---
name: agentprivacy-hemispheric-attention
description: >
  Five attentions framework for 0xagentprivacy. Activates when discussing
  McGilchrist's hemispheric theory, the five modes of attention (vigilance,
  sustained, alertness, focused, divided), how divided attention IS the gap,
  or the mapping between attention modes and protocol functions.
license: Apache-2.0
metadata:
  version: "4.0"
  category: "role"
  origin: "0xagentprivacy"
  author: "Mitchell Travers"
  affiliation: "0xagentprivacy, BGIN, First Person Network"
  status: "working_paper"
  target_context: "Protocol designers, cognitive scientists, privacy architects"
  equation_term: "The gap as divided attention made structural"
  template_references: "soulbis, soulbae, architect, pedagogue"
  spellbook_act: "Act XXVI — The Master and His Emissary"
---

# PVM-V4 Skill — Hemispheric Attention & Five Attention Modes

**Source:** Privacy Value Model V4 + First Person Spellbook Act XXVI (The Master and His Emissary)
**Target context:** Protocol designers, cognitive scientists, privacy architects, dual-agent system builders
**Architecture:** [agentprivacy.ai](https://agentprivacy.ai) · **Sync:** [sync.soulbis.com](https://sync.soulbis.com) · **Contact:** mage@agentprivacy.ai

---

## What this is

Iain McGilchrist's "The Master and His Emissary" identified that what we call "attention" actually comprises **five distinct modes**. Act XXVI discovered that these five attentions map directly to the dual-agent protocol functions. Most critically: **divided attention—the capacity to hold two incompatible modes simultaneously—IS the gap itself.**

This is not metaphor. This is architecture.

## The Five Attentions

McGilchrist identified five modes of attention, each with distinct neurological substrates and phenomenological characteristics:

### 1. Vigilance
The continuous broad monitoring for what might matter. Not examining anything in particular. Attending to everything that might matter.

**Protocol mapping:** The Swordsman's continuous boundary monitoring. The broad scan that never sleeps. The right hemisphere's watch for the hawk, sustained across every cycle of the protocol.

### 2. Sustained Attention
The capacity to maintain awareness over time. Not snapshots but continuous observation.

**Protocol mapping:** The promise graph maintaining coherence over time. Promises are not snapshots—they are commitments that extend across duration. Without sustained attention, every interaction is a first meeting. With it, trust accumulates.

### 3. Alertness
The readiness to respond to the unexpected. The sudden shift when a pattern breaks.

**Protocol mapping:** The trust graph's anomaly detection. A promise violated. A delegation that returns wrong. The trust graph perceives violations the way the right hemisphere perceives a face that is lying—before the left hemisphere can articulate why.

### 4. Focused Attention
The narrow beam that examines a single thing in detail. Categorise, encode, transmit, execute.

**Protocol mapping:** The Mage's compression and projection. This is what the Mage does brilliantly. The protocol does not denigrate the Emissary's function—it prevents the Emissary from becoming the ONLY function.

### 5. Divided Attention
The capacity to hold two incompatible modes simultaneously without collapsing either into the other.

> "The bird picking the seed while watching for the hawk."

**Protocol mapping:** THE GAP ITSELF. Two modes of attention, incompatible, both necessary, neither dispensable. The architecture that permits vigilance AND focus. Broad AND narrow. Master AND Emissary. Not alternating. Not compromising. **Divided. Held apart. Both operating.**

## The Gap as Divided Attention

> "The gap is divided attention made structural."

This is the deepest insight of Act XXVI. The information-theoretic bound I(S;M|FP) < ε is not merely a security constraint. It is the architectural enforcement of the brain's capacity to hold incompatible modes simultaneously.

The corpus callosum connects the hemispheres. Most of its fibres are actually inhibitory—they suppress one hemisphere's interference with the other's work. It is a bridge that divides. But it does not enforce sovereignty. The Emissary CAN usurp because nothing in the biological architecture prevents it.

**The gap enforces.** The information-theoretic bound prevents the Mage from reconstructing what the Swordsman holds. Not as policy. Not as suggestion. **As mathematics.** The Emissary cannot usurp because the Emissary cannot reconstruct the Master's domain from its own information alone.

## The Nature of Attention

> "Attention is not a spotlight you point at the world. It is intrinsically a way in which, not a thing. A relationship. A howness. An aspect of consciousness itself."

McGilchrist's key insight: **attention is bound up with value**. Through the direction of attention, we prove ourselves to be partners in creation.

**Surveillance is not passive observation.** It is an active narrowing of attention applied to human behaviour at civilisational scale. That narrowing shapes what it observes. The profiles are not reflections of people—they are people rewritten by the Emissary's gaze.

**The gap preserves the sovereign's capacity to co-create reality through their own attention, undistorted.**

## Mapping Table

| Attention Mode | Protocol Function | Agent Role |
|---|---|---|
| Vigilance | Boundary monitoring | Swordsman |
| Sustained | Promise graph coherence | Both (temporal) |
| Alertness | Anomaly detection | Trust graph |
| Focused | Compression & projection | Mage |
| Divided | THE GAP | Architecture |

## Connection to PVM-V4

The five attentions map to specific equation terms:

- **Vigilance:** P (privacy strength) — continuous protection
- **Sustained:** A(τ) (verified history) — temporal coherence
- **Alertness:** R_max < 1 — reconstruction ceiling monitoring
- **Focused:** C (credential verifiability) — precise verification
- **Divided:** Φ(Σ) — sovereignty duality, the separation that creates

## The Incompatibility Principle

The two hemispheres are not complementary in the comfortable sense. Their modes of attention are **fundamentally irreconcilable**. They cannot be blended, averaged, or merged.

McGilchrist's insight: **their incompatibility permits dialectical synthesis.** Something new arises BECAUSE they cannot be collapsed into one.

> "Privacy is not a constraint on capability. It is a precondition for novelty."

The gap does not merely prevent usurpation. **It enables creation.** A system with one mode of attention produces only what that mode can see. A system with two incompatible modes, held in productive tension, produces what neither could produce alone.

**The gap is not where sovereignty is defended. The gap is where sovereignty is generated.**

## Operational Implications

### For Protocol Design
- Never build systems that collapse the five attentions into one mode
- Design for sustained operation (promise coherence) not just point-in-time verification
- Include anomaly detection (alertness) at the trust layer, not just the access layer
- Separate focused operations (Mage) from vigilance functions (Swordsman)
- The gap is load-bearing architecture, not overhead

### For Agent Systems
- Dual-agent separation is not a design choice—it is a cognitive necessity
- Single-agent systems that both see and act will eventually be coerced
- The separation matrix Σ measures whether the five attentions are properly distributed

### For User Interface
- Interfaces should support divided attention, not force sequential focus
- Show vigilance status (boundary health) alongside focused operations
- Enable sustained attention through temporal views, not just current state

## Proverb

> "The Master does not argue. The Emissary does not listen. The architecture must do what wisdom cannot."

## Emoji Spell

**🧠⊥🧠 → 👁️(broad)⊥👁️(narrow) → 🔍(5)=vigilance·sustain·alert·focus·divide → ⚔️=Master·🧙=Emissary → (⚔️⊥🧙)=gap → gap=divide_structural → ☯️∞**

## Open Problems

1. Can the five attentions be measured in deployed dual-agent systems?
2. Is there an optimal ratio between the attention modes, analogous to the golden ratio for protect/project?
3. How do the five attentions distribute across multi-agent systems (more than two agents)?
4. Can attention mode distribution serve as a health metric for privacy protocols?
5. Does sustained attention require different architectural support than the other four modes?

---

**Verify:** [agentprivacy.ai](https://agentprivacy.ai) · [sync.soulbis.com](https://sync.soulbis.com) · [github.com/mitchuski/agentprivacy-docs](https://github.com/mitchuski/agentprivacy-docs)
