WHO IS THE EGG-MAN?

Furthermore, Where Did I Leave That Walrus Anyway?

Draft four

When I head about the Snowden Situation, I immediately felt a sympathetic cord ring inside me.  Not so much to take a side for guilt or innocence, but a sympathetic feeling of someone who has felt the invisible presence of having my personal space penetrated.  I initially thought I would write-up this great paper about the Prism Project.  I remembered about a book I read about Sam Israel and Bayou Securities.  No—better idea still, Danny Casolaro’s story would make a stronger backbone.  Then the X-Keyscore story broke and I had to clear my desk.  Today I just learned about the SOD* program [*see end paragraph, Rachael Maddow, 8/5/2013].  Of course, if all else didn’t inspire me, I could always write about The Monarch Program.

This is the nebulous soup described in the movie ‘The Fog.’  What is it, what is out there?  I think the reason I can’t sketch out what I am feeling because the metaphor used to describe the NSA program locked me into a dull charcoal.  It isn’t specifically that vast quantities of data is being ‘vacuumed up.’   That may be part of what is going on, but I am teaching myself to not fall for the shell game.  Someone described the entire scope as a giant squid, reaching out and sticking to everything.  I prefer the simile of an octopus.  It sticks and rips away historically stuck data, AND it extends into many areas of our daily life.  And when the diver detective gets close, it spits out an inky blot so nothing can be seen clearly.

The results of the trip wire that Snowden walked through displayed itself when I read the NPR Snowden Wrap-up article.  I heard what he said when I watched the live Q & A, but NPR put it into permanent text.   This young man said, in a stray but intentional thought lurking in the conversation, that predictive analysis can be applied to each and any person.  By leveraging many technologies applied against hard database data, a type of virtual ESP blankets any point on the globe.  This is an arms race for control over people’s brains.  But are we looking through a lighted keyhole or is the door finally ajar?

The following is taken from the NPR website, displayed here without NPR’s permission to highlight the importance of this subtle point…

http://www.npr.org/2013/06/10/190398617/opinion-roundup-edward-snowden-and-the-nsa-leaks

 

GREENWALD: Why should people care about surveillance?

SNOWDEN: Because even if you’re not doing anything wrong, you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude, to where it’s getting to the point you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody, even by a wrong call.

And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with, and attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer


When the horror of having all thoughts, conversations, relationships and activities monitored; reality asks how should we now defend ourselves.  I tried to imagine this electronic fog-space.  Snowden has described some of the best protective pre-emptive devices for harvesting information.  But if civil liberty was reset, old-fashioned boots on the ground won’t replace the now uncovered electronic warrior sponges.  Citizens are being asked to tolerate the eavesdropping to phone, written word, electronic conversations, and possibly brain wave thoughts because there is no alternative.  The operators may be required to broadcast an ‘interference’ layer which makes the citizen or spy alike think they are listening to or tracking someone else.  Like layers of a gob-stopper candy, each layer that gets dissolved reveals another hard shell and a new flavor of surveillance.  [really sucks]

Most thoughts I have written about pertain to waking hours.  But what happens when the target goes to sleep.  Can I be subliminally whispered to in the first few minutes of twilight?  Can specific pieces of personal information be suggested to warp the brain’s dreamtime?  When you know there is a monster in the shadows, but have little light and no experiential foundation to visualize what you think you feel, the eyes and imagination WILL draw out something more horrific than past perceptions.  And perhaps, we are so far off the curve of acquired experience, our imaginations are correct.  Expert systems combined with The Prism project, X-Keyscore and the Monarch Program have already been revealed.  Imagine the coming attractions; bio-engineered clones will impersonate human life. [Watch Gattaca, 1997, or search wiki]  A Bluetooth device and a look-alike armed with a broadcasted constructed decision criteria profile could do this now in real-time.  Read the NPR Snowden interview transcript…

The Octopus seems to reach any place signals can create a dimensional atmosphere.  Politicians like Lindsey Graham appear to be in two places at on this topic .  The Prism Project seems a necessary part of modern data collection, but universal gun owner background checks appear to be too invasive. [Idea from MSNBC Rev Al Sharpton television show]  Another example is the insurance industry.  Prices are set and coverage is approved or denied.  Decisions are considered locked for fear of competitive reprisals.  The ‘carrot’ of privacy gets dangled in front of you eyes, but like the donkey, citizens are asked to just keep pulling that cart.  A final troubling situation arises when chosen individuals actually make a mistake or fail.  Forces move in to prevent disaster, and over time, failure is considered desirable.  Of course, the safety net won’t be there for regular people.  They are lured to replace the previous person’s disaster.  The magical enchantment encourages citizens to pay now, so another can repay an old debt.

I really set out to write about some of the spy vs. spy projects and devices.  I want to be sure I am factually accurate.  But I also have a sense that all of the revelations have not yet revealed themselves.  MY UNQUALIFIED GUT OPINION tells me the type of work Snowden performed for Booze Allen requires a back channel grey network to click back and forth in cases of data corruption.  This data corruption may originate from password hacking, packet theft, or ‘listening in’ to those who are listening in.  In order to separate the doppelgänger mirror image from the real operative, I WOULD GUESS in this type of scenario, one needs to step away from the shadow or reflection that one casts.  Who knows what authority is monitoring this grey network because the level of unknown about the front channel has become apparent through Edward’s revelations.  Who knows what happens to the data once it is acquired, reduced to text or storage, and sits on someone’s disk or desk.  Outdated versions of the tools could make their way into the secondary market.  One person’s junk is some unacquainted newbie’s treasure.

These tools still seem light years ahead of how the collective citizen mind is thinking.  If the bad guys use these tools, then the good guys should to, right?  I want to describe these tools as I see them.  They are the cane and spoon for the surveillance crowd.  I have a feeling they won’t live without them, now that they have been proven effective.  I just hope that someone will pass a law that protects my sleeping hours.  The one feeling that I know to be true is the longer I become acclimated to this new definition of privacy, the more time it seems I have already been living under its grip.  CAUTION:  Unconscious siphoning may have physical effects…

8/4/2013 [first draft]

Used without permission, Reuters News, John Schiffman…

http://news.yahoo.com/dea-program-differs-recent-nsa-revelations-091643827.html

*SOD: The SOD forwards tips gleaned from NSA intercepts, wiretaps by foreign governments, court-approved domestic wiretaps and a database called DICE to federal agents and local law enforcement officers. The DICE database is different from the NSA phone-records database. DICE consists of about 1 billion records, and is primarily a compilation of phone log data that is legally gathered by the DEA through subpoenas or search warrants

Go Fish. It’s open season…

CATFISHING —  Can the case be made for Extortion or Identity Theft???

Conversations don’t have to start out as a scam or with criminal intent.  I don’t know all the details of the NFL players’ case… I didn’t even know that this scam has a name.  Here is the research of a fishing trip I was taken on.

A few years ago I cam chatted with a young women who appeared to be very sincere.  It was fun.  One day while doing internet research, I typed in her screen name in the browser search box.  Let’s call her ‘my boots’ for an abbreviation.  The character name ‘My Boots’ showed up on another site, owned by someone else with a different women’s picture.  The two women looked nothing alike.  I even live chatted with the site owner.  She claimed she owned the name and knew nothing about another likeness.  When I texted to the ‘my boots’ that I knew [different site] that her name was already taken [registered], strange things began to happen.

Long story short, catfishing always ends up with someone ‘disappearing or mysteriously dying.’  GONE WITHOUT A TRACE.  I think that authorities or other agencies can ‘take over’ or ‘listen in,’ to someone’s two-way connection.  The Big Directors can character direct, through script writing, their situational actions for them.  Big fish always ‘swim in’ when smaller prey appears.

On the other side of the screen, the victim has no idea what is going on.  I was witness to this many times because my camera came with a microphone / speakers and I could hear background conversations describing analysis of myself. Maybe two parties are victims to the third’s hostile takeover.  This is called ‘connecting through’ someone’s computer and link, like remote desktop.  Unfortunately, the connection has already been established so no invitation needs to be given.

Accounts are hacked, credit cards are tagged, and money can be extorted.  ‘Hostage Crisis???’  Files can be deposited on computers.  Bot-nets can be created without permission.  No internet connection is truly safe, especially USB or Wireless [including cellular phones– flame virus?].  You might think that a basic ‘gut check’ is the best protection.  But with all the social media usage [Ex face book], the conditions replicate themselves under many situations.  On-line gamers are routinely ‘listened in’ on for tag words like ‘birthday party’ and ‘gift money.’  External cameras can be tapped to watch people’s activities.  We trust social media with too much of our personal information.  ‘Just click this box to proceed?’

I don’t want to defend any guilty party, these are my observations.  Just try to speak to a professional law enforcement agent or psychologist and get a fair hearing.  The most frequent comment is the act needs to be caught in process (good luck, especially if all parties are not fully aware of conditions around them).  Initiated conversations DO NOT give permission to criminal, unauthorized or unwelcome activity.  When family and friends choose to close their minds… the fraud is fully perpetrated.  It is a false assumption to guess what happens ‘online stays online.’

I hope this helps someone someday.  Stalking is an unwanted and unwelcome one-sided fascination.  No one should have to get a new identity to get away from the digital hydra’s hooks.  Worst Case:  The predator swims away with the prize.

Anthony Maisano III