ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Technology»
  • Internet & the Web

Data Exhaust

Updated on May 7, 2017

Authoritarian Surveillance State

Not simply gathering data, but using it in order to facilitate propaganda on its own citizens

Excerpt from the article 'The great British Brexit robbery: how our democracy was hijacked',

"It is psychological warfare coupled with data-mining that covertly subverts democracy via an authoritarian surveillance state by " ... capturing citizens’ browsing history en masse, recording phone conversations and applying natural language processing to the recorded voice data in order to utilize micro-targeting [individualized political messages], that trigger emotional responses for each individual voter."

According to FBI - you could be a terrorist if you are any of the following; being young, use social media or NOT having a Facebook account - that accounts for everybody.  Also blogging, protesting, stocking up on food and value privacy.
According to FBI - you could be a terrorist if you are any of the following; being young, use social media or NOT having a Facebook account - that accounts for everybody. Also blogging, protesting, stocking up on food and value privacy. | Source


Crime Reduction Utilizing Statistical History is the Memphis Police Department's big data statistical analysis program that relies on demographics, behaviors and the data exhaust that people leave behind in their daily activities. BlueCRUSH is one of many predictive policing programs that give probabilities of future crimes.

Roanoke, Virgina used the RACJIN, Roanoke Area Criminal Justice Information Network data analytics.

The Spokane Police Department in Washington state uses big data collection that records all online chat records is another way that predictive crime prevention practices is being used to monitor the general public in order to prevent future crimes with targeted surveillance of individuals or neighborhood at certain peak times of probabilities.

Crime-fighting analytics using real time datafication of multiple and disparate sources is promoted by the police who deem that increased public safety trumps individuals' privacy concerns.

Unanonymized data can determine a person's identity with 75% to 99% accuracy.

The dark side of this is that police states can now pre-crush protests and legal social dissent that government may deem as far too destabilizing the status quo of social order as was seen during the Arab Spring. The emerging technology of massive data mining in these police predictive policing programs and the problems of potential abuse of information has entered the mainstream consciousness with the movie, 'Minority Report' and has historically led to disastrous outcomes such as when Robert Strange McNamara, systems analyst and defense secretary during the Vietnam war who depended on falsified body counts as a measure of winning the war.


How Sudan used the Internet to crush protest movement, Alan Boswell 4.2011
Law enforcement using analytical tools to predict crime, Kevin McCaney 12.2010
Study Shows Anonymous Data Isn't Very Anonymous At All, Mike Masnick 3.2009

Boston Marathon Bombing

The FBI collected 10 terabytes of data on the Boston Marathon on April 15, 2013 within 72 hours of the terrorist attack and gather the big data in part by appealing to the public to crowdsource as many Boston Marathon 2013 photos and videos as possible at the r/findbostonbombers Reddit Boston Marathon section. Crowd sourced surveillance from different angle shoots over time to be used by the FBI in video analysis and facial recognition.

On big data, the Boston Marathon and civil liberties Derrick Harris April 2013
Bomb Suspect Images And Big Data Tech Combined Would Be A Better Search, Patrick Frye April 2013

Related HUB: FBI Boston Marathon - FUBAR?

False Flag? Or Deep Fried Conspiracy?

[FBI] "knew what he was doing on Skype ... every step of the way ...they were controlling him, they were controlling his every step...and now they say that this is a terrorist act." - Zubeidat Tsarnaeva, the brothers' mother. 'They were set up, FBI followed them for years' RT 4/19

What do you think?

False Flag? Or Deep Fried Conspiracy?

See results

Mining the data exhaust: extracting behavior change evidence from text messages in Tanzania


Please Rate This Hub

5 out of 5 stars from 1 rating of quality of this article
Data Exhaust is the unstructured information or raw data that is a by-product of the online activities of Internet user
Data Exhaust is the unstructured information or raw data that is a by-product of the online activities of Internet user | Source

You've Been Googled!

You have been datafied, aggregated, unanonymised and probabilistically predicted. Has your recombinant data fingerprinted your as a terrorist as outlined by the FBI? Just because you're paranoid doesn't mean they aren't following you.

The FBI Drowning In Counter-Terrorism Money, Power and Other Resources – Will Apply The Term “Terrorism” To Any Group It Dislikes And Wants To Control And Suppress, WashingtonsBlog 12.2012

Minority Report Free Will

State of Emergency

Under a state of emergency in order to inhibit protesters' organizations to develop via Facebook and other social media, anti-terror laws can be use to stifle legal dissent by targeting, arresting and politically disabling peaceful American citizens.

"A State of Emergency gives military courts the power to try civilians .... and prevent democratic opposition from gaining popularity" - Martial Law wiki

"Google knows how often they clicked on a link but then returned to the search page unimpressed with what they found, only to search again. It knows whether they clicked on the eighth link on the first page or the first link on the eighth page or if they abandoned the search altogether ... If many users tend to click on to a search result at the bottom of the results page, this suggests it's more relevant than those above it, and Google's ranking algorithm knows to automatically place it higher up on the page in subsequent searches." - - page 113/114 - Big Data: A Revolution That Will Transform How We Live, Work, and Think, Viktor Mayer-Schonberger, Kenneth Cukier

According to FBI profiling, the mere act of writing this article may make me become under suspicion because of the other articles I wrote about GMO's and conspiracy theories.

Become a Hubber! & write online for money now!

I've been targeted.

For what reason I know not - for I am a law abiding citizen, I was targeted in Honolulu Hawaii and used as a training puppet without my permission during a international police convention.

Since I did not know why - I came to the conclusion that either these people were the most inept stake-out team and needed the training very badly or that they purposely made the staking overt to emotionally unbalance me for fun.

I tried to make a game of it like in the movie 'The French Connection' when the Frog kept trying to lose Popeye Doyle who was tailing him but I was a nobody and didn't understand why they were wasting resources on me when there is a whole bunch of bad guys out there that should be followed and scrutinized closely.

I felt disappointed in my own government that actionable information was probably based on homeless crack addicts lying to get the next fix and worried that our country is going down the wrong path.

If you ever felt that you were being observed by the police then please comment about it. I know from personal experience that it is very hard to talk about to friends or family for fear of appearing mentally paranoid and dismissed as inane.

Poll for Law-Abiding Citizens

Ever Felt That You were Under Police Surveillance For No Reason?

See results

Terrorist Identities Datamart Environment TIDE - Total Information Awareness TIA - Ragtime RT - Threat and Local Observation Notice TALON - Analysis, Dissem

The following may get ANYBODY labeled as a “suspected terrorist” today: valuing online privacy, being Christian, reverent of individual liberty, a belief that one’s personal and/or national “way of life” is under attack, Oppose GMO's
The following may get ANYBODY labeled as a “suspected terrorist” today: valuing online privacy, being Christian, reverent of individual liberty, a belief that one’s personal and/or national “way of life” is under attack, Oppose GMO's | Source

4/24/2013 Update

"The technology came up empty even though both Tsarnaevs’ images exist in official databases: Dzhokhar had a Massachusetts driver’s license; the brothers had legally immigrated; and Tamerlan had been the subject of some FBI investigation,” - Boston police chief: facial recognition tech didn’t help find bombing suspects, Ars Technica 4/22/2013

"Though started with noble intentions, some of the activity on Reddit fuelled online witch hunts and dangerous speculation which spiralled into very negative consequences for innocent parties." - Reddit apologises for online Boston 'witch hunt', BBC 4/23/2013

"The New Statesman went as far as to call it a "racist Where's Wally", with the suggestion that there was emphasis on pointing out non-whites among the crowds." - Boston bombing: How internet detectives got it very wrong, Dave Lee 4/19/2013

"Never did the feds place Tsarnaev under surveillance or press to get evidentiary support for an eavesdropping warrant" - "Did the FBI miss clues about Boston Marathon bomber Tamerlan Tsarnaev? New York Daily News 4/24/2013

"Just moments before the bombs went off, around 4 hours into Monday’s Boston Marathon for instance, officials could be heard over the loud-speakers telling everyone to 'remain calm, this is only an exercise.'" - Another official drill goes live after Texas fertilizer plant explosion, Jeffrey Phelps 4/18/2013

RELATED: FBI Boston Marathon - FUBAR?

Completely inept police or is there more to it?

"In the private sector, intelligence and big data processing are hyped to be the answer to most problems. The reality in government (and in fact, in the private sector) is that the data is never as well aggregated, indexed or accessible for correlation as one might think -- certainly most of the work done in the hours after the bombing could have been assisted by a range of expensive technology -- that's the subject of another article." - Boston bombings was not about failed intelligence, Nick Selby 4/24/2013

Edward Snowden
Edward Snowden

Update 6.10.2013

.. any analyst at any time can target anyone … I, sitting at my desk, certainly have the authorities to wiretap anyone — from you or your accountant, to a federal judge, to even the President. .... I can get your emails, passwords, phone records, credit cards” - Edward Snowden

Update 6.24.2013

Woodrow Wilson enacted the espionage act in 1915 to criminalize dissent against WW1 and 10 people have been charged, seven under the Obama’s administration used against whistles blowers who pulled back the curtain of doublespeak that obscures transparency.

"The word treason has been batted around in recent days... We need to ask who has betrayed who?" - Ricardo Patino

Update 6.16.2013

The National Security Agency (NSA) in 2012 scrutinized fewer than 300 phone numbers according to recently declassified paper released by the Senate Intelligence Committee.

My question: if so limited, then how does that make sense with the statement that "dozens of potential terrorist plots here in the homeland and in more than 20 countries around the world" have been disrupted. Disrupted, not thwarted.

I may have been a victim of unauthorized action

"Thousands of unintended unauthorized collection, storage, access to or distribution of legally protected communications" the Post reported.

In my Hub, Adopting a Problem Dog Diary, The former owners both live and work in the U.S. Army Intelligence Center Fort Huachuca under the command of the United States Army Installation Management Command located in Sierra Vista.

At that time I had no exchange of information from the husband who gave me the Parson Jack Russell. After the dog bit me, I gave it to the Sierra Vista Nancy J. Brua Animal Care and then called the wife. The woman, whom I never met went off the hook with multiple disturbing texts that continued while I drove home the 3 miles from the shelter.

Talking the the hysterical woman on speaker phone with my friend who was a vet who trained at Fort Huachuca, she made a reference to my age implying that I was too old for the dog.

How did she get that information? The license plate from my Kia Sportage was noted when the dog was given to me and then via the Arizona Department of Motor Vehicle, my birth date and address information was taken for purely personal reasons. This woman could have stalked me. She was literally insane with rage that I took the dog given to me to the canine shelter. That's why I had the conversation on speaker phone so that my friend Wojo could hear as a witness because it was a bit scary at the time a women I never met going mentally unstrung over a dog her husband gave to me.

This is exactly the kind of abuse that people are concerned about, private information obtained with malicious personal intentions such as stalking, vandalism or worse.

Online tracking gets more accurate and harder to evade.

"Cross-browser fingerprinting is only the latest trick developers have come up with to track people who visit their sites. " -



Submit a Comment

No comments yet.