1/1/18: 2018 – LIVING FROM DATA DAY

2018

LIVING FROM DATA DAY

MONOLOGUE WRITTEN BY CLYDE LEWIS

As with any New Year, the first day for me is a work day. I ponder for weeks what I want to do for a show on the first day of the New Year and I always want that first day to set the pace for what is in store for us.

Nobody can predict the future with complete accuracy, but one can spot trends, connect the dots and figure out where we are heading for the next 365 days.

While the mainstream was busy toiling with dead leads in the Trump Russia collusion conspiracy, the National Security Agency split from Cyber Command – a very important move and one that I was watching closely.

The move I felt was indicative of some radical changes that we would see happen in 2018. It appears that the elevation of Cyber Command and its split from the NSA will open up a new form of warfare where combatants are not seen but their actions are felt in the markets, at the ATM and with the new trend in crypto currencies.

In 2018, cyber intelligence and data collecting will have to be more sophisticated and you can expect the NSA to intensify its focus on developing access for intelligence, and Cyber Command to prepare to rapidly deploy massive cyber effects at a more complex scale during military operations and shut down the enemy.

This will have to be accomplished next-generation Artificial Intelligence which is most definitely going to be used to give intelligence operatives the upper- hand in just about everything having to do with data collecting on anything that even appears to be criminal activity.

Ultimately, as with discussion of establishing a Space Force as a formal branch of the US military in 2017, these moves center on broadly expanding the size and ambition of what were in the past very limited parts of The Pentagon’s massive worldwide operations, threatening to grow them to unfathomable size and threatening a panopticon that will always be aware of anyone’s digital footprint.

It will also lead to the release of weaponized Artificial Intelligence, which will be able to deliver its blow slowly, stealthily and virtually without a trace.

These mechanisms, once released, are not controlled. Instead, they operate independently of direction, meaning that Advanced Artificial Intelligence can and will be deployed in enemy territory and will also be implemented during law enforcement activity — be ready for Robo Cops that have already been deployed for security will also be on patrol with human counterparts.

They won’t look like Arnold Schwarzenegger – at least not in 2018, but handheld Siri equivalents will be there to run all sorts of checks on suspects and persons of interest.

It will be more of an algorithmic presence that will uses Artificial Intelligence to learn about their environments and blend in with the daily commotion of network activity. If simple spy bots sustain their presence, they grow stronger in their inside knowledge of the network and its users, and they build up control over data and entire systems.

PHOTO CREDIT: TIM DE GROOT

Spy bots can also attack us by impersonating people they may even impersonate you. We already have AI assistants that do our scheduling, email on our behalf and ask us what we’d like to order for lunch—they turn on lights, they play music, but we know now that they listen to everything we say, store it in a cloud somewhere and can be extracted for all sorts of intelligence purposes.

When weaponized AI is sophisticated enough to convincingly impersonate a real person, then it will be hard to trust anything you get in an e-mail or even a tweet.

A stealthy, long-term AI presence on your network will have ample time to learn what your writing style is and how this differs depending on who you email, your contact base and the distinctions in professional and personal relationships based on the language you use and key themes in your conversations.

It can also monitor your e-mail habits, like if you e-mail a friend or a loved one like three times a day around the same time, it can pick up on that and use it against you.

Malicious A.I. will be a new threat, and we will have to relinquish a few liberties we have on the internet as Cyber Command will have to jump in and trace the harassment.

It will be very hard for anyone to escape the technology trends as new innovations will be tested in various areas and people will have to learn to adapt.

In 2016, Amazon announced a new kind of store, one in which, there are no cashiers, no clerks, no lines, and virtually no employees. Instead, technology would operate the store. Now, Wal-Mart, in competition with Amazon, is attempting something similar.

Previously Wal-Mart created a new subsidiary after purchasing Jet.com called Code Eight. The primary objective of the new subsidiary is to recreate the shopping experience.

One angle of the goal is to target busy city moms with the intention of sending them product recommendations and allowing them to make purchases through text messaging. The second angle of their goal, dubbed Project Kepler, is to recreate the in-store shopping experience by replacing employees with computer vision.

According to a tech site called Recode: “Code Eight plans to eventually charge a membership fee, but current testers are using it for free. The personal-shopping service is currently focused on items in “health & beauty, household essentials, and apparel/accessories” categories, according to a job listing.

It’s not clear if the startup is sourcing this inventory from Wal-Mart and its subsidiaries, or from outside retailers.”

Similar to Amazon Go, Wal-Mart is planning to replace cashiers, clerks, checkouts, and more with technology. Project Kepler, over time, could lead to hundreds of thousands of jobs being replaced by technology.

As with Amazon Go, Wal-Mart is planning to utilize computer vision, sensors, cameras, barcodes, and so on to create such an experience — this sends up some red flags as yet another store will require a number or maybe even a chip in order to buy sell or trade on the Wal-Mart Network.

At first, Amazon and Wal-Mart will utilize mobile applications to recreate the shopping experience; however, that is just the start of it.

A Wisconsin based company called 32M (Three Square Market) was the first company to implement microchip readers into break room markets, starting the ‘next phase’ of implementation.

Break Room marketing for 2018 is defined as marketing where small kiosks in workplaces and other places. If you want to order something or buy something, all you have to do is walk in, make a selection, swipe a club card, credit card, or just use your hand and biometrically the purchase will be placed and later delivered to a specified address.

PHOTO CREDIT: SAM BURRISS

According to Three Square Market Chief Executive Officer Todd Westby, the company has technology that allows people to purchase snack items from vending machines straight from their cell phones already, but now Westby wants to expand that to implantable microchips.

Last year, over fifty employees of the Wisconsin-based company all volunteered to have a microchip implanted under their skin just to purchase snacks.

Now, how many people will jump at the chance to be chipped to buy things on Amazon or at Wal-Mart? The incentive to be chipped would be discounts on items, much like what is offered with a Costco card or a Safeway card.

With this much demand in quick purchases, cell phone networks will most certainly have to be beefed up in order for simple purchases to be had over smart phone networks and wireless services.

There will be no escape from any and all electronic noise and fog from wireless operations.

Mount Rainier in Washington State and other national parks are weighing plans to expand cellular coverage in once remote areas. First responders support the plans, as do some park officials, who argue that better cell coverage will help attract a new generation of visitors. Critics fear it will lead to more noisy distractions in places designed to be an escape from the modern world.

Verizon, AT&T and other telecom companies are aggressively courting the most popular national parks, and under the federal Telecommunications Act of 1996, the parks are obligated to at least review proposals for new cellular towers.

Yet, because the National Park Service is highly decentralized, NPS headquarters does not track construction of cellular towers in parks nationwide, nor has it developed a national policy to guide parks superintendents in reviewing such proposals.

All this to attract younger campers and visitors?

Do we really want our national parks to have loud cell phones going off when we want to commune with nature?

Over the last decade, PEER (Public employees for Environmental Responsibility) has emerged as the fiercest opponent of telecom expansion in Yosemite, Yellowstone and other national parks. The nonprofit group is led by lawyer Jeff Ruch, who keeps a close eye on the special use permits the national parks issues for new services and concessions.

Under National Park Service guidelines, such “special uses” are encouraged if they enhance park resources or improve public safety. But such uses should be rejected, the NPS says, if they “unreasonably disrupt the atmosphere of peace and tranquility of wilderness.

If this catches on you can be sure and see various installations of what are called “monofir” cell towers.

These cell phone towers disguised as Ponderosa pine or Douglas fir trees are popping up all over the country.

Meanwhile, human resource and search experts estimate a 50-60% higher demand for AI and robotics professionals in 2018 even as machines take over repetitive manual work.

There is such a need for talent that top business schools, are now to include AI and machine learning in their curriculum – there are also courses being offered in internet law and various courses in intelligence ops with degrees in understanding and working with advanced Artificial Intelligence.

There will also be opportunities in population identification and numbering projects that are underway.

According to ID2020.org, “1.1 billion people live without an officially recognized identity. This lack of recognized identification deprives them of protection, access to services, and basic rights. Id2020 is a public-private partnership dedicated to solving the challenges of identity for these people through technology.”

How noble is it for a company to now find a reason to number and file over a billion people and why do we think they will stop there?

The “ID2020 Alliance” has the most comprehensive surveillance database probably to date and it will be implemented on a GLOBAL scale.

There are critics that are saying that the ID2020 Alliance has been set up primarily to number and identify human beings that have not been vaccinated. There is also a rumor that the Identification Alliance is a trial run for what Christians call the system of the beast where people will be tracked, identified, and will have to use biometric identification to work and to get enough food to feed their families.

Frankly, if you read their website it appears that this is yet another techno identification programmed aimed at tagging potential culling victims.

ID2020 says that this identity system is a part of the solution to delivering basic human services to people.

The ID2020 Alliance says that it is a global partnership working to address the lack of recognized identity by more than a billion people around the world, in accordance with Target 16.9 of the Sustainable Development Goals of Summit 2030.

According to their site, new technologies, including blockchain, when used in conjunction with long-proven technologies, such as biometrics, now make it possible for all people to have access to a safe, verifiable, and persistent form of technology.

So, it is a system where biometrics will be used to monitor people for vaccine use and how it affects them, and since we are looking at Sustainable Development goals, we can bet these vaccines will be used to cull individuals so that the U.N. can meet their goals of depopulation by 2030.

PHOTO CREDIT: ANGELO ESSLINGER

During all of the end of year retrospectives, the mainstream media reminded us that 2017 was an incredible year in tech; how Apple introduced two generations of iPhone in one year, and how quickly initial coin offers (ICOs) and crypto currencies like Bitcoin have surged.

The media reports these things as fads but they are realities whose rate of return will grow exponentially – it will be like a runaway freight train but this time, the train will be smart enough to run away.

The crazy train running off the rails will be pushed by 5th generation technology or 5G.

5G will be tested in 2018 and will serve everyone by 2022.

There are at least 25 mobile operators testing what they define as 5G, with speeds in some cases reaching 36Gbps.

Crucially, 5G is the generation of mobile that will make all kinds of things possible, from autonomous vehicles to smart cities.

Elon Musk has warned that the power of the world could end up in the hands of just a handful of companies with advanced AI systems. He said these companies need to be careful not to create something dangerous.

The thing is, most predictions point to 2025 as the time when AI matches the human brain’s processing ability, but what if it also turns out to be something that matches humanity’s worst instincts?

Cyber command is banking on it – companies that want to chip the population act as though they have never read a page from the biblical apocalypse and what has been said to be the Mark of the Beast.

2018 could be the year that people listen, and some kind of human-robotic rights convention can be agreed upon to prepare the world for a time when humans and machines will have to coexist harmoniously.

SHARE

RELATED CONTENT

9/21/18: I WAS A TEENAGE SATAN W/ JAY DYER 9/20/18: VULCAN – ANSWERS IN THE GALACTIC BACKYARD W/ RICHARD C. HOAGLAND 9/19/18: DICK MOVE 9/18/18: THE APOCALYPSE STRAIN – THE END WE BEGIN FROM 9/17/18: PARAH ADUMAH – THE ADVENT OF THE APOCALYPSE COW W/ PAUL BEGLEY AND GERSHON WINKLER 9/13/18: HAMMER & SMACC – WEAPONIZING NATURE’S FURY W/ CHRISTOPHER FONTENOT
Comments