>World InfoCon - an annotated report
>by Dr. Steven Kurtz, Professor Carnegie Mellon University
>
>In a series of cogent lectures by a roster of distinguished
speakers
>including
>Phillipe Quau, Saskia Sassen, Philip Hammond, Duncan Campbell,
Steve
>Wright, Shahidul
>Alam, Simon Davies, Cees Hamelink, and a variety of other
contributors,
>many
>significant themes emerged-in fact, too many to be reported
in this brief
>document. However, in the interest of promoting further discussion
among a
>wider audience interested in imagining alternatives to global
capital and
>developing forms of tactical resistance, World-Information.Org
offers the
>following abbreviated list of threads.
>
>Methodology
>
>Many of the topics presented and discussed during the conference
were
>extracted from very fuzzy to dark areas in the socio-political
landscape.
>By
>way of example, Duncan Campbell presented information on Echelon
(a highly
>classified world-wide surveillance network primarily initiated
by the US
>and
>the UK), and Philip Hammond presented material on NATO's propaganda
>campaign
>during the war in Kosovo. As to be expected, these topics
are fraught with
>danger when approached from the standpoint of intellectual
rigour. This is
>not to say that these analyses were not carefully constructed,
it is only
>to
>say that when examining topics like Black-Ops (military and/or
security
>operations of which there is no public record) or misinformation
campaigns
>that the data is incomplete, unreliable, and often requires
speculative
>conjectures to fill in the information gaps (speakers were
all very
>forthcoming about when they were in speculation mode). All
the same, this
>type of analysis conjured many questions about what constitutes
plausible
>evidence, and reliable witnesses. Further, this discussion
raised issues on
>how scholars and investigators can protect themselves from
charges of being
>cranks, conspiracy fanatics, or other such labels used to
delegitimize
>explorations into fuzzy regimes, and reduce the production
of multiple
>perspectives and ideological diversity.
>
>In addition, when considering such fractured information there
was a good
>deal of debate over what type of information has greater validity.
For
>example, in Philip Hammond's analysis of NATO's construction
of the war in
>Kosovo, a schism emerged that proceeded along the lines of
those who
>thought
>that direct experience had greater validity than research
grounded in
>secondary documentation and those who thought the reverse.
Those in the
>former camp stated that when using secondary data one cannot
separate
>corrupted documents from useful ones while the latter argued
that
>individual
>experience is too idiosyncratic and often nonrepresentative
of a general
>situation. This area was of profound concern when considering
that most
>activism is virtual. Campaigns and movements develop support
from
>individuals who have no experience of localized problems (such
as the war
>in
>Kosovo), and who have no choice but to follow and react to
the course of
>events through mediated resources.
>
>Terms and classifications were also dramatically problematized.
Terms such
>as public/public access/private/privatised were subject to
considerable
>drift from context to context, and there was tremendous diversity
>concerning
>the way such concepts should be modelled. Of considerable
difficulty were
>even vaguer concepts such as the "the common good."
In this case, the fear
>was that the future hopes and visions of participants were
so vague that
>only an anachronistic political term could be used as a descriptive
device.
>Other common terms that needed more definition were "digital,"
"citizen,"
>"privacy," "Internet" and "democracy."
>
>
>
>Institutional Intervention using State Mechanisms and Grassroots
>Organization Direct Action
>
>While participants expressed preferences and tendencies for
one model of
>resistance or the other, on a practical level, most expressed
sympathy for
>hybrid models. On the one hand, it was suggested that it is
preferable to
>launch cellular and small group units, which could in turn
form the
>foundation for temporary single issue coalitions geared for
both street and
>electronic actions. Others insisted that alliance building
in conjunction
>with legal initiatives had to be used regardless of the danger
of the
>potential of forming future bureaucracies or other types of
long-term
>authority structures. The need for legal action at both national
and
>international levels was really driven home by Saskia Sassen
with her point
>that the deregulation of mobile capital was a major contributor
to the
>collapse of the financial infrastructure in South Korea, as
well as Simon
>Davies' point that Regulation of Investigatory Powers bill
(a bill launched
>by the British government to link all electronic communications
to MI5
>total
>access to all electronic communications without the need of
a warrant) was
>stopped only by an alliance of academics, trade unions, and
human rights
>organizations that intervened in parliamentary process. The
use of
>anti-trust laws were also cited as the only successful means
used thus far
>to break up monopolies. Both Sassen and Quau noted that such
techniques
>were at times necessary to avert catastrophe.
>
>The Digital Divide
>
>A healthy portion of time was given to the subject of the
Digital Divide
>(the massive gap between developed and developing nations
regarding
>technological infrastructure). After giving a brief introduction
to
>fundamental principles of postcolonial theory, Shahidul Alam
argued that
>the
>grand majority of people in developing nations had been intentionally
>denied
>access to information and communications technology (ICT),
and that this
>majority had been all but removed from policy making process
regarding ICT
>(even in their own countries). Alam continued by stating that
technological
>progress dependent on unilateral donor-driven initiatives
can only be
>viewed
>as a continuation of colonial domination configured to maintain
the
>"global"
>information political economy. This description was echoed
by Cees Hamelink
>after which he further explained how this divide could be
narrowed, if not
>eliminated, with rather minimal investment (the equivalent
of the money
>spent on pet food annually) by developed nations, thus concluding
that the
>divide is purely a political one.
>
>Linked to this subject, was the theme of expanding the definition
of low
>intensity warfare. Certainly withholding ICT in order to maintain
western
>capital's hegemony is an example. As is Sasken's point of
view that
>national
>invasions by mobile capital and the dismantling of the welfare
state (in
>the
>US and UK) constitute a form of violence so savage that it
can only be
>considered warfare.
>
>Privacy and Surveillance
>
>After the presentations of Davies, Wright, and Campbell, one
could not help
>but believe that the technology necessary for total surveillance
in
>cyberspace and pervasive real space surveillance is not only
possible, but
>is regularly employed in the US and the UK, and is rapidly
expanding in
>other western nations. This tendency was presented as being
out of control,
>and can only be slowed rather than reversed. The question
soon became what
>should the reaction to this situation be? While the speakers
all agreed
>that cryptography was the best means for an individual to
resist electronic
>surveillance, some audience participants argued for a policy
of total
>transparency at all levels in order to stop the proliferation
of intranets
>and the division of the Internet into a series of fortifications
all
>resisting infiltration from the other. While this option of
complete
>transparency appears to be impractical at the moment, it may
become more
>prominent as infoculture continues to change.
>
>It was also noted that a paradigm shift is underway in the
apparatus of
>repression due to new vision technologies. The older strategies
of temporal
>immediacy and presence are giving way to temporal delay and
absence. Any
>one
>who has received a traffic ticket through the mail is familiar
with this
>shift. The police field of perception is being extended with
vision
>technology so that entire landscapes of "criminal"
data can be recorded and
>thereby witnessed in a manner that flesh police never could
in real time.
>Although delays in arrest are a weakness with this model (a
gap that is
>getting increasingly smaller), it makes up for this shortcoming
by
>functioning as an excellent means for intelligence gathering
for future,
>often pre-emptive, police strikes. It also functions well
in mass actions
>considered a danger to social order (from traffic infractions
to riots) in
>that police are able to eventually identify and arrest every
participant.
>Cameras have the additional feature of acting as a material,
environmental
>reminder that self-discipline must be maintained at all times.
The
>surveillance system used in London's "iron circle"
(a surveillance network
>that can identify and track any vehicle entering the district)
was
>presented
>as the state of the art for this particular paradigm of repression.
>
>Criminality
>
>Criminality was a theme that continually entered presentations
at the
>conference-not so much in its material sense, but in the meanings
it
>generates as a semiotic network inscribed on groups and individuals
with
>resistant tendencies or other minoritarian ( in the Deleuzian
sense of the
>term) activities and behaviours. The western cultural landscape
has been
>falsely constructed as seething with terrorists, drug dealers,
and
>paedophiles from whom the public must be protected. Those
who challenge the
>capitalist order tend to be publicly labelled as criminals
generally
>falling
>into the terrorist category. For example, in spite of the
tendency that
>most
>activists using models of electronic resistance are applying
neither
>sabotage nor terrorism (data and networks cannot be terrorized),
they are
>still represented as perpetrating high crimes against public
safety. Recent
>laws passed in the UK linking hacking to terrorism are an
indication that
>this labelling trend will increasingly manifest as law. As
Simon Davies
>demonstrated, crime itself has fallen in the UK and US, and
yet there are
>still regular calls and attempts to increase the surveillance
capabilities
>of security agencies through legitimate channels by use of
the rhetoric of
>criminality.
>
>At the material level the culture of control is best indicated
by the
>dramatic expansion of the repression industry (security agencies,
prisons,
>courts, social workers, and hardware/software). This development
was
>further
>illustrated by Steve Wright who presented a catalogue of recent
>developments
>in near or less-than-lethal weaponry. This included weapons
like water
>canons, foam guns, car taser security systems, and stun batons
that ranged
>in deployment contexts from home use, to prison use, to general
crowd
>control. These weapons (of which there are a far greater variety
than which
>is listed here) are designed to debilitate, disable, disorient,
disperse,
>and/or detain those who are on the wrong end of them.
>
>Commercialisation
>
>Cees Hamelink, in a manner reminiscent of the Situationists,
began his
>lecture by expressing his concern that the cultural landscape
was
>transforming itself into a big billboard. No person, or place
could escape
>being a medium of spectacle. Sassen was also thinking along
these lines in
>regard to electronic space in particular. Using software development
and
>sales as key indicators, she argued that the topography of
electronic space
>will be increasingly configured as a space of commerce. The
Internet (a
>term
>she found suspect) as a pure research space or as a liberated
zone is
>rapidly moving into obscurity as commerce overwhelms the space.
The only
>big
>research that will soon be on the Internet will be that of
corporate
>surveillance to gather data useful for identifying consumer
groups,
>tracking
>consumer behaviour, and constructing pinpoint consumer profiles.
>
>
>Biotechnology
>
>Although this topic was at the margins of conversation, it
was noted that
>biotechnology would play a role parallel to ICT in various
pancapitalist
>initiatives. Flesh informatics are but another form of digital
modelling
>which rests on the cosmological principle of information society
in
>general--that order comes from order (which stands in contrast
to the
>analogic model that order arises from chaos). Whether we are
speaking of
>digital TV or a clone, capital's obsession with these technologies
is with
>the fidelity of replication. The usefulness of biotechnology
to support
>capitalist hegemonies is undeniable. Already we are seeing
colonial
>expansion by way of raiding third world cultures' biological
resources by
>eco-pirates and bio-privateers; eugenic consciousness is being
reconfigured
>for a consumer market eager for the totalisation of reproductive
process
>via
>extreme medical intervention; and the development of surveillance
>techniques
>designed to invade biological privacy at a molecular level.
>
>
>Final Note
>
>While this conference had a deeply pessimistic aura surrounding
it in
>regard
>to subject matter and critical analysis, there was still a
general feeling
>that effective action could be taken, and that apocalypse
was not a
>predetermined outcome. Autonomous zones still exist in a variety
of forms.
>These can be maintained and potentially expanded even in the
most
>repressive
>of situations. The strength of the society of speed is also
its weakness.
>No
>amount of management can eliminate all the fuzzy, confused,
and dark areas
>that accompany high velocity reconfigurations and emergent
complexities.
>Even totalising institutions like jails have under-economies,
illicit
>activities, secret organizations, and conspiracies. While
the intensity of
>control may fluctuate, it will never reach perfection.
>