Databody economy and the surveillance state

Databody economy Surveillance state
Promise Reality Promise Reality
universal prosperity universal commercialisation total security total control
frictionless market pacified society political harmony death of democracy


The glamour of the data body economy clouds economic practices which are much less than glamorous. Through the seizure of the data body, practices that in the real political arena were common in the feudal age and in the early industrial age are being reconstructed. The data body economy digitally reconstructs exploitative practices such as slavery and wage labour. However, culturally the data body is still a very new phenomenon: mostly, people think if it does not hurt, it cannot be my body. Exploitation of data bodies is painless and fast. Nevertheless, this can be expected to change once the awareness of the political nature of the data body becomes more widespread. As more and more people routinely move in digitised environments, it is to be expected that more critical questions will be asked and claims to autonomy, at present restricted to some artistic and civil society groups trying to get heard amidst the deafening noise of the commercial ICT propaganda, will be articulated on a more general level.

The more problematic aspect of this development may be something else: the practices of the data body economy, themselves a reconstruction of old techniques of seizure, have begun to re-colonise real political space. Simon Davis, Director of the London-based privacy campaigners Privacy International, one of the foremost critics of modern-day technologies of surveillance and data capturing, has warned against the dangers of a loss of autonomy and undermining of civic rights that are being generated when workplaces are clogged with digital equipment allowing the constant monitoring and surveillance of workers. Unless current trends towards data capturing remain unchecked, the workplace of the future will have many features of the sinister Victorian workhouses that appear Charles Dickens novels, where any claims for autonomy were silenced with references to economic efficiency, and the required discipline imposed by a hierarchy of punishments.

The constant adaptation process required from the modern individual has anonymised and structuralized punishment, which now appears in the guise of error messages and the privatisation of risk.

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611761/100438659784
 
How the Internet works

On the Internet, when you want to retrieve a document from another computer, you request a service from this computer. Your computer is the client, the computer on which the information you want to access is stored, is called the server. Therefore the Internet's architecture is called client-server architecture.

A common set of standards allows the exchange of data and commands independent from locations, time, and operating systems through the Internet. These standards are called communication protocols, or the Internet Protocol Suite, and are implemented in Internet software. Sometimes the Internet Protocol Suite is erroneously identified with TCP/IP (Transmission Control Protocol / Internet Protocol).

Any information to be transferred is broken down into pieces, so-called packets, and the Internet Protocol figures out how the data is supposed to get from A to B by passing through routers.

Each packet is "pushed" from router to router via gateways and might take a different route. It is not possible to determine in advance which ways these packets will take. At the receiving end the packets are checked and reassembled.

The technique of breaking down all messages and requests into packets has the advantage that a large data bundle (e.g. videos) sent by a single user cannot block a whole network, because the bandwidth needed is deployed on several packets sent on different routes. Detailed information about routing in the Internet can be obtained at http://www.scit.wlv.ac.uk/~jphb/comms/iproute.html.

One of the Internet's (and of the Matrix's) beginnings was the ARPANet, whose design was intended to withstand any disruption, as for example in military attacks. The ARPANet was able to route data around damaged areas, so that the disruption would not impede communication. This design, whith its origin in strategic and military considerations, remained unchanged for the Internet. Yet the design of the ARPANet's design cannot be completely applied to the Internet.

Routing around depends on the location of the interruption and on the availability of intersecting points between networks. If, for example, an E-mail message is sent from Brussels to Athens and in Germany a channel is down, it will not affect access very much, the message will be routed around this damage, as long as a major Internet exchange is not affected. However, if access depends on a single backbone connection to the Internet and this connection is cut off, there is no way to route around.

In most parts of the world the Internet is therefore vulnerable to disruption. "The idea of the Internet as a highly distributed, redundant global communications system is a myth. Virtually all communications between countries take place through a very small number of bottlenecks, and the available bandwidth isn't that great," says Douglas Barnes. These bottlenecks are the network connections to neighboring countries. Many countries rely on a one single connection to the Net, and in some places, such as the Suez Canal, there is a concentration of fiber-optic cables of critical importance.

TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611791/100438659870
 
Edward Herman

Edward S. Herman is Professor Emeritus in Finance, Wharton School, University of Pennsylvania. Author of several books like The Myth of the Liberal Media: An Edward Herman Reader or Manufacturing Consent: The Political Economy of the Mass Media (he wrote that book - and others - together with Noam Chomsky).

INDEXCARD, 1/2
 
McCarthy

Born in Grand Chute, Wisconsin, Joe McCarthy graduated from Marquette in 1935. In 1939, he won election as a circuit court judge. During World War II, he enlisted in the Marines and served in the Pacific. In 1944, he campaigned for senator but lost in the Republican primary. In 1946, he ran for Wisconsin's other senate seat.

In a 1950 speech, McCarthy entered the public spotlight by claiming that communists had "infested" the State Department, dramatically waving a sheet of paper which purportedly contained the traitors' names. A special Senate committee investigated the charges and found them groundless. Unfazed, McCarthy used his position to wage a relentless anti-communist crusade, denouncing numerous public figures and holding a series of highly confrontational hearings, ruining the careers of many people.

He died at the age of 49 of complications related to alcoholism.

http://us.history.wisc.edu/hist102/bios/31.html

http://us.history.wisc.edu/hist102/bios/31.ht...
INDEXCARD, 2/2