You are viewing a single comment's thread.

view the rest of the comments →

Blacksmith21 ago

These back doors have existed since the days of the telegraph, essentially. The Black Chamber, headed by Henry Yardley, was the predecessor to the Army Signals Agency and eventually the NSA.

The Black Chamber eavesdropped on the League of Nations (predecessor to the UN) meeting in the 30's in SF to gain advantage during trade negotiations. This was done by backroom deals with Western Union, etc.

This eventually migrated to not just deals with the service providers, but also hardware manufacturers. The massive ATT building in NYC = NSA. Google server farms = NSA. The list goes on. There is a reason why the data center in Bluffdale was built - they needed to process and store the data of EVERYTHING.

It would also be beneficial for those not schooled in the history of SIGINT to read up on Echelon.

The Internet 2 is not the same as the "deep" or "dark" web. I2 uses a different transport protocol (IPv6 I think) and is a research network between its' creators and other entities who have the need to pass very large datasets back and forth in near real time.

The deep/dark web is still the same "Internet" that we know and love, it just exists in a different, less controlled manner without all of the constraints of the "Internet".

Regarding CPP - I remember seeing the original server file logs back last fall. Someone also had claimed to have seen CP in the files.

Now, I don't know about you, but I cannot proffer one reasonable explanation why a single-location pizza joint would have the need to have any type of PC/server hosting files on premises. Again, 30k foot thinking - I'll leave the arguments as to the directory structure and other BS diversions for the shills and autists to hash out.

What may be entirely possible though, is that there are entities on I2 which may be involved in the NWO/DS/PG cabal and use the resources and relative privacy of the network to move video; customer orders; manage the business, etc.

Ponder this - if you ran the multi-billion dollar US franchise of the NWO, to include human trafficking operations, I would think you would need a little more computing power than some POS Acer in a pizza joint or a little black book. Where would you keep your enterprise apps, files, and content safely and away from prying eyes?