Pissed off

Camden, AR

#1 Nov 27, 2012
This is the stupidest web site ever I lost my best friend because of the stuff ppl said bout her on here an because somebody said it was me I hope all the ppl that talk crap on here get there real names shown one day cus ain't nobody on here real by no means all fake.,,....
Santa

United States

#2 Nov 27, 2012
Pissed off wrote:
This is the stupidest web site ever I lost my best friend because of the stuff ppl said bout her on here an because somebody said it was me I hope all the ppl that talk crap on here get there real names shown one day cus ain't nobody on here real by no means all fake.,,....
I'm real you b!tch!!! You're the fake!
yeah

Camden, AR

#3 Nov 27, 2012
Pissed off wrote:
This is the stupidest web site ever I lost my best friend because of the stuff ppl said bout her on here an because somebody said it was me I hope all the ppl that talk crap on here get there real names shown one day cus ain't nobody on here real by no means all fake.,,....
I totaling agree. Obviously someone hates you enough they black balled you. It's common around here and only gullible pricks believe trust anonymous people name throwing.
farm hand

United States

#4 Nov 27, 2012
that jus tina rains mad cuz her daughter done ruined herself and its on display for the whole world to see
Fox Mulder

Camden, AR

#5 Nov 27, 2012
Page Two

Or it can be used for direct marketing purposes, such as targeted advertisements, where ads are targeted to the user of the search engine by analyzing their search history and emails(if they use free webmail services), which is kept in a database.

For instance, Google, the world's most popular search engine, stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months. Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences. Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites, in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies "cookies" on each visitor's computer. These cookies track the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use to build a profile of the user to deliver better-targeted advertising.

The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.

In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer's hard drive, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collect passwords, and/or report back activities in real-time to its operator through the Internet connection.

There are multiple ways of installing such software. The most common is remote installation, using a backdoor created by a computer virus or trojan. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Viruses often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These viruses and trojans are most often developed by government agencies, such as CIPAV and Magic Lantern. More often, however, viruses created by other people or spyware installed by marketing agencies can be used to gain access through the security breaches that they create.

Another method is "cracking" into the computer to gain access over a network. An attacker can then install surveillance software remotely. Servers and computers with permanent broadband connections are most vulnerable to this type of attack.

One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a compact disc, floppy disk, or thumb drive. This method shares a disadvantage with hardware devices in that it requires physical access to the computer.

Now to get to the gist of the problem: SOCIAL NETWORK ANALYSIS. Read this part very, very carefully and install it in your brain (pun intended).
Fox Mulder

Camden, AR

#6 Nov 27, 2012
CRAPIX 101

I have told you people - TRUST NO ONE - PERIOD ESPECIALY THE GOVERNMENT. Anyone who/that believes anything they read on Crapix should really seek therapy - even if there is a modicum of truth to some of it. The truth mixed with a lie is still a lie. On the other hand, if you tell a lie long enough, people will start to believe it. Now to do you understand? Annnd, even the ones that purport to be using their "real names" are probably lying. If you are like some of the ones with multiple computers, you can say you are from 'Jack-N-the-Box' on one computer and be the 'taliban' on another computer.

And just so you are aware, people who believe they are anonymous by hiding behind fake names, et cetera is not hidden. People say (with good reason) that an IP address will screw you up. Here's another tidbit: the worst offenders of tracking your computer data and reporting it to the government are primarily two - Google and Facebook. Facebook originally started as a tool that was used primarily by the police to find stupid criminals. Then the tentacles of big brother spread and evolved into government programs utilizing algorithms

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.

Packet capture (also sometimes referred to as “packet sniffing”) is the monitoring of data traffic on a computer network. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. Packet Capture Appliance intercepts these packets as they are travelling through the network, in order to examine their contents using other programs. A packet capture is an information gathering tool, but not an analysis tool. That is, it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform traffic analysis and sift through intercepted data looking for important/useful information. Under the Communications Assistance For Law Enforcement Act ALL U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' broadband Internet traffic.

There is far too much data gathered by these packet sniffers for human investigators to manually search through all of it. So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, and filter out and report to human investigators those bits of information which are "interesting"—such as the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems which intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies.

Corporate surveillance of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Or the data can be sold to other corporations, so that they can use it for the aforementioned purpose.
Fox Mulder

Camden, AR

#7 Nov 27, 2012
Page Three

One common form of surveillance is to create maps of social networks based on data from social networking sites as well as from traffic analysis information from phone call records such as those in the NSA call database, and internet traffic data gathered under CALEA. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.

Scalable Social Network Analysis Program was developed by the Information Awareness Office, whose purpose is as follows: to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA requires information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.

In addition, it has been demonstrated that it is possible to surveil computers from a distance, with only commercially available equipment, by detecting the radiation emitted by the CRT monitor. This form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.

IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated computer.

And it has also been shown that even the high frequency noise emitted by CPUs includes information about the instructions being executed.

Policeware is software designed to police citizens by monitoring discussion and interaction of its citizens. Within the U.S., Carnivore was a first incarnation of secretly installed e-mail monitoring software installed in Internet service providers' networks to log computer communication, including transmitted e-mails. Magic Lantern is another such application, this time running in a targeted computer in a trojan style and performing keystroke logging. Oasis, software developed by the Central Intelligence Agency (CIA), is designed for converting intercepted audio into searchable text. CIPAV, deployed by FBI, is a spyware/trojan designed for identification of a computer.

Following are a few of the government spying programs designed to monitor private citizens and not-so-private individuals.
Fox Mulder

Camden, AR

#8 Nov 27, 2012
Page Four

Carnivore, Total Information Awareness, Magic Lantern, CIPAV, ECHELON, NSA call database, TEMPEST, GhostNet and a multitude of others. The Iranian Government has developed a program that takes cyber-spying/intrusion to a whole new level.

Moral of the Story

I ADVISE ALL TO GET OUT OF FACEBOOK, MYSPACE, GOOGLE, and the myriad of "social networking sites."And you thought freedom of speech was real.

What don't know WILL GET YOU LOCKED UP.
Fox Mulder

Camden, AR

#9 Nov 27, 2012
Why are you deleting my page one?

CRAPIX 101

I have told you people - TRUST NO ONE - PERIOD ESPECIALY THE GOVERNMENT. Anyone who/that believes anything they read on Crapix should really seek therapy - even if there is a modicum of truth to some of it. The truth mixed with a lie is still a lie. On the other hand, if you tell a lie long enough, people will start to believe it. Now to do you understand? Annnd, even the ones that purport to be using their "real names" are probably lying. If you are like some of the ones with multiple computers, you can say you are from 'Jack-N-the-Box' on one computer and be the 'taliban' on another computer.

And just so you are aware, people who believe they are anonymous by hiding behind fake names, et cetera is not hidden. People say (with good reason) that an IP address will screw you up. Here's another tidbit: the worst offenders of tracking your computer data and reporting it to the government are primarily two - Google and Facebook. Facebook originally started as a tool that was used primarily by the police to find stupid criminals. Then the tentacles of big brother spread and evolved into government programs utilizing algorithms

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.

Packet capture (also sometimes referred to as “packet sniffing”) is the monitoring of data traffic on a computer network. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. Packet Capture Appliance intercepts these packets as they are travelling through the network, in order to examine their contents using other programs. A packet capture is an information gathering tool, but not an analysis tool. That is, it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform traffic analysis and sift through intercepted data looking for important/useful information. Under the Communications Assistance For Law Enforcement Act ALL U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' broadband Internet traffic.

There is far too much data gathered by these packet sniffers for human investigators to manually search through all of it. So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, and filter out and report to human investigators those bits of information which are "interesting"—such as the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems which intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies.

Corporate surveillance of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Or the data can be sold to other corporations, so that they can use it for the aforementioned purpose.
told you so

United States

#11 Nov 27, 2012
told you so wrote:
dussin baby breath hall is a cum guzzlin nephew sucker and he aint been with a woman in almost a year so watch your nephews
told you so

Since: Jul 12

Location hidden

#12 Nov 27, 2012
Post from McDonalds wifi until Sonic makes it more comfortable.
Scott Tedder

United States

#13 Nov 27, 2012
Anyone up for some gay sex?
Pissed off

Camden, AR

#14 Nov 27, 2012
If u were real u wud put ur real name haha Santa stopes believing that shit when I was five
Pissed off

Camden, AR

#15 Nov 27, 2012
farm hand wrote:
that jus tina rains mad cuz her daughter done ruined herself and its on display for the whole world to see
not Tina rains thank u hum must suck not knowin who the hell u talkin to scence we already have a Santa ima be the fu$kin easta bunny
camden pride

United States

#16 Nov 27, 2012
Pissed off wrote:
<quoted text> not Tina rains thank u hum must suck not knowin who the hell u talkin to scence we already have a Santa ima be the fu$kin easta bunny
u r tina rains and u aint gona turn the easter bunny into a mixed baby having skank like you know who!
Leave her alone

Camden, AR

#17 Nov 29, 2012
This ain't Tina she puts her real name I think y'all are all Scott Tedder so it really don't matter what you say

Tell me when this thread is updated:

Subscribe Now Add to my Tracker

Add your comments below

Characters left: 4000

Please note by submitting this form you acknowledge that you have read the Terms of Service and the comment you are posting is in compliance with such terms. Be polite. Inappropriate posts may be removed by the moderator. Send us your feedback.

Camden Discussions

Title Updated Last By Comments
Poll Did you vote today? (Jun '10) 4 hr Reality Check 42,179
Farm Job 7 hr Bk guest 6
Where are the muscular fine black men in this t... 10 hr Backwoods 2
Girls 12 hr Backwoods 2
Mark cross 23 hr DLD 5
Looking for someone Mon Missed The Boat 2
Why did Gerald Carlyle get fired? Feb 18 Missed The Boat 2

Camden Jobs

More from around the web

Personal Finance

Camden Mortgages