Skip to main content

Home/ TOK Friends/ Group items tagged anonymity

Rss Feed Group items tagged

Javier E

In Defense of Anonymous Political Giving - NYTimes.com - 0 views

  • In partisan terms, the growth of secrecy in campaign finance has been driven by the political right, as shown in the graphic at Figure 2. Of the $310.8 million in total political spending by nondisclosing groups in 2011-12, $265.2 million, or 85.5 percent, was spent by conservative, pro-Republican organizations (red in the pie chart), and $10.9 million, or 11.2 percent, was spent by liberal, pro-Democratic organizations (blue in the chart).
  • “The rationale behind donor anonymity, which is a form of First Amendment speech, is to protect against the threat of retaliation when someone or some group takes a stand, espouses their point of view or articulates a position on issues that may (or may not) be popular with the general public or the political party in majority power. There are many precedents to this: the Federalist Papers were published under pseudonyms and financed anonymously, out of fear of retribution.”
  • do you have a principled answer to the argument that efforts to influence the political and policy-making process should be as transparent and open as possible because voters deserve to know who is trying to persuade them to take stands on issues of major public importance? More simply: Is transparency an essential ingredient of democracy? What overrides transparency?
  • ...1 more annotation...
  • Scalia declared that “a person who is required to put his name to a document is much less likely to lie than one who can lie anonymously.”Scalia concluded: “I can imagine no reason why an anonymous leaflet is any more honorable, as a general matter, than an anonymous phone call or an anonymous letter. It facilitates wrong by eliminating accountability, which is ordinarily the very purpose of the anonymity.”
Javier E

Seeking privacy, teens turn to anonymous-messaging apps - The Washington Post - 0 views

  • Anonymous and ephemeral, apps such as Whisper, Secret, Ask.fm and Snapchat fill a growing demand among teens for more fun, less accountability and more privacy online.
  • As teens look increasingly for alternatives to the social giants Facebook and Twitter, the anonymous apps create the opportunity for bullying and cruelty in a forum where they cannot be tracked.
  • the popular anonymous question-and-answer forum Ask.fm has become a magnet for cyberbullying.
  • ...3 more annotations...
  • when parents, grandparents and Little League coaches became core users of Facebook, kids naturally gravitated to new places where they could socialize away from the watchful eye of adults, experts say.
  • “The worst stuff happens on the anonymous sites because people are either too scared to say something to someone’s face or they want to present someone with public humiliation,” Olivia said.
  • Numerous psychological studies show conflict is often resolved when people talk face-to-face. When people can see signs of sadness or other emotions, they tend to back down. Facebook said the majority of users who are flagged for abusive or bullying conduct never do it again. On the anonymous sites, there are no such brakes on negative behavior.
Javier E

Owner of Anonymous Hackers-for-Hire Site Steps Forward - NYTimes.com - 0 views

  • He calls himself an ethical hacker who helps companies and individuals fight back against the bad guys operating online. Over the years, Charles Tendell also has emerged as a commentator in the news media about the threat posed by overseas hackers and is a former co-host of an online radio show about security.
  • But behind the scenes, Mr. Tendell, a Colorado resident and a decorated Iraq War veteran, started a new website called Hacker’s List that allows people to anonymously post bids to hire a hacker. Many users have sought to find someone to steal an email password, break into a Facebook account or change a school grade.
  • The propensity is for people to use it as a way to search for hackers willing to break the law as opposed to doing legitimate online investigations and surveillance.
  • ...2 more annotations...
  • The lack of disclosure surrounding Hacker’s List is one reason the hackers-for-hire service has drawn considerable scorn from security consultants, who say the website is an invitation to illegal and unethical behavior.
  • It’s inappropriate for someone like Mr. Tendell, who calls himself a “white hat hacker,” to be involved in any way with an operation that potentially is profiting from illegal activity, Mr. Solomonson said.
Javier E

Rude Behavior Can Have Costs Beyond Hurt Feelings - NYTimes.com - 1 views

  • author of “How Rude!: The Teenager’s Guide to Good Manners” (Free Spirit Publishing, 1997), went further. “I would be the first to say that there has been an absolute collapse of civility in the past generation or two,” Mr. Packer said. “So much of communications is once removed that it adds a layer of distance and anonymity that can only worsen manners.
  • the major causes of incivility were anonymity, stress, lack of time, lack of restraint and insecurity.
  • we’re certainly seeing greater stress and more ability to lash out anonymously through the Internet and texting. “The more volatile the mixture, the more uncivil we become,
  • ...1 more annotation...
  • 60 percent of disrespectful behavior came from above, 20 percent from colleagues on the same level and 20 percent from below. And half said they decreased their effort on the job after experiencing ongoing rude behavior
Javier E

Never Forgetting a Face - NYTimes.com - 1 views

  • Face-matching today could enable mass surveillance, “basically robbing everyone of their anonymity,” he says, and inhibit people’s normal behavior outside their homes.
  • Dr. Atick says the technology he helped cultivate requires some special safeguards. Unlike fingerprinting or other biometric techniques, face recognition can be used at a distance, without people’s awareness; it could then link their faces and identities to the many pictures they have put online. But in the United States, no specific federal law governs face recognition.
  • some casinos faceprint visitors, seeking to identify repeat big-spending customers for special treatment. In Japan, a few grocery stores use face-matching to classify some shoppers as shoplifters or even “complainers” and blacklist them.
  • ...7 more annotations...
  • Facebook researchers recently reported how the company had developed a powerful pattern-recognition system, called DeepFace, which had achieved near-human accuracy in identifying people’s faces.
  • To work, the technology needs a large data set, called an image gallery, containing the photographs or video stills of faces already identified by name. Software automatically converts the topography of each face in the gallery into a unique mathematical code, called a faceprint. Once people are faceprinted, they may be identified in existing or subsequent photographs or as they walk in front of a video camera.
  • Dr. Atick has been working behind the scenes to influence the outcome. He is part of a tradition of scientists who have come to feel responsible for what their work has wrought.
  • Is faceprinting as innocuous as photography, an activity that people may freely perform? Or is a faceprint a unique indicator, like a fingerprint or a DNA sequence, that should require a person’s active consent before it can be collected, matched, shared or sold?
  • A private high school in Los Angeles also has an FST system. The school uses the technology to recognize students when they arrive — a security measure intended to keep out unwanted interlopers. But it also serves to keep the students in line.“If a girl will come to school at 8:05, the door will not open and she will be registered as late,” Mr. Farkash explained. “So you can use the system not only for security but for education, for better discipline.”
  • As with many emerging technologies, the arguments tend to coalesce around two predictable poles: those who think the technology needs rules and regulation to prevent violations of civil liberties and those who fear that regulation would stifle innovation. But face recognition stands out among such technologies: While people can disable smartphone geolocation and other tracking techniques, they can’t turn off their faces.
  • To maintain the status quo around public anonymity, he says, companies should take a number of steps: They should post public notices where they use face recognition; seek permission from a consumer before collecting a faceprint with a unique, repeatable identifier like a name or code number; and use faceprints only for the specific purpose for which they have received permission. Those steps, he says, would inhibit sites, stores, apps and appliances from covertly linking a person in the real world with their multiple online personas.
Javier E

How to Invent a Person Online - Curtis Wallen - The Atlantic - 2 views

  • Social networks and data brokers use algorithms and probabilities to reconstruct our identities, and then try to influence the way we think and feel and make decisions.
  • t’s not an exaggeration to say everything you do online is being followed. And the more precisely a company can tailor your online experience, the more money it can make from advertisers.
  • After Edward Snowden’s leaks about NSA surveillance, Tucker and Marthews found, the frequency of these sensitive search terms declined—suggesting that Internet users have become less likely to explore "search terms that they [believe] might get them in trouble with the U.S. government." The study also found that people have become less likely to search "embarrassing" topics
  • ...7 more annotations...
  • In other words, people are doing their best to blend in with the crowd.
  • The challenge of achieving true anonymity, though, is that evading surveillance makes your behavior anomalous—and anomalies stick out. As the Japanese proverb says, "A nail that sticks out gets hammered down." Glenn Greenwald explained recently that simply using encryption can make you a target. For me, this was all the more motivation to disappear.
  • The U.S. Department of Defense has also figured out how influential Facebook and Twitter can be. In 2011, it announced a new “Social Media in Strategic Communication” (SMISC) program to detect and counter information the U.S. government deemed dangerous. “Since everyone is potentially an influencer on social media and is capable of spreading information,” one researcher involved in a SMISC study told The Guardian, “our work aims to identify and engage the right people at the right time on social media to help propagate information when needed.”
  • For those of us who feel confident that we have nothing to hide, the future of Internet security might not seem like a major concern. But we underestimate the many ways in which our online identities can be manipulated.
  • Private companies are also using personal information in hidden ways. They don’t simply learn our tastes and habits, offering us more of what want and less of what we don’t. As Michael Fertik wrote in a 2013 Scientific American article titled “The Rich See a Different Internet Than the Poor,” credit lenders have the ability to hide their offers from people who may need loans the most. And Google now has a patent to change its prices based on who’s buying. 
  • It is essentially impossible to achieve anonymity online. It requires a complete operational posture that extends from the digital to the physical. Downloading a secure messaging app and using Tor won’t all of a sudden make you “NSA-proof.” And doing it right is really, really hard.
  • Weighing these trade-offs in my day-to-day life led to a few behavioral changes, but I have a mostly normal relationship with the Internet—I deleted my Facebook account, I encrypt my emails whenever I can, and I use a handful of privacy minded browser extensions. But even those are steps many people are unwilling, or unable, to take.
Javier E

Upending Anonymity, These Days the Web Unmasks Everyone - NYTimes.com - 0 views

  • The collective intelligence of the Internet’s two billion users, and the digital fingerprints that so many users leave on Web sites, combine to make it more and more likely that every embarrassing video, every intimate photo, and every indelicate e-mail is attributed to its source, whether that source wants it to be or not. This intelligence makes the public sphere more public than ever before and sometimes forces personal lives into public view.
  • the positive effects can be numerous: criminality can be ferreted out, falsehoods can be disproved and individuals can become Internet icons.
  • “Humans want nothing more than to connect, and the companies that are connecting us electronically want to know who’s saying what, where,” said Susan Crawford, a professor at the Benjamin N. Cardozo School of Law. “As a result, we’re more known than ever before.”
  • ...2 more annotations...
  • This growing “publicness,” as it is sometimes called, comes with significant consequences for commerce, for political speech and for ordinary people’s right to privacy. There are efforts by governments and corporations to set up online identity systems.
  • He posited that because the Internet “can’t be made to forget” images and moments from the past, like an outburst on a train or a kiss during a riot, “the reality of an inescapable public world is an issue we are all going to hear a lot more about.”
Javier E

Technology's Man Problem - NYTimes.com - 0 views

  • computer engineering, the most innovative sector of the economy, remains behind. Many women who want to be engineers encounter a field where they not only are significantly underrepresented but also feel pushed away.
  • Among the women who join the field, 56 percent leave by midcareer, a startling attrition rate that is double that for men, according to research from the Harvard Business School.
  • A culprit, many people in the field say, is a sexist, alpha-male culture that can make women and other people who don’t fit the mold feel unwelcome, demeaned or even endangered.
  • ...12 more annotations...
  • “I’ve been a programmer for 13 years, and I’ve always been one of the only women and queer people in the room. I’ve been harassed, I’ve had people make suggestive comments to me, I’ve had people basically dismiss my expertise. I’ve gotten rape and death threats just for speaking out about this stuff.”
  • “We see these stories, ‘Why aren’t there more women in computer science and engineering?’ and there’s all these complicated answers like, ‘School advisers don’t have them take math and physics,’ and it’s probably true,” said Lauren Weinstein, a man who has spent his four-decade career in tech working mostly with other men, and is currently a consultant for Google.“But I think there’s probably a simpler reason,” he said, “which is these guys are just jerks, and women know it.”
  • once programming gained prestige, women were pushed out. Over the decades, the share of women in computing has continued to decline. In 2012, just 18 percent of computer-science college graduates were women, down from 37 percent in 1985, according to the National Center for Women & Information Technology.
  • Some 1.2 million computing jobs will be available in 2022, yet United States universities are producing only 39 percent of the graduates needed to fill them, the N.C.W.I.T. estimates.
  • an engineer at Pinterest has collected data from people at 133 start-ups and found that an average of 12 percent of the engineers are women.
  • Twenty percent of software developers are women, according to the Labor Department, and fewer than 6 percent of engineers are black or Hispanic. Comparatively, 56 percent of people in business and financial-operations jobs are women, as are 36 percent of physicians and surgeons and one-third of lawyers.
  • “It makes a hostile environment for me,” she said. “But I don’t want to raise my hand and call negative attention toward myself, and become the woman who is the problem — ‘that woman.’ In start-up culture they protect their own tribe, so by putting my hand up, I’m saying I’m an ‘other,’ I shouldn’t be there, so for me that’s an economic threat.”
  • “Many women have come to me and said they basically have had to hide on the Net now,” said Mr. Weinstein, who works on issues of identity and anonymity online. “They use male names, they don’t put their real photos up, because they are immediately targeted and harassed.”
  • “It’s a boys’ club, and you have to try to get into it, and they’re trying as hard as they can to prove you can’t,” said Ephrat Bitton, the director of algorithms at FutureAdvisor, an online investment start-up that she says has a better culture because almost half the engineers are women.
  • Writing code is a high-pressure job with little room for error, as are many jobs. But coding can be stressful in a different way, women interviewed for this article said, because code reviews — peer reviews to spot mistakes in software — can quickly devolve.
  • “Code reviews are brutal — ‘Mine is better than yours, I see flaws in yours’ — and they should be, for the creation of good software,” said Ellen Ullman, a software engineer and author. “I think when you add a drop of women into it, it just exacerbates the problem, because here’s a kind of foreigner.”
  • But some women argue that these kinds of initiatives are unhelpful.“My general issue with the coverage of women in tech is that women in the technology press are talked about in the context of being women, and men are talked about in the context of being in technology,” said a technical woman who would speak only on condition of anonymity because she did not want to be part of an article about women in tech.
Javier E

A scholar asks, 'Can democracy survive the Internet?' - The Washington Post - 0 views

  • Nathaniel Persily, a law professor at Stanford University
  • has written about this in a forthcoming issue of the Journal of Democracy in an article with a title that sums up his concerns: “Can Democracy Survive the Internet?”
  • Persily argues that the 2016 campaign broke down previously established rules and distinctions “between insiders and outsiders, earned media and advertising, media and non-media, legacy media and new media, news and entertainment and even foreign and domestic sources of campaign communication.”
  • ...10 more annotations...
  • Clinton played by old rules; Trump did not. He recognized the potential rewards of exploiting what the Internet offered, and he conducted his campaign through unconventional means.
  • “That’s what Donald Trump realized that a lot of us didn’t,” Persily said. “That it was more important to swamp the communication environment than it was to advocate for a particular belief or fight for the truth of a particular story,”
  • Persily notes that the Internet reacted to the Trump campaign “like an ecosystem welcoming a new and foreign species. His candidacy triggered new strategies and promoted established Internet forces. Some of these (such as the ‘alt-right’) were moved by ideological affinity, while others sought to profit financially or to further a geopolitical agenda.
  • The rise and power of the Internet has accelerated the decline of institutions that once provided a mediating force in campaigns. Neither the legacy media nor the established political parties exercise the power they once had as referees, particularly in helping to sort out the integrity of information.
  • legacy media that once helped set the agenda for political conversation now often take their cues from new media.
  • The Internet, however, involves characteristics that heighten the disruptive and damaging influences on political campaigns. One, Persily said, is the velocity of information, the speed with which news, including fake news, moves and expands and is absorbed. Viral communication can create dysfunction in campaigns and within democracies.
  • Another factor is the pervasiveness of anonymous communication, clearly greater and more odious today. Anonymity facilitates a coarsening of speech on the Internet. It has become more and more difficult to determine the sources of such information, including whether these communications are produced by real people or by automated programs known as “bots.”
  • “the prevalence of bots in spreading propaganda and fake news appears to have reached new heights. One study found that between 16 September and 21 October 2016, bots produced about a fifth of all tweets related to the upcoming election. Across all three presidential debates, pro-Trump twitter bots generated about four times as many tweets as pro-Clinton bots. During the final debate in particular, that figure rose to seven times as many.”
  • the fear of dark money and “shady outsiders” running television commercials “seems quaint when compared to networks of thousands of bots of uncertain geographic origin creating automated messages designed to malign candidates and misinform voters.”
  • When asked how worrisome all this is, Persily said, “I’m extremely concerned.” He was quick to say he did not believe government should or even could regulate this new environment. But, he said, “We need to come to grips with how the new communication environment affects people’s political beliefs, the information they receive and then the choices that they make.”
Javier E

If Russia can create fake 'Black Lives Matter' accounts, who will next? - The Washingto... - 2 views

  • As in the past, the Russian advertisements did not create ethnic strife or political divisions, either in the United States or in Europe. Instead, they used divisive language and emotive messages to exacerbate existing divisions.
  • The real problem is far broader than Russia: Who will use these methods next — and how?
  • I can imagine multiple groups, many of them proudly American, who might well want to manipulate a range of fake accounts during a riot or disaster to increase anxiety or fear.
  • ...3 more annotations...
  • There is no big barrier to entry in this game: It doesn’t cost much, it doesn’t take much time, it isn’t particularly high-tech, and it requires no special equipment.
  • Facebook, Google and Twitter, not Russia, have provided the technology to create fake accounts and false advertisements, as well as the technology to direct them at particular parts of the population.
  • There is no reason existing laws on transparency in political advertising, on truth in advertising or indeed on libel should not apply to social media as well as traditional media. There is a better case than ever against anonymity, at least against anonymity in the public forums of social media and comment sections, as well as for the elimination of social-media bots.
Javier E

Silicon Valley's Safe Space - The New York Times - 0 views

  • The roots of Slate Star Codex trace back more than a decade to a polemicist and self-described A.I. researcher named Eliezer Yudkowsky, who believed that intelligent machines could end up destroying humankind. He was a driving force behind the rise of the Rationalists.
  • Because the Rationalists believed A.I. could end up destroying the world — a not entirely novel fear to anyone who has seen science fiction movies — they wanted to guard against it. Many worked for and donated money to MIRI, an organization created by Mr. Yudkowsky whose stated mission was “A.I. safety.”
  • The community was organized and close-knit. Two Bay Area organizations ran seminars and high-school summer camps on the Rationalist way of thinking.
  • ...27 more annotations...
  • “The curriculum covers topics from causal modeling and probability to game theory and cognitive science,” read a website promising teens a summer of Rationalist learning. “How can we understand our own reasoning, behavior, and emotions? How can we think more clearly and better achieve our goals?”
  • Some lived in group houses. Some practiced polyamory. “They are basically just hippies who talk a lot more about Bayes’ theorem than the original hippies,” said Scott Aaronson, a University of Texas professor who has stayed in one of the group houses.
  • For Kelsey Piper, who embraced these ideas in high school, around 2010, the movement was about learning “how to do good in a world that changes very rapidly.”
  • Yes, the community thought about A.I., she said, but it also thought about reducing the price of health care and slowing the spread of disease.
  • Slate Star Codex, which sprung up in 2013, helped her develop a “calibrated trust” in the medical system. Many people she knew, she said, felt duped by psychiatrists, for example, who they felt weren’t clear about the costs and benefits of certain treatment.
  • That was not the Rationalist way.
  • “There is something really appealing about somebody explaining where a lot of those ideas are coming from and what a lot of the questions are,” she said.
  • Sam Altman, chief executive of OpenAI, an artificial intelligence lab backed by a billion dollars from Microsoft. He was effusive in his praise of the blog.It was, he said, essential reading among “the people inventing the future” in the tech industry.
  • Mr. Altman, who had risen to prominence as the president of the start-up accelerator Y Combinator, moved on to other subjects before hanging up. But he called back. He wanted to talk about an essay that appeared on the blog in 2014.The essay was a critique of what Mr. Siskind, writing as Scott Alexander, described as “the Blue Tribe.” In his telling, these were the people at the liberal end of the political spectrum whose characteristics included “supporting gay rights” and “getting conspicuously upset about sexists and bigots.”
  • But as the man behind Slate Star Codex saw it, there was one group the Blue Tribe could not tolerate: anyone who did not agree with the Blue Tribe. “Doesn’t sound quite so noble now, does it?” he wrote.
  • Mr. Altman thought the essay nailed a big problem: In the face of the “internet mob” that guarded against sexism and racism, entrepreneurs had less room to explore new ideas. Many of their ideas, such as intelligence augmentation and genetic engineering, ran afoul of the Blue Tribe.
  • Mr. Siskind was not a member of the Blue Tribe. He was not a voice from the conservative Red Tribe (“opposing gay marriage,” “getting conspicuously upset about terrorists and commies”). He identified with something called the Grey Tribe — as did many in Silicon Valley.
  • The Grey Tribe was characterized by libertarian beliefs, atheism, “vague annoyance that the question of gay rights even comes up,” and “reading lots of blogs,” he wrote. Most significantly, it believed in absolute free speech.
  • The essay on these tribes, Mr. Altman told me, was an inflection point for Silicon Valley. “It was a moment that people talked about a lot, lot, lot,” he said.
  • And in some ways, two of the world’s prominent A.I. labs — organizations that are tackling some of the tech industry’s most ambitious and potentially powerful projects — grew out of the Rationalist movement.
  • In 2005, Peter Thiel, the co-founder of PayPal and an early investor in Facebook, befriended Mr. Yudkowsky and gave money to MIRI. In 2010, at Mr. Thiel’s San Francisco townhouse, Mr. Yudkowsky introduced him to a pair of young researchers named Shane Legg and Demis Hassabis. That fall, with an investment from Mr. Thiel’s firm, the two created an A.I. lab called DeepMind.
  • Like the Rationalists, they believed that A.I could end up turning against humanity, and because they held this belief, they felt they were among the only ones who were prepared to build it in a safe way.
  • In 2014, Google bought DeepMind for $650 million. The next year, Elon Musk — who also worried A.I. could destroy the world and met his partner, Grimes, because they shared an interest in a Rationalist thought experiment — founded OpenAI as a DeepMind competitor. Both labs hired from the Rationalist community.
  • Mr. Aaronson, the University of Texas professor, was turned off by the more rigid and contrarian beliefs of the Rationalists, but he is one of the blog’s biggest champions and deeply admired that it didn’t avoid live-wire topics.
  • “It must have taken incredible guts for Scott to express his thoughts, misgivings and questions about some major ideological pillars of the modern world so openly, even if protected by a quasi-pseudonym,” he said
  • In late June of last year, not long after talking to Mr. Altman, the OpenAI chief executive, I approached the writer known as Scott Alexander, hoping to get his views on the Rationalist way and its effect on Silicon Valley. That was when the blog vanished.
  • The issue, it was clear to me, was that I told him I could not guarantee him the anonymity he’d been writing with. In fact, his real name was easy to find because people had shared it online for years and he had used it on a piece he’d written for a scientific journal. I did a Google search for Scott Alexander and one of the first results I saw in the auto-complete list was Scott Alexander Siskind.
  • More than 7,500 people signed a petition urging The Times not to publish his name, including many prominent figures in the tech industry. “Putting his full name in The Times,” the petitioners said, “would meaningfully damage public discourse, by discouraging private citizens from sharing their thoughts in blog form.” On the internet, many in Silicon Valley believe, everyone has the right not only to say what they want but to say it anonymously.
  • I spoke with Manoel Horta Ribeiro, a computer science researcher who explores social networks at the Swiss Federal Institute of Technology in Lausanne. He was worried that Slate Star Codex, like other communities, was allowing extremist views to trickle into the influential tech world. “A community like this gives voice to fringe groups,” he said. “It gives a platform to people who hold more extreme views.”
  • I assured her my goal was to report on the blog, and the Rationalists, with rigor and fairness. But she felt that discussing both critics and supporters could be unfair. What I needed to do, she said, was somehow prove statistically which side was right.
  • When I asked Mr. Altman if the conversation on sites like Slate Star Codex could push people toward toxic beliefs, he said he held “some empathy” for these concerns. But, he added, “people need a forum to debate ideas.”
  • In August, Mr. Siskind restored his old blog posts to the internet. And two weeks ago, he relaunched his blog on Substack, a company with ties to both Andreessen Horowitz and Y Combinator. He gave the blog a new title: Astral Codex Ten. He hinted that Substack paid him $250,000 for a year on the platform. And he indicated the company would give him all the protection he needed.
Javier E

Campaigns Mine Personal Lives to Get Out Vote - NYTimes.com - 0 views

  • Strategists affiliated with the Obama and Romney campaigns say they have access to information about the personal lives of voters at a scale never before imagined. And they are using that data to try to influence voting habits — in effect, to train voters to go to the polls through subtle cues, rewards and threats in a manner akin to the marketing efforts of credit card companies and big-box retailers.
  • In the weeks before Election Day, millions of voters will hear from callers with surprisingly detailed knowledge of their lives. These callers — friends of friends or long-lost work colleagues — will identify themselves as volunteers for the campaigns or independent political groups. The callers will be guided by scripts and call lists compiled by people — or computers — with access to details like whether voters may have visited pornography Web sites, have homes in foreclosure, are more prone to drink Michelob Ultra than Corona or have gay friends or enjoy expensive vacations.
  • “You don’t want your analytical efforts to be obvious because voters get creeped out,” said a Romney campaign official who was not authorized to speak to a reporter. “A lot of what we’re doing is behind the scenes.”
  • ...4 more annotations...
  • however, consultants to both campaigns said they had bought demographic data from companies that study details like voters’ shopping histories, gambling tendencies, interest in get-rich-quick schemes, dating preferences and financial problems. The campaigns themselves, according to campaign employees, have examined voters’ online exchanges and social networks to see what they care about and whom they know. They have also authorized tests to see if, say, a phone call from a distant cousin or a new friend would be more likely to prompt the urge to cast a ballot.
  • The campaigns have planted software known as cookies on voters’ computers to see if they frequent evangelical or erotic Web sites for clues to their moral perspectives. Voters who visit religious Web sites might be greeted with religion-friendly messages when they return to mittromney.com or barackobama.com. The campaigns’ consultants have run experiments to determine if embarrassing someone for not voting by sending letters to their neighbors or posting their voting histories online is effective.
  • “I’ve had half-a-dozen conversations with third parties who are wondering if this is the year to start shaming,” said one consultant who works closely with Democratic organizations. “Obama can’t do it. But the ‘super PACs’ are anonymous. They don’t have to put anything on the flier to let the voter know who to blame.”
  • Officials at both campaigns say the most insightful data remains the basics: a voter’s party affiliation, voting history, basic information like age and race, and preferences gleaned from one-on-one conversations with volunteers. But more subtle data mining has helped the Obama campaign learn that their supporters often eat at Red Lobster, shop at Burlington Coat Factory and listen to smooth jazz. Romney backers are more likely to drink Samuel Adams beer, eat at Olive Garden and watch college football.
Javier E

New Pope? I've Given Up Hope - NYTimes.com - 0 views

  • A gift for eternal truths is as dangerous as the gift of Midas’s touch. The pope cannot undo the eternal truths he has proclaimed.
  • How could Paul VI say that Pius XI, in his 1930 encyclical Casti Connubii, had misled the people in such a serious way? If he admitted it, what would happen to his own authority as moral arbiter in matters of heaven and hell? So Paul VI doubled down, adding another encyclical in 1968, Humanae Vitae, to the unrenounceable eternal truths that pile up around a moral monarch.
  • In 1859, John Henry Newman published an article that led to his denunciation in Rome as “the most dangerous man in England.” It was called “On Consulting the Faithful in Matters of Doctrine” and it showed that in history the laity had been more true to the Gospel than the hierarchy.
  • ...1 more annotation...
  • There were no priests in Peter’s time, and no popes. Paul never called himself or any of his co-workers priests. He did not offer sacrifice. Those ideas came in later, through weird arguments contained in the anonymous Epistle to the Hebrews. The claim of priests and popes to be the sole conduits of grace is a remnant of the era of papal monarchy. We are watching that era fade.
Javier E

Virtually Emotional « The Dish - 0 views

  • I don’t see online interaction as easily separable from real-life human interaction any more. We spend more and more time communicating with one another virtually rather than physically. But these communications are still between human beings, with all our foibles and needs and crushes and hatreds and, if we’re lucky, wit and humor. We do not cease being human online; but we do wear a kind of mask, concealing some things, revealing others – whether on a blog or a hook-up app or a list-serv or a Facebook wall. And if you spend more hours a day communicating that way, you haven’t stopped living. You’re actually slowly becoming another person on top of your regular self.
  • This is the current reality for a lot of us. We meet many more people virtually than on the street or in our physical daily lives. We also get to know them more. The anonymity of the web can allow people not just to trash talk in a way they wouldn’t in real life but to sext and love-talk with strangers they’ve only seen pictures of. Some of this may actually be more authentic an expression of ourselves than anything we have the courage to say to someone’s face.
  • the more time we live virtually, the more we will reproduce aspects of our pre-virtual life online. Including love. And this strange, amazing story was about love, not sex. It was about a panicked, conflicted young gay man knowing he would be rebuffed by his straight crush and setting up a fantasy where he could become a virtual woman to have a relationship with him.
  • ...1 more annotation...
  • Increasingly, we seem to live parallel lives – as a person with a body and as an online avatar. Comedy and tragedy will doubtless ensue. That’s what masks can do.
Emily Horwitz

News from The Associated Press - 0 views

  • If you saw the film "Argo," no, you didn't miss this development, which is recounted in Mendez's book about the real-life operation. It wasn't there because director Ben Affleck and screenwriter Chris Terrio replaced it with an even more dramatic scenario, involving canceled flight reservations, suspicious Iranian officials who call the Hollywood office of the fake film crew (a call answered just in time), and finally a heart-pounding chase on the tarmac just as the plane's wheels lift off, seconds from catastrophe.
  • they've caught some flak for the liberties they took in the name of entertainment.
  • And they aren't alone - two other high-profile best-picture nominees this year, Kathryn Bigelow's "Zero Dark Thirty" and Steven Spielberg's "Lincoln," have also been criticized for different sorts of factual issues.
  • ...15 more annotations...
  • But because these three major films are in contention, the issue has come to the forefront of this year's Oscar race, and with it a thorny cultural question: Does the audience deserve the truth, the whole truth and nothing but? Surely not, but just how much fiction is OK?
  • In response to a complaint by a Connecticut congressman, Kushner acknowledged he'd changed the details for dramatic effect, having two Connecticut congressmen vote against the amendment when, in fact, all four voted for it. (The names of those congressmen were changed, to avoid changing the vote of specific individuals.)
  • Kushner said he had "adhered to time-honored and completely legitimate standards for the creation of historical drama, which is what `Lincoln' is. I hope nobody is shocked to learn that I also made up dialogue and imagined encounters and invented characters."
  • "Maybe changing the vote went too far," says Richard Walter, chairman of screenwriting at the University of California, Los Angeles. "Maybe there was another way to do it. But really, it's not terribly important. People accept that liberties will be taken. A movie is a movie. People going for a history lesson are going to the wrong place."
  • Walter says he always tells his students: "Go for the feelings. Because the only thing that's truly real in the movies are the feelings that people feel when they watch."
  • No subject or individual's life is compelling and dramatic enough by itself, he says, that it neatly fits into a script with three acts, subplots, plot twists and a powerful villain.
  • Reeves, who actually gave the "Lincoln" script a negative review because he thought it was too heavy on conversation and lacking action. He adds, though, that when the subject is as famous as Lincoln, one has a responsibility to be more faithful to the facts.
  • "This is fraught territory," he says. "You're always going to have to change something, and you're always going to get in some sort of trouble, with somebody," he says.
  • Futterman also doesn't begrudge the "Argo" filmmakers, because he feels they use a directorial style that implies some fun is being had with the story. "All the inside joking about Hollywood - tonally, you get a sense that something is being played with," he says.
  • Futterman says he was sympathetic to those concerns and would certainly have addressed them in the script, had he anticipated them.
  • Of the three Oscar-nominated films in question, "Zero Dark Thirty" has inspired the most fervent debate. The most intense criticism, despite acclaim for the filmmaking craft involved, has been about its depictions of interrogations, with some, including a group of senators, saying the film misleads viewers for suggesting that torture provided information that helped the CIA find Osama bin Laden.
  • have been questions about the accuracy of the depiction of the main character, a CIA officer played by Jessica Chastain; the real person - or even combination of people, according to some theories - that she plays remains anonymous.
  • screenwriters have a double responsibility: to the material and to the audience.
  • The debate over "Argo" has been much less intense, though there has been some grumbling from former officials in Britain and New Zealand that their countries were portrayed incorrectly in the film as offering no help at all to the six Americans, whereas actually, as Mendez writes, they did provide some help.
  • "When I am hungry and crave a tuna fish sandwich, I don't go to a hardware store," he says. "When I seek a history lesson, I do not go to a movie theater. I loved `Argo' even though I know there was no last-minute turn-around via a phone call from President Carter, nor were there Iranian police cars chasing the plane down the tarmac as it took off. So what? These conceits simply make the movie more exciting."
  •  
    This article reaffirmed my feelings that we can't trust everything that we see or hear through the media, because it is often skewed to better captivate the target audience. As the article stated, there appears to be a fine line in catering to the attention span of the audience, and respecting the known facts of a given event that is portrayed by a movie.
Javier E

Deeper Ties to Corporate Cash for Doubtful Climate Researcher - NYTimes.com - 1 views

  • For years, politicians wanting to block legislation on climate change have bolstered their arguments by pointing to the work of a handful of scientists who claim that greenhouse gases pose little risk to humanity.
  • One of the names they invoke most often is Wei-Hock Soon, known as Willie, a scientist at the Harvard-Smithsonian Center for Astrophysics who claims that variations in the sun’s energy can largely explain recent global warming.
  • He has accepted more than $1.2 million in money from the fossil-fuel industry over the last decade while failing to disclose that conflict of interest in most of his scientific papers. At least 11 papers he has published since 2008 omitted such a disclosure, and in at least eight of those cases, he appears to have violated ethical guidelines of the journals that published his work.
  • ...11 more annotations...
  • Historians and sociologists of science say that since the tobacco wars of the 1960s, corporations trying to block legislation that hurts their interests have employed a strategy of creating the appearance of scientific doubt, usually with the help of ostensibly independent researchers who accept industry funding.
  • “The whole doubt-mongering strategy relies on creating the impression of scientific debate,” said Naomi Oreskes, a historian of science at Harvard University and the co-author of “Merchants of Doubt,” a book about such campaigns. “Willie Soon is playing a role in a certain kind of political theater.”
  • Environmentalists have long questioned Dr. Soon’s work, and his acceptance of funding from the fossil-fuel industry was previously known. But the full extent of the links was not; the documents show that corporate contributions were tied to specific papers and were not disclosed, as required by modern standards of publishing.
  • “What it shows is the continuation of a long-term campaign by specific fossil-fuel companies and interests to undermine the scientific consensus on climate change,” said Kert Davies, executive director of the Climate Investigations Center, a group funded by foundations seeking to limit the risks of climate change.
  • Many experts in the field say that Dr. Soon uses out-of-date data, publishes spurious correlations between solar output and climate indicators, and does not take account of the evidence implicating emissions from human behavior in climate change.
  • Though often described on conservative news programs as a “Harvard astrophysicist,” Dr. Soon is not an astrophysicist and has never been employed by Harvard. He is a part-time employee of the Smithsonian Institution with a doctoral degree in aerospace engineering. He has received little federal research money over the past decade and is thus responsible for bringing in his own funds, including his salary.
  • Though he has little formal training in climatology, Dr. Soon has for years published papers trying to show that variations in the sun’s energy can explain most recent global warming. His thesis is that human activity has played a relatively small role in causing climate change.
  • As the oil-industry contributions fell, Dr. Soon started receiving hundreds of thousands of dollars through DonorsTrust, an organization based in Alexandria, Va., that accepts money from donors who wish to remain anonymous, then funnels it to various conservative causes.
  • Gavin A. Schmidt, head of the Goddard Institute for Space Studies in Manhattan, a NASA division that studies climate change, said that the sun had probably accounted for no more than 10 percent of recent global warming and that greenhouse gases produced by human activity explained most of it.“The science that Willie Soon does is almost pointless,” Dr. Schmidt said.
  • Dr. Soon has found a warm welcome among politicians in Washington and state capitals who try to block climate action. United States Senator James M. Inhofe, an Oklahoma Republican who claims that climate change is a global scientific hoax, has repeatedly cited Dr. Soon’s work over the years.
  • Dr. Oreskes, the Harvard science historian, said that academic institutions and scientific journals had been too lax in recent decades in ferreting out dubious research created to serve a corporate agenda.
Javier E

What Do We Know? - The New York Times - 1 views

  • one thing that happens when we acquire too much “knowledge” is that, like Othello, we sometimes fail to distinguish it from what can never be known, which may not be untrue.
  • Another is that we’re tempted to lose sight of the distinction between those realms, like science and health, where the more data we have, the better, and others, like human relations, where the opposite may be true.
  • Knowledge comes to seem an end in itself, and then we gobble it down and gobble it down without stopping to realize that it’s Iago — or that anonymous writer of the Wikipedia entry — who’s serving it up to us, and that wisdom sometimes depends on seeing how much knowledge doesn’t know and how much every day is shaped by unexpectedness.
  • ...1 more annotation...
  • As a boy I was aware that knowledge was the coolest form of power around; nearly every adolescent wants to be in the know. What I couldn’t see was that it’s precisely in matters of highest importance — love, terror, is there a God, and why is Iago possessed by the Devil? — that we’re outside the domain of knowledge
Javier E

How One Stupid Tweet Blew Up Justine Sacco's Life - NYTimes.com - 1 views

  • I started to wonder about the recipients of our shamings, the real humans who were the virtual targets of these campaigns. So for the past two years, I’ve been interviewing individuals like Justine Sacco: everyday people pilloried brutally, most often for posting some poorly considered joke on social media. Whenever possible, I have met them in person, to truly grasp the emotional toll at the other end of our screens. The people I met were mostly unemployed, fired for their transgressions, and they seemed broken somehow — deeply confused and traumatized.
  • Read literally, she said that white people don’t get AIDS, but it seems doubtful many interpreted it that way. More likely it was her apparently gleeful flaunting of her privilege that angered people. But after thinking about her tweet for a few seconds more, I began to suspect that it wasn’t racist but a reflexive critique of white privilege — on our tendency to naïvely imagine ourselves immune from life’s horrors. Sacco, like Stone, had been yanked violently out of the context of her small social circle. Right?
  • “To me it was so insane of a comment for anyone to make,” she said. “I thought there was no way that anyone could possibly think it was literal.” (She would later write me an email to elaborate on this point. “Unfortunately, I am not a character on ‘South Park’ or a comedian, so I had no business commenting on the epidemic in such a politically incorrect manner on a public platform,” she wrote. “To put it simply, I wasn’t trying to raise awareness of AIDS or piss off the world or ruin my life. Living in America puts us in a bit of a bubble when it comes to what is going on in the third world. I was making fun of that bubble.”)
  • ...11 more annotations...
  • Her extended family in South Africa were African National Congress supporters — the party of Nelson Mandela. They were longtime activists for racial equality. When Justine arrived at the family home from the airport, one of the first things her aunt said to her was: “This is not what our family stands for. And now, by association, you’ve almost tarnished the family.”
  • I wanted to learn about the last era of American history when public shaming was a common form of punishment, so I was seeking out court transcripts from the 18th and early 19th centuries. I had assumed that the demise of public punishments was caused by the migration from villages to cities. Shame became ineffectual, I thought, because a person in the stocks could just lose himself or herself in the anonymous crowd as soon as the chastisement was over. Modernity had diminished shame’s power to shame — or so I assumed.
  • The pillory and whippings were abolished at the federal level in 1839, although Delaware kept the pillory until 1905 and whippings until 1972. An 1867 editorial in The Times excoriated the state for its obstinacy. “If [the convicted person] had previously existing in his bosom a spark of self-respect this exposure to public shame utterly extinguishes it. . . . The boy of 18 who is whipped at New Castle for larceny is in nine cases out of 10 ruined. With his self-respect destroyed and the taunt and sneer of public disgrace branded upon his forehead, he feels himself lost and abandoned by his fellows.”
  • I told her what Biddle had said — about how she was probably fine now. I was sure he wasn’t being deliberately glib, but like everyone who participates in mass online destruction, uninterested in learning that it comes with a cost.
  • “Well, I’m not fine yet,” Sacco said to me. “I had a great career, and I loved my job, and it was taken away from me, and there was a lot of glory in that. Everybody else was very happy about that.”
  • her shaming wasn’t really about her at all. Social media is so perfectly designed to manipulate our desire for approval, and that is what led to her undoing. Her tormentors were instantly congratulated as they took Sacco down, bit by bit, and so they continued to do so. Their motivation was much the same as Sacco’s own — a bid for the attention of strangers — as she milled about Heathrow, hoping to amuse people she couldn’t see.
  • Social media is, on the whole, a very bad thing. It wastes time, gives at best ephemeral pleasure with a modicum of interest, causes privacy and necessary social boundaries to disintegrate, and enriches people very much at the expense of others. Anyone can make a statement they later regret. It is now impossible to genuinely retract or escape such a statement. This is outrageous. Social media brings out the very worst in people. Rather than free speech, ot also promotes - essentially requires - a ridiculous level of self-censorship or imposition of extreme global shaming. This is not a societal good.
  • Reading this article, it made me very happy to not have a Twitter account. Anyone can say something some group doesn't like and interpret its meaning in negative ways, gang up on someone and bring them down
  • Look at Sacco's tweets on her flight and at the airport...absolutely meaningless junk that has no value to anyone. Why did she feel the need to post such thoughts? Post enough mindless thoughts and you'll probably post something really, really stupid you'd wished you hadn't.
  • I do feel sorry for the guy that made a stupid joke at a conference. When he said it, it was directed to one person and someone else decided to post to the world. That kind of stuff keeps up and nobody will ever do anything remotely interesting in public for fear it is misrepresented and their life ends. Getting fired for making a (to me, anyway) harmless joke seems severe
  • The offendee, it seems to me, would have done herself and others a favor by addressing the issue directly with him. Why the need to bypass any direct communication when you can post it and shame the person for the world? That's the act of a coward and someone who's out to punish.
Javier E

Clear Your Google Web History - Wired How-To Wiki - 0 views

  • On March 1st, 2012, Google will implement a new, unified privacy policy. The new policy is retroactive, meaning it will affect any data Google has collected on you prior to that date, as well as any data it gathers afterward.
  • Basically, under the new policy, your Google Web History (all of your searches and the sites you clicked through to) can be combined with other data Google has gathered about you from other services — Gmail, Google+, etc.
  • If you'd like to keep your personal data a good distance away from Google, you'll need to delete your existing search history and prevent Google from using that history in the future.
  • ...4 more annotations...
  • in this case, however, a little time spent changing your settings can provide invaluable peace of mind knowing that Google can't exploit your personal tendencies for its own purposes.
  • First sign into your Google account and head to the history page. Click the button labeled Remove all Web History. Then click Okay to confirm. Note that this also pauses your web history going forward, and Google won't start listening to your history again unless you let it.
  • This will not stop Google from gathering data when you search. To do that you would need to block Google cookies completely. However, while it will still gather the data, Google will not use it to serve targeted ads or do anything other than use it for internal purposes. Also, with Web History disabled, your data is at least partially anonymized after 18 months (if you leave Web History on, Google will keep your search records indefinitely).
  • On the negative side, bear in mind that while this won't prevent Google from making search suggestions, it will prevent you from getting personalized suggestions based on your previous searches.
1 - 20 of 52 Next › Last »
Showing 20 items per page