SEARCH SUMMARY and MOVIE SUGGESTIONS are: The movies Nim's Island, Eagle Eye (2008), The Bourne Identity (2002)/Ultimatum (2007)/Supremacy (2004), Slumdog Millionaire (2008), Body of Lies (2008), Firewall (2006), Antitrust (2001), Live Free or Die Hard (2007), Enemy of the State (1998), Swordfish (2001), and The Dying Gaul (2004) involve the use of the concept that a computer or internet search or data base can exist to be helpful. Deception, Untraceable and Demonlover are about Internet sites that broadcast actual torture. Southland Tales (2006) and Yes Man (2008) are cynical comedies about Homeland-Security-type agencies investigations or spying! Domino, Changing Lanes, Code Breakers, and Breach suggests local and federal government's computer records are not secure. Cellular, Pineapple Express, and Paul Blart: Mall Cop suggest that the phone can be used to access computers or locate persons using ping, geotrack, electronic taps; or sounds may acts as signals to access data. Mission: Impossible III (2006) and Fast & Furious (2009) give an indication of the status of computer data recovery or transfer at government level! DOCUMENTARIES ARE: (2001) and We Live in Public (2009). The internet is used mostly for convenience and likely is NEVER COMPLETELY SECURE! AT WORST, IT CAUSES ADDICTION DUE TO CAUSING A TRANCE LIKE STATE THAT THE SUBCONSIOUS IS REACTING TO. THE WORST PROFITEERS IN THE INDUSTRY MAY HAVE NO RESPECT FOR EITHER PRIVACY OR PROPERTY RIGHTS. If a person visits too many sites they can be redirected to another fake site, distracted by popups, get their identity stolen, or any other number of nuisance problems can occur. The industry insiders may have extreme and unfair influence over all three branches of the government, and may own or control most of the main stream media. Therefore, it may be almost impossible to control the lawlessness of the industry. Websites in countries outside of the control of the government may be impossible to control and the same is true for communication lines; therefore, it can be similar to dealing with terrorists! THIS AUTHOR URGES THE READER TO NOT ATTEMPT TO GO TO ALL BUT THE MOST RESPECTABLE OF SITES IF NECESSARY. It might be best to consider the entire internet an unhealthy experiment, and wonder if computer addiction encourages other addictions that can wipe out an entire generation's assets! The goal of almost all search engines or internet server providers may be to collect and analyze data and/or to get persons onto their servers (they may almost all be insecure data addicts, and this likely goes back to feelings of being isolated or unwanted in childhood!). Almost all phone lines can perhaps be spliced into or have their light signals captured, and likely some of this is done illegally by foreign countries; when it is done with a possible court order or search warrant it is called lawful interception. Most programming is not set up for long use, and poor computer set-up causes strain on the body. Glare from excessive light on the computer screen on a light colored background can help destroy the eyes. Some suspect some computers have a hidden camera in them! Likely rarely is the Internet secure; it is mostly used because it is convenient. Likely the persons with the most powerful computers can hack into almost any system or break almost any code.