Videos of Speeches and Interviews
Conspiracy Theories, Counter-intelligence, and Knowing the Players without a Program
Calling a person a "conspiracy theorist" is an easy way to dismiss what used to be called "an investigative journalist" as if they are fringe, wacko, loopy or insane. But the deeper we go into the sources of "frame management" by oligarchic networks,...
Getting Root
Getting Root: Remote Viewing, Non-Local Consciousness, Big Picture Hacking, and Knowing Who You Are A Journey in Speculative Exploration
Hacking, Biohacking, and the Future of Humanity
Bill Gates was not kidding. Have a listen.
Hacking UFOlogy
"You're over the line," an intelligence professional told Richard Thieme recently. "You know enough to know what's not true but you can't know enough to know what is. You're well into the wilderness of mirrors." Hacking one complex system is always in some ways like...
Beyond Social Engineering
When You Can Make it Win/Win … You’ve Got Something
Living on the Edge
A late-night long ago talk for Notacon, a once-and-sometime con.
Quantum Hacking
The search for a unified theory of everything in contemporary physics stems in part from the fundamental inability to reconcile quantum physics and relativity theory. This has pushed research toward complex mathematical models such as string theory in an effort to...
Masters of the Unseen
Trying to channel the wisdom of the best and the brightest.
The Workplace of the Future
Richard Thieme describes a vision of new possibilities in September 2003 for Medtronic. The poignant opening, days after his son's motorcycle accident, framed the work of the medical device maker and its importance for "the human in the machine."
Hacker Generations
It has all happened so fast. Eleven years of Def Con define three identifiable generations of hackers. (Yes, that's an arbitrary distinction, but it's useful.) The first generation helped build the network, the second learned how to use the network, and the third has...
Hacking the Next Ten Years (2002)
Ten years ago hacking was a frontier; ten years from now, hacking will be embedded in everything we do, defined by the context in which it emerges. Real hackers will be pushing the frontiers of information networks, perception management, the wetware/dryware...
Hackers, Crackers and Spies
A basic tutorial for a Kiwanis Club