HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » Forums & Groups » Main » General Discussion (Forum) » Jefferson owned slaves. F... » Reply #36

Response to Gravitycollapse (Reply #18)

Thu Jun 27, 2013, 03:39 AM

36. This is the root of why/how they want to use metadata to disrupt dissent.

 

Metadata is used to create the targets for a counterinsurgency operation. Sometimes (or according to research, in most cases) the most influential person in a social network (or insurgency) is not the most high profile or the most vocal individual in the group. With very large political groups (OWS for example), this new technology identifies those individuals who's participation in the group is the most critical.

What makes certain folks more critical than others is something very much like what you are going on about. A radical idea presented by a trusted friend will be more easily accepted than if it is tendered by a known loon or crackpot. That's why there is so much effort dedicated to discrediting folks rather than locking them up.

It is super easy to just plant some contraband on an individual and make an anonymous phone call. But if the person is viewed as ultra-reliable then no one will believe the attempted set-up. They have to be discredited in order for these kinds of dirty tricks to be effective.

That, in a nutshell, is why it is so important for them to accurately map our social networks. This is exactly what all the metadata is being collected and used for. It should be obvious how this information can be used/misused to affect our first amendment freedoms, specifically our right to peaceably assemble. There are a couple of stories floating around today about how the MIC is targeting opponents of the keystone pipeline. This counterinsurgeny technology and training is being used against law-abiding citizens right here in America.

Because the algorithms being used are easily handled by computers, and because no errors are introduced by trying to decode or translate any communication content, the system can create a very precise mapping of our social networks. Only actual metadata associated with each communication is logged into the software, and from that the algorithms sort out the social connections.

Remember that our country was founded by insurgents. Many, if not all of our heroes, would have been easily thwarted under this type of surveillance regime and folks have written about how Paul Revere could have been stopped.

Reply to this post

Back to OP Alert abuse Link to post in-thread

Always highlight: 10 newest replies | Replies posted after I mark a forum
Replies to this discussion thread
Arrow 46 replies Author Time Post
Bonobo Jun 2013 OP
JI7 Jun 2013 #1
Bonobo Jun 2013 #5
ucrdem Jun 2013 #8
sabrina 1 Jun 2013 #27
sibelian Jun 2013 #41
Cali_Democrat Jun 2013 #2
Bonobo Jun 2013 #7
sabrina 1 Jun 2013 #28
sibelian Jun 2013 #42
Gravitycollapse Jun 2013 #3
Bonobo Jun 2013 #6
Gravitycollapse Jun 2013 #10
Bonobo Jun 2013 #12
Whisp Jun 2013 #4
Tx4obama Jun 2013 #9
Gravitycollapse Jun 2013 #11
Bonobo Jun 2013 #14
Gravitycollapse Jun 2013 #15
Bonobo Jun 2013 #19
railsback Jun 2013 #22
Bonobo Jun 2013 #23
railsback Jun 2013 #24
Bonobo Jun 2013 #25
railsback Jun 2013 #26
Bonobo Jun 2013 #31
railsback Jun 2013 #32
Bonobo Jun 2013 #34
Democracyinkind Jun 2013 #37
MNBrewer Jun 2013 #44
tblue Jun 2013 #16
Gravitycollapse Jun 2013 #18
Bonobo Jun 2013 #20
LineLineLineLineLineReply This is the root of why/how they want to use metadata to disrupt dissent.
reusrename Jun 2013 #36
Amonester Jun 2013 #17
sabrina 1 Jun 2013 #29
bravenak Jun 2013 #13
Bonobo Jun 2013 #21
sabrina 1 Jun 2013 #30
Summer Hathaway Jun 2013 #33
DFW Jun 2013 #35
Democracyinkind Jun 2013 #38
DFW Jun 2013 #43
Douglas Carpenter Jun 2013 #39
emma7 Jun 2013 #40
kentuck Jun 2013 #45
Waiting For Everyman Jun 2013 #46
Please login to view edit histories.