eb6014bae1d64a40241ca5337ba31292.ppt
- Количество слайдов: 27
tactical media fdm 20 c introduction to digital media lecture 23. 05. 2007 warren sack / film & digital media department / university of california, santa cruz
last time: media ownership • who owns the media today? – ownership structures of local newspapers – media map of u. s. media – media map of international media • types of connection between media companies – mutual investment – interlocking directorates – news flows • implications – censorship – focus • fcc’s current review of ownership laws
outline • what is “resistance” in digital media? • an example – problem: media consolidation – resistance: alternative viewpoints @ moveon. org • three different models of politics (of resistance) – moveon. org, indymedia. org and “enlightenment-style politics” – critical art ensemble, “intervention, ” “disturbance, ” and “post dialectics” – open-source software and the “politics of artifacts”
what is “resistance”? • Tactics vs. strategies (Michel de Certeau) • tactics and means to oppose the strategies of “The Prince” – e. g. , while the prince tries to “divide and conquer” the resistance tries to overcome the imposed isolation • countering the techniques and “technologies of power” (cf. , Foucault) that impose isolation, distraction and domination through surveillance, entertainment, and force
example resistance: the problem F. C. C. Votes to Relax Rules Limiting Media Ownership By THE ASSOCIATED PRESS WASHINGTON -- Federal regulators relaxed decades-old rules restricting media ownership Monday, permitting companies to buy more television stations and own a newspaper and a broadcast outlet in the same city. The Republican-controlled Federal Communications Commission voted 3 -2 -- along party lines -- to adopt a series of changes favored by media companies. New York Times, 2 June 2003
example resistance: a response • WHY WORRY ABOUT WHO OWNS THE MEDIA? • Move. On Bulletin Op-Ed • by Eli Pariser • It's like something out of a nightmare, but it really happened: At 1: 30 on a cold January night, a train containing hundreds of thousands of gallons of toxic ammonia derails in Minot, North Dakota. Town officials try to sound the emergency alert system, but it isn't working. Desperate to warn townspeople about the poisonous white cloud bearing down on them, the officials call their local radio stations. But no one answers any of the phones for an hour and a half. According to the New York Times, three hundred people are hospitalized, some are partially blinded, and pets and livestock are killed. Where were Minot's DJs on January 18 th, 2002? Where was the late night station crew? As it turns out, six of the seven local radio stations had recently been purchased by Clear Channel Communications, a radio giant with over 1, 200 stations nationwide. Economies of scale dictated that most of the local staff be cut: Minot stations ran more or less on auto pilot, the programming largely dictated from further up the Clear Channel food chain. No one answered the phone because hardly anyone worked at the stations any more; the songs played in Minot were the same as those played on Clear Channel stations across the Midwest. • http: //www. moveon. org/moveonbulletin/bulletin 12. html
example resistance: electronic advocacy What does Move. On do? “When there is a disconnect between broad public opinion and legislative action, Move. On builds electronic advocacy groups. ” example action: “Please join us in asking Congress and the FCC to fight media deregulation. ” www. moveon. org (3 June 2003) see http: //www. moveon. org/ for current campaigns
enlightenment-style politics • ideals: – – – reason and rational debate truth and justice “natural” rights universal suffrage free speech free assembly • architecture – free press, fair elections, rule-by-law – consider the technological underpinnings of these • theorists – kant, rousseau, montesquieu, locke, smith, etc. • example: u. s. constitution
indymedia and enlightenment-style politics • “Indymedia is a democratic media outlet for the creation of radical, accurate, and passionate tellings of truth. ” Indymedia FAQ • ideals: free speech, free assembly • tactics: open publishing; email discussions; noncorporate funding; coverageof/participation in street protests (e. g. , wto, seattle, 1999); independent, distributed governance; volunteer organization • see http: //www. indymedia. org
weaknesses of older media forms of resistance • CAE’s articulation of the general problem: – powerful individuals and institutions are increasingly nomadic and invisible – consequently, older forms of resistance that challenge the sites and centers of power are no longer viable
weaknesses of older media forms of resistance • street demonstrations and occupations: public streets are no longer a site of power • labor strikes: factory owners now move the factory to another place rather than confront the workers directly • alternative media: education and entertainment have driven us to distraction so that debate and discussion is no longer a viable tool in politics: we live in an “age of dialectic in ruins” CAE, p. 783
critical art ensemble and the politics of disturbance • “Nomadic power must be resisted in cyberspace rather than in physical space. . A small but coordinated group of hackers could introduce electronic viruses, worms and bombs into the data banks, programs, and networks of authority. . . Such a strategy does not require a unified class action, nor does it require simultaneous action in numerous geographical areas. . By whatever means electronic authority is disturbed, the key is to totally disrupt command control. ” CAE, p. 788
examples of “electronic disturbance” • • • virus trojan horse worm bomb back door
what is a software virus? • virus: [from the obvious analogy with biological viruses, via SF] n. A cracker program that searches out other programs and `infects' them by embedding a copy of itself in them, so that they become {Trojan Horse}s. When these programs are executed, the embedded virus is executed too, thus propagating the `infection'. This normally happens invisibly to the user. Unlike a {worm}, a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see {SEX}). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with your display (some viruses include nice {display hack}s). Many nasty viruses, written by particularly perversely minded {cracker}s, do irreversible damage, like nuking all the user's files. • Hackers’ Dictionary
a short chronology of computer viruses • http: //www. digitalcraft. org/iloveyou/chronology. htm
what is a software “trojan horse”? • Trojan horse: [coined by MIT-hacker-turned. NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! See {back door}, {virus}, {worm}. • Hackers Dictionary
what is “worm”? • worm: [from `tapeworm' in John Brunner's novel `The • Shockwave Rider', via XEROX PARC] n. A program that propagates itself over a network, reproducing itself as it goes. Compare {virus}. Nowadays the term has negative connotations, as it is assumed that only {cracker}s write worms. Perhaps the best-known example was Robert T. Morris's `Internet Worm' of 1988, a `benign' one that got out of control and hogged hundreds of Suns and VAXen across the U. S. See also {cracker}, {RTM}, {Trojan horse}, {ice}. • Hackers Dictionary
what is a software “bomb”? • logic bomb: n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}. • Hackers’ Dictionary
what is a “back door”? • back door: n. A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field service technicians or the vendor's maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BSD} UNIX `sendmail(8)' utility. • Hackers Dictionary
The Robert Morris Internet Worm • Robert Morris, a 23 year old computer science graduate student at Cornell, broought the Internet to a virtual stop in 1988 with a “worm. ”
“enlightenment” forms of resistance – electronic advocacy • e. g. , Moveon. org – media criticism • e. g. , www. fair. org – alternative media • e. g. , Indy. Media. org – legal advocacy, litigation and alternatives • e. g. , electronic frontier foundation; see, also, Larry Lessig’s work on the “Creative Commons” http: //creativecommons. org/ • http: //mirrors. creativecommons. org/getcreative/ – unlike the CAE preferred tactics, these forms of resistance are committed to the Enlightenment ideals of debate and voting: working within the system as it was set down in the 18 th and 19 th centuries
non-dialectical tactics of resistance • in the face of injustice, what can be done by the artist, the writer, the “cultural producer” beyond simply arguing (i. e. , engaging in Enlightenment-style dialectics)? • electronic disturbance – e. g. , CAE • detournement – e. g. , Yes Men (see gatt. org)
more recent work by CAE: the politics of biotech • see http: //www. critical-art. net/biotech/free/index. html • “this work shows how technical, “expert” decisions are being taken by isolated groups of experts and shows how these decisions affect all of us, even though -- in a democratic society -- we (the “non-experts”) should also be able to have a say about anything that affects us all. ” • what can be done to resist genetically modified foods?
CAE member abducted by the FBI • May 25, 2004 • FOR IMMEDIATE RELEASE • FBI ABDUCTS ARTIST, SEIZES ART • Feds Unable to Distinguish Art from Bioterrorism • Grieving Artist Denied Access to Deceased Wife's Body • DEFENSE FUND ESTABLISHED - HELP URGENTLY NEEDED
FBI charges against Steve Kurtz • June 2, 2004 • According to the subpoenas, the FBI is seeking charges under Section 175 of the US Biological Weapons Anti. Terrorism Act of 1989, which has been expanded by the USA PATRIOT Act. As expanded, this law prohibits the possession of "any biological agent, toxin, or delivery system” without the justification of "prophylactic, protective, bona fide research, or other peaceful purpose. " (See http: //www 4. law. cornell. edu/uscode/18/175. html for the 1989 law and http: //www. ehrs. upenn. edu/protocols/patriot/sec 817. html for its USA PATRIOT Act expansion. )" [CAE Legal Defense Fund, June 2, 2004]
does “enlightenment” resistance work now. . . • . . . in a postindustrial, post-discussion/debate society?
does a politics of “disturbance” work now. . . • . . . in a climate of post-9. 11 surveillance and state -sponsored violation of constitutional rights? • perhaps the kurtz case shows how even a “post dialectical” politics of disturbance depends upon some for of enlightenment politics and the rule of law?


