Tuesday, September 05, 2017
CIA Ford Foundation Architect of Multiculturalism
By CNu at September 05, 2017 0 comments
Labels: American Original , Cathedral , Deep State , Degenerate , Dystopian Now , governance , identity politics , political economy , professional and managerial frauds , Toxic Culture?
CIA Infiltration of Journalism Curriculum and Instruction
By CNu at September 05, 2017 0 comments
Labels: cognitive infiltration , Deep State , disinformation , Dystopian Now , Livestock Management , presstitution , professional and managerial frauds , propaganda
Monday, September 04, 2017
Banksters Not About To Surrender Their Drug Money Laundering Profits...,
Fighting drug trafficking was one of the main reasons the Uruguayan government gave for legalizing recreational marijuana. Officials spent years developing a complex regulatory framework that permits people to grow a limited supply of cannabis themselves or buy it at pharmacies for less than the black market rate. Lawmakers hoped that these legal structures would undercut illicit marijuana cultivation and sales.
“There probably isn’t a trade in Uruguay today that is more controlled than cannabis sale,” said Pablo Durán (a legal expert at the Center of Pharmacies in Uruguay, a trade group).
By CNu at September 04, 2017 0 comments
Labels: addiction , banksterism , narcoterror , Vampire Squid , What IT DO Shawty...
Sunday, September 03, 2017
Racism is an Integral, Permanent, and Indestructible Component of America
By CNu at September 03, 2017 0 comments
Labels: American Original , doesn't end well , Ecce Homo , Left Behind
The Invention of the White Race
“When the first Africans arrived in Virginia in 1619, there were no ‘white’ people there; nor, according to the colonial records, would there be for another sixty years.”
By CNu at September 03, 2017 0 comments
Labels: American Original , History's Mysteries , political economy , Race and Ethnicity , relationship management
Saturday, September 02, 2017
America's Current Political Crisis Started 50 Years Ago in Detroit
By CNu at September 02, 2017 0 comments
Labels: .45 , American Original , Living Memory , political theatre , What Now?
Friday, September 01, 2017
The Grand Canyon Wide Narrative Divide
By CNu at September 01, 2017 0 comments
Labels: agenda , civil war , cognitive infiltration , doesn't end well , governance , hegemony , helplessness , Left Behind , Malnare , musical chairs , political economy , unintended consequences , What Now?
Whose Agenda Profits From the Violence-as-Beauty Rhetoric?
By CNu at September 01, 2017 0 comments
Labels: corporatism , doesn't end well , hegemony , identity politics , Left Behind , Naked Emperor , peasants , political economy , political theatre
Does Clarkisha Identify White Supremacy With the Shooter or the Manufacturer?
1. White media branding antifa (and other resistance groups) “the alt left” changes the conversation.
By CNu at September 01, 2017 0 comments
Labels: corporatism , doesn't end well , identity politics , Left Behind , Livestock Management , peasants , political theatre , propaganda
Thursday, August 31, 2017
Toward Ubiquitous Robotic Organisms
By CNu at August 31, 2017 0 comments
Labels: AI , Exponential Upside , transbiological , What Now?
IoT Extended Sensoria
By CNu at August 31, 2017 0 comments
Labels: Exponential Upside , Minority Report , Noo/Nano/Geno/Thermo , transbiological , What Now?
Wednesday, August 30, 2017
The Weaponization of Artificial Intelligence
perception, conversation, decisionmaking).
Advances in AI are making it possible to cede to machines many tasks long regarded as impossible for machines to perform. Intelligent systems aim to apply AI to a particular problem or domain—the
implication being that the system is programmed or trained to operate within the bounds of a defined knowledge base. Autonomous function is at a system level rather than a component level. The study considered two categories of intelligent systems: those employing autonomy at rest and those employing autonomy in motion. In broad terms, systems incorporating autonomy at rest operate virtually, in software, and include planning and expert advisory systems, whereas systems incorporating autonomy in motion have a presence in the physical world and include robotics and autonomous vehicles.
One of the less well-known ways that autonomy is changing the world is in applications that include data compilation, data analysis, web search, recommendation engines, and forecasting. Given the limitations of human abilities to rapidly process the vast amounts of data available today, autonomous systems are now required to find trends and analyze patterns. There is no need to solve the long-term AI problem of general intelligence in order to build high-value applications that exploit limited-scope autonomous capabilities dedicated to specific purposes. DoD’s nascent Memex program is one of many examples in this category.3
Rapid global market expansion for robotics and other intelligent systems to address consumer and industrial applications is stimulating increasing commercial investment and delivering a diverse array of products. At the same time, autonomy is being embedded in a growing array of software systems to enhance speed and consistency of decision-making, among other benefits. Likewise, governmental entities, motivated by economic development opportunities in addition to security missions and other public sector applications, are investing in related basic and applied research.
Applications include commercial endeavors, such as IBM’s Watson, the use of robotics in ports and
mines worldwide, autonomous vehicles (from autopilot drones to self-driving cars), automated logistics and supply chain management, and many more. Japanese and U.S. companies invested more than $2 billion in autonomous systems in 2014, led by Apple, Facebook, Google, Hitachi, IBM, Intel, LinkedIn, NEC, Yahoo, and Twitter. 4
A vibrant startup ecosystem is spawning advances in response to commercial market opportunities; innovations are occurring globally, as illustrated in Figure 2 (top). Startups are targeting opportunities that drive advances in critical underlying technologies. As illustrated in Figure 2 (bottom), machine learning—both application-specific and general purpose—is of high interest. The market-pull for machine learning stems from a diverse array of applications across an equally diverse spectrum of industries, as illustrated in Figure 3.
By CNu at August 30, 2017 0 comments
Labels: AI , Noo/Nano/Geno/Thermo , transbiological , What Now? , wikileaks wednesday
The Weaponization of Information
Most important from the U.S. perspective, Russian IO techniques, tactics and procedures are developing constantly and rapidly, as continually measuring effectiveness and rapidly evolving techniques are very cheap compared to the costs of any kinetic weapon system—and they could potentially be a lot more effective.
At this point, Russian IO operators use relatively unsophisticated techniques systematically and on a large scale. This relative lack of sophistication leaves them open to detection. For example, existing technology can identify paid troll operations, bots, etc. Another key element of Russian IO strategy is to target audiences with multiple, conflicting narratives to sow seeds of distrust of and doubt about the European Union (EU) as well as national governments. These can also be detected. The current apparent lack of technical sophistication of Russian IO techniques could derive from the fact that, so far, Russian IO has met with minimal resistance. However, if and when target forces start to counter these efforts and/or expose them on a large scale, the Russians are likely to accelerate the improvement of their techniques, leading to a cycle of counter-responses. In other words, an information warfare arms race is likely to ensue.
A Strategy to Counter the Russian Threat
Because the culture and history of each country is unique and because the success of any IO defense strategy must be tailored to local institutions and populations, the most effective strategies are likely to be those that are developed and managed on a country-by-country basis. An information defense strategy framework for countering Russian IO offensives should be “whole-of-nation” in character. A whole-of-nation approach is a coordinated effort between national government organizations, military, intelligence community, industry, media, research organizations, academia and citizen organized groups. A discreet US Special Operations Force could provide individual country support as well as cross country coordination.
Just as in the physical world, good maps are critical to any IO strategy. In the case of IO, maps show information flows. Information maps must show connectivity in the information environment and help navigate that environment. They exist as computer software and databases. Information cartography for IO is the art of creating, maintaining, and using such maps. An important feature of information maps is that they are constantly changing to reflect the dynamic nature of the information environment. Because they are artificially intelligent computer programs, they can answer questions; provide situation awareness dynamically; and help to plan, monitor, and appropriately modify operations. Information maps are technically possible today and already exist in forms that can be adapted to support the design and execution IO strategy.
As an example, most of the North Atlantic Treaty Organization (NATO) states, as well as several non-NATO partners, are already subject to concentrated Russian IO and they illustrate ongoing Russian IO techniques. Using information cartography, it is possible to map key Russian sources as part of Russian IO operations against a target state. These sources might include:
• Russian and target country think tanks
• foundations (e.g., Russkiy Mir)
• authorities (e.g., Rossotrudnichestvo)
• television stations (e.g. RT)
• pseudo-news agencies and multimedia services (e.g., Sputnik)
• cross-border social and religious groups
• social media and Internet trolls to challenge democratic values, divide Europe, gather domestic support, and create the perception of failed states in the EU’s eastern neighborhood
• Russian regime–controlled companies and organizations
• Russian regime–funded political parties and other organizations in target country in
particular and within the EU in general intended to undermine political cohesion
• Russian propaganda directly targeting journalists, politicians, and individuals in target
countries in particular and the EU in general.
might include:
• national government organizations
• military
• intelligence community
• industry
• media
• independent think tanks
• academia
• citizen-organized groups.
Christopher Paul and Miriam Matthews of the RAND Corporation observe: “Experimental research in psychology suggests that the features of the contemporary Russian propaganda model have the potential to be highly effective.”14 They present a careful and concise analysis of relevant psychological research results that should inform any information defensive strategy. For example, they describe how propaganda can be used to distort perceptions of reality:
• People are poor judges of true versus false information—and they do not necessarily remember that particular information was false.
• Information overload leads people to take shortcuts in determining the trustworthiness of messages.
• Familiar themes or messages can be appealing even if they are false.
• Statements are more likely to be accepted if backed by evidence, even if that evidence is false.
• Peripheral cues—such as an appearance of objectivity—can increase the credibility of propaganda.15
1. Take the population and break it down into communities, based on any number of criteria
(e.g. hobbies, interests, politics, needs, concerns, etc.).
2. Determine who in each community is most susceptible to given types of messages.
3. Determine the social dynamics of communication and flow of ideas within each community.
4. Determine what narratives of different types dominate the conversation in each community.
5. Use all of the above to design and push a narrative likely to succeed in displacing a narrative unfavorable to you with one that is more favorable.
6. Use continual monitoring and interaction to determine the success of your effort and adjust in real time.
These same technologies can be used for defensive purposes. For example, you could use the techniques for breaking down communities described above to detect adversary efforts to push a narrative and examine that narrative’s content. The technology can help researchers focus while searching through massive amounts of social media data.
By CNu at August 30, 2017 0 comments
Labels: American Original , cognitive infiltration , information anarchy , wikileaks wednesday , you used to be the man
Information Warfare, Mass Surveillance, Endless War and Control...,
No more shadows
By CNu at August 30, 2017 0 comments
Labels: Deep State , information anarchy , institutional deconstruction , necropolitics , predatory militarism , unspeakable , wikileaks wednesday
Tuesday, August 29, 2017
Subverting Marijuana Legalization While Facilitating Heroin Exfiltration...,
By CNu at August 29, 2017 0 comments
Labels: .45 , addiction , Deep State , Degenerate , narcoterror , necropolitics , predatory militarism , professional and managerial frauds , The Great Game
With Intersectional "Allies" Like Ed Buck, Who Needs Nazi's for Enemies?
By CNu at August 29, 2017 0 comments
Labels: addiction , Cathedral , cephalopod mollusc , Degenerate , identity politics , Livestock Management , necropolitics , niggerization , parasitic , professional and managerial frauds , Race and Ethnicity
Monday, August 28, 2017
Intersectionalism Suffocating On Its Own Fumes
By CNu at August 28, 2017 0 comments
Labels: Cathedral , identity politics , Livestock Management , partisan , Race and Ethnicity , What Now?
Manipulated Minorities
- They are typically far more aware of their minority identity/status than the majority. That is to say that if the majority is of skin color A and the minority of skin color B, the minority will be much more acutely aware of its skin color.
- They are typically much more driven and active then the majority. This is probably due to their more acute perception of being a minority.
- They are only concerned with single-issue politics, that single-issue being, of course, their minority status.
- Since minorities are often unhappy with their minority-status, they are also often resentful of the majority.
- Since minorities are mostly preoccupied by their minority-status linked issue, they rarely pay attention to the ‘bigger picture’ and that, in turn, means that the political agenda of the minorities typically does not threaten the powers that be.
- Minorities often have a deep-seated inferiority complex towards the putatively more successful majority.
- Minorities often seek to identify other minorities with which they can ally themselves against the majority.
By CNu at August 28, 2017 0 comments
Labels: identity politics , Livestock Management , Naked Emperor , Race and Ethnicity , Small Minority , What IT DO Shawty...
DEI Is Dumbasses With No Idea That They're Dumb
Tucker Carlson about Alexandria Ocasio-Cortez and Karine Jean-Pierre: "The marriage of ineptitude and high self-esteem is really the ma...
-
theatlantic | The Ku Klux Klan, Ronald Reagan, and, for most of its history, the NRA all worked to control guns. The Founding Fathers...
-
Video - John Marco Allegro in an interview with Van Kooten & De Bie. TSMATC | Describing the growth of the mushroom ( boletos), P...
-
Farmer Scrub | We've just completed one full year of weighing and recording everything we harvest from the yard. I've uploaded a s...