Timothy Leary’s Trip Thru Time (born on October 22 in 1920)

Then this tree, like a cosmic vacuum cleaner, went ssssuuuck, and every cell in my body was swept into the root, twigs, branches, and leaves of this tree. Tumbling and spinning, down the soft fibrous avenues to some central point which was just light.

It’s Timothy Leary’s birthday and for your pleasure, here is the original version of a chapter from Timothy Leary’s Trip Thru Time

by R.U. Sirius

Timothy Leary AP (After Psychedelics) — The Harvard Psilocybin Project

 

Timothy Leary’s First Trip

When David McClellan, director of the Center for Personality Research at Harvard asked Timothy Leary to teach there under his aegis, he told Tim to “stir things up a bit.” In his later years, Leary liked to quip, “I think he got his money’s worth.”

Leary first heard about the effects of psilocybin in 1959 from his friend Frank Barron, who had recently tried the mushrooms and came away impressed by their visionary properties. Tim reacted negatively to Barron’s suggestion that he try them. Lacking any awareness of psychedelic substances — and in spite of Barron’s vivid description — he thought of drugs, along with such gross physical methods as electroshock therapy, as blunt, harmful, coercive tools that behavioral psychology used to force patients to conform. However, the following year — perhaps undergoing one of those much vaunted “midlife crises” as his fortieth birthday was approaching — Leary suddenly got the urge to try the mushrooms.

Timothy Leary’s poolside psilocybin trip on August 9, 1960 in Cuernevaca, Mexico is an oft-told tale — central, as it is, to the history of Western psychedelic culture.

The ‘shrooms were copped by Leary’s friend, historian Lothar Knauth, from “Old Juana,” a disheveled, hunchbacked old woman in raggedy clothes who led him wordlessly out of town and onto an old dirt road before effecting the deal.

Timothy Leary’s first trip began pleasantly. He felt lightheaded “as if from laughing gas.” One of the people who had not taken the drug had been assigned to take notes. He was nerdily-dressed in oddly mismatched clothes. Leary, seeing him scribbling earnestly in his notepad, went into fits of laughter that only increased as he reflected on the pomposity of socialized professionals, himself included.

As the trip intensified, he had a brief moment of panic, worrying that the effects may be too strong, and that his kids, playing blissfully unaware inside the villa shouldn’t be around a bunch of drug-crazed adults. He had one of the straight adults send the kids off to the movies for the afternoon. Then he let himself go.

In High Priest and other autobiographical books, Leary describes visions of “Nile Palaces, Bedouin pleasure tents, mosaics of flaming color, jewel encrusted reptiles, mosaics lit from within.” And then he re-experienced all of evolution; floating “down through snake time, fish time, giant jungle-palm-time, green lacy fern leaf-time” until “hello, I am the first living thing.”

Read more “Timothy Leary’s Trip Thru Time (born on October 22 in 1920)”

how sex negativity & authoritarian culture meets harassment culture & makes everything worse

A Conner Habib Twitter Thread

1 We can’t see sex clearly in our culture. That means not only will our culture of harassment be damaging, but also our responses to it.

2 Punitive measures that empower that state and/or deepen sex-stigma make matters worse.

3  We must see perpetrators of harassment as disgusting in actions. But we ALL live in a sex negative culture. What are the implications?

4 How can we formulate responses to unhealthy & damaging actions when our BASELINE — & this is for almost ALL of us — is unhealthy & damaged?

5 The way misogynists/alt-right/bros deal with this? Blame the victims of the harassment. “They’re just fucked up about sex.”

6 Instead we need to support victims AND see how the currents of sexual repression/negativity are still affecting us even as we do so.

7 What are the BEST ways to support victims? How might certain types of support co-create a culture where more sexual harassment occurs?

8 Not easy questions to answer. But we must remember: being better than harassers doesn’t mean our actions are right, just not as monstrous.

Check out Conner Habib’s video show Against Everyone.  Habib is an author, a lecturer, a porn performer, and a sex workers’ rights advocate. He’s Vice President of the Adult Performer Advocacy Committee and a member of PEN America.

Support his Patreon. He’s creating a podcast & web series on sex, the occult, and radical philosophy. And, oh yes, that twitter feed!

Becoming “Reality Hackers”

 

His (Sterling’s) famous introduction for that book (Mirrorshades), describing what cyberpunk was doing in fiction — seemed to express precisely what a truly contemporary transmutational magazine should be about.

the transition from MONDO 2000 to Reality Hackers — excerpt from Freaks in the Machine MONDO 2000 in late 20th Century Technoculture (yes… still in progress)

R.U. Sirius

Some time in 1988, we made a rash decision. Despite High Frontiers relatively successful rise within the ‘zine scene (where 15,000 in sales was solid), we decided to change the name of the magazine itself to Reality Hackers.

It was my idea.

We’d been hipped to cyberpunk SF and I’d read Gibson’s Neuromancer and Sterling’s Mirrorshades collection. His famous introduction for that book, describing what cyberpunk was doing in fiction — seemed to express precisely what a truly contemporary transmutational magazine should be about.

Here are some parts of it: “The term, (cyberpunk) captures something crucial to the work of these writers, something crucial to the decade as a whole: a new kind of integration. The overlapping of worlds that were formerly separate: the realm of high tech, and the modern pop underground.

“This integration has become our decade’s crucial source of cultural energy. The work of the cyberpunks is paralleled throughout the Eighties pop culture: in rock video; in the hacker underground; in the jarring street tech of hip hop and scratch music; in the synthesizer rock of London and Tokyo. This phenomenon, this dynamic, has a global range; cyberpunk is its literary incarnation…

An unholy alliance of the technical world and the world of organized dissent — the underground world of pop culture, visionary fluidity, and street-level anarchy…

For the cyberpunks… technology is visceral. It is not the bottled genie of remote Big Science boffins; it is pervasive, utterly intimate. Not outside us, but next to us. Under our skin; often, inside our minds.

Certain central themes spring up repeatedly in cyberpunk. The theme of body invasion: prosthetic limbs, implanted circuitry, cosmetic surgery, genetic alteration. The even more powerful theme of mind invasion: brain-computer interfaces, artificial intelligence, neurochemistry — techniques radically redefining — the nature of humanity, the nature of the self. The Eighties are an era of reassessment, of integration, of hybridized influences, of old notions shaken loose and reinterpreted with a new sophistication.

Cyberpunk favors “crammed” loose: rapid, dizzying bursts of novel information, sensory overIoad that submerges the reader in the literary equivalent of the hard-rock “wall of sound.” Well, then… Read more “Becoming “Reality Hackers””

The Medium is the Message and the Message is Voyeurism (1994)

by R.U. Sirius & St. Jude (Wired magazine, 1994)

She’s permed, chubby, hose ‘n’ heels… Mom. She stands up when Phil or Sally Jessy or Oprah aims the microphone. Her voice rises. Her face tumesces. She’s outraged by somebody’s sexual behavior. Oprah’s eyes register $$ – the big score. This is the very essence of daytime talk TV.

In fact, this G-rated money shot is set up for you many times every single weekday. It works like this: The sacrificial “guest” is somehow off-center – not quite your married missionary heterosexual. The host announces the deviant’s category – say, “Men Who Love Shoes Too Much” – then turns to the camera and wonders gravely about this group’s impact on society, arming the audience for attack. Then audience and guest have it out over whether or not the guest should exist. After an hour, the shoefucker is led off, back to the Green Room, bleeding profusely. Then everyone is thanked. Commercials play. Credits roll. I imagine cigarettes being lit all around by audience, guest, and host – as most shows seem to build, then climax.

The ritual being observed here on talk television, and on television at large, is a mapping of classic small-town dynamics onto the media global village. Remember the small town – that tiny-minded, busy-bodied, bully-fisted little burg? No you don’t, because your grandpappy scraped it off his shoes in ought-six so he could get himself a life.

In this century the urban drift became a stampede. Why? The bright lights were calling, but your ancestors and mine were ejected out of Hickwad by the peer pressure.

I Get to Be Me 

Now, in the TV global village, rites based on small-town traditions like “conform-or-die,” “shut-up-and-take-it,” and “you’ll-braise-in-eternal-torment” are being celebrated just like in the old days. Now the targets offer themselves freely, cheerful as volcano virgins, because these bad boys and girls – criminals, perverts, or cultural dissidents – are working for their camera time.

Camera time is the irresistible bait of a media culture. The victims get to be themselves, get to flaunt being themselves – can even try to make converts, before the little red light goes out. After the hatefest, lighting up, the armchair lynchmob can catch the cleanup actions: see the arrests on Fox’s Cops, follow the trial on Court TV and get the smirking denouement on A Current Affair. Read more “The Medium is the Message and the Message is Voyeurism (1994)”

How did we let it get so bad? (Everybody is Pwned)

By: Renketsu Link

You’ve undoubtedly been trying to figure out what to do about what might have been the worst data breach this year, the compromise of the multinational credit bureau Equifax.  As it stands now, the credit histories of millions of people in the United States and other parts of the world are now in the wild and undoubtedly being sold on the black market at cost (nowadays, rather less than $20 per dossier) and if you’re reading this you’ve probably got free credit monitoring until the year 2030.  But that doesn’t answer the key question here: How the fuck did things get so bad?

 

The answer is a complex one and involves significant amounts of suck and fail at every level of complexity.  Let’s start at the top of the stack.

Instituting a security program requires funding from the company itself as well as buy-in from upper management.  Without money, the system administrators at the company can only cobble things together in their spare time – hardening, monitoring, patching, reporting, and deploying the occasional passive security measure.  In some companies to this day, they have to do this on the down low because management there is actively hostile toward security and will force the admins to remove “those useless things.”  Some measures require the purchase of additional hardware and license keys, and not every budget has a couple of thousand dollars to spare on a few new boxes.  If you don’t think places like that exist, they do – I’ve worked at a few, and they make our work much, much easier.  Even if they have money, the C-levels (Chief * Officers), V-levels (Vice *), and D-levels (Directors) need to make it public that they support the security program, will abide by it, and officially order everyone who works there to abide by it, too.  All it takes is one C-level who doesn’t give a fuck to cut the nuts off of the entire thing.

Second, let’s talk about so-called security practitioners.  Probably 80% of the “cybersecurity experts” I’ve butted heads with are barely able to turn on a computer, let alone actually put up a fight.  Most of the security industry pimps certifications like the CISSP or Certified Ethical Hacker sheepskin don’t actually know anything useful about security in any way, shape, or form.  The Wikipedia pages talk a good game by throwing around words like “provable,” “experts,” “ethical,” and “cyber,” but if you actually read any of their training texts (which, of course, are published by those certification bodies and cost as much as your average college textbook) usable information is pretty scarce.  Let’s take the CEH: If you look at what it actually teaches you (things like not running telnet, setting up firewalls, installing patches, and not running all your shit as root) it actually reflects the publically known stuff about security in the late 1990’s.  You’d be hard pressed to find a Linux or real UNIX that actually includes in.telnetd these days but doesn’t mention anything about the sorts of vulnerabilities that one finds today (like process injection or memory hardening evasion techniques).  As for the CISSP, it tells you up front that the Common Body of Knowledge is a mile wide and an inch deep (or more recently “at the thirty-thousand foot view”) but in the same breath they’ll also tell you that when you actually sit for the exam all you have to do is pick the least wrong answer; if you actually know anything about security, for about 74% (if I did my math right (hey, the book’s a thousand pages, cut me some slack)) of the questions have all incorrect answers, and if you actually did what you were taught… well, you know how I make my living, so by all means, keep doing exactly what you were taught.

attrition.org's Charlatans page would actually be the size of Wikipedia if Jericho was still updating it.

Practically every company out there has some legal or industry-specific guidelines that they have to at least make an attempt to comply with, and there’s no shortage of them: PCI-DSS, NIST SP 800-53, NSA IA, HIPAA, ISO 27001… I could go on and on, but all you need to know is that they all say basically the same thing: Google “how do I harden <insert operating system or appliance here>,” follow the instructions if the link isn’t from a perfectly legitimate Russian or Chinese business conglomerate, patch your shit every couple of days, read your logs and respond to what you see, and generally don’t be a dumbass.  In practice, however, they get treated as lists of checkmarks or cells in a spreadsheet.  A couple of meetings are scheduled and suffered through by everybody who bothered to show up (of course, at least one Android phone that now belongs to someone like me is on the table) and roadmaps are drawn up that are supposed to act as a timeline for security measures that need to be instituted.  Sometimes, once or twice a year, a security assessment is held; rarely a security company is hired to do the work.  Then, and here’s the fun part, the remediation loophole kicks in.  It goes like this: Every security program has a requirement built into it that basically says, “You now have x months to fix the findings from this assessment, after which time we’ll run another assessment.”  You probably see where this is headed.  Nothing happens to fix the vulnerabilities found, the next assessment happens, nothing has changed (usually things have gotten worse in the meantime), and during the burndown meeting someone says “Okay, you now have x months to fix the findings from this assessment, after which time we’ll run another assessment.”  Over and over and over again.

Of course, there are a few out there who actually have a clue.  They’re the ones who don’t last very long because they eventually get tired of being ignored, quit, and occasionally go into business as hired guns with their inside knowledge (come on in, the water’s fine!)  They run their scans, tell the sysadmins to patch their shit and harden SQL Server, and read their logs.  They’re also the ones who get told that installing patches adds bugs instead of fixing them, get told that complex passwords are unnecessary, get bitched out at all-hands meetings for trying to institute multifactor authentication because it adds an extra step to normal work (meaning that your Battle.net account probably has stronger authentication than your bank), and watch in horror as C-levels plug flash drives they found in the parking lot into workstations where the user’s logged in as the local admin.  The lot in life of a real security professional is a sad one that often results in functional alcoholism, endless bitching at hacker cons (attended under the pretext of “vacation” because actually hanging out with hackers can cost someone one of those expensive certifications if anyone finds out) and often early retirement to a log cabin in Appalachia.  That’s if they don’t get fired for actually doing their jobs; nobody ever likes being shown that their security program doesn’t actually work and the messenger always gets shot.

Next in line are the sysadmins.  As with any group, there is a subset that actually know what they’re doing, and go as far as they need to so they can do their jobs (which, if they know what they’re doing consists of automating everything in the first month, fucking off the rest of the time, and having a boss key set up so they can look busy whenever somebody wearing a tie walks by).  The rest are content to stand up a Window or Linux box, throw an app or two on it, and let it go at that.  Some don’t bother patching anything, either because it’d be too much work or because the developers won’t let them (“If you patch that you’ll break our production app!”)  Most have a patch cycle that’s entirely too long (weeks to months), which leaves them vulnerable for extremely long periods of time.  Also, operating system ecosystems are becoming more security hostile in very subtle ways (you’re welcome).  There is no shortage of Windows APIs that let a creative user turn off or evade security policy entirely, and systemd has been a godsend to hackers the world over.

Last and certainly not least are the end users, who may as well be on our payroll because they make it all possible.  They’re the ones who use Password_1 as their passwords because password complexity guidelines don’t let them use strings like qu;;o5Eey9aiV-ai3FexiC<a7cu2hGhi|g}e (okay, so that’s not entirely their fault but I’m not above a cheap shot now and then (trolled people are people who make exploitable mistakes)), open every document sent to them from a vaguely official looking e-mail address, and are trained from an early age to click on buttons that make error messages go away. Let’s not forget those wonderful people who forward our trojaned documents to entire teams and make it rain shells.  App developers are the ones who demand that sysadmins not lock their shit down because they don’t know how to write robust code (you’d be amazed at the e-mail threads where a stupid bug made by a dev was blamed on a security patch) and say that many different classes of RCE are theoretical and thus are wastes of time to mitigate (protip: Getting caught selling 0-days in your own code is a career limiting move.)  Analysts that spend more time at work surfing porn than looking at system logs or vuln reports are always fun, plus if you pop their laptops they occasionally have security reports that make life easier for us in the short term.

The Cyberpunk Issue — Pull Quotes from MONDO 2000 Issue #1 (1989)

A cyberspace experience might be a simulation of an entirely imaginary world as long as the space is physically lawful and self-consistent. Autodesk

 

Bush doesn’t want us to know whether he’s telling the truth of lying, but he wants us to be sure he’s not stoned while doing it. Robert Anton Wilson

 

McLuhan seemed to be giving permission for youth culture, rock & roll, and post-print libidinal tactility to finally, mercifully dismantle linear stuffed-shirt Western Civilization. Terence McKenna

 

Gibson has produced nothing less than the underlying myth, the core legend, of the next stage of human evolution. Timothy Leary

His females are shaman ladies, sophisticated wizards, playful, humorous, hip diviners. Timothy Leary

 

Burroughs found 50’s science fiction and used it like a rusty can opener on society’s jugular. William Gibson

McLuhan’s revenge. Media monsters . . . the worst street gang you ever ran into were, at the same time, intense conceptual artists William Gibson Read more “The Cyberpunk Issue — Pull Quotes from MONDO 2000 Issue #1 (1989)”

Jamming the Signal: Better Living Through Subliminal Messages

by John Ohno

A little over ten years ago, I discovered a program that shipped with my screensaver package called xsublim. This program (which no longer ships with xscreensaver, and in fact no longer builds) takes a text file, splits it into individual words, and then displays each word on random place on your screen for a tiny fraction of a second. Experimenting with it led me on an interesting path through the backwoods of cognitive science.

XSublim was written as a lark, and by default it will display slogans from 1984 and They Live. However, in the half century since pop-culture’s ideas about subliminal messages crystallized, research has progressed: contrary to the media depictions of frightening hypnotic mind control, subliminal messages have only weak and difficult-to-predict effects, and complicated messages (longer than one or two words) are barely processed at all.

I’m mostly interested in the mind-expanding (rather than mind-controlling) potential of subliminal messages — an area   they are ultimately better suited for. The point of greatest interest is the way that subliminal messages bypass conscious awareness and therefore do not require conscious attention: subliminal learning is a little bit like earning royalties or interest, in that the returns may be small but the effort-to-return ratio is nearly zero. Replacing a week of active study with a year of passive study is a no-brainer.

Mechanism of action

When we talk about subliminal messages, what we’re really talking about is what cognitive scientists call ‘priming’: a weak nudge that inclines us toward particular associations. Priming creates a sense of familiarity and attractiveness — flash faces on a screen, and those faces will be rated as more attractive during a survey. Priming also encourages similar ideas: people who see the word “water” flashed on a screen will be slightly more likely to interpret “bank” as “river bank” than as “financial institution” and those who see “doctor” will respond slightly more quickly to medical-related prompts — a concept known as “spreading activation.” It does this just by seeding a pattern in working memory — ‘priming the pump’ and making related thoughts flow more easily.

This makes it not terribly useful for advertising. A subliminal ad can make people who are currently thirsty slightly prefer Coca Cola, but it can’t get them to buy a case when they already have Sprite in the fridge. Similarly, the impulse is so weak that it can’t be used to get people to act out of character (you can’t be subliminally instructed to kill the president, although if you are playing a first person shooter video game it might be able to get you to shift your target one in a thousand times). If we want to squeeze utility out of subliminal messages, we need to be a little more creative.

 

Applications

Subliminal exposure can produce a sense of familiarity, which can be used to aid learning. Even though seeing the contents of a math textbook subliminally a million times will not let you skip the math class, it will make the terms and patterns seem more familiar, less imposing, and easier to remember — so later study will be easier. Seeing the contents of the textbook after class can help keep the ideas in memory. I typically begin to display the ebook versions of books I intend to read months in advance, continuously — making the actual task of reading them much faster, when I finally get around to it. I have had dense philosophical texts in circulation for years. Read more “Jamming the Signal: Better Living Through Subliminal Messages”

Exocortices: A Definition of a Technology

By The Doctor

A common theme of science fiction in the transhumanist vein, and less commonly in applied (read: practical) transhumanist circles is the concept of having an exocortex either installed within oneself, or interfaced in some way with one’s brain to augment one’s intelligence.  To paint a picture with a fairly broad brush, an exocortex was a system postulated by JCR Licklider in the research paper Man-Computer Symbiosis which would implement a new lobe of the human brain which was situated outside of the organism (though some components of it might be internal).  An exocortex would be a symbiotic device that would provide additional cognitive capacity or new capabilities that the organism previously did not posses, such as:

  • Identifying and executing cognitively intensive tasks (such as searching for and mining data for a project) on behalf of the organic brain, in effect freeing up CPU time for the wetware.
  • Adding additional density to existing neuronal networks to more rapidly and efficiently process information.  Thinking harder as well as faster.
  • Providing databases of experiential knowledge (synthetic memories) for the being to “remember” and act upon.  Skillsofts, basically.
  • Adding additional “execution threads” to one’s thinking processes.  Cognitive multitasking.
  • Modifying the parameters of one’s consciousness, for example, modulating emotions to suppress anxiety and/or stimulate interest, stimulating a hyperfocus state to enhance concentration, or artificially inducing zen states of consciousness.
  • Expanding short-term memory beyond baseline parameters.  For example, mechanisms that translate short-term memory into long-term memory significantly more efficiently.
  • Adding I/O interfaces to the organic brain to facilitate connection to external networks, processing devices, and other tools.

What I consider early implementations of such a cognitive prosthetic exist now and can be constructed using off-the-shelf hardware and open source software.  One might carefully state that, observing that technologies build on top of one another to advance in sophistication, these early implementations may pave the way for the future sci-fi implementations.  While a certain amount of systems administration and engineering know-how is required at this time to construct a personal exocortex, system automation for at-scale deployments can be used to set up and maintain a significant amount of exocortex infrastructure.  Personal interface devices – smartphones, tablets, smart watches, and other wearable devices – are highly useful I/O devices for exocortices, and probably will be until such time that direct brain interfaces are widely available and affordable.  There are also several business models inherent in exocortex technology but it should be stressed that potential compromises of privacy, issues of trust, and legal matters (in particular in the United States and European Union) are also inherent.  This part of the problem space is insufficiently explored and thus expert assistance is required.

Here are some of the tools that I used to build my own exocortex:

Ultimately, computers are required to implement such a prosthesis.  Lots of them.  I maintain multiple virtual machines at a number of hosting providers around the world, all running various parts of the infrastructure of my exocortex.  I also maintain multiple physical servers to carry out tasks which I don’t trust to hardware that I don’t personally control.  Running my own servers also means that I can build storage arrays large enough for my needs without spending more money than I have available at any one time.  For example, fifty terabytes of disk space on a SAN in a data center might cost hundreds of dollars per month, but the up-front cost of a RAID-5 array with at least one hotspare drive for resiliency was roughly the same amount.  Additionally, I can verify and validate that the storage arrays are suitably encrypted and sufficiently monitored.

Back end databases are required to store much of the information my exocortex collects and processes.  They not only hold data for all of the applications that I use (and are used by my software), they serve as the memory fields for the various software agents I use.  The exact databases I use are largely irrelevant to this article because they all do the same thing, just with slightly different network protocols and dialects of SQL.  The databases are relational databases right now because the software I use requires them, but I have schemes for document and graph databases for use with future applications as necessary.  I also make use of several file storage and retrieval mechanisms for data that parts of me collect: Files of many kinds, copies of web pages, notes, annotations, and local copies of data primarily stored with other services.  I realize that it sounds somewhat stereotypical for a being such as myself to hoard information, but as often as not I find myself needing to refer to a copy of a whitepaper (such as Licklider’s, referenced earlier in this article) and having one at hand with a single search.  Future projects involve maintaining local mirrors of certain kinds of data for preferential use due to privacy issues and risks of censorship or even wholesale data destruction due to legislative fiat or political pressure.

Arguably, implementing tasks is the most difficult part.  A nontrivial amount of programming is required as well as in-depth knowledge of interfacing with public services, authentication, security features… thankfully there are now software frameworks that abstract much of this detail away.  After many years of building and rebuilding and fighting to maintain an army of software agents I ported much of my infrastructure over to  Andrew Cantino’s Huginn.  Huginn is a software framework which implements several dozen classes of semi-autonomous software agents, each of which is designed to implement one kind of task, like sending an HTTP request to a web server, filtering events by content, emitting events based upon some external occurrance, sending events to other services.  The basic concept behind Huginn is the same as the UNIX philosophy: Every functional component does one thing, and does it very well.  Events generated by one agent can be ingested by other agents for processing.  The end result is greater than the sum of the results achieved by each individual agent.  To be sure, I’ve written lots of additional software that plugs into Huginn because there are some things it’s not particularly good, mainly very long running tasks that require minimal user input on a random basis but result in a great deal of user output.

Storing large volumes of information requires the use of search mechanisms to find anything.  It can be a point of self-discipline to carefully name each file, sort them into directories, and tag them, but when you get right down to it that isn’t a sustainable effort.  My record is eleven years before giving up and letting search software do the work for me, and much more efficiently at that.  Primarily I use the YaCy search engine to index websites, documents, and archives on my servers because it works better than any search engine I’ve yet tried to write, has a reasonable API to interface with, and can be run as an isolated system (i.e., not participating in the global YaCy network, which is essential for preserving privacy).  When searching the public Net I use several personal instances of Searx, an open source meta-search engine that is highly configurable, hackable, and also presents a very reasonable API.

I make a point of periodically backing up as much of my exocortex as possible.  One of the first automated jobs that I set up on a new server or when installing new software is running automatic backups of the application as well as its datastores several times every day.  In addition, those backups are mirrored to multiple locations on a regular basis, and those multiple locations copy everything to cold storage once a day.  To conserve mass storage space I have a one month rotation period for those backups; copies older than 31 days are automatically deleted to reclaim space.

In future articles, I’ll talk about how I built my own exocortex, what I do with it, and what benefits and drawbacks it has in my everyday life.  I will also, of course, discuss some of the security implications and a partial threat model for exocortices.  I will also write about what I call “soft transhumanism” in the future, personal training techniques that form the bedrock of my technologically implemented augmentations.

After a talk given at HOPE XI.

This is the first in a series of articles by The Doctor

The Doctor is a security practitioner working for a large Silicon Valley software-as-a-service company on next-generation technologies to bring reality and virtuality closer together.  His professional background includes security research, red team penetration testing, open source intelligence analysis, and wireless security.  When not reading hex dumps, auditing code, and peeking through sensors scattered across the globe he travels through time and space inside a funny blue box, contributes designs and code to a number of open-source hardware and software projects, and hacks on his exocortex,a software ecosystem and distributed cognitive prosthesis that augments his cognitive capabilities and assists him in day to day life collecting information and by farming out personally relevant tasks.  His primary point of presence is the blog Antarctica Starts Here.

 

Pull Quotes from “Kids Do The Darnedest Drugs”: Issue #2 High Frontiers

Image by Lord Nose

I’m pretty sure we only printed 2,000 copies of High Frontiers #2 (1985) just like #1. But this time, we sold most of them. Ron Turner at Last Gasp was very excited by it. He was sure we would be sued by Disney because we had the three-eared Mickey Mouse holding the Central Intelligence Agency hit of blotter acid. And all that happened, according to Turner, was that someone from Disney went to a single popular magazine rack in L.A. and made them pull it from the shelf and hand them over. Odd. Not sure how that works. Maybe some of the workers at Mouschwitz just wanted some free copies.

Image by Lord Nose

Excerpt from Freaks in the Machine: MONDO 2000 in Late 20th Century Technoculture (in progress)

 

The hydrogen bomb (was) the flash of the first synapse of an etheric brain which is extended temporally as well as spatially. Robin Hoor Khuit

 

 

Everyone was looking at Ram Dass like he must be the Magus riding out of the north.  Peter Stafford

 

Learn how to control your own nervous system and the whole universe is yours; that’s the transmutation the alchemists were working for.  Robert Anton Wilson

 

 

There are about six different realities that Bell’s Theorem makes possible, none of them are ordinary. They’re all preposterous Nick Herbert

 

Joyce, Guernica, Auschwitz, lunar landings, nuclear weapons, psychedelic religion, and computer networking — markers on a path that may eventually carry us toward functional anarchy  Terence McKenna

 

 

When you take MDA and LSD simultaneously, you get a sort of matrix multiplication effect where you can observe yourself in all possible incarnations. Zarkov

 

 

[With the Brotherhood of Eternal Love] It was a religious zeal that life is better suited to being high.  Michael Hollingshead

 

 

Revolution and evolution, they’re both a process. A revolution never ends; or once a  revolution ends, it’s  probably a dictatorship  Paul Krassner

 

 

I realized that I was seeing “god central.” The central panel I saw was the control panel of the entire universe.  Zarkov

 

 

There was a giant punk goddess with a green mohawk and full body armor  screaming, “is it finally strong enough for you?” Terence McKenna

 

 

Magnificent extragalactic trisexual desires multiple sex with all creatures any time/any space. Non-smokers only. No weirdoes.  Amalgam X

 

Mad Scientists Wanted for Research on Irrational Mechanics

by Giulio Prisco

I am a mad scientist interested in future science and technology able to resurrect the dead from the past. I look for hints, clues and glimpses in today’s speculative, highly imaginative science. Do you want to join me?

The recently published book “Technological Resurrection: A Thought Experiment,” by Jonathan Jones, provides a short and readable first introduction to our ideas on technological resurrection. See my review on Mondo 2000. According to Jones, future engineers will be able to teleport our consciousness to the future with ultra-technology based on quantum effects, wormholes and whatnot.

Technological resurrection science is likely to involve next-next generation physics of huge energies, infinitesimal scales, space-time noodles and quantum ultra-weirdness, not to mention higher dimensions and parallel worlds. The same science will take us to the stars, perhaps faster than light (FTL), perhaps open the way to some sort of time travel, and perhaps permit understanding God(s). Or build God(s), or become God(s).

I call this research program “Irrational Mechanics” (see below).

Before becoming a mad scientist, I used to be a “real” scientist in academy and public research centers. I know the science establishment pretty well, certainly well enough to realize that what I’m saying is so heretical that no scientist can enter safely. There are a lot of scientists who entertain similar ideas, but even mentioning them is career suicide. Developing these ideas is for politically incorrect amateur citizen scientists like me, and perhaps you.

We can’t do real research because our skills are too limited or too rusty, and/or we have to do other things for a living. What we can do is research on others’ research. But that’s good enough, because the heavy lifting work is already done by top scientists, only they aren’t allowed to even mention some deep implication of their own work. Laying out the heretic implications is up to us. Of course, we must understand the science first.

For example, many enthusiasts believe that the spooky correlations between quantum-entangled particles could be used to send FTL instant messages, or signal backward in time. But unfortunately, according to our current understanding, entanglement is real but can’t be used to send FTL instant messages.

“mad scientist” Frank Tipler

Why? Because measuring the spin of one of a pair of entangled particles always gives a random result  —  even if the results of the two measurements are correlated — and any attempt to preset the spin of a particle would break the entanglement. A good analogy is two decks of “magic” cards that are always in the same order, but the magic only works if both decks are well shuffled first, and cheating breaks the magic. Read more “Mad Scientists Wanted for Research on Irrational Mechanics”