Thursday, August 31, 2017
IoT Extended Sensoria
By CNu at August 31, 2017 0 comments
Labels: Exponential Upside , Minority Report , Noo/Nano/Geno/Thermo , transbiological , What Now?
Wednesday, August 30, 2017
The Weaponization of Artificial Intelligence
perception, conversation, decisionmaking).
Advances in AI are making it possible to cede to machines many tasks long regarded as impossible for machines to perform. Intelligent systems aim to apply AI to a particular problem or domain—the
implication being that the system is programmed or trained to operate within the bounds of a defined knowledge base. Autonomous function is at a system level rather than a component level. The study considered two categories of intelligent systems: those employing autonomy at rest and those employing autonomy in motion. In broad terms, systems incorporating autonomy at rest operate virtually, in software, and include planning and expert advisory systems, whereas systems incorporating autonomy in motion have a presence in the physical world and include robotics and autonomous vehicles.
One of the less well-known ways that autonomy is changing the world is in applications that include data compilation, data analysis, web search, recommendation engines, and forecasting. Given the limitations of human abilities to rapidly process the vast amounts of data available today, autonomous systems are now required to find trends and analyze patterns. There is no need to solve the long-term AI problem of general intelligence in order to build high-value applications that exploit limited-scope autonomous capabilities dedicated to specific purposes. DoD’s nascent Memex program is one of many examples in this category.3
Rapid global market expansion for robotics and other intelligent systems to address consumer and industrial applications is stimulating increasing commercial investment and delivering a diverse array of products. At the same time, autonomy is being embedded in a growing array of software systems to enhance speed and consistency of decision-making, among other benefits. Likewise, governmental entities, motivated by economic development opportunities in addition to security missions and other public sector applications, are investing in related basic and applied research.
Applications include commercial endeavors, such as IBM’s Watson, the use of robotics in ports and
mines worldwide, autonomous vehicles (from autopilot drones to self-driving cars), automated logistics and supply chain management, and many more. Japanese and U.S. companies invested more than $2 billion in autonomous systems in 2014, led by Apple, Facebook, Google, Hitachi, IBM, Intel, LinkedIn, NEC, Yahoo, and Twitter. 4
A vibrant startup ecosystem is spawning advances in response to commercial market opportunities; innovations are occurring globally, as illustrated in Figure 2 (top). Startups are targeting opportunities that drive advances in critical underlying technologies. As illustrated in Figure 2 (bottom), machine learning—both application-specific and general purpose—is of high interest. The market-pull for machine learning stems from a diverse array of applications across an equally diverse spectrum of industries, as illustrated in Figure 3.
By CNu at August 30, 2017 0 comments
Labels: AI , Noo/Nano/Geno/Thermo , transbiological , What Now? , wikileaks wednesday
The Weaponization of Information
Most important from the U.S. perspective, Russian IO techniques, tactics and procedures are developing constantly and rapidly, as continually measuring effectiveness and rapidly evolving techniques are very cheap compared to the costs of any kinetic weapon system—and they could potentially be a lot more effective.
At this point, Russian IO operators use relatively unsophisticated techniques systematically and on a large scale. This relative lack of sophistication leaves them open to detection. For example, existing technology can identify paid troll operations, bots, etc. Another key element of Russian IO strategy is to target audiences with multiple, conflicting narratives to sow seeds of distrust of and doubt about the European Union (EU) as well as national governments. These can also be detected. The current apparent lack of technical sophistication of Russian IO techniques could derive from the fact that, so far, Russian IO has met with minimal resistance. However, if and when target forces start to counter these efforts and/or expose them on a large scale, the Russians are likely to accelerate the improvement of their techniques, leading to a cycle of counter-responses. In other words, an information warfare arms race is likely to ensue.
A Strategy to Counter the Russian Threat
Because the culture and history of each country is unique and because the success of any IO defense strategy must be tailored to local institutions and populations, the most effective strategies are likely to be those that are developed and managed on a country-by-country basis. An information defense strategy framework for countering Russian IO offensives should be “whole-of-nation” in character. A whole-of-nation approach is a coordinated effort between national government organizations, military, intelligence community, industry, media, research organizations, academia and citizen organized groups. A discreet US Special Operations Force could provide individual country support as well as cross country coordination.
Just as in the physical world, good maps are critical to any IO strategy. In the case of IO, maps show information flows. Information maps must show connectivity in the information environment and help navigate that environment. They exist as computer software and databases. Information cartography for IO is the art of creating, maintaining, and using such maps. An important feature of information maps is that they are constantly changing to reflect the dynamic nature of the information environment. Because they are artificially intelligent computer programs, they can answer questions; provide situation awareness dynamically; and help to plan, monitor, and appropriately modify operations. Information maps are technically possible today and already exist in forms that can be adapted to support the design and execution IO strategy.
As an example, most of the North Atlantic Treaty Organization (NATO) states, as well as several non-NATO partners, are already subject to concentrated Russian IO and they illustrate ongoing Russian IO techniques. Using information cartography, it is possible to map key Russian sources as part of Russian IO operations against a target state. These sources might include:
• Russian and target country think tanks
• foundations (e.g., Russkiy Mir)
• authorities (e.g., Rossotrudnichestvo)
• television stations (e.g. RT)
• pseudo-news agencies and multimedia services (e.g., Sputnik)
• cross-border social and religious groups
• social media and Internet trolls to challenge democratic values, divide Europe, gather domestic support, and create the perception of failed states in the EU’s eastern neighborhood
• Russian regime–controlled companies and organizations
• Russian regime–funded political parties and other organizations in target country in
particular and within the EU in general intended to undermine political cohesion
• Russian propaganda directly targeting journalists, politicians, and individuals in target
countries in particular and the EU in general.
might include:
• national government organizations
• military
• intelligence community
• industry
• media
• independent think tanks
• academia
• citizen-organized groups.
Christopher Paul and Miriam Matthews of the RAND Corporation observe: “Experimental research in psychology suggests that the features of the contemporary Russian propaganda model have the potential to be highly effective.”14 They present a careful and concise analysis of relevant psychological research results that should inform any information defensive strategy. For example, they describe how propaganda can be used to distort perceptions of reality:
• People are poor judges of true versus false information—and they do not necessarily remember that particular information was false.
• Information overload leads people to take shortcuts in determining the trustworthiness of messages.
• Familiar themes or messages can be appealing even if they are false.
• Statements are more likely to be accepted if backed by evidence, even if that evidence is false.
• Peripheral cues—such as an appearance of objectivity—can increase the credibility of propaganda.15
1. Take the population and break it down into communities, based on any number of criteria
(e.g. hobbies, interests, politics, needs, concerns, etc.).
2. Determine who in each community is most susceptible to given types of messages.
3. Determine the social dynamics of communication and flow of ideas within each community.
4. Determine what narratives of different types dominate the conversation in each community.
5. Use all of the above to design and push a narrative likely to succeed in displacing a narrative unfavorable to you with one that is more favorable.
6. Use continual monitoring and interaction to determine the success of your effort and adjust in real time.
These same technologies can be used for defensive purposes. For example, you could use the techniques for breaking down communities described above to detect adversary efforts to push a narrative and examine that narrative’s content. The technology can help researchers focus while searching through massive amounts of social media data.
By CNu at August 30, 2017 0 comments
Labels: American Original , cognitive infiltration , information anarchy , wikileaks wednesday , you used to be the man
Information Warfare, Mass Surveillance, Endless War and Control...,
No more shadows
By CNu at August 30, 2017 0 comments
Labels: Deep State , information anarchy , institutional deconstruction , necropolitics , predatory militarism , unspeakable , wikileaks wednesday
Tuesday, August 29, 2017
Subverting Marijuana Legalization While Facilitating Heroin Exfiltration...,
By CNu at August 29, 2017 0 comments
Labels: .45 , addiction , Deep State , Degenerate , narcoterror , necropolitics , predatory militarism , professional and managerial frauds , The Great Game
With Intersectional "Allies" Like Ed Buck, Who Needs Nazi's for Enemies?
By CNu at August 29, 2017 0 comments
Labels: addiction , Cathedral , cephalopod mollusc , Degenerate , identity politics , Livestock Management , necropolitics , niggerization , parasitic , professional and managerial frauds , Race and Ethnicity
Monday, August 28, 2017
Intersectionalism Suffocating On Its Own Fumes
By CNu at August 28, 2017 0 comments
Labels: Cathedral , identity politics , Livestock Management , partisan , Race and Ethnicity , What Now?
Manipulated Minorities
- They are typically far more aware of their minority identity/status than the majority. That is to say that if the majority is of skin color A and the minority of skin color B, the minority will be much more acutely aware of its skin color.
- They are typically much more driven and active then the majority. This is probably due to their more acute perception of being a minority.
- They are only concerned with single-issue politics, that single-issue being, of course, their minority status.
- Since minorities are often unhappy with their minority-status, they are also often resentful of the majority.
- Since minorities are mostly preoccupied by their minority-status linked issue, they rarely pay attention to the ‘bigger picture’ and that, in turn, means that the political agenda of the minorities typically does not threaten the powers that be.
- Minorities often have a deep-seated inferiority complex towards the putatively more successful majority.
- Minorities often seek to identify other minorities with which they can ally themselves against the majority.
By CNu at August 28, 2017 0 comments
Labels: identity politics , Livestock Management , Naked Emperor , Race and Ethnicity , Small Minority , What IT DO Shawty...
Goy, Bye?
By CNu at August 28, 2017 0 comments
Labels: identity politics , Livestock Management , Oy Vey , Race and Ethnicity
Sunday, August 27, 2017
Pompeo Seeking License to Murder Assange...,
The broader issue is whether our government should be designating any entity as a non-state hostile intelligence agency. I’m not sure of the intended consequences of such a designation but I’m pretty sure it could open WikiLeaks to threats and perhaps even violence. It has the sound of some official finding, which it is not, with some legal meaning to it, which it is not. So while I wouldn’t object to high ranking intelligence officials harshly criticizing WikiLeaks, I’d stay away from faux official designations.
Regardless of whether you like or hate WikiLeaks, Congress singling out a publisher of information using a undefined and made up term like “non-state hostile intelligence service” to potentially stifle First Amendment rights and opening the door to more surveillance of sources should concern all journalists. It’s a shame more members of Congress do not see this obvious danger.
By CNu at August 27, 2017 0 comments
Labels: American Original , Ass Clownery , global system of 1% supremacy , hegemony , Pimphand Strong , Rule of Law , unspeakable
Internet: Subverting Democracy? Nah.., Subverting Status Quo Hegemony? Maybe...,
By CNu at August 27, 2017 0 comments
Labels: governance , hegemony , helplessness , individual sovereignty , information , Noo/Nano/Geno/Thermo , Slice vs. Proprietors , unintended consequences
U.S. Patriot Act FUBARs Uruguay's Marijuana Legalization Effort
Since sales began, the number of registered buyers in Uruguay has more than doubled. As of Aug. 15, more than 12,500 people had enrolled in a system that verifies customers’ identities with fingerprint scanners and allows them to buy up to 40 grams per month (at a price of about $13 for 10 grams, enough for about 15 joints, advocates say). Under the law, only Uruguayan citizens and legal permanent residents are allowed to buy or grow marijuana.
“Demand has been very strong,” Mr. Bachini said. “People are thrilled that they no longer have to go to private homes or venture out into neighborhoods” to get marijuana.
By CNu at August 27, 2017 0 comments
Labels: American Original , Ass Clownery , externalities , Pimphand Strong
Saturday, August 26, 2017
In the Shadows of the American Century: The Rise and Decline of U.S. Global Power
By CNu at August 26, 2017 0 comments
Labels: American Original , Living Memory , narcoterror , necropolitics , unspeakable
Asian Wars and Information Regimes
By CNu at August 26, 2017 0 comments
Labels: Living Memory , narcoterror , necropolitics , unspeakable
The History of the Southeast Asian Drug Trade
By CNu at August 26, 2017 0 comments
Labels: Living Memory , narcoterror , necropolitics , unspeakable
Friday, August 25, 2017
Carbon Based: Carbon Fiber Chassis Electric Vehicle on Goodyear 360's
By CNu at August 25, 2017 0 comments
Labels: Exponential Upside , Noo/Nano/Geno/Thermo , Possibilities
Carbon Based: Nanotubes and Vantablack
By CNu at August 25, 2017 0 comments
Labels: Exponential Upside , Noo/Nano/Geno/Thermo , Possibilities
Fuck Robert Kagan And Would He Please Now Just Go Quietly Burn In Hell?
politico | The Washington Post on Friday announced it will no longer endorse presidential candidates, breaking decades of tradition in a...
-
theatlantic | The Ku Klux Klan, Ronald Reagan, and, for most of its history, the NRA all worked to control guns. The Founding Fathers...
-
Video - John Marco Allegro in an interview with Van Kooten & De Bie. TSMATC | Describing the growth of the mushroom ( boletos), P...
-
dailybeast | Of all the problems in America today, none is both as obvious and as overlooked as the colossal human catastrophe that is our...