The Need For Neuro Rights … Rafael Yuste

Professor Rafael Yuste of Columbia University is the pioneer in promoting the concept of Neuro Rights. His address to the Indian audience in the Indian Data Protection Summit 2022 (IDPS 2022) is already available here .

Here is an article published in a journal.

 

Posted in Uncategorized | Leave a comment

Will Oculus promote Meta Verse or create a fear?

(Continued from the previous article)

In the previous article,  we discussed the Oculus and how it is reportedly been designed to cause damage to the human brain. The device is fortunately not yet out in the market and Mr Palmer Luckey no longer works in Meta. But he has how own company and could very well develop this VR set on his own.

While Mr Palmer boasts that he is “Fascinated” by the possibility of bringing the Meta Verse person closer to the real person, if it is to cause damage to the physical person, then the idea is sinister.

To many this is very scary …so scary that they would like to keep themselves away from any VR. Who knows that there is no hidden explosive charge inside which can be triggered by an event in a Meta Verse event?

While people like us may like to push for the laws to control such devices, the public may be also worried that since VRs may be used by many children, the device can be used to cyber hypnotize the users to reveal financial details of their parents or other secrets with which another criminal attack can be launched on the person.

We cannot wish away that this is only a speculation. If people ccoudl create games like the Blue Whale to make children commit suicide, they will definitely use the VR to exploit the immersive experience to Cyber hypnotize the subject and steal information leading to further crimes.

I am also anticipating that terrorists would use it to brainwash members from the public and motivate them for lone wolf attacks.

If we watch the above video and read some of the comments, it is clear that there are many who seem to enjoy this kind of a device. They may be commenting in jest but the possibility that some of them could become agents of a kingpin is plausible.

In view of the above, I trust that Government of India will immediately place all VR sets under a system of “Licensing” based on a critical evaluation of the hardware at code level. The Meta Verse sites that could interact with the users of this kind of advanced VR sets should also be monitored on a continuous basis to ensure that there are no deep web sites that cause an “Immersive” experience to create criminals prowling in the society.

Time to act now…. Address a communication to the Indian Government to take note of this danger.

Naavi

 

Posted in Uncategorized | Leave a comment

Oculus Proves the Immediate Need for Neuro Rights Protection

(PS: The device picture shown above is a conceptual replica. It was not actually built and Mr Palmer was perhaps terminated by Meta for other reasons and not for developing this lethal idea. But the danger of the concept seems plausible and could be built by others)

It is surprising how some criminal minds work. When I urged the need for Neuro Rights legislation in India during his speech at the IDPS 2022, the  existence  of  a concept like Oculus VR set with a possible Microwave blast  was not highlighted.  I only highlighted the developments of Neuro Technology such as Brain Implants and Brain Computer Interfaces that can be misused by the operators to unauthorizedly alter the human mind by manipulating the neuro data.

Mr Palmer Luckey who is identified as an “Entrepreneur” by the Wikipedia is associated with a potential invention of a VR set which can have an embedded Microwave bomb that gets triggered when the wearer is playing a video game and get killed. The Microwave blast would be directed at the brain of the head set wearer killing him in physical life.

Law makers need to seriously think if this technology development is not stopped right now, will it not be a facilitation of  plain “Murder” or “Abatement to suicide”?

If so, it is time to endorse the need for Neuro rights legislation in India now.

The basic requirement of law is

a) Recognize the form of “Neuro Data” as a kind of data coming under “Protected data” 

b) Recognize “Neuro privacy” as a kind of “Protected right”

c) Recognize “harm” due to neurological manipulations

c) Recognized a higher level of “Consent” called “Witnessed Consent” to protect Neuro right

The rest of the law related to penalties and punishments can be considered under other provisions of the data protection act as well as ITA 2000 and IPC as a “Contravention of law”.  The Oculus must me considered as a weapon of death and its inventor and distributor should be punishable under law including punishment of death for third degree murder or attempt thereof.

Considering the urgent need for legislative protection, apart from using other provisions under the “Gaming Control Notification” that the Government is considering, the law on Personal Data Protection, a draft of which is expected to be released anytime must include provisions of Neuro Rights Protection.

Some of the suggested provisions are as follows.

1.“Neuro Data” may be defined as- “Neuro data means the electromagnetic signals that are collected from or fed into the human brain by a Brain Computer Interface in binary form.”

2.“Neuro Privacy” may be defined as- “Neuro Privacy” means the choice of an individual to determine to what extent the individual may share his neuro space with others”

3.“Neurological harm”  may be defined as – Neurological manipulation which alters the ability of an individual to take autonomous decisions” should be added to the definition of harm to extend the “psychological manipulations”

4.“Witnessed Consent” may be defined as-  consent provided by a data principal which is witnessed by independent third parties who donot have conflicting interest in the processing of the personal data under circumstances that the data principal may not be reasonably expected to provide a free consent, and includes sharing of neuro data or sharing of personal data when the data principal is not in a medical condition to provide informed consent.”

I would urge readers to read the series of articles on the suggestions for the new data protection law available at here.

Readers  can  also  view  the  keynote  address  of  naavi  at   IDPS 2022 which is available below.

I request viewers to send their views on whether the time has come to bring Neuro Rights into the Indian law in the current “Draft Digital Personal Data Protection Bill” that the Government is now contemplating.

Please join your voice here so that when FDPPI submits its request to the Government to add these provisions into the draft, your voice will also be heard.

Naavi

Reference:

India Today article

Posted in Uncategorized | Leave a comment

This website can now be accessed easily on Mobile App

The contents of this website are now easily accessible on Google play store for Android phones. The link is below.

Naavi

Posted in Uncategorized | Leave a comment

IDPS 2022 of FDPPI discusses Neuro Rights Regulation

The Indian Data Protection Summit 2022 (IDPS 2022) of FDPPI (Foundation of Data protection Professionals in India) which was held between 11th and 13th November 2022 as a virtual conference launched a discussion on the need for Neuro Rights in India.

On Day 1 of the conference, Dr Rafeal Yuste, the Professor of Neuro Science in the University of Columbia addressed the conference and his speech is available below.

On Day 3, Naavi, Chairman of FDPPI made a brief introdcutory presentation the video of which is available below. (Will be posted shortly).

With this, the first steps in launching a discussion on Neurorights legislation in India has commenced  under FDPPI, which is a Not for profit organization located in Bangalore.

Any other organization interested in joining this movement may kindly contact Naavi, Founder of www.naavi.org and Chairman of FDPPI.

Naavi

Posted in Uncategorized | Leave a comment

Soundwaves may be the new tool of Brain activity manipulation

We have been discussing the need for Protection of Privacy Rights to be augmented to protection of Neuro Rights (The series of articles published in this site are also collated at www.neurorights.in).

So far the discussions have been related to the “Brain Computer interface” through electro magnetic radiation that would bring chemical changes in the brain cells leading to specified neuron activity.

The human brain is said to function with “Brain Waves” which are electro magnetic waves which function in a certain frequency range (or wave length range which is in inverse proportion to frequency) as below.

Externally there are radio waves, Cellular mobile waves and other frequency waves that we come across in the atmosphere. These waves are at a higher wavelength.

5G spectrum which we often hear are in the frequency range of 1GH to 6 GH. (One megahertz (MHz) equals 1,000,000 Hz. One gigahertz is equal to 1,000 megahertz (MHz) or 1,000,000,000 Hz or 10hertz. In wavelength terms, 1GH is approximately 0.299 metres).

We have heard that radiation from mobiles, mobile towers as well as microwave ovens do affect human brains.  Though human body system is tuned to receive certain signals and ignore certain signals the fact that “electro magnetic” is the nature of human brain activity and also the activity of other devices including computers.

The “Brain-Computer interfaces” involving electrodes fixed on top of human skull or chips inside the human skull have gone past animal experimental state and are in advanced state of adoption in our common life. Binaural beats used in music technology is an example on hand.

Current demand for Neuro Rights protection is based on the possibility of manipulation of human brain with implants and other external stimuli which are perceivable by human sensory organs.

Now a new requirement seems to be emerging with scientific developments which indicate the possibility of manipulation of human brain activity without implants and outside the human sensory organs. In other words certain waves which are not heard by our ears or seen by our eyes can be used to manipulate brain activity.

The Privacy concepts such as “Right of Free Choice”, “Expression through a written consent” etc loses meaning when some body can make a human think as per his wish. This is not in the realm of hypnotism or other known forms of psychology through external stimulation. This is a completely new method of intervention of human brain that escapes regulation in any of our known laws.

A serious thought is therefore required to discuss whether our proposed new data protection law should incorporate “Neuro Right Protection” . This will be a point of discussion that  may come up during the IDPS 2022.

In our suggestions we added “Neuro Privacy” as a category to be addressed by  this new law along with other three forms of privacy namely the Physical privacy (non interference in physical terms), Mental Privacy (Right to be mentally left alone) and Information privacy (Right to manage the use of personal information).

We defined neuro privacy as

(c) “Neuro Privacy” means the choice of an individual to determine to what extent the individual may share his neuro space with others

Perhaps for the purpose of the Act this would suffice. But when it comes to “Reasonable Security to Protect the Neuro Privacy” or “Neuro Privacy by default”, the rules need to address how the neuro intervention devices are regulated.

In one of the recent researches it is contended that “Micro waves” are being sent from drones in an US experimental site and the target population are experiencing mental harassment due to the experiment since they seem to be hearing things.  Patents are being claimed for “Microwave Voice to skull technology”.

This patent describes it as an

“invention relates to a hearing system for human beings in which high frequency electromagnetic energy is projected through the air to the head of a human being and the electromagnetic energy is modulated to create signals that can be discerned by the human being regardless of the hearing ability of the person.”

The patent applicant claims

” I have discovered that a pulsed signal on a radio frequency carrier of about 1,000 megahertz (1000 MHz) is effective in creating intelligible signals inside the head of a person if this electromagnetic (EM) energy is projected through the air to the head of the person”

Just as inputs to computer can be given in the form of key strokes or voice commands, in future, Brain-Computer interfaces may operate with sound waves instead of through  a remote computing device.

It is this sort of developments that need “Neuro Rights” to be defined now though we may need time on making rules to regulate the protection of Neuro Rights.

Psychiatrists seem to be ignoring the possibility of human brain activity manipulation through sound waves and dismissing the claims of some people in the alleged experimental area as a kind of neurosis.

Watch out for IDPS 2022 where we may take this discussion further… Provided there are speakers who can share their thoughts.

Naavi

Reference:

Posted in Uncategorized | Leave a comment

Difference between Psychology and Neurology

We often wonder whether Psychology and  Neurology are same. The differentiation is also relevant as we travel from Privacy Rights to Neuro Rights.

The Current Privacy laws have touched the protection of Psychological manipulation of an individual for recognizing infringement of Privacy rights. The Indian data protection law (PDPB2019/DPA2021), lists “psychological manipulation which impairs the autonomy of the individual” as 0ne of the harms that lead to infringement of Privacy Rights.

As distinguished from this “Psychological manipulation” there could be “Neurological Manipulation” which will be part of the protection of neuro rights. For this purpose it is essential to distinguish Psychology from Neurology.

Neurology is a branch of medicine and devotes its attention to assessment and treatment of diseases of the nervous system. When a computer system is connected to the nervous system in such a manner as to read the nerve signals that transmit between the human central nervous system and the human body parts such as the muscles and organs, and perhaps manipulate the signals, we are dealing with a possible infringement of neuro rights of a person.

On the other hand, Psychology is a scientific study of the mind, behaviour and emotions of a person. When a computer system or information is used to alter the behaviour of a person or his emotions, or decisions, we can say that his privacy is being infringed.

The behaviour of a person is a reflection of the activity of neurons in his body. Hence psychological infringement can be caused by neurological infringement. Hence the two concepts of “Psychological intervention” and “Neurological intervention” are related.

If we take the example of a “Optical illusion”, the illusion leads the human to perceive an object different from what it truly is. But what something “Truly” is may itself be an illusion of a large number of persons.

When doctors use “Anaesthesia” they are only cheating the neural system to believe that there is no pain or sensation. Hence that person/part of the person which is anaesthetised is unable to feel the heat, cold or pain though the object he touches may really hot as per the accepted standards. This is a neurological intervention.

On the other hand, if a person is “hypnotized” and through hypnotic suggestions is made to believe that the object is not hot or he does not feel the pain, he may actually donot recognize the heat or pain. In this case, the psychological manipulation is so strong that it induces the neurological changes which otherwise may directly be achieved by an anaesthesia.

This example shows that neurological changes can be brought in by psychological suggestions provided the suggestions are strong enough. This phenomenon has been proved in the “Hypnotic state” where the sub conscious mind of a person is being spoken to by the hypnotist.

In the normal conscious state, the human mind works under its legacy memory and the pre-programmed active nervous system and hence it will feel the heat or pain despite oral suggestions from others. Perhaps some of the “Cult Leaders” have the capability of hypnotic control on persons who appear to be fully awake and in such persons the belief system is strong enough to take them to a hypnotic trance if the cult leader speaks to them.

Thus we can conclude that psychological manipulations can be converted into neurological manipulations and vice versa.

When we try to regulate “Privacy Rights” therefore we need to understand that at the peripheral level, the regulations affect “Privacy” in the “Psychological Domain”. When we try to dive deeper, we come to the neurological domain and need to look at neuro rights.

To explain this two levels that separate the Privacy rights and Neuro Rights, we can take the example of  Data which exists in multiple states.

For example let us take identified personal data and anonymised personal data. One law may address identified personal data and another may address anonymised personal data. There is a layer of separation between identified personal data and anonymised personal data which is the anonymisation technology. If this technology is weak, we can say that there is no difference between anonymised data and identified data and privacy can be infringed if either of the data is available in wrong hands. In that case we need one law to take care of privacy infringement of both identified and anonymised data.

But if  technology is “reasonably” strong, it is possible to keep the two regulations separate.

Similar argument can be made on “Un encrypted and Encrypted Data”. If the encryption is strong, there can be one law for unencrypted law and another for Encrypted data”. Otherwise we need a common law.

When there is a reasonably strong security that separates one set of objects and the other and law is made differently with the confidence that conversion one set of object to the other is technically infeasible, then forced conversion should be considered as a “Malicious activity or a Crime”.

Indian data protection law has done this by a specific provision in PDPB 2019/DPA 2021 which criminalizes re-identification of de-identified information without authority. (also applies to de-anonymisation of anonymised data).

Similarly, when we consider a legal provision for Neuro rights different from Privacy Rights,  we need to place a strong barrier in between what is considered as the psychological domain and the Neurological domain.

This will be one of the biggest challenges in conceptualizing the Neuro Rights law and defining its applicability.

In the Data Protection laws, we define applicability from  “Presence of a processing company in a given jurisdiction” and “Data being collected from within the jurisdiction”  as well as “data related to doing business from a different country or profiling the persons in one country from another country”.

If we use this analogy, we can define psychological intervention in such a manner that it extends to direct or indirect neurological interventions or vice versa.

This is an area for debate by the law makers.

To summarize, here we have discussed the presence of two concepts namely “Psychology” and “Neurology” from the Personal data and Neuro data perspectives and how they may be inter related.

(Debate will continue…)

Naavi

 

Posted in Uncategorized | Leave a comment

Understanding Memory System in Human Brain and the “Thought Space”

(P.S: Naavi as a student of neuro rights is exploring parts of neuro science from the perspective of a Neuro data perspective. There could be errors and mis-conceptions in the information presented here. Request knowledgeable persons to point out mistakes and present different perspectives. The Objective of this site is to learn together. Pictures and information in this article have been sourced from Queensland Brain Institute and other sources…. Naavi)

In understanding the brain functions from the Neuro Rights perspective, we need to understand how neuro data is generated, stored and transmitted.

Neuro data generation is a electro chemical process like the functioning of a battery. Accordingly, neuro perceptions cause certain chemical changes that accumulate positive and negative electric charges in a neuro space which when exceeding a certain level triggers transmission of the signal from one neuron to another.

The “Memory” is a function where the brain retains certain information and is able to recall it later. The data input to the brain is from the sensory organizations. Data Output is mainly to the different motor organizations. If therefore there is a heat sensation, brain may instruct the relevant muscles to move the body away from the heat.

However human brain experiences some “Thoughts” which could be a recall from the memory storage which may not result in any motor functions and simply revolve inside the brain as thoughts.

There is therefore space inside the brain which store memory and maintain a temporary space for churning the memory until they are triggered into actionable instructions to the body parts.

Neuro scientists  have proved that different types of memory are stored in the human brain in different parts. Accordingly scientific names are allocated for different parts of the brain where memory is stored.

They are Hippocampus, Amygdala, Cerebellum, Basal ganglia, Neocortex and Prefrontal cortex.

The functions and purposes of each of these memory storage parts of the brain are different.

Explicit memory is stored in hippocamus, neocortex and amygdala. Implicit memory is stored in basal ganglia and cerebellum.

Prefrontal cortex plays a central role in cognitive control functions.

In order to understand the functions of the different memory storage parts of the brain, we need to categorize the memory  into different types.

At the first level we can segregate memory into “Short Term” and “Long Term”.  Short Term memory may exist for very short time like when you read your OTP on the SMS and then type it in another place.

Long Term memory is either “Explicit” or “Implicit”. What wee mean by “Explicit” memory is the “Episodic” memory which are out experiences of events that have been sensed by our sensory organizations in the past and the “Semantic” memory which are knowledge of the world acquired without specific self experience. Implicit memory includes the sub conscious. Part of the sub conscious memory is driving motor capabilities of different organs. Even our speech consists of memory of our lips and tongue to produce certain sounds. These are automatic replay of past learning. Some times there is a sub conscious association of different memory units and that is referred to as “Priming”. For example, in the Pavlov experiment, when the dog hears the sound of the bell, it salivates as an associated response because the association is stored in the memory.

These storage concepts still donot fully explain the “Thought Processing Area” of the brain where even a person under meditation will be churning his thoughts until a spark of actionable idea is generated and gets into the memory. In the dream state, this “Thought area” is active and after the person wakes up, except for the strongest of the strong dreams, rest of the dream memory is lost. This indicates that the dreams may occur in the temporary memory space.

Whether this temporary memory space itself may be considered as the “Thought Space” is a point to be debated. If “Thinking” is part of the “Cognitive function”, then the pre frontal cortex may be the space where the thoughts are processed.

The reason why we need to explore the “Thought Space” further is that like in a Computer where we have the data in storage and data in transmission, there is a “Data in processing” concept for which we need to find the equivalent in the human brain.

If we understand this concept, we may also be able to unravel some of the philosophical thoughts on what is “Buddhi” and “Viveka”.

“Intelligence” and “Consciousness” are also terms which need to be understood and related to both the modern neuro science concepts and the philosophical concepts.

(….Exploration to be continued)

Naavi

Posted in Uncategorized | Leave a comment

Fighting susceptibility for “Cyber Hypnotism” with Ulysses Contracts

PS: This article dated April 14, 2017 is reproduced from www.naavi.org

The recent Cyber fraud in Mumbai where an elderly (72 year old)  woman was duped to the extent of Rs 42 lakhs in a Nigerian Scam (Refer here) open up a discussion on how it that  seemingly intelligent people fall for this old trick of fraudsters. We often dismiss such frauds as a result of “Greed” where the victim wanted to get rich overnight and fell to a trap. It is true that some of the Nigerian frauds are induced by the greed of the victim. But there could be other reasons as well for which some people seem to get carried away by the various promises made by their online friend and behave as if they are “hypnotized”.

It is not only this case where there is no reason for a 72 year old lady with Rs 42 lakhs in her Bank account should feel greedy and lose her life time savings. There have been similar cases where elderly persons and young kids have fallen for the sweet talk of fraudsters on the facebook or chat apps.

In all these cases, if we look beyond the motive of greed, it appears that the victim was led to behave in a particular manner which appears irrational for many of us exactly in a manner a “hypnotized” person behaves with a post hypnotic suggestion.

We need to analyse these cases scientifically to understand if there exists a phenomenon of “Cyber Hypnotism” where a person can induce hypnosis through written words, implant suggestions and make the  subject behave differently under post hypnotic state.

Hypnosis itself is a very interesting phenomenon and this age old art perhaps is still not fully understood though there  could be several theories to explain the phenomenon.

One easy to understand explanation of hypnotism is that the human brain consists of a conscious part which we interact with the surroundings on a day to day basis but beneath this conscious part seems to exist a “Sub Conscious mind” which can come to the fore during a hypnotized state of mind.

This sub-conscious mind is a store house of every one of our experiences though it is not available for recall by our sensory organs and conscious memory.  In a way it is like our computer where files are stored in a “hidden” storage space and are not accessible by our operating systems and hence are invisible. But if we can use a suitable software to  “undelete a deleted file” or “discover the hidden files”, we may suddenly realize that there are many files which we ourselves have created and saved may be as earlier versions of currently used files and later on over written with other versions.

In the case of human mind, the storage space available is very large compared to what we normally use and hence the “Sub Conscious Memory” holds a very large volume of data that has a “Photographic memory recording” of every one of our past experiences through our sensory organs.

A hypnotist finds a way to put the conscious mind to sleep and awaken the subconscious mind to make the subject remember long forgotten experiences. A therapist uses this to discover reasons for unexplained attitudes and behavioural pattern of individuals and through hypnotic suggestions during the state of hypnosis alter the attitude and behaviour in the post hypnotic state even though the subject is no longer in a “trance”.

It is however a part of theory that the post hypnotic suggestions may be resisted by the subject if it goes against fundamental beliefs of the person and hence cannot be used to make the person do “Criminal Acts”. According to this theory, there are some basic beliefs which a person has got embedded in his mind which cannot be wished away even under the hypnotic state by the hypnotist. But if the hypnotist is clever and makes a person believe that a post hypnotic state is not actually against the basic tenets but in support of it, then the post hypntic state may work. This explains the growth of ISIS type of terrorism in the world and also some of the schizophrenic personalities built through self suggestions.

The post hypnotic suggestions which are harmful are like “Trojans” implanted in the minds of persons which lie low under normal circumstances but make the person behave differently when certain circumstances converge.

This is a state of mind that is created in some persons who exhibit the propensity to fall to the “Social Engineering” of  online fraudsters. As a society, we need to fight against not only such fraudsters but also the susceptible potential victims. It is like preventing the “Addiction” to undesirable habits.

Normally, the hypnotist induces a hypnotic state of mind in a willing subject by making him relax and then speaking to him in a relaxed state of mind, through spoken words the subject is made to slip gradually from a conscious state to a sub conscious state. In some cases it is as simple as telling the subject that “You are now completely relaxed….your eyes are feeling heavy…when I count 5 you will go into deep sleep…etc”. For many this appears like magic particularly when some suggestions are also implanted during this “Inducement stage” as to the subject partially waking up and working under a trance and also waking up completely to come out of the trance. For example when the subject opens his eyes and is still in a trance, a mere statement of “Sleep” may quickly take him back to hypnotic state while a suggestion that after a count down from 5, he will be wide awake brings him out of trance.

What we understand from this phenomenon is that there is a way to take a person from his conscious state to a subconscious state by talking through intelligently. There is no reason to think that this can only be done through spoken words, or through dangling a pendulum or darkening the surroundings etc. These are all methods to ensure that there are no distractions and similar effect is automatically present in the case of most lonely individuals working in the social media  I donot rule out the use of psychedelic images to induce hypnotic state of mind in some cases. Perhaps “Voice Messages” and “Video Messages” can also be used to induce Cyber hypnotism in the same way that hypnotists do in the physical world.

If a person is staring into the Computer monitor and is chatting for a period of time, he is so involved in the conversation that he could slip into a state of pre-hypnotic inducement. If the other person is considered trustworthy and he starts making some suggestions, the subject may start getting into a trance like state of mind letting himself to be “Cyber Hypnotized”. Some games including the “Secondlife.com” kind of situations may take the visitor into a fantasy world where there could be interactions with malicious characters who can “brainwash” the victims into a hypnotic state.  The rest follows as per the normal principle of hypnosis where the subject trusts the hypnotizer and executes his commands in the post hypnotic state later. This in the case of the Nigerian frauds could be going into the Bank and sending out payments or even sharing the Banking credentials online.

Now, how do we prevent our lonely elders and young kids from being so Cyber hypnotized?

The first step is to create a “Self Awareness” in an individual that he is susceptible to “hypnosis” through “Cyber talk”. When a person receives an SMS message ..”Are you feeling lonely? … Can we chat?, the lonely elder male or female should realize this is not a “Friendly therapist” talking to him but a potential fraudster. The best thing is not to test out of curiocity and avoid responding to such messages .

People should think of binding themselves with the “Ulysses Contracts” (Research on finding out what is Ulysses contract and how to use it to avoid irrational and impulsive decisions). The technique has been successfully used in the Finance world as well as Medical world to avoid irrational decisions by subjects. This works well for adults… in the present case the elderly people who feel lonely, who feel aggrieved that they have been neglected by the society and seek alternate remedies on the social media to find company. This is nothing different from being addicted to smoking, drinking or drugs though it is fashionable to say that I am old but I have active facebook profile with many many friends and likes.

We often think Kids are difficult to handle the same way like adults. But the same techniques that work on the adults may also work on those kids who are likely to fall prey to the online inducement of pedophiles or fraudsters since most of the time they also suffer from the psychological state of personal neglect and isolation from busy parents and feel that they are no longer kids and “Know all”. In this state of mind they behave with the confidence that they are adults mentally though they may not be so physically.

Hence, an awareness campaign on”Don’t get Cyber hypnotized” amongst the school kids can be the first step in combating this addiction.

Second precaution that people should adopt is to break away from the computer or mobile screen from time to time to ensure that they are not in a trance. This could be also good for the eyes of the Computer user.

Can this be done with an App that is an add on to social media that “Pops out” at periodical intervals to interrupt a computer user on Facebook or Twitter or other social media to talk to the user and wake him up from a half hypnotic state if he has slipped himself into?.

Yes, this could be annoying for serious Computer users but I am suggesting this only when a person is on social media.

In fact advertisers may grin and be happy with my suggestion that their annoying pop up full screen ads also have a positive purpose!

Probably the Fitness Bands of tomorrow should be programmed to throw up such ads just the way some Car manufacturers are thinking of waking up persons who tend to sleep while driving.

Beyond these three measures of….

“Creating Awareness on Cyber hypnotism”,

“Motivating people to adopt Ulysses Contracts to avoid irrational cyber induced decisions” and

“Forced breaks with pop up ads with relevant reminder messages”,

the need to make these vulnerable sections of the society feel that they are not alone and are wanted by their family members and friends in the real society is also essential.

This is the toughest part in our society since every youngster feels that he is too busy with his work and hence has no time for socialization with his elders or kids at home.

Hopefully we start thinking in this direction and each one of us may find our own solution that helps to combat malicious use of  “Cyber Hypnotism”.

Naavi

[P.S: Author has been an interested student of hypnotism since 1971 and also holds a basic level certificate in hypnotism…. just for knowledge enhancement and not for practice.]

Posted in Uncategorized | Leave a comment

Dark Patterns in E Commerce

While we discuss the need for Neuro Rights Protection, and recognize the need when there is a direct intervention of an external computer system to the  human nervous systems, the current laws of privacy do throw open certain concerns where the human behaviour is unfairly (or without proper transparency) manipulated by the use of technology by E Commerce entities.

The marketing activities which are guided by the AIDAS principle (Awareness, Interest Desire, Availability  and Satisfaction) start with “Market Segmentation” which is segregation of potential customers based on their profiling in terms of identifying an effective communication channel for the marketing messages. The actual marketing messages conveyed either through mass advertising or targeted communication or PR are designed to exploit the knowledge of the profiling of the audience and sending them appropriate messages.

We may go to any length to criticise the Cambridge  Analytica issue but in the end the  problem is political that Cambridge Analytica helped Donald Trump to win. The criticisms are not sustainable on the principles of marketing that has been practiced for decades and involve, profiling of audience through market research, segmenting them based on filtering of the profiling and designing the right communication for each segment to achieve the desired communication goal.

Now researchers have also been working on what they call “Dark Patterns” where the activities of multiple digital platforms are aggregated to arrive at the required profiling and communication effectiveness.

Privacy Activists may live in deniability, may criticise the unfairness of say India Today, NDTV, or ESPN Crickinfo  which manipulated the image of the Chess prodigy Pragyaananda to remove the vibhuti on his forehead so that he does not look a Hindu.

(P.S: It is said that Mr Pragyaananda always presents himself with the Vibhuti mark as is evidenced by his many other photos and hence the one published by some media vehicles is suspected to have been manipulated).

But it  is a fact that Internet uses profiling, modification of facts to a great extent to achieve their marketing goals.

What we are also observing now are the “Dark Patterns” which are design interfaces or features that subtly manipulate people in making sub optimal decisions. In fact the marketing managers are paid only to increase the marketing effectiveness under the given genuine product benefits.

I refer to a research article published recently on Cambridge.org which discusses the phenomenon of “Dark Patterns” where multiple internet communication points collaborate to make the user change his purchasing desire.

Limited-quantity scarcity messages and others like these (e.g., countdown timer, confirmshaming, hidden subscriptions, etc.) are common ‘dark patterns’ found on online retail stores, generally with the goal to induce impulse buying.

Coined by Brignull (Reference Brignull2010), dark patterns are subtle design features embedded in websites that prey on human psychology to steer consumers into making decisions that, if fully informed or under optimal conditions, they might not make.

From a behavioral science perspective, dark patterns are designed to prompt consumers to evoke System 1 thinking rather than a more deliberate and thoughtful System 2 thinking by exploiting cognitive biases like scarcity bias or social proof (Stanovich & West, Reference Stanovich and West2000; Kahneman, Reference Kahneman2011). Central to the motivation as to why online vendors incorporate dark patterns is the attendant impact on impulse buying.

There is a similarity between these techniques and many devices used in Meta Verse. Take for example a simple device like a coloured glass we wear to cheat our eyes of the perception of colours. This is an external device that manipulates the human system and is actually a neuro technology of one kind which is already present within us.

Do our current laws handle such devices and their impact?… is a question we need to ask ourselves.

Coming to the world closer to neuro science, let us look at “Anaesthesia”  which is a system that numbs the nerves either at a local part of the body or in General. Is it a “Neuro Intervention Technique”? and is it covered under the current laws?…. is another question we need to ask ourselves.

These questions indicate that the developments of Neuro rights is a seamless extension of the current privacy concerns though we speak as if it is different.

Probably Neuro Rights has many more nuances to be dealt with and it would be better to consider it as a separate law but it cannot be denied that the principles of neuro rights are already embedded  in the current privacy laws.

We have a similar situation today where Information Technology Act 2000/8 already has provisions which in principle address the Privacy concerns but we still argue that without a separate law on privacy, there is no legal protection. It was strange that the honourable Supreme Court which gave its judgement in the K S Puttaswamy case did not even make a reference that there are laws such as Information Technology Act 2000/8 which perhaps is inadequate and need to be fortified with a new law. Even the Justice Srikrishna Committee did not give a suitable recognition that there already exists a law on privacy in India which may be inadequate and need re-inforcement.

Similarly, most of the professionals would fail to recognize that DPA 2021 has many provisions which can be conveniently extended to protection of Neuro rights though some conceptional clarity may be provided by a separate law taking cognizance of the interplay of neuro science, philosophy with technology and law while discussing Neuro rights.

Let us explore this further in our journey..

Naavi

 

 

Posted in Uncategorized | Leave a comment