Skip to content →

Category: user data

The Mind’s Eye: Black Boxes and Time Machines

The-Time-Machine

There was a moment in time when the internal cinema of the mind opened its doors for business and began selling tickets. It might have been in 1798 when “Lyrical Ballads, with a Few Other Poems” by William Wordsworth and Samuel Taylor Coleridge was published. This cinema of the mind was invoked through the use of unrhymed iambic pentameter, or blank verse. Squiggles of black ink sequenced in a particular rhythm were put down across rows on a sheet of paper. They were designed to induce hallucinations, to operate like a time machine that brought you back to a moment of powerful feeling — pried open your eyes and allowed you to witness that scene as it actually comes to exist in your mind.

wordsworth-manuscript

From the Preface to the “Lyrical Ballads” by William Wordsworth:

I have said that poetry is the spontaneous overflow of powerful feelings: it takes its origin from emotion recollected in tranquillity: the emotion is contemplated till, by a species of reaction, the tranquillity gradually disappears, and an emotion, kindred to that which was before the subject of contemplation, is gradually produced, and does itself actually exist in the mind.

“Spots of time” was the phrase Wordsworth used to describe these powerful feelings that welled up spontaneously, overflowing any effort of reason to contain or define them. Contemplated from a tranquil distance, these are the springs the feed the continuing power of poetry. Defying entropy, these moments don’t strike and fade to nothingness. As Freud would later note, they become constitutive of our identity — in both our joy and our madness. They are the personal identity that persists through time and one source of poetry.

From William Wordsworth’s “The Prelude” (1805 edition):

There are in our existence spots of time,
That with distinct pre-eminence retain
A renovating virtue, whence–depressed
By false opinion and contentious thought,
Or aught of heavier or more deadly weight,
In trivial occupations, and the round
Of ordinary intercourse–our minds
Are nourished and invisibly repaired;
A virtue, by which pleasure is enhanced,
That penetrates, enables us to mount,
When high, more high, and lifts us up when fallen.

prime-suspect

One of the pleasures of the murder mystery genre is this quality of inducing an internal vision of a past moment of intense passion. The detective surveys the scene of the murder and attempts to reconstruct the events. Witnesses are interviewed, asked to tell what happened. As the witness recounts her memory of the event her eyes shift their focus inward. The internal cinema fills her mind’s eye; she sees those moments around the crime as though they are occurring right now. She puts the vision on a loop and attempts to put it into words. In her face we can see the emotions evoked by remembrance and a reflection of the power of emotions from the event itself. The witness’s words evoke a vision in the mind’s eye — for both us and the detective. As each witness tells some piece of the story, we replay the vision, adding details, attempting to piece together a coherent narrative to replace the mystery.

humphrey-bogart-fedora

In film versions of murder mysteries, the eyes of the detective are the key to understanding the kind of thing that will have to be imagined to solve the crime. The world-weary detective in a film noir has seen it all. The character of his eyes gives us a sense of what he could imagine. As he loads the witness’s stories into the projector of his mind’s eye, he must let them induce whatever visions may come. Often we can see how this process of envisioning has taken its toll on the face and eyes of the detective. In others, say the Miss Marple mysteries, we see an incongruous contrast between the seemingly normal countenance of the detective and the eyes that can imagine horrific events of violence. The internal capacity of a dark and powerful imagination doesn’t always correspond with the external physique of an action hero.

marple-hickson

There’s a moment when everything clicks. Often it’s a moment that seems to be a break in the story. The detective, exhausted from gazing at the movie he’s constructed, turns off the projector and re-enters the world. An off-hand remark, a simple gesture, a common object seen in a new light offers the analogy that the provides the key. The puzzle pieces of the internal vision sliding around the detective’s head suddenly form a pattern with the ring of truth. This marks the beginning of the end of the story. Often at this point all the suspects and witnesses are gathered together in a room for a recitation of the detective’s vision. “Now you’re probably all wondering why I brought you here today.” Validation takes the form of the murderer making a break for the door.

minority-reportish

In the future in which we currently reside, this method of scraping a valid account out of the internal memories of unreliable witnesses begins to seem horribly inefficient. Imagine, if you will, how it might go. The detective arrives on the scene of the murder. The victim is positively identified and the paperwork is filed.

sergey-glass

The panel reviews the particulars of the crime and determines whether or not the victim’s black box should be released to the detective and which time machine privileges should be granted. The black box is the victim’s personal network cloud, along with all it’s corporate, medical and government cloud counterparts. This includes a stream of all commercial and financial transactions, social media transactions, voice and text mobile communications, location and personal quantification data. A unique identifier is generated to tie all the person’s data streams together into a single life stream. When loaded into the black box player, the detective can replay the victim’s life from any arbitrary point in time prior to the murder up until the time of death and after. Some data streams don’t require a living subject. The victim’s social graph and location data is used to aggregate all still and video photography relevant to the time in question. A list of additional persons of interest is generated through a strong tie / weak tie analysis of the people the victim came into contact with.

thematrixcouncil

The persons-of-interest list is submitted to the panel for approval. Once approved, this gives the detective the ability to more fully explore what happened along multiple vectors. When the additional black boxes are loaded into the time machine, the detective can travel through multiple vectors and get a real 360 view of the event. The additional data really increases the resolution of the time travel experience. For murder investigations the data also includes all digital communications with built-in auto-erase functions and any sort of strong encryption.

A-Clockwork-Orange-1971

With the data set constructed, the detective initiates the search algorithm. Based on analysis of motive, opportunity and other risk factors the top three suspects with the highest probability are identified. The paperwork is filed to allow the detective to show the prime suspects the highest probability version playback of what occurred. Each suspect is hooked up to biometric measuring machines and shown the playback. Through an automated analysis of the biofeedback the most probable murderer is identified and charged with the crime. The detective then converts the data set to an evidence set for the district attorney. The evidence set includes provenances and audit trails for all the data included.

time-travel-wormhole

Physicists disagree about whether time travel is possible. Given the speed of light and the size of the universe, it’s certainly possible to view ancient events as though they are happening in the current moment. Just go out on a clear night and look at the stars. But seeing old light isn’t the same as traveling to the time in which the image in that light was created. Whether or not time travel is possible in the physical universe, it’s now possible through the large repositories of time stamped stream data that we’re collecting — these so-called haystacks.

minds-eye

On the other hand, these are just words on a page. They’re designed to cause you to imagine a particular future, to view a movie on your internal cinema screen. They may just be a thought experiment — mere ephemera of the moment. You know, the stuff that dreams are made of.

Comments closed

Engelbart’s Frozen Vision

Early-Computer

The passing of Doug Engelbart brings to mind John Markoff’s book “What the Dormouse Said.” The subtitle of the book is “How the Sixties Counterculture Shaped the Personal Computer Industry.” Engelbart was at the center of envisioning what networked personal computers could be. To some extent, we’ve just been coloring in the pictures that Engelbart drew toward the end of 1968.

The date of Engelbart’s death also marks the beginning of the end of the connection between LSD and the technology of personal computing. Engelbart was one of the early experimenters. And while you couldn’t say that his experimentation lead to his visions for technology, you can certainly say that nothing like that would happen today. Interest in our interior space may be at an all-time low. It simply lacks a decent return on investment.

The big demo set the boundaries of the vision, and the commercial technologists have spent the intervening years building it out. If the future wasn’t evenly distributed, it was the job of the personal computing industry to make sure that there was a networked personal computing device for every man woman and child in the country — and every other country too. That “future” is pretty evenly distributed now.

In the early days of the commercialized Network, we used to shake our heads at this company or that government agency and say: “they just don’t get the Internet.” At this point, I’d say that everyone “gets” the Internet and connected computing. Of course, no one gets the Internet in toto, but everyone gets enough of it. And despite the recent laments over the loss of the early spirit of the Network, like the man says: “the street finds its own uses for things.”

german-romaticism

There hasn’t been much new vision since the days of ARC, PARC and PLATO. Philip K. Dick saw the dark side which shows up in our movies. Jaron Lanier’s ideas about virtual reality are migrating into the games we play in our living rooms. David Gelernter’s LifeStreams are turning in the various Tweet Streams, Facebook newsfeeds and photostreams. The techno-primativism of Burning Man somehow never really makes it out of the desert. What happens at Burning Man, stays at Burning Man. The engineers at Google admit to trying to make working versions of the computing technology simulated in the original Star Trek television show. And through the inflation of the series of tech bubbles, “technology” was transformed into what venture capitalists were willing to fund. By that definition, even Engelbart wasn’t able to secure funding to continue his work. The vision was frozen in time. What we have now are the Stacks — which is the total commercial exploitation of Engelbart’s original interrupted vision in the form of feudal central clouds.

Newton-WilliamBlake

Vision has an interesting relationship with technology. It’s vaporware if you don’t build it. Its success is marginal if it doesn’t work its way into the fabric of our lives. But vision is less about the technology we’re building, and more about how we might do things. For instance, when we think about Ted Nelson’s vision for the Network, we see the road not taken. Engelbart’s road was taken, and taken from him. The regret that Engelbart had was that his vision was never allowed to evolve and grow. He never saw the “mother of all demos” as the end of the road. The commercial demands around evenly distributing that particular future put an end to all alternate paths, even the ones Engelbart continued to imagine.

Victorian-Shop-Window

Once the vision becomes frozen, we are transformed from participants to consumers. Even the kind of “participation” that makes up the content of social media is largely a form of consumption. And “consumerism” as Timothy Morton likes to point out, is an invention of the romantic era. Recently, I was reading a collection of essays edited by Harold Bloom on Romanticism and Consciousness. I was struck by his description of a piece by Owen Barfield.

…A brief but profound chapter which I have excerpted from Owen Barfield’s “Saving the Appearances, a Study in Idolatry”. Barfield is a historian of human consciousness, who, in this remarkable book, traces and deplores our loss of “participation,” the awareness “of an extra-sensory link between the percipient and the representations.” The progressive loss of the sense of participation, over the centuries, results in an idolatry of memory images. In Barfield’s view, Romanticism arose as an iconoclastic movement, seeking to smash the idols and return men to an original participation in phenomena.

It seems that we’ve colored in all the pictures that Doug Engelbart left us. We’ve colored them in HD and 3D and in real-time streaming. It may be time to smash the idols and try to come up with a new set of pictures.

One Comment

The Strict Hypocrite’s Diet

Young-Girl-Eating-a-Bird-The-Pleasure-Rene-Magritte

Because we live in an age where we believe in the goodness of clarity and purity, much of the work we do takes the form of “optimization.” Our ideologues, of whatever stripe, push us toward the purest form of an idea. As we stake out the extremes of purity, we decry the moral weakness and hypocrisy of those who fail the tests of purity. Hypocrite! It’s the insult par excellence for our age. Once we get a simple agreement that something is good in principle, we then go about exploring how the great unwashed public, or alternatively our leaders, fall short of that ideal. Every aspect of our lives becomes political, every action measured against a larger political agenda.

Food writer Mark Bittman has written a diet book called “VB6”. “VB6” stands for Vegan Before 6pm. The brilliance of this “diet” is that it’s hypocritical. Surely to be a vegan is to be a vegan all of the time. How else can you genuinely be a vegan? If you cheat, if you break the rules, if you don’t live up to the ideal, you aren’t really a vegan. It’s the same with all diets. A diet is a set of rules, if you break the rules you aren’t really on the diet. Instead of breaking a rule, you should water it with Workouts at MyFitnessHub and you will soon find yourself become better, more fit and healthy than you were. Rule breaking translates into a form of weakness.

Bittman’s VB6 has an interesting relationship to rules. Here’s Bittman on his “diet”.

Nor will I tell you that you must eat foods that you don’t want to eat, or to ignore your body’s legitimate cravings and desires, or to stop eating before you’re full. I am, after all, someone who has built an entire career on my love of cooking and eating good food. And VB6 is the way I eat now, and have for six years.

There are three very basic aspects to VB6. First, you make a commitment to eat more plant foods — fruit, vegetables, whole grains, beans … you know what I’m talking about. Second, you make a commitment to eat fewer animal products and highly processed foods, like white bread. And third, you all but eliminate junk foods, most of which are barely foods in the strict sense of the word anyway. (I say “all but eliminate” because everyone needs to break the rules occasionally.)

Mark Bittman is a food writer. When his doctor suggested that he become a vegan to head off some potential health problems, Bittman was faced with a dilemma. VB6 was his solution, and so far, it’s worked for him. This approach to the rules of diet can be instructive across a whole range of activities. He teaches us something about the nature of rules themselves. Bittman also rejects our current fascination with personal data.

To make matters worse, many diets bury you in data, requiring you to count calories, points, or grams of fat or carbohydrates. Counting calories can of course be an effective dieting strategy; if you consume fewer calories than you burn, you’ll lose weight. But it turns eating into a clinical, obsessive exercise, reduces food to numbers, eliminates pleasure, and makes the diet unsustainable. No one wants to count calories his or her whole life, while all the time following a program that eliminates huge groups of foods.

No hard and fast rules, no counting. What kind of diet is that? How can you be a part time vegan? Isn’t that like vegetarians who eat fish? If you think it’s good to be a vegan, why aren’t you a vegan all the time? Of course, Bittman’s diet isn’t about being a vegan, it’s about developing a sustainable, enjoyable way of living that helps him lose weight and improve his health. Although Bittman isn’t blind to the larger implications of food:

…Food touches everything. You can’t discuss it without considering the environment, health, the role of animals other than humans in this world, the economy, politics, trade, globalization, or most other important issues. This includes such unlikely and seemingly unrelated matters as global warming: Industrialized livestock production, for example, appears to be accountable for a fifth or more of the greenhouse gases that are causing climate change.

Fear of hypocrisy is a common rationale for taking no action whatsoever. Unless a solution is perfectly clear and pure, there’s no sense in ever trying. And once you understand that pure solution, you must adhere to it without fail. That’s what we call “being good”. The fragility of a pure solution is that a single deviation from it ruins the purity upon with the solution depends. As Nassim Taleb as noticed, the more you optimize (purify) a system, the more fragile it becomes. The cynic / nihilist takes the position that since there is no perfect position, no position is worth taking. Since all positions can be criticized, I’ll take the position of criticizing positions.

Philosopher Tim Morton takes on the cynical position by pointing out that the cynic is hypocritical about his hypocrisy:

I’d rather be a straight-forward hypocrite than a hypocritical hypocrite. Now we’ve gotten rid of cynicism, because now there’s only two options: there’s hypocrisy or there’s hypocritical hypocrisy.

In a 2006 interview, the black metal band Wolves in the Throne Room made the observation that “we’re all hypocrites and failures.” As human beings there is no position outside of hypocrisy. In our morality we’ve defined “good” as a pure state and “bad” as an impure state that looks a lot like hypocrisy. You’re in the wrong when you’ve violated a rule you know to be good. Morton gives us the basis to think about ethics in the age of self-conscious hypocrisy. Being “good” looks a lot more like being a straight-forward hypocrite; while being bad looks like the hypocritically hypocritical. This kind of ethical practice has been difficult to articulate. Mark Bittman with his VB6 diet gives us a beautiful example of what being straight-forwardly hypocritical could look like.

Comments closed

We Want You, Big Brother

fuseli_the_nightmare

The song called ‘Big Brother’ by David Bowie keeps playing in the background of my thoughts. Of course, it’s all the noise about NSA and the Big Data work they’ve been doing to try and anticipate terrorist threats. It’s what we asked them to do, and now we’re shocked that they’ve gone and done it.

Someone to claim us, someone to follow
Someone to shame us, some brave Apollo
Someone to fool us, someone like you
We want you big data. Big data.

There’s a book by Shane Harris called “The Watchers” that provides a pretty good history of the effort. John Poindexter is the godfather of Prism and the efforts to use big data techniques to combat terrorism. Although Poindexter’s plan to build audit trails and anonymity into the original system were left by the wayside, the system we have is the one he imagined.

We want zero terrorists attacks, which means we have to stop them before they occur. Like a novel by Philip K. Dick, we have to anticipate the bad guys and stop them before they can act. It’s an impossible demand. Some will say this should be left to law enforcement— good old fashioned police work. And that’s fine if you want to catch the bad guys after the fact. Law enforcement isn’t going to stop a terrorist before the bomb explodes. And if you want to stand up and ask “why couldn’t our intelligence agencies have prevented this?”, then you have to acknowledge that Big Data, and your data, is baked into the cake.

The news media has done shameful job of reporting the story, and they don’t seem to care. The news seems to be about the court-ordered collection of telephony metadata and the potential for collection of specific datasets from the major cloud platforms as a result of court orders. The bloggers working for newspapers prefer to type up their nightmares instead of reporting the story. And, of course, printing nightmares is a good way to create pageviews. The more fear they can create the better. To anyone paying attention, this story has been well known for years.

The house seems to be filled with big brothers, we find them at every turn. Every corporation, organization and government aspires to be a big brother. When big brothers protect us, or give us “free” cloud-based applications, we applaud them. When we begin realize the guns used to defend us could be turned and used against us, we panic. Almost anything can be used as a weapon these days. Take a close look at Jeff Jonas’s real-time sensemaking systems that use context accumulation. Yes, like John Poindexter, he’s baked privacy in from the start. But if that system was pointed at you, there’s very little it couldn’t find out. You can buy that system from IBM.

The nightmare government with total access and control seems to have its roots in the figures of Alp and Mare — the elves that ride you in your sleep without your knowledge or permission. It’s as though the government is dead and now manifests as Mare. It not only has all your earthly communications, but has complete access to your unconscious, your dreams, your wishes and your fears. Government, now dead, haunts the living. It’s unmoored from the material world. It’s everywhere, it gathers up all the information about us and plots our misfortune. Perhaps it seeks revenge for shrinking it to such as small size that it could be drowned in a bathtub.

Oddly what we’re complaining about with the issue of privacy is that our “personal data” which is owned by the phone companies, Google, Facebook, Twitter and Microsoft is being given to the NSA. It should be noted that while we call it “our personal data” and “our privacy”, it’s only ours in that sense that it’s corporate-owned information about us. The Network platforms own it. It doesn’t belong to us, we gave it away in exchange for the chance to win valuable prizes. What we fear with regard to the NSA is the standard business model of the technology industry.

You’ve always already been hacked. The use of common protocols has guaranteed there’s no such thing as a secure computer network. At the end of 2010, the head of the NSA noted that the NSA works under the assumption that various parts of their system have already been hacked. They already act like crypto-anarchists and cypherpunks.

Debora Plunkett, head of the NSA’s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be considered completely and utterly impenetrable – not even that of the NSA.

“There’s no such thing as ‘secure’ any more,” she said to the attendees of a cyber security forum sponsored by the Atlantic and Government Executive media organizations, and confirmed that the NSA works under the assumption that various parts of their systems have already been compromised, and is adjusting its actions accordingly.

John Poindexter was trying to find the signal through the noise. He was trying to do what Jeff Jonas said was impossible. Jonas said you needed to start with the bad guy and then assemble the data around that point. Poindexter created “Red Teams” to devise terrorist strategies, and then based on the interaction patterns the strategies revealed, the analysts would look for matching patterns in the data. Early tests resulted in a lot of false positives. But that was ten years ago, Big Data has come a long way since then. When TIA was de-funded and removed from the official budget, the systems moved to dark funding and we lost a lot of visibility. The secret system became a secret to the extent that there can be secrets anymore.

Do we still want to try and discern the weak signal through the noise? The editor of Slate.com, David Plotz argues that we’re no longer facing terrorist threats and therefore these security programs are overreach. A position that must be much easier to take if you don’t receive daily intelligence briefings. The amount of noise is ever increasing, the question we need to answer is whether it’s really possible to detect a weak signal. Can you really see into the future with a reasonable probability? If not this way, then how?

The Overload
By Talking Heads

A terrible signal
Too weak to even recognize
A gentle collapsing
The removal of the insides

I’m touched by your pleas
I value these moments
We’re older than we realize
In someone’s eyes

A frequent returning
And leaving unnoticed
A condition of mercy
A change in the weather

A view to remember
The center is missing
They question how the future lies
In someone’s eyes

A gentle collapsing
Of every surface
We travel on the quiet road
The overload

Comments closed