Darpers Unite: DARPA & Social Hacking Symposium; How To Be A Predator Class?
- Image Credit: iPredator - |
Maybe we should all attend? We might also be able to learn and convince Congress to do their Job and open a number of Special Committees ( a Full investigation of Obama’s past and current transgressions )
Read the details in the class outline at the Association for the Advancement of Artificial Intelligence:
The Association for the Advancement of Artificial Intelligence, in cooperation with Stanford University’s Department of Computer Science, is pleased to present the AAAI 2014 Spring Symposium Series, to be held Monday through Wednesday, March 24–26. The titles of the eight symposia are as follows:
- Applied Computational Game Theory
- Big Data Becomes Personal: Knowledge into Meaning
- Formal Verification and Modeling in Human-Machine Systems
- Implementing Selves with Safe Motivational Systems and Self-Improvement
- The Intersection of Robust Intelligence and Trust in Autonomous Systems
- Knowledge Representation and Reasoning in Robotics
- Qualitative Representations for Robots
- Social Hacking and Cognitive Security on the Internet and New Media
[...] http://www.aaai.org/Symposia/Spring/sss14symposia.php#ss08
SOCIAL HACKING AND COGNITIVE SECURITY ON THE INTERNET AND NEW MEDIA
The Internet and new media (INM) fundamentally alter the landscape of influence and persuasion in three major ways. First, the ability to influence is now democratized, in that any individual or group has the potential to communicate and influence large numbers of others online in a way that would have been prohibitively expensive in the pre-Internet era. It is also now significantly more quantifiable, in that data from the INM can be used to measure the response of crowds to influence efforts and the impact of those operations on the structure of the social graph. Finally, influence is also far more concealable, in that users may be influenced by information provided to them by anonymous strangers, or even in the simple design of an interface.
“Social engineering” in the computer security space typically has been the venue for discussing the hacking of social interaction. However, the scope of this has, for the most part, been limited to only a narrow field of action: one-on-one conversations that garner sensitive information from gullible members of a target organization. A major goal of this symposium is to establish the field of Cognitive Security (CogSec) whose goal is to update and expand this limited concept to meet the modern realities of influence. CogSec is interdisciplinary and draws on fields such as cognitive science, computer science, social science, security, marketing, political campaigning, public policy, and psychology.
This symposium will convene a diverse group of experts relevant to the broad area of “CogSec” that includes the development of methods that (1) detect and analyze cognitive vulnerabilities (that is, susceptibilities to false information) and (2) block efforts that exploit cognitive vulnerabilities to influence collective action at multiple scales.
The goal of the symposium is to bring together fundamental research from academia as well as the public and private sectors and develop an applied engineering methodology. To this end, we encourage paper submissions in areas relevant to developing the following:
- A Statement of the Field of Cognitive Security
- Cognitive Vulnerability Analysis and Modeling
- A Defense Doctrine of Cognitive Security
- Design Principles for Effective Network Shaping
- A Code of Ethics of Social Shaping and Social Hacking
Topics
Examples of topic areas of interest are
- Artificial intelligence
- Computational social science
- Anthropology of internet and new media culture
- Data-driven political campaigning
- Data-driven marketing and advertising
- Bot swarms
- Algorithmic detection of cognitive biases
Primary Contact
Tim Hwang ( [email protected]).
Organizing Committee
Rand Waltzman (DARPA, [email protected]), Tim Hwang (Pacific Social Architecting, [email protected]), Alex “Sandy” Pentland (MIT Media Lab, [email protected]), Albert-László Barabási (Center for Complex Network Research, Northeastern University, [email protected]), Jure Leskovec (Department of Computer Science, Stanford, [email protected]), Nicco Mele (EchoDitto, John F. Kennedy School of Government, Harvard University, [email protected]), Jodee Rich (PeopleBrowsr, [email protected])
Source: http://www.aaai.org/Symposia/Spring/sss14symposia.php#ss08
Who’s the real tin foil hat wearers?
Still no comment on Obama’s Lie of the Year Award!
Source: http://www.birtherreport.com/2014/02/darpers-unite-darpa-social-hacking.html
Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.
"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.
Please Help Support BeforeitsNews by trying our Natural Health Products below!
Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST
Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST
Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST
Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!
HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.
Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.
MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)
Oxy Powder - Natural Colon Cleanser! Cleans out toxic buildup with oxygen!
Nascent Iodine - Promotes detoxification, mental focus and thyroid health.
Smart Meter Cover - Reduces Smart Meter radiation by 96%! (See Video).