The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Edges 131<br />
<strong>of</strong> the supernatural, a divine or demonic sovereignty. Popular interpretations<br />
<strong>of</strong> epidemics throughout history <strong>of</strong>ten make appeals to the<br />
supernatural: the plague is a sign <strong>of</strong> divine retribution (for the colonized),<br />
a sign <strong>of</strong> divine providence (for the colonizer), a harbinger <strong>of</strong><br />
the apocalypse, a punishment <strong>of</strong> the hubris <strong>of</strong> humanity, even<br />
mystified in modern times as the “revenge <strong>of</strong> nature.” Such representations<br />
are not limited to biological epidemics; in the network society,<br />
they are also found in informational - biological hybrids: the<br />
“metro phage,” the “gray goo” problem <strong>of</strong> nanotech, the “infocalypse,”<br />
and so on. Such narratives and representations can be seen as<br />
attempts to recentralize the question <strong>of</strong> sovereignty in networks. But<br />
in this case, sovereignty is scaled up to the level <strong>of</strong> the divine or demonic,<br />
an agency that may be identified but remains unknowable<br />
and decidedly nonhuman. It is as if to say, “there is no one in control,<br />
except at an order we cannot fathom.” A question <strong>of</strong> theology,<br />
to be sure.<br />
Universals <strong>of</strong> Identification<br />
Request for Comments (RFC) number 793 states one <strong>of</strong> the most fun -<br />
da mental principles <strong>of</strong> networking: “Be conservative in what you do,<br />
be liberal in what you accept from others.” As a political program,<br />
this means that communications protocols are technologies <strong>of</strong> conservative<br />
absorption. <strong>The</strong>y are algorithms for translating the liberal into<br />
the conservative. And today the world’s adoption <strong>of</strong> universal communications<br />
protocols is nearing completion, just as the rigid austerity<br />
measures <strong>of</strong> neoliberal capitalism have absorbed all global markets.<br />
Armand Mattelart wrote that the modern era was the era <strong>of</strong> universal<br />
standards <strong>of</strong> communication. <strong>The</strong> current century will be the era <strong>of</strong><br />
universal standards <strong>of</strong> identification. In the same way that universals<br />
<strong>of</strong> communication were levied to solve crises in global command and<br />
control, the future’s universals <strong>of</strong> identification will solve today’s crises<br />
<strong>of</strong> locatability and identification. <strong>The</strong> problem <strong>of</strong> the criminal complement<br />
is that they can’t be found. “To know them is to eliminate<br />
them,” says the counterinsurgency leader in <strong>The</strong> Battle <strong>of</strong> Algiers. <strong>The</strong><br />
invention <strong>of</strong> universals <strong>of</strong> identification, the ability to locate physically<br />
and identify all things at all times, will solve that problem. In