Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Posted on June 12, 2013. Filed under: American History, Blogroll, College, Communications, Computers, Demographics, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, History of Economic Thought, Investments, IRS, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, People, Philosophy, Politics, Programming, Psychology, Raves, Strategy, Tax Policy, Taxes, Unemployment, Video, War, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , |

microtargeting

microtargeting-voter_lifestyle_social_media

National-Media-analysis-of-undecided-voters-media-habits

data-mining-algorithms

Data Mining

big-data-mining

obama_biden

Maxine Waters Confirms “Big Brother” Database 2013

Maxine Waters (D) Slip of the Tongue Reveals True Intentions (Socialism for America)

Obama’s secret microtargeting operation

Campaigns admit to data mining

During campaigning, candidates are going to great lengths to find out about residents. Both presidential campaigns admit to tracking everything you do online.

Obama’s win: data mining

How We Used Data to Win the Presidential Election

Dan Siroker, of the Obama Campaign and CarrotSticks, describes how the campaign used data to win the presidential election. He shares the lessons his team learned along the way and how one can apply them to any data-driven decision one needs to make — whether it be in developing, designing, or even marketing.

Can You Replicate the Obama Strategy? | The New School for Public Engagement

Political campaigns have revolutionized the way they target, contact and motivate supporters. Strategists are taking the insights of experimental social science and marrying them to the corporate world’s Big Data marketing tools. The Obama Campaign won in large part by using statistical modeling techniques to identify persuadable voters and to fine-tune persuasive messages. This is politics today and in the future—not only for elections but on issue campaigns for education reform, health care, the environment, labor rights and beyond. Who are the pioneers? And how might you apply their the strategies?

Strata 2013: Sasha Issenberg, “The Victory Lab”

The Victory Lab: ‘Moneyball for Politics'” Sasha Issenberg

A Conversation with Sasha Issenberg

Sasha Issenberg discusses the 2012 Obama campaign

Sasha Issenberg discusses the use of social science experiments in Rick Perry’s 2006 campaign

Political Checklist: Frontline Looks at Digital Campaigns

Frontline: The Digital Factor in Election 2012

Frontline: How Much Do Digital Campaigns Know About You?

FRONTLINE  The Digital Campaign

http://video.pbs.org/video/2295038658

RNC/DNC Collecting Your Info En Masse

Microtargeting

About Aristotle

Who Works for Aristotle?

Better Data

Precision of Information in a Campaign

Aristotle Testimonial – Paul Kilgore

Aristotle 360 – Dashboard and Home Page

Aristotle 360 – Dashboard

Aristotle 360 – Power Tools for Politics

Aristotle 360 – Creating Records

Webinar – Aristotle 360 General Training

Webinar – Political Campaign Fundraising with Aristotle 360

Use Voter Data for a Smart Political Campaign

‘Big Brother’ is watching, in sophisticated digital ways

By Gitte Laasby

Town of Mukwonago voter Priscilla Trulen is used to ignoring political solicitations. For weeks, she’s been receiving three political robocalls per day related to the presidential election. On Thursday, she got seven.

But one call she got on Halloween still haunts her. It was a recorded message read by a presidential candidate trying to get her to vote.

“It was Mitt Romney saying, ‘I know you have an absentee ballot and I know you haven’t sent it in yet,’ ” Trulen said in an interview. “That just sent me over the line. Not only is it like Big Brother. It is Big Brother. It’s down to where they know I have a ballot and I haven’t sent it in! I thought when I requested the ballot that the only other entity that would know was the Mukwonago clerk.”

Trulen isn’t the only voter among Wisconsin’s much-courted electorate who is getting creeped out by the political campaigns’ unprecedented, uncanny ability to micro-target voters who are likely to vote for their candidate.

In Brown County, residents are unnerved about “voter report cards” from Moveon.org that show the recipients how their voting participation compares to those of their neighbors.

The solicitations give only a small glimpse into how much digital information the campaigns are able to access about voters.

For years, campaigns have requested the statewide voter registration list, which is subject to public information requests.

The database contains the names and addresses of active voters who are registered and able to vote, as well as inactive voters who are ineligible to vote because they have passed away, moved out of state or committed a felony, or people who need to re-register to be eligible, said Reid Magney, public information officer with the Wisconsin Government Accountability Board.

The list also contains information that the state does not release, for instance people’s birth dates, driver’s license numbers and phone numbers.

“It’s typical for both parties, or individual candidates, to be making public records requests from the clerks. And it’s perfectly legal,” Magney said. “This information is public so there’s transparency in our elections. . . . Except for how you vote, there really are no secrets.”

The state database also contains information on absentee voters. The state’s 1,851 municipalities are required to account for military and overseas absentee ballots both before and after the election, Magney said. Municipalities don’t have to report to the state whether regular absentee ballots such as Trulen’s have been returned until the election is over. However, some municipalities, including the Town of Mukwonago where Trulen lives, report to the state database as they go whether those ballots have been returned. Most likely, that’s how the Republican campaign found out Trulen received an absentee ballot.

“There’s nothing confidential as far as, ‘Did so and so vote?’ ” said Kathy Karalewitz, administrative clerk treasurer with the town. “As far as how they vote, yes.”

Requesters can also request information related to absentee ballots directly from the municipalities, although that’s more cumbersome and labor intensive.

The cost of the entire state database is $12,500. Four requesters have been willing to pay that since Sept. 1, Magney said: Catalist (a progressive voter database organization), the Democratic National Committee, and data analysis firm Aristotle – all based in Washington, D.C. The last requester was Colorado-based Magellan Strategies, a firm that specializes in “micro-targeting” for Republican parties and candidates.

Another 200 requests have been made since Sept. 1 for smaller portions of the database, Magney said.

Crunching the numbers

But what really enables the campaigns to “slice and dice” the electorate down to individual voters is that the voter list is correlated with a slew of other information designed to predict voting behavior and issues that the voter would care about.

In an interview with PBS that aired in October, Aristotle’s chief executive officer, John Phillips, said the company keeps up to 500 data points on each voter – from the type of clothes they buy, the music they listen to, magazines they read and car they own, to whether they are a NASCAR fan, a smoker or a pet owner, or have a gold credit card. Some of that information comes from commercial marketing firms, product registration cards or surveys. Other information is obtained through Facebook, door-to-door canvassing, petitions and computer cookies – small data codes that register which websites the user has visited.

Through data modeling, analyzers can categorize voters based on how they feel about specific issues, values or candidates. They then try to predict voting behavior and figure out which issue ads voters are most likely to be susceptible to – for instance ads on education, gun control or immigration.

One of the companies that requested the full Wisconsin voter database, Magellan Strategies, explains on its website that it conducts surveys on people’s opinions and merges that with their political, consumer and census demographics.

“By correlating respondents’ demographics to the demographics of the whole voting district, we can make predictions about the voting preferences of each voter in the district,” the site states.

The company also states why the strategy is so popular.

“Microtargeting enables campaigns to send targeted messages to voters who are very receptive to those messages,” the website states. “Microtargeting allows for the most cost effective voter targeting programs, for voter persuasion or get-out-the-vote.”

According to its website, Magellan has conducted microtargeting since 2008.

A little extra effort is required to determine party affiliation in Wisconsin which, contrary to other states such as California, does not register people to vote by party.

The last piece of the puzzle is the phone number, which is not available through the government, but easily found in a phone book or located in online databases, sometimes free of charge.

Nathan Conrad, a spokesman for the Republican Party of Wisconsin, did not respond to a request for comment on how the campaign obtained Trulen’s digits. Graeme Zielinski, a spokesman for the Democratic Party of Wisconsin, did not respond for requests on how his party obtains phone numbers either.

As for Trulen, she just wishes she could find a way to make the calls stop.

“It’s alarming to me,” she said. “It’s just not right. . . . It’s like you can feel the tentacles creeping into your house under your door.”

The calls to Trulen were likely part of the GOP’s effort to get out the vote in what the party considers one of its strongest counties. Waukesha County is traditionally a Republican stronghold, just as Milwaukee tends to go for Democrats.

The irony is that the robocallers apparently haven’t figured out Trulen is actually a minority in her county: She has been voting Democratic.

Big Brother

Political campaigns can obtain nearly unlimited information about people through commercially available databases. Here’s what information they can, and can’t, learn about you from public records related to voting:

Public (obtainable)

Your name, address, gender and race

Which elections you voted in, going back to 2000

Whether you have requested an absentee ballot and whether you have sent it in.

Private (redacted)

Whom you voted for

Your date of birth

Your Social Security number, and any part of it

Your driver’s license number

Your phone number (if officials remember to redact it before they release your registration to anyone who asks.)

Online

For more on the information that campaigns and others collect on you, watch this video from PBS.

http://www.jsonline.com/news/wisconsin/unprecedented-microtargeting-by-campaigns-creeps-out-voters-007f111-177062301.html

Microtargeting

Microtargeting is the use by political parties and election campaigns of direct marketing datamining techniques that involve predictive market segmentation (aka cluster analysis). It is used by United States Republican and Democratic political parties and candidates to track individual voters and identify potential supporters.

They then use various means of communication—direct mail, phone calls, home visits, television, radio, web advertising, email, text messaging, etc.–to communicate with voters, crafting messages to build support for fundraising, campaign events, volunteering, and eventually to turn them out to the polls on election day. Microtargeting’s tactics rely on transmitting a tailored message to a subgroup of the electorate on the basis of unique information about that subgroup.

History

Although some of the tactics of microtargeting had been used in California since 1992, it really started to be used nationally only in 2004.[1] In that year, Karl Rove, along with Blaise Hazelwood at the Republican National Committee, used it to reach voters in 18 states that George W. Bush’s reelection campaign was not able to reach by other means. The results were greater contacts with likely Bush voters. For example, in Iowa the campaign was able to reach 92% of eventual Bush voters (compared to 50% in 2000) and in Florida it was able to reach 84% (compared to 50% in 2000).[2] Much of this pioneering work was done by Alex Gage and his firm, TargetPoint Consulting.

Democrats did only limited microtargeting in 2004, with some crediting microtargeting for Kerry’s win in Iowa in 2004.[3] Some news accounts credited Republican superiority in that area for victories in that election cycle.[4] Democrats later developed microtargeting capabilities for the 2006 election cycle.[1][2] “It’s no secret that the other side [Republicans] figured this out a little sooner”, said Josh Syrjamaki, director of the Minnesota chapter of America Votes in October 2006. “They’ve had four to six years’ jump on us on this stuff…but we feel like we can start to catch up.”[5]

Method

Microtargeting is a modification of a practice used by commercial direct marketers. It would not be possible on a large scale without the development of large and sophisticated databases that contain data about as many voters as possible. The database essentially tracks voter habits in the same ways that companies like Visa track consumer spending habits. The Republican National Committee’s database is called Voter Vault. The Democratic National Committee effort is called VoteBuilder.[6] A parallel Democratic effort is being developed by Catalist, a $9 million initiative headed by Harold Ickes,[2] while the leading non-partisan database is offered by Aristotle.[7]

The databases contain specific information about a particular voter (party affiliation, frequency of voting, contributions, volunteerism, etc.) with other activities and habits available from commercial marketing vendors such as Acxiom, Dun & Bradstreet, Experian Americas, and InfoUSA. Such personal information is a “product” sold to interested companies. These data are particularly illuminating when portrayed through a Geographic Information System (GIS), where trends based on location can be mapped alongside dozens or hundreds of other variables. This geographic depiction also makes it ideal for volunteers to visit potential voters (armed with lists in hand, laid out in the shortest route – much like how FedEx and UPS pre-determine delivery routes).

These databases are then mined to identify issues important to each voter and whether that voter is more likely to identify with one party or another. Political information is obviously important here, but consumer preferences can play a role as well. Individual voters are then put into groups on the basis of sophisticated computer modeling. Such groups have names like “Downscale Union Independents”, “Tax and Terrorism Moderates,” and “Older Suburban Newshounds.”[2][5]

Once a multitude of voting groups is established according to these criteria and their minute political differences, then the tailored messages can be sent via the appropriate means. While political parties and candidates once prepared a single television advertisement for general broadcast nationwide, it is now not at all uncommon to have several dozen variations on the one message, each with a unique and tailored message for that small demographic sliver of the voting public. This is the same for radio advertisement, direct mail, email, as well as stump speeches and fundraising events.

See also

References

  1. ^ a b Chad Vander Veen, Zeroing In, www.govtech.net, Jan 2, 2006, accessed November 1, 2006.
  2. ^ a b c d Yochi J. Dreazen, Democrats, Playing Catch-Up, Tap Database to Woo Potential Voters, The Wall Street Journal, October 31, 2006, A1.
  3. ^ Schaller, T: New Math: How a trio of savvy Kerry campaign workers used a fresh voter equation to win Iowa., web only. American Prospect, 2004.
  4. ^ Martin Kettle, “How Democrats missed the vote”, The Guardian, November 3, 2006 [1], accessed February 2, 2007
  5. ^ a b Dan Balz, Democrats Aim to Regain Edge In Getting Voters to the Polls, Washington Post, October 8, 2006, accessed November 7, 2006. [2]
  6. ^ Aaron Blake (August 15, 2007). “DNC holds national training as it rolls out new voter file”. The Hill.
  7. ^ James Verini (December 3, 2007). “Big Brother Inc.”. Vanity Fair.

External links

http://en.wikipedia.org/wiki/Microtargeting

Data mining

Data mining (the analysis step of the “Knowledge Discovery in Databases” process, or KDD),[1] an interdisciplinary subfield of computer science,[2][3][4] is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems.[2] The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.[2] Aside from the raw analysis step, it involves database and data management aspects, data preprocessing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of discovered structures, visualization, and online updating.[2]

The term is a buzzword,[5] and is frequently misused to mean any form of large-scale data or information processing (collection, extraction, warehousing, analysis, and statistics) but is also generalized to any kind of computer decision support system, including artificial intelligence, machine learning, and business intelligence. In the proper use of the word, the key term is discovery[citation needed], commonly defined as “detecting something new”. Even the popular book “Data mining: Practical machine learning tools and techniques with Java”[6] (which covers mostly machine learning material) was originally to be named just “Practical machine learning”, and the term “data mining” was only added for marketing reasons.[7] Often the more general terms “(large scale) data analysis“, or “analytics” – or when referring to actual methods, artificial intelligence and machine learning – are more appropriate.

The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records (cluster analysis), unusual records (anomaly detection) and dependencies (association rule mining). This usually involves using database techniques such as spatial indices. These patterns can then be seen as a kind of summary of the input data, and may be used in further analysis or, for example, in machine learning and predictive analytics. For example, the data mining step might identify multiple groups in the data, which can then be used to obtain more accurate prediction results by a decision support system. Neither the data collection, data preparation, nor result interpretation and reporting are part of the data mining step, but do belong to the overall KDD process as additional steps.

The related terms data dredging, data fishing, and data snooping refer to the use of data mining methods to sample parts of a larger population data set that are (or may be) too small for reliable statistical inferences to be made about the validity of any patterns discovered. These methods can, however, be used in creating new hypotheses to test against the larger data populations.

Data mining uses information from past data to analyze the outcome of a particular problem or situation that may arise. Data mining works to analyze data stored in data warehouses that are used to store that data that is being analyzed. That particular data may come from all parts of business, from the production to the management. Managers also use data mining to decide upon marketing strategies for their product. They can use data to compare and contrast among competitors. Data mining interprets its data into real time analysis that can be used to increase sales, promote new product, or delete product that is not value-added to the company.

Etymology

In the 1960s, statisticians used terms like “Data Fishing” or “Data Dredging” to refer to what they considered the bad practice of analyzing data without an a-priori hypothesis. The term “Data Mining” appeared around 1990 in the database community. At the beginning of the century, there was a phrase “database mining”™, trademarked by HNC, a San Diego-based company (now merged into FICO), to pitch their Data Mining Workstation;[8] researchers consequently turned to “data mining”. Other terms used include Data Archaeology, Information Harvesting, Information Discovery, Knowledge Extraction, etc. Gregory Piatetsky-Shapiro coined the term “Knowledge Discovery in Databases” for the first workshop on the same topic (1989) and this term became more popular in AI and Machine Learning Community. However, the term data mining became more popular in the business and press communities.[9] Currently, Data Mining and Knowledge Discovery are used interchangeably.

Background

The manual extraction of patterns from data has occurred for centuries. Early methods of identifying patterns in data include Bayes’ theorem (1700s) and regression analysis (1800s). The proliferation, ubiquity and increasing power of computer technology has dramatically increased data collection, storage, and manipulation ability. As data sets have grown in size and complexity, direct “hands-on” data analysis has increasingly been augmented with indirect, automated data processing, aided by other discoveries in computer science, such as neural networks, cluster analysis, genetic algorithms (1950s), decision trees (1960s), and support vector machines (1990s). Data mining is the process of applying these methods with the intention of uncovering hidden patterns[10] in large data sets. It bridges the gap from applied statistics and artificial intelligence (which usually provide the mathematical background) to database management by exploiting the way data is stored and indexed in databases to execute the actual learning and discovery algorithms more efficiently, allowing such methods to be applied to ever larger data sets.

Research and evolution

The premier professional body in the field is the Association for Computing Machinery‘s (ACM) Special Interest Group (SIG) on Knowledge Discovery and Data Mining (SIGKDD). Since 1989 this ACM SIG has hosted an annual international conference and published its proceedings,[11] and since 1999 it has published a biannual academic journal titled “SIGKDD Explorations”.[12]

Computer science conferences on data mining include:

Data mining topics are also present on many data management/database conferences such as the ICDE Conference, SIGMOD Conference and International Conference on Very Large Data Bases

Process

The Knowledge Discovery in Databases (KDD) process is commonly defined with the stages:

(1) Selection
(2) Pre-processing
(3) Transformation
(4) Data Mining
(5) Interpretation/Evaluation.[1]

It exists, however, in many variations on this theme, such as the Cross Industry Standard Process for Data Mining (CRISP-DM) which defines six phases:

(1) Business Understanding
(2) Data Understanding
(3) Data Preparation
(4) Modeling
(5) Evaluation
(6) Deployment

or a simplified process such as (1) pre-processing, (2) data mining, and (3) results validation.

Polls conducted in 2002, 2004, and 2007 show that the CRISP-DM methodology is the leading methodology used by data miners.[13][14][15] The only other data mining standard named in these polls was SEMMA. However, 3-4 times as many people reported using CRISP-DM. Several teams of researchers have published reviews of data mining process models,[16][17] and Azevedo and Santos conducted a comparison of CRISP-DM and SEMMA in 2008.[18]

Pre-processing

Before data mining algorithms can be used, a target data set must be assembled. As data mining can only uncover patterns actually present in the data, the target data set must be large enough to contain these patterns while remaining concise enough to be mined within an acceptable time limit. A common source for data is a data mart or data warehouse. Pre-processing is essential to analyze the multivariate data sets before data mining. The target set is then cleaned. Data cleaning removes the observations containing noise and those with missing data.

Data mining

Data mining involves six common classes of tasks:[1]

  • Anomaly detection (Outlier/change/deviation detection) – The identification of unusual data records, that might be interesting or data errors that require further investigation.
  • Association rule learning (Dependency modeling) – Searches for relationships between variables. For example a supermarket might gather data on customer purchasing habits. Using association rule learning, the supermarket can determine which products are frequently bought together and use this information for marketing purposes. This is sometimes referred to as market basket analysis.
  • Clustering – is the task of discovering groups and structures in the data that are in some way or another “similar”, without using known structures in the data.
  • Classification – is the task of generalizing known structure to apply to new data. For example, an e-mail program might attempt to classify an e-mail as “legitimate” or as “spam”.
  • Regression – Attempts to find a function which models the data with the least error.
  • Summarization – providing a more compact representation of the data set, including visualization and report generation.
  • Sequential pattern mining – Sequential pattern mining finds sets of data items that occur together frequently in some sequences. Sequential pattern mining, which extracts frequent subsequences from a sequence database, has attracted a great deal of interest during the recent data mining research because it is the basis of many applications, such as: web user analysis, stock trend prediction, DNA sequence analysis, finding language or linguistic patterns from natural language texts, and using the history of symptoms to predict certain kind of disease.

Results validation

The final step of knowledge discovery from data is to verify that the patterns produced by the data mining algorithms occur in the wider data set. Not all patterns found by the data mining algorithms are necessarily valid. It is common for the data mining algorithms to find patterns in the training set which are not present in the general data set. This is called overfitting. To overcome this, the evaluation uses a test set of data on which the data mining algorithm was not trained. The learned patterns are applied to this test set and the resulting output is compared to the desired output. For example, a data mining algorithm trying to distinguish “spam” from “legitimate” emails would be trained on a training set of sample e-mails. Once trained, the learned patterns would be applied to the test set of e-mails on which it had not been trained. The accuracy of the patterns can then be measured from how many e-mails they correctly classify. A number of statistical methods may be used to evaluate the algorithm, such as ROC curves.

If the learned patterns do not meet the desired standards, then it is necessary to re-evaluate and change the pre-processing and data mining steps. If the learned patterns do meet the desired standards, then the final step is to interpret the learned patterns and turn them into knowledge.

Standards

There have been some efforts to define standards for the data mining process, for example the 1999 European Cross Industry Standard Process for Data Mining (CRISP-DM 1.0) and the 2004 Java Data Mining standard (JDM 1.0). Development on successors to these processes (CRISP-DM 2.0 and JDM 2.0) was active in 2006, but has stalled since. JDM 2.0 was withdrawn without reaching a final draft.

For exchanging the extracted models – in particular for use in predictive analytics – the key standard is the Predictive Model Markup Language (PMML), which is an XML-based language developed by the Data Mining Group (DMG) and supported as exchange format by many data mining applications. As the name suggests, it only covers prediction models, a particular data mining task of high importance to business applications. However, extensions to cover (for example) subspace clustering have been proposed independently of the DMG.[19]

Notable uses

See also category: Applied data mining

Games

Since the early 1960s, with the availability of oracles for certain combinatorial games, also called tablebases (e.g. for 3×3-chess) with any beginning configuration, small-board dots-and-boxes, small-board-hex, and certain endgames in chess, dots-and-boxes, and hex; a new area for data mining has been opened. This is the extraction of human-usable strategies from these oracles. Current pattern recognition approaches do not seem to fully acquire the high level of abstraction required to be applied successfully. Instead, extensive experimentation with the tablebases – combined with an intensive study of tablebase-answers to well designed problems, and with knowledge of prior art (i.e. pre-tablebase knowledge) – is used to yield insightful patterns. Berlekamp (in dots-and-boxes, etc.) and John Nunn (in chess endgames) are notable examples of researchers doing this work, though they were not – and are not – involved in tablebase generation.

Business

Data mining is the analysis of historical business activities, stored as static data in data warehouse databases, to reveal hidden patterns and trends. Data mining software uses advanced pattern recognition algorithms to sift through large amounts of data to assist in discovering previously unknown strategic business information. Examples of what businesses use data mining for include performing market analysis to identify new product bundles, finding the root cause of manufacturing problems, to prevent customer attrition and acquire new customers, cross-sell to existing customers, and profile customers with more accuracy.[20] In today’s world raw data is being collected by companies at an exploding rate. For example, Walmart processes over 20 million point-of-sale transactions every day. This information is stored in a centralized database, but would be useless without some type of data mining software to analyse it. If Walmart analyzed their point-of-sale data with data mining techniques they would be able to determine sales trends, develop marketing campaigns, and more accurately predict customer loyalty.[21] Every time we use our credit card, a store loyalty card, or fill out a warranty card data is being collected about our purchasing behavior. Many people find the amount of information stored about us from companies, such as Google, Facebook, and Amazon, disturbing and are concerned about privacy. Although there is the potential for our personal data to be used in harmful, or unwanted, ways it is also being used to make our lives better. For example, Ford and Audi hope to one day collect information about customer driving patterns so they can recommend safer routes and warn drivers about dangerous road conditions.[22]

Data mining in customer relationship management applications can contribute significantly to the bottom line.[citation needed] Rather than randomly contacting a prospect or customer through a call center or sending mail, a company can concentrate its efforts on prospects that are predicted to have a high likelihood of responding to an offer. More sophisticated methods may be used to optimize resources across campaigns so that one may predict to which channel and to which offer an individual is most likely to respond (across all potential offers). Additionally, sophisticated applications could be used to automate mailing. Once the results from data mining (potential prospect/customer and channel/offer) are determined, this “sophisticated application” can either automatically send an e-mail or a regular mail. Finally, in cases where many people will take an action without an offer, “uplift modeling” can be used to determine which people have the greatest increase in response if given an offer. Uplift modeling thereby enables marketers to focus mailings and offers on persuadable people, and not to send offers to people who will buy the product without an offer. Data clustering can also be used to automatically discover the segments or groups within a customer data set.

Businesses employing data mining may see a return on investment, but also they recognize that the number of predictive models can quickly become very large. Rather than using one model to predict how many customers will churn, a business could build a separate model for each region and customer type. Then, instead of sending an offer to all people that are likely to churn, it may only want to send offers to loyal customers. Finally, the business may want to determine which customers are going to be profitable over a certain window in time, and only send the offers to those that are likely to be profitable. In order to maintain this quantity of models, they need to manage model versions and move on to automated data mining.

Data mining can also be helpful to human resources (HR) departments in identifying the characteristics of their most successful employees. Information obtained – such as universities attended by highly successful employees – can help HR focus recruiting efforts accordingly. Additionally, Strategic Enterprise Management applications help a company translate corporate-level goals, such as profit and margin share targets, into operational decisions, such as production plans and workforce levels.[23]

Another example of data mining, often called the market basket analysis, relates to its use in retail sales. If a clothing store records the purchases of customers, a data mining system could identify those customers who favor silk shirts over cotton ones. Although some explanations of relationships may be difficult, taking advantage of it is easier. The example deals with association rules within transaction-based data. Not all data are transaction based and logical, or inexact rules may also be present within a database.

Market basket analysis has also been used to identify the purchase patterns of the Alpha Consumer. Alpha Consumers are people that play a key role in connecting with the concept behind a product, then adopting that product, and finally validating it for the rest of society. Analyzing the data collected on this type of user has allowed companies to predict future buying trends and forecast supply demands.[citation needed]

Data mining is a highly effective tool in the catalog marketing industry.[citation needed] Catalogers have a rich database of history of their customer transactions for millions of customers dating back a number of years. Data mining tools can identify patterns among customers and help identify the most likely customers to respond to upcoming mailing campaigns.

Data mining for business applications is a component that needs to be integrated into a complex modeling and decision making process. Reactive business intelligence (RBI) advocates a “holistic” approach that integrates data mining, modeling, and interactive visualization into an end-to-end discovery and continuous innovation process powered by human and automated learning.[24]

In the area of decision making, the RBI approach has been used to mine knowledge that is progressively acquired from the decision maker, and then self-tune the decision method accordingly.[25]

An example of data mining related to an integrated-circuit (IC) production line is described in the paper “Mining IC Test Data to Optimize VLSI Testing.”[26] In this paper, the application of data mining and decision analysis to the problem of die-level functional testing is described. Experiments mentioned demonstrate the ability to apply a system of mining historical die-test data to create a probabilistic model of patterns of die failure. These patterns are then utilized to decide, in real time, which die to test next and when to stop testing. This system has been shown, based on experiments with historical test data, to have the potential to improve profits on mature IC products.

Science and engineering

In recent years, data mining has been used widely in the areas of science and engineering, such as bioinformatics, genetics, medicine, education and electrical power engineering.

In the study of human genetics, sequence mining helps address the important goal of understanding the mapping relationship between the inter-individual variations in human DNA sequence and the variability in disease susceptibility. In simple terms, it aims to find out how the changes in an individual’s DNA sequence affects the risks of developing common diseases such as cancer, which is of great importance to improving methods of diagnosing, preventing, and treating these diseases. The data mining method that is used to perform this task is known as multifactor dimensionality reduction.[27]

In the area of electrical power engineering, data mining methods have been widely used for condition monitoring of high voltage electrical equipment. The purpose of condition monitoring is to obtain valuable information on, for example, the status of the insulation (or other important safety-related parameters). Data clustering techniques – such as the self-organizing map (SOM), have been applied to vibration monitoring and analysis of transformer on-load tap-changers (OLTCS). Using vibration monitoring, it can be observed that each tap change operation generates a signal that contains information about the condition of the tap changer contacts and the drive mechanisms. Obviously, different tap positions will generate different signals. However, there was considerable variability amongst normal condition signals for exactly the same tap position. SOM has been applied to detect abnormal conditions and to hypothesize about the nature of the abnormalities.[28]

Data mining methods have also been applied to dissolved gas analysis (DGA) in power transformers. DGA, as a diagnostics for power transformers, has been available for many years. Methods such as SOM has been applied to analyze generated data and to determine trends which are not obvious to the standard DGA ratio methods (such as Duval Triangle).[28]

Another example of data mining in science and engineering is found in educational research, where data mining has been used to study the factors leading students to choose to engage in behaviors which reduce their learning,[29] and to understand factors influencing university student retention.[30] A similar example of social application of data mining is its use in expertise finding systems, whereby descriptors of human expertise are extracted, normalized, and classified so as to facilitate the finding of experts, particularly in scientific and technical fields. In this way, data mining can facilitate institutional memory.

Other examples of application of data mining methods are biomedical data facilitated by domain ontologies,[31] mining clinical trial data,[32] and traffic analysis using SOM.[33]

In adverse drug reaction surveillance, the Uppsala Monitoring Centre has, since 1998, used data mining methods to routinely screen for reporting patterns indicative of emerging drug safety issues in the WHO global database of 4.6 million suspected adverse drug reaction incidents.[34] Recently, similar methodology has been developed to mine large collections of electronic health records for temporal patterns associating drug prescriptions to medical diagnoses.[35]

Data mining has been applied software artifacts within the realm of software engineering: Mining Software Repositories.

Human rights

Data mining of government records – particularly records of the justice system (i.e. courts, prisons) – enables the discovery of systemic human rights violations in connection to generation and publication of invalid or fraudulent legal records by various government agencies.[36][37]

Medical data mining

In 2011, the case of Sorrell v. IMS Health, Inc., decided by the Supreme Court of the United States, ruled that pharmacies may share information with outside companies. This practice was authorized under the 1st Amendment of the Constitution, protecting the “freedom of speech.”[38]

Spatial data mining

Spatial data mining is the application of data mining methods to spatial data. The end objective of spatial data mining is to find patterns in data with respect to geography. So far, data mining and Geographic Information Systems (GIS) have existed as two separate technologies, each with its own methods, traditions, and approaches to visualization and data analysis. Particularly, most contemporary GIS have only very basic spatial analysis functionality. The immense explosion in geographically referenced data occasioned by developments in IT, digital mapping, remote sensing, and the global diffusion of GIS emphasizes the importance of developing data-driven inductive approaches to geographical analysis and modeling.

Data mining offers great potential benefits for GIS-based applied decision-making. Recently, the task of integrating these two technologies has become of critical importance, especially as various public and private sector organizations possessing huge databases with thematic and geographically referenced data begin to realize the huge potential of the information contained therein. Among those organizations are:

  • offices requiring analysis or dissemination of geo-referenced statistical data
  • public health services searching for explanations of disease clustering
  • environmental agencies assessing the impact of changing land-use patterns on climate change
  • geo-marketing companies doing customer segmentation based on spatial location.

Challenges in Spatial mining: Geospatial data repositories tend to be very large. Moreover, existing GIS datasets are often splintered into feature and attribute components that are conventionally archived in hybrid data management systems. Algorithmic requirements differ substantially for relational (attribute) data management and for topological (feature) data management.[39] Related to this is the range and diversity of geographic data formats, which present unique challenges. The digital geographic data revolution is creating new types of data formats beyond the traditional “vector” and “raster” formats. Geographic data repositories increasingly include ill-structured data, such as imagery and geo-referenced multi-media.[40]

There are several critical research challenges in geographic knowledge discovery and data mining. Miller and Han[41] offer the following list of emerging research topics in the field:

  • Developing and supporting geographic data warehouses (GDW’s): Spatial properties are often reduced to simple aspatial attributes in mainstream data warehouses. Creating an integrated GDW requires solving issues of spatial and temporal data interoperability – including differences in semantics, referencing systems, geometry, accuracy, and position.
  • Better spatio-temporal representations in geographic knowledge discovery: Current geographic knowledge discovery (GKD) methods generally use very simple representations of geographic objects and spatial relationships. Geographic data mining methods should recognize more complex geographic objects (i.e. lines and polygons) and relationships (i.e. non-Euclidean distances, direction, connectivity, and interaction through attributed geographic space such as terrain). Furthermore, the time dimension needs to be more fully integrated into these geographic representations and relationships.
  • Geographic knowledge discovery using diverse data types: GKD methods should be developed that can handle diverse data types beyond the traditional raster and vector models, including imagery and geo-referenced multimedia, as well as dynamic data types (video streams, animation).

Sensor data mining

Wireless sensor networks can be used for facilitating the collection of data for spatial data mining for a variety of applications such as air pollution monitoring.[42] A characteristic of such networks is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms.[43]

Visual data mining

In the process of turning from analogical into digital, large data sets have been generated, collected, and stored discovering statistical patterns, trends and information which is hidden in data, in order to build predictive patterns. Studies suggest visual data mining is faster and much more intuitive than is traditional data mining.[44][45][46] See also Computer Vision.

Music data mining

Data mining techniques, and in particular co-occurrence analysis, has been used to discover relevant similarities among music corpora (radio lists, CD databases) for the purpose of classifying music into genres in a more objective manner.[47]

Surveillance

Data mining has been used to stop terrorist programs under the U.S. government, including the Total Information Awareness (TIA) program, Secure Flight (formerly known as Computer-Assisted Passenger Prescreening System (CAPPS II)), Analysis, Dissemination, Visualization, Insight, Semantic Enhancement (ADVISE),[48] and the Multi-state Anti-Terrorism Information Exchange (MATRIX).[49] These programs have been discontinued due to controversy over whether they violate the 4th Amendment to the United States Constitution, although many programs that were formed under them continue to be funded by different organizations or under different names.[50]

In the context of combating terrorism, two particularly plausible methods of data mining are “pattern mining” and “subject-based data mining”.

Pattern mining

“Pattern mining” is a data mining method that involves finding existing patterns in data. In this context patterns often means association rules. The original motivation for searching association rules came from the desire to analyze supermarket transaction data, that is, to examine customer behavior in terms of the purchased products. For example, an association rule “beer ⇒ potato chips (80%)” states that four out of five customers that bought beer also bought potato chips.

In the context of pattern mining as a tool to identify terrorist activity, the National Research Council provides the following definition: “Pattern-based data mining looks for patterns (including anomalous data patterns) that might be associated with terrorist activity — these patterns might be regarded as small signals in a large ocean of noise.”[51][52][53] Pattern Mining includes new areas such a Music Information Retrieval (MIR) where patterns seen both in the temporal and non temporal domains are imported to classical knowledge discovery search methods.

Subject-based data mining

“Subject-based data mining” is a data mining method involving the search for associations between individuals in data. In the context of combating terrorism, the National Research Council provides the following definition: “Subject-based data mining uses an initiating individual or other datum that is considered, based on other information, to be of high interest, and the goal is to determine what other persons or financial transactions or movements, etc., are related to that initiating datum.”[52]

Knowledge grid

Knowledge discovery “On the Grid” generally refers to conducting knowledge discovery in an open environment using grid computing concepts, allowing users to integrate data from various online data sources, as well make use of remote resources, for executing their data mining tasks. The earliest example was the Discovery Net,[54][55] developed at Imperial College London, which won the “Most Innovative Data-Intensive Application Award” at the ACM SC02 (Supercomputing 2002) conference and exhibition, based on a demonstration of a fully interactive distributed knowledge discovery application for a bioinformatics application. Other examples include work conducted by researchers at the University of Calabria, who developed a Knowledge Grid architecture for distributed knowledge discovery, based on grid computing.[56][57]

Reliability / Validity

Data mining can be misused, and can also unintentionally produce results which appear significant but which do not actually predict future behavior and cannot be reproduced on a new sample of data. See Data snooping, Data dredging.

Privacy concerns and ethics

Some people believe that data mining itself is ethically neutral.[58] While the term “data mining” has no ethical implications, it is often associated with the mining of information in relation to peoples’ behavior (ethical and otherwise). To be precise, data mining is a statistical method that is applied to a set of information (i.e. a data set). Associating these data sets with people is an extreme narrowing of the types of data that are available. Examples could range from a set of crash test data for passenger vehicles, to the performance of a group of stocks. These types of data sets make up a great proportion of the information available to be acted on by data mining methods, and rarely have ethical concerns associated with them. However, the ways in which data mining can be used can in some cases and contexts raise questions regarding privacy, legality, and ethics.[59] In particular, data mining government or commercial data sets for national security or law enforcement purposes, such as in the Total Information Awareness Program or in ADVISE, has raised privacy concerns.[60][61]

Data mining requires data preparation which can uncover information or patterns which may compromise confidentiality and privacy obligations. A common way for this to occur is through data aggregation. Data aggregation involves combining data together (possibly from various sources) in a way that facilitates analysis (but that also might make identification of private, individual-level data deducible or otherwise apparent).[62] This is not data mining per se, but a result of the preparation of data before – and for the purposes of – the analysis. The threat to an individual’s privacy comes into play when the data, once compiled, cause the data miner, or anyone who has access to the newly compiled data set, to be able to identify specific individuals, especially when the data were originally anonymous.

It is recommended that an individual is made aware of the following before data are collected:[62]

  • the purpose of the data collection and any (known) data mining projects
  • how the data will be used
  • who will be able to mine the data and use the data and their derivatives
  • the status of security surrounding access to the data
  • how collected data can be updated.

In America, privacy concerns have been addressed to some extent by the US Congress via the passage of regulatory controls such as the Health Insurance Portability and Accountability Act (HIPAA). The HIPAA requires individuals to give their “informed consent” regarding information they provide and its intended present and future uses. According to an article in Biotech Business Week’, “‘[i]n practice, HIPAA may not offer any greater protection than the longstanding regulations in the research arena,’ says the AAHC. More importantly, the rule’s goal of protection through informed consent is undermined by the complexity of consent forms that are required of patients and participants, which approach a level of incomprehensibility to average individuals.”[63] This underscores the necessity for data anonymity in data aggregation and mining practices.

Data may also be modified so as to become anonymous, so that individuals may not readily be identified.[62] However, even “de-identified”/”anonymized” data sets can potentially contain enough information to allow identification of individuals, as occurred when journalists were able to find several individuals based on a set of search histories that were inadvertently released by AOL.[64]

Software

Free open-source data mining software and applications

  • Carrot2: Text and search results clustering framework.
  • Chemicalize.org: A chemical structure miner and web search engine.
  • ELKI: A university research project with advanced cluster analysis and outlier detection methods written in the Java language.
  • GATE: a natural language processing and language engineering tool.
  • SCaViS: Java cross-platform data analysis framework developed at Argonne National Laboratory.
  • KNIME: The Konstanz Information Miner, a user friendly and comprehensive data analytics framework.
  • ML-Flex: A software package that enables users to integrate with third-party machine-learning packages written in any programming language, execute classification analyses in parallel across multiple computing nodes, and produce HTML reports of classification results.
  • NLTK (Natural Language Toolkit): A suite of libraries and programs for symbolic and statistical natural language processing (NLP) for the Python language.
  • SenticNet API: A semantic and affective resource for opinion mining and sentiment analysis.
  • Orange: A component-based data mining and machine learning software suite written in the Python language.
  • R: A programming language and software environment for statistical computing, data mining, and graphics. It is part of the GNU project.
  • RapidMiner: An environment for machine learning and data mining experiments.
  • UIMA: The UIMA (Unstructured Information Management Architecture) is a component framework for analyzing unstructured content such as text, audio and video – originally developed by IBM.
  • Weka: A suite of machine learning software applications written in the Java programming language.

Commercial data-mining software and applications

Marketplace surveys

Several researchers and organizations have conducted reviews of data mining tools and surveys of data miners. These identify some of the strengths and weaknesses of the software packages. They also provide an overview of the behaviors, preferences and views of data miners. Some of these reports include:

 

Related Posts On Pronk Palisades

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

NSC’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach — Videos

U.S. Hacking China and Hong Kong — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

Posted on June 11, 2013. Filed under: American History, Blogroll, Computers, Constitution, Crime, Economics, Employment, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Investments, Islam, Language, Law, liberty, Life, Links, Literacy, media, People, Philosophy, Politics, Press, Programming, Psychology, Rants, Raves, Regulations, Security, Tax Policy, Technology, Terrorism, Unemployment, Video, War | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

~United States Constitution, Amendment IV

“He who controls the past controls the future. He who controls the present controls the past.”

“Now I will tell you the answer to my question. It is this. The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power, pure power. What pure power means you will understand presently. We are different from the oligarchies of the past in that we know what we are doing. All the others, even those who resembled ourselves, were cowards and hypocrites. The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just around the corner there lay a paradise where human beings would be free and equal. We are not like that. We know what no one ever seizes power with the intention of relinquishing it. Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power. Now you begin to understand me.”

“Big Brother is Watching You.”

~George Orwell’s 1984

POWER IS NOT A MEANS, IT IS AN END

obama-ingsoc

org_chart_s4

nsa_unchained

prism-slide-4

new prism slide

google-nsa-grid

enemy_of_the_state

z ATT-Global-Network-Operations-Center-Video-Walls-Data-Monitoring-Header

montesquieu

Maxine Waters Confirms Big Brother Database 2013 Foretells NSA Phone & Internet Spying

Glenn Beck:Govt Storing Citizen Cellphone& Internet Activity

Digital Blackwater: How the NSA Gives Private Contractors Control of the Surveillance State

Glenn Greenwald on How NSA Leaker Edward Snowden Helped Expose a “Massive Surveillance Apparatus”

“A Massive Surveillance State”: Glenn Greenwald Exposes Covert NSA Program Collecting Calls, Emails

He told you so: Bill Binney talks NSA leaks

What You Should Know About The New NSA Utah Data Center

Is Edward Snowden a Hero? A Debate With Journalist Chris Hedges & Law Scholar Geoffrey Stone

Spying On Americans By NSA Prism Collection Details – Rand Paul On Hannity

NSA is Spying on EVERYTHING you do. Phone calls and internet activity is being stored and monitored.

PRISM: Why the NSA is Mining Internet Data

Total Surveillance : N.S.A. data mining all computers, phone calls, internet, emails

CNET Update – Uproar over PRISM government surveillance

NSA Caught Spying on Americans’ Internet Use

Columnist exposes Obama surveillance

Meet Edward Snowden: NSA PRISM Whistleblower

Sky News interview w/ Julian Assange and JP Barlow RE: Prism and Edward Snowden

Complete News – Snowden leaks show NSA ‘routinely lies’ to Congress

Judge Napolitano On NSA Spying: Most Extraordinarily Broad Search Warrant Ever Issued In US History

Rand Paul Discusses The NSA’s Violation Of The Bill Of Rights On Yahoo News (6-6-13)

Rand Paul On NSA Spying: ‘I’m Going To Challenge This At The Supreme Court’ –

Ron Paul: NSA Seizing Phone Records Symptom of Failure of The State

NSA Constitutional Violations? – Judge Andrew Napolitano – Geraldo

Clever Denials Surrounding the NSA PRISM Piracy Scandal

Peter Eckersley from the Electronic Frontier Foundation stopped by to explain why Silicon Vally’s top tech companies are dancing around PRISM allegations. Interview recorded Friday June 7, 2013

NSA Surveillance – Does Obama Have ANY Credibility Left?

“In his remarks today defending the NSA programs gathering telephone records and mining Internet companies, Obama sounded a familiar refrain, saying he welcomes the “debate” over the proper balance between civil liberties and national security.”*

Obama gave a speech in defense of recently uncovered secret programs to wiretap and data-mine U.S. citizens almost indiscriminately, and Congress agrees. Do you believe his remarks that we NEED these programs? Would Obama agree with himself campaigning about his stance on civil rights? Cenk Uygur, Ben Mankiewicz, and John Iadarola discuss.

*Read more form Washington Post:
http://www.washingtonpost.com/blogs/p…

“Obama Is BIG BROTHER And He’s A LIAR!”

How PRISM Easily Gives Your Private Data Over to Big Brother

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.”*

We’ve been assured by the president that the NSA’s PRISM program won’t affect “ordinary” U.S. citizens, but what is the criteria for deciding who gets their data mined and monitored? Cenk Uygur, Ben Mankiewicz, and John Iadarola (Host, TYT University) discuss the egregious reach of the Obama administration’s secret mass surveillance program.

*Read more from The Guardian:
http://www.guardian.co.uk/world/2013/…

Fourth Amendment Has been Suspended

The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.The surveillance by the National Security Agency, the government’s chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack, though it wouldn’t persistently monitor the whole system, these people said.

Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million, said a person familiar with the project.

An NSA spokeswoman said the agency had no information to provide on the program. A Raytheon spokesman declined to comment.

Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs, while others say it is an important program to combat an emerging security threat that only the NSA is equipped to provide.

“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security,” said one internal Raytheon email, the text of which was seen by The Wall Street Journal. “Perfect Citizen is Big Brother.”

Glenn Becks “SURVEILLANCE STATE” (Must Viewing)

NSA spying on All Americans Part 1

NSA spying on All Americans Part 2

How to Protect Yourself from The NSA

NSA Whistleblower Seeks Asylum in Iceland

Former CIA Officer: Officials Considering NSA Whistleblower’s Case Potential Chinese Espionage

Judge Jeanine Slams IRS, NSA and Obama for Expanding Surveillance Program – Opening Statement

James Bamford: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center 1 of 2

James Bamford: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center 2 of 2

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower

NSA whistleblower William Binney Keynote at HOPE Number Nine

U.S. v. Whistleblower Tom Drake

Tom Drake, a former NSA senior executive indicted last year for espionage after leaking to the media allegations that the nation’s largest intelligence organization had committed fraud, waste and abuse will appear in his first television interview. Scott Pelley reports.

Whistle Blower Threatened with 35 Years in Prison, Warns of Developing Tyranny

NSA Whistleblower Thomas Drake Prevails in Unprecedented Obama Admin Crackdown

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Part 2: Former NSA Employee Thomas Drake and Jesselyn Radack on Whistleblower Crackdown

The Police – Every Breath You Take

“When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature’s God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.

We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.–That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, –That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security. …”

The Declaration of Independence

http://www.archives.gov/exhibits/charters/declaration_transcript.html

Background Articles and Videos

Domestic Spying, Mainstream Source – NSA, Internet Spying, AT&T

Domestic Spying, Mainstream Source – NSA Copying Entire Internet

Glenn Becks “SURVEILLANCE STATE”

Barack Obama’s Surveillance Society

GLENN BECK ‘They Are Liars’

Glenn Greenwald: Challenging the US Surveillance State

2012.05.01 – GBTV – The Glenn Beck Radio Program – NSA Warning

Project Vigilant: Shadowy Spy Group Building Dossiers On Internet Users For Feds – Alex Jones Tv 3/3

Total Information Awareness – Social Networking Sites (mirror)

The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to national security, by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources including, without any requirement for a search warrant.[1] This information would then be analyzed to look for suspicious activities, connections between individuals, and “threats”.[2] Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.[2]
Following public criticism that the development and deployment of these technologies could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names.

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued after the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority. The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[2] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[3]

Whistleblowing

Redacted version of the DoD Inspector General audit, obtained through FOIA[4][5]

A group of former NSA workers — Kirk Wiebe, William Binney, Ed Loomis, and Thomas A. Drake, along with House Intelligence Committee staffer Diane Roark (an expert on the NSA budget[6]) — believed the operational prototype system called ThinThread was a better solution than Trailblazer, which was just a concept on paper at the time. They complained to the DoD Inspector General office in 2002 about mismanagement and the waste of taxpayer money at the NSA surrounding the Trailblazer program. In 2007 the FBI raided the homes of these people, an evolution of President Bush’s crackdown on whistleblowers and “leaks” after the New York Times disclosed a separate program (see NSA warrantless surveillance controversy). In 2010, one of the people who had helped the IG in the ensuing investigation, NSA official Thomas Andrews Drake, was charged with espionage,[6][7] part of the Obama administration’s crackdown on whistleblowers and “leaks”.[7][8][9] The original charges against him were later dropped and he pled to a misdemeanor.

The result of the DoD IG complaint was a 2004 audit report that was released under FOIA in 2011.[5] Although highly redacted, the report contained significant criticisms of Trailblazer, and included some relatively minor criticisms of ThinThread, for example, citing a low “quality of service and support” from the ThinThread program team, a lack of documentation, a lack of a configuration management system, and a lack of a trouble ticket system. However, “The findings that led to the recommendations would not have prevented the successful deployment of THINTHREAD … the recommendations were made to improve the operational efficiency of THINTHREAD after it was deployed …”[10]

Technical details

The program would have used a technique of encrypting sensitive privacy information in order to comply with legal concerns, and would have automatically identified potential threats. The sources of the data for this program would have included “massive phone and e-mail data,” but the extent of this information is not clear. Only once a threat was discovered, would the data be decrypted for analysis by agents.[11]

ThinThread would have bundled together four cutting-edge surveillance tools.:[citation needed]

  • Used more sophisticated methods of sorting through massive phone and e-mail data to identify suspect communications.
  • Identified U.S. phone numbers and other communications data and encrypted them to ensure caller privacy.
  • Employed an automated auditing system to monitor how analysts handled the information, in order to prevent misuse and improve efficiency.
  • Analyzed the data to identify relationships between callers and chronicle their contacts. Only when evidence of a potential threat had been developed would analysts be able to request decryption of the records.

Intelligence experts describe as rigorous testing of ThinThread in 1998, the project succeeded at each task with high marks. For example, its ability to sort through massive amounts of data to find threat-related communications far surpassed the existing system. It also was able to rapidly separate and encrypt U.S.-related communications to ensure privacy.[1]

The Pentagon report concluded that ThinThread’s ability to sort through data in 2001 was far superior to that of another NSA system in place in 2004, and that the program should be launched and enhanced. ThinThread was designed to address two key challenges: One, the NSA had more information than it could digest, and, two, increasingly its targets were in contact with people in the United States whose calls the agency was prohibited from monitoring.[citation needed]

Trailblazer Project had more political support internally because it was initiated by Michael Hayden when he first arrived at the NSA.[citation needed]

NSA’s existing system for data-sorting has produced a database clogged with corrupted and useless information. The mass collection of relatively unsorted data, combined with system flaws erroneously flag people as suspect, has produced numerous false leads, draining analyst resources. NSA leads have resulted in numerous dead ends.[citation needed]

NSA dropped the component that monitored for abuse of records. It not only tracked the use of the database, but hunted for the most effective analysis techniques, and some analysts thought it would be used to judge their performance. Within the NSA, the primary advocate for the ThinThread program was Richard Taylor. Taylor has retired from the NSA. The strength of ThinThread’s approach is that by encrypting information on Americans, it is legal regardless of whether the country is at war.[citation needed]

ThinThread “was designed very carefully from a legal point of view, so that even in non-wartime, you could have done it legitimately.”[12]

End of the project

The project was ended after successful testing by General Michael Hayden, and while the privacy elements were not retained, the analysis technology is reported to be the underlying basis of current NSA analysis techniques.

“They basically just disabled the [privacy] safeguards.”[11] [That quote does not appear in the link]

Some anonymous NSA officials told Hosenball of Newsweek that the ThinThread program, like Trailblazer, was a “wasteful failure”.[6]

Drake was interviewed on The Daily Show on August 6, 2012 about his charges and the program with his lawyer.

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience“.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama‘s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://en.wikipedia.org/wiki/Trailblazer_Project

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

http://en.wikipedia.org/wiki/ECHELON

Related Posts On Pronk Palisades

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

United Nations and International Telecommunications Union (ITU) Plans To Takeover The Internet at World Conference on International Telecommunications (WCIT)? or Google FUD?–Videos

Posted on December 2, 2012. Filed under: Blogroll, Business, College, Communications, Computers, Culture, Economics, Education, Entertainment, Federal Government, Fiscal Policy, Foreign Policy, Games, government spending, Language, Law, liberty, Life, Links, media, Movies, People, Philosophy, Politics, Regulations, Taxes, Technology, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

itu

wcitWCIT-Leaks

Anonymous   WORLD ANONYMOUS NOW

Greetings citizens of the world, the following is a very special message for all of humanity. Too long have we lived in fear, fear of greed, fear of corruption, fear of failure, fear that everything we’ve known turned out to be wrong.

No longer will we live in fear! It ends here and now, with you and me! We are brothers and sisters of humanity, the time has come for us to unite! We must forge a new beginning of peace and love, we must be the good we want to see in the world.

Humanity is still young, and for the first time ever in human history we have a real chance at true peace as a species. The internet has united us more than ever before, its time we use this gift to promote the unity of us all. Its time we stand up as a planet and declare we will no longer take part in a system based on fear, greed, corruption, and war.

Lets put everything into perspective for those of you that need more convincing, the United Sates alone has spent trillions of dollars on wars. War has claimed the lives of over 264 million people throughout the course of known human history, many of whom where civilians. Human progress has been halted by senseless wars.

While we fight amongst ourselves on Earth there’s an entire universe passing us by. There are an estimated 160 billion planets in our galaxy alone, many of which could potentially be home to carbon-based life as we know it. Stars go supernova, entire solar systems get destroyed, even whole galaxies collide while we argue and fight over small and pointless issues. We should be happy we have a planet to live on, not fighting over who owns the planet. In truth no individual or even an entire species owns it, because in truth all life on Earth owns this planet.

Someday soon humanity will venture to the stars, will we go into the unknown divided and fighting? Or will we say as one voice, as one species, “We the People of Earth, united as one, declare from this day fourth that no force, however big or small, shall ever divide the spirit of humanity again. United in our cause for peace, knowledge, and progress, we go forward into the unknown as brothers and sisters, as a species no longer divided by war, greed, corruption, and fear.”

The choice is yours to make, you are Anonymous, you are the future of Earth. You can either continue the wars and division of humanity, or you can try something new. You can give peace a chance, you can help secure a beautiful world of peace, knowledge, and progress for all generations to come.

You are Anonymous,
You are part of Humanity,
You should Forgive,
yet You should never Forget,
It’s time to Expect Yourself…Lets unite under WORLD ANONYMOUS NOW.

With your help, may one day the innocent never suffer and the brave never die, for on that day we’ll truly be free. United as one, divided by zero.

anonymous ITU and WCIT 3-15 december

New Trend: Governing the Internet 

TAKE ACTION for a FREE and OPEN INTERNET, Threat Wire Ep. 002

This week on Threat Wire, Darren and Shannon discuss the issues with the ITU and keeping the internet free and open for the world.

For a list of stories and links visit: http://hak5.org/threatwire/0002

U.S. Resists U.N.-controlled Internet 

The UN have apparently released details that they will to add certain levels of control on the internet, which would for one thing cause traffic from abroad to larger international websites based in the US (such as facebook or Google) to have to pay a tax,.

“”Proposals for the new ITU treaty run to more than 200 pages. One idea is to apply the ITU’s long-distance telephone rules to the Internet by creating a ‘sender-party-pays’ rule. International phone calls include a fee from the originating country to the local phone company at the receiving end. Under a sender-pays approach, U.S.-based websites would pay a local network for each visitor from overseas, effectively taxing firms such as Google and Facebook. ”

ALERT – United Nations To Seize Control Of Internet ?!?

The U.N. Threat To Internet Freedom
http://online.wsj.com/article/SB10001424052970204792404577229074023195322.html

United Nation Planning to Control The Internet – Alex Jones Tv

United Nations Seeks to Control the Internet – Thoughts & Opinions

Does the ITU threaten freedom of speech on the Internet? – Truthloader

Assange s prophecy  Govnts plan Internet takeover

Richard Hill at the EIF debate on WCIT and ITRs

The 193 member countries of the ITU will meet in Dubai 3-14 December at World Conference on International Telecommunication 2012 to revise the International Telecommunication Regulations (ITRs), a 1988 treaty-level document establishing policies governing international telecommunications services between countries. While some Member States of the International Telecommunication Union (ITU), as well as a few independent groups, are advocating for expanded intergovernmental powers over the Internet with respect to the Internet as well as wireless, IP-based, and next generation networks; other countries believe that the WCIT should adopt only minor changes to the ITRs as necessary to modernize the existing provisions of the treaty, and that new provisions and authorities are unnecessary.

Europe’s role and view will be crucial in the debate and to its outcome. In the dinner debate organised by the European Internet Foundation, representatives from the European Commission, European Industry and Civil society had been invited to exchange views on issues at stake and present their positions.

Perspectives from the International Telecommunications Union (ITU) were  presented by Richard Hill, Counsellor at the ITU

Vint Cerf on the ITU

Vint Cerf, Google’s Chief Internet Evangelist, shares a message with participants at the Big Tent Dublin on the importance of free expression. Vint also expresses his concerns about potential threats to an Open Internet in Internet governance reform at the International Telecommunications Union (ITU) conference in Dubai in December 2012.

YOUR INTERNET IS IN DANGER!!! 

Your internet is fine. I lied. But Google lied first, so I think it’s justified.

Links!
Google’s “Take Action”: https://www.google.com/intl/en/takeaction/
The International Telecommunications Union: http://www.itu.int/

International Telecommunication Regulations (doc): http://www.itu.int/ITU-T/itr/files/ITR-e.doc
Document leaks: http://wcitleaks.org/

Alex Jones Exposes Google’s Plan to Dominate the Internet 

Goodlatte speaks in opposition to UN control of the Internet 

ITU TELECOM WORLD 2012 – Highlights Video

Highlights video of ITU TELECOM WORLD 2012, Dubai, UAE.

ITU Telecom World 2012, 14-18 October 2012, Dubai International Convention and Exhibition Centre (DICEC).

Five days of pivotal discussion and debate on some of the hottest topics facing the ICT industry.

The world is changing faster than ever before in human history, thanks largely to the explosive growth of the ICT sector. New technologies, new industry players and new global trends is at the heart of debates in Dubai.

Hundreds of industry leaders came together with government ministers, regulators and manufacturers for five days of critical debate to shape the policies, regulations and competitive strategies of future communications.

ITU INTERVIEW @ WCIT-12: Paul Budde, Independent Analyst, BuddeComm

Interview with Paul Budde, Independent Analyst, BuddeComm at WCIT 2012
Dubai, United Arab Emirates, 3-14 December 2012.

The World Conference on International Telecommunications will review the current International Telecommunications Regulations (ITRs), which serve as the binding global treaty designed to facilitate international interconnection and interoperability of information and communication services, as well as ensuring their efficiency and widespread public usefulness and availability.

ITU Secretary – General Video Message: Dr Hamadoun I.Touré, S-G, ITU on WCIT – 12 

ITU Secretary General Video Message: Dr Hamadoun I.Touré, Secretary-General, International Telecommunications Union, speaking about the World Conference on International Telecommunications 2012(WCIT -12).

ITU will convene the World Conference on International Telecommunications (WCIT) in Dubai, United Arab Emirates, from 3-14 December 2012. This landmark conference will review the current International Telecommunication Regulations (ITRs), which serve as the binding global treaty designed to facilitate international interconnection and interoperability of information and communication services, as well as ensuring their efficiency and widespread public usefulness and availability.

FRANCE 24 Tech 24:      Who rules the Web? : ITU vs. ICANN

Internet at Liberty 2012: Plenary II –  Riz Khan, Gary Fowlie, Ben Wagner

Possible Internet Take Over By The ITU (UN) [HD]

 Spread the word, share & take action! :

*Sign-on Letter Opposing ITU Authority Over the Internet :

{https://www.cdt.org/letter/sign-letter-opposing-itu-authority-over-internet}

*ITU Advocacy Tools:

[Internet advocates all over the world are organizing around the upcoming ITU conference. On this page, we’ve collected a set of tools and resources to help interested groups and citizens get involved.]

{https://www.cdt.org/content/itu-tools-advocates}

*ITU Commentary by Global Experts:

{https://www.cdt.org/content/itu-commentary-global-experts}

*CDT Analyses of Key ITU Proposals:

{https://www.cdt.org/content/cdt-analyses-key-itu-proposals}

*ONLINE PETITION: Protect Global Internet Freedom (Organizations:924 – Countries Represented: 161) :

{http://www.protectinternetfreedom.net/}

Internet should stay free and open

Ivailo Kalfin (MEP, BG) argues in the European parliament that Internet should stay free and open, ahead of the WCIT meeting in Dubai in December. Internet is a very strong tool these days and there are many that would like to control it and the people, using it. For example by changing its business model and making it more expensive and less accessible. Some governments are even suggesting creating a “national internet”, which is an oxymoron, something that is against the nature of Internet itself, says Kalfin

Operation WCIT – Keep OUR internet Free

We love the internet.
And we’re guessing you do too. Think about all the awesome things it gives us: A vast communication network; innovative businesses; a platform to freely speak or challenge powerful governments; and hundreds and hundreds of hours of cat videos.

All this great stuff is available because the internet was designed in an open and inclusive way, with a multitude of voices being able to get a say on how it’s governed.
But the internet is in danger.

There’s a meeting between the world’s governments in a just a few weeks, and it could very well decide the future of the internet through a binding international treaty. It’s called the World Conference on International Telecommunications (WCIT), and it’s being organized by a government-controlled UN agency called the International Telecommunication Union (ITU).

If some proposals at WCIT are approved, decisions about the internet would be made by a top-down, old-school government-centric agency behind closed doors. Some proposals allow for internet access to be cut off more easily, threaten privacy, legitimizes monitoring and blocking of online traffic. Others seek to impose new fees for accessing content, not to mention slowing down connection speeds. Used as a pretext to internet pornography among other things as an excuse to censor sensitive material pages (note that there are too many cases of child pornography that are ignored by the police) In addition to paying for internet service, you’d also have to pay for visiting certain sites, such as YouTube. Your communications would be constantly monitored and archived, meaning the end of Internet privacy. This could potentially lead to individuals becoming victims of blackmail by malicious people who control the monitoring. The Internet is home to many organized social movements which fight for human rights worldwide. If we allow this, we will not be able to use the Internet to organize the defense of our rights…

If the delicate balance of the internet is upset, it could have grave consequences for businesses and human rights.
This must be stopped.

Only governments get a vote at WCIT, so we need people from all around the world to demand that our leaders keep the internet open.
Watch the video, and take action above to tell your governments to oppose handing over key decisions about the internet to the ITU. Let’s use the internet’s global reach to save it.

Watch the video here https://www.whatistheitu.org/?ref=an

Leaked documents here http://www.wcitleaks.org/

WebChat: http://webchat.voxanon.org/?channels=opwcit

We are the internet
We are anonymous
We are here to help you with your revolution

Background Articles and Videos

World Conference on International Telecommunications (WCIT-12)

“…ITU will convene the World Conference on International Telecommunications (WCIT) in Dubai, United Arab Emirates, from 3-14 December 2012. This landmark conference will review the current International Telecommunications Regulations (ITRs), which serve as the binding global treaty designed to facilitate international interconnection and interoperability of information and communication services, as well as ensuring their efficiency and widespread public usefulness and availability.

The treaty sets out general principles for assuring the free flow of information around the world, promoting affordable and equitable access for all and laying the foundation for ongoing innovation and market growth. The ITRs were last negotiated in Melbourne, Australia in 1988, and there is broad consensus that the text now needs to be updated to reflect the dramatically different information and communication technology (ICT) landscape of the 21st century.
The conference will consider a review (see PP-06 Resolution 146) of the International Telecommunication Regulations (ITRs), which define the general principles for the provision and operation of international telecommunications. …”

HISTORY OF ITU: “The International Telecommunication Union” – 1966 United Nations Film (Part 1)

HISTORY OF ITU: “The International Telecommunication Union” – 1966 United Nations Film (Part 2)

Related Posts On Pronk Palisades

Julian Assange–Cypherpunks: Freedom and the Future of the Internet–On Turnkey Totalitarianism With The Internet–Videos

Read Full Post | Make a Comment ( None so far )

Hal Varian–On Innovation and On Computer Mediated Transactions–Videos

Posted on February 12, 2012. Filed under: Blogroll, Business, College, Communications, Culture, Economics, Education, Employment, Inflation, Investments, Language, Law, liberty, Life, Links, People, Philosophy, Technology, Video, Wealth, Wisdom | Tags: , , , , , , |

Hal Varian 1/6 

Hal Varian 2/6 

Hal Varian 3/6

Hal Varian 4/6

Hal Varian 5/6

Hal Varian 6/6

Hal Varian on computer mediated transactions

Hal Varian on Nash equilibria and bidding in Google Auctions

Hal R. Varian (Google) – The Economics of Internet Search

Hal Varian 

“…Hal Ronald Varian (born March 18, 1947, in Wooster, Ohio) is an economist specializing in microeconomics and information economics. He is the Chief Economist at Google and he holds the title of emeritus professor at the University of California, Berkeley where he was founding dean of the School of Information.[1] He has written two bestselling textbooks Intermediate Microeconomics, an undergraduate microeconomics text, and Microeconomic Analysis, an advanced text. Together with Carl Shapiro, he co-authored Information Rules: A Strategic Guide to the Network Economy and The Economics of Information Technology: An Introduction.

He joined Google in 2002 as a consultant, and has worked on the design of advertising auctions, econometrics, finance, corporate strategy and public policy.

He received his B.S. from MIT in economics in 1969 and both his M.A. (mathematics) and Ph.D. (economics) from the University of California, Berkeley in 1973. He has taught at MIT, Stanford University, the University of Oxford, the University of Michigan, and other universities around the world. He has two honorary doctorates, from the University of Oulu, Finland in 2002, and a Dr. h. c. from the Karlsruhe Institute of Technology (KIT), Germany, awarded in 2006.

Hal R. Varian

http://people.ischool.berkeley.edu/~hal/

Read Full Post | Make a Comment ( None so far )

Privacy, Target Advertising and Word of Mouth–Videos

Posted on November 21, 2011. Filed under: American History, Blogroll, Business, Communications, Computers, Demographics, Economics, history, Inflation, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Raves, Security, Taxes, Technology, Video, Wealth, Wisdom | Tags: , , , , |

Privacy Targets: Two User Studies on Internet Privacy and Targeted Advertising 

How to Create Amazing Online Word of Mouth by Focusing Offline, Saul Colt, January 2011 SMBSeattle

Social Media and Your Target Market

How To Find Niche Markets

Read Full Post | Make a Comment ( None so far )

Steve Rambam–PRIVACY IS DEAD – GET OVER IT –Videos

Posted on November 20, 2011. Filed under: Blogroll, Business, Communications, Culture, Demographics, Economics, Employment, Energy, Enivornment, Entertainment, Federal Government, government, government spending | Tags: , , , , , , , , , , , , |

Privacy invasion

The Last HOPE: Steven Rambam Keynote (1 of 2)

The Last HOPE: Steven Rambam Keynote (2 of 2)

PRIVACY IS DEAD – GET OVER IT Pt 01, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 02, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 03, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 04, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 05, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 06, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 07, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 08, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 09, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 10, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 11, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 12, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 13, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 14, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 15, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 16, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 17, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 18, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 19, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 20, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 21, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 22, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 23, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 24, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 25, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 26, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 27, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 28, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 29, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 30, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 31, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 32, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 33, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 34, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 35, with Steve Rambam

PRIVACY IS DEAD – GET OVER IT Pt 36, with Steve Rambam

Read Full Post | Make a Comment ( None so far )

Glenn Beck On Google–Videos

Posted on February 16, 2011. Filed under: Blogroll, Business, Communications, Culture, Demographics, Economics, Employment, Foreign Policy, government, government spending, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Rants, Raves, Regulations, Security, Strategy, Talk Radio, Technology, Video, Wealth, Wisdom | Tags: , |

Glenn Beck goes after ‘Hard Left Spooky Google’- Part 1

 

Glenn Beck goes after ‘Hard Left Spooky Google’- Part 2

Read Full Post | Make a Comment ( None so far )

Microsoft and Nokia Partnership On Smart Phones–Videos

Posted on February 12, 2011. Filed under: Blogroll, Communications, Computers, Law, liberty, Life, Links, media, Mobile Phones, Technology, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , |

“….Look what we’ve found! This is the first image you’ll see anywhere of the early fruit of Microsoft and Nokia’s budding new partnership. We have it on good authority that the technicolor phones on show are conceptual devices produced by the two companies. You shouldn’t, therefore, go jumping to conclusions about retail hardware just yet, but hearts should be warmed by the familiarity of Nokia’s new design — the shape of these handsets is somewhere between its recent N8 and C7 Symbian devices and there is, as usual for Nokia, a choice of sprightly colors. The trio of keys adorning the new concept’s bottom give away its Windows Phone 7 ties, but also remind us that the N8 and E7 are highly unlikely to receive any WP7 upgrade love. The best part about this whole discovery, however, might be that it confirms Steve Ballmer’s assertion that the engineers of both companies have “spent a lot of time on this already.” So, who else is excited about owning an Engadget-blue Microkia device? …”

http://www.engadget.com/2011/02/11/exclusive-nokias-windows-phone-7-concept-revealed/

Nokia and Microsoft Windows Phone 7 partnership (HD)

 

Can Nokia Make A Comeback?

 

Nokia and Microsoft partnership – Windows Phone handsets to follow

Nokia and Microsoft Press Conference

 

Nokia / Microsoft Press Conference Q&A Steve Ballmer + Stephen Elop (1)

 

Nokia / Microsoft Press Conference Q&A Steve Ballmer + Stephen Elop (2)

 

Nokia commits to Windows Phone and Microsoft

Nokia’s comeback strategy: strategic alliance with Microsoft

by Stuart Dredge

“…The key details: Nokia will adopt Windows Phone as its ‘principal smartphone strategy, innovating on top of the platform in areas such as imaging, where Nokia is a market leader’ according to the announcement.

Symbian isn’t being killed off: instead, it will become ‘a franchise platform’, as Nokia looks to ‘retain and transition’ the existing base of 200 million Symbian users, while selling 150 million more Symbian devices around the world.

And MeeGo? That becomes ‘an open-source, mobile operating system project’ with ‘increased emphasis on longer-term market exploration of next-generation devices, platforms and user experiences’. But Nokia says it still plans to ship a ‘MeeGo-related product’ later this year.”

http://www.youtube.com/watch?v=006l0xBE6Ko&feature=related

More competition in the smartphone business space will lead to better quality products at lower prices.

I think the partnership is a great opportunity for both companies.

Background Articles and Videos

Nokia CEO Stephen Elop rallies troops in brutally honest ‘burning platform’ memo? (update: it’s real!)

Hello there,

There is a pertinent story about a man who was working on an oil platform in the North Sea. He woke up one night from a loud explosion, which suddenly set his entire oil platform on fire. In mere moments, he was surrounded by flames. Through the smoke and heat, he barely made his way out of the chaos to the platform’s edge. When he looked down over the edge, all he could see were the dark, cold, foreboding Atlantic waters.

As the fire approached him, the man had mere seconds to react. He could stand on the platform, and inevitably be consumed by the burning flames. Or, he could plunge 30 meters in to the freezing waters. The man was standing upon a “burning platform,” and he needed to make a choice.

He decided to jump. It was unexpected. In ordinary circumstances, the man would never consider plunging into icy waters. But these were not ordinary times – his platform was on fire. The man survived the fall and the waters. After he was rescued, he noted that a “burning platform” caused a radical change in his behaviour.

We too, are standing on a “burning platform,” and we must decide how we are going to change our behaviour.

Over the past few months, I’ve shared with you what I’ve heard from our shareholders, operators, developers, suppliers and from you. Today, I’m going to share what I’ve learned and what I have come to believe.

I have learned that we are standing on a burning platform.

And, we have more than one explosion – we have multiple points of scorching heat that are fuelling a blazing fire around us.

For example, there is intense heat coming from our competitors, more rapidly than we ever expected. Apple disrupted the market by redefining the smartphone and attracting developers to a closed, but very powerful ecosystem.

In 2008, Apple’s market share in the $300+ price range was 25 percent; by 2010 it escalated to 61 percent. They are enjoying a tremendous growth trajectory with a 78 percent earnings growth year over year in Q4 2010. Apple demonstrated that if designed well, consumers would buy a high-priced phone with a great experience and developers would build applications. They changed the game, and today, Apple owns the high-end range.

And then, there is Android. In about two years, Android created a platform that attracts application developers, service providers and hardware manufacturers. Android came in at the high-end, they are now winning the mid-range, and quickly they are going downstream to phones under €100. Google has become a gravitational force, drawing much of the industry’s innovation to its core.

Let’s not forget about the low-end price range. In 2008, MediaTek supplied complete reference designs for phone chipsets, which enabled manufacturers in the Shenzhen region of China to produce phones at an unbelievable pace. By some accounts, this ecosystem now produces more than one third of the phones sold globally – taking share from us in emerging markets.

While competitors poured flames on our market share, what happened at Nokia? We fell behind, we missed big trends, and we lost time. At that time, we thought we were making the right decisions; but, with the benefit of hindsight, we now find ourselves years behind.

The first iPhone shipped in 2007, and we still don’t have a product that is close to their experience. Android came on the scene just over 2 years ago, and this week they took our leadership position in smartphone volumes. Unbelievable.

We have some brilliant sources of innovation inside Nokia, but we are not bringing it to market fast enough. We thought MeeGo would be a platform for winning high-end smartphones. However, at this rate, by the end of 2011, we might have only one MeeGo product in the market.

At the midrange, we have Symbian. It has proven to be non-competitive in leading markets like North America. Additionally, Symbian is proving to be an increasingly difficult environment in which to develop to meet the continuously expanding consumer requirements, leading to slowness in product development and also creating a disadvantage when we seek to take advantage of new hardware platforms. As a result, if we continue like before, we will get further and further behind, while our competitors advance further and further ahead.

At the lower-end price range, Chinese OEMs are cranking out a device much faster than, as one Nokia employee said only partially in jest, “the time that it takes us to polish a PowerPoint presentation.” They are fast, they are cheap, and they are challenging us.

And the truly perplexing aspect is that we’re not even fighting with the right weapons. We are still too often trying to approach each price range on a device-to-device basis.

The battle of devices has now become a war of ecosystems, where ecosystems include not only the hardware and software of the device, but developers, applications, ecommerce, advertising, search, social applications, location-based services, unified communications and many other things. Our competitors aren’t taking our market share with devices; they are taking our market share with an entire ecosystem. This means we’re going to have to decide how we either build, catalyse or join an ecosystem.

This is one of the decisions we need to make. In the meantime, we’ve lost market share, we’ve lost mind share and we’ve lost time.

On Tuesday, Standard & Poor’s informed that they will put our A long term and A-1 short term ratings on negative credit watch. This is a similar rating action to the one that Moody’s took last week. Basically it means that during the next few weeks they will make an analysis of Nokia, and decide on a possible credit rating downgrade. Why are these credit agencies contemplating these changes? Because they are concerned about our competitiveness.

Consumer preference for Nokia declined worldwide. In the UK, our brand preference has slipped to 20 percent, which is 8 percent lower than last year. That means only 1 out of 5 people in the UK prefer Nokia to other brands. It’s also down in the other markets, which are traditionally our strongholds: Russia, Germany, Indonesia, UAE, and on and on and on.

How did we get to this point? Why did we fall behind when the world around us evolved?

This is what I have been trying to understand. I believe at least some of it has been due to our attitude inside Nokia. We poured gasoline on our own burning platform. I believe we have lacked accountability and leadership to align and direct the company through these disruptive times. We had a series of misses. We haven’t been delivering innovation fast enough. We’re not collaborating internally.

Nokia, our platform is burning.

We are working on a path forward — a path to rebuild our market leadership. When we share the new strategy on February 11, it will be a huge effort to transform our company. But, I believe that together, we can face the challenges ahead of us. Together, we can choose to define our future.

The burning platform, upon which the man found himself, caused the man to shift his behaviour, and take a bold and brave step into an uncertain future. He was able to tell his story. Now, we have a great opportunity to do the same.

Stephen.

http://www.engadget.com/2011/02/08/nokia-ceo-stephen-elop-rallies-troops-in-brutally-honest-burnin/

 

Related Posts On Pronk Palisades 

Windows Phone Series 7–Videos

Bill Gates–Videos

Bill Gates Goes Nuclear with The TerraPower Traveling Wave Reactor–The Next Big Thing–Innovation and Technology Making A Difference

Bill Gates Wants More Best, Bright, and Cheap Foreign Labor–More Jobs and Competition In Amercan Labor Market Is Needed–Not More Visas and Subsidies!

The History of Microsoft–Videos

A Kinder Gentler Wiser Microsoft Gives Away Valuable Software Developer Tools to Students Around The World!

Bill Gates–Hope, Change and Rapid Affluence Development–Creative Capitalism!

Wealth, Income and Job Creation: Let A 1000 Microsofts Bloom

Microsoft’s Channel 9 Coffeehouse Community Killer–spam

Microsoft Expression Studio–Videos

Read Full Post | Make a Comment ( None so far )

The Global Power Elite–Videos

Posted on January 24, 2011. Filed under: Banking, Blogroll, Communications, Economics, Education, Employment, Farming, Federal Government, Fiscal Policy, government, government spending, Investments, Language, Law, liberty, Life, Links, media, Monetary Policy, Money, People, Philosophy, Politics, Raves, Regulations, Resources, Taxes, Technology, Transportation, Video, War, Wealth, Wisdom | Tags: , , , , , , , , |

Riz Khan – The global power elite – 22 April 08 – Part 1

 

Riz Khan – The global power elite – 22 April 08 – Part 2

 

Related Posts On Pronk Palisades

Murray N. Rothbard–The Federal Reserve and The Power Elite–Videos

Read Full Post | Make a Comment ( None so far )

Google And YouTube Ban Alex Jones Over Collateral Murder–WikiLeaks–Iraq–Video–Videos

Posted on November 30, 2010. Filed under: Blogroll, Communications, Demographics, Federal Government, government, government spending, history, Language, liberty, Life, Links, media, People, Philosophy, Politics, Rants, Raves, Transportation, Video, War, Wisdom | Tags: , , , |

Google & You Tube Ban Alex Jones

 

Alex Jones Comments on Wikileak Video

 

 

Collateral Murder – Wikileaks – Iraq

Wikileaks has obtained and decrypted this previously unreleased video footage from a US Apache helicopter in 2007. It shows Reuters journalist Namir Noor-Eldeen, driver Saeed Chmagh, and several others as the Apache shoots and kills them in a public square in Eastern Baghdad. They are apparently assumed to be insurgents. After the initial shooting, an unarmed group of adults and children in a minivan arrives on the scene and attempts to transport the wounded. They are fired upon as well. The official statement on this incident initially listed all adults as insurgents and claimed the US military did not know how the deaths ocurred. Wikileaks released this video with transcripts and a package of supporting documents on April 5th 2010 on http://collateralmurder.com

 

WikiLeaks | Apache helicopter | Attack | Iraq

 

WikiLeaks editor on Apache combat video: No excuse for US killing civilians

 

Alex Jones Tv Special Sunday Edition: Obama Deception Censored by NSA/CIA Controlled Google!!

 

 

Gore To Bush: You Ignored Saddam’s Terrorist Ties!

 

The George Bush You Forgot

 

 

Nation building or murder? 

Time to bring all the professional soldiers home, now!

If Google and YouTube ban Alex, people will stop using Google as their search engine and find an alternative to YouTube.

Hit Google where it hurts in their advertising dollars.

 

Background Articles and Videos

 

The Obama Deception HQ Full length version

 

EndGame HQ full length version

 

 

 

Related Posts On Pronk Palisades

 

Drip, Drip, Drip, Hello Washington, We Have WikiLeaks,–Soros OSI Connections–Videos

Read Full Post | Make a Comment ( None so far )

ReachLocal–Internet Advertising/Marketing/Video–Client Acquisition–Videos

Posted on July 9, 2010. Filed under: Blogroll, Communications, Demographics, Economics, Employment, Investments, liberty, Life, Links, media, People, Video | Tags: , , , , , , , , , |

Founder and CEO of ReachLocal Zorik Gordon

http://reachlocal33-px.rtrk.com/

By Billingsley, Eric

“…ReachLocal’s core services include: ReachSearch, pay-per-click search engine advertising developed for local and regional businesses; ReachDisplay, online display advertising developed for local and regional businesses; TotalTrack, tools that track the performance of online and offline advertising, including billboards, radio spots, display creative and more; and ReachLocal Xchange, which offers clients advertising opportunities from online search an media publishers. …”

http://www.allbusiness.com/marketing-advertising/marketing-advertising/13100117-1.html

His reach keeps growing: Zorik Gordon finds success from online advertising.

 

 

ReachLocal Promo – What We Do

ReachLocal Promo – How It Works  

orangepassion marketing

ReachLocal Culture Video

Reach Local Automotive Promo

ReachLocal Client Testimonial: Direct Tire

ReachLocal Client Testimonial: Stewart & Labbe Orthodontics

ReachLocal Customer Reviews – Lincoln Property Company

ReachLocal Customer Reviews – Williams Residential

ReachLocal Client Testimonial: Cerritos Nissan

ReachLocal Client Testimonial: Sport & Health Clubs

ReachLocal Testimonial (Bazemore Fleet Services)

ReachLocal Australia Testimonial: Turtle Landscape Supplies

ReachLocal Australia Testimonial: House of Kitchens

ReachLocal Testimonial

ReachLocal Australia Testimonial: Laser and Skin Clinic

    

Background Articles and Videos

   History of Online Advertising

Internet Marketing – $100,000 in 30 Days With Your Website

Internet Marketing: Why Some Websites Make Big Money…

  

Web Marketing: Best Reason to Start a Website.. Ever!

Persuasion and Online Advertising

  

Internet Video/Advertising/Marketing 

 
  

  

Ogilvy’s New Media Guru On Online Advertising

 
  

The Future of Online Advertising is Video

Pre-Roll Video Advertising is “Annoying” to Consumers —

Search Engine Optimization Tutorial – Google Site Command 

 

 

SEO Link Building – SEO Links Video

 

Search Engine Optimization SEO Tutorial – Google allinanchor

SEO BASICS – Video Tutorials

http://www.gsinc.co.uk/video/seo-videos.html  

 

ReachLocal Web Site   

http://www.reachlocal.com/   

Search Engine Watch (SEW) is a website that provides news and information about search engines and search engine marketing. [1]   

Search Engine Watch was started by Danny Sullivan in 1996. In 1997, Sullivan sold it for an undisclosed amount to MecklerMedia (now Jupitermedia). In 2005 the website and related Search Engine Strategies conference series were sold to Incisive Media for $43 million. On November 30, 2006 Danny Sullivan left Search Engine Watch, after his resignation announcement on August 29, 2006.[2][3] Rebecca Lieb was named editor-in-chief the following month.   

Google‘s Matt Cutts has called Search Engine Watch “must reading.” Yahoo’s Tim Mayer has said that it is the “most authoritative source on search.” [4]   

http://en.wikipedia.org/wiki/Search_Engine_Watch   

SearchEngineWatch.com

“…ReachLocal facts   


   

To clear up a few things from a post on this thread (to the extent that I am able):

1) there was no private label branding for agencies at time of testing   

Simply not true – the partner (CMRs and agencies) model is a key component of ReachLocal’s business plan.   

4) Whatever keywords you provide them with, they will expand into thousands of completetly irrelevant keywords to generate a high volume of clicks – not necessarily focus on highly targeted, relevant keywords on your most profitable products / services.   

The ReachLocal platform starts each campaign with a taxonomy of business categories; once the campaign begins to optimize the platform automatically makes bid adjustments based on which keywords are driving ROI via conversion events (not clicks)…more on this later.   

6) Targeting ability: They limit you to 10 cities, a state, a region, or nationwide. You cannot do miles around an address, draw a targeted map, or anything else useful. If you want to target more cities you have to create another account – but this creates a problem with two accounts / campaigns using the same keyword list.   

Simply not true – ReachLocal campaigns can IP target within 10, 25, and 50 mile radius’ from any address, or target a DMA.   

8) They set increadibly high max bids to be in the #1 position only and cost [ i had some campaigns with an average CPC of $7 + ] There’s so many other situations, that’s I’m getting tired of writing about this.   

False. The platform doesn’t care about position and CPC is of secondary concern – the technology uses portfolio based (as opposed to key word rules) optimization (utilizing regression analysis and yield scenarios) and makes bid adjustments based upon the key words , position of key words, and search engines that are driving conversions (phone calls, emails, form submits) at the lowest cost possible. Many times campaign CPC goes up as the campaign optimizes, but cost per lead and cost per acquisition decreases.   

ReachLocal is designed for businesses who sell offline, and the platform is designed to optimize based upon conversions, not clicks. Clicks are meaningless to a business that sells its goods or services offline. RL consults with it’s clients to set up local landing pages (which convert at about 4X the rate than a main national page) so that customers don’t drop off via the “find a location” maze. …”   

“…
Re: Reach Local

   

I have had a far different experience with reach local.

And not to be insulting but it is easy to tell who on this list is a pro and who is not. If you are using Reach Local and not just trying to “peddle your wears” you should know their tracking is based on reverse proxy….anyone worth their salt in IT knows that this does not produce a COPY of a site….it is dynamically served…that is proxy by definition. Your ability to measure ROI therefore in my opinion, even run a campaign is suspect.   

My clients do not care about Clicks, leads budgets etc. They care about Acquisition. They want more business. We have been able to generate Dollar for Dollar an equal or better amount of business for our clients using reach local while eliminating our need to spend dozens of hours per month on campaign optimization.   

Those who care to white label simply want to take credit and money for doing no work. The reason they are not receiving an ROI is because you are marking up a marked up product which is why Reach Local has gone to a direct sales force. I personally concentrate on design and do not mark up my clients Reach Local. I instead concentrate on regular refinement of their site to increase conversions that occur through Reach Local traffic.   

I found that I can make more money doing this by billing for design and increased results which offer my client an actual service and require less manpower making my ROI far better. The margins are slim due to the free market economics in PPC…you’re fattening them up unnecessarily.   

The technology is absolutely amazing when utilized properly. It is designed for the purpose of driving local searchers into local business. If the account administrator (i.e. you and I) set up priorities incorrectly then their software will not perform up to its full capabilities. To use this for complicated e-commerce etc is simply foolish as it not intended for this use. The software platform is designed to be used for local business who have little or no internet savvy. It is designed to generate contact with those businesses. For a highly local business this works very well.   

Currently I place many of my design clients on the platform as I deal mainly with health professionals, local retail, local Big box retail and professional services. All have expensive keywords. After 6 months of hard data comparison same site to same site one “hand optimized” the other on reach local. Reach local beat us 34 out of 36 times….the other two were within 5% ROI. Also average CPC on their system overall for our campaigns was $1.38 our “hand optimized” CPC was $1.31. Who cares? My ROI was far better as I now had more time to do lots of other revenue generating activities instead of the hours I spent manually running 36 campaigns.   

Reach Local also produced a better ROI for these clients. For their dollar more measured contact was generated and they earned more business. Dollar for dollar you must compare ROI to ROI forget CPC. It simply doesn’t matter. As JMINK stated CPC is irrelevant if a system is not set up to generate clicks. This system is set up to generate CONTACT and SALES for off line businesses. Often these words will be more expensive, require higher position etc.   

You will serve your client better by spending your time on natural Optimization and refining for conversions. Leave the PPC up to professionals.   

I have a degree in ME and took many statistics classes. We hand optimized accounts based on statistical analysis….the ability to have an algorithm provide this analysis is invaluable.   

We track their specific customers through analytics and they are a higher quality prospect who does tend to purchase more frequently.   

Sorry for the crass nature but there are too many people out there slinging mud on honest hard working people like myself who still look out for my clients best interest and not to find ways to bill more for less work. …”   

   

http://forums.searchenginewatch.com/showthread.php?t=14440   

Rotohog CEO Kelly Perdew and ReachLocal CEO Zorik Gordon to Deliver VentureNet 2009 Keynote

“…Gordon will present the closing keynote, titled “Media Digitization: The Future of Acquiring and Retaining Local Customers.” He will shine light on the history of his company, ReachLocal, including insight into how the company was built into the successful organization it is today. At ReachLocal, Gordon leads a company that is bringing order to the fragmented local Internet by connecting advertisers, publishers, and creative solutions providers together on one platform.   

In his previous role as CEO for WorldWinner, Inc., Gordon signed major partnerships with Yahoo!, Pogo, Lycos, and Shockwave that positioned WorldWinner as the number one provider of cash tournaments on the Internet. Zorik also founded Jackpot.com, an Idealab business that has grown to become Connexus Corp., one of the leading online marketing companies. …”   

     

http://investors.reachlocal.com/releasedetail.cfm?ReleaseID=455563   

Remarketing: Online’s Misunderstood Conversion Tool

“…Remarketing at its most basic level allows marketers to get in front of viewers who have already shown interest in a product or service by following them and showing ads for the product or service they initially eyed as they surf elsewhere on the Web. …”   

“…   

Advertisers facing the pressure of ROI need to ask themselves: “What did that ad do for my business?” Often this question is posed with a short-term view. This desire for an instant result has given remarketing a reputation for having a positive but low ROI.   

The longer-term view presents a more accurate picture in this case. When it comes to remarketing, the ROI is incremental over time. The advertiser is targeting only their past users, so it may take multiple views of an ad for it to resonate.   

Additionally, the ability to segment the users based on their interests is key. A targeted message is often what captures the attention of a user and compels them to come back and convert.   

Most Under-utilized Online Marketing Technology   

In a survey from Advertise.com and SEMPO, remarketing was cited as the most under-utilized online marketing technology. This is the case in spite of some advertisers experiencing a 400 percent increase in ad response once they have implemented remarketing. …”   

http://searchenginewatch.com/3640914   

   

List of Serach Engines

“…This is a list of Wikipedia articles about search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. …”   

http://en.wikipedia.org/wiki/List_of_search_engines

Read Full Post | Make a Comment ( 2 so far )

FCC Debates Net Neutrality–Videos

Posted on October 23, 2009. Filed under: Blogroll, Communications, Computers, Economics, Fiscal Policy, government spending, Law, liberty, Links, People, Politics, Quotations, Raves, Regulations, Resources, Reviews, Taxes, Video, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

 

“In all countries with a settled bureaucracy people used to say: The cabinets come and go, but the bureaus remain.”

“Only to bureaucrats can the idea occur that establishing new offices, promulgating new decrees, and increasing the number of government employees alone can be described as positive and beneficial measures.”

~Ludwig von Mises

 

FCC Approves Proposed Net Neutrality Rules

 

FCC Debates Net Neutrality -Full video

 

The Communicators: Net Neutrality

 

Mike McCurry on Net Neutrality

 

Paul Misener of Amazon.com on net neutrality

 

Q & A: Faceoff between Mike McCurry and Paul Misener

 

More government regulation and intervention into the economy is the problem not the solution.

The government is attempting to screw the consumer in the name of protecting them from the big bad Internet Service Prodivers or ISPs.

We are from the government and are here to protect you.

Really?

Go take a hike. 

Promote competition and investment in the internet or broadband deployment and cut government spending and regulation–abolish  the Federal Communications Commission.

The Progressive Radical Socialists are all on the side of network neutrality.

Network neutrality is the hostile takeover of the internet by government regulations.

The Progressive Radical Socialists are true believers in government command and control.

I trust private companies before I would even consider trusting the integrity of the government.

Time for the American people to wake up and speak up.

“Capitalism means free enterprise, sovereignty of the consumers in economic matters, and sovereignty of the voters in political matters. Socialism means full government control of every sphere of the individuals life and the unrestricted supremacy of the government in its capacity as central board of production management.”

“Tyranny is the political corollary of socialism, as representative government is the political corollary of the market economy.”

~Ludwig von Mises

 

Background Articles and Videos

The Essential Guide to Network Neutrality

A guide to the future of Internet services and the Internet Freedom Preservation Act.

By John Edwards

“…The Case Against Network Neutrality

The nation’s largest ISPs, including AT&T, Time Warner, Verizon, Cox Communications Inc. and Comcast, are the strongest network-neutrality opponents. Yet these firms steadfastly deny that they are trying to hijack the Internet, as some as their critics claim.

The ISPs insist that their primary interest is simply to ensure better and more reliable service by prioritizing content to meet their customers’ needs. They also state that their actions are essential to comprehensive Internet security; they must prevent outlaw services from taking advantage of customers through illegal Net activities, such as phishing sites and intellectual-property-robbing peer-to-peer file-sharing services. Many neutrality opponents also believe they should be able to charge Web-site operators, especially high-bandwidth services like video streamers, for the right to use the ISP’s portion of the network, which feeds content directly to customers.

Neutrality opponents assert that any government measures directed at promoting a so-called “even playing field” would unnecessarily meddle with Net activities and, in effect, place the government in charge of critical aspects of the Web’s design and operation. Such interference, opponents claim, would stifle Internet growth, hinder the roll out of broadband access and tilt the market toward businesses that use the most bandwidth yet pay the least for network costs within a neutral environment.

The Case for Network Neutrality

Supporters of network neutrality include the businesses that have the most to gain from a neutral Internet — companies such as Amazon.com, Google, Yahoo! Inc., Microsoft and Facebook. Also backing the cause are the editorial boards of several major newspapers, including The New York Times, Los Angeles Times, San Francisco Chronicle and San Jose Mercury News. Organizations such as the American Library Association, Gun Owners of America, Christian Coalition of America and Consumers Union, as well as Internet pioneer Vint Cerf, are also carrying the “free Internet” banner.

Network-neutrality proponents claim that rather than protecting their customers’ interests, ISPs are trying to squash competition in order to benefit their own Internet services, including email, IP telephony, search technology, news and information content aggregation, classified advertising, and social networking. They argue that by attempting to monopolize both access and content, such firms are essentially “double-dipping.”

According to network-neutrality advocates, the loss of a free and open Internet would lead to less innovation, since individuals and small startups buckle under new service and cost restrictions imposed by ISPs. The biggest losers in this situation will be consumers, who will inevitably face fewer service choices and higher fees, argue neutrality supporters. The national business and financial climate will also suffer, they allege, as Internet innovation and growth slows. …”

http://www.voip-news.com/feature/guide-network-neutrality-030508/

Sector to Watch – Internet

 

FCC Net Neutrality: Arbitrary and Capricious?

 

FCC Commissioner on Net Neutrality

 

Oracle Chief Opposes Net Neutrality


 

Internet Regulation – Ayn Rand Center for Individual Rights

 

Net neutrality: Necessary or necessary evil?


 

Lawrence Lessig on Net Neutrality and Google-1/2

 

Lawrence Lessig on Net Neutrality and Google-2/2

 

“Preserving a Free and Open Internet: A Platform for Innovation, Opportunity, and Prosperity”

 

Gov 2.0 Summit 09: Julius Genachowski, “Broadband as Platform”

 

Genachowski Says AT&T Move Doesnt End Need for Web Rule: Video

 

Barack Obama: On Net Neutrality

 

CTO Aneesh Chopra on net neutrality

 

C-SPAN’s Communicators with CTO Aneesh Chopra

 

Anti-Net Neutrality Propiganda Ad

 

Net Neutrality – Plain English

 

DN! Net Neutrality (1\2)

 

DN! Net Neutrality (2\2)

 

Net Neutrality

 

Anti-Net Neutrality Propiganda Ad

 

Net Neutrality – Plain English

 

Google Violates Motto Debate: Jim Harper (3 of 13)

 

 

Related Posts On Pronk Palisades

Network Neurtrality–FCC Julius Genachowski–Tim Wu–Free and Open Internet Or Slow and Stupid Internet?

Robert W. McChesney–Videos

Cass Sunstein–Regulatory Czar–Animal Rights Activist, Body Part Taker, Gun Grabber, Internet Regulator, Nudger–Nuts!

Mark Lloyd, FCC Diversity Czar, and Cass Sustein, Regulatory Czar: Progressive Radical Socialist Silencing of Free Speech On Internet Blogs and Talk Radio

Susan P. Crawford–Videos

Tim Wu–Videos

Beck and Hannity Expose Corrupt Ethics Waived Slumlord Valerie Jarrett–Senior Advisor, Olympics Czar and Close Friend of President Barack Obama–Videos

The Battle For The World Economy–Videos

Obama’s Progressive Radical Socialist Democratic Party’s Propaganda War On Freedom of Speech

Anita Dunn–White House Communications Director–Exposed By Beck As Mao Tse-Tung Admirer On Video!

Fox’s Glenn Beck Installs Hotline to Narcissist Obama–Beck Continues To Be Obama’s Narcissistic Supplier!

Fox News Scares Narcissist Obama–Mirror Mirror Mirror On The Wall Who Is The Fairest Of Them All–Sarah Palin–Obama Attacks Mirror!

Obama’s Socialist Mopster Red Bucket Brigade for The Rockefeller and Soros Agenda of World Socialist Government–A New World Order!

Fox News Scares Narcissist Obama–Mirror Mirror Mirror On The Wall Who Is The Fairest Of Them All–Sarah Palin–Obama Attacks Mirror!

Sam Vaknin–Videos

Narcissistic Personality Disorder (NPD)–Videos

Barack Obama Cult?

Jim Jones–Cult of Personality–The Tragedy of Jonestown–Videos

There Are No Coincidences: Three Progressive Presidents Won The Nobel Peace Prize–Theodore Roosevelt, Woodrow Wilson, and Barack Obama–Narcissistic Personality Disorder!

Change You Can Count On: The 2,000,000,000 Health Care Plan Requires Massive Tax Increases and Huge Cuts In Medicare Reimbursement for Doctors and Hospitals!

President Obama–Killer of The American Dream and Market Capitalism–Stop The Radical Socialists Before They Kill You!

Cloward Piven Strategy–The Crisis Strategy Of Barack Obama

Yuri Bezmenov On KGB Soviet Propaganda and Subversion–Videos 

President Barack Obama Puppet of Trilateral Commission?–Videos

G. William Domhoff: Who Runs America–Videos

Eugenics–Rockefeller–United Nations–Population Control–Holdren–Abortions/Sterilization–Browner–Cap and Trade–Obama–Compulsory Socialized Medicine–Euthanasia–Transhuman–Brave New World!–Videos 

Eugenics, Planned Parenthood, Population Control, and Designer Babies–Videos

Barrack Obama’s Kansas Values–Killing Babies in Cold Blood?

Black Genocide–Eugenics–Planned Parenthood–Population Control–Videos

George Soros: Barack Obama’s Money Man and Agenda Puppeter

George Soros: Government Interventionist and Global Socialist–Obama’s Puppeter Master–Videos

Soros Funded and Obama’s Manufactured Hate Generator–The Southern Poverty Law Center–Disinformation Propaganda Campaign 

Change You Can Count On: The $2,000,000,000 Health Care Plan Requires Massive Tax Increases and Huge Cuts In Medicare Reimbursement for Doctors and Hospitals!

Second Opinion: Doctors Speak Up On Proposed Health Care Reform–And A Third Texas Opinion!–Videos

Republican Health Care Reform: The Patients’ Choice Act

Medical Doctor and Senator Tom Coburn On Health Care–Videos

The Senate Doctors Show–Videos

Obama’s Waterloo– Government Compulsory Single Payer Socialized Medicine!–Videos

President Obama’s Plan of Massive Deficit Spending Is Destroying The US Economy–The American People Say Stop Socialism BS Now!

The Bum’s Rush of The American People: The Totally Irresponsible Democratic Party Health Care Bill and Obama’s Big Lie Exposed

Chairman Obama’s Progressive Radical Socialist Health Care Bill Kills Individual Private Health Care Insurance–Join The Second American Revolution!

The Obama Big Lie and Inconvenient Truth About Health Care–The Public Option Trojan Horse–Leads To A Single Payor Goverment Monopoly of Health Care and The Bankruptcy of USA!

The Obama Public Option Poison Pill For A Government Health Care Monopoly–Single Payer System–Betting Your Life and Paying Though The Nose

Government Bureaucracy: Organizational Chart of The House Democrats’ Health Plan

Dr. Robert W. Christensen–Videos

John Stossel–Sick In America–Videos 

 

Read Full Post | Make a Comment ( None so far )

When The Videos Stop Playing On You Tube!

Posted on March 16, 2009. Filed under: Blogroll, Computers, Links, People, Programming, Rants, Video | Tags: , , , , , , , |

youtube-logo 

 

Many viewers of YouTube were getting this error message on Sunday, March 15, 2009:

Hello, you either have JavaScript turned off or an old version of Adobe’s Flash Player. Get the latest Flash player.

Well not so fast.

First, I had JavaScript turned on.

Second, I downloaded the lastest version of the Adobe Flash Player.

Apparently, this is not the first time this problem has happened.

http://forums.techguy.org/multimedia/526305-hello-you-either-have-javascript.html

http://answers.yahoo.com/question/index?qid=20080330145347AA6eHX8 

This is just the type of problem that should have been avoided had both YouTube and Adobe tested their code before releasing live to world.

Videos are still not playing on YouTube.

However they work perfectly fine on this blog where they are embedded.

I posted on Microsoft’s Channel 9 Coffeehouse to see if any developer were getting the same error message and what they did about it:

http://channel9.msdn.com/forums/Coffeehouse/461080-YouTube-or-Adobe-Screwed-Up-Looks-Like-Adobe/

This may be helpful for all of you that are having this problem:

 

Seeing your post made me actually get round to fixing it, go here, run the uninstaller and the go to flash.com and reinstall it, all works again.

Google who owns YouTube and Adobe need to get their act together, this should not happen!

The whole situation reminds me of a Bugs Bunny Bloopers Cartoon:

(Blooper) Bunny! (1991) – HQ

Start Me Up

http://www.youtube.com/watch?v=Cpd3v4wwThE

Background Articles and Information

Software Bug

A software bug is an error, flaw, mistake, failure, or fault in a computer program that prevents it from behaving as intended (e.g., producing an incorrect or unexpected result). Most bugs arise from mistakes and errors made by people in either a program’s source code or its design, and a few are caused by compilers producing incorrect code. A program that contains a large number of bugs, and/or bugs that seriously interfere with its functionality, is said to be buggy. Reports detailing bugs in a program are commonly known as bug reports, fault reports, problem reports, trouble reports, change requests, and so forth.

http://en.wikipedia.org/wiki/Software_bug

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...