Glenn Greenwald talks about the Snowden case in an unprecedented episode of ‘The Method’ series – OVALE – Sprout Wired

Newsroom | @journalovale

American journalist Glenn Greenwald along with Edward Snowden won the Pulitzer Prize for revealing the existence of covert global surveillance programs carried out by the United States National Security Agency (NSA). His investigative work was featured in the film Citizenfour, which won the 2015 Oscar for Best Documentary. In addition to showcasing Greenwalds work and his collaboration on the award-winning feature, an unreleased episode of the series The Method. Curta!, explores the importance of a good story for a documentary, the reasons behind making a film, and its ability to provoke audience participation.

The episode An Ethics and History premieres June 9 at 10 p.m. on Quarta do Cinema.

In this episode, Greenwald reveals details about the 2013 meeting with Snowden in the city of Hong Kong and the consequences resulting from the disclosure of classified NSA files. Working with Snowden has definitely changed the world. It changed the way people think about privacy and the Internet, it has changed the way they think about government secrets and the role of journalism in democracy , says the journalist.

In Brazil, Glenn was also known for the publication of a series of reports that characterized the scandal called Vaza-Jato, which exposed conciliatory negotiations between members of the countrys judiciary. The case brings up other discussions inherent in documentary production: the possibility of cinema as a complaint against political groups or companies, in addition to ethical issues.

In addition to Greenwalds testimony, excerpts from Citizenfour are shown, an account of the case of Edward Snowden and journalistic reports on the above events, in addition to the views of critic Bill Nichols and documentarian Carlos Nader, who served as the presenter of the series. We do.

View original post here:
Glenn Greenwald talks about the Snowden case in an unprecedented episode of 'The Method' series - OVALE - Sprout Wired

Daryl Morey on Crypto, NFTs: ‘It’s the Start of a Major Trend’ – CoinDesk – CoinDesk

In 2011, when he was general manager of the National Basketball Associations Houston Rockets, Daryl Morey was searching for ideas. He wanted brainstorming fodder: good ideas, outside-the-box ideas, even goofy ideas. Who has plenty of ideas? Fans of the team. So in a highly unorthodox move, Morey asked the Rockets fan base to email ideas on how to improve the team. They could be ideas on how to recruit free agents, ideas on drafting strategy, ideas on anything.

Then he did something even more unorthodox.

Over Twitter, Morey announced that the fan who pitched the best idea would win a bitcoin.

This was a decade ago, 2011. And whens the last time you heard someone use the phrase a bitcoin? The proof still exists on Twitter, where Morey cheerfully doled out the bitcoin, at the time worth $7.24. Most Rockets fans had no idea what he was talking about. I had to google bitcoin, confessed one Rockets junkie. This was so long ago, the Rockets fans were puzzled by Moreys use of a hashtag, confused by the appearance of #bitcoin in his tweet. Since when did # become hashtag? one fan posted. I always thought it was called pound symbol?

This is vintage Morey. Always three or five steps ahead.

A quick primer for the non-hoops crowd: Morey is widely credited with helping to shape the modern-day NBA, or as Michael Lewis once put it, hes Basketballs Nerd King. Morey loves data. He loves finding an edge. Thanks in large part to Moreys charts and spreadsheets, players now shoot more three-pointers (Morey found theyre statistically a higher value shot) and chuck up fewer mid-range jumpers (statistically, a dogs breakfast).

The phrase game changer is usually a cliche, but Morey literally changed the game. True, Morey is not the only influence see also: Steph Curry but its a copycat league. As other teams followed Moreys blueprint, the average score has jumped from 99.9 in 2007 (Moreys first year as Rockets GM) to 112 today.

How is this relevant to blockchain?

When billionaire investors like Michael Saylor or Paul Tudor Jones share their interest in crypto, the space celebrates it as a kind of validation. I would argue that Morey provides the same kind of imprimatur. Hes good at sniffing out trends. Hes good at spotting whats next. Hes the most forward-thinking GM in the most forward-thinking sports league. If Morey embraces crypto? There are worse mainstream signals. (Disclosure: As a lifelong fan of my hometown Houston Rockets, Ive been on Team Morey for years. Look elsewhere for objectivity.)

On our call, Morey brushes off these kinds of plaudits, modestly saying, Im just always into everything new, probably incorrectly at times, where I waste time or money.

Maybe. But his decade-long enthusiasm for crypto seems deeper than a quick bit of dabbling. Moreys so OG that he was involved in the Mt. Gox bankruptcy case, he bought a CryptoKitty, he both collects and mints non-fungible tokens (NFT), he gamely drops into a podcast with Anthony Pomp Pompliano, he collects CryptoPunks (and even used one as his Twitter avatar), he sells tweets as NFTs (and donates the funds to the American Civil Liberties Union), and he scoops up NBA Top Shot moments. His crypto enthusiasm seems more rooted in principles than making a buck. When retweeting Pomps celebration of Bitcoin Pizza Day, for example, he framed it as, Get delicious pizza and stop authoritarian oppression win/win. (Few can top Moreys anti-authoritarian credentials.)

These days, of course, Morey is the general manager of another NBA team, the Philadelphia 76ers, and once again, of course, his team is deep in the championship hunt. A few weeks before his Sixers entered the playoffs, Morey spoke to CoinDesk about his strategy for investing in NFTs, how he (kind of) almost bought an NFT from Edward Snowden and why NFTs are the start of a major, major trend but that were also primed for a shakeout.

CoinDesk: So I could talk hoops with you for hours but I know our time is limited. Youve been into crypto since waaaaay back. How did that start?

Daryl Morey: Im a big decentralized guy, a big civil liberties guy anything that allows a fundamental thing to happen without a central authority intrigued me. So I had a bunch of bitcoin by 2011, or maybe the end of 2010. And I was giving away bitcoin on Twitter in 2011 as part of a Rockets ideas giveaway. Of course, it was not a $60,000 idea. [Note: Bitcoin was worth $60,000 at the time of our conversation, in what now feels like five years ago.]

Just the whole idea [of bitcoin] appealed to me. And then I went through the roller coaster of getting hacked and being in a Japanese bankruptcy case and just the whole nine yards.

You lost some bitcoin on Mt. Gox, right?

Yeah, I did. Half of it.

My instincts were to not put all of it in any one place. So I had some of it on a wallet on my computer in my house. And then I had half of it on Mt. Gox, which afterwards I felt so dumb about. At the time I was like, Well, now I need to do something with it. Okay, Ill put it on this exchange, Mt. Gox. And because it was so little money at the time, I didnt really think too intentionally about it.

Then I found out that Mt. Gox M-T-G-O-X meant Magic: The Gathering Online eXchange. And Im like, What the hell? I put my bitcoin on a Magic: The Gathering trading card site?! I was laughing and I felt really dumb afterwards. So I lost all of that.

Wait, what happened with your Mt. Gox bitcoin?

I was in the Japanese bankruptcy case. And then Bain Capital did a really smart thing. They went to everyone in that case and offered 10 cents on the dollar. I took it because my wifes cousin a bankruptcy judge in New Jersey was saying, Youre never going to see any of that. Take what you can get. In retrospect, I should have kept it and hoped to get it back because its worth so much more now. But whatever. It is what it is, and Bain Capital is smart for a reason.

And then you were also early into CryptoKitties, right?

So I wish I had been more into it. I was into CryptoKitties, for sure, and I grabbed one. I still have my original, which is only worth around 100 bucks. But I didnt quite get it. Everyone was saying this was a digital collectible, and I got that angle, even though I wasnt really into cats. But I didnt get the scarcity angle. Because with the original CryptoKitties you can breed more and more.

And Im like, 'What the hell? I put my bitcoin on a Magic: The Gathering trading card site?!'

You were worried that because you can just breed cats endlessly breeding and breeding fing cats then there wouldnt be real scarcity?

Right. I didnt see the scarcity angle. I was wrong about that because some of them are worth a lot now. I wish I had dove in deeper. I didnt get that if someone made it scarce, which they did with CryptoPunks shortly thereafter, that it would change the game. And I was skeptical of shysters and hucksters jumping in.

What gave you more confidence in NFTs?

When I found out that NBA Top Shot was licensed, and that Roham [Roham Gharegozlou, Dapper Labs CEO] has a real plan for rolling it out to maintain scarcity and that, [as] with CryptoPunks, only 10,000 would ever be made, then I jumped into it in a big way.

So now youre both an NFT collector and an NFT creator. What was it like to mint your NFT?

Well, its pretty straightforward. People make it sound hard. But I like to describe NFTs as just a unique barcode someone cant copy, that you can put on anything. And when you describe it that way, people get that its not especially hard. Its just a thing.

I love that description. Howd you choose what you minted?

I was trying to make sure I did something that made some sense. And so I thought, yeah, the original formula that I got moderately famous for, Ill do that. [This is the Pythagorean Expectation Formula, which Morey adapted to the NBA.] And Ill do it for charity. To my point on shysters and hucksters, I didnt feel right making money on it. So I gave all the proceeds to the ACLU.

How many NFTs did you mint?

I did five of them. I like five as a nice scarce number. You dont want to do just one. Somewhere between five and 50, I think, is the sweet spot for how many things you mint of something to still get the scarcity element.

So I did five, and people snapped them up pretty quick for around $2,500. Four of them sold immediately.

You should have priced them higher!

When there was still one left, I was like, Oh s**t, I want to keep one! So I kept one. Because Im not going to be someone who, you know, just mints more or something. I would hate that. I also sold a couple of tweets for ACLU charity as well. They didnt quite do as well as Jack Dorseys or Ed Snowdens. Did you see Ed Snowdens tweet? I think he got almost [$]4 million [Editors note: Actually, it was 2,224 ETH, or $5.4 million, on the day of sale.]

I have a funny story. So I know the people around Ed Snowden really well. And Ive talked to Ed, and I think hes an American hero who still needs to be celebrated more. And I thought [Donald] Trump could do the one right thing in his presidency and pardon him. But of course he didnt.

And I hadnt known about the sale today. [Note: We spoke on April 16, the day of Snowdens NFT sale.] I just saw a tweet about it. And 15 minutes from the end of the auction, it was going for 13 Ethereum [around $31K at the time]. I immediately called the people around Ed. I was like, Is this real? Because if its 13 Ethereum, Ill buy it.

And then, I realized I read it wrong. It was going for 1,300 Ethereum. So they were laughing at me. They were, like, No, thats 1,300, Daryl. Im thinking, Okay, Ill let someone else do that one.

Yeah, the random bus drivers NFT goes for 13 ethereum.

Can you describe your NFT investing strategy? Because my understanding is that you look for artists who might be the next bigthing, and are currently undervalued. And this sounds a lot like what you do as a GM, hunting for undervalued players.

On the art side there are some very legitimate artists in the space. But then theres also a lot of nonsense. And theres a shakeout coming. Those [NFTs from the nonsense artists] are going to go to near zero, I think.

I had already been a fan of Beeples digital art. So when I saw Beeples sale go for a crazy amount, I immediately thought, Well, s**t, Ill look for all of my favorite digital artists. Ill see if theyre selling. Shockingly, very few were selling when I first went to look a few months ago.

Unless you're asleep at the wheel, every major organization, sports or not, is looking at how to use the technology in the back end.

Things change pretty quick.

When I first went to look, very few artists were actually selling any NFTs. But every single digital artist whose work I knew and thought was good I just grabbed all of them. Im probably most excited about getting some of Pascal Blanches stuff. Hes just so talented.

And when he did a Dune thing, I thought, Oh my God. I have to get the Dune thing because I love the book. So, yeah, I think Pascal has a chance to be the next Beeple, for example. And so Im just squatting those.

And your strategy for NBA Top Shot?

Im trying to get younger players that I think have a good future, and to get the scarcer ones. For Sorare, same thing, Im trying to grab the younger players that I think have a big future. Because when the shakeout comes, theres going to be a chase to quality.

Thats why I love CryptoPunks. I love the better Top Shot moments of younger players, who are going to be good for 10 to 12 years going forward. I love the Sorare soccer players who are younger and are going to be great later.

Theres going to be a moment when everyone thinks, This was all a huge mistake. That moments coming. It happened with bitcoin when it went back to $3,000. And everyone was like, Bitcoin is dead. Its all bulls**t. Thats going to happen in NFTs. Theres going to be a period where everyone thinks, Anyone who did anything right now is an idiot. Then it goes to quality and the foundation of the idea. And the reality is, theres going to be quality, and the idea is great.

Why do you like the idea so much?

Digital collectibles are superior to physical collectibles. I just moved from Houston to Philly and it was a pain in the ass. I had to move 10,000 comics. I had to move all of my wall art. I had to move all of this s**t, and with digital stuff you just move it. Its definitely superior. And its the start of a major, major trend. So things like CryptoPunks, things like Top Shot, Sorare, all of this early stuff as long as its quality is going to be worth, I think, five to 10 to 100 times in five years. But were going to have to go through a cycle.

It sounds like many players are very Top Shot savvy, and NFT savvy. Theyre into it. Do you see any complications here down the road? Like, what if the players want to mint NFTs or do things that are competitive with Top Shot? And will we have a kind of crypto players empowerment movement that leads to an almost meta-negotiation?

Well, the nice thing is, I think the players union and the league office are on top of this. First off, they can make an NFT now, nothing stops them. Theres no agreement. There may be certain kinds of things like game action where there are rules about what they can make. But just like me, theyre personally going to be able to do whatever they want. So nothings preventing that.

Theyre also benefiting in a big way. I mean, give credit to Michele Roberts [executive director of the NBA Players Association] and Adam [Adam Silver, NBA commissioner] and their whole infrastructure. Everyones making a lot of money in Top Shot at the league, and that flows into BRI [basketball-related income] and its shared 50/50.

The way that Adam and Michele have structured it, where the players and the league office have this partnership, really allows for these kinds of things to flourish. It helped us in the bubble we were the first league back. And thats because of the partnership. And for things like Top Shot and NFTs, that partnership allows these kinds of ideas to flourish.

Players might see a Top Shot moment of themselves selling for $250K, and they wonder how they benefit. Well, they do benefit. How they benefit is a little complicated because you have to look at the licensing flows, but they definitely do benefit. Its really nice how the NBA has done everything.

How much is the NBA to the extent that youre aware looking into other types of NFTs, or fan tokens, or other blockchain concepts, whether for ticketing or other fan engagement tools?

Unless youre asleep at the wheel, every major organization, sports or not, is looking at how to use the technology in the back end. And most of them are probably going to screw it up. [Laughs.] But everyone is looking at it. I think youre going to see tons of announcements from players, the league office, players unions, teams, organizations theres going to be a ton of announcements. And if theyre going to get into it, its important that people really understand the underlying technology and the underlying things that are going to drive value.

Youre most famous for using data and analytics to uncover opportunities and exploit inefficiencies in the market. What are some inefficiencies that you see in the crypto markets, that you think can maybe be exploited?

NFTs are going to be a real dangerous space to put money into for the next year, because theres just going to be a lot of low-quality stuff thats going to go to zero. To me, thats the inefficiency. Its similar to the first explosion of all the different kinds of altcoins and s**tcoins. Theres a flight to quality, and it flew to bitcoin and ethereum and a few others. Its similar here [with NFTs]. The inefficiency is the newly minted stuff that isnt really valuable.

How about a crypto project that youre bullish on?

Im really excited about y.at. Their vision is big. Theres a long way to go, but their fundamental vision is that emojis are universal, hard for governments to control so again, decentralized and every person can have their own three, four, or five emoji moniker. Its your email, its your URL, its whats used to log into sites. Your universal identifier becomes these emojis because language obviously varies from place to place, but globally these emojis are universal. So right now theyre minting all these universal emojis that people can own.

My personal one is the Statue of Liberty and a basketball. The three emoji ones, you can buy right now on their site. The two and one emojis are being auctioned off. Theyre putting in this infrastructure, and Im really bullish on them.

Thanks, Daryl. This was a blast. Best of luck with the rest of the season.

See the original post:
Daryl Morey on Crypto, NFTs: 'It's the Start of a Major Trend' - CoinDesk - CoinDesk

Why does the US intelligence spy on European allies? – TRT World

The spying saga shows that Washington will go to any length to stop EU states from getting closer to China and Russia.

Embarrassing leaks that show the US National Security Agency (NSA) spied on high-ranking European Union leaders for years have opened up old wounds of distrust between close military and diplomatic allies.

What has worried EU politicians even more is that Denmark's military intelligence service - the FE - cooperated with the NSA in a sophisticated eavesdropping scheme that targeted German Chancellor Angela Merkel among others.

The revelations came in a pan-European media investigation led by Danish public broadcaster, Danmarks Radio, which said the NSA used Denmark's internet cables to retrieve calls and text messages of high-ranking officials from Germany, Sweden, Norway and France between 2012 and 2014.

Even though the details of NSAs spy operation that focused on Europe have emerged in the past, the new information comes when President Biden is only months into office, while Washington is seeking to coordinate with European allies on a host of issues including Irans nuclear programme.

Intelligence collection against allies suggests a lack of trust in what is being shared in normal diplomatic exchanges, said Ewan Lawson, an associate fellow at the London-based Royal United Services Institute (RUSI).

Key European states have taken different positions to the US on a number of issues, perhaps most notably on relations with Russia and China.

Reports of a sophisticated US spy network first surfaced in 2013 when the NSA analyst Edward Snowden leaked documents showing how Washington was spying on American citizens and allies in other countries.

US intelligence collection against allies was part of the Snowden leaks and as such, this is not new and given it is relatively historical it is unlikely to have a significant effect on US relations with France and Germany, said Lawson.

Nevertheless, the European politicians have reacted angrily. Clement Beaune, Frances Europe Minister, referred to the spying news as extremely serious.

A penalty for dissent

Sami Hamdi, the managing director of International Interest, a global risk and intelligence consultancy, said that Washington has been concerned for years that Europe might take an independent approach towards its foes China and Russia.

Some European countries, such as Italy, have gone their own way and signed agreements to participate in Chinas Belt and Road Initiative - a multibillion dollar infrastructure investment project that the US says Beijing is using to expand its global influence.

While the question of America continuing with its spying practice remains open for debate, Hamdi said the distrust between the allies is still there.

Washington is deeply concerned by European countries mulling better ties with Russia, and the EU negotiating a trade deal with China at the same time that Biden seeks to isolate Beijing.

President Trumps administration largely succeeded in convincing European partners to not use Chinas 5G gear.

But some countries, such as EUs economic powerhouse Germany, have resisted US pressure on other projects that involve China or Russia.

Biden is also concerned that Germany has pushed back hard on issues such as the Nord Stream 2 pipeline project that Washington had resolved to impose sanctions on in its entirety, said Hamdi.

The Nord Stream 2, a 1,200 kilometre-long pipeline that will transport Russian natural gas to Europe is being built at a cost of more than $11 billion. The project is vital for the EU to meet its energy needs.

The US in April warned Germany that there was no room for compromise on the project and that it will use all possible means to stop its construction.

Amid the spying saga, one country that has found itself in perhaps the tightest spot is Denmark.

Lars Findsen, the former director of the Danish Defense Intelligence Service (FE) was suspended along with other officials last year after an internal investigation, which began in 2015, Danmarks Radio said.

This is probably most difficult for Denmark in its relationships with neighbours, said Lawson, the RUSI research fellow.

However, the narrative in Denmark seems to be that this was an operation conducted by its intelligence agencies without the knowledge of politicians and not part of an official policy. This is supported by the suspension of senior intelligence officials.

Source: TRT World

Read more here:
Why does the US intelligence spy on European allies? - TRT World

OPINION: Will treason mania destroy America? – The Richmond Observer

The Founding Fathers carved the Constitution in light of the horrific political abuses that had proliferated in England in prior centuries. That was why there was a narrow definition of treason in the Constitution: Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.

After the end of Reconstruction, treason charges became relatively rare in American politics. Wars were probably the biggest propellants, with anyone who opposed American intervention abroad being tagged with the scarlet T. But by the late 1960s, when the futility of the Vietnam War was becoming clear, treason charges had largely lost their political clout. Gen. Alexander Haig, who later became Richard Nixons last White House chief of staff, denounced the Pentagon Papers as devastating a security breach of the greatest magnitude of anything Ive ever seen its treasonable. But the Nixon administrations protests failed to sway the Supreme Court to block the New York Times from publishing the secret official records of decades of U.S. government deceit on Indochina.

Unfortunately, the political exploitation of the 9/11 attacks included reviving treason accusations against anyone who did not cheer George W. Bushs promise to rid the world of evil. On Dec. 6, 2001, Attorney General John Ashcroft informed the Senate Judiciary Committee, To those who scare peace-loving people with phantoms of lost liberty, my message is this: your tactics only aid terrorists, for they erode our national unity and give ammunition to Americas enemies. At that point, Bush had already suspended habeas corpus and his underlings were busy sabotaging laws limiting federal surveillance of American citizens. But regardless of how many civil liberties were actually destroyed, critics were traitors.

Run-up to 2016

While Bush was rehabilitated by the mainstream media in recent years as a reward for criticizing Donald Trump, his 2004 reelection campaign relied on tacit treason accusations to tarnish Democrats, liberals, and even a few libertarians. At the 2004 Republican National Convention, keynote speaker Democratic Sen. Zell Miller implied that political opposition was treason: Now, at the same time young Americans are dying in the sands of Iraq and the mountains of Afghanistan, our nation is being torn apart and made weaker because of the Democrats manic obsession to bring down our commander in chief.

There was no evidence that such criticism of Bushs foreign policy was ripping America asunder but trumpeting the accusation made Bush critics appear a pox on the land. Other Republicans used the same theme. John Thune, the Republican U.S. Senate candidate in South Dakota, denounced Senate Minority Leader Tom Daschle: His words embolden the enemy. Bush campaign manager Ken Mehlman condemned the Kerry campaign for parroting the rhetoric of terrorists and warned, The enemy listens. All listen to what the president said, and all listen to what Senator Kerry said. Former New York City Police Commissioner Bernie Kerik, stumping for Bush, told audiences, Political criticism is our enemys best friend. Six weeks before the 2004 election, the Washington Post noted, President Bush and leading Republicans are increasingly charging that Democratic presidential nominee John F. Kerry and others in his party are giving comfort to terrorists and undermining the war in Iraq a line of attack that tests the conventional bounds of political rhetoric.

In 2006, the New York Times revealed that the Bush administration was illegally seizing personal financial information of millions of Americans. Rep. Peter King (R-N.Y.), chairman of the House Homeland Security Committee, declared, Were at war, and for the Times to release information about secret operations and methods is treasonous. Sen. Jim Bunning (R-Ky.) also labeled the Times guilty of treason. Rep. Ted Poe (R-Tex.) suggested that the Times had become the Benedict Arnold Press.

After Barack Obama was elected in 2008, treason allegations simmered down, except for occasional allegations that Obama was a secret Muslim scheming to impose Sharia law on America. Former NSA employee Edward Snowdens leak of NSA documents was the biggest treason boomlet of that era. Numerous congressmen called for Snowden to be charged with treason, though the Founding Fathers neglected to include embarrassing the government in the Constitutions definition of treason. House Intelligence Committee chairman Mike Rogers (R-Mich.) and former NSA chief Michael Hayden publicly joked about putting Snowden on a government kill list.

But the Snowden uproar was a kerfuffle compared to the Pandoras box opened by the 2016 presidential campaign. Democratic nominee Hillary Clinton repeatedly effectively asserted that Republican nominee Donald Trump was a Russian tool, betraying the nation.

Treason in the White House

After Trumps surprise victory in November 2016, treason became the coin of the realm for denigrating political opposition. Democratic politicians, activists, and their media allies responded to Hillary Clintons surprise defeat by smearing Donald Trump for colluding with Russia. Leaks to the media from the FBI, CIA, and other federal agencies spurred raging controversies that contributed to Trumps firing FBI chief James Comey. That resulted in the appointment of Robert Mueller as special counsel to investigate Trump. Endless wrangling followed, including a claim by prominent Democrats claiming that Republicans would be guilty of treason if they released a memo detailing the FBIs abuse of the Foreign Intelligence Surveillance Act.

Mueller quickly became sacrosanct; liberals even bought votary candles with his likeness. A piece I wrote for The Hill on Muellers lawless record as FBI chief spurred 1,500 comments, including denunciations of me as a treason weasel, bearded grifter, Alt-moron, lackey, lickspittle, and librarian (some folks cant spell libertarian). In April 2019, Mueller finally admitted that there was no substantive evidence of collusion but that did not stop the endless RussiaGate refrain and treason accusations from Trump critics. Most of Trumps presidency was permeated by charges of treason against him.

But the Mueller-induced treason prattle was childs play compared to what followed disputes over the 2020 presidential election. As law professor Jonathan Turley noted, after the media announced Biden won, All court challenges [to election results] then became unethical for lawyers and all congressional challenges became sedition for members. Pennsylvania Attorney General Josh Shapiro this past December denounced one challenge to the election results as a seditious abuse of the judicial process that was guilty of misleading the public about a free and fair election and tearing at our Constitution. Sen. Chris Murphy (D-Conn.) wailed, The most serious attempt to overthrow our democracy in the history of our country is under way. Twitters left-wing tilt has helped spur hashtags such as #GOPSeditiousTraitors and #TreasonAgainstAmerica. One leftist activist got 65,000 likes when he declared that Donald Trump should replace Benedict Arnold in history as Americas most reviled traitor.

On the other side of the political divide, some Republicans sounded equally hellbent on demonizing any opposition to their demands. Republican lawyer Lin Wood declared that Vice President Pence would be guilty of treason for certifying the election results and that he will face execution by firing squad. The Pro-Trump duo Diamond and Silk tweeted, After listening to the leaked call put out by the Washington Post we are convinced that Georgias secretary of state and his lawyer need to be arrested for Treason!

After protesters crashed into the U.S. Capitol on Jan. 6 (some crashed into the building while others sauntered in), treason accusations went into overdrive. The definition of treason was vastly expanded to include members of Congress who filed a lawful challenge against the 2020 electoral tally. House Speaker Nancy Pelosi declared that Republicans who signaled they would not ratify the Electoral College results earlier that month gave aid and comfort to [protesters] with the idea that they were embracing a lie that the election did not have legitimacy. A court of law would never convict Republican members of treason, but Pelosi can convict them in the court of public opinion, thanks to the hanging judges at CNN and MSNBC.

Civil War politics

Many Trump opponents are invoking 1861, denouncing any Republican challenges to the election as the same type of treason supposed to have been committed by states that exited the union. But the Civil War illustrates the catastrophic damage that can result from broad-brush definitions of treason. Northern politicians quickly persuaded their supporters that all Southerners were traitors a capital offense. In 1864, Gen. William Sherman wired the War Department in Washington, There is a class of people men, women, and children who must be killed or banished before you can hope for peace and order. Union armies in Virginia, Georgia, and elsewhere late in the war intentionally devastated civilian populations who were considered collectively guilty of secession and treason.

Unfortunately, many pundits and politicians know only a fairy-tale version of the Civil War. The fact that Trump had high support in many southern states is spurring bizarre proposals that would be the final coffin nails into any hope for a semblance of peaceful coexistence between Americans with different views and values. Rep. Alexandria Ocasio-Cortez (D-N.Y.), the medias favorite progressive congresswoman, declared, The only way our country is going to heal is through the actual liberation of southern states. She didnt specify whether she favored the type of military dictatorship that was ended only by a historic compromise after the fraud-ridden 1876 presidential election. Politico, one of the most respected Washington publications, printed a piece titled, What Ulysses Grant Can Teach Joe Biden about Putting Down Violent Insurrections. The piece stressed, Grants approach relied on a combination of brute military force and a drastic curtailment of civil liberties, yet it nevertheless has relevance for the current moment. The article stressed the need for overwhelming force to suppress the type of people who violated the sacred space of the U.S. Capitol on Jan. 6.

Any federal attempt to expunge political dissent in America with brute military force and a drastic curtailment of civil liberties would very likely provoke a civil war. But that could be the end result of current trends of presuming that political opponents are traitors who must be exterminated. While Democratic members of Congress and some Biden officials are comforted by the thousands of National Guard troops now occupying Washington at their behest, they would be unwise to presume the troops would obey orders to scourge their countrymen in every nook of the land.

Perhaps the ultimate cause of the proliferation of treason accusations is that politicians have captured far too much control over Americans lives. The more power politicians seize, the more unhinged political rhetoric becomes.

American politics is increasingly becoming toxic because presidents nowadays are elective dictators. Rather than a process of selecting a chief executive who will uphold the Constitution and enforce the laws, elections nowadays confer a license to run amok over the lives and property of practically anyone who falls under federal sway. Government has amassed so much power that the vast majority of Americans no longer trust Washington.

The surest recipe for curtailing political vitriol is to reduce political power so elections are not demolition derbies that doom losing sides. Thomas Jefferson in 1799 offered the ideal that can rescue America from strife today: In questions of power, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution. And if presidents and members of Congress choose to openly scorn their oaths of office and constitutional constraints on their power well, many Americans would consider that to be treason.

James Bovard is the author of 10 books, including 2012s "Public Policy Hooligan" and 2006s "Attention Deficit Democracy." He has written for the New York Times, Wall Street Journal, Playboy, Washington Post, and many other publications.This article was originally published in the April 2021 edition of Future of Freedom.

See the rest here:
OPINION: Will treason mania destroy America? - The Richmond Observer

NEVADA UFOs, the Pentagon, and the enigma of Bob Lazar NEVADA CURRENT – Nevada Current

This month, a highly anticipated report is slated to be delivered to the United States Senate on the subject of Unidentified Aerial Phenomena (UAP) what we used to call Unidentified Flying Objects (UFOs). The report is to be made public (although it may have a classified annex) and was requested as part of the Intelligence Authorization Act attached to a COVID-19 relief bill. Itspurpose is to provide lawmakers with the best information available from the Pentagon and the intelligence community about incidents that appear to involve vehicles with amazing flight characteristics far beyond those of our most advanced aircraft.

But, this report should also shed light on and, in theory, resolve a thirty-year old, major UFO puzzle with Nevada origins: did a young physicist named Bob Lazar actually work on captured extraterrestrial spacecraft at a secret government facility called S-4, in Lincoln County near Area 51?

Lazar surfaced publicly in 1989, when he was interviewed by my former colleague George Knapp of KLAS-TV, Las Vegas. At first, Lazar spoke only in silhouette, and used the pseudonym Dennis. Later, he came forward under his own name and with no disguise. Lazars claims were fantastic: that the U.S government had, in its possession, nine crashed or captive spacecraft from another world at least one of them shaped like an actual saucer. Lazar claimed hed been part of a team hired by the government to reverse-engineer the craft, which would unlock for American scientists the propulsion secrets they needed to pave a path to the stars.

Lazar said he was fired from his job at the clandestine military base because he brought some friends into the desert near Area 51 one evening to surreptitiously watch a saucer being test flown. A Lincoln County deputy caught the group leaving the area and the deputy ratted Lazar out to the government.

Lazars story combined the most compelling elements of alien abduction stories and shadow-government conspiracy theories. The tale had a profound influence on popular culture from cartoons like American Dad to movies like Paul & Independence Day.

While publicity surrounding Lazars amazing claims literally put Area 51 on the map, it also shined a spotlight on himself, and it wasnt long before people started picking apart his story. Places where Lazar claimed to have gone to college like CalTech and MIT said theyd never heard of him. About a year after his initial TV interview, Lazar found himself criminally charged for helping operate what prosecutors described as an illegal high-tech whore house. That didnt help his credibility much.

As his case worked through the legal system, Lazar produced one of the few bits of physical evidence that hed worked at a secret base in Nevada. It was a W-2 form, reflecting income of less than one thousand dollars, purportedly paid to him by the Department of Naval Intelligence.

Even that form was questioned over its authenticity. Skeptics pointed out that theres an Office of Naval Intelligence within the Department of the Navy but not a Department of Naval Intelligence.

I covered Lazars criminal case as a reporter for KTNV-TV in 1990. I remember him pleading guilty to pandering and I recall thinking: if his saucer stories were true, and hes typical of the scientists we have working on the most significant scientific project in history then our planet might be in deep doo-do.

Yet, credibility issues aside, and despite a dearth of physical evidence and lack of corroboration from other scientists, Lazars astounding tale has not only survived over three decades but thrived.

His claims received renewed attention in 2018 thanks to a documentary produced by movie maker Jeremy Corbell. The documentary widely viewed on Netflix led to Lazar appearing on the Joe Rogan podcast, possibly the most popular podcast on the planet (this planet, anyway). Corbell, meanwhile, has been interviewed multiple times recently on network news talk shows. He is the source of at least one, recently leaked UAP video that depicts what appear to be triangular shapes moving through the sky.

Corbell in the interviews Ive seen has not claimed the UAP videos show alien intelligence at work. But he did say in his documentary that he believed there was more evidence Bob Lazar was telling the truth than there was that he was lying.

Far be it from me to suggest these aerial objects could not be of extraterrestrial origin. They may very well be. But, I would caution people inclined to rule out earthly explanations not to jump to conclusions. Just because you dont know what something is doesnt mean it is what you wish it was. UK science writer Mick West has provided very plausible terrestrial interpretations of the most recent UAP videos making rounds on TV, including the video of flying triangles.

The request for the Senate UAP study makes no mention of alien intelligence or extraterrestrial space vehicles. But the language of the request calls for such a comprehensive study that the results should either confirm or debunk Lazars claims.

The Director of National Intelligence, working with the Secretary of Defense and other agencies, is directed to provide a report that includes (in part):

A detailed analysis of unidentified aerial phenomena data and intelligence reporting collected or held by the Office of Naval Intelligence, including data and intelligence reporting held by the Unidentified Aerial Phenomena Task Force;

A detailed analysis of unidentified phenomena data collected by:

A detailed analysis of data by the FBI, which was derived from intrusions of unidentified aerial phenomena data over restricted United States airspace

Also to be included in the report:

Identification of potential aerospace or other threats posed by the unidentified aerial phenomena to national security, and an assessment of whether this unidentified aerial phenomena activity may be attributed to one or more foreign adversaries;

Identification of any incidents or patterns that indicate a potential adversary may have achieved breakthrough aerospace capabilities that could put United States strategic or conventional forces at risk.

Thus, the upcoming Senate report has the potential to paint Lazar as an unfairly maligned interstellar whistleblower with more impact than Edward Snowden, Karen Silkwood and Daniel Ellsberg combined or suggest hes either a liar or a loon.

Assuming Lazar has been telling the truth can the report avoid conceding that? Wouldnt the Pentagon have to say, at the very least, Well, Senators, were not sure whats causing all these recent UAP sightings, but we can tell you that we have an alien technology in our possession capable of performing the same kind of high-speed, gravity-defying maneuvers were seeing in these videos.

Of course, such news would be the biggest story since Genesis.

Im not getting vibes that a world-shattering revelation of that scale is about to be made. For example, former President Barack Obama, who was this nations commander-in-chief and presumably should know whats going on, was asked point-blank about UFOs in a recent interview with CBS-TVs James Corden.

While Obama said he was aware of real incidents involving unknown objects in the sky making incredible, unexplained maneuvers he also addressed the issue of aliens and captive alien spacecraft, saying:

When I came into office, I asked (about aliens), right? I was like, alright, is there the lab somewhere where were keeping the alien specimens and spaceship? They did a little bit of research and the answer was no.

So, if the upcoming Senate report does not vindicate Lazar, what will it say about him? Will he even be mentioned? Or mentioned as a mere minor player who made extraordinary claims but was an ordinary employee at Area 51 who never got near a saucer because there werent any?

My suspicion is the report will contain new details about many incidents already reported, and new reports of other sightings that have been previously secret. There will likely be some events that seem to defy conventional explanation.

But, I think people who are expecting the military to finally provide evidence validating Lazars resume as a saucer mechanic will be disappointed.

One thing you can say about Lazar after all these years: he was unequivocal. Lazar did not drop vague, tantalizing hints (as some have recently done in the media) that American scientists have possible exotic materials that need further testing to determine whether theyre of alien origin. Lazar flat out said our scientists have nine captive alien craft (nine!), that theyve been studying these craft for more than thirty years, and that he personally wrenched on the machines.

Based on Obamas comments, though, I dont think well see evidence of that in the upcoming report. And if Lazars case remains unconfirmed, I fear true believers may decry the Senate report as just another whitewash, a 21st century redux of Project Bluebook which looked at more than 12,000 UFO sightings between 1952 and 1969 and concluded there was no evidence any of them involved extraterrestrial vehicles.

At the very least, the request for the report indicates the government and military are finally taking a serious and urgent look at whats causing these phenomena and whether they pose a threat to our security. Thats progress, and thats good.

But, if the report comes up short for those expecting proof-positive of alien contact, all I can say is this: the truth is out there. And watch the skies. Keep watching the skies.

Continue reading here:
NEVADA UFOs, the Pentagon, and the enigma of Bob Lazar NEVADA CURRENT - Nevada Current

Trump Administration Secretly Seized Phone Records of Times Reporters – The New York Times

WASHINGTON The Trump Justice Department secretly seized the phone records of four New York Times reporters spanning nearly four months in 2017 as part of a leak investigation, the Biden administration disclosed on Wednesday.

It was the latest in a series of revelations about the Trump administration secretly obtaining reporters communications records in an effort to uncover their sources. Last month, the Biden Justice Department disclosed Trump-era seizures of the phone logs of reporters who work for The Washington Post and the phone and email logs for a CNN reporter.

Dean Baquet, the executive editor of The Times, condemned the action by the Trump administration.

Seizing the phone records of journalists profoundly undermines press freedom, he said in a statement. It threatens to silence the sources we depend on to provide the public with essential information about what the government is doing.

Last month, after the disclosures about the seizures of communications records involving Post and CNN reporters, President Biden said he would not allow the department to take such a step during his administration, calling it simply, simply wrong.

Referring to that declaration, Mr. Baquet added: President Biden has said this sort of interference with a free press will not be tolerated in his administration. We expect the Department of Justice to explain why this action was taken and what steps are being taken to make certain it does not happen again in the future.

Anthony Coley, a Justice Department spokesman, said that law enforcement officials obtained the records in 2020, and added that members of the news media have now been notified in every instance of leak investigations from the 2019-2020 period in which their records were sought.

The department informed The Times that law enforcement officials had seized phone records from Jan. 14 to April 30, 2017, for four Times reporters: Matt Apuzzo, Adam Goldman, Eric Lichtblau and Michael S. Schmidt. The government also secured a court order to seize logs but not contents of their emails, it said, but no records were obtained.

The Justice Department did not say which article was being investigated. But the lineup of reporters and the timing suggested that the leak investigation related to classified information reported in an April 22, 2017, article the four reporters wrote about how James B. Comey, then the F.B.I. director, handled politically charged investigations during the 2016 presidential election.

Discussing Mr. Comeys unorthodox decision to announce in July 2016 that the F.B.I. was recommending against charging Hillary Clinton in relation to her use of a private email server to conduct government business while secretary of state, the April 2017 article mentioned a document obtained from Russia by hackers working for Dutch intelligence officials. The document, whose existence was classified, was said to have played a key role in Mr. Comeys thinking about the Clinton case.

The document has been described as a memo or email written by a Democratic operative who expressed confidence that the attorney general at the time, Loretta Lynch, would keep the Clinton investigation from going too far. Russian hackers had obtained the document, but it is apparently not among those that Russia sent to WikiLeaks, intelligence officials concluded.

Mr. Comey was said to be worried that if Ms. Lynch were to be the one who announced a decision not to charge Mrs. Clinton, and Russia then made the document public, it would be used to raise doubts about the independence of the investigation and the legitimacy of the outcome.

The Times reported in January 2020 that Trump-era investigators had pursued a leak investigation into whether Mr. Comey had been the source of the unauthorized disclosure in that 2017 article.

Mr. Comey had been under scrutiny since 2017, after Mr. Trump fired him as the director of the F.B.I. After his dismissal, Mr. Comey engineered through his friend Daniel Richman, a Columbia University law professor the disclosure to The Times of accounts of several of his conversations with the president related to the Russia investigation.

The inquiry into Mr. Comey, according to three people briefed on that investigation, was eventually code-named Arctic Haze. Its focus was said to evolve over time, as investigators shifted from scrutinizing whether they could charge Mr. Comey with a crime for disclosing his conversations with Mr. Trump, to whether he had anything to do with the disclosure of the existence of the document.

As part of that effort, law enforcement officials had seized Mr. Richmans phone and computer, according to a person familiar with the matter. They are said to have initially searched them for material about Mr. Comeys conversations with Mr. Trump, and later obtained a courts permission to search them again, apparently about the Russia document matter.

Separately, according to a person briefed on the investigation, the F.B.I. is also said to have subpoenaed Google in 2020, seeking information relevant to any emails between Mr. Richman and The Times. A spokesman for Google did not respond to a request for comment.

But by November 2020, some prosecutors felt that the F.B.I. had not found evidence that could support any charges against Mr. Comey, and they discussed whether the investigation should be closed.

At the beginning of this year, prosecutors were informed that the F.B.I. was not willing to close the case in part because agents still wanted to interview Mr. Comey, according to a person familiar with the F.B.I.s inquiry. Interviewing the subject of an investigation is typically considered a final step before closing a matter or bringing charges.

Last month, the F.B.I. asked Mr. Comeys lawyer whether he would be willing to sit down for an interview, a request that Mr. Comey declined, according to a person familiar with the case.

Starting midway through the George W. Bush administration, and extending through the Barack Obama and Donald Trump administrations, the Justice Department became more aggressive about pursuing criminal leak investigations.

Mr. Lichtblau who is no longer with The Times came under scrutiny early in that period because he co-wrote a 2005 Times article disclosing the warrantless surveillance program that Mr. Bush had secretly authorized after the Sept. 11, 2001, attacks. The Bush administration convened a special task force to hunt for the sources of that article, and its new approach spilled over into unrelated cases during the Obama administration.

In 2013, Mr. Apuzzo and Mr. Goldman who were then working for The Associated Press and had broken news about a bomb plot by a Qaeda affiliate in Yemen were notified that the Obama-era department had secretly subpoenaed two months of their phone records, along with those of other reporters and editors at The A.P.

That same month, it also emerged that in a leak investigation about a Fox News article involving North Koreas nuclear program, the Obama Justice Department had used a search warrant to obtain a Fox News reporters emails and characterized the reporter as a criminal conspirator.

The disclosures prompted a bipartisan uproar, and Mr. Obama instructed the attorney general at the time, Eric H. Holder Jr., to review rules for criminal investigations that affect the news media.

Mr. Holder tightened them, including strengthening a preference for notifying a news organization in advance about a planned subpoena so it could negotiate or fight in court over its scope. After the changes, the rate of new leak cases dropped significantly during Mr. Obamas second term.

But under Mr. Trump, who liked to attack the news media as the enemy of the people, the practice resurged.

In August 2017, Attorney General Jeff Sessions said that the number of leak inquiries had tripled. And under his successor, Attorney General William P. Barr, it is now clear, the department further escalated its aggressive approach to leak investigations.

Read the original:

Trump Administration Secretly Seized Phone Records of Times Reporters - The New York Times

Machine learning security needs new perspectives and incentives – TechTalks

At this years International Conference on Learning Representations (ICLR), a team of researchers from the University of Maryland presented an attack technique meant to slow down deep learning models that have been optimized for fast and sensitive operations. The attack, aptly named DeepSloth, targets adaptive deep neural networks, a range of deep learning architectures that cut down computations to speed up processing.

Recent years have seen growing interest in the security of machine learning and deep learning, and there are numerous papers and techniques on hacking and defending neural networks. But one thing made DeepSloth particularly interesting: The researchers at the University of Maryland were presenting a vulnerability in a technique they themselves had developed two years earlier.

In some ways, the story of DeepSloth illustrates the challenges that the machine learning community faces. On the one hand, many researchers and developers are racing to make deep learning available to different applications. On the other hand, their innovations cause new challenges of their own. And they need to actively seek out and address those challenges before they cause irreparable damage.

One of the biggest hurdles of deep learning the computational costs of training and running deep neural networks. Many deep learning models require huge amounts of memory and processing power, and therefore they can only run on servers that have abundant resources. This makes them unusable for applications that require all computations and data to remain on edge devices or need real-time inference and cant afford the delay caused by sending their data to a cloud server.

In the past few years, machine learning researchers have developed several techniques to make neural networks less costly. One range of optimization techniques called multi-exit architecture stops computations when a neural network reaches acceptable accuracy. Experiments show that for many inputs, you dont need to go through every layer of the neural network to reach a conclusive decision. Multi-exit neural networks save computation resources and bypass the calculations of the remaining layers when they become confident about their results.

In 2019, Yigitan Kaya, a Ph.D. student in Computer Science at the University of Maryland, developed a multi-exit technique called shallow-deep network, which could reduce the average inference cost of deep neural networks by up to 50 percent. Shallow-deep networks address the problem of overthinking, where deep neural networks start to perform unneeded computations that result in wasteful energy consumption and degrade the models performance. The shallow-deep network was accepted at the 2019 International Conference on Machine Learning (ICML).

Early-exit models are a relatively new concept, but there is a growing interest, Tudor Dumitras, Kayas research advisor and associate professor at the University of Maryland, told TechTalks. This is because deep learning models are getting more and more expensive computationally, and researchers look for ways to make them more efficient.

Dumitras has a background in cybersecurity and is also a member of the Maryland Cybersecurity Center. In the past few years, he has been engaged in research on security threats to machine learning systems. But while a lot of the work in the field focuses on adversarial attacks, Dumitras and his colleagues were interested in finding all possible attack vectors that an adversary might use against machine learning systems. Their work has spanned various fields including hardware faults, cache side-channel attacks, software bugs, and other types of attacks on neural networks.

While working on the deep-shallow network with Kaya, Dumitras and his colleagues started thinking about the harmful ways the technique might be exploited.

We then wondered if an adversary could force the system to overthink; in other words, we wanted to see if the latency and energy savings provided by early exit models like SDN are robust against attacks, he said.

Dumitras started exploring slowdown attacks on shallow-deep networks with Ionut Modoranu, then a cybersecurity research intern at the University of Maryland. When the initial work showed promising results, Kaya and Sanghyun Hong, another Ph.D. student at the University of Maryland, joined the effort. Their research eventually culminated into the DeepSloth attack.

Like adversarial attacks, DeepSloth relies on carefully crafted input that manipulates the behavior of machine learning systems. However, while classic adversarial examples force the target model to make wrong predictions, DeepSloth disrupts computations. The DeepSloth attack slows down shallow-deep networks by preventing them from making early exits and forcing them to carry out the full computations of all layers.

Slowdown attacks have the potential ofnegating the benefits ofmulti-exit architectures, Dumitras said.These architectures can halve the energy consumption of a deep neural network model at inference time, and we showed that for any input we can craft a perturbation that wipes out those savings completely.

The researchers findings show that the DeepSloth attack can reduce the efficacy of the multi-exit neural networks by 90-100 percent. In the simplest scenario, this can cause a deep learning system to bleed memory and compute resources and become inefficient at serving users.

But in some cases, it can cause more serious harm. For example, one use of multi-exit architectures involves splitting a deep learning model between two endpoints. The first few layers of the neural network can be installed on an edge location, such as a wearable or IoT device. The deeper layers of the network are deployed on a cloud server. The edge side of the deep learning model takes care of the simple inputs that can be confidently computed in the first few layers. In cases where the edge side of the model does not reach a conclusive result, it defers further computations to the cloud.

In such a setting, the DeepSloth attack would force the deep learning model to send all inferences to the cloud. Aside from the extra energy and server resources wasted, the attack could have much more destructive impact.

In a scenario typical for IoT deployments, where the model is partitioned between edge devices and the cloud, DeepSloth amplifies the latency by 1.55X, negating the benefits of model partitioning, Dumitras said. This could cause the edge device to miss critical deadlines, for instance in an elderly monitoring program that uses AI to quickly detect accidents and call for help if necessary.

While the researchers made most of their tests on deep-shallow networks, they later found that the same technique would be effective on other types of early-exit models.

As with most works on machine learning security, the researchers first assumed that an attacker has full knowledge of the target model and has unlimited computing resources to craft DeepSloth attacks. But the criticality of an attack also depends on whether it can be staged in practical settings, where the adversary has partial knowledge of the target and limited resources.

In most adversarial attacks, the attacker needs to have full access to the model itself, basically, they have an exact copy of the victim model, Kaya told TechTalks. This, of course, is not practical in many settings where the victim model is protected from outside, for example with an API like Google Vision AI.

To develop a realistic evaluation of the attacker, the researchers simulated an adversary who doesnt have full knowledge of the target deep learning model. Instead, the attacker has asurrogatemodel on which he tests and tunes the attack. The attacker thentransfers the attack to the actual target. The researchers trained surrogate models that have different neural network architectures, different training sets, and even different early-exit mechanisms.

We find that the attacker that uses a surrogate can still cause slowdowns (between 20-50%) in the victim model, Kaya said.

Such transfer attacks are much more realistic than full-knowledge attacks, Kaya said. And as long as the adversary has a reasonable surrogate model, he will be able to attack a black-box model, such as a machine learning system served through a web API.

Attacking a surrogate is effective because neural networks that perform similar tasks (e.g., object classification) tend to learn similar features (e.g., shapes, edges, colors), Kaya said.

Dumitras says DeepSloth is just the first attack that works in this threat model, and he believes more devastating slowdown attacks will be discovered. He also pointed out that, aside from multi-exit architectures, other speed optimization mechanisms are vulnerable to slowdown attacks. His research team tested DeepSloth on SkipNet, a special optimization technique for convolutional neural networks (CNN). Their findings showed that DeepSloth examples crafted for multi-exit architecture also caused slowdowns in SkipNet models.

This suggests thatthe two different mechanisms might share a deeper vulnerability, yet to be characterized rigorously, Dumitras said. I believe that slowdown attacks may become an important threat in the future.

The researchers also believe that security must be baked into the machine learning research process.

I dont think any researcher today who is doing work on machine learning is ignorant of the basic security problems. Nowadays even introductory deep learning courses include recent threat models like adversarial examples, Kaya said.

The problem, Kaya believes, has to do with adjusting incentives. Progress is measured on standardized benchmarks and whoever develops a new technique uses these benchmarks and standard metrics to evaluate their method, he said, adding that reviewers who decide on the fate of a paper also look at whether the method is evaluated according to their claims on suitable benchmarks.

Of course, when a measure becomes a target, it ceases to be a good measure, he said.

Kaya believes there should be a shift in the incentives of publications and academia. Right now, academics have a luxury or burden to make perhaps unrealistic claims about the nature of their work, he says. If machine learning researchers acknowledge that their solution will never see the light of day, their paper might be rejected. But their research might serve other purposes.

For example, adversarial training causes large utility drops, has poor scalability, and is difficult to get right, limitations that are unacceptable for many machine learning applications. But Kaya points out that adversarial training can have benefits that have been overlooked, such as steering models toward becoming more interpretable.

One of the implications of too much focus on benchmarks is that most machine learning researchers dont examine the implications of their work when applied to real-world settings and realistic settings.

Our biggest problem is that we treat machine learning security as an academic problem right now. So the problems we study and the solutions we design are also academic, Kaya says. We dont know if any real-world attacker is interested in using adversarial examples or any real-world practitioner in defending against them.

Kaya believes the machine learning community should promote and encourage research in understanding the actual adversaries of machine learning systems rather than dreaming up our own adversaries.

And finally, he says that authors of machine learning papers should be encouraged to do their homework and find ways to break their own solutions, as he and his colleagues did with the shallow-deep networks. And researchers should be explicit and clear about the limits and potential threats of their machine learning models and techniques.

If we look at the papers proposing early-exit architectures, we see theres no effort to understand security risks although they claim that these solutions are of practical value, he says. If an industry practitioner finds these papers and implements these solutions, they are not warned about what can go wrong. Although groups like ours try to expose potential problems, we are less visible to a practitioner who wants to use an early-exit model. Even including a paragraph about the potential risks involved in a solution goes a long way.

View original post here:
Machine learning security needs new perspectives and incentives - TechTalks

Relogix Announces Collaboration with Dr. Graham Wills, Predictive Analytics and Machine Learning Expert, To Better Predict Office Space Needs -…

Relogix will be the first in the industry to more accurately forecast and predict companies' real estate needs. Companies will potentially save hundreds of millions of real estate spend, year over year with this collaborative innovation between Relogix and Dr. Wills. "Relogix has a significant data set to work with, from years of collecting billions of terabytes of Corporate Real Estate data around the world," says Dr. Wills. "I'm excited to use this data and cutting-edge machine learning techniques to take spatial data research to the next level."

With the pandemic, it has become ever more difficult for companies to understand workplace demand for real estate, with everyone working from home and anywhere for the foreseeable future. As people return to the office, understanding the relationship between people and their demand for workspace is a significant challenge for workplace technology leaders in Corporate Real Estate, HR, and IT.

"We're making a significant R&D investment to further innovation around forecasting and predictive analytics for Corporate Real Estate," says Andrew Millar, Founder and CEO of Relogix. "We are excited to be working with Graham, a pre-eminent researcher in the AI field, and expect our collaboration to leverage advanced machine learning techniques to surface insights like never before."

As an outstanding data science leader for over 20 years, Wills is a disruptive innovator, who has been innovating predictive analytics and forecasting for 30 years. Hailing from IBM, Dr. Wills is a well-known researcher in the fields of spatial data exploration and time series monitoring. At IBM, Wills was the lead architect for predictive analytics and machine learning in IBM's Data and AI group, and led the development of major advances including intelligent automatic forecasting, natural language data insights, anomaly detection and key driver identification.

About Graham Wills, PhD:Graham's passion is analyzing data and designing capabilities that help others do the same with their data. His focus is on creating software systems that allow non-experts to draw conclusions safely and efficiently from predictive and machine learning models, and thus enhance the value of their data. Graham has authored over 60 publications, including a book in the Springer statistical series, and has chaired or presented at numerous international statistical and knowledge discovery conferences. His patents span visualization, spatial analysis, semantic knowledge, and associated AI domains. Graham believes that the goal of AI is to give professionals the assistance they need to make great decisions from their data, and that CRE is an ideal domain in which to introduce new AI and Machine Learning capabilities to revolutionize the marketplace.

About Andrew Millar, CEO:Andrew's mission is to turn data into valuable outcomes. With over 20 years as a corporate real estate solutions and insights provider, Relogix founder and CRE veteran, Andrew Millar, recognized the need for technology in the CRE industry. He founded Relogix out of a need to create solutions to help organizations evolve their workspace and get high quality data to drive strategic decision making. Andrew believes that the key to evolving workspace and strategic planning lies in data science. Just like the workplace, data science is progressive: it is a journey of perpetual discovery, refinement, and adaptation. Andrew has since created proprietary sensor technology with the needs of corporate real estate in mind technology created for CRE professionals by CRE professionals.

About Relogix:Trusted by top Corporate Real Estate professionals who need to make data-driven business decisions to inform their real estate strategy and measure impact. Our flexible workplace insights platform and state-of-the-art IoT occupancy sensors are proven to transform the workplace experience. We're always looking for the next innovation in workplace technology, leveraging two decades of CRE and analytics expertise to help our clients understand and optimize their global real estate portfolios.

SOURCE Relogix Inc.

See the original post:
Relogix Announces Collaboration with Dr. Graham Wills, Predictive Analytics and Machine Learning Expert, To Better Predict Office Space Needs -...

Company uses AWS, genomics and machine learning to develop a blood test for early cancer detection – TechRepublic

Hospitals and businesses use cloud computing, machine learning and voice-controlled devices to personalize healthcare for patients.

Image: 3dreams/Shutterstock

Personalizing healthcare requires the power of cloud computing whether the challenge is screening for cancer, reducing the paperwork load for doctors or making decisions about care, according to speakers at the AWS Healthcare and Life Sciences Virtual Symposium.

Wilson To, the worldwide head of healthcare at AWS, hosted the event at the end of May. To and four guests discussed how cloud services can improve information management to personalize healthcare.

Josh Ofman, chief medical officer for Grail, said that his company is using cloud computing to detect cancer at earlier stages when it is easier to treat. The Galleri test uses a blood test to screen for multiple cancers at once.

Ofman said that genomics and machine learning are the foundation of the new early detection test. The test looks for epigenetic changes in a person's DNA that can be a warning sign for mutations caused by cancer.

According to the company, the test has a false positive rate of less than 0.5% and a positive predictive value of 44%.

Grail recommends the Galleri test for people 50 and older who are at a higher risk of cancer. The company also suggests that the test be used in addition to other screenings, not as a replacement for existing procedures. The company claims that the test can identify more than 50 types of cancer ranging from Hodgkin and non-Hodgkin lymphoma, melanoma and soft tissue sarcoma.

Grail started working with AWS in 2017 to ingest and analyze hundreds of thousands of records and genomic datasets. Grail migrated its core processing and analytical infrastructure from on-premises to a cloud platform at that time. Grail uses storage, compute and network services from AWS.

"This collaboration is powering our growth and will enable us to get to scale," Ofman said.

SEE: Cloud data storage policy (TechRepublic Premium)

Ofman said the company's data set will grow by orders of magnitude as researchers process all the samples they have today.

"It will enable us to continue to refine our test and develop new products in new disease areas," he said.

According to the National Cancer Institute, the most common cancers in men are prostate, lung and colorectal cancers, which make up about 43% of cancers diagnosed in men in 2020. For women, the types that represented 50% of all cancer diagnoses in 2020 were breast, lung and colorectal.

The retail cost of the test is $949. According to the company, the test is not covered by insurance.

Three other AWS customers spoke at the event, including Biogen, Cambia Health Solutions and Houston Methodist Hospital. Laurent Rotival, chief information officer and senior vice president at Cambia Health Solutions, said his company uses AWS to bring together data streams from disparate sources to create a coherent experience for customers.

Alisha Alaimo, president of Biogen's U.S. organization, explained how the company worked with Us Against Alzheimer's to develop a screening test. The idea was to make the test feel more personalized and less intimidating.

The brain health test can be taken by an individual with concerns for herself, or by a caregiver who is worried about a loved one. The screening is at Mybrainguide.org and is anonymous and available in English and Spanish.

Roberta Schwartz, chief innovation officer and executive vice president of Houston Methodist Hospital, described the health system's work with Alexa and voice commands to improve patient care. Schwartz also sees a need for more personalized healthcare services, a trend that the pandemic intensified. The hospital system used these guidelines to revamp the patient experience: Help me now, make it easy and remember me.

Another goal of the project was to let doctors have more face time than screen time when working with patients.

The hospital has Amazon Echos in every room and Schwartz said she has seen a new level of acceptance of the devices among patients and doctors.

"The devices were essential when patients couldn't have visitors," she said. "We are planning to hook our Alexas up to the nurse call system as well."

The hospital also plans to use the devices to reduce the time doctors have to spend transcribing patient information and to make it easier to pull up relevant information during a patient consultation.

During a 34-week pilot program, the hospital deployed 1,200 devices in its facilities and saw more than 600 daily interactions with Alexa and Avia, a virtual health assistant. Requests for music were the most popular request at 75% followed by knowledge searches, socializing, inquiries about the weather and general communication.

This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips. Delivered Mondays

Read more:
Company uses AWS, genomics and machine learning to develop a blood test for early cancer detection - TechRepublic

Adversarial attacks in machine learning: What they are and how to stop them – VentureBeat

Elevate your enterprise data technology and strategy at Transform 2021.

Adversarial machine learning, a technique that attempts to fool models with deceptive data, is a growing threat in the AI and machine learning research community. The most common reason is to cause a malfunction in a machine learning model. An adversarial attack might entail presenting a model with inaccurate or misrepresentative data as its training, or introducing maliciously designed data to deceive an already trained model.

As the U.S. National Security Commission on Artificial Intelligences 2019 interim report notes, a very small percentage of current AI research goes toward defending AI systems against adversarial efforts. Some systems already used in production could be vulnerable to attack. For example, by placing a few small stickers on the ground, researchers showed that they could cause a self-driving car to move into the opposite lane of traffic. Other studies have shown that making imperceptible changes to an image can trick a medical analysis system into classifying a benign mole as malignant, and that pieces of tape can deceive a computer vision system into wrongly classifying a stop signas a speed limit sign.

The increasing adoption of AI is likely to correlate with a rise in adversarial attacks. Its a never-ending arms race, but fortunately, effective approaches exist today to mitigate the worst of the attacks.

Attacks against AI models are often categorized along three primary axes influence on the classifier, the security violation, and their specificity and can be further subcategorized as white box or black box. In white box attacks, the attacker has access to the models parameters, while in black box attacks, the attacker has no access to these parameters.

An attack can influence the classifier i.e., the model by disrupting the model as it makes predictions, while a security violation involves supplying malicious data that gets classified as legitimate. A targeted attack attempts to allow a specific intrusion or disruption, or alternatively to create general mayhem.

Evasion attacks are the most prevalent type of attack, where data are modified to evade detection or to be classified as legitimate. Evasion doesnt involve influence over the data used to train a model, but it is comparable to the way spammers and hackers obfuscate the content of spam emails and malware. An example of evasion is image-based spam in which spam content is embedded within an attached image to evade analysis by anti-spam models. Another example is spoofing attacks against AI-powered biometric verification systems..

Poisoning, another attack type, is adversarial contamination of data. Machine learning systems are often retrained using data collected while theyre in operation, and an attacker can poison this data by injecting malicious samples that subsequently disrupt the retraining process. An adversary might input data during the training phase thats falsely labeled as harmless when its actually malicious. For example, large language models like OpenAIs GPT-3 can reveal sensitive, private information when fed certain words and phrases, research has shown.

Meanwhile, model stealing, also called model extraction, involves an adversary probing a black box machine learning system in order to either reconstruct the model or extract the data that it was trained on. This can cause issues when either the training data or the model itself is sensitive and confidential. For example, model stealing could be used to extract a proprietary stock-trading model, which the adversary could then use for their own financial gain.

Plenty of examples of adversarial attacks have been documented to date. One showed its possible to 3D-print a toy turtle with a texture that causes Googles object detection AI to classify it as a rifle, regardless of the angle from which the turtle is photographed. In another attack, a machine-tweaked image of a dog was shown to look like a cat to both computers and humans. So-called adversarial patterns on glasses or clothing have been designed to deceive facial recognition systems and license plate readers. And researchers have created adversarial audio inputs to disguise commands to intelligent assistants in benign-sounding audio.

In apaper published in April, researchers from Google and the University of California at Berkeley demonstrated that even the best forensic classifiers AI systems trained to distinguish between real and synthetic content are susceptible to adversarial attacks. Its a troubling, if not necessarily new, development for organizations attempting to productize fake media detectors, particularly considering the meteoric riseindeepfakecontent online.

One of the most infamous recent examples is Microsofts Tay, a Twitter chatbot programmed to learn to participate in conversation through interactions with other users. While Microsofts intention was that Tay would engage in casual and playful conversation, internet trolls noticed the system had insufficient filters and began feeding Tay profane and offensive tweets. The more these users engaged, the more offensive Tays tweets became, forcing Microsoft to shut the bot down just 16 hours after its launch.

As VentureBeat contributor Ben Dickson notes, recent years have seen a surge in the amount of research on adversarial attacks. In 2014, there were zero papers on adversarial machine learning submitted to the preprint server Arxiv.org, while in 2020, around 1,100 papers on adversarial examples and attacks were. Adversarial attacks and defense methods have also become a highlight of prominent conferences including NeurIPS, ICLR, DEF CON, Black Hat, and Usenix.

With the rise in interest in adversarial attacks and techniques to combat them, startups like Resistant AI are coming to the fore with products that ostensibly harden algorithms against adversaries. Beyond these new commercial solutions, emerging research holds promise for enterprises looking to invest in defenses against adversarial attacks.

One way to test machine learning models for robustness is with whats called a trojan attack, which involves modifying a model to respond to input triggers that cause it to infer an incorrect response. In an attempt to make these tests more repeatable and scalable, researchers at Johns Hopkins University developed a framework dubbed TrojAI, a set of tools that generate triggered data sets and associated models with trojans. They say that itll enable researchers to understand the effects of various data set configurations on the generated trojaned models and help to comprehensively test new trojan detection methods to harden models.

The Johns Hopkins team is far from the only one tackling the challenge of adversarial attacks in machine learning. In February, Google researchers released apaper describing a framework that either detects attacks or pressures the attackers to produce images that resemble the target class of images. Baidu, Microsoft, IBM, and Salesforce offer toolboxes Advbox, Counterfit, Adversarial Robustness Toolbox, and Robustness Gym for generating adversarial examples that can fool models in frameworks like MxNet, Keras, Facebooks PyTorch and Caffe2, Googles TensorFlow, and Baidus PaddlePaddle. And MITs Computer Science and Artificial Intelligence Laboratory recently released a tool called TextFoolerthat generates adversarial text to strengthen natural language models.

More recently, Microsoft, the nonprofit Mitre Corporation, and 11 organizations including IBM, Nvidia, Airbus, and Bosch releasedtheAdversarial ML Threat Matrix, an industry-focused open framework designed to help security analysts to detect, respond to, and remediate threats against machine learning systems. Microsoft says it worked with Mitre to build a schema that organizes the approaches malicious actors employ in subverting machine learning models, bolstering monitoring strategies around organizations mission-critical systems.

The future might bring outside-the-box approaches, including several inspired by neuroscience. For example, researchers at MIT and MIT-IBM Watson AI Lab have found that directly mapping the features of the mammalian visual cortex onto deep neural networks creates AI systems that are more robust to adversarial attacks. While adversarial AI is likely to become a never-ending arms race, these sorts of solutions instill hope that attackers wont always have the upper hand and that biological intelligence still has a lot of untapped potential.

Visit link:
Adversarial attacks in machine learning: What they are and how to stop them - VentureBeat