Thursday, April 20, 2017

Does Anybody Really Need a Book to Explain Why Hillary Lost?


Review Hillary Clinton's 1969 Wellesley College thesis titled: “there is only the fight” published on line in pdf format, where the key insights can be found that Mrs. Clinton understood that Saul Alinsky’s “political faith” along with that of his fellow thinkers, MLK, Eugene Debs, Walt Whitman was simply “democracy”. 

In the last chapter of her thesis, she rejects the “ideal” of democracy for herself and points out that Alinksy’s solution of new deal style mass projects like the TVA to provide jobs might work in some other countries but not here in this country. She affirms that sentiment with the mocking cartoon appended to the end of her thesis. 

consortiumnews |  An early insider account of Hillary Clinton’s presidential campaign, entitled Shattered, reveals a paranoid presidential candidate who couldn’t articulate why she wanted to be President and who oversaw an overconfident and dysfunctional operation that failed to project a positive message or appeal to key voting groups.

Okay, I realize that people who have been watching Rachel Maddow and other MSNBC programs – as well as reading The New York Times and The Washington Post for the past four months – “know” that Clinton ran a brilliant campaign that was only derailed because of “Russian meddling.” But this insider account from reporters Jonathan Allen and Annie Parnes describes something else.

As The Wall Street Journal review notes, the book “narrates the petty bickering, foolish reasoning and sheer arrogance of a campaign that was never the sure thing that its leader and top staffers assumed. … Mr. Allen and Ms. Parnes stress two essential failures of the campaign, the first structural, the second political. The campaign’s structure, the authors write, was an ‘unholy mess, fraught with tangled lines of authority, petty jealousies, and no sense of greater purpose.’”

The book portrays Hillary Clinton as distant from her campaign staff, accessible primarily through her close aide, Huma Abedin, and thus creating warring factions within her bloated operation.

According to the Journal’s review by Barton Swaim, the book’s authors suggest that this chaos resulted from “the fact that Mrs. Clinton didn’t know why she wanted to be president. At one point no fewer than 10 senior aides were working on her campaign announcement speech, not one had a clear understanding of why Americans should cast their vote for Mrs. Clinton and not someone else. The speech, when she finally delivered it, was a flop – aimless, boring, devoid of much beyond bromides.”

The book cites a second reason for Clinton’s dismal performance – her team’s reliance on analytics rather than on reaching out to real voters and their concerns.

There is also an interesting tidbit regarding Clinton’s attitude toward the privacy of her staff’s emails. “After losing to Mr. Obama in the protracted 2008 primary,” the Journal’s review says, Clinton “was convinced that she had lost because some staffers – she wasn’t sure who – had been disloyal. So she ‘instructed a trusted aide to access the campaign’s server and download the [email] messages sent and received by top staffers.’”

America Cannot Be Great Until the Military and Police Uphold Their Oaths


washingtonsblog |  People around the world view the US as the greatest threat to peace; voted three times more dangerous than any other country. The data confirm this conclusion:
Rather than “drain the swamp” and focus US resources on US upgrades, President Trump joins our opponents with violating war law from two US treaties that armed attack is only lawful if, and only if, the US is under attack by another nation’s government.

Waiting for military honor
The ordinary US military are the used/abused pawns of the .01% psychopathic class. They enlist from economic need, desire to serve ideals within our Declaration of Independence and US Constitution, or from attraction to ideals within this profession. Although they’re trained to recognize unlawful orders within military duty, they are not trained to recognize unlawful Wars of Aggression. Of course, there are no lawful orders for unlawful war. Their Oaths of Enlistment swear them to protect and defend the US Constitution against all enemies, foreign and domestic. There is no greater domestic enemy than .01% “leaders” who lie them into unlawful Wars of Aggression.

Because US military are the ones applying War Crimes onto the world, with all risk and suffering at their immediate experience, one would imagine growing factions refusing to obey lying “leaders” and dishonorable illegal armed attacks.

One would imagine, except We the People see no evidence.


NYTimes Says Assad Used Chemical Weapon Because RUSSIA!


consortiumnews |  the major U.S. news outlets, such as The New York Times and The Washington Post, apparently believe there is only one side to a story, the one espoused by the U.S. government or more generically the Establishment.

Any other interpretation of a set of facts gets dismissed as “fringe” or “fake news” even if there are obvious holes in the official story and a lack of verifiable proof to support the mainstream groupthink. Very quickly, alternative explanations are cast aside while ridicule is heaped on those who disagree.

So, for instance, The New York Times will no longer allow any doubt to creep in about its certainty that Syrian President Bashar al-Assad intentionally dropped a sarin bomb on the remote rebel-held town of Khan Sheikhoun in Idlib province in northern Syria on April 4.

A mocking article by the Times’ Jim Rutenberg on Monday displayed the Times’ rejection of any intellectual curiosity regarding the U.S. government’s claims that were cited by President Trump as justification for his April 6 missile strike against a Syrian military airbase. The attack killed several soldiers and nine civilians including four children, according to Syrian press reports.

Rutenberg traveled to Moscow with the clear intention of mocking the Russian news media for its “fake news” in contrast to The New York Times, which holds itself out as the world’s premier guardian of “the truth.” Rather than deal with the difficulty of assessing what happened in Khan Sheikhoun, which is controlled by Al Qaeda’s Syrian affiliate and where information therefore should be regarded as highly suspect, Rutenberg simply assessed that the conventional wisdom in the West must be correct.

To discredit any doubters, Rutenberg associated them with one of the wackier conspiracy theories of radio personality Alex Jones, another version of the Times’ recent troubling reliance on McCarthyistic logical fallacies, not only applying guilt by association but refuting reasonable skepticism by tying it to someone who in an entirely different context expressed unreasonable skepticism.

Rutenberg wrote: “As soon as I turned on a television here I wondered if I had arrived through an alt-right wormhole. Back in the States, the prevailing notion in the news was that Mr. Assad had indeed been responsible for the chemical strike. There was some ‘reportage’ from sources like the conspiracy theorist and radio host Alex Jones — best known for suggesting that the Sandy Hook school massacre was staged — that the chemical attack was a ‘false flag’ operation by terrorist rebel groups to goad the United States into attacking Mr. Assad. But that was a view from the [U.S.] fringe. Here in Russia, it was the dominant theme throughout the overwhelmingly state-controlled mainstream media.”

Wednesday, April 19, 2017

Shadow Brokers Hit NSA a Devastating Lick


Don't forget I told you cats about the NSA creep-tip two years ago, and gave you a concrete specific recommendation for shoring up your end-point game to protect at least a little something...,

FP |  Weaver believes that when the Shadow Brokers published a broad list of the tools in their possession in January, hoping to auction them off, the NSA moved quickly.

The NSA “did clearly, quietly tell Microsoft,” Weaver said, allowing the company to repair the holes before script kiddies and criminal hackers started figuring out the specifics of the exploits.
Microsoft published a massive patch exactly a month before the Shadow Brokers unleashed its trove.
Neither Microsoft nor the NSA immediately responded to a request for comment.

Before Microsoft revealed it had patched most of the holes, the Shadow Brokers’ release reignited the debate about when government agencies should be required to disclose vulnerabilities it finds in such major products as devices and browsers.

The White House’s Vulnerabilities Equities Process, which determines whether those flaws should be shared with the company in order to be repaired, or taken advantage of by intelligence agencies, was reinvigorated in 2014. The process involves several major agencies, which consider the likelihood that other nation states or criminal actors would come across the same flaws.

It’s unclear, however, which agencies are involved in the process and how those decisions are made. The agencies are not required to disclose vulnerabilities purchased or researched through government sponsorship. If the NSA told Microsoft about the tools, it was because the agency knew or suspected the vulnerabilities had been compromised.

Intelligence officials see the latest Shadow Brokers release as part of a larger erosion of capabilities that has been going on since 2013, when former NSA contractor Edward Snowden gave journalists internal NSA documents. Snowden’s leak kicked off a chain of damaging exposures that, while sparking an important worldwide debate about privacy, severely damaged U.S. intelligence capabilities, the former intelligence official argued.

One former TAO employee who spoke with Foreign Policy believes the release is “a bit dated,” because hacking tools to access more current Windows projects and other browsers weren’t included.
“It is a significant leak. … It gets harder to develop tools as defenses improve,” the former TAO employee said. “But it’s still entirely possible. There are many bugs to be found.”

But the intelligence community’s ability to keep those bugs secret for any amount of time continues to be questioned. In this latest leak, detailed NSA notes and work product were included in addition to technical details about the hacking tools — likely indicating deep-level access to TAO troves. “This should be on an NSA computer only,” Weaver told Foreign Policy.

The details the Shadow Brokers revealed are “scary,” the former cyberintelligence employee said, details that must be from internal emails, chat logs, or insider knowledge.

Only a handful of countries could have pilfered such sensitive material from the NSA remotely, the former TAO employee wrote, Russia and Israel the mostly likely among them.

“If it was an inside job like an operator [typically military] walking out with a thumb drive, then who knows,” the former TAO source wrote.

In recent years, the intelligence community has largely failed to detect insider threats and stem leaks from contractors. Thousands of private companies and their employees make up a massive percentage of the intelligence community’s workforce. As of a decade ago, about 70 percent of the intelligence community’s budget was spent on contracts, according to the Congressional Research Service.

New Evidence Syrian Gas Story Fabricated by the White House


nakedcapitalism  |  It is now clear from video evidence that the WHR report was fabricated without input from the professional intelligence community [emphasis mine (GP)].

The press reported on April 4 that a nerve agent attack had occurred in Khan Shaykhun, Syria during the early morning hours locally on that day. On April 7, The United States carried out a cruise missile attack on Syria ordered by President Trump. It now appears that the president ordered this cruise missile attack without any valid intelligence to support it [emphasis mine (GP)].

In order to cover up the lack of intelligence to supporting the president’s action, the National Security Council produced a fraudulent intelligence report on April 11 four days later [emphasis mine (GP)]. The individual responsible for this report was Lieutenant General H. R. McMaster, the National Security Advisor. The McMaster report is completely undermined by a significant body of video evidence taken after the alleged sarin attack and before the US cruise missile attack that unambiguously shows the claims in the WHR could not possibly be true. This cannot be explained as a simple error.

The National Security Council Intelligence Report clearly refers to evidence that it claims was obtained from commercial and open sources shortly after the alleged nerve agent attack (on April 5 and April 6). If such a collection of commercial evidence was done, it would have surely found the videos contained herein.

This unambiguously indicates a dedicated attempt to manufacture a false claim that intelligence actually supported the president’s decision to attack Syria, and of far more importance, to accuse Russia of being either complicit or a participant in an alleged atrocity [emphasis mine (GP)].
The attack on the Syrian government threatened to undermine the relationship between Russia and the United States. Cooperation between Russia and the United States is critical to the defeat of the Islamic State. In addition, the false accusation that Russia knowingly engaged in an atrocity raises the most serious questions about a willful attempt to do damage relations with Russia for domestic political purposes.
We repeat here a quote from the WHR:
An open source video also shows where we believe the chemical munition landed—not on a facility filled with weapons, but in the middle of a street in the northern section of Khan Shaykhun[Emphasis Added]. Commercial satellite imagery of that site from April 6, after the allegation, shows a crater in the road that corresponds to the open source video.
The data provided in these videos make it clear that the WHR made no good-faith attempt to collect data that could have supported its “confident assessment.” that the Syrian government executed a sarin attack as indicated by the location and characteristics of the crater.

This very disturbing event is not a unique situation. President George W. Bush argued that he was misinformed about unambiguous evidence that Iraq was hiding a substantial store of weapons of mass destruction. This false intelligence led to a US attack on Iraq that started a process that ultimately led to the political disintegration in the Middle East, which through a series of unpredicted events then led to the rise of the Islamic State [emphasis mine (GP)].

On August 30, 2013, the White House produced a similarly false report about the nerve agent attack on August 21, 2013 in Damascus [emphasis mine (GP)]. This report also contained numerous intelligence claims that could not be true. An interview with President Obama published in The Atlantic in April 2016 indicates that Obama was initially told that there was solid intelligence that the Syrian government was responsible for the nerve agent attack of August 21, 2013 in Ghouta, Syria. Obama reported that he was later told that the intelligence was not solid by the then Director of National Intelligence, James Clapper.

Equally serious questions are raised about the abuse of intelligence findings by the incident in 2013. Questions that have not been answered about that incident is how the White House produced a false intelligence report with false claims that could obviously be identified by experts outside the White House and without access to classified information. There also needs to be an explanation of why this 2013 false report was not corrected. Secretary of State John Kerry emphatically testified before the Senate Foreign Relations Committee repeating information in this so-called un-equivocating report.
On August 30, 2013 Secretary of State Kerry made the following statement from the Treaty Room in the State Department:
Our intelligence community has carefully reviewed and re-reviewed information regarding this attack [Emphasis added], and I will tell you it has done so more than mindful of the Iraq experience. We will not repeat that moment. Accordingly, we have taken unprecedented steps to declassify and make facts available to people who can judge for themselves.
It is now obvious that this incident produced by the WHR, while just as serious in terms of the dangers it created for US security, was a clumsy and outright fabrication of a report that was certainly not supported by the intelligence community [emphasis mine (GP)].

In this case, the president, supported by his staff, made a decision to launch 59 cruise missiles at a Syrian air base. This action was accompanied by serious risks of creating a confrontation with Russia, and also undermining cooperative efforts to win the war against the Islamic State.

I therefore conclude that there needs to be a comprehensive investigation of these events that have either misled people in the White House White House, or worse yet, been perpetrated by people to protect themselves from domestic political criticisms for uninformed and ill-considered actions.

Sincerely yours, Theodore A. Postol
Professor Emeritus of Science,
Technology, and National Security Policy
Massachusetts Institute of Technology
Email: postol@mit.edu


BBC News Massively Hypes North Korean ‘Threat’ To The United States


medialens |  One of the longstanding functions of the 'mainstream' media is to channel government ideology about who are 'the Good Guys' - that's 'us' and our allies - and who are the 'Bad Guys' – 'Putin's Russia', 'Saddam's Iraq', 'Chavez's Venezuela', 'Gaddafi's Libya' (until rehabilitated for a while by Blair) and North Korea.

Of course, 'we' often help 'Bad Guys' into power, even give them poison gas, sell them arms, and support them through thick and thin. But let's put all that to one side.
Consider a recent BBC News at Ten segment on the US, China and North Korea that began with presenter Huw Edwards saying:
'President Trump has said the United States will "solve" the threat posed by North Korea's nuclear programme. In an interview with the Financial Times, the president said the US would act alone if China would not intervene. He made his comments ahead of a visit to the US by the Chinese president later this week. Our North America editor, Jon Sopel, is at the White House.
'And, Jon, what does this tell us then about President Trump's approach to this upcoming visit?'
Jon Sopel: 'Well, Huw, for all the talk of surveillance and phone tapping and wire taps and Russia, this is the major strategic national security issue, at least as far as this White House is concerned. What to do about North Korea and their growing ability, it seems, to launch a nuclear missile that could hit the west coast of America.' (April 3, 2017; kindly captured and uploaded to YouTube for us by Steve Ennever)
As we will see, far from being responsible, 'impartial' journalism, this was blatant propaganda, depicting North Korea as a serious threat to the United States, capable of hitting California with a nuclear missile.

Consider, by contrast, a careful analysis by the US writer Adam Johnson in a piece for Fairness and Accuracy In Reporting last month. 
Johnson noted that:
'Tensions between the United States and North Korea are making their way back into the news after a series of missile tests and presidential Twitter threats. Meanwhile, a conservative think tank—previously thought all but dead—has seen a resurgence in relevancy, thanks to its alignment with Donald Trump. The result is that the Heritage Foundation has provided much of the narrative backbone for North Korean/US relations in the age of Trump, making the rounds in dozens of media articles and television appearances.'
Johnson continued:
'One key feature of reports on North Korea's nuclear weapons program is the Hypothetical Scary Nuke Map that shows an entirely hypothetical, not-yet-proven-to-have-been-built intercontinental ballistic missile hitting the US mainland.'
Two types of missile, known as KN-14 and KN-08, are depicted in media reports as capable of reaching the United States.
Johnson highlighted the crucial fact that:
'These missiles have not been tested by North Korea'.
In other words, the media have been publishing 'misleading' maps that 'buried the fact that the range indicating the US could be nuked had not, in fact, been demonstrated.'

Tuesday, April 18, 2017

The Essence of Black Politics vs Essence Magazine's Headfake Politricks


essence |  For the first time ever, ESSENCE honors the women who are blazing trails for equal rights and inclusion for Black people in America.

The cover features a host of dynamic women, such as writer/producer Shonda Rhimes, veteran journalist Joy-Ann Reid, Women’s March co-chairs Tamika Mallory, Linda Sarsour and Carmen Perez. Plus, appearances from Women’s March organizer Janaye Ingram, political commentator Angela Rye, Circle of Mothers founder Sybrina Fulton, author/blogger Luvvie Ajayi and social activist April Reign.  #BlackLivesMatter cofounder Opal Tometi and educator/activist Brittany Packnett are also featured.

When we say Black women will save the world, we’re being literal.

On the ­following pages, ESSENCE recognizes 88 more socially conscious change makers. By their example they ­empower all of us to take action.

Fake Virtue-Signalling By The Corporatocracy


oftwominds |  The Left is morally and fiscally bankrupt, devoid of coherent solutions, and corrupted by its embrace of the Corporatocracy.

History often surprises us with unexpected ironies. For the past century, the slide to fascism could be found on the Right (conservative, populist, nationalist political parties). 

But now it's the Left that's descending into fascism, and few seem to even notice this remarkable development. By Left I mean socialist-leaning, progressive, internationalist/globalist political parties. 

What is fascism? There is no one tidy definition, but it has three essential elements:
1) State and corporate elites govern society and the economy as one unified class.
2) This status quo (i.e. The Establishment) seeks to impose a conformity of values and opinion that support the dominant narratives of the status quo via the mass (corporate) media and the state-controlled educational system.
3) Dissent from any quarter is suppressed via mass-media ridicule, the judicial crushing and silencing of whistleblowers, and all the other powers of the central state: rendition, extra-legal imprisonment, political gulags (in our era, disguised as drug-war gulags), character assassination, murder by drone, impoverishing dissenters via firings and blacklists, and on and on. 

The Left is now the political wing of the corporatocracy. As Phillipe Poutou, a Ford factory mechanic from Bordeaux who is the sole working-class candidate in France's presidential election, so deliciously pointed out, the Left and Right status quo candidates are indistinguishable in terms of their self-serving corruption and elitism: Mechanic-Candidate Bursts French Political Elite's Bubble (NY Times) 

Here in the U.S., the self-serving Democratic Party elites operate within the Corporatocracy structure, in which the state protects and funds private-sector cartels; the two intertwined and self-reinforcing elites manifest and enforce state policies.

Monday, April 17, 2017

Syria Sarin Gas Attack Staged


IBTimes |  Theodore Postol, a professor emeritus at the Massachusetts Institute of Technology (MIT), issued a series of three reports in response to the White House's finding that Syrian President Bashar Al-Assad perpetrated the attack on 4 April.

He concluded that the US government's report does not provide any "concrete" evidence that Assad was responsible, adding it was more likely that the attack was perpetrated by players on the ground.

Postol said: "I have reviewed the [White House's] document carefully, and I believe it can be shown, without doubt, that the document does not provide any evidence whatsoever that the US government has concrete knowledge that the government of Syria was the source of the chemical attack in Khan Sheikhoun, Syria at roughly 6am to 7am on 4 April, 2017.

"In fact, a main piece of evidence that is cited in the document point to an attack that was executed by individuals on the ground, not from an aircraft, on the morning of 4 April.

"This conclusion is based on an assumption made by the White House when it cited the source of the sarin release and the photographs of that source. My own assessment is that the source was very likely tampered with or staged, so no serious conclusion could be made from the photographs cited by the White House."

The image Postol refers to is that of a crater containing a shell inside, which is said to have contained the sarin gas.

His analysis of the shell suggests that it could not have been dropped from an airplane as the damage of the casing is inconsistent from an aerial explosion. Instead, Postol said it was more likely that an explosive charge was laid upon the shell containing sarin, before being detonated.

Trump Has Received and Will Obey his Marching Orders


strategic culture |  Donald Trump has reversed his national-security policies 180 degrees, and is now focusing it around conquering Russia, instead of around reducing the threat from jihadists. The reason for this drastic change is in order for him to be able to win the support of the U.S. aristocracy, who had overwhelmingly favored Hillary Clinton during the Presidential contest, and who (and whose ‘news’media) have been trying to portray Trump as «Putin’s fool» or even as «Putin’s Manchurian candidate» and thus as an illegitimate President or even traitor who is beholden to 'America’s enemy’ (which to them is Russia) for Trump’s having won the U.S. Presidency — which they had tried to block from happening.

Actually, even Republican billionaires generally preferred Hillary Clinton over Donald Trump — and almost all of them hate Putin, who insists upon Russia’s independence, which the U.S. aristocracy call by all sorts of bad names, so that any American who even so much as merely questions the characterization of Russia as being an ‘enemy’ nation, is considered to be ‘unAmerican’, like in the days of communism and Joseph R. McCarthy, as if communism and the U.S.S.R. and its Warsaw Pact that mirrored America’s NATO military alliance, even existed today, which they obviously don’t. So: the U.S. Establishment’s portrayal of current international reality is so bizarre, it can be believed only by fools, but enough such fools exist so as to enable that Establishment to do horrific things, such as the 2003 invasion of Iraq, and the 2011 invasion of Libya, just to name two examples, which got rid of two national leaders who were friendly toward Russia.) 

After Trump ditched his National Security Advisor Mike Flynn (whom Obama had fired for not being sufficiently anti-Russian, but Trump then hired) and replaced him with the rabidly anti-Russian H.R. McMaster (whom the aristocracy’s people were recommending to Trump), Trump was expecting to be relieved from the aristocracy’s intensifying campaign to impeach him or otherwise replace him and make the President his clearly pro-aristocratic Vice President Mike Pence, but the overthrow-Trump campaign continued even after McMaster became installed replacing Flynn. Then, perhaps because the replacement of Flynn by McMaster failed to satisfy the aristocracy, Trump additionally ousted Stephen Bannon and simultaneously bombed Syrian government forces, and now the campaign to overthrow Trump seems finally to have subsided, at least a bit, at least for now.

Sunday, April 16, 2017

Six Main Arcs in Human Storytelling Identified by Artificial Intelligence


theatlantic |  “My prettiest contribution to my culture,” the writer Kurt Vonnegut mused in his 1981 autobiography Palm Sunday, “was a master’s thesis in anthropology which was rejected by the University of Chicago a long time ago.”

By then, he said, the thesis had long since vanished. (“It was rejected because it was so simple and looked like too much fun,” Vonnegut explained.) But he continued to carry the idea with him for many years after that, and spoke publicly about it more than once. It was, essentially, this: “There is no reason why the simple shapes of stories can’t be fed into computers. They are beautiful shapes.”

That explanation comes from a lecture he gave, and which you can still watch on YouTube, that involves Vonnegut mapping the narrative arc of popular storylines along a simple graph. The X-axis represents the chronology of the story, from beginning to end, while the Y-axis represents the experience of the protagonist, on a spectrum of ill fortune to good fortune. “This is an exercise in relativity, really,” Vonnegut explains. “The shape of the curve is what matters.”
The most interesting shape to him, it turned out, was the one that reflected the tale of Cinderella, of all stories. Vonnegut visualizes its arc as a staircase-like climb in good fortune representing the arrival of Cinderella’s fairy godmother, leading all the way to a high point at the ball, followed by a sudden plummet back to ill fortune at the stroke of midnight. Before too long, though, the Cinderella graph is marked by a sharp leap back to good fortune, what with the whole business of (spoiler alert) the glass slipper fitting and the happily ever after.

This may not seem like anything special, Vonnegut says—his actual words are, “it certainly looks like trash”—until he notices another well known story that shares this shape. “Those steps at the beginning look like the creation myth of virtually every society on earth. And then I saw that the stroke of midnight looked exactly like the unique creation myth in the Old Testament.” Cinderella’s curfew was, if you look at it on Vonnegut’s chart, a mirror-image downfall to Adam and Eve’s ejection from the Garden of Eden. “And then I saw the rise to bliss at the end was identical with the expectation of redemption as expressed in primitive Christianity. The tales were identical.”

Artificial Intelligence Will Disclose Cetacean Souls



Scientists have struggled to understand dolphin vocalizations, but new computer tools to both track dolphins and decode their complex vocalizations are now emerging. Dr. Denise Herzing has been studying Atlantic spotted dolphins, Stenella frontalis, in the Bahamas for over three decades. Her video and acoustic database encompasses a myriad of complex vocalizations and dolphin behavior. Dr. Thad Starner works on mining this dataset and decoding dolphin sounds, and has created a wearable underwater computer, CHAT (Cetacean Hearing and Telemetry), to help establish a bridge for communication between humans and dolphins. Starner and Herzing will present this cutting-edge work and recent results, including perspectives on the challenges of studying this aquatic society, and decoding their communication signals using the latest technology.

qz |  The possibility of talking to animals has tickled popular imaginations for years, and with good reason. Who wouldn’t want to live in a Dr. Dolittle world where we could understand what our pets and animal neighbors are saying?

Animal cognition researchers have also been fascinated by the topic. Their work typically focuses on isolating animal communication to see if language is uniquely human, or if it could have evolved in other species as well. One of their top candidates is an animal known to communicate with particularly high intelligence: dolphins.

Dolphins—like many animals including monkeys, birds, cats, and dogs—clearly do relay messages to one another. They emit sounds (paywall) in three broad categories: clicks, whistles, and more complex chirps used for echolocation (paywall), a technique they use to track prey and other objects by interpreting ricocheting sound waves. Researchers believe these sounds can help dolphins communicate: Whistles can serve as unique identifiers, similar to names, and can alert the pod to sources of food or danger.

Communication is most certainly a part of what helps these animals live in social pods. But proving that dolphins use language—the way that you’re reading this article, or how you might talk to your friends about it later—is a whole different kettle of fish.

Physical Basis for Morphogenesis: On Growth and Form


nature |  Still in print, On Growth and Form was more than a decade in the planning. Thompson would regularly tell colleagues and students — he taught at what is now the University of Dundee, hence the local media interest — about his big idea before he wrote it all down. In part, he was reacting against one of the biggest ideas in scientific history. Thompson used his book to argue that Charles Darwin’s natural selection was not the only major influence on the origin and development of species and their unique forms: “In general no organic forms exist save such as are in conformity with physical and mathematical laws.”

Biological response to physical forces remains a live topic for research. In a research paper, for example, researchers report how physical stresses generated at defects in the structures of epithelial cell layers cause excess cells to be extruded.

In a separate online publication (K. Kawaguchi et al. Nature http://dx.doi.org/10.1038/nature22321; 2017), other scientists show that topological defects have a role in cell dynamics, as a result of the balance of forces. In high-density cultures of neural progenitor cells, the direction in which cells travel around defects affects whether cells become more densely packed (leading to pile-ups) or spread out (leading to a cellular fast-lane where travel speeds up).

A Technology Feature investigates in depth the innovative methods developed to detect and measure forces generated by cells and proteins. Such techniques help researchers to understand how force is translated into biological function.

Thompson’s influence also flourishes in other active areas of interdisciplinary research. A research paper offers a mathematical explanation for the colour changes that appear in the scales of ocellated lizards (Timon lepidus) during development (also featured on this week’s cover). It suggests that the patterns are generated by a system called a hexagonal cellular automaton, and that such a discrete system can emerge from the continuous reaction-diffusion framework developed by mathematician Alan Turing to explain the distinctive patterning on animals, such as spots and stripes. (Some of the research findings are explored in detail in the News and Views section.) To complete the link to Thompson, Turing cited On Growth and Form in his original work on reaction-diffusion theory in living systems.

Finally, we have also prepared an online collection of research and comment from Nature and the Nature research journals in support of the centenary, some of which we have made freely available to view for one month.

Saturday, April 15, 2017

2017 Website@Most Important Lab at Harvard and Arguably the World?!?!




-->

Hacking and Reprogramming Cells Like Computers


wired |  Cells are basically tiny computers: They send and receive inputs and output accordingly. If you chug a Frappuccino, your blood sugar spikes, and your pancreatic cells get the message. Output: more insulin.

But cellular computing is more than just a convenient metaphor. In the last couple of decades, biologists have been working to hack the cells’ algorithm in an effort to control their processes. They’ve upended nature’s role as life’s software engineer, incrementally editing a cell’s algorithm—its DNA—over generations. In a paper published today in Nature Biotechnology, researchers programmed human cells to obey 109 different sets of logical instructions. With further development, this could lead to cells capable of responding to specific directions or environmental cues in order to fight disease or manufacture important chemicals.

Their cells execute these instructions by using proteins called DNA recombinases, which cut, reshuffle, or fuse segments of DNA. These proteins recognize and target specific positions on a DNA strand—and the researchers figured out how to trigger their activity. Depending on whether the recombinase gets triggered, the cell may or may not produce the protein encoded in the DNA segment.

A cell could be programmed, for example, with a so-called NOT logic gate. This is one of the simplest logic instructions: Do NOT do something whenever you receive the trigger. This study’s authors used this function to create cells that light up on command. Biologist Wilson Wong of Boston University, who led the research, refers to these engineered cells as “genetic circuits.”

A Programming Language For Living Cells?



MIT |  MIT biological engineers have created a programming language that allows them to rapidly design complex, DNA-encoded circuits that give new functions to living cells.
Using this language, anyone can write a program for the function they want, such as detecting and responding to certain environmental conditions. They can then generate a DNA sequence that will achieve it.
“It is literally a programming language for bacteria,” says Christopher Voigt, an MIT professor of biological engineering. “You use a text-based language, just like you’re programming a computer. Then you take that text and you compile it and it turns it into a DNA sequence that you put into the cell, and the circuit runs inside the cell.”
Voigt and colleagues at Boston University and the National Institute of Standards and Technology have used this language, which they describe in the April 1 issue of Science, to build circuits that can detect up to three inputs and respond in different ways. Future applications for this kind of programming include designing bacterial cells that can produce a cancer drug when they detect a tumor, or creating yeast cells that can halt their own fermentation process if too many toxic byproducts build up.
The researchers plan to make the user design interface available on the Web.

Friday, April 14, 2017

Open Thread: More Human Than Human


Brain item -- AI processing problem...??
would require AI to have the listener's entire life history stored in its memory to determine proper context....??
Your brain fills gaps in your hearing without you realising
No BD. Not an AI processing problem, just an illustration of the mechanical and necessarily error-prone nature of both language and auditory language processing. It's not a Voight-Kampff test and "Context doesn't require a life history".  In fact, with the benefit of big data, and centralized cloud storage and processing of hundreds of thousands of utterances and their associated meanings, the probability of an AI making either the sensory or grammatical error is greatly reduced.  

...Here's a no-nonsense AI item: Turns out AI is not sufficiently stupid to allow PC liberals to shove ridiculous egalitarian concepts down its throat. AI just looks at the *FACTS* and calls it like it sees it....
Machine learning algorithms are picking up deeply ingrained race and gender prejudices concealed within the patterns of language use, scientists say
No BD. Unfortunately, you are still trapped in the realm of language and language constructs your reality. Your language reflects your tendencies - which are racist - and so what FRANK is reflecting back at you is not the truth, merely the truth about you.  Fist tap Big Don.

Thursday, April 13, 2017

The Dark Secret at the Heart of Artificial Intelligence



technologyreview |   No one really knows how the most advanced algorithms do what they do. That could be a problem.

In 2015, a research group at Mount Sinai Hospital in New York was inspired to apply deep learning to the hospital’s vast database of patient records. This data set features hundreds of variables on patients, drawn from their test results, doctor visits, and so on. The resulting program, which the researchers named Deep Patient, was trained using data from about 700,000 individuals, and when tested on new records, it proved incredibly good at predicting disease. Without any expert instruction, Deep Patient had discovered patterns hidden in the hospital data that seemed to indicate when people were on the way to a wide range of ailments, including cancer of the liver. There are a lot of methods that are “pretty good” at predicting disease from a patient’s records, says Joel Dudley, who leads the Mount Sinai team. But, he adds, “this was just way better.”

At the same time, Deep Patient is a bit puzzling. It appears to anticipate the onset of psychiatric disorders like schizophrenia surprisingly well. But since schizophrenia is notoriously difficult for physicians to predict, Dudley wondered how this was possible. He still doesn’t know. The new tool offers no clue as to how it does this. If something like Deep Patient is actually going to help doctors, it will ideally give them the rationale for its prediction, to reassure them that it is accurate and to justify, say, a change in the drugs someone is being prescribed. “We can build these models,” Dudley says ruefully, “but we don’t know how they work.”

Artificial intelligence hasn’t always been this way. From the outset, there were two schools of thought regarding how understandable, or explainable, AI ought to be. Many thought it made the most sense to build machines that reasoned according to rules and logic, making their inner workings transparent to anyone who cared to examine some code. Others felt that intelligence would more easily emerge if machines took inspiration from biology, and learned by observing and experiencing. This meant turning computer programming on its head. Instead of a programmer writing the commands to solve a problem, the program generates its own algorithm based on example data and a desired output. The machine-learning techniques that would later evolve into today’s most powerful AI systems followed the latter path: the machine essentially programs itself.

At first this approach was of limited practical use, and in the 1960s and ’70s it remained largely confined to the fringes of the field. Then the computerization of many industries and the emergence of large data sets renewed interest. That inspired the development of more powerful machine-learning techniques, especially new versions of one known as the artificial neural network. By the 1990s, neural networks could automatically digitize handwritten characters.

But it was not until the start of this decade, after several clever tweaks and refinements, that very large—or “deep”—neural networks demonstrated dramatic improvements in automated perception. Deep learning is responsible for today’s explosion of AI. It has given computers extraordinary powers, like the ability to recognize spoken words almost as well as a person could, a skill too complex to code into the machine by hand. Deep learning has transformed computer vision and dramatically improved machine translation. It is now being used to guide all sorts of key decisions in medicine, finance, manufacturing—and beyond.

Is Artificial Intelligence a Threat to Christianity?


theatlantic |  While most theologians aren’t paying it much attention, some technologists are convinced that artificial intelligence is on an inevitable path toward autonomy. How far away this may be depends on whom you ask, but the trajectory raises some fundamental questions for Christianity—as well as religion broadly conceived, though for this article I’m going to stick to the faith tradition I know best. In fact, AI may be the greatest threat to Christian theology since Charles Darwin’s On the Origin of Species.

For decades, artificial intelligence has been advancing at breakneck speed. Today, computers can fly planes, interpret X-rays, and sift through forensic evidence; algorithms can paint masterpiece artworks and compose symphonies in the style of Bach. Google is developing “artificial moral reasoning” so that its driverless cars can make decisions about potential accidents.

“AI is already here, it’s real, it’s quickening,” says Kevin Kelly, a co-founder of Wired magazine and the author of The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future. “I think the formula for the next 10,000 start-ups is to take something that already exists and add AI to it.”

Will Artificial Intelligence Redefine Human Intelligence?


theatlantic |  As machines advance and as programs learn to do things that were once only accomplished by people, what will it mean to be human?

Over time, artificial intelligence will likely prove that carving out any realm of behavior as unique to humans—like language, a classic example—is ultimately wrong. If Tinsel and Beau were still around today, they might be powered by a digital assistant, after all. In fact, it’d be a littler weird if they weren’t, wouldn’t it? Consider the fact that Disney is exploring the use of interactive humanoid robots at its theme parks, according to a patent filing last week.

Technological history proves that what seems novel today can quickly become the norm, until one day you look back surprised at the memory of a job done by a human rather than a machine. By teaching machines what we know, we are training them to be like us. This is good for humanity in so many ways. But we may still occasionally long for the days before machines could imagine the future alongside us.

Wednesday, April 12, 2017

Why is the CIA WaPo Giving Space to Assange to Make His Case?


WaPo |  On his last night in office, President Dwight D. Eisenhower delivered a powerful farewell speech to the nation — words so important that he’d spent a year and a half preparing them. “Ike” famously warned the nation to “guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.” 

Much of Eisenhower’s speech could form part of the mission statement of WikiLeaks today. We publish truths regarding overreaches and abuses conducted in secret by the powerful.

Our most recent disclosures describe the CIA’s multibillion-dollar cyberwarfare program, in which the agency created dangerous cyberweapons, targeted private companies’ consumer products and then lost control of its cyber-arsenal. Our source(s) said they hoped to initiate a principled public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”

The truths we publish are inconvenient for those who seek to avoid one of the magnificent hallmarks of American life — public debate. Governments assert that WikiLeaks’ reporting harms security. Some claim that publishing facts about military and national security malfeasance is a greater problem than the malfeasance itself. Yet, as Eisenhower emphasized, “Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.” 

Quite simply, our motive is identical to that claimed by the New York Times and The Post — to publish newsworthy content. Consistent with the U.S. Constitution, we publish material that we can confirm to be true irrespective of whether sources came by that truth legally or have the right to release it to the media. And we strive to mitigate legitimate concerns, for example by using redaction to protect the identities of at-risk intelligence agents.





The Blockchain and Us


blockchain-documentary |  What is the Blockchain?

blockchain, NOUN /ˈblÉ’ktʃeɪn/
A digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly.
From en.oxforddictionaries.com/definition/blockchain

A mysterious white paper (Nakamoto, Satoshi, 2008, “Bitcoin: A Peer-to-Peer Electronic Cash System”) introduced the Bitcoin blockchain, a combination of existing technologies that ensures the integrity of data without a trusted party. It consists of a ledger that can’t be changed and a consensus algorithm—a way for groups to agree. Unlike existing databases in banks and other institutions, a network of users updates and supports the blockchain—a system somewhat similar to Wikipedia, which users around the globe maintain and double-check. The cryptocurrency Bitcoin is the first use case of the blockchain, but much more seems to be possible.

The Next Generation of the Internet
The first 40 years of the Internet brought e-mail, social media, mobile applications, online shopping, Big Data, Open Data, cloud computing, and the Internet of Things. Information technology is at the heart of everything today—good and bad. Despite advances in privacy, security, and inclusion, one thing is still missing from the Internet: Trust. Enter the blockchain.

The Blockchain and Us: The Project
When the Wright brothers invented the airplane in 1903, it was hard to imagine there would be over 500,000 people traveling in the air at any point in time today. In 2008, Satoshi Nakamoto invented Bitcoin and the blockchain. For the first time in history, his invention made it possible to send money around the globe without banks, governments or any other intermediaries. Satoshi is a mystery character, and just like the Wright brothers, he solved an unsolvable problem. The concept of the blockchain isn’t very intuitive. But still, many people believe it is a game changer. Despite its mysterious beginnings, the blockchain might be the airplane of our time.

Economist and filmmaker Manuel Stagars portrays this exciting technology in interviews with software developers, cryptologists, researchers, entrepreneurs, consultants, VCs, authors, politicians, and futurists from the United States, Canada, Switzerland, the UK, and Australia.
How can the blockchain benefit the economies of nations? How will it change society? What does this mean for each of us? The Blockchain and Us is no explainer video of the technology. It gives a view on the topic far from hype, makes it accessible and starts a conversation. For a deep dive, see all full-length interviews from the film here.

The Content Of Sci-Hub And Its Usage


biorxiv |  Despite the growth of Open Access, illegally circumventing paywalls to access scholarly publications is becoming a more mainstream phenomenon. The web service Sci-Hub is amongst the biggest facilitators of this, offering free access to around 62 million publications. So far it is not well studied how and why its users are accessing publications through Sci-Hub. By utilizing the recently released corpus of Sci-Hub and comparing it to the data of ~28 million downloads done through the service, this study tries to address some of these questions. The comparative analysis shows that both the usage and complete corpus is largely made up of recently published articles, with users disproportionately favoring newer articles and 35% of downloaded articles being published after 2013. These results hint that embargo periods before publications become Open Access are frequently circumnavigated using Guerilla Open Access approaches like Sci-Hub. On a journal level, the downloads show a bias towards some scholarly disciplines, especially Chemistry, suggesting increased barriers to access for these. Comparing the use and corpus on a publisher level, it becomes clear that only 11% of publishers are highly requested in comparison to the baseline frequency, while 45% of all publishers are significantly less accessed than expected. Despite this, the oligopoly of publishers is even more remarkable on the level of content consumption, with 80% of all downloads being published through only 9 publishers. All of this suggests that Sci-Hub is used by different populations and for a number of different reasons and that there is still a lack of access to the published scientific record. A further analysis of these openly available data resources will undoubtedly be valuable for the investigation of academic publishing.

ISP Data Pollution: Hiding the Needle in a Pile of Needles?


theatlantic |  The basic idea is simple. Internet providers want to know as much as possible about your browsing habits in order to sell a detailed profile of you to advertisers. If the data the provider gathers from your home network is full of confusing, random online activity, in addition to your actual web-browsing history, it’s harder to make any inferences about you based on your data output.

Steven Smith, a senior staff member at MIT’s Lincoln Laboratory, cooked up a data-pollution program for his own family last month, after the Senate passed the privacy bill that would later become law. He uploaded the code for the project, which is unaffiliated with his employer, to GitHub. For a week and a half, his program has been pumping fake web traffic out of his home network, in an effort to mask his family’s real web activity.

Smith’s algorithm begins by stringing together a few words from an open-source dictionary and googling them. It grabs the resulting links in a random order, and saves them in a database for later use. The program also follows the Google results, capturing the links that appear on those pages, and then follows those links, and so on. The table of URLs grows quickly, but it’s capped around 100,000, to keep the computer’s memory from overloading.

A program called PhantomJS, which mimics a person using a web browser, regularly downloads data from the URLs that have been captured—minus the images, to avoid downloading unsavory or infected files. Smith set his program to download a page about every five seconds. Over the course of a month, that’s enough data to max out the 50 gigabytes of data that Smith buys from his internet service provider.

Although it relies heavily on randomness, the program tries to emulate user behavior in certain ways. Smith programmed it to visit no more than 100 domains a day, and to occasionally visit a URL twice—simulating a user reload. The pace of browsing slows down at night, and speeds up again during the day. And as PhantomJS roams around the internet, it changes its camouflage by switching between different user agents, which are identifiers that announce what type of browser a visitor is using. By doing so, Smith hopes to create the illusion of multiple users browsing on his network using different devices and software. “I’m basically using common sense and intuition,” Smith said.

Tuesday, April 11, 2017

Chasing Perpetual Motion in the Gig Economy


NYTimes |  The promises Silicon Valley makes about the gig economy can sound appealing. Its digital technology lets workers become entrepreneurs, we are told, freed from the drudgery of 9-to-5 jobs. Students, parents and others can make extra cash in their free time while pursuing their passions, maybe starting a thriving small business.

In reality, there is no utopia at companies like Uber, Lyft, Instacart and Handy, whose workers are often manipulated into working long hours for low wages while continually chasing the next ride or task. These companies have discovered they can harness advances in software and behavioral sciences to old-fashioned worker exploitation, according to a growing body of evidence, because employees lack the basic protections of American law.

A recent story in The Times by Noam Scheiber vividly described how Uber and other companies use tactics developed by the video game industry to keep drivers on the road when they would prefer to call it a day, raising company revenue while lowering drivers’ per-hour earnings. One Florida driver told The Times he earned less than $20,000 a year before expenses like gas and maintenance. In New York City, an Uber drivers group affiliated with the machinists union said that more than one-fifth of its members earn less than $30,000 before expenses.

Gig economy workers tend to be poorer and are more likely to be minorities than the population at large, a survey by the Pew Research Center found last year. Compared with the population as a whole, almost twice as many of them earned under $30,000 a year, and 40 percent were black or Hispanic, compared with 27 percent of all American adults. Most said the money they earned from online platforms was essential or important to their families.

Since workers for most gig economy companies are considered independent contractors, not employees, they do not qualify for basic protections like overtime pay and minimum wages. This helped Uber, which started in 2009, quickly grow to 700,000 active drivers in the United States, nearly three times the number of taxi drivers and chauffeurs in the country in 2014.

Student Debt Bubble Ruins Lives While Sucking Life Out of the Economy


nakedcapitalism |  The Financial Times has a generally good update on the state of the student debt bubble in the US. The article interesting not just for what it says but also for what goes unsaid. I’ll recap its main points with additional commentary. Note that many of the underlying issues will be familiar to NC readers, but it is nevertheless useful to stay current.
Access to student debt keeps inflating the cost of education. This may seem obvious but it can’t be said often enough. Per the article:
While the headline consumer price index is 2.7 per cent, between 2016 and 2017 published tuition and fee prices rose by 9 per cent at four-year state institutions, and 13 per cent at posher private colleges.
It wasn’t all that long ago that the cost of a year at an Ivy League college was $50,000 per year. Author Rana Foroohar was warned by high school counselors that the price tag for her daughter to attend one of them or a liberal arts college would be around $72,000 a year.
Spending increases are not going into improving education. As we’ve pointed out before, adjuncts are being squeezed into penury while the adminisphere bloat continues, as MBAs have swarmed in like locusts. Another waste of money is over-investment in plant. Again from the story:
A large chunk of the hike was due to schools hiring more administrators (who “brand build” and recruit wealthy donors) and building expensive facilities designed to lure wealthier, full-fee-paying students. This not only leads to excess borrowing on the part of universities — a number of them are caught up in dicey bond deals like the sort that sunk the city of Detroit — but higher tuition for students.
And there is a secondary effect. As education cost rise, students are becoming more mercenary in their choices, and in not a good way. This is another manifestation of what John Kay calls obliquity: in a complex system, trying to map a direct path will fail because it’s impossible to map the terrain well enough to identify one. Thus naive direct paths like “maximize shareholder value” do less well at achieving that objective than richer, more complicated goals.
The higher ed version of this dynamic is “I am going to school to get a well-paid job,” with the following results, per an FT reader:
BazHurl
After a career in equities, having graduated the Dreamy Spires with significant not silly debt, I had the pleasure of interviewing lots of the best and brightest graduates from European and US universities. Finance was attracting far more than its deserved share of the intellectual pie in the 90’s and Noughties in particular; so at times it was distressing to meet outrageously talented young men and women wanting to genuflect at the altar of the $, instead of building the Flux Capacitor. But the greater take-away was how mediocre and homogenous most of the grads were becoming. It seemed the longer they had studied and deferred entry into the Great Unwashed, the more difficult it was to get anything original or genuine from them. Piles and piles of CV’s of the same guys and gals: straight A’s since emerging into the world, polyglots, founders of every financial and charitable university society you could dream up … but could they honestly answer a simple question like “Fidelity or Blackrock – Who has robbed widows and orphans of more?”. Hardly. In short, few of them qualified as the sort of person you would willingly invite to sit next to you for fifteen hours a day, doing battle with pesky clients and triumphing over greedy competitors. All these once-promising 22 to 24 year old’s had somehow been hard-wired by the same robot and worse, all were entitled. Probably fair enough as they had excelled at everything that had been asked of them up until meeting my colleagues and I on the trading floors. Contrast this to the very different experience of meeting visiting sixth formers from a variety of secondary schools that used to tour the bank and with some gentle prodding, light up the Q&A sessions at tour’s end, fizzing with enthusiasm and desire. Now THESE kids I would hire ahead of the blue-chipped grads, most days. They were raw material that could be worked with and shaped into weapons. It was patently clear that University was no longer adding the expected value to these candidates and in fact was becoming quite the reverse. 
And for many grads, an investment in higher education now has a negative return on equity. A 2014 Economist article points out that the widely cited studies of whether college is worth the cost or not omit key factors that skew their results in favor of paying for higher education.

Fuck Robert Kagan And Would He Please Now Just Go Quietly Burn In Hell?

politico | The Washington Post on Friday announced it will no longer endorse presidential candidates, breaking decades of tradition in a...