The Outlier Epidemic: Confronting Crime and White Supremacy in America

The greatest insight of western law is that the rights of the individual supersede the rights of the State.

The greatest insight of western law is that the rights of the individual supersede the rights of the State.

The greatest insight of western law is that the oppression of the individual must be fractionated down to the individual, so sovereignty of the individual means the individual has the intrinsic meaning. This meaning transcends the rights of the State, leading to the consequences: innocent until proven guilty.

Intersectionality is a branch of modern sociology that transcends former well systematized theories of Normativity, most notably in psychology. These theories break apart the engine of western thinking that a singular structure ought rule all of social behaviorism. Fluidity of our perspective is a fluidity of our personality which is a personification of our social and political identities.

These are irreconcilably frames of reference for a complex world, although not irreconcilable in their values… more like general relativity and quantum mechanics are to physicists, less like uncle and aunt arguing at Thanksgiving.

So we’re going to solve this with technology.

When Yale asked me to apply to their college in high school, their application required me to fill out five short answer boxes limited to two hundred words.

When Caltech asked me to apply, my entire application had been four essays of free form writing about specific topics, and an optional essay about current events. I had read about Caltech and their Nobel Prizes, and later read at my public library that Caltech made extenuating efforts to provide financial aid, and I knew I had to apply. By the time I applied to Yale, I decided I knew I had wanted to be a physicist, but I wanted to go to Yale because I knew the East Coast power structure had philosophical and political home at Yale. I had developed a clear narrative of why I had wanted to go to Yale, and I searched for a place in their application to pare down my several essays on the topic. I found none.

Do I believe I possess unparalleled genius that the brilliant minds of our world ought to be reading? No, not at all, quite the contrary: I was quite humbled by the process of applications because they suggested to me my ideas might be a value to anyone at all. Instead, I had come to recognize that a complex world requires complex thoughts and my social upbringing required exceptionalism.

So I wrote essays.

The mathematics of anomaly detection are actually quite unremarkable. We learn more than enough in high school to be a decent statistician in the area of surprise and bullshit detection. Big data makes data mining but complicates the mathematics very little. What happens is simply that the number of false detections rise disproportionally to the number of types of data merged into the analysis. So the engineering becomes more sophisticated to reach the same quality, or the number of people who vet the false positives needs to increase, or the number of types of data a team can handle hits a limit.

At the fringe of applicability, the whole system mires into ambiguity. Is that alarm a weak signal of threat or more indicative of an unknown unknown that gives rise to perceived miscalculation? There is no answer; both are exactly true, and equally so. Intersectionality defines that arithmetic of consideration.

The hard part comes when the data know you’re listening: enter Heisenberg.

The rise of surveillance capitalism has addressed a direct need of national security in the response to the intelligence failures of the September 11th attacks on New York City and the Pentagon. Those horrific attacks established a new heterodoxy of American balance of social safety and social liberalism.

Take, for instance, Facebook.

How coincidental is it that Web 2.0 bubbled out of Silicon Valley right at the time that legislative action curtailed USA PATRIOT ACT collection of U.S. citizen metadata? These changes restricted the use of old teleco monopoly law to treat Internet platforms like telephone company providers. Instead of freedom to collect any metadata on U.S. citizens, the legislature curtailed the rapidly expanding national security complex to collect only data “two-hops” from known suspected terrorists and strengthened FBI financial suites of tools. These FBI financial tools starved al Qaeda, and won the war on terror.

This perspective creates a new kaleidoscope of actionable worry for the security of American democracy as we know it. It ultimately leads to the semi-intentional weaponization of the media and the vitriolic politics of this era.

Meme theory establishes that the transmission of thoughts, intentions, beliefs, and predicated preparatory action are always evolving through language, and what I really mean here is the choice of motifs of language.

Visual spacing, evocative language, patterns of recognition, and context within the viral moment of reception are all creative inputs to a machine which takes ideas from one head to another, segmenting and spurring the target audience into groups inside and outside at rapid, evolving sequence.

Think for a moment of the search for discovery of a new motif pattern. As the agent or machine searches through a new meme, comparing to a database of existing and potential memes and patterns, the system needs a mathematical language for articulating that a new meme is a known meme concern or not.

In that moment of search, which is really the whole entirety of the value of the machine, that new meme is both a potential concern and not a concern. In the sequencing of the search, the path through the memes, potential memes are concern both based on the path taken and the determination of other memes.

In many ways this is the work of the many paths hypotheses of Richard Feynman based on the conservation of action applied to quantum electrodynamics. This work established the groundbreaking for his diagram, which unified a fragmented ecosystem of quantum particle physicists around a common language, and set up the successes of renormalization theory.

Were deep learning of today to establish a common framework around which the flow of entropy through models could be evaluated and shared, this would be a Nobel Prize level achievement for the Artificial Intelligence field.

But this article is about Heisenberg.

You send me a meme. The machine reads the meme. The machine encodes the meme in a mathematical language which machines understand to make their inferences, their calculations. This is how machines work.

Now the world operates Artificial Intelligence machines that share a common framework for the flow across the network. The machines are smart enough to reverse engineer the content and intent of the meme.

Were the Internet a Series of Tubes, this would be the sewer grates that lead out to leak into the ocean. The material will always find a way of leaking out.

Heisenberg solves this problem. What Quantum Mechanics does is establish a framework of interpreting probability as a lower level, deterministic behavior. The science of the mathematics established a concept of an observer to force an instance in which the deterministic information flow becomes a probabilistic observation. Somewhere beneath this architecture is a wormhole from mathematical determinism to the events of experimented real world.

Heisenberg understood that the contextual consequences of this mechanism is that interdependent characteristics linked by the time dimension result in a paradox of observation. Because the observer exists in Quantum Mechanics, and observation is a breaking of the translational symmetry of time, the mathematics of interlinked characteristics must become twisted in their respective mathematical spaces. We see this observer mathematics manifest as a sequence of limitations on the resolving capacity of the observer. We see the same emergence of limitations when spinors mathematically represent the combination of quantum mechanics and general relativity.

WE can relate this back to the interlinking of privacy and machine reading.

Working backwards, we can reformulate machine reading an an action in which the action of reconstruction is itself a separate action. By doing that such that the vector mathematics of computational machine learning operate within a Hilbert space, we ought be able to impede reading reconstruction.

In order to do this, machine learning must only have meaningful interpretation when an observation is made, so as to break the symmetry of a latent lower-level, deterministic behavior operating within the network as a representation of the information flow, a wavefunction of representation.

This makes the representation of individual data states within the network a dual representation of all states, much like quantum computers will someday.

What this allows the machine to do is simultaneously track multiple states of the same transference as memes evolve across the network with new inputs.

The future generations will learn much more than we’ll ever know. We owe these future generations the best truth searching instruments and materials. Through this process we will reform and transform our nature of political discussion in an era of veracity exploitation manifesting oppositional politics.

Starlight. Making better satellite analytics possible.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store