Identity as a vortex or tautology

Our identities are fundamentally made up of semiotic matrices. That is to say, in part, that our identities have meaning; they mean something to us.

Often they mean a great deal to us and from them we derive the semiotics of motivation, intention, life-plans, many of our central interests, and so on.

Identities have strong emotional components, to be sure, but our emotions are ambiguous or diffuse if they are not positioned on a semiotic matrix and focused or defined by that matrix.

Identity is usually tautological in that its components, interests, and associations tend always to lead back to a few central elements. Often these elements have been inculcated in us by training. Some, we learn on our own. These elements are our values and beliefs, and also how these values and beliefs are understood and pursued.

The semiotics of identity must mean something to the person identifying with them. In this sense, they are almost always tautological. I do what I do because that is how I learned how to do it, think it, feel it, perceive it.

Most people are more adept at moving the parts of language around than they are at moving semiotic elements around. When semiotics are unconscious, they act like a vortex pulling perception, emotion, and understanding always toward the center of the identity. I think this is another way to say, in the Buddhist sense, that the self is empty; that it has no “own being.”

We can pursue an understanding of an empty self through Buddhist thought and practice, but we will get better results more quickly if we add a practice that deals directly with the semiotics of our identities.

Since there is no book you can go to to look up how your unique semiotics of identity works, you have to see for yourself how it works. You can do much of this on your own, but eventually you will need a partner because there is no way you will be able to get an objective perspective on yourself acting alone.

FIML practice is the only way I know of to fully see into and through the semiotics of your “identity.” Beneath identity there is a sort of artesian well of pure, undefined consciousness. FIML helps us experience that well while keeping us from rushing back into the tautological matrix of identity or static self-definition and clinging to it.

FIML is able to do this because FIML is process. FIML itself has no definition, only a procedure. It is not a tautology because it has no semiotic boundaries.

Semiotics, FIML, and identity

After you have a done a good deal of FIML, you will start to see semiotics as things, similar to words or memories.

FIML facilitates this process by forcing us to pay close attention to the ways we use semiotics and the ways they affect us.

Our identities, such that they are, are based on our closeness to or need for semiotics that define us, assure us, make us feel at home, tell us who we are.

Our use of semiotics in that way is very common but it is hard to grasp if we have no other basis for our identity, which few of us do.

FIML practice provides a different basis for identity than “extrinsic” semiotics, the conscious and unconscious semiotics of culture, upbringing, media, advertising, schooling, what we may think others think.

FIML partners, by constantly paying attention to the play of interpersonal semiotics, gradually will shift the bases of their identities from largely static extrinsic signs to dynamic intrinsic, or interpersonal, processes. This is what makes semiotics start looking like things rather than abstract elements of linguistic analysis.

Semiotics are things as much as words are. They differ in that there is no dictionary of them; we have to see them for ourselves and understand how they have been formed and why they affect us as they do.

Once partners do this through FIML practice, they will eventually notice that their habitual extrinsic semiotics will start to slough off, to fall away from them. This happens very naturally as a rich dynamic realm of largely error-free communication develops between them.

The falling away of habitual extrinsic semiotics that had been used to define or maintain the identity is accompanied by delightful feelings of freedom and lightness, independence and assuredness that one’s being is better served by the intimate communication of FIML than the inculcated beliefs and values of the past.

Semiotic proprioception in dreams and waking

Proprioception means “one’s own” or “ones’ individual” (Latin proprius) “perception.”

We normally use this word to refer to our physical position in the world—whether we are standing or sitting, how we are moving, and how much energy we are using.

When we dream, our capacity for physical movement, with rare exceptions, is paralyzed. But we still do a sort of proprioception in dreams—a semiotic proprioception, or proprioception within the semiology of the dream.

In dreams, we grope through semiotic associations and respond, gropingly, to them. People and things often look smaller in dreams, or distorted, because we do not have either the need or the capacity to calibrate our physical proprioception as we do in waking life.

Dreams move from one semiotic proprioception to another via our individual four-dimensional (3D plus time) groping/associative function. In one short segment of a dream we are at home, then we go through a door only to find ourselves on a boat in the ocean. Our 4D semiotic proprioception within dreams readily accepts groping, associative shifts like this.

Much of what we perceive when we are awake is memory. We glance at a room we know well and call up our memory of it rather than actually look closely at the room.

I am fairly sure that the memories we call up to aid perception while we are awake are much the same as the groping proprioception we experience in dreams. A major difference is when we are awake we can and do check our waking proprioception with the people and objects around us, while in dreams the associative function has a much freer range.

Notice how dreams move from scene to scene rather slowly. Things can go quickly, but normally dreams grope somewhat slowly along the 4D path of semiotic proprioception.

In waking life, our dreamy use of memory and association to aid perception of the world happens constantly.

When we speak with another person, we use this function to make groping associations concerning what we think they are saying. We grope and respond to them as in a dream while at the same time searching for clues that indicate we are both in the same dream.

These clues that two people may sort of “agree on” while speaking are normally standard public semiotics that belong to whatever culture(s) they share. By “agreeing” on them, we form a sort of agreeable camaraderie with whomever we are speaking, and this can be satisfying, but if we only get this, it can also become deeply unsatisfying.

The four dimensional groping/dreamy function of our mind is far richer than any standard collection of public semiotics. In our public lives—professional, commercial, based on organizations, etc.—we have, at present, little recourse but to accept normal public semiotics, to agree with them and manifest agreement.

We can express some deviation from them and sometimes make jokes about them, but we are generally fairly bound to the semiotics of the culture or organization that generates the context of our speaking. Consider how people in the same church or school are bound by the semiotics of those institutions.

In our intimate relations, however, we do have recourse to investigate and understand how our groping, 4D semiotic proprioception works. This is what FIML does. It allows partners to observe, analyze, and understand the semiotic proprioceptions of their minds as they are actually functioning during interpersonal communication.

If you constantly avoid FIML types of investigations, you will be stuck with a mix of dimly shared public/private semiotics that will tend to become highly ambiguous, even volatile, or very shallow.

Identity and signaling

Identity is constructed of memories, memories that have to be tended to, and this takes time and energy.

You have to remember who you are and often have to work pretty hard just to maintain that image within yourself, to say nothing of projecting it toward other people and getting them to accept it.

A big problem with this way of constructing a “self,” an identity, is it’s probably based on misinterpretations and a good deal of self-deceit.

Our identities, such that they are, are complex fictions. They are a central flaw in our internal signaling system.

If your identity is large and complex, it will use a good deal of energy. As you signal internally to yourself about your identity, you will also be receiving signals from other people, and these signals will necessarily be processed by your large and complex identity. And that, of course, will lead to serious misinterpretations, both internal and external.

If you belong to a group that defines, or helps you define, your identity, you can save some energy but will have as much fiction, maybe even worse fiction.

Consider the codes of group behavior (group signaling)  for Stalin’s NKVD officers who purged so many millions of innocents in the 1930s. All of those officers had identities that were largely determined by signals coming from the NKVD and Joseph Stalin.

There was a weird sort of ethical behavior among those officers in that they were trying to adhere to a group signaling system and not go their own way. This same problem in less serious form can be observed all over the world in every culture.

One problem with ethics and ethical signaling within groups is ethical questions can be difficult. There are few formulas that will always work, and formulas are what hold groups together.

Back to your identity. I hope it is clear that you have to be careful when you base your identity on group signaling systems. If you are a banker, you might do many bad things out of loyalty to your group. Same for all of us.

While ethics are hard to codify, the will to behave ethically is simpler. I want to do the right thing but I don’t always know what it is or how to do it. That is a good statement to make. If you can honestly say that to yourself, that is good because that means that your internal signaling system is seeking greater integrity, great clarity.

When we seek clarity and integrity within our signaling systems, we are seeking better ethics. We are changing our identities, or allowing our identities to be transformed by a higher desire for clarity, purity, integrity, goodness.

When we seek to improve our signaling systems, our ethics, we begin to abandon static identities and poorly constructed fictions about ourselves by subjecting them to a higher order of thought. If we can take a meta-position on ourselves, we will find the process of improving signaling is easier and more enjoyable than clinging to a static fictionalized identity that may have been constructed years before.

Sexy NSA Commercial With Sasha Grey

The NSA database shows once again that it is technology that moves the world more than ideology. I doubt there is anything anyone can do to stop this database or others like it, here or abroad.

We can maybe hope that those who have access to databases of this type are completely honest and that they function within perfect systems that have no corruption, but historically that is highly improbable.

Big databases like the NSA’s (and we know there are more of them) create a form of international competition akin to the arms race. If we don’t get ahead of others, they will get ahead of us.

In the near-term, our best hope is probably for even more technology in the form of accurate lie-detectors that can be used to keep all of us honest, including those with access to the database. I do believe that the database has rendered our traditional form of government obsolete and that there is no turning back.

In the long-term, the database will surely look passe, even puny. Isn’t it likely to be a precursor to the even larger database that will house our electronic/digital “selves” once we have achieved a non-biological stage of evolution (if we haven’t already)? Will we need or even want privacy then?

For today, a conundrum in the database arms race is that the NSA has in one way made us “safer” by staying ahead of other countries (I guess), but it has also made us less safe because no database like that can be made perfectly unhackable.

The database should make it clear to even more people that we fundamentally have no idea how our government works or who controls it to what purpose. Rather than look behind the scenes for who has the “real” skinny, as we naively did twenty years ago, now we must wonder if anything known to the public has any bearing at all on what is really going on.

Repost: FIML is practical semiotics applied to the psychology of intimate human communication

A “psychological morpheme” can be identified with or stimulated by a “sign” that “indexes” a “library” of “meaning.”

FIML practices interrupts the indexing of the sign before it calls up meaning from the library. This is a technical way to say what FIML practice does.

The terms used above, indicated by quotation marks, can be defined as follows:

A psychological morpheme is the smallest unit of psychological meaning. It is analogous to a morpheme in linguistics, which is the smallest unit of meaning in a language, or the smallest semantic unit in a language.

Continue reading…

This Is What Winning Looks Like

My guess is the principal war aim of the US in Afghanistan was and is to secure long-term military bases. These bases have been secured, and thus, the US war aim has been fulfilled. Strategically, bases in Afghanistan secure Central Asia while blocking Chinese or Russian adventurism. The bases in Iraq have a similar logic behind them; they, along with the Afghan bases, surround Iran. For the world’s most powerful country, the US, chaos in a society where we have important bases is unimportant and may even be an advantage as it provides an excuse for our continued presence while rendering local forces powerless.

Consider the NSA database. It is a fait accompli. It is here to stay. It marks a change in an era of world history. It is similar to, but vastly more powerful than, the king’s spies who used to cruise the streets listening to what people said. The revelation of the certainty and some of the scope of the database “shocks and awes” the public. It impresses me. What can anyone do about it? If we don’t have the best one in the world, someone else will.

Who controls it? Do we now have a sort of de facto world government? I think we probably do. It’s too big and powerful for anyone to stop.

The linked video presents a disappointing view of the war in Afghanistan. We see good soldiers resigned to leaving behind a mess and are led to believe that our “victory” looks more like a failure. But if long-term bases were always the main aim, the US did get what it wanted. And it also got what it wanted with the database—full spectrum dominance of the world through cyber warfare.

The NSA database

words 417

Firstly, that database is a sociologist’s wet dream. It is without question the greatest sociological analytical tool ever to come into existence.

The NSA database—using just metadata alone—is capable of discovering and describing in near-perfect detail nearly all social networks in the world.

It is possible that some very secretive groups figured out which way the wind was blowing twenty years ago and have kept away from all electronic surveillance since then, but I doubt that even they can be certain that their membership is not known, or knowable, to the NSA.

In addition to being able to find and analyze all, or virtually all, groups and networks in the world (secret or otherwise), the NSA almost certainly has the capability to reach back years into the content of those groups’ phone calls and other forms of communication.

This makes the database even more than a sociologist’s wet dream. It is also a tool for exceptional good or evil.

First, the evil—anyone with access to the database can spy on virtually anyone anywhere and use the information gained to blackmail, steal inventions or investment ideas, bribe, intimidate, or otherwise do bad stuff behind the scenes.

For the good, the database has the power to figure out groups that are doing bad things and stop them. The database could be used as a massive national and international “lie-detector” or “shit detector.” Just about any group of people up to anything unsavory should be discoverable through the database.

So who controls it? Is there one person at the top? Or a group? Who watches the group?

I am all but certain we will never be rid of that database. If by some miracle the US destroys the NSA database, some other country will surely set one up.

So liberty and goodness now mean that we have to figure out how to make sure the people controlling the database are good people. That they will never do bad things with the information available to them.

How do we do that? Is there any conceivable politics that can bring that about? We need databases watching databases all of which are controlled by groups that are watched by other groups. If we have perfectly reliable lie-detectors, could we establish groups like that? Is there any way forward other than massive transparency of everyone’s life?

It looks to me like our traditional political system is finished. Checks and balances and individual rights are meaningless in the face of that database.

Panopticism

A Panopticon is a circular building with an observation tower in the centre of an open space surrounded by an outer wall. This wall contains cells for occupants (for example, inmates in a prison). This design increases security by facilitating more effective surveillance. Residing within cells flooded with light, occupants are readily distinguishable and visible to a guard/official “invisibly” positioned in the central tower. Conversely, occupants are invisible to each other, with concrete walls dividing their cells.

In Discipline and Punish, Michel Foucault builds on Jeremy Bentham’s conceptualization of a panopticon as he elaborates upon the function of disciplinary mechanisms in the prison and illustrates the function of discipline as an apparatus of power. (Source)

An aspect of power is how do you know who is spying on you? How do you know who your real friends are? How do you know if you are on top? How do you even know who is on top?

Joseph Stalin knew he was in control of everyone in the Soviet Union because he knew that he was able to use the NKVD (his secret police) to control the CPSU (Communist Party of the Soviet Union) and he knew that he could use the CPSU to control the NKVD. He also knew there wasn’t any other power base.

Even still, to be certain he imprisoned and shot millions of innocent people. By doing so, he removed imaginary (and sometimes real) threats and, just as importantly, he proved to himself and others through mass murder (the ultimate crime) that he could do whatever he wanted.

Who controls the NSA? How many people have access to that data? The metadata alone will tell anyone who has access how everyone in the world is connected and to whom. There are several whistle blowers (probably including Snowden) who claim the NSA is also storing phone calls and other digital data.

Information, as Foucault knew, is the basis of power. The NSA has a massive amount of information and thus massive power, but the question fairly screams—Who is at the top of all that power? Who controls and has access to all that information? Who gets to see how the metadata fits together?

I doubt that in today’s world just one person is at the top. We know Congress is not, nor is the president. Does the head of the NSA or the CIA know who is on top? I doubt they are. Is there a group within those bodies that knows? If there is a secret group (not publicly known) that is on top, or thinks they are, they will be able to get a sense of who their competitors are by metadata analyses and by more direct means of spying.

But who may be spying on them? Is there another group within their group or outside of it that knows even more than they do?

Digital panopticism in today’s world implies the profound likelihood that there is more than one “observation tower” or group on top. This is a massive problem for those of us without any power, but it is also a deeply disturbing problem for those with power because none of them can ever be certain if someone is above them and who that might be.

Is that the core reason the spying grows and grows? Because, futiley, they have to spy more and more to be sure they are on top or to be sure they know who is on top, and yet they also know that they can never be sure.

Repost: Why you can’t fix it with generalities

Psychological, cognitive, emotional, or communicative problems cannot be fundamentally corrected by using general analyses or generalized procedures. You can teach someone to think and see differently, even to behave differently, by such procedures, but you cannot bring about deep change by using them. The reason this is so is change through generalizations does little more than substitute one external semiosis for another. The person seeking change will not experience deep change because all they are essentially doing is importing a different explanation of their “condition” into their life.

This happens with Buddhists who remain attached to surface meanings of the Dharma as well as to people seeking mainstream help for emotional problems. Any change will feel good for a while in most cases, but after some time stasis and a recurrence of the original problem, or something similar to it, will occur.

Continue reading…

Five myths about privacy

Source

I am on vacation and so have been slow to add new material to this blog. The linked article is interesting and worth reading, but I chose to post it mainly for the following sentences, which have a wonderful Buddhist-American ring to them:

Even if a person is doing nothing wrong, in a free society, that person shouldn’t have to justify every action that government officials might view as suspicious. A key component of freedom is not having to worry about how to explain oneself all the time.

So agree with that and believe it should also apply to friends and colleagues. That may sound opposite to FIML practice where we say that all contretemps should be fully analyzed/explained, but it really isn’t. FIML is about finding deep freedom to communicate honestly with your partner. It doesn’t require you to justify everything you do, but rather provides a chance to speak deeply without fear of being misunderstood and judged wrongly.

Fourth Amendment to the United States Constitution

 

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Repost: Idiolects and idiotics

An idiolect is the “dialect” of one person. It is unique to that person. We all speak an idiolect unique to us. No one else speaks in exactly the same way as you do. In fact, the varieties of idolects among speakers of even the same dialect can be quite pronounced, to say nothing of speakers who have been acculturated to different dialects.

Virtually, the same thing is true for our use and understanding of semiotics. Each one of us has a unique tangle of semiotics even if we share the same culture. Even if two people were born and raised in the same very strict cult, they will have different takes on their “shared” semiotics; they will see thier semiotics in individual and unique ways.

The term “idiolect” is a blend of the prefix idio, which means “own, personal, distinct to the individual” and the suffix lect, which is taken from the word “dialect.”

Continue reading…