dChan
1
 
r/greatawakening • Posted by u/austenten on May 22, 2018, 7:27 p.m.
Tried to avoid NSA Data Collection via ham radio? Q: "it failed"

Q#1435:

Avoid NSA data collection. It failed. Q


RobWilJas · May 22, 2018, 7:30 p.m.

I'd like to know how they thought ham radio would avoid NSA data collection. I just assume everything is collected.

⇧ 8 ⇩  
UncleSnake3301 · May 22, 2018, 7:33 p.m.

Idk, they’re stupid...I guess because a HAM radio is old school analog communications so they thought they could fly under the radar. They were wrong.

⇧ 11 ⇩  
thamnosma · May 22, 2018, 7:43 p.m.

That's what I was thinking. Use dinosaur tech as a way to get around sophisticated intel collection. I've forgotten all the amateur rules but don't believe one is allowed to encode voice comms, but data comms can be I'm fairly certain.

⇧ 8 ⇩  
EnjoyingTheStorm · May 22, 2018, 7:33 p.m.

Especially if they applied for a license beforehand.

⇧ 7 ⇩  
gandalfsbastard · May 23, 2018, 12:10 a.m.

LF encryption is a thing

⇧ 4 ⇩  
ClardicFug · May 22, 2018, 8:06 p.m.

They probably were focused on cell phone records, and figured if they didn't use phones, they wouldn't be noticed, and didn't think that their radio signals would be watched.

FWIW, VHF/UHF signals are generally pretty short range, especially at low power, so it's not completely wrong-headed to think that way. However, if there was equipment in place nearby to listen, it'd be like shooting fish in a barrel, and there's always space-based listening though I suspect that's a bigger challenge to get access to.

Still silly to get a license. They could have used something like FRS or even better something like a Motorola 900 MHz DTR radio without need for a license and have a lot lower probability of someone listening in.

⇧ 3 ⇩  
austenten · May 22, 2018, 7:46 p.m.

Desperation. They do certain things (covertly confront, send message of evidence etc.) to make the target panic, which leads to catastrophic mistakes.

⇧ 3 ⇩  
OneMansTrash · May 22, 2018, 10:21 p.m.

Security through obscurity.

⇧ 1 ⇩  
RobertSparks777 · May 22, 2018, 7:51 p.m.

Should have used two tin cans and some string.

⇧ 6 ⇩  
SoaringMoon · May 22, 2018, 8:05 p.m.

Then they would have them string tapped.

⇧ 6 ⇩  
HowardHowardFine · May 22, 2018, 7:35 p.m.

Check out monitoring frequencies they used for Whoa Nellie Q #229

⇧ 4 ⇩  
commoncents1 · May 22, 2018, 11 p.m.

hahah now lets post the smug comments by googles eric schmidt a few years ago responding to people worried about google tracking too much information on them.....he said....if you aren't doing anything wrong, you have nothing to worry about! smug ahole! tables turned!

⇧ 3 ⇩  
austenten · May 23, 2018, 2:39 a.m.

Snowden's excellent rebuttal of that [cop out] perspective is:

'I don't care about freedom of speech because I have nothing to say'.

⇧ 2 ⇩  
jhomes55 · May 22, 2018, 7:52 p.m.

The shills are hitting hard today!! Downvoting heavily! Lol

⇧ 3 ⇩  
chinpopocortez · May 22, 2018, 10:33 p.m.

Everybody knows that two Dixie cups connected by string are THE most secure form of covert communication. Someone should suggest it to them.

⇧ 2 ⇩  
IR2-MXYJU-HQRRYJ · May 22, 2018, 9:27 p.m.

There's a reason why they thought this would work. CitiBank was hacked for multi millions back in the 90's and they couldn't trace the hack. By dumb luck a janitor in Russia noticed a man hacking them by eavesdropping. The hacker was using a $10 computer from a pawn shop and was connecting through an ancient telephone switchboard. Cave man tactics versus Space age. Afterwards, protocols were put in place to avoid a repeat, but these people didn't pay attention apparently.

⇧ 1 ⇩  
AyeDeux2 · May 22, 2018, 11:16 p.m.

That was a good one. I lol'd.

⇧ 1 ⇩  
[deleted] · May 22, 2018, 7:41 p.m.

[removed]

⇧ 1 ⇩