hack against the apocalpyse pca 2.0

advertisement

HACK AGAINST THE

APOCALPYSE: THE CIVILIAN

SOLDIERS OF THE INTERNET

I R O N M A N 3 & P A C I F I C R I M

A Brief History of the Military Internet

Paul Baran: the move to a distributed network that depends on packet switching (“On

Distributed Communications” (1964)) in reaction to potential nuclear strike. Other theorists working: Leonard Kleinrock (MIT) and Donald Davies (England)

First use in 1969 (ARPANET). Publically unveiled in 1972; not coincidently, the year that ARPA added the “D” to become DARPA.

The more public and slightly more popular dissemination of the Internet into the 80s

(more common hardware (computers cheaper, moving into the homes), shifting some of the use to a (still relatively small + high machine-knowledgeable number of civilian hobbyists.

Centralized Distributed

Key thinkers: J. C. R.

Licklider (“Man-

Computer Symbiosis”

(1960)); Norbert Weiner &

Claude Shannon (Macy

Conferences (1946-1953))

A Brief History of the Military Internet

The military Internet (and computers) as De Landa (War

in the Age of Intelligent Machines) & Deleuze and

Guattari’s “machinic phylum”: “processes in which a group of previously disconnected elements suddenly reaches a critical point at which they begin to ‘cooperate’ to form a higher level entity” (De Landa, 7)

Deleuze and Guattari: “materiality, natural or artificial and both simultaneously; it is matter in movement, in flux, in variation” (ATP, 409); a “constellation of singularities, which converge, and make the operations converge,

upon one or several assignable traits of expression

(ATP, 406, italics authors’).

The Internet became a more prevalent tool by which to generate and organize this military machinic phylum.

The Civilian (Hacker) and the Military Internet

The late 80s Internet: FTP and BBS systems; lawless; a balance of power – for a time, the civilian was the super-user (ahead of the other ingrained military & corporate infrastructures).

Civilians at the forefront of next wave of innovations in home computing

In all three instances, the hacker is an ethical (humanist) superuser in direct opposition to another force (military machinic phyllum); as an outsider, for De Landa, the hacker is especially important because outside the military machinic phylum: “the military and corporations...are not in the business of giving people total control over computers”

Hacking as a form of resistance; the romantic union between; using the Internet (specifically) to enhance (not just computer hardware); much like Haraway’s cyborg

The Man-In-the-Middle Soldier

While Enemy of the State, Swordfish and The Core ultimately showcase the civilian hacker resisting/overcoming the military Internet, recent popular films, this urge to remilitarize the Internet has manifested in

Iron Man and Pacific Rim, more specific the “man-in-the-middle” soldier.

Not a new idea: Shannon and Weiner was discussing at the Macy

Conferences; Both N. Katherine Hayles (Ch. 3, How We Became

Posthuman) and De Landa discuss the concept.

Iron Man 3 and Pacific Rim are examples of the Future Combat System

(FCS), which Roderick outlines in “Putting the Post-Human in the

Loop.” a cybernetic system in which the soldier is a “man-in-themiddle,” melded to a series of computers, giving him/her access to, via immersion in “mixed reality....[of] information-rich environments”

(Roderick, 305). Cancelled in 2009; American Army continuing under

Army Brigade Combat Team Modernization

(http://www.defense.gov/releases/release.aspx?releaseid=12763).

Tony Stark: “It’s not 1980. No one says hack anymore.”

Tony Stark on the surface, appears to be De

Landa’s heroic, civilian hacker. The first

Iron Man is about his character's turn from a corporate weapon’s dealer to a civilian super hero; staunchly against his company’s products being used for military purposes.

Yet, Stark has great wealth and can afford the time and energy to “tinker” (Candra

Gill, PCA/ACA 2013); more, doesn’t identify himself as a hacker

Instead he is literally constructed as manin-the-middle soldier.

Reinforced by repeated shots of him inside his suit, with various Internet-enhanced

HUDs (right); this type of humantechnological solider/hacker within the film is a far too simplified posthuman; clear divisions between technology and human elements (the two do not meld).

Tony Stark: “It’s not 1980. No one says hack anymore.”

Iron Man’s relationship with Iron

Patriot (formerly War Machine) is more dangerous.

They work closely together; Iron Patriot is a Iron Man clone, repurposed for military use; rebranding in IM3 as more of a friendly brand, repainted with American flag (top). Actual

Man-in –the-middle soldier.

Iron Patriot: simply flies around in the world, into whatever countries and interrogates (bottom picture).

The two work together to conquer

bad guys at end. Talk and banter throughout; close, friendly.

Iron Man still has obvious and strong military ties.

Tony Stark & His Machinic Phylum of Iron Men

Tony Stark & His Machinic Phylum of Iron Men

Tony Stark creates his own network of other Iron Men; fights then in combination with Iron Patriot (using the Internet for remilitarized purpose).

The film is encouraging a heroic (and necessary?) military machinic phylum. Such a phylum is not a tool for diplomacy, but only for conflict and violence. Iron Man 3:

Encourages a too-simple militarized Internet that still relies on nationalistic boundaries (America Vs...); such a militarization is, frankly “awesome” and “cool,” but more importantly, necessary for maintaining (producing) a safe

America.

Technology is therefore an external weapon to be wielded, not a symbiotic extension (as per hacker ethics; far from De

Landa’s heroic hacker).

Pacific Rim: Humans as Biological Networks,

Soldiers

Pacific Rim: Humans as Biological Networks,

Soldiers

Pacific Rim: Humans as Biological Networks,

Soldiers

Compared to Iron Man, no longer just one “man in the middle”; cannot pilot alone. Complex biological/technological networks – not simply stepping into armour.

Dependant on “drifting” or “neural handshake” “Handshake” a key word – in computer science describes how one device (and its microprocessor) talks to and acknowledges another deviceReflective of a machinic audience’s Internet use (multi-user, immersive).

More “healthy” than Iron Man films

(much closer to Avatar’s treatment of the Internet: a messy biological/technological hybrid; less clear divisions)

Symbiotic with machine; when it gets hurt, pilot gets hurt; also, can’t just throw two pilots together - requires

“intimate” Internet.

“The deeper the bond, the better you fight”

- Raleigh Becket (Charlie Hunnam)

Positivity due to change in enemy: Pacific Rim is similar to The Core in that the adversary is Nature, though a man-made mutation of

Nature. Like The Core (and

The Matrix Revolutions and

The Matrix Reloaded), beyond Nationalism (unlike

Iron Man 3). Pacific Rim has all humans bonding together with machines in cooperation; any human apocalypse is a machine apocalypse.

“The deeper the bond, the better you fight”

Yet, the technology is justified as a “war” technology (don’t use Jaegers to build or...). As commander Stacker Pentecost (Idris Alba) says, humans are in the “last days of war.” The “DARPA based” Jaegers are a combat weapon to win that war and the pilots are soldiers – they are hardware to be deployed , under military orders.

Much like Iron Man 3, Pacific Rim showcases the repurposed civilian;

Raleigh Becket, after leaving the military after his brother’s death, is brought back from civilian work to become a soldier again.

While more posthuman-positive than Iron Man 3, still treating the

Internet as weapon. In fact the “intimate” Internet of user-user – machine that pilots the Jaegers is still one piece of hardware to deploy among many; the Internet-enabled user is still just one part of a larger military machinic phylum. Like Iron Man 3, this militarizing of the

Internet is necessary for the safety of the larger population. There is no resistance from the outside hacker, only “good” Internet-enabled soldiers.

Pacific Rim & Iron Man 3- Solutions

Real world example: Perlroth’s New York Times article “Luring Young Web Warriors” – the recruiting of hackers into the military assemblage and military machinic phylum as part of nationalistic army of cybersoldiers. The hacker re-purposed. Cyberarmies as defense and offense against other countries.

The shift towards unmanned drone warfare in both attacks and counterinsurgent measures.

Solutions

A constant awareness of military use of hardware and software, as part of military and civilian life; we must be critical and vocal about surveillance and repurposing of the

Internet’s physical and virtual infrastructures of the Internet in order to create/maintain the checks and balances of empowered civilian users.

An increase in mesh networks; smaller peer-to-peer networks where users use their own hardware (routers, servers, cables) as a way of creating an Internet outside of the one provided by ISPs. Turning away from the overreliance on a centralized Internet.

“Creative Hacking” classes like Creative Writing classes (both engineering and software); making computer education less specialized (teach HTML like you teach handwriting)

Information – aarontucker.ca

Aaron Tucker

Ryerson University

Toronto, ON, Canada aarontucker.ca

atucker@ryerson.ca

Interfacing with the

Internet in Popular

Cinema will be out with Palgrave

Macmillan in July

2014.

Tony Stark/Iron Man in the Internet

Works Cited

 Moshovitus, Ryan, De Landa (WAIM), Deirdre Byrne;

Perlroth’s New York Times article “Luring Young Web

Warriors”; Tubes (Blume); J. C. R. Licklider (“Man-

Computer Symbiosis” (1960)); Hayles (Posthuman);

Haraway; Bruce Stirling The Hacker Crackdown (1992);

Clifford Stoll The Cuckoo’s Egg (1989); Steven Levy

Hackers: Heroes of the Computer Revolution (1984); deleuze and Guattarri (ATP);

Roderick outlines in “Putting the Post-Human in the

Loop.”

(http://www.defense.gov/releases/release.aspx?releasei

d=12763).

Films Cited

War Games

Sneakers

The Net

Hackers

Pacific Rim

Iron Man 3

Iron Man

The Core

The three matrix movies

Swordfish

Avatar

Download