NSA Backlash limps into action


Kudos to the Real News for that interview.

I’m still surprised and disappointed at the miserably subdued backlash against what the American authoritarians and their poodles have been getting away with against the citizens of the world.

But perhaps I’m just impatient and the Resistance is building. Today I hear that there are demonstrations in the streets of Washington, under the banner “Stop Watching Us“. No word yet on how many turned up.

That matters. If it’s a handful, the regime will read that as a green light to continue. It would need to be a several hundred thousand to have serious political impact.

Authoritarian defenders are crawling around trying to find ways to defend the indefensible. One of the most cringeworthy was Cameron’s puerile posing at yesterday’s EU summit

“What Snowden is doing – and to an extent, what the newspapers are doing in helping him doing what he is doing – is frankly signalling to people who mean to do us harm how to evade and avoid intelligence and surveillance,” he said. “That is not going to make our world safer.”

What the fuck has that got to do with listening in on Angela Merkel’s private telephone conversations?

The answer, of course, is “nothing whatsoever” but they haven’t got any kind of justification for that abuse, so, instead they fall back on a childlike reference to the reason they routinely give for snooping on everyone else, in the hope that somehow, the “bewildered herd” will conflate the two issues and conclude that spying on 35 world leaders is all necessarily part of the “War on Terror”

Well those 35 and many other members of the international political classes are beginning to smell the coffee. And they’re beginning to feel their blood pressure mounting as they take on board the extent of American (and British) hubris. This has already resulted in growing demands for NSA-proof communication systems between them and, as you’ll have seen in that Video, countries like Brazil are going a whole stage further and demanding communication channels which bypass America altogether.

This is a very welcome development for the politicians at least. Let’s hope they remember that any secure sauce considered good enough for the political goose is equally good for the citizen ganders.

None of the so-called “Revelations” are actually new…
Coincidentally, “Nothing Whatsoever” is also the answer to the question: how much does the average politician, including the British Prime Minister, understand about “Security”? He and many others we’ve seen squirming in recent weeks have frequently repeated that absurd argument quoted above.

As I’ve pointed out elsewhere, NOTHING in the Snowden revelations is new or unexpected. We have been able to read about it for years, and not just in conspiracy fetish forums where they don’t believe Man has ever walked on the Moon, but in well documented and highly respected sources like the trilogy of exposes written by James Bamford over the past 30 years (“Puzzle Palace” 1983, “Body of Secrets” 2002 and, with specific reference to all the web snooping, “Shadow Factory” 2009)

All Snowden has added to the picture is detail (like the name of the relevant program – PRISM) and some notion of scale. Mostly he has simply confirmed what we’d read in Shadow Factory. (Actually, in my case, I was 2/3 of the way through that book when the Snowden revelations hit the street. That made it somewhat more pressing and relevant!)

So the notion that the “evil-doers” didn’t already know this is utterly stupid and exactly the kind of misapprehension that those who do understand Security would NOT be labouring under. Such naiveté might have been widespread among terrorists at the turn of the century but after 12 years of targeted drone strikes and other successful assassination attempts, the spooks KNOW that their main genuine targets are very aware of the need for secure communications and, almost certainly, avoid using the web altogether (at least not for operational communications).

The only “terrorists” who are going to be caught through their web activity are the terrorist equivalent of those “script kiddies” who created a bunch of irritating but mostly harmless malware in the Nineties and Naughties. They’re the “wannabe jihadists” who, even if they aren’t caught, are rarely going to have the aptitude and experience to pose real threats.

Exposing the scale of the NSA dragnet has, therefore, done “nothing whatsoever” to alert the real bad guys. Which is not, however, to say that the exposure doesn’t help the terrorists. It does, but obviously the spooks haven’t bothered to tell the Prime Minister and other politicians how. Perhaps they think it’s too complicated for him and the rest of the bewildered herd to grok. Or perhaps they’re too embarrassed to admit that they’ve shot themselves in both feet.

How Snowden HAS Helped the Terrorists…
Here’s how Snowden’s high-profile confirmation is going to make life easier for the terrorists and the few other genuine anti-social bastards (like the paedophile network, or people traffickers) we really do need the security services to try to keep tabs on.

At the moment, none of the serious targets will ever be caught discussing anything (significant) online in plain text. If they use the web at all they’ll be using adequate encryption, almost certainly beyond NSA’s capacity to break. But it’s unlikely they’ll even use much in the way of encrypted emails because they will also be aware that even if their messages cannot be read, traffic analysis and the so-called “metadata” we keep hearing about provides a huge amount of significant data on its own, even without knowing the content.

The NSA have huge programs designed to trace the networks of connections between ANY given bunch of targets. As you can read in that link, they (and others) can easily create ad hoc network diagrams for any given targets. But they live in a “target rich environment”, so they have to spend most of their time focussed on those most likely to be sharing sensitive data. Thus they’re most interested in the connections between users of encrypted email. Because, they reason, if the senders are hiding something, it is probably worth reading, and definitely worth knowing who is talking to who.

And, at the moment, tracing those connections and compiling the relevant “organisation chart” is relatively simple. I doubt if, even globally, more than a hundred thousand email users regularly securely encrypt their messages. And mapping the links for that hundred thousand or so is well within the NSA reach.

But a major consequence of Snowden’s leaks is already beginning to be visible as the number of users of serious encryption begins to rise. And some significant political and commercial muscle is going into the mix. For example, Brazil, as we’ve heard, is now demanding a secure email system for their politicians and it’s quite likely they’ll make it available and recommend it for their citizens.

German entrepreneurs, meanwhile, have already come up with a partial solution and appeared within hours of the Merkel revelations, to exploit the advertising opportunity for their SecuSmart micro SD card “encryption dongle” – available for all smartphone users and in use by the German Government since July; which might be why we’re now hearing that Merkel was targeted from 2002 up until June this year. Once the card was fitted, NSA would have lost their ability to bug her – although not necessarily their ability to track who she was calling or being called by. Any communications between two users fitted with those cards can at least be confident that the content of their conversations is not being overheard (providing, of course, that the phones themselves haven’t been tampered with and they’re not bugged in any other way)

We can confidently expect a rash of genuinely secure phone and email products to appear on web pages near you in the near future. Who knows, Google and some of the other major players might even tweak their own services to make them snoop proof (by giving users the ability to add their own secret keys).

So there is a very real prospect that within, say, 5 years, instead of a hundred thousand secure emailers, there will be a hundred million and, as any fule kno, the complexity of a network diagram is proportional not to the number of nodes, but the square of that number (“Metcalfe’s Law”). So the NSA task isn’t going to be a mere thousand times more difficult, but around a million. And even their shiny new Utah Repository isn’t going to be able to cope with that.

Which means that it will shortly become much safer for terrorists and others to use their own encrypted emails. Fish are always safer swimming in the sea. Up till now, they’ve been forced to swim in a rather small pond and have, thus, been easy to target with a hand-held net. Snowden’s revelations, with the help of those media not afraid to talk truth to power, have already achieved far more exposure than Bamford’s. His book is currently languishing at number 72,169 in the Amazon sales rankings, which I reckon must mean that probably fewer people have so far read his (much more detailed) exposure than my guesstimate of the number of users who routinely encrypt their mail.

So the sharks we really do need to keep an eye on are about to get the comforting camouflage of another hundred million or so fish and the reasonably sized Sea they need to swim in more safely. This is what they call, in the trade, Blowback. Nice one NSA…

Advertisements

Digital Evolution – Another Step Closer

This is a key step towards our digital evolution and our migration from organic to digital lifeforms. Basically, if we can’t record the human brain in sufficient resolution, we can’t migrate. Period. No Omortality

But this research looks like we’re poking our sticks in the right ant-nests! If we get this right, then, sometime in the next 10-20 years, we’ll have the technology to record and store the information constituting a complete human brain, probably in a few 10 minute sequences, to the resolution required to preserve our entire personality, memory and neural matrix well enough to be re-animated, later, when a digital substrate exists to house us.

Unfortunately, that might be MUCH later. Like another 50-100 years. So we might, I’m afraid, still have to spend a few years technically dead. Although, interestingly, along the way, technology should reach the point where the brain maps could be interacted with as a kind of “living in the permanent present” avatar, like Henry Molaison, who we’ve been hearing about only this last week…

This isn’t a breakthrough, but it is a major step in the direction we need to travel in order to achieve the break-through.

Oh, and along the way, it’s going to have some fascinating commercial and security spinoffs:

Ferinstance, I give you: the perfect authentication device. It not only verifies, unspoofably, unique individuals, but can even detect the absence of informed consent and thus even block those attacks based on coercion. You couldn’t unlock the safe or file even if you did have a gun pointed at your head. And the attacker will know this, so they won’t even try that. It will even enable version 1 of the Mindlock I mused on back in April.

And of course, it makes possible the Perfect communication and self-surveillance device I was fantasising about in the History of Digital Telepathy

…and think of the impact this is going to have on VR. I think we can bet that “Full Immersion” will come along shortly after the first wave of smart dust adopters have begun to appreciate the benefits of receiving data direct to the sense processing parts of the brain.

And obviously, whatever we record, subject to our informed consent, can be played back. Think what that’s going to do for the sex industry. Just a thought. Though I challenge you not to think about it.

It’s happening Reg! Something’s actually happening!
Just remember, you ‘eard it ‘ere first. Righ’!

Heather Brooke’s Successful battle to expose political corruption

I concur…

Heather Brooke’s Homepage

Mindlocks on the horizon

Wasn’t expecting this development quite so soon after my mention of mindlocks in the context of Digital Telepathy. But is precisely the sort of thing I was talking about.

I first proposed brain based authentication in an email to Dr Larry Farwell about 10 years ago when I came across an article describing his own work as the discoverer of “Brain Fingerprinting” My specific proposal was based on the conjecture that, for example, my own brain wave reaction to, say, a photograph of my own late Father, would be dramatically and reliably different to anyone else’s reaction to the same photograph and that, if measured, that reaction could be used as a form of biometric identifier for the purposes of authentication.

But actually my main hope for brain based authentication is that it offers the only conceivable solution for the “final” authentication problem; viz the one thing we can’t yet test for – is the individual whose identity we have just verified operating under duress? This is a vital authentication test in certain critical situations. For example, it would very useful to build it into the protocols which control the launch of intercontinental ballistic missiles! I’m perfectly sure that existing procedures can reasonable verify the identity of the operators arming the missiles, but can it tell whether the operator is only performing their task because they have a gun pointed at their head? Of course it can’t. But it would be very reassuring to the rest of us if we knew the system COULD make that assessment and block the launch if the operator was found be performing under duress.

But it would also be just as useful, though not quite so dramatic, if we could ALL protect our important actions the same way. If and when I ever have a million quid in the bank, for example, I would quite like to know that I couldn’t transfer the dosh to another person’s bank account without the authentication system verifying that I wasn’t conducting the transfer under duress.

And, of course, in a Trusted Surveillance system, the same tests would trap all sorts of evil, from corrupt border guards to forced sexual consent.

The mindlocks which I casually mentioned in the Digital Telepathy story are based on a related notion, not, this time, of duress but of “intentionality”. The idea being that if – as in the story – we’re all capable of digitally recording everything we’re in range of, then the first level of abuse will be the illicit publication of such recordings without the consent of the other parties present. I propose privacy locks to solve that problem. They involve the recordings being locked with shared keys and a cryptographic protocol to ensure that all parties present have agreed and implemented the locks. But that would also prevent “private” playback within even your own head which is a) too restrictive and b) blocks potentially extremely useful functionality (aides memoire, personal diaries, recording minutes, private pleasure etc).

Mindlocks based on intentionality could solve that problem. They would permit private viewing of the recordings (only within your own head) and instantly lock the recording if they detected any intention on your part to share the recordings without the required consent of the other parties.

This research brings all the above a small step closer.

The History Of Digital Telepathy

I know this won’t be the first time you’ve heard it, but on this day, of all days, we are entitled to remind ourselves, with a certain amount of mutual back slapping, that we are living in the first period in recorded history in which there has been no verifiable armed conflict between nation states anywhere on planet Earth, for more than a decade. In some quarters there are even nervous whispers that it might, at last, be safe to come out from under the bed. John Lennon’s dream may have come true. War – as “diplomacy by other means” – may finally be consigned to human history.

It is easily the most far-reaching and widely accepted benefit of the digital telepathy we now take for granted so perhaps it’s worth briefly reviewing the history of how we got where we are today.

Step 1 – The Smart-Phone
Scholars argue that the demand-driver for DT were the antique smart-phones we see proudly displayed in p-resin as antiques in many modern homes today. They were the first platform which made ubiquitous conversation possible. The ease with which they integrated into the emerging online infrastructure of social networking and video sharing made it trivial, in turn, for the ubiquitous conversation to become the universal conversation, where we could all, for the first time in our history, begin to share in real-time, events happening to ordinary citizens around the world. The appetite for this connectivity had never been anticipated, not even by the world’s most imaginative science fiction writers. Smart-phones and the early web not only generated that appetite but, given the limits of early 21st Century technology, made a pretty good stab at satisfying it. But what those prototypes really did was to illustrate the desire for something much more complete.

Historically we recognise that the transition from a global economy based on profit, to one based on utility was well under way by the early 21st century. As Sarah Klein puts it in her award-winning “From Money to Merit”:

“While we can clearly see that commercial organisations continued to dominate innovation in (capital-intensive) hardware, the clear majority of important innovations in software, even before the inception of the Web, came from the Open Source movement, which made most of their product available at no cost to the consumer. The most important, of course, being the effective cryptography, on which modern society depends” (GooLit, 2053)

Credit must be given, however grudgingly, to the late capitalist compulsion to pursue profits, if necessary even by generating new markets – with their knack for “creating the solution to no known problem”. Selfish though such motivation usually was, there can be no denying the effect it had on technological innovation. Although we now recognise software to be the more important component of our socio-economic infrastructure, that software needed the hardware to run on. Like it or not, the greedy capitalists did far more than socially focussed collectivists to make that happen. Without the combination, however, today’s prosperous, healthy, peaceful and money-free society simply wouldn’t have been possible. So despite their overall brutality, we have a lot to thank the Capitalists for. They got things done. And when their time was over, unlike the Authoritarians who depended on their support, they had the good grace to sink relatively peaceably back into society with no hard feelings between us.

Some argue that the vital step towards DT was the first smart-phone implant (remember the “Mind-Phone”? – you won’t find many of those hanging on living room walls!) and there is no denying that it had enormous consequences. On the road to DT, it was, for a start, the first time you could make contact with someone just by thinking their tag. But it was the effect it had on social control which scores much higher in my analysis.

Step 2 – Citizen Surveillance v Privacy
To begin with, even though it was now simpler than ever to communicate, privately or publicly, with any other similarly connected individual, that first generation of mind-phone users were no more likely to communicate with their fellow early adopters, than they had been as smart-phone users. What had much more dramatic impact was the routine and effortless ability to record, privately and securely, anything and everything they did or witnessed. Being able just to think “store that” rather than dig a phone out of a pocket, unlock it and press a few buttons, made recording so easy that it became the default. Combined with pre-capture and growing memory capacity, it became easier to record virtually every waking moment – and perhaps discard the mundane or unwanted – than try to anticipate what might be worth recording and run the risk of missing it. With trusted time-stamps and hash-indexing against secure auditing databases it became trivial to retrieve forensic quality evidence of any arbitrary event from your own past with verifiable accuracy – provided only that you’d bothered to store it. And it being so effortless, why wouldn’t you?

Initially no one perceived its significance. It merely expanded the opportunities for egocentric adolescents to make fools or heroes of themselves and publicise their antics on the early attempts at digital sharing (remember “Facebook” and “YouTube”? Those were the days!) Scandalous headlines arose fairly quickly, when one or two (thousand) “minders” abused the technology to record and then playback intimate sexual encounters or other sensitive private moments without the informed consent of the other parties. That kind of abuse encouraged the widespread adoption of privacy locks, so that any such recording could only be shared if it was unlocked with keys belonging to all parties present at the original recording. Indeed, until the invention of the mindlock, locked data couldn’t even be replayed internally by the record holder unless the relevant parties pooled their keys.

Then came the question of how to deal with either tragic or sinister situations. Democratic random key distribution and trusted key escrow systems took care of those issues. In the tragic scenario, the individual’s own nominated trusted key holders could recreate the missing keys if death or serious incapacity was medically certified and at least 75% of them agreed that key assembly was necessary and appropriate. In the sinister scenario, like suspected rape or murder, where a suspect perpetrator chose to with-hold their keys and their trusted key-holders also refused to co-operate, the keys were constructed so that any 750, out of a thousand randomly selected citizens could – if persuaded that there was a strong enough case – reassemble the missing keys from their own copies of the distributed key store. Today, of course, we require 900, but, for its day, that degree of democratic control was almost revolutionary.

On its own, though, it was not enough to produce the legal and social revolution which knocked away a major pillar of the Authoritarianism that still ruled humankind in the 3rd decade of this century.

Step 3 – The Legal Victories
The first few successful prosecutions of corrupt or bullying police officers and politicians – made possible by evidence gathered beyond their control and beyond reasonable dispute – didn’t have as much impact as you might have expected. Again, it seemed like only a small step from the same kind of exposures produced by the already widespread digital sharing that had kicked off “citizen journalism” at the tail-end of the previous century. But as the numbers of such incidents began to grow in the typical “successful market” exponential manner, the consciousness began to rise – simultaneously within the citizenry and the authoritarians – that, largely due to the massively improved verifiability of the stored content, it was becoming increasingly difficult for the bullies to hold sway.

What the authorities hadn’t anticipated was that the same cryptographic protections which were essential to protecting individuals from illicit access to their thoughts (which were, of course, accessible by the implants) would prove so valuable in validating any claims made by those individuals in respect of evidence gathered in the routine recording of their daily lives. The crypto protocols didn’t just protect, they forensically validated every transaction and recording that they protected. Their audit trail was bullet proof and beyond reasonable challenge.

By the time some of the more extreme authoritarians woke up to the threat and tried to outlaw the technology in a belated attempt to hold back the tide, it was already becoming almost impossible to detect that an individual even had an implant; particularly after the introduction of the first generation of biological implants genetically configured to operate within the brainstem. And it became increasingly implausible, in the light of all the obvious crime it was detecting – and thus deterring – to argue that citizens shouldn’t avail themselves of this growing benefit. Many authorities pointlessly tried shielding their own contacts with the citizens, which only affected the ability to stream data in real-time – which nobody with their head screwed on ever attempted because it immediately made the implant eminently detectable. It had no impact, however, on our ability to record, with trusted timestamps and hash-chains, at either end of a shielded session, and thus to verify our account of the session, to the rest of the world on demand.

If they knew you had an implant, the more corrupt authorities even tried to use the privacy locks to their own advantage. In the guise of offering the victim their own trusted record, they insisted that all mutual sessions be recorded but privacy locked. If the victim subsequently complained, the authority would routinely try to hide behind its own absolute right to privacy. They would, occasionally, even attempt denial that any contact had taken place. It took them a while to understand that although they do not reveal content, time-stamped and shared privacy locks can easily be used to prove that contact had taken place between the sharers, and the routine authoritarian refusal to unlock audit trails covering disputed events made it increasingly obvious they were lying or abusing their authority. Of course, once the victim was arrested and able to prove the privacy lock times and locations, such authorities then found themselves bound by the rules of disclosure and though they often managed to persuade a judge that executive privilege was justified, they also often failed. And the more often they failed, the more likely it became that some other judge or jury would see through their naive pretences. Eventually it became abnormal for their pleas to succeed.

It was very entertaining to witness the Authoritarians’ own long time mantra coming back to bite them: “If you’ve nothing to hide, you’ve nothing to fear” had been their excuse for the authoritarian surveillance they had increasingly imposed, without consent, on a pliant society. How could they possibly argue against our recording what went on when they dealt with us? And how could they defend not revealing the content of those recordings?

Step 4 – The State Found Guilty of Murder
But what really mobilised the masses was when it became widely understood that citizens with implants could not just win any “your word against mine” argument over trivial disputes with friends, colleagues and family, but could fairly easily prove themselves innocent against even the most the malicious charges of a corrupt authority, however much tax-funded effort they put in to framing their victim.

The infamous case of Wilson v the United States is the pivotal case every student learns about and which exposed the levels of corruption endemic in the so-called Justice system. The police, under the direct instructions of a political aide (Adrian White) to the then Vice President (Joanne Schwarzewild), and with the explicit knowledge of the Attorney General (Carlos Martinez), were shown conclusively to have planted evidence and commissioned witness testimony with the corrupt and direct intent to convict an innocent student – David Wilson – in order to conceal the part played by the FBI in the assassination of the wife (Carole) of a Republican Senator (Alan Liebowitz) who had inconveniently caught said Senator cheating on her in an election year. Unfortunate timing on both sides.

Not only was the student able to prove his own alibi by giving a comprehensive and indisputable record of his movements and location during a critical 14 hour period, but, following his arrest, he endured the routine “legal” blackmail session known as “plea bargaining”. They didn’t know he was implanted and he captured virtual admissions by the police interrogators and prosecutors that he was being set up as a Patsy, that he had “no chance of beating the State machine that you’re up against and your own best interests would be served by admitting guilt even though we all know you didn’t do it”.

The political clincher was the testimony provided by a White House secretary, Marion Downey, present during a conversation in which the Vice President casually made it clear to the Chief of Staff (Sydney Walden) that the suitable target had been found. The VP informed the Chief of Staff that David Wilson regularly earned a bit of extra cash tending the extensive gardens of the Senator’s New England Mansion on Saturday mornings. He could be put in the right place at the right time.

Downey didn’t take much notice at the time because she misunderstood it as a trivial domestic arrangement for the Senator’s gardening requirements. It was only when the Senator’s murdered wife popped up on all the News feeds a couple of weeks later, followed by a startled looking David Wilson being arrested for the murder that she realised she was in possession of incriminating evidence. And for reasons which have been replayed since in a dozen dramatisations of the story, she didn’t much like the VP at the time.

Downey swore testimony and offered to reveal her data to the court but both the Vice President and Chief of Staff pleaded the Fifth and refused to share their privacy-locking keys, citing grounds of “National Security” and “Executive Privilege”; which, for the first time, the entire planet understood to be an inescapable admission of guilt.

The judge (Justice Steven Warren) – clearly part of the conspiracy – tried to rule her testimony invalid and even tried to block the expert testimony of the mathematicians and forensic software consultants who could explain how and why Wilson’s alibi was incontrovertible. Famously the Jury went on strike – together with elements of the local police – who had caught the mood of the masses and refused to make any arrests. The media storm and widespread public protests eventually forced the Government to concede a retrial under the famously incorruptible Justice Mary Elizabeth Sterning.

The technical evidence demonstrated to the court how Wilson’s evidence could not have been spoofed.

The assassin hired by the FBI had killed the Senator’s wife 15 minutes before Wilson was due to report for duty on Saturday morning, expecting him to show up just before the Police snatch squad sent to arrest him with the smoking gun. But he had consumed rather too much alcohol at a Frat party the previous evening and didn’t make it to the Mansion. His ability to prove his movements sunk the prosecution case and under the judge’s direction, the jury gladly, and unanimously, found him not guilty and made their now famous declaration finding “Agents and Agencies of the Government guilty of murder in the first degree, conspiracy to pervert the course of justice and perjury to a degree amounting to Treason against the people of the United States”.

As well as the huge and inevitable political storm this provoked, overnight the American “successful prosecution” rate, always considered as infeasibly high, plummeted as it quickly became clear that a significant percentage of prosecutions were without verifiable foundation and resulted from virtual blackmail in the form of the corrupt plea bargaining system. Outside America the corruption of its judicial system was widely recognised, not least as a result of the direct inverse correlation between the wealth of the defendant and their probability of conviction. But getting Americans to see it with their own eyes was absolutely crucial. Once their authoritarian domino began to wobble, all the others realised the peril that was upon them.

Step 5 – Changing the Game and the Players
Once the chances of successful prosecution against provably innocent victims fell to near zero, the entire plea bargaining system crashed and burned. One after another, juries refused to follow the edicts of obviously corrupt judges and made it impossible to convict the innocent. Honest judges, who fortunately still formed a majority within the judicial system, began rejecting Police evidence routinely unless it was digitally recorded, with trusted time-stamps, on a protected audit trail. The crunch came when the still largely Authoritarian Congress tried to pass new laws, dramatically reducing opportunities for – and the powers reserved for – Trial By Jury. Simultaneously, they tried to mandate trust in Police evidence even when not digitally preserved. Nearly one and a quarter million American Citizens surrounded the Capitol and refused to move until the vote was taken. The Sacking of Congress, which followed the infamous vote is, of course, the day we now all celebrate as the birthdate of our real democracy.

In the famous words (*) of Supreme Court Justice Stephen Pilliakov – the only sitting Supreme to try to fight the State’s attempt at resisting the revolution (and one of the first into the Capitol on that famous Tuesday):

“Yes, it is still necessary, in some circumstances, for society to delegate Authority to public employees but on this historical day we have finally come to terms with Lord Acton’s axiom: “Power tends to corrupt, and absolute power corrupts absolutely. Great men are almost always bad men.” And at last we have found the solution…

From this day forth, the rule of Law shall be modified thus:

Citizen: Innocent until proved Guilty

Authority: Guilty until proved innocent.”

Beyond the criminals in Authority, it became effectively impossible for criminals in the wider world to know – in advance of their attack – whether or not someone was capable of recording their attacks, so once the adoption rate passed the critical mass of about 25%, it rapidly became too dangerous for most attackers to take the risk. Of course, if you actually intended to kill the target, it was still relatively simple to arrange a murder before the victim’s sensors could identify the attacker, for example using a sniper rifle at distance, but almost all other attacks became too costly to the attacker. And once the technology adoption rate achieved the 95% level, the ability to track down attackers purely by a process of elimination became feasible and crime fell to the levels it still sits at today where Murder and Rape are now so rare that each one becomes a sensation for a few weeks after it is uncovered.

Step 6 – Making Public Lies Impossible
The next major enhancement was AAI – Augmented Artificial Intelligence. Some of us are old enough to remember its humble beginnings as a simple audio-visual prompt which would remind users of the name of that acquaintance you’d bumped into in the street. You’d only met them once, and that was a few months back. It was so damn useful to have that name and bio prompt and be able to greet each other, convincingly, like old friends!

But then AAI’s language and context recognition skills began to be turned in another direction. RTFM – Real Time Fact Monitoring – was the killer app that did for Authoritarianism what that prehistoric asteroid collision did for the Dinosaurs. Their use of covert and overt violence to control the population had already been made untenable by the citizen surveillance arraigned against them. Now it became increasingly impossible for them to control any part of the political messaging system unless it genuinely fitted the facts.

At first it was a tool for the satirists. They’d replay a political speech but with the AAI analysis showing up as subtitles. We all smirked as politician after politician was shown to be misinformed, prejudiced, selective, manipulative, superstitious or lying. Bigoted journalists, exaggerating CEOs, Evangelist millionaire ministers and a host of other routine social parasites were all publicly exposed in the same way.

It quickly became obvious that the game was up. No public statement, nor even a private one – if if was based on facts in the public domain – could be made without the increasingly infallible RTFM flagging up all attempts at deceit and manipulation. Dishonest politicians, in particular, found it impossible to continue their centuries old tactics and quickly became unelectable. And although it took a full fifteen more years for the effects of RTFM to sweep the planet, and one or two regimes fought to the literal bitter death, Authoritarianism died, not so peacefully, on January 5 2058, with the public hanging of Iran’s “Guardian Council”.

And as we all know, we’ve seen massive drops in crime against the person, mirrored around the world, and despite the on-going genuine conflicts which continue to exist between citizen and citizen, between State and citizen and between State and State, since that date there hasn’t been a single day of armed conflict between any two or more member States of the United Nations. It seems that once it became impossible to lie to each other about anything which could be instantly fact-checked or, if necessary, remotely or citizen surveilled, wars become essentially impossible to create.

This year, as multiple celebrations are regularly reminding us, is the centenary of the recognised starting point of the digital age – January 1 1970. And today is specifically the 50th anniversary of that first smart-phone implant on April 1 2020 – the birthdate of Digital Telepathy.

I give you “Happy D Day”


*Pilliakov’s speech in Context:

“Yes, it is still necessary, in some circumstances, for society to delegate Authority to public employees but on this historical day we have finally come to terms with Lord Acton’s axiom: “Power tends to corrupt, and absolute power corrupts absolutely. Great men are almost always bad men.” And at last we have found the solution.

From this day forward, let it be known to anyone aspiring to the exercise of Authority in this land: if ever you are delegated powers to act on our behalf, you shall be assumed fully accountable for every second of your life while you remain in office and, if appropriate, for a number of years before and after you leave office.

What this means in practice is very simple. Should you be accused of any crime or misdemeanour, in contrast to the Citizen, whose innocence will continue to be assumed until a Jury can be persuaded otherwise, the starting point for anyone in Authority is the exact opposite. Your guilt shall be assumed unless a Jury can be persuaded otherwise.

For some years, a growing number of ordinary citizens, now constituting a large majority of the population, have, for a wide variety of their own purposes, voluntarily and routinely captured comprehensive detail about own their lives; so comprehensive, that some innocent citizens have famously defeated the infamous attempts by a corrupt State and corrupt judicial system to continue their embedded practice of widespread judicial blackmail and tens of thousands of false imprisonments.

That same technology shall, in future, be deployed to further protect the Citizen from rogue Authority. Unlike ordinary citizens, for whom the adoption and precise use of such technology will always remain optional, if you are appointed to a position of Authority, it is, hereafter, a condition of your employment in such a post, not only that you be monitored by the technology, but for that monitoring to be provably continuous.

You shall record your every move, your every conversation, your every heartbeat. They shall remain just as private and secure as the data stored voluntarily by private citizens. But unlike the private citizen, about whom there can never be certainty about what data they have captured and chosen to archive, the world will know that you are legally obliged to possess your own digital record of any disputed event.

The world will thus know that, if you are innocent, you will be able prove it, just as thousands of innocent citizens have managed to do themselves, even under direct attack by the Authorities and Rules which were supposed to exist to protect them. Under these circumstances, it is, of course, reasonable, should you be accused of anything untoward, that you are given the opportunity to prove yourself innocent. But should you choose not to present such evidence, even if you claim that the evidence has been destroyed, or that a system failure prevented storage, your guilt shall be formally confirmed.

From this day forth, the rule of Law shall be modified thus:

Citizen: Innocent until proved Guilty

Authority: Guilty until proved innocent.

“Anonymous” Takes Aim At The Wrong Target

I’ve only just stumbled across it but a few months back, Anonymous issued some bizarre guidance on avoiding face recognition technology:

For a bunch of skilled hackers, they’re being oddly naive. Every single countermeasure they suggest will be defeated by the authoritarians within a few months or, at most, a few years. Tilting your head more than fifteen degrees is one of the more ludicrous examples. First off, although the software might currently have a little difficulty spotting a face at that angle, to a human observer, such behaviour would stick out like a sore thumb and prompt much more detailed attention. But, in any case, it’s not going to take them a huge amount of time to improve the software to the point where it’ll easily recognise a face even if it’s carried under your arm and upside down!

And “so what?” if they have difficulty spotting your face? They’re already working on things like gait recognition (even from satellites ferchissake!) and earlobe recognition not to mention the FBI’s well advanced research into the use of voice recognition for both surveillance and forensic purposes, which, given their already illegal but ongoing (and ignored by congress) practice of warrantless wiretapping, and the medieval law they’ve passed which allows them to detain citizens indefinitely without trial (habeas corpus? habeas bollocks!). Or the recent acknowledgement of the growing use of Drones to watch their own citizens. Or the (previously) secret Trapwire program itself – which raised the face recognition issue in the first place but goes much deeper and wider than that – and so on and so on…

Are we smelling the coffee yet? Do you really think that pulling a few ridiculous stunts to make face recognition a little more awkward is any part of the solution? If so, I fear you don’t yet understand the true scale of the problem.

What we’re up against here is the most powerfully equipped authoritarian menace in human history. These people make the STASI look like well-meaning amateurs. They are enthusiastically creating the infrastructure required to police a Totalitarian State in which your every movement, contact and, ultimately every belief and even thought can be logged, analysed and risk assessed with a view to “mitigation”.

One of the few things we’ve still got going for us is that they haven’t yet figured out a way to hide the consequences of (some of) their actions or their involvement. As a result they still feel a trifle constrained to operate within some kind of limitations which would pass, at least, the rigorous investigative probing of the “Journalists” at Fox News. That gives them a fair amount of leeway but god help us if they ever turn nasty.

The solution to this problem is not to confront the enemy in the battlefield of their own choosing. This war requires the classic strategy of the martial artist. We need to use the enemy’s energy against them. For example, at least 1% of those in sensitive posts will be as horrified as we are about the increasing tyrannical nature and potential of the activities they are engaged in. We need to ensure they have secure channels through which to leak the crucial evidence. And if and when we ever win this war, we need to reward and honour those who had the courage to blow the whistles when it most mattered.

I’ve been blathering on for some years now about the (increasing) need for a Trusted Surveillance program which will wrest control from the Authoritarians by making them genuinely and unavoidably accountable. Here, for example, is part 1 (all 8 parts are on youtube) of my 2007 attempt to explain how it might work in the context of the prescient movie “Enemy Of The State” (the movie was made back in 1998 – so this isn’t just a post 9-11 problem)

Implementing Trusted Surveillance will be partly technical and partly political. It requires the abolition of many existing laws and the implementation of new ones. Some of the new laws are genuinely revolutionary and we can expect major resistance from all parts of all establishments as they fight to maintain their hold on power. But, as I hint in various places, the battle we are now engaged in is the final battle for the human soul. It will determine whether, in the coming centuries, our species consists of largely free individuals or regimented hordes required to conform to and service the demands of their rulers.

A battle on this scale requires much more than brute force (which, in any case, the enemy has a near monopoly on, despite the relaxed gun laws in the USA). It requires creative intelligence, in which weapons such as subversion, satire and sedition will play a much greater role than bombs and bullets. We need to make the enemy a laughing-stock. We need to get to the point where even the most ignorant sheep-like citizens are too embarrassed to support their patronizing shepherds. In this regard, the likes of Jon Stuart and Stephen Colbert are every bit as important as, say, Wikileaks and whistleblowing.

I may, of course, be wrong in every detail of my proposals but I am utterly certain that I am at least focussed on the right target and that the problem is every bit as far-reaching as I describe in my various rantings. So if you don’t agree with my solution, fine, but you’d better start coming up with an alternative while we’ve still got the freedom and scope to implement it. Meanwhile remember:

Citizen – Innocent Until Proved Guilty
Authority – Guilty Until Proved Innocent

Assassination Politics recruits new high level supporter

this delightfully sinister US Government page doesn’t actually state that they will assassinate any of the high-profile targets named there, but it’s bleedin’ obvious that, should any “tips” they receive lead to locations in the middle of Pakistani, Yemeni or other middle eastern hinterlands conveniently far enough away from journalistic surveillance, they’ll be saying farewell to a few more drones.

I doubt they appreciate the irony of how much their technique resembles Jim Bell’s infamous proposal for controlling the world’s authoritarians and other bullies. The major difference is that the money isn’t put up anonymously by a peeved public but blatantly offered by a State that thinks it can make its own laws whenever appropriate.

And they certainly won’t appreciate or even comprehend why they’re both wrong for exactly the same reasons. And both right.

Assassination is certainly a more humane way to fight war than carpet or chemical bombing. And if the Islamist’s 9-11 attack had merely put bullets through the brains of the leading neo-cons and money-men who had already decided they needed a war, the “terrorists” would have won a lot more respect and a lot less hostility from a grateful world.

I wonder if they’ll pay out on a drone strike…