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” It is a collaboration that dates back decades. Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.
Much has previously been reported about the NSA’s surveillance programs. But few details have been disclosed about the physical infrastructure that enables the spying. Last year, The Intercept highlighted a likely NSA facility in New York City’s Lower Manhattan. Now, we are revealing for the first time a series of other buildings across the U.S. that appear to serve a similar function, as critical parts of one of the world’s most powerful electronic eavesdropping systems, hidden in plain sight.
“It’s eye-opening and ominous the extent to which this is happening right here on American soil,” said Elizabeth Goitein, co-director of the Liberty and National Security Program at the Brennan Center for Justice. “It puts a face on surveillance that we could never think of before in terms of actual buildings and actual facilities in our own cities, in our own backyards.”
There are hundreds of AT&T-owned properties scattered across the U.S. The eight identified by The Intercept serve a specific function, processing AT&T customers’ data and also carrying large quantities of data from other internet providers. They are known as “backbone” and “peering” facilities.
While network operators would usually prefer to send data through their own networks, often a more direct and cost-efficient path is provided by other providers’ infrastructure. If one network in a specific area of the country is overloaded with data traffic, another operator with capacity to spare can sell or exchange bandwidth, reducing the strain on the congested region. This exchange of traffic is called “peering” and is an essential feature of the internet.
Because of AT&T’s position as one of the U.S.’s leading telecommunications companies, it has a large network that is frequently used by other providers to transport their customers’ data. Companies that “peer” with AT&T include the American telecommunications giants Sprint, Cogent Communications, and Level 3, as well as foreign companies such as Sweden’s Telia, India’s Tata Communications, Italy’s Telecom Italia, and Germany’s Deutsche Telekom.
AT&T currently boasts 19,500 “points of presence” in 149 countries where internet traffic is exchanged. But only eight of the company’s facilities in the U.S. offer direct access to its “common backbone” – key data routes that carry vast amounts of emails, internet chats, social media updates, and internet browsing sessions. These eight locations are among the most important in AT&T’s global network. They are also highly valued by the NSA, documents indicate.
The data exchange between AT&T and other networks initially takes place outside AT&T’s control, sources said, at third-party data centers that are owned and operated by companies such as California’s Equinix. But the data is then routed – in whole or in part – through the eight AT&T buildings, where the NSA taps into it. By monitoring what it calls the “peering circuits” at the eight sites, the spy agency can collect “not only AT&T’s data, they get all the data that’s interchanged between AT&T’s network and other companies,” according to Mark Klein, a former AT&T technician who worked with the company for 22 years. It is an efficient point to conduct internet surveillance, Klein said, “because the peering links, by the nature of the connections, are liable to carry everybody’s traffic at one point or another during the day, or the week, or the year.”
Christopher Augustine, a spokesperson for the NSA, said in a statement that the agency could “neither confirm nor deny its role in alleged classified intelligence activities.” Augustine declined to answer questions about the AT&T facilities, but said that the NSA “conducts its foreign signals intelligence mission under the legal authorities established by Congress and is bound by both policy and law to protect U.S. persons’ privacy and civil liberties.”
Jim Greer, an AT&T spokesperson, said that AT&T was “required by law to provide information to government and law enforcement entities by complying with court orders, subpoenas, lawful discovery requests, and other legal requirements.” He added that the company provides “voluntary assistance to law enforcement when a person’s life is in danger and in other immediate, emergency situations. In all cases, we ensure that requests for assistance are valid and that we act in compliance with the law.”
Dave Schaeffer, CEO of Cogent Communications, told The Intercept that he had no knowledge of the surveillance at the eight AT&T buildings, but said he believed “the core premise that the NSA or some other agency would like to look at traffic … at an AT&T facility.” He said he suspected that the surveillance is likely carried out on “a limited basis,” due to technical and cost constraints. If the NSA were trying to “ubiquitously monitor” data passing across AT&T’s networks, Schaeffer added, he would be “extremely concerned.”
Sprint, Telia, Tata Communications, Telecom Italia, and Deutsche Telekom did not respond to requests for comment. CenturyLink, which owns Level 3, said it would not discuss “matters of national security.”
The eight locations are featured on a top-secret NSA map, which depicts U.S. facilities that the agency relies upon for one of its largest surveillance programs, code-named FAIRVIEW. AT&T is the only company involved in FAIRVIEW, which was first established in 1985, according to NSA documents, and involves tapping into international telecommunications cables, routers, and switches.
In 2003, the NSA launched new internet mass surveillance methods, which were pioneered under the FAIRVIEW program. The methods were used by the agency to collect – within a few months – some 400 billion records about people’s internet communications and activity, the New York Times previously reported. FAIRVIEW was also forwarding more than 1 million emails every day to a “keyword selection system” at the NSA’s Fort Meade headquarters.
Central to the internet spying are eight “peering link router complex” sites, which are pinpointed on the top-secret NSA map. The locations of the sites mirror maps of AT&T’s networks, obtained by The Intercept from public records, which show “backbone node with peering” facilities in Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C.
One of the AT&T maps contains unique codes individually identifying the addresses of the facilities in each of the cities.
Among the pinpointed buildings, there is a nuclear blast-resistant, windowless facility in New York City’s Hell’s Kitchen neighborhood; in Washington, D.C., a fortress-like, concrete structure less than half a mile south of the U.S. Capitol; in Chicago, an earthquake-resistant skyscraper in the West Loop Gate area; in Atlanta, a 429-foot art deco structure in the heart of the city’s downtown district; and in Dallas, a cube-like building with narrow windows and large vents on its exterior, located in the Old East district.
Elsewhere, on the west coast of the U.S., there are three more facilities: in downtown Los Angeles, a striking concrete tower near the Walt Disney Concert Hall and the Staples Center, two blocks from the most important internet exchange in the region; in Seattle, a 15-story building with blacked-out windows and reinforced concrete foundations, near the city’s waterfront; and in San Francisco’s South of Market neighborhood, a building where it was previously claimed that the NSA was monitoring internet traffic from a secure room on the sixth floor.
The peering sites – otherwise known in AT&T parlance as “Service Node Routing Complexes,” or SNRCs – were developed following the internet boom in the mid- to late 1990s. By March 2009, the NSA’s documents say it was tapping into “peering circuits at the eight SNRCs.”
The facilities’ purpose was to bolster AT&T’s network, improving its reliability and enabling future growth. They were developed under the leadership of an Iranian-American innovator and engineer named Hossein Eslambolchi, who was formerly AT&T’s chief technology officer and president of AT&T Labs, a division of the company that focuses on research and development.
Eslambolchi told The Intercept that the project to set up the facilities began after AT&T asked him to help create “the largest internet protocol network in the world.” He obliged and began implementing his network design by placing large Cisco routers inside former AT&T phone switching facilities across the U.S. When planning the project, he said he divided AT&T’s network into different regions, “and in every quadrant I will have what I will call an SNRC.”
During his employment with AT&T, Eslambolchi said he had to take a polygraph test, and he obtained a government security clearance. “I was involved in very, very top, heavy-duty projects for a few of these three-letter agencies,” he said, in an apparent reference to U.S. intelligence agencies. “They all loved me.”
He would not confirm or deny the exact locations of the eight peering sites identified by The Intercept or discuss the classified work he carried out while with the company. “You put a gun to my head,” he said, “I’m not going to tell you.”
Other former AT&T employees, however, were more forthcoming.
A former senior member of AT&T’s technical staff, who spoke on condition of anonymity due to the sensitivity of the subject, confirmed with “100 percent” certainty the locations of six of the eight peering facilities identified by The Intercept. The source, citing direct knowledge of the facilities and their function, verified the addresses of the buildings in Atlanta, Dallas, Los Angeles, New York City, Seattle, and Washington, D.C.
A second former AT&T employee confirmed the locations of the remaining two sites, in Chicago and San Francisco. “I worked with all of them,” said Philip Long, who was employed by AT&T for more than two decades as a technician servicing its networks. Long’s work with AT&T was carried out mostly in California, but he said his job required him to be in contact with the company’s other facilities across the U.S. In about 2005, Long recalled, he received orders to move “every internet backbone circuit I had in northern California” through the San Francisco AT&T building identified by The Intercept as one of the eight NSA spy hubs. Long said that, at the time, he felt suspicious of the changes, because they were unusual and unnecessary. “We thought we were routing our circuits so that they could grab all the data,” he said. “We thought it was the government listening.” He retired from his job with AT&T in 2014.
A third former AT&T employee reviewed The Intercept’s research and said he believed it accurately identified all eight of the facilities. “The site data certainly seems correct,” said Thomas Saunders, who worked as a data networking consultant for AT&T in New York City between 1995 and 2004. “Those nodes aren’t going to move.”
An estimated 99 percent of the world’s intercontinental internet traffic is transported through hundreds of giant fiber optic cables hidden beneath the world’s oceans. A large portion of the data and communications that pass across the cables is routed at one point through the U.S., partly because of the country’s location – situated between Europe, the Middle East, and Asia – and partly because of the pre-eminence of American internet companies, which provide services to people globally.
The NSA calls this predicament “home field advantage” – a kind of geographic good fortune. “A target’s phone call, email, or chat will take the cheapest path, not the physically most direct path,” one agency document explains. “Your target’s communications could easily be flowing into and through the U.S.”
Once the internet traffic arrives on U.S. soil, it is processed by American companies. And that is why, for the NSA, AT&T is so indispensable. The company claims it has one of the world’s most powerful networks, the largest of its kind in the U.S. AT&T routinely handles masses of emails, phone calls, and internet chats. As of March 2018, some 197 petabytes of data – the equivalent of more than 49 trillion pages of text, or 60 billion average-sized mp3 files – traveled across its networks every business day.
The NSA documents, which come from the trove provided to The Intercept by the whistleblower Edward Snowden, describe AT&T as having been “aggressively involved” in aiding the agency’s surveillance programs. One example of this appears to have taken place at the eight facilities under a classified initiative called SAGUARO.
As part of SAGUARO, AT&T developed a strategy to help the NSA electronically eavesdrop on internet data from the “peering circuits” at the eight sites, which were said to connect to the “common backbone,” major data routes carrying internet traffic.
The company worked with the NSA to rank communications flowing through its networks on the basis of intelligence value, prioritizing data depending on which country it was derived from, according to a top-secret agency document.
NSA diagrams reveal that after it collects data from AT&T’s “access links” and “peering partners,” it is sent to a “centralized processing facility” code-named PINECONE, located somewhere in New Jersey. Inside the PINECONE facility, there is a secure space in which there is both NSA-controlled and AT&T-controlled equipment. Internet traffic passes through an AT&T “distribution box” to two NSA systems. From there, the data is then transferred about 200 miles southwest to its final destination: NSA headquarters at Fort Meade in Maryland.
At the Maryland compound, the communications collected from AT&T’s networks are integrated into powerful systems called MAINWAY and MARINA, which the NSA uses to analyze metadata – such as the “to” and “from” parts of emails, and the times and dates they were sent. The communications obtained from AT&T are also made accessible through a tool named XKEYSCORE, which NSA employees use to search through the full contents of emails, instant messenger chats, web-browsing histories, webcam photos, information about downloads from online services, and Skype sessions......
https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/


HappyHarryHardon  
06/27/18

Comments:
Northbound 215, number one lane, let's go
 < Previous 20
Page:
Next 20 >  

Back to THE OFFICIAL 147.450 FLAMEBOOK!

Contact administrator at admin@theflamebook.com