[Un]Sanctioned Citizen

VIGNETTE: Governments Pay for Identified Publics


Listen Later

THE RUSH TO HUSTLE

Below is a headlight beam examples of global governments, some with information sharing agreements with both China and the U.S. (Britain), incentivizing a run to collect identity data and train AI clandestinely on real identity processing, in online companies browsers, payment systems and “for child safety”.

Some of it will look like an amplification or incentive rush to get people enrolled in travel Visas before a crushing restriction or being priced out.

UK Expands Hong Kong Visa Scheme After Jimmy Lai Sentencing

Others are bids to ‘modernize’ systems that have failed repeatedly to protect enrolled identities like, India’s biometric identity systems.

India makes Aadhaar more ubiquitous, but critics say security and privacy concerns remain

Yet others, simply deprecate government conventions to protect information security so transit vulnerabilities seem unenforceable and the unfair appears fair, when it’s clearlt still an unfair process where consumer interests are disregarded.

OMB Rescinds Biden-Era Software Security Requirements, Directs Agency-Led and Risk-Based Approach

Yet most of the rush to identify-us-all is driven by a misplaced threat appropriation for child safety per application or per Internet company. As I have advocated in the past, make the parent mobile telecomm provider account process age gatekeeping at the point of sale for devices and register them to the parent with a child registered account. T-Mobile, Verizon etc. can age-lock any device so that iOS or Android are prohibited from installing apps that are for adults. App providers won’t be able to market push or install Pr0nhub, image capture manipulation software or VR software, like the Roblox Metaverse, or any app where children and their data are not safe.

Safer Internet Day: Assuring age while ensuring privacy

When you place the per-app approach, irresponsible app manufacturers who do not care about securitized environments, or who has access to your kids, will also be collecting your kids most sensitive information in “child-safety gatekeeping”. They won’t: keep it safe, classify child data securely or be cautious with it. We know because these are the same app developers who are hacked at least two times a year. WOOPSIE!! Oh well… you’re kids data was in there? Sorry about that!!

Discord to Demand Face Scan or ID to Access All Features

The most invalidating of all these schemes are bids taking taxpayer funds to increase the pot to develop identity and “propriety” schemes for any grant maker, including foreign policy and intelligence agencies, who launder their approach to manufacture an ID requirement or a sanctions capability for a routine payment system.

NIST Awards Over $3 Million to Small Businesses Advancing AI, Biotechnology, Semiconductors, Quantum and More

Operational technology artificial intelligence NIST Compliance Tool (OTAI-NCT): The OTAI-NCT tool evaluates the cybersecurity practices of hardware and software manufacturers to produce a cyber-hygiene score that consumers can use to make informed purchasing decisions. The tool, which uses authoritative data sources such as the National Vulnerability Database (NVD), CISA’s Known Exploited Vulnerabilities Catalog and other publicly available datasets, will empower users while helping to safeguard national security and public safety.

It can really cut either way. The offices at CISA were used to monitor thought crime too, during the pandemic. They now bear the burden to prove this won’t be used to sanction businesses who step out of line politically by abusing a consumer scoring system. If we are being honest, the censor-surveillance-to-sanction vehicle never really went away from a foreign policy posture.

House Judiciary Committee Reveals EU Censorship of Americans

The only thing that would be better, for them, is if you would perform the mass surveillance minding on behalf of the government, as a non-paid volunteer. Google’s Ring camera system can be weaponized by anyone: a sewing circle of mommies, foreign governments, a super-vigilante ring of criminals run by a narcissistic cult leader, a drug cartel… anyone. Anyone can make basic privacy meaningless, as long as Google is supplying the tech.

With Ring, American Consumers Built a Surveillance Dragnet

Now that we are at the end of today’s feel-bad tour of covertly manipulative technologies, we come back to you. You bear the burden of explaining repeatedly and how ever often it necessitates, when your hackles are reached that they have gone over a line. That line can be a foreign policy line: you aren’t their citizen. That line can be a photo capture line for you or your family, ‘You didn’t ask permission for that photo. We own all the Name Image and Likeness. Take us out of your data query’.

Liberty in Many Directions is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit sheilamdean.substack.com/subscribe
...more
View all episodesView all episodes
Download on the App Store

[Un]Sanctioned CitizenBy Sheila Dean