To see the other types of publications on this topic, follow the link: Commande cooperative distribuée.

Journal articles on the topic 'Commande cooperative distribuée'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 38 journal articles for your research on the topic 'Commande cooperative distribuée.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wei, Xing, Yongji Wang, Shuai Dong, and Lei Liu. "A Three-Dimensional Cooperative Guidance Law of Multimissile System." International Journal of Aerospace Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/479427.

Full text
Abstract:
In order to conduct saturation attacks on a static target, the cooperative guidance problem of multimissile system is researched. A three-dimensional guidance model is built using vector calculation and the classic proportional navigation guidance (PNG) law is extended to three dimensions. Based on this guidance law, a distributed cooperative guidance strategy is proposed and a consensus protocol is designed to coordinate the time-to-go commands of all missiles. Then an expert system, which contains two extreme learning machines (ELM), is developed to regulate the local proportional coefficient of each missile according to the command. All missiles can arrive at the target simultaneously under the assumption that the multimissile network is connected. A simulation scenario is given to demonstrate the validity of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
2

Tedesco, Francesco, and Alessandro Casavola. "A Cooperative Game Theoretical Approach to Distributed Iterative Command Governor Schemes." IFAC Proceedings Volumes 47, no. 3 (2014): 9406–11. http://dx.doi.org/10.3182/20140824-6-za-1003.01818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bouteraa, Yassine, Jawhar Ghommam, Gérard Poisson, and Nabil Derbel. "Distributed Synchronization Control to Trajectory Tracking of Multiple Robot Manipulators." Journal of Robotics 2011 (2011): 1–10. http://dx.doi.org/10.1155/2011/652785.

Full text
Abstract:
This paper investigates the issue of designing decentralized control laws to cooperatively command a team of general fully actuated manipulators. The purpose is to synchronize their movements while tracking a common desired trajectory. Based on the well-known consensus algorithm, the control strategy consists in synchronizing the joint position and the velocity of each robot in the network with respect to neighboring robots' joints and velocities. Modeled by an undirected graph, the cooperative robot network requires just local neighbor-to-neighbor information exchange between manipulators. So, it does not assume the existence of an explicit leader in the team. Based above all on combination of Lyapunov direct method and cross-coupling strategy, the proposed decentralized control law is extended to an adaptive synchronization control taking into account parameter uncertainties. To address the time delay problems in the network communication channels, the suggested synchronization control law robustly synchronizes robots to track a given trajectory. To this end, Krasovskii functional method has been used to deal with the delay-dependent stability problem. A real-time software simulator is developed to visualize the robot manipulators coordination.
APA, Harvard, Vancouver, ISO, and other styles
4

Ni, Pengcheng, Zhiyuan Ye, Can Cao, Zhimin Guo, Jian Zhao, and Xing He. "Cooperative Game-Based Collaborative Optimal Regulation-Assisted Digital Twins for Wide-Area Distributed Energy." Energies 16, no. 6 (March 9, 2023): 2598. http://dx.doi.org/10.3390/en16062598.

Full text
Abstract:
With the wide use of renewable energy sources and the requirement for energy storage technology, the field of power systems is facing the need for further technological innovation. This paper proposes a wide-area distributed energy model based on digital twins. This model was constructed to more fully optimize the coordination of wide-area distributed energy in order to rationally deploy and utilize new energy units. Moreover, the minimization of the power deviation between the dispatch command and the actual power regulation output was also taken into account. In contrast to previous dispatch research, the cooperative game co-optimization algorithm was applied to this model, enabling a distributed approach that can quickly obtain a high-quality power command scheduling scheme. Finally, the simulation and comparison experiments using this algorithm with the wide-area distributed energy (WDE) model showed that it had the advantages of significantly reducing the tracking error, average error, and total error and effectively improving the tracking accuracy. The proposed method can help reduce total power deviations by about 61.1%, 55.7%, 53.1%, and 74.8%.
APA, Harvard, Vancouver, ISO, and other styles
5

Ru, Chang-jian, Xiao-ming Qi, and Xu-ning Guan. "Distributed Cooperative Search Control Method of Multiple UAVs for Moving Target." International Journal of Aerospace Engineering 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/317953.

Full text
Abstract:
To reduce the impact of uncertainties caused by unknown motion parameters on searching plan of moving targets and improve the efficiency of UAV’s searching, a novel distributed Multi-UAVs cooperative search control method for moving target is proposed in this paper. Based on detection results of onboard sensors, target probability map is updated using Bayesian theory. A Gaussian distribution of target transition probability density function is introduced to calculate prediction probability of moving target existence, and then target probability map can be further updated in real-time. A performance index function combining with target cost, environment cost, and cooperative cost is constructed, and the cooperative searching problem can be transformed into a central optimization problem. To improve computational efficiency, the distributed model predictive control method is presented, and thus the control command of each UAV can be obtained. The simulation results have verified that the proposed method can avoid the blindness of UAV searching better and improve overall efficiency of the team effectively.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Xiang, and Xiaogeng Liang. "Integrated Guidance and Control of Multiple Interceptors with Impact Angle Constraints Considered." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 37, no. 2 (April 2019): 273–82. http://dx.doi.org/10.1051/jnwpu/20193720273.

Full text
Abstract:
To solve the multi-interceptor coordination problem and to intercept the target with impact angle constraint, a novel distributed cooperative control algorithm with impact angle constraint based on integrated guidance and control is proposed. First, the mathematic model of integrated guidance and control is established by combining the interceptor-target relative motion model with the dynamic equation of the interceptor on pitch plane. The time varying gain extended state observer is developed to estimate and compensate the unknown disturbance. Based on the estimated value and fast nonsingular dynamic surface sliding control method, the IGC algorithm of leader is given; Then, based on distributed cooperative "leader-follower" model, the cooperative control strategy of multi-interceptor is designed, and gives out speeds in two directions on pitch plane, which are transformed to the command of total velocity and trajectory angle based on kinematic relations. Finally, to control the follower, the time varying gain extended state observer and the dynamic surface sliding control method are adopted. The simulation results demonstrate the effectiveness of the distributed cooperative control algorithm.
APA, Harvard, Vancouver, ISO, and other styles
7

Jin, Ruixian, and Jun Su. "Self-organizing Coalition Formation based on Non-cooperative Games in Social Networks." Advances in Engineering Technology Research 4, no. 1 (March 22, 2023): 380. http://dx.doi.org/10.56028/aetr.4.1.380.2023.

Full text
Abstract:
In multi-agent systems, the individual agent must form coalitions to accomplish complex tasks. However, the centralized management model is not flexible in a dynamic environment. To overcome the restriction caused by central control, the paper presents a self-organizing dynamic coalition mechanism based on game theory. Firstly, we adopt a distributed network to communicate among agents, allowing agents to solve the real-time task assignment problem autonomously. Next, a non-cooperative game negotiation model is introduced to find the optimal strategy for each agent. Finally, the effectiveness of our mechanism is validated by comparing it with the traditional command model in three distributed networks. Experimental results indicate the proposed mechanism is capable to improve the system utility.
APA, Harvard, Vancouver, ISO, and other styles
8

Xia, Meizhen, Zhucheng Liu, and Tianping Zhang. "Distributed adaptive cooperative control via command filters for multi-agent systems including input unmodeled dynamics and sensor faults." Applied Mathematics and Computation 457 (November 2023): 128194. http://dx.doi.org/10.1016/j.amc.2023.128194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guo, Mingkun, Guangqing Xia, Feng Yang, Cong Liu, Kai Liu, and Jingnan Yang. "Consensus Cooperative Encirclement Interception Guidance Law for Multiple Vehicles against Maneuvering Target." Applied Sciences 12, no. 14 (July 20, 2022): 7307. http://dx.doi.org/10.3390/app12147307.

Full text
Abstract:
This paper studies a cooperative encirclement interception guidance law against a maneuvering target that utilizes a leader–follower control scheme. The control design is decoupled into two parts. In the line-of-sight (LOS) direction, a fixed-time distributed disturbance observer is presented to estimate the maneuvering of the target. Based on the proposed disturbance observer, the guidance law is designed for the followers to guarantee that each follower’s total flight time achieves consensus with that of the leader. In the normal direction of the LOS, the control command is designed to realize the encirclement interception with a predefined-time consensus protocol. The convergence of the guidance algorithm is proven by the Lyapunov stability theory. Numerical simulations are provided to demonstrate the effectiveness and superiority of the proposed cooperative-guidance law.
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Dongyang, Wenyuan Zheng, Jixuan Yu, and Ji Li. "Research on the Primary Frequency Regulation Control Strategy of a Wind Storage Hydrogen-Generating Power Station." Electronics 11, no. 22 (November 10, 2022): 3669. http://dx.doi.org/10.3390/electronics11223669.

Full text
Abstract:
Wind curtailment and weak inertia characteristics are two factors that shackle the permeability of wind power. An electric hydrogen production device consumes electricity to produce hydrogen under normal working conditions to solve the problem of abandoning wind. When participating in frequency regulation, it serves as a load reduction method to assist the system to rebuild a power balance and improve the wind power permeability. However, due to its own working characteristics, an electric hydrogen production device cannot undertake the high-frequency component of the frequency regulation power command; therefore, an energy storage device was selected to undertake a high-frequency power command to assist the electric hydrogen production device to complete the system frequency regulation. This paper first proposes and analyzes the architecture of a wind storage hydrogen-generating station for centralized hydrogen production with a distributed energy storage, and proposes the virtual inertia and droop characteristic mechanism of the wind storage hydrogen-generating station to simulate a synchronous unit. Secondly, an alkaline electrolysis cell suitable for large-scale engineering applications is selected as the research object and its mathematical model is established, the matching between different energy storage devices and their cooperation in power grid frequency regulation is analyzed, and a super capacitor is selected. A control strategy for the wind storage hydrogen-generating power station to participate in power grid frequency regulation with a wide time scale is then proposed. Using the first-order low-pass filter, the low-frequency component of the frequency regulation power command is realized by an electric hydrogen production device load reduction, and a high-frequency component is realized by the energy storage device. Finally, the effectiveness and rationality of the proposed control strategy are verified by establishing the simulation model of the wind storage hydrogen-generating power station with different initial wind speed states, comparing the system frequency dip values under the proposed multi-energy cooperative control strategy and a single energy device control strategy.
APA, Harvard, Vancouver, ISO, and other styles
11

Xiong, Chang, Yixin Su, Danhong Zhang, Lan Chen, Huajie Zhang, and Qi Li. "A New Distributed Robust Power Control for Two-Layer Cooperative Communication Networks in Smart Grids with Reduced Utility Costs." Energies 16, no. 6 (March 22, 2023): 2911. http://dx.doi.org/10.3390/en16062911.

Full text
Abstract:
The packet loss during transmission of load control commands can lead to regulation errors in the smart grid and increase the cost of utility agencies due to the purchase of additional automatic generation control (AGC) services. In this paper, a two-layer cooperative communication network between the utility company and relays is presented. The utility company rents the relay to assist with the downlink transmission to improve the reliability of communication and reduce the data transmission cost due to packet loss. Furthermore, the uncertainty of channel gain is considered, and a two-tier game model is established. A distributed robust power control algorithm based on the continuous convex approximation method is proposed to obtain the optimal relay power allocation and price. Through the simulation analysis of the proposed scheme and the two comparison schemes, the cost of the utility company was reduced by 6% and 21%, and the standard deviation of income value between the relays was reduced by 40% and 48%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
12

Jiang, Zijie, Xiuxia Yang, Cong Wang, Yi Zhang, and Hao Yu. "Multi-UAV DMPC Cooperative Guidance with Constraints of Terminal Angle and Obstacle Avoidance." International Journal of Aerospace Engineering 2024 (March 20, 2024): 1–28. http://dx.doi.org/10.1155/2024/6912247.

Full text
Abstract:
This paper studies the salvo attack problem for multiple unmanned aerial vehicles (UAVs) against a maneuvering target, and a guidance scheme based on distributed model predictive control (DMPC) is presented to achieve cooperative interception with constraints of terminal impact angle and no-fly zone (or obstacle) avoidance. Firstly, for guaranteeing the synchronization of UAVs in calculating their acceleration commands, the assumed predictive trajectories are introduced, whose deviation from the actual state trajectories is limited by the designed compatibility constraints. Secondly, based on the velocity-obstacle model, the obstacle avoidance constraints are presented, and for guaranteeing the convergence of impact time and impact angles, the auxiliary controller and terminal ingredients are developed, which complete the design of DMPC cooperative guidance scheme. Subsequently, the rigorous proof for the convergence of the proposed guidance scheme is provided. Based on the above design, a complete implementation process of the guidance scheme is presented, in which each UAV uses the particle swarm optimization algorithm to solve the preprocessed local optimization problem, and only the shared information among neighbors is utilized for calculation. Finally, the numerical simulations are conducted under diverse cases, which demonstrate the effectiveness of the proposed guidance scheme when solving cooperative interception problems with terminal angle and obstacle avoidance constraints.
APA, Harvard, Vancouver, ISO, and other styles
13

Xi, Lei, Yudan Li, Yuehua Huang, Ling Lu, and Jianfeng Chen. "A Novel Automatic Generation Control Method Based on the Ecological Population Cooperative Control for the Islanded Smart Grid." Complexity 2018 (August 23, 2018): 1–17. http://dx.doi.org/10.1155/2018/2456963.

Full text
Abstract:
To achieve automatic generation control coordination in the islanded smart grid environment resulted from the increasing penetration of renewable energy, a novel ecological population cooperative control (EPCC) strategy is proposed in this paper. The proposed EPCC, based on the new win-loss criterion and the time tunnel idea, can compute the win-loss criterion accurately and converge to Nash equilibrium rapidly. Moreover, based on a multiagent system stochastic consensus game (MAS-SCG) framework, a frequent information exchange between agents (AGC units) is implemented to rapidly calculate optimal power command, which achieves the optimal cooperative control of the islanded smart grid. The PDWoLF-PHC(λ), WPH strategy (wolf pack hunting), DWoLF-PHC(λ), Q(λ)-learning, and Q-learning are implemented into the islanded smart grid model for the control performance analysis. Two case studies have been done, including the modified IEEE standard two-area load frequency control power system model and the islanded smart grid model with distributed energy and microgrids. The effectiveness, stronger robustness, and better adaptability in the islanded smart grid of the proposed method are verified. Compared with five other smart ones, EPCC can improve convergence speed than that of others by nearly 33.9%–50.1% and the qualification rate of frequency assessment effectively by 2%–64% and can reduce power generation cost.
APA, Harvard, Vancouver, ISO, and other styles
14

Jiang, Yun, Yuan Kong, and Chaoping Zhu. "Implementation of Arithmetic Operations by SN P Systems with Communication on Request." International Journal of Computers Communications & Control 13, no. 3 (May 27, 2018): 353–64. http://dx.doi.org/10.15837/ijccc.2018.3.3284.

Full text
Abstract:
Spiking neural P systems (SN P systems, for short) are a class of distributed and parallel computing devices inspired from the way neurons communicate by means of spikes. In most of the SN P systems investigated so far, the system communicates on command, and the application of evolution rules depends on the contents of a neuron. However, inspired from the parallel-cooperating grammar systems, it is natural to consider the opposite strategy: the system communicates on request, which means spikes are requested from neighboring neurons, depending on the contents of the neuron. Therefore, SN P systems with communication on request were proposed, where the spikes should be moved from a neuron to another one when the receiving neuron requests that. In this paper, we consider implementing arithmetical operations by means of SN P systems with communication on request. Specifically, adder, subtracter and multiplier are constructed by using SN P systems with communication on request.
APA, Harvard, Vancouver, ISO, and other styles
15

Aljumah, Abdullah, and Tariq Ahamed Ahanger. "Blockchain-Based Information Sharing Security for the Internet of Things." Mathematics 11, no. 9 (May 4, 2023): 2157. http://dx.doi.org/10.3390/math11092157.

Full text
Abstract:
The Blockchain (BCT) is the first decentralized ledger to include a trust mechanism in its design. It establishes a trustworthy framework for distributed commands by using data redundancy at several nodes. Conspicuously, the current study presents a BCT-based lightweight IoT information exchange security architecture for data exchange. The proposed technique uses a dual chain methodology, namely transaction and data BCT working together to provide distributed storage and tamper-proofing of data. Moreover, Transaction BCT is enhanced by a consensus algorithm using a practical Byzantine fault-tolerant (PBFT) mechanism. The proposed algorithm can increase data registering efficiency, transactions, and privacy protection BCT. It is deduced that local dominance can be avoided using the dynamic game strategy of node cooperation. Furthermore, by reporting the node’s global reputation value, the status of the unknown node may be approximated. The high-trust measure is utilized to adjust the weight of the affected node in the combined node-set, leading to the Bayesian equilibrium. The proposed model is validated in several experimental simulations and results are compared with state-of-the-art techniques. Based on the results, enhanced performance is registered for the proposed techniques in terms of temporal delay, statistical efficiency, reliability, and stability.
APA, Harvard, Vancouver, ISO, and other styles
16

Sapaty, P. S. "Managing multiple satellite architectures by spatial grasp technology." Mathematical machines and systems 1 (2021): 3–16. http://dx.doi.org/10.34121/1028-9763-2021-1-3-16.

Full text
Abstract:
The paper reviews some advanced space projects oriented on many satellites moving around the globe in low Earth orbits, and investigates how to organize their collective operation for solving important world problems, especially those related to global security and defense. It analyzes the application of the developed Spatial Grasp model and Technology (SGT), successfully tested on numerous applications, for simulation and management of multiple satellite architectures. Of particular interest is the latest Space Development Agency Next-Generation Space Architecture that uses a great number of cooperating satellites organized on different layers, which appears to be much more advanced than the known Strategic Defense Initiative project of the eighties. SGT is based on mobile recursive scenarios in a special high-level Spatial Grasp Language (SGL) which can self-navigate and self-match distributed environments while leaving throughout them powerful spatial infrastructures capable of solving any distributed problems. Providing basics of the latest SGT version, the paper describes examples of solutions in it of such problems as distributed tracing and elimination of complexly moving cruise missiles and hypersonic gliders, organization of effective custody layer which will be able to observe not only localized dangerous objects on the Earth but also any distributed terrestrial infrastructures as a whole. It also shows how to introduce a higher virtual layer for satellite constellation which may simplify formulation and solution of many problems in both terrestrial and celestial environments, including advanced command and control of complex national and international operations and campaigns from space.
APA, Harvard, Vancouver, ISO, and other styles
17

Wan, Yu, Jun Tang, and Zipeng Zhao. "Imitation Learning of Complex Behaviors for Multiple Drones with Limited Vision." Drones 7, no. 12 (December 13, 2023): 704. http://dx.doi.org/10.3390/drones7120704.

Full text
Abstract:
Navigating multiple drones autonomously in complex and unpredictable environments, such as forests, poses a significant challenge typically addressed by wireless communication for coordination. However, this approach falls short in situations with limited central control or blocked communications. Addressing this gap, our paper explores the learning of complex behaviors by multiple drones with limited vision. Drones in a swarm rely on onboard sensors, primarily forward-facing stereo cameras, for environmental perception and neighbor detection. They learn complex maneuvers through the imitation of a privileged expert system, which involves finding the optimal set of neural network parameters to enable the most effective mapping from sensory perception to control commands. The training process adopts the Dagger algorithm, employing the framework of centralized training with decentralized execution. Using this technique, drones rapidly learn complex behaviors, such as avoiding obstacles, coordinating movements, and navigating to specified targets, all in the absence of wireless communication. This paper details the construction of a distributed multi-UAV cooperative motion model under limited vision, emphasizing the autonomy of each drone in achieving coordinated flight and obstacle avoidance. Our methodological approach and experimental results validate the effectiveness of the proposed vision-based end-to-end controller, paving the way for more sophisticated applications of multi-UAV systems in intricate, real-world scenarios.
APA, Harvard, Vancouver, ISO, and other styles
18

He, Sheng, Shaohua Yue, Gang Wang, Siyuan Wang, Jiayi Liu, Wei Liu, and Xiangke Guo. "Target Assignment Algorithm for Joint Air Defense Operation Based on Spatial Crowdsourcing Mode." Electronics 11, no. 11 (June 3, 2022): 1779. http://dx.doi.org/10.3390/electronics11111779.

Full text
Abstract:
Spatial crowdsourcing is a mode that uses distributed artificial computing power to solve specific function sets through Internet outsourcing. It has broad application value in the networked command and control of current joint air defense operations. In this paper, we introduce the spatial crowdsourcing theory into the field of target allocation for joint air defense operations and establish a weapon-target assignment model based on spatial crowdsourcing mode, which is more appropriate to the real situation and highlights the system cooperation capability of joint air defense operations. To solve the model, we propose a heuristic variable weight nonlinear learning factor particle swarm optimization (VWNF-PSO). This algorithm can significantly improve the efficiency and adaptability to weapon-target assignment problems under large-scale extreme conditions. Finally, we establish two kinds of joint air defense operation scenarios to verify the proposed model, then compare the proposed algorithm with variable weight PSO (VWPSO) and adaptive learning factor PSO (AFPSO), to validate the effectiveness and efficiency of the VWNF-PSO algorithm proposed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
19

Muretta, Julie E., Thea McCurdy, and John David Kirtley. "Investigations of Biochar Steam Gasification for Integration with Proton Ceramic Fuel Cells." ECS Meeting Abstracts MA2023-01, no. 40 (August 28, 2023): 2833. http://dx.doi.org/10.1149/ma2023-01402833mtgabs.

Full text
Abstract:
Typical anode materials used in proton ceramic fuel cells (PCFCs) are known to be resistant to both coking and sulfur poisoning, setting these devices apart from the more mature solid oxide fuel cells which still suffer from degradation issues. Thus, PCFCs may offer improved flexibility to operate with typically problematic bio-derived fuels such as sulfur-laden synthesis gas and methane. Steam gasification of biomass and biochar promises a viable option to generate synthesis gas fuel for use in fuel cells, but the fate of sulfur naturally present in these feedstocks is not fully known, and ppm-levels of gaseous sulfur in synthesis gas could prove problematic even for PCFCs. To investigate the potential for biochar gasification for production of low-sulfur, hydrogen-rich syngas, ground P. trichocarpa feedstock was pyrolyzed to 450° C and 700° C and subsequently gasified in 3%(vol.) steam at 700 ˚C. Water-leaching and CaCO3 coating of biomass prior to pyrolysis were additionally investigated as non-toxic, facile means of removing or reacting with (respectively) sulfates before those species could be converted to problematic organosulfur and gaseous sulfur (SO2, H2S, etc.) during pyrolysis and gasification. Gasification products from an updraft packed bed gasification reactor were tracked by quadrupole mass spectrometer, and solids before and after gasification were evaluated using Raman spectroscopy, SEM, and/or XRD. Preliminary results indicate that gasification in 3% (vol. in UHP Ar) steam can produce hydrogen- and methane-rich fuels low in H2S and SO2. Inorganics content and pyrolysis temperature suggest a synergistic effect on the production of H2, CO, CH4 and CO2 as well as H2S. This research was sponsored by the Combat Capabilities Development Command Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-20-2-0163. The views and conclusions contained in this document are those of the authors, and should not be interpreted as representing the official policies, either expressed or implied, of the Combat Capabilities Development Command Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.
APA, Harvard, Vancouver, ISO, and other styles
20

Yogaswara, Andrey Satwika, Disman Disman, Eeng Ahman, and Nugraha Nugraha. "Kinerja Dilihat dari Perspektif Kepemimpinan Militer dan Budaya Organisasi." Image : Jurnal Riset Manajemen 11, no. 2 (October 30, 2023): 142–51. http://dx.doi.org/10.17509/image.2023.013.

Full text
Abstract:
This study aims to determine the role of military leadership and organizational culture on leaders' performance in the TNI AD Military Police unit. The approach used is descriptive verification with multiple regression methods. The population in the study were 69 POMDAM and DENPOM commanders throughout Indonesia. Data collection used a questionnaire distributed via google forms in one data collection (cross-sectional method). Military leadership variables are measured by task-oriented, relationship-oriented, change-oriented, and external dimensions. Organizational culture variables are measured using the dimensions of individual behavior, norms, dominant values, philosophy, applicable regulations, and organizational climate. Meanwhile, the TNI Commander's regulations measure the leader's performance, including quantity, quality, creativity, cooperation, initiative, and personal qualities. The findings show that military leadership and organizational culture significantly affect leadership performance, partially or simultaneously. Military leadership, which is a projection of the personality and character of a leader to make his subordinates do what is asked, can explain performance. Oath-based military culture includes matters such as commitment, values, and behavior which are elements in the culture that play a role in improving the performance of every level of personnel in the organization.
APA, Harvard, Vancouver, ISO, and other styles
21

Bogdanov, K., and M. Yevtodyeva. "U.S.–China: Mechanisms and Dynamics of Arms Race." World Economy and International Relations 65, no. 6 (2021): 42–50. http://dx.doi.org/10.20542/0131-2227-2021-65-6-42-50.

Full text
Abstract:
Received 23.12.2020. The U.S.–China confrontation, generating a military technology race, has been gradually developed over a long period of time after the end of the Cold War. The mission of countering U.S. forces in a possible armed conflict in the Southeast Asian region has led China to adopt a “counter-intervention strategy”, better known by the designation “anti-access/area denial” (A2/AD). The U.S. responded by development of sea-based missile defense systems, which has dangerously damaged the military balance. The study shows that both countries independently faced the need to accelerate one of the most destabilizing types of modern weapons – hypersonic weapons – during this race that required specific military-technical solutions. The course of this arms race has led the U.S. to development of the “AirSea Battle” concept and then other more radical operational concepts, such as “distributed lethality”, requiring a complete step-by-step restructuring of the Navy. A study of the behavior of both powers shows that, at the present stage, the “arms race” is increasingly becoming a more complex process of “technological race”, in which it is at times difficult to distinguish the components of the dynamics of the civilian and military sectors of the economy and of advanced researches and developments. The U.S. adoption of the ambitious “Third Offset Strategy” program occurred simultaneously with the deployment of Chinese research in similar directions, including the improvement of command, control and communications systems, development of lethal autonomous weapons systems and military applications of artificial intelligence. One of the main questions in this regard is to what extent the U.S. dispersed model of innovation management can compete with the Chinese centralized model of “military-civil fusion” marked by its high ability to concentrate resources and at the same time – linkages with global markets through the national champion companies. Acknowledgments. The article was prepared within the project “Post-crisis world order: challenges and technologies, competition and cooperation” supported by the grant from Ministry of Science and Higher Education of the Russian Federation program for research projects in priority areas of scientific and technological development (Agreement № 075-15-2020-783).
APA, Harvard, Vancouver, ISO, and other styles
22

Vakhrusheva, O. V., P. A. Egorova, and T. G. Mukhina. "Development language independence formation as a factor of professional training effectiveness." Vestnik of Minin University 7, no. 3 (August 10, 2019): 7. http://dx.doi.org/10.26795/2307-1281-2019-7-3-7.

Full text
Abstract:
Introduction: orientation to the international cooperation in the context of carrying out missions on providing national and common security, integration of actions at struggle with terrorism transform requirements revealed to the military specialists professional training and determine the National Guard troops need for servicemen who know the international language and able to perform service and fighting missions up to the world standard. The potential of foreign language learning can implemented to the full extent and contributed greatly to the future military specialist personality development, if foreign language training is based on cadet’s foreign language formation. So cadet’s foreign language formation is the means to increase professional training effectiveness. It is the factor influencing the future officer’s readiness to integration to the international professional community.Materials and methods: study and survey of scientific literature, generalization of domestic and foreign experience on the theme, conversation with cadets and their direct commanders, overseeing the cadets’ independent work organization on foreign language learning permit to conclude the following. Cadets do not possess foreign language independence and demonstrate low capability to carry out their independent work. It is demonstrated in difficulties with their independent foreign language activities planning. Future officers are not able to set a goal, determine work stages, distribute time for their reasonable performing, choose means and ways, control. The purpose of methodic experiment is to detect and approve effective means of foreign language formation in the conditions of systematic and goal-oriented independent work organization.Results: as the result of conducted experiment a methods of foreign language formation is developed and approved. The methods developed in the course of studies are an algorithm of education that includes some structured blocks. They are the goal setting block, the theoretical block, the technological block and the assessment block.Discussion and Conclusions: in the course of methodical experiment positive effect of systematically organized independent work on future officers’ foreign language independence formation is approved. Quantitative indicators of foreign language independence formation, received in the course of the experiment, are approved in real qualitative changes demonstrated by cadets. Overseeing cadets at the education process and communication with them prove practical independence using that resulting in future officers’ capability to organize their independent work in the context of foreign language learning. Cadets employ formed foreign language independence at lessons and extracurricular classes. With the foundation on theoretical and practical development on cadet’s foreign language independence formation it is possible to revise the system of foreign language teaching and change it according to the social and governmental order.
APA, Harvard, Vancouver, ISO, and other styles
23

Deutsch, Michael E., and Erica Thompson. "Secrets and Lies: The Persecution of Muhammad Salah (Part II)." Journal of Palestine Studies 38, no. 1 (2008): 25–53. http://dx.doi.org/10.1525/jps.2008.38.1.25.

Full text
Abstract:
Among the handful of high-profile terrorism cases in which the U.S. government has failed to win convictions in jury trials, that of Muhammad Salah stands out. Like the cases against Sami Al-Arian, Abdelhaleem Ashqar, and the Holy Land Foundation, the case against Salah was built on the criminalization of political support for the Palestinian resistance. But while the Palestinian-Israeli conflict is at the core of all four cases, Salah's, unlike the others, was primarily about Israel: the case was manufactured in Israel, the evidence on which it was based was generated in Israel, and its prosecution depended on close U.S.-Israeli cooperation at every turn. Salah, a Palestinian-American Chicago resident and former grocer, was arrested in Israel in January 1993 while on a mission to distribute money to poverty-stricken Palestinians in the occupied territories. Accused of being a U.S.-based Hamas terrorist commander, he was interrogated by Shin Bet, tried before a military tribunal, and spent almost five years in prison in Israel. While the U.S. initially supported Salah and rejected Israel's accusations against him, in January 1995 he became (while still in prison) the first and (to date) only U.S. citizen to be branded a ““specially designated terrorist”” by his government. Upon his return home in November 1997, he was one of the main targets of an intensive terrorism funding investigation, dropped in 2000 for lack of evidence but reactivated in 2002 in the wake of 9/11. In this two-part exclusive report, Salah's lawyers recount for the first time the details of their client's labyrinthine case. Part I focused on the Israeli phase of the story, including the political context of Salah's arrest, and the investigations and legal proceedings launched against him in the United States when he returned. In essence, part I laid the foundation for the trial to come, emphasizing in particular its complex legal underpinnings and implications as well as its importance as a ““test case.”” Part II focuses on the post-9/11 period that unfolded under the George W. Bush Justice Department, starting with Salah's indictment in November 2004, continuing with the two years of contentious pretrial preparations and hearings, and ending with the trial itself. As in part I, the legal dimensions of the case are emphasized, as are the government's maneuvers to advance new standards governing the admissibility of coerced confessions and secret evidence at trial and to manipulate other established principles of the U.S. criminal justice system. This article deals solely with Muhammad Salah, but Abdelhaleem Ashqar, a former professor of business administration in Virginia, was his codefendant at trial. Both were indicted, along with twenty other coconspirators, for participation in a fifteen-year ““racketeering conspiracy”” to ““illegally finance terrorist activities”” in Israel and the occupied territories, as well as for several lesser charges. The two men had never met before the trial opened in October 2006. Despite the common charge, their cases were very different and went forward in parallel fashion, with different lawyers, witnesses, arguments, and entirely separate pretrial proceedings. When the jury trial ended in February 2007, both men were acquitted of all terrorism-related charges.
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Xiang, and Xiaogeng Liang. "Integrated Guidance and Control of Multiple Interceptor Missiles Based on Improved Distributed Cooperative Control Strategy." Journal of Aerospace Technology and Management, May 2, 2019. http://dx.doi.org/10.5028/jatm.v11.1003.

Full text
Abstract:
In this study, an improved cooperative integrated guidance and control (IGC) design method is proposed based on distributed networks to address the guidance and control problem of multiple interceptor missiles. An IGC model for a leading interceptor is constructed based on the relative kinematic relations between missiles and a target and the kinematic equations of the missiles in a pitch channel. The unknown disturbances of the model are estimated using a finite-time disturbance observer (FTDO). Then, the control algorithm for the leading interceptor is designed according to the disturbance estimation and nonsingular fast dynamic surface sliding mode control (SMC). To enhance the rate of convergence of the cooperative control commands for the interceptors, an improved cooperative control strategy is proposed based on the leader-follower distributed network. Consequently, the two velocity components of the interceptor in the pitch channel can be obtained, which are subsequently converted to the total velocity and flight path angle commands of the interceptor using kinematic relations. The control algorithm for the following interceptor is similarly designed using an FTDO and dynamic surface SMC. The effectiveness of the improved distributed cooperative control strategy for multiple interceptors is validated through simulations.
APA, Harvard, Vancouver, ISO, and other styles
25

Zefferman, Matthew R. "Constraints on cooperation shape hierarchical versus distributed structure in human groups." Scientific Reports 13, no. 1 (January 20, 2023). http://dx.doi.org/10.1038/s41598-022-23454-9.

Full text
Abstract:
AbstractSome human groups are organized hierarchically and some are distributed. Both types of groups occur in economic, political, and military domains, but it is unclear why hierarchical organizations are favored in certain contexts and distributed organizations are favored in others. I propose that these different organizational structures can be explained by human groups having different constraints on their ability to foster cooperation within the group. Human within-group cooperation is often maintained by monitoring and punishment. In hierarchical groups, monitoring and punishment are organized into tree-like command-and-control structures with supervisors responsible for monitoring the cooperation of their subordinates and punishing non-cooperators. By contrast, in distributed groups, monitoring is diffuse and punishment is collective. I propose that the organization of cooperative human groups is constrained by the costs of monitoring and punishment. I formalize this hypothesis with a model where individuals in a group cooperate to produce public goods while embedded in a network of monitoring and punishment responsibilities. I show that, when punishment costs are high and monitoring costs are low, socially-optimal monitoring and punishment networks are distributed. The size of these distributed networks is constrained by monitoring costs. However, when punishment costs are low, socially-optimal networks are hierarchical. Monitoring costs do not constrain the size of hierarchical networks but determine how many levels of supervision are required to foster cooperation in the hierarchical group. These results may explain the increasingly large and hierarchical groups throughout much of human history. They also suggest that the recent emergence of large-scale distributed organizations has been possible because new technologies, like the internet, have made monitoring costs extremely low.
APA, Harvard, Vancouver, ISO, and other styles
26

He, Zhichuan, Shipeng Fan, Jiang Wang, and Peng Wang. "Distributed observer‐based fixed‐time cooperative guidance law against maneuvering target." International Journal of Robust and Nonlinear Control, August 29, 2023. http://dx.doi.org/10.1002/rnc.6959.

Full text
Abstract:
SummaryThis paper presents a fixed‐time cooperative guidance law for leader‐following missiles, comprising one leader missile with the target seeker and several seeker‐less follower missiles. The aim is to achieve a simultaneous attack on a maneuvering target at desired impact angles. First, a guidance law with impact angle control for the leader missile against a maneuvering target is proposed based on nonsingular fast terminal sliding mode (NFTSM) control algorithm. Then, the design of cooperative guidance law for the follower missiles is composed of two parts: along the follower‐to‐leader line of sight (LOS) direction, the guidance command derived from bi‐homogeneous property is designed to ensure that the follower‐leader ranges keep proportional consensus with the range‐to‐go of the leader missile, thus avoiding the estimation of time‐to‐go (); in the normal follower‐to‐leader LOS direction, considering the relative impact angle constraints which is determined by the leader LOS angle, the guidance command is proposed based on predefined‐time sliding mode control method. What's more, a distributed fixed‐time observer is designed for the follower missiles to compensate for unobtainable leader missile information. The fixed‐time stability of the proposed methods is demonstrated using the Lyapunov theory and bi‐homogeneous property. Finally, simulation results confirm the effectiveness and superiority of the proposed fixed‐time cooperative guidance law with leader‐following strategy.
APA, Harvard, Vancouver, ISO, and other styles
27

Peng, Junmin, and Kaining Wang. "Distributed adaptive controller for the cooperative control of networked parametric strict feedback systems." Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering, March 9, 2023, 095965182311589. http://dx.doi.org/10.1177/09596518231158985.

Full text
Abstract:
In this article, we investigate the cooperative control of networked parametric strict feedback systems in the presence of uncertainties and nonlinearities. A distributed controller is constructed recursively such that the synchronization error of agents’ outputs can be bounded, that is, practical output synchronization is achieved. By command-filtered backstepping approach, the derivation of the virtual control is avoided, which significantly reduces the computational burden of each agent. Moreover, the neighborhood information which is needed for agent i to construct its controller is minimized. Therefore, information transfer burden is eased as well. It is proved that practical output synchronization is achieved when the digraph has a spanning tree. Finally, the effectiveness of the proposed controller is illustrated by a numerical example.
APA, Harvard, Vancouver, ISO, and other styles
28

Kang, Honglong, Pengyu Wang, and Shenmin Song. "A generalized three-dimensional cooperative guidance law for various communication topologies with field-of-view constraint." Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering, February 2, 2023, 095441002311532. http://dx.doi.org/10.1177/09544100231153265.

Full text
Abstract:
In this paper, a generalized three-dimensional (3D) cooperative guidance law with seeker’s field-of-view (FOV) constraints is designed for multiple missiles to achieve salvo attack against a stationary target. The proposed generalized guidance law is composed of two parts: a proportional navigation guidance (PNG) component for target capture and a biased feedback component for simultaneous arrival. Two novel auxiliary functions are integrated into the biased feedback component to guarantee the satisfaction of FOV constraint. Furthermore, a time-varying lower bound that contains the impact time error is utilized to avoid the guidance command singularity. The proposed guidance law can be easily applied to various missile communication topologies, including centralized connected, distributed connected, and no-connected topologies. The convergence of impact time error, FOV constraint satisfaction, and command non-singularity of the proposed guidance law are theoretically analyzed and proved. Extensive numerical simulations with comparative studies are conducted to demonstrate the effectiveness and advantages of the proposed guidance law.
APA, Harvard, Vancouver, ISO, and other styles
29

Mei, Di, Jian Sun, Yong Xu, and Lihua Dou. "Model‐free learning‐based distributed cooperative tracking control of human‐in‐the‐loop multi‐agent systems." International Journal of Robust and Nonlinear Control, March 18, 2024. http://dx.doi.org/10.1002/rnc.7333.

Full text
Abstract:
AbstractThis article studies the model‐free learning‐based distributed cooperative tracking control of human‐in‐the‐loop multi‐agent systems in the presence of an active leader. The core role of human‐in‐the‐loop is to use the ground station to send control commands to the non‐zero control input of the leader, and then directly or indirectly control a group of agents to complete complex tasks. Meanwhile, three essential demands including the completely unknown system model, the control objective obtained optimally, as well as no initial admissible control strategy requirement, are satisfied simultaneously. It is worth emphasizing that the relevant results only satisfy one or two demands at most, which are essentially not applicable to this problem. In this article, a model‐based human‐in‐the‐loop learning algorithm is first presented to achieve the optimal tracking control, as well as the convergence of the proposed learning algorithm is proved. Then, a bias‐based data‐driven learning algorithm is proposed, which provides the potential opportunities to overcome the difficulties caused by the above‐mentioned three demands. Finally, the validity of theoretical results is testified by a numerical example.
APA, Harvard, Vancouver, ISO, and other styles
30

Jiang, Chao, Xinchi Huang, and Yi Guo. "End-to-end decentralized formation control using a graph neural network-based learning method." Frontiers in Robotics and AI 10 (November 7, 2023). http://dx.doi.org/10.3389/frobt.2023.1285412.

Full text
Abstract:
Multi-robot cooperative control has been extensively studied using model-based distributed control methods. However, such control methods rely on sensing and perception modules in a sequential pipeline design, and the separation of perception and controls may cause processing latencies and compounding errors that affect control performance. End-to-end learning overcomes this limitation by implementing direct learning from onboard sensing data, with control commands output to the robots. Challenges exist in end-to-end learning for multi-robot cooperative control, and previous results are not scalable. We propose in this article a novel decentralized cooperative control method for multi-robot formations using deep neural networks, in which inter-robot communication is modeled by a graph neural network (GNN). Our method takes LiDAR sensor data as input, and the control policy is learned from demonstrations that are provided by an expert controller for decentralized formation control. Although it is trained with a fixed number of robots, the learned control policy is scalable. Evaluation in a robot simulator demonstrates the triangular formation behavior of multi-robot teams of different sizes under the learned control policy.
APA, Harvard, Vancouver, ISO, and other styles
31

"Investigation of Factors Influencing the Implementation of Smart Fire Management using the Fuzzy Approach in Yazd, Iran." Journal of Rescue and Relief, November 24, 2020, 197–209. http://dx.doi.org/10.32592/jorar.2020.12.3.5.

Full text
Abstract:
INTRODUCTION: The development and application of new firefighting technologies are inevitable considering an increase in the number of smart technologies, the widespread use of technologies in various industries and all domains of human societies, utilization of polymeric materials in the tools and infrastructure of societies, as well as the production of new structures with diverse uses, and their aggregation together. The occurrence of massive disasters due to the lack of development and application of safety along with technology is the result of neglecting safety in the development process and social progress. This study aimed to investigate the factors influencing the implementation of smart fire management using the fuzzy approach. METHODS: This descriptive-analytical study was designed based on an applied research method. Initially, all factors influencing the implementation of smart fire management were extracted from the literature. They were then evaluated based on experts and university professorschr('39') opinions. Following that, three types of questionnaires were distributed among the experts. The study population included 15 university experts and managers in the Fire Organization in Yazd, Iran. FINDINGS: The results showed that "command and operations", "integration of smart firefighting systems", "clear business plan and vision", "effective change management", "equipment", "cooperation between the business association and information technology" and "management support" obtained positive D-R and were considered causes. CONCLUSION: The "integration of smart firefighting systems" was regarded as the most effective factor, followed by "organizational resource planning", "exchange system", and "communication system" that ensure the success of these systems. This improves information flow and decision-making process, especially in a crisis.
APA, Harvard, Vancouver, ISO, and other styles
32

RIJALUL FIKRI, AHMAD LUTFI, MUAIDY YASIN, and AKHMAD JUPRI. "KONSEP PENGELOLAAN KOPERASI PESANTREN UNTUK KESEJAHTERAAN EKONOMI MASYARAKAT: TELAAH SURAH AL-HASYR AYAT 7." ISLAMICONOMIC: Jurnal Ekonomi Islam 9, no. 2 (December 31, 2018). http://dx.doi.org/10.32678/ijei.v9i2.96.

Full text
Abstract:
Abstract. The Management of Islamic Boarding Schools Cooperative Concept for Community Economic Welfare: Study of Surah Al-Hasyr Verse: 7. Al-Qur'an with its verses becomes the economic foundation that has given the principles of life in relationships between man and his fellowmen. It contains rules and guidance for his loyalists to do good things and stay away from actions that are considered vandalism and tyranny. Therefore, Al-Qur’an which is foundation of the whole teachings of Islam is not just about the collection of rules and prohibitions, but provides assurance for the realization of economic prosperity of the community. In this article, the writer intends to reveal the clarity of the concept of pesantren cooperative management for the economic welfare of community in the perspective of sura al-Hashr verse 7. Al-Quran believes that economic welfare is not only the problem of economic distribution materially but also concerning non material and other fields. Therefore, to achieve growth and development materially and spiritually, Islamic Economics has characteristics in its growth, which is all-round, balanced, realistic, fair, responsible, sufficient and focusing on human beings in accordance with their right as khalifah on earth. These characteristics indicate that the goal of growth and economic development in Islam is the opportunity of all members of any community of race, religion and character to gain prosperity, so that everyone can experience the blessings and grace of Allah. Al-Qur'an demands all of its loyalists to carry out the whole teaching of Islam in all aspects of their life. The consequence of this concept is that economic welfare should be viewed as the embodiment of God's command to his servants. So that economic welfare is a continuous effort of mankind to do the best, both to God and fellow human beings based on the guidance of Al-Quran. Abstrak. Konsep Pengelolaan Koperasi Pesantren Untuk Kesejahteraan Ekonomi Masyarakat: Telaah Surah Al-Hasyr Ayat 7. Al-Quran dengan ayat-ayatnya menjadi landasan ekonomi yang telah memberikan prinsip-prinsip kehidupan dalam menjalin hubungan antara manusia dengan sesamanya. Di dalamnya berisi aturan dan sekaligus tuntutan agar pengikut-pengikutnya berbuat hal-hal yang baik dan menjauhi tindakan yang dianggap pengerusakan dan kedzaliman. Oleh karenanya Al-Quran yang menjadi landasan dari keseluruhan ajaran Islam tidak sekedar berisi tentang kumpulan peraturan dan larangan, tetapi memberikan jaminan untuk terwujudnya kesejahteraan ekonomi masyarakat. Pada artikel ini, penulis bermaksud mengungkap kejelasan konsep pengelolaan koperasi pesantren untuk kesejahteraan ekonomi masyarakat dalam perpektif surat al-Hasyr ayat 7. Al-Quran memandang bahwa kesejahteraan ekonomi bukan semata-mata hanya permasalahan distribusi ekonomi secara materi semata-mata tetapi juga menyangkut unsur non materi dan bidang-bidang yang lainnya. Oleh karena itu, untuk mencapai pertumbuhan dan perkembangan secara material dan spiritual tersebut, Ekonomi Islam mempunyai karakteristik dalam pertumbuhannya, yaitu serba meliputi, berimbang, realistis, berkeadilan, tanggungjawab, mencukupi dan berfokus pada manusia sesuai dengan haknya sebagai khalifah di muka bumi. Karakteristik tersebut menunjukkan bahwa tujuan pertumbuhan dan pembangunan ekonomi dalam Islam adalah adanya kesempatan semua anggota masyarakat apapun ras, agama dan karakternya – untuk mendapatkan kesejahteraan, sehingga semua orang dapat merasakan nikmat dan karunia Allah Swt. Al-Quran menuntut para pengikutnya untuk menjalankan keseluruhan ajaran Islam dalam semua aspek kehidupannya. Konsekuensi dari konsep ini adalah kesejahteraan ekonomi harus dipandang sebagai perwujudan perintah Tuhan kepada hamba-hambanya. Sehingga kesejahteraan ekonomi merupakan upaya terus menerus dari umat manusia untuk berbuat sebaik-baiknya, baik kepada Tuhan maupun kepada sesama manusia berdasarkan petunjuk Al-Quran
APA, Harvard, Vancouver, ISO, and other styles
33

Hands, Joss. "Device Consciousness and Collective Volition." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.724.

Full text
Abstract:
The article will explore the augmentation of cognition with the affordances of mobile micro-blogging apps, specifically the most developed of these: Twitter. It will ask whether this is enabling new kinds of on-the-fly collective cognition, and in particular what will be referred to as ‘collective volition.’ It will approach this with an address to Bernard Stiegler’s concept of grammatisation, which he defines as as, “the history of the exteriorization of memory in all its forms: nervous and cerebral memory, corporeal and muscular memory, biogenetic memory” (New Critique 33). This will be explored in particular with reference to the human relation with the time of protention, that is an orientation to the future in the lived moment. The argument is that there is a new relation to technology, as a result of the increased velocity, multiplicity and ubiquity of micro-communications. As such this essay will serve as a speculative hypothesis, laying the groundwork for further research. The Context of Social Media The proliferation of social media, and especially its rapid shift onto diverse platforms, in particular to ‘apps’—that is dedicated software platforms available through multiple devices such as tablet computers and smart phones—has meant a pervasive and intensive form of communication has developed. The fact that these media are also generally highly mobile, always connected and operate though very sophisticated interfaces designed for maximum ease of use mean that, at least for a significant number of users, social media has become a constant accompaniment to everyday life—a permanently unfolding self-narrative. It is against this background that multiple and often highly contradictory claims are being made about the effect of such media on cognition and group dynamics. We have seen claims for the birth of the smart mob (Rheingold) that opens up the realm of decisive action to multiple individuals and group dynamics, something akin to that which operates during moments of shared attention. For example, in the London riots of 2011 the use of Blackberry messenger was apportioned a major role in the way mobs moved around the city, where they gathered and who turned up. Likewise in the Arab Spring there was significant speculation about the role of Twitter as a medium for mass organisation and collective action. Why such possibilities are mooted is clear in the basic affordances of the particular social media in question, and the devices through which these software platforms operate. In the case of Twitter it is clear that simplicity of its interface as well as its brevity and speed are the most important affordances. The ease of the interface, the specificity of the action—of tweeting or scrolling though a feed—is easy. The limitation of messages at 140 characters ensures that nothing takes more than a small bite of attention and that it is possible, and routine, to process many messages and to communicate with multiple interlocutors, if not simultaneously then in far faster succession that is possible in previous applications or technologies. This produces a form of distributed attention, casting a wide zone of social awareness, in which the brains of Twitter users process, and are able to respond to, the perspectives of others almost instantly. Of course the speed of the feed that, beyond a relatively small number of followed accounts, means it becomes impossible to see anything but fragments. This fragmentary character is also intensified by the inevitable limitation of the number of accounts being followed by any one user. In fact we can add a third factor of intensification to this when we consider the migration of social media into mobile smart phone apps using simple icons and even simpler interfaces, configured for ease of use on the move. Such design produces an even greater distribution of attention and temporal fragmentation, interspersed as they are with multiple everyday activities. Mnemotechnology: Spatial and Temporal Flux Attending to a Twitter feed thus places the user into an immediate relationship to the aggregate of the just passed and the passing through, a proximate moment of shared expression, but also one that is placed in a cultural short term memory. As such Twitter is thus a mnemotechnology par-excellence, in that it augments human memory, but in a very particular way. Its short termness distributes memory across and between users as much, if not more, than it does extend memory through time. While most recent media forms also enfold their own recording and temporal extension—print media, archived in libraries; film and television in video archives; sound and music in libraries—tweeting is closer to the form of face to face speech, in that while it is to an extent grammatised into the Twitter feed its temporal extension is far more ambiguous. With Twitter, while there is some cerebral/linguistic memory extension—over say a few minutes in a particular feed, or a number of days if a tweet is given a hash tag—beyond this short-term extension any further access becomes a question of paying for access (after a few days hash tags cease to be searchable, with large archives of tweets being available only at a monetary cost). The luxury of long-term memory is available only to those that can afford it. Grammatisation in Stiegler’s account tends to the solidifying extension of expression into material forms of greater duration, forming what he calls the pharmakon, that is an external object, which is both poison and cure. Stiegler employs Donald Winnicott’s concept of the transitional object as the first of such objects in the path to adulthood, that is the thing—be it blanket, teddy or so forth—that allows the transition from total dependency on a parent to separation and autonomy. In that sense the object is what allows for the transition to adulthood, but within which lies the danger of excessive attachment, dependency and is "destructive of autonomy and trust" (Stiegler, On Pharmacology 3). Writing, or hypomnesis, that is artificial memory, is also such a pharmakon, in as much as it operates as a salve; it allows cultural memory to be extended and shared, but also according to Plato it decays autonomy of thought, but in fact—taking his lead from Derrida—Stiegler tells us that “while Plato opposes autonomy and heteronomy, they in fact constantly compose” (2). The digital pharmakon, according to Stiegler, is the extension of this logic to the entire field of the human body, including in cognitive capitalism wherein "those economic actors who are without knowledge because they are without memory" (35). This is the essence of contemporary proletarianisation, extended into the realm of consumption, in which savour vivre, knowing how to live, is forgotten. In many ways we can see Twitter as a clear example of such a proletarianisation process, as hypomnesis, with its derivation of hypnosis; an empty circulation. This echoes Jodi Dean’s description of the flow of communicative capitalism as simply drive (Dean) in which messages circulate without ever getting where they are meant to go. Yet against this perhaps there is a gain, even in Stiegler’s own thought, as to the therapeutic or individuating elements of this process and within the extension of Tweets from an immediately bounded, but extensible and arbitrary distributed network, provides a still novel form of mediation that connects brains together; but going beyond the standard hyper-dyadic spread that is characteristic of viruses or memes. This spread happens in such a way that the expressed thoughts of others can circulate and mutate—loop—around in observable forms, for example in the form of replies, designation of favourite, as RTs (retweets) and in modified forms as MTs (modified tweets), followed by further iterations, and so on. So it is that the Twitter feeds of clusters of individuals inevitably start to show regularity in who tweets, and given the tendency of accounts to focus on certain issues, and for those with an interest in those issues to likewise follow each other, then we have groups of accounts/individuals intersecting with each other, re-tweeting and commenting on each other–forming clusters of shared opinion. The issue at stake here goes beyond the question of the evolution of such clusters at that level of linguistic exchange as, what might be otherwise called movements, or counter-publics, or issue networks—but that speed produces a more elemental effect on coordination. It is the speed of Twitter that creates an imperative to respond quickly and to assimilate vast amounts of information, to sort the agreeable from the disagreeable, divide that which should be ignored from that which should be responded to, and indeed that which calls to be acted upon. Alongside Twitter’s limited memory, its pharmacological ‘beneficial’ element entails the possibility that responses go beyond a purely linguistic or discursive interlocution towards a protection of ‘brain-share’. That is, to put it bluntly, the moment of knowing what others will think before they think it, what they will say before they say it and what they will do before they do it. This opens a capacity for action underpinned by confidence in a solidarity to come. We have seen this in numerous examples, in the actions of UK Uncut and other such groups and movements around the world, most significantly as the multi-media augmented movements that clustered in Tahrir Square, Zuccotti Park and beyond. Protention, Premediation, and Augmented Volition The concept of the somatic marker plays an important role in enabling this speed up. Antonio Damasio argues that somatic markers are emotional memories that are layered into our brains as desires and preferences, in response to external stimuli they become embedded in our unconscious brain and are triggered by particular situations or events. They produce a capacity to make decisions, to act in ways that our deliberate decision making is not aware of; given the pace of response that is needed for many decisions this is a basic necessity. The example of tennis players is often used in this context, wherein the time needed to process and react consciously to a serve is in excess of the processing time the conscious brain requires; that is there is at least a 0.5 second gap between the brain receiving a stimulus and the conscious mind registering and reacting to it. What this means is that elements of the brain are acting in advance of conscious volition—we preempt our volitions with the already inscribed emotional, or affective layer, protending beyond the immanent into the virtual. However, protention is still, according to Stiegler, a fundamental element of consciousness—it pushes forward into the brain’s awareness of continuity, contributing to its affective reactions, rooted in projection and risk. This aspect of protention therefore is a contributing element of volition as it rises into consciousness. Volition is the active conscious aspect of willing, and as such requires an act of protention to underpin it. Thus the element of protention, as Stiegler describes it, is inscribed in the flow of the Twitter feed, but also and more importantly, is written into the cognitive process that proceeds and frames it. But beyond this even is the affective and emotional element. This allows us to think then of the Twitter-brain assemblage to be something more than just a mechanism, a tool or simply a medium in the linear sense of the term, but something closer to a device—or a dispositif as defined by Michel Foucault (194) and developed by Giorgio Agamben. A dispositif gathers together, orders and processes, but also augments. Maurizio Lazzarato uses the term, explaining that: The machines for crystallizing or modulating time are dispositifs capable of intervening in the event, in the cooperation between brains, through the modulation of the forces engaged therein, thereby becoming preconditions for every process of constitution of whatever subjectivity. Consequently the process comes to resemble a harmonization of waves, a polyphony. (186) This is an excellent framework to consolidate the place of Twitter as just such a dispositif. In the first instance the place of Twitter in “crystallizing or modulating” time is reflected in its grammatisation of the immediate into a circuit that reframes the present moment in a series of ripples and echoes, and which resonates in the protentions of the followers and followed. This organising of thoughts and affections in a temporal multiplicity crosscuts events, to the extent that the event is conceived as something new that enters the world. So it is that the permanent process of sharing, narrating and modulating, changes the shape of events from pinpointed moments of impact into flat plains, or membranes, that intersect with the mental events. The brain-share, or what can be called a ‘brane’ of brains, unfolds both spatially and temporally, but within the limits already defined. This ‘brane’ of brains can be understood in Lazzarato’s terms precisely as a “harmonization of waves, a polyphony.” The dispositif produces this, in the first instance, modulated consciousness—this is not to say this is an exclusive form of consciousness—part of a distributed condition that provides for a cooperation between brains, the multifarious looping mentioned above, that in its protentions forms a harmony, which is a volition. It is therefore clear that this technological change needs to be understood together with notions such as ‘noopolitics’ and ‘neuropolitics’. Maurizio Lazzarato captures very well the notion of a noopolitics when he tells us that “We could say that noopolitics commands and reorganizes the other power relations because it operates at the most deterritorialized level (the virtuality of the action between brains)” (187). However, the danger here is well-defined in the writings of Stiegler, when he explains that: When technologically exteriorized, memory can become the object of sociopolitical and biopolitical controls through the economic investments of social organizations, which thereby rearrange psychic organizations through the intermediary of mnenotechnical organs, among which must be counted machine-tools. (New Critique 33) Here again, we find a proletarianisation, in which gestures, knowledge, how to, become—in the medium and long term—separated from the bodies and brains of workers and turned into mechanisms that make them forget. There is therefore a real possibility that the short term resonance and collective volition becomes a distorted and heightened state, with a rather unpalatable after-effect, in which the memories remain only as commodified digital data. The question is whether Twitter remembers it for us, thinks it for us and as such also, in its dislocations and short termism, obliterates it? A scenario wherein general intellect is reduced to a state of always already forgetting. The proletarian, we read in Gilbert Simondon, is a disindividuated worker, a labourer whose knowledge has passed into the machine in such a way that it is no longer the worker who is individuated through bearing tools and putting them into practice. Rather, the labourer serves the machine-tool, and it is the latter that has become the technical individual. (Stiegler, New Critique 37) Again, this pharmacological character is apparent—Stiegler says ‘the Internet is a pharmakon’ blurring both ‘distributed’ and ‘deep’ attention (Crogan 166). It is a marketing tool par-excellence, and here its capacity to generate protention operates to create not only a collective ‘volition’ but a more coercive collective disposition or tendency, that is the unconscious wiling or affective reflex. This is something more akin to what Richard Grusin refers to as premediation. In premediation the future has already happened, not in the sense that it has already actually happened but such is the preclusion of paths of possibility that cannot be conceived otherwise. Proletarianisation operates in this way through the app, writing in this mode is not as thoughtful exchange between skilled interlocutors, but as habitual respondents to a standard set of pre-digested codes (in the sense of both programming and natural language) ready to hand to be slotted into place. Here the role of the somatic marker is predicated on the layering of ideology, in its full sense, into the brain’s micro-level trained reflexes. In that regard there is a proletarianisation of the prosumer, the idealised figure of the Web 2.0 discourse. However, it needs to be reiterated that this is not the final say on the matter, that where there is volition, and in particular collective volition, there is also the possibility of a reactivated general will: a longer term common consciousness in the sense of class consciousness. Therefore the general claim being made here is that by taking hold of this device consciousness, and transforming it into an active collective volition we stand the best chance of finding “a political will capable of moving away from the economico-political complex of consumption so as to enter into the complex of a new type of investment, or in other words in an investment in common desire” (Stiegler, New Critique 6). In its most simplistic form this requires a new political economy of commoning, wherein micro-blogging services contribute to a broader augmented volition that is not captured within communicative capitalism, coded to turn volition into capital, but rather towards a device consciousness as common desire. Needless to say it is only possible here to propose such an aim as a possible path, but one that is surely worthy of further investigation. References Agamben, Giorgio. What Is an Apparatus? Palo Alto: Stanford University Press, 2009. Crogan, Patrick. “Knowledge, Care, and Transindividuation: An Interview with Bernard Stiegler.” Cultural Politics 6.2 (2010): 157-170. Damasio, Antonio. Self Comes to Mind. London: Heinemann, 2010. Dean, Jodi. Blog Theory. Cambridge: Polity Press, 2010. Foucault, Michel. “The Confession of the Flesh.” Power/Knowledge Selected Interviews and Other Writings. Ed. Colin Gordon. New York: Pantheon. 1980. Grusin, Richard. Pre-mediation. Basingstoke: Palgrave, 2011. Lazzarato, Maurizio. “Life and the Living in the Societies of Control.” Deleuze and the Social. Eds. Martin Fuglsang and Meier Sorensen Bent. Edinburgh: Edinburgh University Press, 2006. Rheingold, Howard. Smart Mobs. Cambridge, Mass.: Perseus Books, 2002. Stiegler, Bernard. For a New Critique of Political Economy. Cambridge: Polity Press, 2010. ———. What Makes Life Worth Living: On Pharmacology. Cambridge: Polity Press, 2013.
APA, Harvard, Vancouver, ISO, and other styles
34

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
35

Moore, Claire, Ariadne Nichol, and Holly Taylor. "Supporting Solidarity." Voices in Bioethics 9 (October 31, 2023). http://dx.doi.org/10.52214/vib.v9i.11758.

Full text
Abstract:
Photo ID 72893750 © Rawpixelimages|Dreamstime.com ABSTRACT Solidarity is a concept increasingly employed in bioethics whose application merits further clarity and explanation. Given how vital cooperation and community-level care are to mitigating communicable disease transmission, we use lessons from the COVID-19 pandemic to reveal how solidarity is a useful descriptive and analytical tool for public health scholars, practitioners, and policymakers. Drawing upon an influential framework of solidarity that highlights how solidarity arises from the ground up, we reveal how structural forces can impact the cultivation of solidarity from the top down, particularly through ensuring robust access to important social determinants of health. Public health institutions can support solidarity movements among individuals and communities by adopting a lens of social justice when considering public health priorities and, in turn, promote health equity. INTRODUCTION Over the past two decades, scholars have invoked the concept of solidarity when assessing a wide range of topics in bioethics, from CRISPR-Cas9 technology to organ donation to structural racism.[1] However, the growing literature on solidarity has not fully examined the roles and responsibilities of institutions and governments in fostering solidarity, especially regarding public health measures that implicate entire populations. We argue that it remains unclear how public health institutions should engage with solidarity and how their engagement will affect public health and its ethics. We first take Prainsack and Buyx’ three-tiered framework as an analytical starting point.[2] We then explore how public health institutions can foster solidarity by carefully considering factors that may bolster it on an interpersonal, community, and national scale. We conclude that public health institutions should adopt a lens of social justice to promote solidarity at the interpersonal and community levels, thereby promoting equity in future public health efforts. BACKGROUND Calls for solidarity in bioethics raise longstanding normative questions about the nature and limits of our duties to one another and how to weigh autonomy over considerations of justice.[3] Though the term is diversely applied, Prainsack and Buyx propose a potentially unifying definition in the 2011 Nuffield Council report, “Solidarity: Reflections On An Emerging Concept in Bioethics.” The report defines solidarity as an activity involving “shared practices reflecting a collective commitment to carry financial, social, emotional, and or other ‘costs’ to assist others.” Their conceptualization also includes important features that distinguish solidarity from other values like empathy or altruism: solidarity emphasizes action rather than mere internal feeling and recognition of connection as motivation.[4] Bioethicists have since applied this conceptualization when analyzing issues in public and global health, given that population-level efforts need cooperation from individuals and communities. Prainsack and Buyx further note that solidarity is relevant in bioethics discourses about justice and equity, in support of providing aid to low- and middle-income countries, and as a value exemplified by European welfare states.[5] Other bioethicists have argued that promoting solidarity can contribute to community engagement, partnership with Tribal communities, and global health equity.[6] Most recently, scholars have applied solidarity as a lens to assess the COVID-19 pandemic, highlighting the pitfalls of national mitigation efforts and global disparities in disease outcomes.[7] I. Solidarity at Three Levels It seems impossible to foster solidarity in public health if we cannot identify it in general contexts. Prainsack and Buyx articulate three levels of solidarity: interpersonal solidarity, group solidarity, and legal or contractual codifications of solidarity.[8] They argue that each level inherently informs the one ‘above’ it in a unilateral direction. In other words, solidarity is fundamentally a bottom-up phenomenon. Solidarity among individuals influences group norms, which then have the potential to shape policy and institutional practice.[9] Within the Prainsack and Buyx framework, it would seem nonsensical to posit how solidarity might be expressed vertically or from the “top down.” It appears intuitively odd to imagine how a government entity might ‘be’ in solidarity with a person or group if solidarity requires some cognition about their condition per Prainsack and Buyx’ definition. Some have argued that solidarity does not seem like something that one can impose, as instances of it arise from agents recognizing and acting upon some bond rather than in response to a command. Indeed, people may be rightfully hesitant to engage in solidarity if the official messaging is overly paternalistic or coercive.[10] However, some authors have countered that governments can express solidarity through enacting structural and policy changes, though it is ambiguous how these actions are distinct from a justice-driven approach.[11] If a bottom-up approach is thus the most practical means of achieving policy that reflects solidarity, then it does not add much to public health. Institutions would be ineffective without the population’s initiation of the corresponding social norms. However, we find this conclusion overly pessimistic. Fostering a culture of solidarity to improve public health has potential merit. Prainsack and Buyx’ framework overlooks how public health actors can influence solidarity between individuals and across communities. To clarify, we agree with the view that solidarity is a bottom-up phenomenon. Solidarity may not be able to originate in a top-down fashion, but we suggest that public health institutions can take a more active role in providing the public with accurate information, promoting social justice, and intervening in the social determinants of health. II. The COVID-19 Pandemic as a Case Study Lessons learned from the ongoing COVID-19 pandemic support our argument. The pandemic deepened socioeconomic disparities in the US and hindered access to vital resources such as food, housing, and healthcare.[12] Prainsack recently noted: “[n]ext to the immediate health effects of the virus, poverty and grave inequalities have been the root causes of human suffering during the pandemic.”[13] Prior to the pandemic, many rural and low-income populations lacked reliable access to the internet and devices like laptops or smartphones. This continued lack of access restricts the flow of information and prevents people from accessing telemedicine services.[14] Preexisting social, political, and health inequities worsened health outcomes among many marginalized racial and ethnic groups. It is well-documented that communities of color, including Black, American Indian or Alaska Native, and Latinx populations, had greater COVID-related mortality and morbidity due to the effects of structural racism.[15] Although federal US agencies such as the Centers for Disease Control and Prevention enacted laws that provided safety nets (e.g., the Federal Eviction Moratorium), the majority of such programs have ended, leaving many with little assistance and the threat of further hardship.[16] These disparities are relevant because Prainsack, Buyx, and others note that solidarity arises from agents recognizing and acting on some perceived attainable collective goal(s). Income inequality and disparate access to food, education, and health care may lead people to consider public health goals unattainable. This could limit the desire to work toward those goals collectively.[17] The existing literature on collective action theory supports this intuition. It emphasizes that structural conditions, such as an absence of perceived hope for social change among a group, can lead to low ‘group efficacy’ and little willingness to cooperate, both within and across socioeconomic strata.[18] The pandemic spurred countless messages from public health agencies. The messaging did not recognize or attend to the different material realities and circumstances of the US population. How can people feel comfortable getting vaccinated if they deeply distrust the government, including public health institutions? How can people remain motivated to wear masks and distance themselves if they cannot afford basic necessities and work jobs without adequate pay and leave policies? We ask these questions to illustrate how socioeconomic disparities can marginalize people if they feel ignored, apathetic, or resentful of those better off or those in power whom they perceive to “not be doing enough.” This marginalization precludes the formation of solidarity. There are instances when a population has disparate access to resources and social capital, but solidarity may still emerge from a shared goal or vision for the future. For example, a heterogeneous population living in the same town may come together to protest an environmental injustice that impacts their water supply with the common goal of securing access to safe drinking water. However, many populations in the US failed to recognize shared goals of this kind during the COVID-19 pandemic. A significant minority of the US population was reluctant to acknowledge the severity of COVID-19 infection and thus refused to participate in efforts to mitigate its spread. Even between groups who shared the goal of slowing COVID-19 transmission, the methods were widely debated. Approximately 20 percent of the adult population eligible for vaccination remains unvaccinated.[19] Governmental bodies responsible for disseminating information, coordinating the allocation of resources, and establishing guidelines have a large role in mediating these disagreements and intervening in socioeconomic conditions that impact people's ability and willingness to engage in solidarity. III. Solidarity, Social Justice, and the Role of Public Health Institutions Adopting a lens of social justice provides further insights into how public health actors impact solidarity. Powers and Faden argue that the “foundational moral justification for the social institution of public health is social justice.”[20] Their theory of social justice has two aims. First, it ensures that everyone has a sufficient amount of the six core elements of well-being and that public health institutions are responsible for “adopting policies and creating environments” where all can flourish.[21] Second, public health institutions should distribute resources meant to promote well-being and focus on the “needs of those who are the most disadvantaged.”[22] Public health institutions should enact policies that address injustice. In doing so, public health institutions can seed the opportunity to build solidarity from the bottom up. Equipping individuals and communities with resources will foster cooperation and adherence to policies that require solidarity, such as masking and vaccination. This is consistent with arguments illustrating how institutions such as Tribal governments promote the conditions needed for their group, and especially its most vulnerable members, to flourish.[23] Addressing social determinants of health with a social justice lens will create the circumstances under which more individuals and groups can find common causes and foster solidarity. In the long run, such efforts may result in the establishment of values and practices from the bottom up. There are societal and public health preconditions required before institutions can expect their audience to act in solidarity with one another. Through their great influence over information and resources, public institutions do have the power to impact what values are most widespread. Furthermore, public health may foster trust and hope, which are important psychosocial factors that influence collective action,[24] if policies increase access to resources that promote well-being. Messaging efficacy also depends on the context of public trust, education, and whether the institutions meet one’s basic needs. Disparate messaging across different public institutions may confuse or disillusion individuals. To apply our theory of solidarity to the decision to vaccinate, a policy would be to foster conditions that facilitate access to vaccines and information about vaccine efficacy instead of imposing a top-down mandate without first eliciting public trust. IV. Counterargument Some argue that discordant public health messaging, ineffective government, and inadequate social programs can also bring people together under pressure and foster solidarity. One may argue that the most powerful motivators towards solidarity are strife and disparity, as evidenced throughout history. During the pandemic alone, political struggle and personal hardship inspired solidarity in the US, from individual neighbors helping each other to mutual aid groups forming across communities. We thus do not claim that solidarity is possible only when our government programs and public health institutions are most effective. We instead point out that solidarity can be further hindered when people feel alienated, hopeless, and pitted against each other. CONCLUSION Many competing conceptualizations of solidarity persist in the bioethics literature, and Prainsack and Buyx offer one compelling framework that public health ethicists continue to draw upon.[25] However, their framework fails to acknowledge how public health institutions impact interpersonal and group solidarity. Public health institutions can foster solidarity through actions other than mere messaging, invoking catchphrases like “we are all in this together.” Efforts to address socioeconomic preconditions and alleviate health disparities can cultivate group solidarity. As we saw during the pandemic, cooperation and solidarity go hand-in-hand with disease mitigation efforts; solidarity has clear intrinsic value.[26] As this relationship becomes more apparent, we will continue to see attempts from public health institutions to foster or invoke solidarity. Therefore, public health institutions would be remiss to ignore their role in addressing the social determinants of health. Adopting a social justice lens when planning public health interventions will clarify and strengthen their role in facilitating solidarity. Ultimately, if health disparities continue to persist or widen, it is very hard to imagine how group solidarity can ever be achieved. The widescale adoption of many public health measures needed to promote health and well-being would be conducive to solidarity. - Disclaimer: The opinions expressed are the authors’ and do not represent the views of the NIH, DHHS, or the U.S. government. Funding Disclosure: This work was supported in part by the Intramural Program of the National Institutes of Health Clinical Center. - [1] John J Mulvihill et al., “Ethical Issues of CRISPR Technology and Gene Editing through the Lens of Solidarity,” British Medical Bulletin 122 (2017): 17–29, https://doi.org/10.1093/bmb/ldx002; Ben Saunders, “Altruism or Solidarity? The Motives for Organ Donation and Two Proposals,” Bioethics 26, no. 7 (September 2012): 376–81, https://doi.org/10.1111/j.1467-8519.2012.01989.x; -Vanessa Y Hiratsuka, “SPECIAL REPORT: A Critical Moment in Bioethics: Reckoning with Anti-Black Racism through Intergenerational Dialogue A Call for Solidarity in Bioethics: Confronting Anti-Black Racism Together,” 2022, https://doi.org/10.1002/hast.1380. [2] Prainsack and Buyx, Solidarity: Reflections on an Emerging Concept in Bioethics London: Nuffield Council on Bioethics, 2011; Prainsack and Buyx, “Solidarity in Contemporary Bioethics--towards a New Approach.” Bioethics 26, no. 7 (September 2012): 343–50. https://doi.org/10.1111/J.1467-8519.2012.01987.X. [3] Bob Simpson, “A ‘We’ Problem for Bioethics and the Social Sciences: A Response to Barbara Prainsack,” Science, Technology, & Human Values 43, no. 1 (January 12, 2018): 45–55, https://doi.org/10.1177/0162243917735899. [4] Barbara Prainsack and Alena Buyx, Solidarity: Reflections on an Emerging Concept in Bioethics (London: Nuffield Council on Bioethics, 2011). [5] Barbara Prainsack and Alena Buyx, “Solidarity in Contemporary Bioethics--towards a New Approach,” Bioethics 26, no. 7 (September 2012): 343–50, https://doi.org/10.1111/J.1467-8519.2012.01987.X. [6] Bridget Pratt, Phaik Yeong Cheah, and Vicki Marsh, “Solidarity and Community Engagement in Global Health Research,” The American Journal of Bioethics : AJOB 20, no. 5 (May 3, 2020): 43–56, https://doi.org/10.1080/15265161.2020.1745930; Sara Chandros Hull, F. Leah Nez (Diné), and Juliana M. Blome, “Solidarity as an Aspirational Basis for Partnership with Tribal Communities,” The American Journal of Bioethics 21, no. 10 (October 3, 2021): 14–17, https://doi.org/10.1080/15265161.2021.1965258; Mbih J. Tosam et al., “Global Health Inequalities and the Need for Solidarity: A View from the Global South,” Developing World Bioethics 18, no. 3 (September 1, 2018): 241–49, https://doi.org/10.1111/DEWB.12182. [7] Peter West-Oram, “Solidarity Is for Other People: Identifying Derelictions of Solidarity in Responses to COVID-19,” Journal of Medical Ethics 47, no. 2 (February 1, 2021): 65–68, https://doi.org/10.1136/MEDETHICS-2020-106522; Barbara Prainsack, “Solidarity in Times of Pandemics,” Democratic Theory 7, no. 2 (December 1, 2020): 124–33, https://doi.org/10.3167/DT.2020.070215; F. Marijn Stok et al., “Social Inequality and Solidarity in Times of COVID-19,” International Journal of Environmental Research and Public Health 18, no. 12 (June 2, 2021), https://doi.org/10.3390/IJERPH18126339; Ming Jui Yeh, “Solidarity in Pandemics, Mandatory Vaccination, and Public Health Ethics,” American Journal of Public Health 112, no. 2 (February 1, 2022): 255–61, https://doi.org/10.2105/AJPH.2021.306578; Barbara Prainsack, “Beyond Vaccination Mandates: Solidarity and Freedom During COVID-19.,” Am J Public Health 112, no. 2 (February 1, 2022): 232–33, https://doi.org/10.2105/AJPH.2021.306619. [8] Prainsack and Buyx, Solidarity: Reflections on an Emerging Concept in Bioethics London: Nuffield Council on Bioethics, 2011; Prainsack and Buyx, “Solidarity in Contemporary Bioethics--towards a New Approach.” Bioethics 26, no. 7 (September 2012): 343–50. https://doi.org/10.1111/J.1467-8519.2012.01987.X. [9] Prainsack and Buyx, Solidarity: Reflections on an Emerging Concept in Bioethics London: Nuffield Council on Bioethics, 2011; Prainsack and Buyx, “Solidarity in Contemporary Bioethics--towards a New Approach.” Bioethics 26, no. 7 (September 2012): 343–50. https://doi.org/10.1111/J.1467-8519.2012.01987.X. [10] Yeh, “Solidarity in Pandemics, Mandatory Vaccination, and Public Health Ethics”; Prainsack, “Beyond Vaccination Mandates: Solidarity and Freedom During COVID-19.” [11] Ho, Anita, and Iulia Dascalu. "Relational solidarity and COVID-19: an ethical approach to disrupt the global health disparity pathway." Global Bioethics 32, no. 1 (2021): 34-50; West-Oram, Peter. "Solidarity is for other people: identifying derelictions of solidarity in responses to COVID-19." Journal of Medical Ethics 47, no. 2 (2021): 65-68. [12] Monica Webb Hooper, Anna María Nápoles, and Eliseo J. Pérez-Stable, “COVID-19 and Racial/Ethnic Disparities,” JAMA 323, no. 24 (June 23, 2020): 2466, https://doi.org/10.1001/jama.2020.8598. [13] Prainsack, Barbara. “Beyond Vaccination Mandates: Solidarity and Freedom During COVID-19.” Am J Public Health 112, no. 2 (February 1, 2022): 232–33. https://doi.org/10.2105/AJPH.2021.306619. [14] Camille A Clare, “Telehealth and the Digital Divide as a Social Determinant of Health during the COVID-19 Pandemic,” Network Modeling Analysis in Health Informatics and Bioinformatics 10 (2021): 26, https://doi.org/10.1007/s13721-021-00300-y. [15] Patrick Nana-Sinkam et al., “Health Disparities and Equity in the Era of COVID-19,” Journal of Clinical and Translational Science 5, no. 1 (March 16, 2021): e99, https://doi.org/10.1017/cts.2021.23. [16] Kathryn M Leifheit et al., “Expiring Eviction Moratoriums and COVID-19 Incidence and Mortality,” American Journal of Epidemiology 190, no. 12 (December 1, 2021): 2503–10, https://doi.org/10.1093/aje/kwab196. [17] Barbara Prainsack, “Solidarity in Times of Pandemics,” Democratic Theory 7, no. 2 (December 1, 2020): 124–33, https://doi.org/10.3167/DT.2020.070215 [18] Maximilian Agostini and Martijn van Zomeren, “Toward a Comprehensive and Potentially Cross-Cultural Model of Why People Engage in Collective Action: A Quantitative Research Synthesis of Four Motivations and Structural Constraints.,” Psychological Bulletin 147, no. 7 (July 2021): 667–700, https://doi.org/10.1037/bul0000256. [19] Department of Health and Human Services (HHS) Centers for Disease Control and Prevention (HHS/CDC), “COVID Data Tracker,” 2023, https://covid.cdc.gov/covid-data-tracker. [20] Powers, Madison, and Ruth Faden. Social Justice: The Moral Foundation of Public Health and Health Policy. 1st editio. New York: Oxford Press, 2006, p. 9 and Chapter 4 [21] Powers and Faden, Social Justice: The Moral Foundation of Public Health and Health Policy; Madison Powers and Ruth Faden, Structural Injustice: Power, Advantage, and Human Rights (New York: Oxford University Press, 2019). [22] Powers, Madison, and Ruth Faden. Social Justice: The Moral Foundation of Public Health and Health Policy. 1st editio. New York: Oxford Press, 2006, p. 10 [23] Bobby Saunkeah et al., “Extending Research Protections to Tribal Communities,” The American Journal of Bioethics 21, no. 10 (October 3, 2021): 5–12, https://doi.org/10.1080/15265161.2020.1865477. [24] Agostini and van Zomeren, “Toward a Comprehensive and Potentially Cross-Cultural Model of Why People Engage in Collective Action: A Quantitative Research Synthesis of Four Motivations and Structural Constraints.” [25] Prainsack and Buyx, Solidarity: Reflections on an Emerging Concept in Bioethics. [26] Ruth Chadwick, “COVID‐19 and the Possibility of Solidarity,” Bioethics 34, no. 7 (September 8, 2020): 637–637, https://doi.org/10.1111/bioe.12813.
APA, Harvard, Vancouver, ISO, and other styles
36

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
37

Brien, Donna Lee. "Planning Queen Elizabeth II’s Visit to Bondi Beach in 1954." M/C Journal 26, no. 1 (March 16, 2023). http://dx.doi.org/10.5204/mcj.2965.

Full text
Abstract:
Introduction On Saturday 6 February 1954, on the third day of the Australian leg of their tour of the Commonwealth, Queen Elizabeth II and Prince Philip, the Duke of Edinburgh, visited Sydney’s Bondi Beach. The specially-staged Royal Surf Carnival they witnessed—comprising a spectacular parade, surf boat races, mock resuscitations and even unscheduled surf rescues—generated extensive media coverage. Attracting attention from historians (Warshaw 134; Ford 194–196), the carnival lingers in popular memory as not only a highlight of the Australian tour (Conway n.p.; Clark 8) and among the “most celebrated events in Australian surf lifesaving history” (Ford et al. 5) but also as “the most spectacular occasion [ever held] at Bondi Beach” (Lawrence and Sharpe 86). It is even, for some, a “highlight of the [Australian] post-war period” (Ford et al. 5). Despite this, the fuller history of the Queen’s visit to Bondi, including the detailed planning involved, remains unexplored. A small round tin medal, discovered online, offered a fresh way to approach this event. 31mm in diameter, 2mm in depth, this dual-sided, smooth-edged medal hangs from a hoop on approximately 80mm of discoloured, doubled red, white, and blue striped ribbon, fastened near its end with a tarnished brass safety pin. The obverse features a relief portrait of the youthful Queen’s face and neck in profile, her hair loosely pulled back into a low chignon, enclosed within a striped symmetrical scrolled border of curves and peaks. This is encircled with another border inscribed in raised capitals: “Her Majesty Queen Elizabeth II. Royal Visit to Waverley N.S.W.” The reverse features a smooth central section encircled with the inscription (again in raised capitals), “Presented to the Children of Waverley N.S.W. 1954”, the centre inscribed, “By Waverley Municipal Council C.A. Jeppesen Mayor”. Figs. 1 & 2: Medal, c.1954. Collection of the Author. Medals are often awarded in recognition of achievement and, in many cases, are worn as prominent components of military and other uniforms. They can also be made and gifted in commemoration, which was the case with this medal, one of many thousands presented in association with the tour. Made for Waverley Council, it was presented to all schoolchildren under 15 in the municipality, which included Bondi Beach. Similar medals were presented to schoolchildren by other Australian councils and States in Australia (NAA A462). This gifting was not unprecedented, with medals presented to (at least some) Australian schoolchildren to commemorate Queen Victoria’s 1897 Diamond Jubilee (The Age 5; Sleight 187) and the 1937 coronation of King George VI and Queen Elizabeth (“Coronation Medals” 6). Unable to discover any provenance for this medal aside from its (probable) presentation in 1954 and listing for sale in 2021, I pondered instead Waverley Council’s motivation in sourcing and giving these medals. As a researcher, this assisted me in surmounting the dominance of the surf carnival in the history of this event and led to an investigation of the planning around the Bondi visit. Planning Every level of government was involved in planning the event. Created within the Prime Minister’s Department, the Royal Visit Organisation 1954—staffed from early 1953, filling positions from within the Commonwealth Public Service, armed services and statutory authorities—had overall authority over arrangements (NAA 127, 134). National planning encompassed itineraries, travel arrangements, security, public relations, and protocol as well as fly and mosquito control, the royals’ laundry arrangements, and advice on correct dress (NAA: A1533; NAA: A6122; NAA: A9708, RV/DD Annex.15; NAA: A1838, 1516/11 Parts 1&2; NAA: A9708, RV/CD; NAA: A9708, RV/CQ; NAA: A9708, RV/T). Planning conferences were held with State officials who developed State visit programs and then devolved organisational responsibilities to Councils and other local organisations (NAA: A9708, RV/DD Annex.2; NAA: A9708, RV/DD Annex.3). Once the Bondi Beach location was decided, the Surf Life Saving Association of Australia received a Royal Command to stage a surf carnival for the royals. This command was passed to the president of the Bondi club, who organised a small delegation to meet with government representatives. A thirteen-member Planning Committee, all men (“The Queen to See” 12), was appointed “with full power to act without reference to any other body” (Meagher 6). They began meeting in June 1953 and, soon after this, the carnival was announced in the Australian press. In recognition, the “memorable finale” of a Royal Command Performance before the Queen in London in November 1953 marked the royal couple’s impending tour by filling the stage with people from Commonwealth countries. This concluded with “an Australian tableau”. Alongside people dressed as cricketers, tennis players, servicemen, and Indigenous people, a girl carrying a huge bunch of bananas, and a couple in kangaroo suits were six lifesavers dressed in Bondi march-past costumes and caps, carrying the club flag (Royal Variety Charity n.p.). In deciding on a club for the finale, Bondi was “seen the epitome of the surf lifesaving movement—and Australia” (Brawley 82). The Planning Committee worked with representatives from the police, army, government, local council, and ambulance services as well as the media and other bodies (Meagher 6). Realising the “herculean task” (Meagher 9) ahead, the committee recruited some 170 members (again all men) and 20 women volunteers from the Bondi and North Bondi Surf Clubs to assist. This included sourcing and erecting the carnival enclosure which, at over 200 meters wide, was the largest ever at the beach. The Royal dais that would be built over the promenade needed a canvas cover to shield the royal couple from the heat or rain. Seating needed to be provided for some 10,500 paying spectators, and eventually involved 17 rows of tiered seating set across the promenade, 2,200 deckchairs on the sand in front, and, on each flank, the Bondi Surf Club’s tiered stands. Accommodations also had to be provided at selected vantage points for some 100 media representatives, with a much greater crowd of 50–60,000 expected to gather outside the enclosure. Four large tents, two at each end of the competition area, would serve as both change rooms and shady rest areas for some 2,000 competitors. Two additional large tents were needed, one at each end of the lawns behind the beach, fitted out with camp stretchers that had to be sourced for the St John Ambulance Brigade to deal with first-aid cases, most of whom were envisaged to come from the crowds due to heat stroke (Meagher 6–7). The committee also had to solve numerous operational issues not usually associated with running a surf carnival, such as ensuring sufficient drinking water for so many people on what might be a very hot day (“The Queen to See” 12). With only one tap in the carnival area, the organisers had to lay a water line along the entire one-kilometre length of the promenade with double taps every two to three metres. Temporary toilets also had to be sourced, erected, and serviced. Self-financing and with costs adding up, sponsors needed to be secured to provide goods and services in return for advertising. An iced water unit was, for instance, provided on the dais, without cost, by the ElectrICE Commercial Refrigeration company. The long strip of red carpet laid from where the royals would alight from their car right through the dais was donated by the manufacturer of Feltex, a very popular Australian-made wool carpet. Prominent department store, Anthony Horden’s, loaned the intricately carved chairs to be used by the Royal couple and other officials, while The Bondi Diggers Club provided chrome plated chairs for other official guests, many of whom were the crew of royal yacht, the S.S. Gothic (Meagher 6). Fig. 3: “Feltex [Advertisement].” The Australian Home Beautiful Nov. 1954: 40. http://nla.gov.au/nla.obj-2985285882. The Ladies Committees of the Bondi and North Bondi surf clubs were tasked with organising and delivering lunch and drinks to over 400 officials, all of whom were to stay in position from early morning until the carnival concluded at 5 pm (Meagher 6). Girl members of the Bondi social clubs were to act as usherettes. Officials describe deciding who would meet, or even come in any close proximity to, the Queen as “most ticklish” and working with mayors and other officials a “headache” (“Socialites” 3). In Bondi, there were to be notably few officials sitting with the royal couple, but thousands of “ordinary” spectators seated around the carnival area. On her arrival, it was planned that the Queen would walk through a guard of honour of lifesavers from each Australian and New Zealand club competing in the carnival. After viewing the finals of the surf boat races, the Queen would meet the team captains and then, in a Land Rover, inspect the massed lifesavers and greet the spectators. Although these activities were not contentious, debate raged about the competitors’ uniforms. At this time, full-length chest-covering costumes were normally worn in march-past and other formal events, with competitors stripping down to trunks for surf races and beach events. It was, however, decided that full-length costumes would be worn for the entirety of the Queen’s visit. This generated considerable press commentary that this was ridiculous, and charges that Australians were ashamed of their lifesavers’ manly chests (“Costume Rule” 3). The president of the Bondi Life Saving Club, however, argued that they did not want the carnival spoiled by lifesavers wearing “dirty … track suits, football guernseys … old football shorts … and just about everything except proper attire” (ctd. in Jenkings 1). Waverley Council similarly attempted to control the appearance of the route through which the royals would travel to the beach on the day of the carnival. This included “a sequence of signs along the route” expressing “the suburb’s sentiments and loyalty” (“Queen in the Suburbs” 4; see also, “The Royal Tour” 9). Maintaining that “the greatest form of welcome will be by the participation of the residents themselves”, the Mayor sought public donations to pay for decorations (with donors’ names and amounts to be published in the local press, and these eventually met a third of the cost (“The Royal Tour” 9; Waverley Council n.p.). In January 1954, he personally appealed to those on the route to decorate their premises and, in encouragement, Council provided substantial prizes for the most suitably decorated private and commercial premises. The local Chamber of Commerce was responsible for decorating the transport and shopping hub of Bondi Junction, with many businesses arranging to import Coronation decorations from England (“Queen in the Suburbs” 4; “The Royal Tour” 9). With “colorful activity” providing the basis of Council’s plan (“Queen in the Suburbs” 4), careful choreography ensured that thousands of people would line the royal route through the municipality. In another direct appeal, the Mayor requested that residents mass along the roadsides, wearing appropriate rosettes or emblems and waving flags (“Queen in the Suburbs” 4; “The Royal Tour” 9). Uniformed nurses would also be released from duty to gather outside the War Memorial Hospital as the royals passed by (“Royal Visit” n.p.). At the largest greenspace on the route, Waverley Park, some 10,000 children from the municipality’s 18 schools would assemble, all in uniform and wearing the medal to be presented to them to commemorate the visit. Children would also be provided with large red, white, or blue rosettes to wave as the royals drove by. A special seating area near the park was to be set aside for the elderly and ex-servicemen (“Queen in the Suburbs” 4). Fostering Expectations As the date of the visit approached, preparation and anticipation intensified. A week before, a detailed visit schedule was published in local newspaper Bondi Daily. At this time, the Royal Tour Decorations Committee (comprised of Aldermen and prominent local citizens) were “erecting decorations at various focal points” throughout the municipality (“The Royal Tour” 9). On 4 February, the Planning Committee held their final meeting at the Bondi Beach clubhouse (Meagher 6). The next day, the entire beach was cleaned and graded (Wilson 40). The afternoon before the visit, the Council’s decoration competition was judged, with the winners a house alongside Waverley Park and the beachside Hotel Astra (“Royal Visit” n.p.), one of 14 Sydney hotels, and the only one in Bondi, granted permission to sell liquor with meals until the extended hour of 11.00 pm during the Royal visit (“State House” 5). On the day of the surf carnival, The Sydney Morning Herald featured a large photograph of the finishing touches being put to the official dais and seating the day before (“Stage Set” 15). In reality, there was still a flurry of activity from daybreak on the day itself (Meagher 7), with the final “tidying up and decorating still proceeding” (Meagher 7) as the first carnival event, the Senior boat race heats, began at 10.00 am (“N.Z. Surf” 15). Despite some resident anger regarding the area’s general dilapidation and how the money being spent on the visit could have been used for longstanding repairs to the Pavilion and other infrastructure (Brawley 203), most found the decorations of the beach area appealing (“Royal Visit” n.p.). Tickets to the carnival had sold out well in advance and the stands were filled hours before the Queen arrived, with many spectators wearing sundresses or shorts and others stripping down to swimsuits in the sunshine (“Royal Visit” n.p.). With Police Inspector Michael O’Neill’s collapse and death at a royal event the day before thought to be the result of heat exposure, and the thermometer reaching the high 80s°F (low 30s°C), a large parasol was sourced to be held over the Queen on the dais (Meagher 8). A little after 3:15 pm, the surf club’s P.A. system advised those assembled at the beach that the royal party had left Randwick Racecourse on time and were proceeding towards them (“Queen’s Visit to Races” 17), driving through cheering crowds all the way (“Sydney” 18). At Waverley Park, Council had ensured that the waiting crowds had been entertained by the Randwick-Coogee pipe band (“Royal Visit” n.p.) and spirits were high. Schoolchildren, wearing their medals, lined the footpaths, and 102-year-old Ernest Dunn, who was driven to the park in the morning by police, was provided with a seat on the roadway as well as tea and sandwiches during his long wait (“Royal Tour Highlights” 2; “Royal Visit” n.p.). The royal couple, driving by extremely slowly and waving, were given a rousing welcome. Their attire was carefully selected for the very warm day. The Queen wore a sunny lemon Dior-styled cap-sleeved dress, small hat and white accessories, the Duke a light-coloured suit and tie. It was observed that she wore heavier makeup as a protection against the sun and, as the carnival progressed, opened her handbag to locate her fashionable sunglasses (“Thrills” 1). The Duke also wore sunglasses and used race binoculars (Meagher 8). The Result Despite the exhaustive planning, there were some mishaps, mostly when the excitement of the “near-hysterical crowds” (Hardman n.p.) could not be contained. In Double Bay, for instance, as the royals made their way to Bondi, a (neither new nor clean) hat thrown into the car’s rear seat struck the Duke. It was reported that “a look of annoyance” clouded his face as he threw it back out onto the road. At other points, flags, nosegays, and flutter ribbons (long sticks tied with lengths of coloured paper) were thrown at, and into, the Royal car. In other places, hundreds raced out into the roadway to try to touch the Queen or the Duke. They “withstood the ordeal unflinchingly”, but the Duke was reportedly concerned about “this mass rudeness” (“Rude Mobs” 2). The most severe crowding of the day occurred as the car passed through the centre of Bondi Junction’s shopping district, where uniformed police had to jump on the Royal car’s running boards to hold off the crowds. Police also had to forcibly restrain a group of men who rushed the car as it passed the Astra Hotel. This was said to be “an ugly incident … resentment of the police action threatened to breed a riot” (“Rude Mobs” 2). Almost everything else met, and even exceeded, expectations. The Queen and Duke’s slow progress from Bondi Road and then, after passing under a large “Welcome to Bondi” sign, their arrival at the entrance to the dais only three minutes late and presence at the carnival went entirely to plan and are well documented in minute-by-minute detail. This includes in detailed press reports, newsreels, and a colour film, The Queen in Australia (1954). Their genuine enjoyment of the races was widely commented upon, evidenced in how they pointed out details to each other (Meagher 8), the number of times the Duke used his binoculars and, especially, in their reluctance to leave, eventually staying more than double the scheduled time (“Queen Delighted” 7). Sales of tickets and programs more than met the costs of mounting the event (Meagher 8–9) and the charity concert held at the beach on the night of the carnival to make the most of the crowds also raised significant funds (“Queen in the Suburbs” 4). Bondi Beach looked spectacularly beautiful and gained considerable national and international exposure (Landman 183). The Surf Life Saving Association of Australia’s president noted that the “two factors that organisation could not hope to control—weather and cooperation of spectators—fulfilled the most optimistic hopes” (Curlewis 9; Maxwell 9). Conclusion Although it has been stated that the 58-day tour was “the single biggest event ever planned in Australia” (Clark 8), focussing in on a single event reveals the detailed decentralised organisation which went into both each individual activity as well as the travel between them. It also reveals how significantly responsible bodies drew upon volunteer labour and financial contributions from residents. While many studies have discussed the warm welcome given to the monarch by Australians in 1954 (Connors 371–2, 378), a significant finding from this object-inspired research is how purposefully Waverley Council primed this public reception. The little medal discussed at the opening of this discussion was just one of many deliberate attempts to prompt a mass expression of homage and loyalty to the sovereign. It also reveals how, despite the meticulous planning and minute-by-minute scheduling, there were unprompted and impulsive behaviours, both by spectators and the royals. Methodologically, this investigation also suggests that seemingly unprepossessing material remnants of the past can function as portals into larger stories. In this case, while an object biography could not be written of the commemorative medal I stumbled upon, a thoughtful consideration of this object inspired an investigation of aspects of the Queen’s visit to Bondi Beach that had otherwise remained unexplored. References Brawley, Sean. “Lifesavers of a Nation.” 3 Feb. 2007: 82. [extract from The Bondi Lifesaver: A History of an Australian Icon. Sydney: ABC Books, 2007.] Clark, Andrew. “The Queen’s Royal Tours of Australia Remembered: Reflection.” The Australian Financial Review 10 Sep. 2022: 8. Connors, Jane. “The 1954 Royal Tour of Australia.” Australian Historical Studies 25 (1993): 371–82. Conway, Doug. “Queen’s Perennial Pride in Australia.” AAP General News Wire 26 Nov. 2021: n.p. “Coronation Medals Presented to School Children: 6000 Distributed in Rockhampton District.” Morning Bulletin 12 May 1937: 6. “Costume Rule for Queen’s Bondi Visit.” Barrier Miner 18 Dec. 1953: 3. Curlewis, Adrian. “Letter.” Bondi Surfer: Official Organ of the Bondi Surf Bathers’ Life Saving Club 2.7 (1954): 9. Ford, Caroline. Sydney Beaches: A History. Sydney: NewSouth Publishing, 2014. Ford, Caroline, Chris Giles, Danya Hodgetts, and Sean O’Connell. “Surf Lifesaving: An Australian Icon in Transition.” Australian Bureau of Statistics Year Book, Australia 2007. Ed. Dennis Trewin. Canberra: Australian Bureau of Statistics, 2007. 1–12. Hardman, Robert. Our Queen. London: Hutchinson, 2011. <https://www.google.com.au/books/edition/OurQueen/DySbU9r0ABgC>. Jenkings, Frank. “Editorial.” Bondi Surfer: Official Organ of the Bondi Surf Bathers’ Life Saving Club 2.6 (1954): 1. Landman, Jane. “Renewing Imperial Ties: The Queen in Australia.” The British Monarchy on Screen. Ed. Mandy Merck. Manchester: Manchester UP, 2016. 181–204. Lawrence, Joan, and Alan Sharpe. Pictorial History: Eastern Suburbs. Alexandria: Kingsclear Books, 1999. Maxwell, C. Bede. “Letter.” Bondi Surfer: Official Organ of the Bondi Surf Bathers’ Life Saving Club 2.7 (1954): 9. Meagher, T.W. “The Royal Tour Surf Carnival Bondi Beach, February 6, 1954.” Bondi Surfer: Official Organ of the Bondi Surf Bathers’ Life Saving Club 2.7 (1954): 6–9. National Archives of Australia (NAA): A462, 825/4/6, Royal tour 1954—Medals for School children—General representations, 1954. National Archives of Australia (NAA): A1533, 1957/758B, Royal Visit, 1953–1954. National Archives of Australia (NAA): A1838, 1516/11 Part 1, Protocol—Royal Visit, 1948–1954. National Archives of Australia (NAA): A1838, 1516/11 Part 2, Protocol—Royal Visit, 1954–1966. National Archives of Australia (NAA): A6122, 1861, Government Heads of State—Royal Visit 1954—ASIO file, 1953–1958. Canberra: Australian Security Intelligence Organization. National Archives of Australia (NAA): A9708, RV/CD, Fly and Mosquito Control. National Archives of Australia (NAA): A9708, RV/CQ, Laundry and Dry Cleaning and Pressing Arrangements. National Archives of Australia (NAA): A9708, RV/DD Annexure 2, Minutes of Conferences with State Directors, 22 January 1953–14 January 1954. National Archives of Australia (NAA): A9708, RV/DD Annexure 3, State Publications. National Archives of Australia (NAA): A9708, RV/DD Annexure 15, Report by Public Relations Officer. National Archives of Australia (NAA): A9708, RV/T, Matters Relating to Dress. National Archives of Australia (NAA). Royalty and Australian Society: Records Relating to The British Monarchy Held in Canberra. Research Guide. Canberra: Commonwealth of Australia, 1998. “N.Z. Surf Team in Dispute.” The Sydney Morning Herald 6 Feb. 1954: 15. “Queen Delighted by Carnival.” The Sun-Herald 7 Feb. 1954: 7. “Queen in the Suburbs: Waverley.” Sun 21 Jan. 1954: 4. “Queen’s Visit to Races: Drive in Suburbs.” The Daily Telegraph 6 Feb. 1954: 17. “Royal Tour Highlights.” The Mail 6 Feb. 1954: 2. Royal Variety Charity. “Coronation Year Royal Variety Performance.” London: London Coliseum, 2 Nov. 1953. <https://www.royalvarietycharity.org/royal-variety-performance/archive/detail/1953-london-coliseum>. “Royal Visit to Waverley.” Feb. 1954 [Royal Visit, 1954 (Topic File). Local Studies Collection, Waverley Library, Bondi Junction, LS VF] “Rude Mobs Spoil Happy Reception.” The Argus 8 Feb. 1954: 2. Sleight, Simon. Young People and the Shaping of Public Space in Melbourne, 1870–1914. Abingdon: Routledge, 2016. “Socialites in for Rude Shock on Royal Tour Invitations.” Daily Telegraph 3 Jan. 1954: 3. “Stage Set for Royal Surf Carnival at Bondi.” The Sydney Morning Herald 6 Feb. 1954: 15. “State House Rehearses Royal Opening.” The Sydney Morning Herald 27 Jan. 1954: 5. “Sydney.” Women’s Letters. The Bulletin 10 Feb. 1954: 18. The Age 24 Jun. 1897: 5. The Queen in Australia. Dir. Colin Dean. Australian National Film Board, 1954. “The Queen to See Lifesavers.” The Daily Telegraph 24 Aug. 1953: 12. “The Royal Tour.” Bondi Daily 30 Jan. 1954: 9. “Thrills for the Queen at Bondi Carnival—Stayed Extra Time.” The Sun-Herald 7 Feb. 1954: 1. Warshaw, Matt. The History of Surfing. San Fransisco: Chronicle Books, 2010. Wilson, Jack. Australian Surfing and Surf Lifesaving. Adelaide: Rigby, 1979.
APA, Harvard, Vancouver, ISO, and other styles
38

Broeckmann, Andreas. "Minor Media - Heterogenic Machines." M/C Journal 2, no. 6 (September 1, 1999). http://dx.doi.org/10.5204/mcj.1788.

Full text
Abstract:
1. A Minor Philosopher According to Guattari and Deleuze's definition, a 'minor literature' is the literature of a minority that makes use of a major language, a literature which deterritorialises that language and interconnects meanings of the most disparate levels, inseparably mixing and implicating poetic, psychological, social and political issues with each other. In analogy, the Japanese media theorist Toshiya Ueno has refered to Félix Guattari as a 'minor philosopher'. Himself a practicing psychoanalyst, Guattari was a foreigner to the Grand Nation of Philosophy, whose natives mostly treat him like an unworthy bastard. And yet he has established a garden of minor flowers, of mongrel weeds and rhizomes that are as polluting to philosophy as Kafka's writing has been to German literature (cf. Deleuze & Guattari, Kafka). The strategies of 'being minor' are, as exemplified by Guattari's writings (with and without Deleuze), deployed in multiple contexts: intensification, re-functionalisation, estrangement, transgression. The following offers a brief overview over the way in which Guattari conceptualises media, new technologies and art, as well as descriptions of several media art projects that may help to illustrate the potentials of such 'minor machines'. Without wanting to pin these projects down as 'Guattarian' artworks, I suggest that the specific practices of contemporary media artists can point us in the direction of the re-singularising, deterritorialising and subjectifying forces which Guattari indicated as being germane to media technologies. Many artists who work with media technologies do so through strategies of appropriation and from a position of 'being minor': whenever a marginality, a minority, becomes active, takes the word power (puissance de verbe), transforms itself into becoming, and not merely submitting to it, identical with its condition, but in active, processual becoming, it engenders a singular trajectory that is necessarily deterritorialising because, precisely, it's a minority that begins to subvert a majority, a consensus, a great aggregate. As long as a minority, a cloud, is on a border, a limit, an exteriority of a great whole, it's something that is, by definition, marginalised. But here, this point, this object, begins to proliferate ..., begins to amplify, to recompose something that is no longer a totality, but that makes a former totality shift, detotalises, deterritorialises an entity.' (Guattari, "Pragmatic/Machinic") In the context of media art, 'becoming minor' is a strategy of turning major technologies into minor machines. a. Krzysztof Wodiczko (PL/USA): Alien Staff Krzysztof Wodiczko's Alien Staff is a mobile communication system and prosthetic instrument which facilitates the communication of migrants in their new countries of residence, where they have insufficient command of the local language for communicating on a par with the native inhabitants. Alien Staff consists of a hand-held staff with a small video monitor and a loudspeaker at the top. The operator can adjust the height of the staff's head to be at a level with his or her own head. Via the video monitor, the operator can replay pre-recorded elements of an interview or a narration of him- or herself. The recorded material may contain biographical information when people have difficulties constructing coherent narratives in the foreign language, or it may include the description of feelings and impressions which the operator normally doesn't get a chance to talk about. The Staff is used in public places where passers-by are attracted to listen to the recording and engage in a conversation with the operator. Special transparent segments of the staff contain memorabilia, photographs or other objects which indicate a part of the personal history of the operator and which are intended to instigate a conversation. The Alien Staff offers individuals an opportunity to remember and retell their own story and to confront people in the country of immigration with this particular story. The Staff reaffirms the migrant's own subjectivity and re-singularises individuals who are often perceived as representative of a homogenous group. The instrument displaces expectations of the majority audience by articulating unformulated aspects of the migrant's subjectivity through a medium that appears as the attractive double of an apparently 'invisible' person. 2. Mass Media, New Technologies and 'Planetary Computerisation' Guattari's comments about media are mostly made in passing and display a clearly outlined opinion about the role of media in contemporary society: a staunch critique of mass media is coupled with an optimistic outlook to the potentials of a post-medial age in which new technologies can develop their singularising, heterogenic forces. The latter development is, as Guattari suggests, already discernible in the field of art and other cultural practices making use of electronic networks, and can lead to a state of 'planetary computerisation' in which multiple new subject-groups can emerge. Guattari consistently refers to the mass media with contempt, qualifying them as a stupefying machinery that is closely wedded to the forces of global capitalism, and that is co-responsible for much of the reactionary hyper-individualism, the desperation and the "state of emergency" that currently dominates "four-fifth of humanity" (Guattari, Chaosmosis 97; cf. Guattari, Drei Ökologien 16, 21). Guattari makes a passionate plea for a new social ecology and formulates, as one step towards this goal, the necessity, "to guide these capitalist societies of the age of mass media into a post-mass medial age; by this I mean that the mass media have to be reappropriated by a multiplicity of subject-groups who are able to administer them on a path of singularisation" (Guattari, "Regimes" 64). Guattari consistently refers to the mass media with contempt, qualifying them as a stupefying machinery that is closely wedded to the forces of global capitalism, and that is co-responsible for much of the reactionary hyper-individualism, the desperation and the "state of emergency" that currently dominates "four-fifth of humanity" (Guattari, Chaosmosis 97; cf. Guattari, Drei Ökologien 16, 21). Guattari makes a passionate plea for a new social ecology and formulates, as one step towards this goal, the necessity, "to guide these capitalist societies of the age of mass media into a post-mass medial age; by this I mean that the mass media have to be reappropriated by a multiplicity of subject-groups who are able to administer them on a path of singularisation" (Guattari, "Regimes" 64). b. Seiko Mikami (J/USA): World, Membrane and the Dismembered Body An art project that deals with the cut between the human subject and the body, and with the deterritorialisation of the sense of self, is Seiko Mikami's World, Membrane and the Dismembered Body. It uses the visitor's heart and lung sounds which are amplified and transformed within the space of the installation. These sounds create a gap between the internal and external sounds of the body. The project is presented in an-echoic room where sound does not reverberate. Upon entering this room, it is as though your ears are no longer living while paradoxically you also feel as though all of your nerves are concentrated in your ears. The sounds of the heart, lungs, and pulse beat are digitised by the computer system and act as parameters to form a continuously transforming 3-d polygonal mesh of body sounds moving through the room. Two situations are effected in real time: the slight sounds produced by the body itself resonate in the body's internal membranes, and the transfigured resonance of those sounds is amplified in the space. A time-lag separates both perceptual events. The visitor is overcome by the feeling that a part of his or her corporeality is under erasure. The body exists as abstract data, only the perceptual sense is aroused. The visitor is made conscious of the disappearance of the physical contours of his or her subjectivity and thereby experiences being turned into a fragmented body. The ears mediate the space that exists between the self and the body. Mikami's work fragments the body and its perceptual apparatus into data, employing them as interfaces and thus folding the body's horizon back onto itself. The project elucidates the difference between an actual and a virtual body, the actual body being deterritorialised and projected outwards towards a number of potential, virtual bodies that can, in the installation, be experienced as maybe even more 'real' than the actual body. 3. Artistic Practice Guattari's conception of post-media implies criss-crossing intersections of aesthetic, ethical, political and technological planes, among which the aesthetic, and with it artistic creativity, are ascribed a position of special prominence. This special role of art is a trope that recurs quite frequently in Guattari's writings, even though he is rarely specific about the artistic practices he has in mind. In A Thousand Plateaus, Deleuze and Guattari give some detailled attention to the works of artists like Debussy, Boulez, Beckett, Artaud, Kafka, Kleist, Proust, and Klee, and Chaosmosis includes longer passages and concrete examples for the relevance of the aesthetic paradigm. These examples come almost exclusively from the fields of performing arts, music and literature, while visual arts are all but absent. One reason for this could be that the performing arts are time-based and processual and thus lend themselves much better to theorisation of flows, transformations and differentiations. The visual arts can be related to the abstract machine of faciality (visageité) which produces unified, molar, identical entities out of a multiplicity of different singularities, assigning them to a specific category and associating them with particular social fields (cf. Deleuze & Guattari, Tausend Plateaus 167-91) This semiotic territorialisation is much more likely to happen in the case of static images, whether two- or three-dimensional, than in time-based art forms. An interesting question, then, would be whether media art projects, many of which are time-based, processual and open-ended, can be considered as potential post-medial art practices. Moreover, given the status of computer software as the central motor of the digital age, and the crucial role it plays in aesthetic productions like those discussed here, software may have to be viewed as the epitome of post-medial machines. Guattari seems to have been largely unaware of the beginnings of digital media art as it developed in the 1980s. In generalistic terms he suggests that the artist is particularly well-equipped to conceptualise the necessary steps for this work because, unlike engineers, he or she is not tied to a particular programme or plan for a product, and can change the course of a project at any point if an unexpected event or accident intrudes (cf. Guattari, Drei Ökologien 50). The significance of art for Guattari's thinking comes primarily from its close relation with processes of subjectivation. "Just as scientific machines constantly modify our cosmic frontiers, so do the machines of desire and aesthetic creation. As such, they hold an eminent place within assemblages of subjectivation, themselves called to relieve our old social machines which are incapable of keeping up with the efflorescence of machinic revolutions that shatter our epoch' (Guattari, Chaosmosis 54). The aesthetic paradigm facilitates the development of new, virtual forms of subjectivity, and of liberation, which will be adequate to these machinic revolutions. c. Knowbotic Research + cF: IO_Dencies The Alien Staff project was mentioned as an example for the re-singularisation and the virtualisation of identity, and World, Membrane and the Dismembered Body as an instance of the deterritorialisation and virtualisation of the human body through an artistic interface. The recent project by Knowbotic Research, IO_Dencies -- Questioning Urbanity, deals with the possibilities of agency, collaboration and construction in translocal and networked environments. It points in the direction of what Guattari has called the formation of 'group subjects' through connective interfaces. The project looks at urban settings in different megacities like Tokyo, São Paulo or the Ruhr Area, analyses the forces present in particular local urban situations, and offers experimental interfaces for dealing with these local force fields. IO_Dencies São Paulo enables the articulation of subjective experiences of the city through a collaborative process. Over a period of several months, a group of young architects and urbanists from São Paulo, the 'editors', provided the content and dynamic input for a database. The editors collected material (texts, images, sounds) based on their current situation and on their personal urban experience. A specially designed editor tool allowed the editors to build individual conceptual 'maps' in which to construct the relations between the different materials in the data-pool according to the subjective perception of the city. On the computational level, connectivities are created between the different maps of the editors, a process that is driven by algorithmic self-organisation whose rules are determined by the choices that the editors make. In the process, the collaborative editorial work in the database generates zones of intensities and zones of tension which are visualised as force fields and turbulences and which can be experienced through interfaces on the Internet and at physical exhibition sites. Participants on the Net and in the exhibition can modify and influence these electronic urban movements, force fields and intensities on an abstract, visual level, as well as on a content-based, textual level. This engagement with the project and its material is fed back into the database and influences the relational forces within the project's digital environment. Characteristic of the forms of agency as they evolve in networked environments is that they are neither individualistic nor collective, but rather connective. Whereas the collective is determined by an intentional and empathetic relation between agents within an assemblage, the connective rests on any kind of machinic relation and is therefore more versatile, more open, and based on the heterogeneity of its components or members. In the IO_Dencies interfaces, the different networked participants become visible for each other, creating a trans-local zone of connective agency. The inter-connectedness of their activities can be experienced visually, acoustically, and through the constant reconfiguration of the data sets, an experience which can become the basis of the formation of a specific, heterogeneous group subject. 4. Guattari's Concept of the Machinic An important notion underlying these analyses is that of the machine which, for Guattari, relates not so much to particular technological or mechanical objects, to the technical infrastructure or the physical flows of the urban environment. 'Machines' can be social bodies, industrial complexes, psychological or cultural formations, they are assemblages of heterogeneous parts, aggregations which transform forces, articulate and propel their elements, and force them into a continuous state of transformation and becoming. An important notion underlying these analyses is that of the machine which, for Guattari, relates not so much to particular technological or mechanical objects, to the technical infrastructure or the physical flows of the urban environment. 'Machines' can be social bodies, industrial complexes, psychological or cultural formations, they are assemblages of heterogeneous parts, aggregations which transform forces, articulate and propel their elements, and force them into a continuous state of transformation and becoming. d. Xchange Network My final example is possibly the most evocative in relation to Guattari's notions of the polyvocity and heterogenesis that new media technologies can trigger. It also links up closely with Guattari's own engagement with the minor community radio movement. In late 1997, the E-Lab in Riga initiated the Xchange network for audio experiments on the Internet. The participating groups in London, Ljubljana, Sydney, Berlin, and many other minor and major places, use the Net for distributing their original sound programmes. The Xchange network is "streaming via encoders to remote servers, picking up the stream and re-broadcasting it purely or re-mixed, looping the streams" (Rasa Smite). Xchange is a distributed group, a connective, that builds creative cooperation in live-audio streaming on the communication channels that connect them. They explore the Net as a sound-scape with particular qualities regarding data transmission, delay, feedback, and open, distributed collaborations. Moreover, they connect the network with a variety of other fields. Instead of defining an 'authentic' place of their artistic work, they play in the transversal post-medial zone of media labs in different countries, mailing lists, net-casting and FM broadcasting, clubs, magazines, stickers, etc., in which 'real' spaces and media continuously overlap and fuse (cf. Slater). 5. Heterogenic Practices If we want to understand the technological and the political implications of the machinic environment of the digital networks, and if we want to see the emergence of the group subjects of the post-media age Guattari talks about, we have to look at connectives like Xchange and the editor-participant assemblages of IO_Dencies. The far-reaching machinic transformations which they articulate, hold the potential of what Guattari refers to as the 'molecular revolution'. To realise this revolution, it is vital to "forge new analytical instruments, new concepts, because it is ... the transversality, the crossing of abstract machines that constitute a subjectivity and that are incarnated, that live in very different regions and domains and ... that can be contradictory and antagonistic". For Guattari, this is not a mere theoretical question, but one of experimentation, "of new forms of interactions, of movement construction that respects the diversity, the sensitivities, the particularities of interventions, and that is nonetheless capable of constituting antagonistic machines of struggle to intervene in power relations" (Guattari, "Pragmatic/Machinic" 4-5). The implication here is that some of the minor media practices pursued by artists using digital technologies point us in the direction of the positive potentials of post media. The line of flight of such experimentation is the construction of new and strong forms of subjectivity, "an individual and/or collective reconstitution of the self" (Guattari, Drei Ökologien 21), which can strengthen the process of what Guattari calls "heterogenesis, that is a continuous process of resingularisation. The individuals must, at the same time, become solidary and ever more different" (Guattari, Drei Ökologien 76). References Deleuze, Gilles, and Felix Guattari. Kafka: Pour une Litterature Mineur. Paris: Ed. de Minuit, 1975. ---. Tausend Plateaus. (1980) Berlin: Merve, 1992. Guattari, Félix. Cartographies Schizoanalytiques. Paris: Ed. Galilée, 1989. ---. Chaosmosis: An Ethico-Aesthetic Paradigm. (1992) Sydney: Power Publications, 1995. ---. Die drei Ökologien. (1989) Wien: Passagen Verlag, 1994. ---. "Pragmatic/Machinic." Discussion with Guattari, conducted and transcribed by Charles J. Stivale. (1985) Pre/Text 14.3-4 (1995). ---. "Regimes, Pathways, Subjects." Die drei Ökologien. (1989) Wien: Passagen Verlag, 1994. 95-108. ---. "Über Maschinen." (1990) Schmidgen, 115-32. Knowbotic Research. IO_Dencies. 1997-8. 11 Sep. 1999 <http://io.khm.de/>. De Landa, Manuel. "The Machinic Phylum." Technomorphica. Eds. V2_Organisation. Rotterdam: V2_Organisation, 1997. Mikami, Seiko. World, Membrane and the Dismembered Body. 1997. 11 Sep. 1999 <http://www.ntticc.or.jp/permanent/mikami/mikami_e.php>. Schmidgen, Henning, ed. Ästhetik und Maschinismus: Texte zu und von Félix Guattari. Berlin: Merve, 1995. ---. Das Unbewußte der Maschinen: Konzeptionen des Psychischen bei Guattari, Deleuze und Lacan. München: Fink, 1997. Slater, Howard. "Post-Media Operators." Nettime, 10 June 1998. 11 Sep. 1999 <http://www.factory.org>. Wodiczko, Krzysztof. 11 Sep. 1999 <http://cavs.mit.edu/people/kw.htm>. Xchange. 11 Sep. 1999 <http://xchange.re-lab.net>. (Note: An extended, Dutch version of this text was published in: Oosterling/Thissen, eds. Chaos ex Machina: Het ecosofisch Werk van Félix Guattari op de Kaart Gezet. Rotterdam: CFK, 1998. Citation reference for this article MLA style: Andreas Broeckmann. "Minor Media -- Heterogenic Machines: Notes on Félix Guattari's Conceptions of Art and New Media." M/C: A Journal of Media and Culture 2.6 (1999). [your date of access] <http://www.uq.edu.au/mc/9909/minor.php>. Chicago style: Andreas Broeckmann, "Minor Media -- Heterogenic Machines: Notes on Félix Guattari's Conceptions of Art and New Media," M/C: A Journal of Media and Culture 2, no. 6 (1999), <http://www.uq.edu.au/mc/9909/minor.php> ([your date of access]). APA style: Andreas Broeckmann. (1999) Minor Media -- Heterogenic Machines: Notes on Félix Guattari's Conceptions of Art and New Media. M/C: A Journal of Media and Culture 2(6). <http://www.uq.edu.au/mc/9909/minor.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography