Workingman wrote:Does anybody really think that they have the manpower, that especially, to monitor every one of our so interesting communications every minute of every day?
This presumes that people are doing the checking.
In fact it will not be people it will be computers and a list of keywords. Those computers will then log any communication which hits the keywords for further review. But and here is the big but, who sets the threshold for the keywords… Are they all terrorist related or are there other agendas.
Also and here is the other kicker. If they have control of your phone, then they have the right to track you wherever you go whatever you are doing. Who is to say the people who might “demand” that information? DSS? The local council?
I have been mulling a RFID blocking device to kill any RFID trackers for some time now.
Just remember, the last thing anyone will see or hear will be the actual source media from your conversation. In the first instance it will be a tagged and summarised synopsis of what the software tagged. After it will be a summary of the actual data. If that is still of interest, then the person who requested the data on you will get the actual original source conversation in its native form, whether text message, phone conversation, chat, email or website accessed.
Now we talk about “can they”. The average business server, today, can track a thousand of these conversations per second, even the phone one’s with the voice processing. Then there comes storage. Yes the voice is slightly bulky, but they can store emails, voice, texts and websites visited fairly easily. We now have multi petabyte storage infrastructures and they are working on multi Exabyte infrastructures. That’s enough to cover everyone in the UK for every phone call for every person. All landline or mobile calls go through a computer and are translated into digital. The rest is software…
I come back to the point. Who decides exactly “what” to track and why. As I tell all the people I know who use “registered” tax avoidance services, all of which are illegal outside of the UK. The only avoidance which works is visibility. This is also true of public surveillance. The only way to be sure that they are not doing something you don’t want them to or creating a false reality of your intentions; is not to be visible to them in the first place…
That just became harder.