Hologram Love

“My Holo Love” is really good; this show is everything I was talking about, in my last post: augmented reality, Google glass/smart glasses, driverless cars, smart homes and the Internet of things.

Holograms marry advancements in AI, since the widespread use of digital personal assistants, like Siri and Alexa, with augmented reality, already in some video game systems, phones and virtual reality headsets. 

The show is about a hologram digital personal assistant, that works through a smart glasses, that passed the Turing Test, developed by Alan Turing, in 1950. Turing helped break the German Enigma code, during WWII.

This hologram AI can also drive digitally-enhanced cars, operate smart homes and telephone land lines, and smart TVs. However, it’s not hard to see an evil version of this AI being hacked to become some kind of Skynet, HAL 9000 or Eagle Eye, that can use the power grid, power lines and the Internet of things against unsuspecting people.

Also, the AI, in the TV show, isn’t a perfect AI. It’s so human-like because it’s based on its still living creator, who lives in a lab, underscoring that there are still many things robots and AI can’t do. Other AI cultural touchstones referenced: Chobits and of course, the Spike Jonze film “Her.”

Here is what is available now – not in the near future – now: the technology to mine a nation’s cellphone network has been around for at least two decades.

In the early days of cell phone networks, agencies, such as the FBI and the NSA, perfected surveillance and data-gathering practices, that are still in use today, to police protests and track down criminals.

A historical tipping point was the growth of cell phone networks, in the early 2000s. The market for cell phones was mushrooming, at an exponential rate. Back then planes were developed that could log into cell phone towers, while still in the air. Every cell phone, in the midst of a call, could be scanned, and singular calls could be separated out, with accurate locations, attached to them.

An individual could carry a sensor, that could be encoded, to detect only a certain cell phone number – even if the cell phone was off. Someone could secretly power-on a phone that had already been turned off, by its owner – and then use the cell phone’s microphone, to broadcast everything and anything, in its range.

A single person can re-image several computer drives, at one time; with a fresh battery and SIM card, it is possible to clone cell phones – even without the original phone – and employ them as dummy clients, that can send and receive text messages, like the real cell phone owner.

Individuals, with pocket-sized SIM-card readers, can “borrow” a target’s phone, pull off the battery cover and copy the phone’s SIM card. The original SIM card goes back in the user’s phone – without the owner being any the wiser – while the tech-savvy operative now has the information to create dummy copies of that phone, in multiple burner phones.

As is also well-known now, cell phone calls and text messages can be monitored, for any flag-worthy information. Even back in 2003, multiple signals could be intercepted simultaneously, even as the calls and the messages were being sent out.

A group, organized enough to conduct cyber ops, can turn a national cell phone network into a gold mine of open-source intelligence. Managing the fire hose of information can be handled by gathering metadata – who, when, how long, where – on every phone call. A nifty keystroke recognition software can also secretly hack, and control a computer’s webcam or a cellphone’s camera(s), to conduct a positive-ID, of the target and his or her surrounding environment.

Cyber-defense can also be employed, to protect one’s own cell phone information, from also being siphoned off and hacked. Cordless phones can be converted into makeshift walkie-talkies – or a kit can be easily bought to build walkie-talkies, from scratch.

Other counter-measures: stop using cell phones, sometimes, to stop the data, from the phone, from being collected and used. Despite cell phone network growth, opponents can’t link a cell phone, to someone not even using a cell phone.

Internet cafes or PC rooms were – and still are – incredibly popular – but they are also mass dumping grounds for user information. Sent emails, stored on external servers, can easily be read by unfriendly eyes. Even if multiple people log in, with the same email username and password, and leave draft emails for each other – emails that are never sent, after they have yielded any useful information – an opposing force can create a warning, or a notification, whenever the same username and password is used, to log into an email account, in several locations, at the same time, or within a few hours, of each other.

Once the usernames and passwords, for target accounts, are known, an opponent can even go to an internet cafe, and upload spyware to computers, that ping every time certain usernames and passwords are used, in conjunction with one another.

Another element to avoid: opposing force operatives posing as electronics shop employees, peddling bugged cell phones and computers. Tracking down a cell phone. triangulating a phone call – pulled from real-time cell phone traffic – all of this is available and possible today, to be acquired, with ease, at a relatively low cost.

However, I want to stress that I am not a fatalist or an alarmist. I think wallowing in doomsday despair is like giving up. 

There are seriously people today who believe the earth is flat, or that the moon landing was faked. The answer is not to go back, and hide in the past, or stick our heads in the sand.

I love and appreciate science, technology and medicine. There is no such thing as magic; magic, miracles and coincidences are simply science that one hasn’t understood yet.

Plus, taking the world back to the Middle Ages or the Stone Ages wouldn’t change anything. Technology and science would simply go underground, and become inaccessible to the masses again, which wouldn’t be good for humanity. Science would go back to being state secrets, coded as “magic” or “alchemy.”

Technology and science are like the devious – and righteous – nature of the human condition: it’s been around forever, and it’s here to stay, whether we like it or not. We cannot escape ourselves. The answer isn’t fear, but learning to manage these elements of our daily lives.

References
Naylor, Sean. Relentless Strike: The Secret History of Joint Special Operations Command – St. Martin’s Griffin – 2016.

Surface Effects

avatar 9

Of all the characters in “2001: A Space Odyssey,” the most memorable is the pensive, hyper-focused, if only a bit mournful, Bowman (given the music that plays when the crew is introduced, the Gayne Balley Suite, while he is running and drawing pictures of his comatose crew-mates in hibernation). He is like a cross between Faust and Beethoven, which is very Western, according to Oswald Spengler. Both Bowman and the Gayne Ballet Adagio capture the feeling of the Jupiter Mission: a kind of sorrow and ennui for what has gone before and a deep desire and a yearning for what comes next.

As in other Kubrick films, the music sets the tone – the sense of gravity. Equally important are the audible obscura, the periods where there is no music at all. As noted above, the Gayne Ballet Suite provides a sense of sadness and longing to Bowman and his crew.

  • ‘The Blue Danube’ gives a sense of whimsy and airy lightness, a sense of a familiar commercial place, on the flight and on the space station
  • ‘Also sprach Zarathustra’ gives a sense of victory, strength and power, as felt when the ape finally learns how to use the bone as a weapon
  • ‘Requiem for a Soprano’ provides the sense of dread and visceral wonder when the monolith appears
  • The silence in which only the hiss of oxygen and the rhythm of breathing can be heard when Bowman goes out in the pod gives a sense of sterility and underscores the indifference of the universe to the deaths of Poole and the other astronauts at the hands of HAL.

The silence also makes the sequence tense and gives it a subtle unspoken feeling of foreboding and a heightened sense of helplessness when HAL attacks. There’s nothing Bowman can do but watch as Poole futilely thrashes around in space, struggling to put his breathing tube back in his tank. Silence reigns as the hiss of life-giving oxygen is suddenly cut, in a combination of the two first major sins in the Bible: the sin of pride, and envy – in the Garden of Eden and Cain murdering Abel. Silence again, as Poole’s body, a tiny yellow-suited speck, floats away in space.

Later, we only hear the rush of air in the space ship and the life system monitors beeping plaintively as the three people in hibernation are silently murdered, and then simply the rush of air, as life functions cease, and finally, only the hiss of oxygen and Bowman’s breathing is heard again, as HAL is shut down. One truly gets the sense of being totally alone in space: the first human voice, other than Bowman’s, heard after Bowman’s ordeal, is a recording. Ground control was so dependent on HAL that there was no counter-contingency for communications being shut down.

A nice visual element, that will become more important when Bowman enters the Star Gate, is the glare: how light reflects off faces (especially when a Bowman, deep in concentration, is going to collect Poole’s body) and off the outside of helmets. Most space films (like ‘Gravity,’ ‘Prometheus,’ etc.) edit out the glare or don’t use it in any capacity to convey information or any aesthetic qualities, in of themselves.

This visual detail is valuable and has an added effect: a light-show plays across Bowman’s unchanging face to reflect the graveness of the matter as he tries to retrieve Poole and faces down against HAL. Yet another totally different light-show plays across Bowman’s helmet and expressions of fear as he goes through the Star Gate. When Bowman is squaring off against HAL, the light on his face isn’t on accident, but serves to highlight the hardness of his features and give him a more threatening look, as tension mounts and he becomes angrier at the magnitude of what HAL has done.

So much acting is done with just the face, without saying a word. It is a film of subtleties – much better than the heavy-handed approach usually found in most sci-fi films. This is important, since the viewer spends most of the main part of the film staring back into Bowman’s eyes. The play of light is needed to make sure there is variation in the shot and to highlight Bowman’s face during scenes of heightened tension or to draw attention to changes in his expression and his emotion.

While letting go of Poole and confronting HAL he goes through a range of emotions: shock, determination, sadness, resignation, being at peace and so on. Kubrick pays attention to each detail of the light, how it’s angled and how it falls, to create strange new juxtapositions and images that are lasting and stay with the viewer, because they are unique and will never be seen anywhere else, despite said lighting coming from ordinary sources, like computer screens.

dsdff