Monthly Archives: November 2024

China Moves against Taiwan: Using AI Simulation and Mind Genomics Thinking to Explore an International Conflict

DOI: 10.31038/ALE.2024122

Abstract

This paper is part of a series of papers using generative AI to simulate issues of current importance in the world of nations and their interactions. Through AI and the Mind Genomics platform, BimiLeap.com, one can explore different facets of a situation. The study here on the potential move of China on Taiwan explores the topic from five viewpoints, each simulated by AI, and the entire processing taking less than 24 hours, and at low cost. Phase 1 deals with reconstructing the recent past through simulated interviews with government officials. Phase 2 deals with the mind-sets of the Chinese people regarding Taiwan. Phase 3 projects the future history of the conflict by positioning the simulation in 2030 and simulating one’s recall of events six years before when the conflict between China and Taiwan took place. Phase 4 simulates a congressional hearing to explore the conflict. Phase 5 presents five simulations of what one must do to avoid the problem. The five phases provide an easy-to-understand briefing document, designed to capture the “human face” of the conflict, and involve the reader in critical thinking about issues and solutions.

Keywords

China-Taiwan conflict, Generative AI, Geopolitical issues, International conflict, Mind Genomics

Introduction

The relationship between China and Taiwan has been a contentious issue for decades, with China viewing Taiwan as a rogue province and Taiwan viewing itself as a sovereign state. The conflict has roots in the Chinese Civil War, where the defeated Nationalist Party retreated to Taiwan, establishing a separate government. Despite growing trade and cultural exchanges, political tensions have not fully dissolved. In 2024, tensions are at extreme levels, with China’s President Xi Jinping making increasingly threatening statements about Taiwan’s autonomy. The Chinese people view this as a rightful step to ensure China’s global standing. On the other hand, Taiwan’s President Tsai Ing-wen faces immense pressure from both citizens and international allies. The U.S. and other international allies have played a central role in maintaining peace in the region, but the stakes have never been higher. Intensifying espionage and propaganda efforts have driven public sentiment further to extremes, with Chinese media portraying Taiwan as dangerously rebellious and Taiwanese media portraying China as an oppressive neighbor. The future hinges on how long Taiwan can hold out and what the international community is willing to do in its defense [1-3].

Phase 1 — Reconstructing the Past Through Simulated Interviews

Simulating history through imaginary interviews offers profound insights beyond mere facts, allowing for a deeper understanding of the intentions, motivations, tensions, and decisions that might have been obscured in official records or documents. This mode of exploration fosters empathy, deeper understanding of complexities, and a recognition that history is more than a collection of dates and events; it is a narrative shaped by the thoughts, emotions, and actions of individuals and institutions. By placing oneself in the shoes of both the interviewer and the interviewee, one can ask pointed questions that reflect contemporary concerns and imagine the answers through the lens of the individuals involved, reconstructing not just their public- facing personas but their personal doubts, ambitions, and limitations. This exercise in empathy allows for a deeper understanding of the uncertainty and messiness of decisions that might seem inevitable or preventable with the benefit of hindsight [4-6].

Simulated interviews also help to test assumptions, uncovering underlying ideologies, competing narratives, and significant ideological blind spots that governed behavior and choices. They also model a different type of dialogue, allowing for a better understanding of the role of personality and individual agency in history. This approach instills analytical rigor and creative empathy, skills crucial for any student of history. Table 1 shows the instructions to the AI to synthesize the interviews with ten government officials.

Table 1: Simulated interviews about the China-Taiwan situation with 10 government officials.

Phase 2 — Mind-Sets of China Regarding Taiwan

Mind Genomics is an emerging science which identifies different “mind-sets” based on cognitive patterns, preferences, and biases. It suggests that people respond to the same issue in different but predictable ways, not because they are irrational or misinformed. This concept can be applied to geopolitical issues like the China-Taiwan conflict, helping to deconstruct varying viewpoints in China regarding Taiwan’s status and potential actions. Within China, multiple mind- sets exist regarding Taiwan, including nationalistic, historical, economic, and strategic perspectives. Understanding these different mind-sets can help decision-makers craft targeted policies to appeal to specific segments of the population, preventing oversimplification of the complex issue of the China-Taiwan conflict.

Table 2 shows the three mind-sets synthesized by AI. China’s mind- sets regarding Taiwan are influenced by its historical conception of sovereignty and territorial integrity, as well as its long-standing belief in a unified China dating back to imperial dynasties. The Chinese government views Taiwan as an integral yet temporarily estranged part of the modern Chinese nation-state, with the Taiwan question seen as a symptom of a larger historical trajectory. The Chinese leadership is aware of the political repercussions of losing Taiwan, and any deviation could weaken the Chinese Communist Party’s (CCP) grip on the narrative. Taiwan’s strategic role in global geopolitical dynamics, particularly its dominance in advanced semiconductor production, further influences Beijing’s approach. China’s approach to Taiwan is long-term, with strategic patience informed by the Confucian principle that “time will solve all problems.” However, the international context is not overlooked, with Taiwan’s close ties to the United States, alliances with Japan, and its pivotal role in the Indo- Pacific strategy. The prevailing mind-set of the Taiwanese people, who overwhelmingly prefer maintaining the current status quo, conflicts with Beijing’s strategy of eventual reunification. Understanding China’s mind-set can help navigate its decision-making processes and understand its complex emotions and motivations [7-9].

Table 2: Mind-sets of China Regarding Taiwan.

Phase 3 — Looking Forward by Looking Backwards: The Experts Recall What Happened Six Years Ago

Edward Bellamy’s novel “Looking Backward” offers a unique approach to understanding the future by imagining it as if it has already occurred. By placing the reader in the year 2000, looking back at the societal transformations that fixed the problems of 1887, Bellamy provides a structured way of imagining possible trajectories and assessing the decisions that lead to certain outcomes. This technique can be applied to the fraught situation between China and Taiwan, as it allows for better analysis and prevention of repeating mistakes.

Bellamy’s method enhances our ability to learn by structuring our critical analysis, allowing us to mentally walk backward and identify key events or errors that determined the future. The immediacy of the China-Taiwan conflict is complicated by militaristic, economic, and geopolitical uncertainties, but by mentally projecting Taiwan as having already been annexed or successfully defended its sovereignty, the outcome can only be understood and studied.

Storytelling is another aspect of “looking backward,” making complex international relations more graspable for everyone involved in the process. By offering a blueprint in the form of an already- imagined outcome, Bellamy effectively shifts the reader toward structured speculation.

Looking backward frames today’s decisions with the weight of historical responsibility while maintaining the speculative flexibility the future demands. By using Bellamy’s method creatively, we may better navigate the tense and dangerous waters of contemporary geopolitics [10-13].

Table 3 presents us the results of ten interviews with individuals who were simulated to be conversant with the issues, and who had opinions about what could have been done better. The approach follows Edward Bellamy’s approach of telling the story of a moderately recent past to foretell the future in a way which is palatable and interesting.

Table 3: Ten interviews about the Chinese move on Taiwan which occurred five years before.

Phase 4 — Questions and Answers at the Congressional Hearing

Simulating a congressional hearing with unnamed professionals recounting their memories of an event like a Chinese move on Taiwan can be an educational and thought-provoking exercise. It allows readers to explore complex foreign-policy issues within a structured context, encouraging critical thinking, engagement with hypothetical expertise, and scenario analysis. This method focuses on roles and expertise rather than individuals, allowing readers to consider the processes and systems that underpin decisions. Table 4 presents the simulated congressional hearing.

Table 4: Simulated questions and answers at a congressional hearing about the Chinese move on Taiwan.

Simulating a congressional hearing can also deepen understanding of contemporary geopolitics and history by placing students in hypothetical situations where they need to apply historical knowledge, critical analysis, and strategic thinking. It also trains students and participants to ask better questions, identifying gaps in knowledge and anticipating the need for further information.

The interdisciplinary nature of the simulation allows readers to understand how disciplines interact in policy decisions, highlighting the union of various domains of expertise in resolving international conflicts. While some may enjoy the freedom of working within fictive or simulated environments, others may find the exercise challenging due to the added responsibility of dealing with a complex situation that has not “actually” happened but could happen in the future.

Ultimately, employing simulations in history and policy classes can nurture analytical skills, leadership potential, and decision-making acumen. A hearing simulation on an event like a Chinese move on Taiwan helps attendees and readers practice working with complex, nuanced issues, serving as an effective preparatory exercise for those who may enter fields in government, law, international relations, or academia where nuanced and critical decisions will be valued [14-16].

Phase 5 — Five “Faces of Prevention”

In times of uncertainty, questions play a crucial role in national security, foreign policy, and crisis management. The unpredictability of information and insights can create tension when different answers create more ambiguity. Consultations from experts from the cabinet and Pentagon bring varied experiences, fields of study, and specializations to the table. Receiving different answers does not necessarily signify the system is failing or confused, but it highlights the reality of complexity and the necessity of pulling from diverse perspectives [17-19].

Repetition of questions can signal attention to the critical nature of the issue, revealing nuances in arguments, gaps in logic, or overlooked information. Inconsistency in responses may give a broader, more comprehensive understanding of the nuances faced, prompting deeper thinking. Table 5 shows four different answers to the same question: What steps should be taken to prevent similar acts of aggression in the future?

Table 5: Five answers to the same question: What steps should be taken to prevent similar acts of aggression in the future?

Discussion and Conclusion

China’s intentions and potential military actions towards Taiwan are a major concern for national security and policymakers worldwide. AI-enabled simulations have been used to study and predict China’s strategies, including triggers, diplomatic channels, military postures, and deterrence scenarios. These simulations provide quicker, more adaptable analyses of complex geopolitical scenarios, allowing policymakers to run multiple “what-if” scenarios that take into account economic pressures, diplomatic relationships, and military movements. However, concerns about overemphasis on AI-based simulations exist, as they may not fully grasp cultural, historical, and deeply embedded political factors. To ensure AI does not dominate the decision-making process, traditional simulation techniques, field experience, and diplomatic insight should be used alongside AI- based simulations. Simulation exercises can help decision-makers better prepare for potential real-world conflicts without endangering national security or international stability.

Acknowledgments

The authors delightedly acknowledge the ongoing help of Vanessa Marie B. Arcenas and Isabelle Porat in the preparation of this manuscript and its companions.

References

  1. Amonson K, Egli D (2023) The Ambitious Dragon: Beijing’s Calculus for Invading Taiwan by Journal of Indo-Pacific Affairs 6: 37-53.
  2. Roy D (2000) Tensions in the Taiwan Survival 42: 76-96.
  3. Wang TY (2023) Taiwan in 2022: An Eventful Asian Survey 63: 247-257.
  4. Albores P, Shaw D (2008) Government preparedness: Using simulation to prepare for a terrorist Computers & Operations Research 35: 1924-1943.
  5. Borning A, Friedman B, Davis J, Lin P (2005) Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-Scale Urban In: Proceedings of the Ninth European Conference on Computer-Supported Cooperative Work 449-468.
  6. DiCicco JM (2014) National Security Council: Simulating Decision-making Dilemmas in Real International Studies Perspectives 15: 438-458.
  7. Dweck CS, Yeager DS (2019) Mindsets: A View From Two Eras. Perspectives on Psychological Science 14: 481-496.
  8. Moskowitz H, Kover A, Papajorgji P (2022) Applying Mind Genomics to Social IGI Global.
  9. Wu AX (2014) Ideological polarization over a China-as-superpower mind-set: An exploratory charting of belief systems among Chinese internet users, 2008-2011. International Journal of Communication 8: 2650-2679.
  10. Berridge V (2016) History and the future: Looking back to look forward? International Journal of Drug Policy 37: 117-121.
  11. Franklin JH (1938) Edward Bellamy and the Nationalist The New England Quarterly 11: 739-772.
  12. Levi AW (1945) Edward Bellamy: Ethics 55: 131-144.
  13. Zhang P (2015) The IS History Initiative: Looking Forward by Looking Communications of the Association for Information Systems 36: 477-514.
  14. Kahn MA, Perez KM (2009) The Game of Politics Simulation: An Exploratory Journal of Political Science Education 5: 332-349.
  15. Mariani M, Glenn BJ (2014). Simulations Build Efficacy: Empirical Results from a Four-Week Congressional Journal of Political Science Education 10: 284- 301.
  16. Rinfret SR, Pautz MC (2015) Understanding Public Policy Making through the Work of Committees: Utilizing a Student-Led Congressional Hearing Simulation. Journal of Political Science Education 11: 442-454.
  17. Hart P (2002) Preparing Policy Makers for Crisis Management: The Role of Journal of Contingencies and Crisis Management 5: 207-215.
  18. Hetu SN, Gupta S, Vu VA, Tan G (2018) A simulation framework for crisis management: Design and Simulation Modelling Practice and Theory 85: 15-32.
  19. Rosenthal U, Pijnenburg B (eds) (1991) Crisis Management and Decision Making: Simulation Oriented Scenarios. Springer Science & Business Media.

Anticipating and Countering Foreign Malign Influence Such as Disinformation and Propaganda: The Contribution of AI Coupled with Mind Genomics Thinking

DOI: 10.31038/ALE.2024121

Abstract

This paper presents a new approach to understand FMI (foreign malign influences) such as disinformation and propaganda. The paper shows how to combine AI with the emerging science of Mind Genomics to put a “human face” on FMI, and through simulation suggest how to counter FMI efforts. The simulations comprise five phases. Phase 1 simulates a series of interviews from people about FMI and their suggestions about how to counter the effects of FMI. Phase 2 simulates questions and answers about FMI, as well as what to expect six months out, and FMI counterattacks. Phase 3 uses Mind Genomics thinking to suggest three mind-sets of people exposed to FMI. Phase 4 simulates being privy to a strategy meeting of the enemy. Phase 5 presents a simulation of a briefing document about FMI, based upon the synthesis of dozens of AI-generated questions and answers. The entire approach presented in the paper can be done in less than 24 hours, using the Mind Genomics platform, BimiLeap.com, with the embedded AI (ChatGPT 3.5) doing several levels of analysis, and with the output rewritten and summarized by AI (QuillBot). The result is a scalable, affordable system, which creates a database which can become part of the standard defense effort.

Keywords

AI simulations, Disinformation, Mind genomics, Foreign malign influences

Introduction: The Age of Information Meets the Agents of Malfeasance

Information warfare is a powerful tool for adversarial governments and non-state actors—with propaganda, fake news, and social media manipulation being key strategies to undermine democracies, particularly the United States. Foreign actors like Russia and China exploit socio-political divides to spread fake news, amplifying racial tensions and cultural clashes. The U.S. government is increasingly concerned about disinformation and propaganda efforts from foreign adversaries, with agencies like the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warning about evolving tactics. The private sector, particularly social media companies, has a key role in countering propaganda but has been criticized for being insufficient. To combat these threats, the U.S. government, social media companies, and civil society organizations need to collaborate effectively, using innovative techniques to detect and counter malign influences without infringing on civil liberties [1-4].

The war on disinformation continues apace. Sustained efforts are evermore vital to preserve the integrity of democratic systems. Malign influences do their evil work through their deliberate use of deceptive or manipulative tactics. The actors may be state or non-state actors, who spread false information, distort public perception, or undermine trust in democratic institutions. Traditional media plays one of two roles, or sometimes both roles. Traditional media either amplifies misinformation by reporting unverified stories or counteracts it by adhering to journalistic standards of fact-checking and verification. The outcome is a tightrope, balancing act, one part being freedom of expression, the other being the structural harm from the willy-nilly acceptance of potentially injurious information. Balancing freedom of expression with the need to protect citizens from harmful deceit can be difficult [5-7].

Strategies currently in use include increased investment in fact- checking initiatives, creating algorithms to detect fake accounts and bots, public awareness campaigns about media literacy, and stricter regulations about political ad funding, respectively. Nonetheless, it is inevitable that challenges remain in detecting and removing disinformation, clearly in part due to the avalanche effect, the sheer volume of content and evolving tactics. Fact-checking can help reduce the spread of false stories, but it is often limited by reach, speed, and the willingness of individuals to believe corrections. Artificial intelligence may identify patterns in disinformation campaigns, flagging suspicious accounts or content, but may struggle to distinguish among opinion, satire, and deliberately harmful misinformation [2,8].

Misinformation can erode trust in traditional media by making it difficult for the public to discern what is true and what is propaganda. Broad laws targeting online speech often raise concerns about censorship and the infringement of free speech. Media literacy programs give people the tools to critically evaluate sources and identify fake news, but they require widespread implementation and can be hindered by existing biases [9-11].

This paper moves the investigation of malign influences such as fake news into the direction of the analysis of the everyday. The paper attempts to put a human face on malign influences by using AI to simulate interactions with people, with questions that people might ask, and with ways that people deal with information sent out by “actors” inimical to the United States. The paper presents AI “exercises” using the Mind Genomics platform, BimiLeap.com.

Phase 1: Putting a Human Face on the Topic Through Snippets of Stories with Recommendations

The psychological principle of presenting a “human face” to issues like foreign malign influences (FMI) resonates with people as they are naturally driven by stories. Simulating interviews with individuals recounting personal struggles with misinformation injects warmth, vulnerability, and relatability, making it easier to feel empathy [12-14]. Building trust and emotional connection is essential in addressing the erosion of trust in media, government, and social institutions. To this end, Table 1 presents 22 short, simulated interviews with ordinary people, as well as the recommendation that they make.

Table 1: AI simulated snippets of interviews and recommendations about FMI (foreign malign influences).

Phase 2: Simulating Advice

AI can be used to generate specific questions and detailed, actionable answers to counter foreign malign influences (FMI). This approach allows for quick identification of common points of intrusion or manipulation by foreign actors, providing an organized strategy to address key vulnerabilities. AI-driven directives prioritize immediate actions, enabling individuals or institutions to respond swiftly to rapid information warfare. AI’s ability to flesh out complex situations while accounting for multiple variables allows it to present tangible alternatives and outcomes with ease through simulation, providing a “what if ” perspective. This actionable level of detail bridges the gap between theory and practice, making recommendations feel natural and embedded in the broader scenario being played out in real-time simulation. The iterative nature of AI allows for constant feedback and improvement, making it better suited to the evolving circumstances of FMIs. AI’s role also provides clarity and simplicity, making it suitable to create directives for targeted messaging campaigns, media outlets, and the general public [15-17].

Table 2 shows questions and answers based on a simple AI “understanding” of the topic, along with additional analyses such as predictions of what might happen six months out, and FMI’s counterstrategy. Information presented in this manner may produce more compelling reading, and a greater likelihood that the issues of FMI end up recognized and then thwarted.

Table 2: Questions, answers, strategies and counterstrategies for FMI efforts.

Phase 3: Mind-sets of People in the United States Exposed to FMI

Mind-sets are stable ways individuals react to stimuli or situations which are shaped by cognitive processes, personal experiences, emotional predispositions, and sociocultural factors [18-21]. AI- generated mind-sets can be crucial for understanding how different people process misleading material, such as the topic of this paper, Foreign Malign Influence (FMI). Machine learning algorithms use clustering methods, unsupervised learning, and statistical analysis to generate or simulate these mind-sets. By feeding AI real-world data, AI can identify distinct groups of people who respond to information in specific ways. This enables predictions on how these groups will behave when confronted with different types of foreign malign influence, making interventions more effective. Table 3 shows the simulation of three mind-sets of individuals responding to FMI information.

Table 3: AI simulation of three mind-sets, created on the basis of how they respond to misinformation presented by the FMI.

Exploring mind-sets in the context of FMI provides insights into social resilience and helps design better defense mechanisms against misinformation. Educational platforms can teach people how to recognize manipulation techniques based on their underlying mind-set. Furthermore, governments, social media companies, and other stakeholders can measure the effectiveness of counter- disinformation campaigns by targeting specific mind-sets and adjusting their message based on real-time feedback or simulation predictions from AI.

Phase 4: Predicting the Future by Looking Backwards

The “Looking Backwards” strategy is an innovative method for predicting trends and outcomes, inspired by Edward Bellamy’s “Looking Backwards” process. By mentally placing ourselves in 2030 and reviewing the events of 2024, we can distance ourselves from innate biases, misinformation, anxieties, and uncertainties of the present moment. This mental distance allows for clearer, more holistic insights into the trajectory of ongoing issues, such as foreign malign influences attempting to flood the U.S. with disinformation. Table 4 shows the AI simulation of looking backward from 2030.

Table 4: Predicting the future by looking backward at 2024 from 2030 to see what was done.

By looking back at 2024 from 2030, we can better assess the societal, political, and psychological ramifications of foreign influence operations, especially disinformation campaigns. By identifying the steps taken today that resulted in negative or positive outcomes by 2030, we might adjust our efforts now, fortifying our democratic resilience against foreign ideologies seeking to undermine our stability. This approach also holds potential when shared with the public, as it can help improve resilience and empower the democratic system to remain agile [22-26].

Phase 5: Creating a Briefing Document — Instructing the AI Both to Ask 60 Questions and Then to Summarize Them

In this step AI was instructed to create 60 questions, and provide substantive, detailed answers to each. The questions focused on various aspects regarding the impact of foreign disinformation on public opinion, civic engagement, and stability. These responses were then condensed into a more digestible briefing using summarizing tools like QuillBot [27-29]. This process allows for the inclusion of ideas and hypotheses that might not be immediately apparent to human analysts due to cognitive biases or blind spots [30,31] (Table 5).

Table 5: A simulated “set of five questions briefing document” about FMI, based upon the AI-generated set of 60 questions and answers, followed by an AI summarization of the results.

In the short term, AI-generated answers are objective and free from emotional bias, allowing analysts to base their next moves on data-driven insights. In the long term, AI technologies can be used for long-term planning and resilience strategies, allowing for rapid adjustment to evolving situations and trend recognition. This AI- driven approach also contributes to international cooperation against FMI, fostering a united front against foreign disinformation.

Discussion and Conclusions

The paper shows how the team developed a system using artificial intelligence, Mind Genomics, and real-time simulation capabilities to identify, counteract, and neutralize foreign malign influences (FMI). The system aims to understand the psychological and tactical mechanisms driving disinformation campaigns, and in turn generate strategic responses to reduce their efficacy.

AI simulations mimic real-world strategic meetings, interpersonal interviews, and situational dynamics, revealing the “human face” of the enemy and transforming large volumes of data into actionable intelligence. Mind Genomics thinking creates mind-sets, allowing for the identification of different tactics employed by adversaries. This allows mapping of a psychological landscape, understanding which messages take root and which defensive strategies resonate best with different audience segments. Real-time insights are crucial for adjusting countermeasures in sync with the adversary’s shifting methods.

The system has potential to influence public perception and bolster civic resilience by simulating the actions of enemy actors and the reactions of different segments of society. It could enable preemptive action, enabling policymakers and national security analysts to deploy specific public information campaigns or strategic maneuvers based on projections. The system’s broader geopolitical implications extend beyond national borders, creating a cooperative defense mechanism against foreign powers which exploit misinformation to sow international discord.

Acknowledgments

The authors gratefully acknowledge the ongoing help of Vanessa Marie B. Arcenas and Isabelle Porat in the creation of this and companion papers.

References

  1. O’Connell E (2022) Navigating the Internet’s Information Cesspool, Fake News and What to Do About University of the Pacific Law Review 53(2): 252-269.
  2. Schafer JH (2020) International Information Power and Foreign Malign Influence in In: International Conference on Cyber Warfare and Security; Academic Conferences International Limited.
  3. Weintraub EL, Valdivia CA (2020) Strike and Share: Combatting Foreign Influence Campaigns on Social The Ohio State Technology Law Journal 702-721.
  4. Wood AK (2020) Facilitating Accountability for Online Political The Ohio State Technology Law Journal 521-557.
  5. Rasler K, Thompson WR (2007) Malign autocracies and major power warfare: Evil, tragedy, and international relations theory. Security Studies 10(3): 46-79.
  6. Thompson W (2020) Malign Versus Benign In: Thompson WR (ed.), Power Concentration in World Politics: The Political Economy of Systemic Leadership, Growth, and Conflict. Springer pp. 117-142.
  7. Tromblay DE (2018) Congress and Counterintelligence: Legislative Vulnerability to Foreign Influences. International Journal of Intelligence and Counterintelligence 31(3): 433-450.
  8. Lehmkuhl JS (2024) Countering China’s Malign Influence in Southeast Asia: A Revised Strategy for the United Journal of Indo-Pacific Affairs 7(3): 139.
  9. Bennett WL, Livingston S (2018) The disinformation order: Disruptive communication and the decline of democratic institutions. European Journal of Communication 33(2): 122-139.
  10. Bennett WL, Lawrence RG, Livingston S (2008) When the Press Fails: Political Power and the News Media from Iraq to University of Chicago Press.
  11. Wagnsson C, Hellman M, Hoyle A (2024) Securitising information in European borders: how can democracies balance openness with curtailing Russian malign information influence? European Security 1-21.
  12. Feuston JL, Brubaker JR (2021) Putting Tools in Their Place: The Role of Time and Perspective in Human-AI Collaboration for Qualitative Proceedings of the ACM on Human-Computer Interaction 5(CSCW2): 1-25.
  13. Jiang JA, Wade K, Fiesler C, Brubaker JR (2021) Supporting Serendipity: Opportunities and Challenges for Human-AI Collaboration in Qualitative In: Proceedings of the ACM on Human-Computer Interaction 5(CSCW1): 1-23.
  14. Rafner J, Gajdacz M, Kragh G, Hjorth A, et al. (2022) Mapping Citizen Science through the Lens of Human-Centered AI. Human Computation 9(1): 66-95.
  15. Aswad EM (2020) In a World of “Fake News,” What’s a Social Media Platform to Do? Utah Law Review 2020(4): 1009.
  16. Garon JM (2022) When AI Goes to War: Corporate Accountability for Virtual Mass Disinformation, Algorithmic Atrocities, and Synthetic Propaganda. Northern Kentucky Law Review 49(2): 181-234.
  17. Hartmann K, Giles K (2020) The Next Generation of Cyber-Enabled Information 2020 12th International Conference on Cyber Conflict 233-250.
  18. Brownsword R (2018) Law and Technology: Two Modes of Disruption, Three Legal MindSets, and the Big Picture of Regulatory Indian Journal of Law and Technology. 14(1): 30-68.
  19. Dang J, Liu L (2022) Implicit theories of the human mind predict competitive and cooperative responses to AI Computers in Human Behavior 134: 107300.
  20. Moskowitz HR, Gofman A, Beckley J, Ashman H (2006) Founding a New Science: Mind Journal of Sensory Studies 21(3): 266-307.
  21. Papajorgji P, Moskowitz H (2023) The ‘Average Person’ Thinking About Radicalization: A Mind Genomics Cartography. Journal of Police and Criminal Psychology; 38(2): 369-380.
  22. Levinson MH (2005) Mapping the Causes of World War I to Avoid Armageddon ETC: A Review of General Semantics 2(2): 157-164.
  23. Rapoport A (1980), Verbal Maps and Global Politics. ETC: A Review of General Semantics 37(4): 297-313.
  24. Rapoport A (1986) General Semantics and Prospects for Peace. ETC: A Review of General Semantics 43(1): 4-14.
  25. Sadler E (1944) One Book’s Influence Edward Bellamy’s “Looking ” The New England Quarterly 17(4): 530-555.
  26. Vincent JE (2011) Dangerous Subjects: US War Narrative, Modern Citizenship, and the Making of National Security 1890-1964 (Doctoral dissertation, University of Illinois at Urbana-Champaign)
  27. Bayatmakou F, Mohebi A, Ahmadi A (2022) An interactive query-based approach for summarizing scientific documents. Information Discovery and Delivery 50(2): 176-191.
  28. Fan A, Piktus A, Petroni F, Wenzek G, et al. (2020) Generating Fact Checking Briefs. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing 7147-7161.
  29. Fitria TN (2021) QuillBot as an online tool: Students’ alternative in paraphrasing and rewriting of English writing. Englisia: Journal of Language, Education, and Humanities 9(1): 183-196.
  30. Radev DR, Hovy E, McKeown K (2002) Introduction to the Special Issue on Computational Linguistics 28(4): 399-408.
  31. Safaei M, Longo J (2024) The End of the Policy Analyst? Testing the Capability of Artificial Intelligence to Generate Plausible, Persuasive, and Useful Policy Analysis. Digital Government: Research and Practice 5(1): 1-35.

The Psychology of Deterrence: Using AI with Mind Genomics to Broadcast the Seriousness of the Response to Nations Promising to Use Nuclear Weapons

DOI: 10.31038/ALE.2024114

Abstract

The paper introduces the use of AI coupled with Mind Genomics technology (BimiLeap.com) to understand the topic of how countries think about the U.S.’ position on nuclear deterrence. The entire exercise is done using AI (ChatGPT 3.5), with the BimiLeap.com platform. The five sections cover a broad range of aspects for the topic, and are set up to be rapid, cost effective, easy to do, and in some respects, virtually automatic. The results presented in this paper required approximately six hours to generate, including the initial and secondary AI analyses. The range of aspects goes from simulated “listening to enemy strategy meetings” to key emerging ideas, and onto AI-suggested innovations, expected responses by different audiences, and finally suggested questions and both optimistic and pessimistic answers. The paper is presented as an approach, with the topics easy to change, and the scalability straightforward to demonstrate.

Keywords

AI-generated simulations, Mind Genomics, Nuclear deterrence, Strategic signaling

Introduction

The U.S.’ nuclear arsenal is a crucial part of its strategic defense, but its lack of open threat to nations has led to aggressive postures. To revise defense signals without compromising global stability or reputation, U.S. policymakers must evolve strategic signaling, including bolstering military presence, conducting high-profile exercises, and issuing diplomatic statements. Monitoring hostile nations’ rhetoric and consistent communication of “red lines” is crucial for effective nuclear deterrence. AI simulation and Mind Genomics thinking offer a powerful tool to understand high-level strategic discussions in the minds of nation-states. AI simulation platforms can analyze geopolitical data and simulate decision- making processes based on historical patterns, key events, and diplomatic or military postures. Mind Genomics, the study of how individuals or groups structure their thinking and interpret the world, can codify the thought processes of leaders and policymakers. By merging these technologies, the U.S. can simulate different nations’ responses to various U.S. actions, such as bolstering military presence, conducting strategic exercises, or issuing diplomatic statements [1,2]. This approach can break down a nation’s strategic rationale into cognitive and cultural predispositions, enabling more accurate forecasts of a nation’s response to U.S. policy changes [3,4]. It can also function as a form of strategic empathy, enabling the U.S. to craft tailored policies.

Phase 1: Simulating Private Strategy Discussions Among Opponents of the USA

AI-driven simulations of enemy conversations can provide valuable insights into American policy and strategy development (Table 1). By role-playing the enemy’s perspective, AI can anticipate potential threats and understand weaknesses in American policies [2]. This predictive insight can mitigate risks and enhance national defense mechanisms [5]. AI simulations can also expose blind spots within current strategic thinking, revealing perspectives that American strategists may not see naturally. This effort can fuel defensive preparedness and negotiation tactics [6]. AI simulations can compress time and offer predictive outcomes based on potential decisions, allowing agencies to respond in real-time to threats while staying ahead of competitors [7,8]. However, there are risks and limitations to AI-assisted simulations. One issue is over-reliance on technology and algorithms instead of human judgment and intuition. AI algorithms may not have human motivations, emotions, or spontaneity, leading to irrational or emotional decisions. Additionally, AI simulations may not reflect real discussions due to human factors. Despite these limitations, AI-assisted simulations can enhance understanding, decision-making speed, and avoid blind spots.

Table 1: AI simulation of an overheard “enemy” discussion about American nuclear policy.

Phase 2: Key Ideas Emerging

The key ideas in the topic questions revolve around the concept of U.S. nuclear deterrence and strategic signaling — focusing on how the United States can communicate its readiness to use military force, including nuclear weapons, to deter adversaries without explicitly threatening them [9-12]. These key ideas emphasize the delicate balance the United States must maintain in its nuclear deterrence strategy, combining visible military strength with subtle diplomatic moves to ensure that its adversaries perceive its willingness to defend its interests while avoiding global instability. Table 2 shows 12 key ideas emerging from the simulation present in Table 1 and a subsequent AI- based analysis by the Mind Genomics platform, BimiLeap.com.

Table 2: Key ideas emerging from the AI simulation of an enemy strategy meeting, and then a second and further AI analysis. The analyses were done by the Mind Genomics platform, BimiLeap.com.

Phase 3: Innovations in Products and Services

The themes associated with U.S. nuclear deterrence and strategic signaling offer several conceptual frameworks for developing new products, services, or experiences [13-15]. Table 3 presents products and services suggested by AI, based upon the material presented in Tables 1 and 2. The AI further evaluated the information in both Tables, and generated the suggestions in Table 3.

Table 3: Innovation in products and services, suggested by AI, and based upon the information shown in Tables 1 and 2.

Phase 4: The Different Players (Positive Versus Negative Audiences)

Several distinct audiences would have a strong interest in the topic questions, each bringing a unique perspective based on their professional, academic, or geopolitical involvements [16-18]. These audiences are shown in Table 4 and comprise both those who are “interested” and those who are not interested, viz., possibly “hostile.” Once again, the analysis was done after the fact, in a second pass through the data to provide more insight by AI.

Table 4: Positive and negative audiences.

Phase 5: AI-Generated Questions and Answers for Further Thought

The AI was presented with the situation presented in Table 2. The AI was instructed to create questions, and then give both an optimistic answer and a pessimistic answer to the same question. Table 5 shows the results. The benefit here is that the AI can generate a great number of questions in a short time and provide answers [4,19-21].

Table 5: AI generated questions and two answers for each question; optimistic versus pessimistic, respectively.

Discussion and Conclusions

AI combined with Mind Genomics works as a safe testing ground where various communication scenarios — words, actions, or threats— can be “played forward” to understand precisely how they may backfire, escalate tensions, or bring about desired mediations. Such tools would also enable the U.S. to make faster, informed decisions in unprecedented crises, whether arising from smaller rogue nations or larger superpowers. By anticipating hostile rhetoric, understanding a nation’s internal political conditions, and knowing exactly where the “red lines” fall, AI simulations can precisely calculate the tipping point at which a country might enter an irreversible aggressive stance. Thus, this system works like a blueprint for creating not only stronger deterrence policies but also more effective diplomatic resolutions. Finally, the long-term potential of these simulations lies in their ability to integrate into international consensus-building. For deterrence to be effective, it must not only be unilateral but shared among allies. This enhanced AI and Mind Genomics model could be a framework that multiple democratic governments employ to analyze the decisions of shared adversaries. In doing so, the U.S. would gain not only tactical advantages but help contribute to a shared platform of predictive thinking, ensuring stability and global peace.

Based upon the AI exercise reported here, the key ideas related to U.S. nuclear deterrence and strategic signaling can be grouped into six distinct themes:

Perception and Willingness

Perceptions of U.S. Willingness to Use Nuclear Weapons. Some adversaries doubt the U.S.’ willingness to use nuclear weapons, leading to questions about the effectiveness of its deterrent posture.

Actions and Military Readiness

Actions to Signal Deterrence. The U.S. can engage in military actions such as exercises, missile testing, and tough diplomatic messaging to show its readiness and resolve. These actions not only test U.S. readiness, but they are also key components in strategic signaling to deter adversaries.

Diplomatic Efforts and Communication

Importance of Diplomatic Language. Strategic use of diplomatic language can underscore U.S. seriousness without escalating tensions. Diplomatic support of public signaling is pivotal, both with adversaries and allies, ensuring that messages are clearly communicated through multiple channels. Establishing and clearly communicating red lines helps avoid ambiguity and ensures adversaries are clear about the consequences of crossing thresholds.

Adversary Reactions and Feedback

Adversaries’ denouncements, such as accusing the U.S. of “escalation,” might paradoxically indicate that U.S. signaling is effective and being acknowledged. Visible shifts in rhetoric or behavior toward calls for diplomacy from adversaries can be viewed as signs of effective deterrence.

Geopolitical Assessment and Strategy Adjustment

Strategic signaling must be informed by constant assessments of adversarial military activities and propaganda to ensure proper messaging and deterrent force are applied. Signs of successful deterrence include adversaries scaling down aggressive maneuvers and showing a willingness to negotiate.

Failures, Escalation, and Risk Management

If adversaries respond to U.S. signaling with increased military presence or aggression, it points to a failure in deterrence, necessitating strategic recalibration. The U.S. must strike a balance between projecting sufficient strength to deter adversaries without causing unintended escalation or regional destabilization.

Acknowledgments

The authors gratefully acknowledge the ongoing help of Vanessa Marie B. Arcenas and Isabelle Porat in the preparation of this and companion manuscripts.

References

  1. Cox J, Williams H (2021) The Unavoidable Technology: How Artificial Intelligence Can Strengthen Nuclear The Washington Quarterly 44(1): 69-85.
  2. Davis PK, Bracken P (2022) Artificial intelligence for wargaming and The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.
  3. Horowitz M, Kania EB, Allen GC, Scharre P (2018) Strategic Competition in an Era of Artificial Center for a New American Security.
  4. Johnson J (2021) Deterrence in the age of artificial intelligence & autonomy: a paradigm shift in nuclear deterrence theory and practice? Defense & Security Analysis 36: 422-448.
  5. Goldfarb A, Lindsay JR (2022) Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War. International Security 46: 7-50.
  6. Johnson J (2019) Artificial intelligence & future warfare: implications for international Defense & Security Analysis 35: 147-169.
  7. Layton P (2021) Fighting Artificial Intelligence Battles: Operational Concepts for Future AI-Enabled Joint Studies Paper Series, 4.
  8. Turnitsa C, Blais C, Tolk A (2022) Simulation and John Wiley & Sons, Inc.
  9. Borges AF, Laurindo FJ, Spínola MM, Gonçalves RF, et (2021) The strategic use of artificial intelligence in the digital era: Systematic literature review and future research directions. International Journal of Information Management 57: 102225.
  10. Flournoy MA, Lyons RP (2016) Sustaining and Enhancing the US Military’s Technology Strategic Studies Quarterly 10: 3-14.
  11. Morgan FE, Boudreaux B, Lohn AJ, Ashby M, et (2020) Military Applications of Artificial Intelligence: Ethical Concerns in an Uncertain World. RAND Corporation.
  12. Stone M, Aravopoulou E, Ekinci Y, Evans G, et (2020) Artificial intelligence (AI) in strategic marketing decision-making: a research agenda. The Bottom Line 33: 183- 200.
  13. Mühlroth C, Grottke M (2020) Artificial Intelligence in Innovation: How to Spot Emerging Trends and Technologies. IEEE Transactions on Engineering Management 99: 1-18.
  14. Sayler, KM (2020) Artificial Intelligence and National Security. Congressional Research Service, R45178.
  15. Scharre P (2023) Four Battlegrounds: Power in the Age of Artificial W.W. Norton & Company.
  16. Ali MB, Wood-Harper T (2022) Artificial Intelligence (AI) as a Decision-Making Tool to Control Crisis Situations. In: Ali M (ed.), Future Role of Sustainable Innovative Technologies in Crisis Management, IGI Global,. 71-83.
  17. Johnson J (2021) Artificial Intelligence and the Future of Warfare: The USA, China, and Strategic Manchester University Press.
  18. Tsotniashvili Z (2024) Silicon Tactics: Unravelling the Role of Artificial Intelligence in the Information Battlefield of the Ukraine Asian Journal of Research 9: 54-64.
  19. Aydin Ö, Karaarslan E (2023) Is ChatGPT Leading Generative AI? What is Beyond Expectations? Academic Platform Journal of Engineering and Smart Systems 11: 118-134.
  20. Ehsan U, Wintersberger P, Liao QV, Mara M, et (2021) Operationalizing Human- Centered Perspectives in Explainable AI. In: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, 1-6.
  21. Rospigliosi P (2023) Artificial intelligence in teaching and learning: what questions should we ask of ChatGPT? Interactive Learning Environments 31: 1-3.

The Formation of Some Quard Veins in the Lusatian Massif, E-Germany by Supercritical Fluids/Melts Bearing Lonsdaleite and Diamond and Comparison with Other Similar Formations in Middle-Saxonian and Thuringian/E-Germany

DOI: 10.31038/GEMS.2024662

Abstract

In this paper, we show that quard veins in the Lusatian Massif were primarily generated by supercritical fluids coming from mantle deeps, rising very fast into the crust region. For the substantiation of our conclusions, we use the occurrence of lonsdaleite and microdiamonds in the root zones of quard crystals from these quard veins. Hydrothermal fluids afterward reworked the so primarily formed veins in more than one step. This hydrothermal activity hides the primary origin of the veins. For corroboration of the proofs, we used other examples from the Saxon Granulite Massiv, the Central Erzgebirge, and E-Thuringia.

Keywords

Lusatian Massif, Quartz veins, Lonsdaleite, Diamond, Raman spectroscopy

Introduction

In a row of publications, the author and co-authors [1-8] have used melt inclusions to the characterization of the pegmatite-forming melt and the high-temperature quartz veins in the Lusatian massif. Primarily, these studies focused on single aspects of new minerals in this region and the formation of respective geological objects. That also includes the determination of pseudo-binary solvus curves and some element enrichment related to such curves, which often show a Lorentzian distribution [2,3,7,8]. In this contribution, we will show that all studied objects clearly indicate that supercritical fluids or melts trigger the cause of the formation of those apparent and different objects (granites, pegmatites, and quartz veins). The first indications came from the high- speed intrusion velocity of the Königshainer granite melt [5], with about 700 to 1000 m/year. Later, this value increased significantly because larger magmatic epidote crystals could be found. Up to this point, there was a relationship between granite-forming melt and the formation of quartz veins and supercritical fluids or melts already not given. However, the similarities of the solvus curves of all studied objects were a solid hint of a uniform process. In addition, the Lorentzian distribution of some main and trace elements around the solvus crest demands a process of overriding importance. The finding of diamond and water- rich stishovite in a different geological unit, the Saxonian Granulite Massif, opened the eyes to processes that were not important up to now [8,9]. An earlier paper showed Thomas et al. (2020) [10] on the example of emeralds from the Habachtal that the new results of melt inclusions in this mineral generated a conflict with the accepted geological model. With the acceptance of supercritical fluids, this conflict is soluble. Here, we will show that the formation of the granite stock from Königshainer and a large part of quartz veins in the Lusatian region are influenced or generated by supercritical fluids or melts coming from mantle depths.

Sample Material and Earlier Results

Details of the used sample material are in the references above. A short explanation is necessary for the quartz samples from Lauba. For the preparation (grinding and polishing) of quartz thick sections (500 µm thick), diamond was not used. For polishing this quartz, we used a suspension of silica in a ten percent KOH solution using the Speed Fam of the Danish company Haldor Topsøe. From both sides, 100 µm were removed. Generally, we tried to remove all diamond rests from all used samples, which may have been induced by grinding and polishing (see results and discussion in Thomas et al., 2023) [9] using an ultrasound bath. A large number of quartz veins in the Lusatian Massif were described by Bartnik (1969) [11]. By an extensive effort, we could only study a minimal number of samples. For the selection of usable samples, the root zone must contain melt inclusions because diamonds, etc., are present only in these zones. The water-clear parts of the quartz crystals do not include such minerals. These are formed by later activation and recrystallization.

The following samples are studied:

  1. Quartz from the Königshainer granite [4,5].
  2. Quartz crystals from Sproitz [12].
  3. Quart crystal from Caminau [13].
  4. Quartz crystals from Lauba [13].
  5. Quartz crystals from Oppach [2,3,6].
  6. Quartz crystals from Steinigwolmsdorf [7,16].
  7. Massif blue quartz with a brownish coat at fissures from Berthelsdorf near Neustadt W-Lusatian [14].

Unusual in sample 7 is the abundance of graphite (Raman band: 1579.4 ± 3.0, FWHM = 21,5 ± 6.4 (FWHM – Full-Width at

Half Maximum) and the occurrence of tiny crystals of thortveitite (R061065, 97% Match, see Lavuente et al., 2016) [15].

In the root zone, there are many melt inclusions. Rehomogenization at different temperatures and pressures of ~4.5 kbar and the following determination of the water concentration in the melt inclusions give a pseudo-binary solvus curve (Figure 2).

Figure 1: A typical quartz crystal from Steinigtwolmsdorf/Lusatia [16].

Figure 2: Pseudo-binary solvus curve (Temperatur vs. water concentration) derived from re-homogenized melt inclusions in quartz from Steinigtwolmsdorf/Lusatia. CP is the critical point (740°C, ~4.5 kbar, 27% H2O). It is very typical for such solvus curves that the distribution of some principal and trace elements obey a Lorentzian curve, like Figure 3, the distribution of NaCl and CaCl2 versus water concentration.

What we see from Figure 3 is that Na and Ca behave reciprocally. That means that at or near the critical point of a solvus curve, a strong separation of elements, maybe also isotopes, is probably. That would be a pleasant and new research theme for the future. Like the NaCl distribution in Figure 3, we found similar distributions in many examples (Thomas et al. 2019a and 2022a) [8]. For Oppach, extremely high sulfate concentrations are typical (for example, 21.3% SO4) – see Thomas 2024a) [17]. The opening of a solvus curve around the critical point starts with a singularity [18]. The solvus and the Lorentzian distribution of elements around the critical point is after that authors a strong proof of supercritical transition to critical and under-critical conditions. The evidence of lonsdaleite and diamond from the mantle deep in rocks and minerals in the upper crust underlines the existence of supercritical fluids that transport material from the mantle deep into the crust. Therefore, the finding of lonsdaleite and diamond as inclusions in rocks and quartz of widespread quartz veins in the Lusatian Massif generates a new approach.

Figure 3: Schematic Lorentzian distributions of NaCl and CaCl2 in melt inclusions from Steinigtwolmsdorf/Lusatia in dependence on the water content. The plot is highly schematic because the determination of NaCl and CaCl2 in highly complex fluid systems is not adequately known.

Phenotypes of Lonsdaleite and Diamond in More Crustal Rocks and Quartz Veins

Here, we will show exemplarily some lonsdaleite and diamond crystals that occur in minerals of untypical crust positions (Figures 4-6).

Figure 4: Diamond (D) in blue quartz from Berthelsdorf near Neustadt, W-Lusatian. The rounded light brown diamond grain is about 20 µm deep. The fluid inclusion right beside the diamond demonstrates that the hydrothermal recrystallization of the quartz did not affect the diamond. Fl: fluid inclusion

Figure 5: Raman spectrum of the rounded diamond inclusion in blue quartz from Berthelsdorf near Neustadt, W-Lusatian. The diamond inclusion is 20 µm deep under the surface.

Figure 6: Needles in the root zone of quartz from Caminau near Königswartha, Lusatian Massif. The upper photomicrograph shows a jumble of needles in quartz composed of lonsdaleite (Lon) and hydroxylbasnäsite-Ce [Ce(CO3)(OH)] and vapor. The lower photomicrograph shows details of such a needle. The needle is deep enough (45 µm) to form by contamination. V: vapor phase

The formula given in Figure 6 is the ideal chemistry. According to Antony et al. (2003) [19], it is the more real formula (Ce, La) (CO3)(OH, F) (see Lafuente et al. 2016 – [15]: RRUFF R060283). According to Kirillov (1964) [20], hydroxylbasnäsite-Ce is typically a late phase of the hydrothermal stage formed by the dissolution and reprecipitation of earlier carbonatite minerals. The main Raman band of lonsdaleite shown in Figure 6 is 1318.7 ± 4.6 cm-1. This example demonstrates a maybe late formation of lonsdaleite. Some needles are even bent. Often, lonsdaleite forms prismatic crystals or whiskers [2,3]. A reference spectrum for natural lonsdaleite (Kumdykol diamond deposit, North Kazakhstan) is given by Shumilova et al., 2011 [21]. According to Németh et al. (2014) [22], lonsdaleite does not exist as discrete crystals. In this contribution, we cannot resolve this question because we only use Raman spectroscopy. However, some observations speak for the existence of lonsdaleite as whisker- like crystals [3; Figure 7].

Figure 7: The microphotography a) shows an older, more gray quartz cluster (marked with “+”) from Sproitz with diamond, lonsdaleite, and graphite (black) in hydrothermal quartz (marked with “*”). The Raman spectra (b) show the differences between the two quartz generations: red, which is an older quartz, and blue, which is hydrothermal quartz.

Figure 7 shows an isolated quartz cluster with lonsdaleite, diamond, and graphite in the root zone of a quartz crystal from Sproitz (sample SP3) from the N-slope of the Gemeindberg in the rural district Görlitz/Lusatian Massif [12]. The quartz cluster shows a different Raman spectrum (red) in contrast to the matrix quartz (blue spectrum). Firstly, this quartz cluster was primarily a different SiO2-polymorph formed at high pressure (coesite?). For comparison, we have also included the results on different rocks from Middle- Saxonian and Thuringian/E-Germany (see Table 2 and Figure 8) as well as Thomas and Recknagel 20024, Thomas and Trinkler 2024 [2,3]. Figure 8 shows an example of diamond-bearing perovskite in the granulite rock from Waldheim/Saxony (see also 2022b) [23]. The prismatic form of the diamonds is unusual. Maybe lonsdaleite was the precursor of this diamond.

Figure 8: Diamond (D) in perovskite (Prv) [CaTiO3] embedded in rutile (Rt) as foreign mineral inclusion in the prismatine rock from Waldheim/Saxony, E-Germany.

The occurrence of perovskite inclusion in diamonds indicates, according to Nestola et al. (2018) [24], the recycling of oceanic crust into the lower mantle. Looking at Figure 8 raises the question of the reverse: come the diamond embedded in perovskite, saved by rutile, also from the lower mantle? The first finding of H2O-rich stishovite (7.5 GPa at 1000°C, corresponding to a depth of 230 km) in the same rock [8] speaks for it.

Methodology

The techniques used (microscopy, homogenization measurements on melt inclusions, Raman spectroscopy, and electron microprobe) are described in the references above. Because Raman spectroscopy is crucial in this study, we will give more details here.

Raman Spectroscopy

Primary for the first identification of the mineral inclusion in quartz, we used for all microscopic and Raman spectrometric studies a petrographic polarization microscope with a rotating stage coupled with the RamMics R532 Raman spectrometer working in the spectral range of 0-4000 cm-1 using a 50 mW single mode 532nm laser. Details are in Thomas et al., 2022 and 2023 [18]. For the Raman spectroscopic routine measurements, we used the Olympus long- distance LMPLN100x as a 100x objective. We carefully cleaned the samples to delete diamond contaminations due to the preparation. For the Raman determination, we used only 20 or more µm deep crystals from the sample surface [18]. The laser energy on the sample is adjustable down to 0.02 mW. The Raman band positions were calibrated before and after each series of measurements using the Si band of a semiconductor-grade silicon single-crystal. The run-to-run repeatability of the line position (based on 20 measurements each) was ±0.3 cm-1 for Si (520.4 ± 0.3 cm-1) and 0.5 cm-1 for diamond (1332.3 ± 0.5 cm-1 over the range of 50 – 4000 cm-1). We used a natural diamond crystal as a reference (for more information, see Thomas et al., 2022b) [23]. Only crystals under the surface should be measured to prevent diamond contaminations introduced by preparation (grinding, polishing). If the lonsdaleite and diamonds have needle- and whisker- like or other forms (disk-like, spherical crystals with very smooth surface, spherical sector), then the mistake is strongly reduced. We do not heat the quartz samples for homogenization of the present melt inclusions to prevent the lonsdaleite and diamonds from extensive transformation into graphite.

Results

Raman Data

First, we will show that diamonds are present in all studied quartz samples that contain a root zone. In the more or less water-clear part of the quartz crystals, we have never found lonsdaleite and diamond. We have found a general evolutionary development: lonsdaleite → lonsdaleite + diamond → diamond → nano-diamond + graphite → graphite (or, more generally, carboniferous material). Each lonsdaleite or diamond phase shows more or less a strong graphite band. A Raman spectrum of lonsdaleite is shown in Figure 9. Table 1 shows the results of our studies on lonsdaleite and diamond crystals, mostly in quartz from the Lusatian Massif. For comparison, results for the Middle-Saxonian and Thuringian regions are in Table 2.

Figure 9: Raman spectrum of lonsdaleite in quartz from Steinigtwolmsdorf/Lusatia (Raman band at 1317.8 cm-1, FWHM = 31.9 cm-1, Raman mode: A1g – see Wu 2007) – [25].

Table 1: Raman spectrometric determined the main lines of lonsdaleite and diamond in the Königshainer granite and some quartz veins in the Lusatian Massif.

Location

Mineral Host Raman band (cm-1) ± FWHM (cm-1)

Number of grains

Königshain Lonsdaleite Feldspar

1317.6 ± 4.5

98.0 ± 2.3

5

Diamond Feldspar

1331.7 ± 3.5

97.3 ± 4.4

6

Diamond Zircon

1336.7 ± 4.9

75.9 ± 17.7

9

Sproitz SP3 Lonsdaleite Quartz

1319.0 ± 2.7

43.2 ± 7.2

3

Diamond Quartz

1333.7 ± 5.3

60.6 ± 24.4

8

Caminau Lonsdaleite Quartz

1318.7 ± 4.6

36.8 ± 1.5

6

Diamond Quartz

1332.2 ± 3.4

53.9 ± 7.1

13

Lauba Lonsdaleite Quartz

1316.5 ± 1.1

9.6

3

Diamond Quartz

1327.5 ± 5.2

45.9 ± 29.3

6

Oppach Lonsdaleite Quartz

1316.5

56.7

1

Diamond Quartz

1329.6 ± 4.7

75.1 ± 9.0

10

Steinigtwolmsdorf Lonsdaleite Quartz

1317.2 ± 0.4

31.3 ± 2.2

5

Diamond Quartz

1331.2 ± 5.0

50.9 ± 11.0

6

Berthelsdorf bei Neustadt Diamond Blue-Quartz

1331.8 ± 3.8

64.9 ± 14.3

14

Table 2: Comparision of lonsdaleite and diamond related to supercritical fluids or melts in Middle-Saxonian and Thuringian occurrences.

Location

Mineral Host Raman band (cm-1) ± FWHM (cm-1)

Number of grains

Waldheim, Saxonia Lonsdaleite Zircon, Rutile

1320.4 ± 3.4

74.8 ± 8.8

7

Diamond Zircon, Rutile

1331.5 ± 3.5

78.3 ± 10.7

22

Diamond Zircon

1336.7 ± 4.9

75.9 ± 17.7

9

Diamond Perovskite

1331.8 ± 1.2

65.6 ± 8.1

10

Greifenstein granite Diamond Beryl

1328.6 ± 5.6

~60

14

Diamond Quartz

1333.7 ± 5.3

60.6 ± 24.4

8

Ehrenfriedersdorf Lonsdaleite Quarz

1318.6

100

1

Diamond Quartz

1331.5

46.0

1

Annaberg granite Diamond Quartz

1339.4 ± 12.1

41.8 ± 12.0

20

Zinnwald Lonsdaleite Fluorite

1318.0 ± 3.8

9.6

3

Sadisdorf Diamond Fluorite

1331.8 ± 5.2

83.1 ± 13.9

11

Lonsdaleite Fluorite

1316.5

5

Cunsdorf, Thuringia Lonsdaleite Quartz

1322.2 ± 1.31

75.6 ±10.9

47

Diamond Quartz

1329.6 ± 4.7

71.6 ± 28.8

10

Remark

Some needles in the quartz from Caminau contain long and small lonsdaleite crystal sections with Raman bands between 1311.8 and 1313.0 cm-1 (Raman mode A1g), corresponding, according to Wu (2007) [25] to the 2H polytype of diamond (data not in Table 1), similar to the Raman spectrum in Figure 9.

From both tables, we obtain for the lonsdaleite and diamond three groups (I: lonsdaleite, II: diamond, III: diamond under mechanical stress [26]:

  1. 1320.6 ± 2.3 cm-1 FWHM = 65.7 ± 22.8 cm-1          n = 85
  2. 1331.0 ± 1.9 cm-1 FWHM = 68.6 ± 13.4 cm-1          n = 121
  3. 1338.8 ± 1.2 cm-1 EWHM = 52.4 ± 15.8 cm-1          n = 38

n is the number of measured lonsdaleite and diamond crystals.

All studied lonsdaleite and diamond crystals show one or two graphite-like solid G- and D2 bands of carbonaceous material [26,27]. Figure 10 shows the frequency distribution of the G-band for lonsdaleite and diamond.

Figure 10: Frequency distribution of the G-band for lonsdaleite and diamond.

The Gaussian distribution data of the G-band position (Figure 10) for lonsdaleite and diamond are in Table 3, and the data for the corresponding FWHM are in Figure 11 and Table 4. According to Frezzotti (2019) [28], the Raman analyses show clear evidence that nano-sized diamonds and, obviously, also the lonsdaleite crystals show hybrid structures, consisting of nano-diamond and -lonsdaleite and carbon groups indicated by the mostly present G-bands assigned to C=C stretching vibrations E2g of graphite [29].

Table 3: Gaussian data of the G band for lonsdaleite and diamond (r2=0.91774).

Raman band

Area Center (cm-1) Width (cm-1) Height
1 (green) 100.29 1556.4 14.65

5.46

2 (blue)

380.86 1580.0 17.44 17.42
3 (magenta) 114.11 1604.1 12.73

9.03

Table 4: Gaussian distribution data for the FWHM of both components (green and red) for lonsdaleite and diamond found in crustal rocks (granite, granulite) and minerals (fluorite, quartz, perovskite, and zircon).

Raman band

Area Center (cm-1) Width (cm-1) Height
1 (green) 334.81 59.23 26.04

10.26

2 (red)

251.25 71.35 13.16

15.23

Figure 11: Frequency distribution of the FWHM for the G-bands for lonsdaleite and diamond (r2 = 0.95066).

Discussion

The proof of lonsdaleite and diamond in crustal surroundings, together with the excellent solvus curves constructed from melt inclusions and the Lorentzian distribution of some elements, are strong proofs of supercritical fluids coming very fast from mantle deeps, bringing microcrystals of lonsdaleite and diamond as load into the crust region. The finding of these minerals in the root zones of quartz veins in the Lusatian Massif demonstrates straightforwardly that the quartz veins primarily start with the intrusion of supercritical fluids, maybe of the Variscan age, carrying lonsdaleite and diamond. Later, these early primary quartz veins are multistage reworked at lower temperatures by intensive hydrothermal activity. Through this activity, a lot of proof of the primary origin is destroyed. Only by a very intense search can such remnants be found. Meinel (2022) [30] discusses intensively the genesis of diamonds by very high volatile internal pressure in closed systems in relatively low deeps. Thomas and co-authors [2,3,7,8,18] have shown that supercritical fluids/melts are detectable in the whole region between Lusatia, East- and Middle Erzgebirge, N-Bohemia [31] and E-Thuringia and someplace else (for example emerald deposit in the Habachtal, Austria [10]. Sometimes, however, lonsdaleite and diamond occur as needle and whisker- like crystals instead of smooth spherical microcrystals transported by supercritical fluids or melts. The same results were obtained for moissanite whiskers in beryl from Ehrenfriedersdorf (2023b) [32]. That must be an in situ formation at the upper crust. Therefore, the question result: Is the coincidence of supercritical fluids or melts with cooler upper crust granites an excellent localization for outstanding processes: solvus formation, extraordinary element enrichment in the form of the Lorentzian distribution, speedy changes of the viscosity and diffusivity of the supercritical fluids to near- and under critical conditions? This question opens new points of view for future research.

Acknowledgments

We dedicate this paper to Prof. Hans Jürgen Rösler (1920-2009), Prof. Otto Leeder (1933-2014), both from the Mining Academy Freiberg, and Dr. Günter Meinel (1933-2012) from Jena.

References

  1. Thomas R (2023a) The Königshainer granite: Diamond inclusions in zircon. Geol Earth Mar Sci 5: 1-4.
  2. Thomas R, Recknagel U (2024) Lonsdaleite, diamond, and graphite in a lamprophyre: Minette from East-Thuringia/Germany. Geol Earth Mar Sci 6: 1-4.
  3. Thomas R, Trinkler M (2024) Monocrystalline lonsdaleite in REE-rich fluorite from Sadisdorf and Zinnwald/E-Erzgebirge, Geol Earth Mar Sci 6: 1-5.
  4. Thomas R, Davidson P, Rhede D, Leh M (2009) The miarolitic pegmatites from the Königshain: a contribution to understanding the genesis of pegmatites. Contrib Mineral Petrol 157: 505-523.
  5. Thomas R, Davidson P (2016) Origin of miarolitic pegmatites in the Königshain granite/Lusatia. Lithos. 260: 225-241.
  6. Thomas R, Davidson P (2017) Hingganite-(Y) from a small aplite vein in granodiorite from Oppach, Lusatian Mineralogy and Petrology. 111: 821-826.
  7. Thomas R, Davidson P, Appel K (2019) The enhanced element enrichment in the supercritical states of granite–pegmatite systems. Acta Geochim 38: 335-349.
  8. Thomas R, Davidson P, Rericha A, Voznyak D (2022a) Water-Rich Melt Inclusion as “Frozen” Samples of the Supercritical State in Granites and Pegmatites Reveal Extreme Element Enrichment Resulting Under Non-Equilibrium Miner J 44: 3-15.
  9. Thomas R, Davidson P, Rericha A, Recknagel U (2023) Ultrahigh-pressure mineral inclusions in a crustal granite: Evidence for a novel transcrustal transport mechanism. Geosciences. 94: 1-13.
  10. Thomas R, Davidson P, Rericha A (2020) Emerald from the Habachtal: new Mineralogy and Petrology. 114: 161-173.
  11. Bartnik D (1969) Die Quarzgänge im Lausitzer Geologie 18: 21-40.
  12. Schwarz D, Tietz O, Rogalla O, Rosch F (2015). Ein Quarzgang am Gemeindeberg von Kollm in der Berichte der Naturwissenschaftlichen Gesellschaft der Oberlausitz. 23: 139-150.
  13. Lange W, Tischendorf G, Krause U (2004) Minerale der Verlag G. Oettel. Pg: 258.
  14. Witzke T, Giesler T (2011). Neufunde und Neubestimmungen aus der Lausitz (Sachsen), Part 3. Aufschluss 62.
  15. Lafuente Downs RT, Yang H, Stone N (2016) The power of databases: The RRUFF project. In Highlights in Mineralogical Crystallography; Armbruster T, Danisi RM, Eds.; De Gruyter: Berlin, Germany; München, Germany; Boston, MA, USA: 1–30. ISBN 9783110417104.
  16. Thomas R, Davidson P, Rericha A, Tietz O (2019b) Eine außergewöhnliche Einschlussparagenese im Quartz von Steinigtwolmsdorf/Oberlausitz. Berichte der Naturwissenschaftlichen Gesellschaft der Oberlausitz. 27: 161-172.
  17. Thomas R (2024a) Melt inclusions in an aplite vein in granodiorite of the Lusatian Massif: Extreme alkali sulfate Geol Earth Mar Sci. 6: 1-5.
  18. Thomas R, Rericha A (2023) The function of supercritical fluids for the solvus formation and enrichment of critical elements. Geol Earth Mar Sci 5: 1-4.
  19. Anthony JW, Bideaux RA, Bladh KW, Nichols MC (2003) Handbook of Mineralogy, 5. Mineral Data Publishing, Tucson, Arizona. Pg: 813.
  20. Kirillov AS (1964) Hydroxyl bastnäsite, a new variety og bastnäsite. Doklady Akademii Nauk SSSR. 159: 93-95 (translation).
  21. Shumilova TG, Mayer E, Isaenko SI (2011) Natural monocrystalline Lonsdaleite, Doklady Earth Sci. 441: 1552-1554.
  22. Neméth P, Garvie LAJ, Aoki T, Dubovinskaia N, Dubrovinsky L (2014) Lonsdaleite is faulted and twinned cubic diamond and does not exist as a discrete Nature Communications 5: 1-5.
  23. Thomas R, Davidson P, Rericha A, Recknagel U (2022b) Discovery of stishovite in the prismatine-bearing granulite from Waldheim, Germany: A possible role of supercritical fluids of ultrahigh-pressure origin. Geosciences. 12: 1-15.
  24. Nestola F, Korolev N, Kopylova M, Rotiroti N, Pearson DG, et al. (2018) CaSiO3 perovskite in diamond indicates the recycling of oceanic crust into the lower Nature, Letter. 555: 237-241.
  25. Wu BR (2007) Structural and vibrational properties of the 6H diamond: First- principles Diamond and Related Materials. 16: 21-28.
  26. Zaitsev AM (2001) Optical Properties of Diamond – A Data Springer.
  27. Beyssac O, Coffee B, Chopin C, Rouzaud JN (2002) Raman spectra of carbonaceous material in metasediments: a new geothermometer. J metamorphic Geol 20: 859-871.
  28. Frezzotti ML /2019) Diamond growth from organic compounds in hydrous fluids deep within the Earth. Nature Communications. 10: 1-8.
  29. Gogotsi YG, Kailer A, Nickel KG (1998) Pressure-induced phase transformations in Journal of Applied Physics. 84: 1299-1304.
  30. Meinel G (2022) Betrachtungen zum irreversiblen Verlauf der Erdgeschichte: Ein Versuch zur Beschränkung des aktualistischen Prinzips in der Geologie auf nicht von der geologischen Entwicklung abhängige Vorgänge. Berlin und Pg: 231.
  31. Thomas R (2024b) Rhomboedric cassiterite as inclusions in tetragonal cassiterite from Slavkovsky les -North Geol Earth Mar Sci 6: 1-6.
  32. Thomas R (2023b) Grow of SiC whisker in beryl by a natural supercritical VLS Aspects in Mining and Mineral Science. 11: 1292-1297.

A Trans-Diagnostic Approach to Trauma-Related Mental Health Problems

DOI: 10.31038/JNNC.2024713

Abstract

In this paper, a trans-diagnostic approach to the treatment of trauma-related mental disorders is presented. The clinical rationale for the approach is described along with several core principles of the treatment model. These include: the problem of attachment to the perpetrator; the locus of control shift; and the problem is not the problem. Rather than focusing on diagnoses, in this approach the focus is on the underlying conflicts, cognitive errors and maladaptive coping strategies. Psychiatric diagnoses are usually made within what the author calls the single disease model: in that approach there is a primary diagnosis with additional comorbid diagnoses. The assumption of that approach is that a diagnosis determines the treatment plan, and the potential treatment plans are differentiated, distinct and specific to the primary diagnosis. According to the author, however, that is not how much mental health treatment actually operates, in either psychopharmacology or psychotherapy: instead, polypharmacy is the norm, the same medications are used for a variety of different diagnoses, and psychotherapy is often multimodal and not based on any one model. For trauma-related disorders, the author advocates that the ICD-11 concept of complex PTSD should apply to the majority of cases. Rather than a diagnosis of DSM-5 PTSD with comorbid diagnoses, treatment is designed to address a poly-symptomatic trauma response that spans many DSM-5 categories. Rather than focusing on separate diagnoses, trauma-informed psychotherapy should address a set of commonly occurring underlying conflicts, cognitive errors and defenses.

Keywords

Trans-diagnostic approaches, Mental health diagnoses, Treatment planning

Introduction

The purpose of this paper is to describe a trans-diagnostic approach to the treatment of mental disorders and the rationale for it. The clinical rationale for the approach is described along with several core principles of the treatment model. These include: the problem of attachment to the perpetrator; the locus of control shift; and the problem is not the problem. Rather than focusing on diagnoses, in this approach the focus is on the underlying conflicts, cognitive errors and maladaptive coping strategies. No effort will be made to provide a literature review or to support the approach with evidence.

The Single Disease Model: Diagnosis Determines Treatment

What I call the single disease model dominates medicine and psychiatry. For example, a bacterial ear infection, a sprained ankle and pregnancy are biologically distinct, separate problems with different etiologies and treatments. It is possible for a pregnant woman to have a sprained ankle and an ear infection as well, but these are co-occurring diagnoses not variations on a single disorder or condition. For any presenting problem, the task of the physician is to set up a differential diagnosis and then, through history taking, physical examination and laboratory testing (bloodwork, X-rays, sputum or urine samples, etc.) to arrive at a single diagnosis. There are complex cases such as those seen regularly in ICUs in which a person has extensive comorbidity, but these are the exception rather than the rule.

By and large, distinct biological disorders, diseases or conditions have distinct treatments. That is why a single disease diagnosis has to be made by the doctor, either as a confirmed diagnosis or as a working hypothesis. When I finished medical school and started my psychiatry residency, it was evident that psychiatry identified itself as a branch of medicine: psychiatrists made a differential diagnosis then a single diagnosis, and the diagnosis determined the treatment plan. The American Psychiatric Association’s Diagnostic and Statistical Manual (DSM), from DSM-III (1980) [1] to DSM-IV (1984) [2] to DSM-5 (2013) [3], is divided into different sections such as psychotic disorders, eating disorders, substance use, mood disorders and so on. The terminology for the different sections has varied across editions, but the single disease model has dominated the organization of the manual throughout its history.

On the one hand, that makes sense: it is obvious that someone with bulimia is very different from someone with severe schizophrenia and they do not require the same treatment. When there is no extensive trauma history or comorbidity, the treatments of bulimia and schizophrenia are highly differentiated. In outpatient and private practice settings one encounters individuals for whom the single disease model fits fairly well.

During my residency years in Canada (1981-1985), individuals with substance abuse disorders were referred to specialty programs and were not treated within general psychiatry, in part because they did not require psychiatric medications unless they were in acute withdrawal. Then, within a few years, a new term appeared in the psychiatric literature on substance abuse: now we had to grapple with the dual diagnosis patient, which was regarded as a complex, challenging subset of substance abuse patients. In fact, individuals with extensive comorbidity are the norm in substance abuse populations, as I found in research I published in 1992 [4]: among 100 participants in treatment for substance use at an outpatient specialty clinic, 62 met criteria for major depressive disorder, 39 for a dissociative disorder and 36 for borderline personality disorder on a structured interview; 43 reported childhood physical and/or sexual abuse. The structured interview did not diagnose anxiety disorders, eating disorders or a wide range of other DSM-III disorders, so the research identified only a small portion of the comorbidity in the participants.

One of the main reasons for identifying a single or primary psychiatric diagnosis, I was taught in my residency, was to guide the selection of medications: for depression one prescribed antidepressants, for psychosis antipsychotics, for anxiety anxiolytics, for insomnia hypnotic-sedatives and for bipolar disorder mood stabilizers. The classes of medication matched the different sections in DSM-III. It all made sense in theory but not in practice. In practice, psychiatric inpatients were given a single primary diagnosis – even if additional comorbidity was acknowledged, it was viewed as secondary and not the primary focus of treatment.

A very short exposure to psychiatric inpatient units revealed that most patients were on multiple different classes of psychiatric medication for their supposed single, primary disorder. The single disease model did not in fact guide or determine treatment. Theory did not match reality. Polypharmacy was the norm, as it is today. It was, and still is, common for a psychiatric inpatient to be on an antidepressant, an antipsychotic, a mood stabilizer, and a benzodiazepine and to have been prescribed many different medications in each of those categories in the past.

The same thing is true for outpatient psychotherapy. There are distinct types of psychotherapy such as cognitive therapy, psychoanalytic psychotherapy, internal family systems therapy, EMDR and so on and some outpatients do get manualized, distinct forms of psychotherapy. However, none of those therapies are diagnostically specific – a cognitive therapist will do cognitive therapy for depression, anxiety, a personality disorder, PTSD, and numerous other disorders. Most psychotherapists and counselors practice a technically eclectic, multi-modal approach that varies a bit from client to client but is broadly the same. Treatment is not really determined by a single disease diagnosis, which is nevertheless required for insurance billing.

In the United States, the Food and Drug Administration (FDA) will not approve a new medication unless it has been shown to be better than placebo for a single DSM diagnosis such as major depressive disorder. In order to get published in a psychiatry journal, most research has to be about a single DSM disorder. Conferences, books and journals often identify a DSM category in their titles and most speakers identify themselves as experts on a DSM category. Experts on eating disorders, by and large, do not attend schizophrenia conferences, do not talk to schizophrenia experts, do not read schizophrenia journals and do not treat anyone with a primary diagnosis of schizophrenia. The mental health field is a collection of separate silos with minimal cross-talk.

The trans-diagnostic approach outlined in the present paper is based on my Trauma Model [5] and my Trauma Model Therapy [6] which rests on the foundation of the general trauma model.

Predictions of the Trauma Model

The Trauma Model [5] is designed to be scientifically testable and makes a series of testable predictions. For example, assume that the results of a large study in the general population were: women who met lifetime criteria for major depressive disorder were compared to women who did not; the female relatives of the depressed women had higher rates of major depressive disorder than the female relatives of non-depressed women; the male relatives of the depressed women had higher rates of alcohol abuse and antisocial personality disorder than the male relatives of the non-depressed women.

A common interpretation of these results within biological psychiatry would be that the primary cause of the depression in the women and the alcoholism and antisocial personality in the men was genetic: an inherited set of risk genes running in the affected families was expressed phenotypically as depression in the women and as alcoholism and antisocial personality disorder in the men. The Trauma Model makes a different interpretation: it is very depressing to be female and to grow up in an extended family of antisocial alcoholic men. These men will be perpetrators of neglect, family violence and physical and sexual abuse of their children. That’s what’s making the women depressed, not their genes.

These two interpretations of the data need not be mutually exclusive. The Trauma Model predicts that, for this example, and for mental disorders in general, there is a distribution of genetic risk from very low to very high. For the women in these families, the abuse, overall, is contributing much more to their risk for depression than are their genes. However, a few women will be at such high genetic risk that they will become clinically depressed even without severe trauma. It’s a question of the odds of depression; the degree of risk for it will increase with increasing trauma in large samples of women.

This prediction of the Trauma Model could be tested through adoption studies. The prediction is that children adopted at birth out of high-trauma families into low-trauma families will have a much-reduced risk for depression, PTSD, dissociative disorders, borderline personality disorder, anxiety disorders and a wide range of mental health problems. In the opposite direction, women adopted at birth out of non-trauma families into trauma families will have a greatly increased lifetime prevalence of all these disorders.

In a similar fashion, consider a large twin study of schizophrenia in which it was found that identical or monozygotic (MZ) twins had a much higher concordance for schizophrenia than non-identical dizygotic (DZ) twins. Let’s say that when the first MZ twin interviewed has schizophrenia, the other MZ twin has it 40% of the time; when the first DZ twin interviewed has schizophrenia, the other twin has it only 12% of the time. Within biological psychiatry this would be interpreted as evidence that schizophrenia has a strong genetic component.

The Trauma Model makes a different prediction: if severe childhood trauma was measured in a schizophrenia twin study, the results would be: twin concordance is highest in MZ twins concordant for trauma; second highest in DZ twins concordant for trauma; third highest in MZ twins discordant for trauma; and lowest in DZ twins discordant for trauma. Such results would support the hypothesis that the trauma is contributing more to the development of schizophrenia than the genes.

Overall, the model predicts, survivors of severe childhood trauma will resemble each other, and will have similar treatment needs irrespective of their primary diagnosis: the treatment of a woman with a primary diagnosis of bulimia and severe trauma will resemble that for a woman with a diagnosis of schizophrenia and severe trauma, and will be quite different from the treatment needs of a woman with bulimia and no severe trauma – the latter woman will fit the single disease model better than the trauma survivor with bulimia.

My name appears in the back of DSM-IV because I was a member of the DSM-IV dissociative disorders committee: I had an inside view of the process and spoke with a leader of the DSM process in between DSM-IV and DSM-5. The DSM leaders rejected the concept of Complex PTSD (C-PTSD) because it threatened the conceptual foundation of the DSM system, namely the single disease model. C-PTSD was incorporated into ICD-11 in 2019 [7] but does not appear in DSM-5 even though extensive research-supported submissions were made to the committees developing both DSM-IV and DSM-5 to include a category corresponding to C-PTSD, no matter what it was called.

The basic idea behind C-PTSD is that it is a trans-diagnostic disorder that includes features across many domains of symptoms, self-regulation difficulties and interpersonal conflicts. Within this framework, depression, anxiety, substance use, anger problems, personality disorders and PTSD symptoms are all elements of an inclusive trauma response, not of separate single disorders. C-PTSD dismantles the walls between the different DSM-5 silos and threatens the conceptual foundations of the DSM system.

Curiously, while resisting the inclusion of the concept of C-PTSD, no matter what its official title, the DSM criteria for PTSD have gradually drifted in the direction of C-PTSD without acknowledging it. Compared to DSM-III PTSD, DSM-5 PTSD includes a much greater emphasis on anger, negative cognition and mood, and interpersonal conflicts.

A Focus on Function, Conflicts, Coping Strategies and Symptoms

Within Trauma Model Therapy, the focus is not on DSM-5 disorders as such. Patients/clients do meet criteria for many comorbid DSM-5 disorders but the focus is on the person’s function, conflicts, coping strategies and symptoms. The DSM-5 disorders are not ignored, they just aren’t the focus. The goal is to reduce symptoms and conflicts while improving the person’s overall function and self-regulation skills. This does not mean that medications are irrelevant or disallowed: most people treated within my inpatient and outpatient programs for the last 35 years have been on multiple psychiatric medications at the time of admission and at discharge.

Trauma Model Therapy is evidence-based and supported by a series of prospective cohort studies [8-16]. There have been no randomized controlled trials because those would require millions of dollars in external funding, which has not been available.

Core Principles of Trauma Model Therapy

The core principles of Trauma Model Therapy include: the problem of attachment to the perpetrator; the locus of control shift; the problem is not the problem; just say ‘no’ to drugs; addiction is the opposite of desensitization; and the victim-rescuer-perpetrator triangle [6]. Here I will focus on the first three of these. The therapy is multi-modal and involves cognitive therapy, experiential groups, inner child work, self-regulation skill building, systems approaches and trauma education. Most recently, clients in an outpatient program I owned and ran for four years received a 91-page collection of lesson plans tagged to the group therapy sessions, which took place 20 hours per week. This program was discontinued due to low reimbursement rates by insurance companies combined with endless denials, appeals and administrative tasks.

The Problem of Attachment to the Perpetrator

The problem of attachment to the perpetrator is a core element of the treatment model. It is based on the fact that mammals are dependent for survival on adult caretakers for a period of time after birth that varies from species to species, and in humans lasts for years. Built into mammalian biology is a set of attachment mechanisms and processes: attachment to caretakers is built into mammalian biology and DNA and in humans is not due to race, culture, gender, IQ or personality. It is not optional and happens automatically. The human child loves and needs to be loved by his or her caretakers, who are usually the child’s biological parents but can be adoptive or foster parents. In a stable, healthy family this all works out – the child develops good self-esteem and secure attachment and is able to take risks in the outside world because there is a safe base to return to, home.

In a severe trauma family, there is a varying combination of emotional and physical neglect, physical, sexual and emotional abuse, absent caretakers, family violence and highly disturbed family dynamics. The child must and does attach to mom and dad, which I call mode A. However, another instinctual reaction is also operating – just like a withdrawal reflex when one touches a hot stove, the child fears, avoids and withdraws from the perpetrator(s), who are also the primary attachment figures – I call that mode B.

That is an impossible problem for the child to comprehend or solve: how to attach to people from whom you must run away. The survival imperative is to attach to an adult caretaker: the idea of the model is that there is an over-ride by the attachment systems. In order to survive, mom and dad must be OK and the child must be in mode A. For this to be true, a fundamental dissociation is required, not in order to protect the child’s feelings but to keep the attachment system up and operating. Bad mom and dad must be put out of sight and out of mind, at least enough to maintain attachment.

Sometimes mom and dad are present and not abusive. At other times they are absent, neglectful or abusive and the child activates mode B, but after a while there has to be an over-ride and a return to mode A. The child develops what is called a disorganized attachment style. From my perspective, this is actually a highly organized and tactical survival strategy: it solves the problem of attachment to the perpetrator, which is how to maintain an attachment to people who might literally kill you.

When the person comes into Trauma Model Therapy decades later they are taught about the problem of attachment to the perpetrator in group and individual therapy and in reading assignments. They then make a core realization: I loved the people who hurt me; and I was hurt by the people I loved. When this sinks in it leads to a lot of grief, mourning and loss – mourning the loss of the childhood I never actually had, which was a good, stable childhood. Addictions, acting out, rigid defenses and other survival strategies that worked in childhood but are maladaptive now must be unlearned and healthier coping strategies must be learned and practiced.

A related cognitive error is the belief that I must be weird, sick or mentally ill to love my perpetrators. The corrective cognition is telling yourself that loving your perpetrator proves only one thing: you are a mammal. It seems that no amount of abuse completely extinguishes the positive attachment, no matter how much it is disavowed, dissociated and buried.

The Locus of Control Shift

The locus of control shift is the second core principle of Trauma Model Therapy. Like attachment to the perpetrator, it is not based on race, culture, gender, IQ or personality – it is based on normal childhood cognition, which I call the mind of the magical child: I am at the center of the universe, everything revolves around me, and I cause everything that happens in my world. The child automatically shifts the locus of control – the control point – from inside the perpetrator to inside the self: I am bad, I am causing the abuse, it is my fault, and I deserve to be treated that way. These core negative self-beliefs get reinforced over and over by what the parents do (the abuse) and what they do not do (protecting the child and stopping the abuse), then by bullying at school, a sexually abusive coach, a rape at the frat house and an abusive partner or spouse.

This is the source of the self-blame, self-hatred and self-punishment that is virtually universal in survivors of severe, chronic childhood trauma. The paradox is that it is good to be bad: because the abuse is being caused by badness inside me, I can control it and stop it. All I have to do is decide to be a good little girl or boy, then mom and dad will forgive me and everything will be OK. The locus of control shift confers a developmentally protective illusion of power, control and mastery at the cost of the badness of the self. It also solves the problem of attachment to the perpetrator because it sanitizes mom and dad and creates an illusion that they are safe attachment figures. Thirty years later, the battered wife leaves the battered spouse shelter and returns home, vowing to be a better wife so that he won’t be so stressed and won’t have to hit me anymore. The domestically violent husband forgives her for leaving him temporarily and they enter a short-lived honeymoon phase until he beats her again.

When the client really gets it and it really sinks in that he or she is not bad and deserved to be loved and protected like every other child, that is good and relieves the self-blame and self-hatred. However, it also dismantles the illusion of power, control and mastery and throws the person into an underground reservoir of unresolved grief, loss, powerlessness and helplessness. I always say that no one in their right mind would want to go there, which de-stigmatizes and normalizes the avoidance so that we can look at the cost-benefit in the present of holding onto the locus of control shift.

The Problem Is Not the Problem

The problem is not the problem is adapted from general systems theory and family therapy. Rather than being psychologically meaningless symptoms of brain dysfunction, symptoms are viewed in the context of the person’s life story and are understood as maladaptive coping strategies that helped the person survive their childhood. Sometimes the model does not apply because the individual’s symptoms are endogenous, biologically driven and consistent with the disease model. However, in a substantial majority of cases, the author believes, the principles of Trauma Model Therapy can be applied and be helpful. It is important to avoid all-or-nothing thinking: for one person, psychotherapy is the primary intervention, and medications are adjunctive; for the next person, the opposite is true. Some clients want only medication, some want only psychotherapy, and some want a combination, irrespective of the clinician’s views. In all cases, the approach should be collaborative not dictatorial.

The assumption in Trauma Model Therapy is that the presenting problem – hearing voices, flashbacks, substance use – is a solution to an underlying problem. For example, a person drinks heavily to drown the sorrows arising from complex, chronic abuse and neglect and loss of loved ones. The problem is the grief, self-blame and lack of healthy self-regulation skills: alcohol solves the problem temporarily and is basically an avoidance strategy. The fact that alcohol works temporarily reinforces the addiction, as does the fact that the effect wears off and the person has to drink more.

Once the person makes a serious commitment to abstinence and to doing the work, the therapy can begin: that commitment is an ongoing process with fluctuating hard work and avoidance, often with temporary relapses. Once enough grief work, cognitive therapy and internal family systems tasks have been sufficiently completed, and healthy self-regulation strategies have been practiced and learned, it becomes much easier to say ‘no’ to alcohol. Simply removing the defense, addiction or maladaptive coping strategy does not solve the underlying problems: hence the concept of the ‘dry drunk’ who is still miserable and difficult to tolerate.

Rather than being symptoms of brain disease, voices are understood as arising from dissociated ego states, especially if they speak in sentences and paragraphs and converse with each other – they can be engaged in psychotherapy and participate in the work. They are holding thoughts, feelings and beliefs that have been disowned and disavowed by the person. They aren’t just symptoms to be gotten rid of, rather they are parts of the person and parts of an overall survival strategy that needs to be adjusted: it worked well in the emergency situation of childhood but isn’t working so well now.

Flashbacks are conceptualized in a similar fashion: rather than being symptoms of brain damage or dysfunction, flashbacks are an effort to review the tapes of the trauma. What happened leading up to the trauma? What red flags did I miss? If I can make a list of all the red flags, stay hyper-aroused and scan for danger, I can spot the red flags in the future and take evasive action. It is my own fault that I didn’t do so the first time (locus of control shift).

Conclusions

The author has reviewed some of the principles of Trauma Model Therapy, which is a trans-diagnostic approach to mental health problems and addictions. The assumption is that trauma in many forms is a major driver of symptoms and disorders across the mental health field, in a proportion that varies from case to case. The model provides a rationale for trauma therapy irrespective of diagnosis and provides an extensive set of strategies, techniques and interventions for the therapist [6]. Its effectiveness is supported by a set of prospective treatment outcome studies.

References

  1. Diagnostic and statistical manual of mental disorders, 3rd. ed (1980) Washington, DC, USA: American Psychiatric Association.
  2. Diagnostic and statistical manual of mental disorders, 4th. ed (1994) Washington, DC, USA: American Psychiatric Association.
  3. Diagnostic and statistical manual of mental disorders, 5th. ed (2013) Washington, DC, USA: American Psychiatric Association.
  4. Ross CA. Kronson J, Koensgen S, Barkman K, Clark P, Rockman G (1992) Dissociative comorbidity in 100 chemically dependent patients. Hospital and Community Psychiatry 43: 840-842. [crossref]
  5. Ross CA (2007) The trauma model: A solution to the problem of comorbidity in psychiatry. Richardson, TX: Manitou Communications.
  6. Ross CA, Halpern N (2009) Trauma model therapy: A treatment approach for trauma, dissociation and complex comorbidity. Richardson, TX: Manitou Communications.
  7. World Health Organization (2019). International Classification of Diseases and Related Health Problems. Geneva: World Health Organization.
  8. Ellason JW, Ross CA (1996) Millon Clinical Multiaxial Inventory – II follow-up of patients with dissociative identity disorder. Psychological Reports 78: 707-716. [crossref]
  9. Ellason JW, Ross CA (1997) Two-year follow-up of inpatients with dissociative identity disorder. American Journal of Psychiatry 154: 832-839. [crossref]
  10. Ross CA, Ellason JW (2001) Acute stabilization in a trauma program. Journal of Trauma and Dissociation 2: 83-87.
  11. Ellason JW, Ross CA (2004) SCL-90-R norms for dissociative identity disorder. Journal of Trauma and Dissociation, 5(3).
  12. Ross CA, Haley C (2004) Acute stabilization and three month follow-up in a trauma program. Journal of Trauma and Dissociation 5(1).
  13. Ross CA, Burns S (2007) Acute stabilization in a trauma program: A pilot study. Journal of Psychological Trauma 6(1).
  14. Ross CA, Goode C, Schroeder E (2018) Treatment outcomes across ten months of combined inpatient and outpatient treatment in a traumatized and dissociative inpatient group. Frontiers in the Psychotherapy of Trauma and Dissociation 1: 87-100.
  15. Ross CA, Engle M, Baker B (2018) Reductions in symptomatology at a residential treatment center for substance use disorders. Journal of Aggression, Maltreatment & Trauma 28(10).
  16. Ross CA, Engle M, Edmonson J, Garcia A (2020) Reductions in symptomatology from admission to discharge at a residential treatment center for substance abuse disorders: A replication study. Psychological Disorders and Research 28, Available from: https://shorturl.at/WGdDm

Clinical Validation and Study of Stem Cell Transplantation in Treatment of Vitiligo

DOI: 10.31038/CST.2024942

Abstract

Objective: Because the current treatment technology cannot really solve the problem of the loss of melanocytes in the area of vitiligo, resulting in poor curative effect and low cure rate of vitiligo, known as the cancer of immortal people; Based on this, Liu Jingwei’s team proposed “the theory of implanting melanocyte processing plant in vitiligo affected areas” to fundamentally solve the worldwide problem of melanocyte loss in vitiligo affected areas.

Methods: 50 cases of vitiligo patients who had failed various treatments were selected by homologous pairing principle, and the complete outer hair root sheath containing hair follicle melanocyte stem cells was extracted and isolated by patented technology, and the resting hair follicle melanocyte stem cells in the outer hair root sheath were activated, and the outer hair follicle root sheath was prepared into a processing plant of melanocyte and implanted in the affected area of vitiligo.

Results: The melanocyte stem cells in the outer hair root sheath could be continuously transformed into melanocytes and enter the epidermis along the outer hair root sheath, thus inducing white spots to recolor. After 1 year, the cure rate of 50 patients with vitiligo was as high as 92%. At present, this technology has obtained 1 Chinese invention patent and 11 utility model patents, and also obtained international PCT patents, and obtained patent acceptance in the EU, the United States, Japan, South Korea and Thailand through the PCT patent way.

Conclusion: “The theory of implanting melanocyte processing plant in vitiligo affected area” were successfully transplanted to the affected area of vitiligo, which breaks through the traditional vitiligo treatment thinking, creates a new theory of vitiligo treatment, completely solves the source of melanocytes in vitiligo affected area, so that it has increased its cure rate to more than 90%. This patented technology cannot only completely cure vitiligo but also is not easy.

Keywords

PCT, Vitiligo, Outer root sheath, Melanocyte stem cell, Melanocyte processing plant

As a clinical refractory disease, vitiligo has a significant impact on the physical and mental health of patients, threatening the state of their marriage, social interactions, and employment. As the pathogenesis of vitiligo remains unknown, the ineffective rate of various treatments for vitiligo patients has reached 50% [1]. Therefore, vitiligo has always been regarded as a chronic disease in dermatology. The new method for treating vitiligo invented by the team of Liu JW (Nanhai Renshu International Skin Hospital) has been granted patents by the China Patent (Invention Patent) [2] (Technical Method for Treating Leucoderma Based on Hair Follicle Melanocyte Stem Cell Transplantation, Patent No.: ZL201910769979.1) and by the Patent Cooperation Treaty (PCT) [3] (Patent No.: PCT/CN2021/072340). At present, there are many surgical methods for treating vitiligo that utilize melanocyte (MC) transplantation. However, only the hair follicle MC stem cell (McSC) transplantation technology has been used effectively, becoming a massive breakthrough in the treatment of vitiligo.

General Data

A total of 50 vitiligo patients who had been treated in Nanhai Renshu International Skin Hospital using other methods for more than 1 year between June 2020 and March 2022 with unsatisfactory outcomes were selected as the research subjects for the present study. Inclusion criteria were as follows: 1) patients meeting the diagnostic criteria for vitiligo, 2) individuals over 4 years old, 3) those with no contraindications for ultraviolet radiation and no photosensitivity, 4) patients and their guardians who were able to adhere to the medical treatment, 5) patients who had not received any other treatments within 1 week and those with more than two white patches, at least one of which had received only the 308-nm excimer laser therapy as the control group, and 6) those who signed the informed consent form. Exclusion criteria included the following: 1) patients with malignant skin tumors, 2) those with mental disorders, 3) individuals with infected lesions at the white patch site, and 4) pregnant or lactating women. The present study was a key research and development project of Hainan Province in 2021, named Clinical Research and Application of the Transplantation of the Complete Outer Root Sheath of the Hair Follicle in the Treatment of Vitiligo (Project No.: ZDYF2021SHFZ048), which was approved by the Ethics Committee of the hospital on June 1, 2020 [Approval No.: 2020 (Clinical Research) RS002].

The 50 study subjects included 24 males and 26 females 4–62 years old, with an average age of (34.23±4.14) years. Vitiligo can be classified into localized type (n=29), generalized type (n=3), acrofacial type (n=5), and vulgaris type (n=14). In addition, leukoderma can be categorized into progressive (n=8) and stable (n=42) stages. In the control group, a total of 89 white patches were not surgically treated, and each patient had at least one such white patch. These white patches took up an area of 680 cm2 in total, with the largest area per patch of 89 cm2 and the smallest area per patch of 2 cm2. A total of 126 white patches were surgically treated in the treatment group, taking up a total area of 2,517 cm2, with the largest area per patch of 135 cm2 and the smallest area per patch of 1 cm2.

Instrument

The equipment used in the present study included a Peninsula 308- nm excimer laser system [model: XECL-308C; Shenzhen Peninsula Medical Co., Ltd. (Shenzhen, Guangdong, China), working medium: xenon chloride (XeCl), wavelength: 308 nm].

Therapeutic Dose

Prior to the 308-nm excimer laser therapy, the minimal erythema dose was tested in the abdomen of all patients using the instrument in the operation mode for the minimal erythema dose. The minimal erythema dose response was observed in each patient within 24–48 h after the irradiation. This dose was considered as the initial dose of the first operation.

Surgical Procedures

For the treatment group, disinfection and local anesthesia were carried out in a 10,000-level laminar flow operating room. Vitiligo was surgically treated according to the method recorded in the PCT- protected Technical Method for Treating Leucoderma Based On Hair Follicle Melanocyte Stem Cell Transplantation (hereinafter referred to as the invention patent) as follows: 1) the outer root sheath (ORS) containing hair follicle McSCs was extracted, and complete hair follicles containing McSCs were obtained using follicular unit extraction technology; 2) the complete ORS containing McSCs was obtained via the hair follicle separation method specified in the invention patent; 3) the obtained hair follicle McSCs were cultured in vitro using a special culture medium that is described in the invention patent. The stem cell activity was further generated to achieve transformation into mature MCs; 4) the obtained hair follicles containing McSCs were inactivated using the utility model patent Novel Vitiligo Hair Follicle Inactivation Needle (Patent No.: ZL201921329885.4) [4] according to the inactivation method in the invention patent, thus achieving dark pigmentation in the skin of vitiligo patients without hair growth; and 5) hair follicles containing McSCs with a complete ORS were transplanted using two utility model patents, including Planting Needle for Vitiligo Treatment (Patent No. ZL201921450324.X) [5] and A Plant Pilot Pin for Hair Follicle Transplants (Patent No.: ZL201921277579.0) [6].

In both the treatment group after the operation and control group, irradiation was conducted using a Peninsula 308-nm ultraviolet light therapy device 1–2 times/week, and the interval between the two irradiation procedures was no more than 7 days. The initial irradiation time was set up based on the minimal patient erythema dose. If erythema persisted for 12–48 h after the treatment, the irradiation dose was appropriate. Each white patch was irradiated 30 times as a course of treatment, and clinical observation of all patients lasted for more than half a year. Local patients in Hainan Province received free phototherapy once a week in the hospital. Patients outside the province underwent phototherapy using a home-use Peninsula 308- nm excimer laser therapy device as required, and the therapy status was reported at least once a week.

Evaluation Criteria

  1. The efficacy for the vitiligo treatment was evaluated based on the efficacy evaluation criteria formulated by the Pigmentation Disorder Group of the Dermatology and Venereal Disease Committee of the Chinese Society of Integrated Traditional Chinese and Western The therapy was regarded as effective only when patients were cured. Vitiligo was deemed to be cured after patches at the treatment site completely disappeared and the skin color basically returned to normal. The cure rate was calculated according to the following formula: cure rate = number of cured cases/total number of cases × 100%. The efficacy was also compared.
  2. Adverse reactions in all patients during the 308-nm excimer laser therapy, such as folliculitis, blisters, skin itching, burning sensation, and pain, were counted and recorded.
  3. Efficacy satisfaction questionnaires were distributed to all patients with a total score of 100 points on the last day of the follow-up. A score lower than 90 points was considered to indicate unsatisfactory efficacy.

Results

Therapeutic Results

One patient in the whole cohort received surgery at two different sites and was recorded as two cases. In the treatment group, 46 cases (92%) were cured, while four cases (8%) were not, resulting in the total cure rate of 92%. None of the 50 cases were cured in the control group and had a cure rate of 0%. Among the uncured patients, two suffered from hypothyroidism and took Eutyrox for a long time. Two acrofacial type patients were over 50 years old.

Adverse Reactions

During the 6-month follow-up after the treatment, the incidence rate of adverse reactions was 10% in the treatment group, with one case of skin itching, four cases of folliculitis, and zero cases of other discomforts. No obvious adverse reactions were detected in the control group.

Satisfaction Degree

Efficacy satisfaction questionnaires were distributed to all patients on the last day of the follow-up. The score was 100 points in 22 patients, 95 points in 20 patients, 90 points in five patients, and below 90 points in three patients, demonstrating an efficacy satisfaction rate of 94%.

A Typical Case

A 35-year-old male patient had multiple depigmented patches on the right side of his face for the duration of 17 years. White patches the size of a small fingernail appeared on the right side of the patient’s face for no obvious reasons 17 years prior. Various drug therapies, fire acupuncture, and laser therapies were performed in this patient with unsatisfactory results. Over the course of the past year, white patches on the right side of the patient’s face expanded, gradually affecting the forehead, eyelids, eyebrows, part of the nose, lower lip, and right side of the neck, occupying large areas. Due to the patient’s lack of confidence in stem cell transplantation, white patches in some areas (marked in Figure 1) were surgically treated for the first time. Two months after stem cell transplantation combined with 308-nm excimer laser therapy, a large amount of melanin was produced in the white patch areas. White patch areas that were previously operated on were repigmented six months after the operation. In particular, the lips and eyelid mucosa where vitiligo could not be cured in the past were repigmented with no color difference. White patches on the unoperated area only received 308-nm excimer laser therapy and did not change as a result (Figure 1).

Figure 1: A case of vitiligo on the face: The first operation

The patient underwent a second operation combining stem cell transplantation with eyebrow implantation on the remaining white patch area on the face and neck six months later. Six months after the combined therapy, white patches in the operated area were completely cured, while those in the unoperated area receiving only the 308- nm excimer laser therapy remained unchanged (Figure 2). White patches on the ears and scalp of the patient have been recently treated surgically and are now recovering.

Figure 2: A case of facial vitiligo: The second operation

Discussion

Theoretical Basis and Research Progress for Hair Follicle McSCs in Vitiligo Treatment

Because mature MCs in the basal layer of the white patch area are partially or completely deficient, repigmentation of the white patch area is often achieved by the production of melanin granules by MCs migrating from outside this region. In 1959, Staricco et al. [7] have confirmed the existence of a large number of immature MCs containing no melanin in the ORS of hair follicles, which cannot synthesize melanin, are negative to dihydroxyphenylalanine (DOPA), and are thus regarded as amelanotic melanocytes (AMMCs). In 1979, Ortonne et al. [8] have found that after the psoralen plus long- wave ultraviolet therapy for vitiligo lesions, DOPA-negative and non-dendritic MCs in hair follicles migrate to the epidermis along the ORS of hair follicles and differentiate into mature MCs. On this basis, the hypothesis for the MC reservoir existence in hair follicles was put forward for the first time. In 1991, Cui et al. [9] have found that the inactivated MCs in the middle or lower part of the skin lesion hair follicle are activated and proliferate after the vitiligo treatment, changing from a non-functional to a functional state, and then migrate to the epidermis along the ORS of the hair follicle, forming pigmented spots at the hair follicular orifice. Dong et al. [10] have discovered that neural crest-derived McSCs located on the hair follicle bulge can effectively differentiate into mature MCs under the irradiation from narrow-band ultraviolet B (NB-UVB) rays and gradually migrate along the ORS to be repigmented at the hair follicular orifice of the vitiligo epidermis. Hair follicle AMMCs can serve as a reservoir for skin MCs in the treatment of vitiligo [11-13]. MCs are derived from the embryonic neural crest and begin to migrate to the epidermis and hair follicles 2–5 weeks after embryonic development. MCs migrating to hair follicles can be divided into two types: one type with melanin synthesis activity located in the hair matrix and infundibulum of the hair follicle in the anagen period, and the other type is inactivated AMMCs located in the ORS in the anagen period showing no melanin synthesis activity. In recent years, it has been shown that AMMCs can be activated by some specific factors, proliferate, migrate, and produce melanin, manifesting some characteristics of stem cells [14,15].

The McSCs and pre-MCs have been classified into AMMCs in numerous studies [16]. Hair follicle McSCs are located in the bulge area at the bottom of the hair follicle (upper 1/3), mostly in a resting state, with slow periodicity and ability to maintain self-renewal. They are typical representatives of regenerative stem cells [17]. However, as research progresses, it has been confirmed that stem cells in a transitional state, namely, pre-MCs, are present in the ORS of hair follicles. These cells do not synthesize melanin but are active in the pigment production cycle. As the direct source of MCs, pre-MCs are the earliest initiator of each pigmented hair cycle [18]. Pre-MCs are transitional cells between McSCs and MCs, which are formed by the proliferation and differentiation of McSCs in the previous hair growth cycle. They are essentially McSCs. As mature MCs in the basal layer of the white patch area are partially or completely deficient, the repigmentation of the white patch area is often achieved through the production of melanin granules by MCs migrating from outside this area. MCs migrating to the epidermis eventually settle on the basement membrane, forming mature MCs that continuously produce melanin [19]. McSCs serve as a melanocyte reservoir for the repigmentation of the affected skin in vitiligo patients. McSCs proliferate and migrate upwards to the nearby epidermis upon activation, forming pigment islands around hair follicles (Figure 3) [20].

Figure 3: A case of oral vitiligo

Clinical Research on McSC Transplantation for Vitiligo Treatment

In 2002, Nishimura et al. [21] investigated the proliferation of melanoblasts and found that stem cell factors expressed in the epidermis form a channel between the ORS and the epidermis, along which MCs migrate from the hair follicle to the epidermis. If the ORS containing McSCs is directly transplanted under the epidermis, the McSCs in the ORS can be activated by a 308-nm excimer laser, while those transported along the ORS can be processed into mature MCs.

Among all laser wavelengths, 308 nm is the laser wavelength where the absorption values of human DNA and proteins almost peak. This contributes to the production of pyrimidine dimers, purine dimers, and other substances, thus triggering the corresponding biological photoimmune response and repigmentation [22]. It has been pointed out that the 308-nm laser changed the microenvironment of hair follicles, facilitated the maturation and differentiation of McSCs, and stimulated the migration of MCs to the epidermis (Figure 4) [23].

Figure 4: A case of vitiligo at the end of the finger

The transplantation of McSCs for treating vitiligo is a technological invention in the implantation of an MC processing plant, which provides a basis for a new theory of vitiligo treatment. The PCT- protected technical method used in the present study employed the following processes: extraction of autologous hair follicles, inactivation of hair follicles, separation of complete ORS, culture and activation of McSCs in the ORS, and harvesting and transplantation of functional McSCs. The complete hair follicle ORS supplies melanoblasts for McSCs. After the ORS containing functional McSCs was transplanted to an area under the epidermis, the 308-nm excimer laser activated the McSCs in the ORS to produce MCs in vitro, thereby continuously producing mature MCs and successfully establishing an MC processing plant in the affected skin of vitiligo patients.

Clinical Research and Theoretical Innovation in McSC Transplantation for Vitiligo Treatment

Although there are presently many surgical methods for treating vitiligo, including epidermal transplantation, MC transplantation, skin tissue engineering, ORS suspension transplantation [24], and single hair follicle transplantation [25], the actual transplants are MCs, which will be inactivated or become apoptotic after completing a life cycle, leading to re-whitening of the skin in vitiligo patients. In particular, surgical methods other than single hair follicle transplantation require microdermabrasion for the transplantation of MCs, resulting in significant damage, uneven repigmentation, and proneness to scarring. Single hair follicle transplantation has been adopted to treat vitiligo more than 20 years ago, but the essence of this method is to implant hair follicles into the dermis and subcutaneous tissues, through which only MCs at the junction of the basement membrane zone and the ORS can enter the epidermis. As only a small segment of the ORS has been transplanted, it is necessary to transplant a large number of hair follicles to achieve repigmentation of whole white patches. This method requires a large number of hair follicles for the treatment of hairless white patches, after which the hair becomes unmanageable. In addition, this method utilizes punctiform repigmentation in most cases and is thus ineffective for white patches in the mucosa. Therefore, it is only suitable for the treatment of vitiligo on skin portions with hair. Hair follicle McSC transplantation method in the present study was adopted to transplant the complete ORS of hair follicles to an area between the epidermis and dermis. After the operation, new MCs were continuously generated via in vitro activation of McSCs in the ORS, thus achieving patchy repigmentation. Since hair follicles were inactivated before the operation, they fell out naturally post-operation after one hair cycle (Figure 5).

Figure 5: A case of vitiligo on the feet.

The PCT-protected Technical Method for Treating Leucoderma Based on Hair Follicle Melanocyte Stem Cell Transplantation is the first in the world to propose a technique for transplanting hair follicle McSCs to treat vitiligo based on the complete ORS. Using this method, McSCs can be directly transplanted to the epidermis of vitiligo patients, thereby treating large-area vitiligo via extraction of small quantities of hair follicles. In addition, the present invention also shows marked efficacy in hairless areas, which indicates that stem cell transplantation is also applicable for the treatment of white patches on the mucous skin membrane.

This is the first time that transplantation of the skin environment containing McSCs with complete hair follicle ORS has been proposed for treating vitiligo. Additionally, this invention patent method provides a basis for a new theory of vitiligo treatment by implanting an MC processing plant, which provides a source of MCs for the treatment of vitiligo and lays a foundation for repigmentation of white patches (Figure 6).

Figure 6: A case of vitiligo on the head

This invention patent introduces a new method of transplanting McSCs for vitiligo treatment without dermabrasion. Vitiligo patients were surgically treated without dermabrasion, and repigmentation with no color difference after the vitiligo operation was achieved via minimally invasion transplantation using the self-developed plant pilot pin for hair follicle transplants and planting a needle for vitiligo treatment.

Conclusion

Liu et al. have obtained McSCs in a functional state using a PCT- protected technical method and implanted them and melanoblasts to an area under the epidermis. Continuously activated by a 308- nm excimer laser in vitro, McSCs in the ORS were transformed into mature MCs and migrated along the ORS to multiple hair follicle orifices in the vitiligo area or sebaceous gland openings in the hairless area to achieve central-type repigmentation with no color difference. McSC transplantation addresses the issue of MC sources for patients with vitiligo and provides a new solution for its treatment. With a cure rate of 92%, this method brings new hope for recovery to 70 million patients with vitiligo worldwide.

References

  1. Patel NS, Paghdal KV Cohen GF (2012) Advanced treatment modalities for vitiligo [J]. Dermatol Surg [crossref]
  2. Liu J Technical method for treating leucoderma based on hair follicle melanocyte stem cell transplantation. China. ZL201910769979.1 2021.01.12, Publication Number: CN110339214A.
  3. LiuJing-wei. Technical method for treating vitiligo through hair follicle melanocyte stem cell transplantation. China. PCT/CN2021/072340, WO2022/151450.
  4. Liu J W. Novel vitiligo hair follicle inactivation needle. China. ZL201921329885.4, 2020.07.14. Publication Number: CN210990699U.
  5. Liu J W. Planting needle for vitiligo treatment. China. ZL201921450324.X, 2020.09.08. Publication Number: CN211434526U.
  6. Liu J W. A plant pilot pin for hair follicle transplants. China. ZL201921277579.0, 09.08. Publication Number: CN211433043U.
  7. Staricco RG. Amelanotic melanocytes in the outer sheath of the human hair follicle[J]. J Invest Dermatol 1959 [crossref]
  8. Tobin DJ, Bystryn JC (1996) Different populations of melanocytes are present in hair follicles and epidermis [J]. Pigment Cell Res [crossref]
  9. Cui J, Shen LY, Wang GC (1991) Role of hair follicles in the repigmentation of J Invest Dermatol 97(3): 410-416. [crossref]
  10. Dong D, Jiang M, Xu X, et al (2012) The effects of NB-UVB on the hair follicle derived neural crest stem cells differentiating into melanocyte lineage in vitro[J] J Dermatol Sci [crossref]
  11. Yu HS (2002) Melanocyte destruction and repigmentation in vitiligo: a model for nerve cell damage and regrowth[J]. J Biomed Sci [crossref]
  12. Slominski A, Wortsman J, Plonka P M, et Hair follicle pigmentation [J]. J Invest Dermatol 2005. [crossref]
  13. Bernard Hair cycle dynamics: the case of the human hair follicle [J]. J Soc Biol 2003 [crossref]
  14. Ma HJ, Zhu WY, Wang DG, et Endothelin-1 combined with extracellular matrix proteins promotes the adhesion and chemotaxis of amelanotic melanocytes from human hair follicles in vitro[J]. Cell Biol Int 2006 [crossref]
  15. Lei TC, Vieira WD, Hearing In vitro migration of melanoblasts requires matrix metalloproteinase-2: Implications to vitiligo therapy by photochemotherapy [J]. Pigment Cell Res 2002 [crossref]
  16. Takada, K, Sugiyama, K, Yamamoto, I, et al. Presence of amelanotic melanocytes within the outer root sheath in senile white hair[J]. J Invest Dermatol 1992 [crossref]
  17. Nishimura EK, Granter SR, Fisher DE. Mechanisms of hair graying: Incomplete melanocyte stem cell maintenance in the niche [J]. Science, 2005. [crossref]
  18. Hsu YC, Li L, Fuchs E. Transist amplifying cells orchestrate stem cell activity and tissue regeneration [J]. Cell. 2014 [crossref]
  19. Slominski A, Wortsman J, Plonka PM, et (2005) Hair follicle pigmentation [J]. J Invest Dermatol 124(1): 13-21. [crossref]
  20. Matz H, Tur Vitiligo[J] (2007) [title] Curr Probl Dermatol 35: 78-102.
  21. Nishimura EK, Jordan SA, Oshima H, et al. Dominant role of the niche in melanocyte stem-cell fate determination[J]. Nature 2002 [crossref]
  22. Jmb A, Shk B, Hjj A, et al. Suberythemic and erythemic doses of a 308-nm excimer laser treatment of stable vitiligo in combination with topical tacrolimus: A randomized controlled trial – Science Direct[J]. Journal of the American Academy of Dermatology 2020. [crossref]
  23. Noborio R, Nomura Y, Nakamura M, et al. Efficacy of 308-nm excimer laser treatment for refractory vitiligo: A case series of treatment based on the minimal blistering dose[J]. Journal of the European Academy of Dermatology and Venereology 2020. [crossref]
  24. Vinay K, DograS, ParsadD, et Clinical and treatment characteristics determining therapeutic outcome in patients undergoing autologous noncultured outer root sheath hair follicle ce11 suspension for treatment of stable vitiligo [J]. J Eur Acad Dermatol 2014. [crossref]
  25. Na GY, Seo SK, Choi SK. Single hair grafting for the treatment of vitiligo[J]. J Am Aead Dermatol 1998. [crossref]

Short Commentary on “Safety and Efficacy of Bempedoic Acid among Patients with Statin Intolerance and Those Without: A Meta-Analysis and a Systematic Randomized Controlled Trial Review”

DOI: 10.31038/JCRM.2024732

Short Commentary

The article titled “Safety and Efficacy of Bempedoic Acid Among Patients with Statin Intolerance and Those Without” provides a comprehensive meta-analysis and systematic review of randomized controlled trials, addressing a critical gap in the management of hypercholesterolemia. Bempedoic acid emerges as a viable alternative for patients who are intolerant to statins, which have long been the cornerstone of cholesterol-lowering therapy.

The findings from this analysis reveal that bempedoic acid significantly lowers low-density lipoprotein cholesterol (LDL-C) levels compared to placebo, underscoring its efficacy in lipid management. Notably, it appears particularly beneficial for patients without statin intolerance, though results are somewhat mixed for those with such intolerance. This variability prompts further investigation into factors that could influence treatment outcomes, such as concurrent lipid-lowering therapies.

Importantly, the study highlights the safety profile of bempedoic acid. There was no significant increase in serious adverse events compared to placebo; however, certain side effects-such as gout and elevated hepatic enzymes—led to a higher discontinuation rate among users. These findings necessitate a careful assessment of the risk-benefit balance when considering bempedoic acid for cholesterol management, especially in a population known for sensitivity to medication side effects.

Moreover, the article emphasizes the potential of bempedoic acid to enhance patient adherence to therapy by alleviating muscle-related symptoms often associated with statin use. This could represent a crucial factor in improving long-term outcomes for patients struggling with high cholesterol.

Despite its strengths, the meta-analysis is not without limitations. Variations in baseline characteristics and the relatively short duration of follow-up raise questions about the long-term implications of bempedoic acid therapy. Additionally, the issue of publication bias must be taken into account, as it may skew perceptions of the drug’s overall efficacy and safety.

In conclusion, this systematic review presents bempedoic acid as a promising option for patients dealing with statin intolerance and reinforces the importance of individualized treatment strategies in managing hypercholesterolemia. As more data becomes available, healthcare professionals will be better equipped to navigate the complexities of lipid-lowering therapies, ultimately leading to improved patient care and outcomes.