Before Auto-Tune, if you wanted to make money in pop music, you sort of had to be able to sing. It wasn’t absolutely necessary, of course. You used to be able to mumble into a microphone, then the producer would put all sorts of sturm und drang all around it, and you could have a hit; see: Don’t You Want Me Baby, by Human League. But crooners have an easier time of it, and have less trouble having more than one bite of the top forty apple.
Crowded House was one of those eighties bands — A Flock of Seagulls; ABC, The Bangles; Thompson Twins; Duran Duran; Escape Club; The Fixx; Simple Minds; Simply Red; Howard Jones; XTC; Dan Hartman; Icehouse; Level 42; Psychedelic Furs; Hair Cut 100; Tears for Fears; Wang Chung; World Party — bands that are growing interchangeable with the decades slipping by. If you put them all on the same bill, and they all wore matching suits, they could all play each other’s tunes and not many people would notice. But you always notice when people sing well.
Sippican Cottage, “Pure Pop For Then People — Crowded House”, Sippican Cottage, 2013-09-17
September 18, 2013
QotD: 80’s pop music
Reason.tv: Detroit’s Operation Compliance
“Someone breaks in, they never show up. Yet still, they want to come and blackball you and close your business,” says Derek Little, owner of an auto shop along Detroit’s Livernois Avenue.
He’s one of many business owners in Detroit who’s faced what he says amounts to harassment from the city’s overzealous code enforcement. Amidst a bankruptcy and a fast-dwindling population and tax base, the city has prioritized the task of ensuring that all businesses are in compliance with its codes and permitting. To accomplish this, Mayor David Bing announced in January that he’d assembled a task force to execute Operation Compliance.
Operation Compliance began with the stated goal of shutting down 20 businesses a week. Since its inception, Operation Compliance has resulted in the closure of 383 small businesses, with another 536 in the “process of compliance,” according to figures provided to Reason TV by city officials.
But business owners say that Operation Compliance unfairly targets small, struggling businesses in poor areas of town and that the city’s maze of regulations is nearly impossible to navigate, with permit fees that are excessive and damaging to businesses running on thin profit margins.
The NSA scandal is not about mere privacy
Last week, Yochai Benkler posted this in the Guardian:
The spate of new NSA disclosures substantially raises the stakes of this debate. We now know that the intelligence establishment systematically undermines oversight by lying to both Congress and the courts. We know that the NSA infiltrates internet standard-setting processes to security protocols that make surveillance harder. We know that the NSA uses persuasion, subterfuge, and legal coercion to distort software and hardware product design by commercial companies.
We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted a systematic campaign against the foundations of American power: constitutional checks and balances, technological leadership, and market entrepreneurship. The NSA scandal is no longer about privacy, or a particular violation of constitutional or legislative obligations. The American body politic is suffering a severe case of auto-immune disease: our defense system is attacking other critical systems of our body.
First, the lying. The National Intelligence University, based in Washington, DC, offers a certificate program called the denial and deception advanced studies program. That’s not a farcical sci-fi dystopia; it’s a real program about countering denial and deception by other countries. The repeated misrepresentations suggest that the intelligence establishment has come to see its civilian bosses as adversaries to be managed through denial and deception.
[…]
Second, the subversion. Last week, we learned that the NSA’s strategy to enhance its surveillance capabilities was to weaken internet security in general. The NSA infiltrated the social-professional standard-setting organizations on which the whole internet relies, from National Institute of Standards and Technology to the Internet Engineering Task Force itself, the very institutional foundation of the internet, to weaken the security standards. Moreover, the NSA combined persuasion and legal coercion to compromise the commercial systems and standards that offer the most basic security systems on which the entire internet runs. The NSA undermined the security of the SSL standard critical to online banking and shopping, VPN products central to secure corporate, research, and healthcare provider networks, and basic email utilities.
Serious people with grave expressions will argue that if we do not ruthlessly expand our intelligence capabilities, we will suffer terrorism and defeat. Whatever minor tweaks may be necessary, the argument goes, the core of the operation is absolutely necessary and people will die if we falter. But the question remains: how much of what we have is really necessary and effective, and how much is bureaucratic bloat resulting in the all-too-familiar dynamics of organizational self-aggrandizement and expansionism?
The “serious people” are appealing to our faith that national security is critical, in order to demand that we accept the particular organization of the Intelligence Church. Demand for blind faith adherence is unacceptable.
Elizabeth Loftus on false memories
The more we discover about the process of memory formation and recall, the more we discover that our memories are more fallible and plastic than we believed. Elizabeth Loftus talks to Alison George about the problem of false memories:
AG: How does this happen? What exactly is going on when we retrieve a memory?
EL: When we remember something, we’re taking bits and pieces of experience — sometimes from different times and places — and bringing it all together to construct what might feel like a recollection but is actually a construction. The process of calling it into conscious awareness can change it, and now you’re storing something that’s different. We all do this, for example, by inadvertently adopting a story we’ve heard — like Romney did.AG: How did you end up studying false memories?
EL: Early in my career, I had done some very theoretical studies of memory, and after that I wanted to [do] work that had more obvious practical uses. The memory of witnesses to crimes and accidents was a natural place to go. In particular I looked at what happens when people are questioned about their experiences. I would ultimately see those questions as a means by which the memories got contaminated.AG: You’re known for debunking the idea of repressed memories. Why focus on them?
EL: In the 1990s we began to see these recovered-memory cases. In the first big one, a man called George Franklin was on trial. His daughter claimed she had witnessed her father kill her best friend when she was 8 years old — but had only remembered this 20 years later. And that she had been raped by him and repressed that memory too. Franklin was convicted of the murder, and that started this repressed-memory ball rolling through the legal system. We began to see hundreds of cases where people were accusing others based on claims of repressed memory. That’s what first got me interested.AG: How did you study the process of creating false memories?
EL: We needed a different paradigm for studying these types of recollections. I developed a method for creating “rich false memories” by using strong suggestion. The first such memory was about getting lost in a shopping mall as a child.AG: How susceptible are people to having these types of memories implanted?
EL: Depending on the study, you might get as many as 50 percent of people falling for the suggestion and developing a complete or partial false memory.
As I’ve mentioned before, the more we learn about memory, the less comfortable I am with the belief that eyewitness testimony in criminal cases is as dependable as our legal system assumes. There are definitely large numbers of people in prison based on eyewitness accounts … some of which are almost certainly false memories (but believed by the witness to be accurate).
AG: Is there any way to distinguish a false memory from a real one?
EL: Without independent corroboration, little can be done to tell a false memory from a true one.AG: Could brain imaging one day be used to do this?
EL: I collaborated on a brain imaging study in 2010, and the overwhelming conclusion we reached is that the neural patterns were very similar for true and false memories. We are a long way away from being able to look at somebody’s brain activity and reliably classify an authentic memory versus one that arose through some other process.AG: Do you think it’s important for people to realize how malleable their memory is?
EL: My work has made me tolerant of memory mistakes by family and friends. You don’t have to call them lies. I think we could be generous and say maybe this is a false memory.