MG: Abusing Chomsky

The human brain has evolved physical manifestations of language. Structures throughout itself which deal not simply with sound as an environmental phenomena, but with language as a means of both internal and external explication and communication.

Brains large and small, insectile and mammalian, have developed to deal with environmental stimuli like light, sound, and gravity, allowing them to successfully navigate and dominate their habitués evolving according to the presence and influence of these external forces on their environments; a whale’s experience of sound and gravity are very different from that of an owl, and their brains and bodies have physically responded over time in different ways to make the most of their particular experiences. The human brain, in turn, has responded to deal with the forces of a different layer of reality: narrative.

Enter the Quiditas, exerting a very specific pressure and influence, effecting the development of the human brain in order to be better perceived, interacted with, and used to improved the ability of humankind to survive and procreate.

Chronodopplers

Cloning was easy. Splicing in a group mind, significantly less so. Allowing that group mind to function when the nodes were spread up and down the time stream, impossible. But they did it.

Time travel itself, a different discipline with it’s own impossibilities was relevant to the creation of the ‘dopplers only in so much as their purpose was tied to it’s existence. Their method of communication did rely heavily on physics, but was tied to quantum entanglement, which turned out to have it’s own built in cross-time capabilities, and not to the issues of gravity and power which gave access to the time stream.

Entangling the ganglion in a ‘doppler tied to the group mind required sections of cerebral tissue be extracted, processed, and then re-implanted. Failure increased in likelihood each step along the way, which at best would leave you with a clone designed for, but unattached to the group mind, and at worst a corpse. Because the group mind could only support so many nodes at a time, a creche of unaltered dopplers was kept, ready to go through entanglement whenever an existing node went dark and needed to be replaced.

There were only two stem lines successfully bred for a group mind, both of them based on the x-chromosome. For historic reasons of placement and success, a y based line was continually sought, but had never been successfully developed. The power balance between men and women for so much of history was such it was more difficult to achieve the desired changes.

Autonomy Won't Require AI

The virus was designed by the hacking group Laughing Panda, an offshoot of the old Russian Fancy Bear collective. It was modeled on a handful of ideas: new advances in machine learning involving a smaller code base and a smaller sample size of training data, programatic code switching, a newly discovered exploit in Adobe’s Virtual VR Studio program which allowed code to draw from cloud caches as needed, but could be fooled by a subset of SSH certificates issued by one of the providers, and a recent attack . . .

Read More

Stand Guard

She had the face of an angel.

Carefully folded in the right rear pocket of her jeans, she'd cut it from the Seraph Anadial the night he came for her youngest son.

She was not surprised when it was an angel who came for the boy. She knew something would eventually. It was why she kept such careful watch over him, why she had the long were-bone knife in the first place, despite the small fortune it had cost.

Her family had a long history with the malakhim, tracing back even before her ancestors had joined their fragmented community of Ethiopian Jews. For as long as she could remember one of the highest holy days of the year for her family was the celebration of child slaughter at angelic hands: it wasn't the passing over of their own which bought the Israelites their freedom, but the spilled blood of Egypt's first born. It made a certain sense they would be the first to come after hers.

Lambs blood was one of many tools she used to try and keep her son safe against a poisoned fate, luckily it wasn't the only one.

She had the angel's wings as well, but they didn't travel as well.

Fated

Clotho quit the Moirai when humans began splicing machine code into their DNA.

Atropos had already retired to the French coast, scissors no longer able to cut the threads passed to her, reinforced as they were with technology and science developed to levels beyond her own mystic powers.

Lachesis still measured, but now she wore teflon gloves, the soft, silky lines of life having become cold and razor sharp.

Hacking The Ghost

Finding the frequency wasn’t a fluke so much as the dedication of crackpots. The efforts of ghost hunters and paranormal investigators whose sustained pseudo-science crackpottery was able to capture enough samples of the ghost frequency to eventually warrant attention of the scientific community.

It was years before investigations looped back around to give some measure of validation to the paranormal community. The localized frequencies weren’t coming from space, weren’t bleed off from existing EM emitting sources, and had all the hallmarks of intentionality.

It was longer still before it was determined they weren’t attempts at external communication, the sources weren’t trying to talk to each other or us, but were bleed over from unshielded, internal processes.

Eventually, enough samples were gathered and examined by programmers for it to be determined the signals were code. The capture of faint, unshielded systems running through their internal programs. The bleed of an ephemeral operating system executing.

The syntax wasn’t complex when it was finally deciphered. When enough keywords and types were identified to start making sense of the instruction sets. It was a low level language, some type of assembly code written to a strange and unknown processor whose nature could only be inferred from what was understood about the code running on it.

It was an adjusted binary system which had to take into account overlapping operating environments. There were only a handful of functions focused on basic motion through the two environments, a limited number of actions, a limited number of sounds, and a limited number of inputs.

Once enough of the code had been collected and deciphered to allow for basic writing of it and equipment had been designed to broadcast as well as receive the frequencies, work began on hacking into system.

Success was limited at first. Though the code base was simple, exploits were difficult to find. The language seemed not be designed for extending, and once an instance of the code was running, once an individual ghost was created, it seemed to be designed to run in a loop with a limited number of possible branches. It was hardened against code injection by virtue of the simplicity of the language and the standalone, repetitive nature of the ghosts.

The exploit initially discovered had to do with the program’s termination parameters. When the ghost received a certain set of inputs which varied from ghost to ghost, but which fell into a fairly small group of types, the program had the ability to terminate itself and for all intents and purposes the ghost disappeared.

At first this allowed only for early termination. If enough of a ghost’s code could be gathered to identify what termination input it was waiting for, the input could be generated and broadcast, forcing the ghost to shut down. The public called this ‘ghost busting’ and the paranormal community latched onto the process to commercialize it. Businesses sprang up, reality TV shows, a whole industry.

The scientists, though, saw this as only a baby step, and not a good one, as in forcing the ghost to terminate, they also lost their connection and ability to collect more data.

Eventually, through trial and error, it was found that new types of input, outside the parameters of the original design, but incorporating some of the stimulus being looked for by the OS could cause the ghost to glitch, and from that they were able to refine the process until a pattern was discovered which could force the ghost to incorporate new instructions as valid and executable.

At this point, the ghosts became hackable.

This level of work was classified and owned by the government, of course, which also meant it ended up being weaponized.

A manual was created defining the input and output parameters of the OS, the set of functions the OS was designed to accept, the set of known non-native functions which could be reliably injected, and a syntax to be used in designing new non-functions.

The most obvious use of hacked ghosts were spying and messaging. A basic AV capture routine could be passed into a ghost, then instructions for the ghost to go to specific coordinates, run the capture, then report to a retrieval station where it would give up the captured data to be reconstituted for use.

Limitations of the frequency made it difficult to communicate with the ghosts over distances, so initially all the requirements for an operation had to be coded at the beginning, hoping the ghost wouldn’t run into unexpected input and conditions. Later, boosters which could successfully increase the range of signaling were developed, but it was never a situation where a station anywhere in the world could control a given ghost anywhere else.

Third Ways

"Reality loves its simple duality. It tells us both in this case there are only two choices: forsake all else or forsake each other." He looked hard at the defeat in her eyes, at the loss already blooming there.

"But I have never been a fan of reality's fascism. I understand there are no other choices. That doesn't mean I won't tear a hole in the world to make another way."