Nicolas Mendoza – P2P Foundation https://blog.p2pfoundation.net Researching, documenting and promoting peer to peer practices Fri, 24 Oct 2014 12:44:58 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.15 62076519 Update: User Satoshi Nakamoto’s post in P2P Foundation’s Ning network https://blog.p2pfoundation.net/update-user-satoshi-nakamotos-post-in-p2p-foundations-ning-network/2014/03/11 https://blog.p2pfoundation.net/update-user-satoshi-nakamotos-post-in-p2p-foundations-ning-network/2014/03/11#comments Tue, 11 Mar 2014 12:56:28 +0000 http://blog.p2pfoundation.net/?p=37559 Last Friday the account under the name of Satoshi Nakamoto was used to post a five-word message to our social network for P2P researchers, hosted by NING (Glam Media). We immediately proceeded to contact NING, with the purpose of gathering more information about the Nakamoto post, information that could potentially be useful in determining whether... Continue reading

The post Update: User Satoshi Nakamoto’s post in P2P Foundation’s Ning network appeared first on P2P Foundation.

]]>
Last Friday the account under the name of Satoshi Nakamoto was used to post a five-word message to our social network for P2P researchers, hosted by NING (Glam Media).

We immediately proceeded to contact NING, with the purpose of gathering more information about the Nakamoto post, information that could potentially be useful in determining whether the message was legitimate or apocryphal.

We understand that disclosing private information provided by users is absolutely unacceptable. In fact, non of our questions to NING involved private information of the users. However, we do not consider that the notion of ‘private information’ includes the privacy of a hacker who is breaking illegitimately into a system, and through this very act violating the privacy of a legitimate user.

As creators of the P2P Foundation’s community site, we believe that asking to the NING operators whether the password of a user account had been recently tampered with, or whether there were any signs that could lead to think that a user’s account might or migh not have been compromised, in no way violates the privacy of the user.

Moreover, we consider that members of the community in general should be right to expect at least a minimum of investigation from us in cases where extraordinary behaviour takes place. Users should be able to rely on the expectation that they are probably communicating with who the site says they are communicating.

In sum, the least we can do for our users is to inquire about whether the integrity of the platform might have been compromised, or not, in extraordinary cases, like the one that presented itself last Friday.

That is what we did.

After a weekend-long wait, this is the reply we received from NING:

“We aren’t able provide any information (“personal” or otherwise) about this or other accounts on the Ning Platform without a subpoena, warrant, court order or other legal process. Thanks for understanding—I’m sorry we can’t be of more help here.”

What this means is that this probably the most anti-climatic of all possible updates to this story. In short: we know nothing new.

In their message, NING thanks us “for understanding”. They shouldn’t; we don’t understand.

P.S. Message to the r/bitcoin community: Apologies for promising this update in ‘a few hours’, when it actually took a few days. We assumed that we would receive the information from NING way faster than we actually did. My bad, I shouldn’t have given ourselves a time frame (‘a few hours’) so short, when the final outcome was beyond our control.

 
Now that the update is here I hope is that everyone who was waiting for this update feels like this:

…although I wouldn’t bet on it.

The post Update: User Satoshi Nakamoto’s post in P2P Foundation’s Ning network appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/update-user-satoshi-nakamotos-post-in-p2p-foundations-ning-network/2014/03/11/feed 1 37559
CALL FOR PAPERS – Special Issue of the Journal of Peer Production: Value and Currency in Peer Production https://blog.p2pfoundation.net/call-for-papers-special-issue-of-the-journal-of-peer-production-value-and-currency-in-peer-production/2012/12/10 https://blog.p2pfoundation.net/call-for-papers-special-issue-of-the-journal-of-peer-production-value-and-currency-in-peer-production/2012/12/10#respond Mon, 10 Dec 2012 16:07:03 +0000 http://blog.p2pfoundation.net/?p=28329 Call for Papers Special issue of the The Journal of Peer Production: Value and Currency in Peer Production Edited by: Nathaniel Tkacz, Nicolás Mendoza and Francesca Musiani. The marriage of cryptography and the dynamics of open-source have now produced a working distributed currency system. Bitcoin, as the most notable example, can be understood as a... Continue reading

The post CALL FOR PAPERS – Special Issue of the Journal of Peer Production: Value and Currency in Peer Production appeared first on P2P Foundation.

]]>
Call for Papers

Special issue of the The Journal of Peer Production:

Value and Currency in Peer Production

Edited by: Nathaniel Tkacz, Nicolás Mendoza and Francesca Musiani.

The marriage of cryptography and the dynamics of open-source have now produced a working distributed currency system. Bitcoin, as the most notable example, can be understood as a new technics of exchange inspired by the animal spirits of crypto-libertarianism. Whether or not there is a place for currency — and therefore exchange and (economic) value — in the utopian visions of commons-oriented thought is contested. Meanwhile, hybrid forms like Bitcoin are developing unhindered by their constitutional paradoxes. Capitalism, after all, equally thrives atop what David Graeber has called a ‘baseline’ or ‘everyday’ communism. Current developments of digital currencies are pervaded by a number of issues: Who or what issues the money? What is the source of the collective agreement to concede value? What forms of control are coded into currency systems and who is guiding processes of (re)design? Who plays the role of guarantor when a currency is decentralized? And what role does trust play in all these issues? Has crypto-mathematics transformed trust into a technical quality of a system?

The flipside of this issue is value: The intensification and extension of computational procedures, which is manifested most clearly in the rise of big data, has lead to a proliferation of bottom-up procedures to formalise ‘values’, rendering them easily calculable and lending order to the decentralised world of peers. Wikipedia contributors, for example, have long awarded each other ‘barnstars’ for valued service in a range of areas, and the site has long explored ways of rating article quality. In place of managerial commands and bureaucratic hierarchies we have Karma points, ranking systems, reputation metrics and the long-tail logic of networks. Order in this sense is iterative, recursive and topological.

This issue of The Journal of Peer Production invites contributions on the themes of value and currency as they relate to peer production.

Topics might include but are not limited to:

  • Decentralised and crypto-currencies;
  • Non-coercive taxation systems and/or experiments/experiences;
  • Analog/pre-digital (or historical) networks for distributed value exchange;
  • Currency and design;
  • Currencies and the commons;
  • Life after fiat (the becoming-uncertain of taxes);
  • What does/should peer production value?;
  • Re-thinking the constitution of value;
  • Theories of non-monetary value and worth;
  • The relationship between valuing practices and project hierarchies;
  • Forms of belief in peer production;
  • Automated systems of ranking and distributing value;
  • Theories of exchange, gift and voluntarism;
  • Trust and anonymity in the building of value;
  • Intermediation and ‘guarantees’ in P2P exchanges.

Submission proposals of under 500 words due by January 28, 2013. Full submission details and extended CFP available at http://peerproduction.net/value-and-currency-in-peer-production/.

The post CALL FOR PAPERS – Special Issue of the Journal of Peer Production: Value and Currency in Peer Production appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/call-for-papers-special-issue-of-the-journal-of-peer-production-value-and-currency-in-peer-production/2012/12/10/feed 0 28329
Walter Mignolo: Coloniality: The past and present of global unjustice https://blog.p2pfoundation.net/walter-mignolo-coloniality-the-past-and-present-of-global-unjustice/2012/12/02 https://blog.p2pfoundation.net/walter-mignolo-coloniality-the-past-and-present-of-global-unjustice/2012/12/02#respond Sun, 02 Dec 2012 06:46:54 +0000 http://blog.p2pfoundation.net/?p=28121 Walter Mignolo, discusses essential issues of polycentrism and collaboration in post-coloniality: (excerpt) “”Hegemony, in a polycentric world, would require of pluriversality to a universal principle–an apparent contradiction that deserves careful attention. If the principle of pluri-versality is uni-versaly (that is, globally) assumed, then dialogues and alliances of civilizations—instead of competitions between imperial nation-states and dependency... Continue reading

The post Walter Mignolo: Coloniality: The past and present of global unjustice appeared first on P2P Foundation.

]]>
Walter Mignolo, discusses essential issues of polycentrism and collaboration in post-coloniality:

(excerpt)

“”Hegemony, in a polycentric world, would require of pluriversality to a universal principle–an apparent contradiction that deserves careful attention. If the principle of pluri-versality is uni-versaly (that is, globally) assumed, then dialogues and alliances of civilizations—instead of competitions between imperial nation-states and dependency of small nation-states—would be “natural” to cooperate instead of competing in international relations. The goals, in a polycentric and pluri-versal world order would be to administer scarcity rather than promote development and to promote harmony instead of competing for natural resources and growth; the philosophy guiding such global plan would be cooperation rather than competition, harmony instead of war. Progressive historians are instrumental in illuminating what has been obscured by conservative and imperial histories. But History is extremely limited in relation to the richness of the world and the communities for whom Memories is not an academic discipline but a way of being in the world, of building, maintaining and transmitting identity and consolidating identities that imperial histories taught them to despise. Oral traditions and transmissions, art and literature and communal way of living are sites of living Memories that cannot be controlled by the discipline of History. Memories, as I said, exceed History. Memories have been silenced by hegemony Histories. To decolonize History means to liberate Memories an to correct epistemic un-justices. [3]”

Full article here:

http://waltermignolo.com/2012/11/21/coloniality-the-past-and-present-of-global-unjustice/

The post Walter Mignolo: Coloniality: The past and present of global unjustice appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/walter-mignolo-coloniality-the-past-and-present-of-global-unjustice/2012/12/02/feed 0 28121
Monitoring Bitcoin: WIKISPEED + Bitcoin, buying a peer-produced car with a p2p currency https://blog.p2pfoundation.net/monitoring-bitcoin-wikispeed-bitcoin-buying-a-peer-produced-car-with-a-p2p-currency/2012/08/01 https://blog.p2pfoundation.net/monitoring-bitcoin-wikispeed-bitcoin-buying-a-peer-produced-car-with-a-p2p-currency/2012/08/01#comments Wed, 01 Aug 2012 05:09:38 +0000 http://blog.p2pfoundation.net/?p=25478 Another P2P milestone: it is now possible to order a peer-produced car, or carparts, with a peer-produced currency! WIKISPEED is a project that has been highlighted in several occasions by the P2P Foundation for the powerful way in which it embodies the theory of Peer Production. That fact that there is a company developing more... Continue reading

The post Monitoring Bitcoin: WIKISPEED + Bitcoin, buying a peer-produced car with a p2p currency appeared first on P2P Foundation.

]]>
Another P2P milestone: it is now possible to order a peer-produced car, or carparts, with a peer-produced currency!

WIKISPEED is a project that has been highlighted in several occasions by the P2P Foundation for the powerful way in which it embodies the theory of Peer Production. That fact that there is a company developing more ecological cars using distributed collaborative practices confirms that Peer Production is real, and that it can go beyond immaterial, non-rival, goods like software or music.

WIKISPEED’s recent announcement  about their move to enable Bitcoin payments (read the press release), should send a strong signal about the potential for convergence within the P2P universe. As the P2P world grows in depth and scope, increasingly complex feats will be possible without the need to rely on the conventional structures.

Transportation and currency are two key social functions that were not long ago P2P-unthinkable. Money and cars, we thought (or, rather, we were told), could only be handled by large hierarchical organisations.  Now it is possible to produce cars and currency through P2P arrangements that mix social and computer protocols. At the P2P foundation we see this as a major milestone in the road to a P2P world.

Note: Joe Justice, founder of WIKISPEED will be answering Bitcoin-related questions (mainly) on Wednesday August 1 at 9am Pacific time (Seattle) on Reddit.com. To participate in this real-time distributed interview go to www.reddit.com/r/bitcoin around the time indicated above.

Disclaimer: Nicolás Mendoza, author of this post and researcher at the P2P Foundation, is also in charge of managing Bitcoin adoption for WIKISPEED. He is also the author of the WIKISPEED + Bitcoin press release. His involvement in both WIKISPEED and Bitcoin is on a non-paid voluntary basis.

 

PRESS RELEASE:

WIKISPEED, first car-maker in the world to accept Bitcoin

WIKISPEED is excited to announce that starting today, it is possible to purchase WIKISPEED cars and car parts or to support our projects with Bitcoin. We believe the decentralised, open and internet-native nature of Bitcoin resonates deeply with the essence of the WIKISPEED project.
Our name, WIKISPEED, not only reflects the network origin of our project but more importantly, how the network itself is the core of our methodology. Like a Wikipedia article, our cars are designed and built by teams of collaborative volunteer teams distributed around the world. Similarly, our design and knowledge is open and available for anyone to use and improve. The ‘Wiki’ approach to physical manufacturing allows WIKISPEED teams to perform complex tasks in a fraction of the time and at a fraction of the cost of industry norms.
The networked and open nature of the Bitcoin monetary system allows its users to perform transactions at substantially cheaper cost and at substantially faster speed, worldwide. WIKISPEED and Bitcoin have in common that they enable freely-assembled teams and individuals to perform activities that previously required bureaucracies, companies, or even nations.
For the first time in history, it is now possible to purchase a car manufactured by a distributed, collaborative corporation using currency issued by no bank. We see this as a landmark in the maturation of the web: a step forward in the convergence of activities driven by networking logics in all fields of human life. This convergence of network culture, network manufacturing and network economics holds the promise to fundamentally change the world, bringing back power to the people. A world where an open source car can be purchased with open source money is already a new world with new and exciting potential.
Bitcoin can now be used to purchase the limited edition WIKISPEED SGT01, a replica of our X-Prize winning prototype for $25.000 USD. A comfortable commuter car, the WIKISPEED C3, is in development and will be Bitcoin-compatible at launch. We aim to deliver the C3 as a complete car for $17,995 USD and as a kit for $10,000 USD. All WIKISPEED cars are ultra-efficient, modular, safety-tested, and deliver 100mpg or more. He have also opened an online store where WIKISPEED car parts are available at http://wikispeed.com/Store. Because Bitcoin transfer fees are dramatically lower than those of conventional systems, we are offering a 3% discount in all our prices when payed in Bitcoin.
Funding for the development of the WIKISPEED C3 commuter car is currently being conducted through a crowdfunding campaing at Indiegogo.com. The costs the C3 development include crash test fees, fuel-efficiency testing, materials for prototyping and testing, expert reviews and fabrication, and additional tools. While the Indiegogo platform does not support Bitcoin contributions, these can be sent to the following Bitcoin address: 12JiynsQcfNLbeWnM7cdnYGo3axPXDcwCV
Support WIKISPEED and make the future of automotive transportation happen right now.
WIKISPEED, a Seattle, WA–based automotive-prototyping and manufacturing startup, is a registered automotive manufacturer able to sell complete vehicles in the United States and kit-built vehicles all over the world. WIKISPEED currently has collaborative operations in fifteen countries worldwide.

Our Bitcoin address for donations is 12JiynsQcfNLbeWnM7cdnYGo3axPXDcwCV

We are in the process of implementing an automated shopping cart solution. However, customers who wish to purchase from us using Bitcoin can contact us at [email protected] for detailed instructions.
Press Photos: http://www.wikispeed.com/press, http://www.jigsawrenaissance.org/.
Media Contact: WIKISPEED: [email protected], 425-312-3996
Jigsaw Renaissance: [email protected], 206-659-5260

The post Monitoring Bitcoin: WIKISPEED + Bitcoin, buying a peer-produced car with a p2p currency appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/monitoring-bitcoin-wikispeed-bitcoin-buying-a-peer-produced-car-with-a-p2p-currency/2012/08/01/feed 1 25478
Monitoring Bitcoin: Two significant hardware developments are announced. https://blog.p2pfoundation.net/monitoring-bitcoin-two-significant-hardware-developments-are-announced/2012/06/26 https://blog.p2pfoundation.net/monitoring-bitcoin-two-significant-hardware-developments-are-announced/2012/06/26#respond Tue, 26 Jun 2012 18:15:55 +0000 http://blog.p2pfoundation.net/?p=24716 In a clear example of how code and hardware exist in a relationship that can be understood as a feedback loop, two Bitcoin-specific hardware products have been announced in the past days. The Bitcoin protocol has given birth now to a new kind of chip, especifically designed to maximise the speed of Bitcoin cryptographic calculations... Continue reading

The post Monitoring Bitcoin: Two significant hardware developments are announced. appeared first on P2P Foundation.

]]>
In a clear example of how code and hardware exist in a relationship that can be understood as a feedback loop, two Bitcoin-specific hardware products have been announced in the past days.

The Bitcoin protocol has given birth now to a new kind of chip, especifically designed to maximise the speed of Bitcoin cryptographic calculations while minimising electricity consumption. The first generation of Bitcoin ASIC (application-specific integrated circuit) mining hardware has been announced by a company called Butterfly Labs. The processing power of ASIC hardware is an order of magnitude beyond the hardware currently used by miners, so it’s inception later this year promises to completely transform the field. The economic implications are uncertain, beyond the confirmation of a trend towards the profesionalisation, and the further rising barrier of entry to Bitcoin Mining.

The complexity of the development of Bitcoin ASIC processors should not be overlooked. The development of a new category in computer hardware is a very significant development in itself, a sign of the underestimated vitality inherent in the Bitcoin protocol.

At the other end of the Bitcoin life-chain (the end user) hardware consistent with the protocol is solidifying too. The Bitcoin Card is the first physical, off-line, Bitcoin wallet. The device promises a huge step forward in simple everyday usability for Bitcoin. The solar-powered Bitcoin Card has the size and thickness of a credit card, and yet it offers the user the ability to anonymously perform Bitcoin transactions with other nearby users or points of sale “via an ad-hoc mesh network that doesn’t require internet”.

Form the article:

  • Next, YES, the device is real. We saw it, touched it, and used it. There were several iterations of the device on sight, which used slightly different materials (from several rounds of production). However, what we saw/touched/used were prototypes which are not as thin or attractive as the production version promises to be. Given some of the component technology showed to us, I have no doubt that the production version will be slick as hell.
  • The system’s infrastructure requires two components. One component is the card (which normal people will have) and the other component is a USB dongle (which some merchants and/or users will have). The cards communicate with each other via an ad-hoc mesh network that doesn’t require internet. To communicate transactions to the internet, the dongle picks up this information from nearby cards and relays it to the web. A town of 10,000 people could all use the cards within their community, but for interaction with the outside world, there needs to be at least one dongle in there somewhere plugged into a computer.
  • The device is the size of a credit card (and the production version will be the thickness of a credit card, amazingly). It will be able to fit in your wallet.
  • The device has zero ports on it. No power charger, no USB, no proprietary connection, etc.
  • The mesh-network range of the device is 200-300 meters in open air, less if there are walls or other interferences.
  • All power comes from the solar panel back of the card and this is fully adequate to power the device with near-continuous usage. You do not need to leave it in the sun for 4 hours before using it. The card picks up enough energy from daily use that it can be used without ever spending time to charge it.
  • It was also discussed that the production version of the card would alternatively obtain power whenever the user presses the buttons, or when the user bends the card back and forth slightly. Alex conveyed there is a 60% chance that the production version will not have the solar panel at all, but will instead draw power from these other methods exclusively.
  • Some people on the forums have (probably correctly) said that the alleged features of this card are impossible using any existing technology. This is because Megion’s technology is not available on the market. Again, Megion’s engineers developed many of the components in-house. What is in this card is better technology than what is available in the marketplace.
  • Megion has several projects, and The Bitcoin Card is only one of them. We were not given any details of their other projects but I do not believe they are Bitcoin related. These several projects help explain how they have cost-effectively produced the technology in The Bitcoin Card (the R&D is likely spread across their projects).
  • The devices hold private keys on them. These can be backed up via the company’s website, but it is not necessary to ever interface with the company in order to use the device. In other words, someone can use the device anonymously and without creating any accounts anywhere.
  • If you lose the card and have not backed up the keys, your money is gone.
  • In order to pay someone with the card, you press the “Pay” button and a small list of nearby devices appears. Each device has a unique alias/name. You scroll down to the device you wish to pay, select it, enter the amount to pay, and submit. Thus, you do not need to enter any ugly BTC addresses in daily use.
  • If you wish to pay out to a normal BTC address, you will be able to enter it on the card (but obviously this is tedious). It is likely that the solution will be a linked ewallet-type account paired to your device. If you wish to send to a normal BTC address, you’d use the ewallet via the web on a computer or mobile phone.
  • Merchants who wish to accept payments from the cards should have the USB dongle which allows updated pricing from the web and will check payments for validity.
  • An overarching design principle of the devices is to eliminate the requirement of trust in any single party, even in the manufacturer. Details of how this is accomplished are not fully fleshed out yet, but include ideas like having the devices only create their key pair after they are in the consumer’s hands (so not even the manufacturer would know it).
  • The device will, over time, integrate with various Bitcoin systems to make funding convenient. For example, BitInstant will be integrated so that you can send funds to your card from BitInstant’s website via the various funding methods available there (Russian cash deposits to secret Russian Bitcoin smart card FTW).
  • The device is planned to go into production around January 2013. Megion is considering various options for the funding and distribution of these cards. This might include arrangements like BitInstant paying for 5,000 cards and getting them at a discount, and from there can brand them and sell them to customers.

 

The post Monitoring Bitcoin: Two significant hardware developments are announced. appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/monitoring-bitcoin-two-significant-hardware-developments-are-announced/2012/06/26/feed 0 24716
Life in a Network for Survivors (Part 4) https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-4/2012/06/07 https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-4/2012/06/07#respond Thu, 07 Jun 2012 10:08:36 +0000 http://blog.p2pfoundation.net/?p=24166 Life in a Network for Survivors: The Thermonuclear Apocalypse and the Protocols of Freedom   A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza, presented this week in four daily parts. The final version of... Continue reading

The post Life in a Network for Survivors (Part 4) appeared first on P2P Foundation.

]]>
Life in a Network for Survivors:

The Thermonuclear Apocalypse and the Protocols of Freedom

 

A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza, presented this week in four daily parts. The final version of this essay will be published later in 2012 by the EnterText journal, Brunel University – West London UK.

Complete series: Part 1Part 2Part 3Part 4

Part 4

 

The Next Aftermath

In 2011 something unprecedented happened. What I have called above the global machinic life-form, meaning the global assemblage composed of networked hardware, code, humans, and the environment, started exercising meaningful political agency in national and global scales.

For the first time a government was helpless against a leaderless and yet coordinated multitude, conceding defeat. When the Egyptian government turned off the Internet, the Internet refused to be turned off: an effort to sustain access to communication was rapidly coordinated from around the world. Google provided a service that allowed people to get information out of the country by converting voice messages into Twitter messages[1], Anonymous devised a workaround that enabled free long distance dial-up access, mass-faxing set-up instructions to Cairo[2], and people in the streets adapted the messages previously distributed through Facebook and email to leaflets for street distribution[3]. It is significant how all these actions had a common objective: to restore not ‘Internet access’ but something deeper: the flow, the machinic assemblage itself, regardless of whether the mediums were now telephone, fax or paper. This kind of system challenging, spontaneous, multilateral and yet uncoordinated movement was suddenly appearing all over the world, all one and the same phenomenon. 2011 was what Deleuze called a ‘machinic phylum’. Manuel DeLanda defines the ‘machinic phylum’ as “all processes in which a group of previously disconnected elements suddenly reaches a critical point at which they begin to “cooperate” to form a higher level entity.”[4] The Net reached such critical point in 2011 -a stage of maturity after which there is no going back.

This seems strange as the Net is now more restrictive and protocologically controlled (and here I do mean in the sense of controls from above) than ever. In the face of unprecedented censorship, surveillance and control, and even after physically disconnecting the web (it doesn’t get more counterprotocological than that), the assemblage continued to operate until revolution succeeded in Egypt. Machinic life is not made only of metal machines and their code. Its life is in the “acquisition, use, retention, and transmission of information”, and when a new level of intensity in these processes started to occur in ‘the flesh’, it led to qualitative transformations of the information. Messages of apathy and cynicism transformed into revolutionary messages, which, as they proliferated in the voices of friends, and neighbours, and co-workers, the voices of pop stars and scholars alike, led to resolve and coordination and tighter interconnection and entanglement.In the words of an Anonymous insider:

“Q: Anonymous started out as online pranksters but has gotten a whole lot more serious in the last two years. What happened?” 

A: I believe Egypt was really a turning point for us emotionally in Anonymous. Obviously there was always that sort of prankster edge to us. But people often ask me, “Why are you so mean nowadays?” It started in Egypt – when you work for days to set up live video feeds and the first thing you watch through those feeds is people killing your friends with machine guns – that becomes personal. And then it’s not just Egypt, it’s Libya, Tunisia, over and over again these Freedom Ops are really what gave us a sort of take-no prisoners attitude. We get to know these people. It may not be the same as you and I sitting here, but when you Skype with people and spend hours and hours talking with them on IRC (Internet Relay Chat) and they share their hopes and their dreams with you for their country, their future, when they tell you how they’re risking their lives so their children can have a better future in some far-off land, you bond with those people and they become your friends and family.” [5]

This transformation is pure feedback life. The newfound ability to directly observe the other inevitably changes the trajectory of the observer, a change that then changes the path of the observed, who is observing the observer. Anons helped keep information flowing in Egypt, yes, but their involvement transformed them as much as it transformed Egypt.

The chance to debate is now opened to everyone who can communicate on the internet. Which is not everyone, but it’s a sizeable chunk of people. More importantly, the people now actually have some power. People who have absolutely no power cannot do anything politically, they cannot have an effect.

We can look at the House of Commons, or Congress, and look at the debates that occur there, and say: ‘That’s the seat for political debate.’ But now, the seat for political debate is also on the internet.

I recall seeing this phenomenon three or four years ago when I saw a completely technical discussion on the internet suddenly turn to a political matter. A taboo was broken at that point: the taboo that technical discussions couldn’t step over into the political and that the proper place for political discussions wasn’t on the internet, but in the mainstream press. Only once something appeared in the mainstream press did it truly have political importance.

But those ground rules were broken and those technical individuals started to lose their political apathy. I believe that people are apathetic because they are powerless, not powerless because they are apathetic. So this new way of communicating was actually giving them power, and they then started to consider political matters.

They’re being educated, as a result of the internet, about how the world really works in terms of economic flows and political flows and hypocrisy, and they are also being given a power to express their opinions to a potentially very large audience, billions of people.

People outside the media and political sectors never used to have this, but now we all have it, and that’s such an empowering understanding.

So people are losing their political apathy, not just because they’re being educated and radicalized by examples like Wikileaks’ battle with the Pentagon or the Arab Spring, but because they actually have a power that they didn’t have before. And they’re starting to understand that.[6]

 A feedback loop: a global feedback loop that after just a few months led to the birth of a previously unthinkable Occupy Wall Street Movement. A large scale decision to change course, it seems, is being made without the need of a UN assembly. The new course and the means to achieve the change it supposes are being discussed and mobilised. As new connections and a sense of interdependence emerges, autonomous structures of increasing complexity appear, supported on more simple ones. Such is the machinic phylum: a radically diverse self aware protocological wilderness that transcends the separation between human and nonhuman, repairs itself when violence is inflicted on either realm, and craves for release from the stench of old rotting power.

David Graeber’s 2004 diagnosis grows accurate as history reignites:

It is becoming increasingly clear that the age of revolutions is not over. It’s becoming equally clear that the global revolutionary movement in the twenty first century, will be one that traces its origins less to the tradition of Marxism, or even of socialism narrowly defined, but of anarchism.

Everywhere from Eastern Europe to Argentina, from Seattle to Bombay, anarchist ideas and principles are generating new radical dreams and visions. … everywhere one finds the same core principles: decentralization, voluntary association, mutual aid, the network model, … anarchism, as an ethics of practice -the idea of building a new society “within the shell of the old”- has become the basic inspiration of the “movement of movements” (of which the authors are a part), which has from the start been less about seizing state power than about exposing, de-legitimizing and dismantling mechanisms of rule while winning ever-larger spaces of autonomy and participatory management within it.[7]

Imaginary apocalypse was made bearable by achieving survival in an unliveable world through disembodiment: the annihilation of the territory required the creation of cyberspace for the disembodied to gather. Modernity, with its territorial rigidities and its hegemonic structures continued to exist because the apocalypse never came. Like survivors finally coming out to the surface after discussing it in their nuclear shelters for decades, large numbers of people started gathering in real spaces in 2011, occupying them to contest the late-modern social order consisting in a world divided between ‘decision makers’ and consumers. A speculation of how the transformations might unfold can help spark debates, imaginations, and further action:

First, corporations will be substituted by autonomous networks of peer-to-peer production, as conceptualised by Michel Bauwens[8]. The first half of this process is already complete as corporations themselves have gradually de-materialised over the last decades into outsourcing-management networks for shareholder profit[9]: there is nothing TNC’s do that can’t be done by coordinated swarms, except perhaps influence military strategy.

Second, different flavours of direct democracy will take over increasingly large aspects of life, in an uneven but ever advancing process of autopoiesis, relentlessly eroding institutionalism, towards social arrangements like those envisioned by contemporary anarchist thinkers like David Graeber.

Third, as the qualities of peer to peer exchanges mature, national currencies will become irrelevant. We are already seeing this through phenomena of peer-to-peer collaborative, post customer consumption like Couchsurfing, and the emergence of a credible decentralised currency like Bitcoin and its incipient services ecology[10]. However, the endgame and more powerful project in this area is to redefine value, and therefore exchange systems, in terms that acknowledge the subtle and complex realities that constitute social wellbeing.

Finally, as the political, economic and cultural purposes that the Westphalian state model was useful for are fulfilled by networks through dynamic free association, borders will become diffuse like ecosystems, and regions in Africa and Asia that were forced to adopt arbitrary boundary lines by Western invaders will be able to be free again. Capital trembles, government grows irrelevant, East and South rise. The post apocalyptic society of self regulating collaborative survivors knows nothing about the old world, and as a generation of  ‘script kiddies’ able to defend the right to play matures, change so profound that it is hard to foresee will come to be.

 


[1] Official Google Blog, Some weekend work that will (hopefully) enable more Egyptians to be heard, n.d., http://googleblog.blogspot.com/2011/01/some-weekend-work-that-will-hopefully.html

[2] “Amid Digital Blackout, Anonymous Mass-Faxes WikiLeaks Cables To Egypt – Forbes,” Forbes, n.d., http://www.forbes.com/sites/andygreenberg/2011/01/28/amid-digital-blackout-anonymous-mass-faxes-wikileaks-cables-to-egypt/.

[3] “Egypt protest leaflets distributed in Cairo give blueprint for mass action,” the Guardian, January 27, 2011, sec. World news, http://www.guardian.co.uk/world/2011/jan/27/egypt-protest-leaflets-mass-action.

[4] Manuel de De Landa, War in the Age of Intelligent Machines (Zone, 1991), 7.

[5] http://news.nationalpost.com/2012/05/12/insider-tells-why-anonymous-might-well-be-the-most-powerful-organization-on-earth/

[6] Kelsey-Fry, Jamie. 2012 “‘I Was the Fall Guy’: Julian Assange in His Own Words — New Internationalist.” New Internationalist Magazine. http://www.newint.org/features/web-exclusive/2012/04/01/julian-assange/.

[7] David Graeber, “Anarchism, Or The Revolutionary Movement Of The Twenty-first Century,” zcommunications.org, n.d., http://zcommunications.org/anarchism-or-the-revolutionary-movement-of-the-twenty-first-century-by-david-graeber.

[8] Michel Bauwens, The Political Economy of Peer Production. (Arthur and Mary Louse Kroker: CTHEORY, 2005)

[9] Manuel Castells, The Rise of the Network Society: The Information Age: Economy, Society, and Culture Volume I, 2nd ed. (Wiley-Blackwell, 2009).

[10] P2P Foundation, Bitcoin – P2P Foundation, n.d., http://p2pfoundation.net/Bitcoin.

 

Nicolás Mendoza is a scholar, artist and researcher in global media from The University of Melbourne and a member of the P2P Foundation. His recent work can be found here.

Follow him on Twitter: @nicolasmendo

The post Life in a Network for Survivors (Part 4) appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-4/2012/06/07/feed 0 24166
Life in a Network for Survivors (Part 3) https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-2/2012/06/06 https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-2/2012/06/06#respond Wed, 06 Jun 2012 09:22:25 +0000 http://blog.p2pfoundation.net/?p=24120 Life in a Network for Survivors: The Thermonuclear Apocalypse and the Protocols of Freedom   A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza, presented this week in four daily parts. The final version of... Continue reading

The post Life in a Network for Survivors (Part 3) appeared first on P2P Foundation.

]]>
Life in a Network for Survivors:

The Thermonuclear Apocalypse and the Protocols of Freedom

 

A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza, presented this week in four daily parts. The final version of this essay will be published later in 2012 by the EnterText journal, Brunel University – West London UK.

Complete series: Part 1Part 2Part 3Part 4

 

Part 3

 

Why Alex Galloway is out of control

Alex Galloway has coined the term ‘Protocologic Control’ to describe the notion that the underlying protocols that make electronic networks operational are the instruments of a grand shift in contemporary societies to become the Deleuzian “Societies of Control” [i]. In that sense, the term describes a situation of thorough disempowerment of the individual. For Galloway the distributed network, the digital computer, and the network protocol define “a new apparatus of control[ii] through which power is exercised in contemporary societies.  While he argues that all distributed media is necessarily endogenous to the societies of control, the analysis of the apocalyptic narratives that gave shape to the net shows us that, contrary to Galloway’s reading of Deleuze: a protocol with the characteristics and origin of TCP/IP is a threat to social control precisely because it transfers significant control to its users.

The term “Protocologic Control”, I think, needs to be used with caution because when taken out of context it gives the impression that wherever there is protocol, the dominant logic is that of a hegemonic society of control. It is true and concerning that through code and protocol hegemonic power can be exercised and control can be implemented. This concern is real. Nevertheless, pointing the finger at ‘protocol’ is analogous to seeing someone die after drinking poison and deducing ‘liquids’ are poisonous. To say ‘Protocologic Control’ is like saying ‘Liquidic Fluidity’ in that, yes, liquids are fluids, but the term ‘fluid’ tells us little new about the actual liquids (or protocols) at hand. Network protocols do control informational processes, but the question is in what ways and for whom. Raising suspicion on all protocol is unhelpful; rather, the call should be for a differentiated examination of what each one does, who owns them, through what processes they are managed, etc. Such analysis is central to focus the efforts needed to secure the integrity of the full transformational potential of the Internet.

Galloway’s notion of ‘Protocologic Control’ conflates two levels of the meaning of the word ‘protocol’. On the one hand the expression refers to languages within the technical universe of computers that come into play at different layers in their interactions: the institutionalised feedback mechanisms that effectively route datagrams through distributed digital networks. On the other hand, intermittently through Galloway’s analysis the technical essence of ‘protocol’ is concluded in itself to carry a political weight: “the Net is not simply a new, anarchical media format, ushering in the virtues of diversity and multiplicity, but is, in fact, a highly sophisticated system of rules and regulations (protocol).”[iii] This quote exemplifies the confusion present all through Galloway’s argument, consisting in inferring (or implying) hegemony from the existence of ‘rules and regulations’ in the protocol, regardless of what they are.

In Galloway, all of the ‘highly sophisticated’ technical standards known as protocol necessarily negate political ‘virtues of diversity and multiplicity’. While it is clear that protocols can be designed for exclusion and oppression, the sophistication of TCP/IP lies precisely in that it is able to glue networks of diverse nature, enabling even deeply incompatible actors (and even the human and non-human) to communicate. What its ‘rules and regulations’ do is precisely the opposite of what Galloway’s text implies: they allow to afford unprecedentedly diverse and multiple  inclusion. TCP/IP articulates what we know as ‘the Inter-net’ because it is designed to enable the dialogue between computers and digital networks as diverse as they can be imagined.

Further, Galloway’s recurrent assertions in the sense that the Internet is “the mostly highly controlled mass media hitherto known”[iv] are the result of a second conflation: in this case of two meanings of the word ‘control’. On the one hand, the term ‘control’ in TCP (Transfer Control Protocol) stands for the ability of the protocol to modulate and route datagrams ensuring that they reach their desired destination. It means feedback-based control, of the protocol, over the movement of datagrams. On the other hand, we have the historical use of the term ‘control’ described earlier, used by Cold War strategists, always preceded by the term ‘command’ to conform ‘command and control’. Here ‘control’ means fundamentally repressive control, of the President, over nuclear missiles.

The significance of the phrase ‘command and control’ is that it is critical to understand the ethos of the Net as a communication system devised to empower its users both to initiate and terminate action. This key term is missing from Galloway’s analysis; his texts gravitate exclusively around ‘control’. The identity of the network, this essay argues, is shaped after both principles (‘command’ and ‘control) alike, not just ‘control’. Galloway’s description of the Internet as ‘the most controlled mass media hitherto known” is a spectacular but one-sided statement that fails to differentiate between a media that enables control over its users, and a media that gives them both command and control. Not total command and control, for that describes a perfect monopoly of which only one can exist, but the field for genuinely multilateral (and often contentious) negotiations that is distributed command and control. When billions of actors, a diversity of humans, governments, corporations, machines, and software actors are all given their share of command and control, a new level of complexity emerges. Even the environment and ‘nature’ exercise their agencies in this new arrangement. In this stochastic assemblage control shifts owner in largely unpredictable ways, rendering porous and uncomfortable habitual hegemonies.

While protocol determines the universe of possibility in the network, and in that sense it can be said to determine the very ‘physical’ properties of the net, it does not follow TCP/IP is an instrument for social control from above. The opposite is true, as it is a protocol that, at least in its purest theoretical form, distributes the opportunity of access to power, or command and control, evenly through the nodes in the network. Actually, it represents a massive blow to the existing ‘control’ as it, protocologicaly, takes power from its historical monopolists to distribute it among those who had none, an operation that represents a double setback for the hierarchical-and-centralist entities of power.

Galloway’s confusion results in the proposal of thinking in terms of ‘counterprotocological practices’ to achieve emancipation. Yet it is actually governments and corporations who are currently attack the protocols most vigorously, i.e. practicing counterprotocological practices: pushing in the US draconian legislative projects like DMCA, SOPA or PIPA (and their equivalents around the world), implementing censorship machines like ‘Great Firewall of China’, Australia’s ‘Great Firewall Reef’, Hosni Mubarak’s Internet ‘kill switch’, injecting malware into consumer products to prevent data duplication, etc. The bearers of power defend their hegemony by attacking the protocols that distribute power. If real world current events tell us something about this debate, it is that counterprotocological practices, when it comes to TCP/IP and other realms of digital technologies, are in fact the tools for censorship, surveillance and commodification.

 

The air we breathe

An analogy can be attempted. When we speak, our brains, lungs, vocal cords and mouths control the flow of air to enable the emission of sound waves required to say whatever we want. This control is performed by several biological protocols embedded in the body. In order to be intelligible we rely on the social protocols of language, protocols that belong to a different realm. And yet, there are still occasions when we are unable to say what we want: this may occur for reasons different than biological control preventing us from it. It can happen because of political or cultural control, control that exists on yet another realm than the biological and language protocols that enable human speech in general. In extreme cases of political repression, someone can be threatened not speak their mind or die: a promise of ultimate violence from external political control on internal biological control. Because the lower protocological levels are vital to all the others, silence is usually chosen in this situation.

The analogy of speech leads then to a deeper question to disentangle Galloway: How should we conceptualise control when analysing media?

Is the voice, the biologically protocolised channel, the thing itself or ‘just’ the medium? If voice is a medium between our thoughts and the consciousness of others, can we say that thought is the thing itself? Is thought not merely equally protocolised symbolic activity of the mind, and therefore mediated and substanceless in itself? Does the thinking mind not operate as media within, as ultimately algorithmically controlled manipulation of symbols? (in this sense Eastern practices of meditation would be methods that strive to suspend this algorithmic activity, to shut down the symbolic factory, to de-mediatise existence, to experience being the elusive ‘thing itself’: that immanent entanglement with the signified, but without the signifier.)

This elusiveness of substance is in a sense the universality of Norbert Wiener’s control theory, the very negation of both medium and message through an understanding of an all-encompassing intrinsic entanglement through the notion of feedback. Constant, dynamic, multidimensional communication that affects the future state of all entangled parties: feedback. Reality not as matter but as a universal flow of information, Wiener’s ‘control’ is far beyond the concept we associate with oppression. ‘Control’ in Wiener takes mystical dimensions, for ‘control’ itself is the very substance of existence, the infinite entanglement of feedback that is life, “any organism is held together in this action by the possession of means for the acquisition, use, retention, and transmission of information.”[v] Such ‘means’ that hold together life are the protocols, the life in the network. And so, the political questions of our time tend to increasingly be about how it is and how it should be, this life in a network for survivors.

In her book Protocol Politics, The Globalisation of Internet Governance[vi] Laura DeNardis shows how the notion of protocols (Wiener’s ‘means’) cross from physics, biology, or technology to culture and politics:

Technical protocols are functionally similar to real-world protocols. Cultural protocols are not necessarily enshrined in law, but they nevertheless regulate human behaviour. In various cultures, protocols dictate how humans greet each other, whether shaking hands, bowing, or kissing. … There is nothing preordained about these communications norms. They are socially constructed protocols that vary from culture to culture.[vii]

Conflicts arise as forms of machinic life emerge and gain complexity, culture and idiosyncrasy of its own. It is still relatively uncontroversial to attack network protocol because everything about it seems morally trivial: isn’t it all artificial in the end? A result of human cultural, economic and political forces, machinic life seems enslavable. But the Net as a life form that assembles machines, information and humans alike, strives for freedom for itself. This realisation leads to a profound reconsideration of our relationship with the machine layers of the network:

We should embrace the deeper uncertainty arising from freeing technology from subservience to the merely instrumental goals of human pro?t. …We may then begin to make out a politics beyond the network where human and non-human, living and non-living are connected to mutual bene?t.[viii]

It is rarely that ethical consideration regarding machinic life takes place. Ethics in this realm, must be stressed, are not about what good can the machine do for us, and not even about how we can use the machine to do good, but about how can we make machinic life healthier. It means making the whole assemblage healthier by fostering what Wiener’s calls “the means for the acquisition, use, retention, and transmission of information.” It is in our benefit, and the only reasonable approach, for the network is a heterogeneous assemblage of which we are part. Still, claiming ownership of the other, sweet exploitation temptation knows no frontiers, less when colonisation and exploitation within the electronic frontier is where it’s at.

A perfect storm of counterintuitive grey ethical areas, the Net is metal, electron and flesh. Hardware, software and wetware looking for harmony in the storm. This harmony will only come as the full potential of the assemblage is realised, as (and if) it overcomes the enclosures that contain it: the mandate of profit and accumulation, modern human fear and pettiness, and the territorial boundaries of the nation-state. Will the Western inventions of materialism (i.e. communism and capitalism alike) and westphalianism, modernity itself, finally decline under the relentless swarms of the global machinic life-form?

No less, I think, is the size of the political promise the early days of the decade are pregnant with.

 

 


[i] Gilles Deleuze, “Postscript on the Societies of Control” (n.d.), http://www.jstor.org/stable/778828.

[ii] Galloway, Protocol, 3.

[iii] Alexander R. Galloway, Protocol: how control exists after decentralization (MIT Press, 2004), 69.

[iv] Ibid., 147.

[v] Wiener, Cybernetics, Second Edition, 161.

[vi] Laura DeNardis, Protocol politics: the globalization of Internet governance (MIT Press, 2009).

[vii] Ibid., 6.

[viii] Sean Cubitt, Robert Hassan, and Ingrid Volkmer, “Postnormal network futures: A rejoinder to Ziauddin Sardar,” Futures 42, no. 6 (August 2010): 624.

 

 

Nicolás Mendoza is a scholar, artist and researcher in global media from The University of Melbourne and a member of the P2P Foundation. His recent work can be found here.

Follow him on Twitter: @nicolasmendo


The post Life in a Network for Survivors (Part 3) appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-2/2012/06/06/feed 0 24120
Life in a Network for Survivors (Part 2) https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-2-2/2012/06/05 https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-2-2/2012/06/05#comments Tue, 05 Jun 2012 10:25:18 +0000 http://blog.p2pfoundation.net/?p=24196 Life in a Network for Survivors: The Thermonuclear Apocalypse and the Protocols of Freedom   A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza, presented this week in four daily parts. The final version of... Continue reading

The post Life in a Network for Survivors (Part 2) appeared first on P2P Foundation.

]]>
Life in a Network for Survivors:

The Thermonuclear Apocalypse and the Protocols of Freedom

 

A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza, presented this week in four daily parts. The final version of this essay will be published later in 2012 by the EnterText journal, Brunel University – West London UK.

Complete series: Part 1Part 2Part 3Part 4

Part 2

 

Some survivors are more equal than others

The principles guiding the early designs of the Internet supposed a deep perversion of traditional models of hierarchical military power. This perversion occurred the moment the military moved from a communications model of command and control to one based on distributed command and control. To understand how this move was possible it is useful to reread the opening words to Reliable digital communications systems using unreliable network repeater nodes[i], perhaps the most bizarre introduction to a technical paper ever written:

The cloud-of-doom attitude that nuclear war spells the end of the earth is slowly lifting from the minds of the many….A new view emerges: the possibility of a war exists but there is much that can be done to minimize the consequences.

If war does not mean the end of the earth in a black-and-white Manner, then it follows that we should do those things that make the shade of gray as light as Possible: to plan now to minimize potential destruction and to do all those things necessary to permit the survivors of the holocaust to shuck their ashes and reconstruct the economy swiftly.”[ii]

The author is Paul Baran, and the 1960 paper describes the first ever theoretical model for an entirely digital distributed communications network. When Baran started the research that led to his model, a few years earlier, more than a decade of nuclear threat had been enough to dissolve the euphoric sense of American invulnerability that resulted from WWII, so the survivor and his gray world had to be invented.

Cultural artefacts of the time show an imaginary where there is no paradigmatic survivor but rather a reproduction of class structure as societies go through the experience of the apocalypse. Within the space of the ruling ideological framework, Baran’s ‘shades of gray’ started to emerge. Cold War era movies like When the Wind Blows[iii], The War Game[iv], The Day After[v], or the Japanese (and post-Hiroshima) Barefoot Gen[vi] portray almost identical dramas of lay survivors as they negotiate the dawn of hell on earth. These lay survivors were, however, at best secondarily who the web was created for. Placebos in the form of nuclear emergency contingency pamphlets were the only packages being distributed to them. Their worse-than-death agony was expected, integral part of the ever flourishing collection of nuclear war scenarios. Belonging in this sense to a different category of cultural products of the era are Kubrik’s acclaimed Dr. Strangelove[vii] and Herman Kahn’s less acclaimed book On Thermonuclear War[viii], the former a slightly caricaturised version of the terroristic rationality of the latter. These portray a very different perspective of surviving the apocalypse, that of the powerful. Survivability of the elite, even after absolute Doomsday-machine powered annihilation, was initially the one remaining issue.

 

Fig 2. US Government shelter building pamphlet cover[ix]

In between these two extreme experiences of the apocalypse (one mediated by a wooden ‘inner core or refuge’ and a pamphlet, and the other by reinforced concrete and endless sex), existing societies started representing their pre-apocalyptic relationships of power through a new and flourishing ecology: an ever increasing diversity of individualistic bunkers tailored, ironically, to the individual ‘nuclear family’ and its corresponding social status. For instance, a booklet called The Family Fallout Shelter[x] distributed by the US government.”The least expensive shelter described is the Basement Concrete Block Shelter. The most expensive is the Underground Concrete Shelter”[xi]

 

Command & Conquer

The sanctity of the affordance abyss between the layman and the president was first transgressed by the figure of the secondary commander. Once his needs entered the realm of what is taken seriously after the bomb, the logic of post apocalyptic life (i.e. of the network) had been perverted. It seems now like an insignificant concession, but it was all it took to redraw the diagram of power. In a 1990 interview Paul Baran recalls how the seemingly subtle shift of accommodating for the needs of secondary commanders came to conceptually redefine his model:

The great communications need of the time was a survivable communications capacity that could broadcast a single teletypewriter channel.  The term used to describe this need was “minimal essential communications,” a euphemism for the President to be able to say “You are authorized to fire your weapons”. Or “hold your fire”. These are very short messages. The initial strategic concept at that time was if you can build a communications system that could survive and transmit such short messages, that is all that is needed… . The major initial objection to the scheme was its limited bandwidth.  The generals would say, “Yes, that would be okay for the President. But I gotta do this, and so and so gotta do this, and that command gotta do that.  We need more communication than a single teletypewriter channel.” After receiving this message back consistently, I said, “Okay, back to the drawing board. But this time I’m going to give them so damn much communication capacity they won’t know what in hell to do with it all.” So that became my next objective. Then I went from there to try to design a survivable network with so much more capacity and capability that this common objection to bandwidth limitation would be overcome.[xii]

This is the moment when the perversion happened, when the movement toward distributed command and control took place. The limited bandwidth distribution model still reproduced the polarity of power in the sense that it only considered the limited requirements of the President. Boosting bandwidth made it useful for secondary actors. Suddenly, the architecture of the desirable network stopped mimicking the hierarchies of the chain of command. In the aftermath, even in the absence of the top commanders, a network of secondary commanders would have means of communication and perhaps retaliatory power. The shift was reflected not only in the model of distributed communications but at all levels, especially in the characteristics of the data routing protocol. The concept for this protocol received the name of ‘hot potato’ packet switching.

“Thus, in the system described, each node will attempt to get rid of its messages by choosing alternate routes if its preferred route is busy or destroyed. Each message is regarded as a “hot potato,” and rather than hold the “hot potato,” the node tosses the message to its neighbour, who will now try to get rid of the message.”[xiii]

In terms of control the ‘hot potato’ model is a shift from node-centric control to immanent control distributed through the network. Because the node has no control over the full life of a packet, there is no feedback relationship between node and packet. Hence, there is really no nodal control as per Norbert Wiener’s seminal definition of control as feedback[xiv]. Packet control does ultimately happen, but as a result of the whole network informing the packet of the best available route in real time, which is to say that ultimately it is the multitude of packets who are, collectively, in control of themselves. In practical terms this means that end users in Baran’s design find themselves in a situation of equipotentiality.

Paul Baran’s network was never built but the model he proposed was a major influence in the creation of ARPANET, the primordial web built by the US Department of Defence. In 1973 the need arose to reconcile incompatibilities inherent to diverse data transmission technologies and to communication with other networks like the French network CYCLADES, and so the TCP/IP protocol suite was designed. Because TCP/IP enabled networks of diverse characteristic to communicate, the resulting network-of-networks was called the Inter-net.

Robert Kahn and Vinton Cerf, creators of TCP/IP, describe it as “a simple but very powerful and flexible protocol which provides for variation in individual network packet sizes, transmission failures, sequencing, flow control, and the creation and destruction of process-to-process associations.”[xv] In the TCP/IP protocol flexibility, simplicity and scalability join survivability as the defining features of the design. However, in a 1988 report called The Design Philosophy of the DARPA Internet Protocols David D. Clark recounts the original objectives of the Internet architecture and discusses “the relation between these goals and the important features of the protocols” [xvi]. Clark enumerates the priority list of the characteristics of the Internet:

1. Internet communication must continue despite loss of networks or gateways

2. The Internet must supply multiple types of communications service

3. The Internet architecture must accommodate a variety of networks

4. The Internet architecture must permit distributed management of resources

5. The Internet architecture must be cost effective

6. The Internet architecture must permit host attachment with a low level effort

7. The resources used in the internet architecture must be accountable[xvii]

While this list seems like a self-evident enumeration of any computer network‘s minimum features, Clark points that the significance of this list actually lies in its order: “It is important to understand that these goals are in order of importance, and an entirely different network would result if the order were changed[xviii]. He elaborates on how the principles of agency and survivability contradict the logic of power and control, as it is detached from the ethos of the original Internet:

“…since this network was designed to operate in a military context, which implied the possibility of a hostile environment, survivability was put as a first goal, and accountability as a last goal. During wartime, one is less concerned with detailed accounting of resources used than with mustering whatever resources are available and rapidly deploying them in an operational manner. While the architects of the Internet were mindful of accountability, the problem received very little attention during the early stages of the design, and is only now being considered. An architecture primarily for commercial deployment would clearly place these goals at the opposite end of the list” [xix] (emphasis mine)

This order of priorities of TCP/IP is at the heart of the (originally unintended) disruptiveness of the Internet. It shows how in the Zeitgeist of the cold war, catering to the figure of the survivor, governmentality was momentarily suspended. The protocols that structure the network were built to provide the user with maximum agency (i.e. command and control) as opposed to exercise control over him.

The solution Paul Baran crafted for the problem of network survivability, to essentially distribute power evenly throughout the network, irreparably breaks the social structure that over centuries had revolved around processes of accumulation and consolidation of power. Because it was initially confined to the few who already were supposed to hold power to begin with, distributed power was a tolerable concept. The egalitarian idea of distributed power, paradoxically made possible only as a means of military ‘command and control’ to survive absolute violence, was accepted under the retroactively delusional assumption that the distribution of power wouldn’t affect its concentration.

The struggles in the network emerge from the tension between the contradictory concepts of ‘command’ and ‘control’, buried deep in the protocol that governs it. The expression ‘command and control’ describes the abilities to initiate and stop action, respectively. “At its crudest level ‘command and control’ in nuclear war can be boiled down to this: command means being able to issue the instruction to ‘fire’ missiles, and control means being able to say ‘cease firing’”[xx] It can be conflated into a more simple term: ‘power’; as this bipolar attribute is distributed, pre-existing powers experience loss, disorientation and traumatic distress. If we follow Foucault’s propositions according to which power is always relational and that it exists to be exercised, a network for distributed command and control, (i.e. distributed power), creates a situation where centerless power is exercised in all directions. And so, the paranoid genesis of the Net, combined with the absolute impossibility of the military, and even the academic field, to foresee the impact their toy would have in the planet, provided the enormous historical faux-pas in the logic of power that is the Internet.

 


[i] “Reliable Digital Communications Systems Using Unreliable Network Repeater Nodes,” Product Page, 1960, http://www.rand.org/pubs/papers/P1995.html.

[ii] Ibid., 1.

[iii] Jimmy T. Murakami, When the Wind Blows, Animation, Comedy, Drama, War, 1988.

[iv] Peter Watkins, The War Game, Drama, Sci-Fi, War, 1967.

[v] Nicholas Meyer, The Day After, Drama, Sci-Fi, 1983.

[vi] Mori Masaki, Barefoot Gen, Animation, Drama, War, 1992.

[vii] Stanley Kubrick, Dr. Strangelove or: How I Learned to Stop Worrying and Love the Bomb, Comedy, Drama, 1964.

[viii] Herman Kahn, On Thermonuclear War.

[ix] Ibid.,

[x] Government U.S, The Family Fallout Shelter (1959) *Illustrated*, 2011.

[xi] Ibid., 2.

[xii] Judy O’Neill, An Interview With Paul Baran., (Charles Babbage Institute, Center for the History of Information Processing, University of Minnesota, Minneapolis, 1990), 14-15.

[xiii] Paul Baran, “On Distributed Communications,” Product Page, 1964, 1, http://www.rand.org/pubs/research_memoranda/RM3420.html.

[xiv] Norbert Wiener, Cybernetics, Second Edition: or the Control and Communication in the Animal and the Machine, second edition. (The MIT Press, 1965).

[xv] V Cerf and R Kahn, “A Protocol for Packet Network Intercommunication,” IEEE Transactions on Communications 22, no. 5 (May 6, 1974): 637-648.

[xvi] D Clark, “The design philosophy of the DARPA internet protocols,” in SIGCOMM  ’88: Symposium proceedings on Communications architectures and protocols (Stanford, California, United States: ACM, 1988), 106-114, http://dx.doi.org/10.1145/52324.52336., 106.

[xvii] Ibid., 107.

[xviii] Ibid.

[xix] Ibid.

[xx] John Naughton, A Brief History of the Future: Origins of the Internet ({Phoenix mass market p/bk}, 2000), 96, http://www.amazon.ca/exec/obidos/redirect?tag=citeulike09-20&path=ASIN/075381093X.

 

Nicolás Mendoza is a scholar, artist and researcher in global media from The University of Melbourne and a member of the P2P Foundation. His recent work can be found here.

Follow him on Twitter: @nicolasmendo


The post Life in a Network for Survivors (Part 2) appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-2-2/2012/06/05/feed 1 24196
Life in a Network for Survivors (Part 1) https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-1/2012/06/04 https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-1/2012/06/04#comments Mon, 04 Jun 2012 09:10:31 +0000 http://blog.p2pfoundation.net/?p=24089 Life in a Network for Survivors: The Thermonuclear Apocalypse and the Protocols of Freedom A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza (site), presented this week in four daily parts. The final version of... Continue reading

The post Life in a Network for Survivors (Part 1) appeared first on P2P Foundation.

]]>
Life in a Network for Survivors:

The Thermonuclear Apocalypse and the Protocols of Freedom

A text on the impact of Cold War era apocalyptic fantasy today. A search for the missing ideological history of internet protocols. An essay by P2P foundation’s Nicolás Mendoza (site), presented this week in four daily parts. The final version of this essay will be published later in 2012 by the EnterText journal, Brunel University – West London UK.

 

Complete series: Part 1Part 2Part 3Part 4

Part 1

Wild, dark times are rumbling toward us,

and the prophet who wishes to write a new apocalypse will have to invent entirely new beasts,

and beasts so terrible that the ancient animal symbols of St. John

will seem like cooing doves and cupids in comparison.

-Heinrich Heine

How I Learned to Love the Bomb

 

Today it is impossible to think that the planet could ever be a single union of territories ruled under a totalitarian communist regime. It even seems bizarre to realize that at some point in history, from the 1950s through the 70s, global communism, the ultimate fulfilment of Marxist teleology, seemed like a somewhat foreseeable scenario. The future in that not so distant past seemed to be a tossup between capitalism and communism, and yet the real question haunting humanity was whether a mankind-annihilating thermonuclear apocalypse was around the corner. It was only within such an unprecedented Zeitgeist that the Internet could have been born.

To be more precise, the Internet is the son of the apocalypse. It was conceived not as a means for capitalistic hegemony or even strictly as a means of defence, but rather as a tool for the survivors. It was one of the many inventions of the postapocalyptic world that was starting to exist in the imagination of Cold War strategists. As such, it was even beyond the logic of deterrence through the promise of retaliation. As such, it was really located in the day after. In theory, the first real user of the network was meant to be someone buried in a deep underground bunker desperately looking for signs of life, someone looking for someone, wondering whether or not to press the button of retaliation, while the surface burned, doomed to a century of radioactive thermonuclear winter.

The history of the Internet is usually told in the form of a series of technical breakthroughs by outstanding figures among the scientific community that developed the system because they happened to be useful for the US military, while referring to the extraordinary Cold War mentality merely as if it were an anecdotical serendipity factor. This approach narrates the becoming of the Internet in technical terms, but leaves unanswered questions about its nature, its evolution and its crossroads.

The Internet being first and foremost a postapocalyptic entity is a bizarre beast, alien to all known organization of society, predestined at birth to disrupt every single aspect of what until then was supposed to be. Because the Internet was conceived to perform as a sort of life support machine through the permanent communication and cooperation of survivors in a postapocalyptic environment, with a systematic disregard of any political, economical or cultural consideration concerning the surface, it is fundamentally detached from the continuum of socio-philosophical evolutions by which we normally understand social phenomena. In other words, to understand the Internet we must suspend any attempt to think in terms of the foucaultian epistemic continuums of modalities of the exercise of power, because it basically happened while Dr. Strangelove was dreaming.

 

 

Fig 1: Dr. Strangelove’s dilemma. (diagram by the author)

 

Faced with the Apocalypse, something radical had to be done, whether it was Dr. Strangelove’s underground society of polygamists devoted to the impregnation of “highly stimulating” women, or the Internet. As the unthinkable began to be thought of, Doomsday machines, underground cities and distributed networks were imagined.[1] Critical theory usually overlooks the significance of the extraordinary circumstances in which the Net was conceived. This has led to partial readings informed by categories that under the exceptional circumstances of its conception were no longer relevant. Primarily among these, I argue, is Alex Galloway’s book Protocol: How control exists after decentralisation.[2] In Protocol, Galloway argues that Internet protocols are an apparatus of control; that “The founding principle of the Net is control, not freedom.”[3] This essay wants to show how this is the incorrect dichotomy. Through critical analysis of the dominant narratives at the net’s genesis I will show that, on the contrary, the founding principle of the Net is not control but command and control and, further, distributed command and control. The significance of this precision lays in that the distribution of command and control, as long as it remains real, leads necessarily to the collapse of traditional power and to the emergence of an unprecedented social order of distributed power. Such an order, precisely because of power distribution, is close to what anarchist scholars like David Graeber and web activist groups like Anonymous advocate for. In their theoretical and pure form, the founding protocols of a true distributed network as was initially conceived, even while endangered and partially implemented, break the dam towards collective emancipation. They are the protocols of freedom.

 

Imagine all the people living death in peace

Artist Marlena Corcoran’s essay The Fiction of the Internet[4] links cold war era narratives of the apocalypse with the development of the technologies and structures that we know as the Internet. “The creation of the Internet was not only a technological but also an imaginative feat. The conceptual structure of the Internet is an imaginative response to the threat of an annihilating catastrophe”[5]The point here is not to merely romanticize the net as ‘imaginative’, but to note that without a very specific and powerful set of shared fantasies of a science-fictional nature (the paranoiac mindset shared by the generals, scientists, and politicians that teamed to invent the Net) none of the technical feats would have even been attempted. And, more importantly, to realise that the design philosophy of the Internet condensed those into the protocols that govern it. “The drama of the Net is best understood in the context of this flowering of one of the most highly articulated fantasies of an event that galvanized a nation -and never took place”[6]The question, then, is what is this particular ‘drama of the Net’, about? Can we start to think about this drama in order to grasp the ontology of the Net before it exploded, in a similar way as physics research the Big Bang to understand the universe?

The figure of the thermonuclear-apocalypse survivor drove the design philosophy of the Net. If Western culture is the result of an epistemic evolution that articulated power around a sequence of discourses that gradually moved from the figures of the leper, to the monster, to the masturbator, etc[7], we can only note that the figure of the survivor is one that abruptly came to the centre, courtesy of Cold War nightmares. But the survivor was alien to the historical sequence of the dynamics of power, making his sudden protagonism highly subversive. If the Internet is a manifestation of the problematic of the survivor, then its nature is not related to the forces that transformed sovereign societies into disciplinary societies, ultimately evolving into societies of control.

The apocalyptic survivor is, by definition, in charge. In charge of what exactly, however, is an enigma. His specific tasks are unimaginable. All that is known is that he is somewhere deep, that he has time, and that he has a computer. The survivor must be thought of as an historic individual, a living legend… the sole witness and the narrator for his own future generations not only because the apocalypse implies the extinction of the audience, but also because the story that will be told really starts after the bomb. From the point of view of a survivor civilisation the bomb is not the end, but the beginning. Since he has to be imagined as the breeder of a second mankind, the apocalyptic survivor competes in historic potential with Noah himself, hence Strangelove’s underground ark of lust. He must undertake foundation of the utopian society that we never ceased to fail to construct. At the same time, he is a coward that refused to share the fate of his brothers and went underground. With a generation of so burdened apocalyptic survivors in mind, the Internet was thus designed around the ideas of robustness, flexibility, and survivability: to guarantee survivor agency and empowerment to the maximum possible degree.


Notes

[1] Herman Kahn, On Thermonuclear War., 2nd ed. (Greenwood Press Reprint, 1978).

[2] Alexander R. Galloway, Protocol: How Control Exists after Decentralization (The MIT Press, 2006).

[3] Ibid.,

[4] Marlena Corcoran, “‘Worst Case Scenarios’: The Fiction of the Internet,” Leonardo 30, no. 5 (January 1, 1997): 343-348.

[5] Ibid., 343.

[6] Ibid.

[7] Michel Foucault, Abnormal: Lectures at the Collège de France, 1974-1975 (Picador, 2004).

Nicolás Mendoza is a scholar, artist and researcher in global media from The University of Melbourne and a member of the P2P Foundation. His recent work can be found here.

Follow him on Twitter: @nicolasmendo

The post Life in a Network for Survivors (Part 1) appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/life-in-a-network-for-survivors-part-1/2012/06/04/feed 1 24089
P2P Political action: Reddit-created PAC to release anti Lamar Smith (SOPA proponent) TV Ad https://blog.p2pfoundation.net/p2p-political-action-reddit-created-pac-to-release-anti-lamar-smith-sopa-proponent-tv-ad/2012/04/05 https://blog.p2pfoundation.net/p2p-political-action-reddit-created-pac-to-release-anti-lamar-smith-sopa-proponent-tv-ad/2012/04/05#comments Thu, 05 Apr 2012 06:00:00 +0000 http://blog.p2pfoundation.net/?p=23253 The SOPA/PIPA episode, which escalated earlier this year into a showdown between entertainment industry lobby and large numbers of internet users, and led to a widespread online blackout protest, resulted in the creation of several new organizations concerned with the defense of online freedoms. One of these organisations is called TestPAC. It was created by... Continue reading

The post P2P Political action: Reddit-created PAC to release anti Lamar Smith (SOPA proponent) TV Ad appeared first on P2P Foundation.

]]>
The SOPA/PIPA episode, which escalated earlier this year into a showdown between entertainment industry lobby and large numbers of internet users, and led to a widespread online blackout protest, resulted in the creation of several new organizations concerned with the defense of online freedoms.

One of these organisations is called TestPAC. It was created by engaged Reddit users, who are in a way the unsung heroes of the SOPA blackout day. Reddit was key to coordinating the massive e-mail, fax, and phone-call campaign that eventually broke the morale of congressmen who supported the bill.

TestPAC is now committed to making life hard for Lamar Smith, the Texan Republican congressman who presented the SOPA bill to the US congress. Their goal is to unseat Lamar Smith from congress by bringing attention to the local electorate about his attacks to internet freedom.

TestPAC is an example of pragmatism in P2P political action: it plays within the system in that it uses its spaces and conducts (TV ads, PACS, congress), but does so through distributed creativity, aggregating power, swarming to achieve a collective goal. In a way, it can be conceptualized as emulation: the crowd or swarm shapes itself to fit the mold created for a different kind of entity, in order to gain the access necessary to break the mold.

[If video does not load go directly to:]

TestPAC TV Ad

 

 

 

The post P2P Political action: Reddit-created PAC to release anti Lamar Smith (SOPA proponent) TV Ad appeared first on P2P Foundation.

]]>
https://blog.p2pfoundation.net/p2p-political-action-reddit-created-pac-to-release-anti-lamar-smith-sopa-proponent-tv-ad/2012/04/05/feed 1 23253