Skip to main content

Simply Irresistible




The time has come to seriously consider the implications of all the data the US government is collecting and consuming about its citizens.   For the first time in all of history, a government can peer into the private communications and by deflection the private thoughts of its citizens.  First, with the full neural net of information of interconnections between people, it must now be assumed to be known the full interconnectivity of persons of note.  Not just potential terrorists but politicians, would-be politicians, authors, commentators, newscasters, executives, even pundits, and more are swept up by this net.    If you have “arrived” you are known and fully analyzed.  Your habits are known, your pleasures are known, and so also are your friends.    A little background comes first.

About Edward Snowden, the now high profile leak in the NSA snooping scandal.  It is not what he did at this point, it is about what information he carried with him.  This fellow seems clever enough to have covered himself with tools to help his future situations. Of course, a nefarious host government will smoke them out, much to Edward's displeasure.   The other problem is how many others (i.e. NSA contractors) have done or or doing the exact same thing: harvesting information.  This is a serious issue.  With the data mining capacity of various programs available to the NSA, any operative, with appropriate keywords, can uncover the identity of any secretive email senders, and to whom they have communicated.  One simply does not need the secret email address, one can inversely deduce the identity.  This is dangerous - really dangerous.  Folks can read this post all day long, uncover my email, check on what I'm up to, but I'm basically a nobody, probably uninteresting to anyone.  But we are now at the point where big time secrets can be completely uncovered, no matter how disguised the sender may think he/she is covered.   The moral of this story is to use serious encryption software in all communications if you really want them private. Even the NSA, with all its computing power and expertise, has trouble decrypting, for example, RSA encrypted messages.

What about other countries?  Are citizens of England, France, Germany, Russia also under similar scrutiny.  The software is there; the need is perceived; the knowledge is desired; the will to thwart whatever is rampant.   All you need are ultra high capacity servers and the access to the data streams. Politicians are fundamentally nosy.

This cheap war waged by the terrorists is having far reaching consequences.  Those people know what to do and are likely doing it.  (Just think a moment or two and you can envision easy countermeasures.)  More revelations are coming.  Make no doubt.

 Let us look beyond the banal and proceed directly to what can happen and what will happen.   Or should I say, what could be.  A rule of thumb is that what could be soon becomes what is.   
You must think of unlimited computing power; you must think of unlimited software algorithms to detect even the most remote interconnectivity.  It exists.

You have an immense about of data; you have virtually unlimited computing resources; you have software engineering that can data-mine virtually any inquiry.  What is possible?  Look at an ordinary insurance salesman.  With just the name, phone number and email address, you can soon know all clients, their conditions, their driving records, and their medical issues.  Next, look at a corporate executive.  With the information available, you can soon know who are his/her favorite contacts via emails and phone numbers, what he/she thinks about, and what are the anticipated corporate developments.  Now think of political contenders.  You can gather up who are the main contributors, what they envision, what you envision, and importantly what strategies and tactical moves you plan.   Now move on to the higher chain of public servants.   That’s the easy stuff. 

This said, perhaps you’ve concealed your identity though alternative, i.e. secret,  email accounts, or purchased phones, not in any way connected to you, so you think.  This is exactly where the most subtle data mining can occur.  Simply by examining the data records, it becomes possible to determine though the network of contacts, the contents of the messages, and so on until an educated guess can determine the originator of the messages.  The massive database can help with identification.  This type of analysis, mathematically called inverse analysis, is most interesting, most devastating and most subtle.  It is possible, and you can assume it is applied.    It can provide competitors with a massive advantage at all levels, even at the highest levels of government. 
  
This kind of data mining is simply irresistible.

Comments

Popular posts from this blog

Behavioral Science and Problem-Solving

I.                                       I.                 Introduction.                Concerning our general behavior, it’s high about time we all had some understanding of how we operate on ourselves, and it is just as important how we are operated on by others. This is the wheelhouse of behavioral sciences. It is a vast subject. It touches our lives constantly. It’s influence is pervasive and can be so subtle we never notice it. Behavioral sciences profoundly affect our ability and success at problem-solving, from the elementary level to highly complex wicked problems. This is discussed in Section IV. We begin with the basics of behavioral sciences, Section II, and then through the lens of multiple categories and examples, Section III. II.     ...

The Lemming Instinct

  In certain vital domains, a pervasive mediocrity among practitioners can stifle genuine advancement. When the intellectual output of a field is predominantly average, it inevitably produces research of corresponding quality. Nevertheless, some of these ideas, by sheer chance or perhaps through effective dissemination, will inevitably gain traction. A significant number of scholars and researchers will gravitate towards these trends, contributing to and propagating further work along these established lines. Such a trajectory allows an initially flawed concept to ascend to the status of mainstream orthodoxy. However, over an extended period, these prevailing ideas invariably fail to withstand rigorous scrutiny; they are ultimately and conclusively disproven. The disheartening pattern then reveals itself: rather than genuine progress, an equally unvalidated or incorrect idea often supplants the discredited one, swiftly establishing its own dominance. This cycle perpetuates, ensurin...

Principles of Insufficiency and Sufficiency

   The principles we use but don't know it.  1.      Introduction . Every field, scientific or otherwise, rests on foundational principles—think buoyancy, behavior, or democracy. Here, we explore a unique subset: principles modified by "insufficiency" and "sufficiency." While you may never have heard of them, you use them often. These terms frame principles that blend theory, practicality, and aspiration, by offering distinct perspectives. Insufficiency often implies inaction unless justified, while sufficiency suggests something exists or must be done. We’ll examine key examples and introduce a new principle with potential significance. As a principle of principles of these is that something or some action is not done enough while others may be done too much. The first six (§2-6) of our principles are in the literature, and you can easily search them online. The others are relatively new, but fit the concepts in the real world. At times, these pri...