Beyond the Cusp

May 6, 2014

Can We Trust Future Technology?

Whether you call it Artificial Intelligence, the Singularity, Future Tech or any of probably a few hundred specific areas or identifiers of what future challenges are approaching faster than we are preparing safeguards or educating people to facilitate acceptance, and will acceptance even be desirable? Some of the recent big news stories have dealt with data mining and the use of massive amounts of data in predictive technologies. But there are other uses of these exact technologies which we do not appear to be anywhere near as concerned about other sources using these exact same technologies and very likely with less oversight such as charge card companies and retailers. Then there is the eerie side of the education system known best as Common Core which includes large amounts of data mining on the children as a part of their educational experience presumably to be better able to tailor the education system to each child’s predetermined preferences and likely path in life as determined by the data. One of the fears is this information could also be utilized to spy on and make determinations about the student’s home life and might be applied by the government to make determinations which families might be at risk for undesirable behaviors or activities. If you do not think that any of this is a fast approaching problem then try to explain why whenever you do a search for some retail item or make a few purchases online that your computer begins to display advertisements of related and similar items in the pop-up advertisements. This is accomplished through very similar technologies to what the NSA (National Security Agency) and other government law enforcement and spying agencies were accused of applying to the data mining information that caused such an outrage recently. Somehow the fact that Google, Target, Amazon, Wal-Mart and who knows who else including technology companies and advertising agencies are increasingly using to better mold their advertisements and sales promotions in order to increase their revenues by better targeting trends and potential approaching markets. The one truth we all are facing is that as technologies advance and are refined and improved our privacy becomes more threatened to the point where many of us have probably already redefined personal informational privacy downward lowering expectations of remaining anonymous.

 

There are those among us who have already altered our lives to attempt to forestall the onset of completely and totally compromised personal privacy. Some refuse to use Google when they search for items, but is Google actually contributing to the search engine you use instead and thus you still are feeding the Google data mining which they have admitted to using in their research to produce a better Artificial Intelligence software and predictive analysis algorithms all presumably to better serve us in the future. But are their intentions really all that altruistic or could there exist deeper and darker motivations in their use of our search terms and other on-line activities. With Google we are almost completely defenseless against their attempts to gather the data about us as they continue to swallow up new technologies and smaller companies to the point they are almost omnipresent in everybody’s on-line lives. Then there are so many possibilities for character data mining and experimentation which can be incorporated within the plethora of on-line games and interactive on-line experiences and sharing services such as Twitter, Facebook, StumbleUpon, LinkedIn, Tumblr, Instagram, Flickr, MySpace and other social networking sites even including the one no one admits to ever using any longer, AOL, you know who you are, and so do the data miners. The one good side to using AOL is that the data miners likely refuse to store data on you. Many have probably forgotten but there was a time when AOL was the Google of on-line social interactive media and search engines but that was another time and almost seems like another reality and so innocent and almost primitive compared to Google and the rest of today’s on-line media and social activities. Still, these interactive social media and life sharing sites we provide so much telling information about ourselves that we really do not appear to really be concerned with the amount of information and personal data we provide or how it can and will be used and not necessarily in ways which we would be completely comfortable about. So, where should we draw the line and claim no further intrusions and should these lines apply to private industries and companies or solely apply to government agencies and departments which are presumably restricted from many of these type encroachments into our lives and information by the Constitution. Amendment IV states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” The question will pivot on the definition of what is unreasonable and how invasive would we define an acceptable level of gathering data on us and recording our communications on open networks and public forums. The younger generations appear generally to be less concerned as their lives have been lived with the all-pervasive technology and universal data sharing and personal on-line presence which is openly available to almost any and everybody while those of us who were raised during the ultra-high-tech Etch-A-Sketch era probably fear these technological advances and intrusions far more.

 

The next concern, or at least it should be, is how far will these technologies go and what can we expect future society to resemble. Will we have precogs facilitating the arrest of people for future crime as in Minority Report or will we have to have a special law enforcement department to hunt down artificial humanoid life forms as in Blade Runner or will the future resemble the horrors and enslavement of humankind depicted in the 1927 futurist movie Metropolis. The decisions of how far is too far and what qualifies as unreasonable or too invasive is something which society needs to address and define now and not wait until the technology creates a situation where the consequences are so abhorrent and unacceptable that the decisions made subsequent to this almost predictable coming disastrous circumstance that many beneficial technological applications are made illegal or restricted causing a new problem where avoidable problems are not revealed as a result of the overreaction to the initial misuse of technology. The consequences of upcoming technologies will be astounding even to the most techno-savvy amongst us and quite probably horrifying to those of us less comfortable and acquainted with the possibilities and influences which are coming into existence spawned as a result to the power of information technologies. This will be an even more worrisome situation with the IRS now will not only hold a complete financial inventory of virtually every American citizen but will also have universal access to the health records of the vast majority of American citizens and all should Obamacare actually fulfill its objectives of instituting a single payer government provided healthcare system. Adding this level of data availability across the departments of the Federal Government to the potential metadata collected by the NSA and with the storage and retrievability capabilities of the new data storage complex built on a two-hundred-forty-acre site near Camp Williams outside Bluffdale, Utah, the ability to profile not only every single American citizen but also every individual holding positions of power in every national government in the world along with a sizeable percentage of people simply deemed of interest and you have an incalculable potential for evil pursuits beyond imagination. The coming technological society will be something so beyond anything we can imagine, as the people developing these technologies are far more imaginative than the average person and even if they have only the milk of loving kindness in their hearts, the potential for somebody with nefarious intentions within the companies at the leading edge of these abilities cannot be ruled out, or at least should not be ruled out. The future has the potential to make life enjoyable and promising beyond belief but with such ability it can also turn in a completely opposite direction, and since the government is partnering with these efforts and underwriting much of the research, can we trust the government which includes among their members the most hated politician of your choosing. Imagine the worst example of humanity from the White House or Congress and imagine their having their fingers on every piece of information about everybody and the ability to predict future actions with a believably high level of accuracy and try to find what would be considered off-limits to these politicians. If that does not scare you then you either live the most pure lives ever lived or have no reason as nobody is without sin when it comes to political expediency. I, for one, wish and hope that the future will be all flowers and sweet music but in order to make that so, I also will expect the worst from those with whom we place our trust to make the laws and run the nation and even the world. Watch, verify and constrict government for as George Washington quipped, “Government is not reason; it is not eloquent; it is force. Like fire, it is a dangerous servant and a fearful master.”

 

Beyond the Cusp

 

April 17, 2013

Another Visit to the Liberty vs. Security Debate

No article on this subject can avoid quoting one of the numerous variations on the Benjamin Franklin quote where he said something close to these reputed words, “People willing to trade their freedom for temporary security deserve neither and will lose both.” Often simply quoting Ben Franklin is enough to consider the discussion closed, but where does one draw the line allowing for the most amounts of freedoms and liberties while also ensuring comfortable levels of security. This is where the normal discussion debates the different segments which governments utilize in order to provide security and in this information and computerized age the line can be crucial and must not be drawn with any lack of clarity. The advent of miniaturization, high powered optics, computerized facial recognition software, super-sensitive microphones, spy satellites capable of reading newsprint from orbit, thermal imaging which can “see” through walls, laser sound detectors which can monitor conversations in a room by measuring the slightest vibrations of the glass in a window, abilities to activate cell phones in order to use the camera and microphone to monitor the room were the phone sits, electronic data surveillance capabilities and processing with untold capabilities, universal electronic monitoring capabilities, and other items which easily have the ability to make privacy a quaint old idea whose time has long passed. The majority of the capabilities mentioned above have existed and been utilized by the majority of governments in the industrial world since the middle 1980s or the early 1990s at the latest. The capabilities available to current government agencies leave the citizenry absolutely no place to hide and their lack of knowledge of any person of interest that is being monitored could only be explained by human error. For those who might propose that there are limits on the government spying on their own citizens, I am happy to report that you are correct in your belief that laws guard the individual against unofficial warrantless searches and data gathering. Unfortunately, for quite a while now there has been a treaty between the English speaking nations of Canada, Britain, United States and Australia concerning this problem. By this treaty a list of persons of interest from each country is presented to the other nations who in turn request surveillance on these individuals of their home country by one or more of the other countries. Often each of the member countries would request different set of requests thus should one request be discovered the rest of the investigation would remain undisturbed. The home country then collects the information and passes the raw data which is processed by the foreign nation. Once the data has been organized and processed it is returned to the home country which wished to observe one of their citizens.

The one reassuring item is the ability that governments have displayed for incompetence and missing the forest for the trees. I would not want my privacy or worse to depend on the government’s incompetence but with the investigatory powers available to the government with all the modern data processing and state of the art sensors, no individual is beyond the government’s ability to be able to tell you all of your most guarded secrets and even the smallest of facts no matter how mundane and inconsequential. With all the technical abilities available to law enforcement and intelligence agencies it is remarkable that any crime is able to be committed without the authorities lying in wait before the crime has been committed and nabbing the lawbreaker in the midst of the crime. About the only thing lacking for the government to attempt to emulate the movie “Minority Report” are the psychics wired up to a computer in the basement of the FBI future crimes division. The government is currently gathering agreements with credit card companies, banks, credit unions, communications companies, utility providers and so much more to get them to allow the government to splice into their data banks and use all the data they have gathered on anybody without any need to bother any officials for permission. This includes the coming smart meters measuring electricity and in the near future smart grid appliances which will be capable of reporting each individual appliance and its use of power. This will also allow remote control of these appliances, remote setting of thermostats on heating and airconditioning units, even recording the number of times the power to the refrigerator increased by the small amount that turning on the light causes when you open the door. So many items which were purely science fiction a few decades ago are now or soon to be possible to government in order to inspect every tiny bit of minutia concerning your life.

Benjamin Franklin would become apoplectic if he was transported to our modern world. Once he realized the powers to intrude into the citizens’ private life by government he would likely turn hermit and remove all electronic devices from his residence. Paranoid delusions would be the likely psychological diagnosis of Ben Franklin’s mental breakdown as he was taken away babbling something about liberty has died in his dear loved country of America. The debate of how much liberty or freedoms we might compromise upon to grant government the necessary powers to make us more safe is mute and no longer necessary. We no longer have any liberties or freedoms against government interference and monitoring of every iota of our existences to trade away for security. The real problem is that even with total knowledge at their fingertips the government is still incapable of providing us with absolute security. Yesterday’s bombing in Boston stands as a case in point. About the only power the government does not possess is to be able to read your mind and know your intent, though there is a partnership between the government and Google working on understanding how the mind thinks and developing AI (Artificial Intelligence) where the government will permit Google complete access to the vast majority of their collected data collected by government agencies such as the IRS, Census Bureau, and many others at all levels of government, Federal, State, County, Township and City. They are gaining permission from all levels of governments around the nation with promises of providing better services and other benefits from this research. The amounts of data mining being accomplished by government at all levels is beyond imagination and the lack of security in our persons, houses, papers, and effects has dwindled out of existence and with it our rights as guaranteed by the Fourth Amendment which reads;

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

Liberties and Freedoms as envisioned by the Founding Fathers have evaporated before the heat of advancing technologies. There is virtually nothing which can be considered beyond the government’s ability to know if they are persistent and bring all of their capabilities to bear. The only hopes we have is to retain our protections against having such information from being used against us in a court of law. Beyond that we are likely fighting a losing battle. Our hopes for security of our privacy are now relegated to the whims of government bureaucrats and the officers of the government. Should this make you feel uneasy and raise your levels of concern then you probably have a desire to some level of privacy from the encroaching eyes, ears and sensors of government. It is not so much that we the people have surrendered our liberties, freedoms, and privacies as much as it is the government’s power to compromise these rights have become overtly formidable. How we regain the upper hand in this struggle is beyond me but that does not mean it is not an effort worth taking. If we can rescue even the slightest measure of our eviscerated privacies then any effort expended was worth the struggle.

Beyond the Cusp

Blog at WordPress.com.