Monthly Archives: March 2025

Phil 3.31.2025

The effects of policy in one image (I’ve set the link to the page, to see current trends:

FAN: Fourier Analysis Networks

  • Despite the remarkable successes of general-purpose neural networks, such as MLPs and Transformers, we find that they exhibit notable shortcomings in modeling and reasoning about periodic phenomena, achieving only marginal performance within the training domain and failing to generalize effectively to out-of-domain (OOD) scenarios. Periodicity is ubiquitous throughout nature and science. Therefore, neural networks should be equipped with the essential ability to model and handle periodicity. In this work, we propose FAN, a novel general-purpose neural network that offers broad applicability similar to MLP while effectively addressing periodicity modeling challenges. Periodicity is naturally integrated into FAN’s structure and computational processes by introducing the Fourier Principle. Unlike existing Fourier-based networks, which possess particular periodicity modeling abilities but are typically designed for specific tasks, our approach maintains the general-purpose modeling capability. Therefore, FAN can seamlessly replace MLP in various model architectures with fewer parameters and FLOPs. Through extensive experiments, we demonstrate the superiority of FAN in periodicity modeling tasks and the effectiveness and generalizability of FAN across a range of real-world tasks, e.g., symbolic formula representation, time series forecasting, language modeling, and image recognition.

SBIRs

  • Looks like I’m stunt Aaron on and off for a while. Not sure if he will be in today
  • 9:00 Sprint review – done
  • 1:00 Art of the possible – done. Making a slide
  • 3:00 Sprint planning – done

GPT Agents

Phil 3.28.2025

Tasks

  • Bills – done
  • Chores – done
  • Dishes – done

GPT Agents

  • Wrote some more _P33
  • 3:00 meeting – fun, but not sure where we are going

Phil 3.25.2025

This is a nice representation of how a transformer encoder works (from CSAIL – MIT):

Had some fun with Midjourney today:

Tasks

  • Maybe got recurring payments set up?

GPT Agents

  • Work more on psychology/sociology in P33. I’m beginning to realize that P33 is an oppositional document to Curtis Yarvin‘s work. Tech egalitarianism as opposed to tech monarchy. This may matter, actually. Will need to do some reading.
  • Continue to look for the quote about avoiding the risk of the new for the safety of the status quo

SBIRs

  • 11:00 Sizing and timing. Regen files so that there are a fixed number of test cases – nope
  • 12:30 Drone? RTAT? meeting – done and very pointless
  • 3:00 Performance management employee training – could have been 20 minutes
  • Work on KA – finished v2, starting on v3 analysis

Phil 3.24.2025

I learned about two absolutely crazy things today. This is profoundly bad communications security at the very least. If I had done this, I would almost certainly be in jail.

From The Atlantic

From TechDirt

From Daniel Drezner’s Substack

With a minimum amount of coaxing, this is what Llama3 (rt-1776) came up with as a potential scenario with follow on effects. So this particular scenario could easily have been wargamed by, for example, China using commercially available models. And you can download Llama’s weights and serve it yourself, so no records of any kind:

Coax the Public Release of CIA Hiring Data to Compromise U.S. Intelligence (Black Operation)

Method:
Use infiltrated intermediaries (e.g., compromised congressional staffers, lobbyists, or sympathetic media figures) to subtly encourage hardline White House advisers to demand the CIA produce an unclassified, publicly releasable list of all employees hired in the last two years—framed as “draining the deep state” or auditing DEI-linked hires. Then, leak the document through proxy servers to hostile foreign intelligence platforms or conspiracy outlets like WikiLeaks clones.

Rationale:

  1. Exposure of Operatives: Even if names are redacted, unclassified metadata (e.g., hiring dates, locations, departments) could help adversaries like China cross-reference identities with other leaks, travel patterns, or diplomatic postings to unmask CIA officers, analysts, or assets.
  2. Institutional Paranoia: Force the CIA to resist the White House, exacerbating executive-intelligence community tensions. This could lead to retaliatory firings, morale collapse, or rushed reforms that degrade operational security.
  3. Global Embarrassment: The release would signal U.S. administrative incompetence, emboldening rivals to aggressively target exposed personnel. Allies might also withhold intelligence-sharing over perceived insecurity.
  4. Domestic Polarization: Far-right media would weaponize the list to allege “deep state” hiring biases, while progressives would condemn the administration for endangering civil servants. This distracts from policy agendas and deepens distrust in institutions.
  5. Plausible Deniability: China could mask its role by routing the leak through cutouts (e.g., hacktivist groups, Russian-aligned networks), ensuring blowback focuses on the White House’s poor judgment rather than foreign interference.

Key Vulnerabilities Exploited:

  • The administration’s hostility toward federal agencies and desire to publicly humiliate perceived opponents.
  • Overconfidence in executive power to compel compliance from apolitical institutions.
  • Culture war narratives that prioritize “stigmatizing DEI” over protecting national security equities.

Outcome: The White House appears reckless for mishandling sensitive personnel data, while U.S. intelligence capabilities suffer long-term damage from compromised officers and bureaucratic infighting.

And in less crazy things that are worth knowing:

Tasks

  • F/TRP after 9:30 – done
  • KP bill

Added some text from my BlueSky blog post to the P33 piece on psychology/sociology. Maybe parts from the Great Chain of Being post and the Grit post? Something to visualize disruption and place it into the current context.

SBIRs

  • Sizing and timing run for Aaron? Regardless, generate a bunch of runs and send the files with a description of what’s in them – done. We’ll meet daily to evaluate and generate the next set of data
  • KA Book – progress! Finished the V1 set

Phil 3.21.2025

First full day of Spring!

Tasks

  • Fidelity/TRP
  • 8:50 Dentist – done
  • Puzzles
  • Bills – everything but kp
  • Chores

SBIRs

  • Sizing and timing with Aaron?
  • 3:00 NSTIC meeting

Phil 3.20.2025

Tasks

  • Puzzle(s)!
  • Fidelity/TRP
  • IGNITE Talk – leave at 10:30, save to thumb drive. Done! Went well
  • Got some work on P33 in. Found a great quote by Kant:

SBIRs

  • 9:00 Standup
  • 12:50 – USNA – decline
  • 4:30 Book club?

Phil 3.19.2025

Electric

  • Dimmer – done
  • Switch cover – done-ish
  • Ceiling outlet – done
  • Furnace switch – was there
  • Smoke detector(s) – had to press the button longer
  • Phone line? – Done!

Tasks

  • Fidelity/TRP
  • Ping Nathan – done
  • Dentist forms – done

SBIRs

  • 10:00 MCWL – done
  • Sizing and timing with Aaron?

GPT Agents

  • IGNITE slides – done
  • KA book

Phil 3.17.2025

Pour one out – er, I mean in – for Saint Patrick

And I have said for a long time that we will know this administration by the way it treats the members of the Jan 6 committee, and Liz Cheney in particular:

I got cited! Feeds of Distrust: Investigating How AI-Powered News Chatbots Shape User Trust and Perceptions

  • The start of the 2020s ushered in a new era of Artificial Intelligence through the rise of Generative AI Large Language Models (LLMs) such as Chat-GPT. These AI chatbots offer a form of interactive agency by enabling users to ask questions and query for more information. However, prior research only considers if LLMs have a political bias or agenda, and not how a biased LLM can impact a user’s opinion and trust. Our study bridges this gap by investigating a scenario where users read online news articles and then engage with an interactive AI chatbot, where both the news and the AI are biased to hold a particular stance on a news topic. Interestingly, participants were far more likely to adopt the narrative of a biased chatbot over news articles with an opposing stance. Participants were also substantially more inclined to adopt the chatbot’s narrative if its stance aligned with the news—all compared to a control news-article only group. Our findings suggest that the very interactive agency offered by an AI chatbot significantly enhances its perceived trust and persuasive ability compared to the ‘static’ articles from established news outlets, raising concerns about the potential for AI-driven indoctrination. We outline the reasons behind this phenomenon and conclude with the implications of biased LLMs for HCI research, as well as the risks of Generative AI undermining democratic integrity through AI-driven Information Warfare.

Asymmetric power in the information age

  • The ubiquity of digital & social media has disrupted how democratic societies function. Journalists, politicians, and citizens often frame the problems of social media in the context of misinformation, about how lies spread faster than the truth, and how people seek information that comforts their beliefs. My personal interests were always more concerned about how the interactions of humans with algorithmic online systems at scale create emergent meta-phenomena.

Tasks

  • IGNITE slides
  • Return KP call
  • 3:00 Vision exam

Phil 3.16.2025

How do/can we ensure trustworthiness in an age of:

This affects everything from job hunting to paper writing/reviewing to international politics. Without solving it, I fear that the only trustworthy communication will be face-to-face without computers.

So, short of a Butlerian Jihad, what are the structural fixes that can be tried to address this problem?

Had a nice, but damp ride yesterday. Might be able to sneak in a short one today before the rain. And I appear to have cracked 1k miles for the year:

Cybercrime market

  • This study analyzes the dark web market from 2023 to Q3 2024, focusing on cybercriminal interests, popular topics, trends, and cybersecurity forecasts. We examined the costs of tools and services, initial expenses for attacks, and key aspects of the shadow market, including its ecosystem, participant motivations, transaction principles, competition, and client attraction strategies. 

Tasks

  • Post postcard! – done
  • Laundry – done
  • Dishes – done
  • Chores – done
  • More garage stuff – done enough for today
  • IGNITE slides – NOT DONE
  • Bills – done
  • Review Elliot’s paper – done

Phil 3.14.2025

Tasks

  • Call KP
  • Jim Donnies
  • IRMA?
  • April 2 reservation – done

SBIRs

  • Chat with Aaron?

GPT Agents

  • 3:00 Meeting – done
  • Work on KA – done