Peter Dorman connects the dots at EconoSpeak. http://econospeak.blogspot.com/2013/06/from-big-brother-to-big-data.html
Some time ago I mentioned in this blog that, by all appearance, killing by profile was becoming an established military tactic. Targets for bomb attacks, including but not limited to armed drones, were being selected on the basis of statistical profiles. Given the number of individuals at a particular location, their age and gender, the time of day, whether there was a pattern to their meeting and so on, a decision would be made to blow them up. It was not necessary to have information on their precise identities or human confirmation of their military activities. A simple statistical likelihood was sufficient cause. In the years that have passed the suspicion that profiling was being employed for target selection has become a near certainty. … So the second question is, to what extent do the profiling activities of NSA and other agencies interface with the profiling models employed to take action against individuals—to restrict, punish or kill them? The current discussion seems to be based on the assumption that the profiles constructed by intelligence agencies will be used only as an aid to traditional surveillance and investigation. NSA tells the FBI, watch these guys: they may be dangerous. Or they tell them, here are several suspects for this crime you should follow up on. That sounds only a tiny bit Orwellian, nothing to be too concerned about. But what if that traditional human layer is bypassed, and the profiled data go directly into a profiled action? On Sun, Jun 9, 2013 at 11:13 PM, Chuck Grimes <[email protected]> wrote: > I am not really sure what to say or think. None of what Juan Cole wrote in > his summary or anything that Edward Snowden said in this interview with > Glen > Greenwald is news. > > Still it is nice to see and hear. Yet what is the point worth notice? I am > no sure. Maybe that the mass surveillance state focuses most of its > interest > on whisleblowers of the mass surveillance state? > > Create a national security state to protect the national security state? > > Something about a logic loop belongs here. > > CG > > > _______________________________________________ > pen-l mailing list > [email protected] > https://lists.csuchico.edu/mailman/listinfo/pen-l > -- Cheers, Tom Walker (Sandwichman)
_______________________________________________ pen-l mailing list [email protected] https://lists.csuchico.edu/mailman/listinfo/pen-l
