Darpers Unite: DARPA & Social Hacking Symposium; How To Be A Predator Class?
Birther Report
2/26/2014
Excerpt:
AAAI 2014: DARPA
_______________________________________
Course Titled:
Social Hacking And Cognitive Security
On The Internet And New Media
________________________________________
IS THIS A "HOW TO" CLASS ON HOW TO BE A GOOD LITTLE OBOT?
Special Note:
At least one of the persons on the Organizing Committee is from DARPA
So you know it's going to be revealing and enlightening.
( If this was 1939 would This Class be a required SS training Course 101? )
Progressive Hard Left Institutionalization?
How to Manipulate The Masses?
( Especially Obama Zombies!? )
Is this how it's done ??
Maybe we should all attend? We might also be able to learn and convince Congress to do their Job and open a number of Special Committees ( a Full investigation of Obama's past and current transgressions )
Read the details in the class outline at the Association for the Advancement of Artificial Intelligence:
See what we're up against!?
__________________________________________________ _______________________
AAAI 2014 SPRING SYMPOSIA
March 24–26, 2014
Sponsored by the Association for the Advancement of Artificial Intelligence
In cooperation with the Stanford University Computer Science Department
The Association for the Advancement of Artificial Intelligence, in cooperation with Stanford University's Department of Computer Science, is pleased to present the AAAI 2014 Spring Symposium Series, to be held Monday through Wednesday, March 24–26. The titles of the eight symposia are as follows:
[...] http://www.aaai.org/Symposia/Spring/...posia.php#ss08
SOCIAL HACKING AND COGNITIVE SECURITY ON THE INTERNET AND NEW MEDIA
The Internet and new media (INM) fundamentally alter the landscape of influence and persuasion in three major ways. First, the ability to influence is now democratized, in that any individual or group has the potential to communicate and influence large numbers of others online in a way that would have been prohibitively expensive in the pre-Internet era. It is also now significantly more quantifiable, in that data from the INM can be used to measure the response of crowds to influence efforts and the impact of those operations on the structure of the social graph. Finally, influence is also far more concealable, in that users may be influenced by information provided to them by anonymous strangers, or even in the simple design of an interface.
"Social engineering" in the computer security space typically has been the venue for discussing the hacking of social interaction. However, the scope of this has, for the most part, been limited to only a narrow field of action: one-on-one conversations that garner sensitive information from gullible members of a target organization. A major goal of this symposium is to establish the field of Cognitive Security (CogSec) whose goal is to update and expand this limited concept to meet the modern realities of influence. CogSec is interdisciplinary and draws on fields such as cognitive science, computer science, social science, security, marketing, political campaigning, public policy, and psychology.
This symposium will convene a diverse group of experts relevant to the broad area of "CogSec" that includes the development of methods that (1) detect and analyze cognitive vulnerabilities (that is, susceptibilities to false information) and (2) block efforts that exploit cognitive vulnerabilities to influence collective action at multiple scales.
The goal of the symposium is to bring together fundamental research from academia as well as the public and private sectors and develop an applied engineering methodology. To this end, we encourage paper submissions in areas relevant to developing the following:
Topics
Examples of topic areas of interest are
Primary Contact
Tim Hwang ( tim@pacsocial.com).
Organizing Committee
Rand Waltzman (DARPA, rand.waltzman@darpa.mil), Tim Hwang (Pacific Social Architecting, tim@pacsocial.com), Alex "Sandy" Pentland (MIT Media Lab, sandy@media.mit.edu), Albert-László Barabási (Center for Complex Network Research, Northeastern University, barabasi@gmail.com), Jure Leskovec (Department of Computer Science, Stanford, jure@cs.stanford.edu), Nicco Mele (EchoDitto, John F. Kennedy School of Government, Harvard University, nicco_mele@hks.harvard.edu), Jodee Rich (PeopleBrowsr, JodeeRich@kred.com)
Source: http://www.aaai.org/Symposia/Spring/...posia.php#ss08
View the complete Birther Report presentation at:
http://www.birtherreport.com/2014/02...l-hacking.html
Birther Report
2/26/2014
Excerpt:
AAAI 2014: DARPA
_______________________________________
Course Titled:
Social Hacking And Cognitive Security
On The Internet And New Media
________________________________________
IS THIS A "HOW TO" CLASS ON HOW TO BE A GOOD LITTLE OBOT?
Special Note:
At least one of the persons on the Organizing Committee is from DARPA
So you know it's going to be revealing and enlightening.
( If this was 1939 would This Class be a required SS training Course 101? )
Progressive Hard Left Institutionalization?
How to Manipulate The Masses?
( Especially Obama Zombies!? )
Is this how it's done ??
Maybe we should all attend? We might also be able to learn and convince Congress to do their Job and open a number of Special Committees ( a Full investigation of Obama's past and current transgressions )
Read the details in the class outline at the Association for the Advancement of Artificial Intelligence:
See what we're up against!?
__________________________________________________ _______________________
AAAI 2014 SPRING SYMPOSIA
March 24–26, 2014
Sponsored by the Association for the Advancement of Artificial Intelligence
In cooperation with the Stanford University Computer Science Department
The Association for the Advancement of Artificial Intelligence, in cooperation with Stanford University's Department of Computer Science, is pleased to present the AAAI 2014 Spring Symposium Series, to be held Monday through Wednesday, March 24–26. The titles of the eight symposia are as follows:
Applied Computational Game Theory
Big Data Becomes Personal: Knowledge into Meaning
Formal Verification and Modeling in Human-Machine Systems
Implementing Selves with Safe Motivational Systems and Self-Improvement
The Intersection of Robust Intelligence and Trust in Autonomous Systems
Knowledge Representation and Reasoning in Robotics
Qualitative Representations for Robots
Social Hacking and Cognitive Security on the Internet and New Media
Big Data Becomes Personal: Knowledge into Meaning
Formal Verification and Modeling in Human-Machine Systems
Implementing Selves with Safe Motivational Systems and Self-Improvement
The Intersection of Robust Intelligence and Trust in Autonomous Systems
Knowledge Representation and Reasoning in Robotics
Qualitative Representations for Robots
Social Hacking and Cognitive Security on the Internet and New Media
[...] http://www.aaai.org/Symposia/Spring/...posia.php#ss08
SOCIAL HACKING AND COGNITIVE SECURITY ON THE INTERNET AND NEW MEDIA
The Internet and new media (INM) fundamentally alter the landscape of influence and persuasion in three major ways. First, the ability to influence is now democratized, in that any individual or group has the potential to communicate and influence large numbers of others online in a way that would have been prohibitively expensive in the pre-Internet era. It is also now significantly more quantifiable, in that data from the INM can be used to measure the response of crowds to influence efforts and the impact of those operations on the structure of the social graph. Finally, influence is also far more concealable, in that users may be influenced by information provided to them by anonymous strangers, or even in the simple design of an interface.
"Social engineering" in the computer security space typically has been the venue for discussing the hacking of social interaction. However, the scope of this has, for the most part, been limited to only a narrow field of action: one-on-one conversations that garner sensitive information from gullible members of a target organization. A major goal of this symposium is to establish the field of Cognitive Security (CogSec) whose goal is to update and expand this limited concept to meet the modern realities of influence. CogSec is interdisciplinary and draws on fields such as cognitive science, computer science, social science, security, marketing, political campaigning, public policy, and psychology.
This symposium will convene a diverse group of experts relevant to the broad area of "CogSec" that includes the development of methods that (1) detect and analyze cognitive vulnerabilities (that is, susceptibilities to false information) and (2) block efforts that exploit cognitive vulnerabilities to influence collective action at multiple scales.
The goal of the symposium is to bring together fundamental research from academia as well as the public and private sectors and develop an applied engineering methodology. To this end, we encourage paper submissions in areas relevant to developing the following:
A Statement of the Field of Cognitive Security
Cognitive Vulnerability Analysis and Modeling
A Defense Doctrine of Cognitive Security
Design Principles for Effective Network Shaping
A Code of Ethics of Social Shaping and Social Hacking
Cognitive Vulnerability Analysis and Modeling
A Defense Doctrine of Cognitive Security
Design Principles for Effective Network Shaping
A Code of Ethics of Social Shaping and Social Hacking
Topics
Examples of topic areas of interest are
Artificial intelligence
Computational social science
Anthropology of internet and new media culture
Data-driven political campaigning
Data-driven marketing and advertising
Bot swarms
Algorithmic detection of cognitive biases
Computational social science
Anthropology of internet and new media culture
Data-driven political campaigning
Data-driven marketing and advertising
Bot swarms
Algorithmic detection of cognitive biases
Primary Contact
Tim Hwang ( tim@pacsocial.com).
Organizing Committee
Rand Waltzman (DARPA, rand.waltzman@darpa.mil), Tim Hwang (Pacific Social Architecting, tim@pacsocial.com), Alex "Sandy" Pentland (MIT Media Lab, sandy@media.mit.edu), Albert-László Barabási (Center for Complex Network Research, Northeastern University, barabasi@gmail.com), Jure Leskovec (Department of Computer Science, Stanford, jure@cs.stanford.edu), Nicco Mele (EchoDitto, John F. Kennedy School of Government, Harvard University, nicco_mele@hks.harvard.edu), Jodee Rich (PeopleBrowsr, JodeeRich@kred.com)
Source: http://www.aaai.org/Symposia/Spring/...posia.php#ss08
View the complete Birther Report presentation at:
http://www.birtherreport.com/2014/02...l-hacking.html