TIMES, TIME, AND HALF A TIME. A HISTORY OF THE NEW MILLENNIUM.

Comments on a cultural reality between past and future.

This blog describes Metatime in the Posthuman experience, drawn from Sir Isaac Newton's secret work on the future end of times, a tract in which he described Histories of Things to Come. His hidden papers on the occult were auctioned to two private buyers in 1936 at Sotheby's, but were not available for public research until the 1990s.



Saturday, September 10, 2016

Predicting the Future: Women and the Anti-Terror Algorithm


On 9 September 2016, the Guardian reported: Cell of French women guided by Isis behind failed Notre Dame attack, indicating that ISIS-supporting female jihadis targeted one of the French cathedrals associated with the feminine heart of Christianity. Image Source: Guardian.

On 16 June 2016, the New York Times reported that a physicist at the University of Miami is developing an algorithm to analyze social media communications in order to predict terrorist attacks:
"After Orlando and San Bernardino and Paris, there is new urgency to understand the signs that can precede acts of terrorism. And with the Islamic State’s prolific use of social media, terrorism experts and government agencies continually search for clues in posts and Twitter messages that appear to promote the militants’ cause.

A physicist may not seem like an obvious person to study such activity. But for months, Neil Johnson, a physicist at the University of Miami, led a team that created a mathematical model to sift order from the chaotic pro-terrorism online universe.

In a study published Thursday in the journal Science, Dr. Johnson and Miami colleagues searched for pro-Islamic State posts each day from mid-2014 until August 2015, mining mentions of beheadings and blood baths in multiple languages on Vkontakte, a Russia-based social media service that is the largest European equivalent to Facebook. Ultimately, they devised an equation that tries to explain the activity of Islamic State sympathizers online and might, they say, eventually help predict attacks that are about to happen."
Johnson describes his research as follows:
"My research looks at the physics of collective behavior and emergent properties in real-world systems which are 'complex': from the physical, biological, medical domains through to social and even financial domains. A complex system is one in which unexpected phenomena emerge spontaneously at the macro-level, through the micro-level interactions of many objects over time. For example, traffic jams arise from the interactions of cars -- but understanding what a single car can do tells us little about the jams that emerge. The same holds true for applications in medicine (cancer tumors), molecular biology (macroscopic chromosone dynamics within E. Coli), neurology (brain function from individual neuron firings) through to economics and sociology (mass downloads of a given YouTube video, or crashes in financial markets). The fascinating feature of Complex Systems is that they all contain many interacting objects, with strong feedback from both inside and outside the system, and are typically far from equilibrium and exhibit extreme behavior."
Dr. Johnson's Website is here and another report on his studies of 200 ISIS online communities is here. He found that women users cemented ISIS online communal terror initiatives, potentially in part because of their strong communications and social abilities, combined with the fact that they are shut out of positions of communal authority in conventional systems of organization:
"We were surprised to find that 40% of followers declared themselves to be female. Women hold an unexpected position in the pro-ISIS networks — they tend to be centres of information-flow between followers, and to increase the lifespan of the communities. They typically do not have similarly prominent roles in comparable networks from the everyday world, such as innovation networks for patents in industry and academia."
See further reports on Johnson's work on chaos and predictability in war (here) and a formula for threats (here):
"Using the lens of complexity science, our research team based at the University of Miami have recently shown that the SAME statistical pattern lies hidden in these nightly casualty figures across a wide range of insurgent conflicts and terrorist campaigns -- from the deserts in Iraq, to the jungles in Colombia, and from the streets of Northern Ireland to the mountains of Afghanistan and Pakistan. The implication is that the WAY in which insurgents and terrorists carry out day-to-day violent attacks is statistically the same everywhere -- irrespective of where they are or why they are doing it. And just as medical diagnostics can help specialists treat new diseases as they arise, so our findings offer new insight into how insurgent and terrorist groups organize themselves and hence how best to disrupt them."
The article on the anti-terror algorithm was published in Science on 17 June 2016, New online ecology of adversarial aggregates: ISIS and beyond (Science 17 Jun 2016: Vol. 352, Issue 6292, pp. 1459-1463 DOI: 10.1126/science.aaf0675).

Thursday, September 8, 2016

Jovian Poles and Auroras


Juno's infrared view of the auroras at the Jovian south pole, not visible from earth (27 August 2016). The  Image Source: NASA/JPL.

NASA has released more data from Juno's mission to Jupiter over the past week, including a heat vision photograph of the southern lights over the maw that is the planet's south pole. Photographs from 27 August 2016 revealed that the north pole features a sea of giant cyclones. NASA also published an audio recording of Jovian polar aurora activity.

Composite photograph of Jupiter's south pole from Cassini mission (11-12 December 2000). Image Source: NASA/JPL/Space Science Institute.

Jovian north pole: "The JunoCam instrument obtained this view on August 27, about two hours before closest approach, when the spacecraft was 120,000 miles (195,000 kilometers) away from the giant planet (i.e., for Jupiter's center). Unlike the equatorial region's familiar structure of belts and zones, the poles are mottled with rotating storms of various sizes, similar to giant versions of terrestrial hurricanes. Jupiter's poles have not been seen from this perspective since the Pioneer 11 spacecraft flew by the planet in 1974." Image Source: NASA/JPL-Caltech/SwRI/MSSS.

Video Source: NASA via Youtube.

Caption for the above video: "Thirteen hours of radio emissions from Jupiter's intense auroras are presented here, both visually and in sound. The data was collected when the spacecraft made its first orbital pass of the gas giant on Aug 27, 2016, with all spacecraft instruments turned on. The frequency range of these signals is from 7 to 140 kilohertz. Radio astronomers call these 'kilometric emissions' because their wavelengths are about a kilometer long."

Tuesday, September 6, 2016

Open Source Code: Cross-Pollination and Consensus



If you want to find people who are truly finding new ways to understand the world - society, the economy, politics, law, governance - in light of technological advances, look to the best thinkers in cryptocurrency circles. On 10 June 2016, Andreas Antonopoulous posted this tweet and video from Milan regarding evolutionary and anthropological similarities to open source code:
"The interest of anthropologists drawing similarities between evolutionary biology and market economies. Cross-pollination/ cross-genetic lines or horizontal transfer of DNA between species vs. the open source environment. Different cryptocurrency developers exchanging code ('DNA blueprints') and adopting it. Bitcoin is rapidly progressing. Concepts of basic income. Identity and reputation works best in small communities. They are difficult to scale without collapsing. We can scale reputation but should we or do we want to? Rigid mechanistic reputation systems don't have the the flexible human capability to forget. Scaling consensus through collaboration. The problem of control by the few."

Video Source: Youtube.