1 posted on
09/22/2009 7:14:01 PM PDT by
Cindy
To: Cindy
Did you ever see a movie called “Minority Report”?
2 posted on
09/22/2009 7:15:15 PM PDT by
La Lydia
To: Cindy
What a wonderful continent they have.
3 posted on
09/22/2009 7:15:54 PM PDT by
omega4179
(We must be the change.)
To: Cindy
We should immediately deploy this technology in Washington D.C!
4 posted on
09/22/2009 7:16:20 PM PDT by
April Lexington
(Study the constitution so you know what they are taking away!)
To: Cindy
5 posted on
09/22/2009 7:16:34 PM PDT by
rfp1234
To: Cindy
It has a Muslim-exclusion subroutine.
6 posted on
09/22/2009 7:17:19 PM PDT by
Talisker
(When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
To: Cindy
Well, sort of stopping it before it’s installed, the populace can resort to street theatre, a revival of flash-mobs, and feigning random individual “abnormal” behaviours on an hourly basis to overload the system.
7 posted on
09/22/2009 7:18:38 PM PDT by
The_Reader_David
(And when they behead your own people in the wars which are to come, then you will know. . .)
To: Cindy
The UK is doing so badly they make the U.S. look good by comparison.
11 posted on
09/22/2009 7:25:32 PM PDT by
Clintonfatigued
(Liberal sacred cows make great hamburger)
To: Cindy
A five-year research programme, called Project Indect, aims to develop computer programmes which act as "agents" to monitor and process information from web sites, discussion forums, file servers, peer-to-peer networks and even individual computers. So what is to stop this program from scanning, probing and monitoring websites, networks or computers that are not in the EU?
12 posted on
09/22/2009 7:28:27 PM PDT by
Pontiac
(Your message here.)
To: AdmSmith; Berosus; bigheadfred; Convert from ECUSA; dervish; Ernest_at_the_Beach; Fred Nerks; ...
Abnormal behavior includes working for a living and causing global warming.
13 posted on
09/22/2009 7:29:32 PM PDT by
SunkenCiv
(https://secure.freerepublic.com/donate/__Since Jan 3, 2004__Profile updated Monday, January 12, 2009)
To: Cindy
Wow. Welcome to the ‘Victorian Age’.
15 posted on
09/22/2009 7:33:20 PM PDT by
RushIsMyTeddyBear
(http://www.muckety.com/7BECFF40501E647D3741343C37265A57.map)
To: Cindy
I plan to act suspicious enough to make the computers curious, but not so much as to appear “abnormal” ...
For example, I will drive an SUV, but have all Compact florescent lighting in my bunker compound ...
I will only flush after a “big event”, but I will leave a faucet dripping for the cats to drink out of ...
I will be all for any government program designed to help people, but only if it can be proven to work better than private sector alternatives.
This sort of complexity confuses the computers and the social engineers ...
16 posted on
09/22/2009 7:38:15 PM PDT by
spodefly
(This is my tag line. There are many like it, but this one is mine.)
To: Cindy
The Nazis are making a comeback. Is everyone in Europe sleeping?
19 posted on
09/23/2009 5:57:02 AM PDT by
sergeantdave
(obuma is the anti-Lincoln, trying to re-establish slavery)
To: Cindy
Keystroke Loggers Installed In New Laptop Computers clickinteresting article from this morning
"I called the police, as having a key-logger unknown to me in my laptop is a serious offense. They told me to call the Department of Homeland Security. At this point, I am in disbelief. Why would the DHS have a keylogger in my laptop? It was surreal. So I called them. They told me to submit a "Freedom of Information Act" request"
20 posted on
09/23/2009 6:16:21 AM PDT by
opentalk
To: Cindy
but who defines what constitutes “suspicious behaviour”? Or even more worryingly, “abnormal behaviour”?
24 posted on
09/24/2009 2:19:04 AM PDT by
Vanders9
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson