
The title is required, and must contain letters and/or digits.
It is not possible to 'steal' IP. Therefore there as no such thing as theft of IP.
It is, however, possible to be in breach of IP laws. Which is NOT the same as theft/stealing.
12 publicly visible posts • joined 21 Jul 2009
Sure, on average across the entire public sector this may be true. An office clerk in the public sector probably gets more than one in the private sector, but when you move to professional services, doctors, lawyers, engineers, IT people, those specific professions tend to get more in the private sector.
As an IT professional, I nearly tripled my pay leaving the public sector and becoming a contractor doing the exact same job. And my colleagues who left into private industry as full time employees to places like IBM, CSC, Sun, Novell etc always got at least 30% more, at least. Some (obviously the extradordinary smart cookies) sometimes got 6x the pay as a full time employee.
Nowhere in the article did it say terrorist watch lists.
There are many different watch lists, for terrorists, known criminals, people not allowed to leave the country for other reasons...
A perfect example is when there is a divorce between a couple where one of the couple has a different/dual citizenship. It's been know for the partner with a foreign citizenship to leave the country taking the children with them against the wishes of the other partner. Therefore in these types of situations the children themselves could be put on a watch list such that they can't leave the country unless accompanied by both parents, to prevent them being whisked away outside the jurisdiction of the US divorce proceedings.
Those 'encrypted' communications through the blackberry are also routed through Canada or UK where it has been shown recently that various governments can have access to the unencrypted versions of those communications.
So, use 'encrypted' blackberry comms from say one office in Berlin to another office in Berlin that route through foreign soil where those foreign governments can get the unencrypted data, or send an unencrypted SMS which doesn't leave German soil.
Or even better use a smartphone that uses the local cell network (again doesn't leave German soil) and use encryption technologies on that comms stream.
Consider.
At date/time X, IP address Y, which probably did some sort of google search during the period of capturing, hence is associated with permanent cookie Z.
So google now knows cookie Z came from IP address Y at this street address.
Now your dynamic IP kicks in and your IP changes. But guess what? Your google cookie is still Z, so now you have IP Address A, but still cookie Z, and since they know the address of Y that also used cookie Z, then the overwhelming likely hood is that IP address A is also from the same physical address as Y. And again when the IP Address changes to B, C etc, you still have cookie Z as the Primary Key across all the IP changes. This is assuming you use google searches, which the majority of people do, and that you don't block cookies, which the majority of people don't do
Now, there are exceptions to this, such as if you are using a mobile device transiently etc. But the vast majority of the information collected would be from static devices.