Writer-Researcher-Activist | philosophy/spec-fi/future/art/internet/surveillance/ai/weird
468 stories
·
2 followers

Mephitic Air

1 Share
Mephitic Air examines the moment-to-moment function of sensors used to analyse the air, and what they may add to our own senses of the world around us.



The data being visualised and sonified here is being produced live by air quality sensors mounted on the roof of the gallery. These sensors measure wind speed, wind direction, and the quantities of three common pollutants: Nitrogen Dioxide (NO2), Carbon Monoxide (CO) and particulate matter smaller than 2.5 micrometers (PM2.5).

The three screens in the centre of the room show live visualisations of this data. Each visualisation gets larger and denser as the amount of air pollution measured by the sensors rises, and each pollutant is represented using forms and colours relevant to their materiality. NO2 is represented as a bronze liquid-like visualisation, which is its state at room temperature; CO as a gaseous white; and PM2.5 as metallic particles. Wind direction being recorded by the sensor’s weather vane determines the movements of each visualisation, while high windspeed makes the visualisations disperse, as high windspeed can dissipate air pollutants around sensors. The visualisation in the window uses the same colour coding but shows the total density of each pollutant measured over the day so far, revealing the rhythmic peaks and troughs of data collected by these sensors.

The sonifications read this same live data, with a sound representing each pollutant being measured. These sounds move through the room with the current wind direction, rising and falling in volume as each pollutant increases and decreases. Echo is applied as windspeed increases, dissipating each sound. The sounds used to sonify the data each reference a component of how air pollution functions. NO2 data is sonified with the sound of a car’s catalytic convertor, a component installed to reduce the engine’s emissions of NO2. These devices have the side effect of reducing engine efficiency while emitting PM10 and PM2.5 emissions as platinum residue from the lining of the convertor. In reference to this, the PM2.5 data is sonified with the sound of platinum mining in Norilsk, Russia, one of the most polluted industrial mining towns in the world. CO data is sonified with the English traditional song ‘The Cutty Wren’. The origin and intent of this song is debated; it may be as old as 14th century, and it’s argued to be one of the first documented English protest songs (with one interpretation of its lyrics being the killing and eating of the King to feed the poor). We include this here to highlight the ongoing role of creative practice as an ethical engagement with the conditions of the world.

Mephitic Air was conceived of and created by Wesley Goatley and Tobias Revell for Brighton Digital Festival at ONCA. Produced with the support of Arts Council England and Brighton Bus Company.
Read the whole story
ahmetasabanci
7 days ago
reply
İstanbul
Share this story
Delete

Pure Ideology, by MC Zizek

5 Shares



My God. That was terrible.
Read the whole story
ahmetasabanci
9 days ago
reply
İstanbul
Share this story
Delete

A bright and shiny hell

5 Shares

(Apologies for blogging so infrequently this month. I'm currently up to my elbows in The Labyrinth Index, with a tight deadline to hit if the book's going to be published next July. Blogging will continue to be infrequent, but hopefully as provocative as usual.)

Remember Orwell's 1984 and his description of the world ahead—"if you want a vision of the future, imagine a boot stamping on a human face, forever"?

This is the 21st century, and we can do better.

George got the telescreens and cameras and the stench of omnipresent surveillance right, but he was writing in the age of microfilm and 3x5 index cards. Data storage was prodigiously expensive and mass communication networks were centralized and costly to run — it wasn't practical for amateurs to set up a decentralized, end-to-end encrypted shadow network tunnelling over the public phone system, or to run private anonymous blogs in the classified columns of newspapers. He was also writing in the age of mass-mobilization of labour and intercontinental warfare. Limned in the backdrop to 1984 is a world where atom bombs have been used in warfare and are no longer used by the great powers, by tacit agreement. Instead, we see soldiers and machine-guns and refugees and the presentation of inevitable border wars and genocides between the three giant power blocs.

Been there, done that.

What we have today is a vision of 1984 disrupted by a torrent of data storage. Circa 1972-73, total US manufacturing volume of online computer storage — hard drives and RAM and core memory, but not tape — amounted to some 100Gb/year. Today, my cellphone has about double that capacity. I'm guessing that my desk probably supports the entire planetary installed digital media volume of 1980. (I'm looking at about 10Tb of disks ...) There's a good chance that anything that happens in front of a camera, and anything that transits the internet, will be preserved digitally into the indefinite future, for however long some major state or corporate institution considers it of interest. And when I'm taking about large-scale data retention, just to clue you in, Amazon AWS already offers a commercial data transfer and storage service using AWS Snowmobile, whereby a gigantic trailer full of storage will drive up to the loading bay of your data center and download everything. It's currently good for up to 100PB per Snowmobile load. (1PB is a million gigabytes; 1EB is a billion gigabytes; ten snowmobile loads is 1EB, or about 10,000,000 1973's worth of global hard drive manufacturing capacity). Folks, Amazon wouldn't be offering this product if there wasn't a market for it.

These heaps and drifts of retained data (and metadata) can be subjected to analytical processes not yet invented — historic data is still useful. And some of the potential applications of neural network driven deep learning and machine vision are really hair-raising. We've all seen video of mass demonstrations over the past year. A paper to be presented at the IEEE International Conference on Computer Vision Workshops (ICCVW) introduces a deep-learning algorithm that can identify an individual even when part of their face is obscured. The system was able to correctly identify a person concealed by a scarf 67 percent of the time against a "complex" background. Police already routinely record demonstrations: now they'll be able to apply offline analytics to work out who was there and track protestors' activities in the long term ... and coordinate with public CCTV and face recognition networks to arrest them long afterwards, if they're so inclined.

It turns out that facial recognition neural networks can be trained to accurately recognize pain! The researchers were doubtless thinking of clinical medical applications — doctors are bad at objectively evaluating patients' expressions of pain and patients often don't self-evaluate effectively — but just think how much use this technology might be to a regime bent of using torture as a tool of social repression (like, oh, Egypt or Syria today). They also appear to be better than human beings at evaluating sexual orientation of a subject, which might be of interest in President Pence's Republic of Gilead, or Chechnya, or Iran. (There's still a terrible false positive rate, but hey, you can't build an algorithmic dictatorship without breaking heads.)

(Footnote: it also turns out that neural networks and data mining in general are really good at reinforcing the prejudices of their programmers, and embedding them in hardware. Here's a racist hand dryer — it's proximity sensor simply doesn't work on dark skin! Engineers with untested assumptions about the human subjects of their machines can wreak havoc.)

All of this is pretty horrific — so far, so 2017 — but I'd like to throw two more web pages in your face. Firstly, the Gerasimov Doctrine which appears to shape Russian infowar practices against the west. We've seen glaring evidence of Russian tampering in the recent US presidential election, including bulk buying of micro-targeted facebook ads, not focussing on particular candidates but on party-affiliated hot-button issues such as race, gay rights, gun control, and immigration. (I'm not touching the allegations about bribery and Trump with a barge pole — that way lies the gibbering spectre of Louise Mensch — but the evidence for the use of borderline-illegal advertising to energize voters and prod them in a particular direction looks overwhelming.) Here's a translation of Gerasimov's paper, titled e Value of Science Is in the Foresight: New Challenges Demand Rethinking the Forms and Methods of Carrying out Combat Operations. As he's the Russian army Chief of General Staff, what he says can be taken as gospel, and he's saying things like, "the focus of applied methods of conflict has altered in the direction of the broad use of political, economic, informational, humanitarian, and other nonmilitary [my emphasis] measures — applied in coordination with the protest potential of the population". This isn't your grandpa's ministry of propaganda. Our social media have inadvertently created a swamp of "false news" in which superficially attractive memes outcompete the truth because humans are lousy at distinguishing between lies which reinforce their existing prejudices and an objective assessment of the situation. And this has created a battlefield where indirect stealth attacks on elections have become routine to the point where savvy campaigns pre-emptively place bait for hackers.

There are a couple of rays of hope, however. The United Nations Development Program recently released a report, Journey to extremism in Africa: drivers, incentives and the tipping point for recruitment that pointed out the deficiencies in the Emperor's wardrobe with respect to security services. Religion and ideology are post-hoc excuses for recruitment into extremist groups: the truth is somewhat different. "The research specifically set out to discover what pushed a handful of individuals to join violent extremist groups, when many others facing similar sets of circumstances did not. This specific moment or factor is referred to as the 'tipping point'. The idea of a transformative trigger that pushes individuals decisively from the 'at-risk' category to actually taking the step of joining is substantiated by the Journey to Extremism data. A striking 71 percent pointed to 'government action', including 'killing of a family member or friend' or 'arrest of a family member or friend', as the incident that prompted them to join. These findings throw into stark relief the question of how counter-terrorism and wider security functions of governments in at-risk environments conduct themselves with regard to human rights and due process. State security-actor conduct is revealed as a prominent accelerator of recruitment, rather than the reverse." In fact, the best defenses against generating recruits for extremist organizations seemed to be things like reduced social and eonomic exclusion (poverty), improved education, having a family background (peer pressure), and not being on the receiving end of violent repression. Because violence breeds more violence — who knew? (Not the CIA and USAF with their typical "oops" response whenever a drone blows up a wedding party they've mistaken for Al Qaida Central.)

So, let me put some stuff together.

We're living in a period where everything we do in public can be observed, recorded, and will in future provide the grist for deductive mills deployed by the authorities. (Hideous tools of data-driven repression are emerging almost daily without much notice, whether through malice or because they have socially useful applications and the developers are blind to the potential for abuse.) Foreign state-level actors and non-state groupings (such as the new fascist international and its hive of internet-connected insurgents) are now able to use data mining techniques to target individuals with opinions likely to appeal to their prejudices and inflame them into activism. Democracy is directly threatened by these techniques and may not survive in its current form, although there are suggestions that what technology broke, technology might help fix (TLDR: blockchain-enabled e-voting, from the European Parliament Think Tank). And there are some signs that our existing transnational frameworks are beginning to recognize that repressive policing is one of the worst possible shields against terrorism.

Social solidarity. Tolerance. Openness. Transparency that runs up as well as down the personal-institutional scale. And, possibly, better tools for authenticating public statements such as votes, tweets, and blog essays like this one. These are what we need to cleave to if we're not going to live out our lives in a shiny algorithmic big data hellscape.

Read the whole story
ahmetasabanci
16 days ago
reply
İstanbul
denubis
42 days ago
reply
Sydney, Australia
Share this story
Delete

“I don’t want to give out my phone number” — A gendered security issue

1 Share

I’d just given a talk and was having a nice chat with a young man who was doing similar work and wanted to stay in touch.

“Great, just give me your Signal number,” he said.

I hesitated. I’ve been using Signal for several years, since it was TextSecure. It’s by far the most trusted messaging app in my circles, and although it’s been slow to catch up to WhatsApp and other tools when it comes to fancy features, I use just as much among friends.

But Signal—as well as WhatsApp and Viber—require you to register with and use your phone number as an identifier. What this means practically is that when I meet someone with whom I wish to connect on one of these apps, I have to give them my phone number for them to be able to message me. Other apps, including Wire and Telegram (the latter of which I do not recommend at all), allow you to connect using a handle of your choosing.

I’ve been thinking about this as a security issue for awhile. As a woman, handing out my phone number to a stranger creates a moderate risk: What if he calls me in the middle of the night? What if he harasses me over SMS? What if I have to change my number to get away from him?

I’m not so surprised that the mostly-male developers of these tools didn’t consider these risks. They’ve focused carefully on ensuring that their encryption works (which is key), that their user-verification models are usable and make sense, and I’m grateful for that…but I still don’t want to give my phone number out to a stranger.

Luckily, I have a workaround, and a policy recommendation for app developers. Let’s start with the latter:

Allow users to create alias handles

I’m not a technologist, but I’ve asked around, and a number of smart friends have suggested that it wouldn’t be so hard for apps like Signal to allow for aliases. What do I mean? Well, imagine that young man at the conference had asked me for my Signal, but instead of giving him my number, I could give him a temporary or permanent handle associated with my account. Registration wouldn’t change—my Signal would still be tied to my phone number—but the public-facing identifier could be the phone number or an alias of my choosing.

I don’t know why this hasn’t been done, but I’d love to know. Perhaps the men running these teams simply haven’t thought of it?

A workaround to protect your phone number

A few years ago, I discovered a way to use Signal and WhatsApp while keeping them disconnected from the SIM I carry with me in my phone. It requires you to purchase a second SIM card (I use a pay-as-you-go that I top up every couple of months). Here’s how you do it:

1. Put your secondary SIM card in your regular phone and register your Signal account to that number.
2. After it’s registered, take that SIM card out and put your regular one back in. Do not change your Signal account to that number.

You’ll want to hold on to the SIM card, and make sure it stays operational, because if the number goes back out onto the market, someone can register a new account with it, thus kicking you off of yours (seriously, this happened to a friend in Lebanon, where numbers go back onto the market frequently).

You can treat the secondary number as a public number (mine is on my business cards, and I keep the SIM in an old Nokia so I can take work calls on it), or as your own little secret.

Read the whole story
ahmetasabanci
72 days ago
reply
İstanbul
Share this story
Delete

Saturday Morning Breakfast Cereal - Apocalypse Soon

1 Comment and 8 Shares


Click here to go see the bonus panel!

Hovertext:
New plan - win lottery, have Abby Howard draw all of my comics.

New comic!
Today's News:

Hey geeks! We're doing this little crossover thing to celebrate Abby's new book, which features properly protofeathered dinosaurs. Check it out!

PS: She'll also be doing an AMA today on reddit.

Read the whole story
ahmetasabanci
72 days ago
reply
İstanbul
Share this story
Delete
1 public comment
linforcer
76 days ago
reply
Yesssss, more Abby is always good

Philosophy Infomercial

2 Comments and 6 Shares



Read the whole story
tante
79 days ago
reply
Very good summary of what philosophy does to a mind.
Oldenburg/Germany
ahmetasabanci
72 days ago
reply
İstanbul
Share this story
Delete
1 public comment
freeAgent
83 days ago
reply
This is...oddly parallel to real-life experiences I had with philosophy.
Los Angeles, CA
Next Page of Stories