WHO IS THE EGG-MAN?

Furthermore, Where Did I Leave That Walrus Anyway?

Draft four

When I head about the Snowden Situation, I immediately felt a sympathetic cord ring inside me.  Not so much to take a side for guilt or innocence, but a sympathetic feeling of someone who has felt the invisible presence of having my personal space penetrated.  I initially thought I would write-up this great paper about the Prism Project.  I remembered about a book I read about Sam Israel and Bayou Securities.  No—better idea still, Danny Casolaro’s story would make a stronger backbone.  Then the X-Keyscore story broke and I had to clear my desk.  Today I just learned about the SOD* program [*see end paragraph, Rachael Maddow, 8/5/2013].  Of course, if all else didn’t inspire me, I could always write about The Monarch Program.

This is the nebulous soup described in the movie ‘The Fog.’  What is it, what is out there?  I think the reason I can’t sketch out what I am feeling because the metaphor used to describe the NSA program locked me into a dull charcoal.  It isn’t specifically that vast quantities of data is being ‘vacuumed up.’   That may be part of what is going on, but I am teaching myself to not fall for the shell game.  Someone described the entire scope as a giant squid, reaching out and sticking to everything.  I prefer the simile of an octopus.  It sticks and rips away historically stuck data, AND it extends into many areas of our daily life.  And when the diver detective gets close, it spits out an inky blot so nothing can be seen clearly.

The results of the trip wire that Snowden walked through displayed itself when I read the NPR Snowden Wrap-up article.  I heard what he said when I watched the live Q & A, but NPR put it into permanent text.   This young man said, in a stray but intentional thought lurking in the conversation, that predictive analysis can be applied to each and any person.  By leveraging many technologies applied against hard database data, a type of virtual ESP blankets any point on the globe.  This is an arms race for control over people’s brains.  But are we looking through a lighted keyhole or is the door finally ajar?

The following is taken from the NPR website, displayed here without NPR’s permission to highlight the importance of this subtle point…

http://www.npr.org/2013/06/10/190398617/opinion-roundup-edward-snowden-and-the-nsa-leaks

 

GREENWALD: Why should people care about surveillance?

SNOWDEN: Because even if you’re not doing anything wrong, you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude, to where it’s getting to the point you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody, even by a wrong call.

And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with, and attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer


When the horror of having all thoughts, conversations, relationships and activities monitored; reality asks how should we now defend ourselves.  I tried to imagine this electronic fog-space.  Snowden has described some of the best protective pre-emptive devices for harvesting information.  But if civil liberty was reset, old-fashioned boots on the ground won’t replace the now uncovered electronic warrior sponges.  Citizens are being asked to tolerate the eavesdropping to phone, written word, electronic conversations, and possibly brain wave thoughts because there is no alternative.  The operators may be required to broadcast an ‘interference’ layer which makes the citizen or spy alike think they are listening to or tracking someone else.  Like layers of a gob-stopper candy, each layer that gets dissolved reveals another hard shell and a new flavor of surveillance.  [really sucks]

Most thoughts I have written about pertain to waking hours.  But what happens when the target goes to sleep.  Can I be subliminally whispered to in the first few minutes of twilight?  Can specific pieces of personal information be suggested to warp the brain’s dreamtime?  When you know there is a monster in the shadows, but have little light and no experiential foundation to visualize what you think you feel, the eyes and imagination WILL draw out something more horrific than past perceptions.  And perhaps, we are so far off the curve of acquired experience, our imaginations are correct.  Expert systems combined with The Prism project, X-Keyscore and the Monarch Program have already been revealed.  Imagine the coming attractions; bio-engineered clones will impersonate human life. [Watch Gattaca, 1997, or search wiki]  A Bluetooth device and a look-alike armed with a broadcasted constructed decision criteria profile could do this now in real-time.  Read the NPR Snowden interview transcript…

The Octopus seems to reach any place signals can create a dimensional atmosphere.  Politicians like Lindsey Graham appear to be in two places at on this topic .  The Prism Project seems a necessary part of modern data collection, but universal gun owner background checks appear to be too invasive. [Idea from MSNBC Rev Al Sharpton television show]  Another example is the insurance industry.  Prices are set and coverage is approved or denied.  Decisions are considered locked for fear of competitive reprisals.  The ‘carrot’ of privacy gets dangled in front of you eyes, but like the donkey, citizens are asked to just keep pulling that cart.  A final troubling situation arises when chosen individuals actually make a mistake or fail.  Forces move in to prevent disaster, and over time, failure is considered desirable.  Of course, the safety net won’t be there for regular people.  They are lured to replace the previous person’s disaster.  The magical enchantment encourages citizens to pay now, so another can repay an old debt.

I really set out to write about some of the spy vs. spy projects and devices.  I want to be sure I am factually accurate.  But I also have a sense that all of the revelations have not yet revealed themselves.  MY UNQUALIFIED GUT OPINION tells me the type of work Snowden performed for Booze Allen requires a back channel grey network to click back and forth in cases of data corruption.  This data corruption may originate from password hacking, packet theft, or ‘listening in’ to those who are listening in.  In order to separate the doppelgänger mirror image from the real operative, I WOULD GUESS in this type of scenario, one needs to step away from the shadow or reflection that one casts.  Who knows what authority is monitoring this grey network because the level of unknown about the front channel has become apparent through Edward’s revelations.  Who knows what happens to the data once it is acquired, reduced to text or storage, and sits on someone’s disk or desk.  Outdated versions of the tools could make their way into the secondary market.  One person’s junk is some unacquainted newbie’s treasure.

These tools still seem light years ahead of how the collective citizen mind is thinking.  If the bad guys use these tools, then the good guys should to, right?  I want to describe these tools as I see them.  They are the cane and spoon for the surveillance crowd.  I have a feeling they won’t live without them, now that they have been proven effective.  I just hope that someone will pass a law that protects my sleeping hours.  The one feeling that I know to be true is the longer I become acclimated to this new definition of privacy, the more time it seems I have already been living under its grip.  CAUTION:  Unconscious siphoning may have physical effects…

8/4/2013 [first draft]

Used without permission, Reuters News, John Schiffman…

http://news.yahoo.com/dea-program-differs-recent-nsa-revelations-091643827.html

*SOD: The SOD forwards tips gleaned from NSA intercepts, wiretaps by foreign governments, court-approved domestic wiretaps and a database called DICE to federal agents and local law enforcement officers. The DICE database is different from the NSA phone-records database. DICE consists of about 1 billion records, and is primarily a compilation of phone log data that is legally gathered by the DEA through subpoenas or search warrants

THE MINK COAT

Taking a Look at Powers of Escalation…

first draft…

When someone buys a ‘mink coat,’ they become the center of conversation whether they plan on it or not.  People’s judgments become group thought at a very rapid rate.  Once these group thoughts become incarnate, the ‘mink coat thought’ propagates in outward circles until more and more people are called on to give opinions.  Without realizing what is going on, verbal and electronic sharing or ‘surveillance’ occurs.

It’s not like a mink coat is unique. There is no one particular color which is acceptable.  Type, source, length and purchase point are all topics to discuss.  A quick look on a person’s or group’s social media space will reveal conversations and critiques which may be sampled and passed on.  Maybe the purchaser may provide the most information, self-describing their thoughts and spin that they want publicized.  Could this be too much information, or the data miner’s key that unlocks personal privacy for public consumption.

Citizen’s ‘mink coat behavior’ leads to two main types of privacy degradation.  First, friendly inspection and publication of viewed information and personal opinion discussions gets filtered again and again by familiar and unknown sources.  Why send out a human or non-human [ex. Drone] to record details when a chain reaction can be set in motion artificially through suggestion, or naturally by ‘marking’ someone as “strange.”  A person marked as ‘strange,’ no matter how normal the target appears to oneself, will never be allowed to display unique traits.  If one person tells a tale about another that they once killed someone, or that they have some exotic disease, they will certainly be watched for a long time for any extraneous behaviors.  This is the accused person’s ‘mink coat.’  We have unknowingly become less private, escalated over time by our own and nearby publicity.

Many people spend their day with cell phone camera ready and social media always open.  When someone gives the suggestion, or a person becomes marked as strange, a deputized viewer or group instantly morphs in paparazzi.  And since Hollywood is an unattainable place, why not make your own movie star park in your own hometown.  This behavior is guaranteed to make any life more enjoyable, until you witness how information can be used against you.

Less common forms of surveillance can become engrained in the watcher’s toolbox.  We have all heard about unsecured surveillance cameras being tapped to watch a target marked as ‘strange.’  Could someone’s radio be used as a two-way long distance telephone?  We all have heard how someone’s powered ‘on’ cell phone can be turned into a two-way microphone.  And since televisions are merely sound waves converted back and forth into light waves, can the television screen act as a two-way camera.  But wait, we all like personalized television programming.  I hope it doesn’t talk back to you too much though.  Too much customization ruins the original artistic intent.

Top of the surveillance food chain is remote listening to a person’s thoughts.  Human bodies operate on small amounts of electricity.  Professionals call both simple and complex thought brain waves.  Waves of electrical energy permeate inside and outside of the skull.  These waves can be listened to from varying distances, depending on the strength of reader.  Sounds impossible???  Ever build a string telephone with two cups connected by a length of yarn?  An unknown subject can be ‘listened through’ a thin wall.  And we all know how a stethoscope magnifies someone’s faint heartbeat.  Fun times indeed.

The Fourth Amendment of the U.S. Constitution protects people from unreasonable searches and seizures of their person or papers on the interior or exterior of a person’s body.  The Fourth Amendment also protects someone’s house, and structures located on the same property.  It has also been recently interpreted to protect the interior of someone’s vehicle.  Most importantly, The Fourth Amendment protects a person’s communications, both vocal and electronic.  Most important, communications inside one’s mind or ‘internal communications’ are protected…

The hot topic of 2013 CIA confirmation hearings are drone strikes.  I have trouble making a judgment of who controls the kill lists or what type of person can build one with a hobbyist kit, because I am amazed at all the privacy we have already chosen to give up.  The escalating amounts of information that America has chosen to make public, along with the silly accusations we make about each other have thoroughly diluted the everyday powers of the Fourth Amendment.  We are walking around with ‘mink coats’ that we chose to wear or have been clothed with by other people.  The hearings draw the line dealing with drone surveillance of Americans, but NEVER choose to discuss the escalating memes that have been planted and cultivated.

I try to live my life as transparently as possible, and I also refuse to publicly post extraneous details about myself.  Sometimes a person might explain that because I choose not to publicly post any pictures of myself, my ‘on-line’ identity is unknown.  I really don’t want to clothe myself in the manner that many choose to, and I try to protect myself from being labeled as often as possible.  It is nice to see a vanity shot once in a while, but each instance is evidence for someone to mark me as ‘strange.’  I am warm enough without the coat.

I guess my point is it is awful difficult, and costly, to protect something that we have already given away.  By making our private lives public, by falling in the trap of marking each other, and by failing to say ‘NO’ when our privacy first feels violated, we have allowed the escalation of Forth Amendment Disintegration.  Let’s take the coats off and protect what is left of our privacy.  I try to re-gift the one’s I get to goodwill whenever possible.