> This modern era of disinformation began in the early 1920s, and the art and science of what the CIA once called "political warfare" grew and changed in four big waves, each a generation apart. The outcomes are visible, and may include the death of a leader, a coup, or an insurrection but they-theoretically at least-cannot be traced back to the sponsor. > Covert action is interference in the affairs of another state or non-state actor in an unacknowledged or plausibly deniable manner. Note that many of the features of contemporary information warfare/cybersecurity are articulated here, but the definition/importance seems dated Information warfare, in some guises, almost seems to predate organized societies in other guises, it may continue long after human society has evolved to transcend today's organization whatsoever. Some forms of warfare use the human mind as the ultimate battleground others work just as well even if people go home. Warfare spans human activities from by-the-rules competition to to-the-death conflict. Information takes in everything from gossip to supercomputers. > Slicing, dicing, and boiling the various manifestations of information warfare produces a lumpy stew. We shall be in serious trouble, if we do not take seriously the fact that we are constructing the new physical and intellectual environments that will be inhabited by future generations. The information revolution-whether understood as a third one, in terms of wealth creation, or as a fourth one, in terms of a reconceptualization of ourselves-is no less dramatic. Previous revolutions in the creation of wealth, especially the agricultural and the industrial ones, led to macroscopic transformations in our social and political structures and architectural environments, often without much foresight, normally with deep conceptual and ethical implications. > ICTs are creating the new informational environment in which future generations will live most of their time. Legally manufacture unserialized AR-15's in the comfort and privacy of your home. > No prior CNC knowledge or experience is required to manufacture from design files. > What we did as a speech act, as a template of thought and even the legal prescience that might come of it, they have so much more gravity than what might happen to me # The Monopoly and Regulation of Violence > The Industrial Revolution and its consequences have been a disaster for the human race. Joshua Citarella, _Politigram and the Post-Left_ The network itself works to individuate and isolate everyone each user is an island. > It seems that the end trajectory for every type of online radical is ultimately “the black pill”. It empowers people to break the local bonds of their majoritarian normative systems and decide for themselves which laws are moral and which are bullshit. > Crypto anarchy effectively allows people to pick and choose which laws they support, at least in cyberspatial contexts. The easier it is to generate social movements, the more fragile they become Internet applications have many different applications The web was premised upon freely available information, that didn't scale # Communication Technology and Social Mobilisation These techniques pose particular problems for democracies that seek to preserve free speech while also combating disinformation We are still only beginning to understand the social and political impact of near-zero cost digital communications technologiesĭigital communications networks have transformed older practices of information warfare, covert action, and disinformation How and why do states exploit free speech for political purposes? How does free speech online lead to new, or transformed, national security problems? Class: center, middle, inverse, title-slide
0 Comments
Leave a Reply. |