Skip to content →

Category: identity

Escape from the Factory of Life

listening-couple

It’s as though we just looked up and noticed that someone is watching us. It’s that creepy feeling. You know that someone or something sees you, but you can’t see them. The Internet seemed like a place where no one knew whether you were a dog or not. Identity didn’t matter and that’s what created a level playing field, a kind of equality. But then it turned out that you could be identified, that you identified yourself on social networks for fun and profit, that your identity information and preferences could be aggregated and sold without your knowledge. Rather than a casual conversation, the Internet turned into an indexed and searchable permanent record. It’s the equivalent of having everything you type into your network-connected keyboard published to the front page of USA Today in real time. And that’s a very strange context in which to speak.

conversation11

Doc Searls recently weighed in on the issue of Privacy in the age of connected digital networks. It’s an issue that he’s been deeply involved with for many years. Much of our current dilemma could be seen coming from a mile away. But here’s why Doc sees this as a pivotal moment:

I see two reasons why privacy is now under extreme threat in the digital world — and the physical one too, as surveillance cameras bloom like flowers in public spaces, and as marketers and spooks together look toward the “Internet of Things” for ways to harvest an infinitude of personal data.

There’s a joke that Marc Maron tells: “Big Brother is watching us. That’s what we pay him for.” Maron gets to the conflict at the heart of our complaint about surveillance. In a sense, this is what we’ve asked for. We want maximum safety and so we authorize and pay for unlimited surveillance in the hopes of preventing catastrophic events. Now that we see how our wishes are being carried out, we’re troubled — isn’t total information awareness just for the bad guys? Be careful of what you wish for…

conversation7

Marshal McLuhan called advertising our cave art. It expresses our most basic desires. Some would say that it creates them, but the truth is that the desire needs to be there to start with. Advertising calls that deep desire to the surface. There’s a television ad that’s running now that says a great deal about who and what we’re thinking right now. It’s for a car called the Infiniti Q50.

We see a “Factory of Life”. Men and women, young white professionals are being assembled and outfitted in a factory. A disembodied voice narrates the stages of the process. Industrial robots apply lipstick to the women’s lips. The men’s suit coats and ties are fitted with precision. All the personal style is very high end — but it’s all identical. Industrial capitalism has raised the standard of living to a level of luxury. There are no workers in the factory, there are only the people on the assembly line getting a commodified wealthy lifestyle. Either the people of color are being hidden behind the walls of the factory or the factory has remanufactured their ethnicity to conform to a pre-established standard.

As our hero moves down the assembly line, it becomes clear that this isn’t a socialist utopia where everyone can enjoy the benefits of wealth. It’s a surveillance state where conformity is strictly enforced. Everyone accepts what’s happening to them with a blank stare. There are no emotions — merely impeccably-dressed cogs in the machine. No one loves the artifacts of their wealth, no one enjoys the luxury.

A robot arm puts our protagonist’s necktie into place and he experiences a sudden spark of consciousness. He turns and sees his reflection in some glass. He smiles, thinks “I look pretty good.” As he looks around, suddenly he’s able to see the Matrix. He moves farther down the assembly line to where car keys are being distributed. The keys are to identical C-class cars by Mercedes Benz. Each figure takes a key without complaint. We can see that our hero has begun to question what’s going on. A woman’s face appears on a small screen that only he can see. She’s a human like him and she’s hacked into the Matrix to help get him out. She tells him to check his pants pocket for a set of keys. These are the keys to the Q50 and escape from commodification and conformity. He takes the keys and makes a run for it.

The surveillance system detects his his break from the assembly line and dispatches robots to capture or possibly kill him. He’s not pursued by humans, it’s only technology that enforces its own mechanistic repetition. Making a different choice is clearly a dangerous act. The mechanical forces of commodity chase him as he makes his way to the Q50. He gets in, starts it up and drives out of the factory. The robots engage in the chase, but are left in the dust. The Q50’s acceleration is fantastic and quickly the factory recedes in the distance. The road opens in front of him as he drives out of the darkness and into the light. Freedom.

We easily forget that a commodity with special sauce provides our hero with the means to escape the boring commodities that everyone else accepts. A commodity provides the escape from commodity. It’s an open question how he will make a living outside the machine. No doubt he will live by his wits. The “Factory of Life” that opens the commercial is a good representation of what we’re asking of technology. It’s an expression of our wishes and desires. The machine will supply us with the good life as long as we accept the conformity and don’t get out of line. “Assimilation is beauty.” Individual desires can’t be tolerated. There’s great wealth for everyone in the envelope of a surveillance state. Not unlike the way we trade our personal data for a wealth of free online services.

And predictably, we want to view ourselves as the individual who breaks out of the mold. We’re not part of the machine, we have free will and a need to express our individuality. We wake from a dream anchored to one set of commodities and a mechanized life into another dream level where a revolutionary set of commodities anchor a new and improved fantasy with 30% more freedom. You and I wake up to see that we’re in a surveillance state of cloud computing and the NSA. We see our reflection in the glass and enter Lacan’s mirror stage. We perceive the image of our body and form a mental image of our individual identity. We make a run for it. We’ll live by our wits.

The idea of the “mirror stage” is an important early component in Lacan’s critical reinterpretation of the work of Freud. Drawing on work in physiology and animal psychology, Lacan proposes that human infants pass through a stage in which an external image of the body (reflected in a mirror, or represented to the infant through the mother or primary caregiver) produces a psychic response that gives rise to the mental representation of an “I”. The infant identifies with the image, which serves as a gestalt of the infant’s emerging perceptions of selfhood, but because the image of a unified body does not correspond with the underdeveloped infant’s physical vulnerability and weakness, this imago is established as an Ideal-I toward which the subject will perpetually strive throughout his or her life.

There’s a common political move that allows the complainant to achieve a state of blameless innocence. “Since I completely disagree with what the government is doing; I therefore bear no responsibility for its actions. It’s those people, not me who are doing this terrible surveillance. I am innocent; they are guilty. Me good, world bad. My purity remains as pure as it ever was.”

When things are going well, we’re quite proud of the idea of government by the people, for the people and of the people. In the experiment called the United States, the actions of the government are the actions of the people. The President is President of all of the people, not just those who voted for him or her. Instead of declaring our absolute innocence with regard to the bad acts committed by our government, what if we took personal responsibility for them. Those are our dreams and desires manifesting in the real world. Yes, those bad acts were committed in my name. And that defines my morality and the morality of my fellow citizens. We do that. We asked for, and paid for, a surveillance state. It’s only by owning it that it can be changed.

Comments closed

Look on my Works ye Mighty and Despair!

king-corn

It might be a way for a television show entering its final season to tell the audience that the empire built up by the main character over the years is about to come apart. That’s where Percy Bysshe Shelley’s sonnet “Ozymandiasmakes an appearance.

I met a traveller from an antique land,
Who said—”Two vast and trunkless legs of stone
Stand in the desert. . . . Near them, on the sand,
Half sunk a shattered visage lies, whose frown,
And wrinkled lip, and sneer of cold command,
Tell that its sculptor well those passions read
Which yet survive, stamped on these lifeless things,
The hand that mocked them, and the heart that fed;
And on the pedestal, these words appear:
My name is Ozymandias, King of Kings;
Look on my Works, ye Mighty, and despair!
Nothing beside remains. Round the decay
Of that colossal Wreck, boundless and bare
The lone and level sands stretch far away.”

A poem may have a use as a preview for a television series. It might provide a comment on the inevitable decline of empires built through raw power. On our sofas in front of our big screens, at our desks gazing at computer screens, on our smart phones as we navigate the foot traffic of the sidewalk, we hear the poem and put it into the context of the story arc of a television show. From the safety of our media consumption dens we see the folly of powerful empires in the face of the sands of time. The show, by means of the poem, tells the audience about a particular way to watch the show. More than half a million people heard Shelley’s poem in the five-day period after it was published to the Network. In this context, the poem has a certain utility, but it also bursts out of that frame.

Shelley thought of a poem as a message in a bottle from the future. A powerful poem, this one was written in 1818, continues to deliver messages to the present for a good long time. The poem remains in the future until it has no more it can tell us. “Ozymandias” continues to speak.

The poem’s construction gives us a whole series of nested narrators, interlocking boxes of perspective. We, the readers, are also implicated in this chain of perspectives. It turns out that “we” are Ozymandias, it might be us speaking those words that appear on the pedestal. As we appear to have a relation to the broken and buried stone figures of Ozymandias, so will future civilizations have that same relationship to us.

The desert of Shelley’s poem brings to mind the landscapes of Craig Childs’s “Apocalyptic Planet“. Childs visits landscapes of heat and sand, ice and wind, and fields of volcanic lava. He returns to us a traveler from an antique land. He winds up his Long Now Foundation talk on his journeys with the place he called the most terrifying apocalyptic landscape. Childs and a friend hiked and camped for two days and three nights in an Iowa GMO corn field. For Childs the corn field has much in common with the other apocalyptic landscapes he visited. These are places where the earth becomes “lots of one thing and not much of any other.” King corn has a message written into its DNA. The pesticides carved into the pedestal of its genetic code are a broadcast message to any living entities who might enter its empire: “look on my Works, ye Mighty, and despair!”

cranston-web

The other message delivered in this reading of Shelley’s poem has to do with what attitude, what feeling, we get from the ruins of Ozymandias’s broken stone statues. There’s the “frown and wrinkled lip, and sneer of cold command” and the command to “look on my Works and despair.” We get the feeling of a civilization built on the fear of power — of the many living in fear of the few. If we are Ozymandias, what message we will leave behind for a future generation to ponder?

It’s here that the writer George Saunders’s commencement speech to the students of Syracuse University emerges in the poem. As an older person he wanted to tell this group of young people, with their whole lives ahead of them, what he regretted in his life. And here’s the message written on his pedestal: “What I regret most in my life are failures of kindness”. George Saunders is also Ozymandias, but an Ozymandias who has read and been affected by Shelley’s poem.

So, quick, end-of-speech advice: Since, according to me, your life is going to be a gradual process of becoming kinder and more loving: Hurry up. Speed it along. Start right now. There’s a confusion in each of us, a sickness, really: selfishness. But there’s also a cure. So be a good and proactive and even somewhat desperate patient on your own behalf – seek out the most efficacious anti-selfishness medicines, energetically, for the rest of your life.

Do all the other things, the ambitious things – travel, get rich, get famous, innovate, lead, fall in love, make and lose fortunes, swim naked in wild jungle rivers (after first having it tested for monkey poop) – but as you do, to the extent that you can, err in the direction of kindness. Do those things that incline you toward the big questions, and avoid the things that would reduce you and make you trivial. That luminous part of you that exists beyond personality – your soul, if you will – is as bright and shining as any that has ever been. Bright as Shakespeare’s, bright as Gandhi’s, bright as Mother Theresa’s. Clear away everything that keeps you separate from this secret luminous place. Believe it exists, come to know it better, nurture it, share its fruits tirelessly.

Saunders’s consciousness has been upgraded by the poetry of English romanticism. It’s not just that the sands of time have buried and broken this antique emperor named Ozymandias, but that only a small piece of that culture survives. For Saunders, we read this command from the pedestal: “err in the direction of kindness.” The poem asks you as you read it: “What is your message in a bottle for the future?”

Comments closed

The Mind’s Eye: Black Boxes and Time Machines

The-Time-Machine

There was a moment in time when the internal cinema of the mind opened its doors for business and began selling tickets. It might have been in 1798 when “Lyrical Ballads, with a Few Other Poems” by William Wordsworth and Samuel Taylor Coleridge was published. This cinema of the mind was invoked through the use of unrhymed iambic pentameter, or blank verse. Squiggles of black ink sequenced in a particular rhythm were put down across rows on a sheet of paper. They were designed to induce hallucinations, to operate like a time machine that brought you back to a moment of powerful feeling — pried open your eyes and allowed you to witness that scene as it actually comes to exist in your mind.

wordsworth-manuscript

From the Preface to the “Lyrical Ballads” by William Wordsworth:

I have said that poetry is the spontaneous overflow of powerful feelings: it takes its origin from emotion recollected in tranquillity: the emotion is contemplated till, by a species of reaction, the tranquillity gradually disappears, and an emotion, kindred to that which was before the subject of contemplation, is gradually produced, and does itself actually exist in the mind.

“Spots of time” was the phrase Wordsworth used to describe these powerful feelings that welled up spontaneously, overflowing any effort of reason to contain or define them. Contemplated from a tranquil distance, these are the springs the feed the continuing power of poetry. Defying entropy, these moments don’t strike and fade to nothingness. As Freud would later note, they become constitutive of our identity — in both our joy and our madness. They are the personal identity that persists through time and one source of poetry.

From William Wordsworth’s “The Prelude” (1805 edition):

There are in our existence spots of time,
That with distinct pre-eminence retain
A renovating virtue, whence–depressed
By false opinion and contentious thought,
Or aught of heavier or more deadly weight,
In trivial occupations, and the round
Of ordinary intercourse–our minds
Are nourished and invisibly repaired;
A virtue, by which pleasure is enhanced,
That penetrates, enables us to mount,
When high, more high, and lifts us up when fallen.

prime-suspect

One of the pleasures of the murder mystery genre is this quality of inducing an internal vision of a past moment of intense passion. The detective surveys the scene of the murder and attempts to reconstruct the events. Witnesses are interviewed, asked to tell what happened. As the witness recounts her memory of the event her eyes shift their focus inward. The internal cinema fills her mind’s eye; she sees those moments around the crime as though they are occurring right now. She puts the vision on a loop and attempts to put it into words. In her face we can see the emotions evoked by remembrance and a reflection of the power of emotions from the event itself. The witness’s words evoke a vision in the mind’s eye — for both us and the detective. As each witness tells some piece of the story, we replay the vision, adding details, attempting to piece together a coherent narrative to replace the mystery.

humphrey-bogart-fedora

In film versions of murder mysteries, the eyes of the detective are the key to understanding the kind of thing that will have to be imagined to solve the crime. The world-weary detective in a film noir has seen it all. The character of his eyes gives us a sense of what he could imagine. As he loads the witness’s stories into the projector of his mind’s eye, he must let them induce whatever visions may come. Often we can see how this process of envisioning has taken its toll on the face and eyes of the detective. In others, say the Miss Marple mysteries, we see an incongruous contrast between the seemingly normal countenance of the detective and the eyes that can imagine horrific events of violence. The internal capacity of a dark and powerful imagination doesn’t always correspond with the external physique of an action hero.

marple-hickson

There’s a moment when everything clicks. Often it’s a moment that seems to be a break in the story. The detective, exhausted from gazing at the movie he’s constructed, turns off the projector and re-enters the world. An off-hand remark, a simple gesture, a common object seen in a new light offers the analogy that the provides the key. The puzzle pieces of the internal vision sliding around the detective’s head suddenly form a pattern with the ring of truth. This marks the beginning of the end of the story. Often at this point all the suspects and witnesses are gathered together in a room for a recitation of the detective’s vision. “Now you’re probably all wondering why I brought you here today.” Validation takes the form of the murderer making a break for the door.

minority-reportish

In the future in which we currently reside, this method of scraping a valid account out of the internal memories of unreliable witnesses begins to seem horribly inefficient. Imagine, if you will, how it might go. The detective arrives on the scene of the murder. The victim is positively identified and the paperwork is filed.

sergey-glass

The panel reviews the particulars of the crime and determines whether or not the victim’s black box should be released to the detective and which time machine privileges should be granted. The black box is the victim’s personal network cloud, along with all it’s corporate, medical and government cloud counterparts. This includes a stream of all commercial and financial transactions, social media transactions, voice and text mobile communications, location and personal quantification data. A unique identifier is generated to tie all the person’s data streams together into a single life stream. When loaded into the black box player, the detective can replay the victim’s life from any arbitrary point in time prior to the murder up until the time of death and after. Some data streams don’t require a living subject. The victim’s social graph and location data is used to aggregate all still and video photography relevant to the time in question. A list of additional persons of interest is generated through a strong tie / weak tie analysis of the people the victim came into contact with.

thematrixcouncil

The persons-of-interest list is submitted to the panel for approval. Once approved, this gives the detective the ability to more fully explore what happened along multiple vectors. When the additional black boxes are loaded into the time machine, the detective can travel through multiple vectors and get a real 360 view of the event. The additional data really increases the resolution of the time travel experience. For murder investigations the data also includes all digital communications with built-in auto-erase functions and any sort of strong encryption.

A-Clockwork-Orange-1971

With the data set constructed, the detective initiates the search algorithm. Based on analysis of motive, opportunity and other risk factors the top three suspects with the highest probability are identified. The paperwork is filed to allow the detective to show the prime suspects the highest probability version playback of what occurred. Each suspect is hooked up to biometric measuring machines and shown the playback. Through an automated analysis of the biofeedback the most probable murderer is identified and charged with the crime. The detective then converts the data set to an evidence set for the district attorney. The evidence set includes provenances and audit trails for all the data included.

time-travel-wormhole

Physicists disagree about whether time travel is possible. Given the speed of light and the size of the universe, it’s certainly possible to view ancient events as though they are happening in the current moment. Just go out on a clear night and look at the stars. But seeing old light isn’t the same as traveling to the time in which the image in that light was created. Whether or not time travel is possible in the physical universe, it’s now possible through the large repositories of time stamped stream data that we’re collecting — these so-called haystacks.

minds-eye

On the other hand, these are just words on a page. They’re designed to cause you to imagine a particular future, to view a movie on your internal cinema screen. They may just be a thought experiment — mere ephemera of the moment. You know, the stuff that dreams are made of.

Comments closed

We Want You, Big Brother

fuseli_the_nightmare

The song called ‘Big Brother’ by David Bowie keeps playing in the background of my thoughts. Of course, it’s all the noise about NSA and the Big Data work they’ve been doing to try and anticipate terrorist threats. It’s what we asked them to do, and now we’re shocked that they’ve gone and done it.

Someone to claim us, someone to follow
Someone to shame us, some brave Apollo
Someone to fool us, someone like you
We want you big data. Big data.

There’s a book by Shane Harris called “The Watchers” that provides a pretty good history of the effort. John Poindexter is the godfather of Prism and the efforts to use big data techniques to combat terrorism. Although Poindexter’s plan to build audit trails and anonymity into the original system were left by the wayside, the system we have is the one he imagined.

We want zero terrorists attacks, which means we have to stop them before they occur. Like a novel by Philip K. Dick, we have to anticipate the bad guys and stop them before they can act. It’s an impossible demand. Some will say this should be left to law enforcement— good old fashioned police work. And that’s fine if you want to catch the bad guys after the fact. Law enforcement isn’t going to stop a terrorist before the bomb explodes. And if you want to stand up and ask “why couldn’t our intelligence agencies have prevented this?”, then you have to acknowledge that Big Data, and your data, is baked into the cake.

The news media has done shameful job of reporting the story, and they don’t seem to care. The news seems to be about the court-ordered collection of telephony metadata and the potential for collection of specific datasets from the major cloud platforms as a result of court orders. The bloggers working for newspapers prefer to type up their nightmares instead of reporting the story. And, of course, printing nightmares is a good way to create pageviews. The more fear they can create the better. To anyone paying attention, this story has been well known for years.

The house seems to be filled with big brothers, we find them at every turn. Every corporation, organization and government aspires to be a big brother. When big brothers protect us, or give us “free” cloud-based applications, we applaud them. When we begin realize the guns used to defend us could be turned and used against us, we panic. Almost anything can be used as a weapon these days. Take a close look at Jeff Jonas’s real-time sensemaking systems that use context accumulation. Yes, like John Poindexter, he’s baked privacy in from the start. But if that system was pointed at you, there’s very little it couldn’t find out. You can buy that system from IBM.

The nightmare government with total access and control seems to have its roots in the figures of Alp and Mare — the elves that ride you in your sleep without your knowledge or permission. It’s as though the government is dead and now manifests as Mare. It not only has all your earthly communications, but has complete access to your unconscious, your dreams, your wishes and your fears. Government, now dead, haunts the living. It’s unmoored from the material world. It’s everywhere, it gathers up all the information about us and plots our misfortune. Perhaps it seeks revenge for shrinking it to such as small size that it could be drowned in a bathtub.

Oddly what we’re complaining about with the issue of privacy is that our “personal data” which is owned by the phone companies, Google, Facebook, Twitter and Microsoft is being given to the NSA. It should be noted that while we call it “our personal data” and “our privacy”, it’s only ours in that sense that it’s corporate-owned information about us. The Network platforms own it. It doesn’t belong to us, we gave it away in exchange for the chance to win valuable prizes. What we fear with regard to the NSA is the standard business model of the technology industry.

You’ve always already been hacked. The use of common protocols has guaranteed there’s no such thing as a secure computer network. At the end of 2010, the head of the NSA noted that the NSA works under the assumption that various parts of their system have already been hacked. They already act like crypto-anarchists and cypherpunks.

Debora Plunkett, head of the NSA’s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be considered completely and utterly impenetrable – not even that of the NSA.

“There’s no such thing as ‘secure’ any more,” she said to the attendees of a cyber security forum sponsored by the Atlantic and Government Executive media organizations, and confirmed that the NSA works under the assumption that various parts of their systems have already been compromised, and is adjusting its actions accordingly.

John Poindexter was trying to find the signal through the noise. He was trying to do what Jeff Jonas said was impossible. Jonas said you needed to start with the bad guy and then assemble the data around that point. Poindexter created “Red Teams” to devise terrorist strategies, and then based on the interaction patterns the strategies revealed, the analysts would look for matching patterns in the data. Early tests resulted in a lot of false positives. But that was ten years ago, Big Data has come a long way since then. When TIA was de-funded and removed from the official budget, the systems moved to dark funding and we lost a lot of visibility. The secret system became a secret to the extent that there can be secrets anymore.

Do we still want to try and discern the weak signal through the noise? The editor of Slate.com, David Plotz argues that we’re no longer facing terrorist threats and therefore these security programs are overreach. A position that must be much easier to take if you don’t receive daily intelligence briefings. The amount of noise is ever increasing, the question we need to answer is whether it’s really possible to detect a weak signal. Can you really see into the future with a reasonable probability? If not this way, then how?

The Overload
By Talking Heads

A terrible signal
Too weak to even recognize
A gentle collapsing
The removal of the insides

I’m touched by your pleas
I value these moments
We’re older than we realize
In someone’s eyes

A frequent returning
And leaving unnoticed
A condition of mercy
A change in the weather

A view to remember
The center is missing
They question how the future lies
In someone’s eyes

A gentle collapsing
Of every surface
We travel on the quiet road
The overload

Comments closed