The
Datum of Cura I
The
authors discuss similarities between computer viruses and biological epidemics
within the context of how they are displayed. Forced to “care for the most
misanthropic agents of infection and disease, one must curate that which eludes
the cure” (p. 106) for if the disease was cured, there would be nothing left to
display. Therefore, the best curator would necessarily be the most careless,
the one incapable of exacerbating the virus. Caring for the virus vs. caring for those infected. The political
economy in the 1700s (see Ricardo, Smith, and Malthus) was based on a
correlation between the health of the population and the wealth of the country.
Today’s public health has moved toward the idea of caring for health information
and ensuring that “the biological bodies of the population correlate to the informatics
patterns on the screen” (p. 107). Statistics, rather than bodies, are central.
The
Datum of Cura II
Foucault notes
that curating entails a form of governance- caring for oneself would also benefit
others through self-transformation. Becoming the best individual you can be
will undoubtedly benefit society (so long as the best you can be is good- what
about people’s whose best still sucks?). Yet, self destruction is inherent with
self-transformation
http://www.guardian.co.uk/artanddesign/2009/sep/28/gustav-metzger-auto-destructive
. Liu calls this “viral aesthetics” where the distinction between production
and destruction are blurred. In the above link, an exhibit of Metzger’s work
involves the demolition of an automobile. Its destruction becomes the art. Curare (Latin for to care) is the point
where control and transformation intersect. “Is there a certain ‘carelessness’
to curare?” (p. 109)
Sovereignty
and Biology I
In politics, the body is often used as a
metaphor for political organization. For Plato, the primary threat to the body
politic was the move from concerns about justice to those “of wealth (oligarchy)
and concerns of appetites (democracy) (p. 109). The excess of these concerns
results is disease of the political body, similar to excess bile and phlegm in
the physical body. Lawmakers must work to avoid these symptoms altogether but
in the event they appear, should eradicate them “cells and all.” Our knowledge
of the physical body has changed since the time of Plato, so does this mean
that our understanding of the political body has also changed? Should it change?
Sovereignty
and Biology II
The model of sovereignty
proposed by Hobbes in Leviathan, where
citizens constitute the body and the sovereignty the head raises a fundamental
question of political thought: can a political collectivity exist without transferring
its rights to a supreme ruler? One of the ways that sovereignty maintains
political power is through the continual identification of biological threats.
In doing so, the sovereignty can justify enacting stronger controls over
citizens by protecting them from threats to the health of the population. The medicalization
of politics oversees the behaviors,
conduct, discourse, desires, etc. of biology occurs where discipline and
sovereignty meet, a place which challenges the between the good of the
individual and the good of the collective.
Abandoning
the Body Politic
The body politic
has two states: (1) Constitutive- where the body politic is assembled through
the “social contract” based on securing life (2) Dissolution- chaos, a return
to the “state of nature,” sovereignty of the people, the dark side of the
constitutive body. These two states feed into each through war. “Peace is waging a secret.” Abandoning the
body politic means deserting the military foundations of politics and also opening
the body to its own abandon. “What is left is an irremediable scattering, a
dissemination of ontological specks”
(p.111).
The
Ghost in the Network
Heterogeneous
network phenomena can be understood through the identification of commonalities
in shared particular patterns- “a set of relations between dots (nodes) and
lines (edges) (p. 112). Thus, organization gives shapes to matter and serves as
a means to inform (in-form). The living network can also be viewed in political
terms. There is not a central node that sits in the middle and
monitors/controls every link and node. A single node cannot break the web. A scale-free network is a web without a
spider. For politics to be viewed in a natural sense, networks need to be seen
as an unavoidable consequence of their evolution.
Birth
of the Algorithm
An algorithm
is a type of visible articulation of any given processor’s machinic grammar.
Political
Animals
Biology is a
prerequisite for politics (Aristotle). If the human being is a political
animal, are there also animal politics? Vocabularies of biology retain the
remnants of sovereignty: the queen bee, the drone. But, what about swarm
intelligence where there is no centralized power, but only an instance of
self-organization?
Sovereignty
and the State of Emergency
“Modern
sovereignty is based not on the right to impose laws but on the ability to
suspend the law, to claim a state of emergency” (p.115). Both sides in a state
of emergency rely on network management- either in destabilizing key nodes or
fortifying them.
Epidemic
and Endemic
The
distinction between emerging infectious disease and bioterrorism based on
cause: one was naturally occurring, and the other resulted from direct human
intervention has been muddled if not fully abandoned. In its place, the U.S.
government has developed an inclusive approach to biopolitics. Regardless of
the context, the role of the government is to alert and respond to biological
threats. What matters most is what is at stake, which is always, life itself.
To achieve this aim, “medical security” seeks “to protect the population,
defined as a biological and genetic entity, from any possible biological
threat, be it conventional war or death itself” (p.116). The biological threat
is always present.
Network
Being
Information networks are
often described as a “global village” or a “collective consciousness.” These
references to networks somehow being
alive bring up questions of what being actually means. The authors posit
two questions: At what point does the difference between “being” and “life”
implode? What would be the conditions for the nondistinction between “being”
and “life”? They recognize two problems with the distinctions: (1) Life
sciences are faced with anomalies where living organisms cross species barriers
and questions of what it means to be alive, as in the case of a virus. For
Heidegger, ‘life” and “being” are separate from but dependent upon each other. In
network science, however, the concept of “being” is arrived at from a privative
definition of “life.” In this sense, all networks form the same animal: a graph
or a network. In turn, network science can study all networks as the same type
of being. The impact of this view of network
being is confused. Does the experience of being in a network constitute
network phenomenology (where occurrences are shared)? Does it mean the
existence of properties that differ across networks? The only “life” that is
specific to networks is their “being” a network.
Good
Viruses (SimSARS I)
Network-based
strategies are being developed on all levels. Computer security uses network
solutions to address network threats in the world of online viruses. This
behind the scenes war is invisible to most users but is in constant motion. Similarly,
epidemiologists understand how infectious diseases are spread effectively through
a variety of networks. Public health agencies in turn, use these same networks
as instruments of awareness and prevention. Caution must be exercised in
utilizing these networks to avoid widespread panic or political hype. In the
post 9/11 United States, infectious disease and bioterrorism are inevitably
linked. In doing so, questions of a new biopolitical war or a new medical terror
are raised. “Good” viruses introduced to combat emerging infectious diseases
are administered through the same networks as the disease, but will only
succeed if its rate of infection is greater than the bad virus.
Medical
Surveillance (SimSARS II)
Developments
in medical surveillance are representative of the intensive nature of networks. The Center for Disease Control (CDC)
is working to develop “syndromic surveillance” where the goal is to implement a
real-time, nationwide system for detecting anomalies in public health data
which could signal a possible outbreak or bioterrorist attack. In this case, “an
information network is used to combat a biological network” (p. 121). Similar
the World Health Organization’s Global Outbreak Alert and Response Network
works to insure that potential threats (either naturally occurring or
intentionally caused) are quickly verified and information shared through the
Network. Medical surveillance in itself is not problematic, but could become
controversial when what constitutes “health data” is disputed. “In the informatic
mode, disease is always virtual (p.
122) which creates a permanent state of emergency. Disease is always looming
but kept just out of reach.
Feedback
versus Interaction I
Two models
typify the evolution of two-way communication in mass media. In the first model
(feedback), information flows in one direction- from the public to the institution.
Two-way communication (interaction) is seen in the second model. Here
communication occurs within a system of communicative peers where each peer can
physically affect another.
Feedback
versus Interaction II
Feedback and
interaction also correspond to two different models of control. Feedback
corresponds to the cybernetic model of control where one party is always the
controlling party and the other is the controlled party (television, radio). Interaction
corresponds to a networked model of control where decision making occurs
multilaterally and simultaneously. The authors argue that “double the communication leads to double the control” (p. 124)
through surveillance, monitoring, biometrics, and gene therapy.
Rhetorics
of Freedom
Technological
systems can either be closed or open. Closed systems are generally created by
either commercial or state interests (profit through control and scarcity).
Open systems are generally associated with the public and political transparency
(innovative standards in the public domain). Rather than focus on the
opposition between open/closed, the authors examine alternative logics of control. Open control logics use an informatic
(material) mode of control, while closed logics use a social model of control.
From this perspective, informatic control is equally as powerful (if not more
so) than social control.
A
Google Search for My Body
One is either
online and accounted for or offline and still accounted for. The body becomes a
medium of constant locatability surrounded by personal network devices. For an example, think of how your Facebook page tracks your internet habits. How many people have disconnected the chat function on Facebook or other Instant Messengers because they do not want others to know they are online?Divine Metabolism
Life-forms are
not merely biological but include social, cultural, and political forms as
well, but not all of these have an equal claim on life. Networks are the site
where control works through the continual relation to life-form.
The
Paranormal and the Pathological I
Conceptions of
health and illness have changed from a quantitative approach (illness as a
deviation from the norm) which requires a return to balance to a qualitative
one (disease is a different state than health) where medicine’s role is to
treat symptoms of the disease. However, the third transition, “disease as error,”
is the most telling. In this conception, disease is viewed as an error in the
organism. It does not manifest itself in testimony from the patient or in signs
expressed on the body. Rather, the disease exists only in itself. It is
everywhere and nowhere. Disease is an informatic expression that must be mapped
and decoded.
The
Paranormal and the Pathological II
Because disease
can occur as a mass phenomenon, includes modes of transmission and contagion,
and exists between bodies, it is necessary to evaluate diseases as networks. If
the processes that lead to an outbreak have no center and are multicausal, how
can they be prevented? Epidemics are both medical situations and political
ones. If epidemics are networks, the problem of multiplicities in networks is
the tension between sovereignty and control. Compounding this problem is sovereignty
found in the supernatural.
Universals
of Identification
Once universal
standards of identification are agreed upon, real-time tracking technologies
will increase. Space will become rewindable and archivable; the world will exist
as a giant convenience store. See these videos about gunshot tracking technology to get an idea of what that world will look like or how it is made possible:
RRCOO1b:
BmTP
Molecular
biology laboratories employ (at least) two networks to encode, recode, and
decode biological information: the informatics network of the Internet and the
biological network. The Internet allows for uploading and downloading of
biological information and brings together databases, search engines, and
specialized hardware. The biological network occurs in-between DNA and an array
of other proteins.
Unknown
Unknowns
From Donald Rumsfeld:
“Because as we know, there are known knowns; there are things we know we know.
We also know there are known unknowns; that is to say we know there are some
things we do not know. But there are also unknown unknowns—the ones we don’t
know we don’t know.” The unknown unknowns bring forth visions of death, fear,
and terror, the end of humanity.
Codification,
Not Reification
The new concern
for political problems is the extraction of abstract code from objects. The
process of bioprospecting, whereby unique genes are harvested for their
informational value has reduced individuals to digital forms, ignoring their
lived reality. Today’s impoverished populations are expected to give up their
labor power as well as their bodily information. “The biomass, not social
relations, is today’s site of exploitation” (p.135).
Tactics
of Nonexistence
“The question of
nonexistence is this: how does one develop techniques and technologies to make
oneself unaccounted for?” (p.135). Nonexistence is tactical for anything that
wishes to avoid control.
Disappearance;
or, I’ve Seen It All Before
Disappearance
is the by-product of speed. As technology gets faster, one’s physical and
biological self disappears amid a plethora of files, photos, video, and a
variety of Net tracking data. Bey proposes that nomadism is the response to
speed. A “temporary autonomous zone” (TAZ) is a temporary space set-up to avoid
formal structural control. Move before the cultural and political mainstream
knows what happened.
Stop
Motion
“The
question of animation and the question of ‘life’ are often the same question”
(p.138). Graph theory begins from the classical division between node and edge and in doing so privileges space over time, site over duration (p.139). Networks
can only be thought of in a different way if animation (movement) becomes
ontological or a universal right.
Pure
Metal
Cultural
constructionism focuses more on the way that gender/sexuality, race/ethnicity,
and class/status form, shape, and construct a self than with the innate self or
identity. The human subject is decentralized in the process. What about the
nonhuman? Regardless of views on the nonhuman (incorporating or discorporating),
it continues to be negatively defined. The human is always the starting point
for comparison. How then are nonhuman elements that run through or found within
humans classified?
The
Hypertrophy of Matter (Four Definitions and One Axiom)
Definition 1. Immanence- the process of exorbitance,
of desertion, of spreading out
Definition
2. Emptiness- the space between
things; an edge
Definition
3. Substance- the continual
by-product of the immanence and emptiness; a node
Definition
4. Indistinction- the quality of
relations in a network
Axiom
1- “Networks have as their central problematic, the fact that they prioritize
nodes at the same time as they exist through the precession of edges” (p.143)
The
User and the Programmer
“User” is a
synonym for “consumer.” Programmer is a synonym for “producer.” Most legal
prohibitions are migrating away from the user model (being) toward programmers
(doing). Anyone can be a programmer if he or she chooses. More and more threats
to programming are seen in everyday life. Future politics will focus on use
over expression.
Interface
The authors
define interface as “an artificial
structure of differentiation between two media” (p.144). Differentiation occurs
whenever a structure is added to raw data. Data does not appear fully formed
and whole but instead gets its shape from social and technical processes.
Interface is how dissimilar data forms interoperate.
There
is No Content
Content cannot
be separated from the technological vehicles of representation and conveyance
that facilitate it. “Meaning is a
data conversion” (p.145). There is not content, only data.
Trash,
Junk, Spam
Trash is the set
of all things that have been cast out of previous sets, all that which no
longer has use. Junk is the set of all things that are not of use at this
moment, but may be of use at some time, and certainly may have been of use in
the past. Spam is an exploit. “Spam signifies nothing yet is pure signification” (p.146).
CODA:
BITS AND ATOM
Networks are always exceptional, in the
sense that they are always related, however ambiguously, to sovereignty.
This ambiguity
informs contemporary discussions of networks. Hardt and Negri describe the
multitude as a “multiplicity of singularities,” a collective group that remains
heterogeneous (the one and the many, sovereignty and multitude). Virno
recognizes that the multitude does not clash with the One; it redefines it.
Unity is not the State; rather, it is language, intellect, communal faculties
of the human race. The fact that the multitude is not “One” is its greatest
strength, giving it flexibility that centralized organizations lack.
Contemporary
analyses of “multitude” share significant affinities with Arquilla and Ronfeldt’s
analysis of “netwar.” In this intersection, political allegiances of Left and
Right tend to blur into a strange, shared concern over the ability to control,
produce, and regulate networks.
According to Arquilla and Ronfeldt, “netwar refers to an
emerging mode of conflict (and crime) at societal levels, short of military
warfare, in which the protagonists use network forms of organization and
related doctrines, strategies, and technologies attuned to the information age”
(p.151). Netwar can be waged by ‘good’ or ‘bad’ actors as well as through
peaceful or violent measures. The diversity and complexity of netwar makes them
an emerging form of political action. It takes a network to fight a network.
Despite
their political differences, both the concept of the multitude and the concept
of netwars share a common methodological approach: that “the ‘unit of analysis’
is not so much the individual as it is the network in which the individual is
embedded.
The authors believe what is missing from Hardt and Negri
and from Arquilla and Ronfeldt is a “new
future of asymmetry” (p.152). Resistance IS asymmetry. Formal sameness may
bring reform, but formal incommensurability (having no common basis) breeds
revolution. “Open” or “free” networks exhibit power relations regardless of the
power held by the individuals who comprise them.
At
this point, we pause and pose a question: Is the multitude always “human”? Can
the multitude or netwars not be human and yet still be “political”? That is,
are individuated human subjects always the basic unit of composition in the
multitude? If not, the we must admit that forms such as the multitude, netwars,
and networks exhibit unhuman as well as human characteristics.
These questions relate to the nature of constituent power
in the age of networks. Not all networks are created equal and often display
asymmetrical power relationships. But if no one controls the network, how do we
account for such differences and asymmetrics?
Our
suggestion may at first seem perplexing. We suggest that the discussions over
the multitude, netwars, and networks are really discussions about the unhuman
within the human.
The word “unhuman”
does not mean against human or antihuman. Rather, the use of the term is
designed to ponder whether these emerging forms go far enough in comprehending
the portions of ourselves that are not fully human.
Difficult,
even frustrating, questions appear at this point. If no single human entity
controls the network in any total way, then can we assume that a network is not
controlled by humans in any total way? If humans are only a part of the
network, then how can we assume that the ultimate aim of the network is a set
of human-centered goals?
At both the
macro and micro levels, it is easy to recognize elements in networks that
inhibit total control or total knowledge—computer viruses, infectious diseases,
viral marketing or adware, unforeseen interpersonal connections on social
networks, and various other biological and man-made phenomena
In
fact, it is the very idea of “the total” that is both promised and yet
continually deferred in the “inhumanity” of networks, netwars, and even the
multitude.
Networks are
constituted by the tension between the agency of individuals within the network
and the abstract “whole.”
The
network is this combination of spreading out and overseeing, evasion and regulation.
It is the accident and the plan. In this sense, we see no difference between
the network that works too well and the network that always contains exploits.
Another
perspective, however does see a great difference between successful networks
and networks that fail. These differing viewpoints are part of the reason why
Internet viruses and infectious diseases evoke such fear and frustration. Networks
show us the unhuman in the inhuman and illustrate that individual human subjects
are not the basic unit of network constitution.
For
this reason, we propose something that is, at first, counterintuitive: to bring
our understanding of networks to the level of bits and atoms, to the level of
aggregate forms of organization that are material and unhuman, to a level that
shows us the unhuman in the human.
Networks operate through continuous connections and
disconnections, but at the same time, they continually posit a topology. They
are always taking shape but remain incomplete.
The
unhuman aspects of networks challenge us to think in an elemental fashion. The
elemental is, in this sense, the most basic and the most complex expression of
a network.
The central concern of networks is no longer the action
of individuals or nodes in the network. Instead what matters more is the action
throughout the network, a dispersal of action that requires us to think of
networks less in terms of nodes (information) and more in terms of edges (space)—or
even in terms other than the entire dichotomy of nodes and edges altogether. “In
a sense, therefore, our understanding of networks is all-too-human…” (p.157).
Discussion
Questions:
1.
The videos of gunshot tracking give us
an idea of how surveillance can be incorporated into society. How could a
program such as this be used to track biological happenings? What type of
universals would have to be agreed upon?
2.
On page 118, the authors assert that
network science “seeks a universal pattern that exists above and beyond the particulars
of any given network. For this reason, network science can study AIDS, terrorism,
and the Internet all as the same kind of being—a network.” What are the
similarities between biological and man-made networks? Are there differences?
In response the second discussion regarding the study of network science, which classifies both biological and man-made are ‘all of the same being,’ that is, both the biological and the man-made are networks. As network science ‘seeks a universal pattern’ beyond a single network it then assumes that both biological and man-made entities are essentially the same as all networks are the same animal and the same being. Universality then trumps the historical notions of ‘being’ and ‘life.’ As Aristotle posited, “Biology is a prerequisite for politics,” the biological has become politicized. Put simply, the coalescence of the body and the state that occurred during the emergence of neo-liberalism created biopolitical implications.
ReplyDeleteIn examining the similarities and differences present between the biological and the man-made, the infectious disease ‘Acquired Immune Deficiency Syndrome’ (AIDS) raises critical questions regarding this distinction. The U.S. Center for Disease Control identified AIDS in 1981. Subsequently, a ‘cause’ of the disease emerged in the early 1980s. Initially, the AIDS virus appeared a biological entity, however, this changed as the biological basis of the virus became transformed through various institutions and organizations. That is, the emergence of networks merged AIDS as a biological pathogen into a universally accepted network made by man.
For example, The World Health Organization (WHO) produced a report regarding the AIDS ‘epidemic’ in 1990. The report introduced the, WHO Disease Staging System for HIV Infection and Disease In the document, the WHO states, “With the pandemic spread of AIDS, a universally applicable staging system for HIV infection and disease is needed. This system could be used to: improve clinical management of patients; establish reliable prognoses; help in designing and evaluating drug and vaccine trials; and perform studies on pathogenesis and natural history of HIV infection” ( WHO, 1990). Here one can assess that universal global networks impact the bare notion of AIDS. As the report notes, the proposed HIV staging system can ‘improve,’ ‘establish,’ ‘design,’ ‘evaluate’ and ‘perform.’ WHO offers a universal approach in the systemization of biology. Consequently, man redefined the biological pathogen in terms of science and politics.
Finally, I find it interesting that the meaning between two separate entities such as AIDS and the Internet as both networks displays the similarities and differences between the biological and the man-made, AIDS serves as an example where the two combine.
Carolyn asks: “What are the similarities between biological and man-made networks? Are there differences?”
ReplyDeleteFor me, this is first and foremost a question of semiotics. I understand “biological” to be a claim about the nature of the network and “man-made” to be an inquiry into the origin of the network. In other words, to conceptualize a network in “biological” terms is to make a claim about its make-up, its components, and its inner-workings. In other words, biological comprises and is comprised of processes. Conversely, a network that is “man-made” seems to conceptualize the network as a product that has an identifiable starting point. But of course, this begs the question: a product of what? And, producing what?
Perhaps one way we can begin to answer these questions is by applying the logic underlying distinctions between “evolution” and “design” to the question of “biological” v. “man-made networks.” The blog “Immunoblogging” posted an article in February of 2006 titled “Evolution vs. Design: Man-Made Biological Weapons Part I” (http://immunoblogging.blogspot.com/2006/02/evolution-vs-design-man-made.html). In a discussion about different types of biological warfare, the author writes the following:
“Today, unlike in the previous examples the threat of biological weapons is much greater, because technology has advanced to the point where we can simply design our own pathogens to be more effective weapons...The question that arises is how to determine if an organism is designed by human techniques, or if the pathogen is just another example of a newly emerged pathogen that has arisen by evolutionary processes.” Following this logic, we must ask: how can we determine whether a network is biological or man-made?
Of course, these distinctions are imperfect and clearly overlap into each other: in fact, can a network not be both biological AND man-made at once? It is perhaps problematic to even make the distinction at all, since, as our authors write, “the question of ‘life’ and the question of ‘being’ seem always to imply each other, but never to meet” (p. 119). The question now becomes how we can develop a framework which encompasses both biology and the actions of man, acknowledges the similarities and the differences, and still leaves space for us to account for at least two commonly overlooked aspects of network constitution: 1) the slippage between networks and between the nodes within networks (or, rather, the “space between things,” p. 142) and 2) the “unhuman aspects” that are very much a part of networks (p. 157).
The videos of gunshot tracking give us an idea of how surveillance can be incorporated into society. How could a program such as this be used to track biological happenings? What type of universals would have to be agreed upon?
ReplyDeleteThere is a type of surveillance that I am able to partially avoid because I work on a cash only basis. Think about every time someone swipes their credit or debit card. People as “users” leave trails of digital DNA that is connected to their biological activities. We are under constant surveillance because we leave behinds nodes of personal information as we move across the various networks we come into contact with. Galloway and Thacker explain that data is transferred into meaning through data conversation. ”To the extent that meaning exists in digital media, it only ever exists between two or more technologies” (p. 145). Their concept is demonstrated in how political data miners turn purchase data into votes. The data is given meaning through the conversation between the retail and political parties technologies. According to Andrew Drechsler, "When we get the voter file it's usually first name, last name, address, phone number, and then vote history, is the typical information in the voter file." Voter files will not say who a person voted for, but they will say whether or not the person voted. Data miners also buy information from companies. "You know, what type of magazine do people read, what kind of car do they drive, do they rent, do they own, do they have pets, what sort of pet do they have?” Each detail is a data point, and by the time data miners are finished, they can know a lot about a person. "So we will have close to a thousand data points on the voters." (http://www.voanews.com/learningenglish/home/Political-Data-Miners-Really-Get-to-Know-You-133327648.html) I am not sure the universals are agreed upon. Maybe it is a trade off; speed and convenience in exchange for privacy? But people willingly swipe their cards and give away their personal data. Their participation in the credit/debit network is voluntary. Unless you’re renting a car, most vendors accept cash, which isn’t as track able. I think that this how any new system that might track other biological happening might work; People will willingly participate.
Carolyn’s first question immediately brought to mind a technology that has been discussed by paranoid skeptics for a while- the biochip. The ability to track your loved one or pet can be easily accomplished by implanting the chip. Doomsday prophets have decried this as the “Mark of the beast” for some time now. Actually, this is a bit of an old hat. A 2005 Time article claimed that Applied Digital Solutions sold 7,000 of these chips and had implanted 2,000 (http://www.time.com/time/magazine/article/0,9171,1118348,00.html). This was almost seven years ago, so how far has this technology gone since then?
ReplyDeleteAs recently as five days ago an article was published claiming that the University of Rochester Medical Center won a patent on a biochip that is “designed to give physicians real-time readings of changes in the body” (http://www.rbj.net/article.asp?aID=189394). Advancements like this will allow physicians to monitor conditions like diabetes in real-time, which would seem to be advantageous for treatment purposes. Obviously, the patients would have to agree upon this in order to participate. I am sure many would still shun this type of technology because of the possible Orwellian implications, but as we saw in the film Transcendent Man there are at least a few people out there all too willing to use technology to improve their biology, even going so far as to merge with it.
Even freakier sounding are the “Self-assembling biomimetic nanostructures” which has been lauded as a “bioengineering breakthrough” . I won’t even attempt to explain this so I will include the explanation from the article:
“The design of biological molecules that mimic living structures and tissue is emerging as one of the most valuable strategies in bioengineering. Such biomimetic molecules, coupled with increasingly accurate simulations of cellular growth and responses, are leading to a wide range of regenerative applications as well as the development of controlled drug delivery systems and biochips for pharmaceutical research and diagnosis. In a significant step forward in the field, Charlotte Hauser and co-workers at the A*STAR Institute of Bioengineering and Nanotechnology (IBN) have designed a new class of ultrasmall peptides capable of self-assembling into a variety of structures such as membranes, micelles, tubules and gels that are suitable for application in tissue engineering and regenerative medicine.” (From nanowerk news){http://www.nanowerk.com/news/newsid=23337.php}
The easiest and very obvious example of a technology that is universally agreed upon and provides a data goldmine is something all of us carry: the cell phone. Not only can this device can be pinpointed wherever it is (and usually the owner is right there with it) but a great deal of information about the user can be discovered from the user’s activity.
Hello all...my exploit book is defected and is missing almost all of today's readings. It repeats the nodes chapter again instead. Therefore, to contribute to this post, I will attempt to answer the first question to the best of my ability with the limited pages I had access to.
ReplyDeleteThe gunshot tracking shows the modern day use of surveillance in society. Obviously, we all know that this isn't the only form of visual surveillance in modern day. An interesting form of surveillance that a student recently showed in her persuasive speech arguing for reforms in the US driving systems was a red light video that caught a car who was at the red light for a while and then decided to speed through existing sideways traffic. Luckily, no one was hurt by this car's actions.
This example makes me wonder of the place of surveillance in society from the standpoint that those for the use of it would argue that it will make society safer and help control incidents and violence of all kinds. It seems that the network is beneficial in many ways as it can track any kind of incident, including none-traffic related ones-that may be of interest to the network.
As Galloway and Thacker note, "The network is this combination of spreading out and overseeing, evasion and regulation. It it the accident and the plan. In this sense, we see no different between the network that works too well and the network that always contains exploits" (p. 155). I think Galloway and Thacker's explanation as both accidental and planned best explains the overarching networks of video surveillance in society.