Showing posts with label open source culture. Show all posts
Showing posts with label open source culture. Show all posts

Monday, August 06, 2018

Po Folk Create Their Own Aesthetic


medium |  Walking into a beauty supply store in the hood is like walking into a parallel universe. Cheap bright lipsticks grab your eye immediately. Hair hangs from the ceiling. There is an abundance of dyes, cheap gold jewelry, and every hair accessory known to man. It is a familiar home to Black and Brown women struggling to make themselves beautiful in a world that pays them no mind. If you look past the owners — who are often not of the community and who follow patrons around as if they are going to steal something — and past the lasting effects of colonization, buried in the ingredients of the skin lightening creams on the third shelf of the skin care aisle, it is almost perfect. Almost.
But while it may not be perfect, it is home.

It has the kind of magic that is a byproduct of most hood creations. You tried to destroy us, but [bitch] we’re here. Mining the grime at the bottom of the barrel and turning it into gold.

It is in our strut.

It is in our fashions.

And our fashions, specifically femme fashions, have existed as a subversion of the politics of poverty that says poor people can’t have nice things. Our fashions are loud, making up for the years they tried to take our voices. How fitting that people who are told they are worth nothing adorn themselves like royalty?

This is the genesis of what has come to be known as the “baddie aesthetic” of Instagram and Tumblr. People don’t want to talk about how white and racially ambiguous girls on social media are profiting off of the style of the women from my hood, the mamas who were donning five-inch acrylic nails with three gold rings on every finger long before it was cool, but I do.
Okay you don’t see us as beautiful, you won’t make anything for us; we’ll create our own world, our own beautiful, our own aesthetic.
I grew up being taught that the visible markers of Black style, of deep deep hood Blackness, were unsophisticated and should be looked down upon. Don’t wear bamboo earrings, that’s ghetto. Don’t wear 15 bangles on each wrist, thats ghetto. Don’t mix patterns, that’s ghetto. Even something as innovative as a digital name belt, something so futuristic(!), was something to shy away from. It didn’t matter that these looks belonged to the people of my community, who were sweet and kind to me, the goal was not to be a “ghetto girl.”

Wednesday, May 16, 2018

Autonomous Autistic Incels Not So Keen On Being Gamed For Fun And Political Profit?


RightWingWatch |  As Jared reported earlier today, Jerome Corsi, the Washington bureau chief for Alex Jones’ Infowars, who has spent hours online every day for the last several months “decoding” the cryptic message-board posts made by an anonymous figure known as “QAnon,” has declared that “Q” has been “compromised” and that his postings can no longer be trusted.

Many fringe right-wing activists believe that QAnon was a high-level Trump administration official who has been leaking secret intelligence information to them via the anonymous message boards 4chan and 8chan and Corsi was among the most vocal proponents of the theory, having once even claimed that President Trump himself had directly ordered QAnon to release information.

Recently, Corsi began to sour on QAnon and today he joined Jones on his radio program where Jones claimed that he had personally spoken with QAnon and had been told that the account had been compromised and should no longer be trusted.

“I was on the phone this morning talking to some folks who were out playing golf with people that have been involved in QAnon, they say, ‘Hey, that’s been taken over, we’re unable to even post anymore, that’s not us anymore,'” Jones said. “I’ve talked to QAnon. There is only about five or six that have actually be posting. I’ve talked to QAnon and they are saying QAnon is no longer QAnon.”
“Stick a fork in the avatar of QAnon,” Jones declared. “It is now an overrun disinformation fount.”

exopolitics | According to veteran investigative reporter and best selling author, Dr. Jerome Corsi, he was approached three years ago by a group of generals and told that Donald Trump had been recruited by U.S. military intelligence to run in the 2016 Presidential elections, and subsequently help remove corrupt Deep State officials from positions of power. Corsi claims that QAnon represents the same group of senior military intelligence officials who are exposing the Deep State corruption and officials involved in a history of treasonous actions against the U.S. Republic.

This is what Corsi said at a meeting on April 11, which also featured the founder of InfoWars.com, Alex Jones:

About three years ago a group of Generals came to me, and it was explained to me that they were ready to conduct a coup d’etat. They were ready to move Barack Obama from office with military force. And then a few weeks later I got another call and said they were reconsidering.

You know why they were reconsidering? [audience calls out answers] Because they talked to Donald Trump, and Trump had agreed he would run, and they agreed that if he would run, they would conduct their coup d’etat as a legitimate process, rooting out the traitors within government.  And that pact between the military and Donald Trump has held, as we have been interpreting and watching, and Alex has been following QAnon.

QAnon is military intelligence and close to Trump, and the intelligence we’ve getting, that we’ve explained on Infowars, really is a lot of the inside script. 

While Corsi didn’t name the generals or provide hard evidence for his startling claim, an examination of public comments by President Trump, QAnon and related political events do make Corsi’s extraordinary claim very plausible.

It’s important to note that Corsi’s speech happened only a day after a tweet by President Trump featuring him with 20 senior U.S. military officials who dined with him the previous night:

Friday, September 29, 2017

Why We Want to Change the World?


medium |  Humans have always been a social, cooperative species. According to Oren Harman of The Chronicle of Higher Education, this trait may be what’s propelled us to the top of the food chain:
“Developing the biological and cultural mechanisms that suppressed disruptive within-group competition and fostered empathy and trust, our ancestors became the sole primate.”
Ridley, and other evolutionary biologists, theorize that humans are designed to pass on their genes. However, preserving oneself is not the only way to replicate one’s genes. Per the Stanford Encyclopedia of Philosophy, “By behaving altruistically, an organism reduces the number of offspring it is likely to produce itself, but boosts the number that other organisms are likely to produce.”
David and Edward Wilson described the adaptive strategy behind this paradox more succinctly:
“Selfishness beats altruism within groups. Altruistic groups beat selfish groups”
While altruism may be a cost to the individual, it comes with the benefit of increasing the likelihood that others with the group will survive. In other words, while altruism may not help us as individuals, it may help our kinsmen. Or, as Ridley says, “Selfish genes sometimes uses selfless individuals to achieve their ends.”

The power of reciprocity
Our ancestors cooperated on important functions such as hunting, gathering, protecting the tribe, and raiding others for their resources. This cooperation is helpful to the group and to the individuals within that group, writes Christopher Bergland of Psychology Today:
“Social behaviors — including altruism — are often genetically programmed into a species to help them survive…Even if you are feeling ‘selfish’, behaving selflessly may be the wisest ‘self-serving’ thing to do.”
Bergland explains the benefit to this strategy: “Acting selflessly in the moment provides a selective advantage to the altruist in the form of some kind of return benefit.” A paper published in the Annual Review of Psychology describes these reciprocal benefits more specifically: “Signaling that one is generous can lead to benefits for the person signaling, such as being chosen as an exchange partner, friend, or mate.”
If you help a friend pay of their credit card debt, they may be more likely to help you pay off your debt in the future. If you help a friend move into a new apartment, they’ll be more likely to help you when you move. When you are known as a person who helps others, people want to be your friend. By giving, we receive.

Thursday, May 25, 2017

Did the CBC Help Pakistan's ISI Hack the DNC?


thedailycaller |  A criminal suspect in an investigation into a major security breach on the House of Representatives computer network has abruptly left the country and gone to Pakistan, where her family has significant assets and VIP-level protection, a relative and others told The Daily Caller News Foundation’s Investigative Group.

Hina Alvi, her husband Imran Awan, and his brothers Abid and Jamal were highly paid shared IT administrators working for multiple House Democrats until their access to congressional IT systems was terminated Feb. 2 as a result of the investigation. Capitol Police confirmed the investigation is ongoing, but no arrests have been reported in the case.

The Awans are “accused of stealing equipment from members’ offices without their knowledge and committing serious, potentially illegal, violations on the House IT network,” according to Politico. Many of the Democrats who employed the Awans are members of the House Committee on Homeland Security, the Committee on Foreign Affairs and the Permanent Select Committee on Intelligence. (A list of potentially compromised members is listed below.)

Their positions gave them access to members’ emails and confidential files. In addition, Imran was given the password for an iPad used by then-Democratic National Committee Chairwoman Debbie Wasserman Schultz, a Florida Democrat. The five came to the U.S. from Pakistan.
 
Since the investigation became public, the Awans have abruptly moved from longtime homes in Lorton and Springfield, Va.

Wednesday, May 24, 2017

UMKC Prof. Bill Black Sheds Further Light on FBI Corruption Discretion



therealnews |  KIM BROWN: Bill Black, that has been the buzzword pretty much for the past couple of weeks, but this week in particular regarding the investigations. We're talking about an investigation into former FBI Director Jim Comey's email investigation into Hilary Clinton and now an investigation into former Director Comey's firing, an investigation happening surrounding Mike Flynn and his potential role there. So what are we to take away from these numerous investigations not only swirling around D.C. but swirling around this White House in particular?

BILL BLACK: I wanted to provide some background and some perspective. As you said, I'm a former financial regulator that worked very closely with the FBI and Department of Justice investigations and prosecutions of elite white collar criminals and also, on a pro bono basis, was an outside consultant, an expert to the investigation of a portion of the Bill Clinton stuff. That was a special counsel relationship as well. I can tell you a little bit about these things that are now famous, these Comey notes about the meeting that he had with the president in which, at least according to the leaks, the notes show that the president asked Comey to not pursue General Flynn.

So to begin at the beginning, also with this claim that you're hearing repeated time after time, that nothing can interfere with an FBI investigation and such. In fact, enumerable things can and do interfere with FBI investigations and anybody that's lived through the financial crisis that we just had knows that because they know that the same person, Robert Mueller, the former head of the FBI, not an evil person at all, understandably reorganized the FBI in response to the 9/11 attacks to make it almost exclusively, in its priorities, a counter-terrorist and intelligence organization. That meant that the absolute best people that investigate white collar crime, and the way they do that is by following the money, in other words, the ones with real financial expertise, were transferred out of the white collar section and they were never replaced. That's one of the stories of why there have been zero successful prosecutions because they easily defeated investigations of all the top bankers by never assigning remotely enough agents to the work and assigning them to minor cases.

Historically, J. Edgar Hoover of course was the first director of the FBI and served almost forever and notoriously would not allow the FBI to investigate attacks on, for example, blacks and civil rights workers. The movie, Mississippi Burning, is a fictionalized account of when the attorney general of the United States finally pushed back and forced the FBI to investigate. There were hundreds of occasions in which Hoover intervened to start investigations or stop investigations. Of course, John Dean came up with a bright idea of stopping an FBI investigation by having the CIA, who was only too happy to agree to help President Nixon, falsely claim that the FBI shouldn't look because it was really a CIA operation.

Let's do away with this myth that there's nothing that can interfere with an FBI investigation. The FBI investigations were very much at risk. Let's talk a bit about the key players. Rod Rosenstein is the Deputy Attorney General and because Sessions is recused from dealing with matters involving Russia, Rosenstein actually serves as the acting attorney general when he appointed Mueller, former head of the FBI, before Comey as the special counsel to look at these matters. A little bit about the notes. FBI agents are, in fact, taught, like most people with senior positions in Washington D.C. that involve important matters, to, immediately after a key meeting, to take detailed notes in writing while you're doing the meeting and then turn those notes into a description of the meeting.

Sunday, May 21, 2017

Global Beta Test: UK Fitna Clampdown On Ungovernable Open Source Culture


Independent |  Theresa May is planning to introduce huge regulations on the way the internet works, allowing the government to decide what is said online.

Particular focus has been drawn to the end of the manifesto, which makes clear that the Tories want to introduce huge changes to the way the internet works.

"Some people say that it is not for government to regulate when it comes to technology and the internet," it states. "We disagree."

Senior Tories confirmed to BuzzFeed News that the phrasing indicates that the government intends to introduce huge restrictions on what people can post, share and publish online.

The plans will allow Britain to become "the global leader in the regulation of the use of personal data and the internet", the manifesto claims.


The manifesto makes reference to those increased powers, saying that the government will work even harder to ensure there is no "safe space for terrorists to be able to communicate online". That is apparently a reference in part to its work to encourage technology companies to build backdoors into their encrypted messaging services – which gives the government the ability to read terrorists' messages, but also weakens the security of everyone else's messages, technology companies have warned.

 The government now appears to be launching a similarly radical change in the way that social networks and internet companies work. While much of the internet is currently controlled by private businesses like Google and Facebook, Theresa May intends to allow government to decide what is and isn't published, the manifesto suggests.

The new rules would include laws that make it harder than ever to access pornographic and other websites. The government will be able to place restrictions on seeing adult content and any exceptions would have to be justified to ministers, the manifesto suggests.

The manifesto even suggests that the government might stop search engines like Google from directing people to pornographic websites. "We will put a responsibility on industry not to direct users – even unintentionally – to hate speech, pornography, or other sources of harm," the Conservatives write.

Saturday, May 20, 2017

Interwebs Grinding Out the Seth Rich Whodunnit!


iBankCoin |  Reddit and 4chan have been hard at work trying to connect the dots surrounding Rich’s murder.

To that end, a user in Reddit’s ‘the_donald’ forum has found Seth Rich’s Reddit account – ‘MeGrimlock4’ (a Transformers reference) revealing much about the slain DNC staffer. For the most part, Rich seemed like a regular kinda guy – into football, dogs, patriotism, riding his bike, fun clothes, and volunteering at the Washington Humane Society.

Seth Rich’s twitter is @panda4progress, which follows @Reddit, which led us to believe he was in fact a redditor. That seems consistent with this reddit account, in that they’re both in DC and have an interest in bicycles. Edit: not JUST bicycles. A company named “split” which this account is talking about here @Panda4Progress talks to them here. Also /u/MeGrimlock4 is posting about Nebraska football.

Rich was from Omaha. No cornfed midwestern kid from Nebraska isn’t a Huskers fan. THIS IS DEFINITELY SETH RICH’S ACCOUNT
Here’s where it gets interesting: /u/pandas4bernie and a tumblr by the same name ALSO stopped posting at the same time as this account. If that’s Rich, then that proves motive. Rich was a BernieBro.
———-
Which may be why Rich gave WikiLeaks the DNC emails – after they false flagged Bernie…
The Democratic National Committee (DNC) uses an outside software partner “NGP VAN,” founded by Nathaniel Pearlman, chief technology officer for Hillary Clinton’s 2008 presidential campaign. Their ‘VoteBuilder’ software was designed for Democratic candidates (Bernie, Hillary, etc.) to track and analyze highly detailed information on voters for the purposes of ‘microtargeting’ specific demographics.

On December 16th, 2015, NGP VAN updated the Votebuilder with a patch that contained a bug – allowing the Sanders and the Clinton campaigns to temporarily access each other’s proprietary voter information for around 40 minutes. Lo and behold, the Sanders campaign National Data Director, Josh Uretsky, was found to have accessed Clinton’s information and promptly fired.
Uretsky’s excuse was that he was simply grabbing Clinton’s data during the window of vulnerability to prove that the breach was real.

Bernie cried false flag!
Sanders claimed that Uretsky was a DNC plant – “recommended by the DNC’s National Data Director, as well as a former COO of NGP VAN.”

Of note, Seth Rich was not the National Data Director. According to the DNC’s 2016 roster, Seth Rich was the DNC’s “Voter Expansion Data Director” while Andrew Brown was the National Data Director – who Bernie said referred Uretsky.

So Seth Rich, a Bernie supporter, would have known people involved in the ‘hack’ Bernie says was meant to frame him…
It’s easy to speculate how Seth Rich could have become disgruntled after witnessing the DNC attempt to sabotage the Sanders campaign. As such, it’s not a stretch to imagine that Rich – a guy with access  to sensitive emails and technical skills, did in fact communicate with Wikileaks in order to expose and root out the DNC’s misdeeds.

Saturday, May 06, 2017

Unpaywall


filmsforaction  |  Getting blocked by a paywall can be irritating, especially if you’re trying to access peer-reviewed scientific research. Open access advocates would certainly think so. To paraphrase Richard from HBO’s “Silicon Valley,” who doesn’t want free information? Well, there may now be a way to get scientific publications for free — and it’s completely legal.

Open-source nonprofit Impactstory, funded by the National Science Foundation and the Alfred P. Sloan Foundation, has developed a web browser plug-in called Unpaywall, and as the name suggests, it’s a way to get through to paywalled research papers for free.

“Now more than ever, humanity needs to access our collective knowledge, not hoard it behind paywalls,” according to Unpaywall’s website. “Lots of researchers feel the same; that’s why they upload their papers to free, legal servers online. We want to help bring that open access content to the masses.”

SUPER LEGAL
Unlike similar services that rely on means like automated web scraping, Unpaywall’s method of getting full-text access to scientific journals is totally legal. It scans a database of more than 90 million digital object identifiers (DOIs) for copies of papers that the researchers themselves have uploaded, whether on some pre-press servers or university websites. Unpaywall is also completely secure, as it doesn’t ask you for any personal information.

Best of all, to use the service, you just need to install the plug-in on your Chrome or Firefox desktop browser. A little lock symbol will appear every time you visit a journal article’s landing page. If the lock is green, you have access to a full-text copy of the article. A gold lock means an article already has open license access from the publisher.

“We’re able to deliver an OA copy to users more than half the time,” Jason Priem, one of Unpaywall’s creators, told The Chronicle of Higher Education. He’s excited for the service to hit critical mass: “That’s when people start thinking, ‘Hey, why are we paying millions of dollars to subscribe to tens of thousands of journals when our researchers have about a better-than-even chance of reading an article with no subscription at all?'”

Sunday, November 13, 2016

Did Organized Crime Just Now Do This In America?


globalguerillas |  This year, an open source insurgency formed in the US and it took control of the White House.  I didn't write much about it this fall because it hit too close to home.  I knew what would happen.

What is an open source insurgency?  An open source insurgency is how a very large and very diverse group of people empowered by modern technology and without any formal organization, can defeat a very powerful opponent.

I first started writing about open source insurgencies during the war in Iraq over a decade ago.  During that war, over 100 insurgent groups with different motivations for fighting (tribal interests, pro-Baathist, pro-nationalist, pro-Saddam, and lots of jihadi flavors) used the dynamics of open source warfare to fight a global superpower to a standstill.  We saw it again a few years later in the political world, when during the Arab Spring an open source fueled protest toppled governments in Tunisia, Egypt, Libya and Syria.

Open source insurgencies and protests can arise spontaneously and they are very hard to stop once they get going since they are impervious to most forms of repressive counter-attack and political subversion.  For example, the open source movement propelling Trump forward made him impervious to attacks on his character.  It also eliminated any need for "ground game" or standard political organization and obviated any need for information disclosure and detailed policy papers. 

Of course, that doesn't mean you can't defeat an open source insurgency.  You can, but it requires a different approach.

Saturday, November 12, 2016

A Better Way to Crack the Brain


nature |  At least half a dozen major initiatives to study the mammalian brain have sprung up across the world in the past five years. This wave of national and international projects has arisen in part from the realization that deciphering the principles of brain function will require collaboration on a grand scale.

Yet it is unclear whether any of these mega-projects, which include scientists from many subdisciplines, will be effective. Researchers with complementary skill sets often team up on grant proposals. But once funds are awarded, the labs involved often return to work on their parts of the project in relative isolation.

We propose an alternative strategy: grass-roots collaborations involving researchers who may be distributed around the globe, but who are already working on the same problems. Such self-motivated groups could start small and expand gradually over time. But they would essentially be built from the ground up, with those involved encouraged to follow their own shared interests rather than responding to the strictures of funding sources or external directives.

This may seem obvious, but such collaboration is stymied by technical and sociological barriers. And the conventional strategies — constructing collaborations top-down or using funding strings to incentivize them — do not overcome those barriers.

Thursday, October 27, 2016

Royal Society Open Access Week Until November 6th


RoyalSociety |  Since we launched in 2014, the Royal Society’s broad interest open access journal Royal Society Open Science has been publishing high-quality research across the biological sciences, engineering and mathematics. 

The journal is at the forefront of the Society’s mission to disseminate high-quality science regardless of topic or likely impact, and includes innovative features such as optional open peer review and Registered Reports.

As a broad interest journal, we’ve published many papers that have excited readers, and to celebrate Open Access Week, we wanted to share with you some of our most frequently read papers. We hope you’ll enjoy reading them as much as we have!

Monday, October 24, 2016

breaching the corporate media barrier - by any means necessary...,


unz |  Once we recognize that weakening the media is a primary strategic goal, an obvious corollary is that other anti-establishment groups facing the same challenges become natural, if perhaps temporary, allies.

Such unexpected tactical alliances may drawn from across a wide range of different political and ideological perspectives—Left, Right, or otherwise—and despite the component groups having longer-term goals that are orthogonal or even conflicting. So long as all such elements in the coalition recognize that the hostile media is their most immediate adversary, they can cooperate on their common effort, while actually gaining additional credibility and attention by the very fact that they sharply disagree on so many other matters.

The media is enormously powerful and exercises control over a vast expanse of intellectual territory. But such ubiquitous influence also ensures that its local adversaries are therefore numerous and widespread, all being bitterly opposed to the hostile media they face on their own particular issues. By analogy, a large and powerful empire is frequently brought down by a broad alliance of many disparate rebellious factions, each having unrelated goals, which together overwhelm the imperial defenses by attacking simultaneously at multiple different locations.

A crucial aspect enabling such a rebel alliance is the typically narrow focus of each particular constituent member. Most groups or individuals opposing establishment positions tend to be ideologically zealous about one particular issue or perhaps a small handful, while being much less interested in others. Given the total suppression of their views at the hands of the mainstream media, any venue in which their unorthodox perspectives are provided reasonably fair and equal treatment rather than ridiculed and denigrated tends to inspire considerable enthusiasm and loyalty on their part. 
So although they may have quite conventional views on most other matters, causing them to regard contrary views with the same skepticism or unease as might anyone else, they will usually be willing to suppress their criticism at such wider heterodoxy so long as other members of their alliance are willing to return that favor on their own topics of primary interest.

Tuesday, September 06, 2016

shaming at scale?


edge |  My own view on guilt is that it's highly dependent on how much time you get to spend alone. I think that when you have zero chance of spending any time alone in your society, you're very unlikely to have strong feelings of guilt every day, in part because I view guilt as defined—and there are lots of arguments, and you all know these better than I do, definitions about what guilt or shame really mean—but guilt is internalized, and the only person you're answering to is your own self. I view guilt as the cheapest form of punishment there is. It's self-punishment, and you prevent the group from having to punish you by either cutting yourself off from doing the act, to begin with, or paying some sort of penance afterward.

Shakespeare used the word "guilt" only 33 times. He used the word "shame" 344 times. So when we start thinking that it's just a Western thing, we should also note that it's even more modern than just being a Western phenomenon. My own particular interest is in environmental guilt, which I see this rising a lot, basically beginning in the 1980s, and I tie this to a switch from a system that was focused on changing a supply chain and production of chemicals or bad products, to more a demand-focused side strategy.

With that demand focus strategy, the focus on the individual, guilt was an easy low-hanging way of getting people to engage with the issues. Of course, there's a big threshold problem there. Because it's linked to a switch from the focus on supply to the focus on demand, it means that its power is very limited.

If you ask does this behavior scale, I would argue, no it doesn't scale. Does the U.S. feel guilty for doing something? Does BP feel guilty for the Gulf Oil spill? By the very definition of what guilt is—an internal regulation of one's own conscience—it implies, at least to me, that it does not scale to the group level; although, you have these trends, like survivor guilt or collective guilt, that call this into question.

I am interested in social problems, so maybe we should focus on the types of social emotions that might scale, and not just social emotions, but social tools, and that's why I got interested in shame as a tool, which is separate from shame as an emotion. We could all disagree here about what shame is as an emotion. A lot of people agree that it requires some sort of audience, but some don't. Some people argue it's a sense of your whole self, or as guilt is just based on the transgression itself. But I want to focus on shame as a tool, as a punishment, and situate it within a larger body of punishment.

I would like to distinguish shame, starting off, from transparency. A lot of people confuse them in the popular media, thinking that they're the same thing. Transparency exposes everyone in a population, regardless of their behavior, whereas shame exposes only a minority of players, and this is an important distinction. Both shame and transparency are obviously only interesting if the distribution is not uniform. So we have to have some variability in there; otherwise, we're really not interested in the behavior. I want to argue, too, and one of the points I make in some recent work, is that shame is more effective the larger those gaps are, not just between existing behaviors, but between what we think should happen and what is actually happening.

Saturday, June 25, 2016

ethics as an OS - the preconditions of revolution exist in the west


theguardian |  Robert David Steele, former Marine, CIA case officer, and US co-founder of the US Marine Corps intelligence activity, is a man on a mission. But it's a mission that frightens the US intelligence establishment to its core.

With 18 years experience working across the US intelligence community, followed by 20 more years in commercial intelligence and training, Steele's exemplary career has spanned almost all areas of both the clandestine world.

Steele started off as a Marine Corps infantry and intelligence officer. After four years on active duty, he joined the CIA for about a decade before co-founding the Marine Corps Intelligence Activity, where he was deputy director. Widely recognised as the leader of the Open Source Intelligence (OSINT) paradigm, Steele went on to write the handbooks on OSINT for NATO, the US Defense Intelligence Agency and the U.S. Special Operations Forces. In passing, he personally trained 7,500 officers from over 66 countries.

In 1992, despite opposition from the CIA, he obtained Marine Corps permission to organise a landmark international conference on open source intelligence – the paradigm of deriving information to support policy decisions not through secret activities, but from open public sources available to all. The conference was such a success it brought in over 620 attendees from the intelligence world. 

But the CIA wasn't happy, and ensured that Steele was prohibited from running a second conference. The clash prompted him to resign from his position as second-ranking civilian in Marine Corps intelligence, and pursue the open source paradigm elsewhere. He went on to found and head up the Open Source Solutions Network Inc. and later the non-profit Earth Intelligence Network which runs the Public Intelligence Blog. 

I first came across Steele when I discovered his Amazon review of my third book, The War on Truth: 9/11, Disinformation and the Anatomy of Terrorism. A voracious reader, Steele is the number 1 Amazon reviewer for non-fiction across 98 categories. He also reviewed my latest book, A User's Guide to the Crisis of Civilization, but told me I'd overlooked an important early work – 'A More Secure World: Our Shared Responsibility, Report of the UN High-Level Panel on Threats, Challenges, and Change.'  

Last month, Steele presented a startling paper at the Libtech conference in New York, sponsored by the Internet Society and Reclaim. Drawing on principles set out in his latest book, The Open-Source Everything Manifesto: Transparency, Truth and Trust, he told the audience that all the major preconditions for revolution – set out in his 1976 graduate thesis – were now present in the United States and Britain. 

Steele's book is a must-read, a powerful yet still pragmatic roadmap to a new civilisational paradigm that simultaneously offers a trenchant, unrelenting critique of the prevailing global order. His interdisciplinary 'whole systems' approach dramatically connects up the increasing corruption, inefficiency and unaccountability of the intelligence system and its political and financial masters with escalating inequalities and environmental crises. But he also offers a comprehensive vision of hope that activist networks like Reclaim are implementing today.

"We are at the end of a five-thousand-year-plus historical process during which human society grew in scale while it abandoned the early indigenous wisdom councils and communal decision-making," he writes in The Open Source Everything Manifesto. "Power was centralised in the hands of increasingly specialised 'elites' and 'experts' who not only failed to achieve all they promised but used secrecy and the control of information to deceive the public into allowing them to retain power over community resources that they ultimately looted."

Friday, May 20, 2016

resistance will not be futile at all....,


economist |  THE “hell cannons” of Aleppo pack a deadly punch. Cobbled together in Syria by militant groups fighting to overthrow the autocratic regime of Bashar al-Assad, they use an explosive charge at the bottom of a pipe to hurl a propane cylinder crammed with 40kg or more of explosives and shrapnel. A finned tail welded to the cylinder shields it from the launch blast and provides stability in flight. The Ahrar al-Sham brigade reckon the cannons can hit targets 1.5km away. Fuses detonate the cylinder upon impact or, using a timer, after it punches into a building. This is all the better to demolish several floors with a single strike.

The use of improvised weapons in conflict has a long and bloody history: from the Irish shillelagh, a walking stick that doubles as a club—especially effective when the knob at the top is loaded with lead—to the Molotov cocktail, as the glass petrol bombs the Finnish army hurled at Russian tanks during the second world war came to be known.

The modern equivalents are more high-tech and, like Aleppo’s hell cannons, far deadlier. This comes from a combination of more sophisticated and easily available “off-the-shelf” equipment, and the internet providing a ready medium to spread new weapon-making ideas. The upshot is a reshuffling of the cards in modern warfare, says Yiftah Shapir, a weapons expert at Tel Aviv University and a former lieutenant colonel in Israel’s air force. Any side that begins with a technological advantage will see it erode quickly as the underdogs improve their improvisation capabilities.

The ominous consequences have led America’s Defence Advanced Research Projects Agency (DARPA), an arm of the Pentagon, to try to keep up with developments by soliciting worldwide for new ways to make weapons using commercially available materials and technologies. More than 20 experts are now reviewing hundreds of submissions. To better assess the risks, some of the most promising designs will be built as prototypes and tested. This could earn their inventors awards of up to $130,000.

Sunday, January 17, 2016

Open Thread: THE DOLLAR and THE BALLOT - please help BroCon Feed out...,


Dear Sir:

One day you will step beyond the well traveled rut within which you trek and begin to see that when it comes to POWER IN AMERICA

A. The two official currencies in America are THE DOLLAR and THE BALLOT

B. The primary chartered groups seeking to harvest these currencies from the masses are:
* Corporations (Which you frequently talk about)
* Organized Religious Organizations (which you frequently talk about)
* Unions
* Activist/ Civil Rights Organizations
* Political Parties
***AND The VIRTUAL Notions Of A RACIAL Group With Common Interests

C. That the common SYSTEMATIC SCHEME that each of them use compel their respective congregations to dutifully follow along are:
1) PROPAGANDA To Establish A Narrative For The Masses To Believe In (Branding)
2) A CORRUPT MEDIA To Dispense Enough Affirming Messages That EVEN WHEN A Congregant Starts To Believe That They Are Being Mislead By Bull Shit - His Fellow Foots Soldiers Are Indoctrinated Enough To Push Back, Compelling Him To "Get In Where He Fits In. (Just take a $49 candy bar phone (voice only) into your next meeting and note the taunting you receive. You telling them that you can purchase 16 of these phones for one of their iPhone 6S XL and you put the savings into your children's college fund will get you mocked further. )
3) COLONIAL FIELD AGENTS to enforce the message (see the people taunting you above)
4) The DESTINATION "HEAVEN" that the masses will receive ONLY IF they dutifully go along and don't challenge the establishment power arrayed before them. (The Good Guys who are on the "Right Side Of History")

So, dear sir, this leaves us to conclude that THE CORPORATIONS and THE BANKSTERS who you so frequently point to ARE BUT ONE SET of CAPITALIST OPPORTUNISTS running around in this ecosystem.

More damning to "The Least Of These" are the forces who:
* Got into power by fighting against yesterday's corporations
* Condemned these corporations when they departed from their zones of power where they promised to bring these corps to their needs in order to advance Social Justice and Equality for the masses.
* Saved face and were not run out of LOCAL POWER as they recalibrated their fight from a LOCAL FIGHT to a NATIONAL FIGHT and tricked their congregation to shift their hope for Social Justice and prosperity upward and outward, continuing to invest their HOPES and VOTES

They did ONE BETTER than the CORPORATION in that they:
* Compelled The Churches, Civil Rights Organizations, Unions to compromise themselves based on the promise that in unity and "No Hateration Allowed" they can build up a unified power block and MAKE THE DISENFRANCHISED PEOPLE PROUD once THEY GET INTO POWER. Today the LEAST OF THESE are tricked into living vicariously through the ESTABLISHMENT OF THEIR OWN CHOOSING and the MONEY and POWER that they have but do not need to share.

Where am I wrong, Sir?

Friday, November 06, 2015

the kernal of the argument


WaPo |  It took years for the Internet to reach its first 100 computers. Today, 100 new ones join each second. And running deep within the silicon souls of most of these machines is the work of a technical wizard of remarkable power, a man described as a genius and a bully, a spiritual leader and a benevolent dictator.

Linus Torvalds — who in person could be mistaken for just another paunchy, middle-aged suburban dad who happens to have a curiously large collection of stuffed penguin dolls — looms over the future of computing much as Bill Gates and the late Steve Jobs loom over its past and present. For Linux, the operating system that Torvalds created and named after himself, has come to dominate the exploding online world, making it more popular overall than rivals from Microsoft and Apple.

But while Linux is fast, flexible and free, a growing chorus of critics warn that it has security weaknesses that could be fixed but haven’t been. Worse, as Internet security has surged as a subject of international concern, Torvalds has engaged in an occasionally profane standoff with experts on the subject. One group he has dismissed as “masturbating monkeys.” In blasting the security features produced by another group, he said in a public post, “Please just kill yourself now. The world would be a better place.”

There are legitimate philosophical differences amid the harsh words. Linux has thrived in part because of Torvalds’s relentless focus on performance and reliability, both of which could suffer if more security features were added. Linux works on almost any chip in the world and is famously stable as it manages the demands of many programs at once, allowing computers to hum along for years at a time without rebooting.

Yet even among Linux’s many fans there is growing unease about vulnerabilities in the operating system’s most basic, foundational elements — housed in something called “the kernel,” which Torvalds has personally managed since its creation in 1991. Even more so, there is concern that Torvalds’s approach to security is too passive, bordering on indifferent.

Saturday, July 11, 2015

synthetic genomics and genome engineering rewriting the blueprint of life


genomebiology |  Biology is now undergoing a rapid transition from the age of deciphering DNA sequence information of the genomes of biological species to the age of synthetic genomes. Scientists hope to gain a thorough mastery of and deeper insights into biological systems by rewriting the genome, the blueprint of life. This transition demands a whole new level of biological understanding, which we currently lack. This knowledge, however, could be obtained through synthetic genomics and genome engineering, albeit on a trial and error basis, by redesigning and building naturally occurring bacterial and eukaryotic genomes whose sequences are known. 

Synthetic genomics arguably began with the report from Khorana’s laboratory in 1970 of the total synthesis of the first gene, encoding an artificial yeast alanine tRNA, from deoxyribonucleotides. Since then, rapid advances in DNA synthesis techniques, especially over the past decade, have made it possible to engineer biochemical pathways, assemble bacterial genomes and even to construct a synthetic organism [1]–[11]. Genome editing approaches for genome-wide scale alteration that are not based on total synthesis of the genome are also being pursued and have proved powerful; for example, in the production of a reduced-size genome version of Escherichia coli[4] and engineering of bacterial genomes to include many different changes simultaneously [8]. 

Progress has also been made in synthetic genomics for eukaryotes. Our group has embarked on the design and total synthesis of a novel eukaryotic genome structure - using the well-known model eukaryote Saccharomyces cerevisiae as the basis for a designer genome, known as ‘Sc2.0’. The availability of a fully synthetic genome will allow direct testing of evolutionary questions that are not otherwise approachable. Sc2.0 could also play an important practical role, since yeasts are the pre-eminent organisms for industrial fermentations, with a wide variety of practical uses, including production of therapeutic proteins, vaccines and small molecules through classical and well-developed industrial fermentation technologies. 

This article reviews the current status of synthetic genomics, starting with a historical perspective that highlights the key milestones in the field (Fig. 1) and then continuing with a particular emphasis on the total synthesis of the first functional designer eukaryotic (yeast) chromosome, synIII, and the Sc2.0 Project. Genome engineering using nuclease-based genome editing tools such as zinc finger nucleases, transcription activator-like effector nucleases and RNA-guided CRISPR-Cas9 is not within the scope of this minireview (Box 1). Recent advances in gene synthesis and assembly methods that have accelerated the genome synthesis efforts are discussed elsewhere [12].

the open conspiracy


physorg |  With memories of World War I still very much on his mind, in 1935 HG Wells wrote The Open Conspiracy, which advanced a new approach to the perennial problems of human aggression, national conflict and political inertia.

This , as envisaged by Wells, would be a revolutionary movement that reflected the new spirit of the times. "Never before" he stated in the opening paragraph, "have the conditions of life changed so swiftly and enormously as they have changed for mankind in the last fifty years."

Reading Wells today one might be forgiven for experiencing a sense of déjà vu. The changes he identified were, as are those we face today, largely the result of technological and scientific advances. The telegraph and increased communication had shrunk the world, just as the internet and digitisation has done so for us today. Yet while science forged ahead, politics and morality lagged behind. The Open Conspiracy filled the ideas vacuum left by the failures of parliamentary democracy and socialism.

Conspiracy in the open
Wells suggested that, unlike conspiracies of old, this would be a visible conspiracy grown from below rather than led from above by an elite. His conspirators were "the most sane and energetic people" – anti-militarist in orientation, actively subversive of government and traditional institutions that perpetuated the folly of tradition. They would be drawn from different disciplines: banking, finance, and the sciences – and dedicated to spreading scientific knowledge worldwide.

Wells described his conspirators as awakening from an illusion, made possible by the almost instant exchange of information and a new method of organisation that would map the activities of the whole community. At the centre of the Open Conspiracy was "the brain of the modern community, a great encyclopedic organisation, kept constantly up-to-date and giving approximate estimates and directions for all the material activities of mankind" – which rather sounds like a view of "big data" as seen from the 1930s

Wednesday, June 10, 2015

the fruits of fraud-free science...,


wikipedia |  CimaVax-EGF is the first therapeutic cancer vaccine developed to target non-small-cell lung carcinoma (NSCLC), the most common form of lung cancer. The vaccine was the result of a 25-year research project at Cuba’s Center of Molecular Immunology.[1][2] The product has gone through 2 trial phases in Cuba and is currently in the process of going through a third trial, and there are agreements in place to test it in the United States (at Roswell Park Cancer Institute, subject to approval of a New Drug Application by the U.S. Food and Drug Administration), Japan, and some European countries.[3] It is currently only available in Cuba.

CimaVax is an active vaccine in which patients are immunized with epidermal growth factor (EGF), thus raising antibodies targeting EGF itself. The product is also formulated with the Neisseria meningitidis outer protein P64k and Montanide ISA 51 as an adjuvant to potentiate the immune response.[4] The epidermal growth factor receptor (EGFR) is hijacked by many types of cancer, including cancers of the lung, colon, kidney, and head and neck. By raising antibodies against EGF, which is EGFR's major ligand, the concentrations of EGF in the blood are reduced. Thus CimaVax does not target the cancer cells directly, but is expected to work against these cancers by denying the cancers the growth stimulus they require.[4][5] For this reason, the Roswell Park group thinks that it may prove most useful as a preventive vaccine rather than as a cancer therapy per se.[3]

Early trials showed a statistical trend towards an improved survival rate amongst vaccinated test subjects.[4][6] A direct correlation between the level of antibodies that a vaccinated patient raises against EGF and survival has been observed in several trials,[4] and in one of the largest trials[5] there was also an age-dependence, with only subjects under the age of 60 benefiting in terms of survival.[4] More antibodies are raised when the vaccine is formulated with Montanide ISA 51 rather than aluminum hydroxide as an adjuvant, and when patients receive a low dose of cyclophosphamide three days before vaccine administration.[4] Cyclophosphamide is thought to temporarily block the body's natural immune tolerance to EGF, thereby increasing antibody titers.[4]

CimaVax is relatively cheap to produce and store, and has low toxicity.[3] Side effects of the vaccine appear to be mild, and include chills, fever, headache, nausea.[7][4]

Researchers caution that the early results to date have been in relatively small, early-stage trials with patients that were carefully selected based on predefined inclusion and exclusion criteria, and given specialized oncology care; they may therefore not be representative of most patients who might benefit from the vaccine.[4] It has been urged that CimaVax be tested in patients with earlier-stage NSCLC cancer and in patients who are not candidates for chemotherapy, and that research be conducted to determine which subgroups of NSCLC patients do and don't respond the vaccine.[4] It has also been suggested that CimaVax may also be effective in other types of cancer that are dependent on EGF/EGFR, including many cases of prostate cancer.[4]

Africom Expelled From Niger Just Like Little French Bishes...,

abcnews  |   On Saturday, following the meeting, the junta’s spokesperson, Col. Maj. Amadou Abdramane, said U.S. flights over Niger’s ter...