14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Edges 131<br />

<strong>of</strong> the supernatural, a divine or demonic sovereignty. Popular interpretations<br />

<strong>of</strong> epidemics throughout history <strong>of</strong>ten make appeals to the<br />

supernatural: the plague is a sign <strong>of</strong> divine retribution (for the colonized),<br />

a sign <strong>of</strong> divine providence (for the colonizer), a harbinger <strong>of</strong><br />

the apocalypse, a punishment <strong>of</strong> the hubris <strong>of</strong> humanity, even<br />

mystified in modern times as the “revenge <strong>of</strong> nature.” Such representations<br />

are not limited to biological epidemics; in the network society,<br />

they are also found in informational - biological hybrids: the<br />

“metro phage,” the “gray goo” problem <strong>of</strong> nanotech, the “infocalypse,”<br />

and so on. Such narratives and representations can be seen as<br />

attempts to recentralize the question <strong>of</strong> sovereignty in networks. But<br />

in this case, sovereignty is scaled up to the level <strong>of</strong> the divine or demonic,<br />

an agency that may be identified but remains unknowable<br />

and decidedly nonhuman. It is as if to say, “there is no one in control,<br />

except at an order we cannot fathom.” A question <strong>of</strong> theology,<br />

to be sure.<br />

Universals <strong>of</strong> Identification<br />

Request for Comments (RFC) number 793 states one <strong>of</strong> the most fun -<br />

da mental principles <strong>of</strong> networking: “Be conservative in what you do,<br />

be liberal in what you accept from others.” As a political program,<br />

this means that communications protocols are technologies <strong>of</strong> conservative<br />

absorption. <strong>The</strong>y are algorithms for translating the liberal into<br />

the conservative. And today the world’s adoption <strong>of</strong> universal communications<br />

protocols is nearing completion, just as the rigid austerity<br />

measures <strong>of</strong> neoliberal capitalism have absorbed all global markets.<br />

Armand Mattelart wrote that the modern era was the era <strong>of</strong> universal<br />

standards <strong>of</strong> communication. <strong>The</strong> current century will be the era <strong>of</strong><br />

universal standards <strong>of</strong> identification. In the same way that universals<br />

<strong>of</strong> communication were levied to solve crises in global command and<br />

control, the future’s universals <strong>of</strong> identification will solve today’s crises<br />

<strong>of</strong> locatability and identification. <strong>The</strong> problem <strong>of</strong> the criminal complement<br />

is that they can’t be found. “To know them is to eliminate<br />

them,” says the counterinsurgency leader in <strong>The</strong> Battle <strong>of</strong> Algiers. <strong>The</strong><br />

invention <strong>of</strong> universals <strong>of</strong> identification, the ability to locate physically<br />

and identify all things at all times, will solve that problem. In

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!