Technology & Cultural Change
Wednesday, June 17, 2020
On: Meredith Broussard - Artificial Unintelligence
Wednesday, June 10, 2020
On Safiya Noble - Algorithms of Oppression
It is the persistent normalization of Black people as aberrant and undeserving of human rights and dignity under the banners of public safety, technological innovation, and the emerging creative economy that I am directly challenging by showing the egregious ways that dehumanization is rendered a legitimate free-market technology project (Noble, 14)
Wednesday, June 3, 2020
On Pugliese: Death by Metadata: The Bioinformationalisation of Life and the Transliteration of Algorithms to Flesh
While most people are mildly miffed to discover that Facebook, Google, and YouTube are using their data to decide which WISH advert or which politician to force into their social feeds, few are concerned with what their metadata is let alone where it might situating them in the eyes of - for want of a better term - the powers that be.
Our cellphones are increasingly more akin to our computers than to a telephone - and our increasing reliance on them is the very thing, according to Pugliese, that puts us in the quite literal firing line. He cites the 2014 Reprieve report noting 874 unknowns killed by US drone strike in the hunt for 24 targeted individuals and a 96.5% of casualties from drone strikes as civilians (p7). Metadata allows for very precise identification in terms of location but dispenses with the need to ensure that the hand holding the phone is in fact that of a terrorist. Collateral damage takes on a new meaning. "The Reprieve report documents that manner in which certain targeted individuals have been listed as having been killed up to six times, with the result that dozens of unknown civilians have actually been killed by the time the reporting process authenticates a targeted strike." (p7)
The ability to locate and 'identify' metadata in this way allows the individual(s) charged with location to create a template that then identifies the 'owner' of the metadata without actually truly identifying them. A cellphones electronic identifiers become the users identifiers - and more worrying, can be used to 'locate and identify' anyone in proximity. If they are there, they are that person - or more accurately that cell phone.
A drone strike on December 12 2013 in yemen killed 12 people in a wedding procession. According to the Pentagon all who were killed or wounded in the strike were Al Qaeda militants, thus making the strike both lawful and necessary. Testimony from survivors is denounced - and with it their very humanity. By reducing the human targets to algorithms and metadata, they relieve the attackers of the need to consider such ideas (and ideals) as innocence, guilt, and humanity. They are simply targets - and as a post script - hopefully the correct target.
When the victims of strikes are so decimated that it is impossible for survivors to tell child from adult, human from animal, they are stripped of their remaining human identifier - recognition by survivors. furthermore they become what Pugliesi refers to as a "violent enmeshment of the flesh and blood of the body with the geopolitics of war and empire."(p13) This geobiomorphology gives the physical landscape a flesh and tissue - that of those who minutes before passed through it and who now have become a part of it. The faceless, human less attacks, designed and controlled through alogrithms are transformed to creations of actual flesh.
A drone strike might be a way to give precision to an attack, to render it facile, to allow for an objective observation. The resulting landscape of shredded flesh, spattered blood, and dismembered humanity serves to remind us that it is none of these things.
On Galloway : Protocol
The diagram: the distributed network (structural form without center that resembles a web or meshwork)
The technology: the digital computer (an abstract machine able to perform the work of any other machine)
The management style: protocol (the principle of organisation native to computers in distributed networks)
from Galloway p 3
In considering the periodizations of modern and post modern society, Galloway recognises (citing Foucault) the sovereign societies of the classical era, during which time power was centralized with the sovereign (and stepping down through the hierarchy) and underpinned with violence and coercion in order to command and control. Modern disciplinary societies were underpinned by bureaucratic command and control. This has now shifted to the decentralized societies of control rather than of discipline.
In the computerized postmodern age, command and control are found in computerized information management and networked computer at the core of which is protocol (p 6). These commands and controls are not just snippets that make hardware function so we can do our jobs or talk to Great Aunt Gertie back in England, but are measures control that are insidiously present in day to day living by mere function of the extent to which our world is computerized and networked. Regardless of what we use our computers or our devices for, or when, or how, we are all constrained by the protocols by which these machines operate. As users we do not control these protocols - much of the time we are unaware of their presence let alone their function. Our web pages for example comply with Hypertext Transfer Protocol yet few of us know what that is or how it functions - and yet we submit to its control. These protocols permit us to perform - possibly even function in many case - secure in the belief we as a computer operator are in control, unaware that we are being controlled. Galloway gives the extreme but pertinent example that the simple removal of a '.' from a piece of code can remove an entire nation from a screen, a network, and to all intents and purposes existence. Extreme? Not when we consider how many times a day we double check a URL or an email to be sure we have a correct spelling. Perfect spelling is not the end goal but compliance.
Protocols are, according to Galloway, techniques for achieving voluntary regulation within a contingent environment (p7) Because of their universality - HTML and CSS comply with the same protocols regardless of where the user lives, what language they speak, what they use the technology for - they allow local devices to communicate with foreign ones. Protocols enforce - albeit in a non violent manner - compliance. Information sent from one machine is fluid and non hierarchical but is then processed by a machine that redefines it in a rigid hierarchical manner before then becoming the fluid component ahead of the next step.
The result is a communicating, non hierarchical, peer to peer relationship between machines and within networks on which we depend for the ongoing functioning of post modern society.
On Zeynep Tufecki: Twitter and Tear Gas: The Power & Fragility of Networked Protest (Platforms & Algorithms)
When social media began emerging in 2005 it altered and shaped how we - users, producers, consumers, audiences - behaved, not just when on these platforms - Facebook, Twitter, YouTube, et al - but off them as well. Over
the past fifteen years, social media has shaped, among other things, how we define ourselves, how we consume media, and how we respond to calls for protest and reaction. Online civic spaces have moved from individual blogs to the behemoths of social networks that dominate our screen time (p 34). Controlled by algorithms set by the corporations that own the platforms, these privately owned spaces have become our public space to share, to learn, to consume, to market, and to protest. Spaces that on the surface seem to be 'public' are in fact controlled, manipulated, and adapted to meet corporate requirements. Concerns raised by scholars in the early years of social media as to whether these platforms would be restrictive, would enforce censorship, would sell user information have all been realized. Facebook, Twitter and YouTube regularly censor content. Images of same gender couples kissing are regularly banned for violating community guidelines, posts that are considered to spread 'fake news' are removed, posts that might be considered 'hot under the collar' are at best 'screened' and at worst removed. At the same time platforms permit images that show male gaze driven porn, allow hate speech from groups because they have bought advertising, and Zuckerberg recently went on record saying social media shouldn't fact check politicians (while still removing 'ordinary' user posts the alogrithm deems unacceptable - even if they're not hate speech, violent, or untrue) .
Let us be clear - social media exists not to provide a platform for users but to create money for the parent corporation. Their success is dependent on attracting mass numbers, retaining them, and utilising them in such a way that they can be monetised. These are networked public spaces that are privately owned with corporate owners making the rules. Facebook has used - and continues to use - the real name policy to shut down groups and pages like "We Are All Khaled Said" without having to be accountable for censorship - violating a business rule is just cause for closure. This policy while lucrative for the overarching corporation is dangerous for individuals. People of colour, LGBTQI+ groups, people of diverse faiths - are required to put themselves in danger in order to satisfy Ts & Cs of a platform that will then censor their activism should it become uncomfortable. Reliant on community policing - on one user reporting another - these policies are underpinned by US laws that require only that the platform remove content they are told violates the law (p 143). This targets any user who is commenting on or advocating for anything socially or politically sensitive - I have had a photo removed for community standard violation that showed two men, in tuxedos, exchanging wedding vows. Activists especially are at risk of being reported, harassed (online and off), and of being physically harmed.
Real name policy, 'think of the children' (censorship justification) policy, SPAM policies, verification practices that require sending legal documents through a system that is at best fragile all align a platform with commercial and legal models that prioritise the bottom line. These policies are rarely consistent or even...comprehensible. They disadvantage minority groups that are socially and politically vocal and hide behind protections rarely afforded to those using these platforms as a space to convene, dialogue, and protest.
Saturday, May 23, 2020
On Hans Magnus Enzensburger, Constituents Towards a Theory of the Media.
"A revolutionary plan should not require the manipulators to disappear; on the contrary, it must make everyone a manipulator." (Enzensburger , 20)
Enzensburger's Constituents Towards A Theory of the Media is not a complicated piece but neither is it necessarily simple. His observation that new media in forming new connections are also forming a universal system, that electronic media has a mobilising power, that consumers are now also producers by virtue of platforms and hardware and technology, that every use of media presupposes manipulation are as applicable today as they were in the 1970 writing.
Friday, May 22, 2020
On Post-Work Imaginaries Srnicek & Williams
Srnicek, Nick; Williams, Alex. Inventing the Future: Postcapitalism and a World Without Work