Mentor /Proxy neural coupling underlies successful communication during mind to mind interface
Verbal communication is a joint activity; however, speech production and comprehension have primarily been analyzed as independent processes within the boundaries of individual brains. Here, we applied fMRI to record brain activity from both speakers and listeners during natural verbal communication. We used the speaker's spatiotemporal brain activity to model listeners’ brain activity and found that the speaker's activity is spatially and temporally coupled with the listener's activity. This coupling vanishes when participants fail to communicate. Moreover, though on average the listener's brain activity mirrors the speaker's activity with a delay, we also find areas that exhibit predictive anticipatory responses. We connected the extent of neural coupling to a quantitative measure of story comprehension and find that the greater the anticipatory speaker–listener coupling*, the greater the understanding. We argue that the observed alignment of production- and comprehension-based processes serves as a mechanism by which brains convey information.-H.J Steppen-Proxy Cyber System Analyst The Proxy Cybernetic Systems and Artificial Intelligent Software
Proxy Cyber Systems integrates biotechnology hardware (nano scaled sensors) and artificial intelligence (AI) software seamlessly Proxy Cyber is built upon the cybernetic principles of self-organization as well as the psycho-
cybernetic principles of Neuronautic's Mind Modulation Techniques which take
an interdisciplinary approach to Heightened Reality and Enhanced "being-ness .
Proxy Cyber is built upon Principles not just variables.While there are many
choices available to a consumer who wants the benefits of Deep Learning and
Mentored Life Adjustment Only Proxy Cyber is Qualified and sanctioned to use the tools of Neuronautics ,which is
and always has been based on "self evolution"and not just
algorithm based "mind modification" systematics .Our spiritual based methods of Mentored
Assitance overcome some of the main disadvantages of Direct Neural
The experience of synthetic telepathy or“Artificial Telepathy” is really not that extraordinary. It’s as simple as receiving a cell-phone call in one’s head.Indeed, most of the technology involved is exactly identical to that of cell-phone technology. Satellites link the sender and the receiver. A computer “multiplexer” routes the voice signal of the sender through microwave towers to a very specifically defined location or cell. The “receiver” is located and tracked with pinpoint accuracy, to within a few feet of actual location. But the receiver is not a cell phone. It’s a human brain.
Out of nowhere, a voice suddenly blooms in the mind of the target. The human skull has no “firewall” and therefore cannot shut the voice out. The receiver can hear the sender’s verbal thoughts. The sender, in turn, can hear all of the target’s thoughts, exactly as if the target’s verbal thoughts had been spoken or broadcast. For this reason, the experience could be called “hearing voices” but is more properly described as “artificial telepathy”.
Now, if artificial telepathy were entirely voluntary, like a conversation between friends sitting across the room from one other, it might be kind of cool. One could talk back and forth with one’s friend, exchanging verbal thoughts exactly as if speaking on the phone, but without ever using one’s voice or mouth. It’s a completely silent, sub vocal form of speech. Between lovers, this would be beautiful
The problem is that artificial telepathy provides the perfect weapon for mental torture and information theft. It provides an extremely powerful means for exploiting, harassing, controlling, and raping the mind . It opens the window to a "virtual" possession of another person’s soul.
When used as a “nonlethal” weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protesters, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon.
Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. Embarrassing private moments cannot be hidden: they are subject to all manner of hurtful comments and remarks. Evidence can be collected for blackmail with tremendous ease: all the wrongs or moral lapses of one’s past are up for review.-Magnus Olsun...Targeted Individuals,Sweden