The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
20 Prolegomenon<br />
sovereign is globally networked, extending into all countries and all<br />
social contexts as a localized native (not as an interloper or occupying<br />
force), it is at the same time able to emit a single command decision,<br />
from a single location. <strong>The</strong> network is smart enough to distinguish<br />
between distributed organizational mechanics and directed<br />
commands, for in fact they are the same thing. In this way, a networked<br />
sovereign is able to “flip the switch” and watch as command decisions<br />
propagate rapidly around the globe. An example today would be something<br />
like an operating system security update. It emanates from a<br />
single networked sovereign (a s<strong>of</strong>tware company) but is a type <strong>of</strong><br />
material command that is issued in a global, relatively instantaneous<br />
manner. Of course, the antagonists in this scenario, e - mail worms or<br />
zombie botnets, operate through exactly the same logic. Global - single<br />
commands require an exceedingly high level <strong>of</strong> technological organization<br />
and interconnection. Today they appear mainly as exploitations<br />
<strong>of</strong> technoscientific “opportunities” or are issued as patches or<br />
therapies to combat such material threats, but they may also be issued<br />
in the cultural sectors, representing a greater evolution <strong>of</strong> today’s<br />
strategies <strong>of</strong> “just - in - time production” and trend spotting and rapid<br />
response. If networked sovereigns wield tactics like the global - single<br />
command event, it is interesting to ponder what an asymmetrical response<br />
to such an event would look like. Geography alone will not<br />
save you. Nor will agility or guile. <strong>The</strong>se are the questions addressed<br />
in the following sections on liberation and counterprotocological<br />
practices.<br />
So networks and sovereignty are not incompatible. In fact, quite the<br />
opposite: networks create the conditions <strong>of</strong> existence for a new mode <strong>of</strong><br />
sovereignty. America is merely the contemporary figurehead <strong>of</strong> sovereignty -<br />
in - networks.<br />
While in the past networks may have posed significant threats to<br />
power in everything from the grassroots social movements <strong>of</strong> the 1960s<br />
to guerrilla armies and terrorist organizations, it is not the case today.<br />
<strong>Networks</strong> are not a threat to American power. In fact, the opposite is<br />
true: networks are the medium through which America derives its