Thursday, December 31, 2015

Big Brother and Block Modeling

Big Brother and Block Modeling

By Scott A. Boorman and Paul R. Levitt
(New York Times Nov, 20 1983)

As 1984 approaches, a quiet revolution in computers and information gathering may be bringing us closer than we realize to George Orwell’s controlled state of Oceania. The public seems preoccupied with teen-age computer “hackers” accessing sensitive computer systems. But our more enduring fears should focus on a technology that corporations, nonprofit organizations and governments are using with increasing frequency to harness seemingly innocuous data from the personnel or communications departments and adapt it in new and unexpected ways such as targeting individuals for promotion or dismissal.

One name for this new computer game is block modeling – a programming technique that evaluates how employees fit within an organization on the basis of their relations with other employees. Recent impetus has come from such diverse independent quarters as Bell Laboratories, the American Broadcasting Companies, the Wharton School, and even the Institute for Social Management in Bulgaria.

Each of these organizations has recently spent time and money to develop advanced computer methods capable of “X-raying” a complex population- several hundred middle managers for example – to detect structural patterns of interaction and communication. And though these technologies certainly have significant benevolent uses, their premise is a recognizable extension of the “guilt by association” idea, and can therefore be abused.

Most crucially, these methods have the capacity to capitalize on the unguarded moments of ordinary people; to probe organizations for factional alignments in a low-visibility and therefore insidious way; to play to human biases – particularly among managers – to name names; and to give sometimes facile technological rationales for settling complex personnel problems.

Block-modeling does not require particularly sensitive information like tax returns medical histories. Rather, it exploits the unexpected, even uncanny synergy of large masses of “relational” data buried in organizational files. Examples of relevant data: Whom you talk with in your company; whose phone calls you do not return; whom you eat lunch with; whom you have worked with; who owes you favors; to whom to you send carbon copies of memos and letters; even whom you go bowling with. There is every expectation that far more such data bases will be routinely collected in the near future as minicomputer advances merger ever more widely with office information technology.

Only rarely will any relation between two people be very informative in isolation. But as many relations connecting many pairs of people accumulate, block modeling provides ways to distill frequently very striking and revealing patterns. Moreover, by throwing light on interlocking activities of specific people, block modeling goes a step beyond even the most refined kinds of geo-demographical data analysis such as extrapolating people’s characteristics by Postal Zip Code of residence.

The output of a block-model analysis is simple to state – even deceptively so since a large amount of advanced mathematics and computing is involved. The block model of the social structure chops the social group up into “blocs.” As Justice William O. Douglas once observed, a person is defined by the checks he writes. Blocs in similar positions in the relationship networks and who are thus likely to behave similarly in ways important to the organization, and be candidates for receiving similar “treatment.” Blocs can be, but don’t have to be, tightly-knit groups or factions. Two people may never have heard of each other, yet can end up in the same bloc because of common patterns of relationship with third parties.

In the mid-1970’s, we were part of a research team at Harvard that published the first papers on block-modeling’s social applications. The response was revealing. Places like mental institutions and rehabilitation centers in Lithuania were quick to request reprints. Perhaps they saw block-modeling as a way to ferret out dissidents. Later, members of the group received inquiries from the Swiss as well as West Germans whose questions (and travel reports sent back home) were especially exhaustive.

Interest then seemed to wane until two or three years ago, when a wave of, if often unobtrusive interest started coming from American business sources.

Possible uses of blockmodeling, beyond deciding promotions and dismissals, could include the following:

Identifying sources of grassroots opposition in hostile corporate takeover situations or bankruptcy reorganizations.

Indicating where to put the “good stuff” – raises, promotions, funding, new employees and perks.

Obtaining early warning of trouble spots portending possible “blowups”, in organizations, for example when internal tensions get out of hand, producing a wave of firings or resignations.

In fact, one of the earliest application of this class of methods was set in a Roman Catholic monastery which in the late 1960’s was on the brink of organizational collapse. The block model successfully identified three factions – loyalists, “Young Turks,” and outcasts – whose membership foreshadowed the way the organization would unravel. In an application to a more complex organization in difficulties, the block model not only correctly identified the outcast group, whose members would be dismissed, but also detected a submerged case of personnel misassignment in a different corner of the organization.
With proper safeguards, use of such methods can be sound, ethical and constructive. Obviously, internal sudit departments should at times be permitted to scrutinize employees closely. But stride sin the new “guilt-by-association” technologies are easily outstripping the vastly slower evolution of protective legal and administrative responses.

The typical employee whose position is likely to be most vulnerable to a block-model analysis is the middle manager, who has a family, a mortgage and a career locked into the XYZ Corporation. If the model locates him in a favorably regarded bloc, innocence by association prevails and all is well. But if he associated with known non-cooperators, or worse still, is assigned to a bloc judged likely to split off and found a rival company, he then can be passed over in the next promotion.

Inevitably, these new technologies create an unusually sensitive and complex web of management, privacy, information access, social control, and legal liability problems. In the end, the true 1984 threat lies not so much in the computer methods themselves, but in our society’s slowness to react.   http://bahoowah.blogspot.com/2008/10/big-brother-and-block-modeling.html

What's Up With .. The Black Budget ? ~ the $64 Question~




by Catherine Austin Fitts
23 September 2002

from Scoop Website


Catherine Austin Fitts is the President of Solari, Inc., a former Assistant Secretary of Housing – Federal Housing Commissioner in the first Bush Administration and a former partner and member of the board of Dillon, Read & Co. Inc and President of Hamilton Securities.

She is a member of the advisory board of Sanders Research Associates http://www.sandersresearch.com/ in London and publishes a column in Scoop Media in New Zealand

http://www.scoop.co.nz/ called The Real Deal.





"Engrave this upon my heart: There isn't anyone you couldn't love once you've heard their story."
 Mary Lou Kownacki

"What is relevant is what solves the problem. If we had thought through real relevancies, we would be on Sirius by now."
Peter Medewar



It is time to deal with the 64 dollar question - the biggest crazy aunt in the living room.



The questions that need to be raised in any effort to find the truth about a significant event related to power and money in the US - and answered if we are to ever find the truth of how our world works - are:

  1. WHAT HAS BEEN THE SIZE OF THE U. S. BLACK BUDGET OVER THE LAST 50 YEARS?
  2. WHAT ARE THE SOURCES AND USES OF FUNDS IN THE BLACK BUDGET?
  3. WHO GOVERNS AND MANAGES THE BLACK BUDGET AND OPERATIONS?
  4. WHY HAVE SO MANY DECENT PEOPLE SUPPORTED AN ILLEGAL BLACK BUDGET OPERATION OF SUCH MAGNITUDE FOR SO LONG?
  5. IS THE WAR ON TERRORISM MOVING THE BLACK BUDGET ON BUDGET?

I do not know the answer to these questions. What I do know is that asking these questions brings up a whole pile of challenging uncertainty.



(For background on my experience dealing with black budget/slush fund operations at FHA and Ginnie Mae at the Department of Housing and Urban Development - HUD - Justice, Treasury and the New York Federal Reserve Bank, see my article, "The Myth of the Rule of Law.")



When dealing with challenging uncertainty, I find that many researchers simply delete the existence of such uncertainty from their reality. That is a big mistake - again pretending that we do not have a very big crazy aunt sitting in the living room.



George Orwell once said that,

"Omission is the greatest lie."

Hence, our crazy aunt has to be dealt with.



If you listen to the Ferdinand video/audio depositions in the Carone/Tyree lawsuit, what you will hear is something I have heard many times.



Carone Ferdinand gives his family the sense of all of the organized crime operations by CIA, Army and Mafia through the 1970's as legitimate for national security purposes that then got out of hand and turned bad in the 1980's.



That is, what started out as justifiable got out of hand.



This begs the question,

Why Were Such Activities Considered Justifiable?

The way to deal with uncertainty is with scenario design and probability - i.e. to create a framework of the possible explanations with your best estimate of the plausible scenarios and the probability (all adding up to 100%) of each one being true based on intuition.



Maintaining such a framework allows data collection on key variables and assumptions and an evolution to occur that can enlighten - even determine - concrete questions and answers over time.



So, let me tell a story, give you my framework that I use to handle the fact that I do not have the answers and invite your framework.



I am not looking to hear only what is wrong with my framework. I am looking to improve mine or find a better one. Or better inform my estimate of the probabilities that this one or that one is true. Hence, I invite you to put forward your framework for managing this uncertainty. If we had the truth of the issue I am going to introduce, I dare say we could get to the bottom of 9-11 faster.



In 1998, I was approached by John Peterson, head of the Arlington Institute, a small high quality military think tank in Washington, DC. I had gotten to know John through Global Business Network and had been impressed by his intelligence, effectiveness and compassion. John asked me to help him with a high level strategic plan Arlington was planning to undertake for the Undersecretary of the Navy.



At the time I was the target of an intense smear campaign that would lead the normal person to assume that I would be in jail shortly or worse. John explained that the Navy understood that it was all politics - they did not care.



I met with a group of high level people in the military in the process - including the Undersecretary. According to John, the purpose of the plan - discussed in front of several military or retired military officers and former government officials - was to help the Navy adjust their operations for a world in which it was commonly known that aliens exist and live among us.



When John explained this purpose to me, I explained that I did not know that aliens existed and lived among us. John asked me if I would like to meet some aliens. For the only time in my life, I declined an opportunity to learn about something important.



I was concerned that my efforts with Arlington could boomerang and be connected with the smear campaign and the effects that I was managing. I regret that decision. At John's suggestion I started to read books on the topic and read about 25 books over the next year on the alien question, the black budget, and alien technology.



I had to drop from the project due to the need to attend to litigation and the physical harassment and surveillance of me and some of the people helping me.



This process - which turned out to be incredibly time consuming - I now believe was connected with the black budget/slush fund activities connected with FHA and Ginnie Mae at HUD. (See, "The Myth of the Rule of Law") John then asked me if I would join the board of the Arlington Institute.



When I attended one of my first meetings, I joined in discussion with about 10 people which included James Woolsey, former head of the CIA in the Clinton Administration, Napier Collyns, founder of Global Business Network and former senior Shell executive, Joe Firmage, and other members of the Arlington board.



The main topic of discussion was whether or not the major project for the coming year should be a white paper on how to help the American people adjust to aliens existing and living among us.



I said nothing - just listened. Not that long after, I dropped from the board due to the continued demands related to litigation with the Department of Justice and their informant.



To cut a series of additional long stories short, when I talk with my few sources from the military and intelligence community, I hear the same themes:

  1. Aliens exist and live among us;
  2. In part for this reason as well the accumulated investment over the last 50 years, the technology we have access to through the black budget is far more advanced than is commonly understood;
  3. The black budget/slush fund construct was created to deal with this issue, which is why reasonable people thought selling drugs to the children who were US citizens was the better of several options - including the option of telling the American public the truth and funding the expenses on budget.

As a result of these experiences, here is my framework for dealing with this very large pile of uncertainty.









ONE OF THE THREE FOLLOWING POSSIBLE SCENARIOS MUST BE TRUE

  • SCENARIO #1. ENTRE NOUS:
    The alien question is the single largest and most expensive disinformation campaign in the history of our race.

    A portion of the human race has advanced technologically so far beyond the rest of us - and is attributing various things to aliens as a way of managing their resulting risk - that we have become as aliens to each other.

    To fully understand this scenario, we need to try to understand the use of individual mind control such as criminal hypnosis to effect financial and government fraud and corruption and the truth, whatever it is, of wider subliminal programming and brainwashing. These are slippery subjects for most people to deal with unless they have the training and ability to do so.

    % PROBABILITY SCENARIO #1 IS TRUE ______ (You fill in)


  • SCENARIO #2 - HOLY COW!:
    Aliens exist and live among us. Planet earth is subject to the politics, economics and laws and/or lawlessness of a larger system or systems.

    The transfer of advanced technology into a society that has not evolved governance and legal systems to manage a world with the presence of such technology and the influence of such other system(s) helps to explain current events.

    To fully understand this scenario, we must also try to understand the use of individual mind control such as criminal hypnosis to effect financial and government fraud and corruption and the truth, whatever it is, of wide subliminal programming and brainwashing.

    Again, these are slippery subjects for most people to deal with unless they have the training and ability to do so.

    % PROBABILITY SCENARIO #2 IS TRUE ______ (You fill in)


  •  SCENARIO #3 - MUDDLED: Some combination of (1) and (2) above.

    % PROBABILITY SCENARIO #3 IS TRUE ______ (You fill in)

    TOTAL % PROBABILITY OF SCENARIOS #1, 2 & 3 BEING TRUE 100%



Could my experiences with Arlington and the Navy or any subsequent contacts fit with a disinformation scenario? Absolutely.



I have no evidence to support any scenario. The only evidence I believe I have is my experience dealing with tremendous amounts of money siphoned off over the years, whether through Iran-Contra S&L, HUD and BCCI fraud, or the latest round of money missing from the federal government in the last five years.



This is all documented in the articles below. This cash flow and the operations and syndicates it appears to fund are important to what drives the governance and allocation of resources in this country and around the globe.



There is a reason that power and money are centralizing and the rich are getting richer. I want to know what it is.



Whichever scenario is true  - and I do not know which one is  - if we had the truth it will help us grapple with 9-11 and the War on Terrorism. It would also help us better understand all the efforts to press for centralization of economic and political power that have grown as the black budget has grown since WWII. The reality is the possibilities of why 9-11 occurred and how it was operationalized are impacted by the facts of the US black budget and the advanced technology it has developed.



Why would sane and even decent people think it was the best option for the good of the whole? We must sit in the shoes of the person or people who gave the order - whoever they may be and wherever they may be - and understand how their power and money worked.



Why would a group with the operational and financial capacity to effect a 9-11 operation give the green light to plan 9-11, finance 9-11, do 9-11, stand down so 9-11 could happen, take advantage of 9-11 or to make sure the truth was not illuminated? My experience in Washington and Wall Street would indicate that there is a reasonable chance that all these various people and many in the food chain Are Not Bad Or Irrational People.



That is, we have a better chance of finding the truth if for purposes of our explorations we assume that the people involved in all these roles were people like you and me - just with a different map of certain parts of the world and dealing with a variety of stress and pressures trying to build cooperation or achieve goals that we do not understand.



Watching the federal government contract announcements and without benefit of seeing the full budget and assuming The Disclosure Project allegations regarding the estimates of the black budget size, if I had to guess today my guess would be that 9-11 has been highly successful in permitting the black budget to be moved on budget, partly in the normal budget and partly in the budget that is only disclosed to the Congressional intelligence committees.



The solution to continued growth and funding of the black budget may have been to steal as much money and assets as possible from the federal budget and then to move the black budget on budget when control of media, Congress, Justice and Securities & Exchange Commission ensured that the legal budget was non-transparent, controlled by private government contractors and could not be harmed or fiddled with by Congress.



(See various stories on the disappearance of over $3.3 trillion from the federal government from fiscal 1998-2001)



Grossly oversimplified, by the end of the 2004 fiscal year, covert operations and the black budget may be fully legal, run and controlled by corporations and banks without interference from knowledgeable career civil service, taxpayer funded, and non-transparent.



Why do I say all of this?



We do not have time to pay attention to people who use smears like "conspiracy theorist" to waste our time. Money, budgets, finance... these are all facts. If something does not work, and it continues to not work, there is a reason.



Systems have a logic. They have a rationale. Money helps explain and illuminate that rationale. Anyone who would smear a serious researcher or writer for trying to understand where a great deal of money is disappearing to as a "conspiracy theorist" is someone who would never be taken seriously or associated with in the circles in which I travel.



The exception is if the person doing the smearing is a professional being paid to smear those who have the scent of "the real deal" - Cointelpro or related public relations. The number of people paid to do such things are many and growing.



9-11 was an operation that was implemented by a conspiracy. To get to the bottom of what happened and why one must develop and use conspiracy theories to research in what can only be described as a conspiracy reality.



We know in regards to 9-11 one of two scenarios must be true - some portion of the US military and intelligence are,

  1. complicit and/or
  2. guilty of criminal gross negligence

We also know that the official story is not truthful. Either scenario and the reality of the official story beg the question, "why?"



This course always leads us to consider the fact that US military and intelligence have enjoyed significant expansion of their budgets and powers as a result of 9-11. We are rewarding failure. 9-11 was great for business. Lockheed Martin's stock is up over 50% in a falling stock market. The oil companies have their pipeline.



When a system does not work and continues to not work, there is something that prevents its learning.



Ultimately what we must understand that the problem is not that the system does not work and that it is not learning. The problem is that the system is controlled and operated by the most powerful forces in that system and that the system is indeed working and learning in the general direction they want it to go.



This happens in a manner that is highly organic and requires lots of planning, trial and error and factionalism that involves competition and cooperation over time in the pursuit of the system's real goals. Hence, the system is working and is learning. It is our construct that is wrong. We do not understand the system and the goals of the system.



Once we are clear that the system is working and is learning, once we stop falling back on scapegoating as a technique to explain events, we can start to understand the real system that we are a part of. This is how power and money work in reality.



The amount of money and power spent to keep the general population from understanding this - and focused on things like scapegoating which keep us from building a good map of "the real deal" or gaining the power to impact events by using our money and time as a vote in the marketplace in which the banks and corporations must thrive - is immense.



That is why I strongly encourage reading Jon Rappoport's back interviews on his Infomonster and becoming a subscriber for his ongoing interviews.



For those would like to know more, I would refer you to articles on all the money missing from the US Treasury and the manipulation of the gold markets as well as the Disclosure Project video of their event at the National Press Club



As for me, I do not have the answers. I wish I did.



That is why I am so appreciative of efforts like UnAnswered Questions and the effort of researchers networking and collaborating globally to illuminate, research and answer the right questions.



Let me close with the unanswered questions with which I began and which I believe are critical to our ongoing collaboration:


  1. WHAT HAS BEEN THE SIZE OF THE U. S. BLACK BUDGET OVER THE LAST 50 YEARS?
  2. WHAT ARE THE SOURCES AND USES OF FUNDS IN THE BLACK BUDGET?
  3. WHO GOVERNS AND MANAGES THE BLACK BUDGET BUDGET AND OPERATIONS?
  4. WHY HAVE SO MANY DECENT PEOPLE SUPPORTED AN ILLEGAL BLACK BUDGET OPERATION OF SUCH MAGNITUDE FOR SO LONG?
  5. IS THE WAR ON TERRORISM MOVING THE BLACK BUDGET ON BUDGET?

'Minority Report' Is 40 Years Ahead of Schedule: The Fictional World Has Become Reality

Posted by George Freund on December 29, 2015 at 1:55 PM


JOHN W WHITEHEAD | OCTOBER 7, 2015

Here’s how the world around us resembles Philip Dick’s dystopian police state

“The Internet is watching us now. If they want to. They can see what sites you visit. In the future, television will be watching us, and customizing itself to what it knows about us. The thrilling thing is, that will make us feel we’re part of the medium. The scary thing is, we’ll lose our right to privacy. An ad will appear in the air around us, talking directly to us.”—Director Steven Spielberg, Minority Report

We are a scant 40 years away from the futuristic world that science fiction author Philip K. Dick envisioned for Minority Report in which the government is all-seeing, all-knowing and all-powerful, and if you dare to step out of line, dark-clad police SWAT teams will crack a few skulls to bring the populace under control.

Unfortunately, as I point out in my book Battlefield America: The War on the American People, we may have already arrived at the year 2054.

Increasingly, the world around us resembles Dick’s dystopian police state in which the police combine widespread surveillance, behavior prediction technologies, data mining and precognitive technology to capture would-be criminals before they can do any damage. In other words, the government’s goal is to prevent crimes before they happen: precrime.

For John Anderton (played by Tom Cruise), Chief of the Department of Pre-Crime in Washington, DC, the technology that he relies on for his predictive policing proves to be fallible, identifying him as the next would-be criminal and targeting him for preemptive measures. Consequently, Anderton finds himself not only attempting to prove his innocence but forced to take drastic measures in order to avoid capture in a surveillance state that uses biometric data and sophisticated computer networks to track its citizens.

Seemingly taking its cue from science fiction, technology has moved so fast in the short time since Minority Reportpremiered in 2002 that what once seemed futuristic no longer occupies the realm of science fiction. Incredibly, as the various nascent technologies employed and shared by the government and corporations alike—facial recognition, iris scanners, massive databases, behavior prediction software, and so on—are incorporated into a complex, interwoven cyber network aimed at tracking our movements, predicting our thoughts and controlling our behavior, Spielberg’s unnerving vision of the future is fast becoming our reality.

Examples abound.

FICTION: In Minority Report, police use holographic data screens, city-wide surveillance cameras, dimensional maps and database feeds to monitor the movements of its citizens.

REALITY CHECK: Microsoft, in a partnership with New York City, has developed a crime-fighting system that “will allow police to quickly collate and visualise vast amounts of data from cameras, licence plate readers, 911 calls, police databases and other sources. It will then display the information in real time, both visually and chronologically, allowing investigators to centralise information about crimes as they happen or are reported.”

FICTION: No matter where people go in the world of Minority Report, one’s biometric data precedes them, allowing corporations to tap into their government profile and target them for advertising based on their highly individual characteristics. So fine-tuned is the process that it goes way beyond gender and lifestyle to mood detection, so that while Anderton flees through a subway station and then later a mall, the stores and billboards call out to him with advertising geared at his interests and moods. Eventually, in an effort to outwit the identification scanners, Anderton opts for surgery to have his eyeballs replaced.

REALITY CHECK: Google is working on context-based advertising that will use environmental sensors in your cell phone, laptop, etc., to deliver “targeted ads tailored to fit with what you’re seeing and hearing in the real world.” However, long before Google set their sights on context advertising, facial and iris recognition machines were being employed, ostensibly to detect criminals, streamline security checkpoints processes, and facilitate everyday activities. For example, in preparing to introduce such technology in the United States, the American biometrics firm Global Rainmakers Inc. (GRI) turned the city of Leon, Mexico into a virtual police state by installing iris scanners, which can scan the irises of 30-50 people per minute, throughout the city.

Police departments around the country have begun using the Mobile Offender Recognition and Information System, or MORIS, a physical iPhone add-on that allows police officers patrolling the streets to scan the irises and faces of suspected criminals and match them against government databases. In fact, in 2014, the FBI launched a nationwide database of iris scans for use by law enforcement agencies in their efforts to track criminals.

Corporations, as well, are beginning to implement eye-tracking technology in their tablets, smartphones, and computers. It will allow companies to track which words and phrases the user tends to re-read, hover on, or avoid, which can give insight into what she is thinking. This will allow advertisers to expand on the information they glean from tracking users’ clicks, searches, and online purchases, expanding into the realm of trying to guess what a user is thinking based upon their eye movements, and advertising accordingly. This information as it is shared by the corporate elite with the police will come in handy for police agencies as well, some of which are working on developing predictive analysis of “blink rates, pupil dilation, and deception.”

In ideal conditions, facial-recognition software is accurate 99.7 percent of the time. We are right around the corner from billboards capable of identifying passersby, and IBM has already been working on creating real world advertisements that react to people based upon RFID chips embedded in licenses and credit cards.

FICTION: In Minority Report, John Anderton’s Pre-Crime division utilizes psychic mutant humans to determine when a crime will take place next.

REALITY CHECK: While no psychic mutants are powering the government’s predictive policing efforts, the end result remains the same: a world in which crimes are prevented through the use of sophisticated data mining, surveillance, community policing and precrime. For instance, police in major American cities have been test-driving a tool that allows them to identify individuals—or groups of individuals—most likely to commit a crime in a given community. Those individuals are then put on notice that their movements and activities will be closely monitored and any criminal activity (by them or their associates) will result in harsh penalties. In other words, you are guilty before you are given any chance to prove you are innocent.

The Department of Homeland Security is also working on its Future Attribute Screening Technology, or FAST, which will utilize a number of personal factors such as “ethnicity, gender, breathing, and heart rate to ‘detect cues indicative of mal-intent.’”

FICTION: In Minority Report, government agents use “sick sticks” to subdue criminal suspects using less-lethal methods.

REALITY CHECK: A variety of less-lethal weapons have been developed in the years since Minority Report hit theaters. In 2007, the Department of Homeland Security granted a contract to Intelligent Optical Systems, Inc., for an “LED Incapacitator,” a flashlight-like device that emits a dazzling array of pulsating lights, incapacitating its target by causing nausea and vomiting. Raytheon has created an “Assault Intervention Device” which is basically a heat ray that causes an unbearable burning sensation on its victim’s skin. The Long Range Acoustic Device, which emits painful noises in order to disperse crowds, has been seen at the London Olympics and G20 protests in Pittsburgh.

FICTION: A hacker captures visions from the “precog” Agatha’s mind and plays them for John Anderton.

REALITY CHECK: While still in its infancy, technology that seeks to translate human thoughts into computer actions is slowly becoming a reality. Jack Gallant, a neuroscientist at UC Berkeley, and his research team have created primitive software capable of translating the thoughts of viewers into reconstructed visual images. A company named Emotiv is developing technology which will be capable of reading a user’s thoughts and using them as inputs for operating machinery, like voice recognition but with brain signals. Similar devices are being created to translate thoughts into speech.

FICTION: In Minority Report, tiny sensory-guided spider robots converge on John Anderton, scan his biometric data and feed it into a central government database.

REALITY CHECK: An agency with the Department of Defense is working on turning insects into living UAVs, or “cybugs.” By expanding upon the insects’ natural abilities (e.g., bees’ olfactory abilities being utilized for bomb detection, etc.), government agents hope to use these spy bugs to surreptitiously gather vast quantities of information. Researchers eventually hope to outfit June beetles with tiny backpacks complete with various detection devices, microphones, and cameras. These devices could be powered by the very energy produced by the bugs beating their wings, or the heat they give off while in flight. There have already been reported sightings of dragonfly-like robotic drones monitoring protesters aerially in Washington, DC, as early as 2007.

FICTION: In Minority Report, Anderton flees his pursuers in a car whose movements are tracked by the police through the use of onboard computers. All around him, autonomous, driver-less vehicles zip through the city, moving people to their destinations based upon simple voice commands.

REALITY CHECK: Congress is now requiring that all new cars come equipped with event data recorders that can record and transmit data from onboard computers. Similarly, insurance companies are offering discounts to drivers who agree to have tracking bugs installed. Google has also created self-driving cars which have already surpassed 300,000 miles of road testing. It is anticipated that self-driving cars could be on American roads within the next 20 years, if not sooner.

These are but a few of the technological devices now in the hands of those who control the corporate police state. Fiction, in essence, has become fact—albeit, a rather frightening one.

# # # #

John W. Whitehead is an attorney and author who has written, debated and practiced widely in the area of constitutional law and human rights. He is the president and spokesperson of the Rutherford Institute. Mr. Whitehead is the author of numerous books on a variety of legal and social issues, including A Government of Wolves: The Emerging American Police State. He has a Bachelor of Arts degree from the University of Arkansas and a Juris Doctorate degree from the University of Arkansas School of Law, and served as an officer in the United States Army from 1969 to 1971.

http://www.boilingfrogspost.com/2015/10/07/minority-report-is-40-years-ahead-of-schedule-the-fictional-world-has-become-reality/#sthash.v7uiBeHA.dpuf