It used to be you had to get a warrant to monitor a person or a group of people. Today, it is increasingly easy to monitor ideas. And then track them back to people. Most of us don't have access to the databases, software, or computing power of the NSA, F
Don't let us have all fun — you, too, can dive into the docs and help uncover the truth about the FBI's abuse of power. Much of the mischief at the FBI seems to be emanating from a mysterious “Room 4944”
Privacy is a micro concern, i.e. it refers to individual database records, while data mining tools want to learn macro rules that hold for a large fraction of the database. Techniques that publish data while preserving the right balance between individual
Not wanting to be included in Google's master database of highly personalized profiles, James Thomas decides to go it alone (well, with Yahoo, Ask, other services)...and here's the saga....
1. Programs to detect and remove spyware 2. Programs to prevent the installation of spyware 3. Programs to erase computer and/or internet usage history