Inherent Autonomy

Technology Impact on Privacy

Inherent Autonomy Introduction
. . . . . No Despotism . . . . . Only Independence
Primacy: The Declaration of Independence
In the beginning: Let there be the Articles of Confederation
A Constitution Flawed from Inception
Articles of Confederation was Preferable
Investiture of Heretical Doctrine
The Nature of a Republic
A Culture of Death Under the Law
Two Causes, Two Results
A Senate of Subversion
The Court and your Castle
The Meaning of Independence Day
This Streetcar Lost All Desire
Why Supreme Court Selections are a False Choice
Paris is Burning
The many faces of the anti-war movement
2006 Predictions and Realities
Running Chinese Trade Deficits
Localism for a Free Republic
A Fractured Conservative Movement
Wall Street Reaps Big Bucks from the Wind
Baboon Behavior Behind Wind Projects
Party Goers - What Do You Take With Your Tea?
Assault on Liberty Originate with Secular Humanism
The TUN - a true representative council
Currency Wars among Controlled Economies
Web Attack Bodes Political Censorship
Protect Government Officials at all costs
Populism, Progressives and Public Unions
"Girlie Man" Culture of Government Schools
Midget Minds and Lost Cojones
Monetary Revolution and Alternative Money
The Federal Government Declares War on the Nation
Corporate Cronyism: Solyndra and Evergreen Solar
A True Greek Tragedy - Odyssey of the EU
A Christmas Wish List for Obama
Obama's War on the Catholic Church
The EPA an Out of Control Monster
Homeland Security in the Land of the Free
Pride in America the Stupid
Is Going Off the Grid Practical?
Political Partisan Psychological Disorders
Popular Culture Promotes the Police State
A $14 Trillion Extortion for a Global Warming Scam
Ignoring Whistleblowers
Human Liberty Is Doomed
Amnesty Capitulation Assures a Failed Society
The Actor and Clown Culture
Conservative Civil Liberties
Hobby Lobby and the Supreme Court
Technology Impact on Privacy
TV Propaganda and the Mind Control Culture
Secession Movements Intensify
BREAKING ALL THE RULES
BREAKING ALL THE RULES Forum
hub
BATR Index
Reign of Terror
Stuck on Stupid
Totalitarian Collectivism
Radical Reactionary
Global Gulag
View from the Mount
Strappado Wrack
Solitary Purdah
Dueling Twins
Varying Verity
911 War of Terror
HOPE
M A R K E T S
Mercantile
Corporatocracy
Negotium
Tek
Despotism
LIBERTY
PysOps
RealPolitik
WAR
Foreign Policy
Middle East
AMERICA FIRST
NWO Realpolitik
Gazette
Critique
Forum
Law
Erudite
Chaos
Conundrum
Existentialism
Existentialism Philosophy Blog
Media
Flicks
Culture
Immigration
Diversity
Partners
Links
Polls
ABOUT
Reach Me

"You have zero privacy anyways. Get over it" -  Scott McNealy

privacytechnology.jpg

Technology Impact on Privacy

Going offline or off the grid is not easy for everyone. Modern society has come to repudiate the very elements that make civilization possible. Living in cyber space is existence on life support at best. Until now, people had idiosyncratic relations, with intimate experiences and personal memories. Thoughts were internal and private conduct was confidential. Under a hi-tech environment, the system moves closer to an all knowing eye. But what happens, when the public becomes enlightened to the bondage of the tech prison, thanks to all the whistleblowers?

The irony befits the hypocrite techie class of privacy violators. Lamenting that their fiefdom of intrusive surveillance and data mining might be compromised, the high priests of SPY, Inc. are flustered. With the disclosure of
a synergistic relationship of an intertwined nature, the high-tech prophets lay exposed. NSA Spying Risks $35 Billion in U.S. Technology Sales has the flagship government front companies in full damage control.

"News about U.S. surveillance disclosed by former NSA contractor Edward Snowden has "the great potential for doing serious damage to the competitiveness" of U.S. companies such as Cupertino, California-based Apple, Facebook Inc., and Microsoft Corp., Richard Salgado, Google’s director for law enforcement and information security, told a U.S. Senate panel Nov. 13. "The trust that’s threatened is essential to these businesses."

With the announcement that
Facebook faces lawsuit for allegedly scanning private messages, the diminutive privacy on this social network just got smaller. "Facebook was one of the Web Services that was caught scanning URLs despite such activity remaining undisclosed to the user," according to the complaint.

Can your personal persona remain your own business? What exactly can be attempted to protect your identity and privacy?

Woodrow Hartzog and Evan Selinger propose in
Obscurity: A Better Way to Think About Your Data Than 'Privacy', adding layers of complexity guards against most of the ordinary risks of scrutinized personal data. However, this argument is trite since the cyber world of digital transmission uses the technological routing and coding systems, engineered as part of the total government retrieval society.

"Obscurity is the idea that when information is hard to obtain or understand, it is, to some degree, safe. Safety, here, doesn't mean inaccessible. Competent and determined data hunters armed with the right tools can always find a way to get it. Less committed folks, however, experience great effort as a deterrent.

Online, obscurity is created through a combination of factors. Being invisible to search engines increases obscurity. So does using privacy settings and pseudonyms. Disclosing information in coded ways that only a limited audience will grasp enhances obscurity, too. Since few online disclosures are truly confidential or highly publicized, the lion's share of communication on the social web falls along the expansive continuum of obscurity: a range that runs from completely hidden to totally obvious."

Privacy is a hindrance to corporate marketing, while secrecy is a threat to the national security establishment that observes the basic rule of all technology. Use the optimum scientific hi-tech enhancement to maintain and further the interests of the ruling elites. Any technological development is viewed as a useful advancement if it works to expand control over the economy or social structure.

Supporting this conclusion is an article from the master of facture awareness. Michael Snyder provides an impactful list of
32 Privacy Destroying Technologies That Are Systematically Transforming America Into A Giant Prison.

"Many people speak of this as being the "Information Age", but most Americans don’t really stop and think about what that really means. Most of the information that is considered to be so "valuable" is actually about all of us. Businesses want to know as much about all of us as possible so that they can sell us stuff. Government officials want to know as much about all of us as possible so that they can make sure that we are not doing anything that they don’t like."

If you need more convincing, examine the
10 Privacy-Destroying Technologies That Are Turning America Into A Police State, by Daniel Jennings. How many of these devices or practices are monitoring your every move and thought?

1. Electric meters

2. Telematic devices on cars

3. Smartphones

4. RFID chips in drivers’ licenses, credit cards and other cards that allow the tracking of individuals

5. Data mining by local and federal government

6. Voice recognition. Russian scientists have invented software called Voice Grid Nation that can identify the voices of millions of different people

7. Fingerprint recognition

8. Chips that monitor your body functions

9. Behavior monitoring software

10. Next Generation surveillance systems such as Trapwire and Intellistreet

Popular consensus would have you believe that this infringement into your most personal behavior is inevitable and it is futile to resist. From an institutional perspective that viewpoint seems correct. Nonetheless, the preservation of your human dignity demands a vigorous reassessment of the numerous ways you have the ability to influence, if not, protect against this tech assault.

Before assuming that tech is great, reflect upon the culture of expected progress. Proponents of applied science automatically assume that advancement comes from such evolution. Conversely, the actual function of various innovations often brings the loss of personal solitude. Tech is not neutral. By definition new or different technology changes the landscape.

bigdataprivacy.jpg

What does not change is human nature. Supercharging the velocity and speed of functions and the distribution of information, without guarding the integrity of personal consent is intrinsically immoral. While that statement may seem obsolete as the NSA constructs the largest digital computer memory center in the history of the world in Utah with the capability of storing 5 zettabytes of data, the principle of inherent autonomy still remains.

Amitai Etzioni presents an academic postulation, attempting to answer the question, Are New Technologies the Enemy of Privacy?

"Privacy is one good among other goods and should be weighed as such. The relationship between technology and privacy is best viewed as an arms race between advancements that diminish privacy and those that better protect it, rather than the semi-Luddite view which sees technology as one-sided development enabling those who seek to invade privacy to overrun those who seek to protect it. The merits or defects of particular technologies are not inherent to the technologies, but rather, depend on how they are used and above all, on how closely their use is monitored and accounted for by the parties involved. In order to reassure the public and to ensure accountability and oversight, a civilian review board should be created to monitor the government’s use of surveillance and related technologies. Proper accountability requires multiple layers of oversight, and should not be left solely in the hands of the government."

The problem with this arms race is that it is waged among equally corrupt globalist factions. When Mr. Etzioni asserts "How they are used" he interjects the moral imperative. The record of Microsoft, Google, Facebook, Apple and Amazon, etc. respect and protection of personal confidentially is not exactly reassuring. Their government parent partner agencies in data mining use the telecommunication corporations like Verizon, AT&T and ISP providers as giant sucking machines that feed the secretive intelligence community.

Understanding the drill is simple, secrecy resides within the ruling class, while all personal privacy is relegated to the museum of family archives. Just how can such a relationship be monitored by some kind of nebulous civil board to ensure non consensual privacy?

With the overwhelming wherewithal, increasing technological capacities allow, even greater levels of abuse and evil applications. If no other lesson is internalized from the Edward Snowden disclosures, society better admit that trust in the secure use of communication technology is near zero.

When privacy is surrendered so willingly, especially with no consequences for the offending government agencies or complicit corporatist associates, the future of civilized life comes into question. Yet, people are so easily induced to acclimate into using the next wizard device.

Life is a beach no longer. Now Disney Can Track Your Every Move with NSA-Style Wristbands, is using the "Magic Bands" — which are currently optional — are part of a new MyMagic+ "vacation management system" that can track guests as they move throughout the park..Efficient? Perhaps. But post-Snowden, some worry that Magic Bands are nothing more than NSA-esque tracking devices."

Oh, that voluntary choice lasts only as long as it is offered. This culture of "personal space" invasion is meant to indoctrinate the friendly likes into a sleeping death from poison apples. Being buried alive, in a snow job of tech that promises you will be the fairest in the land, will not make you a queen.

That prince charming kiss only comes with resisting any snooping gear that diminishes the innate right for privacy. Taking protective measure against technological enslavement is the real national security mandate. The enemy is not some fairy tale monster; just look no further than to your own government. You have the right to your secrets. Dump the smart devices and go as low-tech as possible.

SARTRE – January, 6, 2014

Subscription sign-up for the BATR RealPolitik Newsletter

Discuss or comment about this essay on the BATR Forum

"The best way to predict the future is to invent it." - Alan Kay

BATRforum.gif
Join the BREAKING ALL THE RULES Public Forum

© 2000-2014 by BATR All Rights Reserved

batr6420019161562077743551272v.gif
BATR Index Page

tumblr visit counter