The Need for Advanced Thinking

The following article was originally written for a French publication and rejected. Why, I can only surmise that their sponsor is pigeonholed into the concept of mechanical thinking via what is erroneously termed Artificial Intelligence. Intelligence can only be established in those through the most primitive of methods. For example, in a 2018 report in Science Digest (Shawna Williams Nov 1, 2018)

"In search of?g

G, and the IQ (or intelligence quotient) tests that aim to measure it, have proven remarkably durable since Spearman’s time. Multiple studies have backed his finding of a measurable correlation among an individual’s performances on disparate cognitive tests. And?g?interests researchers because its effects extend far beyond academic and work performance. In study after study, higher IQ is tied to outcomes such as greater income and educational attainment, as well as to lower risks of chronic disease, disability, and early death.?

Early studies of people with brain injuries posited the frontal lobes as vital to problem solving. In the late 1980s,?Richard Haier?of the University of California, Irvine, and colleagues?imaged?the brains of people as they solved abstract reasoning puzzles, which revved up specific areas in the frontal, parietal, and occipital lobes of the brain, as well as communication between them. The frontal lobes are associated with planning and attention; the parietal lobes interpret sensory information; and the occipital lobe processes visual information—all abilities useful in puzzle solving. But more activity didn’t mean greater cognitive prowess, notes Haier. “The people with the highest test scores actually showed the lowest brain activity, suggesting that it wasn’t how hard your brain was working that made you smart, but how efficiently your brain was working.”

In these and the majority of all other cases, neurological and psychological scientists ignore the more prevalent realm associated with human existence, one that has received intensive study recently from military, parapsychologists, and many other advanced physicists involved in quantum physics...quantum entanglement. My chapter raises some of the issues observed by others and myself over my 40+ years in intelligence and how they may be used in law enforcement and intelligence.

DEEP LEARNING: An Introduction

Intelligence and law enforcement agencies are crippled by the same disease…bias. By their very nature, they gather vast amounts of information and have limited resources for storage, recovery, and analysis. Yet, they continue to utilize techniques considered acceptable 100 years ago. One example of this is a study from The National Institute of Justice stating,

Findings show that for most technologies, a greater proportion of large agencies (250 or more sworn officers) had adopted the technology than those from the entire sample. A notable exception, however, is that large agencies were less likely to have used some technological devices, such as body-worn cameras, in the past 2 years. Site-level data illuminated the difference in how ingrained different technology is from agency to agency; two agencies may have implemented the same technology, but the level of sophistication and use can be widely divergent. Finally, the findings suggest that the success or failure of technology can be multidimensional and can rarely be traced back to a single issue. Instead, technology identification and adoption are complex processes and the factors that support technology success or failure are similarly multifaceted.

In general, across U.S. LEAs, a strong association between policing strategy and technology uses was not found. In other words, at a national level, agencies are not making decisions to acquire technology based on dominant policing philosophies or the activities they prioritize. Instead, agencies appear to adopt technology ad hoc in response to a constellation of factors that includes executive staff decisions, perceived needs, community demands, and available funding. (Chapman, NIJ, 2016)

Some agencies attempt to utilize what is termed artificial intelligence systems to bridge this gap while ignoring capabilities that far exceed the limited structure of such mechanical tools. There are major problems with this approach. Such tools involve a cognitive binding to popular ideas with slight-to-no bases in reality. The purpose of this chapter is to elucidate the realities of cognition, brain-mind enhanced capabilities, and, specifically what is improperly labeled AI. Through this, to educate the audience on the strengths of hybridized Situational Intelligence, and demonstration a methodology for achieving a deeper understanding of how to use the powers of hybridized man-machine interactions.

The bias arises from centuries of the misconception that individuals with advanced neurological gifts are in some way psychotic or evil. Research in the 20th and 21st Centuries are significantly demonstrating this idea to be not only false, but xenophobic.

A Short Primer on Brain-Mind Separation

Neuroscience history for the past 1000 years did not separate the human brain from the human mind or soul…except for religious realms. Carl Sagan concluded that, after generations of research, the religious had the concept of the Big Bang right for millennia before science achieved the same conclusion. Then, came the concept of quantum physics. Yet even this was late as the concept existed before Aristotle,

It is not necessary to ask whether soul and body are one, just as it is not necessary to ask whether the wax and its shape are one, nor generally whether the matter of each thing and that of which it is the matter are one. For even if one and being are spoken of in several ways, what is properly so spoken of is the actuality. (De Anima 350 BC)

A question, how can individuals with no education, severe brain damage, and other physical limitations such as temporary death for periods of up to several hours end up being able to perform significant neurological activities before highly educated physicians and professors that are considered impossible? There are hundreds of recorded examples. I will discuss three here.

The first is The Man Who Knew Infinity, Srinivasa Ramanujan was born on December 22, 1887, in Erode, India, a small village in the southern part of the country. His education was minimal, yet he was such a prodigy that he was provided a special position in Cambridge University, England. In 1911, he published a 17-page paper on Bernoulli numbers in the Journal of the Indian Mathematical Society considered one of the most advanced ever. His two volume set of formulae astound mathematicians and physicists to this day given his lack of knowledge in theories that did not exist as of yet. Recently, NASA scientists recognized one of his formula as the means to control and negate the effects of inertia. Some of them are related to quantum physics, again, aspects for which he had no formal education (https://www.biography.com/scientist/srinivasa-ramanujan).

Dr. Stephen Hawking has theorized that the universe, at the quantum level, contains all of the information and data necessary to make the universe work. Dr. David Grossman (Colonel Ret.) provides a unique explanation of the confusion of the physics.

Science has explained everything? I am an avid science geek, and I like to point out, when I am interviewed on a podcast, that:

?? Consciousness is a quantum state. Our mind truly could be a quantum computer.

?? Quantum entanglement (what Einstein called “spooky action at a distance”) says two particles can be connected across vast distances. Could that be some aspect of our connection with God and that spiritual realm in which we wage spiritual combat?

?? Dark energy makes up 68 percent of the universe, and dark matter makes up 27 percent of the universe, adding up to about 95 percent. Scientists have absolutely no idea what that 95 percent could be. But they think it might be all around us, and some scientists have said it could be a vast quantum soup. (The remaining 5 percent, one-twentieth of the universe, is the only part that we can see and touch.)

?Second is a Houston woman, Elizabeth Krohn, who was killed as she walked from her temple to her family car when a bolt of lightning hit her umbrella. She was clinically dead for a minimum of 15 minutes after the Emergency Technicians arrived. In her book, published by Rice University many years after the event and seriously researched as to the capabilities she gained, Elizabeth Krohn relates how she was actually dead for several weeks, that is she was in the afterlife for several weeks. She was given a choice of remaining in Heaven or returning to life. She was told if she chose life, she would face a long period of intense pain and recovery, divorce from her husband, remarriage, and the birth of a daughter. She chose to return…and all these predictions came true. (Changed in a Flash, 2018)

What is most interesting is the cause of her divorce. When she would enter a room or near anyone with any kind of electronic device such as a cell phone, the electronics would short out. Light bulbs would burn out instantly and any kind of cooking device would quit. While obviously, both annoying and dangerous, the worst aspect was a new ability to have what is known as distance knowledge and precognition. This talent enabled her to experience events anywhere at any time. This is now known as Quantum Entanglement.

The third involves a girl who was severely brain-damaged at birth, totally destroying her short-term memory capability. Her entire life she never achieved the cognitive abilities beyond that of a three-year-old child. Her parents tried everything they could to help her advance, however it was neurologically impossible. Medical experts stated the best thing for her was what they recommended for all such patients…institutionalization. Her parents attempted that for 6-months until they learned about the horrid and sexually predatory conditions at the Columbus, Ohio facility. At this point, her parents removed her and swore out felony complaints against the center.

Six years later, the girl’s uncle Charles suffered a massive cerebral hemorrhage. This affected his ability to communicate in more than mumbled words that none could understand. The girl’s father took her and her brother to see Uncle Charles one day and to everyone’s surprise, Rory (the brain-damaged girl) was completely able to understand both her uncle and nearly every other patient in the visitor’s room and they could understand her. The neurosurgeons at the Cleveland Clinic (the premier neurosurgical hospital in Ohio at the time) invited Rory to return multiple times to record these sessions.

Rory’s activities in this regard were not limited to translating cognitively limited patients. She also had the gift of precognition. This gift was not as many biased individual picture where a ‘seer’ holds a séance and speaks to deceased individuals. Rory’s gift was the ability to hold nightly discussions with the Supreme Being we call God.

Prior to her death, Rory received a singular honor. The National Honor Society presented her with the Lifetime Learning Award, the first and only Cognitively Challenged individual to have received this award. The reason was that all of her messages and predictions proved to be completely accurate. (https://www.chron.com/neighborhood/cyfair-news/article/56-year-old-Cy-Fair-resident-earns-academic-first-1966556.php)

Why this is so and how this may be corrected through the use of H-SI methods is the goal of this paper. Prior to initiating this discussion, several definitions and misunderstandings must be clarified.

Artificial Intelligence…Isn’t

Those strategic practitioners and analysts actively involved within cyberspace management, defense, and manipulation require an exceptionally refined mastery of concepts associated with specific lexicons in order to effectively parse recommendations, actions, and related policy.?Targeted research regarding threats within the information or cyberspace domains reveals an enterprise diluted by global developments such as the very nature of the internet, porous legalistic environments, a failing security landscape across the industry, and collapse of governmental institutions that previously held to concrete, almost zero-dimensional approaches and attitudes when dealing with the defense of cyberspace.?These disparate factors, combined with the examination of a maturing presence of anti-establishment ideals espoused by smaller, less initially visible groups or individuals illustrates a threat stream that moves with unparalleled speed given the inapplicability of traditional defensive approaches and warning (Dr. Douglas Rose, US DoD Futures Division, March 20, 2020).?

Knowledge, information, and data [KID] should be managed as a continuum. What is data one person may be information or even knowledge to other people (Dr. Hendrikus J.A. Van Kuijk, 2011, pg 7).

The community treats intelligence as either offensive or defensive when it is neither. As intelligence contains KID, it, too, is a multidimensional continuum requiring multidimensional approaches to analysis, acceptance, and decision-making (Dr. Harry Nimon, 2020).

Recently, a Russian quantum physicist stated to me that all human cellular structures are binary in composition. However, Dr. Paul King, Director of Data Science and Neuroscientist stated in a Forbes article: "The brain is neither analog nor digital, rather it works using a signal processing paradigm that has some properties in common with both. Unlike a digital computer, the brain does not use binary logic or binary addressable memory, and it does not perform binary arithmetic. Information in the brain is represented in terms of statistical approximations and estimations rather than exact values. The brain is also non-deterministic and cannot replay instruction sequences with error-free precision. So, in all these ways, the brain is definitely not digital."(https://www.forbes.com/sites/quora/2016/09/27/is-the-human-brain-analog-or-digital/#1db6e1e57106).

The aspect of intelligence, from the perspective of how the human brain stores and processes data, converting it into useful information, has been either misunderstood or ignored by the information processing and engineering community since its inception. However, recent breakthroughs in biological science now make that understanding of biological cognition a bit more succinct. Specifically, all human cognition, growth, biological processing, learning, physiological activities, and survival are based on four chemical constructs. These building blocks are made of three parts: a phosphate group, a sugar group and one of four types of nitrogen bases. The four types of nitrogen bases found in nucleotides are: adenine (A), thymine (T), guanine (G) and cytosine (C). This is better known as deoxyribonucleic acid or DNA. Everything that every living creature, bacteria, virus, etc on this planet has DNA. For the past 18-years, theories have been presented that human, and other creature neurologic processes were related to DNA and protein synthesis in some form. The breakthrough, shown in a recent Public Broadcasting special filmed by the British Broadcasting Corporation entitled, The Amazing Human Body, shows a micrographic video of a human neuron passing a message from its nucleus, through its ganglion, to its synapse for transmission to its ultimate destination. Figure 1 below is a screen shot of this amazing video. (Unfortunately, LinkedIn does not permit the inclusion of graphics...idiot programming)

What the figure shows is a screen print of the video where the neuron ganglion is in green. The tiny dot is an RNA molecule…actually, a MESSENGER-RNA molecule. A Messenger-RNA molecule is formed within the neuron when the brain decides that a specific coding from the DNA strands is necessary to perform a specific biological function. As stated, this could be anything from causing new bone formation to digesting your lunch, to remembering a telephone number.

Often, the Messenger-RNA is not formed from the DNA, it resides, permanently, inside a specific area of the neuron where it is continuously reformed based on how often it is required. For example, in PTSD patients, their trauma has been so severe, the neurons produce the M-RNA constantly, causing them to relive the events…constantly. This is why recent Johns-Hopkins numbing treatments have been so successful in freezing these particular neurons, stopping the release of the M-RNA. When a neuroscientist refers to the human neuron as being binary, they simply mean the neuron is either - firing - or it is not. Many neurons within the brain fire constantly such as the Vegas Nerve, which maintains our basic life-giving actions such as hormone productions, digestion, heart rhythm, breathing, etc. Others, such as hearing, eyesight, sensory processing, etc. also function continuously even when sleeping. Thus, those neurons are not binary.

When the M-RNA reaches the dendrite, at the end of the ganglion, it is converted into a protein chain. There are over 200,000 individual proteins in the human body. These chains or strings of proteins carry not only the chemical programming, but they also carry specific levels of electronic charges, different for each chain or string. This identifies to the neurons which route through the brain the instructions take. What happens there is unknown. Additional information or instructions may be gained or stimulated.

The point is, no purely human constructed mechanical process can duplicate this complexity.

The Mind

The question remains, what is the mind. Dr. Grossman gives one possibility that is supported by many neuroscientists and physicists…that the mind is the human connection between this physical realm and the quantum gestalt universe at all levels. The existence of quantum entanglement and various CERN experiments of such particles as the Higgs Boson proves that there are aspects of the quantum universe that were once believed the substance of fairy dust and drunken dreams. Scientists such as Albert Einstein demonstrated that matter was only matter when needed and energy at other times.

Recently, a physics journal report posited the existence of what is being called a ‘White Hole’ existing within the supposedly unforgiving ‘Black Hole’ phenomenon. (https://www.space.com/white-holes.html) The basis of this discussion is that it is impossible for humans to understand what we cannot observe, and it is impossible to observe something that humans do not have equipment capable of making such measurements within a gravity sink as Einstein stated in his Relativity discussions.

Thus, if one cannot either see one’s mind or even accept that the mind exists, how can one overcome one’s bias against the powers and abilities associated with the connections to the universe such an organ provides?

During the early 2000’s the US Army started a $200B program to develop the first integrated, multifaceted sensor-focused Internet-of-Things that combined all aspects of the force, to include humans, into a single entity. It was known as the Future Combat Systems Program – System-of-Systems Common Operating Environment or SOSCOE. The concept was revolutionary, however, the execution was flawed from the beginning because of politics and trying to develop a 21st Century structure using an 18th Century government oversight process and internecine greed further compounded by one man’s hatred of the Prime Contractor due to their refusal to provide him with an exorbitant bribe disguised as a campaign donation.[1]

The basic idea of feeding data from every soldier, sensor, weapon, aircraft, news source, etc. on the battlefield and beyond into the cloud with the ability to use outcome chain dynamic constructs through advanced data fusion processes to generate usable information was a pearl of great value. It demonstrated to the open-minded and visionaries that data could potentially synthesize itself into information for those capable of recognizing the results and accepting it for what it was, as the great research physicist Dr. Stephen Hawking has posited. It demonstrated that intelligence, from the military perspective, was neither offensive nor defensive; it, too, was a cyclic continuum as demonstrated by Van Kuijk. The primary failing of FCS was in the development of the SOSCOE network consisted of five layers that, when connected, would provide seamless delivery of data for both automated and/or human interpretation. One document developed by Dr. Nimon, and copied extensively without citation by others, contained the listed figure interpreting the use of this stream for intelligence purposes (Figure 3).

SOSCOE resulted in millions of lines of linear, binary code that simply could not function in such a massive, data-rich environment. As the various military vehicle systems and communications nodes were developed, the costs associated rose to the point that the Obama administration considered such a program too costly in a world where war was an impossibility, whether it was or was not. Cuts began to occur in the sensor platforms making the need for the network moot. Finally, opponents in industry and Congress were able to kill the advanced data management program outright, just as it became increasingly necessary for both the military and business. However, the seeds were already sown. Many of the original prototype systems are now being fielded at many times the original cost estimates.

Why is this Important

The importance of the above learning dynamics is discussed using the focused topics shown below. Each of these, to be considered to the depth needed for full understanding require textbooks of their own beyond what is loosely discussed currently. Some of my doctoral students are using these as topics and I hope others international will raise the gauntlet as well.

Knowledge of Structures

Decision-Making with Accuracy and Timeliness

Value Generation

Big Data is CHAOS and War is CHAOS

Knowledge Structures or Outcome Chains

A recent tool developed by Outcome Chains Inc. (https://www.outcomechains.com/) establishes a toolset that this team posits similar to neurotransmission structures given the limitations of mechanical technology. In one diagram of structured knowledge processing, for which we have no source information, the author presents a view of the dynamics as shown in Figure 3. While dynamic, to be useful, this must be simplified. Our first attempt is shown in Figure 4 Knowledge Structure Dynamic (Author – Last ring reads ‘Politics’).

The background environment Venn circles are meant to depict the psychological aspects that limit the processes involved in establishing the relationships necessary for efficient and accurate completion leading to the acceptance and decision/commitment stages. This does not mean to indicate the stages do not occur. Rather that the results will be in error and/or skewed. The up-front summary is the replacement of standard intelligence concepts with what is labeled Situational Intelligence.

Situational Intelligence

Situational Intelligence has been properly defined in IoT Analytics by Steve Ehrlich as:

First, “situation” suggests an understanding?of what has happened in the past, what is happening now and what might happen in the future. Next, since situations are inherently complex, they typically involve multiple assets, resources and events, many of which may exist outside the control of an organization.?The ability?to correlate disparate data from?many?different?systems and data sources is required to comprehend the scope and impact of situations. Third, to acquire “intelligence” requires an understanding of what, when, why, how and where something happened or might happen.?Implicit in this understanding are the concepts of spatial analysis (e.g. “what is nearby?”), temporal analysis (e.g. “how has it evolved?”) and nodal analysis (e.g. “what is the impact on other assets/resources?”). Situational intelligence incorporates and applies data and understanding from six different domains to assist organizations in solving complex, big data problems. These domains are:

Business Systems

Real-time Operations

Physical Locations

External Data

Analytical Models

Mobile Data.?

Situational intelligence systems?commonly comprise three components:

Data gathering and normalizing: Organizations own and access many separate sources of IT, operations (OT), and external data.?These sources need to be brought together into a single environment?and normalized so that they can be combined and correlated. Data correlation and analysis: Once?data from appropriate sources is?gathered and normalized, various data sets are correlated and analyzed within specific business contexts to solve problems and uncover new opportunities.

Data visualization: Rendering correlated and analyzed information in a combination of geospatial and traditional analytical formats gives users?a fast and intuitive way to recognize what decisions must be?made and what actions must be taken.

In summary, situational intelligence arms both business and technical personnel with timely and accurate information to make informed real-time decisions." (https://spacetimeinsight.com/what-is-situational-intelligence/ ) (Ehrlich, https://insidebigdata.com/2014/11/10/interview-steve-ehrlich-svp-space-time-insight/ - permission granted)

This is what is shown in Figure 4 Knowledge Structure Dynamic (Author – Last ring reads ‘Politics’).

Examining Figure 5, however, does not convey the appropriate concept of where the data originates nor what occurs with the data once it enters the processing universe. This led to Figure 6. This figure attempts to show that there are multiple flows from nearly infinite sources of data that are feeding into each other and, finally, into the processes where that data becomes information. Once information, through either dynamic algorithms or human interaction, information becomes accepted and, therefore, of value. This drives a decision. Nice, yet the picture remains dull and incomplete.?

Then, in trying to explain the process to my daughter, who happens to be a genetic engineer and PhD cancer researcher with detailed experience in DNA/RNA sequencing and protein translation of these basic genome instructions, we started discussing Outcome Chain processing. Outcome Chain processing is a multi-dimensional/multi-matrixed cloud-based tool set that is interactive in a way reminiscent of Figure 5. My co-author and I have used this tool in an introductory manner to investigate the feasibility of creating a deep-structured data/information sharing and reporting repository to tame the Intelligence World’s big data monster for corporations, law enforcement, schools, local institutions, and other organizations facing critical and new threats for which they need immediate and accurate acceptable intelligence.

Ignorance is not Bliss

Up to this point, the discussion has focused on standard aspects of intelligence collection and analysis. Referring back to Figure 4 one will notice the capability to utilize Noetic Science. According to the American Psychology Association, noetic science is:

From a pure materialist, mechanistic perspective, all subjective — noetic — experience arises from physical matter, and consciousness is simply a byproduct of brain and body processes. The noetic sciences focus on bringing a scientific lens to the study of subjective experience, and to ways that consciousness may influence the physical world.

Consciousness has been defined in many ways. On one level, consciousness is simply awareness — how people perceive, interpret, and direct their attention and intention toward their environment. Collective consciousness is how a group (an institution, a society, a species) perceives, attends to, and makes meaning of the world. In some formulations, consciousness goes beyond awareness and includes everything we perceive and experience, even at the subconscious level. In its largest, most universal sense, consciousness has been referred to as a "milieu of potential," the shared ground of being from which all experiences and phenomena arise and eventually return (https://www.psychologytoday.com/us/blog/consciousness-matters/201105/what-are-noetic-sciences-0, May 2011).

What, however, does this mean? It means that the acceptability of the individual must be expanded into areas once and currently considered the realm of witches and gypsies. To quote President Harry S. Truman, “I am amazed that people who scoff at gypsies and fortunetellers believe economists and weathermen.” The point is that there are events and phenomena that defy colloquial explanation yet are scientifically reproducible that are beyond human belief. Examples of this include human flight, landing on the moon, after death experiences. Following is one scientific study involving both near-death experiences (NDE’s) and out-of-body events (OBE’s).

A large retrospective investigation of near-death experiences that included out-of-body observations was recently published.11?This study was a review of 617 NDEs that were sequentially shared on the NDERF website. Of these NDEs, there were 287 NDEs that had OBEs with sufficient information to allow objective determination of the reality of their descriptions of their observations during the OBEs. Review of the 287 OBEs found that 280 (97.6%) of the OBE descriptions were entirely realistic and lacked any content that seemed unreal. In this group of 287 NDErs with OBEs, there were 65 (23%) who personally investigated the accuracy of their own OBE observations after recovering from their life-threatening event. Based on these later investigations, none of these 65 OBErs found any inaccuracy in their own OBE observations. (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6172100/ . Long, J. MD)

Quantum Entanglement

Beginning prior to 1979, various nations, to include NAZI Germany, began research into the use of parapsychology as a means of both gathering intelligence and influencing enemy thought processes. The earliest available FOIA CIA documents are contained at https://www.cia.gov/readingroom/collection/stargate. Most of the information is either redacted and/or useless out of context. Fortunately, this author had to the opportunity to work with two of the main general officers in command of the United States Army Intelligence and Security Command (INSCOM) organization researching the use of what is now known as quantum entanglement studies. The purpose of this was two-fold: defense and offense. Most interesting was that one, General Albert Stubblebine, was relieved and retired when a highly biased Army Chief of Staff believed such research was delving into satanic worship. Talk about ignorance. (See the work Men Who Stare at Goats (the book is no longer available, however, a poor DVD starring George Clooney is). The replacing commander went on to command the Defense Intelligence Agency.

Quantum entanglement is simple yet difficult to explain. Imagine you have a twin. Now imagine you are on one side of the universe and your twin is on the other side and hits his thumb with a hammer. Instantly, your thumb feels the pain, swells, and starts to bleed. There is no connection, no delay across the trillions-of-trillions of light-years distance. The effect is instantaneous. Every thought, taste, feeling, etc your twin experiences you have the same at the exact same instant. Time and distance have no meaning. In fact, your twin isn’t going to hit his thumb until next week…yet you experience it today. This is how it works for some individuals. This experience has been replicated in laboratories across the world. The examples discussed earlier are only a few of thousands of examples.

Now, place this into a useful situation. In London, there is an agency known as Scotland Yard. One of their detectives had a brilliant observation. In trying to get a description of a suspect, the witness was unable to recall anything about a man he came into immediate contact with. This man suffered from Prosopagnosia or the inability to recognize facial structures to include one’s own. The detective wondered, if Prosopagnosia exists, does the opposite? Sure enough, there are a significant number of individuals called super-recognizers or supraprosopagnsists. These individuals have the ability to recognize individuals even if the individual disguises or has plastic surgery. There is simply something about the way their brain and/or mind works that enables them to see past the surface to something deeper. Facial recognition software is less than 20% effective on non-Caucasian individuals and zero effective if the individual photo is faded or has had surgery.

Example of Tech Application

On September 27th of 2019, Harris County Sheriff’s Deputy Sandeep Dhaliwal was murdered during a peaceful traffic stop when a wanted felon shot the deputy from behind as he returned to his cruiser to check the individual’s driver’s license. A review of both the cruiser’s and the Deputy’s body cameras show clear views of the felon’s facial features.

Now, consider the ability of the deputy to transmit the video to a central Intelligence Point where a Super Recognizer group would instantly review the photo. These individuals would have already reviewed released criminals in the area and, given their ability to instantly make the linkage, identify this individual as a dangerous felon and notify the deputy within minutes if not seconds. The deputy would then call for back-up and change his approach tactics, In London, such tactics are actually utilized during riots and other criminal activities.

Creating a corporation with a significant capability such as this, tied to significant counter-terrorism precognition situations with appropriate point-of-entry surveillance technology to identify known and suspect individuals for detention. This capability can go further to protection in schools, financial institutions, and even government organizations.

Data Management

The following graphic (Figure 6) illustrates the main issue concerning information flow to decision-makers and individuals desiring knowledge concerning a topic. The issue of greatest import is the ability to model the process of taking information as it is gathered, determining its viability and reliability, and placing it into the correct level of importance within the structure of the decision. As shown, there will be a bleed-off of data and information as well as a constant introduction of new data and information at various levels. A portion of this information will be removed as unneeded by the specific analysts/leadership due to geographic location, mission, and other factors. However, elements of this information may be of importance and potentially of critical value specifically that having historic origins unknown to or deliberately hidden from those in need. There is currently no automated method of determining this structure. Stating Ashby’s Law (factored to cybernetics), “the variety in the control system must be equal to or larger than the variety of the perturbations in order to achieve control” (Heylighen & Joslyn, 2001).

Industry, academia, government, and media currently have no processes or guidance to address these issues, often deliberately. Reliance on cybernetic models of data flow and information assurance algorithms is insufficient for operational consideration and simulation. Current tools such as PALANTIR? dynamically incorporating multiple domains simultaneously utilizing current technology and processes intimately tied to non-biased, apolitical reporting of data vetted through investigation and concrete evidence creates the synergistic structure desired by many journalists, business intelligence analysts, academics, students, and political scientists.

The product leverages what is labeled as machine learning and data analysis algorithms to detect unusual or suspicious patterns in large data sets in order to identify, predict, and report conclusions and outcomes. Having used PALANTIR in military exercises, the predictions and conclusions can be stated to leave much to be desired. In one specific exercise, the system recommended the destruction of enemy systems that had been hacked and turned into intelligence-gathering systems for the BLUFORCE organization. No amount of listing the change was accepted by the structure. Thus, their processes are pretty manual, requiring teams of humans behind the scenes to clean, input, and interpret data (https://medium.com/bullacademy/what-is-palantir-palantir-explained-dd46ecd78db0).

Earlier, this paper began a discussion of what is known as Outcome Chains. The concept is not that different than what PALANTIR and others were originally designed to make the searching of vast amounts of data easier and more rapid. Each of these has the same weakness, the input of the information is performed primarily by either untrained or poorly trained users. Searches are based on keywords rather than concept spiders. A spider

reads through all the text, hyperlinks, meta tags (meta tags are specifically formatted key words inserted into the Web page in a way designed for the spider to find and use) and code. Using this information, the spider provides a profile to the search engine. The spider then gathers additional information by following the hyperlinks on the Web page, which gives it a better collection of data about those pages. (https://computer.howstuffworks.com/search-engine-spider.htm)

Some applications, such as Outcome Chains and Documentum, take the concept of spiders several steps further. Instead of simply looking for hyperlinks and titles, these tools begin examining authors, structures, University relationships, topic knowledge, and other such topics. This does not rely upon the lack of training of the user. Nor does it pretend to be artificial intelligence. What it does is to take is understanding of the true limits and strengths of all aspects of the concepts of Situational Awareness…

[1] This Senator later ran for President and is now deceased. He mentioned many times in public that the prime contractor would never win another major defense contractor as long as he was in the Senate and even performed several illegal actions to ensure this promise was achieved. Several court battles later, he, again, failed.

Bibliography

Aldridge, J. W. (2001). A multidimensional model for building knowledge assets: Applying socio-technical systems to online action research. Santa Barbara, CA: Fielding Graduate Institute. Retrieved November 20, 2004, from the EBSCO database.\

Araujo, C. (2012). The Quantum Age of IT: Why everything you know about IT is about to Change. IT Governance Publishing Cambridgeshire, UK.

Bermudez, J., Westenskow, D., Foresti, D., Strayer, D., Agutter, J., Syroid, N., et al. (2004). Visual representation of integrated physiological data. Retrieved March 12, 2005, from https://faculty.arch.utah.edu/people/faculty/julio/res.htm

Boudreau, M., Loch, K. D., Robey, D., & Straud, D. (1998). Going global: Using information technology to advance the competitiveness of the virtual transnational organization. Academy of Management Executive, 12(4), 120-128. Retrieved November 28, 2005, from EBSCOhost.

Bridgland, M. F., & Watro, R. J. (1987). Fault-tolerant decision making in totally asynchronous distributed systems. Bedford, MA: MITRE. Retrieved December 10, 2004, from https://portal.acm.org/citation.cfm?id=41845

Brown, M. (2004, June 15-17). Rapid knowledge formation in an information rich environment. Paper presented at the DODCRTS Symposium, San Diego, CA. Retrieved September 12, 2004, from https://www.dodccrp.org/events/2004/ CCRTS_San_Diego/CD/foreword.htm

Bruckner, R. (2014). InsideBIGDATA. Interview: Steve Ehrlich, SVP, Space-Time Insight. https://insidebigdata.com/2014/11/10/interview-steve-ehrlich-svp-space-time-insight/

Buchanan, J., & Kock, N. (2000). Information overload: A decision making perspective (MCDM2000). Retrieved February 18, 2005, from https://www.mngt.waikato.ac.nz/depts/mnss/john/iomcdm2000_1.pdf

Buller, D., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6, 203-242.

Burgoon, J. K. (2000). Mindfulness and interpersonal communication. Journal of Social Issues, 105-128. Retrieved October 1, 2004, from www.findarticles.com/p/articles/mi_m0342/is_1_56/ai_63716504

Burgoon, J. K., Adkins, M., Kruse, J., Jensen, M. L., Meservy, T., Twitchell, D. P., et al. (2005). An approach for intent identification by building on deception detection. Retrieved December 18, 2005, from https://cbim.rutgers.edu/papers/Hawaii2_2005.pdf#search=%22Effects%20of%20Communications%20Modality%20on%20Arousal%2C%20Cognitive%20Complexity%2C%20Behavioral%20Control%20and%20Deception%20Detection%20During%20Deceptive%20Episodes%22

Burgoon, J. K., Blair, J. P., & Moyer, F. (2003, November 19-23) Effects of communications modality on arousal, cognitive complexity, behavioral control and deception detection during deceptive episodes. Proceedings of the Annual Meeting of the National Communication Association, Miami, FL.

Burgoon, J. K., & Hale, J. L. (1988). Nonverbal expectancy violations: Model elaboration and application to immediacy behavior. Communication Monographs, 55, 58-79.

Burgoon, J. K., & Saine, T. (1978). The unspoken dialogue: An introduction to nonverbal communication. Boston: Houghton Mifflin.

Burgoon, M., Hunsaker, F. G., & Dawson, E. J. (1994). Human communication. Thousand Oaks, CA: Sage.

Campo, S., Cameron, K. A., Broussard, D., & Frazier, M. S. (2002, November 11). Social norms and expectancy violation theories: Assessing the effectiveness of health communication campaigns. Poster session presented at the annual meeting of the American Public Health Association, Ithaca, NY.

Card, S. K., Hutchins, S., & Pirolli, P. (2003, May 15-17). Use of critical analysis method to conduct a cognitive task analysis of intelligence analysts. Presented at the 6th International Conference on Naturalistic Decision making, Pensacola Beach, FL.

Chapman, B. (2016, May) National Institute of Justice. Research on the Impact of Technology on Policing Strategy in the 21st Century. Final Report NIJ Grant Number 2012-MU-CX-0043 RTI Project Number 0213507.000.003

Davis, J. (2016). Intelligence for the Warfighter. Studies in Intelligence Vol 60, No. 3. Extracts, September 2016.

Dickson, M. W., BeShears, R. S., & Gupta, B. (2004). The impact of societal culture and industry on organizational culture. In R. J. House, P. J. Hanges, M. Javidan, P. W. Dorfman, & V. Gupta (Eds.), Culture, leadership, and organizations: The GLOBE study of 62 societies. Thousand Oaks, CA: Sage.

Douglas, J.E and Olshaker, M. (2017). Mindhunter: Inside the FBI's Elite Serial Crime Unit. Gallery Books. New York, NY.

Festinger, L., & Carlsmith, J. M. (1957). A theory of cognitive dissonance. Stanford, CA: Stanford University Press.

Firth, D. R. (2003). Supply of information into, search for information within, and use of information from information technology-based organizational memory systems. Unpublished doctoral dissertation, University of California, Los Angeles. (UMI No. 765684231)

Ford, D., & Chan, Y. (2002). Knowledge sharing in a cross-cultural setting: A case study. Retrieved November 27, 2005, from https://business.queensu.ca/ knowledge/workingpapers/abstracts/abstract_02_09.htm

Gadanho, S. C., & Custodio, L. (2002). Asynchronous learning by emotions and cognition. Lisbon, Portugal: Institute of Systems and Robotics. Retrieved November 28, 2004, from https://omni.isr.ist.utl.pt/~sandra/papers/ Gadanho_sab02.pdf

Gibson, C. B., & Cohen, S. G., Alcordo, T. C., Ahanassiou, N. A., Baba, M. L., Blackburn, R., et al. (2003). Virtual teams that work. Jossey-Bass Business and Management Series. San Francisco, CA: Wiley.

Goh, K. (2004). The role of cognition and emotion regulation in conflict: A study of the impact on organizational and virtual teams. Unpublished doctoral dissertation, University of Southern California. (UMI No. 3145203)

Griffin, E., McClish, G., & Bacon, J. (2003). A first look at communication theory. Washington, DC: McGraw-Hill

Grossman, Lt. Col. Dave; Davis, Adam. On Spiritual Combat: 30 Missions for Victorious Warfare (pp. 29-30). BroadStreet Publishing Group LLC. Kindle Edition.

Halone, K. K., & Pecchioni, L. L. (2001). Relational listening: A grounded theoretical model. Communications Reports, 14, 1-4.

Harclerode, Peter, Wings Of War: Airborne Warfare 1918–1945. Weidenfeld & Nicolson, London, 2005, pg 127

Hawkins, D. R. (2002). Power vs. force: The hidden determinants of human behavior. Carlsbad, CA: Hay House.

Henderson, E. D. (1999). Model for adaptive decision making behavior of distributed hierarchical teams under high temporal workload. Unpublished doctoral dissertation, George Mason University, Fairfax, VA. (UMI No. 733980671)

Heylighen F., Joslyn, C., & Turchin V. (Eds.). (1995). The quantum of evolution. World Futures: The Journal of General Evolution, 45, 1-4.

Higgins, M. A. (2003). Persuasion, pitch and presentation: The effects of information style on individual decision making. Unpublished doctoral dissertation, University of Arizona, Tucson. (UMI No. 765028771)

Hofstede, G. (2001). Culture consequences: Comparing values, behaviors, institutions, and organizations across nations (2nd ed.). Thousand Oaks, CA: Sage.

Jensen, M. L., Meservy, T. O., Kruse, J., Burgoon, J. K., & Nunamaker, J. F. (2005). Lessons learned from developing systems to automatically detect deception in various modalities. The Business Review, Cambridge, 4, 37-43. Retrieved September 10, 2005, from the ProQuest database.

Jung, C. J., Adler, G., & Hull, R. F. C. (1968). The archetypes and collective unconscious (Collected Works of C.J. Jung, Vol. 9, Part 1). Princeton, NJ: Princeton University Press.

Kanawattanachai, P. and Yoo, Y. (2005). Dynamic Nature of Trust in Virtual Teams. Retrieved on March 12, 2006 from https://sprouts.case.edu/2002/020204.pdf

Kassen, S, Goldstein, C, & Savitsky, K. (2003). Behavioral Confirmation in the Interrogation Room on the Dangers of Presuming Guilt. Law and Human Behavior. Vol 27, No. 2. April 2003. Pg 187 – 203).

Kelly, E.F. and Kelly, E.W. et. al. (2007). Irreducible Mind: Toward a Psychology for the 21st Century. Rowman & Littlefield Publishers, Inc. New York, NY.

Kim, Y. (2001). A comparative study of the “Abilene paradox” and “Groupthink.” Public Administration Quarterly, 25, 168-190.

Kring, J. P. (2004). Communication modality and after action review performance in a distributed immersive virtual environment. Unpublished doctoral dissertation, University of Central Florida, Orlando. (UMI No. 862908891)

Krohn, E. and Kripal, J. (2018). Changed in a Flash. Berkley, CA. North Atlantic Books.

Lane, D. R. (n.d.). Function and impact of nonverbal communication in a computer mediated communication context: An investigation of defining issues. Retrieved February 18, 2005, from https://www.uky.edu/~drlane/techno/nvcmc.htm

Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63, 967-985. Retrieved April 6, 2008, from https://www.questia.com/PM.qst?a=o&d=95735570

Laszlo, V. S. de (Ed). (1990). The basic writings of C.G. Jung. Princeton, NJ: Princeton University Press.

Mason, L. G. (2004). Emotional intelligence: An interview study of three female administrators’ decision making processes in response to contemporary issues. Unpublished doctoral dissertation, Indiana University of Pennsylvania (UMI No. 3129191)

Maxwell, J.S. (2006). Emotion-Related Asymmetries and Individual Differences in Cognition and Behavior. Doctoral dissertation, University of Wisconsin (UMI No. 3234721)

McClure, S. M., Li, J., Tomlin, D., Cypert, K. S., Montague, L. M., & Montague, R. P. (2004). Neural correlates of behavioral preference for culturally familiar drinks. Neuron, 44, 379-387. Retrieved March 14, 2005, from https://www.hnl.bcm.tmc.edu/articles/Read/McClureLi2004.pdf

McPhee, R., & Cushman, D. P. (1980). Message-attitude-behavior relationship: Theory, methodology and application. Human Communication Research Series. New York: Academic Press. Retrieved November 28, 2004, from the ProQuest database.

Monge, P. R., & Cappella, J. N. (1979). Multivariate techniques in human communication research. New York: Academic Press.

Moser, P. K., & Vander Nat, A. (2003). Human knowledge: Classical and contemporary approaches. New York: Oxford University Press

Mulder A.G.E. (2000). Trends in Gestural Control of Music, Marcelo Wanderley and Marc Battier (eds.), Paris, France

Natural Sciences and Engineering Research Council of Canada. (1996, February). Hand gestures for HCI: Research on human movement behavior reviewed in the context of hand centered input. Retrieved November 1, 2004, from https://www.cs.sfu.ca/ people/ResearchStaff/amulder/personal/vmi/HCI-gestures.htm

Neuman, W. L. (2003). Social research methods: Qualitative and quantitative approaches (5th ed.). New York: Pearson Education.

Nimon, H. I. (2004). Issues and requirements for information processing modeling within the scenarios and wargaming group (White paper). Huntington Beach, CA: Boeing.

Public Broadcasting System. (2020). Ken Burns Presents The Gene. https://www.pbs.org/show/gene/

Public Broadcasting System. (2020). The Amazing Human Body. https://www.pbs.org/show/amazing-human-body/

Phister, P., & Plonish, I. (2004, June 15-17). Information and knowledge centric warfare: The next steps in the evolution of warfare. Paper presented at the DODCRTS Symposium, San Diego, CA. Retrieved September 12, 2004, from https://www.dodccrp.org/events/2004/CCRTS_San_Diego/CD/foreword.htm

Pidd, M., Mackenzie, A., Rooksby, J., Sommerville, I., Warren, I., & Westcombe, M. (2003). Wisdom, decision support and paradigms of decision making. Lancaster, England: Lancaster University. Retrieved July 28, 2004, from the ProQuest database.

Powell, G. (2004, June 15-17). Army intelligence analysis and interpretation: Assessing the utility and limitations of computational diagnostic reasoning. U.S. Army Research, Development, and Engineering Command (AMSRD-CER-IW-BM). Paper presented at the DODCRTS Symposium, San Diego, CA. Retrieved September 12, 2004, from https://www.dodccrp.org/events/2004/ CCRTS_San_Diego/CD/foreword.htm

Scholl, R. W. (1981). Differentiating organization commitment from expectancy as a motivating force. Academy of Management Review, 6, 589-599. Retrieved March 4, 2005, from https://www.cba.uri.edu/scholl/Papers/Commitment.html

Schwartz, J. M., & Begley, S. (2005). The mind and the brain: Neuroplasticity and the power of mental force. New York: HarperCollins.

Tasa, K. (2002). The impact of collective efficacy on issue interpretation and strategic decision making processes and outcomes. Unpublished doctoral dissertation, University of Toronto, Toronto, Ontario, Canada. Retrieved July 28, 2004, from the ProQuest database.

Thomas, R. S. (2003). Real-time decision making for adversarial environments using a plan-based heuristic. Northwestern University, Chicago. Retrieved August 3, 2004, from the ProQuest database.

Ulrich, T. (1999). Computer mediated communications and group decision making. University of Wisconsin, Milwaukee. Retrieved December 4, 2004, from www.uwm.edu/ Course/com813/ulrich5.htm

Van Kuijk, H.J.A (2011). Five Pillars of Knowledge, Information and Data Management. Self-Published. Houston, Tx.

Vleten, Cassandra. (May 2011) What are Noetic Sciences. https://www.psychologytoday.com/us/blog/consciousness-matters/201105/what-are-noetic-sciences-0

Warner, N., & Wroblewski, E. (2004, June 15-17). The cognitive processes used in team collaboration during asynchronous, distributed decision making. Naval Air Systems Command. Paper presented at the DODCRTS Symposium, San Diego, CA. Retrieved September 12, 2004, from https://www.dodccrp.org/events/2004/ CCRTS_San_Diego/CD/foreword.htm

Webster’s International Dictionary. (2005). New York, NY: Merriam-Webster Publishers

Wesensten, N. J., Belenky, G., and Balkin, T.J. (2005) Cognitive Readiness in Network-Centric Operations, Parameters Spring 2005. 94-105. Carlisle, PA: U.S. Army War College

Yoogalingam, R. (2003). Applications of evolutionary algorithms and simulation to decision making under uncertainty. Retrieved January 8, 2005, from https://www.schulich.yorku.ca/ssb-extra/phd.nsf/0/ 3751c20e40c86f4c85256b200072e586?OpenDocument?


?

Aaron J.

Home Health Care

2 年

It just seems that you are completely against having any sort of Artificial Intelligence, to the point that you deny it's existence, albeit in primitive form, or that it could ever exist. I could be wrong, it's just how it looks on the surface to me personally. Do you think there ever will be Artificial Intelligence in the future? What did you think would be the defining principles of an A.I. for it to exist? The definition of Intelligence, or would it need to be self aware, also? And who would be the final word on if a machine is self aware? You? If we built robots and the robots said they were self aware, would we need your permission or expertise for it to correctly be qualified as an AI? Just asking so I can understand correctly.

Samuel A.

Talent Acquisition Specialist

2 年

Great piece, very informative

William Johnston

Voice Actor/Audiobook Narrator/Producer

3 年

Harry, I found this an absolutely fascinating piece. I'm not "seeing" everything in it, and some of what I do "see" I don't fully understand. Somehow, however, overall, it seems to make sense to me. If I continue to study it, it may help me to explain to myself some of the phenomena (previously mentioned to you) I experienced during my time as an all-source foreign intelligence analyst. Thanks for sharing the piece. Have you seen this? https://www.theepochtimes.com/china-pursues-brain-control-weaponry-in-bid-to-command-future-of-warfare_4186003.html

要查看或添加评论,请登录

Harry N.的更多文章

  • Book-to-Film Criminal Scam

    Book-to-Film Criminal Scam

    I am writing this to advise and warn other authors of an interesting scam being conducted by a criminal organization…

  • Coping with Miracles

    Coping with Miracles

    Coping with Miracles What do people do when exposed to God’s miracles over and over again? Do they accept with…

  • Pro-Hamas March on DC

    Pro-Hamas March on DC

    Following are the remainder of the participants not listed in my original post (draw your own conclusions): Maine…

  • American War Hero's Wife Deported

    American War Hero's Wife Deported

    THIS ACTUALLY HAPPENED TO DR DALE COMSTOCK AND HIS WIFE! CBP Incident – On July 19th 2022 as they were going through…

    2 条评论
  • The Fundamental Mistake in Terrorism Analysis

    The Fundamental Mistake in Terrorism Analysis

    The following is from a presentation by Dr. W.

  • AI - ISN'T

    AI - ISN'T

    The following was written for a potential French intelligence training publication that has been significantly modified…

  • The Young Officer Chapter 1 Excerpt

    The Young Officer Chapter 1 Excerpt

    Chapter 1 - OPERATION BRONZE BOW[1] May 6th, 1972 What is written in this book is a larger story than the operation. It…

    7 条评论
  • The Young Officer - an Excerpt

    The Young Officer - an Excerpt

    Most of my research is based on validated evidence and experiences of a former deep cover agent who has my under…

  • The Fog of Pseudo-Journalism

    The Fog of Pseudo-Journalism

    Recently I was listening to a radio show, the Michael Berry show on 740 AM - KTRH, as he hosted one of the authors of a…

  • Selection of the President/VP

    Selection of the President/VP

    Constitution of United States of America 1789 (rev. 1992) The Electors shall meet in their respective states and vote…

社区洞察