Technology, Prehistory, Humanity

[Image: Still from 2001].

For those of you in the Bay Area, the Berkeley Center for New Media is hosting an event on April 3rd that sounds worth checking out. “The Human Computer in the Stone Age: Technology, Prehistory, and the Redefinition of the Human after World War II” is a talk by historian Stefanos Geroulanos. From the event description:

After World War II, new concepts and metaphors of technology helped transform the understanding of human history all the way back to the australopithecines. Using concepts from cybernetics and information theory as much as from ethnology and osteology, scientists and philosophers reorganized the fossil record using a truly global array of fossils, and in the process fundamentally re-conceptualized deep time, nature, and the assemblage that is humanity itself. This paper examines three ways in which technological prehistory, that most distant, speculative, and often just weird field, came to reorganize the ways European and American thinkers and a lay public thought about themselves, their origins, and their future.

This obviously brings to mind the early work of Bernard Stiegler, whose Technics and Time, 1 remains both difficult and worth the read.

In any case, if you happen to attend, let me know how it goes.

(In the unlikely event that you share my taste in electronic music, you might choose to prepare for this lecture by listening to Legowelt’s otherwise unrelated track, “Neolithic Computer.”)

Computational Landscape Architecture

[Image: An otherwise unrelated photo, via FNN/Colossal].

In 2017, researchers attending the annual Cable-Tec Expo presented a paper looking at the effect certain trees can have on wireless-signal propagation in the landscape.

In “North America in general,” the researchers wrote, “large swathes of geography are dominated by trees and other foliage which, depending on seasonal growth and longitude, can interrupt a good many LOS [line of sight] apertures between BS [a base station] and client and present performance challenges.”

That is to say, parts of North America are heavily forested enough that the landscape itself has a negative effect on signal performance, including domestic and regional WiFi.

Their presentation included a graph analyzing the effects that particular tree species—pine, spruce, maple—can have on wireless signals. “The impact of deciduous and conifer trees (under gusty wind conditions) suggest that the leaf density from the conifer more frequently produces heavy link losses and these,” they explain.

In other words, for the sake of signals, plant deciduous.

[Image: From “Can a Fixed Wireless Last 100m Connection Really Compete with a Wired Connection and Will 5G Really Enable this Opportunity?”]

What interests me here is the possibility that we might someday begin landscaping our suburbs, our corporate campuses, our urban business parks, according to which species of vegetation are less likely to block WiFi.

There is already a move toward xeriscaping, for example—or planting indigenous species tolerant of arid climates in cities such as Phoenix and Los Angeles—but what about WiFi-scaping, landscapes sown specifically for their electromagnetic-propagation effects?

One of my favorite studies of the last decade looked at whether trees planted around a fuel-storage depot in England known as Buncefield might have inadvertently caused a massive gas explosion. In this case, though, a site’s landscaping might instead cause data-propagation errors.

You can imagine, for example, vindictive foreign governments purposefully surrounding an American embassy with trees unpermissive of signal propagation, even deliberately donating specific indoor plant species known for their negative effects on electromagnetic signals. A kind of living, vegetative Faraday cage.

Hostile houseplant-gifting networks. Like the plot of some future David Cronenberg film.

[Image: Lucian Freud, “Interior in Paddington” (1951), via Tate Britain].

In any case, this brings to mind many things.

A recent study published in the MIT Technology Review, for example, suggested that WiFi could be used to spy on human movements inside architecture. The paper documents how researchers used WiFi “to work out the position, actions, and movement of individuals” inside otherwise sealed rooms.

It’s worth recalling the use of WiFi as a burglar alarm, whereby unexpected human intruders can be detected when their bodies perturb the local WiFi field. Is that someone walking toward you in the dark…? Your router might see them before you do, as their movement cause bulges and malformations in your home’s WiFi.

The more relevant implication, however, is that you could potentially use WiFi to spy on movements in the broader landscape. Deciduous forests would be easier than coniferous, it seems.

You could soak a forest in electromagnetic signals—yes, I know this is not the greatest idea—and measure those signals’ reflection to count, say, active birds, beetles, badgers, or other participants in the wilderness. It’s WiFi as a tool for ecological analysis: you set up a router and watch as its signals reverberate through the forests and fields. Animal radar.

Finally, consider a study published last year that suggested WiFi signals could be turned into a computational device. According to researchers Philipp del Hougne and Geoffroy Lerose, you can “perform analog computation with Wi-Fi waves reverberating in a room.”

Read their paper to find out more, but what seems so interesting in the present context is the idea that forested landscapes could be grown to cultivate their WiFi computational ability. Like botanical pinball machines, you could design, plant, and grow entire forests based on their ability to reflect future WiFi signals in very specific ways, artificial landscapes destined to perform computational tasks.

A bitcoin forest. WiFi forestry.

Or forest supercomputers, pruned for their ability to plumb the mathematical sublime.

(Thanks to Jameson Zimmer for the tip re: WiFI and trees. Earlier on BLDGBLOG: The Design Forest of the Sacred Grove, Forest Tone, and many others.)

Dark Matter Mineralogy and Future Computers of Induced Crystal Flaws

[Image: Mexico’s “Cave of the Crystals,” via Wikipedia].

I guess I’ve got minerals on the brain.

Anyway, there was an amazing story last week suggesting that, deep inside the planet, minerals might exhibit flaws associated with “collisions with dark matter.” In a sense, this would make the entire interior of the earth a de facto dark matter detector—or, according to researchers at the University of Michigan, “minerals such as halite (sodium chloride) and zabuyelite (lithium carbonate), can act as ready-made detectors.”

Proving this hypothesis sounds like the opening scene of a blockbuster science fiction film: “An experiment could extract the minerals—which can be around 500 million years old—from kilometres-deep boreholes that already exist for geological research and oil prospecting. Physicists would need to crack open the extracted minerals and scan the exposed surfaces under an electron or atomic force microscope for the tracks made by recoiling nuclei. They could also use X-ray or ultraviolet 3D scanners to study bigger chunks of minerals faster, but with lower resolution.”

Either way, it’s incredible to imagine that slightly altered mineral structures deep inside the planet might reveal the presence of dark matter washing through the cosmos. After all, the Earth is allegedly “constantly crashing through huge walls of dark matter,” so the idea that some rocks might be glitched and scratched by these impacts isn’t that hard to believe. In fact, this brings to mind another hypothesis, that the GPS satellite network is, in fact, a huge, accidental dark matter detector.

Read more at Nature.

Meanwhile, ScienceDaily reported earlier this month that flaws deliberately introduced into the crystal forms of diamonds could be structured such that they improve those diamonds’ capacity for quantum computation. Apparently, a team at Princeton has designed new kinds of diamonds “that contain defects capable of storing and transmitting quantum information for use in a future ‘quantum internet.’”

There is obviously no connection between these two stories, but that won’t stop me from imagining some vast new quantum computer network, coextensive with the Earth’s interior, performing prime-number calculations along dark matter-induced crystal flaws, crooked mineral veins flashing in the darkness with data, like some buried circuitboard throbbing beneath the continents and seas.

Read more at ScienceDaily.

(Related: Planet Harddrive.)

Sovereign Flocking Algorithms

[Image: Flocking diagram by “Canadian Arctic sovereignty: Local intervention by flocking UAVs” by Gilles Labonté].

One of many ways to bolster a nation-state’s claim to sovereignty over a remote or otherwise disputed piece of land is to perform what’s known as a “sovereignty cruise.” This means sending a ship—or fleet of ships—out to visit the site in question, thus helping to normalize the idea that it is, in fact, a governable part of that nation’s territory.

It is, in essence, a fancy—often explicitly militarized—version of use it or lose it.

Last summer, for example, Vietnam organized a private tour of the Spratly Islands, an archipelago simultaneously claimed by more than one nation and, as such, part of the much larger ongoing dispute today over who really owns and controls the South China Sea [sic].

Vietnam’s effort, Reuters reported at the time, was a strategic visit “to some of Asia’s most hotly contested islands, in a move likely to stoke its simmering dispute with Beijing over South China Sea sovereignty.”

It made “little attempt to disguise its political flavor, and comes as Vietnam pursues a bolder agenda in pushing its claims in the face of China’s own growing assertiveness.” Indeed, the cruise was apparently just the beginning, a mere “trial run ahead of Vietnam’s tentative plans to put the Spratlys on its tourism map, including scheduled passenger flights, possibly this year.”

Bring the people, in other words, and you bring evidence of governmental control.

Against this, of course, we must place the construction of entire islands by China, including the recent installation of a new primary school there, on an artificial island, a school whose opening lecture “was a geopolitical class that focused on China’s ownership of the sea.”

These sovereign games of Go taking place in disputed waters could sustain an entire blog on their own, of course, and are a topic we’ll undoubtedly return to. (Briefly, it’s worth noting that the sovereign implications of artificial islands were also part of a course I taught at Columbia a few years ago.)

Surprisingly, however, another region seen as potentially subject to future disputes over sovereignty is the Canadian Arctic. As such, arguments over such things as whether or not the Northwest Passage is an “international strait” (open to use by all, including Russian and Chinese military ships) or if it is actually a case of “internal waters” controlled exclusively by Canada (thus subject to restricted access), are still quite active.

Add to this a series of arguments over indigenous political rights as well as the specter of large-scale terrestrial transformation due to climate change, and a series of intriguing and quite complicated political scenarios are beginning to emerge there. (Who Owns The Arctic? by Michael Byers is an excellent introduction to this subject, as is Mia Bennett’s blog Cryopolitics.)

[Image: Flocking diagram by “Canadian Arctic sovereignty: Local intervention by flocking UAVs” by Gilles Labonté].

With all this in mind, consider a fascinating report issued by Defence R&D Canada back in 2010. Called “Canadian Arctic sovereignty: Local intervention by flocking UAVs” (PDF), and written by Gilles Labonté, it opens stating that “the importance of local intervention capability for the assertion of Canadian Sovereignty in the Northwest passage is recognized.”

However, Canada presently lacks the ability to deploy at any northern position, on demand, assets that could search a wide area for rescue or surveillance purposes. This fact motivated the exploration we report here on the feasibility of a rapid intervention system based on a carrier-scouts design according to which a number of unmanned aerial vehicles (UAVs) would be transported, air launched and recovered by a larger carrier aircraft.

In other words, if Canada can’t send actual Canadians—that is, living human beings—on aerial “sovereignty cruises” by which they could effectively demonstrate real-time political control over the territories of the north, then they could at least do the next best thing: send in a flock of drones.

Doing so, Labonté suggests, would require a particular kind of flocking algorithm, one with an explicitly political goal. “In the present report,” he adds, “we propose a solution to the remaining problem of managing simultaneously the many UAVs that are required by the vastness of the areas to be surveyed, with a minimum number of human controllers and communications.”

Namely, we present algorithms for the self-organization of the deployed UAVs in the formation patterns that they would use for the tasks at hand. These would include surveillance operations during which detailed photographic or video images would be acquired of activities in a region of interest, and searching an area for persons, vehicles or ships in distress and providing a visual presence for such. Our conclusion is that the local intervention system with flocking UAVs that we propose is feasible and would provide a very valuable asset for asserting and maintaining Canadian Sovereignty in the North.

There are “formation patterns” and flocking algorithms, this suggests, that would specifically be of use in “asserting and maintaining Canadian Sovereignty in the North.”

Hidden within all this is the idea that particular flocking algorithms would be more appropriate for the task than others, lending an explicit air of political significance to specific acts of programming and computation. It also implies an interesting connection between the nation-state and behavioral algorithms, in which a series of behavioral tics might be ritually performed for their political side-effects.

For some context, the report adds, “the Canadian Government has had serious considerations of establishing a presence in the north through purchasing nuclear submarines and ice-breakers.” But why not side-step much of this expense by sending UAVs into the Arctic void instead, reinforcing nation-state sovereignty through the coordinated presence of semi-autonomous machines?

Simply re-launch your drones every two or three months, just often enough to nudge the world into recognizing your claim, not only of this remote airspace but of the vast territory it covers.

A halo of well-choreographed aerial robots flocks in the Arctic skies before disappearing again into a bunker somewhere, waiting to reemerge when the validity of the government appears under threat—a kind of machine-ritual in the open three-dimensional space of the polar north, a robotic sovereignty flight recognized around the world for its performative symbolism.

Read the rest of Labonté’s paper—which is admittedly about much more than I have discussed here—in this PDF.

The World as a Hieroglyph of Spatial Relationships Yet to be Interpreted

drones
[Image: Courtesy Iris Automation].

In an interview published on the blog here a few years ago, novelist Zachary Mason, author of The Lost Books Of The Odyssey, pointed out something very interesting about the nearly limitless, three-dimensional space of the Earth’s atmosphere and how it relates to artificial intelligence.

“One of the problems with A.I.,” Mason explained back in 2010, “is that interacting with the world is really tough. Both sensing the world and manipulating it via robotics are very hard problems, and [these are] solved only for highly stripped-down special cases. Unmanned aerial vehicles, for instance, work well because maneuvering in a big, empty, three-dimensional void is easy—your GPS tells you exactly where you are, and there’s nothing to bump into except the odd migratory bird. Walking across a desert, though—or, heaven help us, negotiating one’s way through a room full of furniture in changing lighting conditions—is vastly more difficult.”

Another way of thinking about Mason’s comment—although Mason himself might disagree with the following statement—is that it is precisely the sky’s ease of navigation that makes it ideal for the emergence and testing of artificial intelligence. The Earth’s atmosphere, in other words—specifically because it is an unchallenging three-dimensional environment—is the perfect space for machine-vision algorithms and other forms of computational proto-intelligence to work out their most basic bugs.

Once they master the sky, then, autonomous machines can move on to more complicated environments, such as roads, mountains, forests. Cities.

In any case, I was thinking about Mason’s interview again earlier today when I read that drones are close to achieving “situational awareness”—albeit through visual, not artificially intelligent, means. In other words, it’s not AI—at least not yet—that will give unmanned aerial vehicles their much-needed ability to avoid colliding with other flying objects. Rather, it is a sufficiently advanced visual processing system that can identify and, more importantly, avoid potential obstacles.

Exactly such a system, TechCrunch claims, has been built by a Canadian firm called Iris Automation. Their system is able “to process visual data in real time, so it can see structures that suddenly appear, like a plane, flock of birds or another drone—not just static objects and waypoints that might be mapped using older technologies like GPS.” The company refers to this as “industrial drone collision avoidance,” which suggests a kind of on-board traffic management system for the sky. Air traffic control will be internal.

Now connect a drone’s “situational awareness” to sufficient processing power, and you could help steward into existence a computationally interesting form of autonomous intelligence.

To return to Zachary Mason’s computationally-inflected rewriting of The Odyssey, it would be AI as Athena, springing fully formed into the world from an empty sky.