Announcement

Collapse
No announcement yet.

Darpers Unite: DARPA & Social Hacking Symposium; How To Be A Predator Class?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Darpers Unite: DARPA & Social Hacking Symposium; How To Be A Predator Class?

    Darpers Unite: DARPA & Social Hacking Symposium; How To Be A Predator Class?

    Birther Report

    2/26/2014

    Excerpt:

    AAAI 2014: DARPA
    _______________________________________

    Course Titled:

    Social Hacking And Cognitive Security
    On The Internet And New Media
    ________________________________________

    IS THIS A "HOW TO" CLASS ON HOW TO BE A GOOD LITTLE OBOT?

    Special Note:

    At least one of the persons on the Organizing Committee is from DARPA
    So you know it's going to be revealing and enlightening.
    ( If this was 1939 would This Class be a required SS training Course 101? )

    Progressive Hard Left Institutionalization?
    How to Manipulate The Masses?
    ( Especially Obama Zombies!? )

    Is this how it's done ??


    Maybe we should all attend? We might also be able to learn and convince Congress to do their Job and open a number of Special Committees ( a Full investigation of Obama's past and current transgressions )

    Read the details in the class outline at the Association for the Advancement of Artificial Intelligence:

    See what we're up against!?
    __________________________________________________ _______________________


    AAAI 2014 SPRING SYMPOSIA

    March 24–26, 2014

    Sponsored by the Association for the Advancement of Artificial Intelligence
    In cooperation with the Stanford University Computer Science Department

    The Association for the Advancement of Artificial Intelligence, in cooperation with Stanford University's Department of Computer Science, is pleased to present the AAAI 2014 Spring Symposium Series, to be held Monday through Wednesday, March 24–26. The titles of the eight symposia are as follows:
    Applied Computational Game Theory
    Big Data Becomes Personal: Knowledge into Meaning
    Formal Verification and Modeling in Human-Machine Systems
    Implementing Selves with Safe Motivational Systems and Self-Improvement
    The Intersection of Robust Intelligence and Trust in Autonomous Systems
    Knowledge Representation and Reasoning in Robotics
    Qualitative Representations for Robots
    Social Hacking and Cognitive Security on the Internet and New Media

    [...] http://www.aaai.org/Symposia/Spring/...posia.php#ss08

    SOCIAL HACKING AND COGNITIVE SECURITY ON THE INTERNET AND NEW MEDIA
    The Internet and new media (INM) fundamentally alter the landscape of influence and persuasion in three major ways. First, the ability to influence is now democratized, in that any individual or group has the potential to communicate and influence large numbers of others online in a way that would have been prohibitively expensive in the pre-Internet era. It is also now significantly more quantifiable, in that data from the INM can be used to measure the response of crowds to influence efforts and the impact of those operations on the structure of the social graph. Finally, influence is also far more concealable, in that users may be influenced by information provided to them by anonymous strangers, or even in the simple design of an interface.

    "Social engineering" in the computer security space typically has been the venue for discussing the hacking of social interaction. However, the scope of this has, for the most part, been limited to only a narrow field of action: one-on-one conversations that garner sensitive information from gullible members of a target organization. A major goal of this symposium is to establish the field of Cognitive Security (CogSec) whose goal is to update and expand this limited concept to meet the modern realities of influence. CogSec is interdisciplinary and draws on fields such as cognitive science, computer science, social science, security, marketing, political campaigning, public policy, and psychology.

    This symposium will convene a diverse group of experts relevant to the broad area of "CogSec" that includes the development of methods that (1) detect and analyze cognitive vulnerabilities (that is, susceptibilities to false information) and (2) block efforts that exploit cognitive vulnerabilities to influence collective action at multiple scales.

    The goal of the symposium is to bring together fundamental research from academia as well as the public and private sectors and develop an applied engineering methodology. To this end, we encourage paper submissions in areas relevant to developing the following:
    A Statement of the Field of Cognitive Security
    Cognitive Vulnerability Analysis and Modeling
    A Defense Doctrine of Cognitive Security
    Design Principles for Effective Network Shaping
    A Code of Ethics of Social Shaping and Social Hacking

    Topics

    Examples of topic areas of interest are
    Artificial intelligence
    Computational social science
    Anthropology of internet and new media culture
    Data-driven political campaigning
    Data-driven marketing and advertising
    Bot swarms
    Algorithmic detection of cognitive biases

    Primary Contact
    Tim Hwang ( tim@pacsocial.com).

    Organizing Committee
    Rand Waltzman (DARPA, rand.waltzman@darpa.mil), Tim Hwang (Pacific Social Architecting, tim@pacsocial.com), Alex "Sandy" Pentland (MIT Media Lab, sandy@media.mit.edu), Albert-László Barabási (Center for Complex Network Research, Northeastern University, barabasi@gmail.com), Jure Leskovec (Department of Computer Science, Stanford, jure@cs.stanford.edu), Nicco Mele (EchoDitto, John F. Kennedy School of Government, Harvard University, nicco_mele@hks.harvard.edu), Jodee Rich (PeopleBrowsr, JodeeRich@kred.com)

    Source: http://www.aaai.org/Symposia/Spring/...posia.php#ss08


    View the complete Birther Report presentation at:

    http://www.birtherreport.com/2014/02...l-hacking.html
    B. Steadman
Working...
X