The Future of Public Data Reception

download The Future of Public Data Reception

of 7

Transcript of The Future of Public Data Reception

  • 8/13/2019 The Future of Public Data Reception

    1/7

    1

    Newsletter Title

    Caption describing picture or

    graphic.

    THE FUTURE OF PUBLIC DATA RECEPTION

    INTRODUCTION

    From William E Justin

    Jan 28, 2014

    1-INTRODUCTION

    2-7 PROPERTIES OF

    FUTURE PUBLIC

    DATA RECEPTION

    4-SEALING OFF THE

    CRIMINALS & PROTECT-

    ING THE PRIVACY

    RIGHTS OF YOU & YOUR

    PIZZAMAN

    6-THE DETRACTORS

    7-RANDOMANONYMOUSPUBLIC MONITORING

    OF ITSELF

    WEJ7 ACRROSS THE WEB

    https://sites.google.com/site/wej7ac

    crosstheweb/widget-3/home

    Both Government and Big Business receive all sorts of data

    from us. Theres no reason to make a list of that here. Werepainfully aware of their needs. The NSA for example, feels it

    needs to know everything about everything. Companies such as

    Google would love to know as much about us as was feasible in

    order to maximize their profit needs. Wall Street, The Entertain-

    ment Industrial Complex, Big Pharma, The oil industrythe more

    of our personal data they can get their hands on, the more they can

    develop psychological grooming patterns that snare and bind us

    to their desires.

    The public goes along with much of this for two reasons. The first

    is that it makes sense to do so. People dont want to go around

    with a cart holding all of the data they need to supply to Govern-

    ment and business. The second is they have no choicethey must give up some data or suffer theloss of assets or a potential asset loosely termed service.

    The problem of how our data is exploited and kept to be exploitedalong with Environmental Is-

    sues, Crime Issues, and issues of the Saturation of Media and Advertizing constantly being shoved

    into our eyes, ears, and brainsis itselfcentral in our politics and public discourse. We can bow down

    or even choose to opt out sometimesbut without great expenditures of time and energy, we mostly

    go along. The static, manipulative depiction brought forth by the Fascist social controller is: its

    always been this way, always will be, you can do nothing about it, so conform to existing social order if you know whats

    good for you.

    The digital age has stymied this social order and is rapidly changing outcomes at every level. The

    Future of Public Data Reception promises to align itself much more with the Democratic Ideals of

    the public, and much less with the Fascist ideals of a weakening, psychologically deformed elite.

    When once it required a days ride in the buggy to search for public records, today it can be done as

    quickly as a pot of coffee is brewed. At least for those who know how. And as time accelerates,

    more and more of this know-how is being infused deep into the masses. Make no mistake about it,

    the Fascist Elite are under siege from all corners.

    Two of the startling episodes of recent times has been the ease in which elite data has been drawn

    from the US Military and State Departments and dispersed like a bowel of candy taken from babies

    and given to the public. Some of the dataperhaps even proving elite criminal behavior and conduct

    rising to the status of War Crimeshas no doubt already been shipped off to world courts for legal

    actions and historical storage and clarification.

    The future of public data reception promises further forays into the financial sector dealings of

    SECTIONS:

    DEMOCRACY

    OR INSIDER

    FACSCIM?

    CAN ANY PUBLIC BLOCK-

    AGE OR DELAY

    BE ALLOWED OUTSIDE OF

    GIVINGVALID

    SUSPECTED CRIMINAL

    ENEMIES EQUAL ACCESS

    TO DATA?

  • 8/13/2019 The Future of Public Data Reception

    2/7

    2

    THE FUTURE OF PUBLIC DATA RECEPTIONINTRODUCTIONTHE SEVEN PRIMARY PROPERTIES

    From William E Justin

    Jan 28, 2014

    WEJ7 ACRROSS THE WEB

    https://sites.google.com/site/wej7ac

    crosstheweb/widget-3/home

    Fascist Elitism as well. Swine will be more difficult than ever to

    disguise with face make-up and perfume. Eventually, the public

    may fully sicken of the values of corruption and, powerfully, in-

    sist on higher standards of leadership.

    SEVEN PROPERIES OF FUTURE PUBLIC DATA

    RECEPTION

    All public data belongs to the public. It may be gathered by Government and Big Business but it

    is owned as a whole by all citizens to the same degree as the coastlines and claimed oceanic spaces

    surrounding our country are. Individuals and companies cant just show up on this preserve and do

    as they please. Google may scoop up your images during web crawling and place them for dissemina-tion, but they certainly dont own those pictures which can be ordered taken off their lists. And if

    your picture appears on a can of some new money-making product called ISoup, the corporation can

    be made to pay or even be criminally charged if you were not included in the loop. Your medical

    history is something that is held in even sticker regard. The Public owns all of its dataand both the

    government and the corporations must be extremely careful how they handle this.

    Reception of Public Data is presorted by various criteria. Some of the various categories in

    which data is presorted as it arrives, are fairly obvious. Health data goes into the health bin for

    instance. Health, real estate ownership, family linkagethese are parts of the horizontal spread of

    the pre-sorting of Public Data. There is also an obvious vertical sectioning in the pre-sorting. Time

    and Location for instance. There are as many sections available as you can think up. Pre-sorting of

    the incoming data is essential for the 3rd Property of Public Data Reception.

    Lucid Publishing of Public Data Reception. It is meant to enhance the public as a whole. What

    other reason would anybody bother to collect it in the first place? Lucid Publishing of our data be-

    comes nuanced. Security for the public as a wholemeans that certain data is time delayed. The times

    and places of police raids for instance should not appear in real time. That would not enhance the public

    as a wholebut accomplish the opposite.

    Privately used Public Data by individuals and companies for money-making schemes--splits away

    from Lucid Publishing at this point. In the past this occurred because it did not make sense for gov-

    ernment to mail out and deliver all of the data to all of the people. With digital reception and housing

    of data, the government is forced to provide all data for as close to free as is reasonable in order to

    SECTIONS:

    DEMOCRACY

    OR INSIDER

    FACSCIM?

    CAN ANY PRIVATE

    COMPANIES

    BE ALLOWED TO

    TAKE PERSONAL

    OWNERSHIP RIGHTS

    OF OUR DATA

    WITHOUTCONSENT

    OR NEGOTIATED

    COMPENSATION?

    1-INTRODUCTION

    2-7 PROPERTIES OF

    FUTURE PUBLIC

    DATA RECEPTION

    4-SEALING OFF THE

    CRIMINALS & PROTECT-

    ING THE PRIVACY

    RIGHTS OF YOU & YOURPIZZAMAN

    6-THE DETRACTORS

    7-RANDOMANONYMOUSPUBLIC MONITORING

    OF ITSELF

  • 8/13/2019 The Future of Public Data Reception

    3/7

    3

    Newsletter Title

    THE FUTURE OF PUBLIC DATA RECEPTIONTHE SEVEN PRIMARY PROPERTIES

    From William E Justin

    Jan 28, 2014

    SECTIONS:

    WEJ7 ACRROSS THE WEB

    https://sites.google.com/site/wej7ac

    crosstheweb/widget-3/home

    inform the public as a whole. Fascist Elitismbe it lodged in govern-

    ment bureaucracy or private sector contractors cannot be al-lowed any advantagein this regard. It doesnt make sense when

    publishing the data in a modern digital world is as easy as ringing

    the old dinner bell or making a local phone call. Individuals that

    attempt to get between the public as a wholeand Its Data, convolute

    the value of it in favor of insiders and should be rounded up and

    subjected to penal retaliation (fines based on value factors; jail

    based on the damages to thepublic as a whole).

    Data Mining is at the heart of the primary seven properties.

    It is well-known that the swellof incoming public data makes it

    harder and harder to work with. Chatty Cathy and a few hun-

    dred million others produce data that pollutes the advantages gained to the public as a wholeby fair,

    intelligent reception methods. Chatty Cathys tweets about pop stars and her favorite garden vege-tables need to quickly pass through the right filters and be disposed of. It should be mentioned here

    that mostof the available data received in an intelligent program should be destroyed because it pol-

    lutes the value of the enterprise itself. The Chatty Kathy stream mainly needs to be checked as well

    as possible for planted code by those hostile to the Democratic imperative of the public as a whole.

    Mining Data through the matrix of pre-sort filters involves having the streams of information readily

    available to be tapped into. To accomplish this, the right set of filters and switches must be opened

    and closed in rhythm with the present conditions. When an hour or a days worth of economic data

    is concluded for instance, the data should be made public without any chance of compromise in order

    to block advantages harnessed by the forces of Fascist Elitism. Many different examples of this

    timely opening and closing of sets of filters and switches are available and well known.

    The force behind future Reception of Public Data is the law itself and the willingness citizens

    to effect it and empower enforcement of it to insure it serves the public as a whole. Democ-

    ratically controlled and court sanctified law-makingmustdetermine exactlyhow Reception of Public

    Data and the lucid publishing of it is handled. With Fascist Elitism and the corruption it sows

    throughout government and business driving the world toward disaster, the public itself must gain

    control through a 4th layer institution of government. A Peoples Congress designed to set the

    stage for law-making and for exploitingitsdata for itspurpose of fair service to itselfwhile also moni-

    toring those who previously were able to shield themselves and the arrangements they made to and

    withThe First Enemy of DemocracyFascist Elitism. This to bring about a method for simple,

    intelligent laws about how public data is handledbut one with switches ultimately set without

    special interests and the additional influence this First Enemy of Democracy can bring to bare.

    DEMOCRACY

    OR INSIDER

    FACSCIM?

    CAN GOV OR OTHERS

    TWIST OUR DATA

    TO SUIT THEIR PUR-

    POSES?

    1-INTRODUCTION

    2-7 PROPERTIES OF

    FUTURE PUBLIC

    DATA RECEPTION

    4-SEALING OFF THE

    CRIMINALS & PROTECT-

    ING THE PRIVACY

    RIGHTS OF YOU & YOUR

    PIZZAMAN

    6-THE DETRACTORS

    7-RANDOMANONYMOUSPUBLIC MONITORING

    OF ITSELF

  • 8/13/2019 The Future of Public Data Reception

    4/7

    4

    Newsletter Title

    Caption describing picture or

    graphic.

    THE FUTURE OF PUBLIC DATA RECEPTION

    From William E Justin

    Jan 28, 2014

    1-INTRODUCTION

    2-7 PROPERTIES OF

    FUTURE PUBLIC

    DATA RECEPTION

    4-SEALING OFF THE

    CRIMINALS & PROTECT-

    ING THE PRIVACY

    RIGHTS OF YOU & YOUR

    PIZZAMAN

    6-THE DETRACTORS

    7-RANDOMANONYMOUSPUBLIC MONITORING

    OF ITSELF

    WEJ7 ACRROSS THE WEB

    https://sites.google.com/site/wej7ac

    crosstheweb/widget-3/home

    The double dippers want morethan one vote; morethan equal opportunity. Their crimes throughout

    American history are well-known. With intelligent Reception of Public Data controlled by true De-

    mocratic interests as a whole, Influence of Fascist

    Elitism along with the psychological and physi-

    cal damage it continues to bring onto the hu-

    man condition, will be sucked away and proc-

    essed as sewage is.

    Input/Output Stations, linked together as

    an Intranet, must exist as Public Data Cen-

    ters in each Congressional District and be

    available for public use 24 hours a day. Ba-

    sic access and helpful onsite staff should be

    given to all citizens. Security-level access should

    be given at various levels. The Internet would

    have no links to this Intranet except possibly by

    specialized ports where data requests might be fulfilled. Data requests by the public may be best in

    limiting onsite use in order to greatly destroy back door hacking attempts by servants of Fascist

    Elitism. Only forced-entry into Public Data Centers would remain as a weak link. Still, it would be of

    very low feasibility considering how break points could be fashioned even as they are in nuclear

    weapon security. Direct-line access from home could be done via phone-lines but through a mirror

    site to create a firewall of security to protect the Data. Wi-Fi access may be even worst but still be

    made viableespecially as satellite and other transference stations receive enhance safeguards.

    It would be in these Public Data Centers for instance that anonymous rotational service units made

    up by the public would work to monitor all government and big business key strokes for unlawful

    misuse of Public Data and surveillance of servants of Fascist Elitism that manage to penetrate Gov-

    ernment, Military, and National Intelligence Agencies. The regular public could even be allowed a

    role in this monitoring system by tuning in the various data streams and sending a signal that a flag

    has been spotted. It is only in this way that the public could keep an eye on the public servants and

    others in Big Business infected by Fascist Elitism those who would hope to exploit them and com-

    mandeer their personal data and secrets in theft, illegal profiteering and control; for maintaining an

    atmosphere of uncertainty that undermines Public Health.

    This Nation-wide, publically run Intranet, would likely have a series of deeper level storage to serve as

    a hedge against the very low possibility that the main Intranet was destroyed.

    Final holding of Public Data for future reference would require changes in the filters that

    earmark its relative importance. Much public data is time limited and may be discarded once it has

    been checked for things such as hidden codes and information that fails to meet legal standards of

    usefulness and fairness. Also, it is at this massive level that citizens required to perform duty would

    flag check in large teams to monitor the system. They report the sighting of real and benignly intro-

    duced flags indicating entrance to data systems as diverse as ones e-mail as well as legal law enforce-

    ment requests. This to protect the public and those working with public data.

    SECTIONS

    DEMOCRACY

    OR INSIDER

    FACSCIM?

    CAN PUBLIC DATA

    BE USED TO SET

    LOW QUALITY BIAS

    THAT RESULT IN A

    FALSE DISTRIBU-

    TION

    OF WEALTH?

  • 8/13/2019 The Future of Public Data Reception

    5/7

    5

    Newsletter Title

    THE FUTURE OF PUBLIC DATA RECEPTION

    SEALING OFF THE CRIMINALS & PROTECTING THE PRIVACY RIGHTS OF YOU &

    From William E Justin

    Jan 28, 2014

    1-INTRODUCTION

    2-7 PROPERTIES OF

    FUTURE PUBLIC

    DATA RECEPTION

    4-SEALING OFF THE

    CRIMINALS & PROTECT-

    ING THE PRIVACY

    RIGHTS OF YOU & YOUR

    PIZZAMAN

    6-THE DETRACTORS

    7-RANDOMANONYMOUSPUBLIC MONITORING

    OF ITSELF

    WEJ7 ACRROSS THE WEB

    https://sites.google.com/site/wej7ac

    crosstheweb/widget-3/home

    Knowledge that our private conversations are being recorded and listened too is unsettling.

    In some states there are laws against secret taping of phone calls. Yet, for billing purposes, records

    that we made and received calls by phones listed in our name, is a standard and necessary practice in

    the modern world.

    Should the public be given an option to de-list all records

    of a particular phones calls in arrangements when they

    pay service providers lump sums for access? Not many

    people would want that considering the value that such

    records have to them personally when going back to fig-

    ure out times, dates, and parties they spoke with. Know-

    ing your public record also puts the mind at ease in terms

    of being able to defend yourself against malicious fraud

    and identity theft. Cue up you record at the service pro-

    viders website, take a simple screen shot of you records,

    and drop them into a lock box file you trust. If any mistake is made or criminal fraud invades your

    spaceyoull have some strong evidence.

    A future public data reception institution would accomplish this in and of itself. All of the informa-

    tion and records available, sorted and sent to you or into your private lock boxand done so with-

    out the knowledge of any insiders programmed by Fascist Elitism working at phone companies or in

    government. Your phone records, your medical recordsactivated in specialized ways that open

    switches to that data and record the accessing of it. Yourdata,yourphone conversations,yourpres-

    ence within the traffic gridare each items you would like to know if able to stop others from know-

    ing about it too. After all, should your prospective employer get to know how much pizza you eat

    and what ingredients you prefer? Should the prospective employer be allowed any access toyour data

    when basic programs provided by a proper Future Public Data Accessing Institutioncould simply

    mark you as employable to do the job described or not employable to do the job described?

    Extraneous detail in such a situation feeds bias that are not good for the public as a whole. Prospective

    employers and others may discriminate against people who will not open the lock box for their

    perusal, but such as this is likely illegality brought by Fascist Elitism. In the end, such practices could

    bring lawsuits and add to a companys negative public image. Consumers may hold a grudge. But

    what about law enforcement needs and oversight of the public by the government? Law enforcement

    tends to desire all the tools and would really like to know more about you and what exactly you are

    saying to your pizza man! Its valuable information for building charts of human trends that allow for

    better service and a greater ability to read and manipulate you. We like the service part and

    dont like the manipulation aspect.

    Only sound legal process and public participation should open access streams. Growing knowledge

    will render the Terms of Service Agreements of today obsolete. Your tracks may be recorded by

    dumb machinesyou control, but law enforcement and Intelligence Agencies will have to provide a

    valid legal argument to the courts and theirpublic rights monitors for entryeven if after the fact.

    SECTIONS

    DEMOCRACY

    OR INSIDER

    FACSCIM?

    CAN PUBLIC DATA BE

    FALSIFIED

    TO TILT THE U.S.

    TOWARD

    CORPORATELED

    INVASION OF

    OTHER NATIONS?

  • 8/13/2019 The Future of Public Data Reception

    6/7

    6

    Newsletter Title

    Caption describing picture or

    graphic.

    THE FUTURE OF PUBLIC DATA RECEPTIONSEALING OFF THE CRIMINALS & PROTECTING THE PRIVACY RIGHTS OF YOU

    & YOUR PIZZAMAN

    Random, Anonymous Public Monitoring of Itself

    From William E Justin

    Jan 28, 2014

    1-INTRODUCTION

    2-7 PROPERTIES OF

    FUTURE PUBLIC

    DATA RECEPTION

    4-SEALING OFF THE

    CRIMINALS & PROTECT-

    ING THE PRIVACY

    RIGHTS OF YOU & YOUR

    PIZZAMAN

    6-THE DETRACTORS

    7-RANDOMANONYMOUSPUBLIC MONITORING

    OF ITSELF

    WEJ7 ACRROSS THE WEB

    https://sites.google.com/site/wej7ac

    crosstheweb/widget-3/home

    to access that information.

    The President, or the head of The Defense Depart-ment, or the head of The CIA, may designate an

    enemy as a military target to be destroyed, but

    maybe not that targets wife and children. Not

    legally if the courts andpublic rights monitors

    have a clear understanding of the full implications

    involved.

    When war crimes, mad public beatings, illegal sur-

    veillance are done by renegade American Security

    or criminals, the public as a wholesuffers. The Future of Public Data Reception will force everybody to

    fair and reasonable conclusions and seal off advantages now held by Fascist Elitism.

    Detractors such asFascist Elitism are the natural enemy of a reasonable Democratic Public

    Data Reception scheme. To lesser degrees Anarchism--as something of a perfect world desire

    for regulation with limited accountability to an overlord such as a Democratic Public Data Recep-

    tion--would view this as a detriment to the stateless society they envision. Also, the minimal-

    government wishes of Libertarians and their desire for Freedom of Association (along with the free-

    dom to remain aloof from mandatory involvement in such) would spawn fear of being groupedby

    Big Brother or the overlord. But it is Fascist Elitism that is diametrically opposed to an intelli-

    gent, vital data tracking system. Its built-in advantage over the so-called 99% would be dissipated .

    The Authoritarianism inherent in Fascist Elitism which insures its continual prosperity, is put at sub-

    stantial risk by a comprehensive Democratic Public Data Reception operation. Exposure of the

    Emperors New Cloths masking a lack of true talent, would tend to burst the egotistical bubble itsdimmed adherents are caught up in. As the national identity aspectin Fascism passes into the mad Capi-

    talismfermenting today in multi-national corporatism, threats by benign Democratic Public Data

    Reception becomes obvious. Theparasiteprovoking ownership and control of people, property, and

    the means of production becomes sealed off and starved. The Totalitarian aspect in Fascist Elitism

    enjoy technological advantage for complete acquisitionstymied as the immoral tactics used by it

    are exposed and criminalized.

    When Fascist Elitismby savvy, amoral hired hands--can go into data bases without leaving a trace

    and change information, the parasite feasts while infecting the public as a wholewith something like a

    highly toxic poison. With insiders under the influence of Fascist Elitism unfairly get the first and

    sometimes only look at incoming data, the parasite is feasting directly on the public as a whole. When

    murders, movements of funds, and other secret, immoral deals are plotted and carried out without

    the possibility of tracking by Democratic Public Data Reception, the parasite is destroying its host.

    SECTIONS

    DEMOCRACY

    OR INSIDER

    FACSCIM?

    CAN CRIMINAL GOV,

    BUSINESS

    OR OTHERS BE EX-

    CUSED FROM

    PUBLIC TRACKING OF

    THEIR ACCESSING

    OF PUBLIC DATA?

  • 8/13/2019 The Future of Public Data Reception

    7/7

    7

    Newsletter Title

    Caption describing picture or

    graphic.

    From William E Justin

    Jan 28, 2014

    1-INTRODUCTION

    2-7 PROPERTIES OF

    FUTURE PUBLIC

    DATA RECEPTION

    4-SEALING OFF THE

    CRIMINALS & PROTECTING

    THE PRIVACY RIGHTS OF

    YOU & YOUR PIZZAMAN

    6-THE DETRACTORS

    7-RANDOMANONYMOUSPUBLIC MONITORING

    OF ITSELF

    WEJ7 ACRROSS THE WEB

    https://sites.google.com/site/wej7ac

    crosstheweb/widget-3/home

    Fear-mongering, the subliminal mind pro-

    gramming of advertising, fraud, murder

    these are the core tactics the parasite of Fas-

    cist Elitism would attempt to use incremen-

    tally to combat the piece-by-piece introduc-

    tion of right, legal, and correct data recep-

    tion methods. The Fascist insider slave-

    holders club will wilt like a clan of soft wax

    demon figurines once it is clear they are

    leaving fixed and permanent tracks and will

    be held accountable for taking unfair advan-

    tage of thepublic as a whole.

    The primary tactic Fascist Elitism would use is stalling the future arrival of comprehensive Public

    Data Reception. Buyingofficials to forestall reasonable, high Quality changes in the law is as close to an

    ace in the holeas its hapless adherents possess. Fascist Elitism does not fight fairhow could it? The

    psychological dilemma prevents this. It spreads fear and pathological need for increasing social

    power and material gain pushing individuals further toward addiction and a narrow, diminished sense

    of fulfillment not unlike the chemical master in the sad images of the crack whore. Separate indi-

    viduals from this addiction and decrease the biological, social fall so far into the pre-hell framework

    pulling at thepublic as a whole.

    Safe building, implementation and use of Modern Public-Data Reception require random,

    anonymous monitoring by the average citizen. When violations of legally-set switches are

    flagged, there must be no way for the criminal employees of the Fascist Elite to interfere. No

    insider option. If non-authorized searches are made, there must be a clear track to the perpetra-

    torin private as well as public systems. Information gathered by Modern Public-Data Reception stays in the

    dumb machineaway from all eyes except those with legal court sanctioned permission.

    In the case of tracking and rooting out possible criminal activity, the line-out would look something

    like this: Information crawling programs within the dumb machinebring back suspicious patterns in the

    data; this information is tapped into like one would tap into their e-mail box. Based on the security

    level, authorized persons would have access under whatever legal conditions are set by Democratic

    law that has legal-system backing; alltapping into this data by authorized people would itself be tracked;

    flagged violations would be spotted by rotating Random, Anonymous Monitoring teams of average

    citizens whose only connection to the data regard were the flags indicating legal and illegal entry. The

    Fascist Elite would not know who or what to bribe, extort or attempt to break into and become neu-

    tered in their efforts to steal and cover-up their tracks. They would be forced to make their case for

    this or that in Democratic forums that are more than capable of destroying the parasiteof built-in

    insider advantage.

    SECTIONS

    DEMOCRACY

    OR INSIDER

    FACSCIM?

    SHOULD PUBLIC DATA

    RECEPTION

    ALSO BE USED TO DESTROY

    CRIMINAL ATTEMPTS TO

    BRIBE, EXTORT OR OTH-

    ERWISE HARM

    PUBLIC DATA TRACKERS

    AND HONEST

    SECURITY FORCES?

    THE FUTURE OF PUBLIC DATA RECEPTIONTHE DETRACTORS

    Random, Anonymous Public Monitoring of Itself