Guardamerican twitter LinkedIn home

The quaint idea of privacy

First: Facial recognition.
How: What can only be described as an absolutely mad grab by every major corporation involved in computers and software to secure a copy of every photograph ever taken by anyone anywhere in the world.
Then, once the bandwidth is sufficient, movies…Videos of everything that is ever captured.
Ideally, you will identify individuals in your photographs, tagging them in FaceBook, or adding that data in iPhoto. Already, every photo is correlated to the user of the device capturing the picture. And location data is built right in to the electronic image, automatically.
Ultimately, it will be irrelevant whether you identify any individual. That identification will be automatic. And every photo or video will describe who the subject(s) is (are), where and when they were, and perhaps what they were likely to be doing. More than just a "thousand words," no?
Second: Biometric recognition
How: By incorporating access to anything electronic using personal identifiers. This is not merely facial recognition. This will include biometric recognition of every individual's unique chemical profile as described by their sweat. Using an array of sensors built into everything, perhaps even your clothing, individuals can generate a unique ID that is based upon a combination of their sweat and the product that is reading it. A unique key.
A key to open what? Answer: You. 
This data will be supplemented by interpretation of whole body movements, postures, or calculable size and weight. Ever recognized someone from afar because you could just tell it was them? You're not the only one. And soon, not the only thing
You already know that every non-cash purchase you make is tracked, don't you? Oh, and think your medical data, what prescriptions you take, will somehow be protected by HIPAA? Don't make me laugh.
Third: Algorithmic interpretation of every movement you make, every bio-chemical you exude, and everything you say or type or do. Taken as a whole, it will be possible to predict what you intend to do next, and perhaps maybe even what you intend to do tomorrow or next week.
How: User-facing cameras capturing your continuous expressions and eye movements, as well as what you are typing, or what you are dictating into your electronic devices (as I am right now). It does not matter whether you type it or it is dictated: all communications are and will be processed algorithmically to determine what you are thinking, and what you will think. And ultimately: what you will do.
Next thing to accomplish: electronic sensors as arrays built into your phone, your computer, your clothing, your car...everything. And lasers work, too. Lasers can identify what you had for lunch.
Fourth: Accumulation of data on every single individual in the United States, and globally.
How: It will not be necessary for individuals to even access an electronic device. It will only be necessary that they come into view of or in physical contact with an electronic device. And they will be everywhere -- again, perhaps in your clothing, and certainly in appliances and devices. Or remotely, via insect-sized drones buzzing about.
Fifth: Development of profiles and templates that indicate specific actions. Using Big Data, it will be possible to interpret all behavior to determine and predict individual behavior. Doesn't the recently-announced funding to "map" the brain sound exciting?
How: When an individual's behavior matches a profile or template, it will generate specific content and experiences to be delivered to that individual -- or possibly elicit a response from something or someone else. Thus, it will not be necessary to "spy" on everyone.
It will only be necessary to determine when every individual intends to do something that is of interest to those who handle or control this information and predictive capability.
In this sense, you might think of every individual as having a potential covalent bond, as in chemistry. Or, more accurately, every individual's behavior will be matched with an electronic receptor. A "socket" will exist as a profile for kinds of behavior, and your individual behavior will be of interest if and when it matches a profile -- like a puzzle piece.
Conclusion: When all of the above occurs (and it is already well underway), certain people will know everything there is to know about you whenever they choose to know it.
Mostly this will just automatically feed electronically-delivered goodies to you that are interesting and useful. The overarching desire is that you buy something. But if you appear likely to do something not approved, your activities will match a profile that will trigger a protocol and you will be flagged for appropriate action.
By, the way: Sorry...just by turning on your computer, you are now on "the list." Oops. 

Add comment

Security code

Category: Jurisdiction