14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

20 Prolegomenon<br />

sovereign is globally networked, extending into all countries and all<br />

social contexts as a localized native (not as an interloper or occupying<br />

force), it is at the same time able to emit a single command decision,<br />

from a single location. <strong>The</strong> network is smart enough to distinguish<br />

between distributed organizational mechanics and directed<br />

commands, for in fact they are the same thing. In this way, a networked<br />

sovereign is able to “flip the switch” and watch as command decisions<br />

propagate rapidly around the globe. An example today would be something<br />

like an operating system security update. It emanates from a<br />

single networked sovereign (a s<strong>of</strong>tware company) but is a type <strong>of</strong><br />

material command that is issued in a global, relatively instantaneous<br />

manner. Of course, the antagonists in this scenario, e - mail worms or<br />

zombie botnets, operate through exactly the same logic. Global - single<br />

commands require an exceedingly high level <strong>of</strong> technological organization<br />

and interconnection. Today they appear mainly as exploitations<br />

<strong>of</strong> technoscientific “opportunities” or are issued as patches or<br />

therapies to combat such material threats, but they may also be issued<br />

in the cultural sectors, representing a greater evolution <strong>of</strong> today’s<br />

strategies <strong>of</strong> “just - in - time production” and trend spotting and rapid<br />

response. If networked sovereigns wield tactics like the global - single<br />

command event, it is interesting to ponder what an asymmetrical response<br />

to such an event would look like. Geography alone will not<br />

save you. Nor will agility or guile. <strong>The</strong>se are the questions addressed<br />

in the following sections on liberation and counterprotocological<br />

practices.<br />

So networks and sovereignty are not incompatible. In fact, quite the<br />

opposite: networks create the conditions <strong>of</strong> existence for a new mode <strong>of</strong><br />

sovereignty. America is merely the contemporary figurehead <strong>of</strong> sovereignty -<br />

in - networks.<br />

While in the past networks may have posed significant threats to<br />

power in everything from the grassroots social movements <strong>of</strong> the 1960s<br />

to guerrilla armies and terrorist organizations, it is not the case today.<br />

<strong>Networks</strong> are not a threat to American power. In fact, the opposite is<br />

true: networks are the medium through which America derives its

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!