A knock and talk is not getting your doors kicked in.
This is how some people get into trouble, by opening their doors for authorities.
The users wouldn't be getting profiled, It would be people that are providing serious information on how to do things.
I don't really have time to link things, nor do I think this is that big of a deal, but as for me I'm on Tor for sure.
I did provide words and phrases for you to look up on your own.
And there are sites where people have been visited by the authorities and I wont be confirming which ones they are.
The people I'm really talking to here are already aware of them, me and what I think.
Just providing food for thought/research as I have already done mine.
Oh and btw earlier I said I decrypted https streams in real-time.
Well thats not really not whats happening. Things are getting bypassed instead of decrypted but I said it that way so most people would understand I was viewing every keystroke that was supposed to be encrypted, ie passwords, chats, emails, gmails, etc..
If you would like to try your hand at some snooping, some https bypassing, just read marlinspikes site on
SSLStrip and try it out yourself on some neighboring wifi fields.
You will have to crack those first of course unless you pull an unsecured one, but accessing open wifi networks is a crazy thing to do in the first place (wifi pineapple) but that's another story.
This is just some unsophisticated playing around on zero dollars. ISPs and govs are sophisticated and get major funding for this type of thing. Add in the Patriot Act and you should at least be concerned with what you are viewing and how you view it.
Records don't get purged or lost or destroyed anymore these days, hard disk space is too cheap.
Also something that is sort of related is the wikileaks leak of Stratfor emails detailing "trapwire".