Toggle light / dark theme

Womb-to-Tomb Management! By Mr. Andres Agostini
Womb-To-Tomb Management
This is an excerpt from the presentation, “…Womb-to-Tomb Management!…” that discusses some management theories and practices. To read the entire piece, just click the link at the end of article:

Please see the graphic at http://lnkd.in/dbD4G7e

This is an excerpt from the conclusion section of, “…NASA’s Managerial and Leadership Methodology, Now Unveiled!..!” by Mr. Andres Agostini, that discusses some management theories and practices. To read the entire piece, just click the link at the end of this illustrated article and presentation:

superman
In addition to being aware and adaptable and resilient before the driving forces reshaping the current present and the as-of-now future, there are some extra management suggestions that I concurrently practice:

1. Given the vast amount of insidious risks, futures, challenges, principles, processes, contents, practices, tools, techniques, benefits and opportunities, there needs to be a full-bodied practical and applicable methodology (methodologies are utilized and implemented to solve complex problems and to facilitate the decision-making and anticipatory process).

The manager must always address issues with a Panoramic View and must also exercise the envisioning of both the Whole and the Granularity of Details, along with the embedded (corresponding) interrelationships and dynamics (that is, [i] interrelationships and dynamics of the subtle, [ii] interrelationships and dynamics of the overt and [iii] interrelationships and dynamics of the covert).

DETAIL    DETAIL    DETAILBoth dynamic complexity and detail complexity, along with fuzzy logic, must be pervasively considered, as well.

To this end, it is wisely argued, “…You can’t understand the knot without understanding the strands, but in the future, the strands need not remain tied up in the same way as they are today…”

For instance, disparate skills, talents, dexterities and expertise won’t suffice ever. A cohesive and congruent, yet proven methodology (see the one above) must be optimally implemented.

Subsequently, the Chinese proverb indicates, “…Don’t look at the waves but the currents underneath…”

2. One must always be futurewise and technologically fluent. Don’t fight these extreme forces, just use them! One must use counter-intuitiveness (geometrically non-linearly so), insight, hindsight, foresight and far-sight in every day of the present and future (all of this in the most staggeringly exponential mode). To shed some light, I will share two quotes.

The Panchatantra (body of Eastern philosophical knowledge) establishes, “…Knowledge is the true organ of sight, not the eyes.…” And Antonio Machado argues, “… An eye is not an eye because you see it; an eye is an eye because it sees you …”

Managers always need a clear, knowledgeable vision. Did you already connect the dots stemming from the Panchatantra and Machado? Did you already integrate those dots into your big-picture vista?

As side effect, British Prime Minister W. E. Gladstone considered, “…You cannot fight against the future…”

PARALLEL     PARALLEL      PARALLEL
3. In all the Manager does, he / she must observe and apply, at all times, a sine qua non maxim, “…everything is related to everything else…”

4. Always manage as if it were a “project.” Use, at all times, the “…Project Management…” approach.

5. Always use the systems methodology with the applied omniscience perspective.

In this case, David, I mean to assert: The term “Science” equates to about a 90% of “…Exact Sciences…” and to about 10% of “…Social Sciences…” All science must be instituted with the engineering view.

6. Always institute beyond-insurance risk management as you boldly integrate it with your futuring skill / expertise.

BEYOND     BEYOND       BEYOND
7. In my firmest opinion, the following must be complied this way (verbatim): the corporate strategic planning and execution (performing) are a function of a grander application of beyond-insurance risk management. It will never work well the other way around. Transformative and Integrative Risk Management (TAIRM) is the optimal mode to do advanced strategic planning and execution (performing).

TAIRM is not only focused on terminating, mitigating and modulating risks (expenses of treasure and losses of life), but also concentrated on bringing under control fiscally-sound, sustainable organizations and initiatives.

TAIRM underpins sensible business prosperity and sustainable growth and progress.

8. I also believe that we must pragmatically apply the scientific method in all we manage to the best of our capacities.

If we are “…MANAGERS…” in a Knowledge Economy and Knowledge Era (not a knowledge-driven eon because of superficial and hollow caprices of the follies and simpletons), we must do therefore extensive and intensive learning and un-learning for Life if we want to succeed and be sustainable.

As a consequence, Dr. Noel M. Tichy, PhD. argues, “…Today, intellectual assets trump physical assets in nearly every industry…”

Consequently, Alvin Toffler indicates, “…In the world of the future, THE NEW ILLITERATE WILL BE THE PERSON WHO HAS NOT LEARNED TO LEARN…”

We don’t need to be scientists to learn some basic principles of advanced science.

Accordingly, Dr. Carl Sagan, PhD. expressed, “…We live in a society exquisitely dependent on science and technology, in which hardly anyone knows about science and technology…” And Edward Teller stated, “…The science of today is the technology of tomorrow …”

And it is also crucial this quotation by Winston Churchill, “…If we are to bring the broad masses of the people in every land to the table of abundance, IT CAN ONLY BE BY THE TIRELESS IMPROVEMENT OF ALL OF OUR MEANS OF TECHNICAL PRODUCTION…”

I am not a scientist but I tirelessly support responsible scientists and science. I like scientific and technological knowledge and methodologies a great deal.

Chiefly, I am a college autodidact made by his own self and engaged into extreme practical and theoretical world-class learning for Life.

APPROACH    APPROACH     APPROACH9. In any management undertaking, and given the universal volatility and rampant and uninterrupted rate of change, one must think and operate in a fluid womb-to-tomb mode.

The manager must think and operate holistically (both systematically and systemically) at all times.

The manager must also be: i) Multidimensional, ii) Interdisciplinary, iii) Multifaceted, iv) Cross-functional, and v) Multitasking.

That is, the manager must now be an expert state-of-the-art generalist and erudite. ERGO, THIS IS THE NEWEST SPECIALIST AND SPECIALIZATION.

Managers must never manage elements, components or subsystems separately or disparately (that is, they mustn’t ever manage in series).

Managers must always manage all of the entire system at the time (that is, managing in parallel or simultaneously the totality of the whole at once).

10. In any profession, beginning with management, one must always and cleverly upgrade his / her learning and education until the last exhale.

An African proverb argues, “…Tomorrow belongs to the people who prepare for it…” And Winston Churchill established, “…The empires of the future are the empires of the mind…” And an ancient Chinese Proverb: “…It is not our feet that move us along — it is our minds…”
DESTINY       DESTINY       DESTINY
And Malcolm X observed, “…The future belongs to those who prepare for it today…” And Leonard I. Sweet considered, “…The future is not something we enter. The future is something we create…”

And finally, James Thomson argued, “…Great trials seem to be a necessary preparation for great duties …”

AGE       AGE         AGE
Consequently, Dr. Gary Hamel, PhD. indicates, “…What distinguishes our age from every other is not the world-flattening impact of communications, not the economic ascendance of China and India, not the degradation of our climate, and not the resurgence of ancient religious animosities. RATHER, IT IS A FRANTICALLY ACCELERATING PACE OF CHANGE…”

Please see the full presentation at http://goo.gl/8fdwUP

EXCERPT

To further underpin this statement, I will share Peter Drucker’s quote, “…The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic…” And also that of Dr. Stephen Covey, “…Again, yesterday holds tomorrow hostage .… Memory is past. It is finite. Vision is future. It is infinite. Vision is greater than history…” And that of Sir Francis Bacon, “… He that will not apply new remedies must expect new evils, for time is the greatest innovator …”

And that of London Business School Professor Gary Hamel, PhD., “…You cannot get to a new place with an old map…” And that of Alvin Toffler, “…The future always comes too fast and in the wrong order…”

View the entire presentation at http://lnkd.in/dP2PmCP

Supermanagement! by Mr. Andres Agostini (Excerpt)

DEEPEST

“…What distinguishes our age from every other is not the world-flattening impact of communications, not the economic ascendance of China and India, not the degradation of our climate, and not the resurgence of ancient religious animosities. Rather, it is a frantically accelerating pace of change…”

Read the entire piece at http://lnkd.in/bYP2nDC

(Excerpt)

Beyond the managerial challenges (downside risks) presented by the exponential technologies as it is understood in the Technological Singularity and its inherent futuristic forces impacting the present and the future now, there are also some grave global risks that many forms of management have to tackle with immediately.

These grave global risks have nothing to do with advanced science or technology. Many of these hazards stem from nature and some are, as well, man made.

For instance, these grave global risks ─ embodying the Disruptional Singularity ─ are geological, climatological, political, geopolitical, demographic, social, economic, financial, legal and environmental, among others. The Disruptional Singularity’s major risks are gravely threatening us right now, not later.

Read the full document at http://lnkd.in/bYP2nDC

The Future of Scientific Management, Today! (Excerpt)

Transformative and Integrative Risk Management
Andres Agostini was asked this question:

Mr. David Shaw’s question, “…Andres, from your work on the future which management skills need to be developed? Classically the management role is about planning, organizing, leading and controlling. With the changes coming in the future what’s your view on how this management mix needs to change and adapt?…” Question was posited on an Internet Forum, formulated by Mr. David Shaw (Peterborough, United Kingdom) on October 09, 2013.

This is an excerpt from, “…The Future of Scientific Management, Today…” that discusses state-of-the-art management theories and practices. To read the entire piece, just click the link at the end of article.

CONCLUSION

In addition to being aware and adaptable and resilient before the driving forces reshaping the current present and the as-of-now future, THERE ARE SOME EXTRA MANAGEMENT SUGGESTIONS THAT I CONCURRENTLY PRACTICE:

1.- Given the vast amount of insidious risks, futures, challenges, principles, processes, contents, practices, tools, techniques, benefits and opportunities, there needs to be a full-bodied practical and applicable methodology (methodologies are utilized and implemented to solve complex problems and to facilitate the decision-making and anticipatory process).

The manager must always address issues with a Panoramic View and must also exercise the envisioning of both the Whole and the Granularity of Details, along with the embedded (corresponding) interrelationships and dynamics (that is, [i] interrelationships and dynamics of the subtle, [ii] interrelationships and dynamics of the overt and [iii] interrelationships and dynamics of the covert).

Both dynamic complexity and detail complexity, along with fuzzy logic, must be pervasively considered, as well.

To this end, it is wisely argued, …You can’t understand the knot without understanding the strands, but in the future, the strands need not remain tied up in the same way as they are today…”

For instance, disparate skills, talents, dexterities and expertise won’t suffice ever. A cohesive and congruent, yet proven methodology (see the one above) must be optimally implemented.

Subsequently, the Chinese proverb indicates, …Don’t look at the waves but the currents underneath…”

2.- One must always be futurewise and technologically fluent. Don’t fight these extreme forces, just use them! One must use counter-intuitiveness (geometrically non-linearly so), insight, hindsight, foresight and far-sight in every day of the present and future (all of this in the most staggeringly exponential mode). To shed some light, I will share two quotes.

The Panchatantra (body of Eastern philosophical knowledge) establishes, …Knowledge is the true organ of sight, not the eyes.…” And Antonio Machado argues, … An eye is not an eye because you see it; an eye is an eye because it sees you …”

Managers always need a clear, knowledgeable vision. Did you already connect the dots stemming from the Panchatantra and Machado? Did you already integrate those dots into your big-picture vista?

As side effect, British Prime Minister W. E. Gladstone considered, …You cannot fight against the future…”

THE METHOD

3.- In all the Manager does, he / she must observe and apply, at all times, a sine qua non maxim, …everything is related to everything else…”

4.- Always manage as if it were a “project.” Use, at all times, the “…Project Management…” approach.

5.- Always use the systems methodology with the applied omniscience perspective.

In this case, David, I mean to assert: The term “Science” equates to about a 90% of “…Exact Sciences…” and to about 10% of “…Social Sciences…” All science must be instituted with the engineering view.

6.- Always institute beyond-insurance risk management as you boldly integrate it with your futuring skill / expertise.

7.- In my firmest opinion, the following must be complied this way (verbatim): the corporate strategic planning and execution (performing) are a function of a grander application of beyond-insurance risk management.It will never work well the other way around. TAIRM is the optimal mode to do advanced strategic planning and execution (performing).

TAIRM (Transformative and Integrative Risk Management) is not only focused on terminating, mitigating and modulating risks (expenses of treasure and losses of life), but also concentrated on bringing under control fiscally-sound, sustainable organizations and initiatives.

TAIRM underpins sensible business prosperity and sustainable growth and progress.

8.- I also believe that we must pragmatically apply the scientific method in all we manage to the best of our capacities.

If we are “…MANAGERS…” in a Knowledge Economy and Knowledge Era (not a knowledge-driven eon because of superficial and hollow caprices of the follies and simpletons), we must do therefore extensive and intensive learning and un-learning for Life if we want to succeed and be sustainable.

As a consequence, Dr. Noel M. Tichy, PhD. argues, …Today, intellectual assets trump physical assets in nearly every industry…”

Consequently, Alvin Toffler indicates, …In the world of the future, THE NEW ILLITERATE WILL BE THE PERSON WHO HAS NOT LEARNED TO LEARN…”

We don’t need to be scientists to learn some basic principles of advanced science.

EFFORT

Accordingly, Dr. Carl Sagan, PhD. expressed, …We live in a society exquisitely dependent on science and technology, in which hardly anyone knows about science and technology…” And Edward Teller stated,…The science of today is the technology of tomorrow …”

And it is also crucial this quotation by Winston Churchill, …If we are to bring the broad masses of the people in every land to the table of abundance, IT CAN ONLY BE BY THE TIRELESS IMPROVEMENT OF ALL OF OUR MEANS OF TECHNICAL PRODUCTION…”

9.- In any management undertaking, and given the universal volatility and rampant and uninterrupted rate of change, one must think and operate in a fluid womb-to-tomb mode.

The manager must think and operate holistically (both systematically and systemically) at all times.

The manager must also be: i) Multidimensional, ii) Interdisciplinary, iii) Multifaceted, iv) Cross-functional, and v) Multitasking.

That is, the manager must now be an expert state-of-the-art generalist and erudite. ERGO, THIS IS THE NEWEST SPECIALIST AND SPECIALIZATION.

Managers must never manage elements, components or subsystems separately or disparately (that is, they mustn’t ever manage in series).

Managers must always manage all of the entire system at the time (that is, managing in parallel or simultaneously the totality of the whole at once).

10.- In any profession, beginning with management, one must always and cleverly upgrade his / her learning and education until the last exhale.

An African proverb argues, …Tomorrow belongs to the people who prepare for it…” And Winston Churchill established,…The empires of the future are the empires of the mind…” And an ancient Chinese Proverb: …It is not our feet that move us along — it is our minds…”

And Malcolm X observed,…The future belongs to those who prepare for it today…” And Leonard I. Sweet considered, …The future is not something we enter. The future is something we create…”

And finally, James Thomson argued, …Great trials seem to be a necessary preparation for great duties …”

The entire document is available at http://lnkd.in/bYP2nDC

Meta-materials — materials that have been engineered to have properties that absolutely do not exist in nature — such as negative refraction — are unraveling interesting possibilities in future engineering. The discovery of negative refraction has led to the creation of invisibility cloaks, for example, which seamlessly bend light and other electromagnetic radiation around an object, though such are normally restricted to cumbersome laboratory experiments with split-ring resonators and/or restricted to an insufficient slice of spectrum.

A recent article in ExtremeTech drew attention to the world’s first quantum meta-material, created recently by a team of German material scientists at the Karlsruhe Institute of Technology. It is believed such quantum meta-material can overcome the main problem with traditional meta-materials based on split-ring resonators, which can only be tuned to a small range of frequencies and not conducive to operate across a useful slice of spectrum. While fanciful applications such as quantum birefringence and super-radiant phase transitions are cited it is perhaps invisibility cloaks that until very recently seemed a forte of science fiction.

From Fiction - The Invisible Man

Breakthroughs at the National Tsing-Hua University in Taiwan have also made great strides in building quantum invisibility cloaks, and as the arXiv blog on TechnologyReview recently commented ‘invisibility cloaks are all the rage these days’. With such breakthroughs, these technologies may soon find mass take-up in future consumer products & security, and also have abundant military uses — where it may find the financial stimulus to advance the technology to its true capabilities. Indeed researchers in China have been looking into how to mass-produce invisibility cloaks from materials such as Teflon. We’ll all be invisible soon.

[1] The first quantum meta-material raises more questions than it answers
http://www.extremetech.com/extreme/168060-the-first-quantum-metamaterial-raises-more-questions-than-it-answers

[2] Quantum Invisibility Cloak Hides Objects from Reality
http://www.technologyreview.com/view/516006/quantum-invisibility-cloak-hides-objects-from-reality/

[3] Hide the interior region of core-shell nano-particles with quantum invisible cloaks
http://www.arxiv.org/abs/1306.2120

[4] Chinese Researchers Make An Invisibility Cloak For Mass Production
http://www.technologyreview.com/view/519166/chinese-researchers-make-an-invisibility-cloak-in-15-minutes/

OLYMPUS DIGITAL CAMERA

Transhumanism, Eugenics and IQ:

The aim of this short essay is not to delve into philosophy, yet on some level it is un-avoidable when talking about Transhumanism. An important goal of this movement is the use of technology for the enhancement, uplifting and perhaps…the transcendence of the shortcomings of the human condition. Technology in general seems to be keeping pace and is in sync with both Moore’s law and Kurzweil’s law and his predictions.

Yet, there is an emerging strain of Transhumanists — propelled by radical ideology, and if left un-questioned might raise the specter of Eugenics, wreaking havoc and potentially inviting retaliation from the masses. The outcome being, the stymieing human transcendence. One can only hope that along with physical augmentation technology and advances in bio-tech, Eugenics will be a thing of the past.

Soon enough, at least IQ Augmentation technology will be within reach (cost-wise) of the common man — in the form of an on-demand, non-invasive, memory and intelligence augmentation device. So… will Google Glass or similar Intelligence Augmentation device, forever banish the argument for “intellectual” Eugenics? Read an article on 4 ways that Google glass makes us Transhuman.

Technology without borders:

There is an essay on IEET titled: The Specter of Eugenics: IQ, White Supremacy, and Human Enhancement. It makes for interesting reading, including, the comments that follow it.

The following passage from the novel “Memories with Maya” is relevant to that essay.

He took a file out and opened it in front of us. Each paper was watermarked ‘Classified’.

“This is a proposal to regulate and govern the ownership of Dirrogates,” he said.

Krish and I looked at each other, and then we were listening.

“I see it, and I’m sure you both do as well, the immense opportunity there is in licensing Dirrogates to work overseas right at clients’ premises. BPO two point zero like you’ve never seen,” he said. “Our country is a huge business outsourcing destination. Why not have actual Dirrogates working at the client’s facility where they can communicate with other human staff. — Memories with Maya

A little explanation: Dirrogates are Digital Surrogates in the novel. An avatar of a real person, driven by markerless performance capture hardware such as a Kinect-like depth camera. Full skeletal and facial tracking animates a person’s Digital Surrogate and the Dirrogate can be seen by a human wearing Augmented Reality visors. Thus a human (the Dirrogate operator) is able to “tele-travel” to any location on Earth, given its exact geo-coordinates.

At the chosen destination, another depth cam streams a live, real-time 3D model of the room/location so the Dirrogate (operator) can “see” live humans overlaid with a 3D mesh of themselves and a fitted video draped texture map. In essence — a live person cloaked in a Computer generated mesh created in real-time by the depth camera… idea-seeding for Kinect 2 hackers.

What would a Dirrogate look like in the real-world? The video below, is a crude (non photo-realistic) Dirrogate entering the real world.

Dirrogates, Immigration and Pseudo Minduploads:

This brings up the question: If we can have Digital Surrogates, or indeed, pseudo mind-uploads taking on 3D printed mechanical-surrogate bodies, what is the future for physical borders and Immigration policies?

Which brings us to a related point: Does one need a visa to visit the United States of America to “work”?

As an analogy, consider the pseudo mind-upload in the video below.

Does it matter if the boy is in the same town that the school is in or if he were in another country? Now consider the case of a customer service executive, or an immigrant from a third world country using a pseudo mind-upload to Tele-Travel to his work place in down-town New York — to “drive” a Google Taxi Cab until such a time that driverless car AI is perfected.

AI logo small

Asia Institute Report

Proposal for a Constitution of Information
March 3, 2013
Emanuel Pastreich

Introduction

When David Petraeus resigned as CIA director afteran extramarital affair with his biographer Paula Broadwell was exposed, the problem of information security gained national attention. The public release of personal e-mails in order to impugn someone at the very heart of the American intelligence community raised awareness of e-mail privacy issues and generated a welcome debate on the need for greater safeguards. The problem of e-mail security, however, is only the tip of the iceberg of a far more serious problem involving information with which we have not started to grapple. We will face devastating existential questionsin the years ahead as human civilization enters a potentially catastrophic transformation—one driven not by the foibles of man, but rather by the exponential increase in our capability to gather, store, share, alter and fabricate information of every form, coupled with a sharp drop in the cost of doing so. Such basic issues as how we determine what is true and what is real, who controls institutions and organizations, and what has significance for us in an intellectual and spiritual sense will become increasingly problematic. The emerging challenge cannot be solved simply by updating the 1986 “Electronic Communications Privacy Act” to meet the demands of the present day;[1] it will require a rethinking of our society and culture and new, unprecedented, institutions to respond to the challenge. International Data Corporation estimated the total amount of digital information in the world to be 2.7 zettabytes (2.7 followed by 21 zeros) in 2012, a 48 percent increase from 2011—and we are just getting started.[2]

[1]As is suggested in the article by Tony Romm “David Petraeus affair scandal highlights email privacy issues” (http://www.politico.com/news/stories/1112/83984.html#ixzz2CUML3RDy).

[2] http://www.idc.com/getdoc.jsp?containerId=prUS23177411#.UTL3bDD-H54

The explosion in the amount of information circulating in the world, and the increase in the ease with which that information can be obtained or altered, will change every aspect of our lives, from education and governance to friendship and kinship, to the very nature of human experience. We need a comprehensive response to the information revolution that not only proposes innovative ways to employ new technologies in a positive manner but also addresses the serious, unprecedented, challenges that they present for us.

The ease with information of every form can now be reproduced and altered is an epistemological and ontological and a governmental challenge for us. Let us concentrate on the issue of governance here. The manipulability of information is increasing in all aspects of life, but the constitution on which we base our laws and our government has little to say about information, and nothing to say about the transformative wave sweeping through our society today as a result. Moreover, we have trouble grasping the seriousness of the information crisis because it alters the very lens through which we perceive the world. If we rely on the Internet to tell us how the world changes, for example, we are blind as to how the Internet itself is evolving and how that evolution impacts human relations. For that matter, in that our very thought patterns are molded over time by the manner in which we receive, we may come to see information that is presented in that on-line format as a more reliable source than our direct perceptions of the physical world. The information revolution has the potential to dramatically change human awareness of the world and inhibit our ability to make decisions if we are surrounded with convincing data whose reliability we cannot confirm. These challenges call out for a direct and systematic response.

There are a range of piecemeal solutions to the crisis being undertaken around the world. The changes in our world, however, are so fundamental that they call out for a systematic response.We need to hold an international constitutional convention through which we can draft a legally binding global “constitution of information” that will address the fundamental problems created by the information revolution and set down clear guidelines for how we can control the terrible cultural and institutional fluidity created by this information revolution. The process of identifying the problems born of the massive shift in the nature of information, and suggesting solutions workable will be complex, but the issue calls out for an entirely new universe of administration and jurisprudence regarding the control, use, and abuse of information. As James Baldwin once wrote, “Not everything that is faced can be changed. But nothing can be changed until it is faced.”

The changes are so extensive that they cannot be dealt with through mere extensions of the United States constitution or the existing legal code, nor can it be left to intelligence agencies, communications companies, congressional committees or international organizations that were not designed to handle the convergence of issues related to increased computational power, but end up formulating information policy by default. We must bravely set out to build a consensus in the United States, and around the world, about the basic definition of information, how information should be controlled and maintained, and what the long-term implications of the shifting nature of information will be for humanity. We should then launch a constitutional convention and draft a document that sets forth a new set of laws and responsible agencies for assessing the accuracy of information and addressing its misuse.

Those who may object to such a constitution of information as a dangerous form of centralized authority that is likely to encourage further abuse are not fully aware of the difficulty of the problems we face. The abuse of information has already reached epic proportions and we are just at the beginning of an exponential increase. There should be no misunderstanding: We are not suggesting a totalitarian “Ministry of Truth” that undermines a world of free exchange between individuals. Rather, we are proposing a system that will bring accountability, institutional order, and transparency to the institutions and companies that already engage in the control, collection, and alternation of information. Failure to establish a constitution of information will not assure preservation of an Arcadian utopia, but rather encourage the emergence of even greater fields of information collection and manipulation entirely beyond the purview of any institution. The result will be increasing manipulation of human society by dark and invisible forces for which no set of regulations has been established—that is already largely the case. The constitution of information, in whatever form it may take, is the only way to start addressing the hidden forces in our society that tug at our institutional chains.

Drafting a constitution is not merely a matter of putting pen to paper. The process requires the animation of that document in the form of living institutions with budgets and mandates. It is not my intention to spell out the full parameters of such a constitution of information and the institutions that it would support because a constitution of information can only be successful if it engages living institutions and corporations in a complex and painful process of deal making and compromises that, like the American Constitutional Convention of 1787, is guided at a higher level by certain idealistic principles. The ultimate form of such a constitution cannot be predicted in advance, and to present a version in advance here would be counterproductive. We can, however, identify some of the key challenges and the issues that would be involved in drafting such a constitution of information.

The Threats posed by the Information Revolution

The ineluctable increase of computational power in recent years has simplified the transmission, modification, creation, and destruction of massive amounts of information, rendering all information fluid, mutable, and potentially unreliable. The rate at which information can be rapidly and effectively manipulated is enhanced by an exponential rise in computers’ capacity. Following Moore’s Law, which suggests that the number of microprocessors that can be placed on a chip will double every 18 months, the capacity of computers continues to increase dramatically, whereas human institutions change only very slowly.[3] That gap between technological change and the evolution of human civilization has reached an extreme, all the more dangerous because so many people have trouble grasping the nature of the challenge and blame the abuse of information they observe on the dishonesty of individuals, or groups, rather than the technological change itself.

The cost for surveillance of electronic communications, for keeping track of the whereabouts of people and for documenting every aspect of human and non-human interaction, is dropping so rapidly that what was the exclusive domain of supercomputers at the National Security Agency a decade ago is now entirely possible for developing countries, and will soon be in the hands of individuals. In ten years, when vastly increased computational power will mean that a modified laptop computer can track billions of people with considerable resolution, and that capability is combined with autonomous drones, we will need a new legal framework to respond in a systematic manner to the use and abuse of information at all levels of our society. If we start to plan the institutions that we will need, we can avoid the greatest threat: the invisible manipulation of information without accountability.

Surveillance and gathering of massive amounts of information

As the cost of collecting information becomes inexpensive, it is becoming easier to collect and sort massive amounts of data about individuals and groups and to extract from that information relevant detail about their lives and activities. Seemingly insignificant data taken from garbage, emails, and photographs can now be easily combined and systematically analyzed to essentially give as much information about individuals as a government might obtain from wiretapping—although emerging technology makes the process easier to implement and harder to detect. Increasingly smaller devices can take photographs of people and places over time with great ease and that data can be combined and sorted so as to obtain extremely accurate descriptions of the daily lives of individuals, who they are, and what they do. Such information can be combined with other information to provide complete profiles of people that go beyond what the individuals know about themselves. As cameras are combined with mini-drones in the years to come, the range of possible surveillance will increase dramatically. Global regulations will be an absolute must for the simple reason that it will be impossible to stop this means of gathering big data.

Fabrication of information

In the not-too-distant future, it will be possible to fabricate cheaply not only texts and data, but all forms of photographs, recordings, and videos with such a level of verisimilitude that fictional artifacts indistinguishable from their historically accurate counterparts will compete for our attention. Currently, existing processing power can be combined with intermediate user-level computer skills to effectively alter information, whether still-frame images using programs like Photoshop or videos using Final Cut Pro. Digital information platforms for photographs and videos are extremely susceptible to alteration and the problem will get far worse. It will be possible for individuals to create convincing documentation, photo or video, in which any event involving any individual is vividly portrayed in an authentic manner. It will be increasingly easy for any number of factions and interest groups to make up materials to that document their perspectives, creating political and systemic chaos. Rules stipulating what is true,and what is not, will no longer be an option when we reach that point. Of course the authorization of an organization to make a call as to what information is true brings with it incredible risk of abuse. Nevertheless, although there will be great risk in enabling a group to make binding determination concerning authenticity (and there will clearly be a political element to truth as long as humans rule society) the danger posed by inaction is far worse.

When fabricated images and movies can no longer be distinguished from reality by the observer, and computers can easily continue to create new content, it will be possible to continue these fabrications over time, thereby creating convincing alternative realities with considerable mimetic depth. At that point, the ability to create convincing images and videos will merge with the next generation virtual reality technologies to further confuse the issue of what is real. We will see the emergence ofvirtual worlds that appear at least as real as the one that we inhabit. If some event becomes a consistent reality in those virtual worlds, it may be difficult, if not impossible, for people to comprehend that the event never actually “happened,” thereby opening the door for massive manipulation of politics and ultimately of history.

Once we have complex virtual realities that present a physical landscape that possesses almost as much depth as the real world and the characters have elaborate histories and memories of events over decades and form populations of millions of anatomically distinct virtual people with distinct individualities, the potential for confusion will be tremendous. It will no longer be clear what reality has authority and many political and legal will be irresolvable.

But that is only half of the problem. Thosevirtual worlds are already extending into social networks. An increasing number of people on Facebook are not actual people at all, but characters, avatars, created by third parties. As computers grow more powerful, it will be possible to create thousands, then hundreds of thousands, of individuals on social networks who have complex personal histories and personalities. These virtual people will be able toengage human partners in compelling conversations that pass the Turing Test. And, because those virtual people can write messages and Skype 24 hours a day, and customize their message to what the individual finds interesting, they can be more attractive than human “friends” and have the potential to seriously distort our very concept of society and of reality. There will be a concrete and practical need for a set of codes and laws to regulate such an environment.

The Problem of Perception

Over time, virtual reality may end up seeming much more real and convincing to people who are accustomed to it than actual reality. That issue is particularly relevant when it comes to the next generation, who will be exposed to virtual reality from infancy. Yet virtual reality is fundamentally different from the real world. For example, virtual reality is not subject to the same laws of causality. The relations between events can be altered with ease in virtual reality and epistemological assumptions from the concrete world do not hold. Virtual reality can muddle such basic concepts as responsibility and guilt, or the relationship of self and society. It will be possible in the not-too-distant future to convince people of something using faulty or irrational logic whose only basis is in virtual reality. This fact has profound implications for every aspect of law and institutional functionality.

And if falsehoods are continued in virtual reality—which seems to represent reality accurately—over time in a systematic way, interpretations of even common-sense assumptions about life and society will diverge, bringing everything into question. As virtual reality expands its influence, we will have to make sure that certain principles are upheld even in virtual space so as to assure that it does not create chaos in our very conception of the public sphere. That process, I hold, cannot be governed in the legal system that we have at present. New institutions will have to be developed.

The dangers of the production of increasingly unverifiable information are perhaps a greater threat than even terrorism. While the idea of individual elements setting off “dirty bombs” is certainly frightening, imagine a world in which the polity simply can never be sure whether anything they see/read/hear is true or not. This threat is at least as significant as surveillance operations, but has received far less attention. The time has come for us to formulatethe institutional foundation that will define and maintain firm parameters for the use, alteration and retention of information on a global scale.

Money

We live in a money economy, but the information revolution is altering the nature of money itself right before our eyes. Money has gone from an analog system within which it was once was restricted to the amount of gold an individual possessed to a digital system in which the only limitation on the amount of money represented in computers is the tolerance for risk on the part of the players involved and the ability of national and international institutions to monitor. In any case, the mechanisms are now in place to alter the amount of currency, or for that matter of many other items such as commodities or stocks, without any effective global oversight. The value of money and the quantity in circulation can be altered with increasing ease, and current safeguards are clearly insufficient. The problem will grow worse as computational power, and the number of players who can engage in complex manipulations of money, increase.

Drones and Robots

Then there is the explosion of the field of drones and robots, devices of increasingly small size that can conduct detailed surveillance and which increasingly are capable of military action and other forms of interference in human society. Whereas the United States had no armed drones and no robots when it entered Afghanistan, it has now more than 8,000 drones in the air and more than 12,000 robots on the ground.[4] The number of drones and robots will continue to increase rapidly and they are increasingly being used in the United States and around the world without regard for borders.

As the technology becomes cheaper, we will see an increasing number of tiny drones and robots that can operate outside of any legal framework. They will be used to collect information, but they can also be hacked and serve as portals for the distortion and manipulation of information at every level. Moreover, drones and robots have the potential to carry out acts of destruction and other criminal activities whose source can be hidden because of ambiguities as to control and agency. For this reason, the rapidly emerging world of drones and robots deserves to be treated at great length within the constitution of information.

Drafting the Constitution of Information

The constitution of information could become an internationally recognized, legally binding, document that lays down rules for maintaining the accuracy of information and protecting it from abuse. It could also set down the parameters for institutions charged with maintaining long-term records of accurate information against which other data can be checked, thereby serving as the equivalent of an atomic clock for exact reference in an age of considerable confusion. The ability to certify the integrity of information is an issue an order of magnitude more serious than the intellectual property issues on which most international lawyers focus today, and deserves to be identified as an entire field in itself—with a constitution of its own that serves as the basis for all future debate and argument.

This challenge of drafting a constitution of information requires a new approach and a bottom-up design in order to be capable of sufficiently addressing the gamut of complex, interconnected issues found in transnational spaces like that in which digital information exists. The governance systems for information are simply not sufficient, and overhauling them to make them meet the standards necessary would be much more work and much less effective than designing and implementing an entirely new, functional system, which the constitution of information represents. Moreover, the rate of technological change will require a system that can be updated and made relevant while at the same time safeguarding against it being captured by vested interests or made irrelevant.

A possible model for the constitution of information can be found in the “Freedom of Information” section of the new Icelandic constitution drafted in 2011. The Constitutional Council engaged in a broad debate with citizens and organizations throughout the country about the content of the new constitution. The constitution described in detail mechanisms required for government transparency and public accessibility that are far more aligned with the demands of today than other similar documents.[5]

It would be meaningless, however, to merely put forth a model international “constitution of information” without the process of drafting it because without the buy-in of institutions and individuals in its formulation, the constitution would not have the authority necessary to function. The process of debating and compromising that determines the contours of that constitution would endow it with social and political significance, and, like the constitution of 1787, it would become the core for governance. For that matter, the degree to which the content of the constitution of information would be legally enforceable would have to be part of the discussion held at the convention.

Process for the Constitutional Convention

To respond to this global challenge, we should call a constitutional convention in which we will put forth a series of basic principles and enforceable regulations that are agreed upon by major institutions responsible for policy—including national governments and supra-national organizations and multi-national corporations, research institutions, intelligence agencies, NGOs, and a variety of representatives from other organizations. Deciding who to invite and how will be difficult, but it should not be a stumbling block. The United States Constitution has proven quite effective over the last few centuries even though it was drafted by a group that was not representative of the population of North America at the time. Although democratic process is essential to good government, there are moments in history in which we confront deeper ontological and epistemological questions that cannot be addressed by elections or referendums and require a select group of individuals like Benjamin Franklin, Thomas Jefferson and Alexander Hamilton. At the same time, the constitutional convention cannot be merely a gathering of wise men, but will have to involve those directly engaged in the information economy and information policy.

That process of drafting a constitution will involve the definition of key concepts, the establishment of the legal and social limits of the constitution’s authority, the formulation of a system for evaluating the use and misuse of information and suggestions as to policies for responding to abuses of information on a global scale. The text of this constitution of information should be carefully drafted with a literary sense of language so that it will outlive the specifics of the moment and with a clear historic vision and unmistakable idealism that will inspire future generations as the United States Constitution inspires us. This constitution cannot be a flat and bureaucratic rehashing of existing policies on privacy and security.

We must be aware of the dangers involved in trying to determine what is and is not reliable information as draft the constitution of information. It is essential to set up a workable system for assuring the integrity of information, but multiple safeguards, checks, and balances will be necessary. There should be no assumptions as to what the constitution of information would ultimately be, but only the requirement that it should be binding and that the process of drafting it should be cautious but honest.

One essential assumption should be, following David Brin’s argument in his book The Transparent Society,[6] that privacy will be extremely difficult, if not impossible, to protect in the current environment. We must accept, paradoxically, that much information must be made “public” in some sense in order to preserve its integrity and its privacy. That is to say that the process of rigorously protecting privacy is not sufficient granted the overwhelming changes that will take place in the years to come.

Brin draws heavily on Steve Mann’s concept of sousveillance, a process through which ordinary people could observe the actions of the rich and powerful so as to counter the power of the state or the corporation to observe the individual. The basic assumption behind sousveillance is that there is no means of arresting the development of technologies for surveillance and that those with wealth and power will be able to deploy such technologies more effectively than ordinary citizens. Therefore the only possible response to increased surveillance is to create a system of mutual monitoring to assure symmetry, if not privacy. Although the constitution of information does not assume that a system that allows the ordinary citizen to monitor the actions of those in power is necessary, the importance of creating information systems that monitor all information in a 360-degree manner should be seriously considered as part of a constitution of information. The one motive for a constitution of information is to undo the destructive process of designating information as classified and blocking off reciprocity and accountability on a massive scale. We must assure that multiple parties are involved in that process of controlling information so as to assure its accuracy and limit its abuse.

In order to achieve the goal of assuring accuracy, transparency and accountability on a global scale, but avoid massive institutional abuse of the power over information that is granted, we must create a system for monitoring information with a balance of powers at the center. Brin suggests a rather primitive system in which the ruled balance out the power of rulers through an equivalent system for observing and monitoring that works from below. I am skeptical that such a system will work unless we create large and powerful institutions within government (or the private sector) itself that have a functional need to check the power of other institutions.

Perhaps it is possible to establish a complex balance of powers wherein information is monitored and its abuses can be controlled, or punished, according to a meticulous, painfully negotiated, agreement between stakeholders. It could be that ultimately information would be governed by three branches of government, something like the legislative, executive, and judicial systems that has served well for many constitution-based governments. The branches assigned different tasks and authority within this system for monitoring information must have built into their organizations set conflicts of interest and approach in accord with the theory of the “balance of power” to assure that they limited the power of the other branches.

The need to assure accuracy may ultimately be a more essential task than the need to protect privacy. The general acceptance of inaccurate descriptions of state of affairs, or of individuals, is a profoundly damaging and cannot be easily rectified. For this reason, I suggest as part of the three branches of government, a “three keys” system for the management of information be adopted. That is to say that sensitive information will be accessible—otherwise we cannot assure that information will be accurate—but that information can only be accessed when three keys representing the three branches of government are presented. That process would assure that accountability can be maintained because three institutions whose interests are not necessarily aligned must be present to access that information.

Systems for the gathering, analysis and control of information on a massive scale have already reached a high level of sophistication. What is sadly lacking is a larger vision of how information should be treated for the sake of our society. Most responses to the information revolution have been extremely myopic, dwelling on the abuse of information by corporations or intelligence agencies without considering the structural and technological background of those abuses. To merely attribute the misuse of information to a lack of human virtue is to miss the profound shifts sweeping through our society today.

The constitution of information will be fundamentally different than most constitutions in that it must contain both rigidity in terms of holding all parties to the same standards and also considerable flexibility in that it can readily adapt to new situations resulting from rapid technological change. The rate at which information can be stored and manipulated will continue to increase and new horizons and issues will emerge,perhaps more quickly than expected. For this reason, the constitution of information cannot be overly static and must derive much of its power from its vision.

Structure of an Information Accuracy System

We can imagine a legislative body to represent all the elements of the information community engaged in the regulation of the traffic and the quality of information as well as individuals and NGOs. It would be a mistake to assume that the organizations represented in that “legislature” would necessarily be nation states according to the United Nations formulation of global governance. The limits of the nation state concept with regards to information policy are increasingly obvious and this constitutional convention could serve as an opportunity to address the massive institutional changes that have taken place over the past fifty years. It would be more meaningful, in my opinion, to make the members companies, organizations, networks, local government, a broad range of organizations that make the actual decisions concerning the creation, distribution and reception of information. That part of the information security system would only be “legislative” in a conceptual sense. It would not necessarily have meetings or be composed of elected or appointed representatives. In fact, if we consider the fact that the actual physical meetings of government legislatures around the world have become but rituals, we can sense that there the whole concept of the legislative process requires much modification.

The executive branch of the new information accuracy system would be charged with administrating the policies based on the legislative branch’s policies. It would implement rules concerning information to preserve its integrity and prevent its misuse. The details of how information policy is carried out would be determined at the constitutional convention.

The executive would be checked not only by the legislative branch but also a judicial branch. The judicial branch would be responsible for formulating interpretations of the constitution with regards to an ever-changing environment for information, and also for assessing the appropriateness of actions taken by the executive and legislative.

The terms “executive,” “legislative” and “judicial” are meant more as placeholders in this initial discussion, rather than as actual concrete descriptions of the institutions to be established. The functioning of these units would be profoundly different from such branches of present local and national governments, or even international organizations like the United Nations. If anything, the constitution of information, in that information and its changing nature underlie all other institutions; will be a step forward towards a new approach to governance in general.

Conclusion

It would be irresponsible and rash to draft an “off the shelf” constitution of information that can be readily applied around the world to respond to the complex situation of information today. Although I accept that initial proposals for a constitution of information like this one may be dismissed as irrelevant and wrong-headed, I assert that as we enter an unprecedented age of information revolution and most of the assumptions that undergirded our previous governance systems based on physical geography and discrete domestic economies will be overturned, there will be a critical demand for new systems to address this crisis. This initial foray can help formulate the problems to be addressed and the format in which do to so in advance.

In order to effectively govern a new space that exists outside of our current governance systems (or in the interstices between systems), we must make new rules that can effectively govern that space and work to defend transparency and accuracy in the perfect storm born of the circulation and alteration of information. If information exists in a transnational or global space and affects people at that scale, then the governing institutions responsible for its regulation need to be transnational or global in scale. If unprecedented changes are required, then so be it. If all records for hundreds of years exist on line, then it will be entirely possible, as suggested in Margaret Atwood’s The Handmaid’s Tale, to alter all information in a single moment if there is not a constitution of information. But the solution must involve designing the institutions that will be used to govern information, thus bringing an inspiring vision to what we are doing. We must give a philosophical foundation for the regulation information and open up of new horizons for human society while appealing to our better angels.

Oddly, many assume that the world of policy must consist of the drafting turgid and mind-numbing documents in the specialized terminology of economists. But history also has moments such as the drafting of the United States constitution during which a small group of visionary individuals manage to meet up with government institutions to create an inspiring new vision of what is possible that are recorded in terse and inspiring language. That is what we need today with regards to information. To propose such an approach is not a misguided modern version of Neo-Platonism, but a chance to seize the initiative with regards to ineluctable change and put forth a vision, rather than responding to change.

[1]As is suggested in the article by Tony Romm “David Petraeus affair scandal highlights email privacy issues” (http://www.politico.com/news/stories/1112/83984.html#ixzz2CUML3RDy).
[2] http://www.idc.com/getdoc.jsp?containerId=prUS23177411#.UTL3bDD-H54
[3] Human genetic evolution is even slower.
[4]Peter Singer. “The Robotics Revolution” in Canadian International Council, December 11, 2012.
[5] http://fairerglobalization.blogspot.kr/2011/06/iceland-writes-information-age.html
[6]Brin, ‚David. The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? New York: Basic Books, 1998.

Yesterday, March 25 2013, the Colorado Legislature passed a resolution making March 25, Aerospace Day. What a great way to celebrate Colorado’s participation in space endeavors. The state is the second largest employer of space related companies. Thanks to Colorado Space Business Roundtable (CSBR), the Colorado Space Coalition (CSC), the Rocky Mountain AIAA (RMAIAA), and the many sponsors who helped make this possible.

The sponsors are Aurora Chamber of Commerce, Ball Aerospace Technologies, GH Phipps Construction, Lockheed Martin Space Systems, Metro State University of Denver, United Launch Alliance, Red Canyon Software, Sierra Nevada Corporation, Webster University, and the Wings Over the Rockies Air and Space Museum.

Picture of the Colorado Senate just after passing the resolution.

Picture of the Colorado House of Representative congratulating CSBR, CSC & RMAIAA just after having passed the resolution.

If we are to become a space faring civilization it is important to celebrate our efforts in space endeavors. Our Colorado legislature recognized the need and passed the resolution to make March 25 Colorado’s Aerospace Day. I hope all the other states will would join Colorado and make March 25 Aerospace Day, and one day March 25 will be the national Aerospace Day.

———————-

I received some photos from Michael Piccone. Here they are

Picture of the inside Capitol Hill showing some of the attendees visiting with the exhibitors.

Picture of 60+ of us who attended. There were more, and we were the ones who posed for this photo.

Close up of on of our state senators.

Some of the people who planned and made this event and resolution possible. They are from CSBR, CSC, Colorado Legislature, Lockheed, Boeing, Wings Over the Rockies.…

——————————————

Benjamin T Solomon is the author of the 12-year study An Introduction to Gravity Modification