On Pegasus Prime, Lavender Prime, and the Double‐Edged Nature of Pre‐Crime Programs - jalToorey/IdealMoney GitHub Wiki

On Pegasus Prime, Lavender Prime, and the Double-Edged Nature of Pre-Crime Programs

In regard to the tragic event that is the Charlie Kirk assassination (and the alleged-to-be-apparent-baseless claims that "Israel" was involved) we will consider in this writing the concepts of The Paradox of Private Versus Monopolistic Perspectives, the Machiavellian Considerations of the Future AI and the Nash Equilibrium, Musings on Trans-Human AI Controlled Algorithms and State Administrations, and Operation Privatized Warp Speed and the generalizations of such and with specific regard to the Pegasus program, the Lavender program, and the double-edged nature of the concept of "pre-crime".

On Pegasus Prime

Pegasus is spyware developed by the Israeli cyber-arms company NSO Group that is designed to be covertly and remotely installed on mobile phones running iOS and Android.1(https://en.wikipedia.org/wiki/Pegasus_%28spyware%29#cite_note-WP-20210719-1) While NSO Group markets Pegasus as a product for fighting crime and terrorism, governments around the world have routinely used the spyware to surveil journalists, lawyers, political dissidents, and human rights activists.2(https://en.wikipedia.org/wiki/Pegasus_%28spyware%29#cite_note-haaretz_9093465-2) The sale of Pegasus licenses to foreign governments must be approved by the Israeli Ministry of Defense.3(https://en.wikipedia.org/wiki/Pegasus_%28spyware%29#cite_note-3)

As of September 2023, Pegasus operators were able to remotely install the spyware on iOS versions through 16.6 using a zero-click exploit.4(https://en.wikipedia.org/wiki/Pegasus_%28spyware%29#cite_note-blastpass-4) While the capabilities of Pegasus may vary over time due to software updates, Pegasus is generally capable of reading text messages, call snooping, collecting passwords, location tracking, accessing the target device's microphone and camera, and harvesting information from apps.5(https://en.wikipedia.org/wiki/Pegasus_%28spyware%29#cite_note-5)[6](/jalToorey/IdealMoney/wiki/6)(https://en.wikipedia.org/wiki/Pegasus_%28spyware%29#cite_note-:17-6) The spyware is named after Pegasus, the winged horse of Greek mythology.7(https://en.wikipedia.org/wiki/Pegasus_%28spyware%29#cite_note-7) ~ wiki Pegasus (spyware)

With regard to the Nash Equilibrium extension of a Pegasus program the want of the users/creators of it would be to implicitly have it installed and infecting in/on all citizenry's communication technologies.

In this sense a Pegasus PRIME Program would refer not to a software that affects a hardware unit but an intelligence program that sees any communication security as an adversary to be breached.

In this regard the Snowden revelations are re-levant with respect to the PRISM program:

Snowden's subsequent disclosures included statements that government agencies such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data[23] - described by Germany as "nightmarish" if true.
Internal NSA presentation slides included in the various media disclosures show that the NSA could unilaterally access data and perform "extensive, in-depth surveillance on live communications and stored information" with examples including email, video and voice chat, videos, photos, voice-over-IP chats (such as Skype), file transfers, and social networking details.[2] Snowden summarized that "in general, the reality is this: if an NSA, FBI, CIA, DIA, etc. analyst has access to query raw SIGINT [signals intelligence] databases, they can enter and get results for anything they want. ~ wiki PRISM

On Lavender Prime

Then in regard to the Lavender program which is an AI assisted targeting program Lavender PRIME would be an intelligence program which can assassinate targets with assistance from the Pegasus Prime Program.

On The Double Edged Nature of a Pre-Crime Program

Then with regard to Lavender Prime assisted by Pegasus Prime and the double-edged nature of pre-crime (and the Nash Equilibrium extension of such) there is the possibility that ASSASSINS could be targeted for assassination as if all citizens could be agents or Manchurian candidates unknowingly.

And such programs could have intentful design to function outside the jurisdiction of otherwise monopoly controlled judiciaries and with "quantum classified" protections.

A Nash Equilibrium Extension Perspective For Citizen Based Security/Privacy

Thus the citizenry of the world should be considering Pegasus not as a program that could infect a device, nor social media apps that could themselves be exploited or have back-doors for exploitation, but that the evolution of the internet is itself an extension of Pegasus Prime (as if it the exploits function "horizontally across" all social media apps etc).

On Evidence of Manchurian Assets Targeted for Assassination Targets

Then it's apparent with consideration of the Nash Equilibrium extension of the considerations of evidence for Manchurian assets targeted for assassination targets would be PRE-SANITIZED by the double-edged pre-crime program.

And thus impossible to reveal with out AT LEAST these considerations by the public.