Lately, I’ve been enjoying reruns of the relatively new BBC series Sherlock, starring Benedict Cumberbatch, which imagines Arthur Conan Doyle’s famous detective in our 21st century world. The thing I really enjoy about the show is that it’s the first time I can recall that anyone has managed to make Sherlock Holmes funny without at the same time undermining the whole premise of a character whose purely logical style of thinking make him seem more a robot than a human being.
If you get just old enough, one of the lessons living through history throws you is that dreams take a long time to die. Depending on how you date it, communism took anywhere from 74 to 143 years to pass into the dustbin of history, though some might say it is still kicking. The Ptolemaic model of the universe lasted from 100 AD into the 1600′s. Perhaps even more dreams than not simply refuse to die, they hang on like ghost, or ghouls, zombies or vampires, or whatever freakish version of the undead suits your fancy. Naming them would take up more room than I can post, and would no doubt start one too many arguments, all of our lists being different. Here, I just want to make an argument for the inclusion of one dream on our list of zombies knowing full well the dream I’ll declare dead will have its defenders.
We asked “If a gene therapy that added fifty years of life was safe and effective, should parents be legally required to give it to their children?” Only a third of the 182 respondents thought mandatory gene therapy for longevity for kids was a good idea.
As expected, the last case ruled on before the Supreme Court of the United States adjourned until October was the Hobby Lobby/Conestoga case. For those unaware, this case is based on the Affordable Care Act’s contraception mandate, classifying contraceptives as preventive healthcare required under all insurance plans without a co-pay. Hobby Lobby and Conestoga Wood both objected to this, saying that covering some forms of birth control, like the IUD/IUS or Plan B, violated their religious beliefs by requiring them to fund abortive medications.1
Last post we observed the dynamics of the collective in the terms of a small tribe, and indicated that at this size, things worked pretty well. That is not to say that error modes were not possible, but that when error modes arose, there were mechanisms in place to deal with those errors. Essentially, at this scale, the ability of individuals to veil their actions in a wall of secrecy did not exist. While it is certainly possible for the individual to lie, cheat, steal and deceive, such actions could only be carried out to a limited extent, and carried repercussions that were deleterious to that individuals long term well being.
Big data is cell phone users having an average of 100 interactions with their phone per day, all of which generate computerized records (100s of trillions of records). Big data is every financial market transaction, every passenger on every airplane flight, every shipped container, every transportation conveyance, every tweet, and every Internet post (all in the 100s of billions or trillions of records). Every transaction for all time.
The digital age version of the proverbial tree falling in the woods question is: Does something exist if it hasn’t been liked, favorited, linked to, or re-tweeted? According to many tech critics, the tragic answer is no. Like Lady Gaga, we live for the applause. But if constantly chasing other people’s approval is a shallow way to live that leads to time and energy being wasted over pleasing others and recurring feelings of insecurity and emptiness, how can we course correct?
Tyler Cowen points to this great Marc Andreessen interview in the Washington Post that features him saying the following about net neutrality: So, I think the net neutrality issue is very difficult. I think it’s a lose-lose. It’s a good idea in theory because it basically appeals to this very powerful idea of permissionless innovation. But at the same time, I think that a pure net neutrality view is difficult to sustain if you also want to have continued investment in broadband networks.
Most of us in the west were raised with legends, myths and movies that taught Suspicion of Authority (SoA). Thanks to the great science fiction author, George Orwell, we share a compelling metaphor— Big Brother —propelling our fears about a future that may be dominated by tyrants.
Commonly described as a “Yelp for men”, Lulu is a relatively new dating app designed to help women seeking men research potential new romances in a similar fashion to looking up products on Amazon. Its founders claim that already a quarter of college women use it.1
Picture this: A group of abortion opponents stand outside a women’s clinic holding pictures of fetal remains. As they stand there, calling and offering pamphlets to people entering the clinic, a trickle of pro-choice activists also arrive…
I am sure you have heard it constantly. "Google is (insert fear term here.)" They want to take over the internet, they are building skynet, they are invading our privacy, they are trying to become big brother, etc, etc, ad nausem. Be it Glass, or their recent acquisition of numerous robotics firms, to even hiring Ray Kurzweil, Google has recently been in the news a lot, usually as the big bad boogieman of whatever news story you are reading.
(CNN)—Critics haven’t been kind to Personal Dating Assistants, a new service that allows men to up their online dating game by outsourcing tasks to paid, clandestine wingmen who pimp profiles, locate prospects and ghostwrite correspondences. GQ calls it “creepy.” CNET says customers eventually will have to admit they are big fakes. And over at Jezebel, dudes who take advantage of the deception are called “human trash.”
Growing up in the South gave me a certain perspective of the United States that I wish many wouldn’t have to deal with, from bigotry to ignorance, poverty to inequality. So listening to Hip Hop became my way of escaping these realities. As time progressed, however, and as society evolved, so too did Hip Hop. Now as we reach the Information Age and a nearing Transhumanist paradigm shift, I again look to Hip Hop and see what it’s saying and whether or not it’s keeping up with the times.
The notorious 1982 video game Custer’s Revenge requires the player to direct their crudely pixellated character (General Custer) to avoid attacks so that he can rape a Native American woman who is tied to a stake. The game, unsurprisingly, generated a great deal of controversy and criticism at the time of its release. Since then, video games with similarly problematic content, but far more realistic imagery, have been released. For example, in 2006 the Japanese company Illusion released the game RapeLay, in which the player stalks and rapes a mother and her two daughters.
Reaching back a bit…I had a chance to speak with the mighty maven of tech-future Journalism, Tim O'Reilly, during my previous visit to Washington DC. The next day in Forbes, Tim cited me with the following quotation: "It is intrinsically impossible to know if someone does nothave information about you. It is much easier to tell if they do something to you." His article, The Creep Factor: How to Think about Big Data and Privacy, is cogent.
I’ve looked at data-mining andpredictive analytics before on this blog. As you know, there are many concerns about this type of technology and the increasing role it plays in our lives. Thus, for example, people are concerned about the oftentimes hidden way in which our data is collected prior to being “mined”. And they are concerned about how it is used by governments and corporations to guide their decision-making processes. Will we be unfairly targetted by the data-mining algorithms? Will they exercise too much control over socially important decision-making processes? I’ve reviewed some of these concerns before.
When the Partially Examined Lifediscussion of human enhancement (Episode 91) turned to the topic of digital technology, the philosophical oxygen was sucked out of the room. Sure, folks conceded that philosopher of mind Andy Clark (not mentioned by name, but implicitly referenced) has interesting things to say about how technology upgrades our cognitive abilities and extends the boundaries of where our minds are located. But everything else more or less was dismissed as concerning not terribly deep uses of “appliances”.
Yes. Yes we can. The last year has brought with it the revelations of massive government-run domestic spying machineries in the US and UK. On the horizon is more technology that will make it even easier for governments to monitor and track everything that citizens do. Yet I'm convinced that, if we're sufficiently motivated and sufficiently clever, the future can be one of more freedom rather than less.
"I believe that we have turned a corner: we have finally attained Peak Indifference to Surveillance. We have reached the moment after which the number of people who give a damn about their privacy will only increase. The number of people who are so unaware of their privilege or blind to their risk that they think “nothing to hide/nothing to fear” is a viable way to run a civilization will only decline from here on in." - Cory Doctorow
Data-mining algorithms are increasingly being used to monitor and enforce governmental policies. For example, they are being used to shortlist people for tax auditing by the revenue services in several countries. They are also used by businesses to identify and target potential customers.
FaceBook turns ten this year, yes only ten, which means if the company were a person she wouldn’t even remember when Friends was a hit TV show- a reference meant to jolt anyone over 24 with the recognition of just how new the whole transparency culture, which FaceBook is the poster child for, is. Nothing so young can be considered a permanent addition to the human condition, but mere epiphenomenon, like the fads and fashions we foolishly embraced, a mullet and tidied jeans, we have now left behind, lost in the haze of the stupidities and mistakes in judgement of our youth.
An RFID chip is a small electronic device that is implanted in a human body. Such a device is embedded to contain information. These chips are implanted to tell things about a human being, such as identity or contractual information – such as a money debit system. This signifies a risk, since it means the conveyance of information can be cloned.
All the recent news about government data leaks has got me thinking about the role of government secrecy in a democracy. It seems to me that in order for the government to serve all the functions we ask of it, some temporary veil of secrecy
may be necessary and ethically permissible. The problem is, if there isn’t a way for members of a democracy to know what their government is doing on their behalf, the democracy may lose its legitimacy.
This series of blog posts is looking at arguments in favour of sousveillance. In particular, it is looking at the arguments proffered by one of the pioneers and foremost advocates of sousveillance: Steve Mann. The arguments in question are set forth in a pair of recent papers, one written by Mann himself, the other with the help of co-author Mir Adnan Ali. Part one clarified what was meant by the term “sousveillance”, and considered an initial economic argument in its favour. To briefly recap, “sousveillance” refers to the general use of veillance technologies (i.e. technologies that can capture and record data about other people) by persons who are not in authority.
Steve Mann (pictured) has been described as the world’s first cyborg, and as a pioneer in wearable computing. He is certainly the latter. I’m not so sure about the former (I believe Mann rejects the title himself). He is also one of the foremost advocates for sousveillance in the contemporary era. Sousveillance is the inverse of surveillance. Instead of recording equipment solely being used by those in authority to record data about the rest of us, sousveillance advocates argue for a world in which ordinary citizens can turn the recording equipment back onto the authorities (and one another). This is thought to be beneficial in numerous ways.