Kenn's Laws | | REAL Black History | Kenn's Essays | History & Archaeology | Weather

Why Racism is Wrong | Why White Supremacy is Wrong | Why Antisemitism Is Wrong

MUST READ ► My Horrific Experience With A Psychopath

January 11, 2016 -- Everyone knows they have a credit score. Few know they have a 'threat score,' let alone what that score happens to be.

Reports say billions of data points are considered when calculating one's threat score. Among those data points is information garnered from your online activity.  

The program scoured billions of data points, including arrest reports, property records, commercial databases, deep Web searches and the man’s social- media postings. It calculated his threat level as the highest of three color-coded scores: a bright red warning. —

The snooping is for our own good, authorities say. It helps cops sniff out potential terrorists and avert mass shootings. 

Discounting gangland shootings in the 'hood, mass shootings took the lives of 23 people in the United States last year; 14 in San Bernardino, Calif. and 9 in Charleston, SC. 

The average number of American struck by lightning per year is 234. That is, you are ten times more likely to be struck by lightening than killed in a mass shooting. The average number of people killed by lightning strikes is 33 per year. 

Nonetheless, government bureaucrats say they need to keep you safe from terrorists by watching you surf the web. 

Fresno, Calif. is one city utilizing Beware software to keep tabs on residents. 

Read more here ►

Please report typos...

▼SHARE if you think the gov't is too snoopy  ▼

More racist hate crime reports at [click here]

Source ►
Image credit: ####

Please do not submit comments containing obscene, racist, or otherwise offensive language. Although comments are not routinely monitored, offending comments will be summarily zapped if discovered to be unduly gauche.

Comment ▼▼▼ is a family-friendly web site.
If you see advertisements that are inappropriate, please notify us via Facebook messaging here ►

Permission is granted to use the material in this article providing (1) the byline is included in an obvious manner crediting as the author, (2) a link to this page is included and (3) no changes are made either by deletion, addition or annotation. Original compositions at are sometimes seeded with decoy data, such as hidden acronyms, to detect unauthorized use and plagiarism.

Comments at are unmoderated. Comments containing obscenities, pejoratives, slurs, etc., do not constitute an endorsement of this site, its contributors or its advertisors. Offensive comments may be deleted without notice.
Comment ▼


Post a Comment