Showing posts with label tricknology. Show all posts
Showing posts with label tricknology. Show all posts

Tuesday, March 27, 2018

With "Platform" Capitalism - Value Creation Depends on Privacy Invasion


opendemocracy |  The current social mobilization against Facebook resembles the actions of activists who, in opposition to neoliberal globalization, smash a McDonald’s window during a demonstration. 

On March 17, The Observer of London and The New York Times announced that Cambridge Analytica, the London-based political and corporate consulting group, had harvested private data from the Facebook profiles of more than 50 million users without their consent. The data was collected through a Facebook-based quiz app called thisisyourdigitallife, created by Aleksandr Kogan, a University of Cambridge psychologist who had requested and gained access to information from 270,000 Facebook members after they had agreed to use the app to undergo a personality test, for which they were paid through Kogan’s company, Global Science Research.

But as Christopher Wylie, a twenty-eight-year-old Canadian coder and data scientist and a former employee of Cambridge Analytica, stated in a video interview, the app could also collect all kinds of personal data from users, such as the content that they consulted, the information that they liked, and even the messages that they posted.

In addition, the app provided access to information on the profiles of the friends of each of those users who agreed to take the test, which enabled the collection of data from more than 50 million.

All this data was then shared by Kogan with Cambridge Analytica, which was working with Donald Trump’s election team and which allegedly used this data to target US voters with personalised political messages during the presidential campaign. As Wylie, told The Observer, “we built models to exploit what we knew about them and target their inner demons.”

These platforms differ significantly in terms of the services that they offer: some, like eBay or Taobao simply allow exchange of products between buyers and sellers; others, like Uber or TaskRabbit, allow independent service providers to find customers; yet others, like Apple or Google allow developers to create and market apps.

However, what is common to all these platforms is the central role played by data, and not just continuous data collection, but its ever more refined analysis in order to create detailed user profiles and rankings in order to better match customers and suppliers or increase efficiency.

All this is done in order to use data to create value in some way another (to monetize it by selling to advertisers or other firms, to increase sales, or to increase productivity). Data has become ‘the new oil’ of global economy, a new commodity to be bought and sold at a massive scale, and with this development, as a former Harvard Business School professor Shoshana Zuboff has argued, global capitalism has become ‘surveillance capitalism’.

What this means is that platform economy is a model of value creation which is completely dependant on continuous privacy invasions and, what is alarming is that we are gradually becoming used to this.

Saturday, March 24, 2018

Atlanta Had Bad Backups and No Kaspersky...,


wsbtv |  City employees were asked to stay off their computers Friday just one day after a massive cyber-attack against the City of Atlanta.

Employees at Atlanta City Hall were handed instructions as they came through the front doors Friday.
Channel 2 Investigative Reporter Aaron Diamant obtained a copy of the flyer that requested employees not turn on computers or log onto their workstations.

Friday’s action comes as city officials are struggling to determine how much sensitive information may have been compromised in a Thursday cyber-attack.

The city has also received demands that it pay a ransom of $50,000, according to Mayor Keisha Lance Bottoms.

Bottoms kicked off a Friday news conference by assuring the public that investigators haven't found any evidence that sensitive customer, resident or employee information was compromised.

Bottoms said federal investigators will advise her on the best course of action.

"This is a marathon, not a sprint," Bottoms said.

The FBI and the Department of Homeland Security are working with city officials to identify the source of the attack.

Hartsfield-Jackson Atlanta International Airport took down the Wi-Fi at the world’s busiest airport after the cyber-attack. 

The Atlanta airport’s website said security wait times and flight information may not be accurate.

Friday, March 23, 2018

Facebook the Surveillance and Social Control Grail NOT Under Deep State Control


NewYorker |  Twelve years later, the fixation on data as the key to political persuasion has exploded into scandal. For the past several days, the Internet has been enveloped in outrage over Facebook and Cambridge Analytica, the shadowy firm that supposedly helped Donald Trump win the White House. As with the Maoist rebels, this appears to be a tale of data-lust gone bad. In order to fulfill the promises that Cambridge Analytica made to its clients—it claimed to possess cutting-edge “psychographic profiles” that could judge voters’ personalities better than their own friends could—the company had to harvest huge amounts of information. It did this in an ethically suspicious way, by contracting with Aleksandr Kogan, a psychologist at the University of Cambridge, who built an app that collected demographic data on tens of millions of Facebook users, largely without their knowledge. “This was a scam—and a fraud,” Paul Grewal, Facebook’s deputy general counsel, told the Times over the weekend. Kogan has said that he was assured by Cambridge Analytica that the data collection was “perfectly legal and within the limits of the terms of service.”

Despite Facebook’s performance of victimization, it has endured a good deal of blowback and blame. Even before the story broke, Trump’s critics frequently railed at the company for contributing to his victory by failing to rein in fake news and Russian propaganda. To them, the Cambridge Analytica story was another example of Facebook’s inability, or unwillingness, to control its platform, which allowed bad actors to exploit people on behalf of authoritarian populism. Democrats have demanded that Mark Zuckerberg, the C.E.O. of Facebook, testify before Congress. Antonio Tajani, the President of the European Parliament, wants to talk to him, too. “Facebook needs to clarify before the representatives of five hundred million Europeans that personal data is not being used to manipulate democracy,” he said. On Wednesday afternoon, after remaining conspicuously silent since Friday night, Zuckerberg pledged to restrict third-party access to Facebook data in an effort to win back user trust. “We have a responsibility to protect your data, and if we can’t then we don’t deserve to serve you,” he wrote on Facebook.

But, as some have noted, the furor over Cambridge Analytica is complicated by the fact that what the firm did wasn’t unique or all that new. In 2012, Barack Obama’s reĆ«lection campaign used a Facebook app to target users for outreach, giving supporters the option to share their friend lists with the campaign. These efforts, compared with those of Kogan and Cambridge Analytica, were relatively transparent, but users who never gave their consent had their information sucked up anyway. (Facebook has since changed its policies.) As the sociologist Zeynep Tufekci has written, Facebook itself is a giant “surveillance machine”: its business model demands that it gather as much data about its users as possible, then allow advertisers to exploit the information through a system so complex and opaque that misuse is almost guaranteed.

Tuesday, March 06, 2018

On Second Thought, Propagation of the Faith May Be Even More Fundamental...,


vanityfair |  When I first came out to L.A. [in 1968], my friend [photographer] Joel Bernstein found an old book in a flea market that said: Ask anyone in America where the craziest people live and they’ll tell you California. Ask anyone in California where the craziest people live and they’ll say Los Angeles. Ask anyone in Los Angeles where the craziest people live and they’ll tell you Hollywood. Ask anyone in Hollywood where the craziest people live and they’ll say Laurel Canyon. And ask anyone in Laurel Canyon where the craziest people live and they’ll say Lookout Mountain. So I bought a house on Lookout Mountain. —Joni Mitchell

jaysanalysis |  It seems more and more as if we are living in a bad B movie, replete with cheesy set pieces and a Casio keyboard score – and the reason for that is because we are.  We have focused on Hollywood and propaganda often at JaysAnalysis, but we have not looked at the music industry, aside from brief mentions and a few shows.  When it comes to the score for that B movie we all live in, the best analysis I’ve read in a good while is none other than recently deceased Dave McGowan’s excellent work, Weird Scenes Inside the Canyon: Laurel Canyon, Covert Ops & the Dark Heart of the Hippie Dream.  I also have the honor of Amazon classing my book, Esoteric Hollywood, with McGowan’s, in the “readers also purchased” section.  I get emails on  daily basis requesting book recommendations (which is much harder to choose than you’d expect), so I think for the spirit of my site, no better book could be suggested for a reading list than Weird Scenes (aside from my own book, of course).

McGowan’s thesis is simple: The 1960s counter-culture movement was not what it appeared to be.  In a purple haze of pot smoke, free love, booze and LSD tabs, the fog of the 60s is believed by most baby-boomers to be a genuine (monstrous for faux conservatives) reaction against the system.  From student protests to politically active musicians, the anti-war, anti-establishment ethos of the 60s was, so the story goes, a natural, organic reaction to a hawkish, greedy corporate demon, embodied in “the man,” opposed by all those revolutionaries who love freedom, expressing themselves in the “arts.”  After reading McGowan’s analysis (a self-confessed fan of this era), it would appear the mainstream view is only slightly correct – some artists were political and genuinely anti-establishment, but the big names, and the movements as a whole, were promoted and directed by design, for large-scale social engineering.

McGowan begins his argumentation by pointing to Jim Morrison’s father, Navy Admiral George Stephen Morrison, who played a central role in the Gulf of Tonkin’s false flag event.  Morrison, curiously, avoided this association, stating his parents were dead, adding fuel to his mythical narrative of having no musical training and supposedly becoming a musical shaman following ghostly encounters and hallucinogenic trips.  While some of that may have been the case (such as the trips and witchcraft initiation, for example, as shown in Oliver Stone’s The Doors), the real story is likely much closer to McGowan’s analysis – Morrison was promoted and made into an icon by the system because of these high level connections.  However, being well-connected was not the only explanation – the establishment had a specific motive of derailing any legitimate anti-war activism or artwork, as well as moving the culture into a more degenerate state for social engineering.

Protecting Profit Is The Fundamental Objective


RollingStone |  For years, YouTube profited off all kinds of extremist content; its three-strike policy was directed at copyright infringement. Its current and newly aggressive posture towards content stems from the advertiser revolt that erupted following Trump’s surprise victory. Within weeks of the 2016 election, brands like Johnson & Johnson, and ad-tech companies like AppNexus, began taking steps to distance themselves from Breitbart and other purveyors of "fake news" and extremist content. In early 2017, companies like Starbucks and Walmart started pulling their ads from YouTube, worried that their marketing was sandwiched between clips featuring foaming-at-the-mouth racists and child abusers. In a watershed moment, the global buying agency Havas pulled its ads from Google/YouTube U.K., after the Times of London detailed how ads for well-known charities were supporting Neo-Nazi articles and videos. When the influential research group Pivotal downgraded Google stock from a buy to a hold, Google suddenly grew concerned about the kind of content its proprietary algorithms had been promoting for years – intentionally and by design.

This is not a conspiracy theory worthy of a "strike," but the testimony of a former YouTube engineer named Guillaume Chaslot, who was profiled by the Guardian in early February. Chaslot, a Ph.D. in artificial intelligence, explained how his team at YouTube was tasked with designing algorithms that prioritized “watch time” alone. “Watch time was the priority,” he told the paper. “Everything else was considered a distraction… There are many ways YouTube can change its algorithms to suppress fake news and improve the quality and diversity of videos people see… I tried to change YouTube from the inside, but it didn’t work.” 

When Chaslot conducted an independent study of how his algorithms worked in the real world, he found that during recent elections in France, Germany and the U.K., YouTube "systematically amplifie[d] videos that are divisive, sensational and conspiratorial." (His findings can be seen at Algotransparency.org.) At the height of the advertising revolt, in March of last year, YouTube announced that it was "taking a hard look at our existing community guidelines to determine what content is allowed on the platform – not just what content can be monetized." CEO Susan Wojcicki announced the company would hire thousands of human moderators to watch and judge all content on the site.

YouTube's new policies were part of an industry-wide course correction. Over the past year, under the banner of combatting hate speech and fake news, Google and Facebook began to cut off search traffic and monetized content-creator accounts, not only to dangerous scam-artists like Jones, but to any site that garnered complaints or didn't meet newly enforced enforced and vaguely defined criteria of "credible" and "quality."

Saturday, March 03, 2018

Why Would The U.S. Govt Fund TOR/Dark Web If These Limited Its Power?


The Tor Project, a private non-profit that underpins the dark web and enjoys cult status among privacy activists, is almost 100% funded by the US government. In the process of writing my book Surveillance Valley, I was able to obtain via FOIA roughly 2,500 pages of correspondence — including strategy and contracts and budgets and status updates — between the Tor Project and its main funder, a CIA spinoff now known as the Broadcasting Board of Governors (BBG). These files show incredible cooperation between Tor and the regime change wing of the US government. The files are released to the public here. —Yasha Levine

surveillancevalley |  I obtained the documents in 2015. By then I had already spent a couple of years doing extensive reporting on Tor's deeply conflicted ties to the regime change wing of the U.S. government. By following the money, I discovered that Tor was not grassroots. I was able to show that despite its radical anti-government cred, Tor was almost 100% funded by three U.S. national security agencies: the Navy, the State Department and the BBG. Tor was military contractor with its own government contractor number — a privatized extension of the very same government that it claimed to be fighting. 

This was a shocking revelation. 

For years, the Tor Project — along with other government-funded crypto tools like Signal — has been seen in almost religious terms by the privacy community as the only way to protect people from government spying online. 

The Electronic Frontier Foundation held up Tor as the digital equivalent of the First Amendment. The ACLU backed it. Fight for the Future, the hip Silicon Valley activist group, declared Tor to be “NSA-proof.” Edward Snowden held it up as an example of the kind of grassroots privacy technology that could defeat government surveillance online, and told his followers to use it. Prominent award-winning journalists from Wired, Vice, The Intercept, The Guardian and Rolling Stone — including Laura Poitras, Glenn Greenwald and Andy Greenberg — all helped pump up Tor's mythical anti-state rebel status. Even Daniel Ellsberg, the legendary whistleblower, was convinced that Tor was vital to the future of democracy. Anyone who questioned this narrative and pointed to Tor's lavish government support was attacked, ridiculed, smeared and hounded into silence. I know because that's what Tor supporters tried to do to me. 

But the facts wouldn't go away. 

The initial evidence that I had gathered in my reporting left little room for doubt about Tor's true nature as foreign policy weapon of the U.S. government. But the box of FOIA documents I received from the BBG took that evidence to a whole new level.

Why would the U.S. government fund a tool that limited its own power? The answer, as I discovered, was that Tor didn't threaten American power. It enhanced it. 

The FOIA documents showed collaboration between the federal government, the Tor Project and key members of the privacy and Internet Freedom movement on a level that was hard to believe:

The documents showed Tor employees taking orders from their handlers in the federal government, including hatching plans to deploy their anonymity tool in countries that the U.S. was working to destabilize: China, Iran, Vietnam, Russia. They showed discussions about the need to influence news coverage and to control bad press. They featured monthly updates that described meetings and trainings with the CIA, NSA, FBI, DOJ and State Department. They also revealed plans to funnel government funds to run "independent" Tor nodes. Most shockingly, the FOIA documents put under question Tor's pledge that it would never put in any backdoors into their software. (See below.)

Snitches Don't Get Stitches, They Get Gubmint Jobs....,


theintercept |  Patrick Ryan, a congressional candidate from New York, is leaning on his experience as a small business entrepreneur to establish his readiness for office, but he has curiously failed to mention the business he used to work in: domestic surveillance.

Seven years ago, Ryan, then working at a firm called Berico Technologies, compiled a plan to create a real-time surveillance operation of left-wing groups and labor unions, hoping business lobbyists would pay top dollar to monitor and disrupt the actions of activist groups across the country. At one point, the proposal included the idea to spy on the families of high-profile Democratic activists and plant fake documents with labor unions in a bid to discredit them.

The pitch, a joint venture with a now-defunct company called HBGary Federal and the Peter Thiel-backed company Palantir Technologies, however, crumbled in 2011 after it was exposed in a series of news reports. 

Years later, Ryan pivoted to a startup called Dataminr, a data analytics company that provided social media monitoring solutions for law enforcement clients. Dataminr, which received financial support from the CIA’s venture capital arm, produced real-time updates about activists for law enforcement. For example, according to documents obtained by the American Civil Liberties Union of California and reported by The Intercept for the first time, Dataminr helped track social media posts relating to Black Lives Matter.

The candidate’s history of spying on progressive groups has been conspicuously absent from the personal history he has presented to voters.

The biography section of Ryan’s campaign website references only another technology business he helped found, called Second Front Systems. That company deploys “cutting-edge data analytics software to our troops on the front lines,” according to the site. Ryan continues to own a 10 percent stake in the firm, valued between $15,000 and $50,000, and has discussed his work with the startup as part of his experience of building a business and providing jobs.

But that business venture appears not to have been as successful as Ryan’s domestic surveillance work — at least not from a moneymaking perspective. His candidate ethics disclosure, which covers money made in 2016 and 2017, does not list any income from Second Front Systems — of which he is still a director — but it reveals that in 2016, Ryan collected $325,510 as a vice president of Dataminr. 

In an hourlong presentation to local Democratic voters with Ulster Activists and Move Forward New York, Ryan stressed his experience as a small business entrepreneur. At one moment during the January 7 event, Ryan referenced his job at Dataminr, but did not mention the company’s name or the type of work it engaged in. In a question about whether taking a job in Congress would constitute a pay cut, Ryan said yes and that he had taken work at another “another tech company” in which he “leads the government team.” In terms of his business career, Ryan talked at length about his efforts to employ former veterans.

Thursday, January 18, 2018

Bitshit: BUY! BUY! BYE!


ibankcoin |  Crypto currency Bitconnect (BCC) plunged from $321 to a tad over $35 today, a drop of more than 86% after regulators from state authorities issued cease and desist letters for unauthorized sale of securities. That’s right. Just because your shit is on the blockchain, that doesn’t mean you get to solicit your fucking Ponzi scheme to people in America. State regulators will have something to say about that.
Via the company’s website, as per the reasons for shutting down.
The reason for halt of lending and exchange platform has many reasons as follow:
The continuous bad press has made community members uneasy and created a lack of confidence in the platform.
We have received two Cease and Desist letters, one from the Texas State Securities Board, and one from the North Carolina Secretary of State Securities Division. These actions have become a hindrance for the legal continuation of the platform.
Outside forces have performed DDos attacks on platform several times and have made it clear that these will continue. These interruptions in service have made the platform unstable and have created more panic inside the community.
Price action.
What did Bitconnect do? They quite literally ran a Ponzi scheme. Look at one of their brochures, promising investors 40% returns, PER MONTH.
Via Tech Crunch:
Many in the cryptocurrency community have openly accused Bitconnnect of running a Ponzi scheme, including Ethereum founder Vitalik Buterin.
The platform was powered by a token called BCC (not to be confused with BCH, or Bitcoin Cash), which is essentially useless now that the trading platform has shut down. In the last The token has plummeted more than 80% to about $37, down from over $200 just a few hours ago.
If you aren’t familiar with the platform, Bitconnect was an anonymously-run site where users could loan their cryptocurrency to the company in exchange for outsized returns depending on how long the loan was for. For example, a $10,000 loan for 180 days would purportedly give you ~40% returns each month, with a .20% daily bonus.
Bitconnect also had a thriving multi-level referral feature, which also made it somewhat akin to a pyramid scheme with thousands of social media users trying to drive signups using their referral code.
The platform said it generated returns for users using Bitconnnect’s trading bot and “volatility trading software”, which usually averaged around 1% per day.
Of course profiting from market fluctuations and volatility is a legitimate trading strategy, and one used by many hedge funds and institutional traders. But Bitconnect’s promise (and payment) of outsized and guaranteed returns led many to believe it was a ponzi scheme that was paying out existing loan interest with newly pledged loans.
The requirement of having BCC to participate in the lending program led to a natural spike in demand (and price) of BCC. In less than a year the currency went from being worth less than a dollar (with a market cap in the millions) to a all-time high of ~$430.00 with a market cap above $2.6B.
Lenders into the Bitconnect Exchange have revealed the company is closing out accounts, issuing BCC in exchange for their dollars — which is causing the price to plummet.

Wednesday, January 17, 2018

Your Elites Are Like A Parasite About To Kill Its Host


oxforduniversitypress |  At the centre of the modern theory of credit rationing, as observed at the macro level, are banks—a critical institution which was missing from DSGE models. This was a particularly peculiar omission because, without banks, there presumably would be no central banks, and it is the central bank’s conduct of monetary policy that is central in those models. The fact that credit is allocated by institutions (banks), rather than through conventional markets (auctions) is an important distinction lost in the DSGE framework. Greenwald and Stiglitz (2003) model banks as firms, which take others’ capital, in combination with their own, obtaining and processing information, making decisions about which loans to make. They too are by and large equity constrained, but in addition face a large number of regulatory constraints. Shocks to their balance sheets, changes in the available set of loans and their expectations about returns, and alterations in regulations lead to large changes in loan supply and the terms at which loans are made available. Variations in regulations and circumstances of banks across states in the US are helping validate the importance of variation in the supply conditions in banking in the 2008 crisis and its aftermath.38

Given how long it takes balance sheets to be restored when confronted with a shock of the size of that of 2008, it is not surprising that the effects persisted.39 But they seem to have persisted even after the restoration of bank and firm balance sheets. That suggests that this crisis (like the Great Depression) is more than a balance sheet crisis. It is part of a structural transformation, in the advanced countries, the most notable aspects of which are a shift from manufacturing to a service-sector economy and an outsourcing of unskilled production to emerging markets; for developing countries, the structural transformation involves industrialization and globalization. Not surprisingly, such structural transformations have large macroeconomic consequences and are an essential part of growth processes. DSGE models are particularly unsuited to address their implications for several reasons: (a) the assumption of rational expectations, and even more importantly, common knowledge, might be relevant in the context of understanding fluctuations and growth in an agricultural environment with well-defined weather shocks described by a stationary distribution,40 but it cannot describe changes, like these, that happen rarely;41 (b) studying these changes requires at least a two-sector model; and (c) a key market failure is the free mobility of resources, especially labour, across sectors. Again, simple models have been constructed investigating how structural transformation can lead to a persistent high level of unemployment, and how, even then, standard Keynesian policies can restore full employment, but by contrast, increasing wage flexibility can increase unemployment (see Delli Gatti et al., 2012a,b).


Wednesday, January 10, 2018

Money As Tool, Money As Drug: The Biological Psychology of a Strong Incentive


nih.gov |  Why are people interested in money? Specifically, what could be the biological basis for the extraordinary incentive and reinforcing power of money, which seems to be unique to the human species? We identify two ways in which a commodity which is of no biological significance in itself can become a strong motivator. The first is if it is used as a tool, and by a metaphorical extension this is often applied to money: it is used instrumentally, in order to obtain biologically relevant incentives. Second, substances can be strong motivators because they imitate the action of natural incentives but do not produce the fitness gains for which those incentives are instinctively sought. The classic examples of this process are psychoactive drugs, but we argue that the drug concept can also be extended metaphorically to provide an account of money motivation. From a review of theoretical and empirical literature about money, we conclude that (i) there are a number of phenomena that cannot be accounted for by a pure Tool Theory of money motivation; (ii) supplementing Tool Theory with a Drug Theory enables the anomalous phenomena to be explained; and (iii) the human instincts that, according to a Drug Theory, money parasitizes include trading (derived from reciprocal altruism) and object play.

Wednesday, January 03, 2018

You Know Better Than To Use Browser Password Managers..., Right?


theverge |  Nearly every web browser now comes with a password manager tool, a lightweight version of the same service offered by plugins like LastPass and 1Password. But according to new research from Princeton's Center for Information Technology Policy, those same managers are being exploited as a way to track users from site to site.

The researchers examined two different scripts — AdThink and OnAudience — both of are designed to get identifiable information out of browser-based password managers. The scripts work by injecting invisible login forms in the background of the webpage and scooping up whatever the browsers autofill into the available slots. That information can then be used as a persistent ID to track users from page to page, a potentially valuable tool in targeting advertising.

The plugins focus largely on the usernames, but according to the researchers, there’s no technical measure to stop scripts from collecting passwords the same way. The only robust fix would be to change how password managers work, requiring more explicit approval before submitting information. “It won't be easy to fix, but it's worth doing,” says Arvind Narayanan, a Princeton computer science professor who worked on the project.

Monday, December 18, 2017

The Long Leash



independent - 1995 |  For decades in art circles it was either a rumour or a joke, but now it is confirmed as a fact. The Central Intelligence Agency used American modern art - including the works of such artists as Jackson Pollock, Robert Motherwell, Willem de Kooning and Mark Rothko - as a weapon in the Cold War. In the manner of a Renaissance prince - except that it acted secretly - the CIA fostered and promoted American Abstract Expressionist painting around the world for more than 20 years.

The connection is improbable. This was a period, in the 1950s and 1960s, when the great majority of Americans disliked or even despised modern art - President Truman summed up the popular view when he said: "If that's art, then I'm a Hottentot." As for the artists themselves, many were ex- communists barely acceptable in the America of the McCarthyite era, and certainly not the sort of people normally likely to receive US government backing.

Why did the CIA support them? Because in the propaganda war with the Soviet Union, this new artistic movement could be held up as proof of the creativity, the intellectual freedom, and the cultural power of the US. Russian art, strapped into the communist ideological straitjacket, could not compete.

gizmodo -2010 |   There's little more divisive than modern art—most take a staunch "brilliance" or "bullshit" stance. So it should come as a surprise that the straight-laced feds at the CIA leaned toward the former camp—or at least saw it as brilliantly exploitable in the psychological war against the Soviets. Reports from former agents acknowledge what was always a tall tale in the art world—that CIA spooks floated pioneering artists like Jackson Pollock, Willem de Kooning, and Robert Motherwell, to drop an aesthetic nuke on Communism. What seemed like natural popularity of certain artists was, in part, actually a deliberate attempt at psychological warfare, backed by the US government.

But why modern art? At the time period in question—the 1950s and 60s—the artistic style of the moment was Abstract Expressionism. Abstract Expressionism (or AbEx, if you want to impress people at your next snooty cocktail party) stood for, above all else, self expression. Radically so. Take a look at a Pollock, for instance.

bbc - 2016 |  In the immediate aftermath of World War Two, something exciting happened in the art world in New York. A strange but irresistible energy started to crackle across the city, as artists who had struggled for years in poverty and obscurity suddenly found self-confidence and success. Together, they formed a movement that became known, in time, as Abstract Expressionism. It is currently the subject of a major exhibition, featuring 164 artworks by 30 artists (including Willem de Kooning, Jackson Pollock, and Mark Rothko), at the Royal Academy of Arts in London.

One of the most remarkable things about Abstract Expressionism was the speed with which it rose to international prominence. Although the artists associated with it took a long time to find their signature styles, once the movement had crystallised, by the late ‘40s, it rapidly achieved first notoriety and then respect. By the ‘50s, it was generally accepted that the most exciting advances in painting and sculpture were taking place in New York rather than Paris. In 1957, a year after Pollock’s death in a car crash, the Metropolitan Museum paid $30,000 for his Autumn Rhythm – an unprecedented sum of money for a painting by a contemporary artist at the time.

Thursday, December 14, 2017

Backpropagation: The Beginning of a Revolution or the End of One?


technologyreview |  I’m standing in what is soon to be the center of the world, or is perhaps just a very large room on the seventh floor of a gleaming tower in downtown Toronto. Showing me around is Jordan Jacobs, who cofounded this place: the nascent Vector Institute, which opens its doors this fall and which is aiming to become the global epicenter of artificial intelligence.

We’re in Toronto because Geoffrey Hinton is in Toronto, and Geoffrey Hinton is the father of “deep learning,” the technique behind the current excitement about AI. “In 30 years we’re going to look back and say Geoff is Einstein—of AI, deep learning, the thing that we’re calling AI,” Jacobs says. Of the researchers at the top of the field of deep learning, Hinton has more citations than the next three combined. His students and postdocs have gone on to run the AI labs at Apple, Facebook, and OpenAI; Hinton himself is a lead scientist on the Google Brain AI team. In fact, nearly every achievement in the last decade of AI—in translation, speech recognition, image recognition, and game playing—traces in some way back to Hinton’s work.

The Vector Institute, this monument to the ascent of ­Hinton’s ideas, is a research center where companies from around the U.S. and Canada—like Google, and Uber, and Nvidia—will sponsor efforts to commercialize AI technologies. Money has poured in faster than Jacobs could ask for it; two of his cofounders surveyed companies in the Toronto area, and the demand for AI experts ended up being 10 times what Canada produces every year. Vector is in a sense ground zero for the now-worldwide attempt to mobilize around deep learning: to cash in on the technique, to teach it, to refine and apply it. Data centers are being built, towers are being filled with startups, a whole generation of students is going into the field.

The impression you get standing on the Vector floor, bare and echoey and about to be filled, is that you’re at the beginning of something. But the peculiar thing about deep learning is just how old its key ideas are. Hinton’s breakthrough paper, with colleagues David Rumelhart and Ronald Williams, was published in 1986. The paper elaborated on a technique called backpropagation, or backprop for short. Backprop, in the words of Jon Cohen, a computational psychologist at Princeton, is “what all of deep learning is based on—literally everything.”

When you boil it down, AI today is deep learning, and deep learning is backprop—which is amazing, considering that backprop is more than 30 years old. It’s worth understanding how that happened—how a technique could lie in wait for so long and then cause such an explosion—because once you understand the story of backprop, you’ll start to understand the current moment in AI, and in particular the fact that maybe we’re not actually at the beginning of a revolution. Maybe we’re at the end of one.


Sunday, December 10, 2017

Next Up: Ekmanized Pre-Cog Face-Reading AI...,

https://s3-us-west-1.amazonaws.com/emogifs/map.html


berkeley |  Using novel statistical models to analyze the responses of more than 800 men and women to over 2,000 emotionally evocative video clips, UC Berkeley researchers identified 27 distinct categories of emotion and created a multidimensional, interactive map to show how they’re connected.

Their findings are published this week in the early edition of the Proceedings of the National Academy of Sciences journal.

“We found that 27 distinct dimensions, not six, were necessary to account for the way hundreds of people reliably reported feeling in response to each video,” said study senior author Dacher Keltner, a UC Berkeley psychology professor and expert on the science of emotions.

Moreover, in contrast to the notion that each emotional state is an island, the study found that “there are smooth gradients of emotion between, say, awe and peacefulness, horror and sadness, and amusement and adoration,” Keltner said.

“We don’t get finite clusters of emotions in the map because everything is interconnected,” said study lead author Alan Cowen, a doctoral student in neuroscience at UC Berkeley. “Emotional experiences are so much richer and more nuanced than previously thought.”

“Our hope is that our findings will help other scientists and engineers more precisely capture the emotional states that underlie moods, brain activity and expressive signals, leading to improved psychiatric treatments, an understanding of the brain basis of emotion and technology responsive to our emotional needs,” he added.

Thursday, December 07, 2017

3-D Printed, WiFi Connected, No Electronics...,


Washington |  Imagine a bottle of laundry detergent that can sense when you’re running low on soap — and automatically connect to the internet to place an order for more.

University of Washington researchers are the first to make this a reality by 3-D printing plastic objects and sensors that can collect useful data and communicate with other WiFi-connected devices entirely on their own.

With CAD models that the team is making available to the public, 3-D printing enthusiasts will be able to create objects out of commercially available plastics that can wirelessly communicate with other smart devices. That could include a battery-free slider that controls music volume, a button that automatically orders more cornflakes from Amazon or a water sensor that sends an alarm to your phone when it detects a leak.

“Our goal was to create something that just comes out of your 3-D printer at home and can send useful information to other devices,” said co-lead author and UW electrical engineering doctoral student Vikram Iyer. “But the big challenge is how do you communicate wirelessly with WiFi using only plastic? That’s something that no one has been able to do before.”

The system is described in a paper presented Nov. 30 at the Association for Computing Machinery’s SIGGRAPH Conference and Exhibition on Computer Graphics and Interactive Techniques in Asia.

3-D Printed Living Tattoos


MIT |  MIT engineers have devised a 3-D printing technique that uses a new kind of ink made from genetically programmed living cells.

The cells are engineered to light up in response to a variety of stimuli. When mixed with a slurry of hydrogel and nutrients, the cells can be printed, layer by layer, to form three-dimensional, interactive structures and devices.

The team has then demonstrated its technique by printing a “living tattoo” — a thin, transparent patch patterned with live bacteria cells in the shape of a tree. Each branch of the tree is lined with cells sensitive to a different chemical or molecular compound. When the patch is adhered to skin that has been exposed to the same compounds, corresponding regions of the tree light up in response.

The researchers, led by Xuanhe Zhao, the Noyce Career Development Professor in MIT’s Department of Mechanical Engineering, and Timothy Lu, associate professor of biological engineering and of electrical engineering and computer science, say that their technique can be used to fabricate “active” materials for wearable sensors and interactive displays. Such materials can be patterned with live cells engineered to sense environmental chemicals and pollutants as well as changes in pH and temperature.

What’s more, the team developed a model to predict the interactions between cells within a given 3-D-printed structure, under a variety of conditions. The team says researchers can use the model as a guide in designing responsive living materials.

Zhao, Lu, and their colleagues have published their results today in the journal Advanced Materials. The paper’s co-authors are graduate students Xinyue Liu, Hyunwoo Yuk, Shaoting Lin, German Alberto Parada, Tzu-Chieh Tang, ElĆ©onore Tham, and postdoc Cesar de la Fuente-Nunez.

Sunday, November 19, 2017

Weaponization of Monetization? Nah, Just Look In the Mirror For the Problem...,


DailyMail  |  The wildly popular Toy Freaks YouTube channel featuring a single dad and his two daughters has been deleted, amid a broader crackdown on disturbing children's content on the video streaming platform.

Toy Freaks, founded two years ago by landscaper Greg Chism of Granite City, Illinois, had 8.53million subscribers and was among the 100 most-viewed YouTube channels before it was shutdown on Friday. 

Though it's unclear what exact policy the channel violated, the videos showed the girls in unusual situations that often involved gross-out food play and simulated vomiting. The channel invented the 'bad baby' genre, and some videos showed the girls pretending to urinate on each other or fishing pacifiers out of the toilet.

Another series of videos showed the younger daughter Annabelle wiggling her loose teeth out while shrieking and spitting blood. 

'He is profiting off of his children's pain and suffering,' one indignant Reddit user wrote about the channel last year. 'It's barf inducing and no mentally stable person or child should ever have to watch it.'

A YouTube spokesperson said in a statement: 'It's not always clear that the uploader of the content intends to break our rules, but we may still remove their videos to help protect viewers, uploaders and children. We've terminated the Toy Freaks channel for violation of our policies.

Tuesday, November 14, 2017

CIA False-Flagging and Impersonating Kaspersky

wikileaks |  Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. "perfectly-boring-looking-domain.com") for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a "hidden" CIA server called 'Blot'.
The cover domain delivers 'innocent' content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users - a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate - it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb(see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Friday, October 27, 2017

CIA-BezosPost Wants To Come Inside Without A Warrant


market-ticker |  I have a dozen ways criminals could exploit this, and they will.
You give Spamzon a means to access your house (e.g. a keypad on your door, etc.)  They now have it.
Let's enumerate a few of the ways you can get hosed:
  • The "employee" (really a contractor, by the way) for Amazon simply steals anything he or she wants in your house while making the delivery -- which you allowed them in for.
  • Your credit card gets compromised.  Said individual orders something on your card to your house, waits for it to be delivered inside and exploits said delivery, either in confederation with the person doing it or by rick-rolling them, and robs your house.
  • The access code is stolen and used to directly access your home.  It's in the cloud.  I'm sure nothing in the cloud will ever be stolen, right?  Uh huh, just like virtually every American's credit file wasn't?  And since the code used to open the door will be authorized guess what -- your high-fautin' security system won't raise a peep as your nice 60" 4k OLED TV and jewelry walk right out the front door!
These took me about 30 seconds to come up with.  A bit more thinking would, I'm sure, enumerate dozens more, all of which will be exploited immediately by those with criminal intent.
I cannot imagine how stupid you have to be to sign up for such a thing.  The "initiative" to get into your car to make deliveries is bad enough, but allowing a retailer's contractors into your home when you have utterly no idea who they are or how said access data will be secured has to rank as one of the dumbest things I've ever heard of, and if you allow it then you have just marked yourself as having an IQ smaller than my running shoes.

Wednesday, October 11, 2017

Trans-Turing Trains Silly Monkey Brains


hackernoon  |  At the heart of digesting online information is the evolutionary propensity to mine all input as social cues or signals. In the case of the “trending news,” Facebook was presenting a manufactured image of the social world which more closely resembles a world which the curators would approve of, than it does the actual world we live in. This manufactured world is then presented as social reality. No matter what side you come down on, this is no trivial thing.

We humans are built to use attention as a cue for status. We then use status as a signal of mastery for which we are constantly on the lookout to apprentice under. Joseph Henrich and Francisco J. Gil-White, while at the Universities of Michigan and Pennsylvania respectively, describe a theory of “information goods.” They show that humans, unlike chimpanzees, use “relative prestige” to assign status, and then use that status as a signal of what to believe and emulate.

The challenge is that this evolutionary mechanism was developed long before mass media. It developed through direct observation. The hunter getting the most attention is likely the fellow who most often comes back with the biggest kills. Thus, trusting the attention of others to point you in the right way was adaptively useful. The Internet is particularly adept at scrambling these signals. We are built to believe that seeing others give their attention to somebody, or something, signals the ability for that someone to teach you something useful. Therefore we implicitly connect attention with prestige and prestige with expertise.

Granny Goodness President Trump, who has an objectively terrible track record with the truth, provides one example of this. A giant swath of the nation, I assume mostly reasonable and well-adjusted people, describe her him as trustworthy, despite what the other half, which I assume are also mostly reasonable and well-adjusted people, feel is obvious and damning evidence to the contrary. Her His supporters are surrounded, physically or digitally, by others who are paying attention to her him. Therefore, some basic, even primordial, part of their brain signals to them that this is someone who deserves attention, emulation, and trust. They believe in him, at least in part, because of his ability to attract attention signals of trustworthiness. When each of President Trump’s tweets, to his 40 million followers, and now to the whole world, receives hundreds of thousands of likes and retweets, we shouldn’t be surprised that he didn’t need to actually do anything to earn that trust. He just needed to attract attention to himself, and then claim that he deserves the trust. The attention supports claim.

Self-Proclaimed Zionist Biden Joins The Great Pretending...,

Biden, at today's Holocaust Remembrance Ceremony, denounces the "anti-Semitic" student protests in his strongest terms yet. He...