Quote Originally Posted by slapout9 View Post
Found this at Danger Room. http://blog.wired.com/defense/files/...Continuous.pdf scary stuff
The question has really never been could it be done so much as it, is, will, and should be just on whom and how it is used. Protocol for this needs to be VERY implicit in its use otherwise it will simply turn into one more tool which can be used by those who may not hold themselves to (shall we say (righteous) implementation).

Anything developed to be used with the best intentions also carry's the with it the possibility of mis-application for ulterior motives