Index 187 distributed network. See network: distributed distribution, 17, 31, 34, 64, 66, 68– 69, 78, 94, 97, 111, 179n13. See also network: distributed distribution, power law. See power law distribution disturbance, 101 diversity, 84. See also heterogeneity dividual, 39– 40. See also individual; individuation DNA, 6, 28, 48– 53, 54, 77, 79, 90, 122– 23, 132– 33 DNA chip, 50 DNA computer, 51– 53, 58 Domain Name System (DNS), 44– 45, 47, 54 Dope Wars, 115 double helix, 175n67 doubt, 160 Dr. Faustus, 138 drift, 163 Duns Scotus, John, 169n9, 169n10 dystopia, 134 Economic and Philosophical Manu - scripts <strong>of</strong> 1844 (Marx), 177n30 economy: Fordist, 3; post - Fordist, 2, 107; service, 3 edge, 22, 31– 32, 37, 39, 52, 59– 60, 62, 99, 112, 139, 142– 43, 146, 157 Edwards, Sean, 67 élan vital, 80, 101 elemental, 155– 57 e - mail, 10, 28, 83, 95, 145– 46, 169n8 emergence, 22, 30, 47, 69 emerging infectious disease. See disease: emerging infectious emp, 163 empire, 6, 8, 27, 152, 179n10 Empire (Hardt and Negri), 152 emptiness, 142 empty, 160 endemic, 115– 17 end - to - end principle, 47 enemy. See enmity Enhanced Surveillance Project, 177n23 enmity, 63– 70, 94, 154 entropy, 172n25 envision, 164 Enzensberger, Hans Magnus, 16 epidemic, 75, 86, 105– 9, 115– 17, 129 epidemiC, 105 epidemiology, 88, 92, 94 equality, 13 error, 129 essence, 134– 35 Ethernet, 42 exception, 38– 39, 101, 162; sover - eign, 169n11; state <strong>of</strong>, 110, 169n11. See also topology: exceptional exceptionalism, 22, 39, 149; Ameri - can, 3, 14 excess, 147 existence, 136– 38 exorcise, 164 exploit, 17, 20– 22, 46, 81– 97, 135, 145– 46, 155, 157 exploitation, 78– 79, 135, 159, 166 face, 12, 64– 70. See also deface - ment; facing; interface faciality, 68 facing, 64– 70. See also defacement; face; interface Fahrenheit 911, 2 fail, 164 failure, 96– 97, 155, 157 family, 22 FedEx, 9 feedback, 55, 122– 24, 171n24 feminism, 14 Fidelista, 26, 168n1
188 Index figuration, 161 file sharing, 12, 25, 34, 139. See also peer - to - peer file transfer protocol (FTP), 133 film, 69 fire, 156 firewall, 10, 12, 75, 96 flaw, 160 flee, 162 flexibility, 27, 29, 31– 32, 53, 60, 91, 98, 113, 115, 150, 179n10 flip, 160 flood, 91, 96, 98 flu, 90; bird, 93 Flusser, Vilém, 124, 170n14 foe, 63– 70 fold, 175n67 Fordism. See economy: Fordist fork, 115, 128, 133, 144, 176n17 fork bomb, 115, 128, 133, 144, 176n17 Fortun, Michael, 107 Foucault, Michel, 7– 9, 35, 38, 41, 70, 72– 73, 76, 78– 79, 98, 107– 11, 115– 17, 130, 169n11, 172n40, 173n43, 173n44, 174n50, 174n52, 174n56, 175n69 France, 6 freedom, 13, 73, 124– 26; <strong>of</strong> expres - sion, 143; <strong>of</strong> use, 143 frees, 164 friend, 63– 70 FTP, 29 function, 163, 176n17 full, 160 Gaia, 118 game, 25, 114– 15, 122, 127, 143 gaming, 101 Gamow, George, 48 Gangsta Disciples, 168n1 gateway, 160 GenBank, 51, 132 gene, 47– 48, 50, 135; expression, 28, 50, 54, 96, 132– 33; splicing, 123; therapy, 124 Genentech, 50 general systems theory. See systems theory genetically modified (GM): food, 48, 170n20; organisms, 50 genetics, 47, 49, 77, 109, 175n67; genome, 28, 54, 92, 159; genomics, 132– 33, 135 Global Health Odyssey, 106 globalization, 80, 90 Global Outbreak Alert and Response Network, 121 global - single command event, 19– 20 glossolalia, 160 Gnutella, 34, 123 God, 19 Google, 126 Goux, Jean - Joseph, 159 governance, 26 grammars <strong>of</strong> action, 113, 132 graph, 31– 32, 118, 124, 146, 154 graph theory, 27, 31– 35, 57, 112, 118, 139– 40, 142, 168n5. See also social network theory grid, 15, 17 Grotius, Hugo, 19 Guangdong Province, 4, 89 Guattari, Félix, 21, 25, 61, 64, 68, 79– 80 guerrilla, 14– 15, 20, 22, 40, 61, 66 H5N1, 93 hacker, 30, 77, 81 hacking, 16, 82, 87 hacktivism, 66 Halliburton, 8 Hamas, 26, 168n1 Hamiltonian path, 51, 53 Hardt, Michael, 8, 15, 27, 76, 78, 149– 53, 179n13 health, 10, 110, 121– 22, 128, 177n22
- Page 2 and 3:
The Exploit
- Page 4 and 5:
The Exploit A Theory of Networks Al
- Page 6 and 7:
Contents On Reading This Book vii P
- Page 8 and 9:
On Reading This Book It is our inte
- Page 10 and 11:
Prolegomenon “We’re Tired of Tr
- Page 12 and 13:
Prolegomenon 3 opportunities that t
- Page 14 and 15:
Prolegomenon 5 centralized armies f
- Page 16 and 17:
Prolegomenon 7 the other hand, the
- Page 18 and 19:
Prolegomenon 9 Following Foucault,
- Page 20 and 21:
Prolegomenon 11 Provisional Respons
- Page 22 and 23:
Prolegomenon 13 comes to thinking a
- Page 24 and 25:
Prolegomenon 15 grams, where ultima
- Page 26 and 27:
Prolegomenon 17 rorism in the same
- Page 28 and 29:
Prolegomenon 19 has nothing to do w
- Page 30 and 31:
Prolegomenon 21 sovereignty. In the
- Page 32 and 33:
PART I Nodes The quest for “unive
- Page 34 and 35:
Nodes Discourse surrounding network
- Page 36 and 37:
Nodes 27 Benkler, and others, posit
- Page 38 and 39:
Nodes 29 cols such as http, FTP, an
- Page 40 and 41:
Nodes 31 tify the political fissure
- Page 42 and 43:
Nodes 33 From the perspective of gr
- Page 44 and 45:
Nodes 35 Indeed, one of the argumen
- Page 46 and 47:
Nodes 37 works. Would it be enough
- Page 48 and 49:
Nodes 39 and “rule” lies. The n
- Page 50 and 51:
Nodes 41 modulating, in flux, alive
- Page 52 and 53:
Nodes 43 ning of the data object. F
- Page 54 and 55:
Nodes 45 number of top - level name
- Page 56 and 57:
Nodes 47 This process may be partia
- Page 58 and 59:
Nodes 49 Biotechnologies today have
- Page 60 and 61:
Nodes 51 be it in the living cell,
- Page 62 and 63:
Nodes 53 DNA computing demonstrates
- Page 64 and 65:
Nodes 55 greater the number of insi
- Page 66 and 67:
Nodes 57 more accurate or successfu
- Page 68 and 69:
Nodes 59 takes on new forms in the
- Page 70 and 71:
Nodes 61 and at all scales. Perhaps
- Page 72 and 73:
Nodes 63 many current network - bas
- Page 74 and 75:
Nodes 65 face because enmity is alw
- Page 76 and 77:
Nodes 67 As a concept, swarming der
- Page 78 and 79:
Nodes 69 Places where faces shouldn
- Page 80 and 81:
Nodes 71 at which “life itself
- Page 82 and 83:
Nodes 73 A crucial challenge is to
- Page 84 and 85:
Nodes 75 concern is not safety anym
- Page 86 and 87:
Nodes 77 is central in the developm
- Page 88 and 89:
itself on the side of life, and tur
- Page 90 and 91:
Nodes 81 Perhaps what is most instr
- Page 92 and 93:
Nodes 83 ever, the language of biol
- Page 94 and 95:
Nodes 85 computer’s normal MBR. E
- Page 96 and 97:
Nodes 87 amples of computer and bio
- Page 98 and 99:
Nodes 89 identify Lyme disease, the
- Page 100 and 101:
Nodes 91 Web sites, databases, and
- Page 102 and 103:
Nodes 93 to our bodies, which has t
- Page 104 and 105:
Nodes 95 True, in extreme cases suc
- Page 106 and 107:
fects are almost impossible to pred
- Page 108 and 109:
Nodes 99 guarded condition, it will
- Page 110 and 111:
Nodes 101 Societies of Control . .
- Page 112 and 113:
PART II Edges —Well there it is.
- Page 114 and 115:
Edges The Datum of Cura I Imagine a
- Page 116 and 117:
Edges 107 In these visions of healt
- Page 118 and 119:
Edges 109 control it seeks to estab
- Page 120 and 121:
Edges 111 treatise: Machiavelli’s
- Page 122 and 123:
Edges 113 Joseph - Marie Jacquard h
- Page 124 and 125:
Edges 115 but that, in the guise of
- Page 126 and 127:
Edges 117 tension, duration, and in
- Page 128 and 129:
Edges 119 abstract, mathematical pr
- Page 130 and 131:
Edges 121 Consider current developm
- Page 132 and 133:
Edges 123 simply mean symmetrical c
- Page 134 and 135:
Edges 125 focuses on code in isolat
- Page 136 and 137:
Edges 127 player online games, and
- Page 138 and 139:
Edges 129 role of medicine is to re
- Page 140 and 141:
Edges 131 of the supernatural, a di
- Page 142 and 143:
Edges 133 proteins, processes that
- Page 144 and 145:
Edges 135 muted into quality,” wr
- Page 146 and 147: Edges 137 which cannot be cast into
- Page 148 and 149: Edges 139 the thing, a particular f
- Page 150 and 151: Edges 141 If Latour gives us a para
- Page 152 and 153: Edges 143 tion. Nondistinction effa
- Page 154 and 155: Edges 145 from the technological ve
- Page 156 and 157: Edges 147 spellings, grammatical er
- Page 158 and 159: Coda: Bits and Atoms Networks are a
- Page 160 and 161: Coda 151 robustness that centralize
- Page 162 and 163: Coda 153 tributed network form, jus
- Page 164 and 165: Coda 155 The point here is not that
- Page 166 and 167: Coda 157 ignored, and the network i
- Page 168 and 169: Appendix Notes for a Liberated Comp
- Page 170 and 171: Appendix 161 infinity palimpsest po
- Page 172 and 173: Appendix 163 singular unordered vit
- Page 174 and 175: lose DEVICE mutate SEQUENCE narcole
- Page 176 and 177: Notes Prolegomenon 1. For more on t
- Page 178 and 179: Notes 169 7. Gilles Deleuze, Negoti
- Page 180 and 181: Notes 171 clude GM foods, chemical
- Page 182 and 183: Notes 173 bodies, the new nondiscip
- Page 184 and 185: Notes 175 61. For a popular overvie
- Page 186 and 187: Notes 177 22. On December 1, 2003
- Page 188 and 189: Notes 179 6. Ibid., 2. 7. Ibid., 20
- Page 190 and 191: Electronic Mediations Katherine Hay
- Page 192 and 193: Index abandonment, 110- 11, 136 Abu
- Page 194 and 195: Index 185 body politic, 109- 11 Boe
- Page 198 and 199: Index 189 Health and Human Services
- Page 200 and 201: Index 191 Metzger, Gustav, 108 Mich
- Page 202 and 203: Index 193 poltergeist, 161 populati
- Page 204 and 205: Index 195 TCP/ IP. See Internet pro
- Page 206: Alexander R. Galloway is assistant