Wednesday, June 1, 2011


Keystone XL
"Deception Machine. Did I ever try to claim a copyright?"

"Why would you want to?"

"Good point."

False equivalence can be a subtle tactic. Combined with Too Much Information (TMI), remarkably obfuscatory. As a fuzzy pattern, easily machine replicated and distributed.

"Though more complex, the soup can be programmed to recognize this type of pattern. Google tools already provide a friendly user interface. One presumes API's are available once algorithms are emperically composed."

"Now you are too abstract. Why do you make things so complex? I am a simple person with simple goals.", she gestured as if to kick him.

"She said in a convincing manipulator's voice ...", he rocked back as if struck.

The 'manufacturability' signature, such as repetition of strings of text, provides the foundation for traceback protocols. Secrecy is lower order privacy than hiding while misleading. A misleading mode of 'fake' conversation that helps provide cover.

One countermeasure is to test depth on a critical mass of synthetic conversations. Thereby revealing the astro-turfing automation. Share the results through cloud entities that are smart enough to provide free tools (for instance, Google).

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN

© 2011 Buzz Hill

No comments:

Post a Comment