{"id":6679,"date":"2015-07-15T14:47:31","date_gmt":"2015-07-15T19:47:31","guid":{"rendered":"http:\/\/hcstx.org\/?p=6679"},"modified":"2015-07-15T14:47:31","modified_gmt":"2015-07-15T19:47:31","slug":"ever-wonder-which-words-will-flag-you-as-a-terrorist","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/07\/15\/ever-wonder-which-words-will-flag-you-as-a-terrorist\/","title":{"rendered":"Ever Wonder Which Words Will Flag You as a Terrorist?"},"content":{"rendered":"<h1 class=\"entry-title\"><\/h1>\n<p>I urge all my readers to go to the site listed below<a href=\"http:\/\/projectseen.com\/\">\u00a0projectseen<\/a>\u00a0and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as &#8220;spook words&#8221;.<\/p>\n<div class=\"entry-meta\" style=\"text-align:center;\">\u00a0<span class=\"meta-sep\">by<\/span> <span class=\"author vcard\"><a class=\"url fn n\" title=\"View all posts by Joshua Krause\" href=\"http:\/\/www.dcclothesline.com\/author\/joshua-krause\/\">Joshua Krause<\/a><\/span><\/div>\n<div class=\"entry-meta\" style=\"text-align:center;\"><\/div>\n<div class=\"entry-content\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\" size-full wp-image-117096 aligncenter\" src=\"http:\/\/www.thedailysheeple.com\/wp-content\/uploads\/2015\/06\/hacker.png\" alt=\"hacker\" width=\"500\" height=\"375\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>By now, we all know that the <del><a href=\"http:\/\/www.dcclothesline.com\/2015\/06\/08\/new-nsa-inspired-barbie-records-kids-conversations-and-uploads-them-for-analysis\/\" target=\"_blank\" rel=\"noopener\">NSA<\/a><\/del> is spying on us. They <a href=\"http:\/\/www.dcclothesline.com\/2013\/08\/01\/meet-xkeyscore-the-nsa-can-spy-on-your-private-facebook-chats-emails-and-even-your-browsing-history\/\" target=\"_blank\" rel=\"noopener\">read our emails, our texts, our<del>Face<\/del>book posts<\/a>, <del>passwords<\/del>, and they even listen to our phone calls. They record every<span id=\"more-50085\"><\/span>thought we utter and every web<del>site<\/del> we visit onto massive <del>data<\/del>bases, and use sophisticated algorithms to predict our actions. But how exactly do they decide which of our thoughts are\u00a0<del>threat<\/del>ening, and which ones are harmless? Which <del>words<\/del> have the potential to <span id=\"IL_AD12\" class=\"IL_AD\">flag us<\/span>as terrorists? The answer may surprise you.<\/p>\n<p>Read the Remainder at <strong><a href=\"http:\/\/www.dcclothesline.com\/2015\/07\/15\/ever-wonder-which-words-will-flag-you-as-a-terrorist\/\">DC Clothesline<\/a><\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>I urge all my readers to go to the site listed below\u00a0projectseen\u00a0and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as &#8220;spook words&#8221;. \u00a0by Joshua Krause &nbsp; By now, we all know that the NSA is spying on us. They&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[13,74,1317,883,1132,65],"tags":[180,183,1683,1766,1684,1767],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6679"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=6679"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6679\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=6679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=6679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=6679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}