pipeline

‘McDonald’s removed the mcrib from its menu so it could suck its own dick’ –@jaynooch

41.jpg

iBorderCtrl is an AI based lie detector project funded by the European Union’s Horizon 2020. The tool will be used on people crossing borders of some European countries. It officially enables faster border control. It will be tested in Hungary, Greece and Letonia until August 2019 and should then be officially deployed.

The project will analyze facial micro-expressions to detect lies. We really have worries about such a project. For those who don’t have any knowledge on AI and CS, the idea of using a computer to detect lies can sound really good. Computers are believed to be totally objective.

But the AI community knows it is far from being true: biases are nearly omnipresent. We have no idea how the dataset used by iBorderCtrl has been built.

More globally, we have to remind that AI has no understanding of humans (to be honest, it has no understanding at all). It just starts being able to recognize the words we pronounce, but it doesn’t understand their meaning.

Lies rely on complex psychological mechanisms. Detecting them would require a lot more than a simple literal understanding. Trying to detect them using some key facial expressions looks utopian, especially as facial expressions can vary from a culture to another one. As an example, nodding the head usually means “yes” in western world, but it means “no” in countries such as Greece, Bulgaria and Turkey.

{ ActuIA | Continue reading }

The ‘iBorderCtrl’ AI system uses a variety of ‘at home’ pre-registration systems and real time ‘at the airport’ automatic deception detection systems. Some of the critical methods used in automated deception detection are that of micro-expressions. In this opinion article, we argue that considering the state of the psychological sciences current understanding of micro-expressions and their associations with deception, such in vivo testing is naïve and misinformed. We consider the lack of empirical research that supports the use of micro-expressions in the detection of deception and question the current understanding of the validity of specific cues to deception. With such unclear definitive and reliable cues to deception, we question the validity of using artificial intelligence that includes cues to deception, which have no current empirical support.

{ Security Journal | Continue reading }

Can’t hear with the waters of. The chittering waters of. Flittering bats, fieldmice bawk talk.

The U.S. government is in the midst of forcing a standoff with China over the global deployment of Huawei’s 5G wireless networks around the world. […] This conflict is perhaps the clearest acknowledgement we’re likely to see that our own government knows how much control of communications networks really matters, and our inability to secure communications on these networks could really hurt us.

{ Cryptography Engineering | Continue reading }

related { Why Controlling 5G Could Mean Controlling the World }

Eer’s wax for Sur Soord, dong-dong bollets for the iris riflers

52.jpg

One brave outdoorsman will finally take a special shot of whiskey at a bar in Canada’s Yukon Territory containing his amputated, now-dehydrated big toe, which he donated to the establishment for their signature “Sourtoe Cocktail” after losing it to frostbite in February 2018.

{ Fox News | Continue reading }

The legendary $5 drink, called the Sourtoe Cocktail, has been served at Yukon’s Downtown Hotel since 1973. Drinkers must touch their lips to the toe to earn a certificate of completion. To date, more than 90,000 have. […]

“We have been without a big toe for some time, so his generous toe-nation will help ensure the tradition continues,” says the hotel’s general manager, Adam Gerle, in a statement. […]

“It takes six weeks to mummify a new toe on rock salt before it’s ready to serve,” Lee says.

{ NY post | Continue reading }

oil on cardboard { Edward Hopper, Nude Walking through Doorway, c.1902 }

Surveiller et punir

imp-kerr-ecstasy.jpg

Paul Hildreth peered at a display of dozens of images from security cameras surveying his Atlanta school district and settled on one showing a woman in a bright yellow shirt walking a hallway.

A mouse click instructed the artificial-intelligence-equipped system to find other images of the woman, and it immediately stitched them into a video narrative of her immediate location, where she had been and where she was going.

There was no threat, but Hildreth’s demonstration showed what’s possible with AI-powered cameras. If a gunman were in one of his schools, the cameras could quickly identify the shooter’s location and movements, allowing police to end the threat as soon as possible, said Hildreth, emergency operations coordinator for Fulton County Schools.

AI is transforming surveillance cameras from passive sentries into active observers that can identify people, suspicious behavior and guns, amassing large amounts of data that help them learn over time to recognize mannerisms, gait and dress. If the cameras have a previously captured image of someone who is banned from a building, the system can immediately alert officials if the person returns.

{ LA Times | Continue reading }

installation sketch { ecstasy, 2018 }

The whool of the whaal in the wheel of the whorl of the Boubou from Bourneum has thus come to taon!

— Persistence 


— Talking too much 


— Contradictions between words and actions or behaviors 


— Triggering your intuition (this doesn’t feel right)

As a reliable general guideline, any time you are engaged in conversation with a stranger and you notice one or more of those characteristics in the conversation, you should expect that you are being scammed. 


{ Active Response Training | Continue reading }

In the end, Decalogue VI seems less interested in labeling its characters than in recognizing that sex — no matter how casual — still carries a psychological/spiritual weight

44.jpg

The team say that sextortion emails demanding cryptocurrency payment first appeared in 2018. The scammers send their emails via botnets, such as Necurs or Cutwail. These are global networks of computers infected with malware that send out spam on demand.

This is offered as a service on the dark net. Various researchers have shown that spammers pay botnet owners between $100 and $500 to send a million spam emails. They can even rent botnets at a cost of $10,000 per month, which allows them to send 100 million spam messages. […]

Back in 2008, one group of cyber-crime experts infiltrated a botnet for 26 days and monitored spammers sending 350 million emails for a pharmaceutical product. The result was 28 sales. This generated a revenue of $2,732, which corresponds to a conversion rate of just 0.00001%. Nevertheless, the experts concluded that by using additional botnets, spammers could generate around $9,500 per day which adds up to $3.5 million per year.

Sextortion has the potential to be much more profitable, say Paquet-Clouston and co. The reason is that it does not require the spammers to host any kind of e-commerce website, or to procure, store, and ship products of any kind. And cryptocurrency payments are simpler than bank payments and do not require the involvement of a friendly bank.

{ Technology Review | Continue reading }

oil on canvas { Caleb Brown, Sports Explosion, 2009 }

And the cloud that took the form (when the rest of Heaven was blue) of a demon in my view

32.jpg

Cooping was an alleged form of electoral fraud in the United States cited in relation to the death of Edgar Allan Poe in October 1849, by which unwilling participants were forced to vote, often several times over, for a particular candidate in an election. According to several of Poe’s biographers, these innocent bystanders would be grabbed off the street by so-called ‘cooping gangs’ or ‘election gangs’ working on the payroll of a political candidate, and they would be kept in a room, called the “coop”, and given alcoholic beverages in order for them to comply. If they refused to cooperate, they would be beaten or even killed. Often their clothing would be changed to allow them to vote multiple times. Sometimes the victims would be forced to wear disguises such as wigs, fake beards or mustaches to prevent them from being recognized by voting officials at polling stations.

{ Wikipedia | Continue reading }

On October 3, 1849, Edgar Allan Poe was found delirious on the streets of Baltimore, “in great distress, and… in need of immediate assistance”, according to Joseph W. Walker who found him. He was taken to the Washington Medical College where he died on Sunday, October 7, 1849 at 5:00 in the morning. He was not coherent long enough to explain how he came to be in his dire condition and, oddly, was wearing clothes that were not his own.

He is said to have repeatedly called out the name “Reynolds” on the night before his death, though it is unclear to whom he was referring.

All medical records and documents, including Poe’s death certificate, have been lost, if they ever existed.

Newspapers at the time reported Poe’s death as “congestion of the brain” or “cerebral inflammation”, common euphemisms for death from disreputable causes such as alcoholism.

The actual cause of death remains a mystery. […] One theory dating from 1872 suggests that cooping was the cause of Poe’s death, a form of electoral fraud in which citizens were forced to vote for a particular candidate, sometimes leading to violence and even murder. […] Cooping had become the standard explanation for Poe’s death in most of his biographies for several decades, though his status in Baltimore may have made him too recognizable for this scam to have worked. […]

Immediately after Poe’s death, his literary rival Rufus Wilmot Griswold wrote a slanted high-profile obituary under a pseudonym, filled with falsehoods that cast him as a lunatic and a madman, and which described him as a person who “walked the streets, in madness or melancholy, with lips moving in indistinct curses, or with eyes upturned in passionate prayers, (never for himself, for he felt, or professed to feel, that he was already damned)”.

The long obituary appeared in the New York Tribune signed “Ludwig” on the day that Poe was buried. It was soon further published throughout the country. The piece began, “Edgar Allan Poe is dead. He died in Baltimore the day before yesterday. This announcement will startle many, but few will be grieved by it.” “Ludwig” was soon identified as Griswold, an editor, critic, and anthologist who had borne a grudge against Poe since 1842. Griswold somehow became Poe’s literary executor and attempted to destroy his enemy’s reputation after his death.

{ Wikipedia | Continue reading }

What happens to $47 billion of lease obligations if there’s a recession?

41.jpg

{ What makes WeWork worth more, the company seems to be saying, is that it’s a tech company + Everything about the company is over-the-top: its growth, losses, potential conflicts of interest and financial gymnastics + The company’s IPO prospectus is an exercise in ducking reality }

‘No, everything stays, doesn’t it? Everything.’ –Flaubert

31.jpg

Before you hand over your number, ask yourself: Is it worth the risk? […]

Your phone number may have now become an even stronger identifier than your full name. I recently found this out firsthand when I asked Fyde, a mobile security firm in Palo Alto, Calif., to use my digits to demonstrate the potential risks of sharing a phone number.

He quickly plugged my cellphone number into a public records directory. Soon, he had a full dossier on me — including my name and birth date, my address, the property taxes I pay and the names of members of my family.

From there, it could have easily gotten worse. Mr. Tezisci could have used that information to try to answer security questions to break into my online accounts. Or he could have targeted my family and me with sophisticated phishing attacks.

{ NY Times | Continue reading }

image { Bell telephone magazine, March/April 1971 }

More Americans are saying they need a variety of animals — dogs, ducks, even insects — for their mental health. But critics say many are really just pets that do not merit special status.

11.jpg

221.jpg

331.jpg

44.jpg

66.jpg

77.jpg

88.jpg

{ Trump’s ties }

OMG SHUT UP AND TAKE OUR MONEY

24.jpg

{ Horns are growing on young people’s skulls, caused by the forward tilt of the head. Phone use is to blame, research suggests. | Washington Post | No, Teenagers Are Not Growing ‘Skull Horns’ Because of Smartphones | Time }

In this big game that we play, life, it’s not what you hope for, it’s not what you deserve, it’s what you take

A woman who was knocked unconscious by a cyclist will be awarded compensation, despite a judge finding she had stepped into the road while looking at her phone.

Robert Hazeldean, a garden designer, who was also knocked out by the collision, will pay thousands in damages and court fees to Gemma Brushett, who works for a finance firm in the City of London and runs yoga retreats. […]

Judge Shanti Mauger, at Central London county court, said: “Cyclists must be prepared at all times for people to behave in unexpected ways.”

{ Guardian | Continue reading }