The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Notes<br />
Prolegomenon<br />
1. For more on the dialogue, see Geert Lovink and Florian Schneider,<br />
“Notes on the State <strong>of</strong> Networking,” Nettime, February 29, 2004; and our<br />
reply titled “<strong>The</strong> Limits <strong>of</strong> Networking,” Nettime, March 24, 2004.<br />
2. This is seen in books like Bob Woodward’s Plan <strong>of</strong> Attack.<br />
3. Pit Schultz, “<strong>The</strong> Idea <strong>of</strong> Nettime,” Nettime, June 20, 2006.<br />
4. Giorgio Agamben, <strong>The</strong> Coming Community (Minneapolis: University<br />
<strong>of</strong> Minnesota Press, 1993), 85.<br />
5. It’s important to point out that terms such as “postmodernity” or<br />
“late modernity” are characterized less by their having broken with or somehow<br />
postdated modernity, but instead exist in a somewhat auxiliary rapport<br />
with modernity, a rapport that was never quite a break to begin with and<br />
may signal coincidence rather than disagreement. Fredric Jameson’s book A<br />
Singular Modernity (London: Verso, 2002) plots this somewhat confusing<br />
boomerang effect.<br />
6. Michael Hardt and Antonio Negri, Multitude: War and Democracy in<br />
the Age <strong>of</strong> Empire (New York: Penguin, 2004), 62.<br />
7. John Arquilla and David Ronfeldt, “Fight <strong>Networks</strong> with <strong>Networks</strong>,”<br />
http: // www.rand.org/ publications/ randreview/ issues/ rr.12.01/ fullalert<br />
.html#networks (accessed June 11, 2005). Arquilla and Ronfeldt qualify this:<br />
“Al - Qaeda seems to hold advantages at the organizational, doctrinal, and<br />
167