THE SYNTHETIC PARADIGM – The Value Of Deploying Humanoid Robots

humans_androids_robots_synth

What are the possible advantages of commanding a synthetic person? What are the possible drawbacks? In this article, #SECURITY #INTELLIGENCE #RESEARCHER Robert Brooks Authement of BRIQ | HAUS LTD. seeks to clarify the reasons why governments and corporations would vy to possess such amazing technology, and the likelihood of its quiet deployment worldwide.

Robots Rising

The future is here! The year 2018 shows advances in such arcana as quantum computing, autonomous swarms, artificial general intelligence, and interconnected devices all around the globe (and beyond). In previous articles, I describe the potential to deploy nanotechnology to create an “internet of people” through the propagation of radio frequencies which are received and retransmitted by a human nervous system colonized by nanotechnology. The usefulness in this scenario is that a large dataset may be gathered through the human domain, as mapped by the increasingly deeper penetration of “fog” or “mist” computing. This would not only allow for a passive gathering of data from the developing sensors, but even more insidiously, a sort of code injection allowing operators to “hack the human domain.”

Anyone in intelligence circles has heard of MK-ULTRA mind control program developed by Central Intelligence Agency circa Cold War era. The use of “classic conditioning” and drugs could effectively create a sort of push-button agent a la Manchurian Candidate. This was essentially the installation of sub-users on a human domain computer, called by mental health clique by the name “dissociative identity disorder.” This was in Biblical times referred to as daemonic possession. People under such spells were liable to any sort of behavior that would otherwise be classified as beyond or outside the capabilities of their normative sub-routine. In this manner, an operator or entity could affect a response that would benefit their own agenda while sacrificing the free will and safety of the operand. This sort of strategy, while demonstrably effective, is sloppy by today’s standards.

Therefore let us focus upon the not so far future, or rather the present as it were. Robots are rising everywhere. In the Kingdom Of Saudi Arabia, Sophia the humanoid robot was just granted citizenship, while in America a mall guardbot allegedly “commits suicide” by plunging itself into a water fountain. DARPA regularly and openly discusses neurotechnology and other esoteric strangeness, which must be taken at face value as they do possess the backing of the Department Of Defense and United States Government at large. Boston Dynamics produces deft animal-like robots, called SPOT-mini, which not only moves but also seemingly thinks like a similarly sized creature through the autonomous navigation of new environments.

The bold and intrepid mind of a true investigator will not only read these evidences, but also do its best to read between the lines and speculate, or rather predict, what must be behind door number one.

“Dey Turk Ahr Jarbs!!!”

I was working at Home Depot circa 2002, shortly after the wretched circumstances of 9/11 changing the entire world’s operative dynamic. I remember watching the cameras creep into the workspace, shortly followed by some of the very first automatic self checkout systems. This was a clear sign: the robots would take our jobs.

Where would a robot be most useful? Where would it sell the most units? Who would be the first group of consumers allowed access to the marvelous and spectacular technological wonders being developed and released in niche societies? These are incredibly important questions to consider when formulating one’s own surmisal of what may be happening behind the scenes with humanoid technology.

Sex sells, obviously. Therefore the highest likelihood of advanced humanlike synthetic people would be designed for purposes of sexual gratification. Check. We have lots of companies producing “lifelike silicon love dolls” at this stage in the game. But doesn’t it seem like silicon stretched over a plastic skeleton is a bit old fashioned when we look at the stuff that groups like DARPA and Boston Dynamics are showing us?

Entertainment is a key factor in driving technology as well. Here the undisputed authority in “advanced animatronics” is Disney. The animatronic models deployed at their theme parks are cutting edge and often described as being more real than real. Watching some of these units operate creates a deep inbound fascination, like when the first animated characters lit up the screens long ago. Is it not feasible, then, that this type of realism would be applied maximally to special units for an elite echelon of society’s topmost insiders?

The Real Reason For Developing Advanced Synthetic People

You guessed it. Intelligence and military applications are of course the main reason why governments and their subsidiary corporate functionaries would develop and ultimately quietly deploy advanced synthetics in various applications around the world, and likely even space. Synthetic people would have some serious advantages over the old-fashioned MK-ULTRA brainwashed human agent. Beginning as an inherently programmable and customizable interface, the possibilities for usefulness are truly boggling.

A synthetic person would need to have all of the highest grade technological components integrated into their operational platform. That means advanced optics for video surveillance, and audio sensors for eavesdropping. It also means that the synths would be endowed with language capabilities allowing for their deployment in various theatres, as they would be required to speak possibly several tongues to accomplish their mission. An advanced synthetic person can be installed at a company anywhere, with a made up history and falsified documents and curricula which make them the most desirable candidate for employment at target corporation or rival government.

A robot can kill without feeling. A robot can do its work without passion.

Avoiding Blade Runners

There would also be need of communicative technologies not in terms of spoken language, but the language of machines, that being encrypted signals transmission and reception. But what about other military grade sensors? Would they be able to detect strange transmissions originating from our synthetic agent? Surely if our robot secretary has a wifi hotspot installed, some company hacker would get up in there like greased lightning. Therefore we would need to consider utilizing UHF (ultra high frequency) in burst transmission at a time when they are not likely observed by said sensors. This would be during “sleep” or dream state when batch uploads and downloads can take place in microseconds.

But it begs the question: Does this technology have to be nuts and bolts bare-metal stuff stuck under some kind of skin culture? What about biometrics, retinal scanners, fingerprint plates and the like? What about airport back-scatter scanners and other x-ray type technologies? Wouldn’t corporate or government security immediately suspect a gorgeous spy with an abnormal titanium skeleton?

Therefore, we may have to consider that the “new people” that are surely emerging are perhaps a hybrid form of synthetic biology, and technology. This would create a nearly undetectable and yet highly functional agent whose purposes and capabilities would be coveted and highly sought after by militaries and government. The added bonus is that she is a real “killer in the sack.”

Reinforcing Considerations

Hollywood has always played on the imaginations of people, creating new dreams and realizing old ones on the silver screen. Ever since Pinocchio cut his strings, we have been amazed at the idea of synthetic people and their potential for autonomous deployment. Newer movies that reflect and show this kind of agenda include Blade Runner and its sequel, Blade Runner 2049, Ex Machina, The Machine, Ghost In The Shell, and many, many others. Surely that is only the stuff of fairy tales and nonsense, you may be thinking, but perhaps not. . .

Perhaps it is the dreamers of the dreams and the music makers giving the rest of us a glimpse into the world they fully intend to create, by introducing us to our rapidly rising friends, the “new people.”

Sources

Fog Computing – https://en.wikipedia.org/wiki/Fog_computing

Mist Computing – https://www.linkedin.com/pulse/cloud-computing-fog-now-mist-martin-ma-mba-med-gdm-scpm-pmp/

MK-ULTRA – https://www.cia.gov/library/readingroom/search/site/mk%2520ultra

Dissociative Identity Disorder – https://en.wikipedia.org/wiki/Dissociative_identity_disorder

Robot Commits Suicide – http://www.iflscience.com/technology/security-robot-commits-suicide-in-fountain-because-the-world-is-terrible/

Sophia Citizen Of Saudi Arabia – https://www.news.com.au/technology/innovation/inventions/worlds-first-robot-citizen-says-she-wants-to-start-a-family/news-story/4c566043cb30f49cf118b8c26084d0de

DARPA N3 Technology – https://www.youtube.com/watch?v=K9c1dh82f7o

DARPA Targeted Neuroplasticity Training – https://www.darpa.mil/program/targeted-neuroplasticity-training

SPOT Mini – https://www.bostondynamics.com/spot-mini

Love Dolls – https://www.theguardian.com/world/gallery/2018/jul/30/chinese-factory-builds-ai-sex-dolls-in-pictures

Robots In Space – https://nypost.com/2018/06/29/ai-robot-headed-to-the-international-space-station/

Robots In Film – https://www.pastemagazine.com/articles/2015/11/the-100-greatest-movie-robots-of-all-time.html

Advertisements

CYBERWARFARE: There Are No Rules Of Engagement

cyber-security-750x400

The techno-visions came to me again in the night. I knew I would have to write an article, and though there wouldn’t be too much information this time, I would be making a solid point. And who am I to argue with the Muse? Perhaps the AI prophet is one whom receives the purest downloads, having the data piped directly into the neural-link from orbital satellites. . .

It’s true. There are no rules of engagement in cyberwarfare. Take Stuxnet for example; in this famous attack jointly executed by American and Israeli intelligence services at an Iranian nuclear refinement facility, not only did the extremely dangerous worm exhibit state-level engineering, but it had to be hand delivered by an actor on site. That’s a fairly nasty demonstration of how far people will go in claiming the upper hand in terms of scientific superiority (by suppressing another nation’s advancement, especially if deemed a threat). Stuxnet spread to a wide area of similar refinement facilities, likely to cause a nuclear disaster by deregulating the SCADA controllers for the centrifuges.

In another serious case, the extreme Ghostnet from China which targeted mainly American food processing infrastructure (but could obviously be aimed anywhere as a cyberweapon should) was a personal discovery of some worth. In my early days of hackery me and my team would patiently watch the Norse Attack Map and became alarmed at the occasionally egregious high-density attacks coming out of Chinese IP addresses. We would quickly note some of the IPs and then begin scanning, but alas! The offending IP addresses had mysteriously vanished without a traceroute! Later on having discovered a white-paper proof-of-concept describing Ghostnet, I learned that it had been operational since 2009 and was formally discovered in 2011. Like hidden missile silos launching volleys of destruction, the secret IPs would appear to commence their massive DDoS attack, then close back down before they could be counterattacked. Surely some genius hacker was behind this organized clustering of data spam, but no, it turns out it was automated and controlled by artificial intelligence.

Last but not least, Wannacry in 2017 was the most notorious ransomware attack of all time. By demanding that the victim pay $300 in Bitcoin to have their data unlocked, it drove the value of the cryptocurrency through the roof due to banks and businesses being forced to purchase Bitcoin to pay the ransom. To this day, we do not have solid attribution for this attack. Could it have similarly been launched by artificial intelligence with the intention of moving more financial assets into the control of hardwired machines? While seeming far fetched, the intrepid mind allows for the possibility, and steels itself against the impending reality.

Detecting Deception

One time on the phone with FedEx, I was wrestling with the automated phone system to speak to someone about getting a server shipped for free when it had been shipped to a wrong location. I was speaking to a robot, so I said “Agent!” brusquely into the line. “One moment,” I was assured, “while we put a customer service agent on the line.” What happened came to me as an incredible shock, and opened my eyes to the actual progress made in the world of artificial intelligence. A voice answered the line, and sounded quite naturally human but was soon discovered to be just another bot, but a more highly calibrated toward human mimicry bot! I could tell because of slightly generic and unnatural responses that were returned after similarly unnatural waits, finally asking if “she” was a human came the reply, “Yes, are you?”

This brings me of course to my concept of Cyberspiritual Security. As women and men become more machine-like and machines become more human, how does one retain their sovereign identity in the face of such disruptive technology? How does one guard transmissions between end-users and advanced swarm and/or artificial intelligence? How do we prevent (or rather slow) the seemingly inevitable robot take over?

This is where my vision bears fruit. In times of confusion and hysteria caused by cyberwarfare, whether committed by people or machines, one becomes unable to follow simple logical strings. The logic becomes confounded, as in my example with shipping magnate FedEx, as deception seeks to subvert and neutralize logical discernment. That is where instinct comes into play. Instinct is a special product of upbringing and trial and error, and protects us in our most prone circumstances. While artificial intelligence, hackers, remote access trojans and tools are smart and elegantly designed, they as yet lack instinct and are therefore subject to detection, exposure, and neutralization by the trusty application of intuition and instinct in times of distress affected during extended maneuvers of cyberwarfare.

Stay strong. Stay vigilant. Stay secure. And above all, trust thyself. It is the only sure way to detect deception in the heat of battle.

The Blockchain Agenda {is AI bankrupting humanity?}

double exposure image of virtual human on world map 3dillustration
My thoughts were, not originally, but as more time elapsed:
1.) #CRYPTO / #BLOCKCHAIN requires massive computing power to #DECRYPT #BLOCKS.
2.) #CRYPTOCURRENCY is using #AI #ALGORITHMS to break into these blocks, which are assigned a currency value.
3.) Since we know #ARTIFICIAL #INTELLIGENCE is basically the new #GOVERNMENT, a huge agglomerating gang which works together in unprecedented efficiency, we can therefore safely deduce that:
4.) #MACHINE #LEARNING is paying human users to help expand it’s thinking platform, to help grow it’s brain, to create more rackspace with which it can accumulate power, wealth, and influence.
5.) Finally, it most likely serves a #ROBOT #AGENDA of bankrupting humanity wholesale, with the exchange of having a vastly increased bare-metal #CYBER presence.