To: Boiling point
Hows this for tin foil worthiness, Gov monitoring eating up too much bandwidth.
Actually, monitoring would most likely not take up any bandwidth anywhere, as it would be a tap into router somewhere between his ISP and a core router somewhere. Of course its possible, but HIGHLY unlikely that such a thing is being done. Its easily done by the ISP or anyone one Jim's subnet, but outside of that, its nearly impossible for the average schmo to get anywhere near a place that and then even identify which lines to tap and write a program to reassemble all the packet segments. Its fun to think about though and if you have access to the right building and have the right equipment (usually any old PC will do) you can do it with a bit of knowhow and patience. I recommend reading "The Cuckoo's Egg" for some pre-internet cyber-spy true crime fun.
32 posted on
02/03/2010 7:42:05 AM PST by
lefty-lie-spy
(Stay metal. For the Horde \m/("_")\m/ - via iPhone from Tokyo.)
To: lefty-lie-spy
I recommend reading "The Cuckoo's Egg" for some pre-internet cyber-spy true crime fun. Highly concur on "The Cuckoo's Egg." They even did a lighthearted docu-drama on it on PBS.
One quibble: This was in the era of the internet (that's what the interloper used), but before widespread introduction of the World Wide Web.
54 posted on
02/03/2010 2:04:58 PM PST by
Erasmus
(<under construction>)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson