Meet The “Bionic Barrista” Whose Mission Is To Terminate Millions Of Minimum Wage Jobs

Tyler Durden

Tired of your barista giving you attitude, spitting in your coffee if you only mention Trump, or misspelling your name on your morning cup of joe? Surely a robot could do better. Well, we are about to find out, because on Monday, Cafe X opened its very first robotic cafe in San Francisco’s Metreon shopping center Digital Trends reports. Promising “precision crafted specialty coffee in seconds, the way the roaster intended,” Cafe X thinks that anything a human can do, its machines can do better. Or rather just one machine.

Nicknamed Gordon, after a Cafe X employee, this robot mans, or robots, two standard professional coffee machines in order to serve up espressos and lattes. In the San Francisco location, customers can grab a cup of coffee with beans from AKA Coffee, Verve Coffee Roasters, or Peet’s. While the coffee itself may not make Cafe X stand out from the competition, the startup hopes that the robot’s efficiency and utility will.

And it surely will, because while its name may be Gordon, its title is the “bionic barrista” and its primary mission is to terminate millions of minimum wage jobs around the globe, boosting the bottom line for major coffee chains everywhere, whose growth has plateaued and who are desperate to cut on overhead costs. Already the average Cafe X coffee costs more than 10%, or 40 cents less than a similar drink at Starbucks. With greater scale the price will only drop.

While offering clear savings for the business, there will be some tradeoffs – introducing automation and robotics into food service will reduce costs and increase efficiency at the expense of customization and a “human touch.” Some companies – and clients – may prefer a personal experience to an efficient one, or a customized product. The company behind Gordon, however, disagrees: “There’s a lot of work that goes into great coffee. The Cafe X system is designed for humans and robots to collaborate,” Cafe X explains on its websites. “Smart robotics and machine learning working autonomously allows our operations team to focus on sourcing and using fresh ingredients, maintaining extremely high hygiene standards, and ensuring a great customer experience with every single interaction.”  According to Cafe X, a great customer experience involves efficiency and replicability. “By being automated, we guarantee every cup of coffee you are served from a Cafe X machine is how the roaster intended you to enjoy their coffee,” Cafe X CEO Henry Hu told CNET.

For clients, the efficiency improvements and passed-through cost savings will likely more than offset any loss of a “human touch” – you can order your cup of coffee ahead of time with the Cafe X mobile app and even schedule a pickup time, if you want. Thanks to the robot’s artificial intelligence software, your pre-orders are taken into consideration alongside walk-in orders to ensure that no one is waiting for too long. And with a single robot capable of making 100 to 120 cups of coffee in an hour, you likely won’t be waiting long at all.

And since bionic barristas not only do not expect a weekly paycheck, but need no healthcare of benefits, the choice for Howard Schultz’ replacement is clear. Oh, and to those 10,000 refugees who had hoped to get a job at Starbucks, our condolences.

Watch “Gordon” in action here:

… here:

… and here:

Facebook hiring neuroscientists to build potential mind-reading social network

Facebook boss Mark Zuckerberg has said telepathy is the technology of the future



Facebook is working on a “brain-computer interface”, apparently to let people talk to each other by reading their minds.

The company is secretly building a team apparently to work on new social media platforms that will use advanced neuroscience and electrical engineering.

Among other mysterious jobs, it is advertising for a “brain-computer interface engineer” in its Building 8 team. That team will work on Facebook’s most futuristic and secretive projects, according to the same listing.

That engineer will work on “developing advanced [brain-computer interface] technologies”, according to the ad. That will involve using computers and artificial intelligence to work with “neuroimaging and electrophysiological data”, according to the same listing.

Mark Zuckerberg has referred to a version of telepathy as the computer platform of the future, and the job ads suggest that Facebook is working on such technology. In a Q&A last year he described how people would be able to “capture a thought… in its ideal and perfect form in your head and share that with the world”.

Other jobs in the Building 8 team – which is apparently just being established – include jobs looking for people capable of building a “communications and computing platform of the future”.

That platform also seems to make use of new forms of interacting with computers. It requires that the person doing it has experience of “speech and audio signal processing algorithms and systems”, and that those will be used to build the new system.

Another job listing reveals that Facebook is looking for a haptics specialist, who would help the company use touch interactions to build “realistic and immersive” experiences.

All of the jobs are listed as temporary, two-year contracts that require someone who is “slightly impatient”. But it isn’t clear when or even whether any of those projects will actually come to fruition, and whether they’ll be included in Facebook products or entirely different, new projects.


Could ‘demonic voices’ take over YOUR phone? Listen to the terrifying hidden audio messages that can hijack smart assistants

  • Hack can embed hidden voice commands in YouTube videos 
  • Tests shows Android 10ft away from speaker playing malicious commands 
  • Commands sound demonic and are rarely understood by humans
  • Can make phones calls, take pictures, transfer money and more
  • Can make assistant download malware to control entire smartphone 

It may sound like YouTube has been possessed, but the demonic sounds coming from the clip below are voice commands to access a smartphone’s virtual assistant.

Researchers have found an attack that uses ‘hidden voice commands’ embedded within clips that lets hackers prompt the assistant to perform a number of tasks.

This attack lets hackers make phone calls, use Venmo to transfer money or worse, download malware giving cyberthieves complete control of the handset.

Scroll down for videos

 Researchers have found an attack that uses ‘hidden voice commands’ embedded within YouTube videos that lets hackers prompt the assistant to perform a number of tasks. They placed an Android 10ft away from the speaker and the ‘demonic sounds’ said ‘OK Google’The bizarre hack was discovered by a group of Ph.D candidates at Georgetown and the University of California, Berkley, which found the commands are ‘unintelligible to human listeners but which are interpreted as commands by devices’.’Voice command systems are becoming ubiquitous,’ notes Micah Sherr, a computer science department professor who worked with colleagues Clay Shields and Wenchao Zhou on the project.’The attack we envision as most feasible is that someone has a YouTube video of kittens or something popular and in the background, there’s something that says, open a URL.’ ‘This introduces an opportunity for attackers to try to issue unauthorized voice commands to these devices.’

In order for you to become a victim, you just have to listen to a malicious YouTube clip via your smartphone or have it nearby – researchers placed the device 10.1 feet away from the speakers and it was hacked.

And when successful, the hacker can take control of your phone by making phones call, using Venmo to transfer money or access other personal information, reports Vocativ.

‘Voice interfaces are becoming more ubiquitous and are now the primary input method for many devices,’ the researchers wrote.

‘We explore in this paper how they can be attacked with hidden voice commands that are unintelligible to human listeners but which are interpreted as commands by devices.’

Another instance, which may be more damaging, would let cybertheives open websites and download malware – letting them have full control of the device.

In order for you to become a victim, you just have to listen to a malicious YouTube clip via your smartphone or have it nearby – researchers placed the device 10.1 feet away from the speakers and it was hacked

‘So a possible scenario could be that a million people watch a kitten video, and 10,000 of them have their phones nearby and 5,000 of those phones obey the attacker’s voice commands and load a URL with malware on it,’ Sherr says.

‘Then you have 5,000 smartphones under an attacker’s control.’

The team used their knowledge about how speech recognition systems work to construct audio recordings that can be understood as speech by computers but lack the necessary resolution for human comprehension.

‘We learned that if you remove those parts and keep everything else, you get something that a computer can still understand but the human brain cannot,’ Sherr explains.

During their work, the team discovered that it is easy to change voice commands in a way that are nearly unrecognizable by humans, but still prompt the phone to do a task.

When successful, the hacker can take control of your phone by making phones call, using Venmo to transfer money or access other personal information. Cybertheives can also open websites and download malware – letting them have full control of the device

When successful, the hacker can take control of your phone by making phones call, using Venmo to transfer money or access other personal information. Cybertheives can also open websites and download malware – letting them have full control of the device

The results were condensing the words into a demonic growl.

‘Ok Google, Open,’ the voice says, and a nearby phone opens that URL.

And humans in the study could only understand ‘Ok Google’ 20 percent of the time, whereas the Android device in the experimental video executed the command 95 percent of the time.

The team also offered some solutions’

‘We then evaluate several defenses, including notifying the user when a voice command is accepted; a verbal challenge-response protocol; and a machine learning approach that can detect our attacks with 99.8% accuracy.’

Brain-to-Brain Communication Is Closer Than You Think

Don’t call it telepathy, but call it very cool.

When neuroscientists used a monkey’s thoughts to control computers, it was a huge breakthrough in mind-machine research. But harnessing brain waves has become even more complex now that humans are the subjects. Recently, researchers used the thoughts of one human’s brain to control the physical actions of another. Really. As a panel of experts explained at the World Science Festival this week, brain-to-brain linkups are just getting started.

The field got its start in 1998 in the lab of Miguel Nicolelis, a Brazilian researcher working at Duke University. Before Nicolelis started experimenting with the brain, scientists were measuring the electrical output of a single neuron at a time. But Nicolelis and his colleagues began recording information from the brains of rats, where they discovered that to make their bodies move, rat brains would fire 48 neurons at a time. Believing that they could advance their understanding further, Nicolelis and his team then turned to monkeys.

They recorded 100 neurons firing at once in the brain of a monkey. Believing they might be able to take this data and use it to perform a task, the team connected a probe into the area of the monkey’s brain that controlled for arm movement. Then they gave the monkey a game to play: Using a joystick, the monkey moved a dot around on a screen until it entered a circle in the center. When the monkey moved the dot into the correct location, she received a reward of juice. Once they recorded the brain patterns that resulted from the movement, the team took the joystick away. The monkey was now able to move the dot around simply by imagining it move.

“Somehow she figured out that she could just imagine. She realized this is the prototype of a free lunch,” Nicolelis said. The innovation was the grandfather of the brain-to-brain interface. “This was the first time a primate’s brain liberated itself from the body,” he said.

After Nicolelis’s study, other neuroscientists began taking the work to humans. In 2013, Chantel Prat and Andrea Stocco, both researchers at the University of Washington Institute for Learning and Brain Sciences, wanted to see if they could send a message to control physical movement from one brain to another. Because it’s a breach of research ethics to connect probes directly into a living human brain, they had to figure out how to do it using non-invasive techniques.

Using an electroencephalography (EEG) cap, which records brain activity, they positioned two researchers in separate areas of the campus. In one room a colleague, Rajesh Rao, played a videogame using his mind. Each time Rao saw an enemy he wanted to shoot in the game he would think about pressing a button. Across campus, Stocco sat with his back to the same video game while wearing noise-canceling headphones so he wouldn’t know when to respond. On his head was a transcranial magnetic stimulation coil (a device that can emit a focused electrical current), which was positioned directly over the part of the brain that controlled the movement of his finger.When Rao thought about moving his finger, the signal was transmitted across campus to Stocco who, without any knowledge of it, would twitch his finger and trigger the game to shoot an enemy.

“The first time I didn’t even realize my hand had moved. I was just waiting for something to happen,” said Stocco.

That reaction, Prat says, is an important aspect of this science. “There is this idea that I would like to dispel. This is not the X-Men version of telepathy where you hear a disembodied voice. My brain would have no way of knowing that your thoughts are mine. Whatever shape [future brain-to-brain communication] takes is going to be very different than listening to someone’s thoughts in your head.”

“I don’t think we will ever be able to broadcast from one brain to another the essence of the human condition.”

The neuroscientists all agreed that, while this technology is still rudimentary there are implications for future uses. Nicolelis, for example, has adapted the brain-to-machine interface to help paralyzed patients walk by using their brain signals to control prosthetic devices. He says that over the two years he’s been working with them several of his patients have recovered some sensory ability in their paralyzed lower limbs. “The conjunction of output to control device and feedback may have triggered axons that survived to start working again,” he says.

Prat, who is especially interested in the differences between individual brains, believes that the technology could also eventually be used to improve learning by harnessing the EEG’s ability to distinguishing between a brain that is focusing and one that is “zoning out.” That way, perhaps in the future, when a “good learner” starts to focus on a learning task their brain can trigger someone who is not paying attention to focus in on the task at hand. Brain-to-brain communication, she says, may one day be especially good at transmitting a state of mind.

In the end the researchers agreed that despite the technology’s many potential benefits one future we won’t see is one in which you can connect your brain into a computer and download all the Earth’s knowledge. According to Nicolelis, downloading massive amounts of data or mimicking telepathy will be impossible because the brain is just too complex.

“I don’t think we will ever be able to broadcast from one brain to another the essence of the human condition. We don’t even know how to record those things let alone broadcast them and then interpret that broadcast. We love analogies, metaphors, expecting things, and predicting things. These thing are not in algorithms. We’re not going to be broadcasting my dreams to your head.”

CIA releases psychic experiment documents

“Stranger Things” got it wrong. It was the CIA and the Department of Defense, not the Department of Energy, that conducted covert research on potential psychic abilities.

The dubious, fictional experiments run by the Department of Energy in “Stranger Things” may have actually been conducted in real life by the Central Intelligence Agency and the Department of Defense.

Among the millions of declassified documents that the CIA uploaded to its site this week, quite a few reveal information about the Stargate Project, a $20 million secret program that started in the mid-1970s to try to develop psychic abilities in agents and military personnel.

The program worked under various code names such as Gondola Wish, Grill Flame, Center Lane, Sun Streak and Scanate. It focused on remote viewing, which involves someone known as a remote viewer seeing an object, person or place from a great distance with one’s mind or via an out-of-body experience.

According to one of the declassified documents uploaded to the CIA site, the Stargate Project at one time consisted of an activity chief, a senior intelligence officer, three operational remote viewers, an intelligence technician and a secretary. The project’s sole purpose was to test remote viewing methodologies. Even the participant consent form for Stargate seems ominous, reminding the participant that the “potential for injury during some training cannot be conclusively ruled out.”

The project apparently proved to be fruitless, and the CIA closed down the Stargate Project in 1995.

This isn’t the first time the CIA has uploaded unusual files to its website. Last year, the CIA uploaded over 1,700 declassified UFO reports.

“The declassification of 25-year-old records is mandated by Executive Order 13526, which requires agencies to review all such records categorized as permanent under the Federal Records Act for declassification,” according to a statement released Tuesday by the CIA. “As a result, following CIA’s review, documents are regularly added to this collection.”

Approximately 930,000 documents — that’s 12 million pages — are now available in the CIA’s Electronic Reading Room on its website. At least we have a way to pass the time while we wait for new episodes of “The X-Files.”

The Vortex: Imminent Revolution, War, and Mass Murder!

America is undergoing a coup attempt, a violent revolution against the people’s expressed will under their Constitution. It is happening now.

The treasonous criminals behind this attack are desperate to prevent the peaceful transfer of power. They include George Soros and his string of subversive organizations; the remnants of Hillary Clinton’s campaign cadre; outgoing President Barack Obama and his political retinue; rogue members of the administration-controlled “intelligence community”; the Democrat Socialists of America (including the 69 Democrat members of Congress comprising the Congressional Progressive Caucus); the leadership of many national Labor Unions; virtually the entire establishment “news” and entertainment establishment; Leftist university and college faculties across the United States; and, perhaps most dangerous of all, a subversive Fifth Column of treacherous neo-conservative war mongers who pretend to be “conservatives” but are not. These include Senators John McCain, Lindsay Graham, Marco Rubio and others who are working as hard as they can to instigate yet another war of aggression, this one with Iran and Russia. If you are a loyal Republican who objects to my description of neo-conservatives as a subversive Fifth Column you’re most likely a good person who just hasn’t been paying attention to their machinations for the last thirty years.

Coup leaders are coordinating lies, disinformation and false news disseminated through their controlled national news and media outlets to whip up support for its efforts.

  • Lie Number One: Donald Trump’s election is invalid because Hillary Clinton won the popular vote nationally.

The fact of the matter is that millions of dead people and illegal immigrants were allowed to vote in the Presidential election of 2016. However, even if the official figures are accepted as valid, outside of California Hillary Clinton LOST the popular vote nationally.

Here are the official final popular vote totals for the nation in the U.S. Presidential Election of 2016:

Hillary Clinton Donald Trump
U.S. Popular Vote Totals    65,844,610   62,979,636

As it happens, last month, on the heels of Donald Trump’s election, a group of disgruntled anti-Trump Californians launched a petition drive for the purpose of achieving California’s secession from the United States. It is interesting to consider what the result of last November’s popular vote would have been had that state already left the union.

Hillary Clinton Donald Trump
U.S. Popular Vote Totals (without California)    58,482,120   59,063,427

Without California, Donald Trump wins a national popular vote majority of 581,307 votes. In fact, except for the votes in just 12 of 58 California counties (Los Angeles, Alameda, Santa Clara, Contra Costa, San Mateo, Sacramento, Orange, Sonoma, Marin, Santa Cruz, Ventura, and Solano) Trump would have carried California as well.
It reduces to this. Hillary Clinton won the popular vote in and therefore deserves to be President of California. The rest of the country? Not so much.

  • Lie Number Two: Vladimir Putin is an aggressive dictator who invaded the Ukraine.

In fact, Putin is not a dictator (see this link) and Russia has not attacked any other nation since the collapse of the Soviet Union. The same cannot be said about the United States (see this link).

Putin was re-elected by a popular vote of the Russian people and enjoys tremendous popularity among the Russian people. Russia did NOT “invade the Ukraine”. It was the United States, led by a bi-partisan clique of neocons (including John McCain and Hillary Clinton’s deputy, Under Secretary of State Victoria Nuland) who overthrew the democratically elected government of the Ukraine and installed a puppet regime with the assistance of neo-Nazis. If you are interested in more detail, go to this link about Russia and to this link.

This week contains the last few days before Trump’s inauguration and is a period of maximum danger.  The US has rushed troops and ammunition in large quantities to  the Russian border. The U.S. and Israel last Friday conducted an air raid on a Syrian air base housing Russian troops in Damascus in a failed attempt to provoke a Russian response. And, in a chilling development, Obama just fired the Commanding General of the DC National Guard effective with Trump’s inauguration.

With the pieces all in place, it is very likely the plotters will manufacture an incident with Iran in the Persian Gulf  as they did in the staged Gulf of Tonkin incident which was used to launch the Vietnam War. Washington’s propaganda machine has been setting the stage for this option for the last several months. Alternatively, they may stage a mass casualty False Flag attack on the United States as it planned to do with Operations North Woods in the early 1960s to justify war with Cuba.

Nothing is beneath these criminals. Pray that they fail or nuclear war and the death of millions will be the result.

Flashback from 2007-

Revolution, flashmobs, and brain chips. A grim vision of the future

Artist Creates Fabric That Can Fool Facial Recognition Tech

Derrick Broze

A German artist has revealed a new technology that he hopes will make it easier for individuals to avoid the growing Surveillance State.

Adam Harvey is an artist and “technologist” based in Berlin, Germany who is well known for using his artistic prowess to create art and fashion that could potentially disrupt the capability of facial recognition technology. Harvey has been profiled in the past for his elaborate ideas on styling hair and makeup in a way that prevents faces from being recognized by surveillance cameras outfitted with facial recognition software.

He is now working on a new project called Hyperface. Harvey is working with international interaction studio Hyphen-Labs and plans to release full details later this month. The Guardian reports:

The Hyperface project involves printing patterns on to clothing or textiles, which then appear to have eyes, mouths and other features that a computer can interpret as a face.

Speaking at the Chaos Communications Congress hacking conference in Hamburg, Harvey said: ‘As I’ve looked at in an earlier project, you can change the way you appear, but, in camouflage you can think of the figure and the ground relationship. There’s also an opportunity to modify the ‘ground’, the things that appear next to you, around you, and that can also modify the computer vision confidence score.’

According to Harvey, the Hyperface project will work by “overloading an algorithm with what it wants, oversaturating an area with faces to divert the gaze of the computer vision algorithm.” To do this he is working with Hyphen-Labs to create patterns that can be worn or wrapped over an object or person. “It can be used to modify the environment around you, whether it’s someone next to you, whether you’re wearing it, maybe around your head or in a new way,” Harvey told The Guardian.

Harvey also discussed how certain researchers are studying facial characteristics and movements in order to identify potential criminals or the age, gender, and mood of a person. Interestingly, Harvey related the attempt to use facial recognition software to study the human species in such a detailed way is reminiscent of the American Eugenics movement of the early 20th century. The Eugenics movement in the United States would go on to be an important inspiration to Adolf Hitler’s philosophy.

“A lot of other researchers are looking at how to take that very small data and turn it into insights that can be used for marketing,” Harvey said. “What all this reminds me of is Francis Galton and eugenics. The real criminal, in these cases, are people who are perpetrating this idea, not the people who are being looked at.”

Harvey’s last project focused on hair and makeup to deflect the watchful eyes of Big Brother and Sister. The belief was that the odd patterns and colors would work in the same fashion Harvey hopes his new cloth patterns will. Harvey’s website CV Dazzle explained the process:

OpenCV is one of the most widely used face detectors. This algorithm performs best for frontal face imagery and excels at computational speed. It’s ideal for real-time face detection and is used widely in mobile phone apps, web apps, robotics, and for scientific research.  OpenCV is based on the the Viola-Jones algorithm. This video shows the process used by the Viola Jones algorithm, a cascading set of features that scans across an image at increasing sizes. By understanding how the algorithm detects a face, the process of designing an “anti-face” becomes more intuitive.

Derrick Broze is an investigative journalist and liberty activist. He is the Lead Investigative Reporter for and the founder of the Follow him on Twitter. Derrick is the author of three books: The Conscious Resistance: Reflections on Anarchy and Spirituality and Finding Freedom in an Age of Confusion, Vol. 1 and Finding Freedom in an Age of Confusion, Vol. 2