Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A Modest Proposal for a FReepers "Instant Alert Network"
Butter Pecan Fan ^ | November 3, 2001 | butter pecan fan

Posted on 11/03/2001 11:55:35 AM PST by butter pecan fan

A Modest Proposal for a FReepers "Instant Alert Network"

FIRST DRAFT, 11/03/01 - SUBJECT TO REVISION.

On the morning of September 11, I was just getting ready to go in to work when the phone rang. It was one of our neighbors. "Did you know that two airplanes just flew into the World Trade Center in New York?"

No, we didn't. At the time, we didn't have our TV on. Neither did my wife's parents, who were doing repair work on a rental property and didn't hear the news until hours later.

In the days since then, I've pondered how I might set up a system to instantly alert myself if something really major and threatening should happen: a nuclear event, a mass aerial anthrax attack, a major dam attack or a coordinated series of bomb blasts in major cities. In such an event, immediate notification =could= make a life-or-death difference.

My first idea was to create a computer system which would periodically scan major news web sites for key phrases in the top news items (such as "nuclear plant"), and automatically trigger a phone call to my home, any time of day or night when such phrases were found. Doable, but there were three major drawbacks to such a plan. First, a lot of work to set up. More importantly, too much delay between the start of a major event, its appearance in the online major media, and the triggering of the phone call. And most importantly of all, too inaccurate. Who wants to be awakened at 3:30 a.m. by the news "More Troops to Protect Nuclear Plant"?

I would now like to propose an "instant alert system" for major threatening events which will overcome all three of those problems, a system which I'm tentatively calling "FReepAlert."

Here's an example of how FReepAlert could work:

4:36 a.m., Central Standard Time: A sleeping FReeper in Illinois is awakened by a phone call from her husband, an early-shift law-enforcement officer in Joliet. It appears that one of the region's nuclear power plants is under sudden and ferocious terrorist attack. Law enforcement and military units are en route.

4:38 a.m.: "BeenThereDoneThat" begins to activate the FReepAlert network by dialing the phone number of "2old2worry" in Philadelphia. At the same time, she boots up her computer and connects to an online police scanner.

4:39 a.m.: "BeenThereDoneThat" gives up on "2old2worry," who left less than 10 minutes ago for work and doesn't have a cell phone in his car. Undaunted, she dials the number of "HillaryforDogcatcher" in Los Angeles, and rouses her from a sound sleep. She also posts a brief message in the FreeRepublic "Breaking News" section: "SCANNER SAYS ILLINOIS NUCLEAR PLANT UNDER ATTACK."

4:43a.m.: "BeenThereDoneThat" hangs up the phone and, being close to the power plant, begins to prepare for possible evacuation. It is seven minutes since she received first notification of the event from her husband, and her job is essentially done. She has activated the network.

4:41 to 5:00 a.m: The initial chain set off by "BeenThereDoneThat" alerts 5 more people. Thirty-two early-bird FReepers spot the news online. Six of these, being close nuclear power plants of their own in other parts of the country, tune in to local police scanners. Three others are part of FReepAlert. All three of these activate different portions of the FReepAlert chain from that already activated by "BeenThereDoneThat."

5:02 a.m: A FReeper monitoring a police scanner in California picks up a report of a terrorist attack on a nuclear power plant there. He immediately posts the news online.

5:08 a.m.: People on the East Coast are starting to wake up, since it's just after 6:00 a.m. there. However, most have not turned on their TV, so they don't see CNN's brief initial report that a power plant in Illinois appears to be under attack. It is twenty-two minutes since BeenThereDoneThat received a phone call from her husband. More than 50 FReepers have received phone calls (only 3 of whom would've heard the news on CNN), and dozens more have already learned the news online. Several more FReepers spot the CNN news and activate other portions of the FReepAlert chain.

5:10 a.m.: Two minutes after the first news breaks on CNN, 150 FReepers learn the attack in Illinois has been successfully repulsed. At least 6 terrorists are dead, and 3 police officers have been killed or wounded.

By 5:16 a.m, just over 70% of FReepAlert chain members have now been informed, as opposed to only 6% of the American population. This ratio is the same for FReepers in the State of California, where it is 3:16 a.m. Several FReepAlert members in Southern California are preparing for possible evacuation should that become necessary.

Almost none of the State's non-FReepers residents are aware of the attack in their State, since 99% are asleep; and in any event, the news has yet to break on CNN. It will be hours before some of these learn what's going on. A few who don't hear for hours will be local FReepers; though not part of the FReepAlert chain.

5:18 a.m.: CNN reports that law enforcement officers appear to have the Illinois power plant situation "under control." Multiple units are in pursuit of several terrorists who are fleeing in a green minivan.

Meanwhile, eleven armed terrorists enter the restricted area of a nuclear power plant in California.


How the Network Will Actually Work

The network will basically be defined by three things: A) Alert Rules; B) the way the network is set up, and C)the Alert Procedures.

A) Alert Rules.

Clear rules must be established for what is and is not a FReepAlertable emergency. The key question is, "Does this information indicate there the likelihood of an immediate and serious threat to people in various parts of the country, or to large numbers of people (many hundreds, or thousands) in a single area?" Threats could be divided into "daytime" and "24-hour" categories, based on the seriousness, immediateness, prior knowledge and credibility of the news threat.

Examples:

Threat

Seriousness Immediacy Prior Knowledge Credibility Alert Level

With no prior warning, news comes from a Tennessee hospital of a *confirmed* case of smallpox.

High

Fairly low

None

High

Daytime alert, since people may need to make preparations, and need to do so before a possible general public panic.

News of a confirmed case of smallpox 24 hours after suspicions first reported.

High

Somewhat low

24 hours

High

No alert needed, because of the 24 hours prior knowledge

Suitcase nuke explodes in downtown Seattle at 2 a.m.

Very high

Very high, esp. with public panic

None

High

24-hour alert.

DEBKAfile reports hundreds of thousands of soldiers massing on the Russia-Afghanistan border.

Moderate, for Americans

Not terribly immediate

None

Very low, since DEBKAfile is not considered by most of us to be a credible source... also, there IS no Russia-Afghanistan border... :-)

None.

I would propose to list several such examples for FReepAlert members, representative of the kinds of scenarios most likely to occur, and include clear criteria for FReepAlert members to decide whether an unlisted threat is a 24-hour alert, daytime alert, or no alert. Only 24-hour alerts would be passed on between the hours of 10 p.m. and 7 a.m.

B) How the Network Will Be Set Up.

The network could be described as a chain, or perhaps more accurately, as a ring. The ring structure means that any major alert given should be able to travel the entire length of the chain and return home, at which point, of course, alert notification would end.

The chain would obviously be broken if a member is not able to reach the next member in line. However, as shown in the example we started with, there is an easy way around this.

Each member of the chain will possess contact information for the next 4 members in the chain. I won't bore you with the math, but if there's a two-thirds chance of getting straight through to any given member, then you stand a 98.8% chance of being able to immediately pass on an alert. On average, you would expect more than 50 links to be completed before the chain would break down. The reliability of the chain would be even stronger at night, when most people are home and reachable in a major emergency.

The daytime hours, are also the hours when FReepers will be more available to pay attention to the news. In reality, then, you wouldn't expect major portions of the chain to be broken for long, because someone somewhere in the next section after the break would pick up the news and restart the chain.

In fact, as explained in the example, in a major crisis several sections of the chain would go active all at once, with the chains of alert dying out when they hit a section where the news has already been heard.

There's also a way make the chain even more reliable (and blindingly fast) in the event of a major middle-of-the-night emergency (such as a nuclear reactor core meltdown). To do so, the FReepAlert "host" (probably me, but this could alternately be someone centrally associated with the FreeRepublic web site) would be notified as part of the first alert. The host would then activate several sections of the chain simultaneously simply by making 5 or 6 phone calls to people at different points in the chain. Using this method with the example scenario above, instead of "more than 50" FReepers already notified by phone by the time a major network first breaks the news, hundreds could already be aware of the situation.

To protect against potential abuse by telemarketer types, no member ( host excepted for reasons detailed below) would possess contact information for more than 4 other people. Any abusing telemarketer could be dropped from the chain upon complaint to the host. So too could a "Chicken Little" who needlessly and repetitively proclaims the sky is falling at 3 a.m., based on dubious reports.

The host would possess a more extensive list of contact information, for several reasons. One is the need, assuming the network reaches a reasonable size, to be able to activate several sections of the ring at once in a major crisis. Also, he would always need to know the latest members to join simply in order to complete the loop and make the network into a ring instead of a one-way chain. When a new member joined, the host would also need to send out the list of 4 contacts for that member.

The host, being located at the "seam" where the loop reconnects onto itself, would be the only member to have a list of contacts which would change when a new member joins. All other members would keep the same contact list for as long as they were part of FReepAlert, which makes the alert system stable and easy to use.

C) Alert Procedures.

I will need to work up a simple, clear draft list of alert procedures which each member will agree to. Briefly, you can get a rough idea of likely procedures from the examples above:

* keep your contact list in an appropriate, findable location or locations.

* if you become aware of a threat, assess its seriousness, immediateness and credibility, as well as how much people are already aware of it.

* if it looks like a major 24-hour alert, and it's the middle of the night, phone the host.

* contact the next person in the chain, and also post a message on FreeRepublic.

* if you can't contact the first person on your list, go to the next one, until you get through.

* once you've contacted the next person, that person will take over and call the next.

* if one of your contacts gets skipped over in the chain (for example, the first person wasn't home), then try to call that person or persons later, because the chain has moved on without them and they won't hear unless they hear from you.

* if you change your contact information or decide to drop out, let the host know so he can alert the 4 people behind you who have your information, and prevent future weaknesses in the chain.

Where From Here?

I would propose to proceed by taking comments and input (NOT contact information!) at this time concerning the FReepAlert idea, its design and operation. Then this proposal will be edited based on some of that input, and clearer rules and procedures set out.

Once I have a sense that people are reasonably happy with the design of things, I would begin taking contact information for those who would like to participate.

Summary

FReepAlert can be set up as a functional network of practically any size, from two participants to thousands. In the event of a major crisis, terrorist or otherwise, FReepAlert could literally be a "life saver".

 


TOPICS: Announcements; Editorial; News/Current Events
KEYWORDS: fr; instantalertnetwork
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-94 next last
To: Nita Nupress
Oh, I see. Being cautious about giving my phone number to a complete stranger is now labeled "paranoia."

No, not at all. Being cautious about giving your phone number to a complete stranger is entirely reasonable.

On the other hand, posting messages publicly casting suspicion on another member of this forum SOLELY on the basis of the length of time that person has been an official member, such as:

Now, how do I get past the suspicious thoughts that the poster of this thread has been here less than a month?

and such things as publicly discounting my opinion, which others have done in other threads - simply because I'm relatively new here would definitely fit into the category of paranoia, and sometimes worse.

But, it seems (as someone who has recently joined this esteemed forum) that at least some of the people here have their established "clique" and don't really give a flip about being welcoming to newbies.

And some are just... a bit paranoid. Or cautious. Well, I can understand that part. After all, most of us (myself included) don't broadcast our full names here, just "monikers" like "Nita Nupress" and "butter pecan fan".

But it's no excuse for abusing recent arrivals.

61 posted on 11/03/2001 8:47:34 PM PST by butter pecan fan
[ Post Reply | Private Reply | To 57 | View Replies]

To: butter pecan fan
Welcome to my "clique" :-)
62 posted on 11/03/2001 8:51:25 PM PST by MistyCA
[ Post Reply | Private Reply | To 61 | View Replies]

To: butter pecan fan
One more thing that may help you understand, just in case you don't already know (I'm giving you the benefit of the doubt here).

You have the distinct misfortune of having one of THE main suspected FR shills posting on your thread and pushing the idea. That's equivalent to going to a job interview for a clergyman's job and then having Bill Clinton show up to offer himself as your personal reference for honesty and integrity. :-/

63 posted on 11/03/2001 9:01:51 PM PST by Nita Nupress
[ Post Reply | Private Reply | To 58 | View Replies]

To: butter pecan fan; mystomachisturning
You two clique-sters can finish this conversation; I'm going to bed. You may want to work on this thing about taking things so personal, though. You've managed to completely sidetrack the thread all because of one little comment I made back at #43.

Toughen up!

64 posted on 11/03/2001 9:08:58 PM PST by Nita Nupress
[ Post Reply | Private Reply | To 61 | View Replies]

To: Nita Nupress; butter pecan fan
You have the distinct misfortune of having one of THE main suspected FR shills posting on your thread and pushing the idea.

Oh my! I have apparently been keeping company with a suspected shill. I imagine it isn't the first time, but it does seem to have put a damper on the entire thread. I think I will take a break and go look up tonk in the canteen or something.

65 posted on 11/03/2001 9:28:02 PM PST by MistyCA
[ Post Reply | Private Reply | To 64 | View Replies]

To: mystomachisturning
But that is why I assumed that the phone chain would be made up of people who have some standing, and the release of names would be limited. I cringed again at one suggestion that the phone list might be posted because I too keep an unlisted private number.

Those who read my original proposal carefully might note:

a) I designed the system specifically so that no individual member would possess contact information for no more than 4 individuals (assigned pretty much at random), plus the host. In doing so, I brushed aside my minor security concerns about publicly giving out my OWN phone number, assuming the not unlikely scenario that I were to end up serving as "host".

b) I suggested such contact information would consist of contact phone numbers, plus a FIRST NAME. There are cases in which a last name may have to be provided as well, but as long as there aren't two "Bradleys" or "Williams" at your place of work, a first name only should do just fine.

Incidentally, I also considered having a slightly shorter contact list of 3 names, rather than 4, but I don't see it makes that much difference for the privacy concerns, whereas statistically, the communication chain is going to be a whole lot stronger and more stable with 4 potential contacts. 3 contacts is iffy, 4 should provide great continuity, 5 in my opinion is just not needed.

c) Therefore (and specifically with regard for privacy), the ONLY person to possess the full list of contact information (and it might not even ultimately be the full list, but that's an advanced topic for another day) would be the "host", whoever he or she might be.

I SPECIFICALLY AND CLEARLY SUGGESTED that somebody beside myself might serve as the host - for example, someone centrally connected with the FreeRepublic web site, if there were such an individual available, eager and equipped to do that role.

Such an individual would need to be interested and engaged, and actively involved though, as there are at least a few administrative tasks that would have to get done. He or she would also need to be pretty reachable in the event of a major emergency.

I basically offered to expose my own phone number to the world (or at least to the network, which I presumed would be fairly open, so it amounts to the same thing), and take on the admin work, because I know from experience that the person who comes up with an idea usually ends up "getting" to run it.

If folks here want to choose someone besides myself to do the host role, that's fine with me, just as long as the person meets the needed criteria. Believe me, I don't need your phone number for any reason. I've got plenty enough to do besides call people for no reason.

And if things are so bad around here that people feel NOBODY who hasn't been an active member for a year should even be privileged to be a part of the warning network, and trusted with 4 other people's first names and telephone numbers, plus the knowledge that they somehow frequent this forum (such contact info could easily be divorced completely from their online identities if people are that concerned), well, all I can say is, things must be pretty bad.

Unless you can really convince me otherwise, I personally would not favor, for example, excluding new people from such a network which might potentially save their lives just because they're new. As you will find in my original proposal, I envisioned part of the role of the "host" as being there to help deal with those who will inevitably do something to abuse the concept. It's not that hard to envision means by which this can be done, but I'll leave that for another post.

Personally, my bigger concern is getting people into the network who: a) are going to be reasonably reachable in the event of an emergency, and who: b) will reliably commit to not LOSING the contact info needed to perpetuate the chain, and who will actually make the call or calls needed to keep a major alert going.

In any event, you (and others) should be aware that the privacy of all participants was and is at the forefront of my thinking; that I specifically stated I don't have to run the thing; and in specific regard to your comment -

I cringed again at one suggestion that the phone list might be posted because I too keep an unlisted private number.

I would also absolutely and totally oppose such an idea.

66 posted on 11/03/2001 9:37:54 PM PST by butter pecan fan
[ Post Reply | Private Reply | To 60 | View Replies]

To: butter pecan fan
Whoa, hoss!

My comments are not based at all on your length of time at FR. I would express the same note of caution to someone/anyone who has been here as long or longer than I have. Some of us have been, shall we say, burrs under the saddle to various powers that be, and we tend to try to develop a certain level of trust with others before we share all that much personal information. In point of fact, I wasn't even thinking of you when I commented to Nita earlier.

You can call it paranoia if you like, but there have been one or two who seemed overly interested in who I am in "real life" - and quite, frankly, I'm one of the more "open" FReepers around.

Your idea is a good one. I've even toyed with something like it myself. But whereas I'd be willing to share with some here, others I wouldn't be. I noted that you were not asking for numbers yet, but I also noted that if and when you do, your plan will make it necessary that you share those numbers with at least a limited number of other folks.

[And if you must know, there are one or two folks who were already here when I arrived who I wouldn't share that information with on a bet. :-)]

67 posted on 11/03/2001 9:41:27 PM PST by logos
[ Post Reply | Private Reply | To 50 | View Replies]

To: Vinnie
Anyone thinking of buying a scanner.... Check your local PD to find out what kind of radio system they have (local Radio Shack can give you the story). If they are on a 'trunk' system you want something other than a plain ole scanner. And 200 channels is barely enough.

Important point.

68 posted on 11/03/2001 9:47:31 PM PST by butter pecan fan
[ Post Reply | Private Reply | To 56 | View Replies]

To: mystomachisturning
I've bookmarked this so I can study it Sunday and post my comments.
69 posted on 11/03/2001 9:49:23 PM PST by 68-69TonkinGulfYachtClub
[ Post Reply | Private Reply | To 48 | View Replies]

To: Nita Nupress
And just to show that I'm willing to reciprocate and watch the 6 of my two buddies, I'll call you guys and wake you up the next time the East Coast gets hit with another white-powder envelope. :)

Uhh ... if you call me at 3:00 a.m. to tell me there's some more white powder in New Jersey, I'm changin' my number.

And if you need me to call you about anything in Houston, it'll be too late. LOL!

70 posted on 11/03/2001 9:56:02 PM PST by logos
[ Post Reply | Private Reply | To 51 | View Replies]

To: 68-69TonkinGulfYatchClub
thanks! Appreciate your input!
71 posted on 11/03/2001 10:01:20 PM PST by MistyCA
[ Post Reply | Private Reply | To 69 | View Replies]

To: logos
Your idea is a good one. I've even toyed with something like it myself. But whereas I'd be willing to share with some here, others I wouldn't be. I noted that you were not asking for numbers yet, but I also noted that if and when you do, your plan will make it necessary that you share those numbers with at least a limited number of other folks.

This is correct. I have however tried to cut that number to a minimum, and keep the process fairly anonymous.

To elaborate on an idea expressed above, contact information shared (even with the host) can be limited to:

This information can be divorced from your online identity, even for the "host".

How? Simple. Spend a few minutes to sign up for a new hotmail or yahoo account (using a different name than your handle here) and email your minimal contact info to whoever is serving as host.

For network quality, the host should then (in my opinion) run a quick check against his member listing, confirming that your phone number is new and that you are not a known abuser of the system. He or she should then dial your number (the main one at least) to confirm you can indeed be reached.

All this would serve the vital purpose of establishing reachability and a bit of credibility for the new member, and helping prevent any booted abusers from rejoining the system.

How?

Someone could theoretically harvest 4 phone numbers by joining. If they joined multiple times, using different phone numbers, they could harvest more than that. They wouldn't know your online identity (even if you didn't bother hiding this from the host, it wouldn't be passed on), but they would have your first name and phone number, and would know you have probably frequented this forum in some way. They also have no control over whose contact info they would get - they would simply be getting contact info for 4 random FReepers, with no link to their online identity.

Hardly worth it. However, let's assume someone does this, since some moron inevitably will.

If a member reports, say, suspected telemarketing abuse, it's going to be limited to 4 people. Since the host can easily deduce who had access to those specific 4 people, it may not be too hard to track down the culprit. Such a person can and should be excluded from the chain. If he tries to reenroll to harvest more phone numbers, he'll at least have to do so with a different phone number.

Some will complain that this isn't airtight enough. Well, it's not perfect - but personally, I do get occasional calls from telemarketers. I find out who they are and then tell them to put me on their "do not call" list. They then have a legal obligation to do so.

In fact, most who telemarket are "real" companies; I suspect only a few independent bozos would even attempt such a scheme. Though some of course would.

Others might fear that some friend of Billary in government somewhere is going to get ahold of their phone number. It's possible, but (even if you ignore the gradually declining numbers of Billary friends in government) if you follow the outlined anonymizing procedure, and generally even if you don't they won't have any connection to your online identity.

Frankly, IMO, if you've put pressure on them and they have connections and want to bad enough, they'll probably track you down from your online posts using far speedier, more reliable and efficient means.

Anyway, security of information is indeed a significant concern, but as I believe others have expressed as well, I think there are ways in which the potential problems can be made minimal. I probably haven't covered all the holes we may want to cover yet, but I hope some of the ideas I've outlined here make at least some progress towards that goal.

Thanks for your comments - IMO they have contributed towards refining the concept, which is the #1 purpose of what this thread is all about.

72 posted on 11/03/2001 10:49:27 PM PST by butter pecan fan
[ Post Reply | Private Reply | To 67 | View Replies]

To: butter pecan fan; Nita Nupress
Anyway, security of information is indeed a significant concern, but as I believe others have expressed as well, I think there are ways in which the potential problems can be made minimal. I probably haven't covered all the holes we may want to cover yet, but I hope some of the ideas I've outlined here make at least some progress towards that goal.

Yours is a well-thought out response, but I don't think you quite grasp the subtleties of the situation just yet. With your indulgence, may I offer a short "tutorial"? Thank you. :-)

I used to be in the business of finding people who didn't want to be found, let us say. When I went looking, one of the first things I wanted to find, if it was available, was a phone number of the person I was looking for. Simply put, if I've got your phone number, I've got you. Give me your phone number, pay my expenses, and in less than a week I'll have your daily routine down pat - when you go to work and when you go home, plus the various routes you take; I'll know where you buy your groceries, if you pay your bills on time, and if not, why not; I'll know the names and daily routines of the members, if any, of your family, or of the friends you live with; there are other things I'll know as well, but that should be sufficient for our purposes here today.

It's true that all this same information can be traced through a cyber screen name and the connected ISP, but it's easier for those who know how to do it to build up a series of almost impenetrable buffers between their cyber ID and their real ID. Phone numbers, even unlisted ones, don't avail themselves of such buffers.

Furthermore, as to you as an individual, I applaud your efforts in front of the VP residence last year, assuming your motives were "right". I don't want to be offensive, but it's precisely your motives that I can't know; most of us don't even know our own motives in every single instance, let alone the motives of a complete stranger.

Let me illustrate. A long time ago I was one of the rioters on Peter Fechter Day in front of Charlie Checkpoint in West Berlin. When the police charged, I ran just as hard as everyone around me to keep from getting knocked in the head. During all the beer drinking afterwards, I was fully accepted as one of "them". Yet, I wasn't there to riot; I was there to collect ID's and information on those who were instigating the riot.

I don't doubt your word that you were protesting Algore. I don't have any reason to doubt your motives for being there. At the same time, I don't have any reason to accept your motives as "good" on their face. Trust is earned; it isn't given out just to be thought of as a "nice guy". At least, not by anyone who has lived a life as long and, shall we say, interesting, as I have.

Speaking of that "interesting" life, I've been cut, I've been shot, and at different times I had two contracts out on my life. That was all many years ago, and as you can see, I'm still here. Most of the others who were involved are either dead, or too old to worry about, and so far as I know, no one is "after" me today. But ... old habits which have proved to be beneficial die hard.

Some might call an attitude such as mine paranoia, and maybe to some degree, it is. I prefer, however, to call it discretion born out of experience.

So ... to reiterate, your idea is a good one, but it still needs some refinement. I'll be gone most of the day now, so don't feel like you need to respond "right away".

[Just for your info, Nita. Checked your mail lately? :-)]

73 posted on 11/04/2001 4:55:53 AM PST by logos
[ Post Reply | Private Reply | To 72 | View Replies]

To: butter pecan fan
Not to worry. Nita is right. There's just some extensive history here, so DON'T take it personally. It comes down to this: It takes time to earn trust around here ("earn" being the operative word). You've got a fine post and a fine idea here; don't get wrapped around the axle over a harmless comment. :)
74 posted on 11/04/2001 6:45:24 AM PST by RightOnline
[ Post Reply | Private Reply | To 50 | View Replies]

To: WIMom
If a high alert area is used, what is to prevent someone from posting vanities there?

One thing would be to only allow a user to post ONCE. If a moderator, at leisure, decides the posting is appropriate, he can reset your alert-post privilege. If your post is a stupid vanity, your privilege stays revoked.

This would weed out the jokers fast enough.

75 posted on 11/04/2001 6:58:01 AM PST by SauronOfMordor
[ Post Reply | Private Reply | To 12 | View Replies]

To: butter pecan fan
bttt
76 posted on 11/04/2001 9:36:49 AM PST by Cinderreno
[ Post Reply | Private Reply | To 1 | View Replies]

To: Osinski
Ok good idea. The problem I have is what if FR is down during a crisis...like earthquake in CA or something else?
(just catching up with this thread again so pardon me if this was answered by someone else)
You could get around this by having a FR mirror sites that constantly pull out information from the FRIM (FR Instant Messenger) (tm pending). Since it is just a small fraction of FR it wouldn't involve much data transfer.
To do so would require a buy in from JimRob as it requires the site to setup a special area for the FRIM that everyone can accurately mirror.
77 posted on 11/04/2001 11:58:48 AM PST by lelio
[ Post Reply | Private Reply | To 34 | View Replies]

To: butter pecan fan
Anyone thinking of buying a scanner....
Oh and in addition: check your market. The cops / fire / etc might be on digital scanners. If so then you're out of luck, you can't easily listen to them unless you have their same gear.
78 posted on 11/04/2001 12:02:24 PM PST by lelio
[ Post Reply | Private Reply | To 68 | View Replies]

To: butter pecan fan
Some of us on FR already have it via, Paltalk and having each others phone numbers....although, we have not set rules ect...bet we'd get the word out!
79 posted on 11/04/2001 12:03:54 PM PST by D. Miles
[ Post Reply | Private Reply | To 1 | View Replies]

To: butter pecan fan
Possibly another method of notification would be some type of communication like instant messenger. Some of us leave our computers on overnight, and with the volume put up all the way, I'd be awakened by a message. All the important info could be in the message. But....how many people are we talking about in my "address" book in case I had to do the notifying? LOL
80 posted on 11/04/2001 12:15:02 PM PST by joathome
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-94 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson