cosmopolis rivista di filosofia e politica
Cosmopolis menu cosmopolis rivista di filosofia e teoria politica

Networks of Power: The Second World and ICT

SUSAN MARET
Articolo pubblicato nella sezione La politica e le nuove tecnologie della comunicazione.
If I am right, we are now rapidly approaching a point at which, unless we radically alter our present course, our surviving democratic technics will be completely suppressed or supplanted, so that every residual autonomy will be wiped out, or will be permitted only as a playful device of government, like national ballotting for already chosen leaders in totalitarian countries.
Lewis Mumford (1964)[1]

In 1906, sociologist Georg Simmel wrote that secrecy «secures, so to speak, the possibility of a second world alongside of the obvious world»[2]. In this article, I explore Simmel's second world of secrecy and its relationship to Information and Communications Technology (ICT). Technology is often thought of as «autonomous»[3], independent of human influence, and ethically neutral[4]. Through various examples, I hope to convince my readers that it is also political, and assists in not only maintaining freedom of information and expression, but secrecy as the consciously willed or intentional concealment of information[5]. What I term twilight domains of information, censorship, redaction, propaganda[6]. surveillance, and espionage/counterespionage, hover between secrecy's second world and total transparency as partial secrets that occur «somewhere between deep concealment and full disclosure»[7]. In secrecy, as well as twilight, «only a small portion of the whole truth will be known to any single person»[8]: that is, censorship seesaws with freedom of expression, redaction[9] with context, propaganda[10], historical engineering[11] and historical delay with contemporary disclosure, surveillance with privacy, espionage and counterespionage with transparency of action. None of these twilight domains are exclusive, and perhaps even extend to lies and leaks; censorship is an integral part of propaganda[12] and influences exchange of information and self-determination; surveillance accompanies espionage or spying, and potentially interferes with one's person as property and civil rights. As such, these matters are worthy of our attention as a study into information politics and power.
What is power? In this article, I define power using philosopher Michel Foucault's concept: power is neither a possession, nor a capacity, arising not from a sovereign or a state, but everywhere as in a network creating new forms of knowledge and activity. Foucault writes that


What makes power hold good is the fact it doesn't weigh on us as a force that says no but that it traverses and produces things like forms of knowledge and discourse. It needs to be considered as a productive network[13].

ICT in the Obvious World

While ICT is increasingly utilized by governments, IGOs (intergovernmental organizations), transnational corporations, NGOs (nongovernmental organizations), social movements, and individuals to conceal second world information, technologies are also employed by these same groups to disclose public information required by law and regulation, promote openness initiatives and a spectrum of rights. ICT is defined as:


forms of technology that are used to transmit, store, create, share or exchange information. This broad definition of ICT includes such technologies as: radio, television, video, DVD, telephone (both fixed line and mobile phones), satellite systems, computer and network hardware and software; as well as the equipment and services associated with these technologies, such as videoconferencing and electronic mail[14].


By way of ICT, governments advance public knowledge of policies, programs, legislation, and laws, including freedom of information laws[15]. ICT is used creatively by other elements of Foucault's productive network, the grassroots, the public realm. For example, the fax machine and photocopier were used by protest movements and citizens to transmit and share information in the Former Soviet Union to disseminate samizdat, or «self publishing house.» This underground distribution network of uncensored literature that reflected the «mood of political discontent,» is completely unimaginable without ICT[16]. Other forms of ICT such as video have given human rights defenders the opportunity to «open the eyes of the world to human rights abuses»[17]; community television[18], radio (participatory radio, community radio, free radio, or alternative radio)[19], phones[20], and satellite communications[21] enhance information sharing and support alternatives to the mainstream media. Databases such as PlantGeneRisk, stores information on genetically engineered plants in the European Union, which provides a public right to know of risks of another technology[22]; The Tax Justice's Network Financial Secrecy Index[23] ranks and assigns secrecy scores of global financial transactions; public interest groups exploit freedom of information laws to obtain once secret information[24]. In this way, ICT is often viewed as a capacity builder and emancipatory medium, utilized as to share «democratic information,» progressive aims[25], identify corruption and challenges to civil and human rights.
With its emphasis on immediacy of communication and social media, the network society[26] flows via mobile and wireless technologies[27]. The Internet's World Wide Web transformed culture, and with it, power and knowledge. Collaboration underlying Wikipedia, YouTube, Facebook, MySpace, Internet Archive, and the free and open source software (FOSS) movement[28] not only gave birth to new knowledge, but rescued lost histories, generated a bottom up kind of experiential journalism, redefined property rights, and energized citizen science[29]. The participatory facet of the Net, with its crowd sourcing ability to deconstruct and build knowledge, is what Howard Rheingold sees as technologies of cooperation. Rheingold's Net is decentralized, self-organizing, and innovative[30]. There is altruism to this particular vision that carries over into the desire to make things better. If Francis Bacon's axiom that knowledge (and information) is power, and hence, empowering, then it is a natural step to link ICT to human development, educational attainment, and improvement in socioeconomic conditions. Another type of idealism, hacktivism or ethics of hacking, is framed as equalizing the tech divide[31], but also protecting information rights under Article 19 of the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights[32] in response to state sponsored censorship. Hactivism as a type of street justice has been justified by groups such as Anonymous and LulzSec in exacting retribution against companies and governments, even creators of child pornography Web sites[33] and the Mexican Drug Cartel are not exempt[34].
But it is netwar, outlined by David Ronfeldt and John Arquilla as a«style of conflict that depends heavily on information and communications technology, nonhierarchical organization, and tactics that are distinctly different from previous forms of civil-society conflicts»[35] that brought Twitterization to Arab Spring in documenting popular mobilizations[36] against the repressive regimes and state violence in Tunisia, Egypt, Bahrain, and Syria. ICT became a tool of outrage in sharing brutal attacks of Egyptian women and Syrian children. Anti-Berlusconi protests in response to bank bailouts went live on Facebook and Twitter; Occupy Wall Street (OWS) encampments throughout the U.S. shared communiqués and declarations via blogs, Skype, Twitter, and Facebook to document politics in progress and police violence from cell phone to Youtube, Vimeo, and Daily Motion. The London riots illustrated the influence of the Blackberry Messenger[37], where Twitter and Facebook were used for mass organizing in order to cleanup ravaged areas in the wake of turmoil[38]. Larry Diamond describes these uses of ICT as «liberation technology»[39].
Clearly ICT are established forms of sociopolitical communication, extending the narrative of transparency, civic engagement and reform. However, as Marshall McLuhan identifies, while these technologies are a means of processing experience and a means of storing and speeding information, they can «plausibly be regarded as weapons»[40].

ICT as Dual-Use

Secrecy as intentional concealment of information or power over information[41] is oft considered a necessary element in the affairs of state, and for a government to protect its security of information, borders, natural resources, technology, and citizens[42]. Historically, as political scientist Carl Friedrich points out «the manipulation of the ruled by the ruler, through secreting and through propaganda, is endemic in all political orders»[43]. But it is Friedrich's category of disfunctional secrecy that marks the difference between the functional uses of secrecy and its other: disfunctional secrecy cloaks misdeeds, questionable policies, and embarrassing actions. Tied to betrayal and corruption, but significantly, to a tampering of communications[44], disfunctional secrecy not only involves assaults on public trust and confidence in information and policies, but paves the way to conspiratorial parallel universes. These depictions illustrate that «power and knowledge directly imply one another»[45]. For example, the National Imagery and Mapping Agency (NIMA) «shutter control» over Ikonos satellite images raised questions as to U.S. policy in Afghanistan as well as questions regarding the ownership of information[46].
With the ability to level freedom of information with pixilated concealment, the study of ICT is also an investigation into technologies of political control. Technologies of political control involve military-intelligence-policing technologies, or those «technological aids» designed to injure, not kill, disarm, not wound, spy, gather, restrict, disguise, and store information[47]. Expanding on the previous definition of ICT in this article, aren't the database, CCTV[48], airport body scanner, GPS, the black-box voting machine, drone, and RFID also «forms of technology that are used to transmit, store, create, share or exchange information»? In fact, technologies of political control?
In this way, ICT is Janus-faced. ICT's dual-use[49] nature operating through «continuous control and instant communication» advances the capabilities of the control society[50]. Twilight domains of information, as well as Simmel's second world of secrecy, are at home in the control society, where surveillance, spying, encryption, hacking, and intelligence gathering require partitioning of information enjoined with stealth. Due to its resistance to checks and balances, secrecy is now associated with terrorism[51], for without transparency, there can be no reasoned deliberations on laws and policies[52]. Nevertheless, this complex system involves mystery, interacting to restrict ideas, modify behavior[53] and historical knowledge: people never remember, but the computer never forgets[54].

Mashup: The Productive Network

Following Foucault's idea that power is a creative force, the mashups (below) illustrate the network of relations that coexist between the second world, twilight, and freedom of expression. Although ICT encourages knowledge production and sharing from both the bureaucracy and the public, it is the countervailing other, secrecy and twilight, which establish rhizomatic «connections between semiotic chains, organization of power, and circumstances»[55]. It is interesting to note that David Lyons' research suggests that «paradoxically, surveillance expanded with democracy»[56]. We see Lyons' idea in the use of CCTV to secure social spaces and in crime prevention, but its use potentially violates privacy and autonomy. Further, databases are critical tools in scrutinizing corruption[57] and in preserving identity and memory[58], but can also be a source of Panopticism[59]. An essential means for the cyborg soldier and information warrior[60] to maintain information superiority[61], satellite technology documents forced evictions, government repression, and human rights violations in Zimbabwe, Nigeria, and Darfur[62].
Below is the playoff between the dual-use ICT, the second world, and twilight:

Censorship

Research indicates that countries are actively involved in Internet filtering[63] with online freedom compromised in 37 countries; «crackdowns on bloggers, increased censorship, and targeted cyberattacks often coincided with broader political turmoil, including controversial elections»[64].
Italy's «DDL intercettazioni» (Wiretapping Act) includes a requirement to all websites to publish, within 48 hours of the request and without any comment, a correction of any content that the applicant deems detrimental to his/her image. The law does not require an evaluation of the claim by an impartial third judge – the opinion of the person allegedly injured is all that is required, in order to impose such correction to any website[65].

ICT Workarounds

- Wikipedia removed the entirety of its Italy pages in protest of "DDL intercettazioni" (Wiretapping Act)[66].
- Psiphon encrypts Internet communications to avoid blocked or filtered content[67].
- Herdict uses crowdsourcing to determine Web site accessibility[68].
- As the first decentralized, "censorship-resistant" currency, Bitcoin is distributed via peer-to-peer computer network. Anonymous Internet users can complete financial transactions stored transparently in the public record. User accounts and transactions cannot be controlled by the third party[69].
- Hackerspace Global Grid proposed the development of a grid of low-cost ground stations that can be bought or built by individuals to bypass state-controlled Internet backbones[70].

Propaganda

Prepackaged news stories are complete, audio-video presentations that may be included in video news releases, or VNRs. They are intended to be indistinguishable from news segments broadcast to the public by independent television news organizations[71].
A Chinese official urged more «"forceful" Web controls to "guide public opinion and promote positive social values"»[72].

ICT Workarounds

- Through infobombing tactics, individuals flood the Net and other public spaces with differing perspectives.
- Collaborative ICT such as alternative media Web sites, wikis, blogs, and listservs build alternative knowledge systems.

Surveillance

ECHELON[73] «is a term associated with a global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses».
In 2007, Britain implemented 4.2 million CCTV cameras – one for every 14 people in the country – and 20 per cent of cameras globally. It has been calculated that each person is caught on camera an average of 300 times daily[74]. Within 200 yards of George Orwell's flat, there are 32 CCTV cameras[75].
Drone warfare secrecy[76].

ICT Workarounds

- Individuals and organizations encrypt their communications via Rubber-hose cryptanalysis, which creates individual partitions or layers each requiring a separate password[77] and PGP (Pretty Good Privacy)[78]. Human rights organizations encrypt their research using Martus[79].
- Sousveillance, or «watchful vigilance from underneath,» as proposed by Professor Steve Mann is inverse surveillance as «a counter to organizational surveillance.» Wearable computing devices generate different kinds of responses, and «new kinds of information in a social surveillance situation»[80].
- Sea Shepherd Conservation Society utilized drones to locate the Japanese whaling ship Nisshin Maru off Australia's western coast[81].
- Occupy Wall Street New York acquired a Parrot AR drone named the «occucopter.» The four-rotor helicopter can be purchased on Amazon.com and controlled with an iPhone[82].
- The Web site cryptome.org organizes critical materials from governments related to surveillance, censorship and secrecy; one of its projects is Cryptome CN, collects documents and information banned in the People's Republic of China.
- In response to Columbine shootings and other violent incidents in U.S. schools, Tyson Lewis suggests teaching critical surveillance literacy, which «enables students to recognize the interconnections between school practices and national policies. It is also important for teachers to open up a pedagogical space were students will feel comfortable expressing their opinions concerning school militarization and hypersurveillance»[83].
- Via freedom of information (FOI) laws[84] and investigative journalism, facts behind the U.S. drone program are revealed[85].
- The courts are used as a vehicle for release of government information[86].

Espionage/Counterespionage

GhostNet infected «at least 1,295 computers in 103 countries, of which close to 30% can be considered as high-value diplomatic, political, economic, and military targets»[87].

ICT Workaround

The Tor (Onion Router) software allows Internet users to transmit information and surf anonymously; WikiLeaks bootstrapped documents, supposedly stolen by Chinese hackers and/or spies using Tor to transmit the data[88].

Concluding Thoughts

Gilles Deleuze writes that it isn't a matter of whether the «old or new system is harsher or more bearable because there's a conflict in each between the ways they free us and enslave us.»[89] In this article, I offered cases regarding showing the dynamic dual-nature of ICT, one that encourages and sustains freedom of expression and free form exchange of ideas, and the other, which has an affiliation with secrecy and twilight information in the control society. In my simple read of Michel Foucault's analysis of power, ICT remains a means for secrecy and control, but also a transcendent conduit for communication across the sociopolitical spectrum. It is as philosophers Deleuze and Guattari observe: the secret must sneak, insert, or introduce itself into the arena of public forms; it must pressure them and prod known subjects into action.[90] While the future remains uncertain as to what shape action will take, ICT as a tool of power sparks the imagination and offers hope of possible, obvious worlds. It is up to us in the present to determine whether the path is dystopian, or participatory and deliberative.



[hr]
[1] L. MUMFORD, Authoritarian and democratic technics, in "Technology and Culture", 5 (1964), 1, pp. 1-8.
[2] G. SIMMEL, The sociology of secrecy and secret societies, in "The American Journal of Sociology", 11 (1906), 4, pp. 441-498.
[3] Cfr. A. FEENBERG A. HANNAY (eds.), The politics of knowledge, Indiana University Press, Bloomington 1995, and L. WINNER, Autonomous technology: Technics-out-of-control as a theme in political thought, MIT Press, Cambridge (MA) 1977.
[4] Cfr. B. RAPPERT, Assessing technologies of political control, in "Journal of Peace Research", 36 (1999), 6, pp. 741-750.
[5] Cfr. G. SIMMEL, The sociology of secrecy and secret societies, cit. [6] There are different types of propaganda: black, white and grey. Each type modifies information in some way. See S. MARET, On their own terms, http://www.fas.org/sgp/library/maret.pdf
[7] Based on Dennis F. Thompson's tacit silences, or «things better left unsaid.» (Cfr. Id., Democratic secrecy, in "Political Science Quarterly", 114 (1999), 2, pp. 181-193).
[8] L. MUMFORD, The pentagon of power, Harcourt Brace Jovanovich, New York 1970.
[9] Redaction is act or process of the blacking out, or removing, information in either declassified or sensitive documents.
[10] Cfr. J. ELLUL, Propaganda: The formation of men's attitudes, Eng. trans. by K. Kellen & J. Lerner, Knopf, New York 1965. Ellul writes that «for propaganda to be successful it must be total; all technical means (TV, radio, movies, advertising-now the Internet) must be exploited to create and reinforce myth. Without the mass media, there can be no modern propaganda»; Propaganda is a «psychological action, psychological warfare, re-education, brainwashing, and a public relations tool» (p.xiii).
[11] Cfr. N. CHOMSKY, Necessary illusions: Thought control in democratic societies, CBC Enterprises, Montreal (Quebec) 1989, pp. 197-206.
[12] Censorship takes two forms: 1. selection of information to support a particular viewpoint, or 2. deliberate manipulation or doctoring of information to create an impression different from the original one intended. Censorship is referred to as a negative form of propaganda. Without some form of censorship, propaganda would be difficult to imagine (Cfr. N. J. CULL - D. CULBERT - D. WELCH, Propaganda and mass persuasion: A historical encyclopedia, 1500 to the Present, ABC-CLIO, Santa Barbara (CA) 2003.
[13] M. FOUCAULT, Power/knowledge: Selected interviews and other writings, 1972-1977, edited and translated by C. Gordon, Pantheon Books, New York 1980.
[14] United Nations Educational, Scientific and Cultural Organization, Using ICT to develop literacy, Phongwarin Printing Ltd., Bangkok 2006. Available at: http://www.unescobkk.org/education/ict.
[15] Freedom of information laws are found on country Websites as well as Freedom Info.org, http://www.freedominfo.org/; In the United States, the Obama administration created its Open Government Dashboard to reform federal agency information policies and encourage citizen participation. See http://www.whitehouse.gov/open/documents/leading-practices-open-govt-plans.
[16] Cfr. F. J. M. FELDBRUGGE, Samizdat and political dissent in the Soviet Union, A. W. Sijthoff, Leyden 1975, and E. MOROZOV, The net delusion: the dark side of Internet freedom, PublicAffairs, New York 2011,).
[17] From Witness, who partners with human rights workers to document abuses via video and documentaries, http://www.witness.org/about-us/witness-background.
[18] For a list of community access TV stations, see http://www.communitymedia.se/cat/.
[19] A list of stations in countries is located at the World Association of Community Radio Broadcasters (AMARC), http://www.amarc.org/index.php; Less formal stations are Radio Insurgente of the National Zapatista Liberation Army, http://www.radioinsurgente.org.
[20] Cell phone text messaging (SMS) was used during the 2004 United States Democratic and Republican National Conventions (RNC) by protesters using TXTmob. During the week of the RNC, «some mobile phone operators (T- Mobile, Sprint) may have blocked TxtMob messages»; Cfr. T. HIRSCH- J. HENRY, TXTmob: Text messaging For protest swarms, paper for the 2005 CHI (Conference on Human Factors in Computing Systems): Technology, Safety, Community, Portland, Oregon, April 2-7 2005, http://web.media.mit.edu/~tad/pub/txtmob_chi05.pdf and http://web.media.mit.edu/~tad/htm/txtmob.html. SMS is also used in agriculture outreach to rural farmers to farmers; see http://www.ictinagriculture.org/ictinag/content/research-impact-0. Flashmobs and smartmobs also use cell and wireless technology.
[21] Community television and radio often uses satellites, such as Deep Dish TV in the U.S., http://www.deepdishtv.org/About/Default.aspx;satellite phones are used for global positioning (GPS).
[22] http://www.testbiotech.org/en/node/596.
[23] http://www.financialsecrecyindex.com.
[24] The FOIA Project, http://foiaproject.org/2011/12/28/34-new-foia-court-documents-2/.
[25] See Using mobile phones for citizen media in the New Tactics in Human Rights Project website: http://www.newtactics.org/en/dialogue/using-mobile-phones-citizen-media and the New Tactics Database: http://www.newtactics.org/en/tactics/database.
[26] Manuel Castells (2001) writes the «network society itself is, in fact, the social structure which is characteristic of what people had been calling for years the information society or post-industrial society… it's not just about networks or social networks, because social networks have been very old forms of social organization. It's about social networks which process and manage information and are using micro-electronic based technologies.» Cfr. H. KREISLER, Identity and change in the network society, Conversation with Manuel Castells, "Conversations with History" Series, Institute of International Studies, UC Berkeley, http://globetrotter.berkeley.edu/people/Castells/castells-con4.html.
[27] Pew Research Center, Global digital communication, in "Pew Global Attitudes Project", December 20 2011, http://www.pewglobal.org/2011/12/20/global-digital-communication-texting-social-networking-popular-worldwide/.
[28] UNESCO Communication and Information, http://www.unesco.org/new/en/communication-and-information/.
[29] See projects run through BOIN software, https://boinc.berkeley.edu/projects.php and Climate Prediction, http://climateprediction.net/.
[30] H. RHEINGOLD, Smart mobs: The next social revolution, Perseus Publishing, Cambridge (MA) 2002.
[31] Cfr. Hackers for Charity, http://johnny.ihackstuff.com/.
[32] Cfr. The Hacktivismo Declaration, http://www.hacktivismo.com/public/declarations/en.phpHackers.
[33] Cfr. BBC, Hackers take down child pornography sites, October 24, 2011, http://www.bbc.co.uk/news/technology-15428203.
[34] Cfr. BBC, "Hackers" threaten Mexican Drug Cartel in YouTube film, October 31, 2011, http://www.bbc.co.uk/news/technology-15520912.
[35] P. DE ARMOND, (2001), Netwar in the emerald city: WTO protest strategy and tactics, in J. ARQUILLA-D. RONFELD (eds.), Networks and netwars: The future of terror, crime, and militancy, Rand Corporation, Santa Monica (CA) 2001, http://www.rand.org/pubs/monograph_reports/MR1382.html and J. ARQUILLA-D. RONFELD, Advent of the netwar (revisited), ivi.
[36] Cfr. S. KELLY- S. COOK (eds.), Freedom on the Net 2011. A Global Assessment of Internet and Digital Media, Freedom House Study, April 18, 2011, http://www.freedomhouse.org/template.cfm?page=70&release=1398.
[37] Cfr. M. BUTCHER, How Blackberry, not Twitter, fuelled the fire under London's riots, in his blog "Techcrunch Europe", August 8, 2011, http://eu.techcrunch.com/2011/08/08/how-blackberry-not-twitter-fuelled-the-fire-under-londons-riots/
[38] Cfr. BBC, England riots: Twitter and Facebook users plan clean-up, August 9, 2011, http://www.bbc.co.uk/news/uk-england-london-14456857.
[39] L. DIAMOND, Liberation technology, in "Journal of Democracy," 21(2010), 3, pp. 69-83.
[40] M. MCLUHAN, Understanding media: The extensions of man, Signet Books, New York 1964, p. 299.
[41] Cfr. S. Bok, Secrets: On the ethics of concealment and revelation, Vintage Books, New York 1989; related to bureaucratic failures and secrecy, see D. VAUGHAN, The Challenger launch decision: Risky technology, culture, and deviance at NASA, University of Chicago Press, Chicago 1996.
[42] Secrecy Report Card (2011) illustrates the relationship of secrecy and national security in the United States, http://www.openthegovernment.org/node/3226
[43] C. FRIEDRICH, The pathology of politics, Harper Row, New York 1972, pp. 189-190.
[44] Cfr. ivi, p. 191.
[45] M. FOUCAULT, Discipline and punish: The birth of the prison, Engl. trans. by A. Sheridan, Vintage Books, New York 1979.
[46] NIMA purchased the images from Space Imaging, the only company collecting U.S. commercial high-resolution satellite imagery over Afghanistan. Cfr. E. SADEH, Spacepower and the environment, in C. D. LUTES - P.L. HAYS (eds), Toward a theory of spacepower: Selected essays, National Defense University Press, Washington DC 2011, http://www.ndu.edu/press/space-Ch13.html.
[47] Cfr. B. RAPPERT, Assessing technologies of political control, cit., and David Lyons many works; Also see Department of Defense's Joint Non-Lethal Weapons Program: http://jnlwp.defense.gov/about/purpose.html
[48] N. LA VIGNE ET AL. Evaluating the use of public surveillance cameras for crime control and prevention, Urban Institute, Justice Policy Center, Washington DC 2011, http://www.urban.org/publications/412401.html.
[49] See J. FELBINGER - J. REPPY, Classifying knowledge, Creating secrets: Government uses for dual-use technology, in "Research in Social Problems and Public Policy Series", vol. 19 (2011): Government Secrecy, edited by S. Maret, pp. 277-299. The authors define dual-use technology as military and public, linking dual-use to exports; for the purposes of this work, I link dual-use to technologies of control and separate it use from exports.
[50] G. DELEUZE, Negotiations, Columbia University Press, New York 1995, p. 174.
[51] S. MANN, Sousveillance, 2002, http://wearcam.org/sousveillance.htm.
[52] A. GUTMANN - D. THOMPSON, Why deliberative democracy?, Princeton University Press, Princeton 2004.
[53] Cfr. G. SIMMEL, The sociology of secrecy and secret societies, cit. Simmel is one of the first social scientists to write on secrecy's influence on relationships.
[54] Cfr. M. MCLUHAN, Counterblast, Harcourt Brace and World, New York 1969.
[55] G. DELEUZE - F. GUATTARI, A thousand plateaus: Capitalism and schizophrenia, Eng. trans. by B. Massumi, University of Minnesota Press, Minneapolis 1987, p. 11.
[56] D. LYON, The electronic eye: The rise of the surveillance society, University of Minnesota Press, Minneapolis 1994.
[57] See Transparency International's GATEWAY Database: http://gateway.transparency.org/tools.
[58] Physicians for Human Rights, U.S. team transfers DNA database to Salvadoran group searching for children who disappeared in civil war, http://physiciansforhumanrights.org/press/press-releases/news-2006-07-06.html.
[59] The U.S. Department of Homeland Security proposal to form a National Operations Center (NOC), «a new DHS system of records titled, Publicly Available Social Media Monitoring and Situational Awareness Initiative System of Records,» Federal Register, February 1, 2011, http://edocket.access.gpo.gov/2011/2011-2198.htm; also recall the Information Awareness Office, https://www.fas.org/irp/agency/dod/poindexter.html.
[60] C. HABLES GRAY, Cyborg citizen: Politics in the posthuman age, Routledge, New York 2001 and M. LIBICKI, Information war, information peace, in "Journal of International Affairs", 51 (1998), 2, pp. 411-428.
[61] Cfr. DoD Dictionary of Military Terms (2011), http://www.dtic.mil/doctrine/dod_dictionary/.
[62] Cfr. E. W. LEMPINEN, Pioneering AAAS Project Finds Strong Evidence of Zimbabwe Repression, in the American Association for the Advancement of Science website, May 30, 2006, http://www.aaas.org/news/releases/2006/0530zim.shtml and Satellite Technology and Human Rights, in Amnesty International's "Eyes on Darfur Project" website: http://www.eyesondarfur.org/satellitetech.html.
[63] OpenNet Regional Overviews, http://opennet.net/research/regions.
[64] Cfr. S. KELLY- S. COOK (eds.), Freedom on the Net 2011. A Global Assessment of Internet and Digital Media, cit.
[65] Wikipedia: Comunicato 4 ottobre 2011/en, https://it.wikipedia.org/wiki/Wikipedia:Comunicato_4_ottobre_2011/en
[66] Ibidem.
[67] Psiphon, http://psiphon.ca/?page_id=48.
[68] Herdict, http://www.herdict.org/.
[69] D. BAROK, Bitcoin: censorship-resistant currency and domain name system to people, in Piet Zwart Institute's (Rotterdam) website, July 20, 2011, http://pzwart3.wdka.hro.nl/wiki/User:Dusan_Barok/Bitcoin:_censorship-resistant_currency_and_domain_name_system_to_the_people.
[70] Cfr. D. MEYER, Hackers plan space satellites to combat censorship, December 30, 2011, BBC, http://www.bbc.co.uk/news/technology-16367042.
[71] U.S. General Accountability Office, Video news releases: Unattributed prepackaged news stories violate publicity or propaganda prohibition, May 12, 2005, http://www.gao.gov/htext/d05643t.html and D. FARSETTA - D. PRICE, Still not the news: Stations overwhelmingly fail to disclose VNRs, in Center for Media and Democracy's website, November 14, 2006, http://www.prwatch.org/fakenews2/execsummary.
[72] Staff, Top China official urges more "forceful" web controls, in "Spacewar", December 11, 2011, http://www.spacewar.com/reports/Top_China_official_urges_more_forceful_web_controls_999.html.
[73] For background, see Federation of American Scientists, https://www.fas.org/irp/program/process/echelon.htm.
[74] Cfr. George Orwell, Big Brother is watching your house, in "London Evening Standard", http://www.thisislondon.co.uk/news/article-23391081-george-orwell-big-brother-is-watching-your-house.do.
[75] Ibidem.
[76] J. MAYER, The predator war: What are the risks of the CIA's covert drone program?, in "New Yorker", October 26, 2009, http://www.newyorker.com/reporting/2009/10/26/091026fa_fact_mayer
[77] Julian Assange is credited with developing Rubber Hose; see The rubber hose technique, http://www.anonymous-proxies.org/2011/03/file-encryption-tactics-rubber-hose.html.
[78] Letters from human rights organizations to Phil Zimmerman, available at http://www.philzimmermann.com/EN/letters/index.html.
[79] Benetech, The Martus concept, 2010, https://www.martus.org/concept/.
[80] S. MANN - J. NOLAN -, B. WELLLMAN, Sousveillance: Inventing and using wearable computing devices for data collection insurveillance environments, in "Surveillance & Society", 1 (2003), 3, pp. 331-355, http://www.surveillance-and-society.org.
[81] Reuters, Sea Shepherd says drones find, photograph Japan's whaling fleet, December 24, 2011, http://www.reuters.com/article/2011/12/25/australia-japan-whaling-idUSB69119620111225.
[82] N. SHARKEY - S. KNUCKEY, OWS fights back against police surveillance by launching "Occucopter" citizen drone, in "Alternet," December 22, 2011, http://tinyurl.com/6sfj3wy.
[83] T. LEWIS, Critical Surveillance Literacy, in "Cultural Studies <=> Critical Methodologies", 6 (2006), 2, p. 263, http://csc.sagepub.com/content/6/2/263.abstract.
[84] Cfr. the FOIA Project, http://foiaproject.org/2011/12/28/34-new-foia-court-documents-2/.
[85] Cfr. ACLU (American Civil Liberties Union), Drone Foia - Department of Defense Document, http://www.aclu.org/drone-foia-department-defense-documents, and J. MAYER, The predator war: What are the risks of the CIA's covert drone program?, cit.
[86] Cfr. EPIC (Electronic Privacy Information Center), EPIC Sues DHS Over Covert Surveillance of Facebook and Twitter, https://epic.org/2011/12/epic-sues-dhs-over-covert-surv.html.
[87] SecDev Group & Citizen Lab, Tracking GhostNet: Investigating a cyber espionage network, in "Information Warfare Monitor", March 29, 2009, http://www.infowar-monitor.net/ghostnet; also see S. HAGARAJA - R. ANDERSON, The snooping dragon: social-malware surveillance of the Tibetan movement, Technical Report Number 746, March 2009, University of Cambridge Computer Laboratory, http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf.
[88] K. ZETTER, WikiLeaks was launched with documents intercepted from Tor, in "Wired", June 1, 2010, http://www.wired.com/threatlevel/2010/06/wikileaks-documents/ and Tor, https://www.torproject.org/about/torusers.html.en.
[89] G. DELEUZE, Negotiations, cit., p. 178.
[90] Cfr. G. DELEUZE - F. GUATTARI, A thousand plateaus: Capitalism and schizophrenia, cit., p. 287.

torna su