Video on BitChute Audio on SoundCloud
Below is an update of an article I wrote in 2006 (original site, previous site) embedded with relevant discussions, interviews, and lectures.
A common definition of an anomaly is "a deviation from the common rule, type, arrangement, or form." This definition, however, can be simplified by stating that an anomaly is a deviation from specific parameters. The defining characteristic of an anomaly is that it can only exist in a comparative setting, implying that it can only be detected within a certain data set. Once a data set is obtained then parameters can be specified to filter out so called anomalies for evaluation. Depending on the type of data collected, these parameters can be specified to be anything occurring in any combination. If there is no data set, then there are no anomalies.
A prison can be defined as "a place of seeming confinement." It is a place to incarcerate people who have lawfully or unlawfully stepped outside the parameters set in their society. This implies that inmates are anomalies within a community. However, these anomalies, unlike eccentrics and aristocrats, are deemed to be a threat to the establishment or the citizenry. Hence prisons are locations where we hold anomalies that we fear.
Geophysics is "the scientific study of the physical characteristics of the Earth, including its hydrosphere and atmosphere, and of the Earth's relationship to the rest of the universe." Equipment is used to collect and interpret data from our surrounding world and, if required, to locate anomalies within a region. User defined parameters needed to find anomalies are usually inputted into computer programs, which extrapolate data providing a detailed representation of a situation. As long as there is sufficient computer processing speed, good data, and a competent interpreter, anomalies can be flagged. In general, the more data acquired the better the controls of an investigation.
Exclusive: National Security Agency Whistleblower William Binney on Growing State Surveillance
Part 2
It should also be understood that anyone involved in a geophysical investigation, from the data collector to the interpreter, can create anomalies, anywhere at any time, either deliberately or erroneously. It is relatively easy to change certain parameters to obtain the anomalies that are desired. The isolation and/or extermination of any number, such as 2 or -5 or 600, can be achieved by running filters through a data set. In most cases, to compensate for any errors in data collection and to assure that the desired number is isolated, the number will be flanked. For example, to isolate the number 2, any number between 1.5 and 2.4 will be flagged. This will assure that any number that might be confused as a 2, or has the possibility of becoming a 2, will be removed from the community.
In the last few years certain governments around the world have passed laws to legalize the merging and collection of data for their populations. From credit card information, to medical records, to travel destinations and phone calls, it is all being recorded, tabulated and interpreted. Parameters are being set to flag people as anomalies who have stepped outside of specified boundaries. Those deemed to be existing outside of the limits set by the controllers are investigated, and in some cases removed from the community. The interpreters are so confident in their collection and evaluation of the data that they are passing laws to assure that those deemed to be a threat are unable to question their investigation or incarceration. Since most anomalies occur in batches, laws have also been passed to allow the controllers to have the ability to extrapolate information from captured anomalies by any means necessary, including torture. These laws will also protect government and private organizations by granting them immunity from prosecution.
At present the parameters set by those involved in these investigations are narrow enough to allow the general public to feel relatively free. However, as time progresses and fewer anomalies are identified, broader parameters will be used in the analysis of the data to assure that no one will accidentally turn into an anomaly. Anyone associated with or related to an anomaly will find their private and public life scrutinized to convince the investigators that they have not been influenced or misdirected due to their close proximity to an anomaly. Fear of certain anomalies, justified or not, will become a prison for most of these societies and fascism the end result.
It is extremely important for us as a population to fully comprehend the power that this sort of broad data collection gives our governments. Those who control and interpret the data will have the ability to not only remove unwanted people, but also to restrict the movement of the entire populace. For example, it is relatively easy to place a location marker on all credit and bank cards, which when activated, will only allow the cards to be used within a certain area. If governments decide to restrict travel, then all they need to do is activate the location markers to restrict the use of financial activity to within a certain distance of a residence, creating a jail without physical walls. When this scenario is carried out, special permission will need to be obtained for anyone travelling outside of their zone.
Exposed: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah
There are numerous ways to gain freedom from these organizations whose purpose is to identify, isolate, incarcerate, eliminate, and even exterminate what they deem to be undesirable elements from society. The machine running these filtration programs can be halted if people stop providing governments and corporations with data. Reducing the number of transactions that are automatically fed into the databases will produce gaps and uncertainties in the data set, creating erroneous interpretation. If enough errors are made, a population loses confidence in the controllers and the system should correct itself. Providing these organizations with large quantities of false or distorted data can also reduce the efficiency of their system. Other methods may include the retraining of law enforcement officers, using cash whenever possible, disassociation and/or protection from insecure electronic activity, and private inquiry into the reasons for government acquisition of personal data. It is very important to grasp the concept that if there is no data set, then there are no anomalies.
The best way, however, to stop these entities is to make fundamental changes to the system itself. This requires us to be educated in the methods in which we are controlled, allowing us to understand the problems that exist in the current system so we can avoid its pitfalls. Placement at the highest levels in government of ethical civil servants that are accountable to the people and regard the privacy of individuals as the most important aspect of their duties is an essential starting point. It is crucial that during this transitional period alternative choices for leaders are present to avoid a power vacuum. By decentralizing our government and localizing our communities we can avert chaos during this process.
Edward Snowden, NSA files source, PRISM whistleblower: 'If they want to get you, in time they will'
Link to video, PRISM (surveillance program)
As a collective we must understand that democracy can only exist in a society with an educated populace, and the right for self-governance can only be obtained through knowledge. When a society embraces ignorance and forfeits its right to control its destiny, it has succumbed to apathy and can only deteriorate. In science, the analysis of anomalies contributes to our understanding of the physical world, improving our lives. In contrast, identifying anomalies in our society based on political doctrine has created fear and misunderstanding, restricting our lives. The lack of accountability from our leaders and our indifference to the consequences of their actions is diminishing our civil liberties. But it is not too late, we can prevent this from happening. We still have the ability to reclaim our future if we begin to educate ourselves.
Constitution and Civil liberties in the United States
"How a Grad Student Scooped the Government and Uncovered One of the Biggest Internet Privacy Scandals"
ReplyDelete
ReplyDeleteGlenn Greenwald: How America's Surveillance State Breeds Conformity and Fear
RSA Conference 2012 - New Threats to the Internet Infrastructure - Bruce Schneier
ReplyDeleteYouTube Pushing Users Switch To Real Names
ReplyDeleteMalte Spitz: Your phone company is watching
ReplyDeleteThis Cute Chat Site Could Save Your Life and Help Overthrow Your Government
ReplyDeleteShopper Alert: Price May Drop for You Alone
ReplyDelete1) TrapWire: International Surveillance Coordination Network
ReplyDelete2) Wikileaks under massive DDoS after revealing "TrapWire," a government spy network that uses ordinary surveillance cameras
NYPD, Microsoft Launch All-Seeing "Domain Awareness System" With Real-Time CCTV, License Plate Monitoring [Updated]
ReplyDeleteThe new totalitarianism of surveillance technology
ReplyDeleteNew Documents Show That Feds Share License Plate Scanning Data With Insurance Firms
ReplyDeleteWilliam Binney: A 32 year veteran of the NSA speaks out.
ReplyDeleteVote Stalkers: Obama, Romney Campaigns Mine Trove of Voters’ Online Data to Win 2012 Election
ReplyDeleteOnline Privacy Issue Is Also in Play in Petraeus Scandal
ReplyDeleteNSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
ReplyDeleteDHS Watchdog OKs ‘Suspicionless’ Seizure of Electronic Devices Along Border
ReplyDeleteObama signs cybersecurity executive order ahead of State Of The Union
ReplyDeleteThe Google Glass feature no one is talking about
ReplyDeleteK-12 student database jazzes tech startups, spooks parents
ReplyDeleteA Cypherpunk's Manifesto
ReplyDeleteThe Internet is a surveillance state
ReplyDelete
ReplyDeletePolice need wiretaps, not just warrants, to search text messages (Canada)
U.S. gives big, secret push to Internet surveillance - "Justice Department agreed to issue "2511 letters" immunizing AT&T and other companies participating in a cybersecurity program from criminal prosecution under the Wiretap Act, according to new documents obtained by the Electronic Privacy Information Center."
ReplyDeleteThe Best Browser Extensions that Protect Your Privacy
ReplyDelete
ReplyDeleteAre all telephone calls recorded and accessible to the US government? A former FBI counterterrorism agent claims on CNN that this is the case
Hidden in immigration reform, vast biometrics plan
ReplyDeleteEric Schmidt interview: 'You have to fight for your privacy or you will lose it'
ReplyDeleteNSA Whistleblowers: "All U.S. Citizens" Targeted by Surveillance Program, Not Just Verizon Customers
ReplyDeleteNSA taps in to user data of Facebook, Apple, Google and others, secret files reveal
ReplyDeleteDocuments: U.S. mining data from 9 leading Internet firms; companies deny knowledge
ReplyDelete"A Massive Surveillance State": Glenn Greenwald Exposes Covert NSA Program Collecting Calls, Emails
ReplyDelete"You’re Being Watched": Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying
ReplyDeleteGlenn Greenwald on How NSA Leaker Edward Snowden Helped Expose a "Massive Surveillance Apparatus"
"On a Slippery Slope to a Totalitarian State": NSA Whistleblower Rejects Gov’t Defense of Spying
NSA uses 'terrorism' to justify mass surveillance that started long before 9/11 and the Patriot Act
ReplyDeleteRevealed: the top secret rules that allow NSA to use US data without a warrant
GCHQ taps fibre-optic cables for secret access to world's communications
ReplyDeletefrom VICE: "Hello NSA: The government is listening to your internets. Generate a sentence with some of the keywords they're looking for. Tweet or share and you could earn a new follower in Washington."
ReplyDeleteGlenn Greenwald: Growing Backlash Against NSA Spying Shows Why U.S. Wants to Silence Edward Snowden
ReplyDeleteXKeyscore: NSA tool collects 'nearly everything a user does on the internet'
ReplyDeleteRejecting NSA Spying, Wikipedia Boosts Security after XKeyscore Revelations
In ACLU lawsuit, scientist demolishes NSA’s “It’s just metadata” excuse
ReplyDeleteThe End of Internet Privacy? Glenn Greenwald on Secret NSA Program to Crack Online Encryption
ReplyDeleteGlenn Greenwald and Janine Gibson: 10 highlights from their Reddit AMA - (original AMA)
ReplyDeleteEdward Snowden’s E-Mail Provider Defied FBI Demands to Turn Over Crypto Keys, Documents Show
ReplyDeleteGreenwald: ‘The objective of the NSA is literally the elimination of global privacy’
ReplyDeleteLavabit: How One Company Refused to Give FBI "Unrestricted" Access to Emails of 400,000 Customers
ReplyDeleteMeet the Private Companies Helping Cops Spy on Protesters - "Promotional materials for private spy companies show that mass surveillance technology is being sold to police departments as a way to monitor dissent"
ReplyDeleteNSA taps into Google, Yahoo clouds, can collect data 'at will,' says Post
ReplyDeleteWhite House to preserve controversial policy on NSA, Cyber Command leadership
ReplyDeleteAs Judge Rules NSA Surveillance "Almost Orwellian," Obama Prepares to Leave Spying Program Intact
ReplyDeleteStanford Study: It's Ridiculously Easy To Match Metadata to People
ReplyDeletePeeping Webcam? With NSA Help, British Spy Agency Intercepted Millions of Yahoo Chat Images - "The bit that might get more concerning is they are trying to—what they’re trying to do with this is see if the person using one particular Yahoo account is the same person using another. So they’re trying to find if their targets are using more than one account. So, they try to automatically match it, check it against all of these images they’re collecting, and see if they get something, which would be fine if it was a perfect technology—well, it might be fine if it was a perfect technology—but it’s not. And so, there’s this risk of false matches, of people in these spy agencies looking up your pictures, your webcam chats, just because some malfunctioning algorithm thinks you look like someone GCHQ is spying on."
ReplyDeleteWikileaks' Julian Assange claims complete worldwide surveillance only 'a few years' away
ReplyDeleteJulian Assange - SXSW - March 8 2014
ReplyDeleteInvestigation Proves NSA Spies on Americans beyond Metadata Collection
ReplyDelete