Tuesday, May 3, 2011
Review of Carr and Dean from LBO
Nicholas Carr, The Shallows: What the Internet Is Doing to our
Brains , W.W. Norton, 276 pp. $26.95.
Jodi Dean, Blog Theory: Feedback and Culture in the Age of the
Drive, Polity Press, 140 pp., $19.95.
Hearts fluttered over the contribution of Facebook and Twitter to the Middle Eastern uprisings. No doubt they contributed, but so did things like pre-existing union agitation in Egypt. And it wouldn’t have happened had people not gotten out of their pajamas and into the streets. But, over the longer term, what is our
wired world doing to our minds and cultures?
These two books come at the same problem from different directions. Jodi Dean’s is explicitly from the left and rather theoretical, and Nicholas Carr’s isn’t explicitly political and is mostly empirical. But they both make you worry about the Internet’s effect on us. Neither author is a Luddite, and both blog. And they’re aware of the oddness of writing a book about the topic. The new media world is fast, faster even than TV, which rewards “fast thinkers,” as Pierre Bourdieu put it (see LBO #83). The speed of TV is driven by advertisers, who fear that anything seriously disruptive, like pausing to think, might interfere with sales effort. Though those preferences have become embedded in the assumptions of producers—they love bombast, phony conflict, quick cuts—one could still imagine serious conversation on TV, or disruptive art—in fact, we’ve all seen that now and then.
Friday, April 29, 2011
Instructions for self-assessment--due May 9
Final Exam--due May 7 at 4:30
You may use your books and consult with others in the class. As a preface or introduction to your exam, explain how you went about answering the questions. Did you work with others? With whom did you work? How did you organize yourselves? What was the process? Be as specific as possible. Failure to provide this account will result in a ten point penalty (that is, ten points deducted from your total exam points).
Note: Your self-assessment will be due on Monday, May 9, at 5:00 in my office. I will accept early papers. I will not accept late papers.
There are 10 ten point questions and 1 twenty point question.
Ten point questions. Be sure to cite and engage the readings that inform your answer.
1. Eric Raymond contrasts the cathedral and the bazaar. What point is he trying to make with this contrast? Is his argument consistent with his title? Why or why not?
2. Siva Vaidhyanathan argues that Google has capitalized on public failure. What does he mean when says this? How is this argument connected to the question of regulation?
3. What drives social media? The best answers will think in terms of both the users and the features of social media. They will also refer to the "The Viral Me."
4. In what ways does an eighties "hacker culture" shape Wikileaks? How does this differentiate Wikileaks from more traditional journalism? What are the benefits of these differences? What are the drawbacks?
5. What does Mark Andrejevic mean by "digital enclosure"?
6. Does interactivity entail democratization? Use Mark Andrejevic to answer this question. What are the repercussions of your answer for analyzing movements.org?
7. What is the connection between technology and refusal of work according to Franco Berardi?
8. According to Franco Berardi, why do problems like panic disorder, ADHD, and depression increase under semio-capitalism?
9. According to Nicholas Carr, what does the internet do to our brains? How does he use the idea of brain plasticity in his argument? Is it persuasive? Why or why not?
10. Why is it in Google's interest to get us to click on more and more links? What are the repercussions of this for Google? What are the repercussions for people? Does it make sense to use the notion of efficiency to think about thinking? Why or why not?
Twenty point question. Be sure to engage and cite material from the course in your answer. You may use texts assigned during the first half of the course (chapter two of Terranova may be important here).
Students had the option of changing the way their work in the course would be assessed. You could change the requirements as well as the way these requirements would be weighted. Why didn't you do this? In answering the question, consider what you personally did or did not do as well as what your fellow students did or did not do (I'm asking you here whether you think your own reasons/motivations were the same or different from those that you attribute to others). The best answers will thematize the effect of the media terrain. For example, digital networks are supposed to facilitate communication; they are supposed to enable people to connect with one another easily; is this the same as enabling/inciting people to come together to evaluate problems, formulate options, and make decisions? Might the same technologies that reduce friction also displace action?
Tuesday, April 26, 2011
End of term
The format for the final exam will be the same as it was for the mid-term. It will be due on May 7 at 5:00. I will post the questions this Friday.
The self assessment paper (15 pages) will be due on May 9 at 5:00. I will post guidelines for the paper by Friday.
Monday, April 18, 2011
Write or Die by Dr Wicked � About
"Write or Die is a web application that encourages writing by punishing the tendency to avoid writing. Start typing in the box. As long as you keep typing, you’re fine, but once you stop typing, you have a grace period of a certain number of seconds and then there are consequences."
Sunday, April 17, 2011
The Terminators: drone strikes prompt MoD to ponder ethics of killer robots | World news | The Guardian
The report warns of the dangers of an 'incremental and involuntary journey towards a Terminator-like reality', referring to James Cameron's 1984 movie, in which humans are hunted by robotic killing machines. It says the pace of technological development is accelerating at such a rate that Britain must quickly establish a policy on what will constitute 'acceptable machine behaviour'."
Saturday, April 16, 2011
Google against extremism (AYM related)
Neo-Nazi groups and al Qaeda might not seem to have much in common, but they do in one key respect: their recruits tend to be very young. The head of Google’s new think tank, Jared Cohen, believes there might be some common reasons why young people are drawn to violent extremist groups, no matter their ideological or philosophical bent. So this summer, Cohen is spearheading a conference, in Dublin, Ireland, to explore what it is that draws young people to these groups and what can be done to redirect them.
Technology, of course, is playing a role both in recruiting members to extremist groups, as well as fueling pro-democracy and other movements--and that’s where Google’s interest lies. "Technology is a part of every challenge in the world, and a part of every solution,” Cohen tells Fast Company. "To the extent that we can bring that technology expertise, and mesh it with the Council on Foreign Relations’ academic expertise--and mesh all of that with the expertise of those who have had these experiences--that's a valuable network to explore these questions."
Cohen is the former State Department staffer who is best known for his efforts to bring technology into the country’s diplomatic efforts. But he was originally hired by Condaleezza Rice back in 2006 for a different--though related--purpose: to help Foggy Bottom better understand Middle Eastern youths (many of whom were big technology adopters) and how they could best "deradicalized." Last fall, Cohen joined Google as head of its nascent Google Ideas, which the company is labeling a "think/do tank."
This summer’s conference, "Summit Against Violent Extremism," takes place June 26-29 and will bring together about 50 former members of extremist groups--including former neo-Nazis, Muslim fundamentalists, and U.S. gang members--along with another 200 representatives from civil society organizations, academia, private corporations, and victims groups. The hope is to identify some common factors that cause young people to join violent organizations, and to form a network of people working on the issue who can collaborate going forward.
"With more than 50% of the world’s population under the age of thirty and the vast majority of those characterized as 'at risk,' socially, economically, or both, an oversupply exists of young people susceptible to recruitment by the extremist religious or ideological group closest to them in identity or proximity," Cohen wrote on the blog of the Council on Foreign Relations, the event’s co-host.
One of the technologies where extremism is playing out these days is in Google’s own backyard. While citizen empowerment movements have made use of YouTube to broadcast their messages, so have Terrorist and other groups. Just this week, anti-Hamas extremists kidnapped an Italian peace activist and posted their hostage video to YouTube first before eventually murdering him. YouTube has been criticized in the past for not removing violent videos quick enough. But Cohen says the conference is looking at the root causes that prompt a young person to join one of the groups in the first place. "There are a lot of different dimensions to this challenge," he says. "It’s important not to conflate everything."
Thursday, April 14, 2011
Web Creator Tim Berners-Lee: Internet Access Is A Human Right
Berners-Lee, who made his comments at an MIT symposium on 'Computation and the Transformation of Practically Everything,' noted that people have become so reliant on the web that it should be a right to have access to it, as reported by Network World.
'Access to the Web is now a human right,' he said. 'It's possible to live without the Web. It's not possible to live without water. But if you've got water, then the difference between somebody who is connected to the Web and is part of the information society, and someone who (is not) is growing bigger and bigger.'"
Wednesday, April 13, 2011
Second paper topics. Papers due on April 22.
Deadline: Papers are due on April 22 at 5:00. I do not accept late papers--no exceptions. You must submit a paper and electronic version. Paper versions are due in my office at 5:00 on April 22. Electronic versions must be sent to my email address: jdean@hws.edu. Again, you must submit both versions (submitting just one does not count and you will get a "0").
Format: Papers must be typed, double-spaced, with a title page, citations (recognized academic form), and page numbers. The paper version must be stapled in the upper left corner. Papers should be 6-8 pages long (5 is too short; 9 is too long).
Style: Papers must have a thesis, that is, a primary claim for which you argue on the basis of your reading of the texts assigned for the class. The thesis must appear in your first paragraph. The assignment is to write an essay on one of the topics listed below. The essay should answer the question the topic poses. In answering the question, the essay should draw from (and cite) the relevant course materials (as well as materials from your presentation if you choose that question). You are welcome to email me your thesis in advance to make sure you are on the right track. I can only answer queries made before noon on April 20.
Assessment: The criteria for assessment (not in rank order) are 1) the format requirements; 2) the cogency of the thesis; 3) the quality of the argument; 4) the quality of the writing; 5) the depth of engagement with the course readings; 6) the understanding of the readings demonstrated in the paper. I am looking for papers that take a position and present strong, well-supported arguments for it. I am also looking for papers that show improvement and development since the beginning of the course.
Questions (choose 1):
1. Terminator 2 depicts a future of sentient machines. Mark Andrejevic envisions a present wherein interactivity disempowers citizens politically while at the same time telling them that they are active and involved. Given the empirical examples we've discussed in class (Movements.org, open source software/development, Google, Facebook, Twitter, and Wikipedia), which vision seems most likely? Are the ways of dealing with (preventing? overcoming?) these two futures the same? Why or why not?
2. Franco Berardi argues that in semio-capitalism, "human minds and flesh are integrated with digital circuits thanks to interfaces of acceleration and simplification. . . " Explain Berardi's thesis. How is it like or not like a vision of Terminators? How is it like or not like the vision of hive mind or singularity Lanier criticizes? Is Berardi right? Why or why not?
3. Franco Berardi contrasts connection with conjunction. Explain these two concepts. What do they entail for the connective generation? Use these concepts to analyze Facebook and/or Twitter.
4. Write an essay in which you compare and contrast Dean and Berardi. Be sure to consider whatever being and the connective generation as well as their discussions of the change in the symbolic/decline of symbolic efficiency.
5. Write an essay that uses one of the theoretical pieces we've read this term (Terranova, Dean, Andrejevic, Berardi) to explore more analytically the empirical material you covered in your class presentation. (These papers will be graded in terms of the depth/detail of your analysis).
6. Franco Berardi describes our world of digital networks in terms of a series of psychopathologies. Yet he also suggests that information technologies are liberating. Which side of his story is more convincing? Why? Are both sides present in our contemporary setting? How or in what sense?
7. Franco Berardi suggests that the connective generation (the generation that learned more words from machines than from their mothers) lacks empathy and desire. He even suggests that art and poetry are captured in semio-capitalism, unable to oppose semio-capitalism. Why does he think this? What are the implications of this claim? Is he right?
Tuesday, April 12, 2011
Celebrity and the refusal of work (I prefer to sleep)
Is it possible that the desire for recognition ends up trumping the desire for freedom? Or that the desire for recognition functions in such a way that it can be manipulated and so substitute for or displace the desire for freedom (we might think here about the entrepreneurs quoted in the Friedman article; as they explain, successful social media uses people's desire for affirmation, people's need to prove they exist).
What if we focus on the desire for freedom? Bifo describes the desire for freedom as a refusal for work: "I don't want to go to work because I prefer to sleep."
Might then the celebrity form be a form of our alienation, our unfreedom? If we were free to sleep when we wanted, free not to work, would we be likely to fantasize about the freedom of a select few?
Monday, April 11, 2011
HACKING MONOPOLISM TRILOGY - Face to Facebook
"There are other common themes in the projects. In all of them we stole data that is very sensitive for the respective corporations. With Google it was the 'clicks' on their AdSense Program; with Amazon we started to steal the content of entire books, and with Facebook we stole a huge amount of public data profiles. In all the three projects, the theft is not used to generate money at all, or for personal economic advantage, but only to twist the stolen data or knowledge against the respective corporations. In GWEI it was the shares obtained through the money created by the Adsense program; in Amazon Noir it was the pdf books distributed for free; and in Face To Facebook it is the collection of profiles moved with no prior notice to a dating website.
All the projects, indeed, independently claim that some of the corporation’s 'crown jewels', including their brand image and marketing approaches, can be hacked, focusing only on their established strategies and thinking in a 'what if?' fashion"
Sunday, April 10, 2011
Radical Philosophy - Commentaries - March/April 2011
Radical Philosophy - Commentaries - March/April 2011"Years ago, Julian Assange considered solutions for an unusual problem, the kind of thing cryptographers discuss: how can you make sure a message only becomes readable at a certain time, not before, such that no human frailty or mechanical error interferes with the schedule? He came up with three answers, which display his knack for odd lateral thinking, an unremarked gift that turns up throughout his work. One solution: encrypt the message, and then broadcast the key to the code out into space, to ‘distant astral bodies’, as he puts it, and wait for it to be bounced back. You can publicize the body, the distance, the coordinates; the satellite dishes of Earth will be oriented at that hour of that day to pick up the bounce and your message will be read. Another solution is quite baroque, with space probes passing a key stream between them, ‘using space as the storage medium’, before sending decrypts back to Earth. The last is by far the most elegant solution, the most difficult to realize, and in some ways the cruellest."
Wednesday, April 6, 2011
Tuesday, April 5, 2011
Sunday, April 3, 2011
Eurozine - The society of the query and the Googlization of our lives - Geert Lovink A tribute to Joseph Weizenbaum
Friday, April 1, 2011
Harsh reality behind Apple scandal | China Watch
Apple Inc acknowledged the scandal for the first time on Feb 15, in its Apple Supplier Responsibility 2011 Progress Report. The company said 137 workers at the Suzhou facility had suffered adverse health effects following exposure to n-hexane. The factory has 16,000 employees.
As of Monday, 100 of the 137 had left the factory with compensation of 80,000 to 140,000 yuan ($12,166 to $21,291), according to Liu Jie, press officer for the industrial park where the plant is situated. All signed agreements with United Win Technology that exempt it from responsibility if their health worsens, Liu said."
Thursday, March 31, 2011
Excerpt from "The Packet Gang" by Jamie King
Here, the idea of openness presents itself as absolutely inimical to the ‘dominant multinational global news system’, where ‘news is not free, news is not open’. With open publishing
the process of creating news is transparent to the readers. They can contribute a story and see it instantly appear in the pool of stories publicly available. Those stories are filtered as little as possible to help the readers find the stories they want. Readers can see editorial decisions being made by others. They can see how to get involved and help make editorial decisions. If they can think of a better way for the software to help shape editorial decisions, they can copy the software because it is free and change it and start their own site. If they want to redistribute the news, they can, preferably on an open publishing site.
Accounts such as this and De Angelis’ bear out my argument that an extreme amount of expectation is being focused on openness as an agent for change. Not only is openness central to the organisation of the social movement, but in many cases it is taken as read that the organisational quality of openness is inherently radical and will be productive of positive change in whichever part of the social-political field it is deployed.
The working parts of journalism are exposed. Open publishing assumes the reader is smart and creative and might want to be a writer and an editor and a distributor and even a software programmer [...] Open publishing is free software. It’s freedom of information, freedom for creativity.[16]
Stallman: "Why Open Source Misses the Point of Free Software"
In 1998, a part of the free software community splintered off and began campaigning in the name of “open source.” The term was originally proposed to avoid a possible misunderstanding of the term “free software,” but it soon became associated with philosophical views quite different from those of the free software movement.
Some of the supporters of open source considered the term a “marketing campaign for free software,” which would appeal to business executives by highlighting the software's practical benefits, while not raising issues of right and wrong that they might not like to hear. Other supporters flatly rejected the free software movement's ethical and social values. Whichever their views, when campaigning for open source, they neither cited nor advocated those values. The term “open source” quickly became associated with ideas and arguments based only on practical values, such as making or having powerful, reliable software. Most of the supporters of open source have come to it since then, and they make the same association.
Nearly all open source software is free software. The two terms describe almost the same category of software, but they stand for views based on fundamentally different values. Open source is a development methodology; free software is a social movement. For the free software movement, free software is an ethical imperative, because only free software respects the users' freedom. By contrast, the philosophy of open source considers issues in terms of how to make software “better”—in a practical sense only. It says that nonfree software is an inferior solution to the practical problem at hand. For the free software movement, however, nonfree software is a social problem, and the solution is to stop using it and move to free software.
Wednesday, March 30, 2011
The GNU Manifesto - GNU Project - Free Software Foundation (FSF)
"Why I Must Write GNU
I consider that the Golden Rule requires that if I like a program I must share it with other people who like it. Software sellers want to divide the users and conquer them, making each user agree not to share with others. I refuse to break solidarity with other users in this way. I cannot in good conscience sign a nondisclosure agreement or a software license agreement. For years I worked within the Artificial Intelligence Lab to resist such tendencies and other inhospitalities, but eventually they had gone too far: I could not remain in an institution where such things are done for me against my will.
So that I can continue to use computers without dishonor, I have decided to put together a sufficient body of free software so that I will be able to get along without any software that is not free. I have resigned from the AI Lab to deny MIT any legal excuse to prevent me from giving GNU away.(2)"
From each according to ability = a really good system
LT: Well, I've put in a lot of work, and that's really what the thing has been all about: everybody puts in effort into making Linux better, and everybody gets everybody elses effort back. And that's what makes Linux so good: you put in something, and that effort multiplies. Essentially, in game theory terms it's not a "zero-sum game" at all: it's a positive feedback cycle.
Imagine ten people putting in 1 hour each every day on the project. They put in one hour of work, but because they share the end results they get nine hours of "other peoples work" for free. It sounds unfair: get nine hours of work for doing one hour. But it obviously is not.
Note that this isn't true of just the Linux developers who write the kernel code, it's also true of the actual users. Especially in the early days of Linux the users were also acting as guinea-pigs for new features and so on, and they (sometimes unwittingly) put in a lot of effort in determining whether something worked or whether it really should have worked another way. And for that work they put in they got the reward of seeing better and better systems.
What I'm really saying that there is no need for anybody to even try to put back as much as you get from the Linux project - because it doesn't really make sense. The whole project is built on the idea that everybody puts back whatever they can - and that the sum of a lot of small effort is a really good system..
Ads for activists or "activismTM"
1. More open source possibilities (than the iPhone)
2. Better security
3. Non-profit friendly
4. Growth in emerging markets.
Brian points out in the comments:
- -Sponsor: Google -No mention of jailbreak/root/hacking of devices that would enable ANY phone this functionality even though they are talking about circumventing other structured systems -No mention of the fact that Google's version of "open-source" involves them currently witholding the source code to their latest tablet OS Android 3.0, which not only undermines the title but the reason we shouldn't be skeptical since it's 100% not available -No mention of the fact that all Android devices have a remote killswitch for content.. fun fact: it's a security feature to allow Google the ability to remote erase viruses that are posted to their "free" Market (This killswitch also exists on Apple iDevices, and can be turned off by hacking either one) -Speaking of their free market, they actively censor their store at the behest of their carrier partners so that, for example, the AT&T HTC Captivate cannot access software that would circumvent AT&T's draconian tethering plans -Also: they allow their partners to block whatever the hell they want, like the removal of content that the consumer does not want (like Bing search, included because of multi-million dollar contracts on some phones-yes, this really means you can't switch the phone's search to Google on a Google phone..) -This is clearly a fucking advertisement
Al Franken: ‘They're coming after the Internet’ - Mike Zapler - POLITICO.com
'I came here to warn you, the party may be over,' Franken said. 'They're coming after the Internet hoping to destroy the very thing that makes it such an important [medium] for independent artists and entrepreneurs: its openness and freedom.”"
Tuesday, March 29, 2011
Bazaar
...release early and often, delegate everything you can, be open to the point of promiscuity - came as a surprise. No quiet, reverent cathedral-building here - rather, the Linux community seemed to resemble a great babbling bazaar of differing agendas and approaches...
Should Pirate Parties Include The Coming Swarm Economy As Policy? - Falkvinge on Infopolicy
"One model for the swarm economy could be a basic unconditional income for every citizen. This would solve many problems, such as the Iron Law of Wages, and promote the industry-fundamental nonpaid work. It would not fundamentally change society’s economy model, as everybody is already guaranteed basic food, board and necessities through welfare systems, but making it unconditional would remove a whole lot of costly red tape."
Twitter Still Dominated By Noisy Minority, Study Finds
CULT OF THE DEAD COW: cyberpunk is dead
5 Reasons Why Android is Becoming the Go-To Mobile Device for Activists | Movements.org
1. More Possibilities with Open Source
Android is an open-source platform, meaning that the source code is accessible to anyone, allowing for developers to create apps that extend the functionality of devices. With closed platforms like Apple’s iPhone, on the other hand, the manufacturer and/or network have much more control over what users can do with their devices."
Monday, March 28, 2011
False Fear: Cyborgs Instead of CEOs | OurFuture.org
"The nightmare for far too many is Cyborgs. The public fears HAL, the 2001 Space Odyssey computer that killed astronauts rather than forfeit its objective.
So terrified of the sentient machine, citizens overlook the allegory. The soft-spoken, reasonable-sounding HAL behaves exactly like a greed-driven, multi-national corporation. The corporate mission is profit. With 29 workers massacred in a Massey mine explosion and 11 slain in the BP oil rig explosion in just one month last year, greedy corporations have shown they’re willing to kill rather than forfeit their profit objective."
Content farms: What do they say about what we care about? - By Annie Lowrey and Angela Tchou - Slate Magazine
...
"So what more do we know about the content farm from running through the database? It exists in the spaces that other sites neglect—answering the mundane questions we ask the Internet about our families, our friends, our bodies. It caters to our baser search instincts. What is the overall picture of us, painted by the content farm? We are, it seems, avid TV watchers who adore sports, pets, and our families, worry about our jobs, and suffer from hypochondria. But maybe none of us needed a content farm to tell us that. "
Thinking about movements.org
- who founded it?
- why?
- what are the goals of the site?
- what does the group support?
- what does the group oppose?
- who supports the group?
- does it seem like there is a lot of interactivity/participation on the site?
- what are some of the noteworthy design features?
Joe Bageant: Algorithms and Red Wine
Joe Bageant: Algorithms and Red Wine: "On the other hand, this whole business of the new hive cybernetic connectivity, could be just a swarm of data bits with no particular significance, in and of themselves, other than the magical thinking belief that they do. Which ain’t no small thing, given that what we agree upon as reality is achieved by social consensus. Hell, to some people Beelzebub still stalks the earth. To others, America is a free republic, not a company town. We all have our hallucinations.
One thing for sure. Most people in the (over)developed world think the connectivity and speed of the algorithms behind the cyberhive are worth it. Even teachers teach to a standardized test so students will conform to an algorithm, and if that ain’t hive mind, I don’t know what is."
Sunday, March 27, 2011
Diverting the Radicalization Track | Hoover Institution
...
"As a result of what new technology offers, the current generation of youth is the most individually empowered generation yet. They can act one way at home and in their communities and have a completely different identity over the internet or through their mobile phones. Because the digital and technological world offers young people opportunities to generate their own media and entertainment, they are learning critical thinking through self-exploration, and they are practicing digital democracy on a daily basis, even if they claim to despise the very concept of democracy. Without their keyboards, remotes, and telephones, they assume a real-life political, religious, ethnic, or nationalist identity. Behind the technology, many of these “digital natives” are beginning to identify with a transnational youth identity. Call it a “youth party” or simply a trend. But many of these youths seem to embrace platforms that facilitate interaction, expression, self-generated media, and expansion of social networks as defining features."
...
"The entrepreneurial spirit of the private sector (especially technology companies such as Google, Yahoo, and Facebook) and its desire to expand into new markets offers a tremendous opportunity in that the U.S. government need not start efforts from scratch, create new forums, or even seek to influence the direction of these independent business enterprises. Its ambition should be to partner with companies that capture the imagination and attention of impressionable young people by virtue of what they do for profit — profit which drives their creativity and success. Whether this is Facebook and the civil liberties, platforms, and global connectivity it provides; or Yahoo and its communication services; or Google and its expansive search engines, the private sector is offering alternatives that have global appeal and universal penetration. The U.S. government must work with these companies to expand the reach and scope of what they do.
For example, Howcast.com is an American focused company that serves as a one-stop shop for “how-to” videos. The U.S. government could use this website’s platforms to make inroads into at-risk environments by creating “how-to” videos on, say, using social networks for protest and mobile phones for freedom of expression, and for providing instructions on how to get around Internet censorship. The U.S. government has, in fact, already started working with Facebook to build worldwide, grassroots movements against violence."
Facebooking for Change
"We are in the midst of uncertain times, but I am hopeful about the future because young people are using Facebook for change in every corner of the globe. They are building civil society in places never before imaginable, standing up to violent extremism wherever it exists and for the first time, are really aware of their value as a demographic. As a government employee who focuses on youth empowerment and countering violent extremism, all I can say is a big fat thank you to Silicon Valley for creating the most important opening of our time.
Inspired by this phenomenon, Facebook, Access 360 Media, Columbia Law School, Google, Howcast, MTV, YouTube, and the U.S. Department of State are bringing leaders of 17 pioneering organizations from 15 countries together with technology experts next month for the first-ever conclave to empower youth against violence and oppression through the use of the latest online tools."
Saturday, March 26, 2011
How I became a soldier in the Georgia-Russia cyberwar. - By Evgeny Morozov - Slate Magazine
ThinkProgress � Koch Industries Employs PR Firm To Airbrush Wikipedia, Gets Banned For Unethical ‘Sock Puppets’
Thursday, March 24, 2011
March 24 Class
Wednesday, March 23, 2011
LocationS11: Heads up!! Change in syllabus!!
I've made a couple of changes in the syllabus for after spring break. Here are the changes. Please make sure that you note them on your syllabus and are prepared for the changes.
3/22 Marc Andrejevic, iSpy, chapters 1-2
3/24 Marc Andrejevic, iSpy, chapter 6-7
3/29 'Google's Revolution Factory' --Alliance of Youth Movements
http://www.globalresearch.ca/index.php?context=va&aid=23283
look through and analyze this website: http://www.movements.org/.
'Diverting the Radicalization Track'
Be sure to read the summit reports (links available at both sites).
What is this group? What does it do? How do you know? Are these good guys?
Why or why not?"
Mapping Election Fraud with an SMS Reporting System - Haiti Rewired
Mapping Election Fraud with an SMS Reporting System - Haiti Rewired: "Inside a dark, mildly air-conditioned room at the Jeune Ayiti Centre de Projets in downtown PetionVille, 12 people sporting “Obsevate” t-shirts sat around the table with their laptops and smartphones. It was March 20, Election Day in Haiti. A small TV off to the side played an England soccer game, but attention was mainly focused front and center to a projection screen displaying a Google Map of Haiti. The map was covered in green house icons with a few red flags scattered around the countryside, testaments to incidents of voting fraud or irregularities that polling station supervisors had reported via an SMS text message.
They were updating the Mwen Konte voting map, a Google map generated from a database of SMS text message reports of irregularities and fraud in the voting process. Cell phones are the communications backbone in Haiti, and they figured prominently in the little-noticed effort to provide transparency in the electoral process, which is typically riddled with fraud and corruption. Sunday's election was the second round of voting after the initial Nov election unraveled amid allegations of fraud. The two candidates that remain are Mirlande Manigat, a seasoned politician and former First Lady, and Michel Martelly, a charismatic show-boater who rose to fame from a career as a pop star."
Why Angry Birds is so successful and popular: a cognitive teardown of the user experience
Tuesday, March 15, 2011
Internet for Robots: It's Not Skynet, It's RoboEarth
Sunday, March 6, 2011
Ask About An Autonomous University: 5 Exam Questions For Life � OCCUPY EVERYTHING
An autonomous university might not have grades. Perhaps the faculty would be able to acknowledge that they learn as much as the students do. Perhaps the students would be able to be open and honest about what they get out of their experiences at the school. Like accreditation, grades serve to differentiate the labor force while rendering future workers servile. To add insult to injury, of all the onerous tasks current universities demand, those who do it complain about grading the most. We can think of more productive forms of feedback."
Impotent With Rage, Psychotic File-Sharers Bite The Hand That Feeds Them | TorrentFreak
Apple is Catholic ("The Holy War: Mac vs. DOS")
The fact is that the world is divided between users of the Macintosh computer and users of MS-DOS compatible computers. I am firmly of the opinion that the Macintosh is Catholic and that DOS is Protestant. Indeed, the Macintosh is counter-reformist and has been influenced by the ratio studiorum of the Jesuits. It is cheerful, friendly, conciliatory; it tells the faithful how they must proceed step by step to reach -- if not the kingdom of Heaven -- the moment in which their document is printed. It is catechistic: The essence of revelation is dealt with via simple formulae and sumptuous icons. Everyone has a right to salvation.
DOS is Protestant, or even Calvinistic. It allows free interpretation of scripture, demands difficult personal decisions, imposes a subtle hermeneutics upon the user, and takes for granted the idea that not all can achieve salvation. To make the system work you need to interpret the program yourself: Far away from the baroque community of revelers, the user is closed within the loneliness of his own inner torment.
You may object that, with the passage to Windows, the DOS universe has come to resemble more closely the counter-reformist tolerance of the Macintosh. It's true: Windows represents an Anglican-style schism, big ceremonies in the cathedral, but there is always the possibility of a return to DOS to change things in accordance with bizarre decisions: When it comes down to it, you can decide to ordain women and gays if you want to.
I cite: Search and store
"Nina links taxonomical drive with contemporary porn's endeavor to bore us all to death and turn sex into work. That is to say, her point is part of a larger argument about contemporary capitalism and its absorption of its outside. I agree. I also think it could be useful to think further with the notion of taxonomical drive. Who is the taxonomy for? The easy answer is that it is for the individual porn consumer: I download, classify, and tag photos and videos so that I can find them when I need them. The taxonomy is for me, in the future. I never know what I might desire, so I can plan for desire in the future. Clearly I don't desire now--if so, I wouldn't be archiving all this stuff, I would be enjoying it.
Differently put, taxonomical drive is a component of archival culture, a culture where we try to control our reality by selecting specific features of it, labeling, and storing these features. It is as if we so fear the changes in which we situated, the rapid flows and movements online, the appearance and disappearance of sites and features, that we try to construct a knowable space or path. Here, at least, we know what's what."
Saturday, March 5, 2011
Immiserating the Poor: We Have An App For That (Social Media vs. the iPhone in Egypt and a Kenyan slum) � Gurstein's Community Informatics
Immiserating the Poor: We Have An App For That (Social Media vs. the iPhone in Egypt and a Kenyan slum) � Gurstein's Community Informatics: "Allowing for a privatized and individualized approach to water provision simply means that those with the resources—to own and use cell phones, to devote time to chasing water suppliers and standing in water queues, and to financially compete for scarce water supplies in the local water marketplace–will be well served and those who don’t have those resources will be left behind and forgotten.
As well, by advantaging those who are the most able – the most technologically sophisticated, the wealthiest, the youngest and the most agile in the community—the possibility of developing community and collaborative strategies for addressing these fundamental issues will be drained away since those most able to respond effectively will have their needs met (and not incidentally as the description boasts, more efficiently and at a better price). If the actions of those immensely brave people demonstrating for democracy in Egypt and Tunisia, teaches us anything it is that major social issues such as the provision of clean and low cost water must be addressed by collective action rather than responding simply to individual actions which by their very nature in this context would be competitive, divisive and collectively disempowering."
Wednesday, March 2, 2011
Corporate-Funded Online 'Astroturfing' Is More Advanced and More Automated Than You Might Think | | AlterNet
"As the Daily Kos has reported, the emails show that:
- companies now use “persona management software”, which multiplies the efforts of the astroturfers working for them, creating the impression that there’s major support for what a corporation or government is trying to do.
- this software creates all the online furniture a real person would possess: a name, email accounts, web pages and social media. In other words, it automatically generates what look like authentic profiles, making it hard to tell the difference between a virtual robot and a real commentator.
- fake accounts can be kept updated by automatically re-posting or linking to content generated elsewhere, reinforcing the impression that the account holders are real and active.
- human astroturfers can then be assigned these “pre-aged” accounts to create a back story, suggesting that they’ve been busy linking and re-tweeting for months. No one would suspect that they came onto the scene for the first time a moment ago, for the sole purpose of attacking an article on climate science or arguing against new controls on salt in junk food."
Tuesday, March 1, 2011
Heads up!! Change in syllabus!!
"Diverting the Radicalization Track"
What is this group? What does it do? How do you know? Are these good guys?
Why or why not?
Google's Revolution Factory - Alliance of Youth Movements: Color Revolution 2.0
http://allyoumov.3cdn.net/f734ac45131b2bbcdb_w6m6idptn.pdf
One might suspect such a meeting of representatives involved in US economic, domestic and foreign policy, along with the shapers of public opinion in the mass media would be convening to talk about America's future and how to facilitate it. Joining these policy makers, was an army of 'grassroots' activists that would 'help' this facilitation.
Among them was a then little known group called 'April 6' from Egypt. These Facebook 'savvy' Egyptians would later meet US International Crisis Group trustee Mohamed ElBaradei at the Cairo airport in Februrary 2010 and spend the next year campaigning and protesting on his behalf in his bid to overthrow the government of Egyptian President Hosni Mubarak."
Celebrities and corporations
The basic debate among new media theorists has concerned the political, economic, and cultural impact of these practices. So, theorists have taken sides over whether these practices are democratic (or whether they have liberal or conservative tendencies), whether they enhance the economic prospects of most people (who can make money?), and whether the culture is more heterogeneous or homogeneous, stagnant or vital.
Hearing comments in our class, though, I'm starting to wonder if our (new media theorists) basic assumption is wrong (or, another way to put this, I'm starting to think that my diagnosis of capture in affective networks is so right that no one even cares anymore or can even imagine that digital networks would function in any other way). Why? Because the default mode of (your? mainstream culture's? students?) thinking is in terms of corporations, celebrities, and consumption (or so it starting to seem to me based on comments in class). People seem basically to identify with the needs and desires of celebrities for celebrity and corporations for profit and consumers for consumer goods. For example, it never would have occurred to me think of Twitter as first and foremost a vehicle for the distribution and contribution of nuggets of celebrity, even as I recognize that the business of mass culture uses Twitter (and other platforms) to good effect (and even though I just saw the really great Justin Bieber where he uses Twitter to generate and connect with fans).
So, on the one hand, it seems that you assume that new media are primarily celebrity, corporate, consumer access devices. But I think there is another hand, that is, I think that you also assume that there is something vaguely democratic and free (liberatory) about networked media. If you think this, then it makes sense to worry about the effects/impact of the first hand (celebrity, corporate, consumer). But if you only think of new media in terms of the first hand, then you have to figure out what opportunities there are for critique, change, freedom, politics, etc. Differently put, if you think about new media only in terms of the first hand, you'll have to grapple with the repercussions for subjectivity. One site/cite for this is the notion of "whatever being" that I develop in chapter 3.
Monday, February 28, 2011
Paper Topics--first paper due on March 11 at 5:00
Deadline: Papers are due on March 11 at 5:00. I do not accept late papers--no exceptions. You must submit a paper and electronic version. Paper versions are due in my office at 5:00 on March 11. Electronic versions must be sent to my email address: jdean@hws.edu. Again, you must submit both versions (submitting just one does not count and you will get a "0").
Format: Papers must be typed, double-spaced, with a title page, citations (recognized academic form), and page numbers. The paper version must be stapled in the upper left corner. Papers should be 7-9 pages long (6 is too short; 10 is too long).
Style: Papers must have a thesis, that is, a primary claim for which you argue on the basis of your reading of the texts assigned for the class. The thesis must appear in your first paragraph. So the assignment is to write an essay on one of the topics listed below. The essay should answer the question the topic poses. In answering the question, the essay should draw from (and cite) the relevant course materials. You are welcome to email me your thesis in advance to make sure you are on the right track. Note, though, I will be away March 7-11; because I will be in the UK (and hence 5 hours ahead), there could be up to a 24 hour delay in my response time. The repercussion--don't wait till the last minute to ask about your thesis.
Assessment: The criteria for assessment (not in rank order) are 1) the format requirements; 2) the cogency of the thesis; 3) the quality of the argument; 4) the quality of the writing; 5) the depth of engagement with the course readings; 4) the understanding of the readings demonstrated in the paper. I am looking for papers that take a position and present strong, well-supported arguments for it.
Questions (choose 1):
1. The first assignment for the class was coming up with an internet timeline. Drawing from Lovink, Terranova, and Dean, write an essay in which you identify a central dynamic, antagonism, or theme in the emergence of network culture. Be sure to specify something like periods, moments, or stages.
2. Lanier describes lords and peasants of the cloud. Does Terranova share his concern? How do they both compare with Anderson? Do networked communications really point to a new economy in which all products will be free? Why or why not? Write an essay in which you take a specific position on the economic effect/potential of networked computing.
3. Lanier and Dean both address the effects of networked computing on people/subjects. Are their concerns the same? Completely opposite? Is his concern with the hive, flatness, blankness, conformity, and crowds the same as her diagnosis of secondary orality, whatever being, or affective networks? Why or why not? Write an essay in which you take a specific position on the effect of networked computing on subjectivity/identity.
4. Compare and contrast Terranova and Dean's account of network politics. What are key points of overlap and divergence in their accounts? What are the repercussions of their discussions of the mass, image, and (for Dean) affective networks? Write an essay in which you take a specific position on the effect of networked computing on politics.
Mid-Term Exam
Deadline: Tuesday, March 8, at 5:00. Exams are due in paper and electronic format. Paper versions must be handed in to my office by 5:00 on March 8. Electronic versions must be emailed to me at jdean@hws.edu by 5:00 on March 8. Exams must be typed, double-spaced, with citations and page numbers. The paper version must be stapled in the top left corner. Both versions must be handed in by the deadline. I will not accept late exams.
You may use your books and consult with others in the class. As a preface or introduction to your exam, explain how you went about answering the questions. Did you work with others? With whom did you work? How did you organize yourselves? What was the process? Be as specific as possible. Failure to provide this account will result in a ten point penalty (that is, ten points deducted from your total exam points).
Note: As stated on the syllabus, there are group projects due on March 31, April 5, April 7 and later. You need to form yourselves into groups and choose one of the topics. You must designate which group you are in (by topic and date) on your mid-term exam. Failure to do will result in 10 point penalty (that is, ten points deducted from your total exam points).
Each question is worth 10 points.
1. Jaron Lanier argues against cybernetic totalism. What are the key features of cybernetic totalism? What arguments does Lanier offer against it?
2. What is "lock in" and why does it matter? Make sure that your answer includes technical and cultural/political components.
3. Why does Lanier think that flat information networks threaten creativity?
4. Why does free choice make stars inevitable? Be as thorough as possible.
5. Several authors (Lovink, Dean, Terranova) criticize the 'late eighties "Californian" mindset'. What is that mindset and why do they criticize it?
6. How does Terranova describe the "mass"? What makes the mass a feature of contemporary network culture? How does the concept of the mass inform or figure in Terranova's critique of the idea of a rational, deliberative public sphere?
7. Terranova emphasizes that a cultural politics of information, "as it lives through and addresses the centrality of information transmission, processing, and communication techniques" extends beyond the distinction between signal and noise. It encompasses a wide array of objects and interfaces, choices and designs, that organize our perceptions and influence the transmission and receipt of information/signals. What aspects of contemporary life come to mind? Come up with a vivid, detailed example to illustrate Terranova's point. Be sure to attend to what she calls the "level of distracted perception . . [that] informs habits and percepts and regulates the speed of a body by plugging it into a field of action." In your answer, begin with a schematic account formulated in terms of Shannon's diagram and then add to and enrich that schematic with more atmosphere and detail. After you have a detailed example in mind, consider the political implications and for whom: police, surveillance, or state apparatuses? for those seeking to resist or change a political formation? for the general field or norm that establishes the base point or expectations for political action (that is, the level of everyday habit and normal life)?
8. According to Terranova, some specific features of the architecture of the internet induce divergence and differentiation. What are these specific features? How are the challenges met? And, what features or qualities does addressing divergence and incompatibility give to the internet?
9. What is the decline of symbolic efficiency? Why does it matter?
10. What are the key features of blogs? What do they have in common with search engines?
11. What are the differences between the ways that cinema and networked media produce subjects?
12. How do affective networks capture users?
Saturday, February 26, 2011
Official Google Blog: Finding more high-quality sites in search
Official Google Blog: Finding more high-quality sites in search: "Many of the changes we make are so subtle that very few people notice them. But in the last day or so we launched a pretty big algorithmic improvement to our ranking—a change that noticeably impacts 11.8% of our queries—and we wanted to let people know what’s going on. This update is designed to reduce rankings for low-quality sites—sites which are low-value add for users, copy content from other websites or sites that are just not very useful. At the same time, it will provide better rankings for high-quality sites—sites with original content and information such as research, in-depth reports, thoughtful analysis and so on.
We can’t make a major improvement without affecting rankings for many sites. It has to be that some sites will go up and some will go down. Google depends on the high-quality content created by wonderful websites around the world, and we do have a responsibility to encourage a healthy web ecosystem. Therefore, it is important for high-quality sites to be rewarded, and that’s exactly what this change does."
Thursday, February 24, 2011
Terranova (concluding)
Explore via:
1. Information theory (signal noise)
2. Network dynamics (ex. open architecture allows for autonomy, localization, differentiation that can generate incompatibilities, technically and politically)
3. Free labor (digital economy; social factory--knowledge labor is inherently collective)
last two chapters:
4. soft control/biological computing
5. communication/mass and migrant
Martin Quigley Digital Networking: I Am Against Posting in the Facebook Group.
Wednesday, February 23, 2011
Tuesday, February 22, 2011
The Cost of Free (Labor): Terranova and Anderson
It might make sense to structure class through a debate between Terranova and Anderson, perhaps with groups coming up with points defending and criticizing their positions (from the perspective of each other, yet Lanier is also relevant here in that he talks about lords and peasants of the cloud and Terranova talks about netslaves--which suggests to me a likely paper topic for your papers that will be due on March 11; more on that later).
Monday, February 21, 2011
Reality is Broken: using games to improve the world - Boing Boing
McGonigal's Reality is Broken: using games to improve the world - Boing Boing: "Jane McGonigal is one of my favorite thinkers, and it's a delight to have her philosophy neatly distilled to a single book, her just-published debut Reality Is Broken. McGonigal is the leading practicioner in the use of games to motivate people to solve real problems with their lives and with the world.
McGonigal starts from the observation that games compel our attention in great sucking draughts, dropping us into flow-like states in which we compete against the machine and each other -- as well as collaborating -- with all the hours we can find. McGonigal takes us through mechanisms that make games so consuming: a series of tasks that increase in difficulty at a rate that keeps us fully engaged; failure modes that are fun and amusing; activities that feel epic in scale."
If anyone (or group) wants to do a presentation that uses this book and ties it directly to a or some games, let me know. We could eliminate one of the other presentation topics I've listed on the syllabus. Or you could do it for extra credit. Or you could do it instead of a paper. You'd need to let me know by the beginning of April so we can schedule a presentation time.
Can “Leaderless Revolutions” Stay Leaderless: Preferential Attachment, Iron Laws and Networks | technosociology
Can “Leaderless Revolutions” Stay Leaderless: Preferential Attachment, Iron Laws and Networks | technosociology: "In fact, if anything, it is quite likely that preferential-attachment processes are part of the reason for the rise of oligarchies and charismatic authorities. Ironically, this effect is likely exacerbated in peer-to-peer media where everything is accessible to everybody. Since it is just as easy to look at one person’s twitter feed as another’s, no matter where you are or where the other person is, it is easier to draw more from the total pool and further entrenching an advantage compared to the offline world where there are more barriers to exposure and attachment. Thus, networks which start out as diffuse can and likely will quickly evolve into hierarchies not in spite but because of their open and flat nature."
Sunday, February 20, 2011
Clive Thompson on How More Info Leads to Less Knowledge
After years of celebrating the information revolution, we need to focus on the countervailing force: The disinformation revolution. The ur-example of what Proctor calls an agnotological campaign is the funding of bogus studies by cigarette companies trying to link lung cancer to baldness, viruses—anything but their product."
Saturday, February 19, 2011
Colbert Launches 'The Colbuffington Re-Post' And Rips Hole In The Blog-Time Continuum
This included HuffPo's posting of multiple Colbert clips -- which infuritated Colbert, who wasn't getting his share of the 'huffbucks' for it.
So until he got paid, Colbert launched his own news aggregation site, the 'Colbuffington Re-post' -- which is just the Huffington Post with a new title on it. 'It's like a Russian nesting doll of intellectual theft,' said Colbert. Visit it online!
To make the whole thing ever more dimensional, yesterday the Huffington Post posted about the Colbuffington Re-Post, which was then reposted by the Colbuffington Re-Post. Trying to explain all the reposting and repackaging, Colbert said he was about to 'rip a hole in the blog-time continuum,' taking us to a 'bizarro-parrallel Huff-verse, where bloggers are paid for their work.'"
Observations from protests in Wisconsin
1) At this point the battle is being fought both in the square and in the media, and the two theaters go together. Control of the narrative must be kept from the right wing noise machine and that means telling the story from the square, with the authority of being here, of seeing and hearing how things are unfolding, of having the confidence that comes with lived experience to tell the dittoheads, very simply, that they are ignorant, clueless, and don’t know what the hell they are talking about.
2) The presence in the square has attained the scale of a movement. Very literally, there are too many pockets of action within the space and time of the square happening for any one person to know. Walking around today, within minutes I witnessed the noisy rally inside the rotunda, the incoming UW student march of 1000s along the State Street side, and the union rally in front of television cameras on the East Washington side. People in the thick of each cluster were oblivious to what was happening in other parts of the square. Not to mention, this was at around 12:30 pm. There had already been a large rally organized by the AFL-CIO at 10 am. Jesse Jackson will speak at 5 pm, and there will be evening rallies, as well.
3) It is the unity of the senate Republicans versus that of the Democrats. Who will divide and conquer first is the question. I’m sure Walker is scheming to buy off one of the Dems, promise that one senator everything in order to get him to sell out the rest, because one vote is all he needs to reach a quorum. On the other hand, there are Republicans spooked by the size and tenor of the demonstrations, and they know that Walker may have overreached to the detriment of their own careers. Targeted pressure will determine the fate of this bill.
4) The reaction is underway, though with how much strength is unknown. A Tea Party organized counter event is scheduled for Saturday noon. Word is spreading for progressive forces to show in overwhelming numbers. If the counter bodies are many—say 5000—there will be tension. If they are pathetically small—say 500 or less—then we must take full advantage and tell the story as proof of the inarguable majority strength of the progressives and the absolute corporate whoredom of the GOP. Provocateurs cannot be ruled out, and given the dirty tricks of the right ever since the ’08 election, probably ought to be expected. People attending need to know who they are with. A little paranoia in times of crisis is not such a bad thing.
5) The movement has a longer term concrete goal, that of recalling Scott Walker. Wisconsin’s recall process is not an easy one. The big challenge is the time limit. From the day the recall effort gets officially filed, we’ll have only 60 days to gather signatures in a number set as a proportion of the total votes in the last gubernatorial election. The current battle lays the groundwork for that effort better than anything else could have done. Many signs among demonstrators make reference to the option, and there are people coordinating already, in preparation for Walker’s first year anniversary, at which time the campaign can begin.
6) The creativity and humor has been impressive. Demonstrators are entertaining each other, showing each other their inventiveness, and making the square the place to be. That alone makes this a resistance of a different, more promising kind.
Thursday, February 17, 2011
Questions from today (slightly altered)
2. (Andrew posted the second question here.)
3. Terranova emphasizes that the open architecture of the internet comes up against divergence and incompatibility. How are these challenges met? And, what features or qualities does addressing divergence and incompatibility give to the internet?
4. How does internet culture (turbulence, open architecture) produce problems for collective organization and groups? What specific sort of dynamics are involved in these problems?
Post-wikileaks (remediated from nettime mailing list)
The exploits of Anonymous to hack the systems of firms providing spying services to governments and corporations suggest that the WikiLeaks mini-era has been surpassed.
Much of WikiLeaks promise to protect sources is useless if the sources are not whistleblowers needing a forum for publication. Instead publishers of secret information grab it directly for posting to Torrent for anybody to access without mediation and mark-up by self-esteemed peddlers of protection, interpretationa and authentication, including media cum scholars.
Arstechnica descriptions of the how the Anonymous hack are the best reading of Internet derring-do yet and far exceeds the much simpler version of WikiLeaks carefully bruited as if precious but is not according to Daniel Domscheit-Berg's revelations.
AnonLeaks.ru is a remarkable advance of WikiLeaks. And promises much more by the same means and methods most associated with official spies -- NSA and CIA run the Special Collections Service to do exactly that kind of criminal aggression, along with black bag burglaries, surveillance and bugging. Contractors hiring ex-spies do much of this highly classified work as well and invent and supply the gadgets and front organizations required.
Not least of importance of the Anonymous hack and the many preceding it is the revelation of how commercial firms have been exploiting public ignorance of their spying capacity. That they are themselves vulnerable is a surprise to them, as it must be to those who hire them and, in the case of governments, provide legal cover for criminal actions.
This is not news, to be sure, for it has been alleged and reported on for decades but mostly in technical journals and conferences where offerers strut their malwares to buyers of perfidium. Imagine that instead of the many iterations of Wikileaks now appearing to receive and publish documents, that more of the Anonymous-type hacks simply steal the family jewels of the spies, officials, lobbyists and corporations believing they own the territory in order to show the extent of their secret predations on the public.
The digitization of vast archives of government, commercial and non-governmental organizations to facilitate their hegemony provides a bounty to be hacked repeatedly despite attempts to prevent it by vainly inept cybersecurity agencies and firms.
The cyber officials yell, hit the Internet Switch. Too late, too late. Anonymous controls the switch. Sure, Anonymous can be compromised with sufficient hostile and friendly inducements, but so can the predators, perhaps moreso the latter.
I like that venerable Anonymous and the promise it offers as the Nymous authoritatives of secrecy frantically attempt to ban its privilege.
For the WL era dutifully enshrine Julian Assange and Bradley Manning, give them Medals of Freedom as icons of what led to the rise of Unnamables worldwide.
I commend Ketih for that unbreakable domain name.
# distributed via <nettime>: no commercial use without permission
# <nettime> is a moderated mailing list for net criticism,
# collaborative text filtering and cultural politics of the nets
# more info: http://mail.kein.org/mailman/listinfo/nettime-l
# archive: http://www.nettime.org contact: nettime@kein.org