I did and couldnt find anything and i am quite good at searching. and wow you actualy leave the house, you have more chance of getting knocked over by a bus than you have of getting arrested for saying ****e on the net. and real world hah **** off you are a hack and a prick.
Levels of Internet surveillance. Internet surveillance may target individuals, local networks, or Internet traffic in bulk. Surveillance of individual users (or, rather, of individual electronic addresses, which may actually have more than one user) is analogous to traditional telephone wiretapping: a law-enforcement agency, intelligence agency, or other surveillant first gains physical access to one or more computers through which the Internet traffic of a suspect party passes. Using specialized hardware and software, the surveillant then scans all data traffic passing to and from the targeted party. Some or all of that traffic may be recorded by the surveillant for later use. All transmissions, recorded or not, are allowed to continue on to their intended destinations so that the surveillance remains secret. Surveillance systems have been proposed recently that would scan Internet content and usage patterns in bulk, not user-by-user. For example, in December 2002 the President's Critical Infrastructure Protection Board released a report entitled "The National Strategy to Secure Cyberspace" (http://www.whitehouse.gov/pcipb/). This report urged the creation of a centralized computer system to monitor the Internet. Such monitoring might, the paper said, be restricted to the analysis of network usage patterns (e.g., a wave of e-mails possibly indicating the spread of a new computer virus via the Internet), rather than being empowered to examine message content. Non-content information that might be gleaned by such a surveillance system includes the source and destination addresses of e-mails, the electronic addresses of websites visited by various persons, or the electronic addresses of persons visiting various websites. However, it would probably be impractical to build a high-level monitoring system that did not provide, at least potentially, access to individual users' information Read more: http://www.answers.com/topic/internet-surveillance#ixzz2UE2297NB
you are good are you two clicks thats all it took me. type in internet surveillance if you can manage it. Deep Packet Inspection equipment is basically black boxes which sit on the network and watch the traffic go by. It is currently used by ISPs for traffic management - for example spotting file-sharing activity and slowing down a connection that is engaging in the activity. However, it could be adapted for more intrusive purposes. "It is possible with this sort of kit to see if someone is using Hotmail, to pull out a list of their emails, who it is from, the date and how big the email is," said Mr Clayton. Continue reading the main story “ Start Quote "” Richard Clayton University of Cambridge He added that the government could also turn to NetFlow, an add-on to routers which collects data about which websites someone has visited. "It can see what IP address has visited which site, and can tell you how many bytes they have viewed," he said. In theory it would enable someone using it to see, for example, which stories a user had viewed on the BBC website by comparing the number of bytes used with the size of stories on the site. None of the technology is new but what might be different this time around is the way the government collects the data. When the previous Labour government mooted a similar idea the greater controversy hinged on the giant database it planned to create. "I suspect what they will propose this time is that Cheltenham has a log-in to one of the data centres that ISPs already use," said Mr Clayton
unless you are from this area ,nobody knows what you are on about , my room was round the back, i still have the bars from the window would you like to see one. The eerie looking Cherry knowle asylum has become a magnet for paranormal enthusiasts after it was billed the "most haunted hospital in the UK". The sprawling red brick building, and gothic towers of Cherry knowle have stood silent since closure in 1998. Attributed to the prolific Asylum Architect G.T. Hine, built between 1891 - 1895, it was originally the Sunderland Borough Asylum, then later known as Cherry Knowle Asylum/ Psychiatric Hospital. In 1891, the Borough of Sunderland decided to construct a psychiatric facility in Ryhope due to good rail service and a scenic view of the North Sea, and from 1893 to 1895 the Sunderland Borough Asylum was constructed (also known as Sunderland Lunatic Asylum). Designed by noted asylum architect G.T. Hine, the old asylum is a prime example of the compact arrow echelon plan where wards were stepped out from the central services, similar to a Kirkbride plan (USA). There are six wards on either side of a combined chapel and recreation hall amongst the usual services, and an isolation hospital and infirmary block were added in 1902