pipeline

Loading the BRICKS from my FRONT YARD into a DUMPSTER because my neighbor TODD is a FUCKHEAD

11.jpg

Oregon Senator Ron Wyden has unveiled updated privacy legislation he says will finally bring accountability to corporations that play fast and loose with your private data.

Dubbed the Mind Your Own Business Act, the bill promises consumers the ability to opt out of data collection and sale with a single click. It also demands that corporations be transparent as to how consumer data is collected, used, and who it’s sold to, while imposing harsh fines and prison sentences upon corporations and executives that misuse consumer data and lie about it. […]

“Mark Zuckerberg won’t take Americans’ privacy seriously unless he feels personal consequences,” Wyden said. “A slap on the wrist from the FTC won’t do the job, so under my bill he’d face jail time for lying to the government.”

{ Vice | Continue reading }

art { Nick Knight, Transhuman After All, VMAN, 2013 }

Holihowlsballs and bloody acres!

23.jpg

Do a country’s inhabitants get happier as it gets richer? […]

In Britain, for example, happiness fell sharply during the two world wars. It began to rise again after 1945, peaked in 1950, and then fell gradually, including through the so-called Swinging Sixties, until it reached a nadir around 1980.

America’s national happiness, too, fell during the world wars. It also fell in the 1860s, during and after the country’s civil war. The lowest point of all came in 1975, at the end of a long decline during the Vietnam war, with the fall of Saigon and America’s humiliating defeat.

In Germany and Italy the first world war also caused dips in happiness. By contrast, during the second world war these countries both got happier as the war continued. […]

A one-year increase in longevity has the same effect on national happiness as a 4.3% increase in gdp. […]

it is warfare that causes the biggest drops in happiness. On average it takes a 30% increase in gdp to raise happiness by the amount that a year of war causes it to fall. The upshot appears to be that, while increasing national income is important to happiness, it is not as important as ensuring the population is healthy and avoiding conflict.

{ The Economist | Continue reading }

Dave, although you took very thorough precautions in the pod against my hearing you, I could see your lips mov

Founded in 2004 by Peter Thiel and some fellow PayPal alumni, Palantir cut its teeth working for the Pentagon and the CIA in Afghanistan and Iraq. The company’s engineers and products don’t do any spying themselves; they’re more like a spy’s brain, collecting and analyzing information that’s fed in from the hands, eyes, nose, and ears. The software combs through disparate data sources—financial documents, airline reservations, cellphone records, social media postings—and searches for connections that human analysts might miss. It then presents the linkages in colorful, easy-to-interpret graphics that look like spider webs. U.S. spies and special forces loved it immediately; they deployed Palantir to synthesize and sort the blizzard of battlefield intelligence. It helped planners avoid roadside bombs, track insurgents for assassination, even hunt down Osama bin Laden. The military success led to federal contracts on the civilian side. The U.S. Department of Health and Human Services uses Palantir to detect Medicare fraud. The FBI uses it in criminal probes. The Department of Homeland Security deploys it to screen air travelers and keep tabs on immigrants.

Police and sheriff’s departments in New York, New Orleans, Chicago, and Los Angeles have also used it, frequently ensnaring in the digital dragnet people who aren’t suspected of committing any crime. People and objects pop up on the Palantir screen inside boxes connected to other boxes by radiating lines labeled with the relationship: “Colleague of,” “Lives with,” “Operator of [cell number],” “Owner of [vehicle],” “Sibling of,” even “Lover of.” If the authorities have a picture, the rest is easy. Tapping databases of driver’s license and ID photos, law enforcement agencies can now identify more than half the population of U.S. adults. […]

In March a former computer engineer for Cambridge Analytica, the political consulting firm that worked for Donald Trump’s 2016 presidential campaign, testified in the British Parliament that a Palantir employee had helped Cambridge Analytica use the personal data of up to 87 million Facebook users to develop psychographic profiles of individual voters. […] The employee, Palantir said, worked with Cambridge Analytica on his own time. […]

Legend has it that Stephen Cohen, one of Thiel’s co-founders, programmed the initial prototype for Palantir’s software in two weeks. It took years, however, to coax customers away from the longtime leader in the intelligence analytics market, a software company called I2 Inc.

In one adventure missing from the glowing accounts of Palantir’s early rise, I2 accused Palantir of misappropriating its intellectual property through a Florida shell company registered to the family of a Palantir executive. A company claiming to be a private eye firm had been licensing I2 software and development tools and spiriting them to Palantir for more than four years. I2 said the cutout was registered to the family of Shyam Sankar, Palantir’s director of business development.

I2 sued Palantir in federal court, alleging fraud, conspiracy, and copyright infringement. […] Palantir agreed to pay I2 about $10 million to settle the suit. […]

Sankar, Palantir employee No. 13 and now one of the company’s top executives, also showed up in another Palantir scandal: the company’s 2010 proposal for the U.S. Chamber of Commerce to run a secret sabotage campaign against the group’s liberal opponents. Hacked emails released by the group Anonymous indicated that Palantir and two other defense contractors pitched outside lawyers for the organization on a plan to snoop on the families of progressive activists, create fake identities to infiltrate left-leaning groups, scrape social media with bots, and plant false information with liberal groups to subsequently discredit them.

After the emails emerged in the press, Palantir offered an explanation similar to the one it provided in March for its U.K.-based employee’s assistance to Cambridge Analytica: It was the work of a single rogue employee.

{ Bloomberg | Continue reading }

Police databases now feature the faces of nearly half of Americans — most of whom have no idea their image is there

{ NY Times | full story }

‘Je ne parlerai pas, je ne penserai rien : mais l’amour infini me montera dans l’âme.’ —Rimbaud

45.jpg

The ads you see online are based on the sites, searches, or Facebook posts that get your interest. Some rebels therefore throw a wrench into the machinery — by demonstrating phony interests.

“Every once in a while, I Google something completely nutty just to mess with their algorithm,” wrote Shaun Breidbart. “You’d be surprised what sort of coupons CVS prints for me on the bottom of my receipt. They are clearly confused about both my age and my gender.”

[…]

“You never want to tell Facebook where you were born and your date of birth. That’s 98 percent of someone stealing your identity! And don’t use a straight-on photo of yourself — like a passport photo, driver’s license, graduation photo — that someone can use on a fake ID.”

[…]

“Create a different email address for every service you use”

[…]

“Oh yeah — and don’t use Facebook.”

{ NY Times | Continue reading }

Miss Yiss, you fascinator, you

Japanese idol Ena Matsuoka was attacked outside her home last month after a fan figured out her address from selfies she posted on social media — just by zooming in on the reflection on her pupils.

The fan, Hibiki Sato, 26, managed to identify a bus stop and the surrounding scenery from the reflection on Matsuoka’s eyes and matched them to a street using Google Maps.

{ Asia One | Continue reading }

Tokyo Shimbun, a metropolitan daily, which reported on the stalking case, warned readers even casual selfies may show surrounding buildings that will allow people to identify the location of the photos.

It also said people shouldn’t make the V-sign with their hand, which Japanese often do in photos, because fingerprints could be stolen.

{ USA Today | Continue reading }

broad beans, hig, steak, hag, pepper the diamond bone

43.jpg

You might (or might not) be surprised at how often in my work as a mortician I am asked whether a mourning family member can keep a dearly departed’s skull. […] In theory, people get to decide what happens to their body after death. In reality, it is near impossible to get legal permission to display a relative’s skeleton. […]

As a funeral professional, I frankly have no idea what equipment a proper decapitation requires. The subsequent de-fleshing would probably involve boiling and/or dermestid beetles, incredible creatures used in museums and forensic labs to delicately eat the dead flesh off a skeleton without destroying the bones. Dermestids are happy to wade into a gruesome, sticky mass of decaying flesh and delicately clean around even the tiniest of bones. […]

Abuse-of-corpse laws exist for a reason. They protect people’s bodies from being mistreated (ahem, necrophilia). They also prevent a corpse from being snatched from the morgue and used for research or public exhibition without the dead person’s consent. History is littered with such violations. Medical professionals have stolen corpses and even dug up fresh graves to get bodies for dissection and research. […]

In the United States, no federal law prevents owning, buying, or selling human remains, unless the remains are Native American. Otherwise, whether you’re able to sell or own human remains is decided by each individual state. At least 38 states have laws that should prevent the sale of human remains, but in reality the laws are vague, confusing, and enforced at random. In one seven-month period in 2012–13, 454 human skulls were listed on eBay, with an average opening bid of just under $650 (eBay subsequently banned the practice).

{ The Atlantic | Continue reading }

‘McDonald’s removed the mcrib from its menu so it could suck its own dick’ –@jaynooch

41.jpg

iBorderCtrl is an AI based lie detector project funded by the European Union’s Horizon 2020. The tool will be used on people crossing borders of some European countries. It officially enables faster border control. It will be tested in Hungary, Greece and Letonia until August 2019 and should then be officially deployed.

The project will analyze facial micro-expressions to detect lies. We really have worries about such a project. For those who don’t have any knowledge on AI and CS, the idea of using a computer to detect lies can sound really good. Computers are believed to be totally objective.

But the AI community knows it is far from being true: biases are nearly omnipresent. We have no idea how the dataset used by iBorderCtrl has been built.

More globally, we have to remind that AI has no understanding of humans (to be honest, it has no understanding at all). It just starts being able to recognize the words we pronounce, but it doesn’t understand their meaning.

Lies rely on complex psychological mechanisms. Detecting them would require a lot more than a simple literal understanding. Trying to detect them using some key facial expressions looks utopian, especially as facial expressions can vary from a culture to another one. As an example, nodding the head usually means “yes” in western world, but it means “no” in countries such as Greece, Bulgaria and Turkey.

{ ActuIA | Continue reading }

The ‘iBorderCtrl’ AI system uses a variety of ‘at home’ pre-registration systems and real time ‘at the airport’ automatic deception detection systems. Some of the critical methods used in automated deception detection are that of micro-expressions. In this opinion article, we argue that considering the state of the psychological sciences current understanding of micro-expressions and their associations with deception, such in vivo testing is naïve and misinformed. We consider the lack of empirical research that supports the use of micro-expressions in the detection of deception and question the current understanding of the validity of specific cues to deception. With such unclear definitive and reliable cues to deception, we question the validity of using artificial intelligence that includes cues to deception, which have no current empirical support.

{ Security Journal | Continue reading }

Can’t hear with the waters of. The chittering waters of. Flittering bats, fieldmice bawk talk.

The U.S. government is in the midst of forcing a standoff with China over the global deployment of Huawei’s 5G wireless networks around the world. […] This conflict is perhaps the clearest acknowledgement we’re likely to see that our own government knows how much control of communications networks really matters, and our inability to secure communications on these networks could really hurt us.

{ Cryptography Engineering | Continue reading }

related { Why Controlling 5G Could Mean Controlling the World }

Eer’s wax for Sur Soord, dong-dong bollets for the iris riflers

52.jpg

One brave outdoorsman will finally take a special shot of whiskey at a bar in Canada’s Yukon Territory containing his amputated, now-dehydrated big toe, which he donated to the establishment for their signature “Sourtoe Cocktail” after losing it to frostbite in February 2018.

{ Fox News | Continue reading }

The legendary $5 drink, called the Sourtoe Cocktail, has been served at Yukon’s Downtown Hotel since 1973. Drinkers must touch their lips to the toe to earn a certificate of completion. To date, more than 90,000 have. […]

“We have been without a big toe for some time, so his generous toe-nation will help ensure the tradition continues,” says the hotel’s general manager, Adam Gerle, in a statement. […]

“It takes six weeks to mummify a new toe on rock salt before it’s ready to serve,” Lee says.

{ NY post | Continue reading }

oil on cardboard { Edward Hopper, Nude Walking through Doorway, c.1902 }

Surveiller et punir

imp-kerr-ecstasy.jpg

Paul Hildreth peered at a display of dozens of images from security cameras surveying his Atlanta school district and settled on one showing a woman in a bright yellow shirt walking a hallway.

A mouse click instructed the artificial-intelligence-equipped system to find other images of the woman, and it immediately stitched them into a video narrative of her immediate location, where she had been and where she was going.

There was no threat, but Hildreth’s demonstration showed what’s possible with AI-powered cameras. If a gunman were in one of his schools, the cameras could quickly identify the shooter’s location and movements, allowing police to end the threat as soon as possible, said Hildreth, emergency operations coordinator for Fulton County Schools.

AI is transforming surveillance cameras from passive sentries into active observers that can identify people, suspicious behavior and guns, amassing large amounts of data that help them learn over time to recognize mannerisms, gait and dress. If the cameras have a previously captured image of someone who is banned from a building, the system can immediately alert officials if the person returns.

{ LA Times | Continue reading }

installation sketch { ecstasy, 2018 }

The whool of the whaal in the wheel of the whorl of the Boubou from Bourneum has thus come to taon!

— Persistence 


— Talking too much 


— Contradictions between words and actions or behaviors 


— Triggering your intuition (this doesn’t feel right)

As a reliable general guideline, any time you are engaged in conversation with a stranger and you notice one or more of those characteristics in the conversation, you should expect that you are being scammed. 


{ Active Response Training | Continue reading }