_______________________________________________________________________
HUBGRAM
Flash Bulletin
September 16, 2007
Violations of Your Rights Boggles the Mind
An Introduction….
To protect yourself, this is an introduction to what you must know about how far the government has absconded with your rights and freedoms.
And then you can decide what to do about it.
This is a little background gathered from several sources:
To most of us with any sense of serious curiosity, it is interesting to figure out what NSA and other investigative agencies are doing with all the data being mined from telephone conversations. Many of us felt that gathering so much data from so many sources seems unproductive and a waste of time. But it would indicate that we know little about the powerful new tools that are being used to probe our lives, our relationships, and virtually everything we had considered personal and none of anyone’s business…
The end result is that there is no more PRIVACY—our lives have become open books that may be probed with permission, without the sanction of a Court of law.
What do they do with all of the information they have access to?
What do they do with it? How do they use it?
What I’ve learned is that the degree of sophistication of places like NSA goes far beyond what most of us might have suspected and is constantly evolving so that what only a few years ago may have seemed an agglomeration of data is now being interpreted intelligently sorted, sifted and analyzed in ways we wouldn’t suspect possible.
And it goes way beyond anything that was part of the inventory of mathematical tools only a few short years ago. This stuff is mostly new and generated as a result of the computer age.. In fact, entire new fields of mathematics, psychology and abstract thinking are being employed in various new and creative ways to take raw data and use it to discover relational linkages among what you believe, your friendships, your avocations, education and everything else that differentiates you as a human being. Towards that end, they employ special algorithms not unlike those used by say Google. But unlike Google, they are not looking for advertising content of some kind but the kind of messages that wouldn’t belong to a conventional subset. .
For example, in relational data base mining, the information sifters are not so much interested in content, per se, but how that content is being used and perhaps more importantly how linkages are crafted and what makes up those linkages. The mathematicians involved see this in terms of three dimensional network linkages akin to a visual kind of net with the knots representing the nodes and the string the actual relationships to different groups that may occur in non-linear ways.. And by analyzing these linkages, they can see who is connected, what are the areas that the participants are engaged in and who is talking to whom and interpret from models what that mean in the larger sense….
When asked from where do these nets appear, the subject said that all of the relationships begin with prior data mining. It begins, per se, with the conversation between one party and another. And it is the byproduct of data mining made possible by this government’s interpretation of FISA regulations that allows the president to eavesdrop randomly without direct approval by the courts in direct violation of the Constitution….
There is a whole other branch of esoteric mathematics that deals with the content. We have heard about programs that hunt for key words. This has not gone away but been expanded way beyond it was with Scavenger and other early FBI type snoop programs.
With the combination of both the data mining and relationship linking along with data analysis, it is easy to sort and prioritize data that has been elusive in the past.
The government, of course is not going to tell us what it knows but the real frightening thing is that most of this data is being generated by citizens who have not been advised of their rights, nor has the Federal courts personally approved of this kind of eavesdropping constituting what amounts to wholesale violation of individual rights under the Constitution. Entire databases are being constructed based on these findings. You may already have been a subject and have all of your file information, anything that is available on you, already catalogued and indexed in some government file, how many times you fell behind on payments, your medical condition, who your friends are, what they do that the government does not like, how many calls you’ve made to sensitive area. In short, what constitutes a circumstantial profile on you, a citizen of the United States.
While I am not against using data to find terrorists, the very fact that we are ignoring the constituting and violating our rights seems to be more laden with dangerous precedent than the threat posed by any terrorist revealed by this system.
When we overlook our rights under the Constitution, we cease abiding by that idea we call democracy.
And so, to my mind, it is a case of the cure being worse than the illness.
With no one picking up the standard who thinks that our way of government is worthy of protecting, these violations will continue perpetuated by something called precedent and unlikely to change under a republican administration, either now or in the future.
Be aware. Be very aware.….
Les Aaron
The Committee for Positive Growth
We are sustained by contributions and volunteerism
LAAGroup@aol.com
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home