Total Pageviews
4/18/2012
GPS placed on vehicles during traffic stops.
3/31/2012
Advanced packet analysis and the end of interpersonal violence in technologically advanced Western societies.
In Ira Levin's book "This Perfect Day" the computer was more of an economic and transportation recorder than a personality or agent program that its top level users accessed. The need for a centralized system is no longer necessary nor great concentration pf computer resources, merely the collection and storage of sufficient data.
It seems that the packet analysis systems deployed by the security forces to cover and collect digital network traffic has resulted in a tremendous advance in law enforcement capacity. Public safety has never been better and stands only to improve by leaps and bounds as digital devices expand into all levels of the public space.
The reduction of interpersonal violence from advanced digital forensics and surveillance means that perpetrators are nearly always caught with a high degree of precision, and may increasingly be expected to be intercepted through advanced "real time" intelligence. The possibility that interpersonal violence, which is the most egregious form of (possibly preventable) human suffering is on the decline has been noted by philosophers such as Steven Pinker, for example. That interpersonal violence is on the decline in western countries is perhaps increasingly attributable to this trend in lawful intercept surveillance technology, increasing penetration of mobile devices, and the almost exponential process of increasing transistor density.
Violence as a means to an end or an end in and of itself is increasingly being disclosed as an impossibility (or an irrational one-off event at worst) in technologically advanced western countries. The use of violence as a means to some end is almost always invariably contrary to the stated end desired but that is a philosophical topic to be discussed else where. The securitization of suburban and urban space and ensuing enhancement of public safety is a great achievement akin to a rocket program or nuclear power. Just as nuclear power and rockets, surveillance and expert analysis monitoring programs require adequate safeguards in place in order to prevent this network management style from degenerating into a myriad of dystopian possibilities.
We must admit that the technology of Orwell's 1984 has been deployed as a means to enhance public safety without necessarily devolving into a dictatorship of repression, at least in the US. The neo-conservatives and the neo-liberal factions have steered a careful course so far. They deserve at least to some extent the benefit of the doubt from a historical perspective by, for example, inheriting and not using the cold war nuclear weapons complex.
We (US and European citizens) may encounter ( if we are not currently already experiencing ) a computer-ized analysis which examines the individual behind the IP address that their networked devices and workstations pull. These individuals are examined through an automated process such as a special forensic psychologist social monitoring "expert AI" system perhaps like IBM Watson for law enforcement.* These systems are increasingly sophisticated and nuanced in the execution of their tasks. They may also be useful for detecting the operation of foreign intelligence and espionage agents or cells operating within a give you geographical area. Not only is this network capable of sniffing out the would be violent actors, but it is also able to detect and unmask the spys. The only persons who are not subject to this regime of monitoring would be those persons who are working under the false identity of under cover domestic spy and Leo agents.
*Of course we may reserve a more narrow definition. For "expert" in the sense that the computer or server cluster is a natural language capable engine capable of limited hypothesis testing and so on.
3/11/2012
POLICE STATE AMERICA: "American Jihadist Terrorism: Combating a Complex Threat"
2/20/2012
EFF FBI CIPAV
The documents discuss technology that, when installed on a target's computer, allows the FBI to collect the following information:
- IP Address
- Media Access Control (MAC) address
- "Browser environment variables"
- Open communication ports
- List of the programs running
- Operating system type, version, and serial number
- Browser type and version
- Language encoding
- The URL that the target computer was previously connected to
- Registered computer name
- Registered company name
- Currently logged in user name
- Other information that would assist with "identifying computer users, computer software installed, [and] computer hardware installed"3
Interestingly, a commentator on Schneier blog had this to say about possibly defeating said trojan:
@ Dirk Praet,
11/15/2011
What is New York? Image factory for fascism.
They surrounded the park. There was a long standoff until a pair of large, white open-bed industrial garbage haulers drove in followed by a trail of police. As protesters shouted obscenities or pleaded, the cops grabbed tents, backpacks, luggage, everything- throwing it all into one big, broken pile.
Then they threw it into the backs of the trucks, swept up what was left and hauled it all off. Meanwhile people were running into the camera guy reporting bludgeoning, people being dragged by their hair or on their faces, tear gas- all in areas that had been swept clear of cameras or reporters. I watched the reports coming in over the chat window. I also watched various people calling in reports from police scanners- Where to avoid. Sometimes one of the possible Anonymous folks would come in with AMBUSH! and street names. It was fascinating and likely a very dumb and expensive way to go about things."
---
I think this just goes to show you that New York, and the money lenders in lower manhatten are the real fascists hiding in broad daylight. The globalists, the pro-UN neo-Liberals all issue their marching orders from New York. New York is an image factory that reproduces images of NY, but what is NY politicially? It is a stronghold and bulwark of reactionary corporate oligarchy. It must be resisted by any means necessary. New York is an image factory of fascism.
8/30/2011
Gunwalker scandal: ATF chief assassin/director out of top job
Does it really surprise us that the director of the ATF who has blood on his hands will not be prosecuted by the executive branch? Just like Janet Reno was not executed for her criminal actions against the Branch Davidians and Ruby Ridge incident, so another ATF scum-scoundrel-murder is let off the hook by an illegal administration. We can only hope that Ron Paul will get elected and disband this criminal para-military execution force known as the ATF. If the ATF were disbanded that *might* stave off another US civil war.
Gunwalker scandal: ATF director out of top job - CBS News Investigates - CBS News:
'via Blog this'
8/11/2011
DHS TERROR DATABASE PRIVACY IMPACT ASSESSMENT
http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_dhs_wls.pdf
"The Homeland Security Presidential Directive 6 (HSPD-6), issued in September 2003, called for the
establishment and use of a single consolidated terrorist watchlist to improve the identification, screening,
and tracking of individuals known or appropriately suspected to be or have been engaged in conduct
constituting, in preparation for, in aid of, or related to terrorism (known or suspected terrorists).
Currently, the TSC distributes the watchlist information from the TSDB to other government agencies
including the DHS and DHS‟s internal components.
WLS will allow TSC and DHS to move away from a manual and cumbersome process of data
transmission and management to an automated and centralized process. WLS will replace multiple data
feeds from the TSC to DHS components to more efficiently facilitate DHS mission-related functions, such as
counterterrorism, law enforcement, border security, and inspection activities. DHS will not receive any
new data as part of the WLS; the system was created for efficiency purposes only. At this time, WLS is a
system-to-system secure connection with no direct user interface. "