Wikipedia – First Among Fact Checkers

The Daily Mail’s creaming itself over being able to publish this attack on Wikipedia.

Chris McGovern, chairman of the Campaign for Real Education, said: ‘This is a complete waste of money. Wikipedia is an intellectual crutch, often full of mistakes, and encouraging pupils to rely on it does not help them.

It’s rare to see a target so comprehensively missed. Not a glowing reference for his “Real Education”.

I challenge anyone to point me to a MORE trustworthy and up to date general information source than Wikipedia. You can start by pointing to one which has fewer mistakes (proportionally) and elaborate how you reach that conclusion.

You can then move on to the question of how this potential superior source identifies its errors; how it publicises that identification and how it fixes them.

And finally, you might point out how and whether we can review the history of its entries and check on the identities (pseudonymous or otherwise) of those who created them.

Wikipedia took a while to deal with its most obvious weakness – the unhindered free access to its editing tools by the ignorant or agenda-motivated. But since it sorted that out, about 10 years ago, it has become, by a distance of several light years, the first port of call for anyone wanting a reasonably objective summary of what is known about the widest range of topics arranged in one place anywhere on the internet.

It’s exceptionally useful as the “First Fact Checker”. Here’s a tip. Whenever you read some extraordinary claim about something you know little about, before you go spreading the story, why not check out what Wiki has to say about it? It will save you a lot of embarrassment.

Yes, it still has occasional errors and some rather amateurish entries. And yes, it can still be “spoofed” in small ways on topics that attract so little attention that nobody bothers to check them. But there is nowhere else on the web which has anything like the rich and vibrant support community and readership which ensures that it has at least as high an overall credibility rating as the “professional encyclopedias” (a fact acknowledged by the BBC – who used to love wiki-bashing as well – back in 2005, after research conducted by the journal Nature, which compared a range of scientific entries in Wiki and Encyclopedia Brittanica and found them broadly comparable)

Most significantly of all, Wiki keeps and publishes an ongoing assessment of its own reliability. Point me to ANY other online information source doing that.

So it’s a nod of appreciation to Leicester city council. Your pupils will gain considerably by learning how to evaluate and use Wikipedia as the best starting point for almost anything they need to research. Most important of all, they’ll learn how it never permits assertions to be made without references and it will let them go and check those references for themselves, to see whether or not the assertion is justified. THAT’S “Real Education”.

Perhaps one of the reasons tabloids like the Daily Mail love attacking Wiki is because it can so easily destroy the credibility of so much of their own bullshit.

Today is October 10th, 2012 and I am ready to go to prison.

Thus spake Leah Lynn Plante just over a year ago.

The Empire obviously broke her spirit because they let her out again a few days later, while the other two refuseniks who were kidnapped by the State at the same time, were only released five months later, when the judge admitted that the State bullying had failed to break their spirits and that he could see no further point in detaining them.

Leah, it is rumoured, co-operated with the grand jury and has thus, apparently, since been shunned by her erstwhile anarchist companions. I, for one, salute her bravery. Not many of us would dare to confront the Bully State to the extent she did and the fact that their bullying and intimidation appears to have frightened her into compliance is certainly no basis for condemnation or even disdain.

But I’d be fascinated to know what she revealed. I’m betting it was buggerall because she obviously isn’t any kind of terrorist – unlike the state employed thugs who broke into her home, kidnapped her and locked her up in the name of the scandalous “War on Terror”

So…read the statement, watch the video, then ask yourself, “who, exactly, are the terrorists in this story?”

here’s a more detailed discussion of the implications of what the modern McCarthyites are up to:

now consider the irony of the source of that video. And in case you distrust the message because you might distrust the messenger, remember that the story is on the public record because at least one “proper” newspaper did report the facts and even the negative and seditious comments by Neil Fox, president of the National Lawyer’s guild. It’s also quite well summarised, with references,here as usual. So we know it really happened. Yet hardly any of us DO know…

I was, initially, concerned that this was old news. A year old to be almost precise. Then I thought, well I didn’t know about it before I “stumbled” it tonight and it’s right in my target zone. Then I looked around for other coverage of what ought to have been fairly major police state outrage and found almost nothing. Fewer than 150 people have watched that video before now, so you’re an early adopter. I couldn’t find any evidence of more than a few thousand views of other versions of the same thing and, as for the mainstream, as usual, nada… Indeed just google “leah-lynn plante” “grand-jury” which terms ought to appear in any serious reporting of the story. It returned a little under 37,000 results, none of which included, in the first five pages, any recognisable commercial or state media. Bizarrely not even that Seattle Times piece appears in the early pages and it definitely contains those search terms!

Somehow they’ve managed to hide the story in plain sight. Which is why it’s probably as much news to you as it was to me.

I find this particular disturbing. One of the observations I made, back in 2005, in the first comment I wrote for my original “Police State of America” collection was that one feature that gave us “hope” for the American condition was that – at least – all its problems were being reported by other Americans, revealing a considerable level of resistance and dissent.

Will we now have to start relying on the Russians to host discussion of the continuing American descent into State brutality against its own citizens?

NSA Backlash limps into action


Kudos to the Real News for that interview.

I’m still surprised and disappointed at the miserably subdued backlash against what the American authoritarians and their poodles have been getting away with against the citizens of the world.

But perhaps I’m just impatient and the Resistance is building. Today I hear that there are demonstrations in the streets of Washington, under the banner “Stop Watching Us“. No word yet on how many turned up.

That matters. If it’s a handful, the regime will read that as a green light to continue. It would need to be a several hundred thousand to have serious political impact.

Authoritarian defenders are crawling around trying to find ways to defend the indefensible. One of the most cringeworthy was Cameron’s puerile posing at yesterday’s EU summit

“What Snowden is doing – and to an extent, what the newspapers are doing in helping him doing what he is doing – is frankly signalling to people who mean to do us harm how to evade and avoid intelligence and surveillance,” he said. “That is not going to make our world safer.”

What the fuck has that got to do with listening in on Angela Merkel’s private telephone conversations?

The answer, of course, is “nothing whatsoever” but they haven’t got any kind of justification for that abuse, so, instead they fall back on a childlike reference to the reason they routinely give for snooping on everyone else, in the hope that somehow, the “bewildered herd” will conflate the two issues and conclude that spying on 35 world leaders is all necessarily part of the “War on Terror”

Well those 35 and many other members of the international political classes are beginning to smell the coffee. And they’re beginning to feel their blood pressure mounting as they take on board the extent of American (and British) hubris. This has already resulted in growing demands for NSA-proof communication systems between them and, as you’ll have seen in that Video, countries like Brazil are going a whole stage further and demanding communication channels which bypass America altogether.

This is a very welcome development for the politicians at least. Let’s hope they remember that any secure sauce considered good enough for the political goose is equally good for the citizen ganders.

None of the so-called “Revelations” are actually new…
Coincidentally, “Nothing Whatsoever” is also the answer to the question: how much does the average politician, including the British Prime Minister, understand about “Security”? He and many others we’ve seen squirming in recent weeks have frequently repeated that absurd argument quoted above.

As I’ve pointed out elsewhere, NOTHING in the Snowden revelations is new or unexpected. We have been able to read about it for years, and not just in conspiracy fetish forums where they don’t believe Man has ever walked on the Moon, but in well documented and highly respected sources like the trilogy of exposes written by James Bamford over the past 30 years (“Puzzle Palace” 1983, “Body of Secrets” 2002 and, with specific reference to all the web snooping, “Shadow Factory” 2009)

All Snowden has added to the picture is detail (like the name of the relevant program – PRISM) and some notion of scale. Mostly he has simply confirmed what we’d read in Shadow Factory. (Actually, in my case, I was 2/3 of the way through that book when the Snowden revelations hit the street. That made it somewhat more pressing and relevant!)

So the notion that the “evil-doers” didn’t already know this is utterly stupid and exactly the kind of misapprehension that those who do understand Security would NOT be labouring under. Such naiveté might have been widespread among terrorists at the turn of the century but after 12 years of targeted drone strikes and other successful assassination attempts, the spooks KNOW that their main genuine targets are very aware of the need for secure communications and, almost certainly, avoid using the web altogether (at least not for operational communications).

The only “terrorists” who are going to be caught through their web activity are the terrorist equivalent of those “script kiddies” who created a bunch of irritating but mostly harmless malware in the Nineties and Naughties. They’re the “wannabe jihadists” who, even if they aren’t caught, are rarely going to have the aptitude and experience to pose real threats.

Exposing the scale of the NSA dragnet has, therefore, done “nothing whatsoever” to alert the real bad guys. Which is not, however, to say that the exposure doesn’t help the terrorists. It does, but obviously the spooks haven’t bothered to tell the Prime Minister and other politicians how. Perhaps they think it’s too complicated for him and the rest of the bewildered herd to grok. Or perhaps they’re too embarrassed to admit that they’ve shot themselves in both feet.

How Snowden HAS Helped the Terrorists…
Here’s how Snowden’s high-profile confirmation is going to make life easier for the terrorists and the few other genuine anti-social bastards (like the paedophile network, or people traffickers) we really do need the security services to try to keep tabs on.

At the moment, none of the serious targets will ever be caught discussing anything (significant) online in plain text. If they use the web at all they’ll be using adequate encryption, almost certainly beyond NSA’s capacity to break. But it’s unlikely they’ll even use much in the way of encrypted emails because they will also be aware that even if their messages cannot be read, traffic analysis and the so-called “metadata” we keep hearing about provides a huge amount of significant data on its own, even without knowing the content.

The NSA have huge programs designed to trace the networks of connections between ANY given bunch of targets. As you can read in that link, they (and others) can easily create ad hoc network diagrams for any given targets. But they live in a “target rich environment”, so they have to spend most of their time focussed on those most likely to be sharing sensitive data. Thus they’re most interested in the connections between users of encrypted email. Because, they reason, if the senders are hiding something, it is probably worth reading, and definitely worth knowing who is talking to who.

And, at the moment, tracing those connections and compiling the relevant “organisation chart” is relatively simple. I doubt if, even globally, more than a hundred thousand email users regularly securely encrypt their messages. And mapping the links for that hundred thousand or so is well within the NSA reach.

But a major consequence of Snowden’s leaks is already beginning to be visible as the number of users of serious encryption begins to rise. And some significant political and commercial muscle is going into the mix. For example, Brazil, as we’ve heard, is now demanding a secure email system for their politicians and it’s quite likely they’ll make it available and recommend it for their citizens.

German entrepreneurs, meanwhile, have already come up with a partial solution and appeared within hours of the Merkel revelations, to exploit the advertising opportunity for their SecuSmart micro SD card “encryption dongle” – available for all smartphone users and in use by the German Government since July; which might be why we’re now hearing that Merkel was targeted from 2002 up until June this year. Once the card was fitted, NSA would have lost their ability to bug her – although not necessarily their ability to track who she was calling or being called by. Any communications between two users fitted with those cards can at least be confident that the content of their conversations is not being overheard (providing, of course, that the phones themselves haven’t been tampered with and they’re not bugged in any other way)

We can confidently expect a rash of genuinely secure phone and email products to appear on web pages near you in the near future. Who knows, Google and some of the other major players might even tweak their own services to make them snoop proof (by giving users the ability to add their own secret keys).

So there is a very real prospect that within, say, 5 years, instead of a hundred thousand secure emailers, there will be a hundred million and, as any fule kno, the complexity of a network diagram is proportional not to the number of nodes, but the square of that number (“Metcalfe’s Law”). So the NSA task isn’t going to be a mere thousand times more difficult, but around a million. And even their shiny new Utah Repository isn’t going to be able to cope with that.

Which means that it will shortly become much safer for terrorists and others to use their own encrypted emails. Fish are always safer swimming in the sea. Up till now, they’ve been forced to swim in a rather small pond and have, thus, been easy to target with a hand-held net. Snowden’s revelations, with the help of those media not afraid to talk truth to power, have already achieved far more exposure than Bamford’s. His book is currently languishing at number 72,169 in the Amazon sales rankings, which I reckon must mean that probably fewer people have so far read his (much more detailed) exposure than my guesstimate of the number of users who routinely encrypt their mail.

So the sharks we really do need to keep an eye on are about to get the comforting camouflage of another hundred million or so fish and the reasonably sized Sea they need to swim in more safely. This is what they call, in the trade, Blowback. Nice one NSA…

Ad Blocking Software – Strongly Recommended

Check out this pleading inanity from one of my (otherwise) favourite sites

Dearie me, am I to understand that it’s a problem for Physorg that I choose not to conform?

Idiots like this just don’t get it. Some of us are not just immune to advertising, we actively and passionately object to it as a manipulative abuse of bandwidth.

This antipathy is more prevalent, perhaps, in UK citizens than most because we have the Beeb, producing consistently high standards of broadcasting without commercial breaks. Before we had our hard-drive backed digital TV services we often had to wait two hours before getting to pee.

Nowadays, we can just pause the program, which neatly eliminates the one advantage that commercial breaks could boast. And boy does it make for a massive culture shock when we are exposed to American TV. That culture must be behind the sentiments expressed by this drivel.

They clearly believe it is their god given right to advertise to me. As my regular reader will know, I obviously don’t believe in god given rights. And, as it happens, I don’t believe in human rights either. I believe in Liberty – which is merely the absence of constraint – and Reciprocity – treat others as you would wish to be treated in return. That combination covers every conceivable ethical question you’ll ever confront; including whether or not to tolerate intrusive commercials on a web page.

And I see absolutely nothing which justifies any constraint whatsoever on my ability to install Adblock and not just ignore your adverts but remain blissfully unaware of their existence. Adblock is a free Firefox add-on – strongly recommended if you’re as allergic to ads as I am. And those who might be inclined to follow my recommendation will not confuse the previous sentence with “advertising” because they will know I have absolutely nothing to gain by that recommendation other than the knowledge I am spreading a little more contentment. My motives, are, therefore, entirely honorable. As I’m sure is true even of some commercials. But not many…

What Physorg and those who think like that obviously don’t understand is that if I was forced to suffer their sites with ads, I would simply exercise my liberty to avoid visiting those sites. How would that improve the human condition?

Dorks.

The History Of Digital Telepathy

I know this won’t be the first time you’ve heard it, but on this day, of all days, we are entitled to remind ourselves, with a certain amount of mutual back slapping, that we are living in the first period in recorded history in which there has been no verifiable armed conflict between nation states anywhere on planet Earth, for more than a decade. In some quarters there are even nervous whispers that it might, at last, be safe to come out from under the bed. John Lennon’s dream may have come true. War – as “diplomacy by other means” – may finally be consigned to human history.

It is easily the most far-reaching and widely accepted benefit of the digital telepathy we now take for granted so perhaps it’s worth briefly reviewing the history of how we got where we are today.

Step 1 – The Smart-Phone
Scholars argue that the demand-driver for DT were the antique smart-phones we see proudly displayed in p-resin as antiques in many modern homes today. They were the first platform which made ubiquitous conversation possible. The ease with which they integrated into the emerging online infrastructure of social networking and video sharing made it trivial, in turn, for the ubiquitous conversation to become the universal conversation, where we could all, for the first time in our history, begin to share in real-time, events happening to ordinary citizens around the world. The appetite for this connectivity had never been anticipated, not even by the world’s most imaginative science fiction writers. Smart-phones and the early web not only generated that appetite but, given the limits of early 21st Century technology, made a pretty good stab at satisfying it. But what those prototypes really did was to illustrate the desire for something much more complete.

Historically we recognise that the transition from a global economy based on profit, to one based on utility was well under way by the early 21st century. As Sarah Klein puts it in her award-winning “From Money to Merit”:

“While we can clearly see that commercial organisations continued to dominate innovation in (capital-intensive) hardware, the clear majority of important innovations in software, even before the inception of the Web, came from the Open Source movement, which made most of their product available at no cost to the consumer. The most important, of course, being the effective cryptography, on which modern society depends” (GooLit, 2053)

Credit must be given, however grudgingly, to the late capitalist compulsion to pursue profits, if necessary even by generating new markets – with their knack for “creating the solution to no known problem”. Selfish though such motivation usually was, there can be no denying the effect it had on technological innovation. Although we now recognise software to be the more important component of our socio-economic infrastructure, that software needed the hardware to run on. Like it or not, the greedy capitalists did far more than socially focussed collectivists to make that happen. Without the combination, however, today’s prosperous, healthy, peaceful and money-free society simply wouldn’t have been possible. So despite their overall brutality, we have a lot to thank the Capitalists for. They got things done. And when their time was over, unlike the Authoritarians who depended on their support, they had the good grace to sink relatively peaceably back into society with no hard feelings between us.

Some argue that the vital step towards DT was the first smart-phone implant (remember the “Mind-Phone”? – you won’t find many of those hanging on living room walls!) and there is no denying that it had enormous consequences. On the road to DT, it was, for a start, the first time you could make contact with someone just by thinking their tag. But it was the effect it had on social control which scores much higher in my analysis.

Step 2 – Citizen Surveillance v Privacy
To begin with, even though it was now simpler than ever to communicate, privately or publicly, with any other similarly connected individual, that first generation of mind-phone users were no more likely to communicate with their fellow early adopters, than they had been as smart-phone users. What had much more dramatic impact was the routine and effortless ability to record, privately and securely, anything and everything they did or witnessed. Being able just to think “store that” rather than dig a phone out of a pocket, unlock it and press a few buttons, made recording so easy that it became the default. Combined with pre-capture and growing memory capacity, it became easier to record virtually every waking moment – and perhaps discard the mundane or unwanted – than try to anticipate what might be worth recording and run the risk of missing it. With trusted time-stamps and hash-indexing against secure auditing databases it became trivial to retrieve forensic quality evidence of any arbitrary event from your own past with verifiable accuracy – provided only that you’d bothered to store it. And it being so effortless, why wouldn’t you?

Initially no one perceived its significance. It merely expanded the opportunities for egocentric adolescents to make fools or heroes of themselves and publicise their antics on the early attempts at digital sharing (remember “Facebook” and “YouTube”? Those were the days!) Scandalous headlines arose fairly quickly, when one or two (thousand) “minders” abused the technology to record and then playback intimate sexual encounters or other sensitive private moments without the informed consent of the other parties. That kind of abuse encouraged the widespread adoption of privacy locks, so that any such recording could only be shared if it was unlocked with keys belonging to all parties present at the original recording. Indeed, until the invention of the mindlock, locked data couldn’t even be replayed internally by the record holder unless the relevant parties pooled their keys.

Then came the question of how to deal with either tragic or sinister situations. Democratic random key distribution and trusted key escrow systems took care of those issues. In the tragic scenario, the individual’s own nominated trusted key holders could recreate the missing keys if death or serious incapacity was medically certified and at least 75% of them agreed that key assembly was necessary and appropriate. In the sinister scenario, like suspected rape or murder, where a suspect perpetrator chose to with-hold their keys and their trusted key-holders also refused to co-operate, the keys were constructed so that any 750, out of a thousand randomly selected citizens could – if persuaded that there was a strong enough case – reassemble the missing keys from their own copies of the distributed key store. Today, of course, we require 900, but, for its day, that degree of democratic control was almost revolutionary.

On its own, though, it was not enough to produce the legal and social revolution which knocked away a major pillar of the Authoritarianism that still ruled humankind in the 3rd decade of this century.

Step 3 – The Legal Victories
The first few successful prosecutions of corrupt or bullying police officers and politicians – made possible by evidence gathered beyond their control and beyond reasonable dispute – didn’t have as much impact as you might have expected. Again, it seemed like only a small step from the same kind of exposures produced by the already widespread digital sharing that had kicked off “citizen journalism” at the tail-end of the previous century. But as the numbers of such incidents began to grow in the typical “successful market” exponential manner, the consciousness began to rise – simultaneously within the citizenry and the authoritarians – that, largely due to the massively improved verifiability of the stored content, it was becoming increasingly difficult for the bullies to hold sway.

What the authorities hadn’t anticipated was that the same cryptographic protections which were essential to protecting individuals from illicit access to their thoughts (which were, of course, accessible by the implants) would prove so valuable in validating any claims made by those individuals in respect of evidence gathered in the routine recording of their daily lives. The crypto protocols didn’t just protect, they forensically validated every transaction and recording that they protected. Their audit trail was bullet proof and beyond reasonable challenge.

By the time some of the more extreme authoritarians woke up to the threat and tried to outlaw the technology in a belated attempt to hold back the tide, it was already becoming almost impossible to detect that an individual even had an implant; particularly after the introduction of the first generation of biological implants genetically configured to operate within the brainstem. And it became increasingly implausible, in the light of all the obvious crime it was detecting – and thus deterring – to argue that citizens shouldn’t avail themselves of this growing benefit. Many authorities pointlessly tried shielding their own contacts with the citizens, which only affected the ability to stream data in real-time – which nobody with their head screwed on ever attempted because it immediately made the implant eminently detectable. It had no impact, however, on our ability to record, with trusted timestamps and hash-chains, at either end of a shielded session, and thus to verify our account of the session, to the rest of the world on demand.

If they knew you had an implant, the more corrupt authorities even tried to use the privacy locks to their own advantage. In the guise of offering the victim their own trusted record, they insisted that all mutual sessions be recorded but privacy locked. If the victim subsequently complained, the authority would routinely try to hide behind its own absolute right to privacy. They would, occasionally, even attempt denial that any contact had taken place. It took them a while to understand that although they do not reveal content, time-stamped and shared privacy locks can easily be used to prove that contact had taken place between the sharers, and the routine authoritarian refusal to unlock audit trails covering disputed events made it increasingly obvious they were lying or abusing their authority. Of course, once the victim was arrested and able to prove the privacy lock times and locations, such authorities then found themselves bound by the rules of disclosure and though they often managed to persuade a judge that executive privilege was justified, they also often failed. And the more often they failed, the more likely it became that some other judge or jury would see through their naive pretences. Eventually it became abnormal for their pleas to succeed.

It was very entertaining to witness the Authoritarians’ own long time mantra coming back to bite them: “If you’ve nothing to hide, you’ve nothing to fear” had been their excuse for the authoritarian surveillance they had increasingly imposed, without consent, on a pliant society. How could they possibly argue against our recording what went on when they dealt with us? And how could they defend not revealing the content of those recordings?

Step 4 – The State Found Guilty of Murder
But what really mobilised the masses was when it became widely understood that citizens with implants could not just win any “your word against mine” argument over trivial disputes with friends, colleagues and family, but could fairly easily prove themselves innocent against even the most the malicious charges of a corrupt authority, however much tax-funded effort they put in to framing their victim.

The infamous case of Wilson v the United States is the pivotal case every student learns about and which exposed the levels of corruption endemic in the so-called Justice system. The police, under the direct instructions of a political aide (Adrian White) to the then Vice President (Joanne Schwarzewild), and with the explicit knowledge of the Attorney General (Carlos Martinez), were shown conclusively to have planted evidence and commissioned witness testimony with the corrupt and direct intent to convict an innocent student – David Wilson – in order to conceal the part played by the FBI in the assassination of the wife (Carole) of a Republican Senator (Alan Liebowitz) who had inconveniently caught said Senator cheating on her in an election year. Unfortunate timing on both sides.

Not only was the student able to prove his own alibi by giving a comprehensive and indisputable record of his movements and location during a critical 14 hour period, but, following his arrest, he endured the routine “legal” blackmail session known as “plea bargaining”. They didn’t know he was implanted and he captured virtual admissions by the police interrogators and prosecutors that he was being set up as a Patsy, that he had “no chance of beating the State machine that you’re up against and your own best interests would be served by admitting guilt even though we all know you didn’t do it”.

The political clincher was the testimony provided by a White House secretary, Marion Downey, present during a conversation in which the Vice President casually made it clear to the Chief of Staff (Sydney Walden) that the suitable target had been found. The VP informed the Chief of Staff that David Wilson regularly earned a bit of extra cash tending the extensive gardens of the Senator’s New England Mansion on Saturday mornings. He could be put in the right place at the right time.

Downey didn’t take much notice at the time because she misunderstood it as a trivial domestic arrangement for the Senator’s gardening requirements. It was only when the Senator’s murdered wife popped up on all the News feeds a couple of weeks later, followed by a startled looking David Wilson being arrested for the murder that she realised she was in possession of incriminating evidence. And for reasons which have been replayed since in a dozen dramatisations of the story, she didn’t much like the VP at the time.

Downey swore testimony and offered to reveal her data to the court but both the Vice President and Chief of Staff pleaded the Fifth and refused to share their privacy-locking keys, citing grounds of “National Security” and “Executive Privilege”; which, for the first time, the entire planet understood to be an inescapable admission of guilt.

The judge (Justice Steven Warren) – clearly part of the conspiracy – tried to rule her testimony invalid and even tried to block the expert testimony of the mathematicians and forensic software consultants who could explain how and why Wilson’s alibi was incontrovertible. Famously the Jury went on strike – together with elements of the local police – who had caught the mood of the masses and refused to make any arrests. The media storm and widespread public protests eventually forced the Government to concede a retrial under the famously incorruptible Justice Mary Elizabeth Sterning.

The technical evidence demonstrated to the court how Wilson’s evidence could not have been spoofed.

The assassin hired by the FBI had killed the Senator’s wife 15 minutes before Wilson was due to report for duty on Saturday morning, expecting him to show up just before the Police snatch squad sent to arrest him with the smoking gun. But he had consumed rather too much alcohol at a Frat party the previous evening and didn’t make it to the Mansion. His ability to prove his movements sunk the prosecution case and under the judge’s direction, the jury gladly, and unanimously, found him not guilty and made their now famous declaration finding “Agents and Agencies of the Government guilty of murder in the first degree, conspiracy to pervert the course of justice and perjury to a degree amounting to Treason against the people of the United States”.

As well as the huge and inevitable political storm this provoked, overnight the American “successful prosecution” rate, always considered as infeasibly high, plummeted as it quickly became clear that a significant percentage of prosecutions were without verifiable foundation and resulted from virtual blackmail in the form of the corrupt plea bargaining system. Outside America the corruption of its judicial system was widely recognised, not least as a result of the direct inverse correlation between the wealth of the defendant and their probability of conviction. But getting Americans to see it with their own eyes was absolutely crucial. Once their authoritarian domino began to wobble, all the others realised the peril that was upon them.

Step 5 – Changing the Game and the Players
Once the chances of successful prosecution against provably innocent victims fell to near zero, the entire plea bargaining system crashed and burned. One after another, juries refused to follow the edicts of obviously corrupt judges and made it impossible to convict the innocent. Honest judges, who fortunately still formed a majority within the judicial system, began rejecting Police evidence routinely unless it was digitally recorded, with trusted time-stamps, on a protected audit trail. The crunch came when the still largely Authoritarian Congress tried to pass new laws, dramatically reducing opportunities for – and the powers reserved for – Trial By Jury. Simultaneously, they tried to mandate trust in Police evidence even when not digitally preserved. Nearly one and a quarter million American Citizens surrounded the Capitol and refused to move until the vote was taken. The Sacking of Congress, which followed the infamous vote is, of course, the day we now all celebrate as the birthdate of our real democracy.

In the famous words (*) of Supreme Court Justice Stephen Pilliakov – the only sitting Supreme to try to fight the State’s attempt at resisting the revolution (and one of the first into the Capitol on that famous Tuesday):

“Yes, it is still necessary, in some circumstances, for society to delegate Authority to public employees but on this historical day we have finally come to terms with Lord Acton’s axiom: “Power tends to corrupt, and absolute power corrupts absolutely. Great men are almost always bad men.” And at last we have found the solution…

From this day forth, the rule of Law shall be modified thus:

Citizen: Innocent until proved Guilty

Authority: Guilty until proved innocent.”

Beyond the criminals in Authority, it became effectively impossible for criminals in the wider world to know – in advance of their attack – whether or not someone was capable of recording their attacks, so once the adoption rate passed the critical mass of about 25%, it rapidly became too dangerous for most attackers to take the risk. Of course, if you actually intended to kill the target, it was still relatively simple to arrange a murder before the victim’s sensors could identify the attacker, for example using a sniper rifle at distance, but almost all other attacks became too costly to the attacker. And once the technology adoption rate achieved the 95% level, the ability to track down attackers purely by a process of elimination became feasible and crime fell to the levels it still sits at today where Murder and Rape are now so rare that each one becomes a sensation for a few weeks after it is uncovered.

Step 6 – Making Public Lies Impossible
The next major enhancement was AAI – Augmented Artificial Intelligence. Some of us are old enough to remember its humble beginnings as a simple audio-visual prompt which would remind users of the name of that acquaintance you’d bumped into in the street. You’d only met them once, and that was a few months back. It was so damn useful to have that name and bio prompt and be able to greet each other, convincingly, like old friends!

But then AAI’s language and context recognition skills began to be turned in another direction. RTFM – Real Time Fact Monitoring – was the killer app that did for Authoritarianism what that prehistoric asteroid collision did for the Dinosaurs. Their use of covert and overt violence to control the population had already been made untenable by the citizen surveillance arraigned against them. Now it became increasingly impossible for them to control any part of the political messaging system unless it genuinely fitted the facts.

At first it was a tool for the satirists. They’d replay a political speech but with the AAI analysis showing up as subtitles. We all smirked as politician after politician was shown to be misinformed, prejudiced, selective, manipulative, superstitious or lying. Bigoted journalists, exaggerating CEOs, Evangelist millionaire ministers and a host of other routine social parasites were all publicly exposed in the same way.

It quickly became obvious that the game was up. No public statement, nor even a private one – if if was based on facts in the public domain – could be made without the increasingly infallible RTFM flagging up all attempts at deceit and manipulation. Dishonest politicians, in particular, found it impossible to continue their centuries old tactics and quickly became unelectable. And although it took a full fifteen more years for the effects of RTFM to sweep the planet, and one or two regimes fought to the literal bitter death, Authoritarianism died, not so peacefully, on January 5 2058, with the public hanging of Iran’s “Guardian Council”.

And as we all know, we’ve seen massive drops in crime against the person, mirrored around the world, and despite the on-going genuine conflicts which continue to exist between citizen and citizen, between State and citizen and between State and State, since that date there hasn’t been a single day of armed conflict between any two or more member States of the United Nations. It seems that once it became impossible to lie to each other about anything which could be instantly fact-checked or, if necessary, remotely or citizen surveilled, wars become essentially impossible to create.

This year, as multiple celebrations are regularly reminding us, is the centenary of the recognised starting point of the digital age – January 1 1970. And today is specifically the 50th anniversary of that first smart-phone implant on April 1 2020 – the birthdate of Digital Telepathy.

I give you “Happy D Day”


*Pilliakov’s speech in Context:

“Yes, it is still necessary, in some circumstances, for society to delegate Authority to public employees but on this historical day we have finally come to terms with Lord Acton’s axiom: “Power tends to corrupt, and absolute power corrupts absolutely. Great men are almost always bad men.” And at last we have found the solution.

From this day forward, let it be known to anyone aspiring to the exercise of Authority in this land: if ever you are delegated powers to act on our behalf, you shall be assumed fully accountable for every second of your life while you remain in office and, if appropriate, for a number of years before and after you leave office.

What this means in practice is very simple. Should you be accused of any crime or misdemeanour, in contrast to the Citizen, whose innocence will continue to be assumed until a Jury can be persuaded otherwise, the starting point for anyone in Authority is the exact opposite. Your guilt shall be assumed unless a Jury can be persuaded otherwise.

For some years, a growing number of ordinary citizens, now constituting a large majority of the population, have, for a wide variety of their own purposes, voluntarily and routinely captured comprehensive detail about own their lives; so comprehensive, that some innocent citizens have famously defeated the infamous attempts by a corrupt State and corrupt judicial system to continue their embedded practice of widespread judicial blackmail and tens of thousands of false imprisonments.

That same technology shall, in future, be deployed to further protect the Citizen from rogue Authority. Unlike ordinary citizens, for whom the adoption and precise use of such technology will always remain optional, if you are appointed to a position of Authority, it is, hereafter, a condition of your employment in such a post, not only that you be monitored by the technology, but for that monitoring to be provably continuous.

You shall record your every move, your every conversation, your every heartbeat. They shall remain just as private and secure as the data stored voluntarily by private citizens. But unlike the private citizen, about whom there can never be certainty about what data they have captured and chosen to archive, the world will know that you are legally obliged to possess your own digital record of any disputed event.

The world will thus know that, if you are innocent, you will be able prove it, just as thousands of innocent citizens have managed to do themselves, even under direct attack by the Authorities and Rules which were supposed to exist to protect them. Under these circumstances, it is, of course, reasonable, should you be accused of anything untoward, that you are given the opportunity to prove yourself innocent. But should you choose not to present such evidence, even if you claim that the evidence has been destroyed, or that a system failure prevented storage, your guilt shall be formally confirmed.

From this day forth, the rule of Law shall be modified thus:

Citizen: Innocent until proved Guilty

Authority: Guilty until proved innocent.

Hillsborough: Why Conspiracy Theories Thrive

So now we KNOW the truth. Up until today, it was just another conspiracy theory. Think about that…
And then address the question of how we might determine which of the other million or so conspiracy theories floating around the web are also entirely (or at least mostly) true.

I’ll expand on this later. (he threatened…)

Internet Usage Correlated With Emotional State

I already knew I wasn’t depressive, but the obvious question after reading this is:

Am I not depressed because I don’t do a lot of file sharing, obsessive email checking or frequent switching?
Or is it cos I is black?