14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

194 Index<br />

Rumsfeld, Donald, 134<br />

Russia, 6– 7<br />

Saigon, 4<br />

SARS, 73, 88– 91, 93, 95, 175n65<br />

Schmitt, Carl, 63, 65– 66<br />

Schneider, Florian, 167n1<br />

Schultz, Pit, 13<br />

scramble, 166<br />

search, 126<br />

search engine, 74, 132, 168n5<br />

Seattle, 4, 114, 151, 179n10<br />

security, 74– 77, 87, 101, 116. See<br />

also U.S. Department <strong>of</strong><br />

Homeland Security<br />

self, 65– 70<br />

selfDestruct, 166<br />

September 11, 2001, 2– 3, 11, 92, 120<br />

Shannon, Claude, 55– 57, 171n23<br />

Shirky, Clay, 18<br />

Shockwave Rider, <strong>The</strong> (Brunner), 83<br />

signification, 146– 47<br />

Simondon, Gilbert, 59, 172n28<br />

SimCity, 122<br />

SimSARS, 119– 22<br />

Singapore, 89– 90, 151<br />

single, 9<br />

singular, 162<br />

singularity, 69, 149– 50<br />

size (graph theory), 31<br />

smallpox, 94<br />

Smith, Adam, 72, 106<br />

Smith, Clark Ashton, 177n41<br />

“Sobig.F,” 83<br />

Social Contract, <strong>The</strong> (Rousseau),<br />

109<br />

social movements, 14, 20<br />

social network theory, 39. See also<br />

graph theory<br />

society: <strong>of</strong> control, 35– 36, 41, 57,<br />

59– 60, 73, 78, 82, 101; disci pli -<br />

nary, 35– 36, 41, 115; network,<br />

14, 170n14<br />

Socrates, 37<br />

s<strong>of</strong>tware, 176n17; open source,<br />

124– 26<br />

sovereignty, 1, 3– 4, 11– 12, 19– 22,<br />

29, 35, 38– 39, 67, 74, 76, 109–<br />

10, 114– 15, 130– 31, 149, 169n11,<br />

178n3, 179n13; distributed, 46–<br />

47; medical, 109. See also power<br />

Soviet Union, 2, 14– 16<br />

spam, 84, 145– 47<br />

speed, 137<br />

Spinoza, Baruch, 19, 111, 142, 150,<br />

169n12, 178n3<br />

spyware, 15<br />

Stallabrass, Julian, 124<br />

standard. See protocol<br />

state, 14, 21, 114, 125, 136, 150.<br />

See also power<br />

State <strong>of</strong> Emergency, 114<br />

state <strong>of</strong> exception, 110, 169n11<br />

state <strong>of</strong> nature, 67, 111, 178n3. See<br />

also nature<br />

statistics, 72– 74, 76<br />

struggle, 166<br />

subculture, 22<br />

subject, 38, 60, 62, 74, 93, 135– 36,<br />

140, 152<br />

subnetwork, 34, 91<br />

substance, 36– 37, 46, 57, 138, 142,<br />

169n9<br />

subtraction, 61<br />

suicide bomber, 22, 179n13<br />

Superfold, 175n67<br />

surveillance, 10, 26, 124; camera,<br />

135; medical, 120– 22<br />

swarm, 5, 13, 15, 17, 25, 41, 66– 70,<br />

98, 101, 114– 15, 126, 141,<br />

179n11. See also rhizome<br />

symmetry, 14, 18, 21– 22, 63, 65– 70,<br />

122– 23, 152. See also asymmetry<br />

systems theory, 34, 55– 57, 171n23<br />

tactics, 135– 37<br />

Taiwan, 89<br />

“tapeworm,” 82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!