nakedcapitalism | It is now clear from video evidence that the WHR report was fabricated without input from the professional intelligence community [emphasis mine (GP)].
The press reported on April 4 that a nerve agent attack had occurred
in Khan Shaykhun, Syria during the early morning hours locally on that
day. On April 7, The United States carried out a cruise missile attack
on Syria ordered by President Trump. It now appears that the president ordered this cruise missile attack without any valid intelligence to support it [emphasis mine (GP)].
In order to cover up the lack of intelligence to supporting the president’s action, the National Security Council produced a fraudulent intelligence report on April 11 four days later
[emphasis mine (GP)]. The individual responsible for this report was
Lieutenant General H. R. McMaster, the National Security Advisor. The
McMaster report is completely undermined by a significant body of video
evidence taken after the alleged sarin attack and before the US cruise
missile attack that unambiguously shows the claims in the WHR could not
possibly be true. This cannot be explained as a simple error.
The National Security Council Intelligence Report clearly refers to
evidence that it claims was obtained from commercial and open sources
shortly after the alleged nerve agent attack (on April 5 and April 6).
If such a collection of commercial evidence was done, it would have
surely found the videos contained herein.
This unambiguously indicates a dedicated attempt to manufacture a false claim that intelligence actually supported the president’s decision to attack Syria, and of far more importance, to accuse Russia of being either complicit or a participant in an alleged atrocity [emphasis mine (GP)].
The attack on the Syrian government threatened to undermine the
relationship between Russia and the United States. Cooperation between
Russia and the United States is critical to the defeat of the Islamic
State. In addition, the false accusation that Russia knowingly engaged
in an atrocity raises the most serious questions about a willful attempt
to do damage relations with Russia for domestic political purposes.
We repeat here a quote from the WHR:
An open source video also shows where we believe the
chemical munition landed—not on a facility filled with weapons, but in
the middle of a street in the northern section of Khan Shaykhun[Emphasis
Added]. Commercial satellite imagery of that site from April 6, after
the allegation, shows a crater in the road that corresponds to the open
source video.
The data provided in these videos make it clear that the WHR made no
good-faith attempt to collect data that could have supported its
“confident assessment.” that the Syrian government executed a sarin
attack as indicated by the location and characteristics of the crater.
This very disturbing event is not a unique situation.
President George W. Bush argued that he was misinformed about
unambiguous evidence that Iraq was hiding a substantial store of weapons
of mass destruction. This false intelligence led to a US attack on Iraq
that started a process that ultimately led to the political
disintegration in the Middle East, which through a series of unpredicted
events then led to the rise of the Islamic State [emphasis mine (GP)].
On August 30, 2013, the White House produced a similarly false
report about the nerve agent attack on August 21, 2013 in Damascus
[emphasis mine (GP)]. This report also contained numerous intelligence
claims that could not be true. An interview with President Obama
published in The Atlantic in April 2016 indicates that Obama was
initially told that there was solid intelligence that the Syrian
government was responsible for the nerve agent attack of August 21, 2013
in Ghouta, Syria. Obama reported that he was later told that the
intelligence was not solid by the then Director of National
Intelligence, James Clapper.
Equally serious questions are raised about the abuse of intelligence
findings by the incident in 2013. Questions that have not been answered
about that incident is how the White House produced a false intelligence
report with false claims that could obviously be identified by experts
outside the White House and without access to classified information.
There also needs to be an explanation of why this 2013 false report was
not corrected. Secretary of State John Kerry emphatically testified
before the Senate Foreign Relations Committee repeating information in
this so-called un-equivocating report.
On August 30, 2013 Secretary of State Kerry made the following statement from the Treaty Room in the State Department:
Our intelligence community has carefully reviewed and re-reviewed information regarding this attack
[Emphasis added], and I will tell you it has done so more than mindful
of the Iraq experience. We will not repeat that moment. Accordingly, we
have taken unprecedented steps to declassify and make facts available to
people who can judge for themselves.
It is now obvious that this incident produced by the WHR, while just
as serious in terms of the dangers it created for US security, was a clumsy and outright fabrication of a report that was certainly not supported by the intelligence community [emphasis mine (GP)].
In this case, the president, supported by his staff, made a decision
to launch 59 cruise missiles at a Syrian air base. This action was
accompanied by serious risks of creating a confrontation with Russia,
and also undermining cooperative efforts to win the war against the
Islamic State.
I therefore conclude that there needs to be a comprehensive
investigation of these events that have either misled people in the
White House White House, or worse yet, been perpetrated by people to
protect themselves from domestic political criticisms for uninformed and
ill-considered actions.
Sincerely yours, Theodore A. Postol
Professor Emeritus of Science,
Technology, and National Security Policy
Massachusetts Institute of Technology
Email: postol@mit.edu
medialens | One of the longstanding functions of the 'mainstream' media is to
channel government ideology about who are 'the Good Guys' - that's 'us'
and our allies - and who are the 'Bad Guys' – 'Putin's Russia',
'Saddam's Iraq', 'Chavez's Venezuela', 'Gaddafi's Libya' (until rehabilitated for a while by Blair) and North Korea.
Consider a recent BBC News at Ten segment on the US, China and North Korea that began with presenter Huw Edwards saying:
'President Trump has said the United States will "solve" the threat
posed by North Korea's nuclear programme. In an interview with the
Financial Times, the president said the US would act alone if China
would not intervene. He made his comments ahead of a visit to the US by
the Chinese president later this week. Our North America editor, Jon
Sopel, is at the White House.
'And, Jon, what does this tell us then about President Trump's approach to this upcoming visit?'
Jon Sopel: 'Well, Huw, for all the talk of surveillance and phone
tapping and wire taps and Russia, this is the major strategic national
security issue, at least as far as this White House is concerned. What
to do about North Korea and their growing ability, it seems, to launch a
nuclear missile that could hit the west coast of America.' (April 3,
2017; kindly captured and uploaded to YouTube for us by Steve Ennever)
As we will see, far from being responsible, 'impartial' journalism,
this was blatant propaganda, depicting North Korea as a serious threat
to the United States, capable of hitting California with a nuclear
missile.
Consider, by contrast, a careful analysis by the US writer Adam Johnson in a piece for Fairness and Accuracy In Reporting last month.
Johnson noted that:
'Tensions between the United States and North Korea are making their way back into the news after a series of missile tests and presidential Twitterthreats. Meanwhile, a conservative think tank—previously thought all but dead—has
seen a resurgence in relevancy, thanks to its alignment with Donald
Trump. The result is that the Heritage Foundation has provided much of
the narrative backbone for North Korean/US relations in the age of
Trump, making the rounds in dozens of media articles and television
appearances.'
Johnson continued:
'One key feature of reports on North Korea's nuclear weapons program
is the Hypothetical Scary Nuke Map that shows an entirely hypothetical,
not-yet-proven-to-have-been-built intercontinental ballistic missile
hitting the US mainland.'
Two types of missile, known as KN-14 and KN-08, are depicted in media reports as capable of reaching the United States.
Johnson highlighted the crucial fact that:
'These missiles have not been tested by North Korea'.
In other words, the media have been publishing 'misleading' maps that
'buried the fact that the range indicating the US could be nuked had
not, in fact, been demonstrated.'
essence | For the first time ever, ESSENCE honors the women who are blazing
trails for equal rights and inclusion for Black people in America.
The cover features a host of dynamic women,
such as writer/producer Shonda Rhimes, veteran journalist Joy-Ann Reid,
Women’s March co-chairs Tamika Mallory, Linda Sarsour and Carmen Perez.
Plus, appearances from Women’s March organizer Janaye Ingram, political
commentator Angela Rye, Circle of Mothers founder Sybrina Fulton,
author/blogger Luvvie Ajayi and social activist April Reign.
#BlackLivesMatter cofounder Opal Tometi and educator/activist Brittany
Packnett are also featured.
When we say Black women will save the world, we’re being literal.
On the following pages, ESSENCE recognizes
88 more socially conscious change makers. By their example they empower
all of us to take action.
oftwominds | The Left is morally and fiscally bankrupt, devoid of coherent solutions, and corrupted by
its embrace of the Corporatocracy.
History often surprises us with unexpected ironies. For the past century,
the slide to fascism could be found on the Right (conservative, populist,
nationalist political parties).
But now it's the Left that's descending into fascism, and few seem to even
notice this remarkable development. By Left I mean socialist-leaning, progressive,
internationalist/globalist political parties.
What is fascism? There is no one tidy definition, but it has three essential
elements:
1) State and corporate elites govern society and the economy as one unified class.
2) This status quo (i.e. The Establishment) seeks to impose a conformity of
values and opinion that support the dominant narratives of the status quo via
the mass (corporate) media and the state-controlled educational system.
3) Dissent from any quarter is suppressed via mass-media ridicule, the judicial crushing and
silencing of whistleblowers, and all the other powers of the central state: rendition,
extra-legal imprisonment, political gulags (in our era, disguised as drug-war
gulags), character assassination, murder by drone, impoverishing dissenters via
firings and blacklists, and on and on.
The Left is now the political wing of the corporatocracy.
As Phillipe Poutou, a Ford factory mechanic from Bordeaux who is the sole
working-class candidate in France's presidential election, so deliciously
pointed out, the Left and Right status quo candidates are indistinguishable in
terms of their self-serving corruption and elitism:
Mechanic-Candidate Bursts French Political Elite's Bubble (NY Times)
Here in the U.S., the self-serving Democratic Party elites operate within the
Corporatocracy structure, in which the state protects and funds private-sector cartels;
the two intertwined and self-reinforcing elites manifest and enforce state policies.
He concluded that the US government's report does not provide any
"concrete" evidence that Assad was responsible, adding it was more
likely that the attack was perpetrated by players on the ground.
Postol
said: "I have reviewed the [White House's] document carefully, and I
believe it can be shown, without doubt, that the document does not
provide any evidence whatsoever that the US government has concrete
knowledge that the government of Syria was the source of the chemical
attack in Khan Sheikhoun, Syria at roughly 6am to 7am on 4 April, 2017.
"In
fact, a main piece of evidence that is cited in the document point to
an attack that was executed by individuals on the ground, not from an
aircraft, on the morning of 4 April.
"This conclusion is based on
an assumption made by the White House when it cited the source of the
sarin release and the photographs of that source. My own assessment is
that the source was very likely tampered with or staged, so no serious
conclusion could be made from the photographs cited by the White House."
The image Postol refers to is that of a crater containing a shell inside, which is said to have contained the sarin gas.
His
analysis of the shell suggests that it could not have been dropped from
an airplane as the damage of the casing is inconsistent from an aerial
explosion. Instead, Postol said it was more likely that an explosive
charge was laid upon the shell containing sarin, before being detonated.
strategic culture |Donald
Trump has reversed his national-security policies 180 degrees, and is
now focusing it around conquering Russia, instead of around reducing the
threat from jihadists. The reason for this drastic change is in order
for him to be able to win the support of the U.S. aristocracy, who had overwhelmingly favored Hillary Clinton during the Presidential contest,
and who (and whose ‘news’media) have been trying to portray Trump as
«Putin’s fool» or even as «Putin’s Manchurian candidate» and thus as an
illegitimate President or even traitor who is beholden to 'America’s
enemy’ (which to them is Russia) for Trump’s having won the U.S.
Presidency — which they had tried to block from happening.
Actually, even Republican billionaires generally preferred Hillary Clinton over Donald Trump —
and almost all of them hate Putin, who insists upon Russia’s
independence, which the U.S. aristocracy call by all sorts of bad names,
so that any American who even so much as merely questions the
characterization of Russia as being an ‘enemy’ nation, is considered to
be ‘unAmerican’, like in the days of communism and Joseph R. McCarthy,
as if communism and the U.S.S.R. and its Warsaw Pact that mirrored
America’s NATO military alliance, even existed today, which they
obviously don’t. So: the U.S. Establishment’s portrayal of current
international reality is so bizarre, it can be believed only by fools,
but enough such fools exist so as to enable that Establishment to do
horrific things, such as the 2003 invasion of Iraq, and the 2011
invasion of Libya, just to name two examples, which got rid of two
national leaders who were friendly toward Russia.)
After
Trump ditched his National Security Advisor Mike Flynn (whom Obama had
fired for not being sufficiently anti-Russian, but Trump then hired) and
replaced him with the rabidly anti-Russian H.R. McMaster (whom the
aristocracy’s people were recommending to Trump), Trump was expecting to
be relieved from the aristocracy’s intensifying campaign to impeach him
or otherwise replace him and make the President his clearly
pro-aristocratic Vice President Mike Pence, but the overthrow-Trump
campaign continued even after McMaster became installed replacing Flynn.
Then, perhaps because the replacement of Flynn by McMaster failed to
satisfy the aristocracy, Trump additionally ousted Stephen Bannon and
simultaneously bombed Syrian government forces, and now the campaign to
overthrow Trump seems finally to have subsided, at least a bit, at least
for now.
theatlantic | “My prettiest contribution to my culture,” the writer Kurt Vonnegut mused in his 1981 autobiography Palm Sunday, “was a master’s thesis in anthropology which was rejected by the University of Chicago a long time ago.”
By
then, he said, the thesis had long since vanished. (“It was rejected
because it was so simple and looked like too much fun,” Vonnegut
explained.) But he continued to carry the idea with him for many years
after that, and spoke publicly about it more than once. It was,
essentially, this: “There is no reason why the simple shapes of stories
can’t be fed into computers. They are beautiful shapes.”
That explanation comes from a lecture he gave, and which you can still watch on YouTube,
that involves Vonnegut mapping the narrative arc of popular storylines
along a simple graph. The X-axis represents the chronology of the story,
from beginning to end, while the Y-axis represents the experience of
the protagonist, on a spectrum of ill fortune to good fortune. “This is
an exercise in relativity, really,” Vonnegut explains. “The shape of the
curve is what matters.”
The
most interesting shape to him, it turned out, was the one that
reflected the tale of Cinderella, of all stories. Vonnegut visualizes
its arc as a staircase-like climb in good fortune representing the
arrival of Cinderella’s fairy godmother, leading all the way to a high
point at the ball, followed by a sudden plummet back to ill fortune at
the stroke of midnight. Before too long, though, the Cinderella graph is
marked by a sharp leap back to good fortune, what with the whole
business of (spoiler alert) the glass slipper fitting and the happily
ever after.
This may not seem like anything special, Vonnegut says—his actual words
are, “it certainly looks like trash”—until he notices another well known
story that shares this shape. “Those steps at the beginning look like
the creation myth of virtually every society on earth. And then I saw
that the stroke of midnight looked exactly like the unique creation myth
in the Old Testament.” Cinderella’s curfew was, if you look at it on
Vonnegut’s chart, a mirror-image downfall to Adam and Eve’s ejection
from the Garden of Eden. “And then I saw the rise to bliss at the end
was identical with the expectation of redemption as expressed in
primitive Christianity. The tales were identical.”
Scientists have struggled to understand dolphin vocalizations, but new
computer tools to both track dolphins and decode their complex
vocalizations are now emerging. Dr. Denise Herzing has been studying
Atlantic spotted dolphins, Stenella frontalis, in the Bahamas for over
three decades. Her video and acoustic database encompasses a myriad of
complex vocalizations and dolphin behavior. Dr. Thad Starner works on
mining this dataset and decoding dolphin sounds, and has created a
wearable underwater computer, CHAT (Cetacean Hearing and Telemetry), to
help establish a bridge for communication between humans and dolphins.
Starner and Herzing will present this cutting-edge work and recent
results, including perspectives on the challenges of studying this
aquatic society, and decoding their communication signals using the
latest technology.
qz | The possibility of talking to animals has tickled popular imaginations for years, and with good reason. Who wouldn’t want to live in a Dr. Dolittle world where we could understand what our pets and animal neighbors are saying?
Animal cognition researchers have also been fascinated by the topic.
Their work typically focuses on isolating animal communication to see
if language is uniquely human, or if it could have evolved in other
species as well. One of their top candidates is an animal known to
communicate with particularly high intelligence: dolphins.
Dolphins—like many animals including monkeys, birds, cats, and dogs—clearly do relay messages to one another. They emit sounds (paywall) in three broad categories: clicks, whistles, and more complex chirps used for echolocation
(paywall), a technique they use to track prey and other objects by
interpreting ricocheting sound waves. Researchers believe these sounds
can help dolphins communicate: Whistles can serve as unique identifiers, similar to names, and can alert the pod to sources of food or danger.
Communication is most certainly a part of what helps these animals
live in social pods. But proving that dolphins use language—the way that
you’re reading this article, or how you might talk to your friends
about it later—is a whole different kettle of fish.
nature | Still in print, On Growth and Form was more than a decade in
the planning. Thompson would regularly tell colleagues and students — he
taught at what is now the University of Dundee, hence the local media
interest — about his big idea before he wrote it all down. In part, he
was reacting against one of the biggest ideas in scientific history.
Thompson used his book to argue that Charles Darwin’s natural selection
was not the only major influence on the origin and development of
species and their unique forms: “In general no organic forms exist save
such as are in conformity with physical and mathematical laws.”
Biological response to physical forces remains a live topic for research. In a research paper,
for example, researchers report how physical stresses generated at
defects in the structures of epithelial cell layers cause excess cells
to be extruded.
In a separate online publication (K. Kawaguchi et al. Nature http://dx.doi.org/10.1038/nature22321; 2017),
other scientists show that topological defects have a role in cell
dynamics, as a result of the balance of forces. In high-density cultures
of neural progenitor cells, the direction in which cells travel around
defects affects whether cells become more densely packed (leading to
pile-ups) or spread out (leading to a cellular fast-lane where travel
speeds up).
A Technology Feature
investigates in depth the innovative methods developed to detect and
measure forces generated by cells and proteins. Such techniques help
researchers to understand how force is translated into biological
function.
Thompson’s influence also flourishes in other active areas of interdisciplinary research. A research paper offers a mathematical explanation for the colour changes that appear in the scales of ocellated lizards (Timon lepidus)
during development (also featured on this week’s cover). It suggests
that the patterns are generated by a system called a hexagonal cellular
automaton, and that such a discrete system can emerge from the
continuous reaction-diffusion framework developed by mathematician Alan
Turing to explain the distinctive patterning on animals, such as spots
and stripes. (Some of the research findings are explored in detail in the News and Views section.) To complete the link to Thompson, Turing cited On Growth and Form in his original work on reaction-diffusion theory in living systems.
wired |Cells are basically tiny
computers: They send and receive inputs and output accordingly. If you
chug a Frappuccino, your blood sugar spikes, and your pancreatic cells
get the message. Output: more insulin.
But cellular computing is more than just a convenient metaphor. In
the last couple of decades, biologists have been working to hack the
cells’ algorithm in an effort to control their processes. They’ve
upended nature’s role as life’s software engineer, incrementally editing
a cell’s algorithm—its DNA—over generations. In a paper published today
in Nature Biotechnology,
researchers programmed human cells to obey 109 different sets of
logical instructions. With further development, this could lead to cells
capable of responding to specific directions or environmental cues in
order to fight disease or manufacture important chemicals.
Their cells execute these instructions by using proteins called DNA
recombinases, which cut, reshuffle, or fuse segments of DNA. These
proteins recognize and target specific positions on a DNA strand—and the
researchers figured out how to trigger their activity. Depending on
whether the recombinase gets triggered, the cell may or may not produce
the protein encoded in the DNA segment.
A cell could be programmed, for example, with a so-called NOT logic
gate. This is one of the simplest logic instructions: Do NOT do
something whenever you receive the trigger. This study’s authors used
this function to create cells that light up on command. Biologist Wilson Wong of Boston University, who led the research, refers to these engineered cells as “genetic circuits.”
MIT | MIT biological engineers have created a programming language that allows them to rapidly design complex, DNA-encoded circuits that give new functions to living cells.
Using this language, anyone can write a program for the function they want, such as detecting and responding to certain environmental conditions. They can then generate a DNA sequence that will achieve it.
“It is literally a programming language for bacteria,” says Christopher Voigt, an MIT professor of biological engineering. “You use a text-based language, just like you’re programming a computer. Then you take that text and you compile it and it turns it into a DNA sequence that you put into the cell, and the circuit runs inside the cell.”
Voigt and colleagues at Boston University and the National Institute of Standards and Technology have used this language, which they describe in the April 1 issue ofScience, to build circuits that can detect up to three inputs and respond in different ways. Future applications for this kind of programming include designing bacterial cells that can produce a cancer drug when they detect a tumor, or creating yeast cells that can halt their own fermentation process if too many toxic byproducts build up.
The researchers plan to make the user design interface available on the Web.
Brain item -- AI processing problem...??
would require AI to have the listener's entire life history stored in its memory to determine proper context....??
Your brain fills gaps in your hearing without you realising
No BD. Not an AI processing problem, just an illustration of the mechanical and necessarily error-prone nature of both language and auditory language processing. It's not a Voight-Kampff test and "Context doesn't require a life history". In fact, with the benefit of big data, and centralized cloud storage and processing of hundreds of thousands of utterances and their associated meanings, the probability of an AI making either the sensory or grammatical error is greatly reduced.
...Here's a no-nonsense AI item:
Turns out AI is not sufficiently stupid to allow PC liberals to shove ridiculous egalitarian concepts down its throat.
AI just looks at the *FACTS* and calls it like it sees it....
Machine learning algorithms are picking up deeply ingrained race and
gender prejudices concealed within the patterns of language use,
scientists say
No BD. Unfortunately, you are still trapped in the realm of language and
language constructs your reality. Your language reflects your tendencies - which are racist - and so what FRANK is reflecting back at you is not the truth, merely the truth about you. Fist tap Big Don.
technologyreview | No one really knows how the most advanced algorithms do what they do. That could be a problem.
In 2015, a research group at Mount Sinai Hospital in New York was
inspired to apply deep learning to the hospital’s vast database of
patient records. This data set features hundreds of variables on
patients, drawn from their test results, doctor visits, and so on. The
resulting program, which the researchers named Deep Patient, was trained
using data from about 700,000 individuals, and when tested on new
records, it proved incredibly good at predicting disease. Without any
expert instruction, Deep Patient had discovered patterns hidden in the
hospital data that seemed to indicate when people were on the way to a
wide range of ailments, including cancer of the liver. There are a lot
of methods that are “pretty good” at predicting disease from a patient’s
records, says Joel Dudley, who leads the Mount Sinai team. But, he
adds, “this was just way better.”
At the same time, Deep Patient is a bit puzzling. It appears to
anticipate the onset of psychiatric disorders like schizophrenia
surprisingly well. But since schizophrenia is notoriously difficult for
physicians to predict, Dudley wondered how this was possible. He still
doesn’t know. The new tool offers no clue as to how it does this. If
something like Deep Patient is actually going to help doctors, it will
ideally give them the rationale for its prediction, to reassure them
that it is accurate and to justify, say, a change in the drugs someone
is being prescribed. “We can build these models,” Dudley says ruefully,
“but we don’t know how they work.”
Artificial intelligence hasn’t
always been this way. From the outset, there were two schools of thought
regarding how understandable, or explainable, AI ought to be. Many
thought it made the most sense to build machines that reasoned according
to rules and logic, making their inner workings transparent to anyone
who cared to examine some code. Others felt that intelligence would more
easily emerge if machines took inspiration from biology, and learned by
observing and experiencing. This meant turning computer programming on
its head. Instead of a programmer writing the commands to solve a
problem, the program generates its own algorithm based on example data
and a desired output. The machine-learning techniques that would later
evolve into today’s most powerful AI systems followed the latter path:
the machine essentially programs itself.
At first this approach
was of limited practical use, and in the 1960s and ’70s it remained
largely confined to the fringes of the field. Then the computerization
of many industries and the emergence of large data sets renewed
interest. That inspired the development of more powerful
machine-learning techniques, especially new versions of one known as the
artificial neural network. By the 1990s, neural networks could
automatically digitize handwritten characters.
But
it was not until the start of this decade, after several clever tweaks
and refinements, that very large—or “deep”—neural networks demonstrated
dramatic improvements in automated perception. Deep learning is
responsible for today’s explosion of AI. It has given computers
extraordinary powers, like the ability to recognize spoken words almost
as well as a person could, a skill too complex to code into the machine
by hand. Deep learning has transformed computer vision and dramatically
improved machine translation. It is now being used to guide all sorts of
key decisions in medicine, finance, manufacturing—and beyond.
theatlantic | While most theologians aren’t paying it much attention, some
technologists are convinced that artificial intelligence is on an
inevitable path toward autonomy. How far away this may be depends on
whom you ask, but the trajectory raises some fundamental questions for
Christianity—as well as religion broadly conceived, though for this
article I’m going to stick to the faith tradition I know best. In fact,
AI may be the greatest threat to Christian theology since Charles
Darwin’s On the Origin of Species.
theatlantic | As machines advance and as programs learn to do things that were once
only accomplished by people, what will it mean to be human?
Over time, artificial intelligence will likely prove that carving out any realm of behavior as unique to humans—like language,
a classic example—is ultimately wrong. If Tinsel and Beau were still
around today, they might be powered by a digital assistant, after all.
In fact, it’d be a littler weird if they weren’t, wouldn’t it? Consider
the fact that Disney is exploring the use of interactive humanoid robots
at its theme parks, according to a patent filing last week.
Technological
history proves that what seems novel today can quickly become the norm,
until one day you look back surprised at the memory of a job done by a
human rather than a machine. By teaching machines what we know, we are
training them to be like us. This is good for humanity in so many ways.
But we may still occasionally long for the days before machines could
imagine the future alongside us.
WaPo | On his last night in office, President Dwight D. Eisenhower delivered a powerful farewell speech
to the nation — words so important that he’d spent a year and a half
preparing them. “Ike” famously warned the nation to “guard against the
acquisition of unwarranted influence, whether sought or unsought, by the
military-industrial complex. The potential for the disastrous rise of
misplaced power exists and will persist.”
Much of Eisenhower’s
speech could form part of the mission statement of WikiLeaks today. We
publish truths regarding overreaches and abuses conducted in secret by
the powerful.
Our most recent disclosures
describe the CIA’s multibillion-dollar cyberwarfare program, in which
the agency created dangerous cyberweapons, targeted private companies’
consumer products and then lost control of its cyber-arsenal. Our
source(s) said they hoped to initiate a principled public debate about
the “security, creation, use, proliferation and democratic control of
cyberweapons.”
The truths we publish are inconvenient for those who seek to avoid
one of the magnificent hallmarks of American life — public debate.
Governments assert that WikiLeaks’ reporting harms security. Some claim
that publishing facts about military and national security malfeasance
is a greater problem than the malfeasance itself. Yet, as Eisenhower
emphasized, “Only an alert and knowledgeable citizenry can compel the
proper meshing of the huge industrial and military machinery of defense
with our peaceful methods and goals, so that security and liberty may
prosper together.”
Quite simply, our motive is identical to that
claimed by the New York Times and The Post — to publish newsworthy
content. Consistent with the U.S. Constitution, we publish material that
we can confirm to be true irrespective of whether sources came by that
truth legally or have the right to release it to the media. And we
strive to mitigate legitimate concerns, for example by using redaction
to protect the identities of at-risk intelligence agents.
blockchain, NOUN /ˈblɒktʃeɪn/ A digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly.
From en.oxforddictionaries.com/definition/blockchain
A mysterious white paper (Nakamoto, Satoshi, 2008, “Bitcoin: A Peer-to-Peer Electronic Cash System”)
introduced the Bitcoin blockchain, a combination of existing
technologies that ensures the integrity of data without a trusted party.
It consists of a ledger that can’t be changed and a consensus
algorithm—a way for groups to agree. Unlike existing databases in banks
and other institutions, a network of users updates and supports the
blockchain—a system somewhat similar to Wikipedia, which users around
the globe maintain and double-check. The cryptocurrency Bitcoin is the
first use case of the blockchain, but much more seems to be possible.
The Next Generation of the Internet
The first 40 years of the Internet brought e-mail, social media,
mobile applications, online shopping, Big Data, Open Data, cloud
computing, and the Internet of Things. Information technology is at the
heart of everything today—good and bad. Despite advances in privacy,
security, and inclusion, one thing is still missing from the Internet:
Trust. Enter the blockchain.
The Blockchain and Us: The Project
When the Wright brothers invented the airplane in 1903, it was hard
to imagine there would be over 500,000 people traveling in the air at
any point in time today. In 2008, Satoshi Nakamoto invented Bitcoin and
the blockchain. For the first time in history, his invention made it
possible to send money around the globe without banks, governments or
any other intermediaries. Satoshi is a mystery character, and just like
the Wright brothers, he solved an unsolvable problem. The concept of the
blockchain isn’t very intuitive. But still, many people believe it is a
game changer. Despite its mysterious beginnings, the blockchain might
be the airplane of our time.
Economist and filmmaker Manuel Stagars portrays this exciting technology in interviews
with software developers, cryptologists, researchers, entrepreneurs,
consultants, VCs, authors, politicians, and futurists from the United
States, Canada, Switzerland, the UK, and Australia.
How can the blockchain benefit the economies of nations? How will it change society? What does this mean for each of us? The Blockchain and Us is
no explainer video of the technology. It gives a view on the topic far
from hype, makes it accessible and starts a conversation. For a deep
dive, see all full-length interviews from the film here.
biorxiv | Despite the growth of Open Access, illegally circumventing paywalls to
access scholarly publications is becoming a more mainstream phenomenon.
The web service Sci-Hub is amongst the biggest facilitators of this,
offering free access to around 62 million publications. So far it is not
well studied how and why its users are accessing publications through
Sci-Hub. By utilizing the recently released corpus of Sci-Hub and
comparing it to the data of ~28 million downloads done through the
service, this study tries to address some of these questions. The
comparative analysis shows that both the usage and complete corpus is
largely made up of recently published articles, with users
disproportionately favoring newer articles and 35% of downloaded
articles being published after 2013. These results hint that embargo
periods before publications become Open Access are frequently
circumnavigated using Guerilla Open Access approaches like Sci-Hub. On a
journal level, the downloads show a bias towards some scholarly
disciplines, especially Chemistry, suggesting increased barriers to
access for these. Comparing the use and corpus on a publisher level, it
becomes clear that only 11% of publishers are highly requested in
comparison to the baseline frequency, while 45% of all publishers are
significantly less accessed than expected. Despite this, the oligopoly
of publishers is even more remarkable on the level of content
consumption, with 80% of all downloads being published through only 9
publishers. All of this suggests that Sci-Hub is used by different
populations and for a number of different reasons and that there is
still a lack of access to the published scientific record. A further
analysis of these openly available data resources will undoubtedly be
valuable for the investigation of academic publishing.
theatlantic | The basic idea is simple.
Internet providers want to know as much as possible about your browsing
habits in order to sell a detailed profile of you to advertisers. If the
data the provider gathers from your home network is full of confusing,
random online activity, in addition to your actual web-browsing history,
it’s harder to make any inferences about you based on your data output.
Steven
Smith, a senior staff member at MIT’s Lincoln Laboratory, cooked up a
data-pollution program for his own family last month, after the Senate
passed the privacy bill that would later become law. He uploaded the
code for the project, which is unaffiliated with his employer, to GitHub.
For a week and a half, his program has been pumping fake web traffic
out of his home network, in an effort to mask his family’s real web
activity.
Smith’s algorithm begins by stringing together
a few words from an open-source dictionary and googling them. It grabs
the resulting links in a random order, and saves them in a database for
later use. The program also follows the Google results, capturing the
links that appear on those pages, and then follows those links, and so
on. The table of URLs grows quickly, but it’s capped around 100,000, to
keep the computer’s memory from overloading.
A program called PhantomJS, which mimics a person using a web browser, regularly downloads data from the URLs that have been
captured—minus the images, to avoid downloading unsavory or infected
files. Smith set his program to download a page about every five
seconds. Over the course of a month, that’s enough data to max out the
50 gigabytes of data that Smith buys from his internet service provider.
Although
it relies heavily on randomness, the program tries to emulate user
behavior in certain ways. Smith programmed it to visit no more than 100
domains a day, and to occasionally visit a URL twice—simulating a user
reload. The pace of browsing slows down at night, and speeds up again
during the day. And as PhantomJS roams around the internet, it changes
its camouflage by switching between different user agents, which are
identifiers that announce what type of browser a visitor is using. By
doing so, Smith hopes to create the illusion of multiple users browsing
on his network using different devices and software. “I’m basically
using common sense and intuition,” Smith said.
Rejuvenation Pills
-
No one likes getting old. Everyone would like to be immorbid. Let's be
careful here. Immortal doesnt include youth or return to youth. Immorbid
means you s...
Death of the Author — at the Hands of Cthulhu
-
In 1967, French literary theorist and philosopher Roland Barthes wrote of
“The Death of the Author,” arguing that the meaning of a text is divorced
from au...
9/29 again
-
"On this sacred day of Michaelmas, former President Donald Trump invoked
the heavenly power of St. Michael the Archangel, sharing a powerful prayer
for pro...
Return of the Magi
-
Lately, the Holy Spirit is in the air. Emotional energy is swirling out of
the earth.I can feel it bubbling up, effervescing and evaporating around
us, s...
New Travels
-
Haven’t published on the Blog in quite a while. I at least part have been
immersed in the area of writing books. My focus is on Science Fiction an
Historic...
Covid-19 Preys Upon The Elderly And The Obese
-
sciencemag | This spring, after days of flulike symptoms and fever, a man
arrived at the emergency room at the University of Vermont Medical Center.
He ...