Monday, February 27, 2017

Palantir

https://theintercept.com/2017/02/22/how-peter-thiels-palantir-helped-the-nsa-spy-on-the-whole-world/?comments=1#comments

It is Sunday morning.  My favorite time to deep dive into a thing of interest to me.  This link is where I dove.  It takes some time to read and the comments add a great amount of perspective.  I have previously commented in this blog about Palantir and those entities associated with it.  Corporate, government, academic, as well as broad problem domains of Artificial Intelligence and, in general,  (because it is my frame of looking at all things) the Object Oriented Approach to relating all these things in some kind of an over all high abstract level big picture Operating System and Application Programs

Palantir certainly has its hands in and on a vast amount of data!  It has the tools to make some thing out of all that data producing information, and knowledge.  It is a complicated domain that covers the problem of figuring all this out to distill a pure result for action application to accomplish purpose and objectives!  The big picture is not hard see and does not require my use of a Palantir level data base or programs to see it.

One arbitrary point of entry just to get started with a big picture look is Information Asymmetry.
The advantage of having information that another entity does not.  Information derived from data.  Information that can be related in various ways leading to production of knowledge about the nature and content of a broad spectrum of information at a macro level that involve relationships among a number of problem domains.

Think of it like a doctor relating to the human body.  A complex physical system of an instance of all human beings.  It is studied from micro to macro level. What it is and what it does.  Data about the structure and operation of a single person leads to information and knowledge.  Aggregates of individuals leads to an expanded problem domain.

It is the Information Age.  We have a window on it to extract information from data and to create knowledge that is the World Wide Web.  Everything that the WWW is and does is available to us in a limited way but available in a controlled system in an unlimited fashion to those that have permissions to access it and/or create their own access methods and tools to get it.

Selective government agencies have various degrees of data access all the way up to unlimited.  Their systems are  all protected by security systems that hide their degree of access as well as how that access is used.  The private sector has similar data access related to their commercial operations domains.  Government Intelligence is simply called Business Intelligence on the private sector side.  the Intelligence System is generally the product of public/private collaboration.  Palantir is an excellent example.  There are many other private enterprise entities operating in the same or closely related relate domain that Palantir operates.  In addition many are operating in the public/private/academic relationship domain.

Open Systems expose an amazing amount of unrestricted data and information to the general public.  The WWW also offers knowledge of how it all works from macro to micro levels.  If anyone using the WWW can gather information about any chosen entity to create some degree of knowledge about the entity by integrating public information it is astounding to think about what public and private entities with special access beyond the WWW can gather and analyze using tools created for Intelligence gathering.

Anybody can gather a vast amount of information about anybody or any entity using the WWW.  Anybody can put the information gathered together to create more information about anything to create knowledge about it.  Anybody can be an information analyst.  Anyone can do investigative research and discover interesting things about anything.  It is something that I enjoy doing.

A google search on Palantir produces more information than I could analyze in a year and the information is dynamic over time as Palantir grows.  Born in government Intelligence it has expanded to the private sector as it continues its leading edge advancement in the Intelligence sector of government agencies.  The initial link in this blog entry gives a look at where Palantir is now.

One significant thing that is obvious by omission that Palantir must be involved in, or some other company like Palantir is Financial Information Intelligence.  A tap or access into all financial transactions.  Just imagine what can be learned from that access!  Following the money is a source of Intelligence.  Laws requiring the identification of beneficial owners would seem to open the door to gathering information that links specific individuals to their ownership of assets.   I see laws that do that as beneficial and public information regarding who are the beneficial owners of anything as good.

Discovering beneficial ownership is an investigative challenge.

http://www.nakedcapitalism.com/2017/02/wolf-richter-much-money-laundering-going-housing-market-lot.html

Data resources such as available at the Palantir level of Intelligence operations would discover beneficial ownership quickly.  Discovery would untangle the web that intends to hide beneficial ownership for tax evasion purposes and name names.  Lots of names.  The big names would of course be the most important to identify but the low level evaders are too numerous to deal with.  I suppose that there may be some low level evaders right in my home town.  How might they be discovered?  Is there enough open source information available to discover them?

What nefarious things are going on in my home town that can be discovered by Open Source intelligence?  What gross inefficiencies could be identified?   I wish I had Palantir level access and ability to discover that!








Thursday, February 9, 2017

Cellebrite

Added 26 Feb 2018: https://www.cnet.com/news/feds-may-have-tool-to-break-into-any-iphone/

http://www.mcclatchydc.com/news/nation-world/national/national-security/article131308584.html

This link presents info on Cellebrite.  Why are so many Israeli companies involved as primary industry players at the leading edge of surveillance?  Just seems like that researching links that so often go back to Israel.  Perhaps it is related to our special friendship.  Things can be done there that cannot be done here?  Regardless, the link sheds light on Cellebrite.

This link also but in a general manner regarding Cellebrite and US police forces.
http://www.citylab.com/crime/2017/02/cellphone-spy-tools-have-flooded-local-police-departments/512543/?ncid=newsltushpmgnews

http://www.cellebrite.com/

Cellebrite is in the cell phone cracking business.  iPhone 7 is hard to crack.  How blatant is this news release:
http://www.cellebrite.com/Mobile-Lifecycle/News-Events/Press-Releases/cellebrite%E2%80%99s-mobile-lifecycle-supports-release-of-the-new-iphone-7-from-launch-day
Cellebrite supports release of the iPhone 7 in this manner:
Via Cellebrite’s in-store platforms, retail associates will be able to transfer a customer’s content from their old device to their new iPhone 7 handset. As part of the device lifecycle, operators and retailers will also be able to provide diagnostics for the new device.

What a nice service for the customer that is so ignorant that they can't transfer their info from an old phone to a new one!  What does Cellebrite help themselves to in the process of helping customers?  What is entailed in "providing diagnostics for the new device"  Its new, out of the box!

"The iPhone 7, which is available in-store on 16 September, is one of some 7,000 mobile devices for which Cellebrite provides point-of-sale transfer solutions. Cellebrite technology empowers retail associates to deliver fast, consistent service across more than 75,000 retail service points globally."

In the process of providing all this wonderful service what kind of back doors does Cellebrite insert?  Why must the FBI go to Cellebrite?  Wow!  This is really putting a lock on the business to which only Cellebrite has the key?


Amazingly obvious?

"The new device will also be supported by Cellebrite’s Hybrid Content Transfer whereby productivity essentials, such as contacts are immediately transferred at the point of sale, while the more time-intensive task of moving large volumes of multimedia data is subsequently completed via Cellebrite’s self-service mobile app." Click on that Content Transfer link (multi channel content transfer) and it goes to 404.  Ooops, if we tell you what Content Transfer is then we would have to shoot you!

However this link: http://www.cellebrite.com/pt/Mobile-Lifecycle/Products/multi-channel-content-transfer goes to a website page in Spanish but on the page gives a English page option that does not give and English language page!  Spain is also a player in this same field!

Spanish to English translation as follows:

Helping customers "Get everything running faster"The multichannel secure content transfer platform meets all the demands of mobile customers and in-store customersOur exuberant and hybrid content delivery delivery model allows for full or partial data transfers within the store or on the device, allowing for optimal personalized service in any situation to increase customer satisfaction, reduce in-store waiting times, and help Customers to "Quit with everything running faster."
    
IN THE STOREFull service content downloads via Cellebrite Touch or Desktop• When the store in the store allows• For customers who are not comfortable with self-service• For smartphones• As a premium service+IN SHOP + HOMEPartial in-store transfer completed at home• To enable customers to have their important data quickly• To manage the hours of intense movement inside the store• For customers with large amounts of data• To minimize in-store effort without reducing customer valueAT HOMETransfer via self-service using the Cellebrite P2P Transfer App• For technology savvy customers• For online purchases• For customers who can notOr do not want to wait for in-store service

 
Easy to use by store attendants!*****Connect the Select the Trans ra Provide the code
       
Phones contentApp activation
 
Easy to use by customers!Download the Pair the Select the Trans Ra content devices application
         
Key Benefits and Features
   
TransferTransfers between operating systems (Apple for Android, Android for Apple, etc.)
      
Unparalleled supportTransfer to and from phones and smartphonesWww.cellebrite.comSales@cellebrite.com© 2015 Cellebrite Mobile Synchronization LTD. All rights reserved.Connectivity optionsVia a wireless access point (WAP) or directly between phones, no need for WAP or cables
       
SDK AvailabilityFor operators / retailers who want to use Cellebrite technology in their own applicationSafeProtects customer privacy without storing any data, whether local or in a cloud serviceReduction of waiting timeAnd sciencePairing with autodetection and QR code simplifies synchronization
 
PromotionalAssignment of own and customizable brand
  
FlexibleControl of content transferred to manage the terms of service
            
in the store
        
Increases the capacity and productivity of store attendants, freeing them to sell more
  
About CellebriteCellebrite is a leading global provider of advanced mobile lifecycle solutions for Operators, Retailers and Outsourced Service Providers (AMS), to improve customer experience, improve customer satisfaction, reduce costs and generate revenue. With in-store, on-device and web-based distribution channels, cell phone retailers can take advantage of Cellebrite's complete suite of cell phone lifecycle solutions: diagnostics, content transfer between phones, backup, restore, and clean , Automated phone repurchase, and application and content distribution. In addition, Cellebrite provides retailers with the monitoring, statistics and analysis of all activities. Cellebrite's worldwide leadership is demonstrated with more than 150,000 units installed in more than 200 mobile operators and retailers worldwide, representing more than 100,000 stores that process hundreds of millions of transactions per year.Founded in 1999, Cellebrite is a subsidiary of Sun Corporation, a Japanese listed company (6736 / JQ).


End translation.

Cellebrite is a subsidiary of Sun Corporation????? 
Yes:  https://en.wikipedia.org/wiki/Cellebrite
"Cellebrite has two business divisions: Cellebrite Wireless Carriers & Retailers and Cellebrite Mobile Forensics.
Cellebrite Wireless Carriers & Retailers produces hardware and software for phone-to-phone data transfer, backup, mobile applications electronic software distribution, and data analysis tools. Cellebrite Wireless Carriers & Retailers products are used by various mobile operators, and are deployed in wireless retail points of sale. Cellebrite works with handset manufacturers to ensure compatibility[clarification needed] before devices are released to the public.[2]
Cellebrite Mobile Forensics was established in 2007 and produces software and hardware for mobile forensics purposes used by federal, state, and local law enforcement; intelligence agencies; military branches; corporate security and investigations; law firms; and private digital forensic examiners.[2]


How convenient to operate on two sides of the fence.  Retail sales and Spy upon what is sold!  It is a terrific business model!

This link from 7 days ago shows that others have a lucrative business model also: Spy and counter-spy:
https://motherboard.vice.com/en_us/article/hacker-dumps-ios-cracking-tools-allegedly-stolen-from-cellebrite 


Wednesday, February 8, 2017

Genetics Is Giving Way to a New Science of Life - Astounding!

https://www.independentsciencenews.org/health/genetics-is-giving-way-to-a-new-science-of-life/
Jonathan Latham, PhD

Absolutely Astounding!  It seems to contain so many of the concepts that find their way into this free range blog that I am compelled to write to find the relationship of things and their expression in what they do that i generally call an Object Oriented approach to the Problem domain. One of the more recent concepts that I have looked at in this blog that the link expresses is that the evolution of our understanding systems is going toward the driving nature of system development not being Imperative but Constraining.

The link also makes a passing reference to Nouns and Verbs.  The nature of what a Thing Is and what a Thing Does which was the beginning foundation mystery that motivated this blog to discover their relationship.  Originally I was going to call this blog "Nouns and Verbs" but then I focused the application of what a thing Is and what that thing Does to Money.  Money is a thing that is perceived and structured dominantly on what it Does not what it is.

The current Monetary System is fallacious because it is premised on what it does almost to the exclusion of what it is.  The trick of hiding what money Is and focus on what it does is that in getting to my final analysis of what money Is I conclude that what it is.....is: A thing created at a point of time in future time and brought in the present real time by birth as debt.

This view of the current monetary system foundation being a future point in time that makes its birthing Parent "Future" an action based verb founded action thing in the future is at the binary opposite end of the spectrum analogous to natural science that is object based noun founded birth existence of an object in the past.

At some point in the link the author expresses the idea that RNA is a single thing (like I view Money) simply having two different expressions?   How do I explain that?????  It looks and feels correct and a solid foundation for system development thought that springs almost from philosophy?

Natural systems nature and structure in the domain of natural science is probably the best model for the creation of our human conceptual systems structures.  I can see that emerging as the object oriented structure of the Information Age advancing to be recognized as a better model for social systems we created in the past structured on what they are designed to do (and then call them anything we choose them to be) rather than what they are and by virtue of what they are they work to serve us, to perpetuate itself toward improved functionality.

https://bioscienceresource.org/about-us/our-staff/

Johnathan Latham applied his thinking about the fundamental natural system and order of things in the science of genetics to the nature and order of things in a social system structure.  Gosh, looks like what I did to examine the fundamental nature of the physical world system and apply it as a model to conceptual world social systems we create.
https://www.independentsciencenews.org/health/why-the-food-movement-is-unstoppable/

Tinkering with Genetics to produce GMO is a problem.  Perhaps a problem as I see it because there is a problem that may arise related to and originating from an even more fundamental thing in the systemic structure of genetic biology (like RNA or even something more fundamental than that) and its natural expression.  Its natural expression being some sort of natural constraint on something else in the natural world.....like things called humans.
https://www.independentsciencenews.org/health/growing-doubt-a-scientists-experience-of-gmos/

https://en.wikipedia.org/wiki/Bioscience_Resource_Project

http://www.truth-out.org/news/item/35871-god-s-red-pencil-crispr-and-the-three-myths-of-precise-genome-editing

Tuesday, February 7, 2017

Another Data Harvest and Phone Home Stealth Method (Blue Tooth)

https://www.theregister.co.uk/2017/02/05/chrome_56_quietly_added_bluetooth_snitch_api/

On the heels of the prior blog entry.  Phone Home Wack-A-Mole.

My Vizio TV is Watching Me Watch - My Car Too?

http://www.huffingtonpost.com/entry/vizio-settlement_us_589962dee4b0c1284f27e534?
"According to a complaint filed by the FTC and the attorney general of New Jersey, Vizio began making TVs in 2014 that automatically tracked what people were watching. Older devices were retrofitted remotely through software updates, and all of the data was gathered without telling consumers and without their consent."

"Automatically tracked" Yes, Vizio did but how it was done and the scope is amazing as well as amazingly simple and doable.  So Vizio did it and made money selling the information harvested on a grand scale.

From the link:


"The FTC detailed how the electronics giant used hidden tracking software to spy on its customers:

On a second-by-second basis, Vizio collected a selection of pixels on the screen that it matched to a database of TV, movie and commercial content. What’s more, Vizio identified viewing data from cable or broadband service providers, set-top boxes, streaming devices, DVD players and over-the-air broadcasts. Add it all up and Vizio captured as many as 100 billion data points each day from millions of TVs.

...We’re not talking about summary information about national viewing trends. According to the complaint, Vizio got personal. The company provided consumers’ IP addresses to data aggregators, who then matched the address with an individual consumer or household. Vizio’s contracts with third parties prohibited the re-identification of consumers and households by name, but allowed a host of other personal details – for example, sex, age, income, marital status, household size, education and home ownership. And Vizio permitted these companies to track and target its consumers across devices."
Vizio selected a matrix of pixels large enough to match against a data base of digital media delivered to the TV screen via "cable or broadband service providers, set-top boxes, streaming devices, DVD players and over-the-air broadcasts."

The methodology is obviously simple:  Select a matrix size of pixels sufficiently large enough copy the matrix information and send it to Vizio.  Probably every second whatever an adequate sample rate would be for the purpose.  The variable pixel matrix size could be up to full frame every 30th or 60th of a second with any variable interval between full screen captures.  If the programming is that simple and there it is certainly probable that it could be then the the potential magnitude and purpose of this method is truly astounding!

How to find a smart TV IP address:
If your TV is connected to internet, press the Menu button on your remote device and select the Network option. Select the Network Settings and then, select IP settings option. The existing IP address of your TV appears. It will be a private IP address if you are using router to connect to your ISP.

http://whatismyipaddress.com/private-ip explains how IP address works.  A private IP address of a TV on a network conveys no user information itself.  The IP address of the internet router it is connected to in a home or any other place is the identifier that is connected to a user, the user account and all information about the user that can be obtained or attributed to the user router IP address.

Amazing!

A smart TV is a computer.  Essentially no different than the laptop I am using to write this blog entry.  Any application program running on the computer could be coded to send a screen pixel matrix copy to any programmed address on the internet?  A screen shot of what I am typing right now?  What I am typing right now is being sent to Google in real time before I even publish this bog entry.  Sent in either draft form or modifying an already posted form if I am editing it.  Beyond that known real time Google monitoring -- for spell check purposes -- any other program on my computer could be sending a matrix screen capture to an address of the programmer's choice.  

This is big:  Not only sending a screen capture but a stealth audio capture or video capture.  While the screen is always on when I am using the computer, sound capture microphone  and video camera sound/video capture may not be on unless I am using (Hey Siri, FaceTime or Skype) them or they are turned on by stealth.  A 60th of a second video frame screen capture is all that is necessary for any program to send the screen capture anywhere.  

Deep Packet inspection is a spy method to find out what is being transmitted over the internet and to whom.  Perhaps I need my own spyware program on my computer to spy on itself!  The NSA could go into the App store business!

Of course Vizio phoning home turned on by default could be turned off by the user.  That however is the "Reader Digest" turned on by default model used to scam people that are not aware that the default setting of on remains set until it is specifically turned off by the user.  Money and/information continues to flow to the originator of the "on by default" setting.  

The scope of Vizio pixel capture is even greater in the  obvious situation that what is captured on the screen may not be related to media arriving via the internet.  Arriving via a dvd for example or from my mac computer via Airplay.  From my Photos on my mac computer being displayed on my Vizio.  Yes, I do have a smart Vizio.  

Ponder this:  Face and object as well as audio recognition is a technological state of the art Artificial Intelligence fact.  It merely requires video/audio analytical programs either incorporated in the transmitting device to selectively transmit or analytical programs applied to real time or history transmissions at the receiving end.

The conclusion:  If the screen shot pixel matrix grabbed by Vizio do not match any media in its data base that is associated with customer having an interest in connection to a data base match then the screen shot still has commercial data mining value to discover a potential customer market.  Match or not it is a win/win money maker to monetize the information.  Contract with the NSA?

The potential for smart TV's to phone home data of interest to a recipient is immense.

For example:  High frequency audio coded signals can be embedded in an audio stream to trigger an event or even transmit an audio code that can be translated into a video screen display object.  Embed that high frequency coded signal into an audio recording stream and if that stream is played on any internet connected device and if the device is phoning home a detection of a high frequency range embedded audio code along with an associated UIC then bingo!  A traceable connection!  Apply that method to top secret level audio/video recording and security leaks can be identified and traced!

Speakers on the device playing the audio probably do not necessarily have the technical ability to process the high frequency range sound beyond the threshold of human hearing.  That would not be necessary.  It is likely that it could be in the digital audio sample that is computer processed.

Likewise a pixel matrix could be embedded in any video, like a video trademark, and the smart TV could be programmed to look for that pixel matrix.  Perhaps it could be pixels or small matrices of pixels distributed across the screen image over a segment of frames over a segment of time or a single video frame.  When detected....Phone Home.

The algorithms do all this are probably patented.  Some company holds the patent.  Maybe it was created in house by Vizio?  Maybe the patent holder is selling it to anyone wanting it.  Maybe it came from In-Q-tel?  NSA would not even have to pay Vizio for the information.  Simply get it for nothing by tapping into the Internet.  That however has its Government Surveillance problems.  Maybe better to pay a private business for it.  NSA gets all the money it wants so why steal it and be on the hook?  Let Vizio or any other entity using this methodology be on the hook.

Vizio is paying the price for being on the hook!  Perhaps a customer contract with Vizio includes payments in the event that Vizio is caught?  It is a cost analysis risk/reward thing.

From the top link:
"Aside from the monetary penalty, Vizio must also stop the tracking, delete most of the data it collected before March 1, 2016 and require consumers to give consent before collecting their information."

Yes, of course!  But what about the data collected and sold to customers and their retention of collected data?  That would require disclosure of any customers that bought the data.  Maybe it is good for someone that the penalty not go that far?

Who else in the smart TV domain is doing this?

Is it being done in the general internet computer domain?

Who has the patent on this method of information capture?

We are Number 1.  Vizio however sells to everyone below us.  What have they done in their courts?  

Picture this as a mild example scenario:

Closed door business briefing using a big screen Vizio TV to present proprietary business information.  The same TV has an internet connection used for other conference room matters.  Large matrix screen shots of the presentation are captured by Vizio.  If the Vizio program detects no internet connection then the screen shots are stored for transmission when the internet is connected.

Insider information?  Company secrets?

Surveillance for profit! 

Here is a real kicker:  Visio makes a router!
https://www.cnet.com/products/vizio-xwr100-dual-band-wireless-router/review/ 
What slick things can that do?

As I suspected the Vizio spyware was provided by a company that offers the product to Smart TV makers. https://en.wikipedia.org/wiki/Inscape_Data_Services
"Inscape is a provider of ACR services to Smart TV OEMs.[1] The company was founded in 2009 as TV Interactive Systems later renamed Cognitive Media Networks Inc. On August 10, 2015, Vizio acquired Cognitive Media Networks and renamed it Inscape. On July 2016 Vizio announced Inscape will spin off and operate as a separate, privately owned company."

CEO Zeev Neumeier patents on the technology here:
https://www.linkedin.com/in/zeev-neumeier-38ab271 
https://www.google.com/patents/US8930980 

http://www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=378233394 

Could be one of the data aggregators that draws personal info from all sources to their data base for monetization.  Maybe Vizio would not be a source since this is more of a tracing investigation oriented data base, not a marketing one which is BtoB.  However an upper level aggregator might aggregate both? 
https://www.bloomberg.com/news/articles/2016-08-05/this-company-has-built-a-profile-on-every-american-adult 

http://ididata.com/solutions/idicore/ 

What is it about these "credentialed" PI agencies that gives them the privelges of signing up for this personal information in accordance with government privacy rules that any ordinary citizen cannot sign up for.  It is probably only a check mark for the authorized credentialed agencies to check at the website that they agree to all the rules and regulations of use.  Exactly like the one any citizen checks in the terms of agreement for access to anything on the internet.

Doctors for example have credentialed privileges  associated with their professional ethics.  PI's?  What ethics do private snoops have?  A license?  Certification? A trench coat? Dues paying members?

https://www.toddington.com/resources/ is evidently draws from open sources, public, information but has a tool to search the open sourced data base that it sells.  It appears to be a  mixed bag of open, semi-fenced and fenced sources and tools free or available at a price.

What about the car watching us?
http://www.autoblog.com/2017/02/24/tv-vizio-privacy-car-data-listening-opinion/ 

Sunday, February 5, 2017

National Watch List Rap Back

https://theintercept.com/2017/02/04/the-fbi-is-building-a-national-watchlist-that-gives-companies-real-time-updates-on-employees/

Placeholder for future comment here.....

The Code Is Law! Coding the Code - And Copyrighting The Result!

https://www.techdirt.com/articles/20170203/00341736620/federal-court-basically-says-okay-to-copyright-parts-our-laws.shtml#comments

I never know what I will find written on the wall on any given Sunday morning and launch me on a blog entry exploring it in my own way.  This idea of this link was writ large.  It's Yuuuge!....Really Big!

Code is Law:  That means the Code of Laws of the United States of America is Law.  Law with a big "L".  Yuuuge I tell you!
https://en.wikipedia.org/wiki/United_States_Code

"The Code of Laws of the United States of America[1] (variously abbreviated to Code of Laws of the United States, United States Code, U.S. Code, or U.S.C.) is the official compilation and codification of the general and permanent federal statutes of the United States"

Did I tell you Yuuuge?  To make it small and short but still Yuuge I will simply call it US Code.

US Code looks like public law to me.  Public...yes, but there is private money to be made on giving it value added that can be sold by an owner that added value to public law and has a private protection on value added.  Yuuuge money!

For example
"On a day-to-day basis, very few lawyers cross-reference the Code to the Statutes at Large. Attempting to capitalize on the possibility that the text of the United States Code can differ from the United States Statutes at Large, Bancroft-Whitney for many years published a series of volumes known as United States Code Service (USCS), which used the actual text of the United States Statutes at Large."

United States Statutes at Large, is now published by the government and available to the public for free in digital format.  At a price paid to the government for a paper copy.

The preceding is background to this Yuugeness:  There is Yuuuge money for private enterprise in monetizing things in the Public Domain sector of government publications.  Monetized by some form of protected value added.  This is simply a specific category of seizing or fencing public property for private gain.

Privatization of public assets is a business model that in application accomplishes privatization of public assets for private profit gain in a variety of very clever ways.  The beginning link looks at specific clever way to get an exclusive private copyright on public law: US Code.

Very clever backdoor model method indeed.   It is the backdoor model method that has Yuuuge potential.

Yuuge potential?  Even Yuuger than the front door model of Privatizing the Public Office of POTUS (POPTUS) which will be a failed attempt that was great risk for great reward where risk will bite Trump severely in the ass in his attempt to grab a great amount of power. 

Cutting to the chase:

The Yuuuge! potential financial return in privatizing  the US Code.  The really big, really big clever method of doing it is writing the US Code in Machine Language Code.

No small task!  Translating the US Code from Natural English Language to Machine Language.  It is a Yuuge long range plan with a logical progression in getting there even beyond the example of the government objective to put a man (or woman)  on the moon.

Digital Governance Google search results cover a wide range of thought and design.

A business model aimed at carving out and fencing private interfaces with the public US Code for private profit gain is Yuuge in potential but so small in present scope of application that it flies under the radar.  It will continue to do so as long as the private interface carve out and fencing by means of copyright remains expressed in Natural English Language as Business Standards.

The whole thing is a Public/Private partnership stealth transformation strategy.   By design or default driven?  Default driven if it is simply a function of how information tends to organize itself logically in the Information Age.  By design to the extent that private enterprise or government agency is taking the lead on change.  Probably private enterprise leading as a contractual agent to the government with revolving door privileges access.

Private standards are creeping into codification in law by extension/inclusion of those standards into US Code law and copyright protection of private entity rights to intellectual property.

That is first step creep.

When private enterprise copyright algorithms methodologies coded in machine language begin to be incorporated into the US Code as application extensions of US Code law like an API Application Program Interface then payments by the government are due to the copyright holder.

The initial link at the beginning of this blog entry focuses on private enterprise extensions to US Code coded in precise English Language it is a step up to coding extensions in a more precise coding language approaching an integration with nth generation machine language operating systems and application programs.

That is a Yuuge money making opportunity for a new market for private enterprise that always wanted to get into government business.

Federal Court Basically Says It's Okay To Copyright Parts Of Our Laws

Bottom line: The US Code of Law will not change.  Only the language used will change to a more highly defined more systemically integrated and accurate dialect of the English language created and copyrighted by the next Big Business Information Age Enterprise that sees opportunity to transform a public domain government law system written in ambiguous and relatively unstructured English language to a more precise more machine like (copyrighted as Intellectual Property coding) code and systems in the emerging domain of Artificial Intelligence. 

The 25th Amendment is a complicated algorithmic law written in English.  Someone, some collection of extremely gifted analysts like lawyers Object Oriented system analysts and programmers could re-write the  essence and intent of the 25th Amendment in a higher order language of English approaching the 5th or 6th generation coding the structure of an operating system and its application programs to say and do the same thing but much more accurately.  Probably identifying a lot of disconnects and logic failures in existing amendment coded in English.

For example:
When the 25th Amendment get an application we will be wishing that the re-coding had already been done! Whatever business did it would get a big and well deserved copyright payment for their intellectual property.  

The original creators never got paid.









Wednesday, February 1, 2017

Bitcoin Network - Physical and Concpetual Network Relationships

http://www.zerohedge.com/news/2017-01-31/those-who-say-bitcoin-has-no-intrinsic-value-need-imbibe-gospel-true-education

The link addresses Bitcoin from a PointOfEntry:Value.  The link's explanation of Bitcoin and bitcoin, two different things is the greater real value of the the link beyond the financial value it presents.

The real value?  It is all about the model of the Internet and its Applications.  What is the "intrinsic value" of the Internet.  From what scheme of the relationship of Things does it derive an intrinsic value?

"Value:Intrinsic" is an ambiguous term.  It has one foot in the real physical world and another in a purely conceptual world.  The Thing:Object:Parent:Frame:Concept:Value is one of existence.  If the thing "Concept:Value" (extracted from its full line of Parent/Child inheritance lineage for the sake of convenience of specific examination) is examined then the classic question of investigation analysis is:  Value is the Object:Parent of what Objects:Children?

Sidebar note here:  What if I had said:  "Value is the Object:Parent of what ObjectOrObjects:Children of the Parent?  But that question itself is not a fully clear and accurate logical statement in Object:Oriented thinking.  A single Child of a Parent that has no other sibling children of that parent that differentiates the Children inherits all the attributes, methods and messages of its Object:Parent.  It is the same as or equal to its parent.  A sole single child of a Parent it redundant thinking.  It is a clone of the Parent.  It is the Parent.

Therefore to have conceptual difference meaning then AllThings must be Object:Children of at least two Parent Objects and that a sole single Object:Parent:Child  has no logical meaning except as a null object at the ultimate SingleExclusiveParent:AllThingsChildren?  At the other end of the spectrum there is another Object:Null.....The sole child of two Object:Parents.

In a circular way I seem to have gotten to the logical binary propositions on which computers and computing are based.  Either/Or, True/False, Neither/Nor, Present/Absent, On/Off.

What are the two TopLevel Object:Parents giving birth to all Object:Children?

1. Physical Real  (Domain:Physical)

2. Logical Conceptual (Domain Conceptual)

What is the sole single ObjectParent spawning these two Object:Children that are different in only one attribute?  What is the sole single Object:Child ultimately spawned at the end of the entire ObjectOrientedUniverse That goes to where I will not go.  The frame of my ObjectOrientedUniverse on a continuum from originating and ending with.......
Objects:ParentOrChild:AbsoluteMinimum=TwoDifferent

If:
The fundamental Object Oriented Partent/Child relationship structure of  of EveryThing

Is between:

TheFirstOnlySoleSingleObject:Parent:FirstChildren:TwoOnly(OneReal/OneConceptual) from which all Object:Children descend.....

And:

TheLastOnlySoleSingleObject:Child that is the ultimate descendant of the FirstOnlySoleSingleObject:Patent?

Then:

From what common ParentSoleSingleObject:Thing do these beginning SingleParent and ending SoleChild descend?

Logical Conclusion Hypothesis:

Time!

At this point I return to thinking about the Bitcoin Network after taking the VeryLongWay around to SetDomainFrame for examination of the meaning of the originating Link.

To be continued as the BitcoinRabbit gets PulledFromHat.......