“Humanity is about going beyond biological limitations”

Image: Drawing of The Vitruvian Man

Leonardo da Vinci’s drawing of The Vitruvian man.

NEW YORK Dreams of immortality inspired the fantastical tales of Greek historian Herodotus and Spanish explorer Juan Ponce de Leon’s legendary search for the fountain of youth. Nowadays, visionaries push for the technologies to transplant human brains into new bodies and download human consciousness into hologram-like avatars.

The latest science and schemes for achieving long life and the “singularity” moment of smarter-than-human intelligence came together at the Singularity Summit held here October 15-16. Some researchers explored cutting-edge, serious work about regenerating human body parts and defining the boundaries of consciousness in brain studies. Other speakers pushed visions of extending human existence in “Avatar”- style bodies — one initiative previously backed by action film star Steven Seagal — with fuzzier ideas about how to create such a world.

Above all, the summit buzzed with optimism about technology’s ability to reshape the world to exceed humanity’s wildest dreams, as well as a desire to share that vision with everyone. True believers were even offered the chance to apply for a credit card that transfers purchase rewards to the Singularity Institute.

“Humanity is about going beyond biological limitations,” said Ray Kurzweil, the inventor and futurist whose vision drives the Singularity Institute.

Rebuilding a healthy body The most immediate advances related to living longer and better may come from regenerative medicine. Pioneering physicians have already regrown the tips of people’s fingers and replaced cancer-ridden parts of human bodies with healthy new cells.

“What we’re talking about here is not necessarily increasing the quantity of life but the quality of life,” said Stephen Badylak, deputy director of the McGowan Institute for Regenerative Medicine at the University of Pittsburgh in Pennsylvania.

Success so far has come from using a special connective tissue — called the extracellular matrix (ECM) — to act as a biological scaffold for healthy cells to build upon. Badylak showed a video where his team of surgeons stripped out the cancerous lining of a patient’s esophagus like pulling out a sock, and relined the esophagus with an ECM taken from pigs. The patient remains cancer-free several years after the experimental trial.

The connective tissue of other animals doesn’t provoke a negative response in human bodies, because it lacks the foreign animal cells that would typically provoke the immune system to attack. It has served the same role as a biological foundation for so long that it represents a “medical device that’s gone through hundreds of millions of years of R&D,” Badylak said.

If work goes well, Badylak envisions someday treating stroke patients by regenerating pieces of the functioning human brain.

Live long and prosper The work of such researchers could do more than just keep humans happy and healthy. By tackling end-of-life chronic diseases such as cancer, medical advances could nearly double human life expectancy beyond almost 80 years in the U.S. to 150 years, said Sonia Arrison, a futurist at the Pacific Research Institute in San Francisco, Calif.

Long-lived humans could lead to problems such as anger over a “longevity gap” between haves and have-nots and perhaps add to stress on food, water and energy sources. But Arrison took a more positive view of how “health begets wealth” in a talk based on her new book, “100 Plus” (Basic Books, 2011).

Having healthier people around for longer means that they can remain productive far later in life, Arrison pointed out. Many past innovators accomplished some of their greatest or most creative work relatively late in life — Leonardo da Vinci began painting the Mona Lisa at 51, and Benjamin Franklin conducted his kite experiment at 46.

“Innovation is a late-peak field,” Arrison told the audience gathered at the Singularity Summit.

Even religion might find a renewed role in a world where death increasingly looks far off, Arrison said. Religion remains as popular as ever despite a doubling of human life expectancy up until now, and so Arrison suggested that religions focused on providing purpose or guidance in life could do well. But religions focused on the afterlife may want to rethink their strategy.

Making ‘Avatar’ real (or not) The boldest scheme for immortality came from media mogul Dmitry Itskov, who introduced his “Project Immortality 2045: Russian Experience.” He claimed support from the Russian Federation’s Ministry of Education and Science, as well as actor Seagal, to create a research center capable of giving humans life-extending bodies.

Itskov’s wildly ambitious plans include creating a humanoid avatar body within five to seven years, transplanting a human brain into a new “body B” in 10 to 15 years, digitally uploading a human brain’s consciousness in 20 to 25 years, and moving human consciousness to hologram-like bodies in 30 to 35 years.

That vision may have exceeded even the optimism of many Singularity Summit attendees, given the apparent restlessness of the crowd during Itskov’s presentation. But it did little to dampen the conference’s overall sense that humanity has a positive future within its collective grasp — even if some people still need to be convinced.

“We are storming the fricking barricades of death, both physically and intellectually, so we have to make it sexy,” said Jason Silva, a filmmaker and founding producer/host for Current TV.

By Jeremy Hsu

    10/17/2011 7:39:40 PM ET2011-10-17T23:39:40

You can follow InnovationNewsDaily Senior Writer Jeremy Hsu on Twitter @ScienceHsu. Follow InnovationNewsDaily on Twitter @News_Innovation, or on Facebook.

Artificial Hippocampus, the Borg Hive Mind, and Other Neurological Endeavors

Artificial Hippocampus, the Borg Hive Mind, and Other Neurological Endeavors

November 15

Many of us know about ‘Borg Hive Mind’ from TV programs where the characters are linked through brain-to-brain or computer-to-brain interactions. However, this is more than a science fiction fantasy. The idea was contemplated seriously in the 2002 National Science Foundation report, Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science. ‘Techlepathy‘ is the word coined, referring to the communication of information directly from one mind to another (i.e. telepathy) with the assistance of technology.

Many research activities focus on neuro-engineering and the cognitive sciences. Many neuroscientists and bioengineers now work on:

  • cognitive computing
  • digitally mapping the human brain (see here and here); the mouse brain map has just been published
  • developing microcircuits that can repair brain damage, and
  • other numerous projects related to changing the cognitive abilities and functioning of humans, and artificial intelligence.

Journals exist for all of these activities — including the Human Brain Mappingjournal. Some envision a Human Cognome Project. James Albus, a senior fellow and founder of the Intelligent Systems Division of the National Institute of Standards and Technology believes the era of ‘engineering the mind‘ is here. He has proposed a national program for developing a scientific theory of the mind.

Neuromorphic engineering, Wikipedia says, “is a new interdisciplinary discipline that takes inspiration from biology, physics, mathematics, computer science and engineering to design artificial neural systems, such as vision systems, head-eye systems, auditory processors, and autonomous robots, whose physical architecture and design principles are based on those of biological nervous systems.”

mind computer

There are many examples.

Researchers from Harvard University have linked nanowire field-effect transistors to neurons. Three applications are envisioned: hybrid biological/electronic devices, interfaces to neural prosthetics, and the capture of high-resolution information about electrical signals in the brain. Research is advancing in four areas: neuronal networks, interfaces between the brain and external neural prosthetics, real-time cellular assays, and hybrid circuits that couple digital nanoelectronic and biological computing components.

Numenta, a company formed in 2005, states on its webpage that it “is developing a new type of computer memory system modelled after the human neocortex.”

Kwabena Boahen, an associate professor of bioengineering at Stanford University, has developed Neurogrid, “a specialized hardware platform that will enable the cortex’s inner workings to be simulated in detail — something outside the reach of even the fastest supercomputers.” He is also working on a silicon retina and a silicon chip that emulates the way the juvenile brain wires itself up.

Researchers at the University of Washington are working on an implantable electronic chip that may help to establish new nerve connections in the part of the brain that controls movement.

The Blue Brain project — a collaboration of IBM and the Ecole Polytechnique Federale de Lausanne, in Lausanne, Switzerland – will create a detailed model of the circuitry in the neocortex.

A DNA switchnanoactuator‘ has been developed by Dr. Keith Firman at the University of Portsmouth and other European researchers, which can interface living organisms with computers.

Kevin Warwick had an RFID transmitter (a future column will deal with RFID chips) implanted beneath his skin in 1998, which allowed him to control doors, lights, heaters, and other computer-controlled devices in his proximity. In anotherexperiment, he and his wife Irena each had electrodes surgically implanted in their arms. The electrodes were linked by radio signals to a computer which created a direct link between their nervous systems. Kevin’s wife felt when he moved his arm.

mind

In his book I, Cyborg, Kevin Warwick imagines that 50 years from now most human brains will be linked electronically through a global computer network.

St. Joseph’s Hospital in the United States has implanted neurostimulators (deep brain stimulators) using nanowires to connect a stimulating device to brain. A pacemaker-like device is implanted in the chest, and flexible wires are implanted in the brain. Electrical impulses sent from the ‘pacemaker’ to the brain are used to treat Parkinson’s, migraine headaches and chronic pain, depression, obsessive-compulsive disorder, improve the mobility of stroke victims, and curb cravings in drug addicts.

In 2003/2004 a variety of publications (see links below) reported on the efforts of professor Theodore W. Berger, director of the Center for Neural Engineering at the University of Southern California, and his colleagues, to develop the world’s firstbrain prosthesis – an ‘artificial hippocampus’ which is supposed to act as a memory bank. These publications highlighted in particular the use of such implants for Alzheimer’s patients.

The research program is proceeding in four stages: (1) tests on slices of rat brains kept alive in cerebrospinal fluid… reported as successful in 2004; (2) tests on live rats which are to take place within three years; (3) tests on live monkeys; and (4) tests on humans — very likely on Alzheimer’s patients first.

The Choice is Yours

If these advancements come to pass, they will create many ethical, legal, privacy and social issues. For the artificial hippocampus we should ask: would brain implants force some people to remember things they would rather forget? Could someone manipulate our memory? What would be the consequence of uploading information (see my education column)? Will we still have control over what we remember? Could we be forced to remember something over and over? If we can communicate with each other through a computer what will be the consequence of a Global Brain?

It is important that people become more involved in the governance of neuro-engineering and cognitive science projects. We should not neglect these areas because we perceive them to be science fiction. We also need to look beyond the outlined ‘medical applications.’ If the artificial hippocampus works, it will likely be used for more than dealing with diseases.

I will cover brain-machine interfaces, neuro-pharmaceutical-based ‘cognitive enhancement,’ and neuroethics and the ethics of artificial intelligence in future columns.

Gregor Wolbring is a biochemist, bioethicist, science and technology ethicist, disability/vari-ability studies scholar, and health policy and science and technology studies researcher at the University of Calgary. He is a member of the Center for Nanotechnology and Society at Arizona State University; Member CAC/ISO – Canadian Advisory Committees for the International Organization for Standardization section TC229 Nanotechnologies; Member of the editorial team for the Nanotechnology for Development portal of the Development Gateway Foundation; Chair of the Bioethics Taskforce of Disabled People’s International; and Member of the Executive of the Canadian Commission for UNESCO. He publishes the Bioethics, Culture and Disability website, moderates a weblog forthe International Network for Social Research on Diasbility, and authors a weblogon NBICS and its social implications.

Resources
 

Scientists at MIT replicate brain activity with chip,,,

BBC

Scientists at MIT replicate brain activity with chip

A graphic of a brain
17 November 2011  at 20:42 GMT
The chip replicates how information flows around the brain

Scientists are getting closer to the dream of creating computer systems that can replicate the brain.

Researchers at the Massachusetts Institute of Technology have designed a computer chip that mimics how the brain’s neurons adapt in response to new information.

Such chips could eventually enable communication between artificially created body parts and the brain.

It could also pave the way for artificial intelligence devices.

There are about 100 billion neurons in the brain, each of which forms synapses – the connections between neurons that allow information to flow – with many other neurons.

This process is known as plasticity and is believed to underpin many brain functions, such as learning and memory.

Neural functions

The MIT team, led by research scientist Chi-Sang Poon, has been able to design a computer chip that can simulate the activity of a single brain synapse.

Activity in the synapses relies on so-called ion channels which control the flow of charged atoms such as sodium, potassium and calcium.

The ‘brain chip’ has about 400 transistors and is wired up to replicate the circuitry of the brain.

Current flows through the transistors in the same way as ions flow through ion channels in a brain cell.

“We can tweak the parameters of the circuit to match specific ions channels… We now have a way to capture each and every ionic process that’s going on in a neuron,” said Mr Poon.

Neurobiologists seem to be impressed.

It represents “a significant advance in the efforts to incorporate what we know about the biology of neurons and synaptic plasticity onto …chips,” said Dean Buonomano, a professor of neurobiology at the University of California.

“The level of biological realism is impressive,” he added.

The team plans to use their chip to build systems to model specific neural functions, such as visual processing.

Such systems could be much faster than computers which take hours or even days to simulate a brain circuit. The chip could ultimately prove to be even faster than the biological process.

More on This Story

Related Stories

Developing a human brain in brain chip for a hybrid brain,,,

BBC News

 Tuesday, 11 March 2008, 10:32 GMT 

Chemical brain controls nanobots
By Jonathan Fildes
Science and technology reporter, BBC News

Artificial brain
The researchers have already built larger ‘brains’

A tiny chemical “brain” which could one day act as a remote control for swarms of nano-machines has been invented.

The molecular device – just two billionths of a metre across – was able to control eight of the microscopic machines simultaneously in a test.

Writing in Proceedings of the National Academy of Sciences, scientists say it could also be used to boost the processing power of future computers.

Many experts have high hopes for nano-machines in treating disease.

“If [in the future] you want to remotely operate on a tumour you might want to send some molecular machines there,” explained Dr Anirban Bandyopadhyay of the International Center for Young Scientists, Tsukuba, Japan.

“But you cannot just put them into the blood and [expect them] to go to the right place.”

Dr Bandyopadhyay believes his device may offer a solution. One day they may be able to guide the nanobots through the body and control their functions, he said.

“That kind of device simply did not exist; this is the first time we have created a nano-brain,” he told BBC News.

Computer brain

The machine is made from 17 molecules of the chemical duroquinone. Each one is known as a “logic device”.

How nanotechnology is building the future from the bottom up

They each resemble a ring with four protruding spokes that can be independently rotated to represent four different states.

One duroquinone molecule sits at the centre of a ring formed by the remaining 16. All are connected by chemical bonds, known as hydrogen bonds.

The state of the control molecule at the centre is switched by a scanning tunnelling microscope (STM).

These large machines are a standard part of the nanotechnologist’s tool kit, and allow the viewing and manipulation of atomic surfaces.

Using the STM, the researchers showed they could change the central molecule’s state and simultaneously switch the states of the surrounding 16.

“We instruct only one molecule and it simultaneously and logically instructs 16 others at a time,” said Dr Bandyopadhyay.

The configuration allows four billion different possible combinations of outcome.

The two nanometre diameter structure was inspired by the parallel communication of glial cells inside a human brain, according to the team.

Robot control

To test the control unit, the researchers simulated docking eight existing nano-machines to the structure, creating a “nano-factory” or a kind of “chemical swiss army knife”.

Nano dust (SPL)

Scientists believe nano-machines could have medical applications

The attached devices, created by other research groups, included the “world’s tiniest elevator”, a molecular platform that can be raised or lowered on command.

The device is about two and a half nanometres (billionths of a metre) high, and the lift moves less than one nanometre up and down.

All eight machines simultaneously responded to a single instruction in the simulation.

“We have clear cut evidence that we can control those machines,” said Dr Bandyopadhyay.

This “one-to-many” communication and the device’s ability to act as a central control unit also raises the possibility of using the device in future computers, he said.

Machines built using devices such as this would be able to process 16 bits of information simultaneously.

Current silicon Central Processing Units (CPUs) can only carry out one instruction at a time, albeit millions of times per second.

The researchers say they have already built faster machines, capable of 256 simultaneous operations, and have designed one capable of 1024.

However, according to Professor Andrew Adamatzky of the University of the West England (UWE), making a workable computer would be very difficult at the moment.

“As with other implementations of unconventional computers the application is very limited, because they operate [it] using scanning tunnel microscopy,” he said.

But, he said, the work is promising.

“I am sure with time such molecular CPUs can be integrated in molecular robots, so they will simply interact with other molecular parts autonomously.”

Revolution in Artificial Intelligence,,,

 ScienceDaily: Your source for the latest research news<br /><br />
and science breakthroughs -- updated daily

 

Computer Scientist Leads the Way to the Next Revolution in Artificial Intelligence

ScienceDaily (Apr. 2, 2012) — As computer scientists this year celebrate the 100th anniversary of the birth of the mathematical genius Alan Turing, who set out the basis for digital computing in the 1930s to anticipate the electronic age, they still quest after a machine as adaptable and intelligent as the human brain.



Now, computer scientist Hava Siegelmann of the University of Massachusetts Amherst, an expert in neural networks, has taken Turing’s work to its next logical step. She is translating her 1993 discovery of what she has dubbed “Super-Turing” computation into an adaptable computational system that learns and evolves, using input from the environment in a way much more like our brains do than classic Turing-type computers. She and her post-doctoral research colleague Jeremie Cabessa report on the advance in the current issue ofNeural Computation.

“This model is inspired by the brain,” she says. “It is a mathematical formulation of the brain’s neural networks with their adaptive abilities.” The authors show that when the model is installed in an environment offering constant sensory stimuli like the real world, and when all stimulus-response pairs are considered over the machine’s lifetime, the Super Turing model yields an exponentially greater repertoire of behaviors than the classical computer or Turing model. They demonstrate that the Super-Turing model is superior for human-like tasks and learning.

“Each time a Super-Turing machine gets input it literally becomes a different machine,” Siegelmann says. “You don’t want this for your PC. They are fine and fast calculators and we need them to do that. But if you want a robot to accompany a blind person to the grocery store, you’d like one that can navigate in a dynamic environment. If you want a machine to interact successfully with a human partner, you’d like one that can adapt to idiosyncratic speech, recognize facial patterns and allow interactions between partners to evolve just like we do. That’s what this model can offer.”

Classical computers work sequentially and can only operate in the very orchestrated, specific environments for which they were programmed. They can look intelligent if they’ve been told what to expect and how to respond, Siegelmann says. But they can’t take in new information or use it to improve problem-solving, provide richer alternatives or perform other higher-intelligence tasks.

In 1948, Turing himself predicted another kind of computation that would mimic life itself, but he died without developing his concept of a machine that could use what he called “adaptive inference.” In 1993, Siegelmann, then at Rutgers, showed independently in her doctoral thesis that a very different kind of computation, vastly different from the “calculating computer” model and more like Turing’s prediction of life-like intelligence, was possible. She published her findings in Science and in a book shortly after.

“I was young enough to be curious, wanting to understand why the Turing model looked really strong,” she recalls. “I tried to prove the conjecture that neural networks are very weak and instead found that some of the early work was faulty. I was surprised to find out via mathematical analysis that the neural models had some capabilities that surpass the Turing model. So I re-read Turing and found that he believed there would be an adaptive model that was stronger based on continuous calculations.”

Each step in Siegelmann’s model starts with a new Turing machine that computes once and then adapts. The size of the set of natural numbers is represented by the notation aleph-zero, 0, representing also the number of different infinite calculations possible by classical Turing machines in a real-world environment on continuously arriving inputs. By contrast, Siegelmann’s most recent analysis demonstrates that Super-Turing computation has 20, possible behaviors. “If the Turing machine had 300 behaviors, the Super-Turing would have 2300, more than the number of atoms in the observable universe,” she explains.

The new Super-Turing machine will not only be flexible and adaptable but economical. This means that when presented with a visual problem, for example, it will act more like our human brains and choose salient features in the environment on which to focus, rather than using its power to visually sample the entire scene as a camera does. This economy of effort, using only as much attention as needed, is another hallmark of high artificial intelligence, Siegelmann says.

“If a Turing machine is like a train on a fixed track, a Super-Turing machine is like an airplane. It can haul a heavy load, but also move in endless directions and vary its destination as needed. The Super-Turing framework allows a stimulus to actually change the computer at each computational step, behaving in a way much closer to that of the constantly adapting and evolving brain,” she adds.

Siegelmann and two colleagues recently were notified that they will receive a grant to make the first ever Super-Turing computer, based on Analog Recurrent Neural Networks. The device is expected to introduce a level of intelligence not seen before in artificial computation.

Efficiency in Multi-Core Chips “computerbrain”

New Bandwidth Management Techniques Boost Operating Efficiency in Multi-Core Chips

ScienceDaily (May 25, 2011) — Researchers from North Carolina State University have developed two new techniques to help maximize the performance of multi-core computer chips by allowing them to retrieve data more efficiently, which boosts chip performance by 10 to 40 percent.


To do this, the new techniques allow multi-core chips to deal with two things more efficiently: allocating bandwidth and “prefetching” data.

Multi-core chips are supposed to make our computers run faster. Each core on a chip is its own central processing unit, or computer brain. However, there are things that can slow these cores. For example, each core needs to retrieve data from memory that is not stored on its chip. There is a limited pathway — or bandwidth — these cores can use to retrieve that off-chip data. As chips have incorporated more and more cores, the bandwidth has become increasingly congested — slowing down system performance.

One of the ways to expedite core performance is called prefetching. Each chip has its own small memory component, called a cache. In prefetching, the cache predicts what data a core will need in the future and retrieves that data from off-chip memory before the core needs it. Ideally, this improves the core’s performance. But, if the cache’s prediction is inaccurate, it unnecessarily clogs the bandwidth while retrieving the wrong data. This actually slows the chip’s overall performance.

“The first technique relies on criteria we developed to determine how much bandwidth should be allotted to each core on a chip,” says Dr. Yan Solihin, associate professor of electrical and computer engineering at NC State and co-author of a paper describing the research. Some cores require more off-chip data than others. The researchers use easily-collected data from the hardware counters on each chip to determine which cores need more bandwidth. “By better distributing the bandwidth to the appropriate cores, the criteria are able to maximize system performance,” Solihin says.

“The second technique relies on a set of criteria we developed for determining when prefetching will boost performance and should be utilized,” Solihin says, “as well as when prefetching would slow things down and should be avoided.” These criteria also use data from each chip’s hardware counters. The prefetching criteria would allow manufacturers to make multi-core chips that operate more efficiently, because each of the individual cores would automatically turn prefetching on or off as needed.

Utilizing both sets of criteria, the researchers were able to boost multi-core chip performance by 40 percent, compared to multi-core chips that do not prefetch data, and by 10 percent over multi-core chips that always prefetch data.

The paper, “Studying the Impact of Hardware Prefetching and Bandwidth Partitioning in Chip-Multiprocessors,” will be presented June 9 at the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) in San Jose, Calif. The paper was co-authored by Dr. Fang Liu, a former Ph.D. student at NC State. The research was supported, in part, by the National Science Foundation.

NC State’s Department of Electrical and Computer Engineering is part of the university’s College of Engineering.

Roll over headlines to view top news summaries:

Pacemaker for Your Brain: Brain-To-Computer Chip Revolutionizes Neurological Therapy

 

Pacemaker for Your Brain: Brain-To-Computer Chip Revolutionizes Neurological Therapy

ScienceDaily (June 28, 2010) — By stimulating certain areas of the brain, scientists can alleviate the effects of disorders such as depression or Parkinson’s disease. That’s the good news. But because controlling that stimulation currently lacks precision, over-stimulation is a serious concern — losing some of its therapeutic benefits for the patient over time.



Now a Tel Aviv University team, part of a European consortium, is delving deep into human behavior, neurophysiology and engineering to create a chip that can help doctors wire computer applications and sensors to the brain. The chip will provide deep brain stimulation precisely where and when it’s needed.

Prof. Matti Mintz of Tel Aviv University’s Psychobiology Research Unit in its Department of Psychology is focusing on the behavioral-physiological aspects of the research. He and the rest of the international research team are working toward a chip that could help treat some diseases of the mind in just a few years. The platform, says Prof. Mintz, is flexible enough to provide a basis for a variety of clinical experiments, and tools which can be programmed for specific disorders. For example, the chip could restore lost functions of the brain after a traumatic brain injury from a car accident or stroke.

Reversing strokes, depression and aging

The team’s methodology is straightforward — they record activity using electrodes implanted in diseased areas of the brain. Based on an analysis of this activity, they develop algorithms to simulate healthy neuronal activity which are programmed into a microchip and fed back into the brain.

For now, the chip, called the Rehabilitation Nano Chip (or ReNaChip), is hooked up to tiny electrodes which are implanted in the brain. But as chips become smaller, the ReNaChip could be made small enough to be “etched” right onto the electrodes themselves.

For therapeutic purposes, though, only the electrodes will be inserted into the brain. “The chip itself can be implanted just under the skin, like pacemakers for the heart,” says Prof. Mintz, who is currently conducting experiments on animal models, “ensuring that the brain is stimulated only when it needs to be.”

One of the challenges of the proposed technology is the size of the electrodes. The researchers hope to further miniaturize deep brain electrodes while adding more sensors at the same time says Prof. Mintz. His Tel Aviv University colleague and partner Prof. Yossi Shaham-Diamond is working on this problem.

The international multidisciplinary team, includes other researchers from TAU — Prof. Hagit Messer-Yaron and Dr. Mira Kalish — and partners from Austria, England and Spain, regularly converge on the TAU campus to update and integrate new components of the set-up and monitor the progress of the chip in live animals in Prof. Mintz’s lab.

A two-way conversation

The idea that a chip can interface between inputs and outputs of certain brain area is a very new concept in scientific circles, Prof. Mintz notes, although movies and TV shows about bionic humans have been part of the popular culture for decades. The researchers say that their ReNaChip could help people whose brains have deteriorated with age or been damaged by injury and disease. The chip will not only provide a bionic replacement for lost neuronal function in the brain, under ideal conditions, it could significantly rehabilitate the brain.

Currently, the researchers are attempting to rehabilitate motor-learning functions lost due to brain damage. “We are attaching the chip to the brain to stimulate relatively simple brain behaviors,” says Prof. Mintz. A controlled treatment for drug resistant epilepsy, based on the team’s technology, could be only a few years away, he says.

Public awareness of the technologies and experiments on humans and its impact on individuals and society in Sweden and Europe / USA.

Public awareness of the MIND CONTROL Technologies and experiments on humans and its impact on individuals and society in Sweden and Europe.

Only within a small sphere of military / medical classified research and industrial projects are factual knowledge available. It has once been of scientific research has focused on the new technologoist is developed into a commercial orgy of humantorture and humiliation,injury to a third party carried out by researchers and their speaking computers with artificial intelligence.

How long shall attempt to sacrifice their families and work have to fight for their human rights in the frenzy of abuse that is now underway on software developed for mapping the brain. 25-04-2010. MINDTECH seeks to establish a network of laymen and media. This group will be dealing with the social and ethical sides to research, development and the implementation of emerging technologies in our society. The most interesting part are the Direct Human Brain – artifcial intelegence – Interface System technologies. MINDTECH will do extensive and thorough research into this totally new area, which at this point, is being investigated only by the few.

bluered.gif (1041 bytes)

Implant chip in the human brain.Synthetic telepathy is communication systems built on thoughts, not speech. Multimedia communication network is based. Brain copying is performed around the clock, largely by learning computer, copying is nothing short of serious torture. No one would voluntarily give informed consent to this serious research abuse. It takes years of learning and program development to develop the new computer-brain interfaces and multimedia language between man and computer. Subjects are now against their will has been online for 6.5 years on Man-Brain-Computer-Interface.

Neurological research has progressed so far that you can hack the neural system is wireless, which means that a computer can communicate with your brain and store all your sensory experiences, and then studying your kognetiva behavior, ie, the ultimate human study. The commercial user fields are endless and it feels no need to explain the far-reaching consequences when abused. This technology brain-computer interaction has happened during the 2000’s and will revoltion our way of life.

bluered.gif (1041 bytes)

“The right to search for truth implies also a duty one must not conceal any part of what one has found to be true”

( ALBERT EINSTEIN)

417193_10150590212497245_184416517244_9626031_2090991766_n

Brain-implant-chip.

bluered.gif (1041 bytes)

IBM: Mind reading within reach in 5 years

The world is changing fast–maybe faster than we ever thought. And within five years, science fiction is going to turn into non-fiction. We’ll be able to read each other’s minds.

brain_chip_interface_bridge

These are just three of the five predictions IBM announced this morning as part of its annual “5 in 5” prognostication project.

December 19, 2011 12:12 PM

The list is meant to promote long-term work being done under Big Blue’s Smarter Planet initiative–and the company says “5 in 5″ already has a track record of success. In 2008, IBM says, it suggested that within five years, consumers would talk to the Web–and the Web would respond. This, the predictions are a bit more :

  • Mind reading is no longer science fiction.
  • You will never need a password again.
  • The digital divide will cease to exist.
  • Junk mail will become priority mail.

It would seem the most interesting idea posited by IBM is the one about reading minds. But lest you think that what its scientists are saying is that you’ll be able to glare at a friend–or perhaps more importantly, an enemy–and know what he or she is thinking, that may be more than five years off. Rather, this is about how our brain implant might someday be synced with computing devices: If you just need to think about calling someone, it happens. Or you can control the cursor on a computer screen just by thinking about where you want to move it.

ibm brain

We’ve been issuing the Next 5 in 5 predictions for the past six years. So, how are we doing? Mindful of the difficulty, and considering the fact that for most of the predictions less than five years have passed, we’ve done pretty well. Two of the first year’s predictions, for instance, have pretty much come true: We will be able to access healthcare remotely from just about anywhere in the world. Today, through telemedicine, patients can connect with physicians or specialists from just about anywhere via inexpensive computers and broadband networks. Doctors can view x-rays and other diagnostic imagery from thousands of miles away. Technologies the size of a few atoms will address areas of environmental importance. Nanotechnology is now used in countless fields and industries, including agriculture, biotechnology and sensor networks, enabling us to understand and interact with the naturals.

world in my eyes

Mr Computer’s capabilities and human-like reasoning cannot be understated.

Read moore: http://www.mindcontrol.se/?page_id=6776

Mon Jan 16, 2012 7:54 PM EST

Predictions from other years have panned out as well. A couple of examples: You will have a crystal ball for your health. Thanks to advances in genetic research and high-performance computing it is now possible to affordably decipher an individual’s entire genome. This makes it possible for physicians to alert people to medical conditions they might fall prey to, and it clears the pathway, eventually, to truly personal medicine. You will talk to the Web…and the Web will talk back. Today, speech recognition and mobile communications technologies make it possible for people to talk to the Internet using their computers or mobile phones, be understood, and listen to automated voices that are responsive to their needs. The Next 5 in 5 initiative got its start in an IBM Innovation Jam in 2006. The seed goal was to get the entire company thinking about grand challenges. “If you give people a grand challenge you push them to really innovate,” says Meyerson. “That’s when extraordinary things can happen.” IBM has played a significant role in each of these breakthroughs. So, it’s working.

Brain hive mind

 Brain-chip.

bluered.gif (1041 bytes)

By: Anders Sandberg. Oxford U.K An implant. It is an independent processor linked to the neurocomputer built to house an artifcial intelegence. The artifcial intelligence program has access to the sensory data and information in the neurocomputer, and can “read” surface thoughts of the owner (of course, access controls can be set if needed, both in the implant and the (artifcial intelegence). Having a (or several) as advisor/secretary/partner is becoming more and more common, although most people rely on an external artifcial intelegence system and a wireless neural connection. It is not uncommon for users to get a motoric shunt to give the artifcial intelegence the ability to control the body.Chips with monitoring artifcial intelegence are sometimes used for or behaviour correction in Landfall.

Brain dollar

Moodulator

bluered.gif (1041 bytes)

An implant of the limbic system, enabling the owners to control their moods. Normally it just sets an allowed range and a bias (e.g. towards cheerfulness or calm), but it can also induce stronger emotional states. The implant is somewhat dangerous due to the risk of addiction to extreme positive states; most users at least tend to improve their mood. Originally it was developed on Nova for treatment of certain emotional disorders, especially the rare but devastating OIAIS (Ocean Induced AutoImmune Syndrome, an autoimmune illness induced by certain poisons causing severe mood swings due to damage of the limbic system). Later more widespread use developed. There are also moodcasters, systems sending signals to the implants of people who have allowed access. Moodcasters are mainly used in virtual dramas.Autonomous control bluered.gif (1041 bytes)

Enables the owner to control many aspects of the autonomous nervous system such as hunger, sleep or pain. Turning off these functions are of course dangerous, but sometimes useful. It can also act as a super-alarm clock (guaranteed to wake you up) or “homeostatic tuner” to optimise the hormone balance of the body.

future_human_evolution_banner

bluered.gif (1041 bytes)

Mind Control “Brain Control” and Brain Cloning !

“To build a Computerbrain”

neuro waves

occupy our mind


Are You a Robosapiens YET ?

One of the most powerful weapons are now targeting some of the civilian population in Europe during its development. The weapon is called brain implants and synthetic telepathy. Synthetic telepathy covers mind reading, and artificial intelligence, to clone the brain and build a computerbrain. People who are involved in the development of invasive imaging of the brain and nervous system without their consent has no legal protection, no human rights, and no medical help. Instead of receiving protection diagnosed these people to suffer from a mental illness. Research is conducted 24 / 7 over the aging process.
We want this website to create an awareness and an awareness that many of the new technologies described developed on the civilian population in Sweden and Europe, without their consent and / or knowledge, for this many years.
Mindtech cooperate with the media and the Swedish / European companies to try to enforce the ethics debate. An ethical debate that has since been blacked out by the research and its representatives.
 
Know someone who is multi-media online but do not dare talk about it?
It is easy not to be believed for the person who claims that a paradigm shift in computer-brain integration and multimedia technology is already here.
 
We are aware that part of the information here may sound like pure science fiction, but it is already a reality.

bluered.gif (1041 bytes)

 

computing brain

.bluered.gif (1041 bytes)

Brain Implants and miniaturized Signal Analysis System is implanted in people without their informed consent, in hospitals all over Europe. The systems are used to clone, and make an artificial copy of the human life, including their nervous system, memory, learning and emotions. This type of illegal research of are impossible to detect. This crimes can continue because yet there is no technology that can detect bioelectronics/neuroelectronics in nano size. The artificial intelligence which performs the majority of the research work, is programmed as a war machine that does not hesitate from any means in order to improve its learning and cloning of a human. This intelligence acquire continuously, more and more unreasonable arguments for continuing its work to grow, including the use of gross physical and mental abuse in an attempt to uphold ”companionship” with the person who is under intrusion. This is also a war between humans and the new computer brains.
implant
These works are aimed at exploring and expose the techno-ethics /Human-Brain- of human interactions with adaptive and cognitive systems developed in the framework of Computer, Bionics, and Artificial Intelligence “computerbrain”.These interactions notably include:
– Human, Brain-Computer non-invasive interactions, involving (AI) autonomous computer which inhabit human environments;
– Human, Brain-machine invasive interactions, involving bionic systems for restoring or enhancing human functionalities;
– Human Brain-softbot interactions, involving AI systems for information access and communication like a Computerbrain, with related areas of applied ethics, concerns:
– Preservation and promotion of human freedom, rights, and identity;
– Fair access to adaptive BRAIN, machinery resources;
– Scientific method and techno-ethical policies;
– Precautionary principles in human-machine interactions;
– Responsibilities for cooperative human-machine deliberation and action;
– Machine autonomy and accountability;
– Individual and societal impact of human brain-machine cognitive and affective bonds;
– Intercultural aspects of robosapiens development, design, and use.

brain globe

Scientists Successfully Implant Chip That Controls The Brain

Allowing

Thoughts, Memory And Behavior To Be Transferred From One

Brain To Another Brain

Brain mind uploading

 In a scene right out of a George Orwell novel, a team of scientists working in the fields of “neural engineering” and “Biomimetic MicroElectronic Systems” have successfully created a chip that controls the brain and can be used as a storage device for long-term memories. In studies the scientists have been able to record, download and transfer memories into other hosts with the same chip implanted. The advancement in technology brings the world one step closer to a global police state and the reality of absolute mind control.

brain eye neuron nano

More terrifying is the potential for implementation of what was only a science fiction fantasy – the “Thought Police” – where the government reads people’s memories and thoughts and then rehabilitate them through torture before they ever even commit a crime based on a statistical computer analysis showing people with certain types of thoughts are likely to commit a certain type of crime in the future.

We already pre-emptively invade nations and torture alleged terrorist suspects with absolutely no due process of law, so the idea of pre-emptively torturing a terrorist suspect before hand to prevent them from committing an act of terrorism in the future really isn’t that far fetched of an idea.

Perhaps a less sensational example, than those I just depicted out of own of Orwell’s famous dystopian novels would be using the technology as it is depicted the modern day Matrix movies, in which computer programs are uploaded into people’s brains allowing them to instantly learn how to perform a wide variety of tasks.

That is exactly the example that Smart Planet uses in their write-up on the USC press release.

Wideband Link

bluered.gif (1041 bytes)

The implants used to achieve group consciousness. Unlike an ordinary neuro, (atrificial intelligence) inteface it connects to most of the cerebral cortex and has a much higher bandwidth. It can send and receive signals not just of primary sensory and motor information but also higher order associations and thoughts. Since each human has an individual “mental language” sophisticated translation systems and much training is required before digital telepathy is possible. Wideband links are also used by the Net Transcendence and Next Step Foundation in their experiments with expanding the human mind. One of the most controversial and interesting applications is to let software rewrite parts of the cortex; theoretically this could be the ultimate psychodesign, even if it is currently extremely crude.

nano implant

Medial forebrain pacemaker

bluered.gif (1041 bytes)

An implant in the motivation and pleasure centres that is controlled by the owner’s neurocomputer. It is illegal and very addictive: users quickly become hooked on anything that activates it. It can be used together with behaviour therapy to change habits and personality.

Thought Control – a new ethical problem! Being able to connect the human brain to a computer via electrodes open, of course, frightening possibilities. Will it be possible to control a person’s thoughts?

There are important ethical aspects of this. It would, of course, theoretically able to control brain functions and modify the human personality. For example, make them more or less prone to aggression or to increase learning ability by adding to chronic stimulation. It’s like with everything else, with the knowledge that there can use it in many ways, “says Göran Lundborg Sweden

People who are exposed without informed consent for research abuse and torture of the new technology, explained idiot when they seek help from authorities. This lack of knowledge caused by the researchers to withhold reports on the technology’s existence

——————————-

By: Anders Sandberg. Oxford U.K

The future may well involve the reality of science fiction’s cyborg, persons who have developed some intimate and occasionally necessary relationship with a machine. It is likely that implantable computer chips acting as sensors, or actuators, may soon assist not only failing memory, but even bestow fluency in a new language, or enable “recognition” of previously unmet individuals. The progress already made in therapeutic devices, in prosthetics, and Brain  in computer science indicate that it may well be feasible to develop direct interfaces between the brain and computers.

Colleague, Professor Gershenfeld, asserts that “in 5 years, computers will be everywhere; in 10 years, embedded by bioengineers in our bodies…” Neither visionary professes any qualms about this project, which they expect to alter human nature itself. “Suddenly technology has given us powers with which we can manipulate not only external reality — the physical world — but also, and much more portentously, ourselves.” Once networked the result will be a “collective intellegence, consciousness”, “the hive mind.” “The hive mind…is about taking all these trillions of cells in our skulls that make individual intelligence. consciousness and putting them together and arriving at a new kind of consciousness that transcends all the individuals.”

BRAIN CHIP FUTURE..By: Ellen.McGee and MQ Maguire Jr (KTH  STOCKHOLM SWEDEN)

A collaboration with mindtech

Mindtech To this information about the revolution highlighting interdisciplinary research, without informed consent to communicate with mind- brain-computer interface.

It’s about providing information to create a general awareness that leads to an ethical debate about this technology. This will hopefully lead to a legislation against the misuse of technology.

It is also about identifying who or what in Sweden and Europe who have illegally engaged in research on people under torture forms.

Mindtech cooperate with the media, church,  the private sector and victims of this research.

Contact us via the contact form.

By: Magnus Olsson / SWEDEN

Scientists to study synthetic telepathy (UCIrvine)

UC Irvine TODAY

Press Releases & Media Advisories Archives > Press Release

Scientists to study synthetic telepathy 
Researchers get grant to develop communication system based on thoughts, not speechIrvine, Calif., August 13, 2008A team of UC Irvine scientists has been awarded a $4 million grant from the U.S. Army Research Office to study the neuroscientific and signal-processing foundations of synthetic telepathy.The research could lead to a communication system that would benefit soldiers on the battlefield and paralysis and stroke patients, according to lead researcher Michael D’Zmura, chair of the UCI Department of Cognitive Sciences.

“Thanks to this generous grant we can work with experts in automatic speech recognition and in brain imaging at other universities to research a brain-computer interface with applications in military, medical and commercial settings,” D’Zmura says.

The brain-computer interface would use a noninvasive brain imaging technology like electroencephalography to let people communicate thoughts to each other. For example, a soldier would “think” a message to be transmitted and a computer-based speech recognition system would decode the EEG signals. The decoded thoughts, in essence translated brain waves, are transmitted using a system that points in the direction of the intended target.

“Such a system would require extensive training for anyone using it to send and receive messages,” D’Zmura says. Initially, communication would be based on a limited set of words or phrases that are recognized by the system; it would involve more complex language and speech as the technology is developed further.”

D’Zmura will collaborate with UCI cognitive science professors Ramesh Srinivasan, Gregory Hickok and Kourosh Saberi. Joining the team are researchers Richard Stern and Vijayakumar Bhagavatula from Carnegie Mellon University and David Poeppel from the University of Maryland.

The grant comes from the U.S. Department of Defense’s Multidisciplinary University Research Initiative program, which supports research involving more than one science and engineering discipline. Its goal is to develop applications for military and commercial uses.

About the University of California, Irvine: The University of California, Irvine is a top-ranked university dedicated to research, scholarship and community service. Founded in 1965, UCI is among the fastest-growing University of California campuses, with more than 27,000 undergraduate and graduate students and nearly 2,000 faculty members. The third-largest employer in dynamic Orange County, UCI contributes an annual economic impact of $3.6 billion. For more UCI news, visitwww.today.uci.edu .

News Radio: UCI maintains on campus an ISDN line for conducting interviews with its faculty and experts. The use of this line is available free-of-charge to radio news programs/stations who wish to interview UCI faculty and experts. Use of the ISDN line is subject to availability and approval by the university.

The NSA – Behind The Curtain

The NSA – Behind The Curtain

Mon Jan 16, 2012 7:54 PM EST

Say hello to Mr Computer…

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

 I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

 Mr Computer

 The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

 Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

 Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

Mr Computer’s capabilities and human-like reasoning cannot be understated.

Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

The Pipes Are Calling

First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

A mixture of ground, air and satellite-based networks are used to deliver this capability.

Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

Input, Input, Input

Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

Ignore any suggestion that this too much data.  The truth is that all the communications happening on the planet right now can be monitored in near real-time.

As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

Hardware

This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.

My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems.  With their base costs, they could be running several hundred easily.

In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.

The Thinking Machine

Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

Eidolon TLP – Mr Computer in incognito

Conclusion

The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.

At some point, it could be your turn.

What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:

81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) monthsprior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.

http://cryptome.org/mayer-016.htm

The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.

The NSA is a deeply corrupt organisation, that has little regards for the rights of others.  Never trust a government, even your own, implicitly.  Nations change, opinions change and people change.  It just takes the right catalyst for it to happen.

In most cases, you will find the seeds were always there, you just chose to ignore them.