Peter Dorman connects the dots at EconoSpeak.
http://econospeak.blogspot.com/2013/06/from-big-brother-to-big-data.html

Some time ago I mentioned in this blog that, by all appearance, killing by
profile was becoming an established military tactic. Targets for bomb
attacks, including but not limited to armed drones, were being selected on
the basis of statistical profiles. Given the number of individuals at a
particular location, their age and gender, the time of day, whether there
was a pattern to their meeting and so on, a decision would be made to blow
them up. It was not necessary to have information on their precise
identities or human confirmation of their military activities. A simple
statistical likelihood was sufficient cause. In the years that have passed
the suspicion that profiling was being employed for target selection has
become a near certainty.

…

So the second question is, to what extent do the profiling activities of
NSA and other agencies interface with the profiling models employed to take
action against individuals—to restrict, punish or kill them? The current
discussion seems to be based on the assumption that the profiles
constructed by intelligence agencies will be used only as an aid to
traditional surveillance and investigation. NSA tells the FBI, watch these
guys: they may be dangerous. Or they tell them, here are several suspects
for this crime you should follow up on. That sounds only a tiny bit
Orwellian, nothing to be too concerned about. But what if that traditional
human layer is bypassed, and the profiled data go directly into a profiled
action?


On Sun, Jun 9, 2013 at 11:13 PM, Chuck Grimes <[email protected]> wrote:

> I am not really sure what to say or think. None of what Juan Cole wrote in
> his summary or anything that Edward Snowden said in this interview with
> Glen
> Greenwald is news.
>
> Still it is nice to see and hear. Yet what is the point worth notice? I am
> no sure. Maybe that the mass surveillance state focuses most of its
> interest
> on whisleblowers of the mass surveillance state?
>
> Create a national security state to protect the national security state?
>
> Something about a logic loop belongs here.
>
> CG
>
>
> _______________________________________________
> pen-l mailing list
> [email protected]
> https://lists.csuchico.edu/mailman/listinfo/pen-l
>



-- 
Cheers,

Tom Walker (Sandwichman)
_______________________________________________
pen-l mailing list
[email protected]
https://lists.csuchico.edu/mailman/listinfo/pen-l

Reply via email to