Arquivo da tag: Inteligência

Social origins of intelligence in the brain (Science Daily)

Date: July 29, 2014

Source: University of Illinois at Urbana-Champaign

Summary: By studying the injuries and aptitudes of Vietnam War veterans who suffered penetrating head wounds during the war, scientists are tackling — and beginning to answer — longstanding questions about how the brain works. The researchers found that brain regions that contribute to optimal social functioning also are vital to general intelligence and to emotional intelligence. This finding bolsters the view that general intelligence emerges from the emotional and social context of one’s life.


Brain regions that contribute to optimal social functioning also are vital to general intelligence and to emotional intelligence. Credit: © christingasner / Fotolia

By studying the injuries and aptitudes of Vietnam War veterans who suffered penetrating head wounds during the war, scientists are tackling — and beginning to answer — longstanding questions about how the brain works.

The researchers found that brain regions that contribute to optimal social functioning also are vital to general intelligence and to emotional intelligence. This finding bolsters the view that general intelligence emerges from the emotional and social context of one’s life.

The findings are reported in the journal Brain.

“We are trying to understand the nature of general intelligence and to what extent our intellectual abilities are grounded in social cognitive abilities,” said Aron Barbey, a University of Illinois professor of neuroscience, of psychology, and of speech and hearing science. Barbey (bar-BAY), an affiliate of the Beckman Institute and of the Institute for Genomic Biology at the U. of I., led the new study with an international team of collaborators.

Studies in social psychology indicate that human intellectual functions originate from the social context of everyday life, Barbey said.

“We depend at an early stage of our development on social relationships — those who love us care for us when we would otherwise be helpless,” he said.

Social interdependence continues into adulthood and remains important throughout the lifespan, Barbey said.

“Our friends and family tell us when we could make bad mistakes and sometimes rescue us when we do,” he said. “And so the idea is that the ability to establish social relationships and to navigate the social world is not secondary to a more general cognitive capacity for intellectual function, but that it may be the other way around. Intelligence may originate from the central role of relationships in human life and therefore may be tied to social and emotional capacities.”

The study involved 144 Vietnam veterans injured by shrapnel or bullets that penetrated the skull, damaging distinct brain tissues while leaving neighboring tissues intact. Using CT scans, the scientists painstakingly mapped the affected brain regions of each participant, then pooled the data to build a collective map of the brain.

The researchers used a battery of carefully designed tests to assess participants’ intellectual, emotional and social capabilities. They then looked for patterns that tied damage to specific brain regions to deficits in the participants’ ability to navigate the intellectual, emotional or social realms. Social problem solving in this analysis primarily involved conflict resolution with friends, family and peers at work.

As in their earlier studies of general intelligence and emotional intelligence, the researchers found that regions of the frontal cortex (at the front of the brain), the parietal cortex (further back near the top of the head) and the temporal lobes (on the sides of the head behind the ears) are all implicated in social problem solving. The regions that contributed to social functioning in the parietal and temporal lobes were located only in the brain’s left hemisphere, while both left and right frontal lobes were involved.

The brain networks found to be important to social adeptness were not identical to those that contribute to general intelligence or emotional intelligence, but there was significant overlap, Barbey said.

“The evidence suggests that there’s an integrated information-processing architecture in the brain, that social problem solving depends upon mechanisms that are engaged for general intelligence and emotional intelligence,” he said. “This is consistent with the idea that intelligence depends to a large extent on social and emotional abilities, and we should think about intelligence in an integrated fashion rather than making a clear distinction between cognition and emotion and social processing. This makes sense because our lives are fundamentally social — we direct most of our efforts to understanding others and resolving social conflict. And our study suggests that the architecture of intelligence in the brain may be fundamentally social, too.”

Journal Reference:

  1. A. K. Barbey, R. Colom, E. J. Paul, A. Chau, J. Solomon, J. H. Grafman. Lesion mapping of social problem solving. Brain, 2014; DOI: 10.1093/brain/awu207

The Real War on Reality (New York Time)

THE STONE June 14, 2013, 12:00 pm

By PETER LUDLOW

If there is one thing we can take away from the news of recent weeks it is this: the modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived.

The revelations about the National Security Agency’s PRISM data collection program have raised awareness — and understandably, concern and fears — among American and those abroad, about the reach and power of secret intelligence gatherers operating behind the facades of government and business.

Surveillance and deception are not just fodder for the next “Matrix” movie, but a real sort of epistemic warfare.

But those revelations, captivating as they are, have been partial —they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it.

The realm of secrecy and deception among shadowy yet powerful forces may sound like the province of investigative reporters, thriller novelists and Hollywood moviemakers — and it is — but it is also a matter for philosophers. More accurately, understanding deception and and how it can be exposed has been a principle project of philosophy for the last 2500 years. And it is a place where the work of journalists, philosophers and other truth-seekers can meet.

In one of the most referenced allegories in the Western intellectual tradition, Plato describes a group of individuals shackled inside a cave with a fire behind them. They are able to see only shadows cast upon a wall by the people walking behind them. They mistake shadows for reality. To see things as they truly are, they need to be unshackled and make their way outside the cave. Reporting on the world as it truly is outside the cave is one of the foundational duties of philosophers.

In a more contemporary sense, we should also think of the efforts to operate in total secrecy and engage in the creation of false impressions and realities as a problem area in epistemology — the branch of philosophy concerned with the nature of knowledge. And philosophers interested in optimizing our knowledge should consider such surveillance and deception not just fodder for the next “Matrix” movie, but as real sort of epistemic warfare.


To get some perspective on the manipulative role that private intelligence agencies play in our society, it is worth examining information that has been revealed by some significant hacks in the past few years of previously secret data.

Important insight into the world these companies came from a 2010 hack by a group best known as LulzSec  (at the time the group was called Internet Feds), which targeted the private intelligence firm HBGary Federal.  That hack yielded 75,000 e-mails.  It revealed, for example, that Bank of America approached the Department of Justice over concerns about information that WikiLeaks had about it.  The Department of Justice in turn referred Bank of America to the lobbying firm Hunton and Willliams, which in turn connected the bank with a group of information security firms collectively known as Team Themis.

Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program),  because of Greenwald’s support for WikiLeaks. Specifically, the plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error. As for Greenwald, it was argued that he would cave “if pushed” because he would “choose professional preservation over cause.” That evidently wasn’t the case.

Team Themis also developed a proposal for the Chamber of Commerce to undermine the credibility of one of its critics, a group called Chamber Watch. The proposal called for first creating a “false document, perhaps highlighting periodical financial information,” giving it to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to “prove that U.S. Chamber Watch cannot be trusted with information and/or tell the truth.”

(A photocopy of the proposal can be found here.)

In addition, the group proposed creating a “fake insider persona” to infiltrate Chamber Watch.  They would “create two fake insider personas, using one as leverage to discredit the other while confirming the legitimacy of the second.”

Psyops need not be conducted by nation states; they can be undertaken by anyone with the capabilities and the incentive to conduct them.

The hack also revealed evidence that Team Themis was developing a “persona management” system — a program, developed at the specific request of the United States Air Force, that allowed one user to control multiple online identities (“sock puppets”) for commenting in social media spaces, thus giving the appearance of grass roots support.  The contract was eventually awarded to another private intelligence firm.

This may sound like nothing so much as a “Matrix”-like fantasy, but it is distinctly real, and resembles in some ways the employment of “Psyops” (psychological operations), which as most students of recent American history know, have been part of the nation’s military strategy for decades. The military’s “Unconventional Warfare Training Manual” defines Psyops as “planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.” In other words, it is sometimes more effective to deceive a population into a false reality than it is to impose its will with force or conventional weapons.  Of course this could also apply to one’s own population if you chose to view it as an “enemy” whose “motives, reasoning, and behavior” needed to be controlled.

Psyops need not be conducted by nation states; they can be undertaken by anyone with the capabilities and the incentive to conduct them, and in the case of private intelligence contractors, there are both incentives (billions of dollars in contracts) and capabilities.


Several months after the hack of HBGary, a Chicago area activist and hacker named Jeremy Hammond successfully hacked into another private intelligence firm — Strategic Forcasting Inc., or Stratfor), and released approximately five million e-mails. This hack provided a remarkable insight into how the private security and intelligence companies view themselves vis a vis government security agencies like the C.I.A. In a 2004 e-mail to Stratfor employees, the firm’s founder and chairman George Friedman was downright dismissive of the C.I.A.’s capabilities relative to their own:  “Everyone in Langley [the C.I.A.] knows that we do things they have never been able to do with a small fraction of their resources. They have always asked how we did it. We can now show them and maybe they can learn.”

The Stratfor e-mails provided us just one more narrow glimpse into the world of the private security firms, but the view was frightening.  The leaked e-mails revealed surveillance activities to monitor protestors in Occupy Austin as well as Occupy’s relation to the environmental group Deep Green Resistance.  Staffers discussed how one of their own men went undercover (“U/C”) and inquired about an Occupy Austin General Assembly meeting to gain insight into how the group operates.

Stratfor was also involved inmonitoring activists who were seeking reparations for victims of a chemical plant disaster in Bhopal, India, including a group called Bophal Medical Appeal. But the targets also included The Yes Men, a satirical group that had humiliated Dow Chemical with a fake news conference announcing reparations for the victims.  Stratfor regularly copied several Dow officers on the minutia of activities by the two members of the Yes Men.

One intriguing e-mail revealed that the Coca-Cola company was asking Stratfor for intelligence on PETA (People for the Ethical Treatment of Animals) with Stratfor vice president for Intelligence claiming that “The F.B.I. has a classified investigation on PETA operatives. I’ll see what I can uncover.” From this one could get the impression that the F.B.I. was in effect working as a private detective Stratfor and its corporate clients.

Stratfor also had a broad-ranging public relations campaign.  The e-mails revealed numerous media companies on its payroll. While one motivation for the partnerships was presumably to have sources of intelligence, Stratfor worked hard to have soap boxes from which to project its interests. In one 2007 e-mail, it seemed that Stratfor was close to securing a regular show on NPR: “[the producer] agreed that she wants to not just get George or Stratfor on one time on NPR but help us figure the right way to have a relationship between ‘Morning Edition’ and Stratfor.”

On May 28 Jeremy Hammond pled guilty to the Stratfor hack, noting that even if he could successfully defend himself against the charges he was facing, the Department of Justice promised him that he would face the same charges in eight different districts and he would be shipped to all of them in turn.  He would become a defendant for life.  He had no choice but to plea to a deal in which he may be sentenced to 10 years in prison.  But even as he made the plea he issued a statement, saying “I did this because I believe people have a right to know what governments and corporations are doing behind closed doors. I did what I believe is right.”  (In a video interview conducted by Glenn Greenwald with Edward Snowden in Hong Kong this week, Snowden expressed a similar ethical stance regarding his actions.)

Given the scope and content of what Hammond’s hacks exposed, his supporters agree that what he did was right. In their view, the private intelligence industry is effectively engaged in Psyops against American public., engaging in “planned operations to convey selected information to [us] to influence [our] emotions, motives, objective reasoning and, ultimately, [our] behavior”? Or as the philosopher might put it, they are engaged in epistemic warfare.

The Greek word deployed by Plato in “The Cave” — aletheia — is typically translated as truth, but is more aptly translated as “disclosure” or “uncovering” —   literally, “the state of not being hidden.”   Martin Heidegger, in an essay on the allegory of the cave, suggested that the process of uncovering was actually a precondition for having truth.  It would then follow that the goal of the truth-seeker is to help people in this disclosure — it is to defeat the illusory representations that prevent us from seeing the world the way it is.  There is no propositional truth to be had until this first task is complete.

This is the key to understanding why hackers like Jeremy Hammond are held in such high regard by their supporters.  They aren’t just fellow activists or fellow hackers — they are defending us from epistemic attack.  Their actions help lift the hood that is periodically pulled over our eyes to blind us from the truth.

Peter Ludlow is a professor of philosophy at Northwestern University and is currently co-producing (with Vivien Weisman) a documentary on Hacktivist actions against private intelligence firms and the surveillance state.

NSA Prism program taps in to user data of Apple, Google and others (Guardian)

• Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook
• Companies deny any knowledge of program in operation since 2007
• Obama orders US to draw up overseas target list for cyber-attacks
Glenn Greenwald and Ewen MacAskill
The Guardian, Friday 7 June 2013
Prism

A slide depicting the top-secret PRISM program.

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program calledPrism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Several senior tech executives insisted that they had no knowledge ofPrism or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

An Apple spokesman said it had “never heard” of Prism.

The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.

PrismThe program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.

It also opens the possibility of communications made entirely within the US being collected without warrants.

Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.

The participation of the internet companies in Prism will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.

Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Yourprivacy is our priority” – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.

Collectively, the companies cover the vast majority of online email, search, video and communications networks.

Prism 

The extent and nature of the data collected from each company varies.

Companies are legally obliged to comply with requests for users’ communications under US law, but the Prism program allows the intelligence services direct access to the companies’ servers. The NSAdocument notes the operations have “assistance of communications providers in the US”.

The revelation also supports concerns raised by several US senators during the renewal of the Fisa Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.

When the FAA was first enacted, defenders of the statute argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.

PRISM slide crop
The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.

The Prism program allows the NSA, the world’s largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.

With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.

The presentation claims Prism was introduced to overcome what the NSAregarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a “home-field advantage” due to housing much of the internet’s architecture. But the presentation claimed “Fisa constraints restricted our home-field advantage” because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US.

“Fisa was broken because it provided privacy protections to people who were not entitled to them,” the presentation claimed. “It took a Fisa courtorder to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all.”

The new measures introduced in the FAA redefines “electronic surveillance” to exclude anyone “reasonably believed” to be outside the USA – a technical change which reduces the bar to initiating surveillance.

The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities’ requests.

In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA.

The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming “access is 100% dependent on ISP provisioning”.

In the document, the NSA hails the Prism program as “one of the most valuable, unique and productive accesses for NSA”.

It boasts of what it calls “strong growth” in its use of the Prism program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was “exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype”. There was also a 131% increase in requests for Facebook data, and 63% for Google.

The NSA document indicates that it is planning to add Dropbox as aPRISM provider. The agency also seeks, in its words, to “expand collection services from existing providers”.

The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM program, which occurred just days before the act expired.

Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working.

“The problem is: we here in the Senate and the citizens we represent don’t know how well any of these safeguards actually work,” he said.

“The law doesn’t forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance program violated the law. Why? Those who know can’t say and average Americans can’t know.”

Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program.

When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

When the NSA reviews a communication it believes merits further investigation, it issues what it calls a “report”. According to the NSA, “over 2,000 Prism-based reports” are now issued every month. There were 24,005 in 2012, a 27% increase on the previous year.

In total, more than 77,000 intelligence reports have cited the PRISMprogram.

Jameel Jaffer, director of the ACLU’s Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data.

“It’s shocking enough just that the NSA is asking companies to do this,” he said. “The NSA is part of the military. The military has been granted unprecedented access to civilian communications.

“This is unprecedented militarisation of domestic communications infrastructure. That’s profoundly troubling to anyone who is concerned about that separation.”

A senior administration official said in a statement: “The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any US citizen or of any person located within the United States.

“The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons.

“This program was recently reauthorized by Congress after extensive hearings and debate.

“Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.

“The Government may only use Section 702 to acquire foreign intelligence information, which is specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies across the board, regardless of the nationality of the target.”

Additional reporting by James Ball and Dominic Rushe

Revealed: how the FBI coordinated the crackdown on Occupy (The Guardian)

New documents prove what was once dismissed as paranoid fantasy: totally integrated corporate-state repression of dissent

Naomi Wolf – guardian.co.uk, Saturday 29 December 2012 14.58 GMT

Occupy Oakland clashes

Police used teargas to drive back protesters following an attempt by the Occupy supporters to shut down the city of Oakland. Photograph: Noah Berger/AP

It was more sophisticated than we had imagined: new documents show that the violent crackdown on Occupy last fall – so mystifying at the time – was not just coordinated at the level of the FBI, the Department of Homeland Security, and local police. The crackdown, which involved, as you may recall, violent arrests, group disruption, canister missiles to the skulls of protesters, people held in handcuffs so tight they were injured, people held in bondage till they were forced to wet or soil themselves –was coordinated with the big banks themselves.

The Partnership for Civil Justice Fund, in a groundbreaking scoop that should once more shame major US media outlets (why are nonprofits now some of the only entities in America left breaking major civil liberties news?), filed this request. The document – reproduced here in an easily searchable format – shows a terrifying network of coordinated DHS, FBI, police, regional fusion center, and private-sector activity so completely merged into one another that the monstrous whole is, in fact, one entity: in some cases, bearing a single name, the Domestic Security Alliance Council. And it reveals this merged entity to have one centrally planned, locally executed mission. The documents, in short, show the cops and DHS working for and with banks to target, arrest, and politically disable peaceful American citizens.

The documents, released after long delay in the week between Christmas and New Year, show a nationwide meta-plot unfolding in city after city in an Orwellian world: six American universities are sites where campus police funneled information about students involved with OWS to the FBI, with the administrations’ knowledge (p51); banks sat down with FBI officials to pool information about OWS protesters harvested by private security; plans to crush Occupy events, planned for a month down the road, were made by the FBI – and offered to the representatives of the same organizations that the protests would target; and even threats of the assassination of OWS leaders by sniper fire – by whom? Where? – now remain redacted and undisclosed to those American citizens in danger, contrary to standard FBI practice to inform the person concerned when there is a threat against a political leader (p61).

As Mara Verheyden-Hilliard, executive director of the PCJF, put it, the documents show that from the start, the FBI – though it acknowledgesOccupy movement as being, in fact, a peaceful organization – nonetheless designated OWS repeatedly as a “terrorist threat”:

“FBI documents just obtained by the Partnership for Civil Justice Fund (PCJF) … reveal that from its inception, the FBI treated the Occupy movement as a potential criminal and terrorist threat … The PCJF has obtained heavily redacted documents showing that FBI offices and agents around the country were in high gear conductingsurveillance against the movement even as early as August 2011, a month prior to the establishment of the OWS encampment in Zuccotti Park and other Occupy actions around the country.”

Verheyden-Hilliard points out the close partnering of banks, the New York Stock Exchange and at least one local Federal Reserve with the FBI and DHS, and calls it “police-statism”:

“This production [of documents], which we believe is just the tip of the iceberg, is a window into the nationwide scope of the FBI’s surveillance, monitoring, and reporting on peaceful protestors organizing with the Occupy movement … These documents also show these federal agencies functioning as a de facto intelligence arm of Wall Street and Corporate America.”

The documents show stunning range: in Denver, Colorado, that branch of the FBI and a “Bank Fraud Working Group” met in November 2011 – during the Occupy protests – to surveil the group. The Federal Reserve of Richmond, Virginia had its own private security surveilling Occupy Tampa and Tampa Veterans for Peace and passing privately-collected information on activists back to the Richmond FBI, which, in turn, categorized OWS activities under its “domestic terrorism” unit. The Anchorage, Alaska “terrorism task force” was watching Occupy Anchorage. The Jackson, Mississippi “joint terrorism task force” was issuing a “counterterrorism preparedness alert” about the ill-organized grandmas and college sophomores in Occupy there. Also in Jackson, Mississippi, the FBI and the “Bank Security Group” – multiple private banks – met to discuss the reaction to “National Bad Bank Sit-in Day” (the response was violent, as you may recall). The Virginia FBI sent that state’s Occupy members’ details to the Virginia terrorism fusion center. The Memphis FBI tracked OWS under its “joint terrorism task force” aegis, too. And so on, for over 100 pages.

Jason Leopold, at Truthout.org, who has sought similar documents for more than a year, reported that the FBI falsely asserted in response to his own FOIA requests that no documents related to its infiltration ofOccupy Wall Street existed at all. But the release may be strategic: if you are an Occupy activist and see how your information is being sent to terrorism task forces and fusion centers, not to mention the “longterm plans” of some redacted group to shoot you, this document is quite the deterrent.

There is a new twist: the merger of the private sector, DHS and the FBI means that any of us can become WikiLeaks, a point that Julian Assange was trying to make in explaining the argument behind his recent book. The fusion of the tracking of money and the suppression of dissent means that a huge area of vulnerability in civil society – people’s income streams and financial records – is now firmly in the hands of the banks, which are, in turn, now in the business of tracking your dissent.

Remember that only 10% of the money donated to WikiLeaks can be processed – because of financial sector and DHS-sponsored targeting of PayPal data. With this merger, that crushing of one’s personal or business financial freedom can happen to any of us. How messy, criminalizing and prosecuting dissent. How simple, by contrast, just to label an entity a “terrorist organization” and choke off, disrupt or indict its sources of financing.

Why the huge push for counterterrorism “fusion centers”, the DHS militarizing of police departments, and so on? It was never really about “the terrorists”. It was not even about civil unrest. It was always about this moment, when vast crimes might be uncovered by citizens – it was always, that is to say, meant to be about you.

• This article originally referred to a joint terrorism task force in Jackson, Michigan. This was amended to Jackson, Mississippi at 4pm ET on 2 January 2012

Human intelligence ‘peaked thousands of years ago and we’ve been on an intellectual and emotional decline ever since’ (The Independent)

STEVE CONNOR, MONDAY 12 NOVEMBER 2012

Richard Gardner/Rex Features

Is the human species doomed to intellectual decline? Will our intelligence ebb away in centuries to come leaving our descendants incapable of using the technology their ancestors invented? In short: will Homo be left without his sapiens?

This is the controversial hypothesis of a leading geneticist who believes that the immense capacity of the human brain to learn new tricks is under attack from an array of genetic mutations that have accumulated since people started living in cities a few thousand years ago.

Professor Gerald Crabtree, who heads a genetics laboratory at Stanford University in California, has put forward the iconoclastic idea that rather than getting cleverer, human intelligence peaked several thousand years ago and from then on there has been a slow decline in our intellectual and emotional abilities.

Although we are now surrounded by the technological and medical benefits of a scientific revolution, these have masked an underlying decline in brain power which is set to continue into the future leading to the ultimate dumbing-down of the human species, Professor Crabtree said.

His argument is based on the fact that for more than 99 per cent of human evolutionary history, we have lived as hunter-gatherer communities surviving on our wits, leading to big-brained humans. Since the invention of agriculture and cities, however, natural selection on our intellect has effective stopped and mutations have accumulated in the critical “intelligence” genes.

“I would wager that if an average citizen from Athens of 1000BC were to appear suddenly among us, he or she would be among the brightest and most intellectually alive of our colleagues and companions, with a good memory, a broad range of ideas and a clear-sighted view of important issues,” Professor Crabtree says in a provocative paper published in the journal Trends in Genetics.

“Furthermore, I would guess that he or she would be among the most emotionally stable of our friends and colleagues. I would also make this wager for the ancient inhabitants of Africa, Asia, India or the Americas, of perhaps 2,000 to 6,000 years ago,” Professor Crabtree says.

“The basis for my wager comes from new developments in genetics, anthropology, and neurobiology that make a clear prediction that our intellectual and emotional abilities are genetically surprisingly fragile,” he says.

A comparison of the genomes of parents and children has revealed that on average there are between 25 and 65 new mutations occurring in the DNA of each generation. Professor Crabtree says that this analysis predicts about 5,000 new mutations in the past 120 generations, which covers a span of about 3,000 years.

Some of these mutations, he suggests, will occur within the 2,000 to 5,000 genes that are involved in human intellectual ability, for instance by building and mapping the billions of nerve cells of the brain or producing the dozens of chemical neurotransmitters that control the junctions between these brain cells.

Life as a hunter-gatherer was probably more intellectually demanding than widely supposed, he says. “A hunter-gatherer who did not correctly conceive a solution to providing food or shelter probably died, along with his or her progeny, whereas a modern Wall Street executive that made a similar conceptual mistake would receive a substantial bonus and be a more attractive mate,” Professor Crabtree says.

However, other scientists remain sceptical. “At first sight this is a classic case of Arts Faculty science. Never mind the hypothesis, give me the data, and there aren’t any,” said Professor Steve Jones, a geneticist at University College London.

“I could just as well argue that mutations have reduced our aggression, our depression and our penis length but no journal would publish that. Why do they publish this?” Professor Jones said.

“I am an advocate of Gradgrind science – facts, facts and more facts; but we need ideas too, and this is an ideas paper although I have no idea how the idea could be tested,” he said.

THE DESCENT OF MAN

Hunter-gatherer man

The human brain and its immense capacity for knowledge evolved during this long period of prehistory when we battled against the elements

Athenian man

The invention of agriculture less than 10,000 years ago and the subsequent rise of cities such as Athens relaxed the intensive natural selection of our “intelligence genes”.

Couch-potato man

As genetic mutations increase over future generations, are we doomed to watching  soap-opera repeats without knowing how to use the TV remote control?

iPad man

The fruits of science and technology enabled humans to rise above the constraints of nature and cushioned our fragile intellect from genetic mutations.

Brain Imaging Can Predict How Intelligent You Are: ‘Global Brain Connectivity’ Explains 10 Percent of Variance in Individual Intelligence (Science Daily)

ScienceDaily (Aug. 1, 2012) — When it comes to intelligence, what factors distinguish the brains of exceptionally smart humans from those of average humans?

New research suggests as much as 10 percent of individual variances in human intelligence can be predicted based on the strength of neural connections between the lateral prefrontal cortex and other regions of the brain. (Credit: WUSTL Image / Michael Cole)

As science has long suspected, overall brain size matters somewhat, accounting for about 6.7 percent of individual variation in intelligence. More recent research has pinpointed the brain’s lateral prefrontal cortex, a region just behind the temple, as a critical hub for high-level mental processing, with activity levels there predicting another 5 percent of variation in individual intelligence.

Now, new research from Washington University in St. Louis suggests that another 10 percent of individual differences in intelligence can be explained by the strength of neural pathways connecting the left lateral prefrontal cortex to the rest of the brain.

Published in the Journal of Neuroscience, the findings establish “global brain connectivity” as a new approach for understanding human intelligence.

“Our research shows that connectivity with a particular part of the prefrontal cortex can predict how intelligent someone is,” suggests lead author Michael W. Cole, PhD, a postdoctoral research fellow in cognitive neuroscience at Washington University.

The study is the first to provide compelling evidence that neural connections between the lateral prefrontal cortex and the rest of the brain make a unique and powerful contribution to the cognitive processing underlying human intelligence, says Cole, whose research focuses on discovering the cognitive and neural mechanisms that make human behavior uniquely flexible and intelligent.

“This study suggests that part of what it means to be intelligent is having a lateral prefrontal cortex that does its job well; and part of what that means is that it can effectively communicate with the rest of the brain,” says study co-author Todd Braver, PhD, professor of psychology in Arts & Sciences and of neuroscience and radiology in the School of Medicine. Braver is a co-director of the Cognitive Control and Psychopathology Lab at Washington University, in which the research was conducted.

One possible explanation of the findings, the research team suggests, is that the lateral prefrontal region is a “flexible hub” that uses its extensive brain-wide connectivity to monitor and influence other brain regions in a goal-directed manner.

“There is evidence that the lateral prefrontal cortex is the brain region that ‘remembers’ (maintains) the goals and instructions that help you keep doing what is needed when you’re working on a task,” Cole says. “So it makes sense that having this region communicating effectively with other regions (the ‘perceivers’ and ‘doers’ of the brain) would help you to accomplish tasks intelligently.”

While other regions of the brain make their own special contribution to cognitive processing, it is the lateral prefrontal cortex that helps coordinate these processes and maintain focus on the task at hand, in much the same way that the conductor of a symphony monitors and tweaks the real-time performance of an orchestra.

“We’re suggesting that the lateral prefrontal cortex functions like a feedback control system that is used often in engineering, that it helps implement cognitive control (which supports fluid intelligence), and that it doesn’t do this alone,” Cole says.

The findings are based on an analysis of functional magnetic resonance brain images captured as study participants rested passively and also when they were engaged in a series of mentally challenging tasks associated with fluid intelligence, such as indicating whether a currently displayed image was the same as one displayed three images ago.

Previous findings relating lateral prefrontal cortex activity to challenging task performance were supported. Connectivity was then assessed while participants rested, and their performance on additional tests of fluid intelligence and cognitive control collected outside the brain scanner was associated with the estimated connectivity.

Results indicate that levels of global brain connectivity with a part of the left lateral prefrontal cortex serve as a strong predictor of both fluid intelligence and cognitive control abilities.

Although much remains to be learned about how these neural connections contribute to fluid intelligence, new models of brain function suggested by this research could have important implications for the future understanding — and perhaps augmentation — of human intelligence.

The findings also may offer new avenues for understanding how breakdowns in global brain connectivity contribute to the profound cognitive control deficits seen in schizophrenia and other mental illnesses, Cole suggests.

Other co-authors include Tal Yarkoni, PhD, a postdoctoral fellow in the Department of Psychology and Neuroscience at the University of Colorado at Boulder; Grega Repovs, PhD, professor of psychology at the University of Ljubljana, Slovenia; and Alan Anticevic, an associate research scientist in psychiatry at Yale University School of Medicine.

Funding from the National Institute of Mental Health supported the study (National Institutes of Health grants MH66088, NR012081, MH66078, MH66078-06A1W1, and 1K99MH096801).