Notes

Do Big Data and SSRIs equal MK Ultra?

Big Data is the term used for massive amounts of data that can be collected from any source and held in the cloud. The raw data is called 'unstructured data', while once indexed, it becomes 'structured data'.

Current global cloud security firms operate their threat identification AI on Big Data pools, that while often provided by the customer (employee status and role lists), are in no way limited to them. There are Big Data services, data brokers, that do nothing but use their AI to scrape the 'supposedly' public only data and compile a database to be accessed for a nominal monthly fee. Consider the email lists, property and criminal records, purchasing history, and reverse phone lookup services we can access as private consumers and realize that is only the tip of the iceberg of these Big Data databases. For example, the ATF has recently been using these public services via credit card companies to circumvent national gun registry restrictions.

Think about all the free psychological profile games on social media. Which Harry Potter character are you? What items can you check on the list that you have done? Who would spend money to create and support these games? How much of our societal demographics can be gleaned from our answers? How do you train an AI?

Most of the readers here are aware of the dangers of social media and of the cultural "nudging" by Main Stream Media. We have seen the censorship, the shadow-banning, deplatforming, and the exclusive promotion of the approved MSM narratives. Tristan Harris with "The Social Dilemma" in 2020 and Shoshana Zuboff with "Surveillance Capitalism" in 2014 were both whistleblowers on the pervasive intrusion of Big Tech manipulation. Shoshana was shadow-banned nearly off the internet. From search engine biases, the sale of our personal information, to the ubiquitous use of AI to identify and manipulate the target audiences, we have seen how quickly AI advances. It goes without saying that the three major AI that The Social Dilemma referenced will have grown exponentially over the years. I am also certain that there are more than three major AI involved in social media now. Have you heard of one of the oldest AI, Wallstreet's Aladdin? How do Naked Shorts and Dark Money work after hours?

So, once the Big Data is collected how is it used? First, cyber threat analysis, such as someone trying to gain unauthorized access to a corporate or government client's sensitive data, or worse attempting to download it. Second, identification of an employees' activity like searching for a new job. Lastly, an outside cyber attack, such as an attempted phishing or port scan for nefarious ends like ransomeware.

The above are all the main, publicly touted benefits of Big Data. These apply to governments, government agencies, banking institutions and all major corporations like Amazon.

As of last year, the SLA (Service Level Agreement, which is to say, the expected terms of services purchased and penalties for failure to comply) for identifying a threat was 3 nanoseconds.

Let me say that again, 3 nanoseconds. In that 3 nanoseconds, not only is aberrant behavior identified, but also includes all of the following:

1. Who (name, employee ID, logins, ports, emails).

2. What (What was being accessed)

3. Where (where were they accessing from, which includes IP and likely physical location of the event, and also the work address and listed private addresses of the suspected offender).

4. When did the infraction occur (GMT).

5. How (how were they accessing the data)

6. Why (This category comes later and is not necessarily part of the SLA, but generic answers are often obvious and suggested (employment, theft, etc.)

All of the above are provided in under 3 nanoseconds, with a target of 1 nanosecond. A breach of the SLA, i.e. going over 3 nanoseconds typically cost the security firm a penalty in the form of tens of thousands of dollars ($40k was common) PER breach.

1
Like
2
replies
0
Restacks