Have you ever considered how your Net activity looks?

page: 2
8
<< 1   >>

log in

join

posted on Jan, 3 2013 @ 05:17 PM
link   
reply to post by wjones837
 


Because the census is important. It is not just knowing how many citizens there are, it means everything from having to redistrict schools due to population, to how much money a local government gets, or other entities. There is a lot that rides on it.




posted on Jan, 3 2013 @ 05:19 PM
link   
reply to post by Charmeine
 


They don't.

It would be way too expensive, and way to time consuming.
They have programs out there that will grab buzz words, or maybe you did something to get ona watch list. but they don't have the manpower to watch each and every person.



posted on Jan, 3 2013 @ 06:41 PM
link   
reply to post by nixie_nox
 


Yeah that was the point I was trying to get across. The chances of someone watching my computer because I've "pissed someone off" are slim to none. I think people just get way too paranoid sometimes on this site. I'm not conducting anything illegal and that's all that counts in my opinion...

That said, you can be sure that your employer is monitoring your every move on a work computer. If you use ats at work they can read your posts too. Not much can be done on a personal computer used at home unless you are involved in something highly illegal and even then - like you said, not enough man power to deal a lot of those cases.
edit on 3-1-2013 by Charmeine because: (no reason given)



posted on Mar, 15 2013 @ 01:57 PM
link   

Originally posted by Charmeine
reply to post by SquirrelNutz
 


Meh. Do you honestly think with millions of computers around the world if not billions that the authorities would take time to look in each and every computer? I doubt it. I think some people are way too paranoid about this.


I don't think you understand how it works. No one [person] is 'sifting' or 'searching' through everything. But, it IS [all] being stored and monitored by a non-human entity. When 'it' detects patterns that could be perceived as a possible threat, then a human is called in to examine and look over the situation.



posted on Mar, 15 2013 @ 10:08 PM
link   
reply to post by Wrabbit2000
 





The deliberate spread of forms of Venereal Disease and how to infect unsuspecting people (How to accomplish and counter) The construction and performance details of known E.M.P. designs and deployment in RW weapons Effects, Deployment and Countermeasure for Anthrax as well as detailed reports of it's wide release in 1979 to including medical summaries Proper procedure as trained in POST Academies for police securing their weapons around prisoners in their station Man Portable Nuclear Weapons and their specific security arrangements at Seal Beach (Historical Interest...don't get any ideas..lol) Network topography for the servers used by the Council on Foreign Relations Military traffic, material, regular shipping volume and on going trends for U.S. Ports from Maine to Texas.


You say that people would get the wrong impression of you through your internet activity. Well, I've seen some perfectly horrid (almost evil) personal stories of what people have done, and yet, at the end of these confessions they finish with "But, I'm a good person!"

If we are incapable of seeing ourselves as we truly are, then how do we know that other people AREN'T getting the wrong impression about us?
edit on 3/15/2013 by jiggerj because: (no reason given)



posted on Mar, 16 2013 @ 01:17 AM
link   
reply to post by Wrabbit2000
 


yes.....it is that easy ..
just check the link below ..
edit on 16-3-2013 by Komodo because: (no reason given)



posted on Mar, 18 2013 @ 09:27 AM
link   

Meh. Do you honestly think with millions of computers around the world if not billions that the authorities would take time to look in each and every computer? I doubt it. I think some people are way too paranoid about this.


Of course not.

Instead, there are computer programs that check the majority of popular means of electronic data, flagging key words and phrases. Then, they are analyzed for frequency, context, geographic location, source (home or office), and compared to desired red flags, etc. The "hits" are then compiled into a list that is then fed into a more detailed software program which does the same, with added and updated info, and then generates a list for a human analyst to examine.

The human analyst then makes that a shorter list by weeding out garbage, before passing that on to other specialists depending on the info, and what area is affected, etc. for either a specialty analyst to examine, or field intelligence, etc.

Once the info is processed, only the hits are "saved", the rest is purged, of course, due to storage constraints. This really shouldn't be too surprising...it's been going on since the Internet existed, and even prior, when only the phone lines were used. It has been known by various names over the years...(Echelon, Carnivore, etc., etc.)



posted on Mar, 18 2013 @ 02:55 PM
link   
reply to post by Gazrok
 


Pretty much what I said directly above you.



posted on Mar, 18 2013 @ 02:57 PM
link   

Originally posted by Charmeine
reply to post by SquirrelNutz
 


Meh. Do you honestly think with millions of computers around the world if not billions that the authorities would take time to look in each and every computer? I doubt it. I think some people are way too paranoid about this.


Also consider the amount of people that are in porno and other shady areas that are time consuming.

They'd never make it over to us unless we throw ourselves onto their radar.



posted on Mar, 21 2013 @ 05:01 AM
link   
If they would check my internet history, there is really nothing much interesting with the sites I visit. I would randomly search and check on websites depending on my mood. But I would usually visit tech-related sites because I want to be updated with the latest gadgets. Maybe it's time I start using the internet for something interesting.



posted on Mar, 21 2013 @ 07:40 AM
link   
reply to post by SquirrelNutz
 



Pretty much what I said directly above you.


I think I was a tad more specific...
(including the naming of past programs...) I imagine the current one is far superior (and highly classified)





top topics
 
8
<< 1   >>

log in

join