Monday, July 23, 2012

Historic Disclosure of a New Technology

On 19 June 2012 I posted the below comment to Slashdot, a technology forum for geeks.  The article being discussed was a press release by the National Security Agency claiming that, were the NSA to disclose how much it spies on US citizens, it would violate the privacy of US citizens.  A previous poster commented on this Orwellian language and claimed that the NSA already intercepted all electronic communication of the 310 Million people in the USA.  I posted this:



Comment: 310 Million +, encryption means naught (Score 5, Funny)


I agree with the poster above. NSA probably spies on all electronic traffic by everyone on Earth, which includes all residents of North America. I'd like to take this occasion to remind people about ECHELON, the 'secret' signals intelligence gathering system whose existence was leaked to the public in 1996 by some very brave Aussies. This revelation included the detail that, since 'Five Eyes' (AUS CAN NZ UK US) foreign intelligence agencies were forbidden by charter from spying on their own citizens, they had worked out an arrangement to spy on each others' citizens and then swap data!
I also wish to take this opportunity to suggest to security-minded readers that NSA et al have advanced cryptanalysis tools at their disposal. While your first reaction might be "Duh!", please bear with me. In this message I actually disclose new non-public, non-official, hard-but-not-impossible-to-verify information. Specifically, I'd like to blow the whistle on the fact that they have probably had a working Quantum Computer system capable of cracking Public Key Cryptography since about 1996. Thus, even your encrypted data has been seen by NSA computers although, of course, that decrypted data set must be partitioned separately and used with extreme care, so as not to reveal its existence.
Science-oriented readers might wonder just what sort of QC could have been built a full 18 years ago, when current technology is just nearing the point of developing a useful QC. The answer is that they generated a 'teleportation/entanglement-based winner-take-all style recurrent topological quantum neural network', then trained it to emulate a Quantum Turing Machine that could run Shor's Algorithm. It exists in the physical form of a complex system composed of 'anyons' interacting with each other within a 'two dimensional electron gas'. Anyons can be generated by moving precision arrays of powerful electromagnets very near the surface of the 2DEG, like creating whirlpools in the bathtub with your hand. I strongly suspect the scientists involved discovered a rule, analogous to Rule 110, that operates directly on the physical system of anyons within a 2DEG. For the detailed scientific underpinnings I suggest you study the collected works of Stuart KauffmanSteven WolframDavid Deutsch, and Robert Laughlin. You have no reason to trust what I'm saying, and disinformation is entirely too common, but I want readers to understand that it is possible for a sufficiently determined and intelligent person to verify that what I just said is probably true, although certainly NOT just by Googling for it :-)
Readers should note that the new technology I describe is not limited to running Shor's algorithm and,in fact, is a powerful new general technology with various other uses. None of which matter much until this whole thing is declassified, so that civilian scientists will be able to study and publish on the topic. The NSA et al is keeping it secret to prevent everyone from knowing that PKI is no longer secure. IMHO this is insufficient reason to keep secret important new scientific knowledge.
Finally, lest someone complain that I might be harming National Security by making the above disclosure, I'd like to point out that China and Russia already have working QCs of their own that function on similar principles. This is an open secret within the Intelligence Community. Thus, I am disclosing new information to Slashdot readers and to the general public whom they might tell about it, but I am NOT telling international spies anything they don't already know. As far as I can tell most everyone who has worked on one of these systems is bound by ironclad Non Disclosure Agreements of one sort or another, but I would not be shocked if leaks sometimes occurred. The NDA seems to come in several flavors. I began to suspect the existence and nature of this system about nine years ago, and have dedicated many years to learning just how the science works and fitting all the details into place. Readers should know that the only controversial part of this post is my claim that this system was ACTUALLY BUILT so long ago, and my choice to disclose it, not that it would probably work as described.
This would be a great message to stash away in an offline storage medium, then check back every six months to see if it has been scraped off slashdot and search engine archives. I'm hoping that last sentence keeps this message from being censored, so please do your part, save it offline, and check back every six months for as long as you remember. I have other such messages, some with far more detail, working their way through the internet and into the media, and would welcome contact from interested parties. I have not signed any NDA, although I have recently been invited to do so. I consider myself a journalist exercising my Constitutional right, as a US Citizen, to freedom of protected speech. Finding me is a sort of very simple intelligence test, since I'm not hiding my identity.












Sunday, May 13, 2012

Useful properties of a Quantum Neural Network

Why would someone go to the time and expense of trying to build a Quantum Neural Network (QNN)?  In other words, even if it is possible to do so, what is it useful for?

 1. You can run a quantum Turing machine on a QNN.  A quantum Turing machine is the basis for quantum computing (QC).  One thing we know QC can do is easily and rapidly crack public key cryptography.  Anyone with access to a QC can read other people's (encrypted) mail, which is the primary purpose of several Government agencies.  No other reason is required, from the perspective of e.g. NSA, to spend billions trying to build one, even if the chance of success is quite low.  This works best if the QC remains a secret, because QC can not crack encryption done the old-fashioned way: shared secret keys, transmitted offline, and synchronous encryption.

2.  A whole host of new technologies can be derived from a QNN.  A QNN is, in fact, a new General Purpose Technology, a technology that enables other new technologies.  Some examples of other General Purpose Technologies include: fire, agriculture, combustion engine, electricity, radio, chemistry, mechanization.  This author suspects this factor was not a consideration by the people who may have funded this project, as it is not at all obvious that QNN is a new General Purpose Technology.  It is, though.  Below are some new technologies enabled by practical QNN technology.

3.  A QNN can be the basis of Advanced Artificial Intelligence.  A QNN is a physical-system starting point for artificial brain technology.  This has many valuable and important uses in both military and civilian life.  Advanced AI enables many new technologies.  E.g.  self-driving vehicles, Jeopardy-winning computers, automatic language translation, extreme data compression rates,  improved data-mining, digital personal assistance, et cetera.

4.  A QNN can provide a secret communications system.  The system provides a quantum channel that effectively teleports information from Alice directly to Bob.  Alice and Bob would each need to be near a Node of the QNN, using a conventional computer with an oracular connection to the QNN.  There must be a (steganographic) classical back channel.  This system is probably quite scale-able.  This system could be used to securely distribute cryptographic keys for symmetric cryptography (e.g. AES), which can not be broken by any known algorithm, quantum or classical.

5.  A QNN might behave as a room temperature superconductor, but only for very tiny currents.

6.  A QNN would be a great starting basis for adiabatic (reversible) computing.  This would be one way to overcome an expected impending quantum limit to Moore's Law.

7.  QNN technology provides an excellent basis for developing, implementing, and securing advanced nanotechnology.

8.  QNN technology might be helpful in the field of Energy Resources, in several different ways.

9.    A QNN could be trained to drastically improve the effectiveness and range of quantum teleportation. The current 'official' range limit for quantum teleportation is about 16,000 meters.  This author supposes that QNN-enhanced quantum teleportation has a much greater range, probably enough range to reach satellites in orbit.

Friday, April 27, 2012

Example #1 of Censored Science

Today there was a Slashdot article about "What Are the Most Dangerous Lines of Scientific Inquiry", which lead to a discussion about censored science.  Since this blog is largely about censored science, I posted this comment describing a concrete example of censored science.  My comment was generally ignored and not widely seen:


Example #1: In the 1990s the English speaking countries AUSCANNZUKUS [wikipedia.org] sponsored a secret science project that discovered and developed Topological Quantum Neural Network technology (would provide a Wikipedia link, but the topic is censored there). They used it to build a Magic Decoder Box, but the technology had much more interesting uses than reading other peoples' mail. It also lead indirectly to some major mathematical and scientific breakthroughs. e.g. The mathematical breakthrough that allowed for rapid sequencing of 'shattered' DNA in the late 90s, some of the advanced AI now in evidence from large corporations, et cetera. However, because the original Magic Decoder Box project was classified none of this science has been publicly shared. Anyone participating in Corporate or Government development using this technology must sign an ironclad NDA of the direst sort. This author is one of the few people who knows a lot about this 'censored science', yet who has never signed an NDA.
This author has personally seen an example of scientific censorship at work: find a rare early First Edition of Dr. Stuart Kauffman's 1996 book At Home in the Universe [wikipedia.org], and compare it chapter-by-chapter with a later First Edition. One chapter has been excised, and that chapter explicitly discusses Quantum Neural Networks. This author suspects he snuck it past the censors, then someone noticed and made him remove it for all later printings, while still calling it a First Edition. The 'censored' version was removed from sale, but there are still a few copies out there. The chapter in question seems odd and out of place, until one realizes that it is trying to deliver a hidden message from a scientist who abhors censoring science, yet had no choice. This author believes that there were once legitimate National Security reasons for keeping this science secret, but believes those reasons are no longer valid. Skeptical readers should note that The Ultra Secret [wikipedia.org], a strikingly similar case, remained classified for 35 years.
One very reasonable Slashdot reader did make this comment:
Excuse me? How nice of you to repeat the plot of a scifi novel, but do mind to also give its name and author.
and my response was
Nope, just telling the truth as I understand it, in a technically correct and factually accurate way. I'm well aware that my story sounds tinfoil hat to the uninformed. Five Eyes have done a good job keeping it quiet, just as US/UK did a good job keeping Ultra quiet. People initially thought David Kahn was being tinfoil hat when he disclosed The Ultra Secret in 1974. This makes it no less true and correct.
If you research this topic you will discover that the more you learn about it the more plausible my statements are. Adiabatic Topological Quantum Computing is currently a hot cutting edge topic, but hard to research academically because the people with access to the best platforms are under NDA and don't publish. This author believes that Professor Stuart Kauffman is overdue for a Nobel Prize, but knows he will never receive one because of the classified nature of the science. Another contributor to this 'secret science' project was awarded the 1998 Nobel Prize in Physics for an ancillary discovery he made while engaged in this project, and now runs an Institute for Quantum Computing Research. David Deutch, who also works at an institute for Quantum Computing, was probably also a contributor, but I don't know that for certain.

This author is trying to find a job.  Next week I have a 2nd interview with a company that (presumably) uses TQNN/AQC technology.  If I accept their offer I will have to sign an NDA, which will presumably prevent me from mentioning this topic ever again.  Thus, it's time for me to turn more of my copious notes into prose.  Before going silent on the topic (and before entering serious discussion of an NDA with a potential employer) I will be sure to copy this entire blog and distribute multiple copies.

(Update on 23 July 2012:  This 2nd interview occurred.  While it would make a very interesting story, in the interest of professionalism I choose to remain silent on the topic.  I'm still looking for work.)


Monday, March 26, 2012

Schroedinger's Cat is out of the bag

Last week I wrote something which was then re-posted to Cryptome.  The cat's out of the bag, so I may as well write down more of the true and probably-true things I (think I) know.  Here is a text copy of content posted to

http://cryptome.org/2012/03/qc-footprint.htm

17 March 2012
Quantum Computation Cognitive Footprint



A sends a comment from Schneier on Security:
Slightly Weird claim: Cognitive Footprint Biometric Application has been around for years

A 'cognitive footprint' biometric analysis system based on keyboard and mouse movements, combined with software-use behavior, has been in production for years. I've known of it since 2004 with a high degree of confidence, but I'm generally wise enough not to discuss it. I tinker with AI and neural networks (NN) myself, and am an expert software engineer, so I can reliably tell you that it's not particularly hard to build such a system at the toy/theoretical level. It's probably quite hard to implement it well in the real world.

My browser-centric toy model of a cognitive footprint biometric application used JavaScript to track keyboard and mouse interaction, which then passed time-parsed data to a neural network for classification. With an ordinary (non-recurrent) neural network the above comments about error rates and edge cases are very accurate. However, with access to an advanced recurrent neural network I'm pretty sure that the error rate could be reduced to a level low enough for effective use in combination with other authentication methods.

___________

Thoroughly Outlandish Claim: Five Eyes got production QC power in 1995

A real-world functional cognitive footprint biometric application requires an advanced recurrent neural network. The recurrent neural network that now powers this app is (literally) related to or descended from a classified system built to crack public-private key cryptography in the 90s.

The Five Eyes (AUS CAN NZ UK US) have had access to practical, production quantum computer power since about 1995. Other groups may have had access since that era, but that's a moot point. I strongly suspect that both China and Russia later developed operational QCs along similar principles.

The QC approach that actually works, in a production-ready scale-able way, is to run a virtual Turing machine atop a winner-take-all-style teleportation/entanglement-based recurrent topological quantum neural network (QNN). Even a basic (multilayer) neural network is Turing Complete, because a NN can perfectly emulate an XOR gate, and multiple XOR gates can be used to construct a Turing machine. A quantum neural network can emulate a quantum Turing machine.

The underlying physical system for this type of QNN is interactions between non-abelian anyons in a two dimensional electron gas (2DEG). The primary math required is a branch of Knot Theory called Braid Theory. Obviously, the primary purpose of this system, from the Five Eyes/Echelon perspective, is to run Shor's algorithm to crack public/private key cryptography. A perusal of current known quantum algorithms, combined with a survey of current advanced AI applications, may suggest other uses.

___________


Not especially Weird Claim: There's a really nifty back story about how this new general technology was developed, and why it matters. It is worthy of a book by Neal Stephenson.

The subject of the 1985 Nobel Prize in Physics was the "quantum Hall effect", which opened up new avenues of research into quantum effects, esp. in two dimensional electron gases. The process of creating a working quantum neural network involved generating lots of anyons (soliton-type standing waves treated as particles) in a two dimensional electron gas and then exploring and measuring the results.

The cleverest aspect of inventing this new technology was to take this 'Anyon Soup' system to the edge of chaos, per the life work of Stuart Kauffman, and then exploit the emergent neural network to bootstrap itself into a more stable and usable system via evolutionary programming techniques. See Kauffman's publications for details on how and why this emergent neural network exists, and then consider it's environment to see why it is a quantum neural network. This author believes Stuart Kauffman is overdue for a Nobel Prize.

The original work inventing this new technology was done between 1990 and 1995. It would be hard to do this work methodically without stumbling on the previously unknown fractional quantum Hall effect. The discoverers of this effect were awarded the 1998 Nobel Prize in Physics, and now lead various Quantum Computing research institutes.

Someone, somewhere, is due to be awarded the Grand Prize Turing Award, for solving Turing's unfinished Morphogenesis problem, and then implementing Turing's original machine on the resulting artificially intelligent 'organism'. I'm inclined towards neither spiritualism nor whimsy, but were I so, then I might suspect that, after he died in 1954, Alan Turing reincarnated quickly, in 1965, in order to finish his incomplete life work. The classified nature of the work probably precludes any awards.

I'd really like it if this whole thing was declassified, but fear we'll have to wait many additional decades for that. This QNN is an excellent candidate to pursue adiabatic (reversible) quantum computing (AQC), might be helpful for certain approaches to advanced nanotechnology, and, were it declassified, might also be helpful to many other scientific ventures. Per the Ultra Secret, it's undoubtedly still considered 'national security', even if it's becoming an open secret within the Intelligence Community.

-- Energyscholar

Posted by: Energyscholar at March 13, 2012 2:44 PM