Beyond the Cusp

December 17, 2014

Has the World Gone Crazy? Government Wants to Look and See

 

Thus far this week we have witnessed too many instances of violence from all across the globe with none of it making much sense. There was the taking of hostages in a small eatery in Australia with a wannabe ISIS crazy who amongst his demands insisted on talking to the Prime Minister of the country. There was a Taliban raid on a Pakistani school murdering innocent children with the count approaching one-hundred-fifty and nearly countless more reportedly in area hospitals, let’s pray it does not exceed that number. The United States did not miss out as a former Marine went on a killing spree in Philadelphia northwestern suburb in Pennsylvania murdering his ex-wife and her sister, mother, grandmother and two children of the sister as well as shooting and injuring the sister’s husband. These, as with too many murders reported unfortunately almost daily, are the actions of disturbed minds or people blinded beyond sanity by their cause will remain beyond our ability to understand. Where the twisted reasoning behind any murder may be beyond the ability of our ability to discern and understand, efforts should continue to see if any discerning and identifying character traits or other determining actions and indicators can be discovered such that in the future some of these grisly events can be prevented. We will probably never have the ability to prevent every time somebody goes beyond all societal norms and commits some act of violence tearing a hole in society as a whole.

 

The question we as societies will need to answer is how far are we to permit law enforcement to go both in their abilities to collect information and survey public or even private areas in order to prevent crimes and provide a higher level of safety in their efforts to circumvent crimes, especially crimes of violence. There are already increasing usages for cameras and sound detection equipment in cities throughout the world with London taking the lead as the most surveyed city with sound detectors and cameras placed throughout so that they can see virtually every area of the streets, river, shopping centers, service alleys and probably the darkest recesses and corners throughout the city. Surveillance carried out to such an extent combined with the advancing artificial intelligence advances in computer technology including facial recognition software, gait detection and profiling which will lead to computers monitoring the entirety of these cameras and potentially adding the microphones so that they can discern every spoken word and conversation using software collating the data in order to alert police to suspected criminal acts they determine are imminent. The police would be directed in the hope that their mere presence would prevent the crime and to interdict any criminal act as soon as it occurs or prevent any violent action intervening at the predicted moment such violence might occur. It would be a virtual future crime system used as deterrence and placing police exactly where they might be needed moments before any criminal act. For crimes such as theft or a holdup such a system would likely deter many criminals but then how far would such a system be empowered. Would they use such a system to determine the name of a person crossing a street in other than a designated crosswalk and send them a summons or ticket just as speed cameras and red light cameras do in many cities currently? Such a system would potentially provide a huge increase in revenue which could potentially completely finance the entire police department.

 

If placing cameras and listening devices all throughout our cities and towns is acceptable, then what if the government decides to go further? It would start with a program where the government would give people payment if they were permitted to add any monitoring cameras and sound devices people currently had in their homes and businesses. The program would begin innocently and be voluntary so what would be the harm, people could simply say they have no interest and such a program might make others who would be unable to afford an alarm system with cameras and twenty-four hour monitoring and such a program would be enabling more homes to be monitored and kept safe. What argument could be made that this was not a good thing and it is still voluntary, right? Then the government would eventually see this as now a right they could extend as were not most of the people who had systems voluntarily opting to join the government subsidy. Anyways, anybody now refusing the government mandated monitoring systems and the government including these systems in their extensive monitoring would be proof that you have something to hide. The thing is such a demand would not be instituted until the vast majority of the public had already agreed to this monitoring by the government and nobody had been adversely affected, so where is the harm in government placing monitoring in every home. Such monitoring would keep homes safe from burglaries while people were at work and where would be the harm? There was a time when people would only accept a ticket if it was written by an officer who had witnessed their exceeding the speed limit or running a red light. Nobody would accept a ticket from a camera radar trap and receiving one would result in their going to court and demanding to confront their accuser. Initially this defense was accepted by the courts and then the city council allowed for a regulation, or even passed a law in some instances, that made these tickets legal and no longer permitted the defense of demanding to confront your accuser and thus no judge would accept that defense. It has become common for camera evidence to be considered superior to an eye witness’s testimony. Add facial recognition and cameras can be utilized to identify people beyond any reasonable doubt in most courts. Where these automated law enforcement technologies will end is anybody’s guess. The camera and the microphones are just the tip of the coming iceberg as we can expect explosives detection systems placed in sensitive areas or places where large crowds are expected to form such as malls, ballparks, amusement parks, concerts, fairs and special events as well as whatever devices and data gathering system which have yet to be developed. Many of the larger ports and other commercial shipping and mass travel systems including trains, planes and ships have detection equipment which checks the luggage or shipping containers as well as magnetometers to check the people while visual checks are made of carryon luggage and bags. These detection devices are simply a computerized version of using a dog or other trained animal and currently almost as reliable and their evidence is acceptable in a court as sufficient evidence for permitting an officer to search and arrest any person refusing the search in order to search the person once in custody.

 

There are numerous types of surveillance equipment with abilities which would astound the average person readily available to police departments should they care to make the outlay funds to purchase such devices. There is equipment which can listen to a conversation simply by placing an invisible laser onto any window to the room which the conversation of interest is being held. This technology has progressed to the point that one would need to cover the window with sound dampening screens or external cover such as aluminum storm shutters. There are systems which can see through walls with amazing detail capability. There are systems being researched which will allow governments to monitor people in ways they likely never imagined. People can be tracked by tracking their cell phones. Using your cell phone a person can be located to within ten feet and their cell phone can be activated to listen to any noises or conversations within the ability of the microphone to detect. Even the cell phone camera can be activated though such is often not very revealing as if the phone is in a purse or pocket the video will not reveal much. There are ways to monitor people’s computer usage as long as their computer is linked to a network which has internet connection active or if the computer itself is connected to the internet. The invasions of our privacy which government can potentially utilize if they wish to monitor our lives covertly are astounding and place every individual potentially in a very compromised position even without their knowledge. These are simply implications of the modern world we all reside within. But then in a world where many of us post even intimate information about ourselves on Facebook, Twitter, YouTube, Flickr, Instagram, Vine and others, why would many of us complain or have any problem with the government monitoring our daily activities. Perhaps the government could start their own social media site and simply put videos of some of the craziest things they monitored and maybe also the top ten crimes of the day. The one prediction which can be made safely is that privacy is a quaint idea whose definition is growing ever smaller with every passing new technology. Perhaps any legal definition claiming that we have unalienable rights to privacy, that our homes are inviolable or that our papers, effects and private information are secure from search or seizure without a court order, summons or warrant are simply cute little ideas whose potential possibility is nil in our high-tech world where information rules and those who can best gather information rule. In simpler terms, if one wishes to have privacy they best be prepared to make a sizeable effort to assure that their desire has been attained. Thomas Jefferson once wrote, “Eternal vigilance is the price of liberty.” Perhaps this could be adapted to modern times where we add that not only is eternal vigilance is the price of liberty but also the price for personal privacy from government. It could be argued that privacy is necessary to have liberty and to have real freedom. To be honest, it is rightly well worth the effort and allows one to sleep better each night.

 

Beyond the Cusp

 

June 11, 2013

Prism, Echelon, Unlimited Data Mining, the NSA, Where Did it Start?

We are hearing stories and rumors, facts and flights of fancy, truths and misdirections, and enough information overload to the point that our heads are spinning and we end up so confused that we likely just shake our heads, take a couple analgesics for the headache and go off to forget the whole mess. Unfortunately, once we know that our every communication, our every internet search, every web site we visit, every purchase we make, and even our every move is being tracked, stored and can be retrieved any time in the future and collated to make any story desired about us believable. Add to that the fact that with computers tapes can be made in which there is nothing that cannot be produced showing us doing anything from sleepwalking to murder and saying anything from the kindest compliments to the worst treasons. When we delve deeply into the potential powers that the government could use in nefarious efforts to paint us as guilty of any crime and part of any conspiracy which they could ever dream up we realize that the powers that be have the ability to make our lives into whatever scheme their sick little minds desired. But at some point in our paranoid fog the thought creeps into our consciousness, when and how did all of this start and how long has it been turned against the people?

 

The beginning of modern data mining was espionage, both between rival city states and within city states by the different members of the ruling court. Espionage was accepted by the common person as it was something that did not affect their lives and it also diverted the ruling classes from further ruining their lives. That has all changed as it is now utilized by governments in order to control the lives of the people. Totalitarian governments have long been known to have secret police and entire departments within their governments which collected information on the general public and went even deeper on persons of interest. The targets usually contained the wealthy, political activists and anybody who was thought to be a potential problem, threat, rival or simply somebody who may need some convincing to assist with gathering information on any others. With the advent of the electronics age espionage became both more technical and also easier to employ against a wider set of targets. Even as electronic data increased geometrically, the ability to gather and store data increased exponentially far outstripping the rate of increase of available data. The unfortunate fact is that the ability to collect data has reached the dream point for the political class as they can now record everything. And since they have the ability to collect every iota of available data they have reached the obvious conclusion, they collect everything, why not.

 

The first major data collecting on masses of people in the United States where anybody who may be of use or importance was monitored for whatever secrets or damning information that could be uncovered was FBI Chief J. Edgar Hoover. His files on politicians, leaders of industry, and anybody who was somebody became stories of legend. But J. Edgar Hoover would have salivated had he ever seen the NSA system known as Echelon, the forerunner of Prism. Echelon was preceded by international signal monitoring between nations but Echelon was capable of such volumes of data gathering as to make everything preceding it seem almost amateurish. Today’s data mining capabilities make Echelon appear almost primitive. Echelon was implemented over a quarter century ago and gave the NSA (National Security Agency) unprecedented capabilities outstripping their wildest dreams of the founders back in 1952. With Echelon the NSA finally realized their dream of having the capability to collect data on almost anybody their little hearts desired. But even the immense gathering powers of Echelon were outpaced by the amounts of data being generated very soon after its inception with the addition of general use of the Internet plus cell phones and a simple explosion with the advent of the electronics age. The onset of the electronics age also provided the solution to the unimaginable amounts of data generated. This presented the NSA with the opportunity to meet the challenge before them, the ability to collect all data from all sources. This required an extensive storage facility. That is exactly what the NSA just officially opened in Nevada where they estimate they have sufficient storage medium to store every electronic signal generated worldwide for the next century. Even if it only does as advertised for half that time, it will still have been an impressive system.

 

Echelon caused a stir amongst many people who follow government abuses, politics and conspiracy theorists. Much of what was known in the public about Echelon was refuted by government as the NSA and others denied its existence. Eventually, like anything which requires large numbers of people to run the equipment and make the raw data into something presentable that had real uses and meaning, the secret got out and enough became known that denial was no longer possible. Armed with the experience of the warnings and denials over Echelon, the revelations about Prism are easily believed by the people and thus no attempt appears to be in the works for denial. That leaves the government with the choice of facing the music or making what they are doing appear to be both necessary and innocuous. Trust one who was a believer and ever suspicious of Echelon, Prism is every bit as dangerous with levels of misuse beyond the wildest of imaginations. We have already been witness to the powers of Prism. General Petraeus and General John Allen were early victims of the powers of Prism as they were disgraced into retirement by the revelation of their private emails. The information of their emails that were released did not result from their government email accounts but from their private email accounts. The power of Prism became evident in these two cases as once those who wished to destroy these men’s lives took the knowledge that there had been emails that might be of a questionable nature and then gathered the entire history of these emails simply be entering a query into Prism data search and waited for the results. Presto, everything that matched the query for the past decade at their fingertips to use in any manner against these men. These were private emails and before you claim they should have known better than to leave such evidence, what would your bosses think if they had access to every email, chat, instant message, tweet, and Facebook entry you have made over the past decade? Would your job be safe? What about that comment you made after a particularly bad day about that slave-master who runs your office? That is the potential damage anybody in our government with access to Prism can bring down on any citizen of the United States for the foreseeable future. I am fairly sure that Prism also is collecting data from other nations as well and its capabilities are being made available to friendly government within limits. With Prism now fully activated and connected to the immense storage facility in Nevada the government can continue collecting every electronic signal and run their queries at their convenience as the data will be available for the rest of time, well, in theory at least.

 

Some may be interested in what are the main differences between Echelon and Prism other than the sheer immensity of the data that can be stored indefinitely by Prism versus Echelon. Well, that actually is the basic difference. Under Echelon the government entered key words and phrases which could be adapted depending on what were deemed to be of interest. With Echelon they had permanent key words such as bomb, President, terror, attack, assassinate, kidnap, Echelon, and the names of important or noteworthy people. When a piece of data crossed the Echelon data input channels containing any of these keywords it was saved and if it contained the right combination or sufficient numbers of key words, it was marked for review by an actual person. Echelon was monitoring all the trans-Atlantic phone cables, satellite uplinks and downlinks, Internet providers’ data points to the Web, and numerous other data points which were considered necessary or sensitive. The main deficiency of Echelon was the amounts of data it was capable of both storing and monitoring. Prism does not have such limitations as it has the capability to take in all the data that the NSA can manage to find a method to intercept. There is no requirement for keywords with Prism. Using Prism does require keywords but they can be entered well after the data was stored, not using them as a hurdle to clear in order to be stored. When accessing the Prism database one enters the names and keywords which they wish to pull the data on just like we do when searching the Internet. The difference is Prism has far more data than the Internet and Prism can track any piece of data in its memory back to the person or people who were parties to the conversation or otherwise connected to the data. Prism has another capability that too many will be even more ominous. If you wish to track the movements of someone you only need to enter a few key numbers to gather tracking information for them from that point further. Whether Prism has the ability to track one from past data it would likely be limited to tracking where any person received a cell call or used their OnStar or tracked their lost vehicle. Any way one looks at the power and potentials for misuse of Prism, it definitely is a sign that Big Brother has arrived and we may soon need to monitor our every facial expression so that our faces do not arouse suspicions, after all there are cameras almost everywhere.

 

Beyond the Cusp

 

Blog at WordPress.com.

%d bloggers like this: