{"id":1085,"date":"2016-01-23T19:51:11","date_gmt":"2016-01-23T19:51:11","guid":{"rendered":"http:\/\/memecon.info\/?p=1085"},"modified":"2018-05-18T07:42:44","modified_gmt":"2018-05-18T07:42:44","slug":"creating-controllability-step-by-step","status":"publish","type":"post","link":"https:\/\/www.memecon.info\/?p=1085","title":{"rendered":"Creating controllability step by step"},"content":{"rendered":"<p>A utopia of total control was described again and again in books and movies. Think about 1984 by George Orwell, where Big Brother has control of the most private spheres of life. Or remember Fahrenheit 451 by Ray Bradbury, in which the possession or reading of books is legally forbidden and where the pervasiveness of the mass media in private life is well illustrated. These conceptions of the future that are shown in many science fiction stories provide an unattractive end state that was surely not developed at one go, but gradually. The required bases for such scenarios do not evolve from one day to the other. The whole begins completely innocently, by creating the controllability step by step.<\/p>\n<p><a href=\"http:\/\/memecon.info\/wp-content\/uploads\/2016\/01\/Ueberwachung.jpg\" rel=\"attachment wp-att-1086\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1086\" src=\"http:\/\/memecon.info\/wp-content\/uploads\/2016\/01\/Ueberwachung.jpg\" alt=\"Ueberwachung\" width=\"835\" height=\"641\" srcset=\"https:\/\/www.memecon.info\/wp-content\/uploads\/2016\/01\/Ueberwachung.jpg 835w, https:\/\/www.memecon.info\/wp-content\/uploads\/2016\/01\/Ueberwachung-300x230.jpg 300w, https:\/\/www.memecon.info\/wp-content\/uploads\/2016\/01\/Ueberwachung-768x590.jpg 768w, https:\/\/www.memecon.info\/wp-content\/uploads\/2016\/01\/Ueberwachung-624x479.jpg 624w\" sizes=\"auto, (max-width: 835px) 100vw, 835px\" \/><\/a><\/p>\n<p>The utopias provide only scrappy ideas, if at all, how these controls are created. The following steps show a possible scenario.<\/p>\n<ol>\n<li><strong>Develop appealing offerings<br \/>\n<\/strong>Everything starts with the technical feasibility. New products and services provide attractive solutions that are becoming by and by affordable for most of the consumers. With the television the unidirectional connection of spectators began. Broadcasts were sent from one sender to many receivers. With the Internet we have the bi-directional connection between many senders and many receivers. In this case there is also data transmitted that does not serve the actual purpose (e.g. duration, frequency and the interests of the users). On this basis further applications are possible, like the navigation system, cashless payment or the electronic passport. These applications transfer more and more confidential data.<br \/>\nThe users are thereby bound into the future control system, without being aware, how much they reveal about themselves.<\/li>\n<li><strong>Free use through advertisement and handing over data<br \/>\n<\/strong>For high prevalence more and more free or at least cheap offers are made that are \u201cpaid\u201d with the supply of data. The users cannot determine, which data is getting exchanged with the data release or the regular update of the app.<br \/>\nFor data fisher men, like the global secret services, it is a smart approach to develop an attractive software that supplies them directly with the appropriate information.<\/li>\n<li><strong>Creating laws and regulations<br \/>\n<\/strong>This procedure becomes legal by explicitly confirming the terms and conditions of an app by the users &#8211; without this confirmation one would not get the software. One suggests security to the citizens by limiting the duration of the data storing and, for example, the necessity for a judicial decision for using the data. This is raising the question, which spies would have ever been made responsible for their illegal bugging and monitoring actions. This makes the juridical question questionable.<br \/>\nThe apparent rule of law is pure sham, as long as national borders and the nearly impossible control of their activities as well as the national self-interests provide the operators sufficient free space.<\/li>\n<li><strong>Facilitating exhaustive tracking<br \/>\n<\/strong>We weave today inadvertently a close meshed net of our behavior with the introduction of mobile offers, like the mobile phones, computers, navigation systems, location-dependent services and applications for detecting vehicles and packages as well as our individual browsing behavior. And everything can be found in the data storages of the Cloud. Calling a competitor of your employer by phone and the download of internal documents and the trip to this enterprise permit already nowadays unpleasant conclusions.<br \/>\nThe infrastructure is already there. As soon as unscrupulous persons receive the access, we are in a still more terrible 1984.<\/li>\n<li><strong>Abolish alternative offers<br \/>\n<\/strong>In order to guarantee all this it is helpful that alternative behaviors are no longer available. With the conversion of payphones from coins to calling cards it is any more possible to phone, without storing the connection details. The abolishment of cash, as it is getting real in Scandinavia, makes it impossible to pay, without having the payment documented. The electronic passport guarantees that all border crossings can be evaluated.<br \/>\nAs soon as those aspects of our everyday life are virtualized, everything is in the hand of those, who have control of this system.<\/li>\n<\/ol>\n<p>This is nota re-narration of 1984, but a list of steps that lead to a pervasive monitor. With a close look, we will recognize that we let these steps already behind us in those regions of the world, where constant supply of electricity and information already exists. Occasional attempts to use these channels with appropriate filters for censorship leak out. This is not a classical end time scenario of conspiracy theoreticians, but our current reality. With the divulgence of governmental secrets by Snowdon, we had to learn that our fantasy is not big enough, in order to be able to imagine the current practices.<\/p>\n<p>Bottom line: We already overhauled the utopia of George Orwell with today&#8217;s technical possibilities. The controllability of all people is technically possible today. If the scruples of those, who have the control, continue to disappear or control is taking over by a strong power, we will be in the position of Winston Smith &#8211; only with drastically expanded consequences.<\/p>\n<div class=\"shariff shariff-align-left shariff-widget-align-left\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button xing shariff-nocustomcolor\" style=\"background-color:#29888a\"><a href=\"https:\/\/www.xing.com\/spi\/shares\/new?url=https%3A%2F%2Fwww.memecon.info%2F%3Fp%3D1085\" title=\"Bei XING teilen\" aria-label=\"Bei XING teilen\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#126567; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 25 32\"><path fill=\"#126567\" d=\"M10.7 11.9q-0.2 0.3-4.6 8.2-0.5 0.8-1.2 0.8h-4.3q-0.4 0-0.5-0.3t0-0.6l4.5-8q0 0 0 0l-2.9-5q-0.2-0.4 0-0.7 0.2-0.3 0.5-0.3h4.3q0.7 0 1.2 0.8zM25.1 0.4q0.2 0.3 0 0.7l-9.4 16.7 6 11q0.2 0.4 0 0.6-0.2 0.3-0.6 0.3h-4.3q-0.7 0-1.2-0.8l-6-11.1q0.3-0.6 9.5-16.8 0.4-0.8 1.2-0.8h4.3q0.4 0 0.5 0.3z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.memecon.info%2F%3Fp%3D1085\" title=\"Bei LinkedIn teilen\" aria-label=\"Bei LinkedIn teilen\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button facebook shariff-nocustomcolor\" style=\"background-color:#4273c8\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.memecon.info%2F%3Fp%3D1085\" title=\"Bei Facebook teilen\" aria-label=\"Bei Facebook teilen\" role=\"button\" rel=\"nofollow\" class=\"shariff-link\" style=\"; background-color:#3b5998; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 32\"><path fill=\"#3b5998\" d=\"M17.1 0.2v4.7h-2.8q-1.5 0-2.1 0.6t-0.5 1.9v3.4h5.2l-0.7 5.3h-4.5v13.6h-5.5v-13.6h-4.5v-5.3h4.5v-3.9q0-3.3 1.9-5.2t5-1.8q2.6 0 4.1 0.2z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button flipboard shariff-nocustomcolor\" style=\"background-color:#373737\"><a href=\"https:\/\/share.flipboard.com\/bookmarklet\/popout?v=2&title=Creating%20controllability%20step%20by%20step&url=https%3A%2F%2Fwww.memecon.info%2F%3Fp%3D1085\" title=\"Bei Flipboard teilen\" aria-label=\"Bei Flipboard teilen\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#f52828; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"24px\" height=\"24px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\"><path fill=\"#f52828\" d=\"M0 0h8v24H0V0zm9 9h7v7H9V9zm0-9h15v8H9V0z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button twitter shariff-nocustomcolor\" style=\"background-color:#595959\"><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.memecon.info%2F%3Fp%3D1085&text=Creating%20controllability%20step%20by%20step\" title=\"Bei X teilen\" aria-label=\"Bei X teilen\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#000; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\"><path fill=\"#000\" d=\"M14.258 10.152L23.176 0h-2.113l-7.747 8.813L7.133 0H0l9.352 13.328L0 23.973h2.113l8.176-9.309 6.531 9.309h7.133zm-2.895 3.293l-.949-1.328L2.875 1.56h3.246l6.086 8.523.945 1.328 7.91 11.078h-3.246zm0 0\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>A utopia of total control was described again and again in books and movies. Think about 1984 by George Orwell, where Big Brother has control of the most private spheres of life. Or remember Fahrenheit 451 by Ray Bradbury, in which the possession or reading of books is legally forbidden and where the pervasiveness of the mass media in private life is well illustrated. These conceptions of the future that are shown in many science fiction stories provide an unattractive end state that was surely not developed at one go, but gradually. The required bases for such scenarios do not evolve from one day to the other. The whole begins [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[35,4],"tags":[1000,1003,214,1004,1002,1005,1001],"class_list":["post-1085","post","type-post","status-publish","format-standard","hentry","category-culture","category-english","tag-1000","tag-free-use","tag-infrastructure","tag-laws","tag-offerings","tag-tracking","tag-winston-smith"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.memecon.info\/index.php?rest_route=\/wp\/v2\/posts\/1085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.memecon.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.memecon.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.memecon.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.memecon.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1085"}],"version-history":[{"count":0,"href":"https:\/\/www.memecon.info\/index.php?rest_route=\/wp\/v2\/posts\/1085\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.memecon.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.memecon.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.memecon.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}