Thursday, August 4, 2011

Pentagon will pay you to be an 'Internet meme tracker'

AntiSec via Examinera

By Helen A.S. Popkin

It's been three days since the potentially iconic image of alleged LulzSec leader "Topiary" — 18-year-old Jake Davis of the Shetland Islands — hit the news. Yet the Internet continues to suffer a dearth of image macros that this kid's face and sunglasses scream for!a

Know Your Meme's Don Caldwell pointed me toward an anemic area on the Memes Research Forum in which one commentor suggested: " 'Deal with it' is written all over his sunglasses … It’s glorious." But at the time of this post, hardly any work's been done beyond a few generated by the "Free Topiary" community.  (C'mon, Interwebs! If that was Keanu Reeves, you'd be all over it!)a

Rather than suspecting the crowd-sourced creativity that brought us LOLCats and Princess Beatrice's big dumb Cuthulu hat on pretty much everything, I choose to suspect it's the government stopping the meme flow. The ongoing international LulzSec and Anonymous-related arrests reveal the the government is obviously hanging out in cyberspace. Further, the Pentagon is offering $42 million in funding to researchers to help develop its Social Media in Strategic Communications program, the New York Times reports:a

As social media play increasingly large roles in fomenting unrest in countries like Egypt and Iran, the military wants systems to be able to detect and track the spread of ideas both quickly and on a broad scale. The Defense Advanced Research Projects Agency is soliciting innovative proposals to help build what would be, at its most basic level, an Internet meme tracker.a

DARPA, y'all! That's the agency that invents new technology for the military. DARPA also gets most of the credit for inventing the Internet, so you'd think they'd have this Internet culture-thing covered, but no. As the document circulating among potential researchers points out:a

Recent research has shown that traditional approaches to understanding social media through static network connectivity models often produce misleading results. It is, therefore, necessary to take into account the dynamics of behavior and SMISC is interested in a wide variety of techniques for doing so.a

The Internet — it's a tricky place. And it's increasingly trickier to figure out who's doing the tricking.a

via The New York Timesa

Related stories:a

US was chief target of cyber attacks: McAfee Cthulhu hat a bold choice for royal wedding Keanu Reeves is sad; Don Draper is sadder Hackers for hire: Criminals offer services online LulzSec spokesperson in custody, say UK police UK spies hack al-Qaida, replace bomb info with cupcake recipes

Artikel yang Berkaitan

0 komentar:

Post a Comment