<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Scotch Wichmann &#187; Cybersecurity</title>
	<atom:link href="https://www.scotchwichmann.com/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.scotchwichmann.com</link>
	<description>Performance art, magick, and more</description>
	<lastBuildDate>Sun, 08 Jun 2025 07:17:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>More Psychic Hacking and My Legs Are Dead</title>
		<link>https://www.scotchwichmann.com/2024/10/11/more-psychic-hacking/</link>
		<comments>https://www.scotchwichmann.com/2024/10/11/more-psychic-hacking/#comments</comments>
		<pubDate>Fri, 11 Oct 2024 23:24:50 +0000</pubDate>
		<dc:creator>scotch</dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[E.S.P.]]></category>
		<category><![CDATA[Parapsychology]]></category>
		<category><![CDATA[Psychic Experiment]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Weird]]></category>
		<category><![CDATA[clairvoyance]]></category>
		<category><![CDATA[clairvoyant]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[esp]]></category>
		<category><![CDATA[parapsychology]]></category>
		<category><![CDATA[psi]]></category>
		<category><![CDATA[psychic hacking]]></category>
		<category><![CDATA[remote viewing]]></category>

		<guid isPermaLink="false">https://www.scotchwichmann.com/?p=2424</guid>
		<description><![CDATA[Fall is here, the leaves are falling, and I&#8217;m super excited to say that my presentation on Psychic Hacking at the 42nd Society for Scientific Exploration convention was a success with lively Q&#038;A and a bunch of exciting follow-ups, including possible publishing and research collaboration opportunities. Yay! If you have 20 minutes to spare, and [...]]]></description>
				<content:encoded><![CDATA[<p>Fall is here, the leaves are falling, and I&#8217;m super excited to say that my presentation on <b><a href="https://www.psychicexperiment.org" target=p>Psychic Hacking</a></b> at the <b><a href="https://www.scientificexploration.org/news/13402349" target=ft>42nd Society for Scientific Exploration convention</a></b>  was a success with lively Q&#038;A and a bunch of exciting follow-ups, including possible publishing and research collaboration opportunities. Yay! If you have 20 minutes to spare, and you&#8217;re curious whether psychics can hack into secure computers using only their minds, check out the video of my <b><a href="https://www.youtube.com/watch?v=PIBnMkrU8rQ" target=live>presentation on YouTube</a></b>.
<p>
<a href="https://www.youtube.com/watch?v=PIBnMkrU8rQ" target=live2><img src="/blogbar/hackeyes.jpg"/ alt="Click here to watch YouTube video from Scotch's presentation on psychic hacking"/></a></p>
<p>
After getting bunches of post-conference requests to share my parapsychology <b>Ph.D. dissertation</b>, I went ahead and made it public. It contains all of the experiment details, the results, the data, and my sources. You can <b><a href="https://www.psychicexperiment.org/Psychic_Hacking_Scotch_Wichmann.pdf" target=p>download it here</a></b>, or from the <b><a href="https://www.psychicexperiment.org" target=p2>Psychic Experiment</a></b> website. (p.s., if you work for the CIA, and are interested in reviving the <b><a href="https://en.wikipedia.org/wiki/Stargate_Project" target=sg>Star Gate project</a></b> to leverage intelligence from psychics, gimme a call!).</p>
<p>
<img src="/blogbar/cuma1.jpg"/ vspace=5 width=500 height=358/></p>
<p>
In other news, I had good intentions of running a <b>100K (62-mile) race</b> east of San Diego, but 91F weather, a 5000-foot climb, and miles of ravines filled with sharp &#038; slippery river rocks got the better of me. </p>
<p>I decided to drop at the 50K mark for my own safety, and because the heat slog slowed my pace considerably. I thought I&#8217;d finish the first 50K in 5-6 hours, but ended up finishing it in 9 hours, which meant I probably wouldn&#8217;t complete the second 50K before the race&#8217;s cutoff time. Nearly half of the runners dropped out early due to heat exhaustion (I saw some getting sick in the bushes), so I feel lucky I finished 50K unscathed, other than being caked in layers of dirt. Looking forward to revenge at my next 100K in April 2025! xoxo
</p>
<p>
<img src="/blogbar/cuma1b.jpg"/ vspace=5 width=500 height=231 /></p>
<p><img src="/blogbar/cuma2.jpg"/  height=406 width=500 /></p>
]]></content:encoded>
			<wfw:commentRss>https://www.scotchwichmann.com/2024/10/11/more-psychic-hacking/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Trust This Face? Hm&#8230;</title>
		<link>https://www.scotchwichmann.com/2016/12/22/trust-this-face-hm/</link>
		<comments>https://www.scotchwichmann.com/2016/12/22/trust-this-face-hm/#comments</comments>
		<pubDate>Fri, 23 Dec 2016 01:08:37 +0000</pubDate>
		<dc:creator>scotch</dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Performance art]]></category>

		<guid isPermaLink="false">http://www.scotchwichmann.com/?p=1685</guid>
		<description><![CDATA[After 2 long years and 160,000 scholarly words written, my Cybersecurity M.S. degree from the University of Maryland is officially done! I met a ton of smart people (including a Ph.D. hunting for extraterrestrials), debated national security policy with 3-letter agency spooks, and learned many scary things I&#8217;ll be writing about on my cybersecurity research [...]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.countercastle.com" target=c0unter><img src="http://h00d00.net/scotch/sfwprocsm.jpg" align=right width=160 height=190 border=0 alt="Scotch Wichmann, cybersecurity researcher in Los Angeles"/></a>After 2 long years and 160,000 scholarly words written, my Cybersecurity M.S. degree from the University of Maryland is officially done!  </p>
<p>I met a ton of smart people (including a Ph.D. hunting for extraterrestrials), debated national security policy with 3-letter agency spooks, and learned many scary things I&#8217;ll be writing about on my cybersecurity research blog (<a href="http://www.countercastle.com" target=c0unter>countercastle.com</a>) when I&#8217;m not busy destroying art galleries with rabid dance moves and razors in my panties (yep, <a href="http://www.scotchwichmann.com/pfotos/images/drinkup.jpg" target=raz>I did that</a>).</p>
<p>With school over, I&#8217;m officially returning to freakyland, but in both the creative <i>and</i> security realms now.  So, look for more performances, a one-man show (finally), and short films as I experiment more with Hollywood. And trust that performance art methods will also spill into the cybersecurity domain, where I&#8217;ll be researching new and (hopefully) unpredictable methods for subversion.</p>
<p>Don&#8217;t let the coat and collar in my photo here fool you &mdash; I was naked from the waist down. (Still am).</p>
]]></content:encoded>
			<wfw:commentRss>https://www.scotchwichmann.com/2016/12/22/trust-this-face-hm/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>A Little Security</title>
		<link>https://www.scotchwichmann.com/2016/03/06/a-little-security/</link>
		<comments>https://www.scotchwichmann.com/2016/03/06/a-little-security/#comments</comments>
		<pubDate>Mon, 07 Mar 2016 03:52:25 +0000</pubDate>
		<dc:creator>scotch</dc:creator>
				<category><![CDATA[Confessions]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Performance art]]></category>
		<category><![CDATA[Weird]]></category>

		<guid isPermaLink="false">http://www.scotchwichmann.com/?p=1632</guid>
		<description><![CDATA[Thank you everyone who came out last night to the monthly insanity at Ventura&#8217;s 5x5x5 Show! Such a wild night! The crowd was on fire, the performer lineup was inspiring (looking at you, Pete Ippel), and I had the chance to unveil You&#8217;re So Nice, a new piece about the tendency to keep negativity bottled [...]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.scotchwichmann.com/photos2.php?cmd=group&#038;perf=sonice" target=sonicenice><img src="http://www.scotchwichmann.com/pfotos/images/nicehand500.jpg" width=500 height=570 border=0 alt="Scotch Wichmann, performance art at the Ventura 5x5x5 show"/></a>
<p>
Thank you everyone who came out last night to the monthly insanity at <b>Ventura&#8217;s  5x5x5 Show</b>! Such a wild night! The crowd was on fire, the performer lineup was inspiring (looking at you, <a href="http://peteippel.com/" target=pete>Pete Ippel</a>), and I had the chance to unveil <a href="http://www.scotchwichmann.com/photos2.php?cmd=group&#038;perf=sonice" target=sonicenice><i>You&#8217;re So Nice</i></a>, a new piece about the tendency to keep negativity bottled up. <i>Nice</i> was originally slated to be part of a one-man show I had hoped to have finished by now, but my grad school workload has been heavier than I&#8217;d hoped, which is also why these blog posts have been far and few between.  </p>
<p>This is the first time I&#8217;ve mentioned school here, in part because my impending degree has little to do with aesthetics (at first glance, anyway), and I&#8217;ve wanted to reserve this space for more uber-right-brained activities. But it&#8217;s high-time I outed myself: my &#8220;day job&#8221; involves working in cybersecurity.</p>
<p>Security&#8217;s been a lifelong interest. Even as a kid, I always had my nose in books about spies, criminal capers, the FBI, lockpicking, etc. My technical background started in the mid-1980s when I taught myself programming and joined a hacker/<a href="https://en.wikipedia.org/wiki/Phreaking" target=ph>phreaker</a> gang as a young teen. After getting scared straight by my own FBI encounter, I began working above-board in the security field in the 1990s.  Since then, I&#8217;ve worked as a consultant, security architect, and hacker for 4  Fortune 500 companies (and counting), with an average stay of 4.5 years at each.</p>
<p>It&#8217;s a challenging balance,  pulling fish out of my performance-art-pants at night, then wearing a poker face  at a job where I&#8217;m tasked with fending off thousands of online attack attempts per day from  amateur and state-sponsored hackers alike. A few of my co-workers know of my double life, but like any good spook, I&#8217;ve tried to keep a low profile; patients might prefer <i>not</i> knowing that their doctor <a href="http://www.scotchwichmann.com/photos2.php?cmd=group&#038;perf=burden" target=burden>rolls around in broken glass</a> on weekends.</p>
<p>My take, however, is that cracking systems can be a <i>creative</i> act &mdash; which you know if you <a href="http://www.twoperformanceartists.com" target=2p4m>read my novel</a>  &mdash; and so hackers/crackers are often a very creative bunch. The very term &#8220;hacker&#8221; denotes someone inventive, whether it be in computers, turning toasters into telephones, or some other wacky trade. It follows that in order to &#8220;deflect&#8221; these creative people from wreaking digital havoc, defenders must be creative themselves, and be capable of seeing what hasn&#8217;t been shown (or even imagined) yet. The best defenders are, in many ways, visionaries capable of &#8220;seeing&#8221; the road long before any dirt has been moved. This is why it pays to exercise the right-brain by embracing occasional insanity to foster new synaptic routes orthogonal to Security&#8217;s inbred patterns.</p>
<p>I&#8217;ll finish my Security M.S. degree this December, and I&#8217;m increasingly realizing ways I might &#8220;hack&#8221; the subject of cybersecurity itself, with lessons learned from performance art. Who says the two subjects can&#8217;t inform each other? Playable glitches have been intentionally <a href="http://www.fastcodesign.com/1662156/glitches-turn-video-games-into-sublime-art" target=glitch>introduced into video games as an art form</a>, so why can&#8217;t performance art &#8220;infect&#8221; cybersecurity as a new approach, a new way of thinking?   And the converse can also be true. Security is very much about detecting what is breached, hidden, or taken; why can&#8217;t these apply to the performer-audience relationship in some explicit ways as well&mdash;or even be the focus of a performance?</p>
<p>Frankly&mdash;and I&#8217;m wagering every artist/performer who works a corporate day job can sympathize&mdash;I&#8217;ve been nervous for <i>years</i> that potential employers might discover my <i>other</i> work, and shy away from hiring me&mdash;but no more. How can I publicly pursue the intersection of art and security if I hide the fact that they already intersect for me intuitively? And really, <i>why shouldn&#8217;t</i> art and technology trade inspiration? They both come from the same brain, after all, in my case.</p>
<p>So, dear potential employers, please hire me for my cybersecurity skillz<nobr>&#8230;</nobr>and  consider the fish in my pants a bonus.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.scotchwichmann.com/2016/03/06/a-little-security/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
