Military Review

Internet control - humanity is trapped

52



Until recently, it was believed that the "World Wide Web" is a global thing, unique and not controlled by anyone. It seems that the providers do not belong to any single corporation or organization, therefore it is impossible to establish control over them. But in reality it is not. Despite the fact that the Internet allows people from all over the world to communicate with each other, we should not forget that the network was developed by the American military, who are very interested in the question of what people do on the Internet, who they are looking for, with whom they communicate, what they write about . However, all these issues are of great interest to many governments.

To establish control over human life, there are many ways. Many of them are connected with the use of Internet technologies.

For example, today, probably, there is no person who would not know why barcodes exist on packages. This set of strips and numbers makes it possible to control prices and the quantity of goods received, how many goods are purchased, and how many are left. When buying, a stroke is scanned, the cost of the goods is fixed, and new data is entered into the electronic consignment note. If necessary, all this information can very quickly be online. According to experts who are engaged in exposing conspiracies, barcodes do not carry a real threat, because it is too primitive. But some of them, on the contrary, are of the opinion that the use of bar codes is the first step towards mass monitoring of everything that exists. In developed countries, bar codes are used by postal services that can track mail via satellites. Purchased goods are controlled from the point of purchase to the owner’s house.

Even more information comes through credit cards, with which you can determine what, where, when and in what quantity a particular person bought, what services he pays for. And on that day, when cash disappears from circulation, credit cards can become a valuable source of information not only about a person’s acquisitions, but also his life as a whole. So, now the banking service, which is carried out via the Internet, is getting more and more developed, thus, the personal data of a person, and with them fingerprints, DNA samples, letters - all this is collected, transmitted and stored around the world in databases.

Another way to control is chips that are implanted under the skin. And this is not a fairy tale, they can become a reality in the near future. Thus, in particular, VeriChip Corporation has already launched the production of subcutaneous chips. And the president of this company offered George W. Bush, who at that time served as the president of the United States, to chip all immigrants, so that they could be easily found if necessary. Moreover, the company is actively offering its products to hospitals, and in 2004, the use of chips for medical purposes was also approved in the United States. Moreover, in the West at the moment, chips are introduced to a large number of children of the elite segments of society, military personnel, people suffering from dangerous diseases, as well as criminals. Currently, not only in America, but also in Europe, the idea of ​​introducing chips under the skin of people is advertised and lobbied by all available means.

The only structures that support the chipization of the population without any reservations are the security services. Moreover, a method of forcibly implanting chips has already been invented - with a sniper rifle. A new technology from Denmark was invented by Empire North, and the invention itself was called ID Sniper. The system includes a microchip, a software package, and the rifle itself. Immediately after the chip was implanted, a photo of a person is taken with a video camera mounted on a rifle for further study. After that, this person can be monitored via satellite.

In addition, a major role in establishing total control has been played by the information revolution, which began in the middle of the last century. This has led to the interest of the intelligence services of various countries to a variety of digital gadgets. The first to translate this interest into reality were the Americans in cooperation with the British. In 1947, between the leaders of the two countries, an agreement was signed on cooperation in the field of electronic espionage, that is, all the data that one party received was transferred to the other. But later, the volume of information increased so much that it became increasingly difficult to intercept and process it. Especially since the interests of the Soviet Union, the most likely adversary, extended to virtually the whole world. Under the control of the UK was only Western Europe. The Americans controlled only small regions in which their own military bases were deployed. Therefore, it became necessary to attract new partners. But, despite very good relations with the member countries of the NATO military bloc, none of them were invited to cooperate. Therefore, Australia, Canada and New Zealand were attracted. However, information processing was still done exclusively by experts from the United States and Britain.

In 1971, a project of an electronic global interception system was developed, called the P-415. The author of the development was the National Security Agency. Thus, enormous opportunities were obtained for intercepting and processing data anywhere in the world. Spy satellites were launched into orbit. In addition, parabolic antennas were installed in Europe and America, which scanned the air, as well as centers for monitoring networks. All these components were subsequently merged into a single system, which was called "Echelon". Thus, the whole world was divided into sectors, for which branches of the system were responsible. Thus, North Africa, Western Europe, and part of Russia to the Urals is controlled by the British Center. The eastern part of Russia and the American continent are controlled by the US National Security Agency, and the South Asian and Pacific regions are controlled by the special services of New Zealand and Australia.

In addition to these countries, several system stations were installed in Japan and Germany, as well as in Israel. Recently, China is among the Echelon participants, on whose territory two top-secret stations were built to intercept data from the eastern part of Russia. It is noteworthy that the Americans initially auditioned the Chinese, but they did it with the help of another NSA station, which is located in Hong Kong, and which was later transferred to the Chinese.

Due to its technical characteristics, Echelon is able to intercept 99 percent of all information transmitted in the world. It is obvious that it is extremely difficult to cope with such a huge flow of information in operational terms, therefore high-speed computers “Cray” are installed in analytical centers.

It is clear that to finance such a large-scale project to a single state is not possible, therefore, the majority of corporations that participated in the creation of the system had a great benefit from cooperation with the special services. Thus, in particular, US auto companies used secret information about Japanese car manufacturers obtained by the CIA. To provide US energy companies with information on new developments in the energy field, an entire Asia-Pacific conference was overheard, held in 1997 in Seattle.

The Echelon project is linked by some analysts with software development called PROMIS, with which you can monitor and coordinate various information about network systems: locate submarines, make predictions on stock market movements.

If you believe the rumors, the US National Security Agency has already learned how to extract a “voice imprint”, that is, there are voice samples in the computer's memory, which can be easily identified by any voice in the audio stream. Thus, if Echelon registered the voice of a certain person, then it can track the telephone conversations of the person who owns the voice, worldwide.

Currently, the Echelon program includes ships, satellites, reconnaissance aircraft, radars, thousands of agents from America, Great Britain, Canada and New Zealand, who control almost the entire planet. The management of some special services that are included in the system are beginning to gradually recognize that this system does exist. However, all the representatives of the security services justify their actions (surveillance, phone tapping, mail interception) in the fight against terrorism.

As for Russia, the collection of information here is very dense, although it is not advertised. Until 1998, the Internet here was considered one of the most control-free communication channels. It is clear that this could not last long. Therefore, in 1998, the State Communications Committee of Russia began to introduce special equipment designed to establish control over all information transmitted in the network. This system has received the official name SORM, that is, the System of technical means for ensuring the functions of operational search activities. If the equipment is connected to the Internet, this allows you to intercept any mail that is of interest to law enforcement agencies. At the same time, the complex works quite simply: all information that is transmitted on the network is divided and scanned according to certain “key” words. Today, almost all service providers that exist in Russia are connected to the SORM system. At the same time, it should be noted that this system is effective only for internal use. To intercept information that comes from abroad, a different system is used - SOUD, or the Unified Accounting System for the enemy. Formally, the agreement on the creation of this system was signed by the Warsaw Pact member states as early as 1977. Its creation was aimed at ensuring the security of the 1980 Olympics of the year, but it began to work a year earlier, in the 1979 year.

The system combines intelligence assets of not only the Soviet Union, but also Bulgaria, the GDR, Poland, Hungary, Czechoslovakia, Mongolia, Vietnam and Cuba. The system contained constantly updated information about Western politicians, businessmen, military, scientists and journalists. Today, SUDS has been transformed into a Russian intelligence system.

But that's not all. Since 1960, the US military has developed a communication network (in other words, the Internet) that was able to withstand even a nuclear attack. With this network, all military and university sites and computers were combined. In 1981, the network was divided into military and civilian. The military component of the Internet gives occasion to some experts to assert that such search engines known to everyone as Yahoo! and Google is a side effect of the NASA project. According to one of the hypotheses, both of these search engines were developed and created in order to detect potentially dangerous information for America, as well as collect data about people who often use certain keywords and expressions in their queries.

Moreover, the Google search engine has already patented the method of observing online games, with the help of which it draws certain conclusions regarding the desires and motives of the players. Other search engines are also actively cooperating with the special services. At the same time, Google remains one of the most powerful and complete directories for satisfying virtually any human request. In addition, here you can find pictures of any corner of the planet, as well as using the webcam to see those places that are most of all interested.

This search engine is developing very quickly, so it is possible that very soon there will be enough information to fully capture the life of humanity.

It must be said that the use of social networks, which are very popular in the modern world, also pose a great danger to humans. Of course, on the one hand, this is a huge amount of unique content, including preferences, requests and much more. But on the other hand, during registration, the user must enter his personal data: first and last name, date of birth, e-mail address. In this case, all the data provided by some of the social networks, for example, Facebook, can use in their personal interests, and moreover, will not bear any responsibility for this.

If we talk about the present, then it should be noted that the establishment of total control over people is gaining momentum. So, in particular, in the United States of America this year the amendment to the law was extended, which makes it possible to intercept e-mail and dry up telephone conversations of American residents without judicial warrants if there is a danger of a terrorist attack.

In addition, the FBI created a new division, the National Domestic Comminications Assistance Center, whose main task was the development of new surveillance technologies, which include spying through the world wide web, intercepting electronic messages and wireless communications (including Skype).

As for the service called Skype, the company Microsoft, which owns it, agreed to listen to the secret services and read the correspondence of users. A similar situation can be traced, for example, in Ukraine. For a long time, the service was a serious barrier for law enforcement agencies during surveillance, because they used ciphers that reliably protect information from hacking. Now law enforcement agencies, according to the privacy policy of the service, can receive personal data of users, the contents of the correspondence in the case of a legal request. In addition, it must be recalled that last year Microsoft had patented a program of “legal intervention”, which allows the judiciary and law enforcement agencies to intercept information without the knowledge of the owners, to eavesdrop on their conversations ...

Thus, it seems that humanity is in a network cell, from which it is almost impossible to get out. And this is not about persecution mania, although it may well evolve from all of the above. Just somehow you do not feel very comfortable when you know that every step you take, every action is controlled and can be used against you ...

Materials used:
http://x-files.org.ua/articles.php?article_id=2805
http://ru.wikipedia.org/wiki/%D1%CE%D0%CC
http://www.rewer.ru/Snoski/Statii/sorm.htm
http://www.cyberpol.ru/sorm.shtml#p_02
http://forum.bakililar.az/index.php?showtopic=80451
Author:
52 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. Brother Sarych
    Brother Sarych 16 November 2012 08: 49
    +2
    Relax and have fun - what else can you advise!
    Probably still worse, but most like it ...
    1. ShturmKGB
      ShturmKGB 16 November 2012 10: 29
      +2
      Let the collars be forced to put on, maybe then the Americans will understand "Bah! Yes, we have no democracy and freedom!"
      1. Lucky
        Lucky 16 November 2012 17: 17
        +2
        It is sad!!))
        1. koosss
          koosss 19 November 2012 13: 53
          0
          "every step you take, every action is controlled"
          online again, not at all)
  2. ATATA
    ATATA 16 November 2012 08: 54
    +3
    When working behind a netbook, I always turn my camera lens away ...
    So just in case ...
    1. baltika-18
      baltika-18 16 November 2012 09: 22
      +6
      Quote: ATATA
      When working behind a netbook, I always turn my camera lens away from me ..

      Personally, I nevermind. I lost my time in the dashing 90s. Moreover, there is nothing to lose.
      1. Eugene
        Eugene 18 November 2012 15: 08
        +1
        And in vain. Stood at the origins of all technology, digital. Eski and other crap. And now begins a full pease ... dorez! The figure will conquer the world. Who will control it? And never ask serious questions on the Web! Remember the Echelon system ".
    2. Brother Sarych
      Brother Sarych 16 November 2012 11: 09
      +5
      So in netbooks, the lenses are rigidly mounted on the screen, often near the light comes on when the camera turns on ...
      Calm down, everything that you tapped on the keys, where you have already been saved ...
      1. fern
        fern 16 November 2012 12: 17
        +4
        Why be afraid at all? Are we extremists, terrorists? We create a front of popular resistance or who else is worse? Don’t just do stupid things online, that's all
    3. urzul
      urzul 16 November 2012 11: 17
      +3
      Information from Google:
      What information do we collect

      We collect information that helps improve our services, from language settings to more complex things, such as ads that are interesting to a particular user or people on the Internet.

      We take information from two sources:

      Information from users To use many of our services, you must have a Google account. When you create it, we ask you for personal data, such as name, email address, phone number or credit card details. For those who want to use all the sharing features, we also ask you to create a public Google profile where you can enter your name and add a photo.

      From the services you work with. We collect data on how and what services you use. This happens when you, for example, visit websites advertised in AdWords or AdMob, or view and interact with our ads or content. This data includes the following:


      Device Information

      We collect device data, such as model, operating system version, unique device identifiers, as well as data on the mobile network and phone number. In addition, a device ID or phone number can be linked to your Google account.


      Log Information !!!

      When you use our services or view content provided through Google, some of your actions may be automatically saved in server logs. The following information is recorded:
      Details on the use of services, including search queries;
      data on telephone calls, including telephone numbers for incoming, outgoing and forwarded calls, date, time, type and duration of calls, as well as information about the SMS route;
      IP addresses
      information about hardware events, including system failures and actions, as well as settings, browser type and language, request date and time, and URL of the transition;
      Cookies that uniquely identify your browser or Google account.


      Location Details !!!

      At Google’s geographic features, we collect and process data about your actual location, including GPS data sent by your mobile device. We also use various technologies for determining coordinates, for example, we polish device sensors for information about the nearest Wi-Fi access points and cell towers.


      Unique application numbers !!!

      Some services use unique program identifiers. They, along with information about the application (for example, version number or type of operating system) can be sent to Google when installing or uninstalling the service, as well as during automatic communication sessions with servers (when downloading updates, etc.).


      ! Local storage

      We collect and store data (including personal data) on your user devices using tools such as browser web storage (including HTML5) and data cache used by applications.


      Cookies and Anonymous Identifiers !!!

      In order to receive and record data about how Google services are used, we use various technologies. Some of them send data to the user device: one or more cookies or anonymous identifiers. This data is also necessary in cases where the user interacts with the services for our partners. These may be AdWords, AdMob, or Google’s features hosted on third-party websites.

      Welcome to the search engine, android, chrome.
      1. iCuD
        iCuD 16 November 2012 16: 18
        0
        Quote: urzul
        Welcome to the search engine, android, chrome.

        AND? A simple user can disable all of the above items. Do not want and do not! And then do not complain that the location function does not work for you (this is all for example), and that this application is raw and with bugs.
        1. Brother Sarych
          Brother Sarych 16 November 2012 16: 53
          +2
          In fact, often it only seems that the user has disabled something, in fact, everything continues to be fixed, though the user is trying not to unnecessarily once again ...
        2. urzul
          urzul 19 November 2012 09: 16
          0
          According to the articles of programmers, everything is not so simple.
          http://habrahabr.ru/post/101396/ как один из примеров.
          1. kostello2004
            kostello2004 3 December 2012 12: 02
            0
            sucked out of the finger
    4. kostello2004
      kostello2004 3 December 2012 12: 01
      0
      yeah, cover the screen with a towel, take out the battery and hide under a fake blanket so that the rocket does not aim. B R E D
  3. Wedmak
    Wedmak 16 November 2012 09: 18
    +1
    Moreover, a method of forced implantation of chips has already been devised - using a sniper rifle.

    And the type of person after this will not only survive, but will not notice anything? Thanks, laughed.
    Guys .. no one has yet canceled encrypted communication channels based on free software - this is the time. If you have something to hide, questions arise: why? from whom? These are two. Nobody is interested in your video conversations with a girlfriend and chat rooms ... These are three.
    1. borisst64
      borisst64 16 November 2012 09: 24
      +1
      It is difficult to find a person who has not been vaccinated. And it starts almost from birth. And I won’t be surprised that there is something not medical in the ampoule.
      1. Wedmak
        Wedmak 16 November 2012 09: 39
        +1
        At the moment, the chips are quite large, about 2-3 mm in diameter and up to 2 cm long - this is the smallest prototype. So notice right away.
      2. urzul
        urzul 16 November 2012 09: 44
        +3
        Bring your vaccines, plant them.
        And it starts almost from birth.

        According to our law, if you don’t want to, don’t do it.
        1. mladenec
          mladenec 20 December 2012 11: 39
          0
          According to our law, if you don’t want to, don’t do it.

          Smiled :), after this the child will not be taken to kindergarten, to school ...
          in the future, deprivation of parental rights (for juvenile technologies).
          All pseudo choices ... you forgive me for using a razor? ;) Of course, they themselves chose that you, that you ... yourself! :)
  4. Middle-brother
    Middle-brother 16 November 2012 09: 21
    +1
    Quote #34169 | 14 November 2012 | added by: bash.org.ru
    Comment on the tattoo in the form of a barcode:
    xxx: Wait, soon they will do it for free
  5. Slevinst
    Slevinst 16 November 2012 10: 16
    0
    after full control is established, some kind of dynasty will appear that will maintain its power, knowing everything about everyone. and on the other hand, whoever is afraid of nothing, this control doesn’t soar, and if you don’t want to be watched, there’s a hermit’s path in the wild
    1. El13
      El13 17 November 2012 13: 03
      0
      Yeah, only the wildlife has remained in few places, while living in Russia we think about it a little because of the wealth of our Motherland, and, say, in Germany, where do you fall for?
  6. iCuD
    iCuD 16 November 2012 10: 20
    0
    And why be afraid? Who, tell me, in their right mind will spend expensive computing power on total population control ???
    They will only be tracked selectively. Well, if someone came under control, then it means to the cause.
    1. Brother Sarych
      Brother Sarych 16 November 2012 11: 11
      +1
      With the modern development of engineering and technology, total control is not much different from selective ...
    2. nickname 1 and 2
      nickname 1 and 2 16 November 2012 11: 40
      0

      And what kind of 60 are you? Well then, yes. And if the young is promising and there is a chance for an increase, for a happy turn of fate, ah, he is compromising! Oops! and you-pushed. Goodbye good luck! OK?
      1. iCuD
        iCuD 16 November 2012 15: 58
        0
        Quote: nick 1 and 2
        And if the young is promising and there is a chance for an increase, for a happy turn of fate, ah, he is compromising! Oops! and you-pushed.

        Hah, so you yourself answered. Agree, if because of compromising YOU pushed, THAT means weighty dirt! Or did you want to force / kill, for example, and so that you don’t have anything?
        Quote: Brother Sarich
        total control is not much different from selective

        You are mistaken. Apparently you don’t have a complete picture ... In any case, with modern technology, no one can provide total control!!! You just can’t imagine what huge resources will be needed... Selective - yes it is carried out quietly ...
        1. Brother Sarych
          Brother Sarych 16 November 2012 16: 49
          0
          And in my opinion, you can’t imagine what resources are already available! So almost total control is already being carried out, though not everywhere else ...
          1. iCuD
            iCuD 17 November 2012 02: 13
            +1
            Well, yes, where do I get an IT specialist, to know what computing resources and currently exist ....
          2. El13
            El13 17 November 2012 13: 05
            0
            Brother Sarych
            Yes, come on, you still can’t create a single traffic police database, what are you talking about?
  7. Forget
    Forget 16 November 2012 10: 30
    0
    Summarizing, we can say that all states build and strengthen authoritarian regimes. Do not dare to rush without supervision ....
    When will you come, a free society, that is communism (from the word commune, society)?
    1. Brother Sarych
      Brother Sarych 16 November 2012 11: 13
      +1
      Yes, never - if you destroy server centers, then your whole life will collapse for a while ...
      1. alexng
        alexng 16 November 2012 12: 45
        +4
        And it’s better to bang all the satellites, after having pre-detected server centers for their traffic, so that later they will bang them, and immediately the US army will be at the Stone Age level. Yes, and servers that are closed on themselves do not need anyone.
  8. Uncle
    Uncle 16 November 2012 11: 33
    +9
    No chips and control can harm the human soul sealed by Holy Baptism. No 666, barcodes, magic actions, etc. from the satanic arsenal will harm the soul of a Christian. Only personal sin, own choice between darkness and light!
    1. iCuD
      iCuD 16 November 2012 16: 12
      -1
      I always said that religion and science are incompatible .... Religion hindered, hinders and will hinder scientific and technological progress .... Actually in some cases and circumstancesreligion is a major factor in the degradation of science. And it is regrettable, fact.
    2. Brother Sarych
      Brother Sarych 16 November 2012 16: 51
      +2
      I recall - That's what the life-giving cross does!
    3. WW3
      WW3 16 November 2012 19: 02
      +3
      However, I did not want people in the future to look like this ... recourse
      1. El13
        El13 17 November 2012 13: 08
        0
        And what is the value of this? - they have the same barcodes laughing
    4. Eugene
      Eugene 18 November 2012 15: 12
      0
      And the soul of a Muslim? Or a Jew?
  9. srha
    srha 16 November 2012 15: 14
    +1
    "The rescue of the drowning is the work of the drowning themselves." If you don't want to feel the "big brother's long nose", use encryption. The software is enough. But for some reason, I only noticed such a practice behind banks, and even then not always ...
  10. bazilio
    bazilio 16 November 2012 16: 46
    0
    That’s what, comrades, we don’t tryndin too much, if you want to speak out against the authorities, use the old grandfather method - in the kitchen, in a whisper, with the tap or radio turned on))
  11. 3 points from Ilyich
    3 points from Ilyich 16 November 2012 17: 13
    +2
    This is all very serious, in fact. And it is rightly said that it is not controlled, it grazes diligently. Everything is under the hood, but the surveillance is already being carried out for the units that are especially dangerous for "them" possessing (and even worse, those carrying the truth into the people). I think Voennoye Obozreniye falls into the category of dangerous ones. here gather really smart enough, sane, seeing, without distortion, through the prism of lies and correctly understanding all the processes on Earth. The system has a weapon of counteraction - deception and technical advantages, but our weapon is true and it is many times stronger, because it is clean, and the Internet, in our case, is a tool, a means of communicating the truth. For this, all this control was created in order to detect a "tumor" at the stage of inception, however, fortunately, people wake up too quickly and sooner or later the system will be too leaky and fall apart
    1. SlavaP
      SlavaP 17 November 2012 01: 08
      0
      And you do not hesitate. Military Review - under the hood, be in the registry. Therefore, drain more bullshit - the Internet is large, it will endure.
  12. baloo3000
    baloo3000 16 November 2012 18: 18
    0
    Amers have a film in the subject - The enemy of society. But, in my opinion, such total control is still fantastic
    1. Eugene
      Eugene 18 November 2012 15: 16
      0
      Enemy of the state.
  13. MG42
    MG42 16 November 2012 18: 52
    +2
    In continuation of total control
    The Ukrainian parliament voted in general for draft law No. 10492 on a unified state demographic register. If the president signs this law, the transition to electronic passports will begin in Ukraine on January 1 of next year.
    As indicated in the project, "information that is on the document data page, face biometric data, additional biometric data, etc." is entered on a non-contact electronic medium. The main biometric data is a digitized signature and photo, additional - digitized fingerprints.
    1. El13
      El13 17 November 2012 13: 12
      +1
      And you didn’t worry about old passports? Without them, it’s practically impossible to do anything, and it, too, strangely enough, serves to identify you, or is it easier to fake and therefore didn’t you care?
  14. Joshhn
    Joshhn 16 November 2012 19: 09
    +1
    A friend worked for a provincial provider, FSB officers came, picked up a sealed gray box, and left, I think so everywhere now, it would be interesting to look inside :)

    And I also saw American ads, Walmart, like, where a suspicious-looking guy comes into the store, stuffs everything in his pockets and leaves, at the exit he is stopped by a security guard and says that he forgot the check. Purchases are automatically scanned upon exit, and money is debited from the account thanks to the implanted chip, as they say: "everything for your convenience" :)
    1. Uncle
      Uncle 16 November 2012 20: 22
      0
      The film "Minority Report" on a similar theme.
  15. thinking
    thinking 16 November 2012 21: 20
    +2
    Hehe, to collect information is 0,1% of the task, systematize, process and most importantly! to use the information collected for the purpose - this is the trick. And if you take into account that people are also sitting on the output of the information ........ at best, they will react ex post. Information is too wild, and those who are needed are usually protected.

    But what you really need is a state-owned free site that works even with outside threats, where people can get free consultations in various fields (law, construction, cooking, library, etc.), dating, games. Complaints and proposals to local, regional, regional and central authorities, departments and any body to amend existing rules, norms, laws (because there is enough stupidity and stupidity in the existing order). and assign the control and operation of this site to the military cyber unit.
  16. Shumer
    Shumer 17 November 2012 08: 15
    -1
    Black humor.
  17. Captain45
    Captain45 17 November 2012 20: 07
    0
    So I went to the site and wondered if I was a fool - after all, now somewhere in the United States deep underground in the Rocky Mountains and in Russia, I don't know where, but I know for sure that there are, a dozen people from both sides of the ocean are convulsively They put on headphones, clung to the monitors and are preparing convulsively squeezing Claudia and mice to shoot information about my presence on the Internet. On the other hand, everyone wants to eat, you have to give people the opportunity to justify their existence and receive a salary. But seriously, even last year in "Kommersant" there was an article "Big Brother's Salary", here is the link http://www.kommersant.ru/doc/1800370, it is interesting to anyone. But in general, I do not mind letting them read, especially comments on articles on "Military Review", we can glean useful information from the discussions.
  18. homosum20
    homosum20 18 November 2012 14: 49
    0
    I think this can be useful in one-time actions against specific individuals engaged in activities that are fundamentally different from the activities of the bulk of society.
    Otherwise, for example, why would the Americans rely so much on the "bogies" and "white tapeworms"? It seems that they seriously believed that it was the "Voice of the People". Why, with the help of Echelon, which intercepts 99% of the information circulating around the country in electronic form, it didn’t become clear to them that most of the people didn’t care about it. (Telephone conversations, forums).
    The problem, it seems to me, lies in the analysis of information.
    Firstly, it is difficult to analyze and correctly evaluate the information coming from a subject with a completely different mentality and outlook.
    After all, people do not speak the language of math formulas. And in human language the word most often has a meaning radically different from that given in the dictionary. (Translations of one book made by two different translators are different, and sometimes very strong. And this is the case with the written literary language)
    Secondly, each listener makes his own correction, expounding what he heard. And here we are talking about the fact that everyone hears what he wants to hear, and the fact that people with different backgrounds usually use different words, even today's analyst’s mood is important.
    In general, it seems to me that you don’t have to fool around for nothing. The devil is not so terrible ...
    No need to be lazy - you want to say something important - get behind the wheel, eat up, and say it. And if you want something to be kept secret - don't talk.
    Nothing new. Everything was as always.
  19. bandana
    bandana 9 January 2013 00: 22
    0
    http://www.romanvega.ru/2012/12/tsss.html
    Roman Vega shares his observations from the looking glass in the article "Sha! On the benefits of silence".
    Ten years in the prisons of America and other looking glass.
  20. jarvisdervn
    jarvisdervn 11 March 2013 07: 59
    0
    I provide email hacking services.

    Do you want to trace the correspondence of your wife (husband), lover (lover),
    girlfriend (friend), enemies or competitors?
    We can help you !!!
    mail.ru [1500 rub, $ 50]
    gmail.com [2500rub, $ 80]
    yandex.ru [2000 rub, 65 $]
    rambler.ru [2000 rub, $ 65]
    I do not change the password, the owner will not suspect anything.
    Hacking terms from 10 minutes to 3 days.
    Anonymously.
    No prepayment.
    Payment webmoney, Yandex.

    Email: [email protected]
    Skype: hackerpromail

    I provide email hacking services.

    Do you want to trace the correspondence of your wife (husband), lover (lover),
    girlfriend (friend), enemies or competitors?
    We can help you !!!
    mail.ru [1500 rub, $ 50]
    gmail.com [2500rub, $ 80]
    yandex.ru [2000 rub, 65 $]
    rambler.ru [2000 rub, $ 65]
    I do not change the password, the owner will not suspect anything.
    Hacking terms from 10 minutes to 3 days.
    Anonymously.
    No prepayment.
    Payment webmoney, Yandex.

    Email: [email protected]
    Skype: hackerpromail

    I provide email hacking services.

    Do you want to trace the correspondence of your wife (husband), lover (lover),
    girlfriend (friend), enemies or competitors?
    We can help you !!!
    mail.ru [1500 rub, $ 50]
    gmail.com [2500rub, $ 80]
    yandex.ru [2000 rub, 65 $]
    rambler.ru [2000 rub, $ 65]
    I do not change the password, the owner will not suspect anything.
    Hacking terms from 10 minutes to 3 days.
    Anonymously.
    No prepayment.
    Payment webmoney, Yandex.

    Email: [email protected]
    Skype: hackerpromail
  21. Gonoriy
    Gonoriy 15 December 2015 12: 45
    0
    Democracy in action. And this is just the beginning.