Science

The Delusion of All-Knowingness: From the Garden to the Tower to the Cloud

THE DELUSION OF ALL KNOWINGNESS: FROM THE GARDEN TO THE TOWER TO THE CLOUD

You’ll be just like God, knowing everything, ranging all the way from good to evil.”…Gen.3: 5

With the Internet, there is no longer an excuse for not knowing… B. Krzanich, CEO Intel

The Garden: All Knowingness and the delusion of Self-Providence

It was the best of times. The accounting provided by the Jewish Torah and Christian Bible indicates that long before such a formal construct as history had been codified, Sapiens (triune-man) had brought their unique giftedness fully to bear. Having been granted dominion over the material world, their souls were constrained only by the boundaries of their uniquely animated reason, imagination, interests, and creator-ability.

It was the worst of times. In the Garden, rather than a quest for new dimensions of Creator sanctioned dominion, sapiens desire for Creator like transcendence exposed their vulnerability to treachery. The father of deception counseled that All-Knowingness was but one bite away. Sapiens bite at All-Knowingness proved both catastrophic and generationally contagious, genetically encoding desire for creatoresque Self-Providence.

The Tower: All Knowingness and the delusion of Self-Sufficiency

It was the best of times. Sapiens, ensconced in a flood-free enclave, sought a symbol to undergird their resistance to divine direction to disperse. The Tower project symbolized permanence, possibly arresting the neurosis induced by the continuing phenomena of rain; the rainbow contract offered little consolation. The Tower provided scant strategic advantage – e.g. reconnaissance of storm clouds on the distant horizon; nor did it impart tactical efficacy – e.g. training to develop critical skills that might serve them well in the future. The Tower was a monument to the first Sapiens inspired permanent city-state.

It was the worst of times. Some aspirations inspire the onset of opiate-like addiction – which disengages spiritually gestated moral authority and imperils social and personal accountability. Sapiens, no less vulnerable to spiritual deception than ages earlier, determined they’d restore their divinely diminished creator-ability through enhanced collaboration. The Tower actually evidenced a new genetic mutation of an old sapiens weakness with contagion potential: Self-Sufficiency born of counterfeit All-Knowingness.

The Cloud: All Knowingness and the delusion of Self-Supremacy

It was the best of times. The sages of Melbourne, Palo Alto, Cern, Beijing, Tel Aviv, et al, synchronized their breathing as the technology mother ship arrived and breached the zone where virtual-digital-knowledge resides. This zone is the by-product of a Sapiens induced digital big bang, which formed a network-centric-ecosystem comprised of many interoperable jurisdictions, e.g. computing, communications, storage, big data, analytics, and applications. This distant digital relative of the analog Tower is called the Cloud.

Suddenly complexity became fast, free, easy… and invisible…T. L. Friedman1

The Cloud is delivering unprecedented benefit; it has brought huge global value directly to the desktop and smartphone, and similarly enabled individuals to broadly touch the outside world – e.g. this blog. Few products, services, relationships, or destinations, are beyond its reach. Many presumptively declare the Cloud as wise, declaring it the sovereign authority of who and when. Many believe that the emergence of quantum computers and artificial intelligence will enable the Cloud to better “amplify the power of machines, the power of one, the power of many, and the power of flows1“, advancing sapiens beyond Self-Providence and Self-Sufficiency, to the portal of Self-Supremacy.

It was the worst of times. The Cloud alone adjudicates digitally articulated policy in its own interest, e.g. elevating All-Knowingness over Personal-Privacy. Destitute of social or psychological discernment, the Cloud is wholly incapable of distinguishing those of noble intent from those of nefarious intent: governments in the name of national security and criminals for personal gain, competitors for strategic advantage and businesses for commercial leverage, and terrorist for political conquest and rebels for thrills. The Cloud enables little more than nominal attributes of privacy, by way of anonymous trusted-third-parties, proxies, and vulnerable security technology, of it’s choosing. It also offers the opportunity to surrender to Big Data and Analytics agency simply by clicking “I Agree”.

The Cloud is considered to be rapidly evolving from a kluge-of-capabilities to cogent-entity status; many believe it exhibits pseudo-sentient analytic proficiency. Nevertheless, the Cloud remains highly vulnerable to nefarious human agency, which uses it to alter past and present accounts to form a new you of their choosing, e.g. profiling. Often the Cloud is positioned where principles, not binary data, ought to moderate. The Cloud now undergirds political party hostilities by furnishing weapons grade accusations and innuendo; its social network agency has abated the tactile connectedness critical to maturation of inter-personal skills. The Cloud has no master, yet it remains connected to an evergreen supply of covert and clandestine information-nutrients. Laws, standards, and threats are powerless to thwart or restrain Cloud-sourced virtual-synthetic-facts.

Disaster or Doxology:

The view from above the Cloud: While deception dons coats of many colors, pride is the color it uses to subvert well-being and foment catastrophe. All-Knowingness was the shade of pride donned by deception in the Garden and Tower, and now the Cloud. In the Garden, deception championed Self-Providence; shame and eviction are what followed. In the Tower, deception held out the illusion of Self-Sufficiency; thereafter, diminished collaborative facility was necessary to thwart a new global contagion.

The Cloud – envisioned as master-servant of sapiens quest for All-Knowingness enabled Self-Providence and Self-Sufficiency – has been besieged by powerful and unrelenting cyber espionage, subversion, interloping, piracy, mass surveillance, and profiling. As in the Garden and Tower, the Cloud opines to discordant spiritual revelation and displaced moral integrity. While direct personal control of privacy and security would substantially thwart such Cloud misadventure, true resolution requires the Words of the Creator to reside in the Hearts of Sapiens – not acts of Congress, Courts, Corporations, or Churches.

Disrupting Deception: Natural vs. Transcendental Progression

Disrupting Deception: Natural vs. Transcendental Progression

 The great counterfeiter adapts deception to every time and culture – Billy Graham

The great counterfeiter’s kryptonite is division through slander – James MacDonald

There’s no disaster that can’t become a blessing or blessing a disaster – J. L. Seagull

  Sapiens: Spirit – Soul – Sentience

Genesis and genetics set forth the proposition that evolution and devolution derive from seeds; sapiens experiences of consequence involve one or both. However, moral momentum first gestates in the spirit, promulgates influence of the soul, and finally transforms conscious perspective and behavior. Both the nefarious and noble acts of men are: spirit-groomed, soul-sanctioned, and sentience-enabled. While we are infused by what we eat, we are only imbued by what we think and that with which we agree.

It is not unreasonable to be disconcerted by our failure to foresee the inconceivable in others. However, transcendental-progression – e.g. spirit-soul-sentience – telegraphs our personal inclination for the implausible. We are alerted by a sense of transformation as the seeds of potential impound our cognitive and kinetic energy to actualize their noble and nefarious destiny. Whether moon landings, mass shootings, cancer cures, financial fraud, good samaritism, terrorism, philanthropy, or maleficence under cloak of authority, each evidences transcendental-progression; timing remains the only unknown.

Deception: Unfaithful Allegiance – Fictitious Sufficiency

Deception exploits our predilection for psychological assessment of nefarious and noble acts. Whereas many believe the confluence of genetic and environmental triggers codify subconscious intent, deception requires a more amenable agency than transcendental- progression. Deception fully embraces natural-progression – e.g. genes-environment-sentience – that supports the illusion that the implausible and inconceivable can be predicted and controlled. Billions are being expended in search of a behavioral-genome having the potential to avert the next Boston, Paris, Brussels, Orlando, and Nice.

Despite a preponderance of experience and evidence to the contrary, many subscribe to the notion that natural-progression informed politics, economics, and social science can re-seed human inclination. Yet, human history confirms that privilege and disadvantage, intelligence and ineptness, affluence and poverty, aggression and complaisance, refinement and inelegance, cohabit both ascendant and subservient potential. Deception dismisses such powerful evidentiary continuity – supplanting light and accord with darkness and friction to wrest control of the human conscious.

Division: Disingenuous Relationship – encapsulated by – Fraudulent Purpose

Division is the first born of deception. It squanders no opportunity to divide: e.g. Jew and Gentile, Shia and Sunni, Hutu and Tutsi, Turk and Armenian, North and South, East and West, Red and Blue, Black and White, and Top from Bottom. Deception disavows coalescence in order to first kindle and then enrage division, no matter urgent protests and unassailable consensus. Division is a far more verbal than tactile proceeding; it burns from both ends of the tongue to inculcate destructive mischaracterizations.

Division is the mother’s milk of politics. It perpetrates a war of attrition predicated on salvos of improbable promises from principle-deficient political operatives. Their goals are: to obtain and retain constituent support while distracting attention from off-putting ideology, and to accumulate unmerited personal resources and power. Politics confirm that division is highly addictive for both operatives and constituents. No political constituency on the planet has managed to alleviate division-addiction for any sustained period. Division-addiction reveals politics as a two-division two-team blood sport – hustlers and the hustled versus hustlers and the hustled.

Division is the loyal mistress of economics. Artificial economic-division (American style) partitions the absolute value of wealth into multiple groups, defining those in the bottom groups as the poor, and those in the top groups as the rich. Such division is much more likely to deceive than to inform; e.g. the value of entitlements (food stamps, housing allowances, healthcare, childcare, et al) are excluded when assessing the quality of life available to those consigned to a bottom group – wherein many live on par or better than the global middle class. Division disparages economic differences without accounting for personal sacrifice, preference, or giftedness, and commutes personal prerogatives into human rights as it sees fit – absent probity or equity.

Supply-and-demand has long served as a reliable macro-economic barometer of stock market volatility and risk. Market apparatchiks and their math-quants have learned to exploit stock market volatility to abate proportionate investment risks. The staggering difference in presumptive wealth between those defined as rich and poor derives largely from the return on investment afforded these apparatchiks and their clients. Economic division is deception-infected; the shroud of inequity is cast over many more than the one tenth of one percent who actually garner such risk-redacted gains. However, economic-division is also self-seeking; the unaffected offer little sympathy when wild swings in market confidence sack the values of apparatchik stock portfolios.

Division maintains social science on retainer and first call. Principled social science seeks to better understand cause and effect, and in turn how to induce the beneficial and control the implausible. Deception-infected-division restricts the basis of social science to natural-progression, opening many paths by which to foment and justify group isolation and disruption. Social-division nourished by deception has achieved pandemic scale; no people, nation, or kingdom has evaded its pernicious disfigurement.

Disaster: People – Nations – Kingdoms

People

Morning: Of the eleven million people involuntarily extracted from West Africa, only two percent would be settled in the south of North America; many would endure well-documented atrocities at the hands of brutal masters. Today, direct descendants of this racial caste: comprise the 16th largest economy in the world; can boast of noted leaders of government and transnational business enterprise to numerous to mention; have achieved a level of formal education rivaled only by the majority national community; and are the most literate of all diasporas of color – so much from so little and so few.

Evening: Inexplicably, over the past thirty years a small cadre of young men from this remarkable community are irrefutably responsible for more than fifty percent of all domestic homicides. In 2015 this cadre would murder 6,000 members of their own community. Concurrently, many young members from this community would exercise their constitutional right to protest the use of lethal force by police in the deaths of 36 unarmed community members – never mind that at this rate of engagement Police would require over forty years to murder on par with this small cadre in one year alone.

Disaster: Regardless of the facts, deception enables politicians, journalist, and self-anointed spokespersons to dispossess this remarkable community of the pride, reputation, and self-confidence it’s accomplishments warrant. Further, agents-of-deception have cast this largely progressive and law abiding community as intractably dependent (entitlement addicted) and morally despicable (promiscuous and profane). This community largely rejects this deceptive script, yet some choose instead to audition.

Nations

Morning: Coalition, a first cousin of collaboration, has always been an essential element of human advancement. There are a number of well recognized coalitions – e.g. the North American Free Trade Act (NAFTA), the European Union (EU), the Asia Pacific Trade Agreement (APTA) – which ostensibly form larger trading blocks that are more competitive across global markets. There are also less formal constructs, e.g. alliances.

Evening: Generally where the more competitive, e.g. Maquiladoras, displace the lesser competitive, e.g. Trade Union – the impact is first and foremost personal. Forecasts of consumer savings provide coalitions political cover, yet many companies retain the lion’s share of increases in margin – as Boards of Directors expect, and Markets demand.

Disaster: No matter that efficiencies align and value accrues to all parties, deception lurks. China is exchanging infrastructure development in Africa for long-term access to natural resources. The EU constitution abetted cultural-division and ultimately defection (Brexit). NAFTA has pushed Americans both higher and lower in the middle class stack.

Kingdoms

Morning: While nations are but intellectual and geographic people progressions, kingdoms abide a different realm than do people or nations. Kingdoms operate only in accordance with transcendental (spirit-soul-conscious) not natural (genes-environment-conscious) progression. Science has confirmed that genes bare specific environmentally influenced instructions after which they enable specific biological construction – whereas spirit and soul cannot be confirmed or denied by scientific processes. Many of the intellectual elite insists that these progressions are complimentary like the double helix structure of DNA. Nevertheless after discovery of gene adaptation (regulate, replicate, and recombine), cogent consideration of spirit and soul was consummately disbarred.

Evening: Observation and reasoned exegesis pushed such epiphanies as the renaissance, reformation, scientific revolution, and enlightenment to challenge and better inform the next sure thing. No sequence of epiphanies has confirmed the capacity of natural progression to account for deception. No outcome employing repeatable scientific processes has demonstrated genetic adaption countervailing deception. It is rational to conclude that deception is the progeny of transcendental not natural progression.

Disaster: Judgment that rest upon the tenants of an immaterial progression portends catastrophe. Transcendental-progression is the only means by which that originating in spirit can be cross-examined, where after the soul adjudicates choice (not amino acids, proteins, and enzymes); all inspiration – light and darkness – arising in this realm have eternal consequences. While the influence of natural progression on psychological response is well established, it by no means accounts for the willing participation of hundreds of thousands in deception inspired misadventure. Yet many believe a genomic protocol capable of averting social (see below) catastrophes will be discovered:

                          45M killed by Moa Zedong                                            12M killed by Adolf Hitler

                          7M killed by Josef Stalin                                                5M killed by Hedeki Tojo

                          4.0M Syrians displaced (2011-2015)                           2.6M Afghani displaced (1979-2015)

                          2.4M Rwandans displaced (1994)                                1.4M Iraqis displaced (1991)

                          2,866 Islamic attacks (2015)                                         27,627 Islamic murders (2015)

                          11,774 worldwide attacks (2015)                                   28,328 worldwide deaths (2015)

                          Global Financial Collapse of 2008                               Dotcom Bubble of 2000

                          Junk Bond Crash of 1989                                               Stock Market Crash of 1987

A Time to Choose

Natural-progression can only exacerbate not disengage deception; darkness begets darkness. Only Transcendental-progression can ameliorate deception and its eternal consequences; light begets light. Each of us is required to choose and embrace but one of these points of reference.

A View from the Confluence of Faith and Science

A VIEW FROM THE CONFLUENCE OF FAITH AND SCIENCE

Much appreciation to: Yuval Harari and Jared Diamond, Gerald Schroeder and Hue Ross, and Moses

Evolution by natural selection is one of the best-substantiated theories in science…Evolutionists

Only one text describes what scientists have since discovered – the Big Bang…Cosmologists

Since the creation of the world God’s invisible qualities… have been clearly seen …Creationist

Faith

Conscience (ethos), Prophecy (revelation), Reason (logic), and Acts (demonstration)

No matter the particular path(s) – only Faith begets Belief

Scientific discoveries continue to illuminate to controversial Beliefs

Question: Is it incongruous to re-examine faith-allied claims in the light of Science?

 Genesis

 Creationists provided Scientific guidance before Theological arguments

No matter the genesis of inspiration, whether – vision incited by revelation, reason conferred by science, or the natural entangled with the transcendental – faith must be cultivated to engender affection, and engaged to actualize potential. This precept is fundamental; everything that exist and everything we are derives from this TripleLux. It is expressed poignantly by the familiar affirmation – faith without works is dead; said in context – inspiration begets cultivation, which begets actualization, e.g. Creation.

Creation exudes Cultivation (synchronization) and Actualization (resiliency)

Question: What are some plausible explanations as to the Inspiration for creation?

Science

Science provides systematic verification of facts, truths, and inference regarding faith

Observation of cultivation and examination of actualization have increased scientific knowledge regarding cosmology, ecology, and anthropology exponentially; inspiration was considered too nebulous for scientific analysis. Given the interdependency of these three high science disciplines, it is reasonable to conclude they share the same modus of inspiration. Prior to the confluence of these high science disciplines, creationism – presented in just thirty-one succinct verses – provided the only complimentary account. This scientific tsunami has given inescapable gravity to but one term, Creator.

Scientific Cosmology coincides with Creationism

Scientific Ecology coincides with Creationism

Question: Can Anthropology coincide with Cosmology/Ecology, but not Creationism?

Cosmology

 In the beginning God created the heavens and the earth…Gen. 1: 1-5

Cosmology is the scientific discipline that investigates the origin and development of the universe. While theories abound, the one exhibiting credible correlation between faith and reason is referred to as the Big Bang. Cosmologists describe the universe as the production of an intelligent beginner and a first cause event – from great nothingness.

The COBE and Hubble satellites enabled scientists to determine the precise tempo at which the universe transpired. In the only precise accounting of record, the six periods – evening (chaos – ereb) to morning (order – boqer) – to include a final period of reference (one earth orbit) – ranged from millions to but thousands of reference-based years. Corroboration and illumination of this written account by credible mathematical and cosmogenesis analysis gives rise to but one description – Creator.

Only one Beginning and Ending coincide with the Creation of the Universe

Question: If Creation of the Universe was the Beginning, what was the End objective?

Ecology

God called the vault “sky” (3.8B yrs.) – God called the dry ground “land”… the gathered waters he called “seas”… Let the land produce vegetation (2.0B yrs.) – Let there be lights in the sky to separate the day from the night (1.0B yrs.) – Let the water teem with living creatures, and let birds fly above the earth across the vault of the sky (0.5B yrs.) – Let the land produce living creatures according to their kinds (0.2B yrs.) Gen. 1: 6-25

Ecology is the scientific discipline that investigates organisms, physical surroundings, and the consequences of their interaction. Analysis of geophysical and fossil data has convinced scientists that the cooling of the earth and the appearance of water and sunshine proffered conditions conducive to the consequential-evolution of biological organisms. No matter debates regarding consequential-resiliency (e.g. global warming), the earth, atmosphere, plants, and animals form a highly complex relational-ecosystem, which boundaries must be understood and respected.

Elementary science, observation, and intuition, embolden the presumption that within the relational-ecosystem the simple gives rise to the more complex. However, molecular biologists have discovered single cell plants with hundreds of times the genetic information per cell as mammals, but lack a plausible explanation as to the origin of either genome. No matter the possible scientific incongruity, the quest for planets evidencing hydro potentiality advances. Only one explanation coincides with earth’s genetically rich relational-ecosystem and congruent cosmological periodicityCreator.

The Biblical account attests that biological organisms bringing forth after their own kind

Question: Does 2B yrs. of composition within the boundaries of kind refute Evolution?

Anthropology

Anthropology is the scientific discipline that studies human beings and cultures. It is perhaps the most intriguing of all human interests, besides critical life saving therapies and protocols. Who are we (relationship), why are we here (purpose), and where did we come from (origin)? While relationship and purpose harbor overarching insight, for context and consistency we’ll follow the trail of origin to its intersection with the others.

Sapiens

Then the Lord God formed a man from the dust of the ground…Gen. 2: 7

Biologically, modern humans are a part of the Homo genus and Sapiens species, of which there were many other species to include Erectus, Ergaster, and Neanderthal; only Homo sapiens survive. Credible scientific investigations repeatedly confirm the sudden not consequential-evolutionary appearance of Homo sapiens. Evolutionists continue to search for a direct link to other Homo genus, contending that Homo sapiens are mammal class evolutionary organisms, and like plants and other animals, are the progeny of the same relational-ecosystem. Further scientific scrutiny reveals that Homo sapiens genetic code is hugely different from other Homo species.

Unlike other Homo genus, Sapiens are the Creators direct handiwork, not consequential-evolution

Question: Why is it critical that Evolutionists directly link all Homo geniuses?

Spirit

Then the Lord…breathed into his nostrils the breath of life …Gen. 2: 7

Despite smaller stature and smaller brains than Neanderthals, Sapiens evidence incomparably advanced cognition and imagination, exhibited by no other Homo genus. The agility biologist, psychologist, and social scientists describe as super-intelligence, derives from impartation of prescient-connection unbounded by time, space, or matter.

The Creator breathed (imparted) His own eternal life spirit into Homo sapiens, not oxygen

Soul

 …and the man became a living being…Gen. 2: 7

Homo sapiens uniqueness – the ability to see what did not exist as though it were, to modify ecosystem relationships to their own advantage, to achieve sufficient caloric intake in a fraction of the time and effort required by other Homo species, and to travel the breath of the planet – derives not from consequential-evolution, but impartation of spirit and then animation of reason, interests, and creativity, this screams Creator.

Th Creator’s life spirit transformed the corporeal and synaptic into the conscious and sentient

Question: What does the gift of Soul and Spirit suggest about Relationship and Purpose?

 

Slide1

The All-Knowingness and Gross-Secrecy Conundrum

THE ALL KNOWINGNESS AND GROSS SECRECY CONUNDRUM

          Rather than to make scapegoats of engineers, it might be wiser to lay before them a work programme… Elmer Ambrose Sperry, 1930

The development of narrative scripts (writing systems) for numbers and then language facilitated the archival preservation and broad dissemination of facts, fictions, accounts, and fantasy. However, narrative scripts were not nearly as proficient at preservation and dissemination of data as for information, likely inspiring and influencing development of computational scripts (mathematical systems).

The analog embodiment of these scripts accommodated physical and access control of data and information. Analog vested scripts together with analog networks comprised of oceans, seas, rivers, tributaries, and estuaries, brought potent benefits to mankind. Collaboration among family, friends, foe, colleagues, and importantly neighbors, increased in practice and value, as did commerce.

Digital scripts (binary systems) enable composition (production), preservation (storage), replication (virtual copies), and dissemination (distribution) of data and information. Importantly, they enable systems, devices, appliances, and applications to directly engage; machine-to-machine communication is a critical network centric process.

The Digital Ecosystem and Monoculture rely on digital scripts. The Digital Ecosystem is enabled by: Network Service Providers such as AT&T, Verizon, Charter and Comcast; Network Technology OEM such as Cisco, Juniper, and HP; Mobile Architecture Providers such as Microsoft, Apple and Samsung; Application Portals such as Facebook, Google, and Yahoo; and Cloud Facilitators such as Amazon and IBM. The Digital Monoculture enables interoperability among disparate data, applications, and devices.

The personal, commercial, and institutional benefits derived from global access to data and information, and Cloud facilitated on-demand digital resources, are apparent. The former aqueous networks have given way to a digital network of networks called the Internet. Like other game changing advances, digital script enabled technology found itself the chaperone of unintended consequences, the specter of all-knowingness.

In many regards, the Digital Ecosystem and Digital Monoculture are no more vulnerable than were the aqueous commercial networks, transports, and cargos of centuries past. Presently, sophisticated weaponized malware renders differentiation of noble from nefarious intent a daunting technical challenge. The broad disintegration of propriety and privacy has fomented unintended consequences, the specter of gross-secrecy.

All-knowingness is highly addictive. Its proponents crave access to data and information for which its owners hold reasonable expectations of privacy; they see their covert and clandestine actions as expressions of urgent benevolence and commercial expediency. Gross-secrecy is also highly addictive. Its proponents evidence totalitarian resistance to encroachment of both their contemporary and vintage stashes of secrets, believing personal risks always outweigh collective security interests.

Just as all-knowingness is antithetical to privacy, gross-secrecy is antithetical to collective security. Some would argue correctly that security would be enhanced were the barons of all-knowingness to impose this knowledge on everyone with regard to those in their sphere of influence (e.g. contact lists). Others would no doubt argue that vulnerability would be exacerbated as gross-secrets were mismanaged, misunderstood, and manipulated. To varying degrees, both conditions already prevail. Neither all-knowingness nor gross-secrecy alone can serve our highest security or moral interests.

It is important to recognize that neither point of view, all-knowingness or gross-secrecy, is necessarily diabolical, although such cogent consideration runs counter to our social and cultural conditioning, not to mention capitalistic instincts. It is crucial that we determine which resources can and cannot resolve this conundrum. Politics can never resolve this conundrum; politics only offers analytics but can’t run, pass, or catch. The solution must carry the essential genetic markers of the conundrum itself, technology.

Recently, a government coterie (by all accounts considered technology neophytes) missed a valuable opportunity when they marched into the valley of American technology giants with cease and desist vibrato, rather than specific lawful collective security objectives. Such specificity would have allowed the participants to memorialize specific technical goals and boundaries, to which the most creative community of technologist on the planet could innovate. Now positioned as combatants rather than citizen partners, both have launched media campaigns that bring resolution no closer.

Many rightfully question whether all meets the eye. The government might very well posses the assailant’s in-coming and out-going communications Meta data, iCloud backup, social media postings, radicalized training CV, and finance, relationship, and travel history. Could the Administrations petition, based on the All Writs Act of 1789, also seek to weaken limitations imposed by recent lawfully enacted legislation: 2015 Cyber Information Sharing Act (CISA), 2015 Modified US-EU Safe Harbor Privacy Framework, and the 2015 Revised Patriot Act? Do American technology companies fear being labeled as conscripted informants of the U.S. government by their global competitors more than they fear U.S. government demands as a harbinger of future demands by other governments?

The most recent outbreak of conundrumitis evidences a disastrous breach of best practices. Politics has cast itself in the role of technologist, issuing specific court sanctioned technical directions. Technologists left with but two courses of action chose the path of lawful resistance over technical submission, challenging the constitutionality of the Attorney Generals petition.

Self-inflicted wounds are now running neck-and-neck with those realized from attacks and assaults by perpetrators. How to get members of team-america to focus more on an effective game plan than on who is captain or who will get the loudest applause, is actually the most dangerous and challenging conundrum we face.

Only Technology can enable All-knowingness and Gross-secrecy to beneficially Coalesce

Undermining Jurisdiction of Choice, Privacy, and Oversight

UNDERMINING JURISDICTION OF CHOICE, PRIVACY, AND OVERSIGHT

 The Objectives of the few are clear; the Dangers to the many remain obfuscated

Part I of VI: Fear and Greed share a Common Convention – Acquisition

Catastrophic security breaches (subversion, surveillance, espionage, impersonation, and piracy) abound, impacting every network connected user class (portal, enterprise, small and medium business, and consumer). Yet, there are three things government and certain businesses don’t want anyone (e.g. constituents and clients) other than themselves to control jurisdiction of: choice (who), privacy (what), and oversight (consent).

The fact that choice, privacy, and oversight, share an overarching bond is not surprising. However, revelation of the allegiance between government and business that supplants this bond should be alarming. Government professes its principle interest to be national security. Business professes its principle interest to be compliance with the law.

For many, global communications networks represent a means to dispossess inefficiencies in knowledge and resource distribution. For a few, they represent a means of pervasive and covert surveillance. Recent disclosures indicate government has broadened its infiltration, while business continues to bolster profits. These fear and greed inspired missions require the few to resist the desires of the many to directly control choice, privacy, and oversight.

Part II of VI: Boundless Greed is a Patron of Bounded Fear – Collaboration

Whether covert government surveillance programs are constitutional and sufficiently proficient to discern nefarious intents is subject (bounded) to adjudication in accordance with democratically established conventions; if necessary, government actions may even be redirected. Understandably, business largely refrains from discussion of its evergreen (boundless) interests in access to client information used for commercial advantages. Both parties consider direct choice, privacy, and oversight to directly controvert their interests.

Neither government nor business is immune to the temptation to potentially know all. No matter the intensity of public protest and histrionics by business regarding government surveillance demands, their corporate behavior disavows the mutual identity of interests they allege with clients. Absent the restraint of direct choice, privacy, and oversight, all knowing has always given rise to attempts to realize more if not total control.

Part III of VI: Fear and Greed are supported by all Network Provider Classes – Facilitation

Service Providers, e.g. Internet Portals, often require users to authorize access to their personal information: email, voice mail, messages, text, tweets, searches, contacts, calendars, photos, and control of location, camera and video recorder functions. Device Providers, e.g. Smartphones and Tablets, and Mobile O/S Providers, are capable of covertly survieiling device resident user data, e.g. fingerprint and pass code files, no matter their protest to the contrary. Resource Providers, e.g. data centers, who store, and process multiple users information, enable broad one-stop attack opportunities. Communications Service Providers, e.g. Cable and Telecos, are meta data treasure troves for interlopers.

Part IV of VI: Fear and Greed Champion Inferior Security Technology – Equivocation

Service and Resource Providers have appointed themselves as trusted-third-parties, to protect client data from others while preserving access for themselves; such access is essentially unrelated to user security. However, access to such information is extremely valuable to Big Data and Analytics enterprises, both are new high margin network centric growth businesses. New Disintermediation services, e.g. transaction providers who require access to users personal credit card and banking information, are actually trusted-third-parties, who also evidence Big Data and Analytics enterprise potential.

Device (OEM) have limited influence regarding security. Mobile O/S Providers are actually the self-appointed trusted-third-parties, who determine with what apps and which service providers privately purchased devices may engage, and what royalty must be paid. This control is only marginally related to user security, but it is central to the gatekeeper strategy of a powerful Mobile Architecture Oligopoly.

It is alleged that Government, to include agencies charged to act as trusted-third-parties of Standards in the public’s interest, conspired to diminish the effectiveness of certain security technology and products. Further, well-known trusted-third-party Communications Service Providers substantially facilitate government’s Surveillance initiatives.

Part V of VI: How to Demystify Fear and Uncloak Greed – Disclosure and Education

While there are a number of impediments to direct control of choice (who), privacy (what), and oversight (consent), several are formidable. Resistance by government and business (inspired by fear and greed) are empowered by strategic denial and tactical silence. User indifference is sustained by lack of appreciation for potentially catastrophic but unintended consequences. Fear and greed can only be demystified and uncloaked by judicious disclosure and sober education. The fourth estate has failed unequivocally in this regard.

Part VI of VI: How to Thwart Fear and Throttle Greed – Technology and Determination

Network Centric tasks and sessions are currently supported by: a Digital Ecosystem e.g. all user classes, infrastructure, devices, apps, and data, and a Digital Monoculture comprised of integrated processes that preserve resource interoperability. Digital Jurisdiction e.g. direct control of choice, privacy, and oversight, requires a security technology breakthrough.

The rapidly advancing capabilities of friends and foe to surveil – where you’ve been and with whom, what you saw, what you said, what you did – and to impersonate you, has inspired ample determination across all user classes: portal, enterprise, small-medium business, and consumers. Insufficiently informed, resistance remains unfocused and easily rebuffed.

 Only User Controlled Jurisdiction can overcome Acquisition, Collaboration, Facilitation, and Equivocation

Affirmation

Affirmation

Timeless and Stateless Power to Invigorate Truth and Deception

Woman was last on a short list of that affirmed as perfect: perfect heavens, perfect earth, perfect man and woman; it would be necessary to expand the list by at least one.

With scant dissent, the global community of physicists and cosmologists agree that the random advent of the heavens and earth has a likeliness of 1 chance in 10, raised to the 10th power, then raised to the 123rd power, e.g. impossible; these specific conditions are essential to sustains life. Frustrated by intractable impossibility, some biologists (short on science) and psychologists (long on induction) now argue that the heavens and earth, like their position regarding the advent of life, are also the products of natural selection.

The former group describes spirituality as a necessary dimension, without concluding inter-dimensionality (confluence of spiritual and natural realms) infers anthropological relationship. The latter group describes spirituality as a contradiction of reason. Advances in quantum science continue to narrow the inter-dimensionality divide, calling into question which group’s claims are more scientific and which are more philosophical. Many openly affirm the relationship between the heavens, earth, and life; they also affirm the obvious discontinuity of their origins. Science can never repudiate truth.

No matter the philosophical defamation of the author of the heavens, earth, and sentient life, the quantum (timeless and stateless) power of affirmation evidences intelligent intent. Affirmation powerfully and uniquely invigorates the mutuality of relationship and companionship. Roused from twilight sleep, man was indelibly imprinted by the comprehensive perfection of his new companion; there was no need to Google her Myers-Briggs type, peruse her Facebook friends, or review her Instagram Red Carpet photos. What some credit to chemistry, others credit to inter-dimensional affirmation.

Man, the corporeal-synaptic enabled guardian of quantum powered affirmation declared, “you are my sentient simpatico, and your curves set all my desires on fire”. The man’s inelegant but affirming words indelibly imprinted the woman. Whether the most gifted or least talented, it remains imperative that a woman adores the her that is her true self. Whether the most powerful or least influential, it remains imperative that a man consider the impact of his words on the abiding love of a woman, and the self-confidence and emotional stability of his offspring. Affirmation indelibly imprints.

The quantum power of affirmation is unambiguous, never straddling the fence; its purview is immutably androgynous, going both ways. Affirmation is as incontrovertible as is its purpose to powerfully invigorate truth. However, the power of affirmation to invigorate deception is incontrovertible and lethal. Affirmation permeates: prohibition and liberty, vision and discouragement, the credible and dubious. Affirmation infuses life-preserving initiative and life-extinguishing disillusion. Absent discernment, aberrant affirmation inspires greed, intransigence and self-righteous conflict.

The slide from perfection began when deception, having its own diabolical source of spiritual inspiration, affirmed fear, jealousy, and ultimately death. Few today recognize the calamitous potential of aberrant affirmation. After each calamity experts routinely determine the callous misadventure to have been circumstantially or environmentally induced. To acknowledge the underlying cause as aberrant affirmation (diabolically inspired words lorded over cultural, political, religious, and economic dependents) infers inter-dimensionality. Any such inference calls into question the incoherent discontinuity argument: estrangement of the origin of the heavens and earth, from the origin of life.

Affirming prohibition and liberty matters. People are actually served and nurtured by transcendently affirmed prohibitions, the scope of which are minuscule when compared to the breathe of transcendently affirmed liberty. Affirming vision and preparation matters. True vision exists in a realm that only spiritual agency can illuminate, whereas preparation is the hands-on and intellectually engaged process by which we overcome circumstances and discouragement. Process and illumination bring the who of you into balance with the what inspired by vision. Inter-dimensionality is transcendent and pragmatic; vision conceived in the spirit must ultimately be gestated in the natural.

Discerning what’s being affirmed, truth or deception, matters most. The truth has its own power, derived from the same point of origin as affirmation; the beneficial yield often lasts a lifetime. While campaigning as a devoted champion of truth, deception only affirms malevolent affections and fraudulent authority; its destructive yield often lasts generations. Those who appreciate the quantum power of affirmation must also recognize the abhorrent consequences of surrendering discernment for the camaraderie and convenience of fashionable orthodoxy.

Parents and teachers, who affirm the nascent and sober interests of children, light a fire difficult for circumstances or adversity to extinguish. Parents and teachers, who affirm children’s foibles as harbingers, suffocate their potential and self-confidence long before signal challenges are encountered. Clergy, who yield to the temptation to affirm social, cultural, and personal points of view without vetting their veracity and doctrinal integrity, pose a serious danger to the laity and themselves.

As it was in the beginning – individuals, businesses, institutions and nations, knowingly abuse the power of affirmation for material gain and psychological control. Abusers abound: e.g. spokespersons and salespersons who fraudulently affirm product and service attributes, politicians and activist who affirm positions for expediency, and institutions that affirm information on the basis of the leverage afforded to them. Polling and referendum pose the latest menace, presuming to affirm an opinion as incisiveness and a narrow majority as an urgent mandate.

Cogent inquiry reveals that what appears to be aberrant affirmation addiction is in reality virulent inter-dimensionality resistance.

A Digital Tipping Point – Chose One and Lose the Other, or Inovate (Part 1 of 3)

PART 1 OF 3: A DIGITAL TIPPING POINT – CHOSE ONE AND LOSE THE OTHER, OR INNOVATE

The security requirements (cloaking) of next generation Virtualization are antithetical to the security requirements (covert visibility) of Surveillance

PRESERVING SURVEILLANCE AT THE EXPENSE OF NETWORK CENTRIC ADVANCES: The government has determined that various threats to national security require timely surveillance of certain digitally articulated data and information. It has granted to the National Security Agency (NSA) authority to capture, analyze, and retain specific digitally articulated metadata (“outside of the envelope”), and presumably under court monitored guidelines, the information (“inside the envelope”, e.g. email, voice mail, instant messages, and text) of certain individuals and entities. This is a challenging assignment for NSA, who many consider the most competent surveillance organization in the world.

The impact of certain threats that many (government, business, and public) face today, and the debilitating fears they can elicit, are not new in the human experience. However, the ability of so few, to bring unprecedented anguish and catastrophe (assault, espionage, interloping, piracy, and subversion) to bear on so many is new. The knowledge and efficiency with which the few operate today, derives substantially from the same proficient Digital Ecosystem that delivers so much benefit. Provided new substantially more capable security technology, it will deliver ultra-secure virtualization (on-demand access to digital resources, services, applications, strategic-bit-torrents, edge-of-network-cache, and single-use-intranets), leveling the global digital playing field.

Current Surveillance technology and operations are conflicted with Virtualization

SIMILAR CAPABILITY – DIFFERENT OBJECTIVES: National Security Agency (NSA) contract employee Edward Snowden’s disclosure of the federal governments Planning Tool for Resource Integration, Synchronization, and Management (“Prism” system), used to facilitate covert surveillance and collection of foreign intelligence information was an egregious breach of trust. In contrast, similar systems are being used by commercial service providers, unscrupulous competitors, foreign sovereigns and their multi-national companies, to covertly access the digitally articulated personal and proprietary information of global institutions, businesses, and consumers (“Mining” programs).

These revelations bring to light serious concerns regarding privacy as it relates to both national security practices, and protection of US citizens and businesses proprietary information. The notion that “going dark” (privacy) dangerously impairs national security repudiates advances in covert location, contact, confederate, and dossier technology.

The Digital Ecosystem can’t differentiate Nefarious from Principled Users or Usages

IRREFUTABLE TECHNICAL CONFLICT: User-controlled-cloaking, and covert-visibility are critical to virtualization and surveillance respectively. Both are strategically compatible in that they can provide personal, commercial, and national security benefits. However, the means by which each is presently enabled are irrefutably technically incompatible. Red and blue administrations, corporate, institutional, and thought leaders, along with millions who take privacy and security for granted, presume the only issues related to surveillance are who, what, when, and why.

The Elephant in the room is How to enable both Virtualization & Surveillance

IRREFUTABLE OPERATIONAL CONFLICT: Network centric application service “providers” such as Apple, Google, Microsoft, Yahoo, and Facebook, often act as trusted-third-parties (TTP) of their customer’s personal and proprietary (private) information, as often do communications service providers such as ATT, Verizon, Comcast, and Time Warner. The current national-security-operating-model allows the courts to legally compel such TTP to covertly (without the customer’s knowledge) produce their customer’s private information. Nevertheless, many providers’ business models rely on even more customer private information than that sought by the government. Their exploitation of client information (revealed in the fine print and authorized by insufficiently sophisticated customer’s) is for all intents and purposes “clandestine”.

The Customer’s Info is Mine to mine – I may provide/sell the Customer’s Info to Others

IRREFUTABLE LOSS OF CUSTOMER CONFIDENCE: Questions arising from operational conflicts abound: When better informed about the nature and extent of sharing and mining of their private information for national security or commercial purposes respectively, will customers snap with outrage from their current state of hopeful reliance, and what other choices will they have? Will the compromise of their customer’s private information, even in accordance with lawful national security initiatives, provide sufficient “cover” against customer backlash? What unintended consequences will the accumulation of increasingly large caches of proprietary business and personal information (enabled by third-party-controlled security) foment in the years to come? When these providers bring to market next generation virtualization capabilities, will they have sufficient customer credibility to again be called upon as trusted-third-parties?

Only Customer-Managed Security can interdict Covert/Clandestine access of Client Data

CONSENT DOESN’T CONNOTE RESOLUTION: Consent has no impact on resolving technical and operational conflicts, nor does it reflect likely customer privacy preferences. Nevertheless, the government believes national security interests out weigh the needs of institutions, businesses, and the public for privacy, which is fundamental to virtualization.

Confident of the beneficial impact of covert surveillance on national security objectives, legislators have provided NSA the funding, and the courts have confirmed its actionable authority under the 1978 Foreign Intelligence Surveillance Act (FISA), supported particularly in cryptography by the Invention Secrecy Act (ISA) of 1951. Nevertheless, the lawful consent of the Courts, and the silent consent of the People who retain limited expectations of privacy and limited awareness of likely collateral consequences, do not materially impact the conflict induced by surveillance technology and its operating model.

VIRTUALIZATION WILL FORCE CHOICE OR INNOVATION: The well-documented failures and limitations of current security technology (e.g. hybrid cryptography, forensics, and analytics) compel a fundamental new security technology breakthrough. It must be capable of securing the entire digital ecosystem (terrestrial and wireless network connected users, platforms, devices, apps, data, and content), while enabling ultra secure free-agent virtualization (the ability to choose from among many efficient and cost competitive remote providers from task-to-task and session-to-session, and on-demand single-use-intranets compatible with existing Internet infrastructure). The technology must also enable expeditious administration and collaborative oversight of surveillance.

Institutions, Business, and Consumers may not always agree to subordinate the powerful benefits & value of Virtualization in favor of the current Surveillance model