<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>THING2THING &#187; Big Data</title>
	<atom:link href="http://thing2thing.com/?feed=rss2&#038;tag=big-data" rel="self" type="application/rss+xml" />
	<link>http://thing2thing.com</link>
	<description>A History of Wikileaks</description>
	<lastBuildDate>Sat, 25 Apr 2026 04:33:14 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0.3</generator>
		<item>
		<title>TRUMP, BREXIT &amp; CAMBRIDGE ANALYTICA &#8211; What is the real problem?</title>
		<link>http://thing2thing.com/?p=5407</link>
		<comments>http://thing2thing.com/?p=5407#comments</comments>
		<pubDate>Sat, 18 Nov 2017 17:45:55 +0000</pubDate>
		<dc:creator>CaTⓋ</dc:creator>
				<category><![CDATA[ACADEMIC]]></category>
		<category><![CDATA[ANONYMOUS]]></category>
		<category><![CDATA[EDITORIAL]]></category>
		<category><![CDATA[NEWS]]></category>
		<category><![CDATA[AggregateIQ]]></category>
		<category><![CDATA[AIQ]]></category>
		<category><![CDATA[Behavioural Micro-Targeting]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Brexit]]></category>
		<category><![CDATA[Cambridge Analytic]]></category>
		<category><![CDATA[Hillary Clinton]]></category>
		<category><![CDATA[John Pilger]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Lawrence Lessig]]></category>
		<category><![CDATA[Psychometrics]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[Wikileaks]]></category>

		<guid isPermaLink="false">http://thing2thing.com/?p=5407</guid>
		<description><![CDATA[Speaking at a Sydney 'Politics in the Pub' event last month, Cathy Vogan, founder of THING2THING.COM and author of 'The Wikileaks Tapes', offered a comprehensive view of how the use of behavioural micro-targeting, big data and psychometrics by Cambridge Analytica got Donald Trump elected, and led to a vote for Brexit. This is an update of that talk. <a class="more-link" href="http://thing2thing.com/?p=5407">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<div id="attachment_5411" class="wp-caption aligncenter" style="width: 660px"><a href="http://politicsinthepub.org.au"><img src="http://thing2thing.com/wp-content/uploads/CATHY-TRUMP650.jpg" alt="" title="CATHY-TRUMP" width="650" height="366" class="size-full wp-image-5411" />
<parent="blank"></a><p class="wp-caption-text">Cambridge Analytica: how big data-assisted behavioural micro-targeting facilitated the Trump &#038; Brexit victories</p></div><br />

<p>
<i>Speaking at a Sydney <span style colour="F10000"><a href="http://politicsinthepub.org.au/"><strong>event</strong></a></span> last month, Cathy Vogan, founder of <strong><span style colour="f10000"><a href="http://thing2thing.com/?page_id=83">thing2thing.com</a></span></strong> and author of <strong><span style colour="F10000"><a href="http://thing2thing.com/?page_id=2834">&#8216;The Wikileaks Tapes&#8217;,</a></span></strong> offered a comprehensive view of how the use of behavioural micro-targeting, big data and psychometrics by Cambridge Analytica got Donald Trump elected and led to a vote for Brexit.</i></p>
<p><iframe src="https://www.facebook.com/plugins/video.php?href=https%3A%2F%2Fwww.facebook.com%2Fcathy.vogan%2Fvideos%2F10154867030125894%2F&#038;show_text=0&#038;width=650" width="650" height="366" style="border:none;overflow:hidden" scrolling="no" frameborder="0" allowTransparency="true" allowFullScreen="true"></iframe></p>
<p>Vogan opened by addressing some of the claims made by Hillary Clinton in a 2017 interview on Australia&#8217;s ABC TV, giving Julian Assange the <span style colour="f10000"><a href="https://www.youtube.com/watch?v=SAW7wGCPbj8"><strong>right of response </strong></a></span>to Clinton&#8217;s question: <em>&#8220;Why doesn&#8217;t Wikileaks ever publish anything about Russia?&#8221;.</em> Assange&#8217;s answer was: <em>&#8220;Wikileaks has published over 800,000 documents about Russia, most of them critical&#8221;.</em> The ABC journalist had left the question hanging in the air. </p>
<p>Clinton suggested that Wikileaks had been involved in the spread of <em>&#8220;awful stories&#8230; the worst of which was &#8216;Pizzagate&#8217;&#8221;. </em>Vogan cross-cut to John Pilger and Assange discussing the content of the Podesta emails: weapons deals that ended in arming ISIS, pay-for-play with dictators via the Clinton Foundation and the death of tens of thousands of Lybians, which she suggested would help her presidential campaign.</p>
<p>Vogan&#8217;s take on the 2016 US elections would not involve Russians or Wikileaks, but perception management by what Slavoj Žižek refers to as a &#8220;cognitive-industrial-complex.</p>
<p><img src="http://thing2thing.com/wp-content/uploads/Cathy-Max650.jpg" alt="" title="Cathy Vogan &amp; Max Kaye - Politics in the Pub, Sydney" width="650" height="366" class="aligncenter size-full wp-image-5450" /></p>
<p>There were claims by Micah Lee in <strong><span style colour="f10000"><a href="https://theintercept.com/2017/11/15/wikileaks-julian-assange-donald-trump-jr-hillary-clinton/">&#8216;The Intercept&#8217;</a> </span></strong> of a &#8216;Nazi-Soviet Pact&#8217; moment between Assange and the Trump campaign. When Trump Jr made his Twitter communications public, it appeared someone with access to the Wikileaks Twitter handle had communicated with him. Lee, assuming for us that it was the editor-in-chief, wrote:</p>
<h2><i>&#8220;An organisation with a sterling reputation for providing the public with accurate information about secret government and corporate activities was used to launder conspiracy theories that helped elect a racist, sexual predator president of the United States.&#8221;</i></h2>
<p>Vogan&#8217;s exposé on Cambridge Analytica concluded on a similar note. An audience member at their show in Germany pointed out to the CEO, Alexander Nix, that there is no glory in assisting a <i><strong>&#8220;misogynist buffoon into power&#8230; who is fucking up our lives&#8221;</strong></i> [audience cheers].  </p>
<p>There was no mention of Pizzagate in the Trump Jr DMs, but the Intercept amplified the accusation Clinton made on ABC Australia, that Wikileaks&#8217; co-orchestrated the spread of <i><strong>&#8220;preposterous conspiracy theories&#8221;.</strong></i> Lee&#8217;s article proved more effective than the Russian narrative in deflecting attention away from the content of Podesta&#8217;s emails, since it damaged trust in the organisation, rendered supporters vulnerable to propaganda and turned some into enemies.
<p></p>
<p><div id="attachment_5452" class="wp-caption aligncenter" style="width: 660px"><img src="http://thing2thing.com/wp-content/uploads/Cathy-E-Embassy650.jpg" alt="" title="He said no, he forgets and I'm saying nothing..." width="650" height="366" class="size-full wp-image-5452" /><p class="wp-caption-text">He said no, he forgets and I'm saying nothing...</p></div><br />
<br />
Lee noted, by way of remarkable omission:</p>
<h2><i>&#8220;the hacked emails were used to reverse-engineer preposterous conspiracy theories, like the imaginary pedophilia scandal called Pizzagate&#8221;</i></h2>
<p>Hacked means extracted via the internet. Former NSA technical director, William Binney, and his team from Veteran Intelligence Professionals for Sanity (VIPS) have interpreted the forensic evidence available. They reported that the rate of transfer of the data could only have been on to a USB stick. That suggested the files were copied in-house, not hacked. Ignoring conflicting evidence, Lee adhered to the DNC&#8217;s hacking narrative and Clinton&#8217;s claim that there was nothing incriminating in the Podesta emails. He also aroused suspicion of ulterior motive behind their release, the editor-in-chief&#8217;s alleged partisan allegiance. </p>
<p>The idea of the truth-teller in league with a serial liar was too much for some to assimilate with their values and those of the Wikileaks-inspired transparency movement.  In the eyes of many Wikileaks supporters, political chicanery and opportunism was perceived in the (alleged) machiavellian tactics employed by Assange in his support for Trump&#8217;s ascendency to the White House. It was sadly reminiscent for them of the cynical act of betrayal in Stalin&#8217;s signing of the Nazi-Soviet pact (&#8220;The Devil&#8217;s Alliance&#8221;) in 1939, which had a demoralising effect and also broke up the &#8220;movement&#8221; of anti-fascist Popular Fronts. </p>
<p>Barrett Brown, one of Wikileaks most heroic and prominent allies, who went to jail for 4 years for co-ordinating the supply of material to Wikileaks, compared their communications with the Trump campaign advisor, to those that preceded the taking over of Poland. He was done with the movement; but there were still people saying: <span style colour="f10000"><strong><a href="https://medium.com/@caityjohnstone/everyone-should-do-what-wikileaks-did-88486b72b409">&#8220;Why Everyone Should Do What WikiLeaks Did&#8221;</a></span></strong>, offering a broader perspective on the organisation&#8217;s activities and a different angle on the Trump Jr DMs.</p>
<p>The Intercept had made a point about Wikileaks &#8216;sleeping with dogs&#8217;, and damaging their support base, but none of this pointed to Russia, or towards the real problem of &#8216;What Happened&#8217; to two democracies. Oxford &#038; Washington university studies do; Tim Berners Lee does; and so do pending legal proceedings against Cambridge Analytica.</p>
<p>In the longer term, it may not be about who&#8217;s supporting whom; or financial corruption; or excess spending &#8211; as the current thrusts of Transatlantic political and legal enquiry would suggest. Money issues are simply the most viable way in at the moment. But the <span style colour="f10000"><strong><a href="https://www.theguardian.com/politics/2017/nov/20/electoral-commission-launches-inquiry-into-leave-campaign-funding#img-1">freshly-launched</a></span></strong> British Electoral Commission enquiry, into excessive Leave EU campaign spending and collaboration between multiple campaigns, can at best, only point to everyone spending their money in the same shop. <hi>They are not tackling the more serious problem of what that shop is selling.</h1>
<p>The case of <strong><span style colour="F10000"><a href="https://www.theguardian.com/technology/2017/oct/01/cambridge-analytica-big-data-facebook-trump-voters">Professor David Caroll vs Cambridge Analytica</a></span></strong> takes us much closer to the heart of the problem that &#8216;we the people&#8217; now have. It concerns an individual&#8217;s privacy, and promises to be a landmark case, if sufficiently funded.</p>
<p><div id="attachment_5509" class="wp-caption aligncenter" style="width: 660px"><a href="https://www.theguardian.com/technology/2017/mar/11/tim-berners-lee-online-political-advertising-regulation"><img src="http://thing2thing.com/wp-content/uploads/CA-lawsuit4-650.jpg" alt="" title="Professor David Carroll vs Cambridge Analytica (via SCL parent company)" width="650" height="366" class="size-full wp-image-5509" /></a><p class="wp-caption-text">Professor David Carroll vs Cambridge Analytica (via SCL parent company)</p></div>
<p><span style colour="000000">.</span><br />
Sir Tim Berners Lee, inventor of the world wide web, is <strong><span style colour="F10000"><a href="https://www.theguardian.com/technology/2017/nov/15/tim-berners-lee-world-wide-web-net-neutrality">worried</a></span></strong> that the democratic platform he gifted humanity with is failing. He lashes out at Facebook &#038; Twitter for facilitating the spread of misinformation and condemns the trafficking of &#8220;weaponised AI propaganda&#8221;. The term comes from Berit Anderson&#8217;s &#8220;The Rise of Weaponised AI Propaganda&#8217;, which Vogan cites in her exposé of Cambridge Analytica:</p>
<h2><i>“By leveraging automated emotional manipulation alongside swarms of bots, Facebook dark posts, A/B testing, and fake news networks, a company called Cambridge Analytica has activated an invisible machine that preys on the personalities of individual voters to create large shifts in public opinion. Many of these technologies have been used individually to some effect before, but together they make up a nearly impenetrable voter manipulation machine that is quickly becoming the new deciding factor in elections around the world.&#8221;</i></h2>
<p>The use of armies of bots has been proven, <strong><span style colour="F10000"><a href="http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/06/Comprop-USA.pdf">by Oxford University researchers into computational propaganda,</a></span></strong> to have had a profound effect in setting the agenda for political debate during the 2016 US Presidential campaign. In fact it &#8220;throttled out&#8221; the voice of humans and gave such a false sense of source diversity and consensus, they largely followed its lead. Of particular interest in that study, is that the technology is open to anyone. There was a chain reaction to the bots among ordinary citizens. </p>
<h2><i>&#8220;&#8230; democratisation of online propaganda is also an especially salient issue. While government departments, academics, and journalists continue to search for evidence that campaigns used these means to manipulate public opinion, they tend to ignore the fact that anyone can launch a bot or spread fake news online. <strong>It was these citizen-built bots that probably accounted for the largest spread of propaganda, false information, and political attacks during the 2016 election.&#8221; </strong></h2>
<p></i></p>
<p>Indeed the &#8216;hive-mind&#8217; has become The Wild West, and The Law has not yet ridden into town. The Oxford study revealed more inter-connectedness between the Trump campaign and its citizen-generated bot networks, than with those associated with the Clinton campaign. Maybe that was because so many DNC supporters preferred to &#8220;Feel the Bern&#8221;, and the party was divided &#8211; or maybe they were more scrupulous. The study shows, in any case, that citizen recruitment in the spread of false information and propaganda is the principle catalyst for political chaos in the UK and the US. </p>
<p>A foreign power, and Wikileaks, may or may not have influenced the outcomes of the US elections, but domestic armies of bots and bot-meisters did much more so. To focus so much on foreign influence, we risk to assume that anything local is fair game, even when technology is used by Everyman to disinform and persuade. Theoretically, we can all play, but it is no longer an even playing field when humans are being driven or drowned out by armies of propaganda bots. Tim Berners Lee also believes that highly-funded dark political messaging threatens democracy and net neutrality:</p>
<h2><i>&#8220;We have these dark ads that target and manipulate me and then vanish because I can’t bookmark them. This is not democracy – this is putting who gets selected into the hands of the most manipulative companies out there,” </h2>
<p></i></p>
<p><img src="http://thing2thing.com/wp-content/uploads/Cathy-Dark-Ads650.jpg" alt="" title="Cathy Vogan - Dark-Ads-Here - Cambridge Analytica exposé" width="1920" height="1080" class="aligncenter size-full wp-image-5476" /></p>
<p>Cambridge Analytica boasts the use of &#8216;dark strategy&#8217; for the Trump campaign &#8211; that practice of dividing the political offer on the basis of information obtained about the target&#8217;s personality type. On their advice, the Leave EU campaigns did the same, sending a billion psychologically tailored messages to the British public. Both were were focusing on those who were undecided about their vote, and thus &#8216;persuadable&#8217;. </p>
<p>The Russian troll influence has been exposed in the US, via targeted social media advertising &#8211; for a very nominal sum of money. Their targeting techniques are being exposed as shocking, but as if they apply uniquely within the Russian context. The elephant in the room is that the Trump and Brexit campaigns spent millions using the same techniques! Figure it out. Is it not our own back yards that been occupied, and that are sorely in need weeding? </p>
<div id="attachment_5477" class="wp-caption aligncenter" style="width: 660px"><img src="http://thing2thing.com/wp-content/uploads/Dark-Strategy650.jpg" alt="" title="Dark Strategy on Facebook - the dividing of the political offer" width="650" height="366" class="size-full wp-image-5477" /><p class="wp-caption-text">Dark Strategy on Facebook - the dividing of the political offer</p></div>
<p>Considering that the company who persuaded impressionable people to vote Trump and Leave EU, themselves claim to have a 25 year record of performing similar psychological operations on populations for governments around the world, I suggest that &#8216;What Happened&#8217; in the US and UK is more akin to a military coup, primarily funded by the playful and principled western oligarch &#8211; Robert Mercer, and that his &#8216;MI6 for Hire&#8217; people at SCL need to be stopped, before they break any more democracies. </p>
<p>What we should be examining is the abuse of power, in locating and propagandising impressionable people, and those who could be identified as ignorant of politics. This would have made targets of the BeLeave campaign, who were very young, especially vulnerable to manipulation.</p>
<p>One is suddenly reminded of Assange&#8217;s words in 2013, during his Australian Wikileaks Party campaign speech:  </p>
<h2><i>&#8220;When all of the communications &#8211; heart-felt &#8211; the inner core of our life &#8211; communications between boyfriends and girlfriends &#8211; between husbands and wives, sons and daughters &#8211; between business partners &#8211; even between bureaucracies and states &#8211; when all of those communications are swept up, hoovered up, into a vast collection apparatus &#8211; indexed and stored for all time &#8211; available only to a select few &#8211; then we are in a situation where we have a tank on the street of the inner core of our lives &#8211; a soldier under the bed, listening&#8230;&#8221;</h2>
<p></i></p>
<p>It&#8217;s not sure Assange anticipated what the &#8220;select few&#8221; would say back to the masses, after the indexing of that vast collection was complete. He knows now.</p>
]]></content:encoded>
			<wfw:commentRss>http://thing2thing.com/?feed=rss2&amp;p=5407</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Palantir Technologies &#8211; The Philosopher&#8217;s Stoned</title>
		<link>http://thing2thing.com/?p=4343</link>
		<comments>http://thing2thing.com/?p=4343#comments</comments>
		<pubDate>Mon, 05 May 2014 02:17:28 +0000</pubDate>
		<dc:creator>CaTⓋ</dc:creator>
				<category><![CDATA[ANONYMOUS]]></category>
		<category><![CDATA[EDITORIAL]]></category>
		<category><![CDATA[GEEK]]></category>
		<category><![CDATA[LIVING PROOF]]></category>
		<category><![CDATA[akaWACA]]></category>
		<category><![CDATA[Alex Karp]]></category>
		<category><![CDATA[Batphone]]></category>
		<category><![CDATA[Big Brother]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Canberra Peace Convergence]]></category>
		<category><![CDATA[Cathy Vogan]]></category>
		<category><![CDATA[Condoleezza Rice]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[George Tenet]]></category>
		<category><![CDATA[Glenn Greenwald]]></category>
		<category><![CDATA[HB Gary Federal]]></category>
		<category><![CDATA[KILLER APP]]></category>
		<category><![CDATA[Lord of the Rings]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Osama Bin Laden]]></category>
		<category><![CDATA[Palantir Technologies]]></category>
		<category><![CDATA[Peter Thiel]]></category>
		<category><![CDATA[PRISM]]></category>
		<category><![CDATA[spy tools]]></category>
		<category><![CDATA[wagepeace]]></category>
		<category><![CDATA[Wikileaks]]></category>
		<category><![CDATA[William Binney]]></category>

		<guid isPermaLink="false">http://thing2thing.com/?p=4343</guid>
		<description><![CDATA[Palantir Technologies, is a premium Silicon Valley start-up, whose business it's been to write clever software to track your digital footprints, and then JOIN THE DOTS to predict who you are, and where you might go next. Its directors are Peter Thiel, Mr Paypal-Facebook, and Alex Karp an “eccentric philosopher” who has turned their Palo Alto head-quarter into a replica of The Shire. If it sounds like a fairy story, it's not. Palantir's software has been labelled the KILLER APP. It was used to hunt down and murder Osama Bin Laden. <a class="more-link" href="http://thing2thing.com/?p=4343">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p><a href="http://thing2thing.com/wp-content/uploads/KarpGollum2.jpg"><img src="http://thing2thing.com/wp-content/uploads/KarpGollum2.jpg" alt="" title="KarpGollum2" width="650" height="921" class="alignleft size-full wp-image-4352" /></a><br />
The Palantíri were the Seeing-stones of Middle-earth, the fictional world of J.R. Tolkein in Lord of the Rings. According to legend, the Palantíri [singular Palantir] could only show visions or intended thoughts of the users. Their vision was not hampered by obstacles, but by darkness; they could see through things, but would only see shadow.</p>
<p>That may sound unreliable&#8230; but it sells! Welcome to Big Brother meets Big Data!</p>
<p>Palantir Technologies, is a premium Silicon Valley start-up, whose business it&#8217;s been to write clever software to track digital footprints, then &#8216;join the dots&#8217; to predict who you are and what you might do next. Its directors are Peter Thiel, the co-founder of Paypal and first outside investor in Facebook, and Alex Karp, an <strong><em><a href="https://www.theguardian.com/technology/2025/nov/18/fear-really-drives-him-is-alex-karp-of-palantir-the-worlds-scariest-ceo">“eccentric philosopher”</a></em></strong> (with a PhD in neoclassical social theory) who turned their Palo Alto* headquarters into a replica of The Shire from &#8216;Lord of the Rings&#8217;. If it sounds like a fairy story, it is not. Palantir&#8217;s software has been labelled the Killer App. It was allegedly used to hunt down and kill Osama Bin Laden.</p>
<p>* In 2020 Palantir moved its headquarters to Denver.</p>
<p>Palantir is &#8216;well in&#8217;. Its advisors are Condoleezza Rice and George Tenet (ex CIA). It was funded by the CIA, which became a client of Palantir back in 2004. Other government clients are the NSA, the FBI, the NYPD, and a number of counter terrorism and military agencies. </p>
<p>This baby has been valued at five to eight billion dollars and is predicting another billion in private sector deals in 2014. Forbes Magazine reports: </p>
<h3><strong><em><span style="color: #999999;">“Palantir is emerging from the shadow world of spies and special ops to take corporate America by storm. Private-sector deals now account for close to 60% of the company’s revenue.”</span></em></strong> </h3>
<p>The identities of corporate clients are usually kept secret, but they include J.P. Morgan, various hedge funds, News Corp and Bank of America &#8211; as some will recall from Palantir&#8217;s dealings with H.B Gary Federal in a thwarted plan to destroy Wikileaks and its media partner Glenn Greenwald, who instead went on to report on the disclosures of Edward Snowden. The plan may have succeeded, had not Aaron Barr, an employee of H.B. Gary bragged about and published a list of alleged members of Anonymous, which in reality was a list of artists, writers and musicians who had taken an interest in the movement. The injustice of this blunder unsurprisingly triggered a revenge attack on H.B. Gary&#8217;s servers from real hackers, who uncovered a Powerpoint file outlining the steps the partners would take to discredit Wikileaks and its associates.</p>
<p><a href="http://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/"><img src="http://thing2thing.com/wp-content/uploads/Palantir_HBGary1.png" alt="" title="Palantir_HBGary" width="650" height="565" class="alignleft size-full wp-image-4355" /></a></p>
<p>When Anonymous gained access to thousands of emails on H.B Gary&#8217;s servers, they found that Palantir had worked with HB Gary Federal to develop proposals for attacking WikiLeaks’ infrastructure, blackmailing its supporters and identifying donors. One idea was to submit false information to the organisation&#8217;s drop box, which would later be exposed as such. When the plot was exposed, Palantir put an engineer on leave, apologised for his role in the plan, and cut ties with HB Gary. After that they installed a &#8220;Batphone&#8221; in Karp&#8217;s office, allegedly to receive reports about <strong><em>&#8220;unethical clients&#8221;</em></strong>, and reinstated their engineer.</p>
<p><a href="http://thing2thing.com/wp-content/uploads/Karp_Batphone.jpg"><img src="http://thing2thing.com/wp-content/uploads/Karp_Batphone.jpg" alt="" title="Karp_Batphone" width="650" height="281" class="alignleft size-full wp-image-4356" /></a></p>
<p>One might ask at this stage if these people are elves or the Black Riders. </p>
<p>Palantir Technologies is a perhaps a pioneer in an upcoming consumer industry of selling private information for profit, and they are cheap as chips compared to Booz Allen, IBM and Lockheed Martin. But Forbes Magazine suggests Palantir restrict their services to the top end because some people won&#8217;t be happy if they go totally public. Quote: <strong><em>“It helps its customers see too much”.</em></strong></p>
<p>Really?  Alex Karp claims his <strong><em>“turn-key”</em></strong> service (as he calls it) helps the Government go after bad guys. Who those bad guys are he often doesn&#8217;t know or succeed in finding out. </p>
<h3><strong><em><span style="color: #999999;">“It&#8217;s tough”</em></strong>, he says, because his targets don&#8217;t leave behind any tangible evidence such as fingerprints or DNA.</span></em></h3>
<p>Whether they actually are bad guys he takes on faith from his Government or whichever client he is working for, and of course the Batphone. According to former employees, Palantir has sought work in Saudi Arabia despite the staff’s misgivings about human rights abuses in the kingdom, but Karp doesn&#8217;t seemed to have picked up on any calls about that issue.</p>
<p>In an interview on the Palantir website, Karp assures us that Palantir are the good guys and he showcases a high profile project where they chased the infiltrators of the Dalai Lama&#8217;s computer. He stumbles however when asked who it was and has to admit that it wasn&#8217;t really clear in the end whether it was a foreign government or teenagers. That&#8217;s a pretty wide margin of error.</p>
<p>Palantir&#8217;s so-called predictions hinge on assumptions and probabilities &#8211; no light, just shadow &#8211; and as it turns out, the <strong><em>“bad guys”</em></strong> are not always bad guys. Sometimes they&#8217;re activists; sometimes journalists. Karp loves to drop in the word <strong><em>“turn-key”</em></strong> when he&#8217;s selling his crystal ball kit. The irony he doesn&#8217;t see is that it is the perfect tool for turn-key totalitarianism. You put all of this surveillance into place and then someone, a new President or Prime Minister, flips the switch to tyranny.</p>
<p><iframe width="650" height="366" src="//www.youtube.com/embed/0LvKdoIbLh0" frameborder="0" allowfullscreen></iframe></p>
<p>Click. Suddenly the technology is not being used as intended. Click. Anti-war activists are raided by the FBI. Click. Refugee activists are threatened by the Department of Immigration and Border &#8216;Protection&#8217;. </p>
<p>Alex Karp claims to be an advocate for civil liberties. He assured a talk-show host that innocent people would not be <strong><em>“swept into the dragnet”</em></strong>; that the <strong><em>“patterns”</em></strong> his software detects only relate to the activities of terrorists. He says that the data Palantir supplies is <strong><em>“tagged”</em></strong> for one use only, giving the impression that his company has control over who sees what, or how the information will be used.</p>
<p>The US Justice Department&#8217;s Inspector General, in a series of reports on FBI practices found systematic disregard for the required procedures for demanding records. False statements in affidavits to telecommunications companies and the FISA Court; improper acquisition of journalists’ phone records; use of national security authorities in cases unrelated to national security; and attempts by superiors to retroactively conceal these improprieties. Speaking of patterns, a pattern of failure to report potential violations to the proper oversight board was also “noted”. </p>
<p>William Binney, a former NSA official, who led a team to develop ThinThread, the agency&#8217;s selective and effective pre-911 surveillance tool, resigned because he saw the whole thing spin out of control and his country turn into a police state. Binney baulked when he saw that NSA data was being used to prosecute petty crime, and not  many terrorists. Not many at all. Palantir&#8217;s director admits that real terrorists are apt to change their patterns and cut their ties as soon as anyone in their circle is arrested. Going after ordinary citizens, on the other hand, is a much more fruitful, easy and lucrative process.</p>
<p><a href="http://thing2thing.com/wp-content/uploads/Prism_collection_details650.jpg"><img src="http://thing2thing.com/wp-content/uploads/Prism_collection_details650.jpg" alt="" title="Prism_collection_details650" width="650" height="366" class="alignleft size-full wp-image-4363" /></a></p>
<p>FBI Director Robert Mueller argued that the entire body of phone records is <strong><em>“relevant to an investigation”</em></strong> because it plausibly contains records that will be relevant to some investigation at some point in time. Since these investigations were not only being used to pursue petty criminals but dissidents too, Binney realised that his Government&#8217;s actual use of data gathered through spying had become <strong><em>“a Totalitarian Process”</em></strong>. The American Civil Liberties Union describes Palantir as <strong><em>&#8220;a true totalitarian nightmare&#8221;.</em></strong></p>
<p>Julian Sanchez from the CATO Institute articulates a problem that possibly none of the hobbits from The Shire had foreseen:</p>
<h3><strong><em><span style="color: #999999;">“Such an architecture of surveillance, once established, would be difficult to dismantle and prove too potent a tool of control if it ever fell into the hands of people who — whether through panic, malice, or a misguided confidence in their own ability to secretly judge the public good — would seek to use it against us.&#8221;</span></em></strong></h3>
<p>Unscathed by the plot to destroy his career, Glenn Greenwald worked with Edward Snowden to reveal that this architecture is in place. Mass surveillance of all citizens, an unprecedented level of eavesdropping, with all the dirt ready if your name comes up, to prosecute you for any kind of crime or misdemeanour. And if you happen to be living in &#8216;The Lucky Country&#8217; of Australia you might already be getting into strife for criticising your Government, even if you use a pseudonym because you happen to work for it.</p>
<p><a href="http://thing2thing.com/wp-content/uploads/Silence_Act650.jpg"><img src="http://thing2thing.com/wp-content/uploads/Silence_Act650.jpg" alt="" title="Silence_Act650" width="650" height="597" class="alignleft size-full wp-image-4350" /></a><br />

<p>
<img src="http://thing2thing.com/wp-content/uploads/ScrollChapterEnd-200x301.jpg" alt="" title="ScrollChapterEnd-200x30" width="200" height="30" class="aligncenter size-full wp-image-5835" /></p>
<p>The more innocent citizens are spied upon and intimidated, if they get lippy, the more secretive Governments must become to get away with it. Besides an erosion of civil liberties that inevitably becomes unconstitutional, there&#8217;s another &#8216;technical&#8217; issue that makes the whole process dubious: </p>
<h2>Evidence stops being &#8216;forensic&#8217; when it&#8217;s only a digital footprint.</h2>
<p>Alex Karp admits that and one can only conclude that his company sells nothing but hunches, and that around these hunches his clients have cultivated a devout belief in the stoned philosopher&#8217;s Palantiri &#8211; and word has it he often is. A cloud of secrecy then prevents sceptics, lawyers and moralists from reality-checking the &#8216;vision&#8217;, and inducing them to assume that a well-paid, well-protected job is being well done. Copies of NSA documents are not even allowed to be passed on for analysis by another Palantir client, the NYPD. And thus, the circle of trust is hermetically sealed, around an irrational, self-serving seat of power that is frightened of our own shadows.</p>
<h2>Peter Jackson should make a film about that!</h2>
<div id="attachment_4364" class="wp-caption alignleft" style="width: 660px"><a href="http://thing2thing.com/wp-content/uploads/Prism_underpants2.png"><img src="http://thing2thing.com/wp-content/uploads/Prism_underpants2.png" alt="" title="Prism_underpants2" width="650" height="688" class="size-full wp-image-4364" /></a><p class="wp-caption-text">Sydney PRISM-BREAK protest - Photo Jarek Gasiorek</p></div>
]]></content:encoded>
			<wfw:commentRss>http://thing2thing.com/?feed=rss2&amp;p=4343</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
