14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

126 Edges<br />

the so - called closed logics <strong>of</strong> state and commercial control operate<br />

primarily using a social model <strong>of</strong> control. For example, Micros<strong>of</strong>t’s<br />

commercial prowess is renewed via the social activity <strong>of</strong> market exchange.<br />

Or digital rights management (DRM) licenses establish a<br />

social relationship between producers and consumers, a social relationship<br />

backed up by specific legal realities (such as the 1998 Digital<br />

Millennium Copyright Act).<br />

From this perspective, we find it self - evident that informatic (or<br />

material) control is equally powerful as, if not more so than, social<br />

control. If the topic at hand is one <strong>of</strong> control, then the monikers <strong>of</strong><br />

“open” and “closed” simply further confuse the issue. Instead we would<br />

like to speak in terms <strong>of</strong> alternatives <strong>of</strong> control whereby the controlling<br />

logic <strong>of</strong> both “open” and “closed” systems is brought out into the<br />

light <strong>of</strong> day.<br />

A Google Search for My Body<br />

<strong>The</strong> expectation is that one is either online or not. <strong>The</strong>re is little<br />

room for kind <strong>of</strong> online or sort <strong>of</strong> online. Network status doesn’t allow<br />

for technical ambiguity, only a selection box <strong>of</strong> discrete states. It is<br />

frustrating, ambiguity is, especially from a technical point <strong>of</strong> view. It<br />

works or it doesn’t, and when it doesn’t, it should be debugged or<br />

replaced. To be online in a chronically ambiguous state is maddening,<br />

both for those communicating and for the service provider. <strong>The</strong><br />

advent <strong>of</strong> broadband connectivity only exacerbates the problem, as<br />

expectations for uninterrupted uptime become more and more inflexible.<br />

One way to fix the ambiguity is to be “always on,” even when<br />

asleep, in the bathroom, or unconscious. All the <strong>of</strong>ficial discourses <strong>of</strong><br />

the Web demand that one is either online and accounted for, or <strong>of</strong>fline<br />

and still accounted for. (This is the idealistic ubiquity <strong>of</strong> wireless connectivity—the<br />

very air you breathe is a domain <strong>of</strong> access, harkening<br />

back to radio’s domain <strong>of</strong> dead voices on air.) Search engines are the<br />

best indicator <strong>of</strong> this demand. Bots run day and night, a swarm <strong>of</strong> surveillance<br />

drones, calling roll in every hidden corner <strong>of</strong> the Web. All<br />

are accounted for, even those who record few user hits. Even as the<br />

Web disappears, the networks still multiply (text messaging, multi-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!