Why do people go to America

Why do people go to America? Moving involves tremendous emotional, financial and physical expenditure. It is a very different and unique culture full of surprises, your savings will vanish in the expensive dollar economy, and you will have to adjust to a car driven, credit history driven existence.

Why move to America?

The answer lies in the small notion of American dream-

  1. Freedom of speech
  2. Freedom of worship
  3. Freedom from want
  4. Freedom from fear

I can criticize, mock , insult  the American president when in America- a freedom I am denied in most other countries on the planet

I can worship anyone and anything, openly, loudly and not be afraid.

I can get a good living even as a blue collar worker and have unlimited opportunities to start y own business or startup with atmost ease.

But above all,

I am free from fear when I am in America. The FBI needs a warrant and the CIA wont hurt me. That is not true of other countries.

Yet with threats of deportation, there is no more freedom from fear.  Even to children. Hate crimes against minorities is an unprecedented high (by American standards) and even the press is now mocked (reversing traditional American politics or even  politics in other democracies). The Putinization of America is on  way and all we do is twiddle on Twitter.

So why move for the American dream?

As someone said, to dream the American dream, you first need to go to sleep.

Amen

No Hacker is a Bandit

When bankers in suits can lose billions, and be bailed out by tax payer money and pay themselves and each other millions- why should the common man , the middle class be left out of the gravy train that economic productivity created by digital revolutions.

A hacker is a highly skilled person, why should he be exploited for visas, billing rates, sub contracting but have no recourse in normal outdated legal processes

If spies can hack ala Stuxnet and get golden medals

If companies can hack and be rewarded by IPOs

Why cant humans hack and be rewarded for it

Hackers and malware creators are highly talented individuals who have been failed with the system, one in which corporations and governments collude for deliberate vulnerabilities on unsuspecting tax paying software buying people

No Linux user is complaining of a virus if you noticed. But you cant sue people for defective software. Yet!

A Healthy Routine for Hackers and Tech Workers

  • Meet people for dinner
  • Sleep
  • Do until

 

Heuristics and Occam’s razor for Counter Terrorism

When overworked analysts use shortcuts to search huge noisy dirty databases, they create trails which can be mined for actual heuristics

Heuristics –

A heuristic technique (/hjᵿˈrɪstk/; Ancient Greek: εὑρίσκω, “find” or “discover”), often called simply a heuristic, is any approach to problem solving, learning, or discovery that employs a practical method not guaranteed to be optimal or perfect, but sufficient for the immediate goals. Where finding an optimal solution is impossible or impractical, heuristic methods can be used to speed up the process of finding a satisfactory solution

 

 

Example- A Police chief in Chicago may adopt different heuristics than in New York than in New Orleans for allocating human resources

Solution- Make a database of heuristics as actually in practice for that particular domain

Additional Solution- Search Companies to partner not just in giving data but also training and in some case search algorithms for database analysis and database design reviews of Homeland Security

Occam’s Razor-

Occam’s razor (also written as Ockham’s razor, and lex parsimoniae in Latin, which means law of parsimony) is a problem-solving principle attributed to William of Ockham (c. 1287–1347), who was an English Franciscan friar, scholastic philosopher and theologian. The principle can be interpreted as stating Among competing hypotheses, the one with the fewest assumptions should be selected.

https://en.wikipedia.org/wiki/Occam%27s_razor

https://en.wikipedia.org/wiki/Heuristic

Related – How to amplify noise in social media using other algorithms

https://decisionstats.com/2010/01/19/a-noisy-algorithm/

https://decisionstats.com/2015/04/14/random-thoughts-on-cryptography/

https://decisionstats.com/2013/12/14/play-color-cipher-and-visual-cryptography/

 

https://decisionstats.com/2010/11/25/increasing-views-to-youtube-videos/

http://www.cs.cornell.edu/~shmat/shmat_oak09.pdf

De-anonymizing Social Networks
Arvind Narayanan and Vitaly Shmatikov
The University of Texas at Austin
Abstract
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers,
and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social- network graphs. To demonstrate its effectiveness on real-
world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate.