She starts by saying that "Trump’s assertions, however overinflated, nonetheless echo certain aspects of The New York Times’s reporting from recent weeks. That, in turn, has allowed his administration to assert that the basis for his claims rests, in part, on reporting by The Times."
On the surface, there are similarities. Both The Times and
Trump have referred to wiretaps. Both have referenced White House
knowledge of the investigations. And both have described efforts by
officials from the Obama administration to involve itself in the
continuing investigations of Trump and Russia.
Maybe Trump is not a completely raving lunatic after all. So where are the differences:
For one, as The Times (and others) has made clear, these
investigations have been conducted by the F.B.I., intelligence agencies
and Congress, not by Obama himself. The Times has also
said Obama administration officials sought to spread intelligence about a
possible link between Trump and Russia to ensure a trail of evidence
for investigators, but it said Obama himself was not involved. And no Times reporter has claimed that any warrants have been issued to spy on Trump or his associates.
And there it is again: several months after we thought we would never
again hear the old "Obama had no idea what was going on excuse", it
strikes yet again, only this time we find it very difficult to believe
that Obama, who expanded the distributions of confidential NSA data to
multiple offices just weeks before his final day in office, had no clue
that Trump was being wiretapped.
There's more, and this is where things get delightfully Orwellian,
because as Spayd "explains", the confusion is really just a function of
readers being confused because, well, it's complicated:
libertyblitzkrieg | By now, most of you have heard about the largest ever release of
confidential CIA documents published by Wikileaks, known as Vault7. Many
of you have also read various summaries of what was released, but
reading the take of others is not the same as analyzing it yourself. As
such, I strongly suggest you check out the original Wikileaks summary. It’s mostly written for the layperson without much technical expertise (like myself), and I think you’ll get a lot out of it.
In this post, I’m going to republish the entire press release, as
well as provide key excerpts from the larger summary along with some
personal observations. Let’s get started…
Press Release Today, Tuesday 7 March 2017, WikiLeaks begins its new series of
leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by
WikiLeaks, it is the largest ever publication of confidential documents
on the agency. The first full part of the series, “Year Zero”, comprises 8,761
documents and files from an isolated, high-security network situated
inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its
hacking arsenal including malware, viruses, trojans, weaponized “zero
day” exploits, malware remote control systems and associated
documentation. This extraordinary collection, which amounts to more than
several hundred million lines of code, gives its possessor the entire
hacking capacity of the CIA. The archive appears to have been circulated
among former U.S. government hackers and contractors in an unauthorized
manner, one of whom has provided WikiLeaks with portions of the
archive.
Lovely. Just lovely.
“Year Zero” introduces the scope and direction of the
CIA’s global covert hacking program, its malware arsenal and dozens of
“zero day” weaponized exploits against a wide range of U.S. and European
company products, include Apple’s iPhone, Google’s Android and
Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones. Since 2001 the CIA has gained political and budgetary preeminence
over the U.S. National Security Agency (NSA). The CIA found itself
building not just its now infamous drone fleet, but a very different
type of covert, globe-spanning force — its own substantial fleet of
hackers. The agency’s hacking division freed it from having to disclose
its often controversial operations to the NSA (its primary bureaucratic
rival) in order to draw on the NSA’s hacking capacities.
This leak might very well be from a competing government agency
concerned about the unaccountable power and sloppiness of the CIA, or it
could simply be a turf war.
NYTimes | In what appears to be the largest leak of C.I.A documents in history, WikiLeaksreleased
on Tuesday thousands of pages describing sophisticated software tools
and techniques used by the agency to break into smartphones, computers
and even Internet-connected televisions.
The
documents amount to a detailed, highly technical catalog of tools. They
include instructions for compromising a wide range of common computer
tools for use in spying: the online calling service Skype; Wi-Fi
networks; documents in PDF format; and even commercial antivirus
programs of the kind used by millions of people to protect their
computers.
A
program called Wrecking Crew explains how to crash a targeted computer,
and another tells how to steal passwords using the autocomplete
function on Internet Explorer. Other programs were called
CrunchyLimeSkies, ElderPiggy, AngerQuake and McNugget.
The document dump was the latest coup for the antisecrecy organization and a serious blow to the C.I.A., which uses its hacking abilities to carry out espionage against foreign targets.
The
initial release, which WikiLeaks said was only the first installment in
a larger collection of secret C.I.A. material, included 7,818 web pages
with 943 attachments, many of them partly redacted by WikiLeaks editors
to avoid disclosing the actual code for cyberweapons. The entire
archive of C.I.A. material consists of several hundred million lines of
computer code, the group claimed.
In
one revelation that may especially trouble the tech world if confirmed,
WikiLeaks said that the C.I.A. and allied intelligence services have
managed to compromise both Apple and Android smartphones, allowing their
officers to bypass the encryption on popular services such as Signal,
WhatsApp and Telegram. According to WikiLeaks, government hackers can
penetrate smartphones and collect “audio and message traffic before
encryption is applied.”
Unlike the National Security Agency documents Edward J. Snowden gave to journalists in 2013,
they do not include examples of how the tools have been used against
actual foreign targets. That could limit the damage of the leak to
national security. But the breach was highly embarrassing for an agency
that depends on secrecy.
Robert
M. Chesney, a specialist in national security law at the University of
Texas at Austin, likened the C.I.A. trove to National Security Agency
hacking tools disclosed last year by a group calling itself the Shadow Brokers.
“If
this is true, it says that N.S.A. isn’t the only one with an advanced,
persistent problem with operational security for these tools,” Mr.
Chesney said. “We’re getting bit time and again.”
guardian | It may sound strange, but a number of prominent people have been
asking this question lately. As fears about the impact of automation
grow, calls for a “robot tax” are gaining momentum. Earlier this month,
the European parliament considered one for the EU. BenoĆ®t Hamon, the French Socialist party presidential candidate who is often described as his country’s Bernie Sanders, has put a robot tax in his platform. Even Bill Gates recently endorsed the idea.
The proposals vary, but they share a common premise. As machines and
algorithms get smarter, they’ll replace a widening share of the
workforce. A robot tax could raise revenue to retrain those displaced
workers, or supply them with a basic income.
The good news is that the robot apocalypse hasn’t arrived just yet. Despite a steady stream of alarming headlines about clever computers gobbling up our jobs, the economic data suggests that automation isn’t happening
on a large scale. The bad news is that if it does, it will produce a
level of inequality that will make present-day America look like an
egalitarian utopia by comparison.
The real threat posed by robots isn’t that they will become evil and kill us all, which is what keeps
Elon Musk up at night – it’s that they will amplify economic
disparities to such an extreme that life will become, quite literally,
unlivable for the vast majority. A robot tax may or may not be a useful
policy tool for averting this scenario. But it’s a good starting point
for an important conversation. Mass automation presents a serious
political problem – one that demands a serious political solution.
theatlantic | In science fiction, the promise or
threat of artificial intelligence is tied to humans’ relationship to
conscious machines. Whether it’s Terminators or Cylons or servants like
the “Star Trek” computer or the Star Wars droids, machines
warrant the name AI when they become sentient—or at least self-aware
enough to act with expertise, not to mention volition and surprise.
What
to make, then, of the explosion of supposed-AI in media, industry, and
technology? In some cases, the AI designation might be warranted, even
if with some aspiration. Autonomous vehicles, for example, don’t quite
measure up to R2D2 (or Hal), but they do deploy a combination of
sensors, data, and computation to perform the complex work of driving.
But in most cases, the systems making claims to artificial intelligence
aren’t sentient, self-aware, volitional, or even surprising. They’re
just software.
* * *
Deflationary examples of AI are everywhere. Google funds a system to identify toxic comments online, a machine learning algorithm called Perspective. But it turns out that simple typos can fool it. Artificial intelligence is cited as a barrier to strengthen
an American border wall, but the “barrier” turns out to be little more
than sensor networks and automated kiosks with potentially-dubious
built-in profiling. Similarly, a “Tennis Club AI” turns out to be just a better line sensor using off-the-shelf computer vision. Facebook announces an AI to detect suicidal thoughts
posted to its platform, but closer inspection reveals that the “AI
detection” in question is little more than a pattern-matching filter
that flags posts for human community managers.
AI’s
miracles are celebrated outside the tech sector, too. Coca-Cola
reportedly wants to use “AI bots” to “crank out ads” instead of humans.
What that means remains mysterious. Similar efforts to generate AI music or to compose AI news stories seem promising on first blush—but then, AI editors trawling Wikipedia to correct typos and links end up stuck in infinite loops with one another. And according to human-bot interaction consultancy Botanalytics (no, really), 40 percent of interlocutors give up on conversational bots after one interaction. Maybe that’s because bots are mostly glorified phone trees, or else clever, automated Mad Libs.
empireexposed | The ruling elite’s longtime agenda has been to destroy the United States and the West from within. In reaction to last year’s growing anti-globalist movement, represented by the Brexit vote and “anti-establishment” Trump election, the elite is becoming desperately aggressive now, fighting for absolute domination and population control, insidiously whipping up unstable domestic conditions throughout the Western world, engineered to explode with racial, class, religious and politically charged civil war violence in both America and Europe. In the US this takes the form of mass deployment of a robotically dumbed down, highly manipulated yet well-organized political left, constituting the elite’s WMD against Trump’s reactionary militarized authoritarian federal forces, soon spilling blood and chaos as America’s very own Spring uprising. The coming riots are aimed at causing the violent breakdown of civil society in both America and Europe, of course co-timed with the ongoing, incessant MSM propaganda machine, 24/7 delivering the false narrative of overly hostile, aggressive Russia, China and Iran intended to ignite World War III, simultaneous to the implosion of the house of cards global economy - the New World Disorder’s perfect storm of cataclysmic events, mapped out long in advance to bring about its one world government tyranny.
Meanwhile, amidst this seemingly suicidal freefall decline of the unipolar American Empire is international law enforcement’s unprecedented crackdown under Trump of the controlling elite’s pedophile child sex trafficking operations, shaking loose the sickos embedded at the top of the predator food chain from their previously impenetrable, high and mighty perch of insulated privileged protection. With so many deeply disturbed criminal psychopaths literally, satanically feeding off the blood of our innocent children, while fronting so many of the West’s national governments, Fortune 500 corporations, central banking and entertainment industries, rather than be held accountable for their ungodly sins, they’ve escalated the launching of their genocidal counteroffensive to eliminate 90% of the global population within the next few years in virtual total earth destruction. The same evil forces so actively bent on destroying Trump, America and most of us on the planet, are the same pedophile bloodlines that have ruled this world for centuries. For a very long time they’ve been preparing for this epochal moment in human history, smugly counting on their bug-out contingency exit plan that includes continuing their life of luxury from safe, expansive subterranean dwellings and secret stellar space colonies, combined with their advancing transhumanism exploits, all designed to remain impervious to our human laws of justice, spiritual laws of karma, as well as the earth’s sixth mass life extinction they’ve been methodically engineering on our planet’s surface.
naturalnews | Looking into the context of history can be instructive to realize the importance of locations and legends from the past. Only to learn what the future may hold. Sometimes these artifacts of history come in the form of myths routed in reality and steeped in mystery with no definitive point of origin. Often these stories live on long after they have been marginalized as is the case with theReport from Iron Mountain. An urban legend crops up in the public consciousness that persists only because of it’s relevance and accuracy. A publication as controversial as the Report from Iron Mountain, an admitted satire by it’s author Leonard Lewin, could evoke such mystery. A statement of the research put out by cold war think tanks? A prototype Agenda21 white paper?
Originally setting out to profile the document itself only to find the real story behind the legend. There has been so much written about this document it could easily fill ten books. This publication’s origin may be in doubt. It’s namesake certainly isn’t.
Iron Mountain. What is not in doubt is secretive nature of the original locations that bear it’s name. Few articles detail their significance and never painting a full picture. Today the company is the one of the largest physical item and data storage corporations in the world. Now with hundreds of locations. Underground and above ground. The largest and most well known being in Boyers, P.A. tunneled 220 feet underground. Where Sony and Orbis corporations store music records and film. Among many other data storage clients. Another well known underground bunker is in Greenfield, Rhode Island. It can withstand a direct hit by a 5-megaton nuclear bomb. These were acquired by Iron Mountain years after the Report from Iron Mountain surfaced.
Supplying the storage needs for 90% of the Fortune 1000 corporations in physical records and data storage. As well as records disposal in both paper and electronic data
form. Performing a valuable and needed service for business and
government. In no way is this article implying any nefarious purpose to
any of these locations. Only to inform the reader of this fascinating history in relation to the Report from Iron Mountain and it’s context to today. It is no secret that Iron Mountain stores almost anything for the largest clients.
Including their top people in time of nuclear war or natural disaster. This is an attempt to geolocate the only two facilities in operation by Iron Mountain
around the time the document was produced. In doing so this reveals a
story that is perhaps more interesting and mysterious than the Report from Iron Mountain itself.
washingtonsblog | Washington’s Blog asked the highest-level NSA whistleblower in history – Bill Binney – whether he thought Trump had been bugged.
Binney is the NSA executive who created the agency’s mass surveillance program for digital information, who served as the senior technical director within the agency, who managed six thousand NSA employees.
He was a 36-year NSA veteran widely regarded as a “legend” within the agency and the NSA’s best-ever analyst and code-breaker.
Binney also mapped out the Soviet command-and-control structure
before anyone else knew how, and so predicted Soviet invasions before
they happened (“in the 1970s, he decrypted the Soviet Union’s command
system, which provided the US and its allies with real-time surveillance
of all Soviet troop movements and Russian atomic weapons”).
Binney told Washington’s Blog:
NSA has all the data through the Upstream programs (Fairview/Stormbrew/Blarney) [background] and backed up by second and some third party country collection.
Plus the FBI and CIA plus others, as of the last month of the Obama
administration, have direct access to all the NSA collection (metadata
and content on phones,email and banking/credit cards etc.) with no
attempt at oversight by anybody [background]. This is all done under Executive Order 12333 [the order which allows unlimited spying no matter what intelligence officials claim] ….
FBI would only ask for a warrant if they wanted to be able to take it
into court at some point given they have something meaningful as
evidence. This is clearly true given the fact the President Trump’s
phone conversations with other country leaders were leaked to the
mainstream media.
In other words, Binney is saying that Trumps phones were bugged by the NSA without a warrant – remember, top NSA whistleblowers have previously explained that the NSA is spying on virtually all of the digital communications of Americans. – and the NSA shared the raw data with the CIA, FBI and other agencies.
If the FBI obtained a warrant to tap Trump’s phone, it was a
“parallel construction” to “launder” improperly-gained evidence through
acceptable channels.
Anti-Trump pundits and Democrats react reflexively to the news, express shrieking outrage, and proclaim that this finally proves untoward collusion between Trump and Russia — a smoking gun, at last.
Aggrieved
former Clinton apparatchiks *connect the dots* in a manner eerily
reminiscent of right-wing Glenn Beck-esque prognostication circa 2009.
Self-proclaimed legal experts rashly opine as to whether the new
revelation entails some kind of criminally actionable offense. (Recall
the now-laughable certitude that felled National Security Advisor Mike Flynn
violated the 200+ year old Logan Act.) This latest version is the
certitude that Jeff Sessions committed perjury, when that at the very
least is highly questionable. (Probably best to at least read the relevant statute first.)
The notion of Russian “collusion” being key to toppling Trump becomes
further implanted in the minds of the most energized Democratic
activists, as evidenced this time around by a troupe of protesters who
showed up to the Department of Justice headquarters brandishing
trademarked “Resist” placards, chanting “Lock Him Up,” and (as usual)
hyperventilating about Putin. As I’ve written before,
Trump/Putin theories are increasingly the top concern that plugged-in
“Resistance” types bring up at the highly-charged town hall meetings
that have received so much attention of late.
cnbc | To the average person, the billboard on the bus stop on London's Oxford Street was a standard coffee-brand ad. Every few seconds, the digital poster would change. Sometimes, it would feature a wide range of drab grays and blocks of text. Other times, it was a minimalistic image with a short saying.
What was unique about this particular poster, which ran in two locations at the end of July 2015, wasn't the fact that people were looking at it. Rather, it was looking at them — and learning. Using facial tracking technology and genetics-based algorithms, the poster took the aspects that people looked at the longest and then incorporated that into the next design evolution.
"We were surprised how quickly it learned," said Sam Ellis, business director of innovation atM&C Saatchi. "It got to a state of where it felt like it was in the right place a bit faster than we thought."
In less than 72 hours, the M&C Saatchi advertisement was creating posters in line with the current best practices in the advertising industry, which had been developed over decades of human trial and error like realizing three to five word slogans work best.
"We thought [our employees] would be nervous about it: Is this going to kill off creative?" Ellis said. "What they started to realize is that it could be really, really useful based on its insight."
M&C Saatchi's Ellis believes eventually ad agencies will be smaller, because AI will be able to accomplish tasks with a high degree of accuracy — for much less money than now — and will make outsourcing tasks a lot more effective.
As our machines become more sophisticated and more details about our lives are recorded as data points, AI is getting to the point where it knows a tremendous amount about humans. It can tell what a person is feeling. It knows the differencebetween a truth and a lie. It can go through millions of permutations in a second, coming up with more variations than a human could think of. It knows your daily routine, like when you're most likely going to wanta cold beer on a hot summer day.
justsecurity | Once again, Donald Trump has kicked off a media firestorm with a series of early-morning Tweets, this time leveling the serious accusation that “President Obama had my ‘wires tapped’ in Trump Tower” just prior to the presidential election.
If it were true that President Obama had ordered the intelligence
community to “tapp” Trump’s phones for political reasons, that would of
course be a serious scandal—and crime—of Nixonian proportions. Yet
there’s nothing in the published reports—vague though they are—to
support such a dramatic allegation. Let’s try to sort out what we do
know.
First, as one would hope Trump is aware, presidents are not
supposed to personally order electronic surveillance of particular
domestic targets, and the Obama camp has, unsurprisingly, issued a statement denying they did anything of the sort:
Neither President Obama nor any White House official ever
ordered surveillance on any U.S. citizen. Any suggestion otherwise is
simply false.
Rather, the allegation made by various news sources is that, in
connection with a multi-agency intelligence investigation of Russian
interference with the presidential election, the FBI sought an order
from the Foreign Intelligence Surveillance Court authorizing them to
monitor transactions between two Russian banks and four persons
connected with the Trump campaign. The Guardian‘s
report alleges that initial applications submitted over the summer,
naming “four members of the Trump team suspected of irregular contacts
with Russian officials,” were rejected by the FISC. But according to the BBC,
a narrower order naming only the Russian banks as direct targets
was ultimately approved by the FISC in October. While the BBC report
suggests that the surveillance was meant to ferret out “transfers of
money,” the Mensch article asserts that a “warrant was granted to look at the full content of emails and other related documents that may concern US persons.”
Taking all these claims with the appropriate sodium chloride seasoning, what can we infer?
thescientist |Yaniv Erlich and
colleagues encoded large media files in DNA, copied the DNA multiple
times, and still managed to retrieve the files without any errors, they
reported in Science today (March 2). Compared with cassette
tapes and 8 mm film, DNA is far less likely to become obsolete, and its
storage density is roughly 215 petabytes of data per gram of genetic
material, the researchers noted.
To test DNA’s media-storage capabilities, Erlich, an assistant
professor of computer science at Columbia University in New York City,
and Dina Zielinski,
a senior associate scientist at the New York Genome Center, encoded six
large files—including a French film and a computer operating system
(OS), complete with word-processing software—into DNA. They then
recovered the data from PCR-generated copies of that DNA. The Scientist spoke with Erlich about the study, and other potential data-storage applications for DNA.
The Scientist: Why is DNA a good place to store information?
Yaniv Erlich: First, we’re starting to reach the
physical limits of hard drives. DNA is much more compact than magnetic
media—about 1 million times more compact. Second, it can last for a much
longer time. Think about your CDs from the 90s, they’re probably
scratched by now. [Today] we can read DNA from a skeleton [that is]
4,000 years old. Third, one of the nice features about DNA is that it is
not subject to digital obsoleteness. Think about videocassettes or 8 mm
movies. It’s very hard these days to watch these movies because the
hardware changes so fast. DNA—that hardware isn’t going anywhere. It’s
been around for the last 3 billion years. If humanity loses its ability
to read DNA, we have much bigger problems than data storage.
TS: Have other researchers tried to store information in DNA?
YE: There are several groups that have already done
this process, and they inspired us, but our approach has several
advantages. Ours is 60 percent more efficient than previous strategies
and our results are very immune to noise and error. Most previous
studies reported some issues getting the data back from the DNA, some
gaps [in the information retrieved], but we show it’s easy. We even
tried to make it harder for ourselves . . . so we tried to copy the
data, and the enzymatic reaction [involved in copying DNA] introduces
errors. We copied the data, and then copied that copy, and then copied a
copy of that copy—nine times—and we were still able to recover the data
without one error. We also . . . achieved a density of 215 petabytes
per one gram of DNA. Your laptop has probably one terabyte. Multiply
that by 200,000, and we could fit all that information into one gram of
DNA.
thescientist | It wouldn’t be the first timeShubhayan Sanataniwrote one of these letters, nor would it be the last. A child under his care at the British Columbia Children’s Hospital had been unable to obtain health insurance ever since testing positive in a genetic screen for a sudden arrhythmia death syndrome (SADS). Whenever this happened to one of his patients, Sanatani, a pediatric cardiologist, would write a letter to the insurance company in question, explaining that the positive test did not necessarily indicate a significant increase in risk for a cardiac event.
“We haven’t had much to offer, other than to write letters of support saying the child has an extremely low risk of an event,” Sanatani toldThe Scientist. “All we can do, really, is advocate for our patients. I’m not confident about how successful we are.”
How often do parents discover that a genetic screening result has rendered their children uninsurable, or subject to prohibitively high insurance premiums? Sanatani resolved to find out. In a January 24 study inCirculation: Cardiovascular Genetics,Sanatani and colleagues conducted informal interviews of 202 people across North America who had either a SADS diagnosis (which, in 73 percent of cases, involved a genetic screen) or an affected family member. Despite its limitations—the survey did not ask when the alleged acts of insurance discrimination occurred, for instance—the self-reported results shed some anecdotal light on what Sanatani said he had been observing in his medical practice.
Thirty-nine percent of the respondents with a SADS diagnosis or an affected family member reported an increase in their existing insurance premiums. Just more than half said they applied for insurance only after receiving the diagnosis; 60 percent of these respondents indicated that they were rejected by insurers.
Before initiating the study, “a lot of families came to us with the notion that having their kids tested would impact their health coverage, but whenever we went to the literature to see if we could substantiate this or refute this, we couldn’t find much,” Sanatani toldThe Scientist. Yet, after examining the data, the team concluded that “a large percentage of the respondents had experienced some form of insurance rejection,” he said, “with most of them being rejected on the basis of the diagnosis.”
The results were surprising because, according to the researchers, most of the survey respondents were from the United States, where the 2008Genetic Information Non-Discrimination Act(GINA) should have protected them.
28blackdaysin2017 |If you already recognize that Black gestures, speech, trends, ideas
and attitudes are not exclusive to actual Black Bodies then you are
ready for the concept of BlacOS.
If you already recognize that Not All Black People Are The Same (aka,
I'm not your Monolith,) and that Alain Locke was onto something with his
"New Negro," and that "Black Is Beautiful" was an adjustment in Black
folks' ways of being in the world then you are ready for the concept of
BlacOS. If you understand that any given
instance of Black representation in the media is a complex mixture of
agency, randomness, creative inspiration, hopelessness and straight
coonery then you are ready for the concept of BlacOS.
It's simple: Blackness, however you understand, celebrate or loathe it,
is software: an operating system (OS) to be specific. The job of the OS
is to make the resources of a computing system's hardware and programs
available to the user. Windows. Macintosh. Linux. Be. Android. iOS.
These are all systems that sit on top of a layer of hardware, and make
it possible for you to interact with web browsers, video games, word
processors, screen savers, and spreadsheets. You know, the stuff that
makes the computer usable.
Anyone thinking about music and social control in the early modern period would tend to look for precedents in antiquity, the most significant authors in this regard being Plato and Aristotle. The two crucial texts by Plato are his Republic and the Laws, both of which are concerned with the nature of the best form of political organisation and the proper kind of education for individuals that lead to a stable and harmonious community.
Education of the republic's citizens includes early training in both gymnastics and mousike, which Andrew Barker defines as 'primarily an exposure to poetry and to the music that is its key vehicle.' (For the rest of this discussion I will simply refer to 'music' but will be using it in the broader sense of poetry set to musical accompaniment.) The crucial point is that within Plato's ideal society the kinds of 'music' that are performed must be firmly controlled by the law givers, the argument being that freedom of choice in music and novelty in its forms will inevitably lead to corruption and a breakdown of society.
Plato's distrust of musical innovation is made concrete in his Laws where he describes what he thinks actually happened once in Greek society, namely that the masses had the effrontery to suppose they were capable of judging music themselves, the result being that 'from a starting point in music, everyone came to believe in their own wisdom about everything, and to reject the law, and liberty followed immediately'. (To Plato liberty is anathema since some people have much greater understanding and knowledge than others.)
This close association between the laws of music and laws of the state exists because according to Plato music imitates character, and has a direct effect on the soul which itself is a harmonia, the consequence being that bad music results in bad citizens. To achieve a good state some form of regulation must take place, the assumption being that if the right musical rules are correctly followed this will result in citizens of good character.
It is fascinating to discover that Plato looks to Egypt with approval for its drastic control of music in society, claiming that its forms had remained unchanged for ten thousand years because of strict regulation that 'dedicated all dancing and all melodies to religion'. To prescribe melodies that possessed a 'natural correctness' he thinks 'would be a task for a god, or a godlike man, just as in Egypt they say that the melodies that have been preserved for this great period of time were the compositions of Isis.' (In fact as we shall see there were similar arguments made for the divine origins of sacred music in the Hebrew tradition.)
Perhaps thinking himself to be a 'godlike man', Plato lays down a series of strict rules governing musical composition and performance, a prescription that if correctly followed would ensure the virtue of citizens and the stability of the state, as well as the banishment of most professional musicians from society.
First, Plato wants to limit the kind of poetry that is set to music at all because songs have such a direct and powerful effect on people's morals. Thus any poems that portray wickedness, immorality, mourning or weakness of any kind must be banned, leaving only music that encourages good and courageous behaviour among citizens. The next thing to be curtailed is the range of musical styles allowed in the city, which Plato would confine to the Dorian and the Phrygian 'harmoniai', a technical term for organisations of musical pitch that for the purposes of this paper need not be discussed in any more detail. Between them these two 'harmoniai' appropriately 'imitate the sounds of the self-restrained and the brave man, each of them both in good fortune and bad.' Thirdly, as well as controlling the words to be sung and the manner in which they are performed, Plato would also regulate the kinds of instrument used for accompaniment, the two most important being the lyra and the kithara. Those that are forbidden include the aulos as well as a range of multi-stringed instruments capable of playing in a variety of different modes. Finally, Plato is emphatic in stating that the metrical foot and the melody must follow the words properly for the right effect to be achieved, rather than the other way around.
Of course these rules are intrinsically interesting, since they tell us about what Plato thought was wrong with music of his own time. However, for my purposes they are also interesting because they seem to have had a discernable influence on would-be reformers of music and society in the early modern period (that is, between the sixteenth and eighteenth centuries) which I will come to further on in my paper.
soundhealthinc | Welcome to The Journal of BioAcoustic Biology (JBAB), sponsored by the
Sound Health Research Institute, Inc., a duly recognized exempt
organization (SHRI). This Journal has been established in response to
the calls for a peer-reviewed venue for the publication of articles and
practice notes on the subject of Human BioAcoustic Vocal Profiling and
Sound Presentation.
The SHRI trustees responded by adopting, as part of the Credentials
System sponsored by the Institute, authorization for the establishment
of this Journal. According to the enabling Resolution, “The Journal
publishes in the area of Human BioAcoustics as established by the
research initiated by Sharry Edwards…” articles and practice notes
subject to the oversight of the Peer Review Subcommittee. The general
Peer Review Standards can be found under the JBAB links to the right.
Our Premier Public Issue features a seminal article on the Theory of
Human BioAcoustics. This issue was prepared by the Journal staff under
the direction of Ms. Edwards. This issue represents the first public
issue of a Journal that has been privately published since 1995.
The Research Reports published in the Journal have had any specific
Frequencies referenced redacted (and usually replaced with the musical
note in which the Frequency occurs). The Reports are intended to provide
brief introductions to ongoing research.
thescientist | A man with Parkinson’s disease sitting in a crowded restaurant has to
use the rest room, but he cannot get there. His feet are frozen; he
cannot move. The more he tries, the more stressed he becomes. People are
beginning to stare at him and wonder what is wrong. Then he remembers
the song “You Are My Sunshine,” which his music therapist taught him to
use in situations like this. He starts humming the tune. In time with
the music, he steps forward—one foot and then the other—and begins
walking to the beat in his head. Still humming, he makes it to the rest
room, avoiding a potentially embarrassing situation.
Freezing of gait is a common occurrence for many people with
Parkinson’s disease. Such struggles can limit social experience and lead
to seclusion and depression. Unfortunately, available pharmacological
and surgical treatments for Parkinson’s do a poor job of quelling this
and many other symptoms. But where conventional medicine has failed,
music therapy can sometimes provide relief.
Music therapy is the use of music by a credentialed professional as an
intervention to improve, restore, or maintain a non-music-related
behavior in a patient or client. As a music therapist, I have worked
with many people with Parkinson’s disease and have seen how music can
provide an external cue for patients to walk in time to, allowing them
to overcome freezing. I have also used group singing to help patients
with Parkinson’s improve their respiratory control and swallowing.
Impaired swallowing can lead to aspiration pneumonia, which is a leading
cause of death among this patient population.
But perhaps the most powerful component of music therapy is the social
benefit derived from making music together, which can help patients
combat depression. When patients with Parkinson’s engage in music
therapy, often one of the first behaviors to emerge is smiling, and the
flat affect and masked face that are characteristic symptoms of the
disease fade away. These participants comment on how music therapy is
the best part of their week, and their caregivers state that their loved
ones are in much better moods—with fewer Parkinson’s symptoms—after
returning home from music therapy.
While all of this is interesting, it is not new. Aristotle and Plato
were among the first to write on the healing influence of music. The
earliest references to music as therapy occurred in the late 1700s and
early 1800s, and the field formally began after World War I, when
professional and amateur musicians played for veterans who had suffered
physical and emotional trauma as a result of the war. Nowadays,
certified music therapists seek to do more than just play the right song
at the right time. They use music to help people with many different
physical and emotional disorders or diseases.
nakedcapitalism | It has long been the case that “Big Data” has been treated as a
magical, unstoppable force that will reap power and profits for those
who can channel it effectively. In the 2016 Presidential election, the
Clinton campaign and Democratic National Committee relied heavily on Ada
(named after Lord Byron’s mathematician daughter, a perfect
identitarian for Clintonian Democrats, combining as she does into one
symbolic person aristocratic status, the creative class, feminism and
computing). Ada was the Democrats’ attempt at a Big Data
Election-Winning Machine, apparently created for it in secret in a dark
cave at the top of a mountain by Eric Schmidt and unknown coding slaves
who were probably killed as soon as Eric carried his prize down the
mountain to Hillary’s waiting arms.
That last part is made up.
But the Democrats did have Ada, which only top aides were allowed to use or even see. Very little is known about Ada, because (spoiler alert) Clinton lost and the brain trust leading the party (if you can call it that)
didn’t want anyone to focus on their incompetence and wasteful spending
because RUSSIA. Ada said Wisconsin was a safe state. Ada said paying Jay Z to perform would win Ohio. Ada failed, along with Clinton.
Yet now there are rumblings that there is a REAL Death Star, a Big
Data system perfect in its design, malevolent in its intent, and
all-powerful in its capacity to segment and manipulate every human being
on Earth. (No, not the NSA – how silly of you to worry about an arm of
the government!) It’s Cambridge Analytica, of which Robert Mercer, right
wing hedge fund billionaire, is a major investor. That Robert
Mercer, who backed Donald Trump, the crazy-haired real estate hair and
game show host who won the 2016 Presidential election.
The thinking is, now that Trump has access to all that otherwise completely benign NSA data,
he and Mercer can conspire to feed all of America into the gaping maw
of this algorithmic monster, and manipulate otherwise good-thinking
Americans into…I’m not sure, exactly. Trump already won the Presidency.
The Republican Party – the party notably less aligned with Silicon
Valley, although that is rapidly changing because Silicon Valley boys
know to go where the money is – is already so dominant, it controls not
only every branch of the Federal Government,1 but such a large percentage of the states it only needs one or two more to call a Constitutional Convention. It did all of this without an Election-Winning Death Star.
This suggests a number of questions:
How much should we fear Big Data?
How much should we fear Cambridge Analytica?
Are we on the verge having of a new, uniquely powerful propaganda tool?
And the secret question, the one unsaid in most of these pieces: Can the Democrats get their hands on it to win back power?
The short answers are:
A lot
No more or less than every other Big Data operation
No
No
All this extensive data gathering and mining of people without their
full knowledge and consent is bad. It’s bad when the NSA does it. It’s
bad when Facebook does it. It’s bad when Cambridge Analytica does it.
There is the potential for tremendous harm. There is also the potential
(which is, to some degree, already occurring) for massive manipulation of people’s emotions in new ways. Targeted segmentation and messaging works for many purposes. Here’s a primer.
consortiumnews | On Nov. 20, the Times published alead editorialcalling on Facebook and other technology giants to devise algorithms that could eliminate stories that the Times deemed to be “fake.” The Times and other mainstream news outlets – along with a few favored Internet sites – joined a special Google-sponsored task force,called the First Draft Coalition, to decide what is true and what is not. If the Times’ editorial recommendations were followed, the disfavored stories and the sites publishing them would no longer be accessible through popular search engines and platforms, essentially blocking the public’s access to them. [See Consortiumnews.com’s “What to Do About ‘Fake News.’”]
On Thanksgiving Day, the Post ran a front-page story citingan anonymous group, called PropOrNot, blacklisting200 Web sites, including Consortiumnews.com and other important sources of independent journalism, because we supposedly promoted “Russian propaganda.”
Although PropOrNot and the Post didn’t bother to cite any actual examples or to ask the accused for comment, the point was clear: If you didn’t march in lockstep behind the Official Narrative on, say, the Ukraine crisis or the war in Syria, you were to be isolated, demonized and effectively silenced. In the article, the Post blurred the lines between “fake news” – stories that are simply made up – and what was deemed “propaganda,” in effect, information that didn’t jibe with what the U.S. State Department was saying.
Back then, in November, the big newspapers believed that the truth was easy, simple, obvious, requiring only access to some well-placed government official or a quick reading of the executive summary from some official report. Over the last quarter century or so, the Times, in particular, has made a fetish out of embracing pretty muchwhatever Officialdom declared to be true. After all, such well-dressed folks with those important-sounding titles couldn’t possibly be lying.
That gullibility went from the serious, such as rejecting overwhelming evidence that Ronald Reagan’s Nicaraguan Contra rebels were deeply involved in drug trafficking, to the silly, trusting the NFL’s absurd Deflategate allegations against Tom Brady. In those “old” days, which apparently ended a few weeks ago, the Times could have run full-page ads, saying “Truth is whatever those in authority say it is.”
bloomberg | At JPMorgan Chase & Co., a learning machine is parsing financial deals that once kept legal teams busy for thousands of hours.
The program, called COIN, for Contract Intelligence, does the mind-numbing job of interpreting commercial-loan agreements that, until the project went online in June, consumed 360,000 hours of work each year by lawyers and loan officers. The software reviews documents in seconds, is less error-prone and never asks for vacation.
While the financial industry has long touted its technological innovations, a new era of automation is now in overdrive as cheap computing power converges with fears of losing customers to startups. Made possible by investments in machine learning and a new private cloud network, COIN is just the start for the biggest U.S. bank. The firm recently set up technology hubs for teams specializing in big data, robotics and cloud infrastructure to find new sources of revenue, while reducing expenses and risks.
The push to automate mundane tasks and create new tools for bankers and clients -- a growing part of the firm’s $9.6 billion technology budget -- is a core theme as the company hosts its annual investor day on Tuesday.
Behind the strategy, overseen by Chief Operating Operating Officer Matt Zames and Chief Information Officer Dana Deasy, is an undercurrent of anxiety: Though JPMorgan emerged from the financial crisis as one of few big winners, its dominance is at risk unless it aggressively pursues new technologies, according to interviews with a half-dozen bank executives.
Rejuvenation Pills
-
No one likes getting old. Everyone would like to be immorbid. Let's be
careful here. Immortal doesnt include youth or return to youth. Immorbid
means you s...
Death of the Author — at the Hands of Cthulhu
-
In 1967, French literary theorist and philosopher Roland Barthes wrote of
“The Death of the Author,” arguing that the meaning of a text is divorced
from au...
9/29 again
-
"On this sacred day of Michaelmas, former President Donald Trump invoked
the heavenly power of St. Michael the Archangel, sharing a powerful prayer
for pro...
Return of the Magi
-
Lately, the Holy Spirit is in the air. Emotional energy is swirling out of
the earth.I can feel it bubbling up, effervescing and evaporating around
us, s...
New Travels
-
Haven’t published on the Blog in quite a while. I at least part have been
immersed in the area of writing books. My focus is on Science Fiction an
Historic...
Covid-19 Preys Upon The Elderly And The Obese
-
sciencemag | This spring, after days of flulike symptoms and fever, a man
arrived at the emergency room at the University of Vermont Medical Center.
He ...