Menu
News
All News
Dungeons & Dragons
Level Up: Advanced 5th Edition
Pathfinder
Starfinder
Warhammer
2d20 System
Year Zero Engine
Industry News
Reviews
Dragon Reflections
Columns
Weekly Digests
Weekly News Digest
Freebies, Sales & Bundles
RPG Print News
RPG Crowdfunding News
Game Content
ENterplanetary DimENsions
Mythological Figures
Opinion
Worlds of Design
Peregrine's Next
RPG Evolution
Other Columns
From the Freelancing Frontline
Monster ENcyclopedia
WotC/TSR Alumni Look Back
4 Hours w/RSD (Ryan Dancey)
The Road to 3E (Jonathan Tweet)
Greenwood's Realms (Ed Greenwood)
Drawmij's TSR (Jim Ward)
Community
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Resources
Wiki
Pages
Latest activity
Media
New media
New comments
Search media
Downloads
Latest reviews
Search resources
EN Publishing
Store
EN5ider
Adventures in ZEITGEIST
Awfully Cheerful Engine
What's OLD is NEW
Judge Dredd & The Worlds Of 2000AD
War of the Burning Sky
Level Up: Advanced 5E
Events & Releases
Upcoming Events
Private Events
Featured Events
Socials!
Twitch
YouTube
Facebook (EN Publishing)
Facebook (EN World)
Twitter
Instagram
TikTok
Podcast
Features
Top 5 RPGs Compiled Charts 2004-Present
Adventure Game Industry Market Research Summary (RPGs) V1.0
Ryan Dancey: Acquiring TSR
Q&A With Gary Gygax
D&D Rules FAQs
TSR, WotC, & Paizo: A Comparative History
D&D Pronunciation Guide
Million Dollar TTRPG Kickstarters
Tabletop RPG Podcast Hall of Fame
Eric Noah's Unofficial D&D 3rd Edition News
D&D in the Mainstream
D&D & RPG History
About Morrus
Log in
Register
What's new
Search
Search
Search titles only
By:
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Menu
Log in
Register
Install the app
Install
Community
General Tabletop Discussion
*Geek Talk & Media
Tolkien vs. Orwell: Who understood modern surveillance best (article)
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Janx" data-source="post: 6162418" data-attributes="member: 8835"><p>Well, that's kind of like how Dork Tower points out how Gandalf doesn't really have any power when all his in-book action is mapped to the RPG the group is playing.</p><p></p><p>Speaking to the 3rd point of the article, the volume of data generated by humans is really high. High enough that banks only store your last 3 months on the server for the web-banking to show your transactions because performance is too slow otherwise. All your older data is replicated to slower/cheaper storage in case there's a need for it.</p><p></p><p>As such, it is improbable with current technology that the NSA can handle "everything" being shoved at it. It's too much data to receive, store or query through. Additionally, each source will use a different format. You can't just write a query to read phone records, you've got to write a query to read AT&T phone records. And then you'll find those idiots didn't follow their own standard and there will be bad data or incomplete fields. Once you get that mapping done, the specification will have changed, and you've still got 3 other vendors to resolve mapping on their data imports as well.</p><p></p><p>Whats more useful is for each business entity to be required to keep records of their own transactions. When a crime happens, a search warrant gets issued and the cops get access to any data where their criminal appears and any data down the tree from that. That's how you find out the Mad Bomber What Bombs At Midnight was talking to his Mr. Johnson last week, and find who Mr. Johnson was getting his orders from.</p><p></p><p>There are some technologies for data analysis on rapidly streaming feeds (ex. oil wells deliver a mountain of data every second) that triggers can be written to send alerts on. That kind of thing could potentially be used to "spot bad people doing bad things" if their behaviors were something you could detect in the feeds. </p><p></p><p>But that would require actually getting feeds from the appropriate businesses. There are some fat internet pipes in america, but to really do it "Person of Interest" style, would effectively mean the NSA would need a pipe as big as all the bandwidth in the world, so every server could send a replica of their data over to them, without impacting their day to day bandwidth.</p><p></p><p>In other implementations, there have been wiring closets with black boxes installed under NDA and forgotten about, walled off and rediscovered during a remodel or network traffic scan. Allegedly, some of those boxes were installed to scan traffic and send info back to a 3 letter organization. The discovery by network traffic monitoring is usually the most entertaining because these devices were using the companies' own pipe to relay their data, and somebody not in the know, but in authority finds them through routine due diligence checking of unexplained network utilization. Other than that, the technical advantage is the scope of the data monitoring is limited to within one company, and the output doesn't have to be "everything", only flagged data or alerts to come back with a real search of their data.</p></blockquote><p></p>
[QUOTE="Janx, post: 6162418, member: 8835"] Well, that's kind of like how Dork Tower points out how Gandalf doesn't really have any power when all his in-book action is mapped to the RPG the group is playing. Speaking to the 3rd point of the article, the volume of data generated by humans is really high. High enough that banks only store your last 3 months on the server for the web-banking to show your transactions because performance is too slow otherwise. All your older data is replicated to slower/cheaper storage in case there's a need for it. As such, it is improbable with current technology that the NSA can handle "everything" being shoved at it. It's too much data to receive, store or query through. Additionally, each source will use a different format. You can't just write a query to read phone records, you've got to write a query to read AT&T phone records. And then you'll find those idiots didn't follow their own standard and there will be bad data or incomplete fields. Once you get that mapping done, the specification will have changed, and you've still got 3 other vendors to resolve mapping on their data imports as well. Whats more useful is for each business entity to be required to keep records of their own transactions. When a crime happens, a search warrant gets issued and the cops get access to any data where their criminal appears and any data down the tree from that. That's how you find out the Mad Bomber What Bombs At Midnight was talking to his Mr. Johnson last week, and find who Mr. Johnson was getting his orders from. There are some technologies for data analysis on rapidly streaming feeds (ex. oil wells deliver a mountain of data every second) that triggers can be written to send alerts on. That kind of thing could potentially be used to "spot bad people doing bad things" if their behaviors were something you could detect in the feeds. But that would require actually getting feeds from the appropriate businesses. There are some fat internet pipes in america, but to really do it "Person of Interest" style, would effectively mean the NSA would need a pipe as big as all the bandwidth in the world, so every server could send a replica of their data over to them, without impacting their day to day bandwidth. In other implementations, there have been wiring closets with black boxes installed under NDA and forgotten about, walled off and rediscovered during a remodel or network traffic scan. Allegedly, some of those boxes were installed to scan traffic and send info back to a 3 letter organization. The discovery by network traffic monitoring is usually the most entertaining because these devices were using the companies' own pipe to relay their data, and somebody not in the know, but in authority finds them through routine due diligence checking of unexplained network utilization. Other than that, the technical advantage is the scope of the data monitoring is limited to within one company, and the output doesn't have to be "everything", only flagged data or alerts to come back with a real search of their data. [/QUOTE]
Insert quotes…
Verification
Post reply
Community
General Tabletop Discussion
*Geek Talk & Media
Tolkien vs. Orwell: Who understood modern surveillance best (article)
Top