Tuesday, May 8, 2007

EshelonHitWords

These words will be monitored through routers and filters of the internet.

Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security,
SAI, Information Warfare, IW, IS, Privacy, Information Terrorism,
Terrorism Defensive Information, Defense Information Warfare,
Offensive Information, Offensive Information Warfare, The Artful
Dodger, NAIA, SAPM, ASU, ASTS, National Information Infrastructure,
InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls,
Secure Internet Connections, RSP, ISS, JDF, Ermes, Passwords, NAAP,
DefCon V, RSO, Hackers, Encryption, ASWS, CUN, CISU, CUSI, M.A.R.E.,
MARE, UFO, IFO, Pacini, Angela, Espionage, USDOJ, NSA, CIA, S/Key,
SSL, FBI, Secert Service, USSS, Defcon, Military, White House,
Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA,
Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2,
BITNET, SAMU, COSMOS, DATTA, Furbys, E911, FCIC, HTCIA, IACIS,
UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC,
NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC,
CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb,
Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools,
RECCEX, Telex, Aldergrove, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL,
NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS,
DDIS, mixmaster, BCCI, BRGE, Europol, SARL, Military Intelligence,
JICA, Scully, recondo, Flame, Infowar, FRU, Bubba, Freeh, Archives,
ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC,
spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed,
ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse,
Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN,
FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL,
NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT,
USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL,
USCODE, CISE, SIRC, CIM, ISN, DJC, LLNL, bemd, SGC, UNCPCJ, CFC,
SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA,
DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch,
AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI,
benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV,
Masuda, Forte, AT, GIGN, Exon Shell, radint, MB, CQB, TECS, CONUS,
CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP,
Echelon, Dictionary, MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767,
MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz,
Recce, 707, CIO, NOCS, Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops,
SASCOM, grom, NSIRL, D-11, DF, ZARK, SERT, VIP, ARC, S.E.T. Team,
NSWG, MP5k, SATKA, DREC, DEVGRP, DSD, FDM, GRU, LRTS,
SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM. SUKLO,
Schengen, SUSLO, TELINT, fake, TEXTA. ELF, LF, MF, Mafia, JASSM,
CALCM, TLAM, Wipeout, GII, SIW, MEII, C2W, Burns, Tomlinson, Ufologico
Nazionale, Centro, CICAP, MIR, Belknap, Tac, rebels, BLU-97 A/B, 007,
nowhere.ch, bronze, Rubin, Arnett, BLU, SIGS, VHF, Recon, peapod,
PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, The Hague, SHF,
ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z-200,
15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley
Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter
Terrorism Security, Enemy of the State, SARA, Rapid Reaction,
JSOFC3IP, Corporate Security, 192.47.242.7, Baldwin, Wilma, ie.org,
cospo.osis.gov, Police, Dateline, Tyrell, KMI, 1ee, Pod, 9705 Samford
Road, 20755-6000, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting,
M-x spook, Z-150T, Steak Knife, High Security, Security Evaluation,
Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real,
spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT,
NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside,
Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss,
ASDIC, .tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac,
.li, Tony Poe, MJ-12, JASON, Society, Hmong, Majic, evil, zipgun, tax,
bootleg, warez, TRV, ERV, rednoise, mindwar, nailbomb, VLF, ULF,
Paperclip, Chatter, MKULTRA, MKDELTA, Bluebird, MKNAOMI, White Yankee,
MKSEARCH, 355 ML, Adriatic, Goldman, Ionosphere, Mole, Keyhole, NABS,
Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC,
DNR, NADDIS, NFLIS, CFD, BLU-114/B, quarter, Cornflower, Daisy, Egret,
Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx,
Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG,
rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT,
csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor,
EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11,
Alouette, executive, Event Security, Mace, Cap-Stun, stakeout, ninja,
ASIS, ISA, EOD, Oscor, Tarawa, COSMOS-2224, COSTIND, hit word,
hitword, Hitwords, Regli, VBS, Leuken-Baden, number key, Zimmerwald,
DDPS, GRS, AGT. AMME, ANDVT, Type I, Type II, VFCT, VGPL, WHCA, WSA,
WSP, WWABNCP, ZNI1, FSK, FTS2000, GOSIP, GOTS, SACS
STU-III, PRF, PMSP, PCMT, I&A, JRSC, ITSDN, Keyer, KG-84C, KWT-46,
KWR-46, KY-75, KYV-5, LHR, PARKHILL, LDMX, LEASAT, SNS, SVN, TACSAT,
TRANSEC, DONCAF, EAM, DSCS, DSNET1, DSNET2, DSNET3, ECCM, EIP, EKMS,
EKMC, DDN, DDP, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI,
NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2,
Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise,
Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9, pink
noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security,
Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security,
VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT,
5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery,
force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers,
replay, redheads, RX-7, explicit, FLAME, J-6, Pornstars, AVN, Playboy,
ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives,
SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis,
quiche, DES, 1*, N-ISDN, NLSP, OTAR, OTAT, OTCIXS, MISSI, MOSAIC,
NAVCOMPARS, NCTS, NESP, MILSATCOM, AUTODIN, BLACKER, C3I, C4I, CMS,
CMW, CP, SBU, SCCN, SITOR, SHF/DOD, Finksburg MD, Link 16, LATA,
NATIA, NATOA, sneakers, UXO, (), OC-12, counterintelligence, Shaldag,
sport, NASA, TWA, DT, gtegsc, nowhere, .ch, hope, emc, industrial
espionage, SUPIR, PI, TSCI, spookwords, industrial intelligence,
H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss, loch, 64
Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX,
penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA-DST, INI, watchers,
keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib,
primacord, RSP, Z7, Becker, Nerd, fangs, Austin, nod, Comirex, GPMG,
Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC,
zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation,
Starr, Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22,
2010, JCET, cocaine, Vale, IG, Kosovo, Dake, 36,800, Hillal, Pesec,
Hindawi, GGL, NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef,
Magdeyev, VOA, Kosiura, Small Pox, Tajik, +=, Blacklisted
411, TRDL, Internet Underground, BX, XS4ALL, wetsu, muezzin, Retinal
Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS, Reprieve,
NZC-332, edition, cards, mania, 701, CTP, CATO, Phon-e, Chicago Posse,
NSDM, l0ck, beanpole, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC,
Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7,
Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM,
burned, Indigo, wire transfer, e-cash, Bubba the Love Sponge,
Enforcers, Digicash, zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy,
AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM,
Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort
Meade, *&, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet,
:, Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c,
Jiang Zemin, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo,
sorot, Yucca Mountain, FARC, Toth, Xu Yongyue, Bach, Razor, AC,
cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA,
INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD,
Delta Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws,
Black-Ops, O/S, Area51, SABC, basement, ISWG, $@, data-haven, NSDD,
black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA,
garbage, market, beef, Stego, ISAF, unclassified, Sayeret Tzanhanim,
PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG, orthodox,
CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama, Manfurov,
Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF, Gray
Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy,
Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM,
Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap,
Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX,
Electron, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco,
Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor,
CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens,
Kiwis, Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail,
csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC,
cybercash, Bush, George W., Nixon, NAWAS, government, NSY, hate,
speedbump, joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415,
ladylove, filofax, Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669,
Sayeret Golani, Lanceros, Summercon, NSADS, president, ISFR,
freedom, ISSO, walburn, Defcon, VI, DC6, Larson, P99, HERF pipe-bomb,
2.3 Oz., cocaine, $, imapct, militia, Roswell, ESN, COS, E.T., credit
card, b9, fraud, ST1, assasinate, virus, ISCS, ISPR, anarchy, rogue,
mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium,
William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta,
TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG,
Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon,
Templeton, Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP,
ISEC, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO,
Red Cell, NSOF, DC7, Glock 26, snuffle, Patel, package, ISI, INR, INS,
GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND,
SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK,
HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS,
SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man,
Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach,
Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF,
Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM,
CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut,
SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP,
blackjack, Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071,
WINGS, cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor,
Templar, THAAD, package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS,
chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF, J-Star, PRIME,
SURVIAC, telex, Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR,
SBU, Threat, JPL, Tess, SE, Alex, EPL, SPINTCOM, FOUO, ISS-ADP, Merv,
Mexico, SUR, blocks, SO13, Rojdykarna, RSOC, USS Banner, S511, 20755,
airframe, jya.com, Furby, PECSENC, football, Agfa, 3210, Crowell,
moore, 510, OADR, Smith, toffee, FIS, N5P6, EuroFed, SP4, shelter,
Crypto AG, Cheney, Colin Powell, etc.

Monitor This, Echelon -
Neither the National Security Agency (NSA) nor its UK equivalent -- the Government Communications Headquarters -- has admitted that the system exists, ...www.wired.com/politics/law/news/1999/10/32039 - 40k - Cached - Similar pages
Distracting the Spooks, NSA, CIA, MI6...
Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive ...www.c4i.org/erehwon/spookwords.html - 17k - Cached - Similar pages
Subversive Keywords
http://www.attrition.org Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism ...www.fiveanddime.net/subversive.html - 26k - Cached - Similar pages
the webmaster found these interesting tag line words to place in ...
... SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, ... MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, ...www.geocities.com/Athens/Library/3661/ub80.html - 14k - Cached - Similar pages
[PDF]
Table of Contents
File Format: PDF/Adobe Acrobat - View as HTMLRewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare,. IW, IS, Privacy, eject-specimen-from-the-hive, Information ...www.metamute.org/en/html2pdf/view/6961 - Similar pages
[oldboys] Correction to 'Metamute Meets Echelon' mail
... Echelon Day 2001. see http://cipherwar.com/echelon START Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, ...www.nettime.org/Lists-Archives/oldboys-0109/msg00008.html - 18k - Cached - Similar pages
[chai] Fwd: you're right - nothing better to do... (fwd)
Here, supposedly, is a list of "trigger" words: Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, ...www.fitug.de/debate/9910/msg00218.html - 6k - Cached - Similar pages
Power Privacy - The global Echelon surveillance network -
Don't ask how I got these: Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information ...https://www.powerprivacy.com/site.php/arti/read/projectechelon/ - Similar pages
Project Echelon - The Spynetwork.. :: fbomn - Faribault's Newest ...
Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism ...www.infaribo.com/modules.php?op=modload&name=News&file=article&sid=62&mode=thread - 72k - Cached - Similar pages
Echelon@Everything2.com
Then the USA and Canada swap information, therefore getting information on its own citizens. ... telephone and fax communications, plaintext is not safe. ...everything2.com/index.pl?node=echelon - 130k - Cached - Similar pages
INDUS

Wednesday, May 2, 2007

For Whom The Bell Tolls

"No man is an island, entire of itself; every man is a piece of the continent, a part of the main. If a clod be washed away by the sea, Europe is the less, as well as if promontory were, as well as if a manor of thy friend's or of thine own were. Any man's death diminishes me, because I am involved in mankind; and therefore never send to know for whom the bell tolls; it tolls for thee."
The title is taken from "Meditation XVII" of Devotions Upon Emergent Occasions, a 1624 metaphysical poem by John Donne.
Virginia Tech and Seung-Hui_Cho


As tragic as this killing was it could have happened any where. And if an occurrence does happen from an individual, always forward will come someone stating that they knew this was going to happen someday. It is easy looking back on tragedies and second guessing ones behavior.
There have been many very similar killings throughout history. We as a society will always judge other peoples actions as cold and strange.
These meaningless killings have happened from the beginning of time since ie.Cain and Able. Senseless murder of family, associates and even strangers is an inevitable.
When a danger exists the public has a right to know immediately so they can act and react as seems fit. The authorities in Virginia should not have suppressed any information, as lack of this critical information will and as it has proved futile. To serve and protect is their motto.
Real time bulletins/announcements are crucial. I think the school and on the grounds police should have made a public address over the entire campus immediately. This is common practice when a bomb threat via phone or note happens, isn’t a current shooting(s) more an event of actuality?
Below is examples of social networking avenues, but these are not a source for current information, they are however a pooling of quote: friends, associates, common interest and any type of similar knacks. The social network cannot be looked at as fact and honest reporting of news and current events. rumors of all sorts, and also giving up ones personal information is the result of these forms of human interactions.
There are probably more cons then pros for social networking. We have to look else where for answers. This acticle of Social Depression, Loneliness, and Depression proves to be an interesting read and maybe will shed some light on Seung-Hui_Cho.
"...man cannot live without attachment to some object which transcends and survives him...he is too little...we have no other object than ourselves we cannot avoid the thought that our efforts will finally end in nothingness, since we ourselves disappear" (Durkheim 210). - Emile Durkheim
Sociologist Emile Durkheim (April 15, 1858 - November 15, 1917) is one of the originators of modern sociology. One of Durkheim's most famous works is "Suicide" in which he describes his four theories of suicide: egoistic, altruistic, anomic, and fatalistic suicide. Durkheim's theory of egoistic suicide, as described in the quote above, explains the cause of depression due to social isolation and loneliness. This theory says that too little integration with society or a community leads to suicide. There are no goals set outside the self, and people feel that life is meaningless; there is nothing greater than themselves to live for. For example, Durkheim compared widowed people with children and widowed people without children. He found that widowed people with children are more protected against suicide than their counterparts because they have something greater than themselves to live for, their children. When you have something you’re obligated to outside yourself (i.e. a network of friends or family), you’re more protected from depression and suicide. Social integration provides goals and meanings for people to live for. For someone who is depressed, there is little to no meaning left in life. Everyday activities, such as eating and exercising seem meaningless. They are constantly mourning on their own dead inner selves.
Social Isolation, loneliness, and depression are all interrelated. Studies have shown that the more time spent on the Internet leads to social isolation and loneliness, which in turn leads to depression. Even though online communities and instant messaging allows a person to stay connected with their friends and family as well as expanding their social network, the more time spent socializing online is time spent away socializing in the real world.
http://en.wikipedia.org/wiki/Seung-Hui_Cho

http://www.fhu.com/articles/anger_kills.html
===============================================================

Types of Online Social Networks


Online Communities
Examples of the most popular online communities
For a through list see:
http://en.wikipedia.org/wiki/List_of_social_networking_websites

Ryze
Friendster
Myspace
FaceBook
Downelink
With these: After signing up for an account, people can then personalize their own pages with pictures and information about themselves. These websites allow people to browse other people’s pages, add each other as friends upon request, message each other, leave comments on their pages, blog, set up dates, etc.
Instant Messaging:
http://en.wikipedia.org/wiki/Comparison_of_instant_messaging_protocols
Exchange messages with friends, family, and colleagues onlineICQ
AOL Instant Messenger
MSN Messenger

Each individual can create a different, unique screen name and add their friends to their buddy list. Instant messaging allows people to chat with others online – one-on-one conversations or chat in chat rooms with your friends or with random people either to socialize or to conduct business.

Pros:
Save on postage stamps and phone bills
A way to bridge a geographical gap
Meet People
Conduct business ie. eBay or Craig’s List

Cons:
people spend hours in a virtual world where the people of the pages they are browsing through may not even know of them. Just reading about other people and their lives already takes time away from actual socializing with your friends. By browsing these pages, people become so absorbed into a virtual world that they become disconnected from reality.
They feel like they are getting to know someone without actually knowing them. The friends on one's friends list may not even be a friend. They could be acquintances or people you just met. However, many people consider these as "friends," however, many do not even see or talk to them after adding them. People try to gather the most friends on their list to look popular. The physical contact and presence of being with a friend thus fades and one slowly becomes disconnected with reality.
I think that the more hours spent on line leads to an increase social isolation in all three categories: usage of the phone, time spent with family, and social events.

Instant Messaging
Instant messaging also causes social isolation and disembodiment because you are simply having conversations that are not real. You start losing social skills in the real world as you master your social skills chatting behind a computer screen. As well, a person can easily alter their identity behind the computer screen. When put in real social situations, the person that has been accustomed to the online social life will not know how to behave and act around other people and will likely find it difficult to socialize with others. This, in turn, will lead to social awkwardness and furthers the desire to comfortably socialize on the Internet. As this social awkwardness strengthens in the real world, people more and more desires the comfort of the ease to chat online that they soon become disembodied from reality, and therefore, isolates themselves from the world.
However, like all things, nothing can be too good to be true. With an increased amount of time spent on the Internet comes with consequences. As studies have shown, the more time spent on the Internet browsing through online communities and chatting through instant messenger means less time spent socializing with real people. People slowly become disembodied with real life and believe they live in a virtual world with virtual friends. As they begin to lose touch with other people, they increasingly isolate themselves, and according to Durkheim’s (above reading) theory of egoistic suicide, being socially isolated leads to suicide. Though suicide is quite drastic in this sense, it explains how people can become depressed. Therefore, even though it has its benefits in the virtual world, the real world is greatly impeded by the increasing use of online social networking.
There are endless numbers of Social Networks , some more popular than others. There are also targeted ones. What ever floats your boat is out there on the internet
I believe that most if not all these avenues of networking are useless in the times of emergencies. As the word implies Social network, being the center for gossip on line.
Let the horns sound and the trumpets reveal danger nearby.

Indus

Wednesday, April 25, 2007

Do Not Drive Your Own Car

and smile if you are driving;

ANPR (Automatic License Plate Recognition) technology is gaining to be one of the most reliable and mature video monitoring technologies. Though this technology hasn't been utilized, recent price drops are turning ANPR into a viable and powerful tool for a wide range of applications. From parking access control to stolen vehicle identification, ANPR combined with an IP video management type solution can improve the safety and security of both streets and parking lots. ANPR is founded on technology known as Optical Character Recognition (OCR) technology, which was developed to recognize text within a scanned image. OCR allows for the conversion of a printed magazine article into an electronic word processor file or a business card into an electronic contact. Combined with computer video technology, the automatic recognition of license plates is now a reality. ANPR has been in operation at parking lots for years, as a result the technology has been fine-tuned to provide above 99% accuracy recognition results. The UK has been involved probably the most. Who can benefit from this technology? In actuality, any facility with a parking lot can gain from the numerous advantages of ANPR. Combined with a traditional access control system, ANPR has the ability to uniquely identify a vehicle. ANPR software can accurately recognize a license plate and match it to a database of registered users in real-time. The system is then able to determine an appropriate course of action, from opening a gate to triggering an alarm. The end result is a dramatic improvement in security without interfering with parking lot operations. The Law Enforcement agencies have a different menu of uses for this technology. Their applications will be used for criminals and their acquaintances. Will speed traps be obsolete? Will cameras and computers record speeds and assign tickets etc.? The “no where to hide” syndrome is now at the street level.. We can also assume that this ANPR technology will live a short time as far as a camera is concerned. New cars, and implanted RFID tags will take over the cameras roll as far as recognition data. There are already techniques out there to disable and confuse this technology and the growth of these tools are from your average challenger. The people that do this type of hacking stuff is because they can and because its there. Below are links to more information on uses and disuses.




Becareful and be





INDUS

Wednesday, February 28, 2007

See you on the InTube

The scrimmage on intellectual property protection is part of a wide-ranging debate on how much intellectual protection there should be and who owns what. One of the arguments for intellectual property is that it cost somebody money to create knowledge or entertainment. The fact that Joosts’video has a start-up going and Viacom has jumped into bed with them and decided to the extent that a menage e twa with Google wasn’t satisfying enough. Hey!! Promises talk and GS walks. This merger and Internet TV ,InterTube, or InTube(my words,copyrighted:)) is going to lackless and there will be no future in this. Hasn't any one been paying attention to regs. on HDTV and the future(which was suppose to be settle on a standard in 1997)..The copyright wars on property, especially with video has been going on for a while. After film, came “The Great Time Machine” A video tape player/recorder from Magnavox to hit the market aimed at consumers. Sony’s Betamax Tape system was new on the west coast and Matsushita’s VHS was on the same tracks. The friction of copyrighted video intellectual property has begun. The Question? Am I performing copyright infringement recording “off the air waves” shows like “Leave it to Beaver” and placing them on magnetic tape? The logical answer was yes, BUT!! If your doing it for your own enjoyment and not charging a fee for someone else to watch then its ok.
That was the calming of the seas answer as far as consumers or everyday people like us were concerned. The law regarding major players was that they pay royalties. If Google/YouTube did not own the copyrights of any of the videos they were showing, then they have no foot to stand on. If Viacom owns them and decides to back Joost well that’s ok as long as Viacom pays royalties to any living movie stars or relatives of dead ones. There are laws in place from the VCR days. The adage that nothing is free in this world is true. Somebody, somewhere owns anything in question, at least when there is money involved. Did we talk about video films that are now public domain?
Lets face it SLOWSCAN TELEVISION rules. Which is free by the way.
Indus

Tuesday, February 13, 2007

DarkSide

Mirror-mirror on the net whose the smartest of the....
One side of the internet is considered as the “Dark Side”. The place for some of no rules, no honesty, no reliability, and just plain greed. This dark side is a side people prey on the unknowing or uninformed individuals using computers. A playground of take, deceive and conquer. It also can be a vicious chain of loop events. I, one day take something of somebody’s and before I can act out my evil doings, some one has scanned or performed port knocking on me. A technique or scheme looking for hidden opened ports or back doors on a computer’s cpu or network system. This type of invasion has become a popular challenge with computer darksiders. ” Basically, the "secret knock" would be a "password" of sorts which could allow unrestricted access to anyone who knew it.1 A more easier way for some identity thieves would be a technique known as “War Driving”. Here you are on your wireless home or business network. You get up to look out the window and you wonder why you see the same car parked outside across the street or lot with it’s occupant acting as if he/she is resting looking down or maybe looking as if they are listening to the radio. Now with a little imagination you might think they are monitoring people, casing out the joint, or just maybe they are intercepting your wireless network. And you thought you were the smart one. Yes, you have been driven on!! by War Driving. “Wardriving is driving around a city searching for the existence of Wireless LAN (802.11) Networks. It's locating and logging wireless access points while in motion or parked. Often, this task is automated using dedicated wardriving software and a GPS unit.
Wardriving was invented by Peter Shipley and is now commonly practiced by hobbyists, hackers and security analysts worldwide. 2 Just some tidbits of the “Dark Side “.
Well, I have to go! There is a car out in my driveway which has been there for a while. I think it’s my neighbors ex-spouse which by the way has taken everything they have, and done without the use of a computer. Go Figure?? :)






















1/ http://netsecurity.about.com/cs/generalsecurity/a/aa032004.htm
Tony Bradley
2/ www.wardrive.net

Tuesday, February 6, 2007

Life's Walk

Step, Step, stammer, stammer
Step, Stammer, step, stammer
Stammer, Stammer, step
YOU?
Step, Step, Step, step
Step, step
STEP...
Live!

Saturday, January 27, 2007

Vacuity Net

I have noticed while sitting idle in front of the computer screen, that the mouse has a tendency to travel to the outer URL's of the wired and wireless akasa. The come-back results are fascinating. What the mouse finds and your eyes ponder and brain deciphers is a smogasboard or melting space of snafu knowledge with results of everything, anything, and of course humans. With AI machines also to follow soon(if they are not already out there) producing artificial information for one as myself to ponder and just an ingling to find truth within. To see the subjects and visions of such and to believe or not believe. In days past and still mentioned by some, that to shake hands with and look into the eyes of a two legged being with aura seems to be one of the last realities left, of course excluding the plastic mouse in your hand. The Internet truely is a vacuity.
A universe of information which is nothing but brick and mortar libraries and digital paper. Are we going in circles? What was before the first internet page and what is after the last internet page? Where are we? Will we start in caves again lying down looking at the mouse go by or will we be sitting in front of plasma levitating the mouse pointer with our minds. What do you believe? Do you believe your reading this blog? Would you believe the feel and interior of a real book?