Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged Military

Rss Feed Group items tagged

Weiye Loh

Censorship of War News Undermines Public Trust - 20 views

I posted a bookmark on something related to this issue. http://www.todayonline.com/World/EDC090907-0000047/The-photo-thats-caused-a-stir AP decided to publish a photo of a fatally wounded young ...

censorship PR

Meenatchi

US Navy creates command to maintain cyber supremacy - 3 views

Article Summary: http://news.yahoo.com/s/afp/20091002/pl_afp/usitmilitaryintelligencesecurityinternet_20091002130920 The article talks about the US Navy's announcement about it consolidating inte...

rights democracy Ethics surveillance

started by Meenatchi on 16 Oct 09 no follow-up yet
Weiye Loh

Magazine's database of US military personnel is hacked | Technology | The Guardian - 0 views

  • names, passwords and email addresses had been hacked, and that other details, such as duty status, pay grades and type of service, were also obtained by the hackers.
Weiye Loh

Fake tweets by 'socialbot' fool hundreds of followers - tech - 23 March 2011 - New Scie... - 0 views

  • Socialbots 2011, a competition designed to test whether bots can be used to alter the structure of a social network. Each team had a Twitter account controlled by a socialbot. Like regular human users, the bot could follow other Twitter users and send messages. Bots were rewarded for the number of followers they amassed and the number of responses their tweets generated.
  • The socialbots looked at tweets sent by members of a network of Twitter users who shared a particular interest, and then generated a suitable response. In one exchange a bot asks a human user which character they would like to bring back to life from their favourite book. When the human replies "Jesus" it responds: "Honestly? no fracking way. ahahahhaa."
  • When the experiment ended last month, a before-and-after comparison of connections within the target community showed that the bots were "able to heavily shape and distort the structure of the network", according to its organiser, Tim Hwang, founder of the startup company Robot, Robot and Hwang, based in San Francisco. Some members of the community who had not previously been directly connected were now linked, for example. Hwang has not revealed the identities of the entrants, or of the members of the 500-person Twitter network that the bots infiltrated.
  • ...4 more annotations...
  • The success suggests that socialbots could manipulate social networks on a larger scale, for good or ill. "We could use these bots in the future to encourage social participation or support for humanitarian causes," Hwang claims. He also acknowledges that there is a flip side, if bots were also used to inhibit activism.
  • The military may already be onto the idea. Officials at US Central Command (Centcom), which oversees military activities in the Middle East and central Asia, issued a request last June for an "online persona management service". The details of the request suggest that the military want to create and control 50 fictitious online identities who appear to be real people from Afghanistan and Iraq.
  • It is not clear, however, if any of the management of the fake identities would be delegated to software. A Centcom spokesperson told New Scientist that the contract supports "classified blogging activities on foreign language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US".
  • Hwang has ambitious plans for the next stage of the socialbot project: "We're going to survey and identify two sites of 5000-person unconnected Twitter communities, and over a six-to-12-month period use waves of bots to thread and rivet those clusters together into a directly connected social bridge between those two formerly independent groups," he wrote in a blog post on 3 March. "The bot-driven social 'scaffolding' will then be dropped away, completing the bridge, with swarms of bots being launched to maintain the superstructure as needed," he adds.
Weiye Loh

IBM to Apply Analytics to War on Terror - 1 views

Big Blue will supply its analytics know-how to a key U.S. military force in the battle against terrorism October 13, 2009 By Stephen Baker TECHNOLOGY Can the analytic science that powers operati...

War Technology Business

started by Weiye Loh on 14 Oct 09 no follow-up yet
Ang Yao Zong

Cyber Cold War? - 1 views

The following websites relate to "Cyber Warfare" that is conducted over cyberspace. 1) http://english.people.com.cn/90001/90780/91343/6699021.html (China) The above article first starts off by de...

online warfare

started by Ang Yao Zong on 13 Oct 09 no follow-up yet
Weiye Loh

BrainGate gives paralysed the power of mind control | Science | The Observer - 0 views

  • brain-computer interface, or BCI
  • is a branch of science exploring how computers and the human brain can be meshed together. It sounds like science fiction (and can look like it too), but it is motivated by a desire to help chronically injured people. They include those who have lost limbs, people with Lou Gehrig's disease, or those who have been paralysed by severe spinal-cord injuries. But the group of people it might help the most are those whom medicine assumed were beyond all hope: sufferers of "locked-in syndrome".
  • These are often stroke victims whose perfectly healthy minds end up trapped inside bodies that can no longer move. The most famous example was French magazine editor Jean-Dominique Bauby who managed to dictate a memoir, The Diving Bell and the Butterfly, by blinking one eye. In the book, Bauby, who died in 1997 shortly after the book was published, described the prison his body had become for a mind that still worked normally.
  • ...9 more annotations...
  • Now the project is involved with a second set of human trials, pushing the technology to see how far it goes and trying to miniaturise it and make it wireless for a better fit in the brain. BrainGate's concept is simple. It posits that the problem for most patients does not lie in the parts of the brain that control movement, but with the fact that the pathways connecting the brain to the rest of the body, such as the spinal cord, have been broken. BrainGate plugs into the brain, picks up the right neural signals and beams them into a computer where they are translated into moving a cursor or controlling a computer keyboard. By this means, paralysed people can move a robot arm or drive their own wheelchair, just by thinking about it.
  • he and his team are decoding the language of the human brain. This language is made up of electronic signals fired by billions of neurons and it controls everything from our ability to move, to think, to remember and even our consciousness itself. Donoghue's genius was to develop a deceptively small device that can tap directly into the brain and pick up those signals for a computer to translate them. Gold wires are implanted into the brain's tissue at the motor cortex, which controls movement. Those wires feed back to a tiny array – an information storage device – attached to a "pedestal" in the skull. Another wire feeds from the array into a computer. A test subject with BrainGate looks like they have a large plug coming out the top of their heads. Or, as Donoghue's son once described it, they resemble the "human batteries" in The Matrix.
  • BrainGate's highly advanced computer programs are able to decode the neuron signals picked up by the wires and translate them into the subject's desired movement. In crude terms, it is a form of mind-reading based on the idea that thinking about moving a cursor to the right will generate detectably different brain signals than thinking about moving it to the left.
  • The technology has developed rapidly, and last month BrainGate passed a vital milestone when one paralysed patient went past 1,000 days with the implant still in her brain and allowing her to move a computer cursor with her thoughts. The achievement, reported in the prestigious Journal of Neural Engineering, showed that the technology can continue to work inside the human body for unprecedented amounts of time.
  • Donoghue talks enthusiastically of one day hooking up BrainGate to a system of electronic stimulators plugged into the muscles of the arm or legs. That would open up the prospect of patients moving not just a cursor or their wheelchair, but their own bodies.
  • If Nagle's motor cortex was no longer working healthily, the entire BrainGate project could have been rendered pointless. But when Nagle was plugged in and asked to imagine moving his limbs, the signals beamed out with a healthy crackle. "We asked him to imagine moving his arm to the left and to the right and we could hear the activity," Donoghue says. When Nagle first moved a cursor on a screen using only his thoughts, he exclaimed: "Holy shit!"
  • BrainGate and other BCI projects have also piqued the interest of the government and the military. BCI is melding man and machine like no other sector of medicine or science and there are concerns about some of the implications. First, beyond detecting and translating simple movement commands, BrainGate may one day pave the way for mind-reading. A device to probe the innermost thoughts of captured prisoners or dissidents would prove very attractive to some future military or intelligence service. Second, there is the idea that BrainGate or other BCI technologies could pave the way for robot warriors controlled by distant humans using only their minds. At a conference in 2002, a senior American defence official, Anthony Tether, enthused over BCI. "Imagine a warrior with the intellect of a human and the immortality of a machine." Anyone who has seen Terminator might worry about that.
  • Donoghue acknowledges the concerns but has little time for them. When it comes to mind-reading, current BrainGate technology has enough trouble with translating commands for making a fist, let alone probing anyone's mental secrets
  • As for robot warriors, Donoghue was slightly more circumspect. At the moment most BCI research, including BrainGate projects, that touch on the military is focused on working with prosthetic limbs for veterans who have lost arms and legs. But Donoghue thinks it is healthy for scientists to be aware of future issues. "As long as there is a rational dialogue and scientists think about where this is going and what is the reasonable use of the technology, then we are on a good path," he says.
  •  
    The robotic arm clutched a glass and swung it over a series of coloured dots that resembled a Twister gameboard. Behind it, a woman sat entirely immobile in a wheelchair. Slowly, the arm put the glass down, narrowly missing one of the dots. "She's doing that!" exclaims Professor John Donoghue, watching a video of the scene on his office computer - though the woman onscreen had not moved at all. "She actually has the arm under her control," he says, beaming with pride. "We told her to put the glass down on that dot." The woman, who is almost completely paralysed, was using Donoghue's groundbreaking technology to control the robot arm using only her thoughts. Called BrainGate, the device is implanted into her brain and hooked up to a computer to which she sends mental commands. The video played on, giving Donoghue, a silver-haired and neatly bearded man of 62, even more reason to feel pleased. The patient was not satisfied with her near miss and the robot arm lifted the glass again. After a brief hover, the arm positioned the glass on the dot.
Weiye Loh

The Free Speech Blog: Official blog of Index on Censorship » Thank God for th... - 0 views

  • The US Supreme Court ruled yesterday by an 8-1 vote that the bizarre anti-gay funeral picketers belonging to the Westboro Baptist Church have a First Amendment right to free speech. Rev Fred Phelps and his crew have been waving placards with messages such as “Thank God for Dead Soldiers” and “AIDS Cures Fags” at military funerals to promote their belief that God is punishing the US for accepting homosexuality.
  • The Supreme Court decision (see below) overruled a previous award of over $10 million (reduced on appeal to $5 million) to the family of Lance Corporal Matthew Snyder in relation to a protest at his funeral.
  • First, undoubtedly debate about war, its causes and casualties is important. This was “speech” in a public place on an issue of public concern, even though the particular hypothesis is ridiculous and offensive. Free speech protection can’t, however, just be for views already presumed to be true. Secondly, protestors were scrupulous about staying within the letter of the law. They knew that they had to remain 1,000 feet from the funeral, for instance, and did not shout or otherwise disrupt the service. Preventing such orderly protests on issues of importance would have been a serious attack on civil liberties, even though the protestors displayed gross insensitivity to those mourning.
  • ...1 more annotation...
  • we should welcome this decision even though it protects bigots of limited reasoning ability about cause and effect who are indifferent to the feelings of the recently bereaved. The best response to hateful speech is surely counter-speech. At many recent military funerals, counter-protestors have arrived early in their thousands and occupied the prime spaces in the surrounding area. That is a far better reaction than a legal gagging order.
Paul Melissa

"Can a robot commit a war crime?" - 1 views

http://www.newscientist.com/blog/technology/2008/02/military-turing-test-would-make-war.html This question was raised at the question was raised at the conference on The Ethics of Autonomous Milit...

started by Paul Melissa on 15 Oct 09 no follow-up yet
Weiye Loh

Drone journalism takes off - ABC News (Australian Broadcasting Corporation) - 0 views

  • Instead of acquiring military-style multi-million dollar unmanned aerial vehicles the size of small airliners, the media is beginning to go micro, exploiting rapid advances in technology by deploying small toy-like UAVs to get the story.
  • Last November, drone journalism hit the big time after a Polish activist launched a small craft with four helicopter-like rotors called a quadrocopter. He flew the drone low over riot police lines to record a violent demonstration in Warsaw. The pictures were extraordinarily different from run-of-the-mill protest coverage.Posted online, the images went viral. More significantly, this birds-eye view clip found its way onto the bulletins and web pages of mainstream media.
  • Drone Journalism Lab, a research project to determine the viability of remote airborne media.
  •  
    Drones play an increasing and controversial role in modern warfare. From Afghanistan and Pakistan to Iran and Yemen, they have become a ubiquitous symbol of Washington's war on terrorism. Critics point to the mounting drone-induced death toll as evidence that machines, no matter how sophisticated, cannot discriminate between combatants and innocent bystanders. Now drones are starting to fly into a more peaceful, yet equally controversial role in the media. Rapid technological advances in low-cost aerial platforms herald the age of drone journalism. But it will not be all smooth flying: this new media tool can expect to be buffeted by the issues of safety, ethics and legality.
Low Yunying

China's Green Dam Internet Filter - 6 views

Article: http://edition.cnn.com/2009/TECH/06/30/china.green.dam/index.html Summary: China has passed a mandate requiring all personal computers sold in the country to be accompanied by a contro...

China pornography filter

started by Low Yunying on 02 Sep 09 no follow-up yet
Weiye Loh

WikiLeaks is delinquent and anti-democratic - Telegraph - 0 views

  • The frenzied hyperbole generated by the latest WikiLeaks episode – an anarchic, but so far remarkably ineffectual, spasm of delinquency – seems peculiarly weak in its understanding of the basic concepts with which its rhetoric is larded. It is, in fact, the precise opposite of what its apologists claim it to be: with its unilateral programme of revealing confidential information, which it boasts is unstoppable and accountable to no one, it is profoundly anti-democratic.
  • In its self-contradictory maintenance of its own untraceable operations, it effectively declares itself to be the only agency in the world that is entitled to secrecy. Its insistence that it is somehow a voice of open and transparent “freedom of expression” is simply absurd: there is no issue here of any individual or group openly expressing an opinion that would otherwise have been suppressed.
  • the leaked material has been almost entirely unsurprising, apart from one rather spectacular own goal in WikiLeaks terms: it turns out that a number of Gulf states have been urging the US to strike at Iran before it succeeds in producing nuclear weapons, and that the US has been resisting this pressure. This tends to undermine both the image of America as trigger-happy warmonger and the idea that the entire Muslim world is united in hatred and distrust of the Great Satan.
  • ...2 more annotations...
  • But there was one document that did include information of a sensational kind: a list of soft targets (places that could be expected to be less well-protected) that the US considered vital to its national security. Many of these were non‑military, including European centres for the manufacture of smallpox vaccine.
  • there is nothing democratic about this at all. It is an arrogant, defiant provocation of international conventions by a tiny handful of unidentifiable people that involved no consultation or popular mandate. Who are they? Apart from their self-publicising editor, Julian Assange, they are nameless and faceless. To whom could a society or an electorate – even if it was overwhelmingly opposed to such actions – protest or present its arguments?
Weiye Loh

Roger Pielke Jr.'s Blog: Political Affiliations of Scientists - 0 views

  • Dan Sarewitz tossed some red meat out on the table in the form of an essay in Slate on the apparent paucity of Republicans among the US scientific establishment.  Sarewitz suggests that it is in the interests f the scientific community both to understand this situation and to seek greater diversity in its ranks, explaining that "the issue here is legitimacy, not literacy."
  • The issue that Sarewitz raises is one of legitimacy.  All of us evaluate knowledge claims outside our own expertise (and actually very few people are in fact experts) based not on a careful consideration of facts and evidence, but by other factors, such as who we trust and how their values jibe with our own.  Thus if expert institutions are going to sustain and function in a democratic society they must attend to their legitimacy.  Scientific institutions that come to be associated with one political party risk their legitimacy among those who are not sympathetic to that party's views.
  • Of course, we don't just evaluate knowledge claims simply based on individuals, but usually through institutions, like scientific journals, national academies, professional associations, universities and so on. Sarewitz's Slate article did not get into a discussion of these institutions, but I think that it is essential to fully understand his argument.
  • ...4 more annotations...
  • Consider that the opinion poll that Sarewitz cited which found that only 6% of scientists self-identify as Republicans has some very important fine print -- specifically that the scientists that it surveyed were all members of the AAAS.  I do not have detailed demographics information, but based on my experience I would guess that AAAS membership is dominated by university and government scientists.  The opinion poll thus does not tell us much about US scientists as a whole, but rather something about one scientific institution -- AAAS.  And the poll indicates that AAAS is largely an association that does not include Republicans.
  • One factor might be seen in a recent action of the American Geophysical Union -- another big US science association: AGU recently appointed Chris Mooney to its Board.  I am sure that Chris is a fine fellow, but appointing an English major who has written divisively about the "Republican War on Science" to help AGU oversee "science communication" is more than a little ironic, and unlikely to attract many Republican scientists to the institution, perhaps even having the opposite effect.  To the extent that AAAS and AGU endorse the Democratic policy agenda, or just appear to do so, it reflects their role not as arbiters of knowledge claims, but rather as political actors.
  • I would wager that the partisan affiliation of scientists in the US military, in the energy , pharmaceutical and finance industries would look starkly different than that of AAAS.  If there is a crisis of legitimacy in the scientific community, it is among those institutions which have become to be so dominated by those espousing a shared political view, whatever that happens to be. This crisis is shared by AAAS and AGU, viewed with suspicion by those on the Right, and, for instance, by ExxonMobil, which is viewed by a similar suspicion by those on the Left.  Sarewitz is warning that for many on the Right, institutions like AAAS are viewed with every bit as skeptical an eye as those on the Left view ExxonMobil.
  • Many observers are so wrapped up in their own partisan battles that they either don't care that science is being associated with one political party or they somehow think that through such politicization they will once and for all win the partisan battles.  They won't. Political parties are far more robust than institutions of science. Institutions of science need help to survive intact partisan political battles.  The blogosphere and activist scientists and journalists offer little help.
Weiye Loh

Review: What Rawls Hath Wrought | The National Interest - 0 views

  • Almost never used in English before the 1940s, “human rights” were mentioned in the New York Times five times as often in 1977 as in any prior year of the newspaper’s history. By the nineties, human rights had become central to the thinking not only of liberals but also of neoconservatives, who urged military intervention and regime change in the faith that these freedoms would blossom once tyranny was toppled. From being almost peripheral, the human-rights agenda found itself at the heart of politics and international relations.
  • In fact, it has become entrenched in extremis: nowadays, anyone who is skeptical about human rights is angrily challenged
  • The contemporary human-rights movement is demonstrably not the product of a revulsion against the worst crimes of Nazism. For one thing, the Holocaust did not figure in the deliberations that led up to the Universal Declaration of Human Rights adopted by the UN in 1948.
  • ...1 more annotation...
  • Contrary to received history, the rise of human rights had very little to do with the worst crime against humanity ever committed.
Weiye Loh

Valerie Plame, YES! Wikileaks, NO! - English pravda.ru - 0 views

  • n my recent article Ward Churchill: The Lie Lives On (Pravda.Ru, 11/29/2010), I discussed the following realities about America's legal "system": it is duplicitous and corrupt; it will go to any extremes to insulate from prosecution, and in many cases civil liability, persons whose crimes facilitate this duplicity and corruption; it has abdicated its responsibility to serve as a "check-and-balance" against the other two branches of government, and has instead been transformed into a weapon exploited by the wealthy, the corporations, and the politically connected to defend their criminality, conceal their corruption and promote their economic interests
  • it is now evident that Barack Obama, who entered the White House with optimistic messages of change and hope, is just as complicit in, and manipulative of, the legal "system's" duplicity and corruption as was his predecessor George W. Bush.
  • the Obama administration has refused to prosecute former Attorney General John Ashcroft for abusing the "material witness" statute; refused to prosecute Ashcroft's successor (and suspected perjurer) Alberto Gonzales for his role in the politically motivated firing of nine federal prosecutors; refused to prosecute Justice Department authors of the now infamous "torture memos," like John Yoo and Jay Bybee; and, more recently, refused to prosecute former CIA official Jose Rodriquez Jr. for destroying tapes that purportedly showed CIA agents torturing detainees.
  • ...11 more annotations...
  • thanks to Wikileaks, the world has been enlightened to the fact that the Obama administration not only refused to prosecute these individuals itself, it also exerted pressure on the governments of Germany and Spain not to prosecute, or even indict, any of the torturers or war criminals from the Bush dictatorship.
  • we see many right-wing commentators demanding that Assange be hunted down, with some even calling for his murder, on the grounds that he may have endangered lives by releasing confidential government documents. Yet, for the right-wing, this apparently was not a concern when the late columnist Robert Novak "outed" CIA agent Valerie Plame after her husband Joseph Wilson authored an OP-ED piece in The New York Times criticizing the motivations for waging war against Iraq. Even though there was evidence of involvement within the highest echelons of the Bush dictatorship, only one person, Lewis "Scooter" Libby, was indicted and convicted of "outing" Plame to Novak. And, despite the fact that this "outing" potentially endangered the lives of Plame's overseas contacts, Bush commuted Libby's thirty-month prison sentence, calling it "excessive."
  • Why the disparity? The answer is simple: The Plame "outing" served the interests of the military-industrial complex and helped to conceal the Bush dictatorship's lies, tortures and war crimes, while Wikileaks not only exposed such evils, but also revealed how Obama's administration, and Obama himself, are little more than "snake oil" merchants pontificating about government accountability while undermining it at every turn.
  • When the United States Constitution was being created, a conflict emerged between delegates who wanted a strong federal government (the Federalists) and those who wanted a weak federal government (the anti-Federalists). Although the Federalists won the day, one of the most distinguished anti-Federalists, George Mason, refused to sign the new Constitution, sacrificing in the process, some historians say, a revered place amongst America's founding fathers. Two of Mason's concerns were that the Constitution did not contain a Bill of Rights, and that the presidential pardon powers would allow corrupt presidents to pardon people who had committed crimes on presidential orders.
  • Mason's concerns about the abuse of the pardon powers were eventually proven right when Gerald Ford pardoned Richard Nixon, when Ronald Reagan pardoned FBI agents convicted of authorizing illegal break-ins, and when George H.W. Bush pardoned six individuals involved in the Iran-Contra Affair.
  • Mason was also proven right after the Federalists realized that the States would not ratify the Constitution unless a Bill of Rights was added. But this was done begrudgingly, as demonstrated by America's second president, Federalist John Adams, who essentially destroyed the right to freedom of speech via the Alien and Sedition Acts, which made it a crime to say, write or publish anything critical of the United States government.
  • Most criminals break laws that others have created, and people who assist in exposing or apprehending them are usually lauded as heroes. But with the "espionage" acts, the criminals themselves have actually created laws to conceal their crimes, and exploit these laws to penalize people who expose them.
  • The problem with America's system of government is that it has become too easy, and too convenient, to simply stamp "classified" on documents that reveal acts of government corruption, cover-up, mendacity and malfeasance, or to withhold them "in the interest of national security." Given this web of secrecy, is it any wonder why so many Americans are still skeptical about the "official" versions of the John F. Kennedy or Martin Luther King Jr. assassinations, or the events surrounding the attacks of September 11, 2001?
  • I want to believe that the Wikileaks documents will change America for the better. But what undoubtedly will happen is a repetition of the past: those who expose government crimes and cover-ups will be prosecuted or branded as criminals; new laws will be passed to silence dissent; new Liebermans will arise to intimidate the corporate-controlled media; and new ways will be found to conceal the truth.
  • What Wikileaks has done is make people understand why so many Americans are politically apathetic and content to lose themselves in one or more of the addictions American culture offers, be it drugs, alcohol, the Internet, video games, celebrity gossip, text-messaging-in essence anything that serves to divert attention from the harshness of reality.
  • the evils committed by those in power can be suffocating, and the sense of powerlessness that erupts from being aware of these evils can be paralyzing, especially when accentuated by the knowledge that government evildoers almost always get away with their crimes
Weiye Loh

How We Know by Freeman Dyson | The New York Review of Books - 0 views

  • Another example illustrating the central dogma is the French optical telegraph.
  • The telegraph was an optical communication system with stations consisting of large movable pointers mounted on the tops of sixty-foot towers. Each station was manned by an operator who could read a message transmitted by a neighboring station and transmit the same message to the next station in the transmission line.
  • The distance between neighbors was about seven miles. Along the transmission lines, optical messages in France could travel faster than drum messages in Africa. When Napoleon took charge of the French Republic in 1799, he ordered the completion of the optical telegraph system to link all the major cities of France from Calais and Paris to Toulon and onward to Milan. The telegraph became, as Claude Chappe had intended, an important instrument of national power. Napoleon made sure that it was not available to private users.
  • ...27 more annotations...
  • Unlike the drum language, which was based on spoken language, the optical telegraph was based on written French. Chappe invented an elaborate coding system to translate written messages into optical signals. Chappe had the opposite problem from the drummers. The drummers had a fast transmission system with ambiguous messages. They needed to slow down the transmission to make the messages unambiguous. Chappe had a painfully slow transmission system with redundant messages. The French language, like most alphabetic languages, is highly redundant, using many more letters than are needed to convey the meaning of a message. Chappe’s coding system allowed messages to be transmitted faster. Many common phrases and proper names were encoded by only two optical symbols, with a substantial gain in speed of transmission. The composer and the reader of the message had code books listing the message codes for eight thousand phrases and names. For Napoleon it was an advantage to have a code that was effectively cryptographic, keeping the content of the messages secret from citizens along the route.
  • After these two historical examples of rapid communication in Africa and France, the rest of Gleick’s book is about the modern development of information technolog
  • The modern history is dominated by two Americans, Samuel Morse and Claude Shannon. Samuel Morse was the inventor of Morse Code. He was also one of the pioneers who built a telegraph system using electricity conducted through wires instead of optical pointers deployed on towers. Morse launched his electric telegraph in 1838 and perfected the code in 1844. His code used short and long pulses of electric current to represent letters of the alphabet.
  • Morse was ideologically at the opposite pole from Chappe. He was not interested in secrecy or in creating an instrument of government power. The Morse system was designed to be a profit-making enterprise, fast and cheap and available to everybody. At the beginning the price of a message was a quarter of a cent per letter. The most important users of the system were newspaper correspondents spreading news of local events to readers all over the world. Morse Code was simple enough that anyone could learn it. The system provided no secrecy to the users. If users wanted secrecy, they could invent their own secret codes and encipher their messages themselves. The price of a message in cipher was higher than the price of a message in plain text, because the telegraph operators could transcribe plain text faster. It was much easier to correct errors in plain text than in cipher.
  • Claude Shannon was the founding father of information theory. For a hundred years after the electric telegraph, other communication systems such as the telephone, radio, and television were invented and developed by engineers without any need for higher mathematics. Then Shannon supplied the theory to understand all of these systems together, defining information as an abstract quantity inherent in a telephone message or a television picture. Shannon brought higher mathematics into the game.
  • When Shannon was a boy growing up on a farm in Michigan, he built a homemade telegraph system using Morse Code. Messages were transmitted to friends on neighboring farms, using the barbed wire of their fences to conduct electric signals. When World War II began, Shannon became one of the pioneers of scientific cryptography, working on the high-level cryptographic telephone system that allowed Roosevelt and Churchill to talk to each other over a secure channel. Shannon’s friend Alan Turing was also working as a cryptographer at the same time, in the famous British Enigma project that successfully deciphered German military codes. The two pioneers met frequently when Turing visited New York in 1943, but they belonged to separate secret worlds and could not exchange ideas about cryptography.
  • In 1945 Shannon wrote a paper, “A Mathematical Theory of Cryptography,” which was stamped SECRET and never saw the light of day. He published in 1948 an expurgated version of the 1945 paper with the title “A Mathematical Theory of Communication.” The 1948 version appeared in the Bell System Technical Journal, the house journal of the Bell Telephone Laboratories, and became an instant classic. It is the founding document for the modern science of information. After Shannon, the technology of information raced ahead, with electronic computers, digital cameras, the Internet, and the World Wide Web.
  • According to Gleick, the impact of information on human affairs came in three installments: first the history, the thousands of years during which people created and exchanged information without the concept of measuring it; second the theory, first formulated by Shannon; third the flood, in which we now live
  • The event that made the flood plainly visible occurred in 1965, when Gordon Moore stated Moore’s Law. Moore was an electrical engineer, founder of the Intel Corporation, a company that manufactured components for computers and other electronic gadgets. His law said that the price of electronic components would decrease and their numbers would increase by a factor of two every eighteen months. This implied that the price would decrease and the numbers would increase by a factor of a hundred every decade. Moore’s prediction of continued growth has turned out to be astonishingly accurate during the forty-five years since he announced it. In these four and a half decades, the price has decreased and the numbers have increased by a factor of a billion, nine powers of ten. Nine powers of ten are enough to turn a trickle into a flood.
  • Gordon Moore was in the hardware business, making hardware components for electronic machines, and he stated his law as a law of growth for hardware. But the law applies also to the information that the hardware is designed to embody. The purpose of the hardware is to store and process information. The storage of information is called memory, and the processing of information is called computing. The consequence of Moore’s Law for information is that the price of memory and computing decreases and the available amount of memory and computing increases by a factor of a hundred every decade. The flood of hardware becomes a flood of information.
  • In 1949, one year after Shannon published the rules of information theory, he drew up a table of the various stores of memory that then existed. The biggest memory in his table was the US Library of Congress, which he estimated to contain one hundred trillion bits of information. That was at the time a fair guess at the sum total of recorded human knowledge. Today a memory disc drive storing that amount of information weighs a few pounds and can be bought for about a thousand dollars. Information, otherwise known as data, pours into memories of that size or larger, in government and business offices and scientific laboratories all over the world. Gleick quotes the computer scientist Jaron Lanier describing the effect of the flood: “It’s as if you kneel to plant the seed of a tree and it grows so fast that it swallows your whole town before you can even rise to your feet.”
  • On December 8, 2010, Gleick published on the The New York Review’s blog an illuminating essay, “The Information Palace.” It was written too late to be included in his book. It describes the historical changes of meaning of the word “information,” as recorded in the latest quarterly online revision of the Oxford English Dictionary. The word first appears in 1386 a parliamentary report with the meaning “denunciation.” The history ends with the modern usage, “information fatigue,” defined as “apathy, indifference or mental exhaustion arising from exposure to too much information.”
  • The consequences of the information flood are not all bad. One of the creative enterprises made possible by the flood is Wikipedia, started ten years ago by Jimmy Wales. Among my friends and acquaintances, everybody distrusts Wikipedia and everybody uses it. Distrust and productive use are not incompatible. Wikipedia is the ultimate open source repository of information. Everyone is free to read it and everyone is free to write it. It contains articles in 262 languages written by several million authors. The information that it contains is totally unreliable and surprisingly accurate. It is often unreliable because many of the authors are ignorant or careless. It is often accurate because the articles are edited and corrected by readers who are better informed than the authors
  • Jimmy Wales hoped when he started Wikipedia that the combination of enthusiastic volunteer writers with open source information technology would cause a revolution in human access to knowledge. The rate of growth of Wikipedia exceeded his wildest dreams. Within ten years it has become the biggest storehouse of information on the planet and the noisiest battleground of conflicting opinions. It illustrates Shannon’s law of reliable communication. Shannon’s law says that accurate transmission of information is possible in a communication system with a high level of noise. Even in the noisiest system, errors can be reliably corrected and accurate information transmitted, provided that the transmission is sufficiently redundant. That is, in a nutshell, how Wikipedia works.
  • The information flood has also brought enormous benefits to science. The public has a distorted view of science, because children are taught in school that science is a collection of firmly established truths. In fact, science is not a collection of truths. It is a continuing exploration of mysteries. Wherever we go exploring in the world around us, we find mysteries. Our planet is covered by continents and oceans whose origin we cannot explain. Our atmosphere is constantly stirred by poorly understood disturbances that we call weather and climate. The visible matter in the universe is outweighed by a much larger quantity of dark invisible matter that we do not understand at all. The origin of life is a total mystery, and so is the existence of human consciousness. We have no clear idea how the electrical discharges occurring in nerve cells in our brains are connected with our feelings and desires and actions.
  • Even physics, the most exact and most firmly established branch of science, is still full of mysteries. We do not know how much of Shannon’s theory of information will remain valid when quantum devices replace classical electric circuits as the carriers of information. Quantum devices may be made of single atoms or microscopic magnetic circuits. All that we know for sure is that they can theoretically do certain jobs that are beyond the reach of classical devices. Quantum computing is still an unexplored mystery on the frontier of information theory. Science is the sum total of a great multitude of mysteries. It is an unending argument between a great multitude of voices. It resembles Wikipedia much more than it resembles the Encyclopaedia Britannica.
  • The rapid growth of the flood of information in the last ten years made Wikipedia possible, and the same flood made twenty-first-century science possible. Twenty-first-century science is dominated by huge stores of information that we call databases. The information flood has made it easy and cheap to build databases. One example of a twenty-first-century database is the collection of genome sequences of living creatures belonging to various species from microbes to humans. Each genome contains the complete genetic information that shaped the creature to which it belongs. The genome data-base is rapidly growing and is available for scientists all over the world to explore. Its origin can be traced to the year 1939, when Shannon wrote his Ph.D. thesis with the title “An Algebra for Theoretical Genetics.
  • Shannon was then a graduate student in the mathematics department at MIT. He was only dimly aware of the possible physical embodiment of genetic information. The true physical embodiment of the genome is the double helix structure of DNA molecules, discovered by Francis Crick and James Watson fourteen years later. In 1939 Shannon understood that the basis of genetics must be information, and that the information must be coded in some abstract algebra independent of its physical embodiment. Without any knowledge of the double helix, he could not hope to guess the detailed structure of the genetic code. He could only imagine that in some distant future the genetic information would be decoded and collected in a giant database that would define the total diversity of living creatures. It took only sixty years for his dream to come true.
  • In the twentieth century, genomes of humans and other species were laboriously decoded and translated into sequences of letters in computer memories. The decoding and translation became cheaper and faster as time went on, the price decreasing and the speed increasing according to Moore’s Law. The first human genome took fifteen years to decode and cost about a billion dollars. Now a human genome can be decoded in a few weeks and costs a few thousand dollars. Around the year 2000, a turning point was reached, when it became cheaper to produce genetic information than to understand it. Now we can pass a piece of human DNA through a machine and rapidly read out the genetic information, but we cannot read out the meaning of the information. We shall not fully understand the information until we understand in detail the processes of embryonic development that the DNA orchestrated to make us what we are.
  • The explosive growth of information in our human society is a part of the slower growth of ordered structures in the evolution of life as a whole. Life has for billions of years been evolving with organisms and ecosystems embodying increasing amounts of information. The evolution of life is a part of the evolution of the universe, which also evolves with increasing amounts of information embodied in ordered structures, galaxies and stars and planetary systems. In the living and in the nonliving world, we see a growth of order, starting from the featureless and uniform gas of the early universe and producing the magnificent diversity of weird objects that we see in the sky and in the rain forest. Everywhere around us, wherever we look, we see evidence of increasing order and increasing information. The technology arising from Shannon’s discoveries is only a local acceleration of the natural growth of information.
  • . Lord Kelvin, one of the leading physicists of that time, promoted the heat death dogma, predicting that the flow of heat from warmer to cooler objects will result in a decrease of temperature differences everywhere, until all temperatures ultimately become equal. Life needs temperature differences, to avoid being stifled by its waste heat. So life will disappear
  • Thanks to the discoveries of astronomers in the twentieth century, we now know that the heat death is a myth. The heat death can never happen, and there is no paradox. The best popular account of the disappearance of the paradox is a chapter, “How Order Was Born of Chaos,” in the book Creation of the Universe, by Fang Lizhi and his wife Li Shuxian.2 Fang Lizhi is doubly famous as a leading Chinese astronomer and a leading political dissident. He is now pursuing his double career at the University of Arizona.
  • The belief in a heat death was based on an idea that I call the cooking rule. The cooking rule says that a piece of steak gets warmer when we put it on a hot grill. More generally, the rule says that any object gets warmer when it gains energy, and gets cooler when it loses energy. Humans have been cooking steaks for thousands of years, and nobody ever saw a steak get colder while cooking on a fire. The cooking rule is true for objects small enough for us to handle. If the cooking rule is always true, then Lord Kelvin’s argument for the heat death is correct.
  • the cooking rule is not true for objects of astronomical size, for which gravitation is the dominant form of energy. The sun is a familiar example. As the sun loses energy by radiation, it becomes hotter and not cooler. Since the sun is made of compressible gas squeezed by its own gravitation, loss of energy causes it to become smaller and denser, and the compression causes it to become hotter. For almost all astronomical objects, gravitation dominates, and they have the same unexpected behavior. Gravitation reverses the usual relation between energy and temperature. In the domain of astronomy, when heat flows from hotter to cooler objects, the hot objects get hotter and the cool objects get cooler. As a result, temperature differences in the astronomical universe tend to increase rather than decrease as time goes on. There is no final state of uniform temperature, and there is no heat death. Gravitation gives us a universe hospitable to life. Information and order can continue to grow for billions of years in the future, as they have evidently grown in the past.
  • The vision of the future as an infinite playground, with an unending sequence of mysteries to be understood by an unending sequence of players exploring an unending supply of information, is a glorious vision for scientists. Scientists find the vision attractive, since it gives them a purpose for their existence and an unending supply of jobs. The vision is less attractive to artists and writers and ordinary people. Ordinary people are more interested in friends and family than in science. Ordinary people may not welcome a future spent swimming in an unending flood of information.
  • A darker view of the information-dominated universe was described in a famous story, “The Library of Babel,” by Jorge Luis Borges in 1941.3 Borges imagined his library, with an infinite array of books and shelves and mirrors, as a metaphor for the universe.
  • Gleick’s book has an epilogue entitled “The Return of Meaning,” expressing the concerns of people who feel alienated from the prevailing scientific culture. The enormous success of information theory came from Shannon’s decision to separate information from meaning. His central dogma, “Meaning is irrelevant,” declared that information could be handled with greater freedom if it was treated as a mathematical abstraction independent of meaning. The consequence of this freedom is the flood of information in which we are drowning. The immense size of modern databases gives us a feeling of meaninglessness. Information in such quantities reminds us of Borges’s library extending infinitely in all directions. It is our task as humans to bring meaning back into this wasteland. As finite creatures who think and feel, we can create islands of meaning in the sea of information. Gleick ends his book with Borges’s image of the human condition:We walk the corridors, searching the shelves and rearranging them, looking for lines of meaning amid leagues of cacophony and incoherence, reading the history of the past and of the future, collecting our thoughts and collecting the thoughts of others, and every so often glimpsing mirrors, in which we may recognize creatures of the information.
Weiye Loh

Miss Malaysia Toy Boy - 7 views

Yes, commodification has led to liberation. After all, capitalism is all about creating new markets for more production and consumption. Beauty has all along been commodified since the oldest trade...

juliet huang

Warfare has moved online - 1 views

military online cyberspace

started by juliet huang on 14 Oct 09 no follow-up yet
Elaine Ong

Cyberwars for the ultimate good? - 4 views

http://www.nytimes.com/2009/08/02/us/politics/02cyber.html?_r=1 In 2003, the Pentagon and American intelligence agencies made plans for a cyberattack to freeze billions of dollars in the bank acco...

started by Elaine Ong on 13 Oct 09 no follow-up yet
Weiye Loh

Is Assange the "world-spirit embodied"? A Hegel scholar reports fro... - 0 views

  • Although the atmosphere at the Troxy was very genial, and Žižek generally enthusiastic about WikiLeaks (as he was in the London Review of Books article he published about it), there was a distinct tension between the rather standard Enlightenment rhetoric employed by Assange (more facts, a more complete historical record, better educated journalists)  and the significantly more radical conclusions the philosopher was drawing. This is why - whilst it should no doubt be read in a similar light as Žižek’s own remarks on his position during the conversation (I feel now like that Stalinist commentator: the leader has spoken, I provide the deeper meaning) - the ventured analogy nevertheless contains a kernel of truth beyond its bombast: defining the emancipatory significance of phenomena should not be left to the actors alone.
  • in response to Goodman's initial question on the significance of the Iraq war logs, Assange primarily emphasized the concrete revelations WikiLeaks had provided. He mentioned the 400.000 cables leaked, 15.000 previously unreported deaths revealed, a video of an American helicopter mowing down civilians, and so on. In contrast, Žižek went far enough to say that even if WikiLeaks had not revealed a single new thing, it should be considered game-changing. Why? Because of the very way it functions. For the philosopher, our democracies not only have rules regarding what can be revealed, but also rules which regulate the transgression of those first rules (the independent press, NGOs, etc). The contention then is that WikiLeaks operates outside both these sets of rules, and that there is the source of its power.
  • the reply was firmly anchored in the key trope Žižek has championed since his first major work in English: that ideology in today's "post-ideological" world is not dead, but rather more powerful than ever - alive not so much on the level of knowledge but in the ways it structures social reality itself.
  • ...2 more annotations...
  • Žižek points out, the innocence of the accusers is anything but innocent; they decry the violence of WikiLeaks revelations, themselves oblivious to the military, economic, political and social framework of everyday violence that goes unmentioned in public discourse. The violence of leaks is on a formal level, and precisely this is at the root of the Slovene’s exclamation to Assange: “Yes, you are a terrorist, but by God, then what are they?”
  • WikiLeaks should not be seen as merely another chapter in investigative journalism and free flow of information, but a positive, subversive emancipatory force by virtue of the way it operates outside the system of secrets and allowed revelations. What then remains ahead is the hard task of keeping this subversive strength alive.
  •  
     in response to Goodman's initial question on the significance of the Iraq war logs, Assange primarily emphasized the concrete revelations WikiLeaks had provided. He mentioned the 400.000 cables leaked, 15.000 previously unreported deaths revealed, a video of an American helicopter mowing down civilians, and so on. In contrast, Žižek went far enough to say that even if WikiLeaks had not revealed a single new thing, it should be considered game-changing. Why? Because of the very way it functions. For the philosopher, our democracies not only have rules regarding what can be revealed, but also rules which regulate the transgression of those first rules (the independent press, NGOs, etc). The contention then is that WikiLeaks operates outside both these sets of rules, and that there is the source of its power.
1 - 20 of 21 Next ›
Showing 20 items per page