Tuesday, August 20, 2013

Changing IP Address is Illegal - Control of Everything

This link reports this:  Changing an IP address to access a public website is ruled a violation of US law.

An IP address is described by Wikipedia here.  The following is the first sentence:

"An Internet Protocol address (IP address now defined by IPv6) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing."

The structure of information is built on this one basic building block: identifying an exclusive, unique one to one entity relationship.  Meaning:  This one unique thing (a noun, a real thing or a conceptual thing) among all things just like it (an instance of a class of things) is related only, exclusively and directly to this other thing (instance of a class, maybe the same class but another noun that is a real or conceptual thing).

The rule is that all things relate to all other things.  There are 3 ways to relate:

One to one

One to many

Many to many

Simply put:  That is it.  That defines all possible relationships between and among things.  "Things" being used here as the plural form of the singular "Thing".  A Thing or its plural form Things is an Object.  An Object, real and conceptual is a Thing.  All Things are all Objects. 

Rule Two:

A thing that relates to nothing cannot exist.  By definition, a thing cannot relate exclusively to itself because.....just because!  It is not allowed.  That is a recursive relationship that goes nowhere except infinity.  Unless you have all the time in the world then don't waste your time thinking about it.  It is a given of reality.  It can only be conceived in terms of the spiritual world.

We as individual human beings cannot relate exclusively to ourselves that would violate the rule.  Our mind relates to our own body.  Two different things.  Our mind cannot relate to itself exclusively.  It relates to the our own soul of conciseness.  That is spiritual.  That is another realm.  Going into that world, God is the only unique  recursive relationship that can possibly exist.  He, she or it relates only and exclusively to its own entity and there is only One Entity in that world.

Back to the real world!!!

What does all this have to do with an IP address.

An IP address relates on a one to one relationship to a device in the IP system.  It uniquely identifies that device as a single unique entity instance of a class by its unique identity number that can only relate to another entity with a unique IP address.  That is the rule. 

An IP address can relate to many different people users. 

What the legal ruling does is to make it illegal for a user of a system device with an IP number to use a different device and associated IP number to access a public web site.

Note this: The website name is merely an alias for an IP number.  We find it more convenient to use web site names rather than numbers.  The machine converts the name to the IP number.

The intent to block a specific IP internet system user based on their user identity, individual person or company, only works if by rule (of law)  that identified person or entity is allowed to use only a single device that is registered directly to them (and no other system accessing entity) to access the internet system.

In a perfectly controlled internet system world this would be the situation:  Blocking an IP number therefore blocks the user of that IP number.  It blocks that user absolutely from any access to the internet.  The user is not allowed by law to use any other IP address that is not directly connected by system registration to them.

Does that sound like absolute control?

It is all about control.

That is what conceptual information structures are built on.  Just like real physical natural structures.  Laws that apply in all cases.

Get this:  (This is a big thing to hoist aboard, pay attention all that went before was aimed at saying this)

The structure of the information world is headed for the ultimate end where we ourselves, individually are the uniquely identifiable entity interacting with the information system we call the internet.  That unique identity also becomes the same identity that we use to interact with the entire world around us whenever any interaction is designated as requiring our unique identity to enable, like a key, the interaction.

Who decides what things in our lives, what systems, will require our unique identities in order to access the capabilities of that system???

Think about that!

It is like somebody deciding that baptism is the unique, one and only way, to access a conceptual structure.  All non-baptized need not apply!  Gotcha!  As a matter of fact, the non-baptized are heathens, those that have no soul to enter.  No soul = non existent as a human being.  Absolutely true because the mortal mind then has no soul to relate exclusively to.  By that definition, it is an extremely controlling system.

Binary system.

I talk about where the structure of information is headed but we are probably almost there.  The NSA must (simply because the rules of information structure say so) have a unique identifying number for every single entity they wish to gather information on as a common identification number used to consolidate all the various sources of information about that selected entity.

It will be (is now) much easier to consolidate a variety of information to a single number.  A credit card number, telephone number, IP number, license plate number, to a master number.

This legal ruling that I started out examining is a step toward making the IP device number more closely associated to the entity using that device as an access to the the internet system.  A step toward a pass word entry, better yet a biometric such as a finger print, etc, as the means of entry to the internet.  A step toward the ultimate direct one to one unique identification of all human users as individually identifiable devices on the information system network.  Where we are located at an access point and all communication associated with that entry.

NSA nirvana!

Monetary system nirvana also.  At least in my monetary system where all digital dollars are uniquely identified by a serial number and a value of "one".  All users of that dollar system (money user authorized entities) are also uniquely identified as unique entities.  Each single dollar is a unique master record that does not change.  Only the relationship of a unique registered and identified user of the money system to that master record single dollar changes (current "owner" of that single dollar to a new owner) conveying rights related to a transaction to transfer ownership to another registered user of the system.

Now that is a tight system!

Think about the role of system administrators in that system!

Freedom works as long as the administrator is always collectively the people.

Its our money.

Yes, but who can dictate or monitor how and when we get it and spend it and what we spend it on.

That is control!

Control the monetary system and everything is controlled!

Control of the government or the media is nothing in comparison.

Just for info and expansion in understanding the situation:  This analysis is focused on attackers and identifying who they are beyond the IP devices that they may use.  Focus here is on the bad guys.  Same focus as the NSA.  Get the bad guys by setting up a system that is designed and constructed to identify everybody.

There are many entities on the internet that want to identify me as me associated to the machine I am using.  Whatever that machine may be.  My computer, my phone, and ATM.  They want to connect the machine to me with absolute certainty.  PIN, Password.

Caller ID:  I talked to someone at my credit card company about a card matter.  It started by me putting in the credit card number using the dial pad.  When I finally connected to  a person they wanted the same number again.  I said that you are probably already looking at it on your computer screen as well as the telephone number I am calling from.  They did not say yes but they said the call was being recorded and it was necessary for me to repeat the credit card number for verification purposes.

Voice recognition to make sure it was me.  For super accurate voice recognition the same voice, same words are recorded many times.  How many voice recordings of me saying my credit card number might they have on file?

Every time I give them the digits on the card I say it different just to make them ask my mother's maiden name or last 4 of the social.  Like I say twenty for two-zero.

Messing with the system!

I also know that the business I am talking to is data mining the conversation for everything it is worth.  One of those things is evaluating the customer service as well as the individual employee giving it.  For pleasant, helpful service I give a standard long form "thank you" at the end containing all the key words that I am sure they are looking for to rate and rank the employee.  It is kind of like a verbal tip for good service.

Unintended consequences:  The mined data base on me might categorize me as a pleasant, cooperative person that does not scream, shout, threaten or use profanity and therefore can be expected to with whatever is offered by the business in the event of a complaint. A nice guy that is an easy mark.

My friend told me that the secret to getting to a customer service rep quickly on the phone is to use profanity when answering the standard litany of machine asked questions.  I guess I would rather wait in line.  Maybe the data base has that fact on me too?

Record all information all the time!  Not just the motto of the NSA!

Maybe I should streamline my "thank you for your service" statement to the customer service rep by making a recording on the smart phone that I activate at the end of the conversation that says what I want to say and them hangs up.  Similar to the "leave a message" recording.  I could make several recordings ranging from one to nine on the key pad as well a ranging from 1 - 9 in the positive/negative range of choice keywords of what I wish to say?

Hmmmm....Anyone thought of that yet?

If I had a personal info data mining company I would call it "Getting to Know You".  (Getting to Know All About You).  It would be the background music when someone is on hold.  The caller would here it but at the receiving end everything that they said or was audible while on hold would be recorded as well as the follow on conversation or during the follow on conversation when the service rep asks if they may put me on hold while they check something.

Hmmm.....Anyone thought of that yet????

How often does person carry on a conversation with someone they are with regarding the subject matter of the call while the call is placed on hold by the customer service rep?

The call wall has ears.  How often does the caller think that the service rep is not continuing to listen to whatever is said by the caller while on hold and the caller therefore believes that the person (computer) at the other end hears nothing?

IP to ID Tracking:  This is interesting. The long way around to identify who is using the IP device in absence of a solid association connection of device to personal identity.

Give me a few degrees of separation and I will tell you who you are.  Like the guy guessing age at a carnival.  Just connect up the clues.

Whois (Who is defined by Wikipedia)  is an internet discovery tool that discovers internet devices and associated information.  Initially identifying devices more than who is the human being connected or associated to the device it is never the less a good means to get to a human that might be associated to the device.  With more devices all the time it is more likely that there is personal identification.  Cell phones for example.  Where is there a public cell phone.  It is a personal thing.  Kids even have them.  Some people share a single device but they are married, retired and always together or they are poor and use one per household.

Who is anthropomorphizes an internet connected machine to being a "Who".  A machine being used by someone is close to "who".  The end objective is often the real question what specific human "who" is using this device, a device that is being used as a personal extension of a unique human being.  The future will probably bring us a complete and absolute chain to the individual using the device and associated with the content of information passing thru that device.  It will identify with a legal certitude the association of the person to the device.  The information system will be structured to do that.

That last paragraph brings it around to the focus of the subject even if discussion went far and wide.

It is like watching a tree grow..if you have time..if you don't, you just know that because of the laws of nature it is going to sprout branches and more branches and leaves at the end of an increasing number of branches.  All stemming from the same trunk.  That is what trees do.

Naturally.

















No comments: