Theory On Demand 15 Ippolita in The Facebook Aquarium The Resistible Rise of Anarcho Capitalism I
Theory On Demand 15 Ippolita in The Facebook Aquarium The Resistible Rise of Anarcho Capitalism I
References
Thanks
IN THE FACEBOOK AQUARIUM - PRE-
AFTERWORD
This essay is a critical investigation of the phenomenon of social
media and the so-called Web 2.0. We use the example of Facebook,
but most of our analysis is applicable to all the free services on the
internet. We want to stress that our approach is anti-prohibitionist.
This is not a simple stand 'against' all commercial internet
experiences, but a description from a hybrid political and situated
approach.
For example, the relationship with the social can be framed in many
ways that are useful: with the application of the rules of social media
marketing to political communication, with hacking, through
desertion, and the construction of the social 'other'. We like the idea
of replacing the concept of the social network with the trusted
network. We do not need to socialize more, but we need to build
organized networks with the people and the machines that we trust.
But even in this case it is not about condemning open source and
all its derivative models, since they are without doubt better than a
completely closed approach. However, we stress that the debate
about technology is in fact dominated by a fixed and seemingly
immutable horizon, that of capitalism. Beyond the blackmail of
survival, which certainly neither the developers nor the leaders
address, is there something we do not want and do not have to sell?
What is a common good if it is not something that you do not sell
and do not buy? The data managed or held by the governments is
similar to the natural heritage of a historic geographical area; in on
other words it is as if Italy would put one of its art cities on sale,
arguing that it is a necessary and inevitable market opening. The
data in question involves the physical bodies, cultural identity, social
relations, history and linguistic behavior of real communities.
Unable to stop the moving train just a few will decide to get off. An
economic-social class division is beginning to take shape at the
horizon, not only in regard to the constant and sterile threats to net
neutrality, an absurd logic that never existed and can not exist, just
like privacy, but also in the sense of access to services. On the one
hand there will be those of the A type, partially protected and paid
for by the elite who understood that using Gmail to manage their
own affairs is a bad idea; on the other hand those of the B-type, the
uneducated masses, shaped by social media filled with advertising
and subjected to marketing and profiling. The dynamics of privacy
by payment could be the same as the old virus and anti-virus
model: who produces the former will also produce the latter.
We are not alone, there are those who begin to smell a rat, and
have already been working for some time on digital self-defense.
Self-defense is to be self-consciousness, of one's own history and
proper limits, a way of learning how to manage personal resources
in a common world. To transform personal vulnerabilities into many
strengths, without yielding to a militaristic, Manichean narrative. For
example, many teachers, educators and trainers have found that to
intervene in the study of technology in order to train individuals, it is
necessary to recognize that commercial platforms should be
structured as pedagogical settings. They are beginning to criticize
the system in ontological terms.
1. Paideia (παιδεία), refers to the training of the mental and physical faculties in order
to produce a broad and enlightened outlook. Paideia includes physical, moral and
intellectual exercises as well as socialization in order for the individual to become a
successful member of the polis. back
PART I: I HAVE A THOUSAND FRIENDS,
BUT I KNOW NO ONE
1.01 DEFAULT POWER, OR PLEASE
FOLLOW THE INSTRUCTIONS
Facebook has now almost reached the one billion users mark
worldwide, Windows Live Messenger, Twitter and LinkedIn host 350
million, 330 million and 130 million accounts, respectively.1 Google+
has also made a splash in the market. These numbers are
constantly rising, while new social networks appear almost daily.
This phenomena is not exclusive to Western or democratic
societies; tens of millions of Russians have an account with
Vkontakte; Chinese social networks like Qzone and Renren, which
are closely controlled by the authorities, have over one hundred
million users; the Iranian government sponsors Cloob, etc. An
overwhelming majority of all these users accept the default settings
of the platforms offered by the social networks. When these settings
are modified, as often happens (e.g. in 2010 when Facebook revised
its privacy settings, not once, but several times) almost all users
adopt the new settings without dissent. This is what we call 'default
power': the ability to change the online lives of millions of users by
simply tweaking a few parameters. For the networks owners
anything is possible, whether it is closing down the pages of cat
lovers or censoring risqué photos.
1. All statistics in this translation are reproduced from the original Italian edition:
Ippolita, Nell'acquario di Facebook, Milan: Ledizioni, 2012. back
1.02 IN THE BEGINNING WAS GOOGLE
In early 2006, when the Social Web was just for the select few (in the
US, Ivy League universities and Stanford were just beginning to
embrace Facebook), Ippolita published Open non è free ('Open
Does not Mean Free').1 We argued that open source and free
software are not the same thing. Freedom comes at a cost while
opening up to the market can be highly profitable. Our reception
was modest at best, as our approach was largely philosophical at
the expense of simplicity. This is because it was becoming apparent
that we were witnessing a paradigm shift in the digital world from
epistemology to ontology. The 'what' (what you know) was rapidly
replaced by the 'who' (what you are). In other words, management
of knowledge was becoming management (and construction) of
identity.
But the subject matter was of paralyzing complexity, and worse still,
of little interest to the general public. Debating the transformations
in IT for the benefit of a handful of specialists was a pointless
exercise. Therefore our new task became a critique of the largest
actor in its domain, the most popular and versatile search engine,
Google. Google's mission, a dogma preached by many digital
evangelists, is the organization of all of the information in the world.
As stated by Eric Schmidt, the former CEO of the Mount View giant,
Google is a global IT enterprise valued at 'a hundred billion US
dollars'.
But Google is just one example of what is becoming increasingly
common, namely people delegating their '(re)search choices' to a
hegemonic subject. Google's vision of the future finds its clearest
expression in the 'I am feeling lucky' button: a technocratic subject
who shares my desires and realizes them. I am what Google knows
of me: I trust Google with everything; my ontology is Google's
epistemology. My online searches and browsing, my contacts and
my preferences, my emails, pictures, private and public messages;
everything that makes up my identity is being taken care of,
managed 'for my own good', by Google.
Thanks to its copyleft distribution, The Dark Side of Google, has
been translated in several languages.2 Yet, even as Google is still very
much discussed, no new analysis has managed to overcome
specialist concerns and address the larger public. On the other
hand, there are an increasing number of studies published on
indexing algorithms and manuals on Google's ten new services that
enable users to generate wealth. But nobody has attempted to
break through the banality of the new service documentation. Cloud
computing is now affected by FOG (Fear of Google), the dread that
an information monopoly becomes a threat, not only to individuals,
but also to private companies, state institutions and international
bodies. But what is actually being feared? There is a growing angst
about the possibility of an emerging rhizomatic control by
businesses and administrations, (in earlier times we would have said
the military-industrial complex). Semi-authoritarian governments,
but also anti-trust commissions, firms and individuals have taken
Google to court in cases where millions of dollars are at stake. Yet,
in the age of the triumphant 'free market', it shouldn't be that
difficult to grasp the fact that 'gratuity' means that the services
provided have to be funded from somewhere else: in this case
through increasingly perfected control. Someone must be able to
'know it all', in order for sophisticated account holders to 'own' their
unique, customized object, and feel really 'free'.
Has anything changed since 2006? Not really, the dozen or so new
services offered by Google have only confirmed the totalitarian
nature of a project aimed at 'organizing all the world's information'.
Google embodies more than ever the global 'webization' of the Net.
Its weapons are always the same, simplicity and efficiency,
academic-inspired 'excellence' (Stanford, Silicon Valley), soft
capitalism (rewards, brand and corporate identity), exploitation of
open source code, etc. Sure, Google now seems old, panting to
keep up with the 'new actors of the Web 2.0' and belatedly joining
the 'social networking' fray. The 'good giant' definitely did take a
'social' turn with Google+ but only after the catastrophic failure of
Google Wave and Google Buzz. Google+ 'circles' (of relationship)
were promptly copied by Facebook in an attempt to silence its
critics regarding the rather tricky subject of its privacy management.
In the meanwhile, more aggressive competitors have gained
positions of power.
1. Ippolita, Geert Lovink and Ned Rossiter, ‘The Digital Given. 10 Theses on Web 2.0’,
The Fiberculture Journal 14 (2009), http://fourteen.fibreculturejournal.org/fcj-096-
the-digital-given-10-web-2-0-theses/. back
2. Stefano Boni, Cuture e Poteri, Milan: Eleuthera, 2011, pp. 29-33. back
1.04 SOCIAL DYNAMICS: VOYEURISM
AND HOMOPHILIA
Facebook promotes 'homophily', the mutual fascination
experienced by those who feel they share a common identity -
which has nothing to do with affinity.1 Facebook 'Friends' are, at least
formally, people who come together because they 'like' the same
things: 'this is what we like' is what they express. Perhaps in the
future they will add 'this is what we don't like'. But the latter is
unlikely, since dissent provokes discussion. So we take part in the
same events. We are equals, and that is why we feel happy together
and we exchange notes, messages, 'presents', games, and pokes.
Social exchange is organized on the basis of the identity. Dialectics
is impossible, conflict is banned by design and evolution
(intersection, exchange and selection of differences) is obstructed.
We stick together because we recognize ourselves to belong to the
same identity. Deviance is out, diversity is a non-issue, and actually,
we are not concerned in the least.
From a social viewpoint, homophilia leads to the tendency of
generating monolithic groups of people who literally all echo each
other. It is precisely the opposite of affinity, where difference, on the
contrary is a condition. Difference here is even prized as the starting
point of every relationship. In affinity-based relationships, individuals
perceive each other and engage in relationships as the outcome of
a bundle of differences which suggest likeness, facilitating easier
interactions. There is no such thing as a requirement to adjust to
the group, since it is the uniqueness of the individual that creates
value, not his conformity within the group.
The logical outcome of social structuring in small homogenous
groups, consisting in a few hundred 'friends' or a few thousands
'fans' is the emergence of social dynamics akin to those of a village.
Everybody knows everything about everybody else. Social control is
pervasive and implicit in every relationship. Even if it is possible, in
theory, to set up different levels of sharing of the information
published on our profile, the actual practice is to have everything
published without restriction, and as this spreads out further and
further afield, 'total transparency' on 'the whole internet' is attained.
As per company policy, Facebook is based on the concept of
sharing, and is designed to allow you to connect with and find
others more easily.2 The underlying economic rationale of this,
which we will elaborate in more detail, is obvious: 'encouraging
people to become public increases advertising revenues. [...]
Technology makes everything more visible and accessible. The
technology is completely aligned with the market.'3
The ideology of sharing on Web 2.0 makes exposure of others a fully
acceptable and encouraged social practice and self-exposure the
golden rule of community life. Rob was yesterday at Alice's party,
here are the pics, 'like' them and share them with all your 'friends'.
Update your profile and tell everybody what you 'like', where you are
with whom, and what you are doing. Please tell us what is your
favorite brand of jeans, and what's your favorite position in bed,
with full details. You're looking for this great lube with that special
taste, now here we've got a customized ad just for you, matching
your requirements precisely, and available now!
When a group's identity is established on the basis of feelings so
simple as to be captured by the 'Like' button, iterating over and
again what one 'likes' becomes essential. But on the other hand it is
also crucial to know in real time what other people 'like' so as to
avoid unpleasant discrepancies with the common identity that
reinforces our sense of belonging. To cement the group identity
implies control of others as well as self-control. Articulating a strong
dislike of this or that, is out of the question, just as are nasty
pronouncements about this or that person who is one of the
'friends' of some of our 'friends'. Just ignoring is the right option. In
these types of relationships, creative conflict is replaced with
indifference but also a subtle nastiness where people take pleasure
in posting the least flattering photos of their 'friends'. This creates
an underground relational accounting system, where we react
almost instantly to those who are respond quickly, while sharing
invitations, comment requests and 'like' with others are simply left
as an afterthought.
Facebook offers many tools to track all the activities of users.
Facebook Connect and Facebook Mobile make it easy to stay
connected even when users are logged on Facebook, or in front of a
computer screen. The spread of self-exposure devices like
smartphones and tablets enables further cross-collecting of geo-
referenced GSM data together with increasingly detailed personal
profiles on social networks. All of this is for our own good, in order
to let us share more, faster and better. But do we really share?
1. Michel de Certeau, The Practice of Everyday Life, trans. Steven Rendall, Berkeley:
University of California Press, 1984. back
2. Richard Foreman, 'The Pancake People, or, the God's Are Pounding on My Head',
Edge, 3 August 2005,
http://edge.org/3rd_culture/foreman05/foreman05_index.html. back
3. Foreman, 'The Pancake People'. back
4. Paul Feyerabend, Against Method. Outline of an Anarchist Theory of Knowledge, 4th
ed., New York: Verso Books, 2010. back
5. The idea, that inner space is the last space left to explore can be traced back at least
to J.G. Ballard's guest editorial for New World Science. See J.G. Ballard, 'Which Way to
Inner Space?', New World Science Fiction, vol. 40, Concrete Island, New York: Farrar,
Straus and Giroux, 1998, pp. 116-118. back
6. For a short presentation of how tracking research see: http://donttrack.us/. back
7. When we get a hundred free SMS for recharging mobile phones, to be sent within
the next twelve hours, we are faced with a communicative possibility that costs
nothing and is worth nothing, neither to the sender nor to the recipient. An act of
communication is of value only through the effort and time spent on it. Yet this
perverse offer of free communication is so powerful that it can even make us feel
guilty for not having taken the extraordinary opportunity to send hundred of text
messages in a short burst. back
8. Graph theory can easily be used to show how in the internet (considered as graph) a
new link can completely reconfigure the network itself and is therefore an act of
radical creation. For an introduction to the topic, see Albert-László Barabási, Linked:
The New Science of Networks, New York: Perseus Book Groups, 2002. back
9. Pierre Lévy, Collective Intelligence, New York: Basic Books, 1995. back
10. Manuel Castells, The Rise of The Network Society: The Information Age: Economy,
Society and Culture, Hoboken: John Wiley & Sons, 2000. back
11. Cornelius Castoriadis, The Imaginary Institution of Society, trans. Kathleen Blamey,
Cambridge: MIT Press, 1997. back
12. Digital democracy based on the principle of a link per vote quickly turns into a
system of retroactive recommendations (Google, Amazon, FaceBook) which
effectively militarizes networks. Services that use profiling keep repeating: ‘if you have
nothing to hide, you have nothing to fear’. They argue that the law will not allow them
use the information taken from the user to go against the user’s own interests. This
is a rather a hollow defense to hush up the truth that we have been completely
robbed of our personal data. back
1.07 PUBLIC AND PRIVATE,
ONTOLOGY AND IDENTITY
Is what is private also public? According to Facebook, everything
private should tend towards becoming as public as possible. Public
meaning of course managed by, published on, and made available
through Facebook, a private enterprise. But the social networks to
which an individual belong are not the same as her or his
'behavioral networks' (the people we meets often, but who are not
'friends' e.g. parents, children, relatives, neighbors, etc. They do not
correspond with our online networks either. Danah Boyd's writing
on social networks is a good starting point for clarification.1 The
fundamental issue always remains the same: a personal ontology
being created within a collective context. This is how Mark
Zuckerberg thinks about it:
1. Peter Lattman, 'Why Facebook Is Such a Crucial Friend for Goldman', New York
Times, 3 January 2011, http://dealbook.nytimes.com/2011/01/03/why-Facebook-is-
such-an-important-friend-for-goldman-sachs/. back
2. Joseph Menn, Francesco Guerrera and Shannon Bond, 'Goldman Deal Values
Facebook at $50bn', Financial Times, 4 January 2011,
http://www.ft.com/cms/s/0/e0dad322-173c-11e0-badd-
00144feabdc0.html#axzz1KzW89fTA. back
3. Anupreeta Das, Robert Frank and Liz Rappaport, 'Facebook Flop Riles Goldman
Clients', The Wallstreet Journal, 19 January 2011,
http://online.wsj.com/article/SB10001424052748703954004576090440048416766.
html#articleTabs%3Darticle. back
4. 'The Goldman Sachs Facebook Deal: Is This Business as Usual?', Public Policy, 19
January 2011, http://knowledge.wharton.upenn.edu/article/the-goldman-sachs-
facebook-deal-is-this-business-as-usual/. back
5. John Cook, 'Is Zynga’s Culture Really Rotten at the Core? Hear how Mark Pincus
Described the Mission in April', Geekwire, 28 November 2011,
http://www.geekwire.com/2011/zyngas-culture-rotten-core/. back
1.10 FREE CHOICE AND THE OPT-OUT
CULTURE
Social network gurus have a lot in common with financial traders.
They are young, greedy, reckless, white, male and have difficulties
forming relationships. We will talk in detail about nerd supremacy
later on. For the time being, let's simply state that uncritically
accepting Zuckerberg's positions, as a cure to social problems is
equivalent to trusting a dentist with rotting teeth. Even if he is a
great expert he is apparently careless enough to neglect his own
health. Let us not forget that the good shepherd here is more
interested in the data we are supplying than in our own well-being.
Ultimately, the idea of radical transparency is put forth as the
automated solution to remedy our inability to manage personal
relationships. Like every commercial digital platform, it provides
users with exciting new features that make the analog world seem
poor in comparison. It is impossible for Facebook outsiders to have
thousands of friends and stay in touch with all of them.
Speaking of 'free choice', there is a corollary to the default power
that is worth noting: the 'opt-out' culture. Facebook alters the
settings of millions of users without notification, providing only
obscure references well after the fact. In doing this Facebook
assumes that users themselves have no clue about what they really
want, or at least, that their service provider knows better than the
users do themselves. Digital social networks accumulate enormous
amounts of user data and know how to monetize these with
increasing efficacy thanks to feedback systems (votes, likes, report
abuse etc.). Facebook retain the real identity of their users and have
a more encompassing view of them than they possibly could have of
themselves. Seen from their perspective it is logical to think that any
change will be of benefit to them, since the data proves it in an
unequivocal way. Later, the users can always decide to opt out and
reject this new update. The assumption that new versions are
always better is easy to grasp, in this sense innovations become
self-imposing. Yet this issue is a very uncomfortable one, since,
technically speaking, it is increasingly difficult to enable so many
millions of users to choose easily what should be shared, and how
to share it. Obviously the commercial social networks are not solely
responsible for offering unwieldy privacy settings. Also for users, the
'optimal' strategy in the data-driven world of radical transparency, is
to leave privacy settings more or less at the mercy of default power.
Delegation is intrinsic to these tools. Users are attracted by their
simplicity, but explicitly prefer to choose their own levels of sharing
and exposure. In the same way, also from the point of view of the
social media company, it is not easy to be user-friendly, capture a
mass audience, and explicitly ask for user consent. Both for users
and service providers, to operate by an 'opt-in logic' is more difficult
and cumbersome than just delegating the choice to an algorithm.
Of course, delegation is easier than self-management. Freedom of
choice and autonomy are always difficult and risky. At a mass scale,
it is impossible. Also, as we see in the 'Google culture', a celebration
of the cult of innovation, permanent research and development,
resulting in new software usually being released in untested, beta
versions. True usability is only achieved after incorporating feedback
from beta versions. Imposing a change that turns bad then
becomes a manageable risk, since it can always be redressed if too
many users start complaining.
Let's consider a real life scenario. From December 2010, Facebook
began providing users with a facial recognition feature which
automatically tags uploaded photos. Photos were scanned and
faces identified based on images previously tagged in Zuckerberg's
databases. When this software was introduced in the United States,
it generated a large amount of controversy due to the threat it
posed to privacy. Facebook's responded to criticism by suggesting
users deactivate this feature by modifying their default privacy
settings and opting out. Of course, when the new technology was
released, Facebook neglected to tell its users (whether individuals or
commercial partners) that the face recognition software had been
activated by default on the social network. Facebook is not unique
in this regard: Google, Microsoft, Apple, and the United States
government have all been developing new automated facial
recognition systems. The rationale given to the public is that this is
'for the good of users', and to protect citizens from dangerous
terrorists. But the destructive potential of this technology is
terrifying. In the worst case scenario, an authoritarian regime can
semi-automatically 'tag' dissidents' faces captured in the streets by
CCTV, create a comprehensive system of surveillance, and strike at
the time it choses. In democratic societies, the technology is
accessible to any tech savvy person. The logic of the Opt-out follows
the same rule of developers: release early, release often (RERO).
Constant updates allow user feedback to improve the software in
successive beta versions. Yet, social relations cannot be quantified
in these kind of logical cycles. The evaluative mistakes that are made
when new technology is released can cause pernicious collateral
damage.
Paradoxically, the webization of the social through mass profiling
results in anti-social outcomes, since we all can become guilty by
association or innocent by dissociation. Since human decision
makers are increasingly delegating their power to algorithms, we
can only expect an increasing number of evaluative errors of a kind
that would be easily avoidable in real life, or within decentralized
systems. To bear the same name as someone with a criminal record
or listed as a terrorist by the federal police becomes a crime by
association. The machines turn us into defendants because they are
unable to distinguish us from someone who possesses the same
name. If we have been victim of identity theft, and someone uses
our credit card for an illegal activity, we also become culprits, insofar
as our digital alter ego is guilty beyond doubt We are then no longer
in a regime of 'innocent till proven guilty', but of 'guilty till proven
innocent'. The criminalization of society is the logical outcome of
profiling procedures - which ultimately derive from criminal profiling.
In the end, there only obvious beneficiaries are the ill intentioned,
who are always conscious of the need for an alibi.
Ordinary users are vulnerable to all kinds of abuse because due to
the profiling which turn them into potential culprits. A Facebook
account, or an account on Google+ or Twitter, is not owned by the
user. It is a space made available to the user in exchange for letting
herself be partitioned into commercially interesting bits and pieces.
Strangely enough, the user herself carries zero value, since she
must, prove who she actually is but also that she is innocent. In
Facebook's case, there are a number of reasons for which users can
be banned. The most common one is using a fake name. Some fake
names are easy to notice, but not all are. 'Superman' is most likely
an alias but which algorithm is sophisticated enough to make out
whether 'Ondatje Malimbi' is truly a Kenyan user with a Swedish
mother? To do so it would require access to civil registries, tax-office
files and social security databases; a scenario which is actually not
that unlikely. Incidentally, we should note that authoritarian
governments appear to have far less reservations about
implementing 'radical transparency'.
Managers of social media play a decisive role when it comes to what
is permissible and what is not. In this sense they do help shape the
rules of the society in which we live. They may not have the power to
send somebody to prison but they actively cooperate with
governments to enforce official and social laws of the land. Google
specifically, since the beginning, has partnered with the American
intelligence community. 'Google Earth' began as military cartography
software developed by In-Q-Tel (a venture capital firm with CIA
connections), and sold to Google in 2004.1 After the USA Patriot Act
was passed, with its harsh penalties for any collaborator who assists
government enemies, commercial services providers have become
extremely cautious. Enforcing censorship is less risky than hosting
potential terrorists on their servers, or even people criticized by the
US government. In countries under US embargo, dissidents' profiles
are often closed while the regime's supporters are free to propagate
their views on the government's controlled servers. While eulogizing
Iran's 'Twitter Revolution', nobody, not even the people in the
Administration - who waxed lyrical about its democratizing effect-
seems to have noticed that Twitter was infringing the US embargo
by offering its services to Iranian citizens. The PRISM case is nothing
more than a mere confirmation of what we already know about
Echelon, global tracking and global espionage, with the burden of
the direct, automatic involvement of the major digital players. We
can expect a lot of similar 'scandals' in the future.
Censorship is commonplace on Facebook, which often projects
itself as guarantor of the net's neutrality, a concept we have already
criticized. Facebook's very peculiar idea of democracy is based on its
moralism, as we have seen at work before. Any user suspected of
hate speech may be immediately banned. Here is a characteristic
example: >My Facebook account has been cancelled, with that of
****'s because we were the administrators of the 'Against Daniela
Santanchè' group (a far right Italian politician), or rather, I was
administrator and **** the developer. I tried to log in but I only got
a message that my account had been de-activated. I sent an email
to the address I had found in the FAQ. At first I got no reply, but
received the following response two weeks later, after a second
message:
The media would have us believe that they are means for
accessing experiences, when in fact they have become portals
which merely frame pre-scripted experiences as story-boards,
and continually decode what is livable and accessible through
the internet. [...] A cloning of life takes place, not in the sense
that the media can replace experience, but in the sense that
they are placed as necessary conditions of experience: they
impose on us with the enticement of that old madam called
Technology, whose trump card has always been her lascivious
whisper 'I serve you'.2
1. Ivan Illich remains an essential source on technological tools and the technical
approach that underlies them, even if his analyses are somewhat dated by now. The
distinction he makes between industrial tools and tools of conviviality remains very
timely, however: '‘I choose the term ‘conviviality’ to designate the opposite of
industrial productivity. I intend it to mean autonomous and creative intercourse
among persons, and the intercourse of persons with their environment; and this in
contrast with the conditioned response of persons to the demands made upon
them by others, and by a man-made environment. I consider conviviality to be
individual freedom realized in personal interdependence and, as such, an intrinsic
ethical value. I believe that, in any society, as conviviality is reduced below a certain
level, no amount of industrial productivity can effectively satisfy the needs it creates
among society's members.' See: Ivan Illich, Tools for Conviviality London: Fontana,
1975 (1973), p. 24. back
2. Franco La Cecla, Sorrogati di presenza. Media e vita quotidiana, Milan: Mondadori,
2006, p. 26. back
3. John M. Grohol, 'FOMO Addiction: The Fear of Missing Out', Psych Central, 2013,
http://psychcentral.com/blog/archives/2011/04/14/fomo-addiction-the-fear-of-
missing-out/. back
PART II: THE LIBERTARIAN WORLD
DOMINATION PROJECT: HACKING,
SOCIAL NETWORK(S), ACTIVISM AND
INSTITUTIONAL POLITICS
Everyone wants powerful friends. But they want friends
more powerful than themselves.
Elias Canetti, Notes, Aphorisms, Fragments, 1973-1985
2.01 ONLINE IDEOLOGIES: THE
ENLIGHTENMENT OF GOOGLE AND
THE LIBERTARIANISM OF FACEBOOK
We are now coming to the issue concerns us most directly and is
the closest to us: the political question. Even though politics
appears to have very little connection with social networks, it is
precisely the political ideology behind their respective business
model that makes the major difference between the two giants of
social media and long time competitors: Facebook and Google.
Ippolita has been active in critiquing the totalitarianism of Google,
the platform that organizes all the world's information. Yet Google,
in sense, can also be understood as a continuation of the
Enlightenment project, the old dream of global knowledge
accessible to all who benefit from its benign tyranny. To liberate the
human being from her 'minority position' and let her gain autonomy
was an aim of the Enlightenment, and we surely still appreciate this
ideal. But if is true, the dark side of Google is also the
Enlightenment's dark side: its unrestrained display of scientific
rationality, technological progress and all of the myths associated
with this. The regressive aspect of pure reason is the barbarity of
total control, the alienation of the human, and of the life world as a
whole, which submits to the new religion of the machine. Google is
undoubtedly the realization of the mega-machine in all its positive
and negative aspects. Google develops innovative algorithms and
filters to produce search results, which is ultimately the outcome of
scientific research and technical invention. Yet Google's contents do
not derive solely from profiling its users but also through the effort
to create an abundance of free information. Access to information is
managed by a technical subject, and not by the users themselves,
who intend to be benevolent (the famous 'Don't be evil' motto), in
the context of 'free market' capitalism.
In the United States, Google is perceived as politically 'liberal', which
is tantamount to the center-left in European parlance. In the rest of
the world, Google is perceived as supporting freedom of expression
and to being opposed to repressive (and usually anti-American)
governments. Google's disputes with China have earned it a
reputation as a company standing for democratic values, or at least,
democratic access to information. Free access to all information is
good in principle. On the other hand, it can be understood as a new
reinterpretation of the American Dream, only the frontier
movement is now the conquest of digital information. Progress here
is the accumulation of data, making the network denser, and, a
universal vision of koinè (community, public,) on the global scale. Its
involves an digital community which all contribute to the
Encyclopedia and extends to searches, images, emails, books and all
forms of information. So if we just gloss over the enormous problem
that of all knowledge being managed by a private entity and large
scale technocratic delegation, then, Google is not so bad after all. Of
course, there will be an increasing number of conflicts, due to
Google's vast material interests, and the global reach of its services.
These conflicts will include both private individuals and national and
international authorities and involve infringements of the
fundamental right to privacy, suspicion of abuse of its dominant
market position, cartel-formation, collaboration with intelligence
agencies, etc. But it is equally true that, as a company dealing with
global knowledge, Google does not have a clearly definable political
position.
The same cannot be said of Facebook, which is financially supported
by the libertarian extreme right in the US, or to use that strangely
apt oxymoron: the anarcho-capitalists. It is not easy to describe this
particular ideology in a few sentences, especially from a European
perspective. Libertarian ideas in Europe may come in many shades,
from municipal libertarianism to anarcho-syndicalism, anarcho-
communism, individualist anarchism, etc., yet they all are historically
linked to anarchism, and therefore to socialist internationalism.
From this perspective, a fundamentally anti-socialist reading of
anarchism seems a logical absurdity.
Yet, as we shall see shortly, US rightwing libertarians not only play a
central role in the everyday practices and corporate politics of
Facebook, they are also prominent in shaping a whole set of values
which has emerged over the past twenty years in the digital world.
There are also significant connections between the world of hacking
and libertarian ideas. From this vantage point, we are not out to
explore the epistemic similarities between political philosophy and
economic theory, as much as we are trying to uncover the governing
principle linking apparently disparate phenomena like Facebook,
WikiLeaks and Anonymous together.
2.02 LIBERTARIANISM OR A SHORT
HISTORY OF CAPITALISM ON
STEROIDS
Libertarianism is comprised of a diverse group of political currents
which came to prominence in the sixties, promoting a radical
strengthening of individual liberties, in a strictly 'free market'
context. These political positions have nothing in common with any
kind of socialist tradition or practice. Some of its representative
advocate keeping a bare minimum of shared society, and fall under
the banner of minarchism proposing a minimalist state by
deliberately confusing social relationships with social institutions.
But truly radical individualism, posing as 'anarchist', as it is set out in
the works of the better known libertarian authors such as Murray N.
Rothbard, Robert Nozick or Ayn Rand, the founder of Objectivism,
can only come to fruition if all oppressing social institutions are
dismantled, including the State; hence the somewhat paradoxical
definition of 'anarcho-liberalism' and 'anarcho-capitalism'.1
A good start to understanding the theoretical context of anarcho-
capitalism, is in the work of Murray Rothbard, the first author to use
the term in his writings. Rothbard, an economist who was also a
student of Ludwig von Mises in New York in the 40s, created an
original synthesis between the fierce anti-socialism of the Austrian
School of economics and American individualist thinkers, especially
Lysander Spooner and Benjamin Tucker. According to the Austrian
School, free market capitalism is the only economic system that will
vouchsafe individual freedom. It is good 'by nature' and therefore
property rights are 'natural rights', and expanding property law is
the only means to protect 'true liberty'. Any system interfering
between the individual and the enjoyment of her private property is
considered an oppressive tyranny which should be overcame by all
means possible. Being a staunch advocate of individual freedom as
a supreme good, Rothbard criticizes the moral legalism of those
libertarians who accommodate the institutional status quo. For
Rothbard market freedom can only be effective if the political
practice itself is free of oppressive laws and regulatory measures by
the State.
This approach fall shorts of the concept of liberty, since the only
liberty that matters here, is that of the capitalist market, which is
itself the outcome of the free agency of totally individuals motivated
by their purely private interest in the accumulation of capital and
consumerism. Since individualist anarchism is the political
expression of individual liberty and the free market itself is the
realization of that liberty; anarchism and capitalism are, according to
Rothbard, one and the same thing. 'We are anarcho-capitalists. In
other words, we believe that capitalism is the fullest expression of
anarchism, and anarchism is the fullest expression of capitalism.
Not only are they compatible, but you can't really have one without
the other. True anarchism will be capitalism, and true capitalism will
be anarchism.'2
Later on we will see the paradoxes underlying this blind faith in the
benevolence of the free market. For now let us just emphasize how
libertarian economic theory and policies are deeply related to the
actual practices of Californian turbo-capitalism.3 According to this
line of thought individual liberty can only be realized through
economic and monetary transactions. Considered as actors that are
'free by nature', individuals assign subjective values to the goods,
services, and utilities available in an ideal free market system.
Deregulation is the necessary condition to bring about a market
that is 'benign by nature', without interference from the state and
other public entities. Private property, as a 'natural right' is the
foundation of individual identity; and the accumulation of goods
and utilities constitutes the very substance of liberty.
Society from the anarcho-libertarian perspective is nothing more
than the outcome of purely economic transactions at the individual
level. In order to understand how such a vision has come into being
we need to consider the historical context. According to Austrian
economic theory, especially Ludwig von Mises, Rothbard's guru, the
individual has a practice which defines her a priori, without need for
her concrete actions to be taken into account. Through the study of
this field, praxeology, we can arrive at fixed axioms.
Absolute truth derives from a single axiom only, the Fundamental
Axiom or the principle of action.4 The action axiom asserts
individuals act in order to achieve their subjective ends, by applying
means. This axiom is considered true for all human beings, at all
times it can neither be denied nor falsified, since even negating this
axiom is a form of acting. In philosophical terms, we may describe
the action axiom as a synthetic a priori proposition. From the
fundamental axiom we can derive the following, equally
unconditional truth: all individuals try to maximize their own utility.
An individual always acts in such a way as to alter their present
condition, which they perceive as unsatisfactory, in order to replace
it by a condition deemed superior. Every human action therefore,
consists in the elimination of a perceived want and of the
satisfaction of a need. In other words, every human action tends
towards the advancement of our own benefit. Every action is aimed
at individual profit, but in an entirely subjective manner. The
individual cannot avoid acting, moving and maximizing their own
benefit and this is usually realized through the accretion of wealth.
Plenty is good and more is even better.
The concept of time as a scarce resource sheds more light on the
far-reaching influence of the doctrine of human beings as only truly
free in the role of a consumer. This is precisely the definition of
liberty underlying the digital social networks and 'Web 2.0' ideology.
As time is a scarce resource, and all human action is oriented
towards the satisfaction of needs through the consumption of
goods, speed becomes the essence of achievement. On the basis of
this purely deductive affirmation it follows that in the matter of
production and consumption, the shorter the action lasts the
better. Individuals, as consumers driven by subjective needs, prefer
immediate gratification over long term satisfaction. Soon is good but
the sooner the better. Speed above all else.
Naturally, praxeology as is has been developed in the writings of the
Austrian School is more nuanced and complex is possible to
present here. Yet, like any theory which presents it self as having
absolute validity at all times and situations and for all people,
praxeology exhibits a number of irreducible contradictions. Yet we
need to consider one particular aspect it shares with the anarchist
American individualistic tradition: absolute subjectivism. In classic
economic theory, not only in English one (but also in Marx), there
are objective values from which an axiology may be derived.5
However according to Austrian praxeology no such thing as
objective values exists. Economic exchanges can be beneficial to
both parties, instead must be. If was this not the case then the
axiom of profit maximization in as little time as possible would
collapse. This entails that a good has a value that differs according
to the individuals involved. Therefore, it is possible to gain
distributed profits while at the same time underwriting unlimited
growth, due to an errors in evaluating the wrongly estimated
'objective' value.
But this generalized expansion of individual economic welfare,
which coincide with freedom tout court, is only possible in a
situation of absolute economic freedom, without any interference
by institutions. These institutions are by definition oppressive, as
they seize private properties, manipulate conscious and dull the
senses of individuals who are by nature able to strive for the
satisfaction of their immediate needs. Hence, this is the absolute
reference point of individualism: the individual, posited as an
absolute subject, demands absolute freedom. She needs to be
liberated, in the most literal sense, from all constraints.
The nation state, whether it is in a capitalist or socialist guise, is
clearly the common enemy of the Austrian School and American
individualism. All the more so since the Federal Government and all
its institutions which claim to regulate the capitalist marketplace are
effectively reducing individual freedom. Yet not all libertarians are in
agreement about the absolute necessity to abolish the state.
Nowadays, the most well known exponent of anarcho-capitalism is
David Friedman, a US economist who favors a more gradual
abolition of the state.
The whole anarcho-capitalist discourse can be encapsulated in one
single word: privatization. Privatization can and should be extended
to all sectors of society from firms to common law. If the individual is
to triumph, no mediation whatsoever should be tolerated. But who
then is this alleged individual? Our critique of digital social networks
equally applies to anarcho-capitalism: the crucial question remains
the relationship between individual and collective identity. Since
humans develop their individuality within a social context it does not
make sense, even theoretically, to consider the individual as a given,
absolute identity separate from her social, biological, and cultural
environment.
To be more specific: philosophically speaking, absolute subjectivism,
from which the economic theory linked to anarchist individualism is
deducted, is in open opposition with the radical relativism which
characterizes of our research. Our ambition is not to describe social
network 'as they really are', following the approach of technological
determinism which apparently reveals a technology's true essence.
Still less can we accept the idea that it would be possible for
someone to really know everything about human nature, and hence
to be able to infallibly deduce the essence of society as a whole.
This would be unrealistic as well as unfair. The fact that there are
'realities' external to ourselves does in way mean that we can
depend upon the 'the world' to demonstrate the truth of our
beliefs. Some descriptions of the world are more appropriate than
others, but only because they enable us to act better, not because
they represent the world better than other descriptions. Radical
relativism does not mean that all viewpoints are equally valid. On
the contrary radical relativists support a position that strongly
reflects their own particular standpoint on issues, precisely because
there is no foundation or an ultimate, inherent truth.6
Additionally we may consider the very idea of a subject that is totally
free from any link with the outside world and whose sole purpose is
to act as rapidly as possible in pursuit of purely economic interests
does not reflect the concrete experience of human beings and living
beings in general. On the contrary, we constantly create and
maintain links and relationships for no apparent economic reason
at all. We do not always act to maximize our personal utility. We
even sometimes prefer to postpone (or even to deny) the
satisfaction of a personal desire not only to please other people, but
even simply to expand our sense of freewill, in a complex game of
weighing up the benefits and the drawbacks. To recognize the
positive value of our limits is an essential part of human life
experience (as far as body and language are concerned), despite
the anxiety may cause us to discover our finitude in both time and
space by becoming aware that we are endowed with limited mental
and physical resources, in the same way as our the horizon of our
planet is limited. Personal autonomy is a process, not a state of
nature or something permanent. The interaction between human
individuals (and even non-humans) with the products of digital
technology and the objects of our everyday world, are not
immutably determined and cannot be reduced to axioms from
which rules of conduct could be perfectly derived.
There is no need to be an anti-capitalist anarchist in order to
understand that libertarianism is grounded on a remarkably
impoverished and warped definition of the concept of freedom in
order to justify greed.7 Without going into a detailed refutation of
libertarianism, for our purposes here it will suffice to examine the
misunderstanding of freedom which is the conceptual basis of
anarcho-capitalism. The sphere of freedom is far more complex
than the mere freedom of the capitalist market. A positive definition
of freedom, meaning one that adds rather than subtracts, and
which still has a revolutionary quality, can be found in Bakunin: 'I am
truly free only when all human beings, men and women, are equally
free. The freedom of other men, far from negating or limiting my
freedom, is, on the contrary, its necessary premise and
confirmation. It is the slavery of other men that sets up a barrier to
my freedom [...] My personal freedom, confirmed by the liberty of
all, extends to infinity.'8
An individual is not born free by nature, but becomes free through
multiple collective processes of liberation. If we want to contrast the
two approaches as slogans, we could say that anarchic freedom
begins with the freedom of others, whereas from the liberal
perspective, freedom needs to be separately constructed for each
and every individual. Therefore, for libertarians freedom ends where
the freedom of others begins. Nothing could be more remote from
the anarchist conception of liberty, which is relative and subject to
constant verification, than the purely economic freedom expounded
by anarcho-capitalists.
Libertarianism, initially an economic theory eventually became a
political philosophy influential among parties, something totally
incompatible with anarchism, and even with anarcho-capitalism in
the strict sense. Despite this some of its adepts have gone on to
defending it in parliament. In the United States there is a libertarian
party competing for seats in Congress whose candidate came
fourth in the 2008 presidential elections.9 The US Libertarian Party
draws significant support and funding from prominent business
people, university professors and politicians. Magazines and think
tanks openly claim libertarian leanings and thereby consider
themselves to be the most radical and authentic representatives of
the true American tradition.10 In a sense, the libertarian worldview is
reminiscent of the myth of the white frontier man, alone in a hostile
environment - but fortunately armed with a gun - setting off to
conquer the Far West. Libertarian parties and institutions share a
minarchic orientation, they favor a minimal government that has a
sole purpose of protecting existing rights. Any interference would
lead to an attempt at changing or abolishing the state. This ideology
is very close to the Tea Party line.
There are openly libertarian parties in Argentina, Canada and Costa
Rica. In Europe Libertarianism is far less common, at least in terms
of official policy. Minor libertarian parties can be found in the United
Kingdom, Netherlands and there is a libertarian movement in Italy.
Though the political agenda of many rightwing parties contains
distinctly libertarian elements outside of the United States, Canada
and the UK, there is no coherent definition of what it even means to
be a libertarian.
In Europe, political movements are developing which are intimately
linked with the basic values of libertarianism and they experience a
remarkable degree of success, especially among the younger
generations. For example 'pirate parties' are becoming increasingly
popular. The most important ones are the Piratpartiet in Sweden,
the Piratenpartei in Germany, and the Pirate Party in the UK. But
there are also smaller pirate parties throughout Europe; in France,
Italy, Spain, Austria and the Netherlands. The ideology of the pirate
parties appears to becoming global. These parties advocate the
abolition of 'intellectual property' and are opposed to the dominant
position of corporations and multinational institutions, especially in
the digital realm. They also fight increased police powers and
surveillance through new technologies. Yet, they would like to realize
individual freedom in an ideal technology-driven free market: the
internet. There is a debate raging these days about how to define
the ideology of these pirate parties, but we should note that none of
these parties have a socialist orientation.11 We will return later on to
the links between pirate parties and libertarianism, in the section
discussing WikiLeaks.
1. See in particular: Tom Hodgkinson, ‘With Friends Like These...’, The Guardian, 14
January 2008, http://www.theguardian.com/technology/2008/jan/14/facebook. back
2. See, http://www.forbes.com/profile/peter-thiel. back
3. See, http://www.cato-unbound.org/. back
4. Peter Thiel, 'The Education of a Libertarian', Cato Unbound, 13 April 2009,
http://www.cato-unbound.org/2009/04/13/peter-thiel/education-libertarian. back
5. See in particular: Peter Thiel, 'The Optimistic Thought Experiment' Policy Review, 29
January 2008. http://www.hoover.org/research/optimistic-thought-experiment. back
6. Jeffrey M. O'Brien, 'The PayPal Mafia', Fortune, 13 November 2007,
http://fortune.com/2007/11/13/PayPal-mafia/. back
7. Andrew Orlowski,'Cryptome: PayPal a "Liar, Cheat and a Thug"', The Register, 10
March 2010, http://www.theregister.co.uk/2010/03/10/cryptome_PayPal/. back
8. See, https://www.palantir.com/. back
9. See, http://www.geni.com. back
10. See, http://halcyonmolecular.com. back
11. It is curious that Milton Friedman (1914-2006), winner of the 1976 Nobel Prize in
Economics, a notable proponent of Laissez-faire economics and financial advisor to
the Chilean dictator, Augusto Pinochet, has been vigorously attacked by Rothbard,
who considered him a statist for his position on government control of the gold
reserves and currency issue. back
12. See, http://seasteading.org/. back
13. See http://singularityu.org and Bruce Benderson, Transhumain, Paris: Payot &
Rivages, 2011. back
14. Sarah Lacy, 'Peter Thiel: We're in a Bubble and It's Not the Internet. It's Higher
Education', Techcrunch, 10 April 2010, http://techcrunch.com/2011/04/10/peter-
thiel-were-in-a-bubble-and-its-not-the-internet-its-higher-education/. back
15. Peter Thiel, 'End of the Future', National Review, 3 October 2011,
http://www.nationalreview.com/article/278758/end-future-peter-thiel. back
16. Eric Wesoff, 'Peter Thiel Doesn’t Like Cleantech VC, Mankind', Green Tech Media, 14
September 2011, http://www.greentechmedia.com/articles/read/peter-thiel-doesnt-
like-cleantech-mankind. back
17. Geert Lovink, The Principle of Notworking: Concepts in Critical Internet Culture,
Amsterdam: Amsterdam University Press, 2005,
http://networkcultures.org/blog/publication/the-principle-of-notworking-geert-
lovink/. back
2.04 SOCIAL NETWORKS THROUGH
THE ANARCHO-CAPITALIST LENS - OR
THE MANAGEMENT OF SOCIALITY IN
THE ERA OF BIG DATA
Social networks predate the internet. Sentient beings in general and
in particular human beings, need to develop relationships among
each other. Few things indeed are worse than loneliness. Even
violent criminals, hardened by the prisons' inhuman conditions of
detention, shudder at the prospect of solitary confinement. May
testimonies of prisoners of war reveal that would rather face
physical torture than solitary confinement, since at least there is
contact with their torturer. Several scientific experiments conducted
on sensory deprivation have demonstrated that a healthy individual,
if immersed in a liquid at body temperature and deprived of
auditory and visual stimulation, rapidly looses any awareness of the
boundaries of his own body and risks insanity, obsessed with the
sound of his own heart. It is only through the acceptance of one's
own limitation that overcoming solitude in a way that is not harmful
to others becomes possible. Rising above loneliness through
socialization means that we recognize our own limitations and open
ourselves to creative sharing. According to Luce Irigaray: 'The
proximity of the other, or more precisely with the other, is
discovered in the possibility of creating a common world with him or
her which does not destroy the personal world of either one. This
common world is always in the act of becoming.'1
The need to contact within our own species is not limited to mere
survival activities (obtaining food, protection against predators,
reproduction), and this need grows with the increase in neuronal
complexity.2 Among humans (but equally among great apes) the
relational dimension slowly begins to break away from the
individual, literally thanks to the technè, which impacts on our
relationships and is the connection between the self, peers, and the
world. The first social mediation tool, in a certain sense the first
social medium, was probably fire. Instead of huddling together like
most social animals do, human groups started to relate to the social
medium - fire - by defining a social space organized around that
specific technical phenomena. All techniques that evolve into
technologies are instruments of mediation in the relationship with
the world and with others. Language is the simplest and most
powerful instance of this phenomenon: it establishes a separation
between the individual and the others (mediation) and permits the
projection of past memories (project, desires) into the future. In
other words, languages allow us to share personal imagination in a
shared, collective imaginary.
The story and the stratification of this complex network of
relationships that we call society is a kind of consensual
hallucination which we can access through language and symbols
by using evolved higher cognitive functions of the neocortex.
Animals possessing only a small frontal cortex are less complex than
human and are capable of producing practically no artifacts.
Neuroscience research demonstrates that when the functionalities
of a person's frontal cortex are compromised, she loses the
specifically human characteristic of empathy. Such a person will no
longer be able to imagine what an other person's experiences may
be. Once their reflexive capacity is either damaged or even
destroyed, they can no longer perceive themselves as individuals
belonging to various social groups such as family, sports teams,
groups of friends, social class, workplace team, local community etc.
The meaning usually assigned to things and to the world becomes
confused, fluid, ambiguous and ill defined. Nothing makes sense
any longer, in a distinct, articulated and communicable way.
To understand the world of which we are part means to position
ourselves in an environment which transcends our finitude as
individuals in space and time, while still comprehending this
environment through a fictional collective idea. The very prospect of
imagining and planning a future based on past experience, and
then to understand what surrounds us, falters at the moment that
we are no longer able to go through and modify in a significant way
the networks to which we belong. Even to imagine this has become
impossible. Paradoxically, when we are confronted with too many
data, we become unable to make sense of any of it. The sheer mass
of data and the speed at which information hits us makes any
analysis cumbersome, or extends the time required to a potential
infinity. Such an analysis hence becomes pointless using the
traditional methods. Yet there are two related concepts that allow is
to continue exploration and analysis: Big Data and profiling.
At the beginning of the 21st century, one gigabyte (one billion bits,
i.e. one billion text characters) seemed like a large amount of data. A
decade later, the internet contains a hardly imaginable amount of
data, something near five trillion gigabytes, the numbers are
predicted to double each year.3 We will provide two examples in
order to grasp this order of magnitude. A high-definition feature film
requires several GBs. Currently a personal computer contains more
data than an entire family would have been able to produce over
several generations. There are billions of site-pages on the internet,
but there exists also a large number of unconnected networks
which may be larger than anything we can imagine, or even what a
human brain can picture.4 We have entered the era of Big Data and
we are still only at the beginning.
In everyday life also, even when if we are not directly involved in the
use of the devices generating this data, we are witness to countless
occasions for the detection, storage and analysis of data involving
almost every human activity. The details are increasing and the
resolution is ever more finely honed. Everyday, an extraordinary
volume of SMS, emails, calls, posts, images, videos, chats and
documents of all types are being produced. There is no way we
could be aware of even a fraction of all the data being sent and
exchanged via WiFi networks and mobile devices capable of tracing
our movement. Search engines register all our requests through
logs, cookies and LSOs (local shared objects). Automatic payment
systems in toll booths, supermarkets, ATMs record all our
purchases. Social networking platforms record all our connections
with friends, colleagues, co-workers and lovers. Record, archive and
analyze everything at optimal speed. Quantity and speed are always
viewed as advantageous.
However, the focus is not on the magnitude of this, inordinate as it
may be, but the interrelationship between data and the increasing
opportunities to increase access and work from a smartphone, a
tablet or computer. Because this data is linked to us, we cannot be
dissociated from it and it constitute our digital footprint. Our
identity is therefore perpetually reconstructed through data
collection and analysis. But this has nothing to do with knowledge:
all Big Data can do is to provide ever more opportunities to make
profits through profiling.
In the first part of work we have already discussed the construction
of a profile, a unique digital fingerprint that identifies individuals as
precisely as possible. It is no coincidence that the vocabulary used is
'fingerprint' and 'traces', as if we were on the scene of a crime.
Profiling is an activity that originates from criminology. Whenever we
use digital tool and services we leave trace that might be subject to
profiling through analysis and archiving. The metadata is used from
profits, which in turn allows the existence of a 'free' 'Web 2.0'.
Unlike machines, human beings are not able to manage Big Data.
Machines can analyze and calculate in an individual's most likely
behavior. Recall that for anarcho-capitalists, the individual realizes
herself in action, through two variants production and consumption.
Since individuals are no longer able to orient themselves in the
noise of data that surrounds them, it becomes necessary to
delegate tasks to machines. In order to get closer to the ideal
society, individuals need to become machine-readable. They must
also continuously feed the databanks within ever accelerating
feedback loops. Users explicit and implicit preferences are then
archived, disaggregated and re-aggregated in real time.
Profiling is the promise of freedom automated: contextualized
advertising, research into users' sentiments to provide personalized,
tailored ads in order to maximize click-through sales. This is shortly
followed by the disposal of the purchase as soon as possible in
order to purchase a new commodity. We, the users, are all suspects
whose most intimate details must be known so we can satisfy our
compulsive craving for new and immediately obsolete objects. The
problem of privacy is endless discussed, but only enters the public
discussion once it has already been violated. This issue is usually
coupled with complaints about the immorality of an authoritarian
system that divides people into categories. In the era of Big Data
conspiracies are rife. But the real problem is much more concrete
and distressing because it affects us all personally and not as an
anonymous mass. While certain individuals want to be profiled, for
the others whatever we do in order to avoid profiling, our digital
footprint is inescapable. There is no way we can opt out once
enlisted in the army of the data-suppliers. We are all prosumers in
the sense that we are both at once the producers and consumers
of data.
The problem relating to the use and abuse of data mining have
been subject to debate for some time.5 New lines of digital
segregation are being created, based on access, i.e. which
researchers, institutions and groups have the means and the
opportunity to use this data? What are the rules, what are the limits
and who decides? Here is not the place for a detailed examination.6
We will return to our main point here. This is not about going
against progress and its promise of a brilliant future, nor is it an
escape into Luddism or into its exact opposite, cryptography. To
hide serves no purpose; neither does refusing to come to terms
with the present order of things. What we need to do is to get a
clear understanding of Big Data and profiling, in so far as practical
strategies for the realization of a society modeled on anarcho-
capitalism, an ideology according to which everyone is 'free' to rob
everybody else. The anarcho-capitalist 'utopia' can more accurately
be termed a dystopia, based on control and self-control. We are
imperceptibly drifting from a world rich with meaning from
relationships to one that where meaning exists only through
connections relayed by machines.
It seems we no longer need either theories or practices that are
grounded in personal belief and proved by life experience. The
status of knowledge is transformed, because it seems that the
figures speak for themselves. Knowledge emerges from data as self-
evident and imposes itself as a certainty. Statistical correlations
establish relationships between things and have a bear on
relationships between people. We no longer shape a discourse;
data is to have the last word. This is the chimera of a data-driven
society, where the role of the human subject is practically irrelevant.
The role of humans now is one of docile acquiescence where we
relinquish out ability to choose and desire. It seems a parody of the
ancient Delphic maxim 'know thyself', and instead is the messianic
promise of the Quantified Self movement, 'Self-knowledge through
numbers'. Give us ever more powerful machines, handover all your
data, be transparent and we can predict the future. The future of
the market, of course.
We fly over the world, we consider it from the outside, we see
oceans of data, expanding and swirling, transformed by tsunamis of
social trends, as sudden as it is fleeting, occupying all available
space before giving way to the next start up. We can analyze the
attitudes of the masses and the aggregate opinion is easy to obtain
through polls and data mining.7 We, the targets are enthusiastic and
willing victims; we love to be 'free' consumers. The general, global
recording of everything is the price to be paid if we want to be truly
'free' to choose. An algorithm can inform us of what we truly want: it
already advised which book to buy on Amazon. Algorithms correct
our Google searches, suggest to us which new film we should see
and tells us which music best suits our taste. It is an algorithm that
tells us of our potential friends on Google+, LinkedIn, Twitter and
Instagram. Algorithms are paying attention for us, and encourage
correct socializing. In the near future it will be no longer be
necessary to desire anything, since an algorithm will know our
desires before we do.
This future will be the equivalent of seeing with 'the eye of God',
who is able to predict the future in the crystal ball where the deluge
of information flows. Open your heart, let your body be dissected
into useful segments, speak your mind, tell us where you are now,
what it is you are doing, and who is your current company. Without
thinking say it all, now, and you will obtain all you desire, without
even knowing yet what it is you actually desire. Inexpressible vertigo
(in the literal sense of what 'cannot be'), infantile enthusiasm (in the
original sense of infans: the one who does not talk yet), mystical
ecstasy in front of the Matrix before our very eyes. The expressions
and imagery about Big Data often take on a religious tone, and that
is a bit too frequent to be mere chance.
A kind of techno-fascistic religiosity is the fetish underlying the
knowledge society of Big Data. It is an indifferent religion since
having a sufficient quantity of data, means any viable hypothesis can
be confirmed. Like the Bible, the Q'uran or any holy book, the scope
for interpretation is endless, yet Big Data is vastly larger. It is
precisely because Big Data is so vast that is can be manipulated to
accommodate and support any assumption. Statistics can be used
for everything but ultimately prove nothing, they are apparently
scientific proofs of highly ideological presuppositions.
Meanwhile, paraphrasing John Lennon, life is what happens to us
while we're busy amending our digital profiles and contributing to
an even mass of data. One could argue that there are inherent
limits to digital computing and that the libertarian faith in innovation
without limits is a logical absurdity. But even in the absence of limits,
this faith is an irrelevance, as we would not longer be able to
manage our data in an autonomous fashion anyway. We would no
longer be able to manage the very knowledge that keeps us afloat.
So time to put aside the illusions of omnipotence and to descend to
Earth. Performing a specific search with a concrete and defined aim
exposes the trap lying behind the sheer endless availability of data.
Our goal is to write a work for curious people. There is a great
difference between writing a serious essay and making an endless
compilation, and inevitably imperfect still, of critiques, general
observations and alternative proposals. The mere accumulation of
more data does not by itself result in a better quality of research.
There is not such thing as an objectively superior choice because it
supposedly represents the 'natural' outcomes of a search from an
unbelievable quantity of data. Worse still, the data is often
automatically deemed correct, and neutral, just because it is derived
from sensors placed on the body using wearable computing
devices. There are only subjective, well-defined choices, when
personal preferences are passionate pleas for something that we
do not like, just for the duration of a click, but we are willing to
become involved because it matters to us.
1. Luce Irigaray, Sharing the World, London: Continuum, 2008, p. 47. back
2. See the work of Boris Cyrulnik in particular: Ensorcellement du monde Paris: Odile
Jacob, 1997, Les nourritures affective, Paris: Odile Jacob, 2000, and De chair et d’âme,
Paris: Odile Jacob, 2006. back
3. The figures are taken from the report of the independent analyst firm IDC and
should be treat with the usual caution since they are a large multinational company,
with their own vested interests. But since the purpose here is purely demonstrative,
the precise numbers do no alter our argument. For more information see the 2011
IDC Digital Universe Study http://www.emc.com/collateral/about/news/idc-emc-
digital-universe-2011-infographic.pdf and David Bollier, The Promise and Peril of Big
Data, Washington: The Aspen Institute, 2011,
http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_an
d_Peril_of_Big_Data.pdf. back
4. Contrary to what one might imagine, the public knowledge is only a fraction of
existing knowledge. Much of the knowledge is secret, state secret or trade secrets,
removed from the public eye and largely meant to subjugate and manipulate us. See
the comprehensive research undertaken on 'secret materials' by Peter Galison,
physics professor at Harvard, especially 'Removing Knowledge', Critical Inquiry, 31
(2004) Chicago: University of Chicago Press,
https://www.fas.harvard.edu/~hsdept/bios/docs/Removing%20Knowledge.pdf and
his documentary film with Robb Moss, Secrecy,
http://www.secrecyfilm.com/about.html. back
5. Dino Pedreschi et al, 'Big Data Mining, Fairness and Privacy: A Vision Statement
Towards an Interdisciplinary Roadmap of Research', KD Nuggets, October 2011,
http://www.kdnuggets.com/2011/10/big-data-mining-fairness-privacy.html. back
6. For a good critical overview see, Danah Boyd and Kate Crawford, 'Six Provocations for
Big Data', A Decade in Internet Time: Symposium on the Dynamics of the Internet
and Society, September 2011, http://papers.ssrn.com/sol3/papers.cfm?
abstract_id=1926431. back
7. The latest software for understanding social network dynamics and social influence
is SenticsNet http://sentic.net/. back
2.05 THE HACKER SPIRIT AND THE
DISEASE OF ANARCHO-CAPITALISM
There are some people who absolutely love machines. They must
know how devices work, and nothing will mitigate their curiosity,
least of all the fear of being punished for breaking the law. They
enjoy taking machines apart and putting them back together,
tinkering with them in the process to improve their performance. In
the case of digital devices they write codes to make them
interconnect and to function in a new way. They literally feed the
machines and give them new life. These passionate people are
hackers.
There are various types of hackers. Code hackers write in various
computing languages - and their 'dialects' - to create new programs.
Security hackers invent novel ways of bypassing or breaking a
system's protection. Sometimes they actually put this knowledge to
work, but often they just make their discoveries public. They
sometimes can be found working for large corporations,
governments, institutions or the army. In these cases they are
supposed to enhance the security of computer systems. Hardware
hackers are more interested in directly altering machines: cutting,
soldering, assembling and fixing not only computers but also radios,
stereos, and even, bicycles, toasters and washing machines. Geeks
on the other hand, may not always possess expertise in coding, but
they move effortlessly in the digital realm, and can create and
modify to audio, video, and text objects, and use communication
tools like IRC (Internet Relay Chat).
In the mainstream press, hackers and geeks are often portrayed as
repressed and brilliant adolescents who threaten to take down the
whole digital world from their obscure rooms filled with computers
and modified devices. Totally withdrawn in their own universe, they
are more at ease in front of a computer screen than facing a real
human being. They are nerds: physically below average, poor at
sports, shy with girls and lacking of social skills. But they do possess
other abilities, in particular the ability to adeptly use computers.
They have a power they can put to use wherever it suits them: they
potentially can destroy your data on a whim, or for money or, to
take revenge against world that does not seem particularly
interested in them.
These simplifications however, do not do justice to the complexity of
the hacker phenomenon. This stereotype makes no distinction
between the mercenary hackers training the military for cyber
warfare, and the 'script kiddies', who use viruses and malware they
downloaded from the internet. The mythical figure of the hacker
breaking into databases, stealing private information and mocking
the police is the most widespread representation of an enduring
maxim: knowledge is power. Mastery of technology generally is a
source of power. Knowledge-power is a social power in the same
way as a tribesman who can handle fire may establish himself as the
leader of the tribe, or as a shaman, to whom the leader of the tribe
must respect in order to gain from this technical power only he can
handle. Whoever has the knowledge can make use of it to become
superior to others and exert authority. Knowledge about machines,
in a world shaped largely by the machines themselves, is the
greatest possible power that exists in our age. The control of this
power creates an unrelenting struggle for supremacy.
Nerd supremacy has ancient roots. In a society that is run by
machines, it is logical to assume that those who master the
machines also command society. Though the specifics may not yet
be clearly established, it is at least arguable that a certain type of
relationship style has impact on most of the technical instruments
we make daily use of and which shape the way we interact with each
other. It makes no sense to seek for the absolute truth, nor to figure
out what is a 'real' hacker. If we were to analyze thousands of
individual cases and personal stories about hacking, we would be
left with such diversity that we would not be able to come to a valid
interpretation. There is no doubt we could marshal enough
'evidence' if our aim was to prove that hackers are dangerous
criminal, but we could equally come up with 'proof' that hackers are
actually exemplary citizens, fearlessly fighting against multinationals,
banks, and authoritarian governments to create a more free world.
Instead, let us rather observe that among the most influential and
powerful individuals in the world of today, whether it is in the 'real'
economy or in the realm of the imaginary, we find many hackers, ex-
hackers and aspiring hackers. It is uncertain to what extent Bill
Gates, Microsoft's founder, and Steve Jobs, founder of Apple, are
hackers but is well known that the Silicon Valley of the seventies was
the common denominator for them both. Larry Page and Sergey
Brin founded Google at Stanford University, and following the classic
geek tradition, relocated to a garage in order to house the machines
running their nascent search engine. They might be hackers with
commercial ambitions, unlike Steve Wozniak - Apple's other Steve,
but it can not be denied that they possess IT expertise. As can be
seen in the feature film The Social Network, Mark Zuckerberg is very
much at ease with machines, so much so that he had devised a
computer-assisted dating system, which we now know as Facebook.
Julian Assange, the controversial front man of WikiLeaks, has a past
as Australian security hacker before he challenged governments
across the world by publishing secret diplomatic cables. Linus
Torvalds, creator of Linux operating System, is typical of many
hackers who devote their time trying to write better code than
everybody else. Possibly less well known to the public is Richard
Stallman, the founder of the Free Software Federation (FSF).1 He is
perhaps the best example of the purist hacker following his own
ideals of freedom without any compromise.
It is very important to understand the values that underlie what has
been called 'the hacker spirit' or even 'the hacker ethic'. This
because these values profoundly shape the collective, technological
imaginary, digital sociality and ultimately the society in which we live
as a whole. We must look beyond hagiographic reconstructions of a
mythical past where lanky and bespectacled heroes of the digital
revolution, with a twisted and odd sense of humor are driven by
pure love of knowledge and a peculiar notion of fun.2 Human
actions are never pure, nor can they be predicted by some
automated pattern or at least not yet. Simplistic trivialization of the
apparent differences between good and bad, 'white hats' versus
'black hats' hackers, or between hackers who have sold out to
corporation and governments versus those who remain
independent only serve to obscure a proper understanding of the
hacker spirit. The irreducible differences of individual stories are, as
always, a starting point for observation. But the question remains -
do these differences also betray similarities? Is there something like
a 'hacker style'?
Ippolita has a strong bias in favor of those individuals who get their
hands dirty and attempt to lead an autonomous life. One of the
mottos that describe the hacker attitude is 'hands on', put your
finger on it. Another motto is 'information wants to be free': we
should reject all barriers. To achieve this goal, hackers share what
they learn and explain their techniques and strategies, which is also
the way of gaining merit in the hacking community. From a political
viewpoint, when hackers and geeks talk within their community, the
use of the word freedom is frequent, as in freedom of expression, of
thought, in private life, as an individual, etc. The other dominant
concept is individual meritocracy. In the United States this
sentiment more or less corresponds with the liberal world-view. But
there are so many subtle shades in the spectrum that the original
color tends to fade away.3 If Zuckerberg and Stallman are total
opposites of each other, it may well be that their unexpected
similarities are revealed precisely by this opposition. The former
spends his time harvesting web users personal contents through
proprietary software, you can't download or modify Facebook's
code, in order to reap large profits from individually targeted
adverts. The latter appears to be completely committed to
protecting the software's basic freedoms: execute, modify, distribute
and share. Nonetheless, both are somehow hackers.
The common character trait both of them share is their
individualistic tendencies. There are very good reasons for this: even
from a purely technical viewpoint, sharing is only possible among
individuals if they are able to create personal projects. Besides, in
more prosaic terms, the relationship between a person and her
computer had become so closely personal from the 1980s onwards
that it borders on solipsistic alienation.
There are other remarkable similarities. The cult of excellence, for
instance: permanent improvement is imperative. A third
characteristic is the rejection of limits as a principle. Overcoming
obstacles, crossing boundaries, penetrating systems, is the
language used to describe the rush into technical space, which, with
the advent of the internet, had become a true virtual space in itself.
The tendency to set challenges, like 'which of us will get furthest' is
the outcome of individual excellence coupled to the will to explore
the unknown. In its crudest form this takes the shape of a duel
between two opponents. But there are more complex
configurations, all subsumed under the competition principle which
in itself is typically a male behavior. Not surprisingly hackers are
overwhelmingly males, with a high level of education, an inclination
towards abstract thinking, and often diagnosed with Asperger
syndrome.4 To develop from a small clique of computer geeks to a
vast corporate hierarchy, takes less time than one would think.
Communities of hacker-geeks celebrate meritocracy, risk-taking, the
need for maximum commitment, and finally the duty to think
independently before pestering your geek friends with basic
questions, a precept epitomized by the acronym R.T.F.M. - Read The
Fucking Manual. A community consisting of people who are able to
understand and appreciate individual effort also knows how to add
value and agree on a shared cause of knowledge. The explicit
references to personal charm, pride for discovering an elegant
solution quicker than anyone else and technical expertise acquired
at a high price are all recurrent motifs of hacker culture.5
The individual engaging in hacking is surrounded by an aura of
sorts, conferring on him a kind of superior power. On the other side
are the non-hackers, the users or the sheep who understand
nothing about computers. Manuals and guides are published for
these users, often called lamers - it is even possible to teach them
how to use certain programs! But it remains a common sense fact
that knowledge has a pyramidal structure. There are exoteric levels,
understandable to the general public, and esoteric levels only open
to the initiated. There are many levels of initiation and competence,
referred to in the stereotypical distinction between those who
belong to the elite in terms of being familiar with machines and
those who are mere amateurs.6
From this state of mind arises two behavioral characteristics: one is
a thinly veiled contempt of the physical body, the real world and for
physical contact with other human beings. The second
characteristic is a tendency to see everything in black and white, like
a transposition of the ones and zeros in binary code. Either it is right
or wrong, good or bad. The world is an epic battle between the
forces of good and evil, the dark forces have a global impact. The
knights of Knowledge, the Jedis of the machines, may chose for one
side or the other, but it is clear there is war and those who have
more weapons cannot remain mere spectators. We are drawing a
caricature to describe these competing traits but many examples
are consistent with this vision. A spirit of confrontation lingers.
Individualism and the cult of limitless liberty are two major traits
shared by both the hacker spirit and anarcho-capitalists. We can
add to that a blind faith in the redeeming power of technology. We
should also note that both anarcho-capitalists and hackers share
the same enemy: institutions, and more specifically US federal
institutions, which impose limits on their liberties (unrestricted
access to knowledge in one case, unrestricted freedom to get rich in
the other). Yet if we are to believe Eric S. Raymond's half-serious
pronouncements, the points of agreement go much further. Eric
Raymond himself is a high-ranking, 'historic' member of the hacker
tribe and a dyed-in-the-wool libertarian. In his portrayal of the
fictitious person J. Random Hacker, he describes his political
convictions as follows:
There are good reasons to take this analysis seriously. Even if,
generally speaking, hacking is rather apolitical, politics have begun
to dominate in the hacking sphere. More than twenty years have
passed since the first large-scale suppressive operations against
hackers, with 'Operation Sun Devil' as a climax. In the US numerous
youths were trampled down during the 'Hacker Crackdown', and its
second act a few years later in Italy with 'Fidobust', aka the 'Italian
Crackdown.8 The suspicious attitude of the authorities has not
changed ever since. There has been an increase of repressive laws
excessively widening the scope for surveillance and banning
hacking-associated initiatives. Exemplary in this respect are the
Digital Millennium Copyright Act (DMCA) in the United States and
the European Union's Copyrights Directive (EUCD). Conflicts in the
'real' world have now shifted into the 'virtual' world giving a new
lease of life to old antipathies. Keywords like labor, class and
property see themselves updated into a Web-compliant jargon.
Large numbers of people are being criminalized on the pretense of
protecting copyrights, which all too often are a mere scapegoat for
corporate greed. Where some see virtual worlds as open
playgrounds, for the unscrupulous and acquisitive they are empty
lands ripe for conquest.
'The Underground Myth' is an article that puts the acts of hackers
into proper historical context and describes the ongoing process
where control of the internet is increasingly concentrated in the
hands of a few firms and institutions.9 All these organizations have
largely benefited from the contributions of these kids, whom they
criminalized out of curiosity only to co-opt them shortly afterwards
in order to improve their security systems, i.e. to build improved
controllable networks. The 'digital piracy' allegory is therefore very
appropriate only not in the sense intended by corporations. The
way cyberspace is being occupied has much in common with the
way America was conquered. The 'frontier' trope recurs, and with it,
that of colonization and the unavoidable violence associated with it.
The abuses and massacres perpetrated in order to spread
'civilization', together with material, human, and animal losses
incurred were not mere 'collateral damages', but they were essential
to the colonizing mission. In the same fashion, the conquest of the
digital realms implies pyramids of profiteering abuses at the global
scale and enormous pile-up of electronic waste and obsolete code.
In order to make all this possible, it is necessary either to buy out or
destroy the pirates infiltrating the digital oceans.10
In the 17th and up to the early 18th century, pirates in the New
World had a more adventurous, and also more free and egalitarian
life than the sailors on Spanish, British, French or Dutch ships.11
Later they were often coerced to sell their liberty and enlist under
the flag of the various European powers whose ships they
previously plundered. 'Letters of Marque' transformed pirates into
privateers, or in others words, into mercenaries. In the same
fashion, hackers at the beginning of the 21st century were
confronted with joint attacks by institutional colonizers and often
opted to co-operate with them. From being free explorers they
became proficient mercenaries in the pay of companies and
governments who are out to establish a new order of things in the
digital realm.12
The 'global war' frame of mind satirized in the film, War Games has
unfortunately materialized in the realm of digital sociality. News
reach us everyday about malevolent hackers engaged on this or
that front, against white, black, yellow, or red terrorists, all with
vague, unintelligible or absurd demands. They are battling or
collaborating with intelligence services with underhand deals and
suspicious pasts. The once amusing scenarios of gnostic hackers
working with the Illuminati and Voodoo gods of cyberspace, has
now become a sinister conceit. Cyber warfare is by now an everyday
concept. The internet has become an immense resource, but also a
threat to the established order.13 The sheer quantity of computers
and their developing processing power can be used to manage
flows of malignant data in order to extract private information, or to
carry out attacks, as with the armies of zombie computers remotely
controlled by other computers (botnet). For example the computers
control by government agencies used to shutdown networks.
Viruses are created to attacks enemy targets, or to slow down or
disable military research programs. Today's wars like the one in
Afghanistan, 'in defense of democracy', are fought at a distance with
drones, operated by remote control from bases thousands of
kilometers away. The modus operandi is precisely the same as that
of videogames, only with all to real deadly effects.
Are hackers a menace in such an apocalyptic scenario? Are they
buccaneers or privateers? Are they dangerous subversives
combating the established order, or are they the hired hands of
strong powers with libertarian tendencies? Let us now take a trip to
the far North of Europe, to Sweden, where we will find a number of
elements in the farrago of hacking, piracy, and libertarianism: the
Pirate Bay site, the Pirat Partiet and WikiLeaks.
1. Richard Stallman's Free Software inspired the Open Source movement and was very
influential within the digital culture right from the beginning. back
2. The best-known hagiography, which is still a good historical reconstruction, is Steven
Levy's Hackers, Heroes of the Computer Revolution, New York: Penguin, 1984. back
3. Gabriella Coleman is one of the few scholars who try to go beyond the stereotypes.
See: Gabriella Coleman, 'Hacker Politics and Publics', Public Culture, New York:
Institute of Public Knowledge, 2011, http://gabriellacoleman.org/wp-
content/uploads/2012/08/Coleman-hacker-politics-publics.pdf. back
4. Asperger syndrome is an autism spectrum disorder, and involves socializing
difficulties and stress. It has been noted that San Francisco's Bay Area has by
percentage many more cases of Asperger’s than the US national average. In 2011,
lawyers in the United Kingdom used Asperger’s as an extenuating condition in order
to reduce the sentence of Ryan Cleary, an alleged member of the notorious 'Lulzsec'
hacker group. We will go more into the 'Lulz spirit' (Laughing out Loud) later on, it
suffices here to say that it consists of breaking into secured systems, extracting
private data and publishing it. back
5. FAQs (Frequently Asked Questions), a repertoire of questions and answers that show
how to use a services, programs and tools, demonstrates in an impressive manner
this very belief, that the individual must show that she has done all she can for
herself before asking for help. This approach can take various forms, some more
community oriented through prioritizing the necessity to develop shared knowledge,
but under no circumstances should shared knowledge be seen as some kind of pre-
digested pap accessible to all. The ability to find your own way out when challenged
by a novel situation, and to apply a creative solution to the problem has obvious
parallels to the myth of the explorer, able to orient herself in an unknown territory by
reading and interpreting the clues she discovers around her. back
6. For more detail on what we are discussing here and to get to grips with what
motivates a hacker, see Phrack, one of the best independent publications on hacking
which has been active since the mid-eighties: http://www.phrack.org. back
7. See Eric S. Raymond, The Jargon File,
https://web.archive.org/web/20130827121341/http://cosman246.com/jargon.html
Despite being somewhat egocentric and a bit dated by now, The Jargon File (archived
August 27, 2013) remains a fundamental document to understand the history and
culture of hacking up to the beginning of the 21st century. back
8. See Bruce Sterling, The Hacker Crackdown: Law and Disorder on the Electronic
Frontier, New York: Bantam Books, 1992, http://www.mit.edu/hacker/hacker.html
and Carlo Gubitosa, Italian Crackdown: BS amatoriali, volontari telematici, censure e
sequestri nell'Italia degli anni '90, Milan: Apogeo, 1999. back
9. Anonymous, 'The Underground Myth', Phrack Magazine, 18 April 2008,
http://phrack.org/issues/65/13.html. back
10. See our anaylsis in Ippolita, Open non è free, Milan: Eleuthera, 2005. back
11. Even today, pirates as heroes of the popular imagination embody a very specific
worldview based on liberty and equality. They were libertarians avant la lettre in the
sense of socialist internationalism. This thesis is supported with a wealth of historic
details in Marcus Rediker's research. See: Marcus Rediker, Villains of All Nations:
Atlantic Pirates in the Golden Age, London: Verso, 2004. back
12. Exemplary in this respect is the 'Tiger Team' case. This was the name of a group of
security hackers hired by Telecom Italia and the Italian secret services. The team was
involved with fraud in the 2006 election and in selling confidential information to
French, Israeli, and American secret services. See details see the investigative
documentary of Beppe Cremagnani and Enrico Deaglio, 'Gli Imbroglioni' Diario,
numero speciale 18 e film, 2007. One of the most disturbing characters in this dark
story is Fabio Ghioni, a security expert, essayist and novelist. As an instructor of
malicious hackers for several government agencies, he is the promoter of the ENOC
program (Evolution and New Order Civilization). Perhaps this is just bait for rich
people with money to burn but it may also be yet another transhumanist project,
since overcoming the human condition through technology, is a recurring obsession
for most anarcho-capitalists and technophiles. back
13. 'The Threat from the Internet: Cyberwar' The Economist, July, 2010,
http://www.economist.com/node/16481504. back
2.06 PIRATE PARTIES, OR
TECHNOLOGY IN POLITICS
In 2003 digital pirates began infiltrating Sweden's social-democratic
society. Since this year the Pirate Bay has been indexing torrent files
and saving names and addresses of shared files through the peer-
to-peer torrent protocol, a meta-data format that identifies text,
audio, and video files.1 Shared files are not stored on a centralized,
server: they are only indexed so as to make them accessible to
users. This approach enables Pirate Bay to bypass, the problem of
complicity in copyright infringement, which led to Napster's closure
in 2001, Morpheus and Grocker in 2003, and numerous other file-
sharing systems. According to the reasoning of the Pirate Bay,
violations, if they occur, are entirely the users' responsibility. The
Swedish pirates regularly publish on their site the legal letters they
receive from Microsoft, Apple, Dreamworks and Adobe, as well as
the mocking responses they send back to these tech giants.
But what, then, is the specific crime that these pirates are accused
of? Here, the concept of piracy must be seen in the context of the
conflict between big media enterprises operating like a cartel and
the practice of sharing copyright protected files. The organizations
representing the interests of big firms which produce and distribute
multi-media content make use of the 'piracy' moniker to stigmatize
the theft of copyrighted content, which lowers their earnings. Their
reasoning is that every time someone downloads a copyright
protected film (or an audio file, book, video game etc.), that person
will not go to the movies, nor will she purchase the product in
another legal form. Therefore there is considerable economic
damage resulting from this theft.
Let us assume, for the sake of the argument, that private property
should be defended when you harm the economic interests of
others. The a priori argument in opposition to this is that our
purchasing is artificially constrained while there is an enormous
proliferation of content in all mediums. In other words, if I have only
ten euros to spend on records, there is no way I will be able to
spend one hundred. But I can download music for free, usually with
a significant compromise in quality as mp3 cannot compete with a
high quality vinyl, nor can streaming video be compared with a
cinema screen. Many consumers may wish to buy more books,
films, or records yet they must limit themselves to what surplus cash
they have. In many cases if these contents were not free, they would
not 'consume' them. In this sense, there is no real loss in earnings.
But there is also an a posteriori argument that can be made with
the benefit of hindsight, the increasing turnover of the
entertainment industry globally proves that cultural content is a
source of profits. Yet greed knows no limit and the idea that profits
can grow exponentially is the dream of every boss of a major media
company.
There are also legal reasons that make this definition of 'piracy'
problematic. Theft of a digital goods that can be identically
reproduced at very low cost (memory drive plus the electricity
needed to make a copy) is starkly different from the theft of a non-
digital good.2 A copied file does not dispossess the original owner of
the file. It follows that intellectual property of this type of goods
needs to be distinguished from the property of non-digital goods.
Furthermore making file sharing illegal, under any circumstance,
tends to erase the difference between commercial and personal
use. Yet it is obvious that the re-sale for profit of a copyright-
protected digital good and the use of it without any profit-making
motives are different things altogether. In fact, it is the architecture
of the content distribution system itself that traditionally makes
extensive personal use possible. A book, once purchased, can be
given away, read aloud, or loaned to a friend. Its sentences can be
memorized, repeated, rehearsed, modified, and reproduced for
personal use. Quoting an author in another book is generally
considered a tribute to the author. In no way can this now all be
redefined as theft.3
In Europe and in the United States, not to mention the rest of the
world, the law is inadequate. Where specific, IT-related law has been
enacted it tends to limit and suppress personal usage for the
benefit of media oligopolies, which have found governments
enthusiastic assistants willing to protect and advance corporate
interests by legislative means. But far from being universally
accepted, accusations of theft are continually raised. Sites like The
Pirate Bay's are true 'repositories of collective actions', to quote the
term used by the sociologist and political scientists, Charles Tilly and
Sidney Tarrow.4 The mass use of identical duplication services leads
to the emergence of zones of economic counter-power, something
that economist John Kenneth Galbraith has dubbed compensatory
power, a concept quite close to the Post-Marxist notion of 'counter-
power'.5 These zones of counter-power forms lines of resistance
against the prevailing power in the absence of competition, and in
particularly with the case of Sweden, against the collusion of the
state with anti-market forces. The collusion of governments with
oligopolies raises serious problems for citizen-constituencies and is
discussed by critics as a kind of 'organized crime' related to a wave
of de-democratization. What makes such alliances more troubling is
the fact that file-sharing has not demonstrably 'damaged' the
creative industries as a whole, but appears to have contributed to
world-economic transformations including an increase in creative
production and an expansion and globalization of media markets.6
In a landmark decision, the operators of the Pirate Bay were
condemned in 2009 to a prison term of one year and substantial
fines. This judgment has been appealed. Apparently under the
pressure of powerful cultural lobbies, the Swedish state went for a
repressive approach. However one of the judges had an
undisclosed conflict of interests, so the case is still far from clear-
cut. After having announced a sale that failed, after a blockade, the
Pirate Bay is still indexing millions of files. The members have been
arrested and prosecuted, but it continues to inspire fear, the Italian
government, for example, decided to block access to the site. The
site is theoretically beyond reach of Italians, but indirect access is
still possible. Through using a proxy, e.g. Google Translate, or other
similar systems, users can circumvent this clumsy attempt at
censorship.7
A small group of 'netizens' deliberately breaking the law online and
therefore demonstrating their disapproval of the concentration of
economic power is not a new idea. This is clearly a vital concept,
since consumer pressure, for example net boycotts, can produce
real change. But it is much more difficult to sustain political theories
inspired by online strikes, calls for action, demonstrations, and other
networked activities, that are leading to the emergence of a new
form popular sovereignty which goes beyond the traditional forms.8
As we will see later on, online activism is often mere slacktivism, and
tends to weaken traditional forms of political commitment. The
benefit of this approach is that it redirects the attention from what
is less important, the economic aspects, in order to focus attention
on the pressing social and political issues.
It is fair to say that the Pirate Bay affair has had a significant political
repercussions. The resurgence of the anti copyright demonstrations
caused by government repression played an important role in the
rise of the Pirat Partiet in Sweden, the first 'Pirate Party' worldwide.
By asserting everybody's right to break intellectual property
protection laws it considers outdated and illiberal, the Pirat Partiet
has had major successes over the past few years, which culminated
in the election of two of its members to the European parliament in
2009. There is no doubt about the fact that the increasing number
of copyrights, patents, trademarks and non-disclosure clauses have
progressively eroded civil and personal liberties. This has occurred
with widespread indifference of the public. The creativity of authors,
inventors, and researchers has been debilitated in the process by
norms which should protect and encourage it instead of defending
big business' interests. Often, the 'total war against terrorism and
rogue states' has been used as a convenient excuse to authorize all
kinds of suppressive measures, which are intended to control the
people for the benefit and protection not only of the cultural
industries, but equally of Big Pharma and the biochemical and
military industries, in short all actors bend on the privatization of
knowledge.
In this regard, the debate around SOPA (Stop Online Piracy Act), a
bill proposed to the US Congress in October 2011, gives a good
summary of the interests at stake. The full title of the proposed act
reads: 'to promote prosperity, creativity, entrepreneurship, and
innovation by combating the theft of U.S. property, and for other
purposes'.9 So the copyrights owners, meaning the media and
entertainment oligopolies wish to pose as innovative defenders of
intellectual property against the thieving pirate. The MPPA (Motion
Picture Association of America), the RIIA (Recording Industry
Association of America) and other media lobbies are pushing for
criminalization, in the narrow sense, for anyone who violates the
current status, regardless whether this is for personal or any other
usage. Yet, we should remember that copyright infringements are
already deemed criminal offenses under the DMCA (Digital
Millennium Copyright Act) and EUCD (European Union Copyright
Directive). Now not only is it possible to criminally prosecute all who
facilitate online tracking of copyrighted material, and that means all
search engines including Google, Yahoo, and Bing, but also all
browsers, such as Mozilla when they are used to track 'illegal' files.
Lined up on the other side are all the network intermediaries, which
do not produce and do not hold 'protected' documents, but which
are used to access these documents. But the oddity here is that
Google, eBay, Yahoo!, Facebook, Twitter, etc., who all ostensibly fight
for the users' freedom, are in fact, as we have shown, the new
masters of the internet. Moreover, all the codes which these tech
giant run their systems on are proprietary, opaque, and protected,
yet they claim at the same time to be advocates for transparency
and openness. The two concepts foster ambivalent practices – at
the individual level at least, they are often mere synonyms for
'totalitarian privatization'. In fact, users have to adopt their
proprietary tools and contribute to their world privately. Thus we
see a transition from the old media oligopolies to the new digital
masters. Positive freedom and autonomy in the tech world seems
more and more a distant dream.
Thus, both large scale digital intermediaries and the Pirate Party
have the same enemy: the media oligopolies. Even though the
Pirate Party is not a hackers party, it can still easily pass as the agent
of progressive political demands, especially among the young, who
have little access to the paradise of compulsive consumption. In a
similar manner, the party also opposes arbitrary police checks. The
website of the Pirat Partiet stated:
1. Since 2009 p2p sharing systems have increasingly shifted towards the use of magnet
links, the traces (hash) files rather than names and addresses, substantially reducing
the flow of metadata and hence the bandwidth required. The Pirate Bay, like many
other similar services started to promote the use of DHT (Distributed Hash Table)
and PEX ((Peer Exchange) as substitutes for traditional centralized trackers. Their
main benefit is to avoid the need for users (peers) to refer to one single server
keeping and distributing the names and traces of torrent files. Combined with the
use of encryption for incoming and outgoing data flows at the peer level,
decentralized protocols strengthen the network, making it both safer and more
reliable, and, of course, much less prone to interception. back
2. The common distinction between tangible and intangible goods is misleading as well
as incorrect, and only serves to strengthen the vulgar mass media interpretation. The
files are not immaterial, they are precise sequences of electrical impulses stored on
enchanced silicon supports. Moreover, without computers and networks they are
inaccessible, and the computers and networks are very obviously material. back
3. Nonetheless, this is exactly what happens with proprietary software. The Windows
'shrink-wrap' user license states that you are not the owner of the digital good, but
that you are merely allowed to use it, without modifying, copying, or sharing it. The
same is true, perhaps to an even worse extent with Apple, since it uses the lock-
down software previously distributed under a BSD license. back
4. Charles Tilly and Sidney Tarrow, Contentious Politics, Boulder: Paradigm Publishers,
2007. back
5. John Kenneth Galbraith, The Anatomy of Power, Boston: Houghton Mifflin,
1983. back
6. Leon Tan, 'The Pirate Bay: Countervailing Power and the Problem of State Organized
Crime', C Theory, November 2010, http://www.ctheory.net/articles.aspx?id=672. back
7. See, http://piratebayitalia.com/. back
8. Leaving aside the more militaristic visions of multitude opposed to empire, see:
Alexander R Galloway's and Eugene Thacker, The Exploit: A Theory of Networks,
Minneapolis: University of Minnesota Press, 2007. back
9. H.R. 3261 (112th): 'Stop Online Piracy Act', October 2011,
https://www.govtrack.us/congress/bills/112/hr3261/text. back
10. Pirate Party Declaration of Principles 3.2,
http://docs.piratpartiet.se/Principles%203.2.pdf. back
11. 'Swedish Pirate Party to Host New WikiLeaks Servers', Piratpartiet Presscenter,
August 2010, http://press.piratpartiet.se/2010/08/17/swedish-pirate-party-to-host-
new-WikiLeaks-servers/. back
2.07 THE WIKILEAKS AFFAIR: A FUTILE
CHALLENGE OR SENSIBLE DEFIANCE?
Like the Pirate Bay, the WikiLeaks affair is still unfolding. Since this is
a Spectacle, in the Situationist sense, a new plot twist is always on
the cards. However everything that has been written about
WikiLeaks betrays a disturbing lack of critical analysis. There is little
beyond the trivial standpoints of the 'Like/ Don't Like' variety. Left-
wing groups, especially in Europe, consider WikiLeaks a champion of
the oppressed daring to challenge corrupt governments. The logic
here is once more borrowed from the battlefield; the enemy of my
enemy is my friend. Seen from the perspective of governments, or
those taking a patriotic or conservative position, WikiLeaks is viewed
as a project threatening international diplomacy. It endangers the
lives of soldiers of 'the forces of good' who are engaged in peace
keeping operations and the war on terror, as well as discrediting
governmental institutions. In our opinion, WikiLeaks, despite
involving people in good faith, from the point of view of the
Spectacle is ultimately part of the libertarian galaxy.
Lets briefly summarize the facts. WikiLeaks was founded in 2006, as
a site that publishes classified and secret documents. Until 2010
WikiLeaks used the same interface as Wikipedia and described itself
as a place where confidential documents may be posted
anonymously. The WikiLeaks site then publicly releases the
documents once they have been screened. In the beginning of
WikiLeaks, posting documents on the site was neither risk free nor
very anonymous, and it was only in a later phase only that the
WikiLeaks team setup a relatively secure system. The site won
acclaim from the international press in 2007. By this point Julian
Assange had proclaimed himself editor-in-chief. Assange, born
1971, is an Australian hacker, and his technical skills are impressive.
His contributions to a range of free software coding projects are
highly original.1 Assange was condemned in Australia for what
federal institutions deemed to be crimes but his prison sentence
was commuted to a fine. Julian Assange made the front-page of
newspapers worldwide in November 2010 when WikiLeaks
published secret diplomatic documents exposing the US
government.
It is not so much the content of documents published on WikiLeaks
that is problematic because it is preferable that news circulates,
rather than be censored. But the aims and methods of WikiLeaks
which come dangerously close to those of Facebook. The idea is to
achieve radical transparency, but now at the level of governments:
exposing the evils of corrupt governments, and seeking out the
underside of the powerful just as we like to do with our 'friends'.
Millions of secret documents are then presented to the general
public, generating a phenomenon of mass voyeurism that results in
mass indifference. We are confronted with staggering revelations:
wars are not intended to export democracy, but instead to control
oil, uranium, and access to precious earth resources. More shocking
perhaps is that the public has become accustomed to believing
outright lies such as 'the war for freedom against the axis of evil'.
Julian Assange is the public face of the white knight hackers, who
pose as the guardian priests of a liberating technology, and
dissidents who are willing to defy the system even at the cost of
their own freedom. There are some contradictions of course, but it
is all for our own good. The most obvious contradictions is that this
battle for transparency demands a semi-secret, opaque
organization, run by a clandestine elite with equally secretive
funding, and with a single public leader, a charismatic figurehead
able to attract the attention of television cameras and who is
prepared to argue with presidents and world leaders, in a media
war. There is no mediation possible, no work to be done, no
commitment to be shown. There is one only truth to consider, the
documents made available to us by WikiLeaks. Yet, as we have
shown in the case of Big Data, having a massive storehouse of data
at your disposal oppresses rather than liberates people, stirring up
a feeling of impotence, and making them think the whole issue is
futile. Corruption, violence and news about the shocking behavior of
the powerful are hardly surprising for anyone who is not totally
oblivious to the world around them.
Moreover, the methods of WikiLeaks appear quite unsuitable to
other contexts of information censorship. Attacking the United
States while being protected under the constitutional liberties
granted by European social democracies like Sweden, with the
support of libertarian extremists opposed to any form of
government, and large Western newspapers, is far easier than
confronting, authoritarians states like China, Burma, or North Korea,
Cuba, Iran, Syria, or Belarus.2 The emergence of structure like
WikiLeaks is simply inconceivable in modern authoritarian regimes,
for the simple reason that these regimes exercise an increasingly
effective control on network infrastructures and access to networks.
Even if something like WikiLeaks were to occur in these societies,
authoritarian governments have many options to manipulate public
opinion and rid themselves dissidents without dirtying their hands.
The work of Evgeny Morozov describes these methods of
manipulation in detail.
In Russia, one of the countries most tolerant of piracy, in a manner
that is anti-Western and anti-American in particular, young
consultants of the regime influence the opinions of the public with
great skill. Russian government propaganda often users the exact
same manipulative techniques as American spin doctors: blogging,
newspaper articles, entire social networks devoted to pro-regime
stances, and to vilifying dissidents – with verbal intimidation often
preceding physical aggression. In China we have the 'Fifty Cents
Party', a moniker referring to the money allegedly paid for each post
supporting the government. Armies of pro-government bloggers
busy themselves with tweaking Wikipedia entries, and boosting
traffic and pro-regime background noise, drowning out the already
feeble opposition voices in the process. Saudi Arab princes regularly
hire IT experts to monitor the net for information harmful to the
regime, which should be refuted, discredited or obscured. Within
the 'international community', states behave exactly like individuals
when it comes to their digital profiles: they do their best to identify
embarrassing behavior among their peers, while trying to hide their
own and glorifying their own achievements without any critical
perspective. It is both absurd to suppose that populism and greater
transparency can really support democratic debate. Authoritarian
and democratic regimes both benefit from transparency; but only
when applied to their own citizens. The one who manages their
information the best wins.
Let us return to the WikiLeaks affair. The choice to publish the
classified documents on the war in Afghanistan on July 25th 2010, in
five major newspapers (The New York Times, The Guardian, Der
Spiegel, Le Monde, El Pais) displays the signs of a confused and
contradictory strategy. By publishing the leaks in this sensationalistic
way, WikiLeaks are largely following the logic of the tabloid and the
Society of the Spectacle. Dispatches were continually released for
several months until the end of September 2010, when WikiLeaks'
German spokesperson, Daniel Domscheit-Berg, left the
organization, or was expelled, due to a personal disagreements with
Julian Assange. The latter is now subject to an arrest warrant on for
a double charge of sexual assault in Sweden, and which was
converted, as per the Schengen agreements, to a European arrest
warrant in November 2010.
The allegations of rape do not shed a very favorable light on the
already controversial figure of Julian Assange, but it is important to
note the entire debacle was part of a media spectacle. By delving a
little deeper into the matter, we can understand the issue in its full
complexity. According to Swedish law, consensual sex without
protection may afterwards be interpreted as sexual assault if one of
the parties asks for a test for sexually transmitted diseases (STD)
and the other party refuses. Since Julian Assange so far refused to
submit to a medical checkup, the accusation has been upheld. But
refusing to submit to a blood test is different type of issue
altogether from sexual assault.3 On December 7, 2010, Julian
Assange turned himself over to the London Police. That same day,
under pressure of the US Government, Bank of America, VISA,
MasterCard, PayPal and Western Union blocked all money transfers
to WikiLeaks and froze its accounts. Julian Assange remained in
prison until December 16. Almost one year later, Britain agreed to
the extradition request by Sweden, who still want to prosecute
Julian Assange for sexual assault. Meanwhile, in the United States,
several prominent conservative politicians accused Assange as an
enemy of the state that must be apprehended, Sarah Palin wished
him dead, and many others asked for a reward to capture Assange
dead or alive. Even the more progressive politicians the dominant
view was that Assange is a dangerous terrorist.
Perhaps the allegations of sexual assault have been fabricated, but
what we know for certain, is that Assange has been widely
described as an authoritarian, paranoid and inflexible personality.
He has been characterized as a person who cannot stand the
hassle of human relationship and is totally committed to his own
crusade. So we appear to have another fanatic, and more obsessive,
who is representative of nerd supremacy. If you need more
convincing, just read his unauthorized autobiography, which came
out in November 2011.4 Having spent all the money of the advance
on legal costs, Assange subsequently attempted to terminate the
contract with his publishing but was refused.
Another thing worth noticing in the WikiLeaks affair is what Julian
Assange had to say in an interview with Forbes Magazine in
November 2010. He states that he does not consider himself an
enemy of the United States nor of global capitalism in general. On
the contrary, WikiLeaks disclosures are meant to improve markets'
information, since perfect markets demand completely truthful
information. This way, people are free to decide on which product to
focus. He went on to declare his faith in libertarianism: 'It's not
correct to put me in any one philosophical or economic camp,
because I've learned from many. But one is American libertarianism,
market libertarianism. So as far as markets are concerned I'm a
libertarian, but I have enough expertise in politics and history to
understand that a free market ends up as monopoly unless you
force them to be free. WikiLeaks is designed to make capitalism
more free and ethical.'5
Of course, Assange is ultimately a victim in this sad story, since has
self-imprisoned himself for several years in the Embassy of Ecuador
in London in order to avoid arrest. For some he has become a
martyr of free speech Yet, WikiLeaks' war has caused collateral
damages, and has at least one other obvious victim: the young
American soldier and IT specialist Bradley (now Chelsea) Manning,
who was accused of downloading tens of thousands of secret
documents and passing them on to WikiLeaks while he was serving
as computer intelligence analyst in Iraq. From November 2010,
Bradley Manning was first detained for 10 months in particularly
inhumane military prison in in Quantico, Virginia before being
transferred to Fort Lavenworth, Kansas. Activists, lawyers, and
notable personalities in arts and culture have staged protests
worldwide against the barbarous treatment of the 'spy' Manning,
whose culpability is still a matter of a debate.6 Some people have
called Manning a hero, and her name forward for the Nobel Peace
Prize in 2012. Manning's sad story shows that blatant confrontation
against authorities has harsh repercussions in the digital world just
as it would in the real world. Opposing the obscurantism of the
powerful in favor of transparency by drawing upon the logic of war
and the spectacle is the exact opposite of what should be a tangible
struggle for freedom, understood as the expansion of personal and
collective autonomy. Disagreements within the WikiLeaks
organization and Julian Assange's incarceration led to a split and the
foundation of OpenLeaks, a project under development that aims at
correcting the organizational imbalances of WikiLeaks.7 In order 'to
foster whistle-blowing and make it safer', OpenLeaks attempts to
use shared tools, managed co-operatively by a group having
recognized expertise in data gathering. The goal was not to directly
host leaks of information but rather to provide technological tools
to the holders of the classified information, which gives them the
means to act autonomously. In this sense, OpenLeaks avoids an
approach that is explicitly opposed to governments, and hence
differentiates its position from the rhetoric of libertarianism.
Before the advent of WikiLeaks, sites publishing confidential
documents did exist, for example the aforementioned site
Cryptome. But the WikiLeaks format had a large impact. After
WikiLeaks, a growing number of local leak websites developed in
France, Bulgaria, Indonesia and Venezuela. Beyond the simple
WikiLeaks clones, different approaches were also tried, such as
Wikispooks and Israelileaks. Meanwhile, mainstream medias got
busy trying to set up secure communication channels in order to
receive anonymous leaked material. Including Al Jazeera, The Wall
Street Journal and The New York Times among others.8 There are
also agencies specialized in spying services and companies
developing methods of anonymous internal information disclosure.
None of them are very much public. Globaleaks.org is the only
project set up to study the issue from a technical and philosophical
perspective and analyses how these structures could be run on a
global scale by hackers, while remaining trustworthy, secure,
anonymous and free.
But whichever system is used, the main point is still transparency
and exposure, which implies the existence of one single truth, since
'the data speaks for itself'. All this would be unnecessary in a society
where everybody used Facebook and followed Mark Zuckerberg's
radical transparency doctrine. But would we be more free in such a
society? The many critiques of Facebook and its underlying
libertarian ideology suggest otherwise. Jaron Lanier, one the
inventors of virtual reality and a longtime hacker, has pointed out
the risks associated with this drift towards nerd supremacy.9
Lawrence Lessig, liberal jurist and inventor of the Creative
Commons licenses, has reservations about WikiLeaks' defense of
total exposure, which he considers as a dangerous perversion of
the principle of free speech so dear to Americans.10 Of course these
are interventions that attempt to legitimate the status quo. But the
question then becomes, how can hackers fight for freedom with
radical interventions, but without sliding down into libertarian
rhetoric?
1. Perhaps his most interesting contribution was 'Rubberhose', a hidden encryption
program he developed together with other hackers. Rubberhose, which is now
outdated, provided a way of denying the existence of the part of a hard-drive where
encrypted data was stored. Since decryption is basically only a matter of computing
power, at least in theory, hiding the existence of encrypted data itself is a clever
strategy that considerably enhances the safeness of data. The technique is known as
steganography, meaning concealing the very existence of what you wish to keep
secret. It is curious that the technique was specifically devised to safeguard human-
right activists operating in autocratic states. back
2. Geert Lovink and Patrice Riemens, 'Twelve Theses on WikiLeaks,' Eurozine Magazine,
July 2010, http://www.eurozine.com/articles/2010-12-07-lovinkriemens-en.html. back
3. The story is complicated, due to the fact that the two women filed a complaint
together. The full allegations against Julian Assange was published by the Guardian.
See: Nick Davies, '10 Days in Sweden: the Full Allegations Against Julian Assange', The
Guardian, 17 December 2010,
http://www.theguardian.com/media/2010/dec/17/julian-assange-sweden. back
4. Julian Assange, The Unauthorised Autobiography, Edinburgh: Cannongate Books,
2011. back
5. Andy Greenberg, 'An Interview With WikiLeaks' Julian Assange', Forbes Magazine, 29
November 2010, http://www.forbes.com/sites/andygreenberg/2010/11/29/an-
interview-with-WikiLeaks-julian-assange/5. back
6. Bruce Ackerman and Yochai Benkler, ‘Private Manning's Humiliation’, The New York
Review of Books, 28 April 2011,
http://www.nybooks.com/articles/archives/2011/apr/28/private-mannings-
humiliation/. back
7. The founder is the former German spokesperson for WikiLeaks, Daniel Domscheit-
Berg. See http://leakdirectory.org/index.php/OpenLeaks and Daniel Domscheit-Berg,
Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous
Website, New York: Crown, 2011. back
8. See the 'Leak Site Directory,' a directory of official and community based sites that
actively support whistleblowing and leaks about various topics.
http://leakdirectory.org. back
9. Jaron Lanier, 'The Hazards of Nerd Supremacy: The Case of WikiLeaks', The Atlantic,
20 December 2010, http://www.theatlantic.com/technology/archive/2010/12/the-
hazards-of-nerd-supremacy-the-case-of-WikiLeaks/68217/. The first analysis of the
phenomena is Patrice Riemens, 'Some Thoughts on the Idea of "Hacker Culture"',
http://cryptome.org/hacker-idea.htm; original article: 'Quelques réflexions sur la
"culture hacker"', Multitudes 1:8 (2002): 181-187. back
10. Jonathan Zittrain, Lawrence Lessig, et al., 'Radio Berkman 171: WikiLeaks and the
Information Wars', MediaBerkman, 8 December 2010,
http://blogs.law.harvard.edu/mediaberkman/2010/12/08/radio-berkman-171/. back
2.08 ANONYMOUS, OR OUT OF THE
BOX ACTIVISM
Before making the headlines worldwide, that is, prior to the
cablegate documents on Iraq and Afghanistan, WikiLeaks had
already published a lot pressing news. Some notable examples
being the American secret services' plot to assassinate the Somali
prince Hassan Dahir Aweys in 2006, the totally inhuman treatment
of Guantanamo inmates by American authorities in 2007, and the
rampant corruption of former Kenyan president Daniel Toroitich
Arap Moi's close circle in 2008. Also in 2008, as noted by Daniel
Domscheit-Berg, members of Anonymous approached WikiLeaks
with internal documents of the church of Scientology. These
documents were immediately published.
The case of the church of Scientology interests us precisely because
it relates to Anonymous, which has become the most talked about
hackers-activists group over these past few years. Though the
Scientology church is a powerful adversary its activities are far
easier to uncover than many clandestine dealings by traditional
institutions. The cult had managed to silence quite a number of
people who attempted to make information about it public. Threats,
intimidation and outright persecution, have been their fate
especially in case of former members of the church. Anonymous'
Chanology Project started in January 2008 in response to the
church's attempt to remove a Tom Cruise interview that revealed
the inner workings of Scientology. Before involving WikiLeaks,
Anonymous posted on YouTube a video-clip with a 'message to the
Church of Scientology'.1 The two minutes clip's conclusion have
become the motto most characteristic of Anonymous: 'Knowledge is
Free. We are Anonymous. We are Legion. We do not forgive. We do
not forget. Expect us!' Anonymous then launched several rounds of
DDoS (Distributed Denial-of-Service) attacks to paralyze the sect's
servers by overloading them with requests, a type of attack that
requires a certain amount of technical competence.2 The common
thread connecting WikiLeaks and Anonymous is transparency,
conceived as the ultimate weapon in the fight against opaque,
repressive powers. The need to remain anonymous and the practice
of hiding behind the masks of Guy Fawkes, the famous early 17th
Century English catholic conspirator – made famous by the comic 'V
for Vendetta', is another element that illustrates the similarities in
method shared between Anonymous and WikiLeaks.
From the perspective of the media, the reaction of the church of
Scientology, and that of all Anonymous victims, was to portray the
members of the group as computer fanatics, cyber-terrorists and
ultimately dangerous hackers. It is not easy to define Anonymous in
terms of ideology, but one aspect cannot escape notice: what is
bubbling to the surface from all of the nodes of Anonymous is a
very peculiar interpretation of freedom of expression, which is
described as 'non-negotiable'.3 As can be seen with the OpBart
operation, Anonymous often appears when censorship shows its
face.4 Anonymous' and WikiLeaks' paths crossed again on December
the sixth and tenth, 2010 during Operation Avenge Assange (aka
Operation Payback), when several DDoS attacks were mounted,
many successful, against a dozen banks and financial institutions
which had blocked donations to WikiLeaks.5
Exposing the enemy's misdeeds while keeping a mask on,
challenging opacity through transparency while remaining
anonymous, attacking the powerful actors (churches, armies,
governments and banks) through interventions pairing technical
competencies with mass media engagement, and adopting an
attitude of war or sabotage, are the features Anonymous and
WikiLeaks share in common. But the similarities end here. Unlike
WikiLeaks, one cannot identify Anonymous with one really existing
person because it is does not exist as a singular form but always in
plural. In theory, anybody can be part of Anonymous, whereas
passing on classified information to WikiLeaks does not result in any
affiliation with the person leaking it. Anonymous in its turn, is made
up of a great number of individuals, networks, and operations.
Can The Pirate Bay, WikiLeaks and Anonymous be considered as
different manifestations of the same hacker spirit? It is clear that the
environment that gave birth to Anonymous is, at least partially,
connected to the high-level world of hacking, as can be seen the
from participation of various Anonymous groups to a number of
operations conducted by Lulzsec.6 The hacker motto 'just for fun'
finds its expression in the Lulz spirit, which is a transformation of
the acronym LOL (Laughing Out Loud), used in online chats. The
channel b of 4chan is definitely part of the culture of the first people
to call themselves Anonymous, for the simple fact that most of its
contents is still posted anonymously.7 A number of people, arrested
during the attempt to suppress Anonymous, were users of 4chan. If
you are not familiar or curious about manga, anime, video games,
TV series, strange acronyms, black humor, borderline porn, LOLCats
(photoshopped cats with captions), culture jamming, etc., then
4chan is definitely not for you. It may seem like a madhouse of
macabre and surreal imagery, the meeting place of kids who use
incomprehensible terms and the paranoid observer may see it as a
breeding ground for cyber terrorists.
The mass media have focused on Anonymous hacking operations,
but actually there have been many different types of Anonymous
interventions, on multiple networks. There have also been public
demonstrations of the more traditional kind, with Anonymous
activists donning Guy Fawkes masks. With the politicization of real
life actions, Lulz online attacks have become less numerous, and the
group became more politically oriented. Until the emergence of
groups within Anonymous, who openly called themselves
anarchists, for example the A(A)A for Anonymous Anarchist Action.
But what kind of anarchism are we talking about here? Is it the
anarcho-capitalist variety, bent on the total triumph of the free
market, and extreme privatization facilitated by a liberating
technology? Or is it anarchy understood as an anti-authoritarian
practice and the struggle for a society made up of 'free and equals'
individuals, where competition takes a step back for solidarity? Sure,
there are members of Anonymous who are active within genuinely
anarchist organizations, but there are also among them those who
espouse liberal capitalist or even libertarian tendencies. The fact
that journalists hailed 4chan as the Web's most anarchist site
should raise some doubt. The views of the founder of Moot, the
New Yorker Christopher Poole, provide a good benchmark for
evaluation. Poole has declared himself in favor of radical opacity,
and absolute anonymity online, which give everyone the
opportunity to behave 'badly' without worrying about offending,
disturbing or being punished. Therefore Pool surely would be
opposed to the radical transparency of Facebook. But this is a bit
unsubstantial for claiming the subversive anarchist label. Canvas, a
site that needs to be authenticated through a Facebook account, is
part of the evolution of a showcase format that allows for
modification of online images.8 This is an innovative system for the
creation collaborative visual content. But this project is certainly not
in the spirit of revolutionary anarchy or anti-authoritarianism. On
the contrary, it is a project funded by venture capital, without in any
way diverging from the advertisements-based business model
already successfully operated by Google, Facebook, and all other
Web 2.0 actors extracting profits from digital sociality.
Sociality and politics work in the same way: online practice is
narrowly connected with real life practice, and cross-fertilization
occurs all the time. Anonymous' initiatives attracted major media
attention, which in its turn attracted the unwelcome attention of the
police on the group. During the Occupy Wall Street demonstrations,
inspired by the occupation of Spanish plazas by the 'Indignados',
Anonymous brought in its technical expertise. Twitter and Facebook
apps were created to improve communications between protesters.
On many occasion, transparency became an defensive weapon
against the police, e.g. to identify agents who had beaten protesters.
However, the same face identification technology was repeatedly
used against the demonstrators themselves.9
As already mentioned in our discussion of WikiLeaks, practices of
informing only work within a democratic context and where a
certain amount of liberties and citizen rights still exist, where civil
disobedience has a recognized value, and state-sponsored
repression rarely endangers the lives of citizens. In all those cases,
appeals, claims, and criticism can be much more effective when the
actions are carried out in a creative way, like in the examples of
Anonymous. However, it is during the construction phase that the
inherent weaknesses of mass movements are revealed; yet
Anonymous unambiguously claims to be a mass movement by
profiling itself as a 'legion' that nothing can stop. To shout out 'Que
se vajan todos!' as the Argentinian did in 2001, is a lively equivalent
to the methods of digital sabotage but it is still a petition of sorts to
the authorities. It asks the ruling powers to loosen their grip, the
banks to stop behaving like banks, the governments to stop waging
wars and the military to stop killing. All this is legitimate, it is even
fair but it is not adequate when considering the concrete reality of
these propositions. It is even counterproductive, since the request
for change is addressed to the very people who are responsible for
repression, and in fact, and in this sense legitimizes their authority
in the process. So it is precisely in the construction phase that we
should be acutely aware and make a radical shift in perspective. The
macroscopic lens of the opposition movement against a corrupt
and oppressive power, and proposes alternatives in the name of all
is doomed from the start, as it falls within the logic of
confrontational which is typical of hegemonic discourse. Once they
have had their fun ridiculing banks, churches, corporations and
governments, the Anonymous organizers who do not share
WikiLeaks' nerd suprematist style, should really start concentrating
on the constructive aspects of their technical power.10 Otherwise,
they will end up being co-opted to-morrow by the very powers they
ridicule today.
Anonymous' anomaly lies in the fact that its activists hold a great
power: the power of technology. They know the intricacies of digital
networks and know how to make their existence work to their
advantage. They can choose to use this knowledge-power to
reinforce the network of already existing organizations.
Governments are organizations trying to expand their chances to
exercise control, sometime with the benevolent purpose of
assistance and aid to the most members of society: in which case
they surely need such skills. On the other hand, companies
especially the large corporations providing social media services are
in desperate need of strengthening their organizations' networks,
that is to make them more secure, which means to make them
more impenetrable to unwanted elements. But other modes of
action are also possible, for instance investing in the organizational
capacity of networks in development, which do not have a position
to defend, or interests to protect, or copyrighted materials, patents
and trademarks but which aim to a create a shared systems for
exchange and interaction.
In this sense, perhaps the most interesting common trait between
Anonymous and Occupy movements is the way they profile
themselves as constitutively devoid of leaders and with a strong
tendency to self-organization. It is the size of these small organized
networks which is the truly innovative aspect of Anonymous and
Occupy. The lack of a leader figure or a fixed agenda makes it
almost impossible for hierarchical, institutional organizations to
engage with such movements. Yet, the Manichean and militaristic
caricature of Anonymous as soldiers fighting for the greater good
also has to be carefully avoided. Political practices and ideas do not
ineluctably arise from the adoption of appropriate technological
tools.
1. http://www.YouTube.com/watch?v=JCbKv9yiLiQ. back
2. The propagation of the LOIC (Low Orbit Ion Cannon) software, originally a proprietary
program to test servers' capacity, was essential for lining up the computer networka
necessary to launch DDoS-type of attacks, a kind of voluntary botnet. back
3. An Anonymous member appropriated the notorious phrase 'the American way of life
is non-negotiable’ from a George W Bush speech where he attempt to justify 'total
war against terrorism'. back
4. See the video: http://www.YouTube.com/watch?v=MlsLmDOhQ5Y. back
5. See Thesis 6 of Geert Lovink, Patrice Riemens, 'Twelve Theses on WikiLeaks,'Eurozine
Magazine, July 2010. http://www.eurozine.com/articles/2010-12-07-lovinkriemens-
en.html. back
6. From May to June 2010, the hacker group declared '50 days of Lulz,' hitting targets of
various types (FBI, Sony, Fox, Twitter) and also publishing login and password details
of users, simply, ‘because we can do it’. The pirate vessel of Lulzsec has left a deep
mark in the ocean of the Net; the torrent of operations and compromised sites is still
available in the mirrors. back
7. 4chan Showcase was started in 2003 by Christopher Poole (then 15 years old, he
managed to stay anonymous till 2008) and takes its inspiration from similar Japanese
sites. In early 2011 4chan had the staggering number of more than a half million
unique hits a day. back
8. See, https://www.facebook.com/canvas. back
9. In Rome, after the riots of 15 October 2011, the mass media named and shamed all
the suspected Black Bloc members. Many could be identified thanks to the help of
‘honest citizens’. In another context, and on a different scale, the same procedure
was used in Iran during the riots of June 2009. The authorities requested the
participation of citizens to identify the insurgents, who were marked with a red circle
on a government site. See: http://www.gerdab.ir/fa/pages/?cid=407. back
10. Lulz's latest exploits, involving attacks against the security firms Stratfor and
SpecialForces.com, were highly politicized. Here's what the online press release,
LulzXmas, said on December 27, 2011: ‘Continuing the week long celebration of
wreaking utter havoc on global financial systems, militaries, and governments, we are
announcing our next target: the online piggie supply store SpecialForces.com. Their
customer base is comprised primarily of military and law enforcement affiliated
individuals, who have for too long enjoyed purchasing tactical combat equipment
from their slick and ‘professional’ looking website. What’s that, officer? You get a kick
out of pepper-spraying peaceful protesters in public parks? You like to recreationally
Taser kids? You have a fetish for putting people in plastic zip ties?’ See Richi Jennings,
'Anonymous Antisec hacks STRATFOR in Lulzxmas operation', Computerworld, 27
December 2011, http://www.computerworld.com/article/2471899/cybercrime-
hacking/anonymous-antisec-hacks-stratfor-in-lulzxmas-operation.html. back
PART III: THE FREEDOMS OF THE NET
Any sufficiently advanced technology is indistinguishable from
magic.
Arthur C. Clark
3.01 ONLINE REVOLUTION AND
COUCH ACTIVISM: BETWEEN MYTH
AND REALITY
The media coverage of the Occupy movement and the logistical and
technical support of Anonymous bring us back to considering
perspectives and practices of participation, democracy and digital
organization. The success commercial social networks have is due
to the possibilities of forming and maintaining contacts that is
potentially global in extent. However, it is not up to the user to
choose how to relate to others, but the service provider which,
through exercising 'default power', determines the details of this
shared environment. Digital participation assisted by commercial
platforms is easier than the commitment required by self-managed
analogical organization. The ease of creating a Facebook group to
collect funds for refugee or environmental catastrophes etc., is of a
totally different order than the resource mobilization required of
non-digital, off-line activism. Digital activists feel a false sense of
power from being on the net and can conveniently ignore the
bureaucracy, dead end group discussion and material problems of
their analogical counterparts. The main advantage of armchair
activism is that it offers a simulacrum of participation, with 'likes' and
'share this 'link'. The armchair activist can give free reign to their
indignation while remaining safe behind their screens, using
software produced and managed by tech corporations.
The Western media's enthusiasm for the 'Arab Spring', and the
earlier Iranian Green Movement, and others present and future so-
called digital movements is the result of the technophilic and
internet-centrist perspective we discussed in the first section of this
book. At an even deeper level, it reveals a blind faith in information
as expression of absolute truth. Activists, and citizens of Western
democracies are so ignorant of reality that they are convinced
merely removing the cloak of censorship will enable a blossoming of
democracy. From this perspective freedom is merely the result of a
proper use of appropriate technology, and free information is the
host of the democratic gospel. Therefore if the Chinese were
allowed to communicate freely, the party leaders would be wiped
out, just like the Soviet politburo in 1989. We can always bet on the
fact that all coming insurrections will be read through the distorting
lens of liberating technology. We should remember Gil Scott-Heron's
words: 'you will not be able to stay home, brother.[...] Because the
revolution will not be televised'. We have been asked by reporters to
comment and analyze digital movements, and our views on
Anonymous attacking the IS or similar headlines news – we can only
answer: no comment. We do not want in any way legitimize the
mythical, militaristic, dualistic (online vs. offline) tale starting with
'once upon a time, the army of Good composed of masked hackers
fighting for a better world attacked the armies of Evil'. The
Situationists have already explained how The Society of the
Spectacle works, we can not help but look for ways of subtraction
and desertion.
The technological patina that covers everything these days allows
critics to indulge in the same 'cut-and-paste' analysis regardless of
social context. According to this view social oppression is the result
of communicative misunderstandings and inaccurate information.
This is precisely the same discourse of the technocrats who shape
communication tools, and develop political marketing strategies.1 A
free society demands an intensification of the circulation of
information by accelerating transactions and improving network
connections. Here again, technology plays a reassuring role by
convincing 'honest citizens in the West' that their attitudes are fine.
The sense of emotional closeness that develops in observers who
witness acts of repression in real time, helps strengthen the support
for the freedom of the people. However, the walls that must fall to
achieve this are not technological firewalls, but social, political, and
cultural barriers.
The most common objection to the progressive radical critiques of
social media technology is that every tool can be put to use in a
revolutionary way. However, inside the Facebook aquarium we are
constantly bombarded by information stimuli. In this deluge of
information, political content is confused with all other subjects, and
does not have, nor ever will have, an autonomous space to itself.
The relationship of one to many, the illusion of 'spreading the news'
at a mouse click has to contend with the white noise of perpetual
chatter. The revolutionary event shall be forgotten, buried in the
eternal present of digital ephemera, without testimony or memory.
Technology is indeed neither good nor evil in itself but must be
analyzed in the context of its specific functioning. Technology is
power, and power cannot be neutral.
In this sense, Facebook has been extremely successful in realizing
it's economic and political project of radical transparency. This
technology works when the aims of the users coincide, or at least
are compatible, such as in social media marketing, public relations
or events planning. But it does not mean that this technology is
good in itself. The fact that Facebook and Twitter were used as
communication tools during the revolutions in North African
'revolutions' and the uprisings in the Middle East and Asia does not
ipso facto transform them into revolutionary devices. People make
revolutions not technologies and they rebel by using whatever
instruments are at their disposal. In this case rebels used corporate-
owned social networks. Each case should be analyzed in a specific
fashion: languages, histories and backgrounds are different,
territories and populations are distinct and not comparable. If to
delve beneath the news about spectacular technology-enabled
uprisings, we often discover a much more mundane reality.
In 2011, the West quickly concluded that the Mubarak regime had
fallen due to its powerlessness against the popular uprising enabled
by the internet. The new wave beginning in Tunisia, was supposed
to rapidly spread through the Mediterranean, or at least up to Syria.
In reality, the only thing that became clear is that superannuated
autocrats like Mubarak were not secure, especially not if they left
opposition groups free to galvanize opposition on Facebook for
months on end. If we now focus a bit more on the Mediterranean
basin, we see no movements in Algeria, whereas a full-blown civil
war has erupted in Syria. Meanwhile, Egypt and Tunisia were
democratically handing themselves over to extreme Islamist parties,
which unlike the previous regimes are far more savvy with social
media. Libya also appears to be taking the road to Islamic
fundamentalism, following a bloody civil war backed by the West for
control of oil resources. Its difficult to be optimistic , but
commentators continue to be near unanimous in judging the crucial
role of social media.2
The techno-enthusiastic interpretation of events in Iran is possibly
even more disturbing. The vast majority of Farsi tweets posted
during the 2009 street protests in Iran, were overseas based Iranian
dissidents using their twitter profiles from the safety of the United
States or the UK rather than from the streets in Teheran.3 In April
2010, Moeed Ahmad, Al Jazeera's director, reported
We do not very much know yet about how effective Twitter's role
was in the Green protest movement in Iran, save that it was
doomed to fail from the outset. There is little we can say about the
immediate future, as the Iranian theocracy remains in power and
taking steps to purge opponents, including on the technological
front. Many activists including those who managed to have their
voice heard remain skeptical.5 The fact that there were so many
tweets circulating in the West about the revolt in Iran does not
mean that many Iranian dissidents were on Twitter. The concrete
result was that the Iranian government, monitoring pro-rebel tweets
by American and European politicians, brutally censored everybody
in Iran who had been in touch with 'Western media', starting a
campaign of threats via SMSs and bringing together a special
information police force. Bypassing the censorship of social media
in Iran has now become a lot more difficult.
Modern securitarian states, in the Middle East and in the rest of the
world already exercise control on the two main instruments of
power: weapons and money. They are now learning to live with the
flow of digital information – as long as this information does not
translate into concrete political actions that might threaten the
ruling elites. Rami Khouri, foreign correspondent for the Lebanese
newspaper Daily Star fears that the global impact of new
communication technologies on the political conflicts in the Middle
East will ultimately be highly negative. He argues that 'the new
media' will function as a mere palliative to the stress of
powerlessness rather than an instrument of real change: 'Blogging,
reading politically racy Web sites, or passing around provocative text
messages by cellphone is equally satisfying for many youth. Such
activities, though, essentially shift the individual from the realm of
participant to the realm of spectator, and transform what would
otherwise be an act of political activism — mobilizing,
demonstrating or voting — into an act of passive, harmless personal
entertainment.'6
So it is all again about spectacles – the spectacles that the
authorities allow. Dictatorships are not led by clueless autocrats,
easily dislodged by the pressure of free social media. On the
contrary, these rulers learn very quickly all what they need to apply
technological innovations to their own advantage, to the point that a
rebellion which even makes use of these tools becomes dangerous.
The most well organized repressive regimes know how to make use
of the same methods as their dissenters; something that yet again
demonstrates that technology is not neutral. DDos attacks, one of
the one of the 'weapons' popularized by Anonymous was also used
by the Saudi government to impose censorship. Philosophy has
been banned for years in the Sheiks' universities, since it urges
individuals to think for themselves. Western thought is forbidden in
Saudi Arabia, furthering the country's schizophrenic position as
both a privileged trading partner to Western governments and one
of the largest funders of Islamic fundamentalism. In 2006,
Tomaar.net was launched by the Saudis to discuss philosophy and
share forbidden links and resources which were officially prohibited
but still accessible online. Being in Arabic, it had also many non-
Saudi followers. But surveillance technology is always improving and
it became increasingly easy for the government to trace each visitor
of the site. The Saudi government first blocked access to Tomaar
from internet terminals in its own territory. Users responded by
using anonymization software and anti-censorship proxies. An arm
races ensued. The Saudi government launched DDoS attacks
against the US server that hosted the forum. Now Tomaar.net is
dead.7 Dissident sites and activist webpages have also been
subjected to DDoS attacks from Burma, Belarus, Uzbekistan,
Kazakhstan, and Russia. The resulting feeling of powerlessness
among dissidents is heightened by the fact that Western
government, while eulogizing internet freedom and condemning
censorship and repression, still back authoritarian governments
through economic, financial and military agreements. This only
serves to strengthen such governments at the expense of the very
dissidents the West claims to support. We also should not forget
that democratic governments also practice censorship, including
through DDoS attacks, to prevent their own citizens from accessing
content deemed.
Although the role of social media in politics is praised by the
Western media, the triumph of democracy is unlikely to be the
outcome of corporates-owned technology. In well functioning
dictatorships like China, Facebook access is blocked not so much
because of the party leaders aversion to radical transparency, but
because it is considered as a product of American imperialism. The
much criticized collaboration between Google and the NSA in 2010,
Google's complaints about attacks from Chinese hackers, Google
openly pulling out of China in protest of government censorship,
didn't improve things either. Who could blame China for viewing
these firms as spies in the pockets of Washington? In China, the
Facebook, Twitter and Google clones are directly controlled by the
government, rather than through the secretive, high-level
agreements and collaborations in the United States. In the future
the laboratories of consensual dictatorships will greatly improve on
this arrangement, and nobody will worry any longer about being on
Facebook and Twitter. Everybody will know everything about all the
obscene things taking place in public or private – and nothing will
change. Anyone will be allowed to become part of the Spectacle.
Since everybody will be an accomplice in banality and vulgarity,
there will be no more scandals. It is likely that in a near future there
will be full cooperation between social media enterprises and
governments in the realm of surveillance. In the case of democratic
regimes, preventive censorship of users and removal of contents
under institutional pressure will be presented as a defense of the
common interests against hate speech. In totalitarian regimes,
private corporations have zero interest in defending dissidents'
anonymity, since that will attract the unwelcome attention of the
people in power and such users generally do not generate any
substantial advertisement revenue.
The push for transparency, combined with the fragmentation of
digital messages and the underlying decrease in attention favors
posts that are simplistic sound bites and makes it more difficult to
articulate complex arguments or nuanced views. The harsh laws of
mass culture are enormously amplified by commercial digital media.
Catastrophes get higher view ratings than good news. Crass
spectacles and melodrama are more successful than challenging
works. After all, what people want is to be entertained rather than
challenged. Two millennia ago, Roman emperors already knew that
the answer to social strife can be summed up in the famous
formula 'panem et circenses '(bread and circuses) where the
circuses were bloody massacres between gladiators, wild animals,
slaves and opponents of the regime. Today's globalized media circus
is played out on television newsreels, blogs, YouTube videos and
tweets. It is a convenient and dis-embodied way to experience
reality in real time, without any effort, without the dirt and the
blood, skimming over the tragedy with our eyes only. Distant
tsunamis are explained in plenty of detail, while almost nothing is
mentioned about what happens in our immediate surroundings.
What is not on Google does not exist; and if you leave no tweet
behind, you aren't worth anybody's attention. Even when voyeurism
turns into political indignation the protests has barely any notable
consequences and is quickly reduced to sterile claims often even
before further repression.
Sound policies cannot be expressed in the one hundred and forty
characters of an SMS or a microblog. This is equally the case for
posts on a Facebook group, and even on a blog, despite the fact
that the latter offers more opportunities for interaction. Instead
thanks to these formats, sectarian message such as incitement to
racial hatred, can rapidly propagate, as was demonstrated with the
SMS terror campaigns against ethnic minorities in Nigeria (targeting
Christians in 2010) in Kenya 2007, (against Kikuyus) and in Australia
in 2005 (against the Lebanese). Somali pirates co-ordinate their
operations on Twitter and Mexican drug traffickers glorify the
murders they perpetrate on YouTube. Muslim fundamentalist use
blogs to praise Sharia law, threaten infidels, execute innocent
people, while Neo-Nazis around the world use social media to
spread their noxious messages. Western evangelist in favor of
internet freedom, particularly social media, perhaps should pay
attention to these developments before blinding celebrating
internet activism.8 The world is far more complex than is shown by
the mass media, driven by the logic of the spectacle and
advertisement. Yet, as the freedom of speech is eulogized – an
abstract freedom devoid of concrete content and knowledge-
sharing methodology – at the same time authorities demand more
rights to regulate and suppress content by those who think
differently, triggering a wave of censorship and surveillance.
1. Spin doctors are the sophists our time, the professionals of manipulating public
opinion. They orchestrate huge campaigns of disinformation to cover up scandals
and arrange publicity stunts for the promotion of their clients, usually politicians. A
backbone of the US lobby system, spin doctors have now started playing an
increasingly important role in Europe also. They are a ultimately a byproduct of the
development of the advertisement industry and of its logic. If policies are simply
products put up for sale, democracy will appear more and more as a Hollywood film
or a bad sitcom. back
2. A collection of sources on the role of social in the Arab spring.
https://socialcapital.wordpress.com/2011/01/26/twitter-facebook-and-YouTubes-
role-in-tunisia-uprising/. back
3. 'Oxfordgirl', for instance, was a Twitter user who posted thousands of tweets during
this period, sharing informations about the protests. But she is an Iranian journalist
based in Oxfordshire, UK. back
4. 'L'intervento di Moeed Ahmad', Al Jazeera e i nuevi media, 27 April 2010,
http://www.dailymotion.com/video/xd3jl5_al-jazeera-e-i-nuovi-media-l-
interv_news%20[. back
5. 'Vahid Online', an Iranian activist blogger who posted from Teheran in 2009 before
taking refuge in the United States, stated on several occasions that the influence of
Twitter and Facebook inside Iran had actually been near-zero, even though
Westerners believed they were actually participating in the uprisings in real-time.
See: http://vahid-online.net. Also the blogger Alireza Rezaei pointed out that the
chaotic unfolding of the protests did not conform to the idea of a Twitter-organized
uprising. See: http://alirezarezaee1.blogspot.com/. back
6. Rami G. Khouri, 'When Arabs Tweets', International Herald Tribune, 22 July 2010,
http://www.nytimes.com/2010/07/23/opinion/23iht-edkhouri.html. back
7. See: 'Free Speech Case Study: The Demise of Tomaar.net', Anonymous Proxies,
February 2011, http://www.anonymous-proxies.org/2011/02/free-speech-risks-
demise-of-tomaarnet.html. back
8. The Italian artist duo Liens Invisibles have created a tool specifically for couch
activism. See: http://www.lesliensinvisibles.org/2010/05/repetitionr-com-tactical-
media-meet-data-hallucination/. back
3.02 ORWELL, HUXLEY, AND THE
SINO-AMERICAN MODEL
Freedom on digital networks is counterbalanced by the demand for
greater security, which in turn leads to a demand for more control.
The wish to be anonymous is at odds with the will to seek out and
prosecute those who threaten social stability. In democratic
regimes, this may be pedophiles, serial killers, drug traffickers,
terrorists, subversives, etc. The wave of emotions caused by some
sensational crime can trigger an irrational response: the passing of
laws that violate the most basic civil liberties. But ultimately the
potential perpetrator is aware that he is under surveillance. In this
sense that he is aware of this, a potential criminal may actually be
freer than the rest of the population, which is subjected to an
increasingly pervasive digital surveillance and control. Not to
mention that fact, which we have already pointed out, that this
control does not prevent crime. At most it simply eases the system
of punishment, at least in theory, by strengthening the logic the
judicial and prison systems.
The pressure to regulate the Web coincides with a demand for
more transparency, traceability, and recognition of what is
happening in digital worlds. Such requirements also allow for the
formation of very heterogeneous social categories. Parents
associations are worried about the dangers their children may be
exposed to. Lobbies of big media copyright owners (Hollywood, the
music industry, publishers) all want to make investigation and
removal of protected content easier. Banks wish they could have
more effective ways of verifying their account holders' identities in
order to reduce online fraud. Harassed ethnic minorities want to
find out the identity of their tormentors. Xenophobic nationalists
(who, once in power, will give a totalitarian twist to our already
security-obsessed democracies) want to identify and register all
foreigners in order to vent their frustrations and strengthen their
reactionary group identity in ritual pogroms. Victims of violent
incidents want to be able to denounce their oppressors without risk
of retaliation, by on the one hand protecting their anonymity, while
at the same time identifying criminals more effectively through
stricter control measures. Outraged citizens want to see the income
tax returns of corrupt politicians published so as to name and
shame them in the media. Even authoritarian regimes like more
transparency since they want to keep a close eye on their citizens.
Transparency increases the opportunities for surveillance and that
makes it desirable to almost all political powers.
The 20th century saw two major dystopias profoundly influence
Western thought in the matter of surveillance: George Orwell's Big
Brother in his novel 1984' (1949) and Aldous Huxley's 'Brave New
World' (1932, followed in 1958 'Brave New World Revisited'). Both
authors represent opposite dystopias: Orwell, the Englishman, was
worried about total 'optical' control, whereas Huxley – English born,
but writing from the California – saw an upcoming emotional
lobotomy generated by unbridled consumerism.
For Orwell, the emergence of totalitarian systems marked a new
phase, reminiscent of the Inquisition, in which technology was used
to abolish the privacy of citizens. The omnipresent eye of Big
Brother's exercises a power that is both sadistic and oppressive. Big
Brother is able to change reality itself through Newspeak, the
language specifically designed to limit the range of possible
expressions. Every personal move must be completely predictable,
and everybody must obey. The protagonist in '1984', Winston Smith,
discovers that neurologists working for the regime are attempting to
eliminate orgasm, in order to completely suppress desire, that
dangerous moment of psychophysical instability, which could
potentially trigger revolt.
In Huxley's vision, technology, on the contrary, is used to maximize
pleasure, as part of a cycle of continuous consumption. In the world
of Huxley's Fordist consumerism, throwing away is preferable to
repairing, and citizens have no incentive whatsoever to think in an
autonomous and critical way, since their pleasures find satisfaction
even before having been formulated. Of course, not everyone's
desires are identical: a rigid system of castes, from 'Alphas' to
'Epsilons', is managed through eugenic control. Different categories
of consumers exist, which are preassigned to consume specific
goods and services. But desire is diminished through excess with a
system of compulsory sexual promiscuity. Family bonds are deemed
pornographic because they are privileged links. Social interactions
are organized in a fully transparent way, to the extent that women
are forced to wear a contraceptive belt, which signals their
immediate sexual availability. Individuals are consumer goods like
any other, must express who they are without ambiguity.
With Orwell, there is a higher level of conspiracy in which some
freedom is possible, at least among the oppressors. In the world of
Huxley, nobody is free, not even the 'Alphas'. They too must perform
their duties of daily consumption, just like those they command.
Conformity is the supreme good, docile obedience is necessary to
have the entire population reduced to a state of infantile bliss. A
daily dose of the drug 'Soma' and hypnopedia (indoctrination during
sleep) wards off such mortal sins as the desire for solitude,
autonomy and independence.
It is precisely these forbidden desires that we will have to return to
in order to imagine a new expression of social networks. The only
way to escape induced desires and conformity is the rejection of
social performance. One cannot deny that both Orwell's fearful
dystopia and Huxley's enforced entertainment provide insights into
our own contemporary societies. Evgeny Morozov stresses our
tendency to underestimate the number of Orwellian elements in
democratic regimes (with the reality TV show 'Big Brothers' the fear
of control has become a joke) while at the same time discounting
the Huxleyan elements present in dictatorships. Most dictators
prefer to distract and entertain the masses rather than dominate
them with terror, because in the long term overt repression tends
to generate violent riots. Hedonistic consumerism on the other
hand, may strengthen consent, or at least gain some acceptance
from the oppressed.
Better yet, 'panem et circenses' politics may even encourage the
masses into supporting a despotic regime. Why should a Chinaman,
a Turk or a Cuban not praise the government in exchange for some
gift? Ultimately, the internet does bring to many authoritarian
societies exactly the type of entertainment people need to escape
from their disappointing reality: pornography, gossip, innocuous TV
series, quizzes, gambling, video-games, online dating and
government supervised discussion forums. In fact, this is also
exactly the same type of entertainment that allows citizens in
democratic societies to escape from their daily reality. Naomi Klein
correctly points out marked similarities that exist between China
and the West (and more specifically, between China and the United
States), a successful combination of Orwellian control and Huxleyan
distraction: 'China is becoming more like us in very visible ways
(Starbucks, Hooters, cellphones that are cooler than ours), and we
are becoming more like China in less visible ones (torture,
warrantless wiretapping, indefinite detention, though not nearly on
the Chinese scale).'1
Profiling techniques used by Google, Facebook, and others can be
applied to improve the relevance of individually targeted
advertisements just as it can be used to refine individually targeted
censorship and repression. If your friends are fans of a certain
band, chances are that you will like this kind of music too, and are a
potential customer by association. And if your friends read the same
subversive blog as you do, then they too are potential dissidents,
just like you. The algorithms used to arrive at these results are
precisely the same. The Chinese and American social formats have
in common the drive towards increased transparency. The Clinton
administration in the nineties was failed in its attempt to realize the
'information superhighway', but nothing proves that the Chinese
Communist Party may not be successful in its attempts to create a
great Peoples' Republic. With assistance from the American military-
industrial complex, China is busy creating the prototype of a high-
tech police state. The plan is to give every Chinese citizen an email
account, a profile on government-owned social networks, an
account for online purchase on authorized sites, and storage space
to store personal data on regime servers. A kind of nationalized,
Chinese Facebook, integrated into a Chinese email, storing data on
the Chinese iCloud, and able to suggest what to purchase next from
the Chinese clone of Amazon. This scenario highlights the fact that
the policies of the IT giants, and especially of those which require
ever more sophisticated profiling to boost their profitability – as is
the case with the four largest: Facebook, Google, Apple, and
Amazon – is totally compatible with authoritarian control systems.
These technologies correspond perfectly to the needs of modern
dictatorships.
The general acceptance of this profiling is what makes the coming of
this social model possible. Chinese authoritarian capitalism, proves
perfectly reconcilable with American democratic capitalism. Indeed,
the two systems actually support each other. From a financial
perspective they are totally interdependent, since the Chinese
sovereign wealth funds includes a large part of America's public
debt, and thus China could, given the amount of its US Dollar
reserves, destabilize Washington. From the economic point of view,
American high-tech companies could never amass the kind of
extraordinary profits they make without low-cost industrial inputs
from China. To take just one example if iPods, iPhones and iPads
were manufactured in the West rather than in the industrial district
of Shenzhen, their cost would be astronomical. The FoxConn factory
workers, who put together these alluring objects of desire, are
forced to sign contracts in which they pledge not to commit suicide,
an event which is not uncommon, given the inhuman working
conditions. Business practices that these workplaces depend on
would be impossible to implement in Western countries.
Both these systems share a need to more effectively identify their
own population. The United States must supply consumer goods in
order to guarantee the happiness written in the social contract
while at the same time detecting and neutralizing potentially
subversive threats to the system. China needs to improve the
material life conditions of the people without allowing the
development of democratic politics, at the same time it needs to
restrain ethnic and religious tensions. Unlimited growth is of course
the basis common to both approaches. The rest of the world,
meanwhile, does not sit still, and every country participates as much
as it can in this competition. Some countries go for the Orwellian
approach, others prefer a more sophisticated model with subtle
profiling, the Huxleyan way. The social network thus morphs into a
trap where flat individualities, also known as pancake people, split
up by profiling, trash around. At that stage it becomes increasingly
challenging to convince these people to buy stuff because they are
not even able to consume a fraction of what they have already
accumulated, while they produce extraordinary amounts of
industrial waste. They waddle around in search of personalized
commodities, passive entertainment and collective identities.
1. Naomi Klein, ‘China's All-Seeing Eye’, Rolling Stone Magazine, 14 May 2008,
http://www.naomiklein.org/articles/2008/05/chinas-all-seeing-eye. back
3.03 ON ANTHROPOTECHNICS:
REACTION AND SURVIVAL
Not all is lost, it is possible to remove data and to vanish from
commercial social networks. We can ignore the revelations from
WikiLeaks' for what they are, and in the meanwhile build up
alternatives free from control, like Lorea, the Diaspora Project or
OpenLeaks.1 It is possible to build profiling-free search engines,
cloud computing services, and more general communication
networks that are owned and managed by the users themselves. In
the spirit of curiosity, typical of the hacker, we could start make it
building physical networks for autonomous communications.
Everything is within reach, and independent tools are a more
desirable option than to outsource digital sociality to private
companies. But at the same time, we need to realize that no
alternative is going to be totally free. Even if we manage to define in
concrete terms what it means to be free, and are able to mobilize
the necessary energies, the most difficult task still remains: to the
actual construction of new tools. The challenge is not to rebel for
the sake of rebelling, but to imagine ways to develop autonomy and
to put these into practice, here and now.
The first method to escape the effects of radical transparency is the
adoption of encryption and anonymization tools. Any encrypted
email is unreadable for whoever does not possess the appropriate
decryption key. All searches we perform on the internet can also be
anonymized, as well as our connection to computer networks and
data stored on our computers, and smartphones. There are very
powerful hybrid encryption algorithms available, such as GPG (Gnu
Private Guard).2 Anonymous web browsing is possible, through
making use of software such as TOR, a system first developed by the
US Navy, but now an independent project.3 TOR allows users to hide
their requests by connecting them, first to intermediary nodes
(proxies) or to other randomly selected TOR nodes, from where they
finally reach their desired site. Protecting your privacy whenever
possible is always a good idea. The use of cryptographic
instruments should be the rule, not the exception.
It is also advisable to become more familiar with our everyday tools.
However, one should always keep in mind that protection is always
relative, never absolute, but provides a reasonable level of security
with regard to the current state of technology. With sufficient
financial resources and computing power, decoding an encrypted
communication is only a matter of time. As far as anonymization is
concerned, blocking of proxies is always an option in a system of
diffuse surveillance: we have seen that this practice exists both in
democratic and in authoritarian states. If the user has been marked
as dangerous by the surveillance system, the use of physical
coercion is always another option. But the most counter-productive
aspect of these technologies is that in a world where everybody
trusts everybody else, and use their real name in digital interactions,
those who behave different and use encryption or anonymization
are assumed to have something to hide. The simple fact of using
these systems make us self-evident targets. Similarly not having a
Facebook account or a mobile phone arouses suspicion in others.
Cryptography is not easy to use, and requires a reasonable level of
technical competence, which is a major obstacle to its widespread
adoption. As a specialized form of knowledge power, cryptography
reinforces the emergence of a hierarchy of more or less trustworthy
experts. Also, it does not really protect against profiling, since it is
perfectly possible to profile users of cryptography, as soon as they
communicate with less wary users: by tracing the group 'fingerprint'
it is possible to reconstruct the history of user out. The paradox
being that the more I try to protect myself, the more I stand out
from the crowd, and hence become increasingly more recognizable.
If your browser uses extensions to prevent profiling and enables
anonymization and encryption, and if your operating system is of a
particular type like GNU/Linux, you become much more visible to
prying electronic eyes than a user with less sophisticated and more
'mainstream' systems.4
Finally cryptography has attracted a lot of criticism by those who
consider that it shares the same idea of unlimited growth – always
increasing speed and power – as libertarian turbo-capitalism. The
increase in computing power and accelerating network speed,
increases the effectiveness of the latest cryptographic systems: but
this also rapidly renders older systems obsolete. This dynamic of
innovation-obsolescence is reminiscent of military confrontation,
with a logic of attack and defense, espionage and
counterespionage. We should recall that these were systems that
were originally designed for military purposes and that they were
intended to prevent communication interception by the enemy.
Ultimately, encryption is a good practice, especially for technology
geeks who enjoy logical puzzles, but its basic approach is not
satisfactory.
The second common reaction, which is especially tempting for
those who detest hacking culture, is Luddism. The Luddite is
convinced that information and communication technologies
should be completely rejected or even destroyed. Their reasons
include the fact that these technologies are a threat to personal and
collective liberties, they provide democratic or authoritarian
governments formidable instruments of repression and they tend
to create structures of technocratic domination. In fact there are
both technophobe and technophile luddites. The former are more
consistent with themselves, they are not at ease with appliances,
especially digital ones. They often idealize a mythical, natural past
world, which never existed, where humans were free from the yoke
of machines. Their mantras are 'things were better before' or 'in the
past this would never have happened'. They are not entirely
mistaken: Ivan Illich's criticism of industrial technology tools is still
relevant today. Technical systems become counter-productive when
they develop beyond a certain point, and once they have passed the
threshold of usefulness, they become harmful. Cars within cities are
a slow, polluting and dangerous means of transport. The same
appears to be true of the social internet, which more and more
resembles a system that makes us feel alone while being in
company, with everybody being individually connected to the big
network without physical contact with the other people on it.
But the technophobic luddite is not consistent in his desire for
nature-based purity; human history is cultural history, made up
from the development of technical ideas, which become
materialized in technological tools. The problem resides in
domination practices, not in technology itself, which does no more
exist anymore than the concept of nature in itself does. The most
extremist luddites advocate the destruction of all technical systems.
Anarcho-primitivists like John Zerzan, for example, would like to
abolish not only the internet, but also agriculture, art, language, all
being considered tools of oppression. But who wants to live in such
a world? Fundamentalist luddites worship the inviolability of nature,
and are fanatics in the religious sense of the term: they even
promote the total extinction of the human race as the sole remedy
to the impending catastrophe.5
Technophile luddites have a rather more schizophrenic attitude.
They appreciate the convenience and opportunities offered by
technological developments, especially those that bring them in
contact with others. But they refuse to take an interest in the way
these social networking tools actually work. They make no effort to
understand, self-manage or tweak these technologies, since it is so
much easier to outsource these problems. They have great
confidence in the experts and call them up as soon as they
encounter a problem. With this type of careless behavior they
contribute to the emergence of technocracy. This does not prevent
them from complaining bitterly that they do not understand
anything about these irksome devices and to furiously attack the
experts when they realize that nobody is going to manage their
instruments free of charge and that even experts are not able to
solve their problems once and for all.
Perhaps the most common practice is to deliberately embrace
technocracy and to and to surrender to outsourcing problems. It is
natural, when bombarded with contradictory messages and the
chaos of information, to think that these issues are so huge that
they can be resolved independently. The internet is global and some
digital technologies are more pervasive than others. The
technological patina that covers everything makes us believe that
the problem is universal. Techno-enthusiast argue that to manage
this knowledge independently because human beings are by nature
selfish and greedy, ready to go to war. They believe in Hobbes'
famous dictum, that man is a wolf to his fellow man. For the greater
good, it is better to delegate to some capable figure and overcome
the typical human inadequacies. Technophiles believe that it is
necessary to setup institutions and organizations responsible for
addressing these technological issues, and preferably at a global
scale. These organizations should ensure citizens' liberties and
rights, and of course an adequate level of consumerism.
Technocracy is inherently scientific and it is difficult to oppose
without being accused of obscurantism, opposition to progress, or
simple naivety. Technocrats want to regulate every aspect of the
internet through setting up systems of control. These technocrats
are therefore in favor of expanding the panoptic model. Within the
Matrix, users live under the guidance of experts forming the
disembodied great collective intelligence, a society of total
knowledge, a kind of fantasy replica of Teilhard de Chardin's
'noosphere'.6 Technocratic extremism finds its realization in the
post-humanist and transhumanist movements; but even the
moderates demanding global regulation of the internet actually
contribute to the advancement of radical transparency and global
profiling.
The assumption underpinning the technocratic position is that
technologies are inherently good and the outcome of scientific
objective and disinterested research. The machines do not lie
because they are not capable of lying and would have no interest in
doing so. This may be the case, but let us not forget that machines
are programmed by humans, who have many personal interests at
stake, and they are perfectly capable of lying, even to themselves.
Technocracy is based on the delegation of technological knowledge-
power to others. With the absence of mechanisms of shared
delegation, hierarchies tend to be structured in an authoritarian
manner and to lose touch with their historic background, which is
the outcome of social conventions and agreements. There is a large
difference between acknowledging the authority of someone as a
competent person in a certain field and giving this person a
mandate, which is verified regularly and revocable, to blind trust in
the supremacy of a technocrat. In the latter case the experts-
priests' power becomes unassailable and unquestionable. Naturally,
it will always be presented as redeeming, and this often in
millenarian terms; if you do not choose the right technician, you are
lost.7 The IT expert, even more than a medical doctor, is the shaman
of our contemporary age. Will my computer recover from this virus
that infected it? Is there any hope for recovering the data I lost? The
authority of the expert leads to the paradoxical situation in where
every action becomes a request to the principle of an external
authority, and simultaneously, a statement of self-disparagement.
First we have to confess to our own ignorance and inadequacy,
make amend for past errors and humbly ask for assistance, only to
discover that experts are not at all custodians of objective
knowledge. Sometimes these disappointed techno-enthusiasts can
become disillusioned technophile luddites.
Technolatry is the inevitable consequence of technocracy.
Technology becomes an idol to worship. Confidence turns into faith,
and into the belief that there exist miraculous solutions that will
solve social problems. We expect technical solutions to a whole
range of problems like pollution, global warming, world hunger and
new, fanciful mythologies are being devised: green fuels, clean
technology and genetically modified crops. These quick fixes to
pressing problems are almost magical. Like any hegemonic
apparatus, technocracies dull critical capacity as they demand blind
collaboration from people and claim a range of identities in, a social
chain without apparent beginning or end. Everything is connected
because everyone is involved and no one can opt out. All forms of
consumerism, and especially those inspired by techno-enthusiasm,
are tributes to technocracy. They confirm that there is no alternative
to the present system, because they avidly buy the latest gadget put
on the market as the magic key to happiness. Personal desire has
been expropriated by advertising itself and is now reduced to the
predatory search for the best deal. As then individual ever more
transparent, technical mediation progresses in an increasingly
opaque way, making the development of knowledge-power totally
impenetrable. Technocratic society is the society of Mega Machines,
in which nobody is responsible, but where everybody is a tiny cog in
the global mechanism – at least as a consumer. The top of the
hierarchy is just as elusive as its bottom, and to escape the system
is simply inconceivable.8
Peter Sloterdijk asserts in 'Rules for the Human Zoo' that, what he
calls, humanistic anthropotechnics is in crisis.9 The project to breed
and train citizens through public education has collapsed, the
project to develop mass literacy could be replaced by eugenics to
engineer are more civilized race. There is no need to resort to
genetic engineering; social engineering is already more than
enough. We have already seen how the use of invasive social
technologies leads to automated forms of obedience which are
then portrayed as necessary and beneficial. Observing this process,
we can easily detect the anthropotechnics of Facebook. In this way,
the biopolitical control of both bodies and minds is decentralized as
much as possible towards the individual, who becomes answerable
for her own subjugation to technology. The transparent individual
already lives outside of herself, in the technological sphere, and no
longer has any secrets or any other space to retreat to. Such an
individual increasingly loose confidence in their autonomy because
they have become less competent, and they surrender to the
incomprehensible vastness of the global network. It seems for them
that there is no longer any way to make things work.
Finance is a good illustration of this type of mechanism, where the
mouse click of amateur investors and uncontrollable forces are
capable of wiping our entire economies. Technocracies themselves
are portrayed as the rational solution to all social problems, but in
fact they are ultimate expression of the irrationality of the economy.
Anthropocentrism tends to lead us into believing in a rational
intentionality present behind every event, so it becomes obvious to
see a correlation between the uncontrollable power of technology
and natural forces, something made near-explicit in everyday
language, with terms like 'financial tsunami', information deluge,
innovation waves, etc. Merging technology with nature results in
attitudes bordering on mysticism and produces absurd vacillations
between the will to power and the desire to rebel. The perfect
individual within a global technocratic regime is docile and
apathetic. Obedient to the rules decreed and by her enthusiastic,
defeatist or passive attitude, she forces potential rebels to conform.
Such an individual is neither a charismatic leader nor an exceptional
figure, but a supporter of technical banality, in other words a little
Eichmann of contemporary techno-totalitarianism. In the words of
Lewis Mumford: 'In every country there are now countless
Eichmanns in administrative offices, in business corporations, in
universities, in laboratories, in the armed forces: orderly, obedient
people, ready to carry out any officially sanctioned fantasy, however
dehumanized and debased.'10
Even before the issue of civic rights, it is firstly an issue of losing our
personal autonomy, in terms of skills lost or ones that now will
never develop. Forty years after such lucid insight by the Canadian
sociologist, when the costs of this ubiquitous incapacitation should
be obvious, the technological drift has enveloped itself around us in
its ever more stifling coils. We are all sentient terminals of a global
network and this integration process doesn't look like as it could be
stopped. Even when we recognize the enormous problems the
adoption of these technologies causes, there are very few
possibilities to opt out. The escape routes considered by various
commentators are not very convincing.
But we should not be deceived by the pressing demands for viable
alternatives, especially when the demand is for alternatives that
work immediately and are suitable for all. We should examine
personal users need and whether an individual's desire, real or
imaginary, can be satisfied. It is obvious that no alternatives exist if
the quest is to for entity as large and powerful as Google. Only
another Google could work as fast and efficiently as Google, just as
an alternative social media platform that functions in the same way
as Facebook would merely be a Facebook clone. Instead what is
required are many niche alternatives and many local and diverse
solutions. Gigantism simply does not work, nor does the ideology of
unlimited growth and radical transparency will not set us free.
McLuhan's most famous dictum 'the medium is the message'
cannot be taken seriously enough. The same message disseminated
through different media undergoes change. The fact is, that in the
digital society, we are the medium, and therefore message. Having
debated about digital technologies we lost track of the depth of the
changes that have occurred in the meanwhile. We have to return to
the body, and that if our memories are stocked on line, our bodies
will tend to materialize in those same places. To adapt oneself to
the virtual world means, literally, to be absorbed and relocated
elsewhere, often in the so-called data Clouds. The intangible
lightness of being digitally connected cannot be dissociated from
the server-banks' heaviness – data centers strewn around the
planet, preferably in its colder regions, as computers heat up and
need chilling.2 Data centers are gigantic sheds with interconnected
hard disks stacked up to the ceiling. These fragile monuments of
total memory consume phenomenal amounts of electricity (3% of
the US' total consumption in 2011), taking an equally phenomenal
toll on the environment. Cloud computing will do nothing to
mitigate this problem, since the exponential growth in data will
undermine any attempt to reduce waste.3 Each time we log into our
digital profile to check whether we exist, somewhere another
computer lights up, connecting our request over thousands of miles
of cable, all so that we can 'connect' to our digital body.
The rapid transformation of millions of users into sentient terminals,
incapable of surviving in a world without the web was made
possible by the extraordinary adaptability of the human body. Until
the middle of the 20th century, physical strength was an important
criterion in a person's employability. The technological promise of a
world free of physical burdens has been realized for the richest part
of the planet, who have adapted to a life between screens and
keyboards. Meanwhile, the rest of the world aspires to participate in
the pleasures of choosing between thousands of types of
commodities. The consumer cult demands that we constantly use
commodities as a form of identity and expression. Even the space
occupied on remote servers is a status symbol and mark of identity.
Occupying a lot of digital space results in having to manage a 'body'
that stretches beyond the limits of physicality. In the context of
corporate social media this body is subjected to default power, that
is it is subjected to mandatory, unrequested influence. A digital body
does not belong to users and can only be managed according to
the rules imposed upon from the outside. Furthermore, the digital
body has been shaped by the demands of the technological world
which privilege brain power over physical strength. Google Earth is
our all-seeing eye, but we may only use it, for free, within the limits
granted to us. Meanwhile, our eyesight deteriorates as we keep
sitting in front of a screen.
Theories of the brain, just like the theories of the body, have
undergone dramatic change in recent years. Until a few decades
ago the general idea was that, once its growth phase was over, the
brain had become a static as an organ. Now we know that, on the
contrary, the brain is extremely plastic and retains its plasticity
throughout our life. Even though neurons keep dying, they continue
to create new connections between existing neurons. The
sensations we feel through repeated experience form new neuronal
circuits, while neglected circuits eventually deteriorate. Even the
thought of performing an action, to experience or re-experience a
specific situation causes physical change on the neuronal level.
Once these neuronal pathways are established it is nearly
impossible to reverse such a change. In the case of social media,
predominantly the eye and visual cortex is used, while the rest of
the body becomes weaker. The brain adjusts accordingly, and so
does our perception of the world.4
The brain is a muscle that when fed with too many superficial
connections atrophies and loses other disused capacities. Just as
junk food is a drug that upsets the metabolism, 'junk
communication' pollutes the brain and overtime it is difficult to
recover lost capabilities.5 The concentration necessary to deep
thinking requires quiet and attentiveness. Research has also
demonstrated that cognitive capacities increase when in a natural
environment.6 More complex imaginative faculties, like empathy and
compassion, need time and attention to develop and hone. The
sight of another person's physical pain stimulates a response of
empathy much more quickly than perceiving psychological pain,
which is a more complex phenomena to grasp.7 In terms of
creativity, developing a common moral and aesthetic vision
demands considerable time and an enormous listening capacity. It
is easy to be angered and outraged by the injustices of the world,
but it is near impossible to share dreams and utopias with
technological tools that only generate distracted attention...
Our social dimension is not necessarily defined by current
technologies. Mobile phones have become indispensable and the
same is slowly happening with mass social media. But this is not
necessarily inevitable. We could decide that we do not want to
become dependent on Facebook or Google+ or any other social
media platforms managed 'for our own good'. Instead we could try
to find out together something better to nurture our social life, just
as some people improve their diet. Our communication life could
then become a deeply satisfying banquet instead of a void that
becomes increasingly more difficult to fill.
A convivial information regimen is possible which favors the
realization of individual freedom and empowerment within a society
adequately equipped with efficient tools. The logical outcome of this
critique of domination-oriented information is inevitably 'small is
beautiful'; because size matters. Beyond certain numbers, a fixed
hierarchy becomes a requirement to manage the relationships
between human beings and other living beings in general. This is
because everything that is in a relationship is 'relative'. If, instead of
maintaining relationships with ten people, in a circumscribed space,
we have to do with thousands or millions of people, relativity gives
way to homology. To have one thousand friends does not make any
sense at all since we do not have the time and energy to maintain
all these so-called 'friendships'. Significant relationships require
time, attention and competence and cannot be satisfied, with the
distracted attention or indifference characteristic of social media.
Human beings can only effectively keep in touch, meaning here to
know where are, what they do there etc., with a few dozen people at
the same time.8 In a project that has too high number of
participants, people start to identify categories of gender, 'race',
wealth, resources, age, expertise, etc., in a fixed hierarchical manner.
The standard white male discourse leaves no room for evolution
other than through a radical break resulting in shocks, violence and
disruptions which inevitably returns us to the question, what to do?
This notorious Leninist question, 'What is to be done?' lacks any
libertarian response without beginning yet another totalitarian
revolution, from either the left or the right of the political spectrum.
Megamachines involves chain of both capitalist and despotic type.
They create dependency, exploitation, and powerlessness, reducing
humans to the function of enslaved consumers. This is not a
question of property issues, since:
The real question to ask then is how to do this? What are our
desires in relation to digital technology? What kind of digital social
networks, appropriate to our desires, would we like to build? Which
tools will we use? Which modes of participation and of exchange
would we like to draw upon?
We need to reverse the logic of radical transparency and apply it to
the technologies we use, and to those social media platforms that
promise immediate interaction but are in fact non-transparent
intermediaries. It is absolutely essential for an individual to retain a
private sphere and to nurture a secret, personal inner world that is
not subject to profiling. It is vital to learn to spend time alone, in
silence, and to learn to like each other, by facing the fear of the void,
which social media tries to fill in vain. Only individuals that possess
self-esteem and are happy with themselves, despite their flaws, will
have the energy to build up sensible spaces of communication
where they can meet other people. Only individuals who have
acquired a know-how that goes beyond mere self-promotion skills,
have something interesting to communicate and to share. Effective
communication demands each person can listen to themselves,
before even being able to listen to others. Algorithmic logic is both
inadequate and degrading. It is not up to the individual to be
transparent to technology; rather it is technological mediation itself
that should be made to be as transparent and intelligible as
possible. The process of constructing shared worlds must be
explained.
Expressing desire is not an automatic process. Nor is the
transmission of skills a spontaneous process. To formulate desires
is not without risks. Relationships are based on trust and on the risk
that this trust might be broken or betrayed. Stratification and depth
are essential elements in a relationship. All forms of authentic
communication are complex acts of sharing personal imagination.
Misunderstandings are possible, and so-called radical transparency
will not prevent conflicts from arising. It does not make sense to
split up these processes into logical cycles and to submit them to
the perfect algorithm. The automatic satisfaction of desires merely
means outsourcing everything to technology, including the
imagination. Welcome then to the desert of the automatic, induced
desires, where there is nothing left to imagine.
There is a need to give an account of the communicative processes
and of the technologies that implement them. We need to explore
them with the help of texts and practices enabling us to extend, re-
trace, and re-assemble the social, by making visible the mesh of
connections between the social actors who are its protagonists.10
This way it should be possible to cut across the now blocked
instituted imaginary, and get it moving again. The net is the trace left
by the flow of social assets and made visible by the constant
translations performed by actors. Following these actors is certainly
slower and more difficult for all-encompassing globalizing answers
and main-streamed, standardizing theories, but it is a risk that must
be taken in order to capture the complexity of the real. This book's
ambition was to start sketching out the map of an area only partly
explored, by following the connections between actors and their
respective translations and betrayals. Naturally, the map does not
always correspond with the territory, there are many empty spaces
left, which may give rise to new associations.11
An actor carries out actions that are intended to achieve something.
In this sense an actor is much more than a simple intermediary,
since she is neither a neutral support nor an anonymous channel
for external communication that does not result in any reaction or
change. Quite on the contrary, an actor is a mediator who translates
and modifies information, according to her own characteristics, and
therefore is able to transmit messages in an effective way. Thus,
when two friends have a banal conversation on Facebook chat, this
not only involves the linguistic skills of two people, but also the
ideology that underpins Facebook. The communication protocols of
Facebook are layered in extremely complex networks and the
mutual expectations of those who interact on the network, and
many other aspects of interaction, are not all reducible to the
catchall term 'information'.
It may appear strange to associate neurons, individuals, emotions,
membranes and circuits, the macroscopic social world with the
microscopic one of molecules, but in reality all these elements are
connected. If anything it would be more unusual to dissociate them,
strictly limiting individuals to the domain of sociology and
anthropology, neurons to brain science, emotions to psychology,
membranes to biology, and circuits to engineering or computer
sciences. At this point it becomes impossible to identify the links
between all these different elements, without resorting to an
omnipresent essence, a deus ex machina of the social bond in the
paradigm of informationalism. In other words, without speaking of
imaginary 'social forces', or unidentified psychic forces, or history's
'manifest destiny' etc. Communication, however, does not transmit
information, but requires the creation of spaces of interaction, in
which heterogeneous actors are summoned together.
Collaboration can progressively evolve into convivial technology
when it stops being part of the ongoing chatter and aims to create a
shared space. Personal space can be developed both in an
individual and in a collective sense.12 If a space succeeds in giving
individuals a sense of fulfillment, then it might be visited, shared,
and used. Such a territory is a collective one; it represents a
different system with regard to individuals. It is something that has
not existed before, a radical creation, in the words of Castoriadis an
imaginary institution, directed by a magmatic logic.13 Using a
convivial technology together means to change, to alter reality, to
modify one's own reality, and in a broader sense, to change the
world around us.
In the study of group dynamics, the largest problem, which may also
sometimes be a strength, is the limits of the collective.14 In all
collaborative activities, the limits can be formulated in qualitative,
quantitative, and temporal terms. Certain qualitative limits are self-
evident, since collective work does conform to a specific individual's
expectations but rather to the individual self as unfolding
development within a collective self. It is, in a certain sense, less
precise, as the perceptions of a single individual subject are not the
same as those of the collective subject. Both subjects are in a
process of coming-into-being and require a continuous and
controlled exchange. For this reason doing things alone is much
easier and less troublesome than doing them as a group. To
operate within a group is painful in so far as you have to renounce
having the final word, your own identity is under continuous re-
assessment. The individual has to entrust a portion of their own
self-expression to others. If one individual attempts to control
everything, he stifle the collective and takes up a dominant role, he
will be a constant point of criticism, even in those case where
people end up agreeing with him.
It is essential to be exacting but there is a risk of becoming a 'guru',
and even a censorious critic. Therefore it is essential to keep the
group method in mind as a positive limit, which will also function as
a quantitative limit with respect to the time and the energy that can
be used sensibly in a collective activity. It will be even more difficult
to achieve harmony in a project when there are large differences in
the levels of personal investment in a project. Those who put in the
most effort into a project are subsequently unable to do more and
to compensate for the others' presumed or real failings. There are
two reasons, related yet opposed, for this state of affairs. The first
reason is external, the more you invest in a project the greater the
risk that you will overshadow over participants and thwart
autonomy within the collective. The second reason is internal; when
an individual member takes on a disproportionate amount of
responsibility, it becomes a source of frustration and they often
demand compensation. 'I am doing all the work here' and 'nothing
would happen without me' are the typical complaints of such an
individual. But the others are unwilling to recognize these
complaints, in order to not debase their own personal contribution
or the collective. Seen from an economic perspective, doing more is
not necessarily always a good a thing, cooperation demands the
continuous renegotiation of the limits and the rules governing a
collective.
Pure voluntarism is blind and often counter-productive. A sensible
and constructive imbalance that tends towards chaos and the
unexpected often requires us to step back in order to redistribute
our energies in favor of others. This is not a matter of altruism, but
simple tactic. Excessive imbalances should be avoided but on the
other hand, we must also avoid adapting to the rhythm of
participants who show the least enthusiasm and effort. Tempering
enthusiasm often amounts to imposing a conservative viewpoint, in
the sense of one that is already well established and not useful in
overcoming difficulties. Enthusiasm should be encouraged with
trust and trust must be balanced by a critical mindset, or in other
words, by reflexivity. Mutual efforts should be directed towards
developing a space of autonomy, and be fueled by pleasure rather a
sense of duty or obligation. Otherwise frustration and resentment
will gain the upper hand. The desire to dominate others is fed by
the desire of others to be dominated, and vice-versa. This is why the
balance needs to be dynamic and capable of drawing upon the
energies of individual members, avoiding the crystallization of
hegemonies and hierarchies. Stasis can only be overcome by
appealing to the 'residual chaos', the imbalance regulated by shared
procedures.
The compulsive tendency to return to the group must be restrained
in a positive way. A group sometime needs to wind down, either to
reconfigure itself or simply because it has spent all of its energy.
Refined theories, flawless experiments, conducted by a collective
without critical sense, are as beautiful as they are useless. Theories
devoid of any critical relevance are merely ornamental and certainly
not valuable tools. Perfectionism must be shunned when making
room for the autonomy of what is to come. Instead we must
embrace a contingent realism, defined by what technologies are
currently available. The word games must stop when the mood has
changed and the pleasure of playing and sharing have disappeared.
Facebook and similar social networks push us into disembodied
mass elitism, which is synonymous with global totalitarianism
organized in small, autarchic groups. Even though it is a complex
laborious task, we prefer to take a risk and dare to imagine a world
of convivial technologies. Everything is still possible; nothing is set in
stone. We are here, with our desires and our time available to satisfy
them. It is the right time to create something different. The moment
has come to log out of social media, to go out on the streets and to
start building different social networks.