Burning Bridges
Burning bridges:
No warmth, no afterglow
from smoldering piers,
Just bitter tears
cutting trails through ash,
Trails impossible to follow
to places she'll never forget.
Burning bridges:
No warmth, no afterglow
from smoldering piers,
Just bitter tears
cutting trails through ash,
Trails impossible to follow
to places she'll never forget.
It's been more than six months since my trip to Iceland, and I continue to struggle daily with wanting to write about it, but every sentence I put to screen just ends up feeling vapid and painful.
It truly felt like I was being exposed to the secret life of the world, the bones and dreams and breath of it, in a way I had only ever glimpsed before, and I still find myself dumbstruck by the magnitude.
Clotho quit the Moirai when humans began splicing machine code into their DNA.
Atropos had already retired to the French coast, scissors no longer able to cut the threads passed to her, reinforced as they were with technology and science developed to levels beyond her own mystic powers.
Lachesis still measured, but now she wore teflon gloves, the soft, silky lines of life having become cold and razor sharp.
fiber optic vines
splicing the world tree
volva injecting runic code
overflow error
destiny crash
reboot yggdrasil
root access granted
the function of this system
to rise
hold
feel
to believe for the faithless
momentum will not
become condemnation
Finding the frequency wasn’t a fluke so much as the dedication of crackpots. The efforts of ghost hunters and paranormal investigators whose sustained pseudo-science crackpottery was able to capture enough samples of the ghost frequency to eventually warrant attention of the scientific community.
It was years before investigations looped back around to give some measure of validation to the paranormal community. The localized frequencies weren’t coming from space, weren’t bleed off from existing EM emitting sources, and had all the hallmarks of intentionality.
It was longer still before it was determined they weren’t attempts at external communication, the sources weren’t trying to talk to each other or us, but were bleed over from unshielded, internal processes.
Eventually, enough samples were gathered and examined by programmers for it to be determined the signals were code. The capture of faint, unshielded systems running through their internal programs. The bleed of an ephemeral operating system executing.
The syntax wasn’t complex when it was finally deciphered. When enough keywords and types were identified to start making sense of the instruction sets. It was a low level language, some type of assembly code written to a strange and unknown processor whose nature could only be inferred from what was understood about the code running on it.
It was an adjusted binary system which had to take into account overlapping operating environments. There were only a handful of functions focused on basic motion through the two environments, a limited number of actions, a limited number of sounds, and a limited number of inputs.
Once enough of the code had been collected and deciphered to allow for basic writing of it and equipment had been designed to broadcast as well as receive the frequencies, work began on hacking into system.
Success was limited at first. Though the code base was simple, exploits were difficult to find. The language seemed not be designed for extending, and once an instance of the code was running, once an individual ghost was created, it seemed to be designed to run in a loop with a limited number of possible branches. It was hardened against code injection by virtue of the simplicity of the language and the standalone, repetitive nature of the ghosts.
The exploit initially discovered had to do with the program’s termination parameters. When the ghost received a certain set of inputs which varied from ghost to ghost, but which fell into a fairly small group of types, the program had the ability to terminate itself and for all intents and purposes the ghost disappeared.
At first this allowed only for early termination. If enough of a ghost’s code could be gathered to identify what termination input it was waiting for, the input could be generated and broadcast, forcing the ghost to shut down. The public called this ‘ghost busting’ and the paranormal community latched onto the process to commercialize it. Businesses sprang up, reality TV shows, a whole industry.
The scientists, though, saw this as only a baby step, and not a good one, as in forcing the ghost to terminate, they also lost their connection and ability to collect more data.
Eventually, through trial and error, it was found that new types of input, outside the parameters of the original design, but incorporating some of the stimulus being looked for by the OS could cause the ghost to glitch, and from that they were able to refine the process until a pattern was discovered which could force the ghost to incorporate new instructions as valid and executable.
At this point, the ghosts became hackable.
This level of work was classified and owned by the government, of course, which also meant it ended up being weaponized.
A manual was created defining the input and output parameters of the OS, the set of functions the OS was designed to accept, the set of known non-native functions which could be reliably injected, and a syntax to be used in designing new non-functions.
The most obvious use of hacked ghosts were spying and messaging. A basic AV capture routine could be passed into a ghost, then instructions for the ghost to go to specific coordinates, run the capture, then report to a retrieval station where it would give up the captured data to be reconstituted for use.
Limitations of the frequency made it difficult to communicate with the ghosts over distances, so initially all the requirements for an operation had to be coded at the beginning, hoping the ghost wouldn’t run into unexpected input and conditions. Later, boosters which could successfully increase the range of signaling were developed, but it was never a situation where a station anywhere in the world could control a given ghost anywhere else.
The skin of her,
The breath;
The impromptu motions
of eyes and fingers,
of her lips
while she was thinking
or sipping coffee.
The way she is in the world;
The way she is to me
in the world.
The box is full of Darwin's bark spiders. Spliced, bred, and trained for service, doped up on graphene and carbon nanotubes.
Insert your hand, fingers splayed wide. Feel them weave supple, impervious gloves right onto your delicate skin.
We have a bigger box if you'd like a full suit.
If Facebook is chiefly a way to track events and adventures, and Instagram is mainly for keeping tabs on what Brian Andreas is currently drawing, then Twitter is as much about watching the fever dreams of Jeff Noon spill out into the world as anything else.
I haven't read his newest novel yet, but I enjoyed it's predecessor, A Man of Shadows, and the short story collection Pixel Juice even more.
On the Twitters he's recently been doing bits with the tag #speedlit which adhere to the following rules:
"20 words or less
no punctuation
lower case
one line break"
I've been trying my hand at it through out the day and found it a fun exercise.
gathering the fuel of fear
from birds
mice
quantum existence engines
revving with each purr
schrodinger had no idea
wherewolves
in teflon and night vision
hunting
through the shadow of crowds
hunger imperceivable
until
unhappy
with spotify ranking
orpheus
packs lyre
coins
dog biscuits
perilous road to contract
renegotiation
do
not
turn
around
transistor cherub
dreaming of flight
bright filament arrays
unfolding
ding
honeysuckle on the cemetery wall
long yellow throats
cooing softly
let us taste
the nectar of you
neural arcing
welding
one lost memory
to another
she remembers
the fall to pandemonium
the rise
The alchemy of wonder
Mixing beauty and passion,
empyrean experience,
into ego.
Born of sense and insight,
alive in the world
breathing, bursting;
Believing in sunlight
and shadow,
In the motion
of winds and moon;
The tidal effects of time
drawing, pushing, pulsing.
Effect of the affecting:
transitional, mercurial;
releasing with reflection
on creation undone to birth.
Overall, season 11 of the X-Files was an unredeemable mess, but episode 9, which itself was almost unwatchable, had a brilliant gem of a scene between Mulder and Scully as they stood in a Catholic church talking about some of Dana's internal struggles. I was particularly struck by Fox's response at one point:
"I don't know if any god is listening, but I am standing right here, and I am listening, right beside you, all ears . . ." - Fox Mulder, X-Files season 11 episode 9.