Transcripts For CSPAN2 We Are Data 20170813 : vimarsana.com

Transcripts For CSPAN2 We Are Data 20170813

And they can be purchased downstairs he will sign the following the event if we run out of copies there is a place they can sign never even order a book for you. So find me if you could not get a book also sees bin is here this evening please silence your cellphone also there are some pamphlets and fires in the back and if you take out your phone into the picture of me, please dont a yellow box will appear we were worried about the batteries die in. Dying. [laughter] [inaudible conversations] the way that we use these technologies but john cheneylippold points out we are data we are what computers do nazi they compute cutting through marketing speak as a reassuring reminder to say it is being performed the same goes for a banner ad for those jackets but based on the Search History those keywords this seems more pernicious and evasive as a condition of what we prefer to think does not shape that life after all you may laugh in a way that human complexity to say it isnt claiming that we are day negative but rather contemporary numbers this is what you call a measurable type of with those prophecies that are creating them aisle were kidnapped contemporary life for gender race and class or hoping not to overgeneralizes the way that they do want to strip down those facsimiles without not even a flaw in their design in the do so on their terms end to paraphrase another threat to be extrapolated the united the progressive very regressive future in within this framework he can work with bin scholarship with the interactions within the world that is increasingly shaping the government john cheneylippold is a professor the university of michigan please help me to welcome him. [applause] i am very happy a2 we here with friends and family so hopefully we can talk about this in the coming future. The book is called we are data and he did a very good job to explain it is not that it is us individually i do not look at my hands to see once a and zeros but we are data comes from one single pieces that you are not wholly in thank you are in terms of data but there is a centesis of the terms of the data are not the terms of our reality. Talk about sexuality and race we think of these things a sister met asymmetrically ourselves with that is the way we negotiated with the government doesnt try to put you to those legal procedures it is just trying to find to effectively understand the targeting mechanisms from nsa for jsoc is a what they fake israel but what is useful for them so one way to see this example is through the idea of gender and marketing so i ask my clients that mall negative class is the students so what gender does google think i am . They seriously go through google preferences and find out the idea may be google this is a coup you are is who you are. It is funny as the 65 role of women but it is not necessarily an accurate because it says i like to view the and fitness i have no idea how that was developed. [laughter] but to save those connections they are trying to make in terms of a pattern of behavior theyre just trying to find commercially they dont want to know what exist or how to underperformance is in a very real way but either the fits or doesnt. So instead i argue this is the entirely new age or race or class or sexuality. Not based on a normal agenda from the discourse of surrounding there is another company that tries to show things like College Graduate attributes then produces one says a male or a College Graduate. This information is useful to identify in the of misidentification or zhuzhou benedettis rather they are used for extraordinarily powerful the tracks metrics and analytics itself under states and those demographics to access content. For example, i use a web site from my graduate years since losses angeles it was fun and wonderful but because of what we would do is look at the break down those coming to the site and then determine what type of stories that we werent right imagine a bunch of white people or hispanics you say we could deduct the resources to identify them in general or to say in the website we try to do both but to say i as a 65 yearold woman would be participating in a day woman that they are written writing stories for i would read three passages because i realize doing all these interviews i have such as stock way to talk about it but i do better in the book. So i will read three things and a short video to bring you to a sense how this impacts of how they work. That the utilization of everything how they proclaim controller for the use of the system but as long as it is granted at the pleasure of google there is simply no consistency or accountability. So it normalizes the inconsistency at every step. With the terms of an for rationed it is not to replace the understanding of ourselves or a cyborg rather explore how they put layers upon additional layers on that identification that all the rhythmic ideas is of a process that goes through the database and with the bases in the future with the dynamic interpretation that they technology to that discourse and that is the colonel of the of arithmetic identity. And with that statistics but here we you counter that political sphere with vocabulary needed into the purpose of phrase to think politically is to attach politics to what is the noble we cannot think about those genders the same way or the algorithm neck brace and the same way with those categories gold distributions. In this way i talk about gender and class and identity battle so more than just the of big three so here i introduced the idea of the algorithm make society that cannot for me in the of prism there is a very fascinating little thing that says anybody in the nsa can be watched. So what does that mean . Either you are or you were not. According to a passport or documentation or they try too often dicky yourself. This becomes problematic when deciding who deserves the right to privacy. The added say question that has the body or a user or the Social Security number. Online readjusted the ip address. So they try to create a new index for citizenship to make the dragnet completely legal. So one you k artist as this one app it looks at what sites you visitor coming from and within the parlance of the nisei like a citizen. So the information that they use to evaluate is not citizenship metrics but very weird racist assumptions. If you speak english with you speak to another you are more likely to be foreign. If you are in the United States but if it drags from outside you are for in. View are encrypting it or if not youre supposed to be a citizen otherwise you could be. That it is a suggestion of quality that you could be the operative flour as well. This is the way the and the say determine citizenship and also now i will read again. The founder of 0k key bed quickly assessing with the power of dave the to have new forms of research. Today said the microchip can understand that he is a sentence to tell the story to the computer we kill people based on metadata. It is rare you are from where you send a text message. That identifies with the type and date or the device that you use. To sell with those Fiber Optic Networks that it is spoken wage would not wanted to speak so the former chief hayden alerts us to how did metadata could be spoken for as is that could be against a preexisting pattern and if if its within the signature of the template at the end of a predator draw on strike that requires no target or groups of men who have certain signatures of the characteristic with terrorist activity that with this in mind we could be more specific with the war of terror during the rest. With the Drought Program the strikes were targeted with individuals and their voice or of their name then judge road operator with launched them down but it in 2008 with the frustrations with the military state u. S. Loosened the guidelines now is adjusted to u. S. Claims the also the database. Sova to publicly differentiate one of the consequences was the frequency of day it drove attack. To attack and during those seven years between 2009 and 2015. The loosening of the goal restrictions was a pre identified signature behavior. Says 2008 the government has launched precision drove attacks with the dead that looks as if the target that they wanted to kill but forcibly that was not the same. So to propose with the true strike that should but never will remind americans it was of distant lands. That unintentional targeting of a Wedding Party were they congregate outside the city center as if it was a terrorist meeting with those geographic areas even on u. S. Kill list to be identified as if they were precarious sense of life this operation lysing of terrorist with that process of metadata of louis r. And then to be tethered together without attention to are of historical particulars such logic like that signature strike with those back stories does not deal with the desire for motivation and is conjured up by one of those virtues the abandonment in favor of world the detail. We are strategically fictionalized with the philosophy as if the purpose of the world of ideas is not the betrayal but provide with an instant to find more easily in this world. So to have the power to tell the stories for us. In this story as described putting out more of the knowledge more than anytime in existence putting Human Knowledge out there in the world inundated to capture the of rigid more worldly detail through that big data perspective with those quantities paring it down as the logical next up of course, with that, and plays acceptance that a terrorist is declared to be a terrorist. Most likely speak arabic and most will practice is long. That what they describe as baggage that encounters from the media scholar of that terrorist monster. Saw one that does not make that subject in regina of his own drone program. So the other monstrosity experience the conditions here one mans terrorist is another mans is reinforced this is always in terms favorable so with as it allocation one whose parity is justified looking that targeted presently it just needs to be a data signature as the anonymous u. S. Official said you dont necessarily need to know his name or have his dossier but in what they have been engaged. But that status of target rather than me being in depth with that logarithmic data is a strategic convenience. It is a program to the logic of the nsa. It is the uncertain the vernacular the creator of the of software the problem is some problems with the engineers. Because the future them into problems the nsa has incredible capacity and referring to those small patterns of correlation that expand beyond conventional college. Said to face that concept is also must include the algorithm the cousin. So now i want to think about something from my research. I am always taken pride that piece of the culture that isnt intended to be used for purposes, can i show you the recurring doctrine . To let people know but it is a very interesting cents so we will watch the video and then have questions. Inside vessel there is a code that represents not what we are, but who we might become. It is our potential. Twentyfive years ago based on the ideas that technology was the key to unlocking the power of human potential. Fueled by the latest software and to break down barriers. So what can i be . We have inspired them to pursue their dreams. How far can i go . We give them the tools to express their ideas. How do i compete . So what is the next big thing . We enable them to fulfill their vision the better we do our job the greater the achievement we inspire to move forward with the unexpected opportunities mitt is the worlds greatest challenge trivias those achievements of us all microsoft. I love this so much because it is so utopian or 90s. [laughter] but i use of video and the beginning and the conclusion to think about this. We are metadata this configuration is best described the what a jury of the graph. Whether it actualizes through technology but more appropriately to be there by the rhetoric. That code represents not just us but they celebrate the world and that goes handinhand with but but that seems like the one that stays late at the office with a partnership. The yet that voiceover copy is more substantial so then the world changes. With those ideas and how it is organized. With the knowledge of how that is defined or connected of course, we dont have to use microsoft products to of the shower potential but they will critique the role that technology has to determine who might become. And then to play second fiddle with citizenship celebrity they become the author of who we are and it classifies us it did those classifications carry immense weight. And racine in gender mean. It needs the central argument but then to say i am john without full comprehension. In this is the political astilbe of 84. How much the present controls the past. Everything that comes before so what happens we dont control the present . With that film about facebook when the human being becomes the set of data everything shrinks. It with that transcendent experience of those desires or fears should be careful what we wish for but on facebook there not more free bet more owed to because were made of data where researchers have free conceptualize that idea with a new feature to make that more decorum into our lives to evaluate the photos are status updates what facebook thinks is inappropriate content so to be considered in the coming the should be posted publicly but that it would no appropriate and inappropriate is the same idea that tsa is a terrorist they dont all these are constructed from these inconsistencies but despite that it is powerful facebook if ever implemented one of more that behavior than any other. They could unlock your potential but not in the way microsoft wants you to believe. But to be hard coded into your system trust me you dont but with one brief look will show that terrifying competence what these algorithms to for the office. Regimen a world and this is the precise problem that we encounter. Sure Public Policies are losing funding but google has the ability to make a celebrity is facebook defines that as an appropriate. So for me, that is my presentation so i invite you to ask me any question is related to the book. [applause] our sherbrooke structured . I start with day idea of how they get the identities of a terrorist then i move on and to produce a relationship of control with that gender theory how those that we do not think of over a our behavior to connect all the rhythmic ideas so what is privacy and what does that mean . I have never ben asked that. I wonder in the terrorists example you can talk about the nature and how that differentiates between human judgment as you said a couple of times to identify a pterosaur a drone strike might be different. And i think one of the things that was the differentiator was the types of mistakes computers are making in one of the things i tried to distinguish with some reasonable certainty first is the algorithm that i decided with this possible from ability. This is a fantastic question. We have seen these drones strikes before then in terms of the of a rhythmic terrorist so his views on the ground communication i see them through the window but its creepy and that as say western operator fed data that they use in particular often is that space of metadata no proof that it is all connected to a person that is why a lot of wedding parties 25 people are outside the city center that looks like a terrorist meeting so because of that there is a cellphone they are targeting that put its weight to which they phone the idea they have a model for terrorism so in terms of that there will be errors but that senator strike is because if you want to see a terrorist you will see them anywhere you will be much more likely is it now looks suspicious. But i imagine those accidentally kyles our different. Very good point and also those that are killed in civilian attacks were a lot more humiliated but in the joint attacks it is entirely unconnected after the taliban realized that they would meet every week to put the sin cards in the bed then reallocate to disrupt a the pattern so imagine if you picked the card from falling then they want chanter killed. So ive had some friends pass away recently have the memorial of those who have died so what is your take on that so how you interpret that person is a memory or a death . Is also a deeply philosophical. I think facebook sway to identify these events is the problem what to do with this culture is no longer eat fiber into useful followed by those events and according to the aesthetics and the structure that you might want to commemorate of mine with the ability to monitor or manufacture a profile that increases the score with other people and how they determine people are on facebook together so it is that commercialization useful for facebook so because of that everything is saved. Other questions . Going back to drown said his Decision Making 35 years ago in a world of where people withheld information and interpreted a view as gender something very similar is a Human Network of what has been embodied in Silicon Valley . That is excellent financial use gossip to understand that relationship may not be immediate because of normal function if the cop says hey you then you recognize yourself mended it is hailing you as a person so somebody sees you across the street if well understand Something Like gender and race the big things i would find that is different is the social world that there is day dialogue of the social construct like george to stand the yelling this is not just society there are rules. But that construction of gender and race but on the converse Something Like this there is proprietary in heavy entirely a commercial category with the social contract of race. If you talk back to tears on the model that would make it available. Is that a good dancer . A answer . Do you think that construction of the employment of data, which of the use of the algorithms is to remove a the subjective factor but also to be replaced so we will engineer the solution . And the second question is more lighthearted but i am sure you have seen the movie can you comment . With the state power is compelling holiday reconfigured but day militant was if they bomb people even if they were not affiliated with the terrorist groups they were seem to be militants because of a georgia under that allows us to avoid those questions i think there is a lot of ways those strong pilots are forced to distance themselves the way theyre on play station or joysticks. But in terms set you dont know what you see. I am from i would they have a lot of drone pilots that workfare. But other rhythmically but there is existing legal stuff a foreigner dressed like a terrorist but they have not find of as targeted to treated as the same thing. To increasingly use those data driven patterns especially n. Yemen but then there is no

© 2025 Vimarsana