Algorithm warfare is literally everywhere nowadays yet most people haven’t got the slightest idea what is going on or what they are being exposed to.
Most of us can relate to Allan Weisbecker’s example of how Yahoo mail served him an ‘associated’ advertisement when one day he mentioned “walking the dog” as he wrote an email.
“This one came up as I was signing ‘allan.’
Coincidence? Pu-lease. My point is the lightning speed with which Yahoo’s algorithm worked. Like two seconds was all it took to analyze ‘walking the dog’ then nail me with a dog-related ad – what shocked me was the speed, considering all the cyber-details that had to go through the system. This is what Yahoo uses on a casual daily basis. Imagine the algorithm NSA has grinding away at Fort Meade, to keep track of what you’re thinking and doing.”
two rival swarms of critters wage a non-stop war for the space
source of featured image: http://www.cellfighter.com/conway-life-screensaver.html
The Algorithm of Jazz @Yale: Matt Griffith ’14 performs Artie Shaw Concerto for Clarinet
“… The reality is that the gap between mainstream and alternative media outlets has artificially been reduced by co-opting the alternative media and their audiences. Countless examples of this exist. At least 9 out of 10 alt media outlets are pretty much carbon copies of each other and have during the last 5 years been putting their weight behind government policies that would have been exposed and debunked years earlier.
For instance, the false war on islam terror is widely accepted now by guys like Alex Jones, Steve Quayle and Doug Hagmann. All of them are also buying into and spreading other zionist scams, lies and propaganda fluff. For sure these characters are the best of all to put on mainstream news broadcasts – where they belong. They go into suicidal funks when they can parrot Netanyahu’s insane waffling.
The conditioning was, it now seems, planned to climax all along when a type like Trump came into the White House. It is also at this very moment that all of this is being suggested right as zionist puppet Trump is “reshaping” the press room in Washington. How convenient. Likely the NSA algorithms didn’t see this one coming. Riiiight….
Shockingly, well – not really, Hodges’ suggestions are greatly welcomed by his following, when we observe the feedback he gets for it.
Well folks, wish Dave Hodges good luck. Wish him a fruitful career at CNN, ABC or NBC because that’s where he is planning to apply.
It looks like they have come full circle at the transparent alternative media. What once was a platform or niche for alleged dissent has now officially turned into a mergers and acquisitions business model…..”
https://www.youtube.com/watch?v=LSHZ_b05W7o (Daddy’s Car, three minutes)
a song composed by Artificial Intelligence – in the style of the Beatles
Hierarchical Temporal Memory algorithms for understanding asymmetric warfare
Conference Paper: (PDF Available) April 2009
There is a problem in combat modeling when it comes to accurately representing asymmetric warfare. The roots of this problem stem from the ways in which warfare has evolved over the last century from force-on-force combat to the network-centric warfare (NCW) that has emerged today in its most exemplary fashion in the Middle East, especially in the context of Joint Urban Operations (JUO). Therefore, this paper focuses on some of the previous attempts as a means to motivate the need for a new technique that understands the interactions on which an accurate representation of NCW rests. Given the difficulties of previous modeling attempts, this work then focuses on the profound impact that human behavior has on the modeling of NCW. Furthermore, with such attention to human behavior, the discussion of modeling NCW shifts to the human brain and its impact on behavior in such an environment. Thus the topic of this paper turns towards what results from neuroscience are useful for understanding NCW and how those facts can be translated into use on modern computers, via the use of hierarchical temporal memory (HTM) algorithms; finally, the inherent issues with such a task shall then be discussed.
From the single desk of a startup hedge fund to the gilded halls of Goldman Sachs, computer code is now responsible for most of the activity on Wall Street.
AUTHOR: FELIX SALMON AND JON STOKES.
DATE OF PUBLICATION: 12.27.10.
ALGORITHMS TAKE CONTROL OF WALL STREET
http://algorithmicjazz.com/p5js/coj/cojindex.html A jazz melody algorithm. Click, hold, and move the cursor around on the screen.
source of image:
Page created January 20, 2017 – Last updated January 24, 2017
Algorithm warfare is a very complex topic that needs to be introduced to the world, not the least due to the present and future dangers that it poses.
Algorithm warfare includes more than just the deployment of analytical, defensive and conditioning or offensive (hostile) algorithms by commercial entities and government agencies. It is also about constantly creating floods of fresh mineable data; analyzing, exploiting and manipulating financial markets, perceptions and public opinions; and the eventual creation and deployment of self-perpetuating loops of algorithmic artificial intelligences that can steer a planetary populace on autopilot.
Although the basic concept of algorithms is understood by the general public, the advances and potential capabilities in the field are far less understood. It is therein that the dangers lay.
In our introductory articles [1, 2, 3, 4] the concept of algorithm warfare has already been explained with practical examples but a clear overview of who and what the major players are for instance, who the centerpieces are if you will, had yet to be created.
This page will also serve that purpose, to list those involved directly and indirectly. The longer the list becomes the clearer the bigger picture will become on where algorithm warfare is coming from and where it is heading.
ADDITIONAL RECOMMENDED READING
“Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been … used “to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people.”
It is also used to destroy the morale of enemies through tactics that aim to depress troops’ psychological states.
Civilians of foreign territories can also be targeted by technology and media so as to cause an effect in the government of their country…..”
The co-founder & lead developer for Warfare Plugins is a WordPress enthusiast and U.S. Army Reserves Psychological Operations Sergeant.
This article was published by Jeff Gates for Foreign Policy Journal on August 28, 2009. It was included on the IRIS website because it provides a perspective that is completely in line with their algorithm warfare sensitization campaigns and it explains an aspect of it from a specific point of view that interlocks with our previous report titled “Israeli Intelligence Deploys New ‘Anti-Semitism’ Identification System“.
“… Israeli game theorists operate not from the Center for Morality or the Center for Justice but from the Center for Rationality. As modeled by Zionist war planners, game theory is devoid of all values except one: the ability to anticipate—within an acceptable range of probabilities—how “the mark” will react when provoked. Thus we see the force-multiplier potential for those who wage war with well-planned provocations and well-timed crises.
Israeli behavior is often immoral and unjust but that does not mean it is irrational. For Colonial Zionists committed to the pursuit of an expansionist agenda, even murderous provocations are rational because the response can be mathematically modeled, ensuring the results are reasonably foreseeable. That alone is sufficient for a people who, as God’s chosen, consider it their right to operate above the rule of law.”
“… already points to a future in which intelligence-gathering, assessment and military action, including the calculation of who can legally be killed, will largely be performed by machines based upon an ever-expanding database of aggregated information. As such, this transition to execution by algorithm is not simply a continuation of killing at ever greater distances inaugurated by the invention of the bow and arrow that separated warrior and foe, as many have suggested.  It is also a consequence of the ongoing automation of warfare, which can be traced back to the cybernetic coupling of Claude Shannon’s mathematical theory of information with Norbert Wiener’s wartime research into feedback loops and communication control systems.  As this new era of intelligent weapons systems progresses, operational control and decision-making are increasingly being outsourced to machines…..”
“…. When one poses the question, under what conditions is it morally acceptable to deliberately kill a human being, one is not, in this case, asking whether the law permits such an act for reasons of imminent threat, self-defence or even empathy for someone who is in extreme pain or in a non-responsive vegetative state. The moral register around the decision to kill operates according to a different ethical framework: one that doesn’t necessarily bind the individual to a contract enacted between the citizen and the state. Moral positions can be specific to individual values and beliefs whereas legal frameworks permit actions in our collective name as citizens contracted to a democratically elected body that acts on our behalf but with which we might be in political disagreement. ….”
Click here to download the PDF of this item
JANUARY 19, 2016
The F-35 Joint Strike Fighter, the most expensive weapons program ever, won’t justify its price tag by outmaneuvering other jets (it can’t), flying particularly fast, or even by carrying munitions in a stealthy bomb bay. Instead, the U.S. military is banking on an emerging technology called cognitive electronic warfare to give the jet an almost-living ability to sniff out new hard-to-detect air defenses and invent ways to foil them on the fly.
While the specifics of the jet’s electronic warfare, or EW, package remain opaque, scientists, program watchers and military leaders close to the program say it will be key to the jet’s evolution and its survival against the future’s most advanced airplane-killing technology. In short, cognitive EW is the most important feature on the world’s most sophisticated warplane…..
Read “interaction” in that context to mean the critical moment when an adversary, perhaps a single lowly radar operator, detects a U.S. military aircraft on a covert operation. That moment of detection is the sort of world-changing event that happens, literally, in the blink of an eye.
Just before the study came out, the Defense Advanced Research Projects Agency, or DARPA, established the Adaptive Radar Countermeasures program to “enable U.S. airborne EW systems to automatically generate effective countermeasures against new, unknown and adaptive radars in real-time in the field.”
The goal: EW software that can perceive new waveforms and attacks as quickly and as clearly as a living being can hear leaves rustle or see a predator crouching in the distance, then respond creatively to the threat: can I outrun that? Can I fight it? Should I do anything at all? It’s a problem of artificial intelligence: creating a living intelligence in code….”
The full article is here:
“What we’ve done with the 5th Generation [aircraft] is the computer takes all those sensory inputs, fuses it into information. The pilot sees a beautiful God’s eye view of what’s going on. […] It’s a stunning amount of information.”
“… Algorithms are not just determining who lives, but also who dies. The Defense Department, taking advantage of incredible advancements in autonomous technologies, is increasingly advocating for self-flying drones. The hope is that machine learning and better algorithms can reduce the human error in drone-based assassinations, potentially allowing these technologies to make the decision to shoot without human intervention.
Ever since the development of computers in the mid–20th century, algorithms have been used to increase business efficiency. Today, algorithms run our world. UPS and FedEx use algorithms to optimize the routes of its drivers, Procter & Gamble and Walmart use learning algorithms to ensure that sufficient products are on store shelves, and banks use algorithms not only for securities trading but also to predict cash flows…..”
“… There is an objective quality about the computer that is lacking in a human being, even though they are both ultimately political. It is just that the human seems political at the time the decision is made, while the algorithm was political when it was designed and implemented…..”
“… There is a belief that moving such decisions away from humans and into the machine-learning black box is the solution to many of our political problems. That is precisely wrong. We aren’t avoiding the politics of our decisions, but rather giving up human agency itself to allow the computer to make it for us. This is the fundamental difference between first and second generation algorithms.
Developing policies in our society is the forcing function to ensure that we come together, debate, and ultimately work toward a usable consensus on how we want our government to function. The more we give up on those sorts of arenas for debate, the more we will increasingly find that our society simply cannot work together whatsoever.
Algorithms will not save us. They cannot make the decisions we have to make any easier, and in fact, can massively increase the level of polarization that takes place in our country. Using an algorithm in immigration to predict economic performance may sound like a way to avoid a hard debate about immigration, but that is precisely why it is so dangerous. Who exactly do we want to allow into our country? Computer code can’t make us content…..
I still believe that when the algorithms themselves are part of the political debate, we can increase the efficiency of government while also improving the lives of citizens.
Ultimately, we live with each other in a human society. We should never give up our seat at the table in order to allow the algorithms to just do their work. The data we allow them to use and the models we allow them to calculate should all be areas where humans have a voice. Our politicians need to see the algorithm as where politics is increasingly centered, and engage with them accordingly.”
“HOW DOES ONE ARRIVE AT THE OFFICIAL FBI CODE NAME ‘PENTTBOM’ (PENTAGON/TWIN TOWERS BOMBING INVESTIGATION) WHEN ONLY AIRPLANES WERE USED TO DESTROY THE TWIN TOWERS AT THE WTC AND PARTIALLY THE FACADE OF THE PENTAGON? IN OTHER WORDS: HOW DOES ONE COME TO THE CONCLUSION THAT THE WORD ‘BOMBING’ MUST BE INCLUDED IN THIS PROMINENT CASE’S CODE NAME?”
For this occasion the comment section will be opened below.