Showing posts with label tactical evolution. Show all posts
Showing posts with label tactical evolution. Show all posts

Friday, January 17, 2020

EVERY Machine is Vulnerable to Unadvertised Behaviors (I Don't Play Guitar, I Play Electricity)


lareviewofbooks |  The past two decades have brought two interrelated and disturbing developments in the technopolitics of US militarism. The first is the fallacious claim for precision and accuracy in the United States’s counterterrorism program, particularly for targeted assassinations. The second is growing investment in the further automation of these same operations, as exemplified by US Department of Defense Algorithmic Warfare Cross-Functional Team, more commonly known as Project Maven.

Artificial intelligence is now widely assumed to be something, some thing, of great power and inevitability. Much of my work is devoted to trying to demystify the signifier of AI, which is actually a cover term for a range of technologies and techniques of data processing and analysis, based on the adjustment of relevant parameters according to either internally or externally generated feedback

Some take AI developers’ admission that so-called “deep-learning” algorithms are beyond human understanding to mean that there are now forms of intelligence superior to the human. But an alternative explanation is that these algorithms are in fact elaborations of pattern analysis that are not based on significance (or learning) in the human sense, but rather on computationally detectable correlations that, however meaningless, eventually produce results that are again legible to humans. From training data to the assessment of results, it is humans who inform the input and evaluate the output of the algorithmic system’s operations.

When we hear calls for greater military investments in AI, we should remember that the United States is the overwhelmingly dominant global military power. The US “defense” budget, now over $700 billion, exceeds that of the next eight most heavily armed countries in the world combined (including both China and Russia). The US maintains nearly 800 military bases around the world, in seventy countries. And yet a discourse of US vulnerability continues, not only in the form of the so-called war on terror, but also more recently in the form of a new arms race among the US, China and Russia, focused on artificial intelligence.

The problem for which algorithmic warfare is the imagined solution was described in the early 19th century by Prussian military theorist Carl von Clausewitz, and subsequently became known as the “fog of war.” That phrase gained wider popular recognition as the title of director Errol Morris’s 2003 documentary about the life and times of former US Defense Secretary Robert McNamara. In the film, McNamara reflects on the chaos of US operations in Vietnam. The chaos made one thing clear: reliance on uniforms that signal the difference between “us” and “them” marked the limits of the logics of modern warfighting, as well as of efforts to limit war’s injuries.

Tuesday, January 07, 2020

Can 2nd Amendment Sanctuary Be a Mass-Driver for Sustainable Localism?


libertyblitzkrieg |  Many of you probably have heard of the second amendment sanctuary movement, which consists of municipalities and counties across the U.S. passing resolutions pledging not to enforce additional gun control measures infringing upon the right to bear arms. The current movement traces its origins back to Effingham County in southern Illinois, which passed a resolution in April 2018 calling the county a second amendment “sanctuary”, essentially a vow to ignore gun control legislation proposed by Illinois state lawmakers. This particular tactic gained traction not just within Illinois, where 67 of 102 counties have now passed similar resolutions, but throughout the country.

The movement started gaining more attention over the past couple of months following the blistering momentum it found in Virginia after Democrats won the state legislature in November. As of this writing, 87 out of Virginia’s 95 counties have passed such resolutions and it’s important to note that virtually all of them were passed in the two months since the election. In other words, this is happening at a very rapid pace.

Before discussing the significance of all this, let’s address some thoughtful criticism of the movement from Michael Boldin of the Tenth Amendment Center. His primary point of contention is that the resolutions these municipalities and counties are passing — unlike immigration sanctuary ordinances passed in places such as San Francisco — carry no weight of the law.

Specifically, they’re not passing ordinances, but rather resolutions, which Michael describes as “non-binding political statements.” In other words, it’s all just talk at this stage and he’s frustrated that much of the media coverage makes it seem what’s being passed is more concrete than it actually is. Although I disagree with his overall assessment of the importance of what’s happening, he makes many good points and puts some much needed meat on the bone of this issue for those getting up to speed. He published an instructive video on the topic, which I recommend checking out.

Sunday, November 10, 2019

Drone Technology Has Disintermediated the Imperial Sovereign Murder Monopoly


technologyreview |  Sophisticated weapons systems have one drawback: the enemy must expose himself within the effective killing range in order for the weapon to work as intended. The smart combatant, of course, rarely exposes himself. So when we do home in on enemy fighters, we use a $30 million aircraft to drop a JDAM (joint direct attack munition) and kill a dozen guys living in tents on the side of a mountain. What has that $30 million technological advantage bought us? The highly (and expensively) trained aviator piloting a beautifully complex flying and killing machine just extinguished some men living under canvas and sticks, men with a few thousand rounds of small arms ammo at their disposal. The pilot will return to his expensive air base or carrier. He will have a hot shower, eat hot chow, Skype his wife and children, maybe play some Xbox, and hit the gym before he hits the rack. He will not, nor will he be asked to, concern himself with the men he killed a few hours ago. And in a draw or valley a few klicks away from where the pilot’s munitions impacted, there is another group of men living under extremely basic circumstances, eating boiled rice and maybe a little roasted meat. They will ambush an American convoy or attack a government-friendly village in the morning. Native grit debases our technologically superior forces and materiel. Native grit wins a war.

asiatimes |   Houthi striking capability – from drone swarms to ballistic missile attacks – has been improving remarkably for the past year or so. It’s not by accident that the UAE saw which way the geopolitical and geoeconomic winds were blowing: Abu Dhabi withdrew from Crown Prince Mohammad bin Salman’s vicious war against Yemen and now is engaged in what it describes as a  “peace-first” strategy.

Even before Abqaiq, the Houthis had already engineered quite a few attacks against Saudi oil installations as well as Dubai and Abu Dhabi airports. In early July, Yemen’s Operations Command Center staged an exhibition in full regalia in Sana’a featuring their whole range of ballistic and winged missiles and drones.

 The situation has now reached a point where there’s plenty of chatter across the Persian Gulf about a spectacular scenario: the Houthis investing in a mad dash across the Arabian desert to capture Mecca and Medina in conjunction with a mass Shiite uprising in the Eastern oil belt. That’s not far-fetched anymore. Stranger things have happened in the Middle East. After all, the Saudis can’t even win a bar brawl – that’s why they rely on mercenaries.

Orientalism strikes again

The US intel refrain that the Houthis are incapable of such a sophisticated attack betrays the worst strands of orientalism and white man’s burden/superiority complex.

The only missile parts shown by the Saudis so far come from a Yemeni Quds 1 cruise missile. According to Brigadier General Yahya Saree, spokesman for the Sana’a-based Yemeni Armed Forces, “the Quds system proved its great ability to hit its targets and to bypass enemy interceptor systems.”

Friday, September 14, 2018

Speaking of Termites and Tennis Umpires...,


Tennis umpires are reportedly considering a boycott of Serena Williams matches. The public statement of boycotting Serena’s games underscores beyond any shadow of a doubt the specific nature of this particular tempest on a tennis court. Even in the twilight of her career, the disparate economic influence of the GOAT on the worldwide enterprise of tennis  vs. the butt hurt bleetings of some expendable little men - will be most interesting to observe and measure.

There have been rumblings for years about replacing these overpaid and underperforming accessories to the match with computers, taking the element of human error (and human sensitivity) out of the equation. If the umpires go on strike, it will be a perfect opportunity to begin testing a new and improved HawkEye system which does a bit more than accurately track tennis ball ballistics.

In the interim, while the final and permanent disintermediation of highly fallible human umpires is developed, it will not be difficult to find other umpires to replace the ITF's little men with their panties in an ill-considered bunch. Technology has advanced to the point where umpires aren't really necessary. 

The victorian-era rules of tennis are a little archaic and arbitrary to being with, the fact that they are selectively enforced means it's overdue time for a change. 

medium |  Serena’s unhinged outbursts in yesterday’s US Open Championship, was an embarrassment and an eyeopener to who and what she’s become. We can go back and forth on what other male players have said and gotten away with, one has nothing to do with the other in this case. Serena’s issues over her career have not been because she was a woman but because she was Black. It’s disingenuous of those who claim to be woke, to not acknowledge that Serena used every liberal and feminists excuse, except for the real issue that’s plagued her career; her skin color.

This intersectionality game that Feminist play to ensure that White women are the real benefactors in all things related to womanhood and civil rights, is becoming irritating. The fact that Serena did not acknowledge her Blackness as the real issue she has been constantly discriminated against, was a slap in the face for Black women and more importantly Black female athletes. Serena has attempted to use her giving birth and being a mother as somehow a foreign thing in women’s sports. She has also bought into the social media hype and White liberals newfound love and praise for her because she’s a mother.

Monday, July 23, 2018

Full Spectrum Subversion by Russian Electronic Warfare and Anti-Satellite Systems..,


unz |  But there is more bad news for the AngloZionist Empire: in a recent interview by General Iurii Borisov, Deputy Prime Minister for Defense and Space Industry named six weapons systems which, in his opinion, have no counterpart in western arsenals. These include two almost never (or very rarely) mentioned before:
  1. The “Sarmat” heavy MIRVed ICBM
  2. The Sukhoi Su-57 aka “PAKFA”, the 5th generation jet fighter being developed for air superiority and attack operations
  3. The revolutionary T-14 “Armata” main battle tank
  4. The long-range S-500 air defense system
  5. The mobile anti-satellite system “Nudol
  6. The ground-based mobile jamming system for satellite communications “Triada-2S
While the first four systems listed have been known for a while, very little is known about the Nudol ASAT or the Triada-2S jamming systems. A couple of years ago, in 2015, The Washington Free Beacon wrote one article about the Nudol system entitled “Russia Flight Tests Anti-Satellite Missile Moscow joins China in space warfare buildup” but I did not find anything at all in English about the Triada-2S. There are a few articles published about these two systems in Russian however, and I will summarize them here beginning with the Nudol system.

The Russian plan to counter the US military threat is becoming clearer and clearer with each passing day. I would summarize as follows:
US CapabilityRussian Response
ABM systemmaneuverable hypersonic ballistic and very long-range cruise missiles
US aircraft carriers and surface fleetmaneuverable hypersonic ballistic and very long-range cruise missiles
US airpower and cruise missilesadvanced and integrated air defenses + 5th generation multirole fighters
US attack submarinesadvanced diesel-electric/AIP submarines in littoral and coastal waters
US command, control, communications, networks, and satelliteselectronic warfare and anti-satellite systems
US/NATO deployments near RussiaTank Armies with T-14s, doubling of the size of the Airborne Forces, Iskander missiles (see here)
US nuclear forcesDeployment of a next-generation SSBNs, road-mobile and rail-mobile ICBMs, PAK-DA (next generation bomber) and ABM systems

By targeting US space-based capabilities Russia is aiming at an exceedingly important and currently extremely fragile segment of the US armed forces and the impact of that cannot be overstated. It is already well known that the US military has almost no practice operating in a highly contested electronic warfare environment and that, in fact, US EW capabilities have stagnated over the years. In the age of advanced communication and network-centric warfare, the disruption or elimination of any meaningful segment of the US space-based capabilities would have a dramatic impact on US warfighting capabilities. Just like US tactical air is practically completely dependent on AWACs support, all the branches of the US military have grown accustomed to enjoying advanced command, control, communications, computers, intelligence, surveillance, and reconnaissance capabilities (C4ISR) and this is what the Russians want to deny them (and you can bet that the Chinese are working along the exact same lines).

This is not to say that Russia has achieved anywhere near full-spectrum dominance over the United States but it does mean that the United States has totally failed in its efforts to achieve anything near full-spectrum dominance over Russia and, therefore, over the rest of the planet. It is important to understand that while, for the US, it is crucial to achieving superiority, for Russia it is enough to deny that superiority to the US. Russia, therefore, has no need to achieve anything even remotely resembling full-spectrum dominance over the US/NATO – all she needs to achieve is to make it impossible for the Empire to make her submit by force or threat of force.

Sunday, May 06, 2018

Weaponized Autism: Fin d'Siecle Programmer's Stone


melmagazine |  We know that people on the spectrum can exhibit remarkable mental gifts in addition to their difficulties; Asperger syndrome has been associated with superior IQs that reach up to the “genius” threshold (4chan trolls use “aspie” and “autist” interchangeably). In practice, weaponized autism is best understood as a perversion of these hidden advantages. Think, for example, of the keen pattern recognition that underlies musical talent repurposed for doxxing efforts: Among the more “successful” deployments of weaponized autism, in the alt-right’s view, was a collective attempt to identify an antifa demonstrator who assaulted several of their own with a bike lock at a Berkeley rally this past April.

As Berkeleyside reported, “the amateur detectives” of 4chan’s /pol/ board went about “matching up his perceived height and hairline with photos of people at a previous rally and on social media,” ultimately claiming that Eric Clanton, a former professor at Diablo Valley College, was the assailant in question. Arrested and charged in May, Clanton faces a preliminary hearing this week, and has condemned the Berkeley PD for relying on the conjecture of random assholes. “My case threatens to set a new standard in which rightwing extremists can select targets for repression and have police enthusiastically and forcefully pursue them,” he wrote in a statement.

The denizens of /pol/, meanwhile, are terribly proud of their work, and fellow Trump boosters have used their platforms to applaud it. Conspiracy theorist Jack Posobiec called it a new form of “facial recognition,” as if it were in any way forensic, and lent credence to another dubious victory for the forces of weaponized autism: supposed coordination with the Russian government to take out ISIS camps in Syria. 4chan users are now routinely deconstructing raw videos of terrorist training sites and the like to make estimations about where they are, then sending those findings to the Russian Ministry of Defense’s Twitter account. There is zero reason to believe, as Posobiec and others contend, that 4chan has ever “called in an airstrike,” nor that Russia even bothered to look at the meager “intel” offered, yet the aggrandizing myth persists.

Since “autistic” has become a catchall idiom on 4chan, the self-defined mentality of anyone willing to spend time reading and contributing to the site, it’s impossible to know how many users are diagnosed with the condition, or could be, or earnestly believe that it correlates to their own experience, regardless of professional medical opinion. They tend to assume, at any rate, that autistic personalities are readily drawn to the board as introverted, societal misfits in search of connection. The badge of “autist” conveys the dueling attitudes of pride and loathing at work in troll communities: They may be considered and sometimes feel like failures offline — stereotyped as sexless, jobless and immature — but this is because they are different, transgressive, in a sense better, elevated from the realm of polite, neurotypical normies. Their handicap is a virtue.

Sunday, November 19, 2017

Weaponization of Monetization? Nah, Just Look In the Mirror For the Problem...,


DailyMail  |  The wildly popular Toy Freaks YouTube channel featuring a single dad and his two daughters has been deleted, amid a broader crackdown on disturbing children's content on the video streaming platform.

Toy Freaks, founded two years ago by landscaper Greg Chism of Granite City, Illinois, had 8.53million subscribers and was among the 100 most-viewed YouTube channels before it was shutdown on Friday. 

Though it's unclear what exact policy the channel violated, the videos showed the girls in unusual situations that often involved gross-out food play and simulated vomiting. The channel invented the 'bad baby' genre, and some videos showed the girls pretending to urinate on each other or fishing pacifiers out of the toilet.

Another series of videos showed the younger daughter Annabelle wiggling her loose teeth out while shrieking and spitting blood. 

'He is profiting off of his children's pain and suffering,' one indignant Reddit user wrote about the channel last year. 'It's barf inducing and no mentally stable person or child should ever have to watch it.'

A YouTube spokesperson said in a statement: 'It's not always clear that the uploader of the content intends to break our rules, but we may still remove their videos to help protect viewers, uploaders and children. We've terminated the Toy Freaks channel for violation of our policies.

Monday, November 13, 2017

None of These WEAPONS Products Is What It Appears To Be...,


nakedcapitalism  |  As the Philadelphia meetup, I got to chat at some length with a reader who had a considerable high end IT background, including at some cutting-edge firms, and now has a job in the Beltway where he hangs out with military-surveillance types. He gave me some distressing information on the state of snooping technology, and as we’ll get to shortly, is particularly alarmed about the new “home assistants” like Amazon Echo and Google Home. 

He pointed out that surveillance technology is more advanced than most people realize, and that lots of money and “talent” continues to be thrown at it. For instance, some spooky technologies are already decades old. Forgive me if this is old hat to readers:
Edward Snowden has disabled the GPS, camera, and microphone on his cell phone to reduce his exposure. As most readers probably know, both the microphone and the camera can be turned on even when the phone has been turned off. He uses headphones to make calls. This makes the recent phone design trend away from headphone jacks look particularly nefarious.
“Laser microphones” can capture conversations by shining a laser on a window pane and interpreting the vibrations. However, this isn’t really a cause for worry since there are easier ways to spy on meetings.
With a voice recording (think a hostage tape), analysts can determine the room size, number of people in the room, and even make a stab at the size and placement of objects, particularly if they get more than one recording from the same site.
But what really got this reader worked up was Amazon’s Echo, the device that allows users to give voice instructions to a device that will tell your TV to stream video or audio. order from Amazon or other participating vendors, provide answers to simple search queries, like “Tell me the weather,” perform simple calculations, and allow you to order around smart devices in your home that are on the networks. like tell your coffee maker to make some coffee. He said, “I’d never take one of them out of the box.”

He was at a party recently with about 15-20 people when the host decided to show off her Echo. She called across the room, “Alexa, tell me the capital of Wisconsin,” and Alexa dutifully responded.
Based on his knowledge of other technologies, here is what he argues was happening:
The Echo was able to pick a voice out of a crowd engaged in conversation. That means it is capable of singling out individual voice. That means it has been identifying individual voices, tagging the as “Unidentified voice 1″, Unidentified voice 2” and so on. It has already associated the voices of its owners, and if they have set up profiles for other family members, for them as well, so it knows who goes with those voices.
Those voices may be unidentified now, but as more and more voice data is being collected or provided voluntarily, people will be able to be connected to their voice. And more and more recording is being done in public places.
So now think of that party I was at. At some time in the not too distant future, analysts will be able to make queries like, “Tell me who was within 15 feet of Person X at least eight times in the last six months.” That will produce a reliable list of their family, friends, lovers, and other close associates.
CNET claims that Amazon uploads and retains voice data from the Echo only when it has been activated by calling to it and stops recording when the request ends. But given the Snowden revelations that every camera and microphone in computers and mobile devices can be and are used as viewing and listening devices even when the owner thinks they are off, I would not be so trusting. Even if Amazon isn’t listening and recording at other times, the NSA probably can. CNET adds:
Amazon Echo is always listening. From the moment you wake up Echo to the end of your command, your voice is recorded and transcribed. And then it’s stored on Amazon’s servers….
It’s unclear how long the data is stored, but we do know that it is not anonymized. And, for now, there’s no way to prevent recordings from being saved.
Reread the first paragraph. The Echo has to be listening at all times in order to respond to the “Alexa” command. So the only question is whether Amazon or some friendly member of the surveillance state is recording then too. 

This scenario ties into a recent development I find alarming: banks and other retail financial firms relentlessly offering to let you use your voice as your identifier if you wind up calling them. Every time I have called, I have to waste time rejecting their efforts to route me into that system. I’ve told the customer reps I never want that done but there is no way to override that even when I call in from a phone number they recognize as belonging to a customer.

Wednesday, July 05, 2017

Pill City


vice |  When the Baltimore riots erupted in April 2015 after Freddie Gray's death in police custody, James "Brick" Feeney and Willie "Wax" Harris*, two tech-savvy teenagers with ties to Maryland's Black Guerrilla Family (BGF), saw opportunity. Using the chaos as cover, they managed to steal at least a million doses of prescription drugs and heroin from city pharmacies and rival dealers. But even if their caper was essentially an old-school, smash-and-grab-style theft, the teens had plans to sell the drugs in a more sophisticated manner: via the Dark Web, where pills went for upward of $100 each.

Leaning on location-based technology and encrypted messaging software, Brick envisioned their operation as an "Uber of drug dealing."

As the looted drugs were shipped up and down the East Coast, a spike in opiate overdoses in African American communities raised eyebrows, and the DEA and FBI eventually took notice. In his forthcoming book Pill City: How Two Honor Roll Students Foiled the Feds and Built a Drug Empire, veteran crime reporter Kevin Deutsch profiles the the teens' massively profitable scheme, which he contends had (distant) ties to El Chapo's Sinaloa cartel. 

Deutsch enjoyed incredible access to the two teens and some 300 other dealers, addicts, gang bangers, police, and drug-treatment specialists for the book. A reporter who prefers to work with his "feet on the ground," Deutsch saw the vicious effects of America's opioid epidemic in an urban setting. VICE talked to the journalist about how he wrapped his head around the technology in play, how opiates were never just a middle-class white problem, and where Brick and Wax are at now.

Tuesday, June 27, 2017

Don't Comprehend "Real" Currency But Steady Yapping About Cryptocurrency


paecon |  Despite the fact that the goal of capitalists is to accumulate evermore money, the classical political economists largely took the analysis of money for granted.4 To be sure, from Adam Smith to Karl Marx, we can certainly find passages on money but two things are of general note. First, the classical political economists as well as Karl Marx thought gold and silver were “real” money. In other words, money was understood as “commodity money” and therefore to expand the money supply meant finding new mines, plundering it from others, or selling goods or services on the world market to obtain it from others who possessed it. Indeed, a considerable portion of the history of slavery and colonial violence can be traced back to the elite concern for acquiring gold and silver (Di Muzio and Robbins, 2016; Graeber, 2012; Kwarteng, 2014; Vilar, 1986). Second, because gold and silver were thought to be money, the classics failed to understand the scale or level of credit creation that began with the institutionalization of the Bank of England in 1694. Many argue that the Bank of England was inspired by the Bank of Amsterdam and the success of Dutch finance. But this is not the case. While the Bank of Amsterdam did make loans from time to time, its primary function was to maintain the quality of the paper notes in circulation that represented coin. Moreover, the bank was owned by the city, not private social forces as came to be the case with the Bank of England (Wennerlind, 2011: 69; Vilar, 1986: 206; Zarlenga, 2002: 238ff). Whereas the notes issued by the Bank of Amsterdam mostly reflected the exact value of gold and silver in the city’s vault, the Bank of England expanded the English money supply by extending paper notes as credit (Desan, 2014: 311ff). 

The Bank of England’s largest customer was the Crown in Parliament who used the initial loan of £1,200,000 to finance war with France. Indeed, the main reason why the Royal Charter was granted to the Bank of England’s 1509 investors was to provide the finance for organized violence against a dynastic rival (Davies, 2002: 261). The slave trade, colonization and continuous wars in the next two centuries lead to a mounting and unpayable “national” debt that solidified the Bank’s role as the government’s permanent debt manager. But the investors in the Bank of England did not only profit from war and debt, they also benefited from the interest received on loans to individuals and companies. As Wennerlind underscores, the Bank of England’s notes became “Europe’s first widely circulating credit currency” (2011: 109). Theoretically, however, the issued notes remained tethered to a metallic hoard of silver, and later only gold from 1861 (Davies, 2002: 315). No one knows for certain how much metal coin backed up the notes in circulation at any one time. In one study, Rubini argued that the Bank of England had a shifting reserve of silver for all notes in circulation of about 2.8 percent to 14.2 percent (1970: 696). Another study by Wennerlind argued that the founder of the Bank, William Paterson, proposed that 15 to 20 percent in silver for all notes outstanding would suffice to assure sufficient confidence in the Bank of England (2011: 128).5 This ambiguity and the fact that the Bank of England was privileged by the government, likely helped the Bank gain confidence among the users of its notes. As long as citizens thought they could eventually cash in their notes for silver/gold coins, faith in this system of money creation could continue (Kim, 2011). This uncertainty need not delay us, for what is definite is that the notes in circulation were of a far higher value than the actual metallic hoard at the Bank. To sum up this brief history of the world’s first widely circulating credit currency we can argue that new money was created as loans to customers – primarily to the British Crown in Parliament and primarily to finance an apparatus of international violence and Empire. 

By the early 19th century, the British politician, Samson Ricardo, realized the absurdity of granting private social forces the power to create money:
“It is evident therefore that if the Government itself were to be the sole issuer of paper money instead of borrowing it of the bank, the only difference would be with respect to interest: the Bank would no longer receive interest and the government would no longer pay it…It is said that Government could not with safety be entrusted with the power of issuing paper money – that it would most certainly abuse it... I propose to place this trust in the hands of three Commissioners” (Ricardo, 1838: 50). 
Ricardo’s proposal that the public take control of new money creation was ignored. In the 1844 Bank Charter Act, the Bank of England was given the exclusive right to issue banknotes in London. Country banks that were already issuing notes could continue to do so provided they were outside London (by a 65 mile radius) and backed their notes with some kind of credible security. Under this Act, the Bank of England was also divided into two distinct units, the Issue Department and the Banking Department. Davies highlights this important provision of the Act:
“The Issue Department was to receive from the Banking Department some £14 million of government securities to back its fiduciary issue of notes, any  issue above that [was] to be fully backed by gold and silver, the latter not to exceed one quarter of the gold” (2002: 315). 
Thus, while the Bank of England had the exclusive right to issue banknotes in London, its ability to create new money appeared to be circumscribed by the new laws. Existing banks outside of London were also seemingly bounded in their ability to create money. However, while official note issuance was restricted, this did not stop the Bank of England and other provincial banks from merely recording new loans on their balance sheets and issuing cheques to borrowers (Davies, 2002: 317). In other words, the bankers found a convenient way around the legislation and continued to expand the money supply regardless of gold reserves which were never publically known anyway. This changed the nature of banking in Britain and as we shall discuss, its legacy largely remains with us today. With this in mind, we now move to examine two theories of money creation: the heavily taught fractional reserve theory known popularly as the money multiplier model and the underappreciated credit creation theory. 

Saturday, June 24, 2017

Adept Police Forces Are Essential for Capitalist Empire Democracy


Jacobin |  The most dramatic effort to modernize policing at home occurred with President Lyndon Johnson’s War on Crime. The 1968 Omnibus Crime Control and Safe Streets Act created the Law Enforcement Assistance Administration (LEAA), which provided funding, developed guidelines, and helped with coordination among federal, state, and municipal law-enforcement agencies, while also offering research grants to test experimental tactics and technologies. A decade before the beginning of the incarceration boom, a federally backed revamping of law enforcement set the stage.

The original idea for new federal anticrime infrastructure had emerged a few years earlier, in early autumn 1964. Summer unrest had shown police forces to be underprepared and insufficiently trained to handle urban riots or apparently increasing crime levels. As a result, Johnson administration officials launched a program to assist domestic law enforcement modeled on an ongoing program to assist foreign police.

Counterinsurgent foreign police assistance was not new in the 1960s, but it gained a robust, centralized leadership and a budgetary line of its own in 1962. The program consisted of three areas: technical assistance, such as help setting up crime laboratories, surveillance units, or prisons; material aid, what some skeptics derided as “running guns to cops”; and training. Advisers aimed to help indigenous forces fight ordinary crime, control unrest, and keep tabs on radicals. No great distinctions were drawn between these tasks, and the means for their accomplishment overlapped.

In December 1963, the Office of Public Safety (OPS), housed within the Agency for International Development, opened its International Police Academy in Washington, DC. High- and mid-ranking police officials from over seventy-five countries attended classes there for a decade. They learned state-of-the-art police techniques, including logistics, riot control, marksmanship, and record-keeping. The academy’s raison d’etre was one of “training trainers,” so lessons imparted there were sure to be replicated in other countries.
One OPS executive argued,
Regardless of what color policemen are, the suits they wear, what they call themselves, they are all the same. They are the same for the simple reason that a policeman exists in society as a behavior control mechanism. The basic principles of what is done, how it is done, and why it is done are the same.
If this projection was not yet true, OPS’s mission was to make it a reality.

Culled from agencies around the country, OPS’s advisers represented the best and most versatile experts US law enforcement had to offer. In addition to prior police work at home, most also had experience in counterinsurgency and special-warfare operations overseas.

Although Congress eventually shuttered OPS amid accusations that it taught and condoned torture and bomb-making, most of its work was utterly pedestrian — and that underpins today’s problem. OPS’s version of counterinsurgency did not try to institute highly militarized police forces so much as attempt to create standards of discipline, specialized units, benchmarks for training, facility with up-to-date technologies, and autonomy from external influences. Its lessons were based on the idea that adept police forces are essential for capitalist democracy.

Even today, we live with the legacies of OPS. Its program of total surveillance of South Vietnamese citizens using tamper-proof national ID cards might make today’s electronic spies jealous, but the means of checking those IDs — stop-and-frisk — would be recognizable to any beat cop in New York or Chicago. In 1964, an OPS training manual advised, “These methods — checks, searches, passes — are tolerated only in situations of national emergency in which they are necessary to combat the enemy. Viet Nam today is in the midst of such an emergency.” But today, on US streets with continually declining crime rates, these “reformed” actions of the police constitute the emergency.

Saturday, June 10, 2017

Is Brer Rabbit Whitlock Caping Up For Kaepernick or Jerry Jones, or Both?



dallasnews |  Whitlock, on the Herd with Colin Cowherd Friday, said Kaepernick is a good fit, "As far as someone on the roster who can back up Dak Prescott, who can play behind that offensive line that provides plenty of protection, who would be playing for the perfect owner, the guy whose brand has been about second chances for athletes." 

Whitlock said Cowboys owner Jerry Jones is the perfect guy to give Kaepernick a second chance. 
"Whether you like him or not -- and he's the poster boy for all these alleged conservative bigoted NFL owners who voted for Trump and hate black people -- yeah, Jerry Jones, he's that guy," 

Whitlock said. "The guy that gave Greg Hardy a second chance. The guy that stood by Michael Irvin during his playing career and after his playing career and has helped Michael Irvin become a better person and someone who has been able to take care of his family and friends. Jerry Jones the conservative alleged bigot has been tremendous with black athletes. The social justice warrior class won't tell you these things because they're lying to you. That all these NFL owners, they're just so out of control with their bigotry and they hate these black quarterbacks.

Tuesday, May 16, 2017

The System


wikipedia |  Systema (Система, literally meaning The System) is a Russian martial art.[1] Training includes, but is not limited to: hand-to-hand combat, grappling, knife fighting, and firearms training. Training involves drills and sparring without set kata. In Systema, the body has to be free of tensions, filled with endurance, flexibility, effortless movement, and explosive potential; the "spirit" or psychological state has to be calm, free of anger, irritation, fear, self-pity, delusion, and pride.[2]

Systema focuses on breathing, relaxation, and fluidity of movement, as well as utilizing an attacker's momentum against him and controlling the six body levers (elbows, neck, knees, waist, ankles, and shoulders) through pressure point application, striking, and weapon applications. As a discipline, it is becoming more and more popular among police and security forces and it is taught by several practitioners inside and outside Russia.


Correct Kettlebell Movements Are Like Feldenkrais On Steroids


wikipedia |  The Russian girya (ги́ря, a loanword from Persian غران girān "heavy") was a type of metal weight, primarily used to weigh crops, in the 18th century. The use of such weights by circus strongmen is recorded for the 19th century. They began to be used for recreational and competition strength athletics in Russia and Europe in the late 19th century. The birth of competitive kettlebell lifting or girevoy sport (гиревой спорт) is dated to 1885, with the foundation of the founding year of the "Circle for Amateur Athlethics" (Кружок любителей атлетики).[2]

Russian kettlebells (Russian: ги́ри giri, singular ги́ря girya) are traditionally measured in weight by pood, corresponding to 16.38 kilograms (36.1 lb).[3] The English term kettle bell has been in use since the early 20th century.[4]

Similar weights used in Classical Greece were the haltere, comparable to the modern kettlebell in terms of movements. Another comparable instrument was used by Shaolin monks in China.


Wednesday, April 12, 2017

The Blockchain and Us


blockchain-documentary |  What is the Blockchain?

blockchain, NOUN /ˈblɒktʃeɪn/
A digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly.
From en.oxforddictionaries.com/definition/blockchain

A mysterious white paper (Nakamoto, Satoshi, 2008, “Bitcoin: A Peer-to-Peer Electronic Cash System”) introduced the Bitcoin blockchain, a combination of existing technologies that ensures the integrity of data without a trusted party. It consists of a ledger that can’t be changed and a consensus algorithm—a way for groups to agree. Unlike existing databases in banks and other institutions, a network of users updates and supports the blockchain—a system somewhat similar to Wikipedia, which users around the globe maintain and double-check. The cryptocurrency Bitcoin is the first use case of the blockchain, but much more seems to be possible.

The Next Generation of the Internet
The first 40 years of the Internet brought e-mail, social media, mobile applications, online shopping, Big Data, Open Data, cloud computing, and the Internet of Things. Information technology is at the heart of everything today—good and bad. Despite advances in privacy, security, and inclusion, one thing is still missing from the Internet: Trust. Enter the blockchain.

The Blockchain and Us: The Project
When the Wright brothers invented the airplane in 1903, it was hard to imagine there would be over 500,000 people traveling in the air at any point in time today. In 2008, Satoshi Nakamoto invented Bitcoin and the blockchain. For the first time in history, his invention made it possible to send money around the globe without banks, governments or any other intermediaries. Satoshi is a mystery character, and just like the Wright brothers, he solved an unsolvable problem. The concept of the blockchain isn’t very intuitive. But still, many people believe it is a game changer. Despite its mysterious beginnings, the blockchain might be the airplane of our time.

Economist and filmmaker Manuel Stagars portrays this exciting technology in interviews with software developers, cryptologists, researchers, entrepreneurs, consultants, VCs, authors, politicians, and futurists from the United States, Canada, Switzerland, the UK, and Australia.
How can the blockchain benefit the economies of nations? How will it change society? What does this mean for each of us? The Blockchain and Us is no explainer video of the technology. It gives a view on the topic far from hype, makes it accessible and starts a conversation. For a deep dive, see all full-length interviews from the film here.

Saturday, March 18, 2017

Robert Mercer: Brainbug and Moneybag Behind the Trump Presidency


NewYorker |  In 1993, when Nick Patterson mailed Robert Mercer a job offer from Renaissance, Mercer threw it in the trash: he’d never heard of the hedge fund. At the time, Mercer was part of a team pioneering the use of computers to translate languages. I.B.M. considered the project a bit of a luxury, and didn’t see its potential, though the work laid the foundation for Google Translate and Apple’s Siri. But Mercer and his main partner, Peter Brown, found the project exciting, and had the satisfaction of showing up experts in the field, who had dismissed their statistical approach to translating languages as impractical. Instead of trying to teach a computer linguistic rules, Mercer and Brown downloaded enormous quantities of dual-language documents—including Canadian parliamentary records—and created code that analyzed the data and detected patterns, enabling predictions of probable translations. According to a former I.B.M. colleague, Mercer was obsessive, and at one point took six months off to type into a computer every entry in a Spanish-English dictionary. Sebastian Mallaby, in his 2010 book on the hedge-fund industry, “More Money Than God,” reports that Mercer’s boss at I.B.M. once jokingly called him an “automaton.”

In 2014, Mercer accepted a lifetime-achievement award from the Association for Computational Linguistics. In a speech at the ceremony, Mercer, who grew up in New Mexico, said that he had a “jaundiced view” of government. While in college, he had worked on a military base in Albuquerque, and he had showed his superiors how to run certain computer programs a hundred times faster; instead of saving time and money, the bureaucrats ran a hundred times more equations. He concluded that the goal of government officials was “not so much to get answers as to consume the computer budget.” Mercer’s colleagues say that he views the government as arrogant and inefficient, and believes that individuals need to be self-sufficient, and should not receive aid from the state. Yet, when I.B.M. failed to offer adequate support for Mercer and Brown’s translation project, they secured additional funding from DARPA, the secretive Pentagon program. Despite Mercer’s disdain for “big government,” this funding was essential to his early success.

Meanwhile, Patterson kept asking Mercer and Brown to join Renaissance. He thought that their technique of extracting patterns from huge amounts of data could be applied to the pile of numbers generated daily by the global trade in stocks, bonds, commodities, and currencies. The patterns could generate predictive financial models that would give traders a decisive edge.

Tuesday, March 07, 2017

Does Technology Destroy Jobs?


mishtalk |  In light of my posts on robots, driverless vehicles, and automation, readers keep asking: where will the jobs come from?

I do not know, nor does anyone else. But does that mean jobs won’t come?

Is technology destroying jobs for the first time?

Daniel Lacalle on the Hedgeye blog offers this bold claim: Face It, Technology Does Not Destroy Jobs.

Tuesday, February 28, 2017

Would You Trust A Robot to Perform Surgery?


sciencefriday  |  Forget about finding the best surgeon in town. Why not undergo your operation by a robot, which has learned from the best, without the element of human error? Researchers have now developed a robot that can perform sutures and other delicate operations completely autonomously. But would you trust it? Physician Peter Kim and his colleagues recently detailed their invention, which they call the Smart Tissue Autonomous Robot, in Science Translational Medicine. Kim says his goal is to get the robot into hospitals nationwide by keeping the price well below the cost of the surgeon-assisted robots used today. 

technologyreview |   A robot surgeon has been taught to perform a delicate procedure—stitching soft tissue together with a needle and thread—more precisely and reliably than even the best human doctor.

The Smart Tissue Autonomous Robot (STAR), developed by researchers at Children’s National Health System in Washington, D.C., uses an advanced 3-D imaging system and very precise force sensing to apply stitches with submillimeter precision. The system was designed to copy state-of-the art surgical practice, but in tests involving living pigs, it proved capable of outperforming its teachers.

Currently, most surgical robots are controlled remotely, and no automated surgical system has been used to manipulate soft tissue. So the work, described today in the journal Science Translational Medicine, shows the potential for automated surgical tools to improve patient outcomes. More than 45 million soft-tissue surgeries are performed in the U.S. each year. Examples include hernia operations and repairs of torn muscles.

Saturday, February 18, 2017

Elon Musk Thinks Humans Must Merge with Machines


libertyblitzkrieg |  To start, let’s examine some recent comments made by Elon Musk at the World Government Summit in the UAE.

ArsTechnica reports:
Humans must become cyborgs and develop a direct high-bandwidth connection with machines or risk irrelevance and obsolescence, says Tesla and SpaceX founder Elon Musk.
Musk’s latest cheery thoughts were imparted at the World Government Summit in the UAE. “Over time I think we will probably see a closer merger of biological intelligence and digital intelligence,” Musk said, according to CNBC.
The main thrust of Musk’s argument seems to hinge on the limited bandwidth and processing power of a single human being. Computers can ingest, transfer, and process gigabytes of data per second, every second, forever. Meatbags, however, are severely limited by an input/output rate—talking, typing, listening—that’s best measured in bits per second. Thus, avoid replacement by robot or artificial intelligence, we need to become machines.
By way of example, Musk spoke about self-driving cars, which will very soon start displacing jobs—lots and lots of jobs. “The most near term impact from a technology standpoint is autonomous cars … There are many people whose jobs are to drive. In fact I think it might be the single largest employer of people … We need to figure out new roles for what do those people do, but it will be very disruptive and very quick.”
Autonomous vehicles are perhaps the most visible prominence when it comes to recent developments in AI, but rest assured (or not) that we aren’t even close to AI’s capability ceiling. Current deployments of AI are quite limited in that they can only perform one or two tasks adequately—drive a car, lift a piece of steel, flip a burger—but AI research is slowly bubbling towards artificial general intelligence (AGI), which can ostensibly perform every task that a human is capable of.
Once that happens, it’s fairly safe to assume that AGI will continue to improve until, in the words of Elon Musk, it is “smarter than the smartest human on earth.”
As for how humans might achieve silicon symbiosis, the jury’s still out. Musk, according to CNBC, proposed a brain-attached high-bandwidth computer link, perhaps via neural lace. Low-speed and low-resolution EEG-based brain-computer interfaces already exist, of course, but I doubt that’s what Musk has in mind. In all likelihood, we will need to massively improve our understanding of the human brain before any such interface can be created.
Musk has been one of the individuals at the forefront of warning about the threats of artificial intelligence (AI) for a very long time, but it appears the thrust of his most recent comments center around concerns that a rapid increase in technology applied to the economy will result in a massive wave of job losses. This seems plausible to me, and I’ve called attention to it in the past. For example, in the 2015 post, Chinese Company Moves to Replace 90% of its Workforce with Robots,

Is Google Deep Mind Exhibiting Greed and Aggression?


theantimedia |  Will artificial intelligence get more aggressive and selfish the more intelligent it becomes? A new report out of Google’s DeepMind AI division suggests this is possible based on the outcome of millions of video game sessions it monitored. The results of the two games indicate that as artificial intelligence becomes more complex, it is more likely to take extreme measures to ensure victory, including sabotage and greed.

The first game, Gathering, is a simple one that involves gathering digital fruit. Two DeepMind AI agents were pitted against each other after being trained in the ways of deep reinforcement learning. After 40 million turns, the researchers began to notice something curious. Everything was ok as long as there were enough apples, but when scarcity set in, the agents used their laser beams to knock each other out and seize all the apples.

The aggression, they determined, was the result of higher levels of complexity in the AI agents themselves. When they tested the game on less intelligent AI agents, they found that the laser beams were left unused and equal amounts of apples were gathered. The simpler AIs seemed to naturally gravitate toward peaceful coexistence.

Researchers believe the more advanced AI agents learn from their environment and figure out how to use available resources to manipulate their situation — and they do it aggressively if they need to.

“This model … shows that some aspects of human-like behaviour emerge as a product of the environment and learning,” a DeepMind team member, Joel Z Leibo, told Wired.

You Will Eat Ze Bugs AND KNOW NOTHING!!!

dogusgrubu  |   Doğuş Group, the Turkish-based international conglomerate founded in 1951, has already invested $15m in Göbeklitepe – a ma...