comparemela.com

And they can be purchased downstairs he will sign the following the event if we run out of copies there is a place they can sign never even order a book for you. So find me if you could not get a book also sees bin is here this evening please silence your cellphone also there are some pamphlets and fires in the back and if you take out your phone into the picture of me, please dont a yellow box will appear we were worried about the batteries die in. Dying. [laughter] [inaudible conversations] the way that we use these technologies but john cheneylippold points out we are data we are what computers do nazi they compute cutting through marketing speak as a reassuring reminder to say it is being performed the same goes for a banner ad for those jackets but based on the Search History those keywords this seems more pernicious and evasive as a condition of what we prefer to think does not shape that life after all you may laugh in a way that human complexity to say it isnt claiming that we are day negative but rather contemporary numbers this is what you call a measurable type of with those prophecies that are creating them aisle were kidnapped contemporary life for gender race and class or hoping not to overgeneralizes the way that they do want to strip down those facsimiles without not even a flaw in their design in the do so on their terms end to paraphrase another threat to be extrapolated the united the progressive very regressive future in within this framework he can work with bin scholarship with the interactions within the world that is increasingly shaping the government john cheneylippold is a professor the university of michigan please help me to welcome him. [applause] i am very happy a2 we here with friends and family so hopefully we can talk about this in the coming future. The book is called we are data and he did a very good job to explain it is not that it is us individually i do not look at my hands to see once a and zeros but we are data comes from one single pieces that you are not wholly in thank you are in terms of data but there is a centesis of the terms of the data are not the terms of our reality. Talk about sexuality and race we think of these things a sister met asymmetrically ourselves with that is the way we negotiated with the government doesnt try to put you to those legal procedures it is just trying to find to effectively understand the targeting mechanisms from nsa for jsoc is a what they fake israel but what is useful for them so one way to see this example is through the idea of gender and marketing so i ask my clients that mall negative class is the students so what gender does google think i am . They seriously go through google preferences and find out the idea may be google this is a coup you are is who you are. It is funny as the 65 role of women but it is not necessarily an accurate because it says i like to view the and fitness i have no idea how that was developed. [laughter] but to save those connections they are trying to make in terms of a pattern of behavior theyre just trying to find commercially they dont want to know what exist or how to underperformance is in a very real way but either the fits or doesnt. So instead i argue this is the entirely new age or race or class or sexuality. Not based on a normal agenda from the discourse of surrounding there is another company that tries to show things like College Graduate attributes then produces one says a male or a College Graduate. This information is useful to identify in the of misidentification or zhuzhou benedettis rather they are used for extraordinarily powerful the tracks metrics and analytics itself under states and those demographics to access content. For example, i use a web site from my graduate years since losses angeles it was fun and wonderful but because of what we would do is look at the break down those coming to the site and then determine what type of stories that we werent right imagine a bunch of white people or hispanics you say we could deduct the resources to identify them in general or to say in the website we try to do both but to say i as a 65 yearold woman would be participating in a day woman that they are written writing stories for i would read three passages because i realize doing all these interviews i have such as stock way to talk about it but i do better in the book. So i will read three things and a short video to bring you to a sense how this impacts of how they work. That the utilization of everything how they proclaim controller for the use of the system but as long as it is granted at the pleasure of google there is simply no consistency or accountability. So it normalizes the inconsistency at every step. With the terms of an for rationed it is not to replace the understanding of ourselves or a cyborg rather explore how they put layers upon additional layers on that identification that all the rhythmic ideas is of a process that goes through the database and with the bases in the future with the dynamic interpretation that they technology to that discourse and that is the colonel of the of arithmetic identity. And with that statistics but here we you counter that political sphere with vocabulary needed into the purpose of phrase to think politically is to attach politics to what is the noble we cannot think about those genders the same way or the algorithm neck brace and the same way with those categories gold distributions. In this way i talk about gender and class and identity battle so more than just the of big three so here i introduced the idea of the algorithm make society that cannot for me in the of prism there is a very fascinating little thing that says anybody in the nsa can be watched. So what does that mean . Either you are or you were not. According to a passport or documentation or they try too often dicky yourself. This becomes problematic when deciding who deserves the right to privacy. The added say question that has the body or a user or the Social Security number. Online readjusted the ip address. So they try to create a new index for citizenship to make the dragnet completely legal. So one you k artist as this one app it looks at what sites you visitor coming from and within the parlance of the nisei like a citizen. So the information that they use to evaluate is not citizenship metrics but very weird racist assumptions. If you speak english with you speak to another you are more likely to be foreign. If you are in the United States but if it drags from outside you are for in. View are encrypting it or if not youre supposed to be a citizen otherwise you could be. That it is a suggestion of quality that you could be the operative flour as well. This is the way the and the say determine citizenship and also now i will read again. The founder of 0k key bed quickly assessing with the power of dave the to have new forms of research. Today said the microchip can understand that he is a sentence to tell the story to the computer we kill people based on metadata. It is rare you are from where you send a text message. That identifies with the type and date or the device that you use. To sell with those Fiber Optic Networks that it is spoken wage would not wanted to speak so the former chief hayden alerts us to how did metadata could be spoken for as is that could be against a preexisting pattern and if if its within the signature of the template at the end of a predator draw on strike that requires no target or groups of men who have certain signatures of the characteristic with terrorist activity that with this in mind we could be more specific with the war of terror during the rest. With the Drought Program the strikes were targeted with individuals and their voice or of their name then judge road operator with launched them down but it in 2008 with the frustrations with the military state u. S. Loosened the guidelines now is adjusted to u. S. Claims the also the database. Sova to publicly differentiate one of the consequences was the frequency of day it drove attack. To attack and during those seven years between 2009 and 2015. The loosening of the goal restrictions was a pre identified signature behavior. Says 2008 the government has launched precision drove attacks with the dead that looks as if the target that they wanted to kill but forcibly that was not the same. So to propose with the true strike that should but never will remind americans it was of distant lands. That unintentional targeting of a Wedding Party were they congregate outside the city center as if it was a terrorist meeting with those geographic areas even on u. S. Kill list to be identified as if they were precarious sense of life this operation lysing of terrorist with that process of metadata of louis r. And then to be tethered together without attention to are of historical particulars such logic like that signature strike with those back stories does not deal with the desire for motivation and is conjured up by one of those virtues the abandonment in favor of world the detail. We are strategically fictionalized with the philosophy as if the purpose of the world of ideas is not the betrayal but provide with an instant to find more easily in this world. So to have the power to tell the stories for us. In this story as described putting out more of the knowledge more than anytime in existence putting Human Knowledge out there in the world inundated to capture the of rigid more worldly detail through that big data perspective with those quantities paring it down as the logical next up of course, with that, and plays acceptance that a terrorist is declared to be a terrorist. Most likely speak arabic and most will practice is long. That what they describe as baggage that encounters from the media scholar of that terrorist monster. Saw one that does not make that subject in regina of his own drone program. So the other monstrosity experience the conditions here one mans terrorist is another mans is reinforced this is always in terms favorable so with as it allocation one whose parity is justified looking that targeted presently it just needs to be a data signature as the anonymous u. S. Official said you dont necessarily need to know his name or have his dossier but in what they have been engaged. But that status of target rather than me being in depth with that logarithmic data is a strategic convenience. It is a program to the logic of the nsa. It is the uncertain the vernacular the creator of the of software the problem is some problems with the engineers. Because the future them into problems the nsa has incredible capacity and referring to those small patterns of correlation that expand beyond conventional college. Said to face that concept is also must include the algorithm the cousin. So now i want to think about something from my research. I am always taken pride that piece of the culture that isnt intended to be used for purposes, can i show you the recurring doctrine . To let people know but it is a very interesting cents so we will watch the video and then have questions. Inside vessel there is a code that represents not what we are, but who we might become. It is our potential. Twentyfive years ago based on the ideas that technology was the key to unlocking the power of human potential. Fueled by the latest software and to break down barriers. So what can i be . We have inspired them to pursue their dreams. How far can i go . We give them the tools to express their ideas. How do i compete . So what is the next big thing . We enable them to fulfill their vision the better we do our job the greater the achievement we inspire to move forward with the unexpected opportunities mitt is the worlds greatest challenge trivias those achievements of us all microsoft. I love this so much because it is so utopian or 90s. [laughter] but i use of video and the beginning and the conclusion to think about this. We are metadata this configuration is best described the what a jury of the graph. Whether it actualizes through technology but more appropriately to be there by the rhetoric. That code represents not just us but they celebrate the world and that goes handinhand with but but that seems like the one that stays late at the office with a partnership. The yet that voiceover copy is more substantial so then the world changes. With those ideas and how it is organized. With the knowledge of how that is defined or connected of course, we dont have to use microsoft products to of the shower potential but they will critique the role that technology has to determine who might become. And then to play second fiddle with citizenship celebrity they become the author of who we are and it classifies us it did those classifications carry immense weight. And racine in gender mean. It needs the central argument but then to say i am john without full comprehension. In this is the political astilbe of 84. How much the present controls the past. Everything that comes before so what happens we dont control the present . With that film about facebook when the human being becomes the set of data everything shrinks. It with that transcendent experience of those desires or fears should be careful what we wish for but on facebook there not more free bet more owed to because were made of data where researchers have free conceptualize that idea with a new feature to make that more decorum into our lives to evaluate the photos are status updates what facebook thinks is inappropriate content so to be considered in the coming the should be posted publicly but that it would no appropriate and inappropriate is the same idea that tsa is a terrorist they dont all these are constructed from these inconsistencies but despite that it is powerful facebook if ever implemented one of more that behavior than any other. They could unlock your potential but not in the way microsoft wants you to believe. But to be hard coded into your system trust me you dont but with one brief look will show that terrifying competence what these algorithms to for the office. Regimen a world and this is the precise problem that we encounter. Sure Public Policies are losing funding but google has the ability to make a celebrity is facebook defines that as an appropriate. So for me, that is my presentation so i invite you to ask me any question is related to the book. [applause] our sherbrooke structured . I start with day idea of how they get the identities of a terrorist then i move on and to produce a relationship of control with that gender theory how those that we do not think of over a our behavior to connect all the rhythmic ideas so what is privacy and what does that mean . I have never ben asked that. I wonder in the terrorists example you can talk about the nature and how that differentiates between human judgment as you said a couple of times to identify a pterosaur a drone strike might be different. And i think one of the things that was the differentiator was the types of mistakes computers are making in one of the things i tried to distinguish with some reasonable certainty first is the algorithm that i decided with this possible from ability. This is a fantastic question. We have seen these drones strikes before then in terms of the of a rhythmic terrorist so his views on the ground communication i see them through the window but its creepy and that as say western operator fed data that they use in particular often is that space of metadata no proof that it is all connected to a person that is why a lot of wedding parties 25 people are outside the city center that looks like a terrorist meeting so because of that there is a cellphone they are targeting that put its weight to which they phone the idea they have a model for terrorism so in terms of that there will be errors but that senator strike is because if you want to see a terrorist you will see them anywhere you will be much more likely is it now looks suspicious. But i imagine those accidentally kyles our different. Very good point and also those that are killed in civilian attacks were a lot more humiliated but in the joint attacks it is entirely unconnected after the taliban realized that they would meet every week to put the sin cards in the bed then reallocate to disrupt a the pattern so imagine if you picked the card from falling then they want chanter killed. So ive had some friends pass away recently have the memorial of those who have died so what is your take on that so how you interpret that person is a memory or a death . Is also a deeply philosophical. I think facebook sway to identify these events is the problem what to do with this culture is no longer eat fiber into useful followed by those events and according to the aesthetics and the structure that you might want to commemorate of mine with the ability to monitor or manufacture a profile that increases the score with other people and how they determine people are on facebook together so it is that commercialization useful for facebook so because of that everything is saved. Other questions . Going back to drown said his Decision Making 35 years ago in a world of where people withheld information and interpreted a view as gender something very similar is a Human Network of what has been embodied in Silicon Valley . That is excellent financial use gossip to understand that relationship may not be immediate because of normal function if the cop says hey you then you recognize yourself mended it is hailing you as a person so somebody sees you across the street if well understand Something Like gender and race the big things i would find that is different is the social world that there is day dialogue of the social construct like george to stand the yelling this is not just society there are rules. But that construction of gender and race but on the converse Something Like this there is proprietary in heavy entirely a commercial category with the social contract of race. If you talk back to tears on the model that would make it available. Is that a good dancer . A answer . Do you think that construction of the employment of data, which of the use of the algorithms is to remove a the subjective factor but also to be replaced so we will engineer the solution . And the second question is more lighthearted but i am sure you have seen the movie can you comment . With the state power is compelling holiday reconfigured but day militant was if they bomb people even if they were not affiliated with the terrorist groups they were seem to be militants because of a georgia under that allows us to avoid those questions i think there is a lot of ways those strong pilots are forced to distance themselves the way theyre on play station or joysticks. But in terms set you dont know what you see. I am from i would they have a lot of drone pilots that workfare. But other rhythmically but there is existing legal stuff a foreigner dressed like a terrorist but they have not find of as targeted to treated as the same thing. To increasingly use those data driven patterns especially n. Yemen but then there is no repercussions. But that could change in the coming years. At was glad to hear you mention heidegger is your final chapter to famously said that is only a half measure against technology and i am curious of that conclusion without full measure with the use of technology. In the past five for six months the democracy because im looking analogue of examples how the Defense Department tries to append revolution not your actual agents or covert actions by using data as the profile people so what point could those uprisings occurred . And then there is a whole market for it. That is how populations are moving around about the usaid program with that show company with those that reason that connection. And have all that data is saved into the database. Which would categorize them into the entire revolution with the idea out to the streets to go against a the castro regime. That is with Foreign Policy but i do know a lot of people say from those to all of President Trump election in the Cruz Campaign is that filter bubble with these fragmented commercial pockets for civil discourse. I am very very hopeful. What do we do . To try to think of privacy that they take writings from 1880 in the 19th century in theorize the idea taken up by Warren Brandeis to think about information that brandeis was the taking photos from the trees within he himself was eating privacy. With that invasion. But to be much more provocative not just raising the best you call your energy so we should be able to avoid this before it happens. But i start to think about that algorithm x stuff that the merchant way of the opinions to have that aberrant behavior. And what about these manipulating forces . Through that i kind of give up on that live your right to privacy because even if i go home my phone is still my in my house that verizon might know. And to protect yourself from privacy. That if you produce enough new ways that they know who you are. You have a fit the template enough with the baseline statistics you can avoid being in the 92 then you also would be outside so i am very hopeful for that but it is kagan mouse im teaching the class so how do attracted this freedom . Allotted the answers that this is good two years ago but not today. It is like introducing paranoia in the best way. With the book writing process and those that are writing dissertations so at what point did you realize there was no light at the end of the tunnel . For week it is the first draft of the third revision. People in this room helped me a lot to figure out much as the contents and the voice that i wanted to have to pare it a scholar but also a to say that i have the tools to do that it is a delight at the end of the tunnel but to see what existed. But it did take several years. But it does get better. Any questions . I know your d talked about it but what about technologies offered to make noise . Will that be advanced enough one day . With you try to make googles searches to have a Program Running ways for you know google learns how to recognize the new ways noise and there was ted new program from nyu researchers that takes headlines from the papers on the internet and aggregates for every six texans 3 6 aikens there is a cacophony so so when i was writing the text searching for a the Search Engine to extend that it can be predicted you go to the site of plugging in is using and then you create that same word bank there is much more things you can do also we should not sit on our laurels. But there is a propensity for that. But almost to be called liquid maternity the constant changing ideas and not to be sure of herself yourself that is more of the case increasingly but i think we are Getting Better at it. So looking at literacy in that way in the academic setting . For a lot of my students are agnostic to a lot of these things it is hard for them to a understand like to be lambaste it as your browser size or your window size you have higher tickets a because you are seen to be more wealthy. Node was to pay 50 more than the start that now if uber does the same thing if you go from of the neighborhood to wealthy neighborhood is a higher price. So theres a lot of problems coming up with this but what are the things you can put in four of his vacation . Joyce dave 15 if i walk a couple of blocks over . But when i talk to people but the sec rollbacks have been day couple of months ago to allow those isp for taking that traffic so a lot of that to say how can you limit that ability because google has 2025 of the data facebook has about 20 comcasts is 100 percent so obfuscation for meet is to figure out new protocols so that your computer isnt losing battery. It is ignorant not to go down that ravitch told but also to make you aware of what is happening. A so i am wondering can you talk about in the context of the power or the algorithms have a positive outcome . There is one that we just missed that they tried to use how to make a text from the image so with Google Images like searching for donald trump. People were not going to the doctor they were searching their symptoms like i cant sleep or mike will. There is a slide that shows more or less these terms that create what seemed to be good indicators of selectivity so internationally they were able to figure out what to predict due to the data learning environment and then they maybe tell the local hospitals or schools to be aware of these things because they may have the ability to shut back down so theres a lot of good from this. If they were allowed. But how we can understand maybe hand Washing Powder that would have given through samples. Doesnt that make the case for a google phone device . I knew somebody would say that. It does in the way that if you regulate it it it would be much more a fan of the autonomous country that took away the mantra a couple of years ago. Thats a very good point. They had reasons to keep it private and use it for the profit like a symmetry with the users. So thinking about how the comments can be data. I just want to make sure i understand when you say in response to what we should do is talk about obfuscation. Is that just sending out activities so the various algorithmic stone to characterize i guess im just stuck on what we should do because as the world becomes more technologically advanced and a more essential part of our life theres going to be less and less like i like this and its always going to be green, so i like this thing that can come in a billion different forms and it is based on data that is collected from pretty much everything that we do in our lives. So if you send out obfuscating data, do not see that somewhere down the line in the more technically advanced world like kind of basically creating disharmony between your true self and what you want in your environment like what if the underlying this strategy that you employ the two confused the systems is something akin to not having a smart phone and you are at a minimum amount of technological stuff that you have to engage in authentically to maintain competency and get a job and things like that. Often people say like i am on facebook. I am also a fan of the new technologies that are extraordinarily rich and problematic but at the same time im keen on what they can do technologically. We talk about this idea of the digital enclosure which is a way that companies try to keep you in their world as long as possible by giving you the advantages and making you feel like you need to keep an facebook tinfacebook to maintaid relationships with the algorithms can understand you to understand the world better. I am wary of those because it isnt for you its for them to keep you on the site and they are giving you reasons its like i will give you 50 to open up a Checking Account within the bank fee is 200, so youre thinking its good that then eventually yoyou get screwed over. I do think though that the question still stands at a very good question as well, how do we understand the social inclination or the social use of these at the same time because a lot of people say if you put a lot of focus getting information on it you are ruining the experience for everybody. We could have a cure for cancer but then all of a sudden w we he a lot of jaundice in newborns and we think thats a really Important Health issue, but its not. So i do think its something we have to talk about, to go back to the initial question of what is new about this, i think the important part is having the categories. I am not against agenda or algorithmic agenda but directionality of what is called the blackbox society where we dont have the ability to talk back or make these categories social and think about how they affect us in the public. Other questions. Thank you all so much for coming. [applause] i am reading a few books. A book called the generals by thomas ricks was a professor at the war college. College. I imagincollege. I imagine her with the Army National guard and i try to read one military dog a

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.