Video on BitChute Audio on SoundCloud
Below is an update of an article I wrote in 2006 (original site, previous site) embedded with relevant discussions, interviews, and lectures.
A common definition of an anomaly is "a deviation from the common rule, type, arrangement, or form." This definition, however, can be simplified by stating that an anomaly is a deviation from specific parameters. The defining characteristic of an anomaly is that it can only exist in a comparative setting, implying that it can only be detected within a certain data set. Once a data set is obtained then parameters can be specified to filter out so called anomalies for evaluation. Depending on the type of data collected, these parameters can be specified to be anything occurring in any combination. If there is no data set, then there are no anomalies.
A prison can be defined as "a place of seeming confinement." It is a place to incarcerate people who have lawfully or unlawfully stepped outside the parameters set in their society. This implies that inmates are anomalies within a community. However, these anomalies, unlike eccentrics and aristocrats, are deemed to be a threat to the establishment or the citizenry. Hence prisons are locations where we hold anomalies that we fear.
Geophysics is "the scientific study of the physical characteristics of the Earth, including its hydrosphere and atmosphere, and of the Earth's relationship to the rest of the universe." Equipment is used to collect and interpret data from our surrounding world and, if required, to locate anomalies within a region. User defined parameters needed to find anomalies are usually inputted into computer programs, which extrapolate data providing a detailed representation of a situation. As long as there is sufficient computer processing speed, good data, and a competent interpreter, anomalies can be flagged. In general, the more data acquired the better the controls of an investigation.
Exclusive: National Security Agency Whistleblower William Binney on Growing State Surveillance
It should also be understood that anyone involved in a geophysical investigation, from the data collector to the interpreter, can create anomalies, anywhere at any time, either deliberately or erroneously. It is relatively easy to change certain parameters to obtain the anomalies that are desired. The isolation and/or extermination of any number, such as 2 or -5 or 600, can be achieved by running filters through a data set. In most cases, to compensate for any errors in data collection and to assure that the desired number is isolated, the number will be flanked. For example, to isolate the number 2, any number between 1.5 and 2.4 will be flagged. This will assure that any number that might be confused as a 2, or has the possibility of becoming a 2, will be removed from the community.
In the last few years certain governments around the world have passed laws to legalize the merging and collection of data for their populations. From credit card information, to medical records, to travel destinations and phone calls, it is all being recorded, tabulated and interpreted. Parameters are being set to flag people as anomalies who have stepped outside of specified boundaries. Those deemed to be existing outside of the limits set by the controllers are investigated, and in some cases removed from the community. The interpreters are so confident in their collection and evaluation of the data that they are passing laws to assure that those deemed to be a threat are unable to question their investigation or incarceration. Since most anomalies occur in batches, laws have also been passed to allow the controllers to have the ability to extrapolate information from captured anomalies by any means necessary, including torture. These laws will also protect government and private organizations by granting them immunity from prosecution.
At present the parameters set by those involved in these investigations are narrow enough to allow the general public to feel relatively free. However, as time progresses and fewer anomalies are identified, broader parameters will be used in the analysis of the data to assure that no one will accidentally turn into an anomaly. Anyone associated with or related to an anomaly will find their private and public life scrutinized to convince the investigators that they have not been influenced or misdirected due to their close proximity to an anomaly. Fear of certain anomalies, justified or not, will become a prison for most of these societies and fascism the end result.
It is extremely important for us as a population to fully comprehend the power that this sort of broad data collection gives our governments. Those who control and interpret the data will have the ability to not only remove unwanted people, but also to restrict the movement of the entire populace. For example, it is relatively easy to place a location marker on all credit and bank cards, which when activated, will only allow the cards to be used within a certain area. If governments decide to restrict travel, then all they need to do is activate the location markers to restrict the use of financial activity to within a certain distance of a residence, creating a jail without physical walls. When this scenario is carried out, special permission will need to be obtained for anyone travelling outside of their zone.
Exposed: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah
There are numerous ways to gain freedom from these organizations whose purpose is to identify, isolate, incarcerate, eliminate, and even exterminate what they deem to be undesirable elements from society. The machine running these filtration programs can be halted if people stop providing governments and corporations with data. Reducing the number of transactions that are automatically fed into the databases will produce gaps and uncertainties in the data set, creating erroneous interpretation. If enough errors are made, a population loses confidence in the controllers and the system should correct itself. Providing these organizations with large quantities of false or distorted data can also reduce the efficiency of their system. Other methods may include the retraining of law enforcement officers, using cash whenever possible, disassociation and/or protection from insecure electronic activity, and private inquiry into the reasons for government acquisition of personal data. It is very important to grasp the concept that if there is no data set, then there are no anomalies.
The best way, however, to stop these entities is to make fundamental changes to the system itself. This requires us to be educated in the methods in which we are controlled, allowing us to understand the problems that exist in the current system so we can avoid its pitfalls. Placement at the highest levels in government of ethical civil servants that are accountable to the people and regard the privacy of individuals as the most important aspect of their duties is an essential starting point. It is crucial that during this transitional period alternative choices for leaders are present to avoid a power vacuum. By decentralizing our government and localizing our communities we can avert chaos during this process.
Edward Snowden, NSA files source, PRISM whistleblower: 'If they want to get you, in time they will'
Link to video, PRISM (surveillance program)
As a collective we must understand that democracy can only exist in a society with an educated populace, and the right for self-governance can only be obtained through knowledge. When a society embraces ignorance and forfeits its right to control its destiny, it has succumbed to apathy and can only deteriorate. In science, the analysis of anomalies contributes to our understanding of the physical world, improving our lives. In contrast, identifying anomalies in our society based on political doctrine has created fear and misunderstanding, restricting our lives. The lack of accountability from our leaders and our indifference to the consequences of their actions is diminishing our civil liberties. But it is not too late, we can prevent this from happening. We still have the ability to reclaim our future if we begin to educate ourselves.
Constitution and Civil liberties in the United States
"How a Grad Student Scooped the Government and Uncovered One of the Biggest Internet Privacy Scandals"ReplyDelete
Glenn Greenwald: How America's Surveillance State Breeds Conformity and Fear
RSA Conference 2012 - New Threats to the Internet Infrastructure - Bruce SchneierReplyDelete
YouTube Pushing Users Switch To Real NamesReplyDelete
Malte Spitz: Your phone company is watchingReplyDelete
This Cute Chat Site Could Save Your Life and Help Overthrow Your GovernmentReplyDelete
Shopper Alert: Price May Drop for You AloneReplyDelete
1) TrapWire: International Surveillance Coordination NetworkReplyDelete
2) Wikileaks under massive DDoS after revealing "TrapWire," a government spy network that uses ordinary surveillance cameras
NYPD, Microsoft Launch All-Seeing "Domain Awareness System" With Real-Time CCTV, License Plate Monitoring [Updated]ReplyDelete
The new totalitarianism of surveillance technologyReplyDelete
New Documents Show That Feds Share License Plate Scanning Data With Insurance FirmsReplyDelete
William Binney: A 32 year veteran of the NSA speaks out.ReplyDelete
Vote Stalkers: Obama, Romney Campaigns Mine Trove of Voters’ Online Data to Win 2012 ElectionReplyDelete
Online Privacy Issue Is Also in Play in Petraeus ScandalReplyDelete
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the postReplyDelete
DHS Watchdog OKs ‘Suspicionless’ Seizure of Electronic Devices Along BorderReplyDelete
Obama signs cybersecurity executive order ahead of State Of The UnionReplyDelete
The Google Glass feature no one is talking aboutReplyDelete
K-12 student database jazzes tech startups, spooks parentsReplyDelete
A Cypherpunk's ManifestoReplyDelete
The Internet is a surveillance stateReplyDelete
Police need wiretaps, not just warrants, to search text messages (Canada)
U.S. gives big, secret push to Internet surveillance - "Justice Department agreed to issue "2511 letters" immunizing AT&T and other companies participating in a cybersecurity program from criminal prosecution under the Wiretap Act, according to new documents obtained by the Electronic Privacy Information Center."ReplyDelete
The Best Browser Extensions that Protect Your PrivacyReplyDelete
Are all telephone calls recorded and accessible to the US government? A former FBI counterterrorism agent claims on CNN that this is the case
Hidden in immigration reform, vast biometrics planReplyDelete
Eric Schmidt interview: 'You have to fight for your privacy or you will lose it'ReplyDelete
NSA Whistleblowers: "All U.S. Citizens" Targeted by Surveillance Program, Not Just Verizon CustomersReplyDelete
NSA taps in to user data of Facebook, Apple, Google and others, secret files revealReplyDelete
Documents: U.S. mining data from 9 leading Internet firms; companies deny knowledgeReplyDelete
"A Massive Surveillance State": Glenn Greenwald Exposes Covert NSA Program Collecting Calls, EmailsReplyDelete
"You’re Being Watched": Edward Snowden Emerges as Source Behind Explosive Revelations of NSA SpyingReplyDelete
Glenn Greenwald on How NSA Leaker Edward Snowden Helped Expose a "Massive Surveillance Apparatus"
"On a Slippery Slope to a Totalitarian State": NSA Whistleblower Rejects Gov’t Defense of Spying
NSA uses 'terrorism' to justify mass surveillance that started long before 9/11 and the Patriot ActReplyDelete
Revealed: the top secret rules that allow NSA to use US data without a warrant
GCHQ taps fibre-optic cables for secret access to world's communicationsReplyDelete
from VICE: "Hello NSA: The government is listening to your internets. Generate a sentence with some of the keywords they're looking for. Tweet or share and you could earn a new follower in Washington."ReplyDelete
Glenn Greenwald: Growing Backlash Against NSA Spying Shows Why U.S. Wants to Silence Edward SnowdenReplyDelete
XKeyscore: NSA tool collects 'nearly everything a user does on the internet'ReplyDelete
Rejecting NSA Spying, Wikipedia Boosts Security after XKeyscore Revelations
In ACLU lawsuit, scientist demolishes NSA’s “It’s just metadata” excuseReplyDelete
The End of Internet Privacy? Glenn Greenwald on Secret NSA Program to Crack Online EncryptionReplyDelete
Glenn Greenwald and Janine Gibson: 10 highlights from their Reddit AMA - (original AMA)ReplyDelete
Edward Snowden’s E-Mail Provider Defied FBI Demands to Turn Over Crypto Keys, Documents ShowReplyDelete
Greenwald: ‘The objective of the NSA is literally the elimination of global privacy’ReplyDelete
Lavabit: How One Company Refused to Give FBI "Unrestricted" Access to Emails of 400,000 CustomersReplyDelete
Meet the Private Companies Helping Cops Spy on Protesters - "Promotional materials for private spy companies show that mass surveillance technology is being sold to police departments as a way to monitor dissent"ReplyDelete
NSA taps into Google, Yahoo clouds, can collect data 'at will,' says PostReplyDelete
White House to preserve controversial policy on NSA, Cyber Command leadershipReplyDelete
As Judge Rules NSA Surveillance "Almost Orwellian," Obama Prepares to Leave Spying Program IntactReplyDelete
Stanford Study: It's Ridiculously Easy To Match Metadata to PeopleReplyDelete
Peeping Webcam? With NSA Help, British Spy Agency Intercepted Millions of Yahoo Chat Images - "The bit that might get more concerning is they are trying to—what they’re trying to do with this is see if the person using one particular Yahoo account is the same person using another. So they’re trying to find if their targets are using more than one account. So, they try to automatically match it, check it against all of these images they’re collecting, and see if they get something, which would be fine if it was a perfect technology—well, it might be fine if it was a perfect technology—but it’s not. And so, there’s this risk of false matches, of people in these spy agencies looking up your pictures, your webcam chats, just because some malfunctioning algorithm thinks you look like someone GCHQ is spying on."ReplyDelete
Wikileaks' Julian Assange claims complete worldwide surveillance only 'a few years' awayReplyDelete
Julian Assange - SXSW - March 8 2014ReplyDelete
Investigation Proves NSA Spies on Americans beyond Metadata CollectionReplyDelete