Skip to main content

Simply Irresistible




The time has come to seriously consider the implications of all the data the US government is collecting and consuming about its citizens.   For the first time in all of history, a government can peer into the private communications and by deflection the private thoughts of its citizens.  First, with the full neural net of information of interconnections between people, it must now be assumed to be known the full interconnectivity of persons of note.  Not just potential terrorists but politicians, would-be politicians, authors, commentators, newscasters, executives, even pundits, and more are swept up by this net.    If you have “arrived” you are known and fully analyzed.  Your habits are known, your pleasures are known, and so also are your friends.    A little background comes first.

About Edward Snowden, the now high profile leak in the NSA snooping scandal.  It is not what he did at this point, it is about what information he carried with him.  This fellow seems clever enough to have covered himself with tools to help his future situations. Of course, a nefarious host government will smoke them out, much to Edward's displeasure.   The other problem is how many others (i.e. NSA contractors) have done or or doing the exact same thing: harvesting information.  This is a serious issue.  With the data mining capacity of various programs available to the NSA, any operative, with appropriate keywords, can uncover the identity of any secretive email senders, and to whom they have communicated.  One simply does not need the secret email address, one can inversely deduce the identity.  This is dangerous - really dangerous.  Folks can read this post all day long, uncover my email, check on what I'm up to, but I'm basically a nobody, probably uninteresting to anyone.  But we are now at the point where big time secrets can be completely uncovered, no matter how disguised the sender may think he/she is covered.   The moral of this story is to use serious encryption software in all communications if you really want them private. Even the NSA, with all its computing power and expertise, has trouble decrypting, for example, RSA encrypted messages.

What about other countries?  Are citizens of England, France, Germany, Russia also under similar scrutiny.  The software is there; the need is perceived; the knowledge is desired; the will to thwart whatever is rampant.   All you need are ultra high capacity servers and the access to the data streams. Politicians are fundamentally nosy.

This cheap war waged by the terrorists is having far reaching consequences.  Those people know what to do and are likely doing it.  (Just think a moment or two and you can envision easy countermeasures.)  More revelations are coming.  Make no doubt.

 Let us look beyond the banal and proceed directly to what can happen and what will happen.   Or should I say, what could be.  A rule of thumb is that what could be soon becomes what is.   
You must think of unlimited computing power; you must think of unlimited software algorithms to detect even the most remote interconnectivity.  It exists.

You have an immense about of data; you have virtually unlimited computing resources; you have software engineering that can data-mine virtually any inquiry.  What is possible?  Look at an ordinary insurance salesman.  With just the name, phone number and email address, you can soon know all clients, their conditions, their driving records, and their medical issues.  Next, look at a corporate executive.  With the information available, you can soon know who are his/her favorite contacts via emails and phone numbers, what he/she thinks about, and what are the anticipated corporate developments.  Now think of political contenders.  You can gather up who are the main contributors, what they envision, what you envision, and importantly what strategies and tactical moves you plan.   Now move on to the higher chain of public servants.   That’s the easy stuff. 

This said, perhaps you’ve concealed your identity though alternative, i.e. secret,  email accounts, or purchased phones, not in any way connected to you, so you think.  This is exactly where the most subtle data mining can occur.  Simply by examining the data records, it becomes possible to determine though the network of contacts, the contents of the messages, and so on until an educated guess can determine the originator of the messages.  The massive database can help with identification.  This type of analysis, mathematically called inverse analysis, is most interesting, most devastating and most subtle.  It is possible, and you can assume it is applied.    It can provide competitors with a massive advantage at all levels, even at the highest levels of government. 
  
This kind of data mining is simply irresistible.

Comments

Popular posts from this blog

Accepting Fake Information

Every day, we are all bombarded with information, especially on news channels.  One group claims it's false; another calls it the truth. How can we know when to accept it or alternatively how can we know it's false? There are several factors which influence acceptance of fake or false information. Here are the big four.  Some just don’t have the knowledge to discern fact/truth from fiction/fact/false*. Some fake information is cleverly disguised and simply appears to be correct. Some fake information is accepted because the person wants to believe it. Some fake information is accepted because there is no other information to the contrary. However, the acceptance of  information  of any kind become a kind of  truth , and this is a well studied topic. In the link below is an essay on “The Truth About Truth.” This shows simply that what is your point of view, different types of information are generally accepted, fake or not.   https://www.linkedin.com/posts/g-donald-allen-420b03

Your Brain Within Your Brain

  Your Bicameral Brain by Don Allen Have you ever gone to another room to get something, but when you got there you forgot what you were after? Have you ever experienced a flash of insight, but when you went to look it up online, you couldn’t even remember the keyword? You think you forgot it completely. How can it happen so fast? You worry your memory is failing. Are you merely absent-minded? You try to be amused. But maybe you didn’t forget.   Just maybe that flash of insight, clear and present for an instant, was never given in the verbal form, but another type of intelligence you possess, that you use, and that communicates only to you. We are trained to live in a verbal world, where words matter most. Aside from emotions, we are unable to conjure up other, nonverbal, forms of intelligence we primitively, pre-verbally, possess but don’t know how to use. Alas, we live in a world of words, stewing in the alphabet, sleeping under pages of paragraphs, almost ignoring one of

Is Artificial Intelligence Conscious?

  Is Artificial Intelligence Conscious? I truly like the study of consciousness, though it is safe to say no one really knows what it is. Some philosophers has avoided the problem by claiming consciousness simply doesn’t exist. It's the ultimate escape clause. However, the "therefore, it does not exist" argument also applies to "truth", "God", and even "reality" all quite beyond a consensus description for at least three millennia. For each issue or problem defying description or understanding, simply escape the problem by claiming it doesn’t exist. Problem solved or problem avoided? Alternately, as Daniel Dennett explains consciousness as an account of the various calculations occurring in the brain at close to the same time. However, he goes on to say that consciousness is so insignificant, especially compared to our exalted notions of it, that it might as well not exist [1] . Oh, well. Getting back to consciousness, most of us have view