14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

154 Coda<br />

to be sure. Furthermore, networks <strong>of</strong>ten display asymmetrical power<br />

relationships (as in the “directed” graph). But if no one controls the<br />

network in an instrumental sense, if there is indeed a defacement <strong>of</strong><br />

enmity, then how do we account for and “live against” such differences<br />

and asymmetries?<br />

Our suggestion may at first seem perplexing. We suggest that the discussions<br />

over the multitude, netwars, and networks are really discussions<br />

about the unhuman within the human.<br />

By using the word “unhuman,” we do not mean that which is against<br />

the human or is antihuman. Nor do we mean the use <strong>of</strong> cybernetic<br />

technology to evolve beyond the human. This is not a nihilism (anti -<br />

humanism) or a technophilia (posthumanism). We do not deny the<br />

crucial role that human action and decision play, even at the most<br />

micropolitical, localized level. But we do wonder if the thinking about<br />

these so - called emerging forms really goes far enough in comprehending<br />

them.<br />

Difficult, even frustrating, questions appear at this point. If no single<br />

human entity controls the network in any total way, then can we assume<br />

that a network is not controlled by humans in any total way? If humans<br />

are only a part <strong>of</strong> a network, then how can we assume that the ultimate<br />

aim <strong>of</strong> the network is a set <strong>of</strong> human - centered goals?<br />

Consider the examples <strong>of</strong> computer viruses or Internet worms, <strong>of</strong><br />

emerging infectious diseases, <strong>of</strong> marketing strategies employing viral<br />

marketing or adware, <strong>of</strong> the unforeseen interpersonal connections in<br />

any social network, <strong>of</strong> the connections between patterns <strong>of</strong> immigration<br />

and labor in the United States, <strong>of</strong> the scaling up <strong>of</strong> surveillance<br />

in U.S. Homeland Security and the Patriot Act, <strong>of</strong> the geopolitics <strong>of</strong><br />

the Kyoto Treaty and climate change. At the macro and micro levels,<br />

it is not difficult to note at least some element in every network<br />

that frustrates total control—or even total knowledge.<br />

In fact, it is the very idea <strong>of</strong> “the total” that is both promised and yet<br />

continually deferred in the “unhumanity” <strong>of</strong> networks, netwars, and even<br />

the multitude.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!