202 Matching Annotations
  1. Mar 2020
    1. So perhaps what we need are electronics that exploit and expand on the cracks, the failures, and the garbage, as a way to move toward the creative and ethi-cal aspects of electronics and electronic waste, as a way to imagine new material relations.

      Like glitch, garbage becomes an opportunity for art, ethics, etc. rather than something to be avoided or completely discarded.

    2. the persistence of waste occurs in part through the unavoidable remainders that do not easily recycle into new systems of production or that are left behind as the pollution and residue from previous activities. W

      What would it look like to apply this approach to waste to the other kinds of "garbage" we have discussed this semester?

    3. Rather than encounter waste, failure, and transience as conditions in need of elimination, it may be possible to consider these conditions as constitutive elements of material processes

      This should sound familiar! It's the working theory of our entire class.

    4. From thin screens to tiny chips and from dispersed net-works to rapid rates of exchange, many of the qualities of electronics convince us that they are relatively free from material requirements. Yet the term dematerialized does not necessarily mean “without material” but may, instead, refer to modes of materialization that render infrastruc-tures imperceptible or ephemeral. This is electronic technology’s sleight of hand, its magic.

      This is an excellent distillation of the book's argument.

    5. A dump registers the speed and voracity of consumption, the transience of objects and our relation with them, and the enduring materiality of those objects.

      There's a good bit about the speed of processes in this book that might be worth discussing.

    6. here focus on a number of key sites in which the remains of electronics can be stud-ied. Fieldwork conducted in the gathering of these spatial stories has ranged from Silicon Valley to Singapore and from the Bronx to London. Superfund sites and museums of the electronics industry, shipping yards and electronics recycling facilities, computing archives, and electronics superstores and repair shops inform the content, texture, and structure of this study, which takes up natural history as much as a method as a theoretical point of inquiry.

      Here's a good description of Gabrys' "stuff" - the material she analyzes in the book. Her method is "natural history."

    7. The material culture of electronics discussed here is not cen-tered on users as manipulators of media content but, instead, focuses on how materialized workers, technologists, and consumers all emerge in relation to processes of electronic obsolescence and decay.

      Shifting the lens from "users" to other processes.

    8. Obsolete objects returned to a kind of prehistory when they fell out of circulation, at which time they could be examined as resonant material residues—fossils—of eco-nomic practices.

      Benjamin did this for items that had fallen out of style, analyzed them as artifacts of culture. He didn't do this in the way a scientist might (objectively categorizing them) but instead analyzed them as sedimentations of cultural processes. Gabrys uses this method as inspiration.

    9. electronic devices shrink to the scale of paper-thin and handheld devices, they appear to be lightweight and free of material resources.

      Smaller devices lead to a sense of immateriality and thus less sustainable practices. This suggests an interesting design question: Should our devices be more visible, chunkier, more "in the way" to encourage more sustainable practices?

    10. expanded definitions of what constitutes electronic waste, as well as inventive methods for gathering together stories about that waste.

      Here's an important methodological point: we need new ways of accounting for waste, since it's more than what we can easily "see" (i.e. that which sits in landfills).

    11. studying waste might also account for more than empirical pro-cesses of waste making.

      This is the key contribution of this text: waste is not just the "matter" but is also other kinds of waste making.

    12. Electronics often appear only as “media,” or as interfaces, apparently lacking in material substance. Yet digital media materialize in distinctive ways—not just as raw matter, but also as performances of abundance—often because they are so seemingly immaterial.

      This notion of media as "immaterial" was especially prevalent in the the 90s and early 200s, when technology was understood in terms of a "virtual" world that was separate from the "real" world. Today's interactions with technology are more likely to get us thinking about the Internet as threaded through everyday life rather than a separate realm.

    13. The theory of waste developed in this book describes processes by which electronics end up in the dump, as well as what happens to electronic remainders in their complex circuits prior to the dump.

      A theory of waste built on processes rather than products.

    14. In fact, Silicon Valley has the highest concentration of Superfund sites in the United States. What is perhaps so unexpected about these sites is that the pollution is not a product of heavy industry but, rather, stems from the manufacture of those seemingly immaterial information technologies.

      Pollution created not by discarded objects but rather by the creation of those objects.

    15. Electronics are bound up with elaborate mechanisms of fascination, with driving economic forces

      Gabrys' interest in process extends beyond manufacturing and disposal into cultural practices, economic practices, etc. This isn't just a focus on "the object."

    1. What is “ spam ” ? Spam is the use of information technology infrastructure to exploit existing aggregations of human attention.

      after such a detailed and sprawling history, the definition is small and precise

    2. Litspam obviously does not work for human readers, aside from its occasional interesting resemblance to stochastic knockoffs of the work of Tzara or Burroughs (with a hint of Louis Zukofsky ’ s quotation poems, or Bern Porter ’ s “ Founds ” assembled from NASA rocket documentation). If anything, its fractured lines and phrasal salad are a sign that something ’ s suspiciously wrong and the message should be discarded.

      spam is literature for robots

    3. Bayesian filters destroyed email spam as a reputable business model in three ways, each of which became a springboard for spam ’ s transformation.

      How Graham's model transformed spam.

    4. If filtering made it much harder to make money per number of messages, spam messages could become much more individually lucrative: rather than sales pitches for goods or sites, they could be used for phishing, identity theft, credit card scams, and infecting the recipient ’ s computer with viruses, worms, adware, and other forms of dangerous and crooked malware.

      Bayesian filters transform spam into something else.

    5. the public and private mailing activities of 158 people in the upper echelons of a major corporation, frozen in place like the ruins of Pompeii for future researchers. They were not slow in coming.

      the accidental creation of a perfect dataset for spam filters

    6. Clearly the necessary starting point is some kind of agreed-upon spam object, something like a spam meter or spam calorie, on which and against which things can be tested — a corpus.

      The trouble of defining spam.

    7. The only workaround for spammers would be to build their own artificial societies — which is, in fact, exactly what they did.

      Spammers answer? Create reputation economy of their own.

    8. By bringing together the technical-objective and the social-subjective, Google could eliminate the “ junk results, ” the spam that could fool machines but not humans with its stack of keywords

      Google solves spam aimed at both human and robot audiences by tracking "relevance" and reputation.

    9. The damping factor is underappreciated as an antispam strategy. It ’ s the subtle gradation of how rank passes through links, how far reputation can go before its effect decays into nothing. The source of the damping factor models is boredom.

      Google's "damping factor" as antispam measure.

    10. At the most abstract level, search engines have three elements from their inception to the present day: a spider, an indexer, and a query handler.

      anatomy of a search engine

    11. To understand what happens from now on in spam ’ s history, we need to start with the gradual and momentous transition of the relevance of text into something robot-readable, particularly how that happened with search on the web, and thus how search engine spamming came into being — which means talking about Google.

      robot readability of text transforms the world of spam

    12. On NANAE, system administration tools became the starting points for increasingly elaborate campaigns of surveillance, following the track of messages and the ownership of accounts to trace and identify spammers.

      tools designed for system administrators to manage the network become surveillance tools

    13. com-puters as gardens rather than bodies, with diverse software populations to be tended and pruned by attentive and self-reliant users, potentially capable of weed resistance in their interdependence, with the professionals as agronomists, breeders, and exterminators rather than doctors at the cordon sanitaire.

      computers as gardens rather than bodies might have led us to different ways of managing them...

    14. Usenet, by contrast, is a protocol for handling the storage, retrieval, and forwarding of messages among a set of computers in a network.

      Usenet is not a place - it is a set of rules.

    15. One of the manifestations of this uncertainty is the struggle over metaphors, a struggle with very practical, physical, and technological consequences. What was spam like? To decide the answer to that question was to decide indirectly what the network itself was like and how people and their machines should behave on it. This question was played out to great effect in the shaping of law.

      to define spam is to define the network

    16. ACCESS TO RESOURCES

      More reminders in this section that the digital isn't an "immaterial" space with "virtual" resources but rather a material arrangement with constraints, etc.

    17. These 5 MB are like a geologist ’ s road cut, a sectional slice across the enterprise of a midlevel spamming crew hard at work.

      The importance of these materials for historical research...ethics intersects with archival impulses.

    18. The Brutal files are the best, and therefore worst, instance of charivari shaming as an antispam strategy, a deeply invasive and unsettling act of social pillory. When does a criminal forfeit all right to his or her privacy? Especially, it must be said, a “ criminal ” who has not been convicted of any crime by anyone other than a mysterious hacker-consultant and a bunch of strangers on the Internet?

      The ethics of charivari now intersect with our previous discussions of online harassment.

    19. The so-called Brutal materials include photographs of Garst in various states of undress in the office and at home, as well as what appears to have been a private boudoir photography session for a Premier Services employee and two erotic stories allegedly found on one of the servers.

      Outing spammer would of course intersect with online misogyny - this is unsurprising.

    20. The story of spam was through 1994 largely a story about building community and managing scarce resources on networked computers and in the process defining misbehavior, marking it, and stopping it. From 1994 on, the threads of the concept of community and the capture of attention entwine with issues of money, collective organization, and the law.

      The shift that happens in this second phase.

    21. “ NO COMMERCIAL ADVERTIS-ING, if you please. Imagine what this vulnerable medium would look like if hundreds of thousands of merchants like you put up their free ads like yours. ” 142 “ This vulnerable medium ” is an interesting phrase, at once an overt plea for responsibility presented from a position of weakness and a more covert assertion of the need to maintain the status quo in favor of the people who already run it. It recalls the very real and cogent concern for the networked commons but also the all-too-common threat language of groups in power who would like to stay that way — the rhetoric of a vulnerable democracy in a dangerous world used by the Bush administra-tion in its erosion of civil liberties, for example.

      This returns us to Chun's arguments for the possibility of a network in which we can be vulnerable/exposed in safe ways, in public.

    22. In March 1994, AOL enabled what it called the “ Usenet feature. ” Its massive subscriber base, which had been functioning inside the enclosed space of their proprietary network, were abruptly turned loose onto Usenet.

      opening the floodgates

    23. As the argument about whether to freeze or delete the topic dragged on, other users began bombarding the topic with enor-mous slabs of text, duplicated protests, nonsense phrases — spam — to dilute Mandel ’ s hateful weirdness in a torrent of lexical noise, rendering it unus-able as a venue for his emotional breakdown.

      spam for good

    24. What we are discussing here is a kind of complex political performance that is built out of mocking laughter, insults, masking and anonymity, and the mingling between active crowds and passive audi-ences. It is a performance that is at every turn tangled up with the question of who is allowed to participate in political discourse and the extent and role of the law and its representatives.

      Is this how we should understand something like Gamergate?

    25. What I am calling the charivari is a distinct network-mediated social structure, a mode of collective surveillance and punishment for the violation of norms and mores.

      How Brunton uses the term charivari.

    26. More remains to be written about the role of graduate student poverty and parsimony in shaping the hacker ethos, which obliges you to repurpose scavenged equipment, invent workarounds, and maximize limited resources and how this ethos shaped the networks built with those resources.

      I would read this study.

    27. After thirty years of rhetoric of the Internet as everywhere nonlocal, disembodied, virtual and cyberspatial, it can be dif-ficult to remember how local, relatively speaking, early networked comput-ing was.

      early networked computing was local, small, and built on trust

    28. In general, an implementation should be conservative in its sending behavior, and liberal in its receiving behavior. ”

      A crucial foundational concept of the Internet. Send conservatively, accept liberally.

    29. Before you make serious inter-ventions into the rules governing a consensual space, you must be precise about what you are trying to stop, and you have to work with the users of the space to determine what intervention reflects your collective goals.

      An important note about writing rules that address, in Jeong's terms, behavior rather than content.

    30. Spamming is the hypertrophied form of the very technologies and prac-tices that enable the virtual communities that loathe and fight it. This nature is why it is so hard to define, so hard to stop, and so valuable to our understanding of networked digital media and the gatherings they support.

      Spam isn't trash/garbage. It's the logical endpoint of our systems and networks.

    31. — spam provides us with reactive publics. Obliged, suddenly, to be aware of the means of their own existence and to create deliberate mechanisms that blur between technical, social, political, and legal, these reactive publics must manage themselves and their infrastructure.

      Another great link to the Dibbell reading. But also a link to Chiang's story, since the owners of Digients are constantly reacting to various threats and continually circling the wagons in response.

    32. “ contextual integrity, ” in which our friends, family, and professional domains operate in distinct contextual partitions and conversa-tions. 23

      Context collapse...

    33. A network of networks, for reasons that combined utility, efficiency, and budget with a concept of “ human community ” : this was the vision for a new project, christened ARPANET,

      Military/governmental roots of the internet.

    34. Spam survived and prospered by operating in the edge cases around these big ideas, in the friction between technical facts and the root paradigms that are expressed in them where powerful concepts like trust, anonymity, liberty, and community online were reinvented, modified, and sometimes discarded. In following spam, we will explore how these ideas evolved and, above all, how human attention online, and the strategies for capturing it, changed over time.

      Spam becomes a way to understand the internet (the shadow history of the internet) but also a way to study the history of human attention.

    35. technolo-gies are statements about the distribution of needful things such as power, status, access, wealth, and privilege, for good and for ill.

      "technologies are statements" - similar to saying "technologies are not neutral"

    36. (In fact, many of the early cases of spam provoke groups of people on computers into the task of self-definition and self-organization as communities.

      This is exactly what happens in the Dibbell piece, which wasn't about spam. This suggest that the "anomalies" of the internet are crucial to how communities define themselves.

    37. This is a book about spam for anyone who wants to understand what spam is, how it works, and what it means, from the earliest computer networks to the present day.

      Very clear articulation of audience.

    38. We fund and enable it with choices we make and trade-offs we are willing to accept because the benefits to the network outweigh the costs.

      We all contribute to the problem of spam - this is the kind of insight that we get when we take the Parikka Sampson approach.

    1. Our primary contribution here is to examine the interaction between the asymmetric architecture of the American media ecosystem that we discovered in our own work and the presence of the Russian efforts

      Primary contribution of this chapter

    2. Despite extensive efforts, we were unable to find an example of disinformation or commercial clickbait started on the left, or aimed from abroad at the left, that took hold and became widely reported and believed in the broader network that stretches from the center to the left for any meaningful stretch of time.

      reality check dynamic would apparently guard against this.

    3. The commercial bullshit or clickbait sites are the most familiar challenge. They are simply a new breed of spammers or search engine optimizers.

      The overlap between spam and propaganda

    4. Practically, this means that professional journalism needs to recalibrate its commitment to objective reporting further toward transparent, accountable verifiability and away from demonstrative neutrality.

      Away from "neutrality" and toward verifiability.

    5. nstead of these technologically driven dynamics, which are novel but ultimately less important, we see longer-term dynamics of political economy:ideolog y and institutions interacting with technological adoption as the primary drivers of the present epistemic crisis.

      We focus on tech and miss broader, longer historical patterns.

    6. Changes in technolog y (satellite and FM radio, cable transmission, and only later the internet), institutions (the deregulation of cable, repeal of the fairness doctrine, reduction in ownership limits, and reduced antitrust enforcement) and political culture have shaped the emergence of a network of media outlets, including radio, cable television, and internet sites, that operate in a distinctly partisan propagandist mode.

      The complex ecology that leads to the current problem.

    7. These facts are as inconvenient to academics seeking a nonpartisan, neutral diagnosis of what is happening to us as they are to professional journalists who are institutionally committed to describe the game in a nonpartisan way. Both communities have tended to focus on technolog y, we believe, because if technolog y is something that happens to all of us, no partisan finger pointing is required. But the facts we observe do not lend themselves to a neutral, “both sides at fault” analysis

      Pointing to technology as a way to avoid evidence that this is a partisan problem.

    8. Here we sketch out a framework for understanding the differences in the incentives, mechanics, and practices between the two parts of the media landscape.

      Essentially two different systems with different kinds of dynamics.

    9. Outside the right-wing ecosystem, we did not see a leftward polarization but its opposite—an increase in the authority of, and attention paid to, the traditional professional media that occupy the center and center-left, at the expense of the left.

      Not a "both sides" issue.

    10. Network Propaganda—What we observe in our broad, macroscale studies as well as in our detailed case studies is that the overall effect on beliefs and attitudes emerges from the interaction among a diverse and often broad set of discrete sources and narrative bits.

      key definition for this study

    11. Ellul’s now-classic work reoriented the study of propaganda from understanding the practice of intentional management of beliefs and attitudes at the population level to understanding the structure of consciousness in technologically mediated market society. Propaganda was no longer something an actor perpetrates on a population (although it is that too), but the overall social practice and effect that normalizes and regularizes life and meaning in modern, technologically mediated society.

      Ellul's work understands propaganda systemically, rather than as a tool of certain evil people.

    12. Indeed, our own detailed study of the American case suggests that it is only where the underlying institutional and political-cultural fabric is frayed that technolog y can exacerbate existing problems and dynamics to the point of crisis.

      always linking technology to underlying infrastructure/cultural/political issues

    13. e suggest that each of these “usual suspects” acts through and depends on the asymmetric partisan ecosystem that has developed over the past four decades.

      four decade buildup to current crisis

    14. Our own contribution to debates about the 2016 election was to shine a light on the right-wing media ecosystem itself as the primary culprit in sowing confusion and distrust in the broader American media ecosystem.

      key contribution of this study

    15. In our observations, Facebook appears to be a more polluted information environment than Twitter or the open web.

      "polluted" is an important choice of term here - more garbage on Facebook than other places

    16. first, the list of actors who have been described as potentially responsible for disrupting American political communications, and second, precise definitions of the terms

      Important signposting of the argument here

    17. We take a political economy view of technolog y, suggesting that the fundamental mistake of “the internet polarizes” narrative is that it adopts too naïve a view of how technolog y works and understates the degree to which institutions, culture, and politics shape technological adoption and diffusion patterns.

      Their analysis understand the media environment as more than just the "internet." Institutions and culture are crucial too.

    18. The bulk of this book comprises detailed analyses of large data sets, case studies of the emergence of broad frames and particular narratives, and synthesis with the work of others

      statement of method

    19. attacks on Hillary Clinton that we document in Chapters 3, 4, 6, and 7 were intended precisely to reduce that dissonance

      Intense attacks on Clinton an attempt to resolve dissonance between Trumpian politics and GOP politics.

    20. Our work helps to explain how a media ecosystem that initially helped the GOP gain and retain power ultimately spun out of control.

      Important to note how much responsibility this analysis puts on the media environment.

    21. All of these professions organized themselves into their modern national, institutional forms in roughly the first 20 years of the twentieth century.

      Crucial moment in the creation of modern methods and disciplines.

  2. Feb 2020
    1. Some shared means of defining what facts or beliefs are off the wall and what are plausibly open to reasoned debate is necessary to maintain a democracy.

      What are these shared means? How do we agree on a shared method when we can't agree on shared facts/truths?

    2. Something fundamental was happening to threaten democracy, and our collective eye fell on the novel and rapidly changing—technolog y. Technological processes beyond the control of any person or country—the convergence of social media, algorithmic news curation, bots, artificial intelligence, and big data analysis—were creating echo chambers that reinforced our biases, were removing indicia of trustworthiness, and were generally overwhelming our capacity to make sense of the world, and with it our capacity to govern ourselves as reasonable democracies.

      One thing to track in this reading: Is the technology creating the problem, or is the problem symbiotic (culture/politics in a feedback loop with technology).

    1. consequential discussions about the legacy of ancient Greece and Rome are happening not in the conventional realms of literatu re, theater, and scholarship, but on the internet.

      This gets to some of what I've annotated above about the divide between academic and public conversations.

    2. The idea of a vibrant, radical, intersec-tional feminist Classics—one that uses the ancient world to enrich conversations about race, gender, and social justice—is anathema to them. And that is why feminist Classics to day is more exciting and necessary than ever.

      This idea that a feminist Classics is a threat is interesting given that Red Pill sees itself as, in some cases, politically and socially subversive (ie upsetting a "gynocentric" world).

    3. This is an idea that we ought to take seriously, because it is not far removed from the attitude of some on the poli tica l left. The men of the Red Pill believe that the Classics are only (or at least espe-cially) meaningful to reactionary white men, and th ose with pro-gressive politics who seek to upend or replace the Western canon tacitly cede this point. Both sides of that debate agree that the study of ancient literatu re perpetuates white male supremacy; they differ only on the question of whether that is a consequence that should be celebrated.

      We should be skeptical of "both sides" arguments, but perhaps this one has something to it?

    4. they are aspirational. Even more disturbingly, their online vitriol suggests that they believe they deserve such a society, and that our society—one in which women are allowed to vote and to choose with whom to have sex and whom to marry—re presents a deep systemic injustice against white men. They use ancient litera-ture to justify their sense of entitlement to female bodies and to political power over them

      This is especially troubling given that these online cultures are not cut off from everyday politics and "real life." Given Gamergate's status as a proving ground for Trumpism, it becomes important to respond to Red Pill rhetoric and take it seriously.

    5. a rape culture exists within a social group that normalizes rape to the degree that consequences for rapists are minimal or nonexiste nt and punishing rapists is seen as more barbaric than rape itself

      working definition of rape culture

    6. The men of the Red Pill who write about the ancient world would have their readers believe th ere is a straight line from antiquity to today, a continuity of male and female behavio r

      This is the throughline of each chapter.

    7. Ovid’s text may have only limited value when used to validate modern game advice, but it works beautifully to illuminate the flaws and dangers in pickup-ar tist ideology. Taken alone, the Ars Ama-toria has often been treated by scholars as an amusing literary game, and seduction manuals are excused as common-se nse tips for how to win the game between the sexes. But when placed alongside each other, each text appears in a diff erent light. Ovid’s casual references to sexual assault seem far more sinister and less ironic when one realizes that similar ideas are widespread in the seduction commu-nity today. And Ovid shows that, for certain men, the most seduc-tive idea of all is that mastering the art of love—that is, learning how to violate women’s boundar ies in a socially acceptable manner—ca n function both as social commentary and as poli tica l resi sta nce

      If you were to skim the deep dives into evidence of this chapter, this passage offers a clear and concise wrap up of the chapter and the stakes of the argument.

    8. In contrast, he is extremely sparing with detail about any of his conquests, with the exception of Lisa, the woman he falls for at the end of the book who inspires him to leave the community. Aside from her, most women are identified by their first names, their occupation, and their hair color

      Women as props in the story.

    9. To an outsider, it may look like a group of men talking about women, but often the women become li ttle more than a means to the end of es-tablishing authority and social capital among a group of male peers.

      Perhaps another moment to think about Chun's discussion of community.

    10. . In parti cula r, the similarities between the ancient and modern seduction guides highlight two parallel tendencies: the prizing of male subjectivity over female subjectivity, and a projec t of gradually intensifying the violation of women’s boundar ies.

      The purpose of this comparative study between Ovid and "game."

    11. Pickup-artist readers of the text generally ignore the ironizing element of the narratorial voice in the Ars and instead read the text as straightforward advice.

      An interesting ethical question arises here: who is responsible for readers missing the irony?

    12. The most common Engl ish translation of Ars Amatoria, The Art of Love, masks the text’s true nature and makes it sound much more flowery than it re ally i

      This question of translation is important given how interpretation of Ovid is tied to the ethics and care of the translator.

    13. Treating the premise of this poem as fundamentally playful or subversive, as some scholars do, becomes irresponsible when th ere is a community using it today to normalize an attitude to ward consent that would not be out of place in ancient Rome.

      Another moment where we should understand the boundary between academic and popular discussion of classical texts.

    14. At its heart, learning how to have game requires conceptualizing and internalizing ideas about gender that lead to devaluing women and relegating them to the status of sexual ob-jects.

      The dangers of PUAs philosophy, which denies women any ability to think/reason/etc. and conceptualizes women as have certain essential properties.

    15. f you agree with this interpretation of the philosophy, then both inter-sectional feminists and members of the Alt-Right can embrace Stoicism freely and without concern

      Stoicism's ambivalence makes it fertile ground for a broad range of philosophies and political arguments.

    16. Tomassi is not alone in this belief: the men who frequent Red Pill sites are confident that they are more rational and less emotional than anybody el s

      Another moment to think of Brock's argument about African American Cybercultures and pathos...

    17. However, hidden just beneath the surface of Stoicism’s ap-parent protofe minism is a gender politics easily adaptable to Red Pill ideology.

      Here's where we begin to learn that this is not just a story of the misinterpretation of Stoicism.

    18. In their musings about Stoic philosophy’s value to the modern man, they reveal why Stoicism continues to exert such appeal over the men who have “swallowed the red pill”: in short, it justifies their belief in the intellectual supe-riority of white men.

      The answer to: Why Stoicism now?

    19. Holiday puts racism, sexism, ableism, homophobia, and a host of other prejudices into a box, labels it “disadvantage,” and then makes it vanish by proclaiming disadvantage universal to the human condition.

      Key rhetorical tactic of the manosphere.

    20. The most famous of th ese is the praemeditatio malorum, a practice of envisioning possibl e outcomes so as to be inoculated against negative reactions

      Richard Grusin's book Premediation argues that this is what our current media environment does - it "premediates" terrible outcomes to innoculate us against them.

    21. Stoicism focuses explicit ly on self-improvement, so it can be blended easily into the self-help aspect of Red Pill communities.

      Self help - a key part of the Stoic toolbox.

    22. So antifeminist readings of th ese texts in Red Pill communities should not be dis-missed as misreadings or shallow interpretations: they may be re-sponding to and drawing on parts of Stoicism that advocates of the philosophy would prefer to ignore.

      The key contribution of this chapter is its argument that Stoicism offers Red Pill theoretical resources that this community uses. It's not just that they are misinterpreting - some of the fault lies in Stoicism itself.

    23. Sto-icism, the philosophy beloved by the Red Pill, has a reputation among scholars as one of the most feminist of all ancient philoso-phies.

      We spoke in class about the disconnect between academic conversations and "popular" conversations, and this is another good example of that.

    24. Stoicism, a philosophical school founded in Athens around 300 bce by Zeno of Citium, teaches its adherents that nearly everything usually perceived to be harmful (including hunger, sick-ness, poverty, cruelty, and death) is only harmful if one allows it to be

      Brief definition of Stoicism.

    25. Epictetus advises taking responsibility for our perceptions and ac-tions; Valizadeh claims that women forced him to act in a certain manner.

      A contradiction that sits at the core of Red Pill. All ideologies rely on contradictions - this one is no exception.

    26. claim that study of the classic texts of the Western tradition is under attack by progressives, who wish to ei ther throw out the canon or read to day’s corrosive identity politics into it.

      This is a really important moment in Z.'s argument.

    27. The bond that keeps the Red Pill community together is ideo-logical sublimation: racial to gendered, gendered to racial.

      This is a moment in the text that would be worth pausing over in class. How does this process of "sublimation" work?

    28. Arguing with them is nearly impossible, because these men have a set of established rhetorical tricks that they use, consciously or unconsciously, to misdirect and derail opposing views. Since this book is dedicated to exposing how Red Pill rhe-toric works, th ese tricks deserve some explication

      One question we might ask is how complicit the traditional teaching of first-year writing and rhetoric classes is in providing this Red Pill "toolbox."

    29. This argument, much like th ose of the Red Pill writers I men-tioned earlier, is a straw man: nobody denies that our society owes a debt to the Greeks.

      The manosphere relies a a great deal on these straw man arguments.

    30. However, the student said her professor focused on the beauty of the language and the splendor of the imagery when lecturing on the text. As a result, the student completely disengaged from the class discussion as a means of self-pr eservation

      This would seem to be easy to solve - teach the works with more care. But the response to the critique of students has been to say that they are "snowflakes," etc.

    31. The Columbia Spectator op-ed was met with bipartisan scorn in outlets from The Wall Street Journal to Salon

      A common response to such episodes - one that will argue that "both sides" are misguided.

    32. But th ere is no denying that producing feminist readings and uses of the Classics can be a bit like trying to use a normal pair of scissors when you are left-handed

      this stacks the deck against anyone trying to read these texts "against the grain"

    33. no universality or even commonality, and that lacking manifests in how we tear ourselves, and each other, down, and always have.

      Think here of Chun's discussions of community based on hatred. Elam insists that the community is only bound by one thing - hatred of feminism.

    34. In this chapter, I will map out the contours of the Red Pill com-munity and its various subgroups. By identifying what each of th ese internal factions is trying to achieve and how they operate, we can better understand why they feel compelled to position themselves as the inheritors of the classical tradition and how the ancient world validates one of their most cherished, deeply held beliefs: that all women throughout history share distinct, immutable qualities that make them promiscuous, deceitful, and manipulative.

      roadmap for the chapter

    35. I have decided to focus primarily on the gender politics rather than the racial politics of Red Pill communities for two reasons.

      An important moment to notice as Z. discusses what decisions she made as she conducted the study.

    36. Social media has el-evated misogyny to entirely new levels of viole nce and virulence.

      This is an argument that social media spaces have played an active role in elevating and spreading this arguments. Again, the tool is not neutral, according to these arguments.

    1. "ss  ss s s  s  s s  ss s  ss s s sss  s ss s !s

      Because we are policing content instead of behavior (deletion after the fact), the horrified responses remain.

    2.  ssss  ssNs sssss  ssssss ss‹ ss s 

      Not a community of "us" vs. "them" but a community that blurs boundaries altogether.

    3. ssss sss s s s sss s ssss s

      A community based not in a shared identity but based on a shared experience of radical vulnerability and exposedness.

    4. " s s sss Ÿs sssnss  ss s  sss  s  ss  s  s   sssss  sss  ss s s( ss  ss  s s ss s  ssss s  <sss ss s s *<ss ss   s °s

      Amanda Todd as a model for inhabiting networks differently.

    5. s  s ss s ss s s s s s ss s s6 s s ss s  s

      An entirely new way of thinking about interaction and "space" online.

    6. s s ssss  sss   ss s  s  ss  ,s;  s  s ss s } ss ,)ss  ss s ss sss sss  )s   ,s

      This turn toward questions of infrastructure and design is something we'll return to often this semester.

    7. s s sss sss  ssssssss  

      Not about "safe spaces," since this whole argument that Chun is making is that there's no such thing.

    8. 3 s s  ss s  s ss sss  ssssTsBss !\S

      This has an interesting resonance with Parikka and Sampson.

    9. G ssss s s  ss ss ss  s ss s s sss  s   As

      We are confessing that which is already "out there" even if it may be difficult to find.

    10. ïs ss ss sss ss ss s ss s  ss ssss   s  ,s

      We never read "alone." All of our reading and writing practices are tracked and put into databases to be used.

    11.  sssJ%-sJs ss%s -  s ss-  -ss    ssss s -

      Think here about Zuckerberg's comment that "a squirrel dying in your front yard" might be more important to you than some global catastrophe.

    12. s# s   s  s ssN s   ss  ss  s.ss   s s   sss s

      epistemology of outing/the closet is affected by/affects all of these other boundaries that are now being questioned.

    13. s# fss  &s s ss   s   ss s ssss6 s ss ,s

      a concise definition of the "epistemology of outing"

    14. sss s  s s  ss U  s s  s s ss s k s s ss  s s  ss s 

      It's worth thinking of "influencer" culture as we read this portion of the argument.

    15. )dw6S5W;cwdL;whc;^M>bwL56NdcwZ?wS;5RNXJ?Z^wcocd;WN7wkhUX;^56NSNdN;c wJSZccNXJwZk;^wdL;wm5ocwNXwmLN7LwZh^w\^ZWNc7hZhcwW57LNX;cw^ZhdNX;UowmZ^RwdL^ZhJLw5Xw5SS;J;8wS;5RNXJwdL5dwhX8;^WNX;cwdL;wc;\5^5dNZXwZ?wdL;w\;^cZX5Sw?^ZWwdL;wX;dmZ^R;8w

      Chun is attaching these forces to the infrastructure and function of the internet rather than just "user choice."

    16. Bs <ss ss s sss  skss s<s ss <ss#  <|sks  w

      Important to see this parallel.

    17. sšsss 

      "template as shield" - later we'll learn that the template (notecard genre) sits in between a singular, non-repeatable experience and a communal, shared experience.

    18. sss  s   s  ss/  s s   $ sss s

      We talked a bit about how Brock was aiming to escape the loop of control-resistance that we typically use to understand how people deal with power and attempt to resist. Chun is trying to find a way out of a similar loop. In this case, the loop involves condemnation and celebration, both of which remain trapped in the epistemology of "outing."

    19. 2L5dw8Z;cwNdwW;5XwdZw7ZX8;WXw7;ad5NXwhc;acw5cwmLZa;cw5X8w5dd;XdNZXwc;;R;acwNXw5wW;8NhW w5wX;drmZaR wdL5dwNcw6ow8;?OXNdNZXw\aZWNc7hZhcw

      There's a version of this in Tolentino as well - that women are punished for being visible and getting attention when that's exactly how the Internet thrives - one attention and action.

    20. dZw7ZX?;ccwNXw5wW;8NhWwNXwmLN7Lwm;w5a;w5Sm5ocw7ZX?;ccNXJ w

      An important part of Chun's argument - the medium reveals and distributes things, over and beyond our choice to reveal or distribute.

    21. 4 ss   s ss sssss( s s 9*ss s 7ss s

      Notecard video as genre, something that comes up later in the argument. These are repetitions of a form, but they are attempts to "inhabit" this form differently.

    22. μs ss ™s sss %s%sss%X s%  Xss%s sssGs  sGs  s sE6Ƴs ss s  s%ss s(X%sb,@*Kss s% ss%s % s %% s ss

      Chun's suggestion that Todd's video was not a cry for help but a documentation of her "will to live."

    1. the conflation of speech and act that’s inevitable in any computer-mediated world, be it Lambda or the increas-ingly wired world at large.

      Worth noting that Dibbell is writing three years after the publication of Judith Butler's Gender Trouble, which relies on a similar theory of language: that language performs action and creates realities (similar to arguments she makes in Excitable Speech with regard to law/speech).

    2. But it was also having some unsettling effects on the way I looked at the rest of the world. Sometimes, for instance, it grew difficult for me to understand why RL society classifies RL rape alongside crimes against person or property.

      Rethinking the virtual world leads to rethinking things in other spaces as well...

    3. In a few days, Haakon announced, he would build into the database a system of petitions and ballots whereby anyone could put to popular vote any social scheme requiring wizardly powers for its implementation, with the results of the vote to be binding on the wizards.

      a policy emerges, in the wake of someone exploiting a "policy-less" space

    4. He had committed a MOO crime, and his pun-ishment, if any, would be meted out via the MOO

      The community seems to be in agreement that when it comes to punishment, the line between online and offline is clear.

    5. Peaking in number at around 30, this was one of the largest crowds that ever gathered in a single LambdaMOO chamber,

      Gives you a sense of the relatively small size of this community.

    6. but only implement whatever decisions the community as a whole directed them to.

      Perhaps an early case of the tech community off-loading responsibility for community management onto users.

    7. it would require the services of a nobler class of character. It would require a wizard.

      power dynamics of LambdaMoo - not the egalitarian/democratic space it might have been touted as

    8. whether we present that body to another as a meat puppet or a word puppet is not nearly as significant a distinction as one might have thought.

      a blurring of the boundary between "virtual" and "real"

    9. LambdaMOOers are allowed a broad freedom to create -- they can describe their characters any way they like, they can make rooms of their own and decorate them to taste, and they can build new objects almost at will.

      This "broad freedom" is important to consider, since it leads to a need to define norms, rules, etc.

    1. lackness as a dynamic core of narrative gravity (pace Yancy) sustained through intentional, libidinal, historical, and imaginative Black agency in the context of navigating American racial ideology.

      Brock's definition of Black culture

    2. These practices are optimized for communicative efficiency on their respective media, drawing from a pleasure in creative linguistic expression and the historical, discursive practices and experi-ences of evading white racial surveillance in plain sight

      In a text that we'll read later this semester called Race After Technology, Ruha Benjamin argues that black technology users "already live in the future," and this resonates with that. African American technical practices deal with surveillance in innovative ways because they have always had to deal with the surveillance of white supremacy.

  3. Jan 2020
    1. This is why cultural theory needs to stretch its conceptual capacities beyondrepresentational analysis and come up new notions and ideas in order to bet-ter grasp the technological constellations and networked assemblages of“anomalous media culture.”

      a representational approach has no way of accounting for the multiple computational processes that are happening outside of the user's awareness

    2. Anomalies transform our experiences of contemporary network cultureby intervening in relational paths and connecting the individual to newassemblages

      No anomaly, no change.

    3. British cafebecomes exposed to the transformational force of spontaneous events ratherthan the static essences or signs of identity politics

      The "spamming" of the cafe is indicative of potentiality rather than just an anomalous event.

    4. Instead, the dangerous anomaly has long been regarded as a functionof the homogenizing powers of popular media.

      The concern was often that TV (or radio before it) was trash - was low culture and was polluting minds.

    5. For us, judging a computer virus as a metaphor of a biological virusall too easily reproduces it to the same fixed terms conjured up in themetaphor in itself and does not provide any novel information concerningthe intensive capacities of, for example, a specific class of software program

      Think here of the multiple metaphors used by Chiang's characters when trying to describe Digients.

    6. hat makes this collection standout, however, is notonly its radical rethinking of the role of the anomalous in digital culture, butthat all of the contributions in the book in one way or another mark animportant conceptual shift away from a solely representational analysi

      This is an important idea to track as we make sense of the argument.

    7. anomalies are continuously processed and rechanneled back into the every-day of network culture.

      This argument suggests that the internet is actually a fairly efficient system - like the farm that composts everything, it wastes very little.

    8. This junkfills up the material channels of the Internet, transforming ourcommunications experiences on a daily or even hourly basis.

      Like Jeong, P&S argue that garbage is at the heart of the internet - there's lots of it, and it's always been there.

    1. More importantly, examination of sustained harassment campaigns shows that they are often coordinated out of another online space.

      Important to note. Campaigns have "backstage" and "frontstage" phases - they coordinate on one platform and then swarm.

    2. arbage can be mitigated by and disposed of through architectural solutions—in other words, by code. Manual deletion, manual banning and legal action are not the only tools in the toolkit.

      Using code to deal with garbage.

    3. Large-scale sustained campaigns also resemble tiny, crude, handmade botnets. At the center is an orchestrator, who perhaps engages in harassment from multiple “sockpuppet” accounts—the corollary to the burnable domains and email addresses that are so highly sought after by spammers. But the really bizarre phenomenon is all the low-level mobbers, who have little-to-no real investment in going after the target, and would not manifest any obsessions with that particular target without the orchestrator to set them off. Here they resemble the zombie nodes of spam botnets, right down to the tactics that have been observed to be deployed—rote lines and messages are sometimes made available through Pastebin, a text-sharing website, and low-level mobbers are encouraged to find people to message and then copy/paste that message.

      The mechanics and infrastructure of large-scale, targetted harassment campaigns.

    4. repeated difficulties that MoveOn.org

      This was a problem at Rutgers last year as union emails were being filtered as spam by the university email system during contract negotiations.

    5. For small and intimate communities, the question of balancing speech and user safety is relatively null. But large-scale platforms are different.

      It's worth noting here that the R-CADE Symposium that happens on campus in April will feature a workshop on "building your own small social network." One of our guest speakers, Darius Kazemi, will walk us through how to do this, from technical details to how to approach community norms, etc. The key here is to consider the difference between a social networking site for "everyone" and one that is actually just for a small group of like-minded people...how should their infrastructures differ?

    6. A user doesn’t have to have a real change of heart to decide to simply go along with the norms that are being enforced.

      An important point here: Fixing the problem may not necessarily be about fixing the person's motivations or biases.

    7. simply deleting or filtering offending content is not the end goal.

      Instagram recently rolled out a "restrict" tool that allows users to "shadow ban" an abusive commenter. The abusers comments are not visible to others, but the abuser is not aware of this: https://www.thesun.co.uk/tech/10049938/instagram-bullying-restrict-hide-comments/

      This is an approach that is not merely about removal of content, and in a way it is more focused on "behavior." It does not necessarily curb that behavior, but it recognizes the way the behavior works. If the abuser thrives on their comments being visible, this strategy recognizes this and uses it against them.

    8. The context in which the publicly information gets posted matters.

      The mere fact that the info is available is not always as important as when/how/to whom is is presented. How many eyeballs are on it and what is happening at that time? This is usually what's most important.

    9. When complex internet pile-ons like Gamergate get heated, the term “harassment” is flung back and forth like an accusation, with each side convinced that the other side is the real harasser, and that their opponent is now using the term in bad faith to apply to mere criticisms or mildly unpleasant language.

      Prophetic, given that Jeong was the victim of just this kind of attack in 2018: https://apnews.com/519ffe9de59149639cfbca3a6cefd72a