About Palm Sunday

Palm Sunday is the fictional account of a private agency that is secretly monitoring the Internet. They are culling massive amounts of data from the private communications of ordinary people, without their knowledge. They do this by tapping into the underlying infrastructure of the Internet.

The Human Society


Their intent is to create a "societal profile", a snapshot of what Americans are concerned enough to be communicating about. Originally intended as a mechanism to predict when the United States might be in peril of losing its place of preeminence, the process has been subjugated to the whims of a power hungry leader with his own peculiar agenda.

When a ten-year-old boy finds a hand-held computer and brings it home, it opens a window into the clandestine activities of the secretive agency.

Purchase the Ebook

You can buy Palm Sunday as an eBook from the retailers below. If your favorite vendor is not listed, they may carry it as well.

Barnes & Noble

About the Author

Bill lives in northwestern Pennsylvania with his family and many pets. He is an Edinboro University of Pennsylvania alumnus, with a Bachelor's degree in Russian Language and additional certifications in computer programming and operations.

Bill Vitanyi

In 2009 he proposed and established the Impact writing contest, in which students at Edinboro University of Pennsylvania. submitted paragraphs of 200 words or less on a topic of their choice. The authors of the paragraphs with the greatest impact won. Over 40 students participated.

He has written several books, numerous articles at Hubpages.com (see Articles on the main page) and founded the Build-A-Book project.

Before writing Palm Sunday, Bill found a handheld device that someone had lost. In an effort to return the device it was necessary to open it and search for the owner's name. It took a bit of digging, but it turned out to belong to a coworker, and it was returned.

This incident was the kernel of a germ of an idea that sparked the thought that became the concept behind Palm Sunday. As such, it was the beginning of the thing. You just never know where an idea will come from.

Connect with the Author


Create a Website at 1and1

To contact me send email to: Contact Bayla


Chapter One

Robert Slocum casually tossed down a shot of whiskey, pursed his lips at the bite, and followed it with a swallow of cold beer. He didn't drink much, and he hadn't today. The single shot with its beer chaser was simply part of a routine he always followed before meeting a client. Throwing a few bills on the counter, he nodded at the bartender and walked towards the exit.

It was late, well after midnight, and a mix of drizzle and sleet had just started to fall. No matter, his car was only half a block away. He stepped onto the poorly lit sidewalk, and had gone no more than ten paces when something struck him a savage blow to the back of the head.

He felt himself falling, slowly corkscrewing towards the concrete walkway, as if in slow motion. Powerless to stop himself, he crashed to the ground as darkness slowly engulfed him. The faint perception of something tugging at his clothes, and distant voices, were among his last memories as he slowly lapsed into unconsciousness.

Palm Sunday: Read entire Chapter One Open PDF.

Database Technology

Bill Vitanyi

The inexorable flow of data across the centuries has progressed from leaflets, to books, to copper wires, to fiber optics and beyond. This flow requires an infrastructure, and in today's world that means the Internet.

When you think Internet infrastructure, think wires, controlled by private companies, carrying millions of bits of data just like yours. Even though you may be using a cell phone or tablet to access the Internet, and this uses a wrireless signal, ultimately your data is passing over physical wires, be they copper or fiber optic.

So what happens to your data when you press Send?


The Internet is not really one thing. It is a collection of interconnected networks, some very small, like the one in your own home, and some very large. Through connections between networks, you can reach any other point on the Internet, whether it's a web page, an email address, or something else.

The largest of these commercial networks are called backbones, and they carry an enormous enormous amount of data. In the United States these large backbones are owned by only seven companies. They are:

Level 3

Although there are many smaller players beneath the level of these few giants, to gain access to the larger online world requires that you join their network, so there is a degree of centralized control of the path of the data flow. More importantly, the streams are actually gushing rivers, a torrent of data conveniently funneled into a few massive pathways. When one is mining a valuable commodity, having that commodity available in known veins of never-ending ore is optimal.

Database Technology

If you have ever used a computer, watched a television program, or lived on Earth, you have probably heard the word database. In a general sense most people understand that this means a place where information is stored, but what exactly is a database, and why should you care?

A database is in fact a place to store information, but this information is stored in a very specific way. A database is constructed of tables, which consist of rows, which contain columns. Those columns contain the data.

A database table looks very much like a spreadsheet, with rows and columns. The difference is that a database table's columns are predefined as to type and length, whether or not they can be empty, and other criteria. Once defined, data stored in a column must conform to the column definition. A database can, and usually does, contain many tables, some of which relate to each other to make it easier and more efficient to look up data. Computer programs can reference database tables to process transactions, search for specific bits of data, or to otherwise read or manipulate the data.

There are many different database products, but the most prevalent are Oracle, Microsoft SQL Server, MySQL, and Informix, to name a few. Cost and performance are considerations when choosing which databse to use, and some are free, while others are quite expensive, both to purchase and maintain. Many organizations use more than one database system.

Once populated, a database can be searched very quickly. The language used to search a database is called Structured Query Language, or SQL, and a typical SQL statement might look something like this:

Select Lastname,Firstname,Telephone_number
From Table_01
Where Lastname = 'Smith';

This search would return the last name, first name, and telephone number for everyone with the last name Smith that is stored in the table called Table_01. The search could be done manually by a person, or by a computer program, and can be far more complex, limited only by the data contained in the database, and the expertise of the people extracting it.

Populating a database with data from the Internet backbones would provide an ongoing source for searches for specific keywords, phrases, or any combination to find conversations of interest. Although searches that dig into the domestic communications of U.S. citizens are strictly regulated by law, we cannot know what we cannot see.


If all that is required is a database and some SQL queries, then what is to prevent someone with access to the tools and a desire to snoop from digging into the data mine? A mine, incidentally, that contains your information, and mine.

Two things. First, the law. However, even that is less of a protection than it once was, with the advent of the Patriot Act as well as the Foreign Intelligence Surveillance Act, enabling statutes that give the government the right to surveil the Internet.

The second is encryption. Much of the traffic on the Internet is encoded with password protection, but cracking that code may not be as hard as once thought. Some have suggested that the National Security Agency (NSA) designed the pseudorandom number generator widely used for generating algorithms used in encryption, and know its weaknesses. If true, this would allow for easier government decryption of intercepted Internet traffic.

Logically, why would the government collect all that data if they couldn't decrypt it anyway? Further, if the technology is in the hands of the government, how far off is its transfer to private entities? Such secrets do not remain secret for long.


If you have a smart phone, and who doesn't, you may think that you can avoid the data stream of the Internet when you browse online. In fact, although you connect to the Internet either through your cell network or a wireless access device, your data is still ultimately traveling across the internet infrastructure. The wireless aspect offers convenience, but as far as the Internet is concerned, it is still just a way to get to the wires.


Communications are now largely Internet based, with much of the data travelling across a limited number of high traffic backbones, which may be susceptible to surveillance. Database technologies exist that facilitate rapid accumulation and mining of vast quantities of digital information, a difficult to resist source of raw data.

Social freedom is a democratic imperative, but if privacy of communication is violated on a national scale, that freedom is at risk. The hidden nature of the Internet infrastructure places it out of sight and out of mind, but if we are at least aware of the potential, it may be a first step in perserving our treasured privacy.

We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.


© 2020 Bayla Publishing LLC

Back to top