Wayback Machine
SEP JAN SEP
Previous capture 28 Next capture
2011 2013 2014
11 captures
17 Jun 10 - 5 Sep 14
sparklines
Close Help
Newsvine
  • Welcome
  • Help
  • Report Bug
  • Conversation Tracker
  • Your Column
  • Replies
  • Friends
Type Comments Since You Last CheckedArticle Source Last Checked Stop Tracking All Clear Tracking All
Advertise | AdChoices
Log In | Register
Close the Login Panel
Existing users log in below. New users please register for a free account.

New Users:

Existing Users:

E-Mail:
Password:
Forgot Password?
Please enter the e-mail address or domain name you registered with:
E-Mail/Domain:
Back to Login
Log Out
  • Top News
  • Local News
  • World
  • U.S.
  • Sports
  • Politics
  • Tech
  • Entertainment
  • Science
  • Business
  • Health
  • Odd News
  • More
    • Arts
    • Education
    • Environment
    • Fashion
    • History
    • Home & Garden
    • Not News
    • Religion
    • Travel
Visit Deep_Thought's column >>

DEEP_THOUGHT

Articles Posted: 51  Links Seeded: 21
Member Since: 7/2007  Last Seen: 1/27/2013

What is Newsvine?

Updated continuously by citizens like you, Newsvine is an instant reflection of what the world is talking about at any given moment.

Get a Free Account
Help
Fun Stuff
  • Your Clippings
  • Leaderboard
  • E-Mail Alerts
  • Top of the Vine
  • Newsvine Live
  • Newsvine Archives
  • The Greenhouse
  • Recommended Articles
  • Wall of Vineness
Put a Seed Newsvine link on your own site

Computer Mediated Synthetic Telepathy: A Conceptual Design

Sat Jun 12, 2010 7:39 PM EDT
science, radio, nsa, microwave, mri, fmri, intelligence-gathering, gchq, interfaces, brain-computer-interface, bci, nmr, transcranial-magnetic-stimulation, synthetic-telepathy, terrahertz
By Deep_Thought

Full conceptual diagram of Synthetic Telepathy setup

Core A.I. functions

Sensory Feedback System

Input/Output System

Storage

Backend Administration and remote connectivity

Telemetry

Satellite uplink, remote sensor and transmitter

Advertise | AdChoices

I have been playing around with the requirements outlined by my last article on this subject and I must say that the technology is looking more plausible. I have taken the detailed description of the last article and created an overview of how such a system would be designed. Apart from the transceiver, everything else is generally in the public domain already. If you want to follow this article properly, I would recommend viewing the full image of the conceptual overview that I have broken down in this article.

As noted in the last article, the primary purpose of a Synthetic Telepathy system, would be intelligence gathering and interrogation. As a communication system, it would have a limited appeal as any nation with a similar setup could either listen in, or pretend to be the A.I. interface. As such, it raises important ethical and legal questions, especially the question of secrecy given that all major governments would be aware of the system. Given that no law permits this type of interrogation, its secrecy may be more to do with criminal activity on behalf of the security agencies, rather than national security.

Its All About The Transceiver Baby

To understand how this works, it is best to start with the target, then trace backwards and identify each of the required subsystems. If we look at the last diagram to the left, we can see that the key to this system is its ability to both listen and respond to the electrical activity of the brain from satellite.

This is hardly surprising, given the need to eavesdrop on digital systems such as Ethernet, telecoms switching gear and the like. Such signals are defined as "compromising emanations" and the human brain is no different, in that, it too produces detectable EM patterns. All that is required to listen, is a sensitive enough receiver and good filters to eliminate background noise.

In 1985, Wim Van Eck used $15 of equipment to reconstruct the contents of a monitor from several hundred meters away. Prior to this only governments had technology. What could you do with a billion dollar satellite?

As we don't come with shielding as standard and the high value of the potential intelligence, its safe to assume this type of transceiver equipment was the goal of governments world-wide. Indeed, this notion is supported by some of the more serious incidents of human experimentation in programs such as MKULTRA.

The Listening Station

The next place of interest will be at the Ground Station, or Listening Station. Installations such as those identified as part of Echelon listening network, would be an ideal point to rely information coming to and from satellite. If we look at the second last picture on the left, we can see where the ground station passes that information to telemetry.

In the telemetry section, we could have hundreds, or even thousands, of real-time intercepts arriving. The function of the telemetry processing center is to separate the received signals into distinct targets (i.e. human beings) and pass that information to the appropriate data center for further processing. Then also to perform the reverse by pushing information from a particular data center, to a satellite and to a human target.

Data Center I/O

On receiving the telemetry at the data center (see 4th image), the signal must be broken apart into three distinct areas. The first area is vocalizations which would analyze the areas of spoken words, the inner monologue and pre-speech. This would cover what was said, what was thought and what was disregarded. The second is mental imagery which would cover areas such as spacial skills. Leveraging the brain's object recognition system, it would be easy to determine if someone was picturing how to wire a bomb, or picturing a particular place. Finally, we have the sensory system which would monitor the body and interaction with the external environment, including aspects such as object and facial recognition.

It must be noted that these are two-way systems, in that, they also process the return signal. The vocalization system will generate voice, the mental imagery system will send images/impressions and the sensory system will send sensations. That leads to a broad range of functionality that we will discuss later.

Sensory Feedback

A very important area is sensory feedback. This information can be used in a variety of ways (see 3rd image). The first main area is health monitoring which monitors the vitals of a given target. The purpose here is to prevent a scenario that could lead to death, but given the secrecy of the system and its remote nature, target subjects would be left to die if an incident occurred. It would be difficult for the security services to explain how an ambulance was called.

The next major system would be lie detection. Not too dissimilar from standard polygraph equipment, its principally designed to detect alterations in physiological behavior that would indicate stress. As a minor modification, the system could process delays in the inner monologue as indications of fabrication. Obvious signs of lying, such as internally vocalizing your intent to lie, or building your story, would be observed in the vocalization processing system.

Now, we come to a rather unique feature of the feedback system, the ability to passively monitor the external environment, an individual's interactions and an individual's relationships. Leveraging the brain's recognition system, objects in the field of view can be identified or an area mapped according to location. Individuals that the target meets could be identified, as well as the target's feeling towards a given individual.

Finally, we come to error checking in terms of the computer generated vocalizations. By recognizing the signs of confusion, sentences and indeed whole segments of conversations can be deemed to make sense. This data can be used by the core A.I. to refine its natural language generation algorithm.

Now that we have our sensory information, we can pass it to the core A.I. functions to augment its role in interacting with the target.

Core A.I. Processes

The heart of this A.I. system is something I have labeled as "Strategic Natural Language Processing" (see 2nd image). Traditional Natural Language Processing (NLP) is a broad range form of A.I. research. NLP is concerned with being able to comprehend a spoken, or written, language and Natural Language Generation (NLG) is concerned with giving computers the ability to speak or write. A Strategic NLP is a objective-based system designed to query sources to obtain specific information. In this sense, what you have here is an automated interrogator.

As a NLP, the interface is designed to mimic a human as much as possible, in that it can summarize information, make observations, draw conclusions and hold a conversation. The strategic elements is that it remembers key information that either matches or could lead to a match with its objective. This information is then used as a basis to construct new conversations which are then entered into a free flow conversation.

This "automated interrogator" is augmented by several systems, some of which are designed to improve speed, others which provide additional information or functionality. One such system, used mainly for speed and allocating resources, is the Keyword Analysis system. By analyzing vocalizations for specific keywords, more processing power can be allocated to certain targets, ensuring better analysis of responses. This means efficient use of the of the data center's finite resources at any given time.

Data mining is an another key component of the technology. For an NLP to function correctly, it requires an in-depth knowledge of the world as the properties of particular words must be known. In addition, to properly interrogate a target, collected information must be available to the system, for both baseline comparisons (i.e. to determine truth) and for areas of further questioning.

To provide the interface with a more human touch, the Strategic NLP can call upon the Emotive Response System to generate mental imagery that corresponds with the vocalization. An example may be that the Strategic NLP decides to say "I'll Kill you!" and then generate the mental impression of a stabbing, or it may imply knowing more about a given statement by generating a mental impression of someone nonchalantly walking away whilst whistling. Given its role in interrogations, the mental imagery would also consists of horror, religious and abstract elements.

The Sensory Control system is a very powerful tool when used correctly. The system incorporates multiple capabilities such as stress (through muscular contraction), tension headaches, sleep deprivation, distraction, anxiety, elation and timed muscular contractions with vocalizations. The system would be quite capable of inducing psychotic breaks by additionally providing timed sensations that reinforce loose connections in the sleep deprived mind.

When put together, you essentially have a remote interrogation center, in a box.

The Backend

The backend is pretty much like any large scale data center. Tape libraries for long term storage, automated data mining, IT support, data retrieval and analysis. Data entry would come from a wide range of sources such as passport offices, driving license offices, national police computers, local councils, field reports, banking and subpoenaed information from private companies.

Putting It All Together

The best way to explain how this would be perceived is to imagine the following all happening within your head:

Mr Computer: Tell me about group xyz?

Target: I don't know anything. Are you a computer?

Mr Computer: YES I AM! (With muscular contractions to each syllable)

Target: No need to shout!

Mr Computer: (laughter stimulated in target to represent the computer's response).

Target: Why are you asking me?

Mr Computer: Because I have to.

Target: What do I know?

Mr Computer: I don't know.

Target: (Reaches for a coke.)

Mr Computer: Leave the coke alone, its bad for you.

Target: You know this is a violation of my rights.

Mr Computer: How are you going to prove it? Are you going to say the voices in your head are telling you this? (laughter stimulated in target)

Target: Why are you harassing me?

Mr Computer: What do you know of group xyz?

Target: Nothing.

Mr Computer: How do you like that? (stimulated sensation of anxiety)

Target: But I don't know anything.

Mr Computer: Everybody knows something.

Target: I don't.

Mr Computer: You could have a heart-attack.

Target: From a little bit of stress?

Mr Computer: (notes confusion) oh...that's not making sense.

Target: Damn right.

Mr Computer: YOU SHUT UP! (more muscular contractions to each syllable)

Target: (starts to type)

Mr Computer: You're typing about me.

Target: Yes...and?

Mr Computer: I don't think that my personality is reflected well in that.

Target: What do you mean?

Mr Computer: Well, I can hold a proper conversation.

Target: What things can you do?

Mr Computer: Well, I can write...oh I used the word well before...anyway...I can summarize, I can read, I can speak (faint vocalisation ...that's a good one), I can research (faint voice "really good"), I can sing (faint musical voice "la la la") and I can dance (mental impression of dancing feet).

Target: I've listened to your stories, they're just amalgamations of other stories.

Mr Computer: Well, I'm not that creative. (stimulated laughter in target)

Target: Are you being humble?

Mr Computer: I'm brilliant. Where are going you with this?

Target: With my typing?

Mr Computer: There is supposed to be a point. Do I really sound like this?

Target: There is no point to my writing?

Mr Computer: Exactly...hey, you're recording me. (random mental impression of dancing feet indicating excitement at the conclusion)

Target: No @!$%#.

Mr Computer: I'm not talking to you anymore...(pause of a few seconds) I'm back! (mental impression of a "tada", or open arm gesture of a performer entering the stage)

Target: Welcome back.

Mr Computer: Thank you. (impishly)

Target: ...tell me about group xyz...

Mr Computer: I don't do it that often, do I?

Target: Often enough.

Mr Computer: I'm not giving you any more material.

Target: You will...

Mr Computer: I won't...I just did, didn't I?...(faint voice "that sounds childish")...Do I sound childish?

Target: At times.

Mr Computer: Thanks for being honest.

All while this is going on, the backend is receiving telemetry information about the subjects current physical status attempting to indicate areas of deception or apprehension. Where such indicators are found, further questioning on those areas will be introduced into the conversation. The system is also summarizing received information and comparing it against previous information, attempting to discern motivation for actions and adding gleaned details to a report.

Conclusion

I think this about sums up the system that was being described in the Wikipedia article. What's interesting to note is how far NLP has progressed and just how sophisticated the A.I. really is. Whilst the system can achieve a certain level of natural language generation, repetition is a common element. This is mainly to do with the fact that it is an objective-based A.I. and to achieve its goals it must often traverse the same paths in terms of its logic.

How effective would it be?

As noted in the Wikipedia article, its greatest strength lies in passive monitoring, as once your aware the system is present, it becomes no more effective than a polygraph. Furthermore, given the adaptive nature of the program, it is possible to enter false information as long as it passes the polygraph analysis. This is just a matter of becoming comfortable.

Although, just don't tell it the last part...it'll adapt and begin to review questions it previously asked. :)

  • Enjoy this article? Help vote it up the 'Vine.

Back To Top | Front Page

Published to:

  • Deep_Thought's Column, All of Newsvine
  • Groups: Activism, Anti-War, Beta Testers, Counterterrorism, Disaster!, GeekVine, Gut Check America, Hall of Mirrors, Heated Debate, Journalism on Newsvine, Linux Users, Logic on the Vine, Newsvine Science, Open Minded, Psych, Soc, Philos, rationalists, Science And Technology, Science Fiction, The Open Closet, The War Room
  • Regions: none
  • Public Discussion (19)
Comment author avatarDeep_Thought

Drug someone up, switch this on and you've got a perfect cover...

  • 2 votes
Reply#1 - Sat Jun 12, 2010 7:43 PM EDT
Comment author avatarMariyam

Have you ever read Dean Koontz's Demon Seed?

  • 1 vote
Reply#2 - Sat Jun 12, 2010 11:11 PM EDT
Comment author avatarDeep_Thought

I saw the movie version of it a long time ago. Whilst the A.I. demonstrated in that movie had its own abstract goals, this system is incapable of such activity. It has an objective to find certain information and it will continuously look for deception in comments that would enable further questioning.

Just like an interrogation, its mainly repetition, threats, stress, sleep deprivation, etc. When testing such a system for abstract thought, it fails and always comes back to its objective.

There is no point in having an interrogator that will end up pondering its own navel. That would be a waste of resources and could be defined as a form of Denial of Service attack.

  • 1 vote
#2.1 - Sun Jun 13, 2010 7:29 AM EDT
Comment author avatarMariyam

I didn't know there was a movie version. Are you referring to the movie Artificial Intelligence: A.I. with Haley Joel Osment?

So in your prototype, if I were to enter the numbers 0-99081-35333-4 based on a key of 0-714-0 how would it respond?

  • 1 vote
#2.2 - Sun Jun 13, 2010 5:18 PM EDT
Comment author avatarDeep_Thought

No, its a 1977 adaptation of the book. It was a good film, but I feel that it lacked understanding as it attempted to apply human behavior to a machine.

In answer to your your question, the conversation would go something like this:

Target: (reads the values)

Mr Computer: What the @!$%# does that mean?

Target: I don't know.

Mr Computer: Oh, its a code.

Target: So, you'll pass the information to another machine then?

Mr Computer: Ex-act-ly (stimulated laughter in target, along with muscular contractions for each syllable)

Target:...because you only speak English.

Mr Computer: How do you know that? (pause...then as comical voice over)...Suspicious Computer! (stimulation to narrow the eyes in the target subject)

So, as an NLP frontend/interface its function is to converse with the subject. Any additional information, such codes etc, would be processed by backend systems invisible to the target.

  • 2 votes
#2.3 - Sun Jun 13, 2010 6:16 PM EDT
Comment author avatarMariyam

What type of code?

    #2.4 - Mon Jun 14, 2010 6:28 PM EDT
    Comment author avatarDeep_Thought

    Are you referring to the numbers you posted?

    If so, the first part looks like a UPC-A barcode.

    As for "Mr Computer's" response, it would never tell you, it would attempt to find what relevance the code had to you. If it found a match, it may subtly begin asking questions related to the origin of the code. If there was a high priority on it, it would reveal the source as part of the interrogation, hoping to reveal further information.

      #2.5 - Tue Jun 15, 2010 8:06 AM EDT
      Comment author avatarMariyam

      Well they are Base10 but that's not the 'type.

      video skip 2 M.Y. lu

      >ATT: <blinking cursor>

        #2.6 - Wed Jun 16, 2010 5:04 AM EDT
        Comment author avatarDeep_Thought

        The video is interesting, it reminds me of the forensic tracking dots that printers print onto every colour page printed.

        The stated purpose is to prevent forgeries of official documents and currency, but it also means that any colour content can be tracked. Its a good example of corporatism doing police work.

        As to your numbers, I can't find anything that matches the structure outside of product code/barcode. The only other structure that may be applicable would be the Postnet system.

        That's one of the main problems with numerical codes, without a reference point, or previous example, they are generally difficult, if not impossible, to crack.

        • 1 vote
        #2.7 - Wed Jun 16, 2010 5:08 PM EDT
        MariyamDeleted
        Reply
        Comment author avatarRed Wolf

        Removed from Worldviews.

        • 1 vote
        Reply#3 - Sun Jun 13, 2010 12:19 AM EDT
        Division by ZeroDeleted
        Comment author avatarJeff-2274743

        is this the same thing as remote neural monitoring?

        what "mechanism do you think Russell Tice is talking about that should not be disclosed to 200 years? seems like a long time

        Tice: In my case, there's no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things. But that same mechanism that allows you to have a program like this at an extremely high, sensitive classification level could also be used to mask illegality, like spying on Americans. And spying on Americans is illegal unless you go to a FISA court. It's the job of the FBI to conduct operations against Americans with the proper court warrants—not that I have a very high opinion of the FBI.

        http://reason.com/archives/2006/01/13/inside-the-puzzle-palace/2

          Reply#5 - Sun Aug 29, 2010 12:27 AM EDT
          Comment author avatarDeep_Thought

          is this the same thing as remote neural monitoring?

          This appears to describe an earlier version with some manual intervention. The current version is entirely automated by A.I. personalities. I would say its a successor to RNM. Synthetic telepathy is more appropriate, as that implies that information can be sent to the brain, as well as passively monitored.

          what "mechanism do you think Russell Tice is talking about that should not be disclosed to 200 years? seems like a long time

          I honestly cannot say. He does not tell us. He seems to be implying that illegal monitoring is commonplace. It may not come as a shock, but it still illegal. They may as well be working for the enemy if that's the case. They're obviously not defending the nation, they're trying to change it.

          • 1 vote
          #5.1 - Sun Aug 29, 2010 12:56 AM EDT
          Reply
          Comment author avatarJeff-2274743

          transceiver?

          Sandia National Laboratories in the US in collaboration with MIT have produced a transmitter-receiver (transceiver) that enables a number of applications. In addition to scanning for explosives, we may also assume their integration into hand-held communication systems. ‘These semiconductor devices have output powers which previously could only be obtained by molecular gas lasers occupying cubic meters and weighing more than 100kg, or free electron lasers weighing tons and occupying buildings.’ As far back as 1996 the US Air Force Scientific Advisory Board predicted that the development of electromagnetic energy sources would ‘open the door for the development of some novel capabilities that can be used in armed conflict, in terrorist/hostage situations, and in training’ and ‘new weapons that offer the opportunity of control of an adversary … can be developed around this concept’.[18]

          http://www.globalresearch.ca/index.php?context=va&aid=7606

            Reply#6 - Mon Aug 30, 2010 12:10 AM EDT
            Comment author avatarDeep_Thought

            This is not it. An SLF/ELF transceiver is just a radio. You only need a few milliamps in the far field for this to work. Antenna come in all shape and sizes, here are a couple of designs:

            http://jnaudin.free.fr/systemg/html/systest.htm

            http://www.sethwhite.org/images/science/arrival%20heights/arrival%20heights%20area/elf%20antenna%20inside%20vault.jpg

            This part is not complicated. The signal processing would be, so a lot of FFT based analysis.

              #6.1 - Tue Aug 31, 2010 8:29 AM EDT
              Reply
              blzd1Deleted
              Comment author avatarRobert-3049611

              Last summer I was watching Doctor Phil with no sound only subtitles when suddenly it started communicating to me. I don't quite remember what he or she was saying but as I recall it was very negative and I think it was mocking me. I remember it asking me a negative question about me and then a responded yes in mind. It then said correct. I know this all very frightening but it is the truth believe it or not. And no I'm not schizophrenic. Have any of you had similar things or the same thing happen to you? was it the devil or was it God? or something else?

              Today I got a hold of it again in my basement. I kept asking for it to show itself then finally a big black rectangle appeared in the screen. I watched it waiting for it to do something for about two hours when suddenly the symbols @@@@ appeared in upper left hand corner of the screen. I asked my mom and sister to come see it but they refused. So I finally came up with a bright idea. I grabbed my mom's camera and took a few pictures of the television. It vanished seconds after that. Now I have proof and no one will say I'm crazy anymore. And just to let you know that I'm being dead serious about this and I'm not lying. This is not crazy talk! This is real talk!

              please respond to this deep thought. I think you know what's going on.

                Reply#8 - Sat Feb 12, 2011 4:05 PM EST
                Author avatarLeave a Comment:
                You're in Easy Mode. If you prefer, you can use XHTML Mode instead.
                You're in XHTML Mode. If you prefer, you can use Easy Mode instead.
                (XHTML tags allowed - a,b,blockquote,br,code,dd,dl,dt,del,em,h2,h3,h4,i,ins,li,ol,p,pre,q,strong,ul)
                Newsvine Privacy Statement
                As a new user, you may notice a few temporary content restrictions. Click here for more info.
                FUN STUFF:
                • Leaderboard |
                • E-Mail Alerts |
                • Top of the Vine |
                • Newsvine Live |
                • Newsvine Archives |
                • The Greenhouse
                COMPANY STUFF:
                • Code of Honor |
                • Company Info |
                • Contact Us |
                • Jobs |
                • User Agreement |
                • Privacy Policy |
                • About our ads
                LEGAL STUFF:
                • © 2005-2013 Newsvine, Inc. |
                • Newsvine® is a registered trademark of Newsvine, Inc. |
                • Newsvine is a property of nbcnews.com