elementary-my-dear-Watson

didn't

In-Q-TEL's primarily invests in new Data Mining Technologies .



What does that mean? essentially, In-Q-TEL ciphers the internet in search for "systems" which can help the CIA data mine with ease. Something like myspace, and facebook, essentially gives the CIA access to trends in various demographics aswell as ... thought patterns and behaviors.

iCyte

free free free

free

With iCyte, anyone can simply highlight the information he or she would like to save and click the iCyte icon on the browser toolbar. Then, the data can be categorized into different projects designated by the user. Tags and notes can be added for further categorization of data, creating an easily searchable database of the information each user finds most important...



Regarding iCyte’s day-to-day uses, Foley adds, "iCyte is perfect for holding expired eBay pages, keeping blog history, organizing holiday accommodation, saving online purchase order receipts, storing and sharing student research - pretty much anything that is part of your daily internet usage." iCyte is the ideal product for college students; they can use it to store important research material for assignments, along with their own personal projects.

The reason why we need your name, email address and a password is so we can hold your work product under your identity. If we did not have your login information then we would have no way of knowing who you were and what work product to show you.



There are many well known "free" web sites such as facebook, twitter and linkedin who ask for similar information.

your

their

anyone

nunnayerbidness

private

super

if

"Career suicide."

neener

David's 1,086 word Special Report explores the following issues:



* Employment: how social networking can lead to career suicide



* Reputation: how something you say now could haunt you for years into the future.



* Malware, phishing and identity scams: how using services like Facebook and Twitter without caution could cause you serious financial loss



* Physical security and stalking: how social networks give stalkers and other scary people an almost minute-by-minute update on your habits and haunts



Gewirtz asks, will a log of Twitter or Facebook postings provide future "palling around with terrorists" albatrosses for candidates in 2012 and beyond?



As for physical risk, he says, "The potential for horror is enormous. If a criminal can easily find out where you are, what stores you frequent, what your daily habits are, who your friends are, and even what your personal food, entertainment, and beverage preferences are, you can be targeted with a level of ease never before possible."

It's not just social networking.

still

anyone

long

What's your credit score?

on and on and on