Remember in my Myth-Conceptions article that I warned: “Some will call me a Troll. Some will think I’m an Agent Provocateur. Most will think I’m full of more crap then a Christmas Turkey. And before someone starts PM’ing the Administrators about me being some agent of disruption, consider this: Those folks are already here. And have been here for some time.” But those that know me will agree that I will play the Devil’s Advocate on occasion. I have no qualms in arguing against my own beliefs. This is one method to insure that I’m not blinded by outside influences. That can also be a handicap. But this post is not about myself but the Board as a whole. (Yeah , I know, it sounds damn arrogant) Big Brother is a concept brought about by an English writer who was writing about Stalin and the horror of Totalitarianism. And there has been the questions concerning if Big Brother has been watching the Board. But the answer to this question is not if, but how often. Let’s venture through the gray cells some concerning this possibility. Let me play the Devil’s Advocate. Oh, and remember, this Board has already been hacked at least once. First, look at the membership roster. Notice how many members show up at least once a week, yet have never posted. Auditors? But a good agent will post to insure he gets some action. Remember, anyone can gain access to the Monkey. All they have to do is apply. No Background Check Required. So here I am, the Head of the Department of Cyber-Intelligence on Terrorism. Considering that the FBI once placed Survivalists and Militia on their watch list, I must also observe who is saying what about whom. But considering everyone posting is using nicknames and are posting very little useable information in their profiles, how is the best way to ID each person. Enter my senior programmer. First he buys all the updated Firewall programs. Dissects them until he knows where the holes are in each program. And they all have holes in them. Now he designs a tracking bot to resemble the ones used by Proctor & Gamble to see where people are going and shopping for on the internet. But this one does not just watch where you go, it delves deep into your computer for the personal information stored in there. It’s primary search program is to copy and send your connection phone number back to a specific computer for further research. Note: Every time you post a message to a bulletin board, you leave a traceable code in the board’s server. This code is traceable back to your ISP, which in turn keeps a record of what connection phone number is tied to that coding. The Tracking Bot just has to follow the bread crumbles and get by any firewalls you might have installed. Now I have your phone number. And if for some reason, the modems memory contains more then one phone number, then it becomes only a simple search to determine which one belongs too a residence. But a secondary program built into the bot is still working in your computer. It is digging deep into your stored memory for any trace of Name, Address, Credit Card Number, etc., that is stored on the computer from previous shopping activities. This is just for confirmation at a later date. And if we really want to get fancy, we will dig into the Boards Basis Program and arrange access to every PM sent by virtue of a Back Channel Copy which will not register on either the senders or receivers computer. We can also tag a subroutine in our bot which will also give us a BCC of all your email from your computer. And even if discovered, it will look like some marketing bot that are out there by the thousands. Now I have you lock, stock and conspiracy. And all in about 60 seconds. Once the program reads it has completed it’s mission, it self-terminates, leaving behind the subroutines for mail, etc.. It might even create a “Fatal Error” situation, causing you too do a total shut-down and wiping any memory of the bot out of your system. And we all know how often computers foul up. Now I have names, and possibly faces even to tie too posts about how much and type ammunition they are buying, weapons being bought and even emergency communications methods by virtue of observing the board. Follow the conversations and determine who each person might be teaming up with for caching equipment, weapons and ammunition. Now let’s flip the coin. I’m actually the cell leader of one of the known domestic terrorists organizations located in the United States. And I need to insure that my people are armed and supplied. I now have a ready source to draw upon if my people work it right. So I decide to send a team to deal with Colossus Man. He has stated on many occasions that he never goes anywhere unarmed and the team is equipped to deal with such matters. Another team robs the West Gate Savings & Loan for expense money. The team consists of 1 female and 3 males. They locate the residence and begin a simple surveillance of the location. They ID Colossus Man and watch his daily habits. They notice he often stops at Wal Mart and picks up groceries as needed. They set up a mugging. The female is placed in a wheelchair, with her husband pushing her down the parking aisle towards the store while Colossus Man is getting ready to get into his truck. Timing is important. As he has his back to everyone, getting into his truck, the female shoots him with a tazer. After all, where is the risk of a female in a wheelchair being pushed by her loving husband? The other 2 members are in an over watch, ready to drive in, pick them up in case of trouble. The capture team quickly disarms and stuffs Colossus Man into the cab of the truck and heads off after restraining him with zip-ties. We’ll skip the nastiness that is used to gain entry into the home. They clean out the gun safe. The personal safe of gold and gems he was collecting in case of the SHTF. All the ammunition. The they go through the residence and any out building for anything that could be used by them later on. Then they put a bullet into the brain of Colossus Man and his wife. Set fire to the house and leave in his truck loaded with gear. All the gear is transferred to another vehicle, the truck is torched. And they vanish into the night. The police classify it as a Home Invasion, Robbery, Murder and Arson. It was a hit for profit. And two months later, they hit Gadget Dude, who lives alone out in the boonies, halfway across the country. No one on the board misses him for several weeks and no one can find out what happened too him. This time, the capture team leaves the house intact, but makes sure there are traces of cocaine in various places about the house. The sheriff’s office classifies it as a drug deal gone bad. You can add a third scenario using a foreign terrorist organization needing weapons and ammunition once their folks enter the country. And to top it this off, we cannot forget the cockroaches of the world. You know the ones I’m referring too. These are the folks that survive by preying on others. They figure why do all the work and prep when someone else can do it for them. Now this is much more plausible then some of the OMG situations that seem to get so much worry. So, I have noticed how easily many of the folks here like to talk about what they bought this week to prepare themselves for the dark days of survival. About caching equipment. About where and what radio frequencies to use in cause of an emergency. And what weapons they have bought. Has anyone ever heard of Operational Security? Big Brother, The Society for Democratic Reform, or the Islamic Bowel Movement now knows who, where, and what so many folks have. Who it would be profitable to rob or who might be the first taken out incase of the most feared takeover by the Druid Reformation which has been plotting the takeover of the United States since 1169A.D.. If someone wants you and what’s yours, they are going to come at you in black helicopters wearing ninja suits. They are going to come at you sideways. Remember the lady with the taser? IF she missed, don’t think you’ll get a free shot back at her. Her husband has a sawed-off H&R 12 gauge ready for action in case anything goes wrong. It’s better to kill the pigeon and flew away, then take the chance on loosing a member of the team. The backup team swoops in, picks up the pair and they are off into the sunset. Another day, another pigeon. Is what I have described possible? Oh hell Yes! Back in late Spring, I had a nice discussion with the owner of an Internet Service Provider. He said with a top notch programmer, a very good computer and the time and expense to set up such a tracking system, it could be done. The nice part of the discussion was Poacher splashing Johnny Walker Green scotch into my canteen cup as the discussion was being held about a mesquite fueled campfire. And to finally response to a comment made a couple times towards me concerning my faith in fellow man let me say this: I know mankind to be a vile, diseased, self-destructive parasite that feeds on all its surroundings without giving anything back. We are a parasite which feeds on it’s on kind for sport, profit, politics, religion or just plain madness. But for some odd reason, I know there are those about us that are good, decent people. And I have a habit of drinking good whiskey with a handful of them on a regular basis. Post-Script: I wrote this 3 weeks ago while busy with something else. If folks find it a tad crude, rude and abrasive, so be it. In my former line of work finesse was defined as using only 2 pounds of C-4 instead of 4 pounds. Survival is not for the faint of heart. I hope everyone sleeps well………. I certainly do.