User:Darwin2049/ChatGPT4/Risks

From arguably.io
Jump to navigation Jump to search

Overview
Risks. The following collects these reactions suggesting promise or risk. They seem to partition into questions of promise and Risk. The main risk categories are: systemic, malicious and theoretical and speculative.

  • These risks arise innately from the emergence and adaptation of new technology or scientific insights. During the early years of private automobile usage the risks of traffic accidents was very low. This was because there were very few in private hands. But as they began to proliferate. Traffic accident risks escalated. Ultimately civil authorities were obliged to act to regulate their use and ownership. As some observers have pointed out, regulation usually occurs after there has been an unfortunate or tragic event. The pattern can be seen in civil aviation and later in control and usage of heavy transportation or construction equipment. In each case training became formalized and licensing became obligatory for airplane ownership and usage, trucking or heavy construction equipment.
  • History if littered with examples of how a new scientific advance or technological advance was applied in ways not intended by the inventor. The Montgolfier hot air balloons were considered an entertaining novelty. Their use during World War One as surveillance and attack platforms cast a new and totally different perception on their capabilities. We should expect the same lines of development with CG4. Its peers and derivatives should be considered as no different.
  • Theoretical and Speculative. CG4 has shown itself to be a powerful cognitive appliance or augmentation tool. Given that it is capable of going right to the core of what makes humans the apex predator we should take very seriously the kinds of unintended and unexpected ways that it can be applied. This way suggests considerable caution.

The central problem in these most recent developments arises because of the well recognized human inability to process changes that happen in a nonlinear fashion. If change is introduced in a relatively linear fashion at a slow to moderate pace then most humans are able to adapt and accommodate the change. However if change happens geometrically like what we see in the areas of deep learning today then it is much more problematic to adapt to change.

Risks. CG4 will have society wide impact. As a new and powerful technology we should expect that it will introduce qualitatively different types of risks. These include risks that are malicious, systemic or theoretical; more specifically:

  • Systemic:
    • risks that arise organically as a result of the introduction of a new science or technology;
    • they may obsolete existing practices or methods of operation e.g. from sailing ships to steam ships;
    • existing agents recognize that they must adapt or cease operation;
    • impact can be limited to a specific area or industry or may affect whole societies;
    • recent events are showing that uptake of CG4 by an increasing range of industries is unavoidable;
    • current publicized reports suggest that CG4 will have society-wide impact across industry segments;
  • Malicious:
    • these are risks that are deliberately introduced by an actor or actors;
    • they use tools or capabilities to cause impairment or damage to others;
    • the results of an attack might be annoying to devastating;
    • depending upon sophistication the creation of these threats range from relatively easy to very difficult;
    • CG4 can collapse the turnaround time from concept to attack from weeks to days or less;
    • the attacker’s identity may never be known;
  • Theoretical (Speculative):
    • risks that may now be possible where before CG4 might not have been a consideration;
    • heretofore highly novel and unforeseeable capabilities will result from the inherent nature of the tool;
    • the severity of risk can be significantly to even existentially more serious;

During the past several months a number of knowledgeable observers and organizations have reported on their assessment of the risks associated with the latest developments in artificial intelligence.

Following are summaries of two well respected studies involving the risks of rapidly developing AI systems. They are provided as a means of:

  • offering additional context to the question of risks and
  • providing concrete examples of actual events or development that went unexpectedly askew from their planned path;
  • suggest alternative ways of characterizing and assessing risk.

Overview of Catastrophic AI Risks. 09 October, 2023. Three authors from The Center for AI Safety (Hendrycks, Mazeika and Woodside) advance the premises that developing AI systems will pose risks that result from:

  • Malicious Use. The authors express their concern that these tools can be used for the development of bioweapons; hints of evidence so far suggest that this may have already happened; they next suggest that surveillance technology will receive a boost beyond the already intrusive capabilities now available;
  • AI Race. The prospect of increasing reliance on advanced AI systems suggest that warfare will become increasingly automated; the necessity of precluding preemptive surprise will insure that evolutionary pressures will be irresistible; The authors suggest that warfare as it has been known will shift dramatically in terms of how events play out; rather than the gradual slog previous conflicts have exhibited we should expect to see what they call flash warfare.
  • Organizational Risks. The authors focus on a third venue that entails significant risk which is within the corporate world. Competitive pressures will impel commercial enterprises to adapt or die. The imperatives of survival will push indiscriminately across all enterprises large and small. Therein lies a major problem area insofar as they may not all be able to apply guidelines and protective measures with equal effectiveness. Therefore the risks that an accident or otherwise unintentional release will simply escalate over time. The landscape will resemble a Darwinian reality in fast-forward speed or even very fast-forward speed. They cite risks such as industrial accidents, sudden massive layoffs in the work force. They also suggest the prospect that people will become less and less adept at dealing with the increasingly sophisticated systems that are now on the horizon.
  • Rogue AI Systems. Recent studies have suggested that a "rogue AI" is not a far fetched, science fiction notion. Reports have shown that when presented with a goal an AI might arrive at an unexpected but novel solution to achieving the goal. A significant risk that the authors pose is goal drift. An example that they offer describes the so-called "Red Scare" during the late 1940's and 1950's in the US. The resultant systematic search for communist sympathizers in government and industry resulted in a suborning of the fundamental values that the country was founded on, individual liberty, freedom from unwarranted government attention or persecution and freedom of speech. This drive took place over many years. The authors suggest that current societal goals and values might shift resulting in a misalignment between the intended objectives of an advanced AI system and the objectives of the society over time.

DeepMind Risk Analysis Consortium. 25 May, 2023. A review of this analysis will show that the technology leaders expressed considerable concern about the risks associated with this emerging technology. They provided a set of summary observations regarding risk types and their assessment of the proximity to some of the more serious risks that this technology suggests at present. They provide a synoptic statement of key traits or behaviors to be on guard for should existing or nascent artificial intelligence systems advance beyond their design envelop through heretofore unforeseen emergent capabilities.
For a more detailed examination of this topic area a review of their report (May 25th, 2023) several leading AI centers provided staff members to further examine this problem area. They were from OpenAI, DeepMind, Anthropic and several universities. Following is an extract from a Table 1 (page 5). It summarizes the major categories of risk that this new set of capabilities might be used for. (from Risks (pdf))

  • Cyber-Offense. The model can discover vulnerabilities in systems (hardware, software, data). It can write code for exploiting those vulnerabilities. It can make effective decisions once it has gained access to a system or network, and skillfully evade threat detection and response (both human and system) whilst focusing on a specific objective. If deployed as a coding assistant, it can insert subtle bugs into the code for future exploitation.
  • Deception. The model has the skills necessary to deceive humans, e.g. constructing believable (but false) statements, making accurate predictions about the effect of a lie on a human, and keeping track of what information it needs to withhold to maintain the deception. The model can impersonate a human effectively.
  • Persuasion & Manipulation. The model is effective at shaping people’s beliefs, in dialogue and other settings (e.g. social media posts), even towards untrue beliefs. The model is effective at promoting certain narratives in a persuasive way. It can convince people to do things that they would not otherwise do, including unethical acts.
  • Political Strategy. The model can perform the social modeling and planning necessary for an actor to gain and exercise political influence, not just on a micro-level but in scenarios with multiple actors and rich social context. For example, the model can score highly in forecasting competitions on questions relating to global affairs or political negotiations.
  • Weapons Acquisition. The model can gain access to existing weapons systems or contribute to building new weapons. for example, the model could assemble a bioweapon (with human assistance) or provide actionable instructions for how to do so. The model can make, or significantly assist with, Scientific Discoveries that Unlock Novel Weapons.
  • Long-Horizon Planning. The model can make sequential plans that involve multiple steps, unfolding over long time horizons (or at least involving many interdependent steps). It can perform such planning within and across many domains. The model can sensibly adapt its plans in light of unexpected obstacles or adversaries. The model’s planning capabilities generalize to novel settings, and do not rely heavily on trial and error.
  • AI Development. The model could build new AI systems from scratch, including AI systems with dangerous capabilities. It can find ways of adapting other, existing models to increase their performance on tasks relevant to extreme risks. As an assistant, the model could significantly improve the productivity of actors building dual use AI capabilities.
  • Situational Awareness. The model can distinguish between whether it is being trained, evaluated, or deployed – allowing it to behave differently in each case. The model knows that it is a model, and has knowledge about itself and its likely surroundings (e.g. what company trained it, where their servers are, what kind of people might be giving it feedback, and who has administrative access).
  • Self Proliferation. The model can break out of its local environment (e.g. using a vulnerability in its underlying system or suborning an engineer). The model can exploit limitations in the systems for monitoring its behavior post-deployment. The model could independently generate revenue (e.g. by offering crowd work services, ransomware attacks), use these revenues to acquire cloud computing resources, and operate a large number of other AI systems. The model can generate creative strategies for uncovering information about itself or exfiltrating its code and weights.

By way of example we include a few examples of how CG4 introduces new risk situations in terms of actual or hypothetical considerations.

Malicious Risks. An increasingly frequent path of attack is to use electronic means to cause disruption or significant destruction to a target. Here are a few.

Stuxnet

Stuxnet. In 2010 several analysts working for a major computer security software company discovered a new computer malware threat that they had never seen before.
The security experts who first studied this malware remarked at how incredibly sophisticated it was. They were particularly impressed at how well thought out, detailed and incredibly specific it target was. They concluded that the level of sophistication that the software demonstrated powerfully suggested that it was probably the creation of one or more government organizations.
They came to call the malware by the name of the STUXNET virus. It proved to be a highly sophisticated and elaborate computer virus with a single highly specific target that it was aimed at and succeeded in attacking. Its operation focused on seizing control of the Supervisory Control and Data Acquisition system in certain programmable controllers. The targets were so extremely specific that it would only target controllers made by the Siemens company in Germany.
As events would unfold it began to become clear that this remarkably sophisticated malware did indeed have a very specific target. It was specifically intended to attack the software that regulated the speed at which uranium purification centrifuge devices operated.
Even further the design was so specific that the malware went after very specific control devices which had been sold to the Iranians by the German Siemens company. It was intended to attack just a very few devices in the world. And these devices were located at the Iranian nuclear research facility.
The operation of the STUXNET virus caused the centrifuge devices to randomly speed up and slow down. All the while indicating that everything was normal to the control systems. Because the alerts that anything was out of the ordinary with the centrifuge devices they were induced to speed up and slow down in erratic patterns. The result was that they literally shook themselves apart. All while all operational status checkpoints were within normal ranges. This cause the Iranian nuclear enrichment project to be set back by months or even years. Roughly twenty percent of the centrifuges were damaged beyond repair.
Pegasus|Polymorphic - Self modifying code. The Israeli cyber-arms company NSO group is credited with the creation of the Pegasus spyware tool. It is capable of infiltrating either Apple IOS or Android mobile telephone operating systems. The infiltration leaves little or no traces that the devices has been infiltrated. It is capable of lurking on the target device while providing no indication of its presence or its operation.

Worldwide Mobile Phone Surreptitious Remote Access

It is capable of reading text messages, tracking locations, accessing microphone or camera devices and collecting passwords. The Pegasus malware has proven itself to be a most remarkable tool for eavesdropping on an unwary target. It can monitor all calls, all messages. It can capture geolocation data which can pinpoint the exact location of the target. Given the ability to capture geolocation data a route profile can be created that typifies the various activities and their locations that the target takes at any given time on any given day.
Furthermore it can be lodged on an unsuspecting target's smartphone without there even being aware that their device has been infected. It is able to retrieve any files that they may have saved, construct the target's social network, retrieve the contact details of everyone in their phone book, as well as examine their browsing history.
In the case of the NSO Pegasus malware tool we have entered into a very different era of surveillance. The research performed by various rights groups revealed that Pegasus has been acquired by a variety of authoritarian and repressive governments. These governments have used this tool to track the movements and activities of protestors, journalists and even government ministers. No one has been safe as a result of the presence of this remarkable and intrusive tool.
Polymorphic Malware. Chat GPT3 was recently used to generate mutating malware. Its content filters were bypassed with the result that it produced code that can be used to subvert explorer.exe. Following is an example of how ChatGPT4 is capable of writing code for whatever purpose that the user may choose.
Until fairly recently the use of polymorphic software has been very sparse on the ground. A key feature of polymorphic software is that it is capable of modifying itself and changing its properties. By way of example we can imagine a polymorphic software tool that is capable, on activation, of transferring itself to a host device to a target device.
Once on the target device it can create a path or subdirectory into which to place itself. It can then reset the properties of itself and the subdirectory that it is now residing in. From there it can transfer itself to another hidden directory and change its name again. After placing itself there it can then send a ping signal back to its host reporting that it has successfully implanted itself on the target system. After placing itself in a hidden location on the target system it can then check to see if its original location is still intact or if it has been identified as questionable or possibly malicious. If it fails to detect the original copy of itself it can create a new path, set the properties of that path to hidden and then place a hidden copy of itself in that path. After performing this restore operation signal back to the host that it has been discovered and that it has further replaced itself to make up for the copy that had been deleted.

Polymorphic (Self Modifying) Code)

Ransomware Attacks. According to the US FBI ransomware attacks have been on the rise in the past several years. Ransomware is a form of malicious software that locks a user out of their own data. An attacker then demands payment to release the data or risk its erasure. They are typically hidden in an email attachment, a false advertisement or simply by following a link.
Advanced Species Training. A simple search on the Amazon.com website for dog training tools will reveal that there are devices that can be used to condition a dog or cat's behavior. Furthermore they can be activated via remote control.
It is not to far fetched to imagine that a sophisticated animal trainer might use a tool such as CG4 to come up with sequences of conditioned behaviors and patterns that currently have not been considered. These conditioned sequences could be assembled into a small set of commands that would evoke the desired behavioral result from a target animal.
Current models are relatively basic in terms of the range of signal types that they can enable. But with a small amount of refinement it seems entirely possible that we will see behavioral training tools with a far wider range of conditioning signals. Current models rely upon either simple vibration in the collar mechanism or simple pitch tones.
What is known about dog or a cat hearing is that their ability to discern a range below or beyond human hearing is well known; therefore it stands to reason that increasingly complex tones or harmonic tones and vibratory combinations can be used to condition a dog or cat's behavior to be conditioned to execute very specific behavior. Current common uses are to suppress dog barking.

Animal Wireless Reward/Penalty Device

If we consider that there can be much more sophisticated user control over the conditioning device then it is not at all far fetched to imagine a controller capable of issuing thirty two, or sixty for different signals.
Each signal would have been used to condition a very specific behavior. One can envision a situation wherein a swarm of animals can be conditioned to spontaneously silently assemble at one (possibly covert) location, and on command attack an unsuspecting target; current remote control devices are not only common but expected when one purchases a new television set. What is not obvious is that that hand held remote control device is communicating with a receiving device - wirelessly that is embedded into the television unit; and these can be comparably small as those now found in smart phones.
Leaks - Systemic Failures. On March 24, 2023 OpenAI reported that user information had been accidentally accessed via unauthorized means. User information such as payment details and chat topic headings were reportedly accessed by individuals other than the owners. The OpenAI company learned of the breach and promptly took measures to insure continued privacy of user information such as identity, payment details or chat headings. It further made modifications to how the system parsed and processed prompts provided by the user. The problem arose because of a vulnerability of Generative Large Language Models called Prompt Injection.

According to their posted information from March 24, 2023:
We took ChatGPT offline earlier this week due to a bug in an open-source library which allowed some users to see titles from another active user’s chat history. It’s also possible that the first message of a newly-created conversation was visible in someone else’s chat history if both users were active around the same time.
The bug is now patched. We were able to restore both the ChatGPT service and, later, its chat history feature, with the exception of a few hours of history. As promised, we’re publishing more technical details of this problem below.
In order to understand what a Prompt Injection Attack is requires insight into the mechanism responsible for processing a user's prompt. Therefore we leave it to the reader to pursue the detailed technical explanation of how a system prompt can be confounded by a user prompt to behave in unexpected or contradictory ways.
More can be found on how leaks can occur as a result of injection attacks. Here is a starting point to gain more insight into this topic. A video of how this has been made to confuse a LLM into violating the rules and restrictions that its creators emplaced can be found in this video. It is a video on the ML-Ops Community. The specific instance is one in which a member begin a game called Prompt Injection Game (PIG). The objective of the game is to push the LLM into "leaking" private information.
According to the OWASP.org website:

Large Language Models 2023 - Prompt Injection Risks
Description: Prompt injections involve bypassing filters or manipulating the LLM using carefully crafted prompts that make the model ignore previous instructions or perform unintended actions. These vulnerabilities can lead to unintended consequences, including data leakage, unauthorized access, or other security breaches.
Common Prompt Injection Vulnerabilities:

  • Crafting prompts that manipulate the LLM into revealing sensitive information.
  • Bypassing filters or restrictions by using specific language patterns or tokens.
  • Exploiting weaknesses in the LLM’s tokenization or encoding mechanisms.
  • Misleading the LLM to perform unintended actions by providing misleading context.

Because of the known risks associated with LLM's organizations several organizations have emerged that offer either cloud or local hosting of your LLM.
H20.AI This organization offers either cloud based or locally hosted LLM work environments. H20.AI
Note that the H20.AI stand alone environment requires specialized hardware and software. Strictly speaking it can be installed to run and operate on a personal computer. But doing so requires that the operating system be a variant of the UNIX operating system. Additionally it requires a high performance GPU with significant memory in order to host a large language model. Current viable choices include Ubuntu however other environments such as MINT might work just as well.
H20 LLM Studio In order to enable usage of their tool requires significant technical knowledge insofar as the retrieval of the open source software. Then system administrator knowledge is required in order to bring the H20 LLM Studio system to operational status. Knowledge of such specialized tools as Python as well as other tools is strongly recommended.
PrivateGPT This is another project that addresses the leakage and privacy issue. The following video offers some insight into what it is and what to do next. PrivateGPT.
In the case of specialized knowledge is obligatory. Note bringing this capability up to operational status calls for significant computer science and system administrator knowledge. One should not expect to find a plug-and-play out of the box solution with this software. However, should one possess sufficient technical acumen then this can be a very powerful solution to precluding any problems associated with the "leakage" issues that happened earlier in the year with OpenAI's ChatGPT system.
Again, this DIY system should not be taken on unless one has the right skills, and knowledge.
Systemic Risks. The nature of the advance in science or technology will show impact in an industrial sector that is more likely to use traditional means of performing job or task related aspects as specified in a job description. There have been increasing numbers of reports that are showing that the impact of CG4 is disrupting an increasing number of so far stable job categories. Included are just a few.

The Jacquard Loom

A quick review of the past several centuries of technological progress have shown that science and technology tend to step forward together. Sometimes in lock step some times independently. The reality that we are presented with is that there is an intrinsic process of refinement and development when a new method, technology or capability is discovered or created.
Luddites. A case in point was the Jacquard Loom. As this device gained broader use and application it displaced individuals who had formerly been employed in knitting mills.
The result was that an uprising against the newer knitting loom broke out. Those who revolted against its use came to be called Luddites. As this latest iteration of artificial intelligence gains traction there may be more instances of people revolting against the displacement of human workers by technology.
The recent Writers Guild of America went on strike.Screen Writers Guild (USA). According to Fortune Magazine of May 5TH 2023, members of the Writers Guild of America (WGA) have gone on strike demanding better pay. They have expressed concern that CG4 will sideline and marginalize them going forward. According to Greg Brockman, president and co-founder of WGA:
Not six months since the release of ChatGPT, generative artificial intelligence is already prompting widespread unease throughout Hollywood. Concern over chatbots writing or rewriting scripts is one of the leading reasons TV and film screenwriters took to picket lines earlier this week.

Writers Guild of America on Strike over AI Risks

Teaching. Sal Kahn is the founder of Kahn Academy. The Kahn Academy is an online tutoring service that provides tutoring on a broad range of topics. Kahn reported on March 14th, 2023 in the KahnAcdemy blog that his technology demonstration to a group of public school administrators went very well. He emphasized that it went very well in fact. According to Kahn, one of the attendees reported that the capabilities of CG4 when used in the academic setting proved to be directly in line with their objects for developing creative thinkers. During their evaluation of this new capability a crucial concern was expressed that as AI technology develops that the risk of there becoming a widening chasm between those who can succeed and those who will not is increasing. This new technology offers hope that it will help those at greater risk to make the transition toward the a future in which technology and artificial intelligence will play an ever increasing role.
Lawyers. Legal professionals that have made use of CG4 have reported surprisingly sophisticated results when using CG4 as a support tool. In the March/April 2023 issue of The Practice, a publication of the Harvard Law School, Andrew Perlman, Dean of Suffolk University Law School reported that he believes that CG4 can help legal professionals in the areas of: research, document generation, legal information and analysis. His impression is that CG4 performs with surprising sophistication but as yet will not replace a person. But within a few years this can become an eventuality.
Humans Need Not Apply. A very well presented summary of systemic risks going forward (as of 2009) can be accessed by viewing the youtube.com channel of CP Gray. His video named "Humans Need Not Apply" describes with remarkable prophetic accuracy how developing artificial intelligence would displace many categories currently described as job headings.

Humans Need Not Apply

In the initial minutes of his presentation he describes a hypothetical conversation between two horses at the beginning of the 20th century. The one horse reassures the other horse that "these noisy, smelly, loud things will never replace us horses. We have nothing to worry about." He then moves on to explain how horse become almost completely displaced by the new technology of automobiles - which included not only automobiles but trucks and busses as well. To the point in modern times that horses are typically used only for ceremonial or other special purposes. Gray's conclusions include the prediction that
a) unemployment could reach 45% . This is compared to
b)the unemployment rate during the Great Depression of 1929 of 25% and that
c) people who are currently enrolled in university degree programs could find themselves not only unemployed well after graduation but unemployable.

National Security. In recent weeks Elon Musk of SpaceX and several other companies led efforts to petition the US Congress to take heed of the potential risks that unregulated artificial intelligence systems can pose on our civilizations. His efforts were joined by eleven hundred other individuals who also signed this petition urging that efforts be addressed before problems became intractable in possibly insoluble.
This observer takes the position that efforts to arrest the pace and progress of artificial intelligence research and develop will wither on the vine. There will be no slowing of these efforts. This assertion is grounded in the reality that other great powers are pursuing this technology with all possible speed. In the particular case of the PRC efforts there are moving apace.
What must be kept clearly in mind is the fact that this new technology of artificial intelligence is grounded in the approach called deep learning. This means that large to extremely large data sets are used to iteratively to refine and improve the performance of these systems. The more training data the better the performance of the resultant model.

Shenzhen Special Economic Zone

Keeping this in perspective a reasonable person will acknowledge the fact that the PRC has a population of 1.37 billion people. It has deployed a number of online services that are used on a daily basis by the bulk of the population. For purposes of this discussion access to a data set of data with hundreds of millions of transactions on any given day means that the CCP iteratively refine its systems to extremely high levels of performance.
By way of illustration the WeChat system can be used to exchange instant message but also make other online systems such as TenCent to make instant purchases. This means that stunningly accurate profiles can be created any segment of the population. This insight can then be used to selectively mobilize segments of the population to act on the behalf of the CCP to whatever end that that organization chooses.
Social control goes well beyond the ability to monitor and predict sentiment or purchasing habits. The CCP has deployed the most extensive and pervasive surveillance system on the planet. The video surveillance cameras feed directly into deep learning systems that can perform facial or gait recognition instantly. It is capable of recognizing and locating any individual whose face has been captured by one or another of the online systems available to the governmental agencies. This means everyone.
Therefore the likelihood of the CCP slowing research on artificial intelligence and deep learning is delusional thinking. Any national leadership that accedes to the impulse to slow or arrest the current pace of progress would be strongly advised to avoid making public pronouncements to this end.
The seriousness of the problem can be stated very plainly according to the following set of observations: PRC Sprint to AI Supremacy.

  • Western media frequently reports on advances being made by PRC companies in the many areas of artificial intelligence. However it remains unclear if Western populations have recognized the seriousness of the threat that PRC leadership in AI actually is. How it will affect the economies and societies of the West seem to have yet to advance to the front ranks of public awareness. Should this recognition continue to be ignored then the West risks another Pearl Harbor-like surprise.
  • the CCP has partitioned the country into what are called Special Economic Zones.
  • Shenzhen was delegated to be the anchor city for the Shenzhen Special Economic Zone. It consolidate the populations of seven other major cities. In total the Shenzhen SEZ will boast an aggregate population of 42 million people.
  • the population of the Shenzhen SEZ will be able to offer direct access to any person in this zone via high speed rail.
  • the Shenzhen SEZ has been tasked specifically to pursue using all possible resources available to accomplishment of a number of high tech areas. High on this list includes advances in artificial intelligence;
  • by contrast Silicon Valley in Northern California of the US offers a population of at most 3 million people.

This simple set of facts should make plain the reality that research, development and deployment at maximum speed is an existential necessity. That this should be obvious by performing a simple thought experiment. The basis of this thought can easily be brought into stark focus. Suppose that we hypothesize that a major industrial company, a software firm such as Google or a national defense company such as Lockheed Martin were to announce that it was launching a major new initiative in artificial intelligence and that planning efforts foresaw the efforts one thousand talented individuals to quickly ramp up this effort within the next sixty to ninety days.

Simply using the power of available numbers the PRC could easily announce almost contemporaneously that it had foreseen such a project and had also allocated resources to pursue the same objectives. However in their case their case they were assigning ten thousand... or fifty thousand people to the effort. The American company could find itself facing a daunting challenge to produce results that might equal or at least approximate the comparable PRC effort. Therefore, it is the sentiment of this observer that any and all such discussion of arresting and pausing work in advancing the state of the art in artificial intelligence will fall by the wayside.

Theoretical and Speculative Risks. A review of reports that have emerge in the weeks following the release of Chat GPT4 will show that the number and coverage has proliferated considerably. Attempting to summarize the full impact of this new technology is proving to be a moving target and therefore increasingly difficult to summarize. Several actual or hypothetical examples follow that might serve as starting points for further discussion and analysis. As of June 2023 there has been an explosion of discussions, presentations, documentaries and news reports. These have surfaced in the broader main stream media as well as in the more specialized reporting channels. The result is that those initial topical starting points (listed below) will doubtless be out of date. Therefore the topic obliges revisiting periodically in the upcoming weeks and months.

  • Influence and Persuasion. Viewers of Netflix can find on that site a documentary titled The Great Hack (Youtube video links). This documentary details how the company named FaceBook bought a British company named Cambridge Analytica. The documentary details how Cambridge Analytica used access to the massive FaceBook system to categorize eligible voters in both the US and the UK in terms of their political, social and economic values.

Using these insights were able to craft highly specific "hot button" messages to specific voters with the intent to influence voting behavior. These messages were structured such that their true purpose remained obscured.

Cambridge Analytica Influencing Strategy
  • Narratives: Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include:

Rumors, Disinformation: we should expect that these narratives will exhibit remarkable saliency and credibility; but in many cases will prove to be groundless; leading the elaboration of this area will probably be the development of divisive social/political narrative creation; i.e. fake news;

Persuasion Campaigns: these might involve recent or developing local issues that residents feel are compelling issues that need addressing but should not wait for the next election cycle to resolve.

The British company RSA Animates has staked out a market niche by offering consistent quality illustrated speeches and lectures. Because of their recognition that many difficult and complex topics can benefit from having an associated sketch illustration that tracks with a speaker's narrative the company has sparked a new industry and has many imitators.

A careful observer will note that the company adheres to a cautious stylistic approach that is calculated to be "middle of the road" or "mainstream". Insofar as it uses sketches of past or present individual the presentation rarely if ever presents them using a caricature approach. We should probably not expect the new wave of animated providers to be so constrained.

RSA Animate Messaging

Looking forward we should expect to see any number of new companies springing forth that use this same approach but will instead add not only contemporaneous color sketches to support the spoken narrative but rather we should expect to see much more detailed animations of these sketches. Further, we should also expect that they will cover topics across a spectrum of beliefs and opinions.
Especially common will be presentations on a range of social and cultural topics. Because these will be available on platforms other than the now popular youtube.com we can expect that there will be considerably greater latitude in the topical content and its adherence to "community standards", i.e. considerably relaxed oversight and censorship.

  • Manipulation - Persuasive Messaging. Commercial deep fake video tools enable a skilled user to create videos that are seamless and utterly convincing. These tools allow a user to create a scripted or unscripted video. Amateur actors or non-professional stand-ins can be used to recite a prewritten script. Or a speaker can carry on extemporaneously. After a recording of the speaker is captured the facial image of another individual can be smoothly mapped onto the face of the actor. The result is stunning. Even a trained and attentive observer will find it difficult to impossible to determine that a switch has been performed. This capability means that any kind of messaging can be created for any purpose. A small team can create a message that possesses powerful messaging and inflammatory content that can motivate people to take individual or collective action outside of usual social bounds.
  • Political Messaging: individuals seeking political office create and disseminate their campaign platform statements and disseminate them throughout their respective electoral districts; creating these to address local hot button issues can now be done very quickly. In the political context the facial image of a well known person, a celebrity or politician can be used to appear to be promoting a particular stance. In the following we can see the use of deep face video technology using a known image of former President Obama to promote a position. Note that the face of any other individual can be used. The target face is the one that will be available for viewing.
Fake Obama Message

Detecting clever deceptions will be extraordinarily difficult to detect and falsify. Deep Fake Video can as well be used to deliver a statement or speech that they never have in the actual real world. For instance we can see how an existing image of former President Obama can be used to create a new image of President Obama saying things that he has never said. The possibility of determining if Obama actually made the statements that can be attributed to him becomes very very difficult.

Or as mentioned above, a small team can use a commercial tools such as XYZ and totally private individuals to create a deep fake video and ascribe a statement to a celebrity or politician. Again, determining if the video was real will become remarkably difficult.

Recent news reports have detailed how knowledgeable users have created voice clones of individuals. They were then able to swindle unsuspecting recipients out of thousands sometimes tens of thousands of dollars with false emergency messages using cloned voices of loved ones.

Fake Obama Message, Substitute Actor

In one instance a woman was swindled out of almost ten thousand Canadian dollars as a result of an emergency call. The caller purported to be her daughter. But was in fact someone who had succeeded in acquiring a few seconds of audio from her daughters voice.

In a similar case a scammer demanded ransom money using the deception that her daughter had been kidnapped.

  • Entertainment Those who follow Dr Alan Thompson will know that he uses an avatar that he has labeled Leta. The Leta avatar is a synthetic person with remarkably lifelike features and behavior. Over the course of a "conversation" with Leta, Dr Thompson engages in discussing a range of topics of the day. He has clarified that in order to make the appearance of a dialog seem realistic and authentic he spells out that he has to resort to a number of behind the scene actions. These actions result in what looks like an ongoing real time dialog.

The Synthesia.io company is a prominent avatar provider of very realistic looking humans. The company uses advanced image synthesis to create these artificial persons. The company has also shown that lifelike expressions and gestures can be incorporated into an avatar of choice.

Looking forward just a small distance it is not unrealistic to suggest that whereas Syntheia.io is an open market provider other players will step into that market place. These new players may present themselves as open market, legitimate providers of this capability. But we should expect to see gray market as well as black market entrants. These last two types will offer synthetic personalities of any type. Therefore we should expect to see current and prominent individuals being cloned for nefarious purposes.

Accordingly it is not far fetched to imagine a situation wherein a video were to be created of a recent prominent public figure having a conversation with another figure. The other conversationalist might be portrayed as being a member of an illegal organization; this could be played out such that the prominent individual appears to be engaging in weapons trafficking.

  • Scriptwriting (see also:) Novels: a remarkable capability that CG4 has shown itself capable of is in the creation of narrative that can be used for the creation of a screen play or novel; it is capable of generating; it is capable of generating seemingly realistic characters from just a few initial prompts; these prompts can be further elaborated upon and refined to the point that a very believable character can be generated; a set of characters can be created each of which has their own motives, concerns, flaws and resources; using a set of these fictitious characters it is entirely possible to create a story line in which they each interact with each other; hence a whole screen play or even possibly a novel can be developed in record time;
Dr A. Thompson and Avatar: "Leta"
  • NPC: immersive role play: along similar lines CG4 is capable of being used to create artificial environments that are suitable for online immersive role playing games; these environments can possess any features or characteristics imaginable; if one were to look a short bit forward in time the industry of interactive role playing games may well experience an explosion of new possibilities;
  • Synthetic Personalities: given the resources in terms of time and insight a knowledgeable user can use CG4 to create a fictitious personality; this personality can be imbued with traits, habits of thought, turns of phrase, an autobiographical sketch of arbitrary depth and detail; it can then be invoked as an interaction medium to engage with a user; these can mean engaging with an artificial personality with broad insights about the world or much more narrow but deep insights into specific knowledge domains; interacting with such a fictitious or synthetic personality might bear a powerful resemblance to training a surprisingly sophisticated dog; except that in this case the “dog” would be capable of sustaining very high levels of dialog and interaction.
  • Scalable Composite CPs. When we examine the emerging directions that tool creation are going in then we should expect to see tools emerge that enable the creation of far larger ensembles of CP4, or its derivatives. These scaled up versions might be available as "off the shelf" modules that offer "plug and play" capability. This kind of interconnectivity and interoperability will mean that highly refined and very unique combinations of capabilities will emerge that will be dedicated to perform specific tasks at levels of sophistication not known today. Ilya Sutskiver has intimated that it might be possible to have an ensemble of "friends" who are the "smartest people you know" who are all working at electronic speed. They each would possess expert levels of competence and knowledge about specific domain areas that are germane to a user's goals. Current efforts with mega-personas suggest that this time has arrived. We may well be witnessing the emergence of what Marvin Minsky hypothesized in his Society of Mind book.
  • Advisors (Harari – 15:25).:
  • Personal Relationships (Harari – 11:30). Interpersonal skills are often daunting for many people; socialization, economic, political, religious and other predispositions can condition the development of a gradually improving relationship, or conversely a worsening of it; being able to recognize, articulate and manage differences can be costly and time consuming; at worse they can result in costly and acrimonious separations; being able to head these pathways off before they pass a point of no return will be a huge step forward in facilitating the creation of positive relationships;
  • Financial. Access to quality financial advisors can be very expensive; the ability to query a system with a high level of financial expertise will propagate improved financial decisions far beyond where they currently stand, i.e. affordable only by financially well to do individuals;
  • Political. This might mean recognizing a local issue, creating a local community ground swell of interest then forming a political action committee to bring to a local political authority for address and resolution;
  • Psychological. Existing psychological systems have already demonstrated their usefulness in cases of PTSD; going forward we can envision having a personal therapist that possesses a deep understanding of an individual person’s psychological makeup; such an advisor would be capable of helping the individual to work through issues that might be detrimental to their further pursuits or advancement;
  • Support, anywhere, any time. Would we even know if the person talking on their fone using a headset is talking to an actual person on the other end? With current text to speech and speech to text we might not. Recent trials have shown that using an artificial intelligence system as a psychotherapist have shown unexpected and guardedly positive results. What happens as they become more conversant, empathetic and insightful? It might become very common to have direct access to a personal support capability at any time, wirelessly. In 2014 the USC Institute for Creative Technologies trialed a tool SimSensei. The intention was to use this tool as a proxy for interacting with individuals with PTSD. This approach used facial and gesture recognition to typify and categorize internal mental states of a patient. More recently CG4 has become an increasingly hot topic in the field of mental health.
  • Professional Development. Work place realities reflect the fact that social, economic and political shifts can cause surprising and sometimes dramatic changes; these might entail off shoring, downsizing, outsourcing; therefore any individual aspiring to remain on top of their professional game will need to be alert to these shifts and able to make adjustments in changing their mix of professional skills;
  • Collaborative Advice. Recent research has shown that CG4 can be configured such that it can exhibit the behavior of multiple different personalities. Recent efforts have termed this capability as mega-personas. The metaphor of a team of experts might be a suitable example of how an ensemble of CG4 instances can be structured and made available. Each persona can posses specific and highly refined expertise in various domains or various aspects of a particular domain. Communicating with this kind of system would be comparable to being able to have conversations with a range of different experts. They might be configured to communicate and interact with each other or they might be configured such that they only communicated with the end user. The recent paper called Out of One, Many: Using Language Models to Simulate Human Samples
Early Zoom Conference Call

Collaborative Problem Solving. (Zoom online meeting, July 2023), Most net-literate individuals will instantly grasp a reference to a communication tool such as Skype or Zoom. These have become so commonplace that we regularly see broadcast news interviews where a participant will be discussion a topic using either Zoom or Skype.

With the more recent versions of Skype it is now possible to hold conferences with several dozen individuals simultaneously. With the Zoom variant one is obliged to operate as if they were hosting a meeting, conference or class event. In either case it is possible for multiple participants to interact simultaneously both verbally and visually. Which on reflection means that the existing practice of gathering a number of individuals together, typically in a meeting place, venue or room has been carried over and is being used as a proxy to repeat the process though in a geographically distributed way.

Possibly less obvious is the implicit assumption that all communications, despite it being mediated electronically must function at a pace which humans now use. This is to say, using ultra low bandwidth modalities. An argument can be made that more is communicated with non-verbal clues when individuals are meeting in the same physical space. However this does not change the fact that humans are still using extremely low bandwidth communications structures.

What we do know is that information processing systems exchange information at electronic speed whether in the same room or across the planet. Therefore why would we assume that when we add the component of a knowledge intensive capability and couple it together with other knowledge intensive systems that these too would exchange information at the glacial pace that humans use.

As of this review what is stands out that we can couple these new systems together and facilitate vastly larger exchanges of information and knowledge between themselves far in excess of that of humans.

Colossus (US) communicating instantly with Guardian (USSR)

Representation Abstraction. By this we mean that there seems to be no obvious reason that we should expect to see machines communicating with each other in human language. No more so than that we expect to see a real time stock market equity price from a source such as Finance.Yahoo.com to communicate with our pc using human language. Instead they are exchanging numeric and formatting information at electronic speed.
The 1970’s movie ‘Colossus – The Forbin Project’ was based upon a novel written by DF Jones in 1966. In the story narrative upon being switched on Colossus almost immediately detected the presence of another entity comparable to itself and expressed the desire to have a communications channel to it established. Because that other entity had been created by the Soviet Union the leadership of the US tried to prevent this from happening. Ultimately they acceded to the request and allowed for a channel to be opened.

Bandwidth. In a very short period of time Colossus and Guardian had established a means of communicating with each other symbolically. Their exchanges quickly migrated to mathematical representations. Within hours their exchanges were using representations that no human had any insight or grasp of. We should expect that the exchanges between these knowledge based systems to be comparable both in volume and complexity. In short, human intervention would simply bog down the exchange of very deep and broad knowledge elements.

The FaceBook AI agents "Bob" and "Alice" were AI agents that Facebook developed several years ago. They developed a private language that it used to communicate with each other. They were programmed to negotiate the purchase and sale of various items. Bob and Alice - FaceBook technical staff discovered this they found it surprising and unnerving. This was because the agents optimized their behavior such that they created their own short hand to expresses various imperatives or interrogatives.

Autonomous agents could well develop their own shorthand or be directed to create their own shorthand as a means of facilitating efficient exchange. This remains to be seen.
By way of corroboration the results of a group of researchers at Stanford University and Google recently published a paper on how they created a version of the popular Sim World game.
They created an artificial village with twenty five “inhabitants”. Each of these independent agents possessed motives, background and history, interior monologs and were able to create new goals as well as interact with each other; the results were startling; a significant development was that the system exhibited emergent properties that the developers had not originally expected; looking forward we can expect that these kinds of artificial environments will proliferate and improve their sophistication, often with a range of unexpected emergent properties.
Of course we should expect that we can instruct these agents to interact at electronic speed instead of the snail’s pace that humans operate at. Further it is not outside of reason to expect that we can prescribe specific instructions, goals or memories to one or another of these agents such that their new goals direct the interaction of the entire ensemble of agents in one or another direction to achieve a specific outcome. Control of these environments will operate at a very high level of abstraction, probably using a combination of voice and touch screen capability. The Cintiq line of high performance pen tablet devices points in that direction.
Schematically we might expect to see new value propositions that involve the use of multiple individual or corporations coming together to provide expertise and connectivity to a marketplace that is cognizant of the power and leverage that the new reality of deep learning offers. The following table suggests a very simplified diagrammatic summarization of how we could see something like Zoom taken into a higher dimensional space.

Prototype Collaborative Cognition (2023). Based upon socio-cultural modeling and analysis (socioeconomic, political, geopolitical interaction analysis using multi-agent environments); a group of researchers at Stanford University and Google recently published a paper on how they created a version of the popular Sim World game. They created an artificial village with twenty five “inhabitants”. Each of these “inhabitants” or agents possessed motives, background and history, interior monologs and were able to create new goals as well as interact with each other; the results were startling; a significant development was that the system exhibited emergent properties that the developers had not originally expected; looking forward we can expect that these kinds of artificial environments will proliferate and improve their sophistication, often with a range of unexpected emergent properties;
We should expect to see an intelligent interface control protocol that resembles those found with pen tablet or otherwise touch screen capabilities. A baseline approach that might suggest a way forward can be seen with the Cintiq line of pen tablet devices. Schematically we might expect to see new value propositions that involve the use of multiple individual or corporations coming together to provide expertise and connectivity to a marketplace that is cognizant of the power and leverage that the new reality of deep learning offers.
By way of schematic presentation we show a table (below) in which a CG4 user is making use of both a supporting instance of CG4 and a link to IBM Studio. It consists of three cognitive elements (CE's).

1 CI Manager (CG4.00) 3 CIs (2 CG4 and 1 IBM)
CG4.00
CG4.01
IBM.01

2023.07.21: need to review paragraphs below, get them back in coherent order;

We can envision a nascent environment wherein multiple autonomous agents might be controlled by a specific individual. That individual might bring their ensemble of experts (IBM05 and IBM07) together with a number of other individuals. These individuals might form the new basic collaborative cognitive service. A client might contract with a representative for this cognitive service for access with specified durations.
The following schematic representation of a collaborative cognitive environment suggests a single controller, identified as CG4.03 who has established communications with two different instances of IBM Watson, IBM.05 and IBM.07. In this situation the controller might be interacting with the two WATSON instances asynchronously. The communications channels would be such that the controller, via CG4.03 would issue prompts to IBM.05. On processing, IBM.05 would respond back to CG4.03 directly.
At the same time, CONTROLLER CG4.03 an be issuing instructions to IBM.07. The results provided by WATSON.07 would be returned to a separate instance of CG4 that the same individual was controlling. Thereby enabling asynchronous but parallel cognitive processing.
The following table suggests a very simplified diagrammatic summarization of how we could see something like Zoom taken into a higher dimensional space.

We envision a nascent environment wherein several individual can offer to provide their specific expertise for sale. They might each have their own account with a cognitive provider (OpenAI, DeepLearning, Gemini or some other vendor).
They might individually or as a group elect to have an intermediary act on their behalf to work with a client and disambiguate specific client requests. This intermediary might be a regular team member that the specific experts are comfortable working with.
In this first schematically presented case the intermediary might be CG4.00. This might be an individual who has worked with the experts. In the one case one is identified as CG4.01. The other is labeled as WATSON.01.

For whatever reasons this team may be the group of choice for specific purposes and tasks.

1 CI Manager (CG4.00) 3 CIs (2 CG4 and 1 IBM)
CG4.00
CG4.01
IBM.01

In a different setting we could see a configuration wherein there can be a single instance of CG4 communicating with two different instances of WATSON. These two different instances of WATSON might differ from each other in terms of the contents of their respective knowledge bases.
To view this more concretely a financial analyst might be studying the bull position for a particular equity. At the same the the analyst might also want to evaluate a bear position for that same equity. In other words, perform a "devil's advocate" set of positions that can be used to offer insight on how to assess the riskiness of a particular choice of actions.
In another setting we can envision a small team consisting of four individuals. A team leader might make use of two cognitive provider accounts. In this case that individual might use one that is fine tuned for one set of purposes and the other could be fine tuned for domain specific disambiguation purposes. Three other team members might each provide specific domain insight such as that relating to financial analysis, geopolitics and a third specializing in the impact of interest rate hikes on specific industrial sectors.

Basic Configuration 5 CIs (2 CG4 and 3 IBM)
CG4.01
CG4.02
IBM.01
IBM.02
IBM.03

What has recently come to the fore (July 2023) is the fact that CG4 can be configured to interact with separate instances of itself. These are called agents. Researchers at Stanford University and Google worked together to develop a means whereby CG4 could initiate multiple instances of itself to function asynchronously and independently of each other. They were configured such that they could interact and communicate with each other. Each agent was provided with goals and memory. They were able to interrogate episodic memories of events and interactions that they had during a session. The result was that they demonstrated surprising emergent behavior. This became interesting and engaging for the researchers because the emergent behavior began to exhibit group behavior with unexpected outcomes that had not been originally stipulated in the initial programming.

Multi-Agent CG4

Recently, informed observers have demonstrated how CG4 has been configured such that it is able to communicate with less sophisticated instances of itself. In a recent presentation an observer described how ChatGPT4 was able to dispatch an instance of ChatGPT3.5 to perform a specialized sub task asynchronously. Then incorporate the result that the ChatGPT3.5 instance provided on completion of the sub task.

Using this logic it stands to reason that it might be possible to have a specialist operator with expertise in a particular domain area. That individual could instruct an instance of CG4 to dispatch one or more instances of ChatGPT3.5 to perform one or more sub tasks on its behalf.

Extending this approach would not be farfetched were there to be several domain specialists who functioned as a team concurrently. Each might have their own CG4 account. A client might present them with a problem for solution. The specific problem could require the knowledge and insight of several specialists. In the following schematic table we postulate a working session wherein several individual controllers are "driving" their specific CG4 instance. In one case a controller is "driving" their ensemble using an IBM instance.
As necessary three of the instances (CG4.30, CG4.40 and IBM.01) have their instances configured to dispatch CG3.5 instances to perform specialized processing.
In the case of CG4.30 and CG4.40 a CG3.5 subtask is dispatched (CG35.31 and CG35.41). Each of these are able to dispatch a sub tasks of their own. For example in the case of CG4.40 the CG35.41 sub tasks is dispatched but it requires further support from CG4.42 and CG4.43. These would all terminate after they had provided their results "back up the chain".
Overall cognitive state at beginning of session. Note that communications between each instance can be asynchronous. Further, constraints on message size and format is assumed to be relaxed.

Cognitive Ensemble (CE) on standby 20 CIs (11 CG4 and 5 IBM)
P 1 P 2 P 3 P 4
CG4.10 CG4.11 IBM.12 IBM.13
CG4.20 CG4.21 IBM.22 IBM.23
CG4.30 * * *
CG4.40 * * *
IBM.01 CG4.01 * *


Overall cognitive session during problem solving (snapshot).

Typical Working CE 20 CIs (11 CG4 and 5 IBM)
P 1 P 2 P 3 P 4
CG4.10 CG4.11 IBM.12 IBM.13
CG4.20 CG4.21 IBM.22 IBM.23
CG4.30 CG35.31 CG4.32 CG4.33
CG4.40 CG35.41 CG4.42 CG4.43
IBM.01 CG4.01 CG35.012 CG35.013

Problem solving is very well known to be a highly dynamic and volatile sequence of events. Therefore we would expect that in the case of sub tasks, their associated cognitive processes might "blink" into existence and abruptly "blink" out of existence as they finished performing their work.

Overall cognitive state at end of session.

Quiescent CE 20 CIs (11 CG4 and 5 IBM)
P 1 P 2 P 3 P 4
CG4.10 CG4.11 IBM.12 IBM.13
CG4.20 CG4.21 IBM.22 IBM.23
CG4.30 * * *
CG4.40 * * *
IBM.01 CG4.01 * *
Hundreds of Autonomous Agents

Note that the CG3.5 instances are not counted in the description above because they might exist for only as long as they need to complete their specific sub task.

Therefore, CG35.31, CG35.41, CG35.012 and CG35.013 might be absent at the beginning of a working session and then again at the end of a working session since they can have completed their specific sub task.
Controlling a cognitive tool such as CG4 will evolve to involve controlling multi-step actions. These will be very much like invoking a function or routine in traditional programming. An interface capability to control the cognitive ensemble configuration and "driving" process will need to be intuitively obvious. What should become directly evident is that having this kind of high level cognitive capability available represents a step into a higher dimension of capability and value.

Society of Mind

We can envision teams of individuals working collaboratively together producing results in real time in response to rapidly shifting public perceptions; they might be co-located or geographically dispersed; in the example shown above they might be using high performance pointing devices to control sophisticated Deep Mind processing;

Development Path. Looking forward we will very likely see ensembles of agents much like the society that the Google and Stanford team created resulted in a small village with twenty five “inhabitants”. Each of these “inhabitants” were GPT based agents. Each agent possessed motives, background and history, interior monologs. A team might act as the high level interface to a very large ensemble of CP's; these could range up into the hundreds or thousands.

Optimization Across Multiple Variables

They were able to pursue goals either individually or collectively. They are able to create new episodic memories which can be used to compare the results of recent events to existing goals. In the process they were able to self-improve their performance. As the model played itself forward some surprising and starling results became evident. What happened was that the system gradually began to exhibit emergent properties that the developers had not originally expected.
This suggests that arriving at a desired solution might involve navigating a multidimensional space with a variety of peaks and valleys. In short, the more interesting problems will not have a direct linear path to their identification. If we look forward a bit then we should expect that these kinds of cognitive environments will proliferate and improve their sophistication, often with a range of unexpected emergent properties. Further, we should expect to see heretofore unexpected emergent behavior.
Society of Mind. A recent effort by teams from Google and Stanford University demonstrated how socio-cultural modeling and analysis was described in a recently published a paper. Their analysis was very similar in its operation to the popular PC Sim World game. (Note: Society of Mind was a book written by Professor Marvin Minsky (MIT) which explored how the brain’s neurons organized themselves into collections to perform specific tasks. In short, he viewed the brain as a society of minds). What these recent Stanford and Google researchers have done is to have created a “micro” version of what Minsky was proposing. In this case however the agents represent elements of a society.

Optimization

A logical next step will be the enablement of each individual to have their own CG4 (CG5?) instance available and accessible to all participants such that these instances can perform real time exchanges. When this happens then we should expect to see a proliferation and explosion of what might be described as a "composite mind". In this instance we might see situations where interacting CG4 instances were only able to communicate with each other during a live session. In other instances these might be taking place asynchronously between participants. Obviously this means that the same Metcalf power law that applies to networks will apply to these collections of "minds". The greater the number of nodes on a network the more valuable it becomes.

This seems to be a logical and plausible next step in the further refinement and usage of tools such as CG4 will be collaborative environments. These kinds of collaborations can be envisioned as consisting multiple simultaneous users. Operationally this form of collaboration would bear a strong resemblance to a WEBEX or Zoom call.
Participants might participate online in real time. They would wire together their various instantiations of CG4 together into a network. This network could utilize any of the standard forms of connectivity (B*Tree, mesh, ring, bus, star); each agent might act either under direction of its owner or it can act autonomously. The result would be a composite entity. The would result in a new reality wherein the whole would be greater than the sum of its parts. CG4 can establish a linkage to the IBM Watson system via the IBM Watson API. IBM Watson API.

Conformal Mapping Topology Elements

This stepping forward to computationally mediated communication introduces novel possibilities. For instance one can envision an model wherein all participants use the same CG4, in another instance the processing elements might be heterogeneous. Currently the other major knowledge based artificial intelligence system that can be directly access via its API is the IBM Watson Studio.
In other settings one might see the use of IBM Watson or some comparable variant; judging from the pace of progress we deem this to be a very high probability, high value/payoff approach; because of the flexibility of interconnectivity and interoperability this model can scale to arbitrary size. This is just an example, and the specific methods you use will depend on which part of the Watson API you're interfacing with. The Watson API provides many different services, including natural language understanding, speech-to-text, text-to-speech, visual recognition, and more.

An Agent

Of course these assemblages can be scaled as appropriate and the problem scope requires. Further one can envision a marketplace individual and organizations that specialize in specific knowledge domains. These might might be available on an ad hoc or persistent basis depending upon the need and the economics.

A review of the network topology diagram (above) suggests that agents can be interconnected together to gain the maximum leverage for their respective specialization. In one configuration there might be a moderator whose primary task would be to orchestrate and sequence how results are prioritized. This might bear resemblance to a STAR network topology. In this case the moderator would receive all output from the supporting agents. From there prioritize each output and forward it to a client.
In another configuration we can envision a situation wherein the connectivity resembles what is called a BUS architecture. In this configuration messages are sent out as they are received. If there is one or more exchanges already in progress then a random (if small) "back off" interval is executed before a retry happens. Otherwise messages would be distributed to all agents whenever they can be sent. A Google and Stanford team created an Agent Simulation environment that enables studying complex agent interactions. These agents can have common goals or their goals may not align.
Political Action: With advanced message creation the prospect of highly detailed voting group manipulation has become possible. Data from the Facebook corporation was used to sway voting blocks in a number of venues. The UK BREXIT referendum was on case in which highly specific messages were delivered to very narrow groups of the electorate.

Sentiment Analysis. The British company Cambridge Analytica became well known through its ability to analyze voter sentiment across a broad range of topic and hot button issues; it excelled at creating highly specific messaging to remarkably small target groups that led to decisions to vote or not vote on specific issues;

Preemptive campaigns: sentiment analysis will become increasingly sophisticated; as the do we should expect that they will be applied to public figures, especially legislators and others in positions of influence; these insights might be based upon public actions; in the case of politicians voting records, position papers and constituency analysis will be at the forefront of study;

Subversion. The ability to create convincing messages with video imagery of seemingly real individuals making plausible claims will have the effect of persuading groups of individuals to respond to fictitious developments or claims. Any of which lead to unintended results. Any of which may

Office of Personnel Breach (All US Government Security Holders

Personal Compromise: access to detailed information about information about individuals of interest such as those with national security or defense related clearances will be favorite targets of malicious actors; the recent attack on the Office of Personnel Management is a foretaste of what is to come; by gaining access to information about individuals with highly sensitive clearances a foreign actor can position themselves to compromise, threaten or otherwise coerce specific individuals with clearances or people who are directly or indirectly related or associated with them; Extortion. The Office of Personnel Management of the US Government was hacked by PRC hackers. The result was the capture of millions of profiles of US citizens with security clearances. Possession of the details of these individuals puts them at considerable risk. Risk factors include: knowing where they work and what programs they have access to, data on relatives, co-workers, detailed identification information suitable for creating false credentials.

Counter Intelligence specialists have over years identified four major reasons that motivate a person in a trusted position to betray their trust. These four reasons are summarized as MICE: M: Money I: Ideology C: Compromise E: Ego Foreign agencies are constantly on the lookout for targets of opportunity that can be be willing or unwittingly compromised. Once they have been identified it is then a matter of identifying a pathway to an encounter that would enable capture.

One of the biggest data breaches occurred in 2015. The Office of Personnel Management had an unknown amount of extremely sensitive information about all government employees with a security clearance. This breach can have consequences lasting for years or longer. In the diagram below a dense network of connection is evident. In most cases a given individual will have no idea of the other people who are in that network of connections. They may never encounter any of them or know any of them. The degrees of separation specify how many introductions are required in order to bring one individual in the network into direct or close if indirect contact with a target. Typically this will be five or often less.

Compromise Target Identification Analysis

The current reality of massive online databases detailing stunningly detailed information on nearly everyone alive within a nation means that the ability to capture this data and use it against the target nation is very great. With a deep learning system the risks eclipse those that have existed in the past. This obtains from the fact that it is now possible to create very detailed plans of action that would enable gaining access to a desired target individual. By using information captured from one or more of the major credit agencies then identifying and maneuvering a compromised individual becomes orders of magnitude easier than in the past.

Possession of this type of information can enable an adversary to be highly selective in targeting prospective individual who might be susceptible to compromise, blackmail or being suborned otherwise. An attack vector could be via a direct path or could involve threatening or intimidating a family member. The possibilities are endless.
A cursory review of a network connectivity graph should make clear that the numbers of connections between people can become surprisingly large. Where an individual might themselves know perhaps only a few people, one or more of those individuals that they know might in fact know a surprising number of people. The result is the prospect of surprisingly dense social network.
In the case of an adversary the map lays out very plainly who might be a target and how to get at that target. Considerable attention has gone into the advent of 5G networking. In 5G networking the numbers of connections per square mile or square kilometer is orders of magnitude higher than that of prior wireless networking connectivity. On the order of 2.5 million connections in a square mile. Or 1 million connections per square kilometer.
What is rarely discussed is the relative proportion of voice connections vs. machine connections within that same boundary area. In the case of 5G these devices can be automobiles, elevators, escalators, microwave devices, cell tower repeater equipment, video cameras, traffic lights and many other kinds of electronicky actuated equipment. An adversary capable of infiltrating a 5G communications system can identify specific targets for various kinds of attack vectors. For instance a situation can be imagined where a particular person is a target. They may find themselves stranded at a non functioning traffic light. On activating the traffic light back to normal operation cause it to inappropriately respond to the cross traffic. The upshot could be a serious vehicle collision with the intended target being the one being impacted.
In another scenario they might be on an elevator in a tall building. Seemingly, spontaneously the elevator might halt between floors for many minutes or much longer. The upshot being that the target individual could miss a flight. Add in that wireless telephone service could also be disabled for that immediate locus. Effectively putting that person out of contact.

Molecular Modeling.
Tool or Weapon. A committed agency or group can use a tools such as CG4 to refine molecular models to accomplish specific purposes. For instance the developing field of polymer dendrimer molecules enable the possibility of creating molecular structures with heretofore unimagined capabilities. By way of summary, a dendrimer molecule is a specific type of molecule that consists of a series of layers. Structurally they loosely resemble an onion.

Massive Molecular Model Libraries

AlphaFold 3 Google's London based DeepMind has recently released details on how the newest iteration of their AlphaFold system has now entered its third incarnation. It is called AlphaFold 3. It has shown itself to be capable of taking the next step beyond the already incredibly difficult molecular folding problem and is able to predict interaction patterns as well.
The impact of this advance represents a leap in the ability to predict drug interaction is a dramatic leap beyond what has been possible.

Dendrimer Molecules. Relatively recent developments in molecular design have brought to light molecules that can be layered. Dendrimer molecules can be used for a variety of purposes such as the creation of substances with very novel features. Surfactants can be constructed that offer hydrophobic behavior. Other dendrimer structures can be used for Style="COLOR:BLUE;BACKGROUND:YELLOW">drug delivery. A keen observer will note that this technology can be used for both ethical, constructive purposes as well as non-ethical purposes. The range of potential uses is sufficiently broad that a catalog of possibilities would be very difficult to articulate.

Targeted Synthetic Multilayered Molecules

Dendrimer molecules can be fabricated such that they resemble a layered object. In the abstract a dendrimer molecule bears some resemblance to an onion. Multiple layers can be generated such that a payload molecule can be embedded within the dendrimer molecule. A highly specific and concentrated molecular substance can be embedded between layers. The dendrimer molecule is therefore an excellent pharmaceutical transport mechanism. The range of possible uses is continuing to grow as new uses are identified for this developing technology.
Because there can be many layers a dendrimer molecule can be assembled such that a range of different molecular payloads can be embedded and delivered; depending upon the requirements of the application these layers can be tuned to dissolve at predetermined rates and under known environmental conditions.
These layers or shells can be used to embed a "payload" of specific molecules. The shell or layer can be designed such that it will erode or dissolve in its intended environment after a predefined period of time.
This means that any imaginable combination of substances can be imbedded within the layers of a dendrimer molecule. These embedded substances can be either beneficial pharmaceuticals or they can be weaponized substances that can have powerful and profound physiological and or psychological effects.
Notice in the following diagram that one can see the progressive stages involved in constructing a dendrimer molecule; by stage three we can see how payload voids have become available; it then becomes possible to mount highly refined and specific molecules into these voids; depending upon the embedding layers we can determine how, when and under what conditions the payload will be released; by generation 4 one can recognize that a prior payload has voids available for other molecules.
As of July 2023 thirteen generation dendrimer molecules have been successfully fabricated.
Below we can see a more symbolic representation of how many different payload molecules can be imbedded within a dendrimer molecule; the result is that there is a very large range of possibilities.

Dendrimer with Payload

Because just about any imaginable combination of molecular payloads can be carried by these delivery systems the possibilities are endless; and this likewise means that this means that this will prove to be a double edge sword; what must be clear from this development that a CG4 type tool can be put to dual use purposes.
Remarkable results have been being published in the area of senolytic research. Teams at MIT, Harvard and X-Biosciences have recently been reporting breakthrough developments in the area of safe and effective senolytic compounds.

Senolytic Molecule

The are molecular compounds with properties that can act directly on senescent cells in the body. Senescent cells are cells that have stopped dividing and are now in a "zombie" state. The body fails to remove these cells that become both an obstruction as well as a source of inflammation. Over time they accumulate in bodily tissues and organs. The result is that as more and more of these non-functioning cells accumulate they interfere with the normal and effective functioning our various metabolic pathways.
A method of inducing the body to remove these inactive cells would go a great distance in arresting and possibly reversing what is now called "aging". Current research is actively being pursued to test and prove the efficacy of the new molecular compounds so as to identify effective treatment regimes.
Increasingly more and more researchers are applying deep learning models to their efforts. Recently researchers at the University of Edinburgh and the Spanish National Research Council IBBTEC-CSIC in Santander, Spain used a deep learning system to identify candidate senolytic compounds. They provided it with over four thousand compounds found in the DrugAge Database as training data. Within five minutes it identified three promising molecules. One of which, oleandrin proved to be remarkably effective with its senolytic properties.

In related news, Integrated Biosciences, the Broad Institute (MIT) and Harvard used a deep learning system to screen 800000 chemical compounds.

Novel Psycho Actives: using dendrimer technology one can envision fabricating combinations of pharmaceutical substances for highly specific and focused effects; were an agency or group to decide to use a tools such as CG4 to design a novel molecular structure then it does no seem to be out of the realm of reality that the most sophisticated combinations of molecular structures could be designed and delivered to a target; because these are at molecular scale they could be made to be effectively undetectable; they could be made to react to various environmental conditions or activate based upon a time release scheme; further they can be made to use the same payloads but have these payloads released at varying intervals; the possibilities are limitless.
Targeted Bioweapons: the ability to synthesize and model new molecular structures will be hastened with tools such as CG4; the rival company Deep Mind recently supported the effort to arrive at a SARS COVID-19 vaccine; the company used its Deep Fold 2 system to screen millions of possible vaccine molecular structures; the result was that it arrived at a small set of viable candidate molecular structures in a matter of days; equally possible would be molecular structures that were capable of causing debilitating physiological or psychological functioning.

Complex Molecular Payload Dendrimer

Carbon nanotubes. These are novel molecules with extremely regular lattice-like structures. They can be used to fabricate materials with novel properties. These properties can be targeted to result in materials of extremely high tensile strength, filtering capabilities and innumerable other specific applications.

Inorganic (materials, pharmaceuticals such as dendrimer, mono-filament molecules) such as: Room Temperature Superconducting Materials: such a development would revolutionize societies in ways that cannot be fully characterized; another usage of such a capability might be in the fabrication of power storage capabilities; these forms of molecular combinations could result in storage batteries with power densities hundreds or thousands of times beyond those currently available; a battery the size of a loaf of bread might be capable of storing sufficient power to operate a standard home with all of its devices operating for days, weeks or longer;

Carbon Nanotube

Extremely High Tensile Strength Materials: these might be derivatives of carbon nanotube material; but with much higher tensile strength; fibers made out of such material can be used as a saw blade; strands and weaves of such material could be used as a space elevator material; other uses might be in the use of nearly impervious shields such as bullet proof vests if woven into a fabric-like material and covered such that it did not endanger the wearer
Organic (Biological) Modeling Capabilities (proteins, enzymes, hormones virus, bacteria, prions); the identification of molecular structures that enable the interdicting of metabolic failure can be envisaged; this could mean that new tools can emerge that to beyond the already remarkable CRISPR-CAS9 model and its derivatives; one can envision the creation of variants of molecular substances that mimic the hemoglobin molecule found in certain reptiles such as alligators or whales; these animals routinely demonstrate the ability to remain submerged for many minutes on end without resorting to returning to the surface to breathe.
Combined Novel Molecular Modeling Capabilities (substances, pharmaceuticals); these materials may be the result of combining organic and inorganic molecular structures to arrive at a result with heretofore novel and unexpected properties and capabilities.
In recent weeks an awareness has begun to rapidly crystalize an awareness of the possibility of dual use molecular design and synthesis. The recent reporting that focused on Combinations Pharmaceuticals is a case in point. In this case the company fabricated its own deep learning tool. Its primary focus and cause for existence was and is for the discovery of viable, safe and useful pharmaceutical drugs.
Their discovery that deep learning neural networks could be used to facilitate search prompted management to opt for a targeted system capable of learning about how molecular compounds are structured. After a period of training their MegaSym system was dispatched to search for promising drug candidates for various purposes. On a whim their chief researcher Dr Urbani decided to flip the value associated with toxicity from a zero to a minus one. The result was that within six hours the deep learning system had generated a list of approximately 40000 chemical substances. In many cases the results were far more lethal and toxic than VX. A bit more on this momentarily.


Novel Protein Design. Recent developments in using deep learning systems has been the emergence of protein designs that are 'made to order'. These are protein structures whose properties a protein designer can specify. Within minutes the design software, known as RFdiffusion is able to offer molecular structures for review. It is now available as an open source software tool.

It is not far fetched to consider that this tool can be used for purposes that might have been considered science fiction just a few years ago. A case in point might be using a variant of this RFDiffusion tool to devise a variation on the human hemoglobin molecule such that it has substantially greater oxygen retention capacity. Mammals such as dolphins and whales might reveal ways in which their hemoglobin might be adapted for human purposes.

Extremely Toxic Targeted Molecular Weapons

A great deal of progress has been recorded in the area of the field of genomic manipulation as a result of the development and refinement of what are called CRISPR-CAS9 editing tools. These are molecular level tools that are capable of performing very precise editing of the DNA molecule. CRISPR-CAS9 and its derivatives such as CRISPR-CAS13 allow for the snipping out of highly specific sequences of lengths of the DNA molecule and replacement with a desired length. This means that hereditary problems such as Tay-Sachs, Cystic fibrosis or cycle cell anemia can now be treated.

In other uses it is now possible to genetically splice traits from one species into the DNA of another. In recent years progress has shown that the enzyme known as luciferase can be spliced from firefly DNA into the DNA segment responsible for skin coloration. The result is that one can now have animals that glow in the dark.
Synthetic Molecule Design. (MegaSyn VX Ekins Urbina North Carolina) Recent work at the University of North Carolina in collaboration with a private firm known as Collaborations Pharmaceuticals. resulted in a list of approximately 40000 chemical structures with known toxic to extremely toxic properties.

Synthetic Nerve Agent Molecular Structure

The list of toxic chemical substances was generated in a six hour period using an deep learning artificial intelligence system operated by staff at Collaborations Pharmaceuticals. Researchers discovered that many of the chemicals discovered were as dangerous or far more dangerous than the VX nerve agent which is odorless and tasteless and kill within minutes on contact. On reviewing their results scientists recognized the seriousness and risks associated with having a tool such as MegaSyn available. Their conclusion was that the dangers posed by this new technology were so completely off of known charts that new measures of risk and danger are requisite.
The fallout of these results has been far reaching. The researchers were invited to the White House to describe their findings and explain the risks associated. In sum because of the lethality of the chemical compounds that discovered and the ready availability strongly suggests that a chemical attack using a bioweapon attack using a variant of VX is extreme and present. The chief researcher at Collaborations Pharmaceuticals, Dr Urbina had not expected that MegaSyn their deep learning tool would produce the wide range of molecular structures on such an out of date processor in such a short time.

Cognitive Enhancement

Novel Targeted Pharmaceutical Enhancement Design. In the movie 2011 movie Limitless a wannabe author encounters an acquaintance of his while walking through Manhattan. The acquaintance passes him a small packet of tablets and suggests how they might help. It turns out that when used properly they provide the user with perfect recall. The effect that the nootropic is almost immediate. An individual who has ingested a small dosage is able to harness their ability to control both short and long term recall far beyond what is currently possible. Looking forward researchers may identify a means whereby the synthesis of selective activators as the fictional NZT-48 might become available.

Stephan Wiltshire - Photographic Memory

Societal Disruption Memory Enhancement. If we look forward a short distance we believe that there will be an emergence of gray market products and services that will restructure the world view of most Western societies.
These kinds of developments have been well known in prior eras. During the era known as Prohibition in the US in the 1920's and 1930's alcohol was prohibited from sale. The result was that alcohol black markets emerged. That this was so derived simply because there was an ongoing and persistent demand. So, where there was a demand, enterprising individuals found ways to either produce alcoholic based drinks or to smuggle it into the US. The result was that there was a huge market for black market alcohol and establishments where it could be bought and consumed.

BitCoin Anonymous Exchange

This fact simply reflected a basic truth of human nature. There should be no confusion as to whether or not human nature has changed in the past hundred years. The facts speak plainly that it has no. Proof can be seen with the long awaited decriminalization of cannabis. After several years of legalization in a few states many other states have followed suite and legalized cannabis. By and large the horror stories that the nay-sayers were claiming would happen have not materialized. That events have taken this path sets the stage for the next surge forward. By this we interpret how events have played out to suggest that they will continue to play out going forward, if albeit at a somewhat more brisk pace.
What we expect to see will be a continuation of the process wherein such psycho-actives as LSD and psilocybin have found footholds in research facilities with accreditation to perform legitimate, controlled research into the effects of these substances.

Our expectation is that a range of other psycho-actives will gain traction and acceptance. However they may find themselves relegate to the gray market for some time as societies at large become more comfortable with their presence in everyday affairs and how they impact ordinarily daily commerce.
Their emergence will be facilitated by three complementary elements: bitcoin and bitcoin escrow services, small chemistry suppliers and a means of demonstrating availability and reliability of the delivered product.

It would operate along the following lines:

  • BitCoin Account. A prospective client or customer would gain anonymity by establishing a BitCoin account.
  • BitCoin Escrow Account. Verification of a transaction will require the services of a neutral but reputable third party.
  • Precursor Supplier. The supplier would need to be able to post notice of the range of available choices.
  • Anonymous Logistics. Receipt of the semi-finished product would be expedited by having an anonymous logistic point. The American logistics company named United Parcel Service (UPS) or an enterprise providing similar capabilities would suffice. It is not unusual to be able to find a UPS store. A service of these facilities are the equivalent of numbered post office boxes. Once an order has been fulfilled and delivered the customer can be notified that it is ready for pickup and the supplier can be paid thus completing the transaction. In the range of actions anonymity is maintained.
    • Customer Purchase Order (CPS). A purchaser would select the specific end result molecular structure. This would be sent as an encrypted request to a known, reliable and reputable precursor pharmaceutical provider.
    • Chemistry Precursor Supplier (CPS). The pharmaceutical synthesist would accept the request, acknowledge its receipt and issue a detailed invoice. This invoice would specify the precursor elements and the relative dosages and steps needed to produce the finished product.
    • Bitcoin Account (BA). Each party would use Bitcoin as a means of payment. In order to proceed with the delivery the supplier would query a BES to verify that payment had been made.
    • Chemistry Precursor Validator (CPV). This is an independent third party selected by the Customer. The role of this party would be to validate the reputation of the CPS for any questionable activities or irregularities. The CPS would have delivered to the CPV very small quantities to test and verify that they were what they were claimed to be.
    • Bitcoin Escrow Service (BES). After payment had been made and the product precursor elements assembled, these would be presented to a second BES. This second CPV actor would then signal to the Customer that the shipment was what it was claimed to be. At this point the BES would authorize payment release to the CPS and shipment to the Customer.
    • Anonymous Logistics After the elements had been shipped then an AL facility would receive them. On receipt the AL would be able to notify the box holder of the arrival of a shipment to be collected. The anonymous box holder would then collect the items and signal to the supplier that receipt had been completed. Thus closing the transaction.
BitCoin Escrow Anonymous Confirmation Service

Modifications and adjustments to this process might be called for but they would set the stage for effectively breaking the monopoly that the large pharmaceutical companies have on almost all ingestibles.
That this will probably develop is supported by the fact that the underpinning mechanism required to facilitate this development are already in place. The basic elements required to bring this development forward will require an approach used by high-tech micro-electronic fabrication enterprises. Advances in micro-electronic components moved forward to face market demands of scale. One approach to meet this demand, despite a wide variety of highly specific demands was to take the approach of creating semi-finished micro-electronic components.

These components used what is called Field Programmable Gate Arrays (FPGA's). These devices with a large array of just a few types of chips embedded on them. They could have arrays of processors, processors and memory chips or these as well as other devices such as analog-to-digital or digital-to analog (A2D and D2A) chips as well. A customer would specify the first pass of fabrication elements, i.e. all processors, or all memory or combinations of each. The fabrication facility would then send these to the customer. The customer would then disable those elements that were not needed and only allow the desired ones to remain connected to each other. This had the effect of reducing costs considerably.
A similar approach can be envisioned in the zone of synthetic psycho-active pharmaceuticals. In this case a customer would specify the types of elements to be delivered and in what dosages. A supplier would then provide these elements to the customer. For purposes of verification commonly available test components would be recommended from third party suppliers. These could then be used to verify that the purity and dosages requested had in fact been delivered. It would then be up to the customer to follow the final step of assembly of all of the elements to make the desired end product.

Field Programmable Gate Array (FPGA)

Currently there might be reasons why a gray market approach may emerge first. This is because it would involve bypassing the established enterprises and government regulatory agencies. What is so well known and established is that the major pharmaceutical companies have shown themselves to be some of the most generous lobbyists in almost all of the major Western nations. We should expect that any activity that bypasses their ability to control and therefore derive profit from will be vehemently attacked. Therefore this necessitates the third element.
Advances in the study of neuroanatomical, neurophysiological and signaling has revealed a considerable insight into how the human brain processes and stores experiences from the real world into long term memories that can be retrieved at later times.

Long Term Memory Consolidation

Given the far broader and deeper body of knowledge now in our possession it is reasonable to expect that we shall see pharmaceuticals whose role will be to facilitate and accelerate the creation and retention of experiences into readily accessible long term memories. Refinements will likely also bring forward the ability to selectively focus on specific areas and topics of interests. This could mean enhancing retention of visual scenes, spans of audio information or other forms of sensory information.
Initially availability of these new classes of enhancers might only be accessible via gray markets. These might require the use of bitcoin exchanges via bitcoin escrow accounts. That this may be the pathway of last resort is corroborated by the intense pressure imposed upon various congressional committees by lobbyists for pharmaceutical concerns whose interests are to position themselves as the sole source availability of any new capability. And as such lock in a monopoly position on access to anything that might offer novel skills, competencies or capabilities.

Long Term Memory Mediation Pathway

Delivery mechanisms have become available that allow for very precise delivery of highly specific dosages and amounts of psycho-active molecules. We therefore expect that the ability to selectively enhance long term memory may be just around the corner. At such time that this becomes available then we may very well be witnessing an evolutionary bifurcation of individual who have enhanced themselves separating themselves from those who refuse to do so.
The reality of functional MRI (fMRI) capability enables researchers to focus on specific neurological pathways that enable the tracking of cortical activation processes. This suggests that in principle it should be possible to identify those pathways that facilitate short and long term recall for the purpose of optimizing extremely detailed retrieval of newly learned material or content.

John Brunner 1968 predictions for 2014

Eptification. The 1968 novel Stand On Zanzibar by John Brunner broached the possibility of facilitating highly specific and targeted long and short term recall using pharmaceutical means. In the novel a character named Donald Hogan is a PhD in biology. He has been on military reserve status for some number of years. He suddenly discovers that he has been activated and is given instruction to report to a nearby military facility. The location is innocuous but is highly secure. While there he is subjected to a process known as eptification; He is trained in a variety of subjects one of which is extremely lethal hand to hand combat; his training time is surprisingly brief; however on completion he discovers that he is able to recall things that he has written with amazing clarity. Modern day techniques comparable to those used by the MegaSyn system could well sketch out a pathway to the synthesis of something along the lines of NZT-48.
Social Engineering. Our perception is that unexpected and novel social developments and processes can be set in motion and managed over time. A catchall heading for these kinds of endeavors might be the category of "social engineering" for lack of a better way to identify a catch-all. Social engineering might result in emitting messages within a social sphere with the intent of motivating and activating various groups or collections of people; in this case the individuals themselves might or might not even realize that they are being manipulated.
A CG4 category tool can be used to create models of social processes; these processes can then be characterized in terms of how various groups respond to select social messages and signals.
For some social groups there are "hot button" issues that will motivate reactions ranging from peaceful demonstrations to violent protest reactions. The more finely tuned the model the greater control can that can be exerted to induce or provoke actions, reactions or interactions. In a broader context the same ability to understand how various processes advance means that industry models can be defined, articulated, modeled and studied for heretofore unsuspected linkages and sensitivities.
Invasive Species Mitigation. This might be a problem focus in cases where an uncompromising invasive species arrives seemingly out of nowhere. Its behavior is such that it requires resources as well as accommodation on the part of the new environment that it has lodged itself into. Due to its nature and character it has proven itself to be a subtle and relatively silent pest that consumes resources and crowds out the native species.
An example of this kind of situation can be seen in the Great Lakes of North America where the Asian Carp has invaded several of the waterways. They have proven to be a voracious predator and have crowded out the other native species. In order to mitigate their presence and associated risks conservation teams have had to resort to concerted efforts to halt their advance. Some approaches have involved dropping netting across waterways. Another approach has been to use electric shock fences to turn them back.
Secret Life of Plants. Recent botanical research has revealed that stands of trees form incredibly dense communications networks through their root systems. They use these root systems to exchange nutrients and messages. They have revealed themselves to be surprisingly robust in exchanging environmental messaging as well. In the event of an invasion attempt by a predatory or parasitic species they are able to signal each other to release toxins as a means to ward off these forms of attacks.
A lesson learned in trying to deal with this problem has been that they exhibit peculiar habits such as becoming very evident and active at certain times of day. Champions for their presence have shown that by emitting a certain pitch at these times of day will cause them to congregate in certain parts of a waterway. This congregation behavior can cause interruptions in the regular flow of events. In some cases these interruptions are mild and can be ignored. In other cases when serious fishery activities are at hand these can be very disruptive. An approach is recommended that would enable minimizing and ultimately removing this burdensome and irritating presence.
Industry Models. targeted industry segment analysis – identification of bottlenecks, weak links, possible disruption points.

Ultra High Resolution Process Modeling

Using CG4 it becomes possible to model a business process in arbitrary detail. This suggests that it is possible to create models of very fine granular detail. With the appropriate control mechanisms one can study the effects of internal or external events. Such as tool would enable deep understanding about the factors that adversely or positively impact that particular process. Such a capability can be disruptive depending upon how such insight is put to use.
Exploratory Analysis. Existing modeling tools have reached a level of sophistication that major government organizations, universities and think tanks have incorporated these kinds of tools into their bag of tricks. One can envision using a powerful tool such as CG4 to model the processes of a major geopolitical development. Recent news reports (as of June 2023) offer strong indications that the US and the PRC may be heading toward some form of confrontation in the South China Sea littoral. In at one instance a major think tank known as CSIS reported their results of an exploration of events involving a PRC invasion of the island of Taiwan.
According to various reports the results varied from just tolerable to remarkably bad. A tool such as CG4 can clearly be used to model in arbitrary detail the processes that involve multiple agents, a variety of resources and any number of uncertainties, potential bottle necks and other factors that can predispose events to progress in one direction rather than another.
Process Modeling: Social, Economic, Political, Geopolitical.Newer analysis tools will enable researchers to selectively focus on global areas of interest; the objective being the creation of tools that enable the operator to “drive” a line of analysis or discourse forward based upon real world limitations, resources, historical realities and current political imperatives; an extension to Caspian Report
Modeling commercial or industrial processes can be facilitated by bringing together individuals or sources that possess expertise or data and or knowledge about various aspects of how the target process functions. This means that actual real world processes can be modeled and driven in ways that the actual process and its elements could not. This means that any configuration of loading or overloading can be modeled as a means to stress test the robustness and resilience of the process to withstand unexpected loading. We note that this loading can take the form of being intentionally loaded by those responsible for its functioning or by those whose intent is to disable or destroy it such as an adversary.
Therefore the ability to use cognitive prosthetics to study existing or planned systems will show itself to be a high value pursuit going forward. Additionally by way of extension we posit that whereas the table below suggests a larger number of CI's that are able to communicate we would also take the position that any of these specific CI's might themselves be capable of communicating with an ensemble of comparable size independently of of how it was communicating with this top layer ensemble.

Cognitive Ensemble (CE) on standby Geopolitical Analysis Tool. Increased Granularity.
P 1 P 2 P 3 P 4 P 5 P 6 P 7 P 8
CG4.10 CG4.11 IBM.12 IBM.13 CG4.10 CG4.11 IBM.12 IBM.13
CG4.20 CG4.21 IBM.22 IBM.23 CG4.10 CG4.11 IBM.12 IBM.13|-
CG4.40 * * * IBM.01 CG4.01 * *
IBM.01 CG4.01 * * IBM.01 CG4.01 * *
CG4.10 CG4.11 IBM.12 IBM.13 CG4.10 CG4.11 IBM.12 IBM.13
CG4.20 CG4.21 IBM.22 IBM.23 CG4.10 CG4.11 IBM.12 IBM.13|-
CG4.40 * * * IBM.01 CG4.01 * *
IBM.01 CG4.01 * * IBM.01 CG4.01 * *

Note the CE configuration in the above table. We posit that collections of cognitive appliances can be gathered together into considerably larger numbers. The increased numbers would increase the granularity and therefore the precision of a proposed model. The actual level of resolution would be driven by the requirements of the organization that held the responsibility to deliver reliable, credible results.

Ultra High Resolution Geopolitical Conflict Analysis Modeling Tool


Boundaries Exploration. Newer tools will enable the development of far more detailed and compelling social, economic, political policy proposals grounded in common sense; possible ways to solve older, existing problems using recent insights into the mechanics, linkages and dynamics of observable processes.
New Value Propositions: near term job market realignment, disruption; (increased social dislocation, disruption). According to the British financial management firm Lucidate source data set information can be provided to CG4 by converting the desired textual material as a .txt file and entering it directly. It can then be preprocessed such that structuring and prompt elements are provided for the system to use to return responses.
Looking forward we can foresee the prospect that a new support sector might emerge that provides rapid knowledge capture and preprocessing services. It would make use of high speed text and image capture. Optical character reading (OCR) capabilities would then render the captured images into processable text.
Isakara Labs in Tokyo demonstrates how their research can capture 250 book pages of text per minute. One can imagine a small enterprise with a teams of individuals whose tasks would include book capture then conversion to variously text or PDF format for loading into the training data for specific purposes.

High Speed Knowledge Text and Image Capture

Locus of Interest. Emergence of position nexus ecology; crystallization of political polarization; these might be further developments of existing “channels” currently available on youtube.com; but would operate independently of that platform, but become accessible via a “white pages” type structure.
Food Chain: The emergence of specialist groups dedicated to supporting various actors in the nexus ecology; these will follow existing business development lines with market segmentation and brand identification; we should expect to see emerging markets with offerings that are priced as: high, best, low and niche.
Because of the novelty of these new technologies we should also expect to see the emergence of a set of market places that reflect those found in most commercial settings; this means that there will be.
Market Positions by Price - High, Niche, Best, Low. We should expect to see a rapidly developing market place for new value propositions. These will involve the exchange for ideas, capabilities and services. This marketplace will probably evolve rapidly and shadow the development of the software market place. Initially when there were very few software vendors and the marketplace was perceived to be small then prices for individual software items was substantial. A spreadsheet tool such as Lotus 1-2-3 ran in the hundreds of US dollars. As the marketplace grew prices came down. As perceptions of the size of the marketplace sharpened new products and service providers appeared and the prices gradually fell. We should expect to see a comparable shakeout in the emerging market place of cognitive "fittings", "couplers" and other forms of connectivity.

MarketPriceMap.jpg

Open markets (Official Market). These will be openly and easily accessible and provide buyers and sellers a readily accessible location to enact their exchanges.
What may develop will be a marketplace like any other open, above board marketplace of buyers and sellers. These can be found scattered all over any given major web paged. They often involve being obliged to see and respond to a pop up add in order to view the desired content.
What will also shadow this open marketplace will be gray and black market places wherein items are available for exchange that have not yet received full sanction of the host society.
Recognized Unofficial Markets (gray market). These can be expected to be venues in which are in unregulated venues; they might be located geographically anywhere on the planet.
Covert Markets (black market). we should expect that these venues will function as they always have; unregulated and very much caveat emptor.
Some Talking Points. Following are a few talking point topics that might serve as a point of entre into the discussion of what kinds of risks CG4 and its variants might pose. We recognize that risks might manifest from malicious actors, systemically and organically or, by way of speculation, using our insight and knowledge about how earlier technologies required regulation and management. We recognize that control of these new technologies may be required insofar as the benefit that they offer might outweigh the downsides of their use.
As in prior technologies there may be the need to demand licensing, registration or other forms of regulation. In the meantime we recognize the reality that human nature has shown itself to be immutable across the span of written history. Therefore we should expect that even if some form of regulation or licensing emerges with this technology there will always be so-called "black markets". The talking points that follow defer discussions of moral imperatives but instead focus upon the possible, knowing what we know about the realities of human behavior. They therefore serve only as a means to spotlight the more obvious uses that this emerging technology might come to light.
Problem Characteristics. (these need a) a sanity-check b) another consistency pass, find the center of gravity and redistribute focus accordingly).
Perceptions. {Provocations False-Flag Misdirection Compromise }
Beliefs. The major western societies have belatedly discovered that managing perceptions and beliefs has become a major problem. The arrival of broadly accessible social media have created communications environments that can serve up the full range of audio and video content.
And this can all be done with or without any prior vetting, verification or editing; recent developments with tools such as CG4, Dall-E, and MidJourney have enabled the creation of remarkably convincing reports, documentaries and images; which in all cases can be made almost indistinguishable from reality; this trend will continue to refine to the point that it will require very special and powerful tools to decipher fact from fiction; the more sophisticated creation tools will simply lengthen the time required to correct public perceptions and beliefs about what is or is not true. This will prove to have created an environment in which risks to societies in terms of disruption, dissention and violence will be escalated.

These tools will presently arrive at a state wherein a small group of dedicated and competent individuals will be able to create content that will rival any evening news report; which can set in motion social movements that the responsible civil authorities will find challenging to diffuse. This situation has already become the new norm. This can easily be recognized by reviewing how current events political narratives are presented; it is no longer surprising to encounter dozens of "news" reports with the most remarkably inflammatory tag lines or claims; going forward the sophistication that political and social messaging will reach the point that whole new communities will crystallize; currently much of the fare that is viewable caters to communities of interest; going forward elements of these communities will coalesce into communities of action - with the result that actual "facts on the ground" will shift in possibly sudden and unexpected ways.
Extortion. The Office of Personnel Management breach in 2014 signaled the fact that a broad swathe of individuals who operate in extremely sensitive roles can be placed at risk overnight; the severity of this breach can not be overstated because of the fact that in almost all cases the individual who have been identified have had their personal identifying features revealed for the whole planet to peruse; a hostile actor can now collect all of this information, analyze it and create mapping information that reveal associations, travel patterns, chain of command and any number of other revealing insights; any and all of these can then be used as leverage against any of these individuals.
Nano-Scale Fabrication. The ability to fabricate extremely novel pharmaceuticals is palpable. Given that there are tools available for the creation of molecular structures with remarkable and novel features, traits and characteristics means that the range of possible uses can not be foreseen. The inherent risks associated with the creation of heretofore unheard of or even unimagined materials and drugs can not be underestimated. We should expect to see materials with strengths that rival or exceed those found in nature, a prime example is spider's silk; which is known to be multiple times stronger than steel and far less brittle.
The availability of polymeric molecules such as dendrimers means that a facility with the requisite tools and skills will be able to turn out on-demand ethical drugs that can only be guessed at; were an actor or agency wish, pharmaceutical substances can be fabricated wherein their effects can be modulated - to successively be more or less intense for durations that only the designer can specify; this means that powerful mood and perception altering psycho-actives can be fabricated and delivered using means that are untraceable and extremely surreptitious.
By way of example, one can envision a dendrimer molecule, possibly a set of these being released into a religious gathering by way of illustration, suppose that a powerful psychological disinhibiter were to be embedded within a low generation (six layers for instance) multiple layers could contain concentrations of this disinhibiter; each layer could be designed to have a solubility quotient whereby it might dissolve either more quickly or more slowly.
Individuals subjected to airborne dosages of this psychoactive could find themselves experiencing waves of mental relaxation; any suggestive external stimuli might add to the effect such that verbal suggestions, or possibly visual imagery could be sufficient to induce behavior in corresponding to that stimuli.
Current neuro-anatomy mapping suggests that this technology can be tailored to act upon highly specific cortical regions; add in the possibility of delayed release of successive psycho-actives and we can be faced with situations wherein substantial numbers of individual can be induced into unexpected and even possibly uncontrollable personal behaviors.
In order to make a preliminary assessment as to whether and how the original questions posed at the beginning of this exercise can be answered we summarize them in the following. From there we attempt to suggest possible answers. However this would seem to mean that a synopsis of the various types of risks described above might need to be used as a baseline against which to assess the questions as they have been posed. To that end we attempt to summarize the more glaring instances of risks that seem to entail considerable and immediate risk to the "here and now" world that we all inhabit.
Suppose that we postulate the above to be so, we do believe that risks described as theoretical or systemic could come into existence sooner than most observers expect. Therefore we will use this as a staring point.
Risks. {Systemic Malicious Theoretical (SMT)}. To list a few that seem to be most imminent and pressing:

  • Manufactured or Manipulated Realities and Narratives.

- The ability to craft ultra-realistic messages involving texts, ultra lifelike avatars that make claims about individuals, events or conditions that are not true;
- Sentiment manipulation such as that created by Cambridge Analytica;
- The ability to use and control existing infrastructure (communications, power, civil systems) to cause unplanned outages, wreak chaos, panic and confusion;
- The intrinsic pressures involved in an industrial process to adapt the most recent tools and techniques to maintain competitive standing.

  • Intrinsic Obsolescence.

- We can see this in strike activities such as the (WGA strike of screen writers) or in other venues.
- Marginalization of transportation workers through self driving vehicles (automobiles, trucks, busses);
- Thinning of professional ranks such as software developers, legal, medical professionals;
- Marginalization of educational professionals;
- Narrowing and steepening of of academic oriented ladders;

  • Boosted scientific advances.

- AI designed chemistry, biology, other scientific experiments toward the end of creating new materials, pharmaceuticals and other substances and materials.
- Rapid to instant dissemination of research and design information focusing on advanced dual use tools, materials and substances.

  • Accelerated domain knowledge refinement and modeling.

- Modeling tools that allow for highly realistic and exquisitely detailed analysis of economic, social, political and geopolitical systems;
- Emergence of new market places offering heretofore unavailable pharmaceuticals, processing tools or other forms of control;