alicestrt
4 years ago
11 changed files with 1125 additions and 154 deletions
@ -0,0 +1,715 @@ |
|||||
|
### How to Build a Low-tech Internet |
||||
|
|
||||
|
Wireless internet access is on the rise in both modern consumer |
||||
|
societies and in the developing world. |
||||
|
|
||||
|
In rich countries, however, the focus is on always-on connectivity and |
||||
|
ever higher access speeds. In poor countries, on the other hand, |
||||
|
connectivity is achieved through much more low-tech, often asynchronous |
||||
|
networks. |
||||
|
|
||||
|
While the high-tech approach pushes the costs and energy use of the |
||||
|
internet [higher and |
||||
|
higher](https://www.lowtechmagazine.com/2015/10/can-the-internet-run-on-renewable-energy.html), |
||||
|
the low-tech alternatives result in much cheaper and very energy |
||||
|
efficient networks that combine well with renewable power production and |
||||
|
are resistant to disruptions. |
||||
|
|
||||
|
If we want the internet to keep working in circumstances where access to |
||||
|
energy is more limited, we can learn important lessons from alternative |
||||
|
network technologies. Best of all, there\'s no need to wait for |
||||
|
governments or companies to facilitate: we can build our own resilient |
||||
|
communication infrastructure if we cooperate with one another. This is |
||||
|
demonstrated by several community networks in Europe, of which the |
||||
|
largest has more than 35,000 users already. |
||||
|
|
||||
|
[]{#anchor}Picture: A node in the [Scottish Tegola |
||||
|
Network](http://www.tegola.org.uk/hebnet/). |
||||
|
|
||||
|
More than half of the global population does not have access to the |
||||
|
\"worldwide\" web. Up to now, the internet is mainly an urban |
||||
|
phenomenon, especially in \"developing\" countries. Telecommunication |
||||
|
companies are usually reluctant to extend their network outside cities |
||||
|
due to a combination of high infrastructure costs, low population |
||||
|
density, limited ability to pay for services, and an unreliable or |
||||
|
non-existent electricity infrastructure. Even in remote regions of |
||||
|
\"developed\" countries, internet connectivity isn\'t always available. |
||||
|
|
||||
|
Internet companies such as Facebook and Google regularly make headlines |
||||
|
with plans for connecting these remote regions to the internet. Facebook |
||||
|
tries to achieve this with drones, while Google counts on high-altitude |
||||
|
balloons. There are major technological challenges, but the main |
||||
|
objection to these plans is their commercial character. Obviously, |
||||
|
Google and Facebook want to connect more people to the internet because |
||||
|
that would increase their revenues. Facebook especially receives lots of |
||||
|
criticism because their network promotes their own site in particular, |
||||
|
and blocks most other internet applications. \[1\] |
||||
|
|
||||
|
Meanwhile, several research groups and network enthusiasts have |
||||
|
developed and implemented much cheaper alternative network technologies |
||||
|
to solve these issues. Although these low-tech networks have proven |
||||
|
their worth, they have received much less attention. Contrary to the |
||||
|
projects of internet companies, they are set up by small organisations |
||||
|
or by the users themselves. This guarantees an open network that |
||||
|
benefits the users instead of a handful of corporations. At the same |
||||
|
time, these low-tech networks are very energy efficient. |
||||
|
|
||||
|
****WiFi-based Long Distance Networks**** |
||||
|
|
||||
|
Most low-tech networks are based on WiFi, the same technology that |
||||
|
allows mobile access to the internet in most western households. As we |
||||
|
have seen in the previous article, [sharing these devices could provide |
||||
|
free mobile access across densely populated |
||||
|
cities](https://www.lowtechmagazine.com/2015/10/the-4g-network-thats-already-there.html). |
||||
|
But the technology can be equally useful in sparsely populated areas. |
||||
|
Although the WiFi-standard was developed for short-distance data |
||||
|
communication (with a typical range of about 30 metres), its reach can |
||||
|
be extended through modifications of the Media Access Control (MAC) |
||||
|
layer in the networking protocol, and through the use of range extender |
||||
|
amplifiers and directional antennas. \[2\] |
||||
|
|
||||
|
Although the WiFi-standard was developed for short-distance data |
||||
|
communication, its reach can be extended to cover distances of more than |
||||
|
100 kilometres. |
||||
|
|
||||
|
The longest unamplified WiFi link is a 384 km wireless point-to-point |
||||
|
connection between Pico El Águila and Platillón in Venezuela, |
||||
|
established a few years ago. \[3,4\] However, WiFi-based long distance |
||||
|
networks usually consist of a combination of shorter point-to-point |
||||
|
links, each between a few kilometres and one hundred kilometers long at |
||||
|
most. These are combined to create larger, multihop networks. |
||||
|
Point-to-points links, which form the backbone of a long range WiFi |
||||
|
network, are combined with omnidirectional antennas that distribute the |
||||
|
signal to individual households (or public institutions) of a community. |
||||
|
|
||||
|
Picture: A relay with three point-to-point links and three sectoral |
||||
|
antennae. |
||||
|
[Tegola](http://www.tegola.org.uk/howto/network-planning.html). |
||||
|
|
||||
|
Long-distance WiFi links require line of sight to make a connection \-- |
||||
|
in this sense, the technology resembles the [18th century optical |
||||
|
telegraph](https://www.lowtechmagazine.com/2007/12/email-in-the-18.html). |
||||
|
\[5\] If there\'s no line of sight between two points, a third relay is |
||||
|
required that can see both points, and the signal is sent to the |
||||
|
intermediate relay first. Depending on the terrain and particular |
||||
|
obstacles, more hubs may be necessary. \[6\] |
||||
|
|
||||
|
Point-to-point links typically consist of two directional antennas, one |
||||
|
focused on the next node and the other on the previous node in the |
||||
|
network. Nodes can have multiple antennas with one antenna per fixed |
||||
|
point-to-point link to each neighbour. \[7\] This allows mesh routing |
||||
|
protocols that can dynamically select which links to choose for routing |
||||
|
among the available ones. \[8\] |
||||
|
|
||||
|
Long-distance WiFi links require line of sight to make a connection \-- |
||||
|
in this sense, the technology resembles the 18th century optical |
||||
|
telegraph. |
||||
|
|
||||
|
Distribution nodes usually consist of a sectoral antenna (a small |
||||
|
version of the things you see on mobile phone masts) or a conventional |
||||
|
WiFi-router, together with a number of receivers in the community. \[6\] |
||||
|
For short distance WiFi-communication, there is no requirement for line |
||||
|
of sight between the transmitter and the receiver. \[9\] |
||||
|
|
||||
|
To provide users with access to the worldwide internet, a long range |
||||
|
WiFi network should be connected to the main backbone of the internet |
||||
|
using at least one \"backhaul\" or \"gateway node\". This can be a |
||||
|
dial-up or broadband connection (DSL, fibre or satellite). If such a |
||||
|
link is not established, users would still be able to communicate with |
||||
|
each other and view websites set up on local servers, but they would not |
||||
|
be able to access the internet. \[10\] |
||||
|
|
||||
|
****Advantages of Long Range WiFi**** |
||||
|
|
||||
|
Long range WiFi offers high bandwidth (up to 54 Mbps) combined with very |
||||
|
low capital costs. Because the WiFi standard enjoys widespread |
||||
|
acceptance and has huge production volumes, off-the-shelf antennas and |
||||
|
wireless cards can be bought for very little money. \[11\] |
||||
|
Alternatively, components can be put together [from discarded |
||||
|
materials](http://roelof.info/projects/%282014%29Pretty_Fly_For_A_Wifi/) |
||||
|
such as old routers, satellite dish antennas and laptops. Protocols like |
||||
|
WiLDNet run on a 266 Mhz processor with only 128 MB memory, so an old |
||||
|
computer will do the trick. \[7\] |
||||
|
|
||||
|
The WiFi-nodes are lightweight and don\'t need expensive towers \-- |
||||
|
further decreasing capital costs, and minimizing the impact of the |
||||
|
structures to be built. \[7\] More recently, single units that combine |
||||
|
antenna, wireless card and processor have become available. These are |
||||
|
very convenient for installation. To build a relay, one simply connects |
||||
|
such units together with ethernet cables that carry both signal and |
||||
|
power. \[6\] The units can be mounted in towers or slim masts, given |
||||
|
that they offer little windload. \[3\] Examples of suppliers of long |
||||
|
range WiFi components are [Ubiquity](https://www.ubnt.com/), |
||||
|
[Alvarion](http://www.alvarion.com/) and |
||||
|
[MikroTik](http://www.mikrotik.com/), and |
||||
|
[simpleWiFi](https://www.simplewifi.com/). |
||||
|
|
||||
|
Long Range WiFi makes use of unlicensed spectrum and offers high |
||||
|
bandwidth, low capital costs, easy installation, and low power |
||||
|
requirements. |
||||
|
|
||||
|
Long range WiFi also has low operational costs due to low power |
||||
|
requirements. A typical mast installation consisting of two long |
||||
|
distance links and one or two wireless cards for local distribution |
||||
|
consumes around 30 watts. \[6,12\] In several low-tech networks, nodes |
||||
|
are entirely powered by solar panels and batteries. Another important |
||||
|
advantage of long range WiFi is that it makes use of unlicensed spectrum |
||||
|
(2.4 and 5 GHz), and thus avoids negotiations with telecom operators and |
||||
|
government. This adds to the cost advantage and allows basically anyone |
||||
|
to start a WiFi-based long distance network. \[9\] |
||||
|
|
||||
|
****Long Range WiFi Networks in Poor Countries**** |
||||
|
|
||||
|
The first long range WiFi networks were set up ten to fifteen years ago. |
||||
|
In poor countries, two main types have been built. The first is aimed at |
||||
|
providing internet access to people in remote villages. An example is |
||||
|
the Akshaya network in India, which covers the entire Kerala State and |
||||
|
is one of the largest wireless networks in the world. The infrastructure |
||||
|
is built around approximately 2,500 \"computer access centers\", which |
||||
|
are open to the local population \-- direct ownership of computers is |
||||
|
minimal in the region. \[13\] |
||||
|
|
||||
|
Another example, also in India, are the AirJaldi networks which provide |
||||
|
internet access to approximately 20,000 users in six states, all in |
||||
|
remote regions and on difficult terrain. Most nodes in this network are |
||||
|
solar-powered and the distance between them can range up to 50 km or |
||||
|
more. \[14\] In some African countries, local WiFi-networks distribute |
||||
|
internet access from a satellite gateway. \[15,16\] |
||||
|
|
||||
|
A node in the AirJaldi network. Picture: AirJaldi. |
||||
|
|
||||
|
A second type of long distance WiFi network in poor countries is aimed |
||||
|
at providing telemedicine to remote communities. In remote regions, |
||||
|
health care is often provided through health posts scarcely equipped and |
||||
|
attended by health technicians who are barely trained. \[17\] Long-range |
||||
|
WiFi networks can connect urban hospitals with these outlying health |
||||
|
posts, allowing doctors to remotely support health technicians using |
||||
|
high-resolution file transfers and real-time communication tools based |
||||
|
on voice and video. |
||||
|
|
||||
|
An example is the link between Cabo Pantoja and Iquitos in the Loreto |
||||
|
province in Peru, which was established in 2007. The 450 km network |
||||
|
consists of 17 towers which are 16 to 50 km apart. The line connects 15 |
||||
|
medical outposts in remote villages with the main hospital in Iquitos |
||||
|
and is aimed at remote diagnosis of patients. \[17,18\] All equipment is |
||||
|
powered by solar panels. \[18,19\] Other succesful examples of long |
||||
|
range WiFi telemedicine networks have been built in India, Malawi and |
||||
|
Ghana. \[20,21\] |
||||
|
|
||||
|
****WiFi-Based Community Networks in Europe**** |
||||
|
|
||||
|
The low-tech networks in poor countries are set up by NGO\'s, |
||||
|
governments, universities or businesses. In contrast, most of the |
||||
|
WiFi-based long distance networks in remote regions of rich countries |
||||
|
are so-called \"community networks\": the users themselves build, own, |
||||
|
power and maintain the infrastructure. Similar to the shared wireless |
||||
|
approach in cities, reciprocal resource sharing forms the basis of these |
||||
|
networks: participants can set up their own node and connect to the |
||||
|
network (for free), as long as their node also allows traffic of other |
||||
|
members. Each node acts as a WiFi routing device that provides IP |
||||
|
forwarding services and a data link to all users and nodes connected to |
||||
|
it. \[8,22\] |
||||
|
|
||||
|
In a community network, the users themselves build, own, power and |
||||
|
maintain the infrastructure. |
||||
|
|
||||
|
Consequently, with each new user, the network becomes larger. There is |
||||
|
no a-priori overall planning. A community network grows bottom-up, |
||||
|
driven by the needs of its users, as nodes and links are added or |
||||
|
upgraded following demand patterns. The only consideration is to connect |
||||
|
a node from a new participant to an existing one. As a node is powered |
||||
|
on, it discovers it neighbours, attributes itself a unique IP adress, |
||||
|
and then establishes the most appropriate routes to the rest of the |
||||
|
network, taking into account the quality of the links. Community |
||||
|
networks are open to participation to everyone, sometimes according to |
||||
|
an open peering agreement. \[8,9,19,22\] |
||||
|
|
||||
|
Wireless links in the Spanish Guifi network. |
||||
|
[Credit](https://iuliinet.github.io/presentazione_ottobre_2014/img/barcellona.jpg). |
||||
|
|
||||
|
Despite the lack of reliable statistics, community networks seem to be |
||||
|
rather succesful, and there are several large ones in Europe, such as |
||||
|
[Guifi.net](https://guifi.net/) (Spain), [Athens Wireless Metropolitan |
||||
|
Network](http://www.awmn.gr/content.php?s=ce506a41ab245641d6934638c6f6f107) |
||||
|
(Greece), [FunkFeuer](http://www.funkfeuer.at/) (Austria), and |
||||
|
[Freifunk](https://freifunk.net/en/) (Germany). \[8,22,23,24\] The |
||||
|
Spanish network is the largest WiFi-based long distance network in the |
||||
|
world with more than 50,000 kilometres of links, although a small part |
||||
|
is based on optic fibre links. Most of it is located in the Catalan |
||||
|
Pyrenees, one of the least populated areas in Spain. The network was |
||||
|
initiated in 2004 and now has close to 30,000 nodes, up from 17,000 in |
||||
|
2012. \[8,22\] |
||||
|
|
||||
|
Guifi.net provides internet access to individuals, companies, |
||||
|
administrations and universities. In principle, the network is |
||||
|
installed, powered and maintained by its users, although volunteer teams |
||||
|
and even commercial installers are present to help. Some nodes and |
||||
|
backbone upgrades have been succesfully crowdfunded by indirect |
||||
|
beneficiaries of the network. \[8,22\] |
||||
|
|
||||
|
****Performance of Low-tech Networks**** |
||||
|
|
||||
|
So how about the performance of low-tech networks? What can you do with |
||||
|
them? The available bandwidth per user can vary enormously, depending on |
||||
|
the bandwidth of the gateway node(s) and the number of users, among |
||||
|
other factors. The long-distance WiFi networks aimed at telemedicine in |
||||
|
poor countries have few users and a good backhaul, resulting in high |
||||
|
bandwidth (+ 40 Mbps). This gives them a similar performance to fibre |
||||
|
connections in the developed world. A study of (a small part of) the |
||||
|
Guifi.net community network, which has dozens of gateway nodes and |
||||
|
thousands of users, showed an average throughput of 2 Mbps, which is |
||||
|
comparable to a relatively slow DSL connection. Actual throughput per |
||||
|
user varies from 700 kbps to 8 Mbps. \[25\] |
||||
|
|
||||
|
The available bandwidth per user can vary enormously, depending on the |
||||
|
bandwidth of the gateway node(s) and the number of users, among other |
||||
|
factors |
||||
|
|
||||
|
However, the low-tech networks that distribute internet access to a |
||||
|
large user base in developing countries can have much more limited |
||||
|
bandwidth per user. For example, a university campus in Kerala (India) |
||||
|
uses a 750 kbps internet connection that is shared across 3,000 faculty |
||||
|
members and students operating from 400 machines, where during peak |
||||
|
hours nearly every machine is being used. |
||||
|
|
||||
|
Therefore, the worst-case average bandwidth available per machine is |
||||
|
approximately 1.9 kbps, which is slow even in comparison to a dial-up |
||||
|
connection (56 kbps). And this can be considered a really good |
||||
|
connectivity compared to typical rural settings in poor countries. |
||||
|
\[26\] To make matters worse, such networks often have to deal with an |
||||
|
intermittent power supply. |
||||
|
|
||||
|
Under these circumstances, even the most common internet applications |
||||
|
have poor performance, or don\'t work at all. The communication model of |
||||
|
the internet is based on a set of network assumptions, called the TCP/IP |
||||
|
protocol suite. These include the existence of a bi-directional |
||||
|
end-to-end path between the source (for example a website\'s server) and |
||||
|
the destination (the user\'s computer), short round-trip delays, and low |
||||
|
error rates. |
||||
|
|
||||
|
Many low-tech networks in poor countries do not comform to these |
||||
|
assumptions. They are characterized by intermittent connectivity or |
||||
|
\"network partitioning\" \-- the absence of an end-to-end path between |
||||
|
source and destination \-- long and variable delays, and high error |
||||
|
rates. \[21,27,28\] |
||||
|
|
||||
|
****Delay-Tolerant Networks**** |
||||
|
|
||||
|
Nevertheless, even in such conditions, the internet could work perfectly |
||||
|
fine. The technical issues can be solved by moving away from the |
||||
|
always-on model of traditional networks, and instead design networks |
||||
|
based upon asynchronous communication and intermittent connectivity. |
||||
|
These so-called \"delay-tolerant networks\" (DTNs) have their own |
||||
|
specialized protocols overlayed on top of the lower protocols and do not |
||||
|
utilize TCP. They overcome the problems of intermittent connectivity and |
||||
|
long delays by using store-and-forward message switching. |
||||
|
|
||||
|
Information is forwarded from a storage place on one node to a storage |
||||
|
place on another node, along a path that *eventually* reaches its |
||||
|
destination. In contrast to traditional internet routers, which only |
||||
|
store incoming packets for a few milliseconds on memory chips, the nodes |
||||
|
of a delay-tolerant network have persistent storage (such as hard disks) |
||||
|
that can hold information indefinitely. \[27,28\] |
||||
|
|
||||
|
Delay-tolerant networks combine well with renewable energy: solar panels |
||||
|
or wind turbines could power network nodes only when the sun shines or |
||||
|
the wind blows, eliminating the need for energy storage. |
||||
|
|
||||
|
Delay-tolerant networks don\'t require an end-to-end path between source |
||||
|
and destination. Data is simply transferred from node to node. If the |
||||
|
next node is unavailable because of long delays or a power outage, the |
||||
|
data is stored on the hard disk until the node becomes available again. |
||||
|
While it might take a long time for data to travel from source to |
||||
|
destination, a delay-tolerant network ensures that it will eventually |
||||
|
arrive. |
||||
|
|
||||
|
Delay-tolerant networks further decrease capital costs and energy use, |
||||
|
leading to the most efficient use of scarce resources. They keep working |
||||
|
with an intermittent energy supply and they combine well with renewable |
||||
|
energy sources: solar panels or wind turbines could power network nodes |
||||
|
only when the sun shines or the wind blows, eliminating the need for |
||||
|
energy storage. |
||||
|
|
||||
|
****Data Mules**** |
||||
|
|
||||
|
Delay-tolerant networking can take surprising forms, especially when |
||||
|
they take advantage of some non-traditional means of communication, such |
||||
|
as \"data mules\". \[11,29\] In such networks, conventional |
||||
|
transportation technologies \-- buses, cars, motorcycles, trains, boats, |
||||
|
airplanes \-- are used to ferry messages from one location to another in |
||||
|
a store-and-forward manner. |
||||
|
|
||||
|
Examples are DakNet and KioskNet, which use buses as data mules. |
||||
|
\[30-34\] In many developing regions, rural bus routes regularly visit |
||||
|
villages and towns that have no network connectivity. By equipping each |
||||
|
vehicle with a computer, a storage device and a mobile WiFi-node on the |
||||
|
one hand, and by installing a stationary WiFi-node in each village on |
||||
|
the other hand, the local transport infrastructure can substitute for a |
||||
|
wireless internet link. \[11\] |
||||
|
|
||||
|
Picture: AirJaldi. |
||||
|
|
||||
|
Outgoing data (such as sent emails or requests for webpages) is stored |
||||
|
on local computers in the village until the bus comes withing range. At |
||||
|
this point, the fixed WiFi-node of the local computer automatically |
||||
|
transmits the data to the mobile WiFi-node of the bus. Later, when the |
||||
|
bus arrives at a hub that is connected to the internet, the outgoing |
||||
|
data is transmitted from the mobile WiFi-node to the gateway node, and |
||||
|
then to the internet. Data sent to the village takes the opposite route. |
||||
|
The bus \-- or data \-- driver doesn\'t require any special skills and |
||||
|
is completely oblivious to the data transfers taking place. He or she |
||||
|
does not need to do anything other than come in range of the nodes. |
||||
|
\[30,31\] |
||||
|
|
||||
|
In a data mules network, the local transport infrastructure substitutes |
||||
|
for a wireless internet link. |
||||
|
|
||||
|
The use of data mules offers some extra advantages over more |
||||
|
\"sophisticated\" delay-tolerant networks. A \"drive-by\" WiFi network |
||||
|
allows for small, low-cost and low-power radio devices to be used, which |
||||
|
don\'t require line of sight and consequently no towers \-- further |
||||
|
lowering capital costs and energy use compared to other low-tech |
||||
|
networks. \[30,31,32\] |
||||
|
|
||||
|
The use of short-distance WiFi-links also results in a higher bandwidth |
||||
|
compared to long-distance WiFi-links, which makes data mules better |
||||
|
suited to transfer larger files. On average, 20 MB of data can be moved |
||||
|
in each direction when a bus passes a fixed WiFi-node. \[30,32\] On the |
||||
|
other hand, latency (the time interval between sending and receiving |
||||
|
data) is usually higher than on long-range WiFi-links. A single bus |
||||
|
passing by a village once a day gives a latency of 24 hours. |
||||
|
|
||||
|
****Delay-Tolerant Software**** |
||||
|
|
||||
|
Obviously, a delay-tolerant network (DTN) \-- whatever its form \-- also |
||||
|
requires new software: applications that function without a connected |
||||
|
end-to-end networking path. \[11\] Such custom applications are also |
||||
|
useful for synchronous, low bandwidth networks. Email is relatively easy |
||||
|
to adapt to intermittent connectivity, because it\'s an asynchronous |
||||
|
communication method by itself. A DTN-enabled email client stores |
||||
|
outgoing messages until a connection is available. Although emails may |
||||
|
take longer to reach their destination, the user experience doesn\'t |
||||
|
really change. |
||||
|
|
||||
|
A Freifunk WiFi-node is installed in Berlin, Germany. Picture:[ |
||||
|
Wikipedia |
||||
|
Commons](https://upload.wikimedia.org/wikipedia/commons/5/51/Freifunk-Initiative_in_Berlin-Kreuzberg.jpg). |
||||
|
|
||||
|
Browsing and searching the web requires more adaptations. For example, |
||||
|
most search engines optimize for speed, assuming that a user can quickly |
||||
|
look through the returned links and immediately run a second modified |
||||
|
search if the first result is inadequate. However, in intermittent |
||||
|
networks, multiple rounds of interactive search would be impractical. |
||||
|
\[26,35\] Asynchronous search engines optimize for bandwith rather than |
||||
|
response time. \[26,30,31,35,36\] For example, RuralCafe desynchronizes |
||||
|
the search process by performing many search tasks in an offline manner, |
||||
|
refining the search request based on a database of similar searches. The |
||||
|
actual retrieval of information using the network is only done when |
||||
|
absolutely necessary. |
||||
|
|
||||
|
Many internet applications could be adapted to intermittent networks, |
||||
|
such as webbrowsing, email, electronic form filling, interaction with |
||||
|
e-commerce sites, blogsoftware, large file downloads, or social media. |
||||
|
|
||||
|
Some DTN-enabled browsers download not only the explicitly requested |
||||
|
webpages but also the pages that are linked to by the requested pages. |
||||
|
\[30\] Others are optimized to return low-bandwidth results, which are |
||||
|
achieved by filtering, analysis, and compression on the server site. A |
||||
|
similar effect can be achieved through the use of a service like |
||||
|
[Loband](http://www.loband.org/loband/), which strips webpages of |
||||
|
images, video, advertisements, social media buttons, and so on, merely |
||||
|
presenting the textual content. \[26\] |
||||
|
|
||||
|
Browsing and searching on intermittent networks can also be improved by |
||||
|
local caching (storing already downloaded pages) and prefetching |
||||
|
(downloading pages that might be retrieved in the future). \[206\] Many |
||||
|
other internet applications could also be adapted to intermittent |
||||
|
networks, such as electronic form filling, interaction with e-commerce |
||||
|
sites, blogsoftware, large file downloads, social media, and so on. |
||||
|
\[11,30\] All these applications would remain possible, though at lower |
||||
|
speeds. |
||||
|
|
||||
|
****Sneakernets**** |
||||
|
|
||||
|
Obviously, real-time applications such as internet telephony, media |
||||
|
streaming, chatting or videoconferencing are impossible to adapt to |
||||
|
intermittent networks, which provide only asynchronous communication. |
||||
|
These applications are also difficult to run on synchronous networks |
||||
|
that have limited bandwidth. Because these are the applications that are |
||||
|
in large part responsible for the growing energy use of the internet, |
||||
|
one could argue that their incompatibility with low-tech networks is |
||||
|
actually a good thing (see the [previous |
||||
|
article](https://www.lowtechmagazine.com/2015/10/can-the-internet-run-on-renewable-energy.html)). |
||||
|
|
||||
|
Furthermore, many of these applications could be organized in different |
||||
|
ways. While real-time voice or video conversations won\'t work, it\'s |
||||
|
perfectly possible to send and receive voice or video messages. And |
||||
|
while streaming media can\'t happen, downloading music albums and video |
||||
|
remains possible. Moreover, these files could be \"transmitted\" by the |
||||
|
most low-tech internet technology available: a sneakernet. In a |
||||
|
sneakernet, digital data is \"wirelessly\" transmitted using a storage |
||||
|
medium such as a hard disk, a USB-key, a flash card, or a CD or DVD. |
||||
|
Before the arrival of the internet, all computer files were exchanged |
||||
|
via a sneakernet, using tape or floppy disks as a storage medium. |
||||
|
|
||||
|
Stuffing a cargo train full of digital storage media would beat any |
||||
|
digital network in terms of speed, cost and energy efficiency. Picture: |
||||
|
Wikipedia Commons. |
||||
|
|
||||
|
Just like a data mules network, a sneakernet involves a vehicle, a |
||||
|
messenger on foot, or an animal (such as a [carrier |
||||
|
pigeon](https://www.lowtechmagazine.com/2009/02/sneakernet-beats-internet.html)). |
||||
|
However, in a sneakernet there is no automatic data transfer between the |
||||
|
mobile node (for instance, a vehicle) and the stationary nodes (sender |
||||
|
and recipient). Instead, the data first have to be transferred from the |
||||
|
sender\'s computer to a portable storage medium. Then, upon arrival, the |
||||
|
data have to be transferred from the portable storage medium to the |
||||
|
receiver\'s computer. \[30\] A sneakernet thus requires manual |
||||
|
intervention and this makes it less convenient for many internet |
||||
|
applications. |
||||
|
|
||||
|
There are exceptions, though. For example, a movie doesn\'t have to be |
||||
|
transferred to the hard disk of your computer in order to watch it. You |
||||
|
play it straight from a portable hard disk or slide a disc into the |
||||
|
DVD-player. Moreover, a sneakernet also offers an important advantage: |
||||
|
of all low-tech networks, it has the most bandwidth available. This |
||||
|
makes it perfectly suited for the distribution of large files such as |
||||
|
movies or computer games. In fact, when very large files are involved, a |
||||
|
sneakernet even beats the fastest fibre internet connection. At lower |
||||
|
internet speeds, sneakernets can be advantageous for much smaller files. |
||||
|
|
||||
|
Technological progress will not lower the advantage of a sneakernet. |
||||
|
Digital storage media evolve at least as fast as internet connections |
||||
|
and they both improve communication in an equal way. |
||||
|
|
||||
|
****Resilient Networks**** |
||||
|
|
||||
|
While most low-tech networks are aimed at regions where the alternative |
||||
|
is often no internet connection at all, their usefulness for |
||||
|
well-connected areas cannot be overlooked. The internet as we know it in |
||||
|
the industrialized world is a product of an abundant energy supply, a |
||||
|
robust electricity infrastructure, and sustained economic growth. This |
||||
|
\"high-tech\" internet might offer some fancy advantages over the |
||||
|
low-tech networks, but it cannot survive if these conditions change. |
||||
|
This makes it extremely vulnerable. |
||||
|
|
||||
|
The internet as we know it in the industrialized world is a product of |
||||
|
an abundant energy supply, a robust electricity infrastructure, and |
||||
|
sustained economic growth. It cannot survive if these conditions change. |
||||
|
|
||||
|
Depending on their level of resilience, low-tech networks can remain in |
||||
|
operation when the supply of fossil fuels is interrupted, when the |
||||
|
electricity infrastructure deteriorates, when the economy grinds to a |
||||
|
halt, or if other calamities should hit. Such a low-tech internet would |
||||
|
allow us to surf the web, send and receive e-mails, shop online, share |
||||
|
content, and so on. Meanwhile, data mules and sneakernets could serve to |
||||
|
handle the distribution of large files such as videos. Stuffing a cargo |
||||
|
vessel or a train full of digital storage media would beat any digital |
||||
|
network in terms of speed, cost and energy efficiency. And if such a |
||||
|
transport infrastructure would no longer be available, we could still |
||||
|
rely on messengers on foot, [cargo |
||||
|
bikes](https://www.lowtechmagazine.com/2014/05/modular-cargo-cycles.html) |
||||
|
and [sailing vessels](https://www.lowtechmagazine.com/sailing-ships/). |
||||
|
|
||||
|
Such a hybrid system of online and offline applications would remain a |
||||
|
very powerful communication network \-- unlike anything we had even in |
||||
|
the late twentieth century. Even if we envision a doom scenario in which |
||||
|
the wider internet infrastructure would disintegrate, isolated low-tech |
||||
|
networks would still be very useful local and regional communication |
||||
|
technologies. Furthermore, they could obtain content from other remote |
||||
|
networks through the exchange of portable storage media. The internet, |
||||
|
it appears, can be as low-tech or high-tech as we can afford it to be. |
||||
|
|
||||
|
Kris De Decker (edited by [Jenna |
||||
|
Collett](https://www.linkedin.com/pub/jenna-collett/1a/925/b3)) |
||||
|
|
||||
|
This article has been translated into |
||||
|
[Spanish](https://solar.lowtechmagazine.com/es/2015/10/how-to-build-a-low-tech-internet.html). |
||||
|
|
||||
|
****Sources & Notes:**** |
||||
|
|
||||
|
DIY: [Wireless networking in the developing |
||||
|
world](http://wndw.net/book.html#readBook) (Third Edition) is a free |
||||
|
book about designing, implementing and maintaining low-cost wireless |
||||
|
networks. Available in English, French, and Spanish. |
||||
|
|
||||
|
\[1\] [Connecting the unwired world with balloons, satellites, lasers & |
||||
|
drones](https://tech.slashdot.org/story/15/09/03/214256/connecting-the-unwired-world-with-balloons-satellites-lasers-drones), |
||||
|
Slashdot, 2015 |
||||
|
|
||||
|
\[2\] [A QoS-aware dynamic bandwidth allocation scheme for multi-hop |
||||
|
WiFi-based long distance |
||||
|
networks](https://link.springer.com/article/10.1186%2Fs13638-015-0352-z#/page-1), |
||||
|
Iftekhar Hussain et al., 2015 |
||||
|
|
||||
|
\[3\] [Long-distance, Low-Cost Wireless Data |
||||
|
Transmission](http://www.ursi.org/files/RSBissues/RSB_339_2011_12.pdf) |
||||
|
(PDF), Ermanno Pietrosemoli, 2011 |
||||
|
|
||||
|
\[4\] This link could only be established thanks to the height of the |
||||
|
endpoints (4,200 and 1,500 km) and the flatness of the middle ground. |
||||
|
The curvature of the Earth makes longer point-to-point WiFi-links |
||||
|
difficult to achieve because line of sight between two points is |
||||
|
required. |
||||
|
|
||||
|
\[5\] Radio waves occupy a volume around the optical line, which must be |
||||
|
unemcumbered from obstacles. This volume is known as the Fresnel |
||||
|
ellipsoid and its size grows with the distance between the two end |
||||
|
points and with the wavelength of the signal, which is in turn inversely |
||||
|
proportional to the frequency. Thus, it is required to leave extra |
||||
|
\"elbow room\" for the Fresnel zone. \[9\] |
||||
|
|
||||
|
\[6\] [A Brief History of the Tegola |
||||
|
Project](http://www.tegola.org.uk/tegola-history.html), Tegola Project, |
||||
|
retrieved October 2015 |
||||
|
|
||||
|
\[7\] [WiLDNet: Design and Implementation of High Performance WiFi based |
||||
|
Long Distance |
||||
|
Networks](http://tier.cs.berkeley.edu/docs/wireless/wild_multihop.pdf) |
||||
|
(PDF), Rabin Patra et al., 2007 |
||||
|
|
||||
|
\[8\] [Topology Patterns of a Community Network: |
||||
|
Guifi.net](http://dsg.ac.upc.edu/sites/default/files/1569633605.pdf) |
||||
|
(PDF), Davide Vega et al., 2012 |
||||
|
|
||||
|
\[9\] [Global Access to the Internet for All, internet |
||||
|
draft](https://trac.tools.ietf.org/group/irtf/trac/wiki/gaia), Internet |
||||
|
Engineering Task Force (IETF), 2015 |
||||
|
|
||||
|
\[10\] This is what happened to Afghanistan\'s JLINK network when |
||||
|
[funding for the network\'s satellite link ran dry in |
||||
|
2012](https://www.wired.com/2012/05/jlink/). |
||||
|
|
||||
|
\[11\] [The case for technology in developing |
||||
|
regions](https://www.cs.cmu.edu/~mattkam/lab/publications/Computer2005.pdf) |
||||
|
(PDF), Eric Brewer et al., 2005 |
||||
|
|
||||
|
\[12\] [Beyond Pilots: Keeping Rural Wireless Networks |
||||
|
Alive](https://www.usenix.org/legacy/event/nsdi08/tech/full_papers/surana/surana.pdf) |
||||
|
(PDF), Sonesh Surana et al., 2008 |
||||
|
|
||||
|
\[13\] <http://www.akshaya.kerala.gov.in/> |
||||
|
|
||||
|
\[14\] <http://main.airjaldi.com/> |
||||
|
|
||||
|
\[15\] [VillageCell: Cost Effective Cellular Connectivity in Rural |
||||
|
Areas](http://www.cs.bham.ac.uk/~pejovicv/docs/Anand12ICTD.pdf) (PDF), |
||||
|
Abhinav Anand et al., 2012 |
||||
|
|
||||
|
\[16\] [Deployment and Extensio of a Converged WiMAX/WiFi Network for |
||||
|
Dwesa Community Area South |
||||
|
Africa](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.452.7357&rep=rep1&type=pdf) |
||||
|
(PDF), N. Ndlovu et al., 2009 |
||||
|
|
||||
|
\[17\] \"[A telemedicine network optimized for long distances in the |
||||
|
Amazonian jungle of |
||||
|
Peru](http://www.ehas.org/wp-content/uploads/2012/01/Extremecomm_sig_ISBN.pdf)\" |
||||
|
(PDF), Carlos Rey-Moreno, ExtremeCom \'11, September 2011 |
||||
|
|
||||
|
\[18\] \"[Telemedicine networks of EHAS Foundation in Latin |
||||
|
America](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4197650/)\", |
||||
|
Ignacio Prieto-Egido et al., in \"Frontiers in Public Health\", October |
||||
|
15, 2014. |
||||
|
|
||||
|
\[19\] \"[The design of a wireless solar-powered router for rural |
||||
|
environments isolated from health |
||||
|
facilities](https://eciencia.urjc.es/bitstream/handle/10115/2293/THE%20DESIGN%20OF%20A%20WIRELESS%20SOLAR-POWERED-2008.pdf?sequence=1)\" |
||||
|
(PDF), Francisco Javier Simo Reigadas et al., in \"IEEE Wireless |
||||
|
Communications\", June 2008. |
||||
|
|
||||
|
\[20\] [On a long wireless link for rural telemedicine in |
||||
|
Malawi](http://users.ictp.it/~mzennaro/Malawi.pdf) (PDF), M. Zennaro et |
||||
|
al., 2008 |
||||
|
|
||||
|
\[21\] [A Survey of Delay- and Disruption-Tolerant Networking |
||||
|
Applications](http://www.jie-online.org/index.php/jie/article/view/91), |
||||
|
Artemios G. Voyiatzis, 2012 |
||||
|
|
||||
|
\[22\] [Supporting Cloud Deployment in the Guifi Community |
||||
|
Network](https://www.sics.se/~amir/files/download/papers/guifi.pdf) |
||||
|
(PDF), Roger Baig et al., 2013 |
||||
|
|
||||
|
\[23\] [A Case for Research with and on Community |
||||
|
Networks](http://www.sigcomm.org/sites/default/files/ccr/papers/2013/July/2500098-2500108.pdf) |
||||
|
(PDF), Bart Braem et.al, 2013 |
||||
|
|
||||
|
\[24\] There are smaller networks in Scotland |
||||
|
([Tegola](http://www.tegola.org.uk/)), Slovenia ([wlan |
||||
|
slovenija](https://wlan-si.net/)), Belgium ([Wireless |
||||
|
Antwerpen](http://www.wirelessantwerpen.be/)), and the Netherlands |
||||
|
([Wireless Leiden](https://www.wirelessleiden.nl/)), among others. |
||||
|
Australia has [Melbourne Wireless](http://melbourne.wireless.org.au/). |
||||
|
In Latin America, numerous examples exists, such as [Bogota |
||||
|
Mesh](https://www.facebook.com/BogotaMesh) (Colombia) and [Monte Video |
||||
|
Libre](http://picandocodigo.net/2008/montevideolibre-redes-libres-en-montevideo/) |
||||
|
(Uruguay). Some of these networks are interconnected. This is the case |
||||
|
for the Belgian and Dutch community networks, and for the Slovenian and |
||||
|
Austrian networks. \[8,22,23\] |
||||
|
|
||||
|
\[25\] [Proxy performance analysis in a community wireless |
||||
|
network](http://upcommons.upc.edu/handle/2099.1/19710), Pablo Pitarch |
||||
|
Miguel, 2013 |
||||
|
|
||||
|
\[26\] [RuralCafe: Web Search in the Rural Developing |
||||
|
World](http://www.ambuehler.ethz.ch/CDstore/www2009/proc/docs/p411.pdf) |
||||
|
(PDF), Jay Chen et al., 2009 |
||||
|
|
||||
|
\[27\] [A Delay-Tolerant Network Architecture for Challenged |
||||
|
Networks](http://www.kevinfall.com/seipage/papers/p27-fall.pdf) (PDF), |
||||
|
Kevin Fall, 2003 |
||||
|
|
||||
|
\[28\] [Delay- and Disruption-Tolerant Networks (DTNs) \-- A Tutorial |
||||
|
(version |
||||
|
2.0)](http://ipnsig.org/wp-content/uploads/2012/07/DTN_Tutorial_v2.04.pdf) |
||||
|
(PDF), Forrest Warthman, 2012 |
||||
|
|
||||
|
\[29\] [Healthcare Supported by Data Mule Networks in Remote Communities |
||||
|
of the Amazon |
||||
|
Region](http://www.hindawi.com/journals/isrn/2014/730760/), Mauro |
||||
|
Margalho Coutinho et al., 2014 |
||||
|
|
||||
|
\[30\] [First Mile Solutions\' Daknet Takes Rural Communities |
||||
|
Online](http://www.firstmilesolutions.com/documents/FMS_Case_Study.pdf) |
||||
|
(PDF), Carol Chyau and Jean-Francois Raymond, 2005 |
||||
|
|
||||
|
\[31\] [DakNet: A Road to Universal Broadband |
||||
|
Connectivity](http://courses.media.mit.edu/2003fall/de/DakNet-Case.pdf) |
||||
|
(PDF), Amir Alexander Hasson et al., 2003 |
||||
|
|
||||
|
\[32\] [DakNet: Architecture and Connectivity in Developing |
||||
|
Nations](http://ijpret.com/publishedarticle/2015/4/IJPRET%20-%20ECN%20115.pdf) |
||||
|
(PDF), Madhuri Bhole, 2015 |
||||
|
|
||||
|
\[33\] [Delay Tolerant Networks and Their |
||||
|
Applications](http://www.citeulike.org/user/tnhh/article/13517347), |
||||
|
Longxiang Gao et al., 2015 |
||||
|
|
||||
|
\[34\] [Low-cost communication for rural internet kiosks using |
||||
|
mechanical |
||||
|
backhaul](https://people.csail.mit.edu/matei/papers/2006/mobicom_kiosks.pdf), |
||||
|
A. Seth et al., 2006 |
||||
|
|
||||
|
\[35\] [Searching the World Wide Web in Low-Connectivity |
||||
|
Communities](http://tek.sourceforge.net/papers/tek-www02.pdf) (PDF), |
||||
|
William Thies et al., 2002 |
||||
|
|
||||
|
\[36\] [Slow Search: Information Retrieval without Time |
||||
|
Constraints](https://www.cs.cmu.edu/~yubink/hcir2013.pdf) (PDF), Jaime |
||||
|
Teevan, 2013 |
||||
|
|
||||
|
\[37\] [Potential for Collaborative Caching and Prefetching in |
||||
|
Largely-Disconnected |
||||
|
Villages](http://mrmgroup.cs.princeton.edu/papers/isaacman-winsdr503.pdf) |
||||
|
(PDF), Sibren Isaacman et al., 2008 |
||||
|
|
||||
|
-- |
||||
|
-- |
||||
|
|
||||
|
Posted on October 26, 2015 at 12:26 AM in [Access to |
||||
|
information](https://www.lowtechmagazine.com/copyright_and_access_to_information/), |
||||
|
[Communications](https://www.lowtechmagazine.com/communications/), |
||||
|
[Cover story](https://www.lowtechmagazine.com/cover-story/), |
||||
|
[DIY](https://www.lowtechmagazine.com/diy/), |
||||
|
[Internet](https://www.lowtechmagazine.com/internet/), [Wireless |
||||
|
technology](https://www.lowtechmagazine.com/wireless_technology/) \| |
||||
|
[Permalink](https://www.lowtechmagazine.com/2015/10/how-to-build-a-low-tech-internet.html) |
@ -0,0 +1,398 @@ |
|||||
|
Title: Re-Centralization of AI focusing on Social Justice |
||||
|
Author: Adnan Hadzi, Denis Roio |
||||
|
|
||||
|
# RE - CENTRALIZATION OF AI FOCUSING ON SOCIAL JUSTICE |
||||
|
|
||||
|
In order to lay the foundations for a discussion around |
||||
|
the argument that the adoption of artificial |
||||
|
intelligence (AI) technologies benefits the powerful |
||||
|
few, 1 focussing on their own existential concerns, 2 we |
||||
|
decided to narrow down our analysis of the argument |
||||
|
to social justic (i.e. restorative justice). This paper |
||||
|
signifies an edited version of Adnan Hadzi’s text on |
||||
|
Social Justice and Artificial Intelligence, 3 exploring the |
||||
|
notion of humanised artificial intelligence 4 in order to |
||||
|
discuss potential challenges society might face in the |
||||
|
future. The paper does not discuss current forms and |
||||
|
applications of artificial intelligence, as, so far, there |
||||
|
is no AI technology, which is self-conscious and self- |
||||
|
aware, being able to deal with emotional and social |
||||
|
intelligence. 5 It is a discussion around AI as a speculative |
||||
|
hypothetical entity. One could then ask, if such a speculative |
||||
|
self-conscious hardware/software system were created, at what |
||||
|
point could one talk of personhood? And what criteria could |
||||
|
there be in order to say an AI system was capable of |
||||
|
committing AI crimes? |
||||
|
Concerning what constitutes AI crimes the paper uses the |
||||
|
criteria given in Thomas King et al.’s paper Artificial |
||||
|
Intelligence Crime: An Interdisciplinary Analysis of Foreseeable |
||||
|
Threats and Solutions, 6 where King et al. coin the term “AI |
||||
|
crime”. We discuss the construction of the legal system through |
||||
|
the lens of political involvement of what one may want to |
||||
|
consider to be ‘powerful elites’ 7 . In doing so we will be |
||||
|
demonstrating that it is difficult to prove that the adoption of AI |
||||
|
technologies is undertaken in a way, which mainly serves a |
||||
|
powerful class in society. Nevertheless, analysing the culture |
||||
|
around AI technologies with regard to the nature of law with a |
||||
|
philosophical and sociological focus enables us to demonstrate |
||||
|
a utilitarian and authoritarian trend in the adoption of AI |
||||
|
technologies. Mason argues that “virtue ethics is the only |
||||
|
ethics fit for the task of imposing collective human control on |
||||
|
thinking machines” 8 and AI. We will apply virtue ethics to our |
||||
|
discourse around artificial intelligence and ethics. |
||||
|
As expert in AI safety Steve Omonhundro believes that AI is |
||||
|
“likely to behave in antisocial and harmful ways unless they are |
||||
|
very carefully designed.” 9 It is through virtue ethics that this |
||||
|
paper will propose for such a design to be centred around |
||||
|
restorative justice in order to take control over AI and thinking |
||||
|
machines, following Mason’s radical defence of the human and |
||||
|
his critique of current thoughts within trans- and post- |
||||
|
humanism as a submission to machine logic. |
||||
|
|
||||
|
The paper will conclude by proposing an alternative |
||||
|
practically unattainable, approach to the current legal system |
||||
|
by looking into restorative justice for AI crimes, 10 and how the |
||||
|
ethics of care could be applied to AI technologies. In conclusion |
||||
|
the paper will discuss affect 11 and humanised artificial |
||||
|
intelligence with regards to the emotion of shame, when |
||||
|
dealing with AI crimes. |
||||
|
In order to discuss AI in relation to personhood this paper |
||||
|
follows the descriptive psychology method 12 of the paradigm |
||||
|
case formulation 13 developed by Peter Ossorio. 14 Similar to how |
||||
|
some animal rights activists call for certain animals to be |
||||
|
recognised as non-human persons, 15 this paper speculates on |
||||
|
the notion of AI as a non-human person being able to reflect on |
||||
|
ethical concerns. 16 Here Wynn Schwartz argues that “it is |
||||
|
reasonable to include non-humans as persons and to have |
||||
|
legitimate grounds for disagreeing where the line is properly |
||||
|
drawn. In good faith, competent judges using this formulation |
||||
|
can clearly point to where and why they agree or disagree on |
||||
|
what is to be included in the category of persons.” 17 |
||||
|
In the case of AI technologies we ask whether the current |
||||
|
vision for the adoption of AI technologies, a vision which is |
||||
|
mainly supporting the military-industrial complex through vast |
||||
|
investments in army AI, 18 is a vision that benefits mainly |
||||
|
powerful elites. In order to discuss these questions, one has to |
||||
|
analyse the history of AI technologies leading to the kind of |
||||
|
‘humanised’ AI system this paper posits. The old-fashioned |
||||
|
approach, 19 some may still say contemporary approach, was to |
||||
|
primarily research into ‘mind-only’ 20 AI technologies/systems. |
||||
|
Through high level reasoning, researchers were optimistic that |
||||
|
AI technology would quickly become a reality. |
||||
|
Those early AI technologies were a disembodied approach |
||||
|
using high level logical and abstract symbols. By the end of the |
||||
|
80s researchers found that the disembodied approach was not |
||||
|
even achieving low level tasks humans could easily perform. 21 |
||||
|
During that period many researchers stopped working on AI |
||||
|
technologies and systems, and the period is often referred to as |
||||
|
the “AI winter”. 22 |
||||
|
Rodney Brooks then came forward with the proposition of |
||||
|
“Nouvelle AI”, 23 arguing that the old-fashioned approach did |
||||
|
|
||||
|
not take into consideration motor skills and neural networks. |
||||
|
Only by the end of the 90s did researchers develop statistical |
||||
|
AI systems without the need for any high-level logical |
||||
|
reasoning; 24 instead AI systems were ‘guessing’ through |
||||
|
algorithms and machine learning. This signalled a first step |
||||
|
towards humanistic artificial intelligence, as this resembles |
||||
|
how humans make intuitive decisions; 25 here researchers |
||||
|
suggest that embodiment improves cognition. 26 |
||||
|
With embodiment theory Brooks argued that AI systems |
||||
|
would operate best when computing only the data that was |
||||
|
absolutely necessary. 27 Further in Developing Embodied |
||||
|
Multisensory Dialogue Agents Michal Paradowski argues that |
||||
|
without considering embodiment, e.g. the physics of the brain, |
||||
|
it is not possible to create AI technologies/systems capable of |
||||
|
comprehension. |
||||
|
Foucault’s theories are especially helpful in discussing how |
||||
|
the “rule of truth” has disciplined civilisation, allowing for an |
||||
|
adoption of AI technologies which seem to benefit mainly the |
||||
|
upper-class. But then should we think of a notion of ‘deep-truth’ |
||||
|
as the unwieldy product of deep learning AI algorithms? |
||||
|
Discussions around truth, Foucault states, form legislation into |
||||
|
something that “decides, transmits and itself extends upon the |
||||
|
effects of power” 28 . Foucault’s theories help to explain how |
||||
|
legislation, as an institution, is rolled out throughout society |
||||
|
with very little resistance, or “proletarian counter-justice” 29 . |
||||
|
|
||||
|
Foucault explains that this has made the justice system and |
||||
|
legislation a for-profit system. With this understanding of |
||||
|
legislation, and social justice, one does need to reflect further |
||||
|
on Foucault’s notion of how disciplinary power seeks to express |
||||
|
its distributed nature in the modern state. Namely one has to |
||||
|
analyse the distributed nature of those AI technologies, |
||||
|
especially through networks and protocols, so that the link can |
||||
|
now be made to AI technologies becoming ‘legally’ more |
||||
|
profitable, in the hands of the upper-class. |
||||
|
In Protocol, Alexander Galloway describes how these |
||||
|
protocols changed the notion of power and how “control exists |
||||
|
after decentralization” 30 . Galloway argues that protocol has a |
||||
|
close connection to both Deleuze’s concept of control and |
||||
|
Foucault’s concept of biopolitics 31 by claiming that the key to |
||||
|
perceiving protocol as power is to acknowledge that “protocol |
||||
|
is an affective, aesthetic force that has control over life itself.” 32 |
||||
|
Galloway suggests that it is important to discuss more than the |
||||
|
technologies, and to look into the structures of control within |
||||
|
technological systems, which also include underlying codes and |
||||
|
protocols, in order to distinguish between methods that can |
||||
|
support collective production, e.g. sharing of AI technologies |
||||
|
within society, and those that put the AI technologies in the |
||||
|
hands of the powerful few. 33 Galloway’s argument in the |
||||
|
chapter Hacking is that the existence of protocols “not only |
||||
|
installs control into a terrain that on its surface appears |
||||
|
actively to resist it” 34 , but goes on to create the highly |
||||
|
controlled network environment. For Galloway hacking is “an |
||||
|
index of protocological transformations taking place in the |
||||
|
broader world of techno-culture.” 35 |
||||
|
Having said this, the prospect could be raised that |
||||
|
restorative justice might offer “a solution that could deliver |
||||
|
more meaningful justice” 36 . With respect to AI technologies, |
||||
|
and the potential inherent in them for AI crimes, instead of |
||||
|
following a retributive legislative approach, an ethical |
||||
|
|
||||
|
discourse, 37 with a deeper consideration for the sufferers of AI |
||||
|
crimes should be adopted. 38 We ask: could restorative justice |
||||
|
offer an alternative way of dealing with the occurrence of AI |
||||
|
crimes? 39 |
||||
|
Dale Millar and Neil Vidmar described two psychological |
||||
|
perceptions of justice. 40 One is behavioural control, following |
||||
|
the legal code as strictly as possible, punishing any |
||||
|
wrongdoer, 41 and second the restorative justice system, which |
||||
|
focuses on restoration where harm was done. Thus an |
||||
|
alternative approach for the ethical implementation of AI |
||||
|
technologies, with respect to legislation, might be to follow |
||||
|
restorative justice principles. Restorative justice would allow |
||||
|
for AI technologies to learn how to care about ethics. 42 Julia |
||||
|
Fionda describes restorative justice as a conciliation between |
||||
|
victim and offender, during which the offence is deliberated |
||||
|
upon. 43 Both parties try to come to an agreement on how to |
||||
|
achieve restoration for the damage done, to the situation |
||||
|
before the crime (here an AI crime) happened. Restorative |
||||
|
justice advocates compassion for the victim and offender, and a |
||||
|
consciousness on the part of the offenders as to the |
||||
|
repercussion of their crimes. The victims of AI crimes would |
||||
|
|
||||
|
not only be placed in front of a court, but also be offered |
||||
|
engagement in the process of seeking justice and restoration. 44 |
||||
|
Restorative justice might support victims of AI crimes better |
||||
|
than the punitive legal system, as it allows for the sufferers of |
||||
|
AI crimes to be heard in a personalised way, which could be |
||||
|
adopted to the needs of the victims (and offenders). As victims |
||||
|
and offenders represent themselves in restorative conferencing |
||||
|
sessions, these become much more affordable, 45 meaning that |
||||
|
the barrier to seeking justice due to the financial costs would |
||||
|
be partly eliminated, allowing for poor parties to be able to |
||||
|
contribute to the process of justice. This would benefit wider |
||||
|
society and AI technologies would not only be defined by a |
||||
|
powerful elite. Restorative justice could hold the potential not |
||||
|
only to discuss the AI crimes themselves, but also to get to the |
||||
|
root of the problem and discuss the cause of an AI crime. For |
||||
|
John Braithwaite restorative justice makes re-offending |
||||
|
harder. 46 |
||||
|
In such a scenario, a future AI system capable of committing |
||||
|
AI crimes would need to have knowledge of ethics around the |
||||
|
particular discourse of restorative justice. The implementation |
||||
|
of AI technologies will lead to a discourse around who is |
||||
|
responsible for actions taken by AI technologies. Even when |
||||
|
considering clearly defined ethical guidelines, these might be |
||||
|
difficult to implement, 47 due to the pressure of competition AI |
||||
|
systems find themselves in. That said, this speculation is |
||||
|
restricted to humanised artificial intelligence systems. The |
||||
|
main hindrance for AI technologies to be part of a restorative |
||||
|
justice system might be that of the very human emotion of |
||||
|
shame. Without a clear understanding of shame it will be |
||||
|
impossible to resolve AI crimes in a restorative manner. 48 |
||||
|
|
||||
|
Thus one might want to think about a humanised symbiosis |
||||
|
between humans and technology, 49 along the lines of Garry |
||||
|
Kasparov’s advanced chess, 50 as in advanced jurisprudence. 51 A |
||||
|
legal system where human and machine work together on |
||||
|
restoring justice, for social justice. Furthering this perspective, |
||||
|
we suggest that reflections brought by new materialism should |
||||
|
also be taken into account: not only as a critical perspective on |
||||
|
the engendering and anthropomorphic representation of AI, but |
||||
|
also to broaden the spectrum of what we consider to be justice |
||||
|
in relation to all the living world. Without this new perspective |
||||
|
the sort of idealized AI image of a non-living intelligence that |
||||
|
deals with enormous amounts of information risks to serve the |
||||
|
abstraction of anthropocentric views into a computationalist |
||||
|
acceleration, with deafening results. Rather than such an |
||||
|
implosive perspective, the application of law and jurisprudence |
||||
|
may take advantage of AI’s computational and sensorial |
||||
|
enhanced capabilities by including all information gathered |
||||
|
from the environment, also that produced by plants, animals |
||||
|
and soil. |
||||
|
|
||||
|
|
||||
|
[^1]: Cp. G. Chaslot, “YouTube’s A.I. was divisive in the US presidential election”, Medium, November 27, 2016. Available at: https://medium.com/the-graph/youtubes-ai-is-neutral-towards-clicks-but-is-biased-towards-people-and-ideas-3a2f643dea9a#.tjuusil7 d [accessed February 25, 2018]; E. Morozov, “The Geopolitics Of Artificial Intelligence”, FutureFest, London, 2018. Available at: https://www.youtube.com/watch?v=7g0hx9LPBq8 [accessed October 25, 2019]. |
||||
|
[^2]: Cp. M. Busby, “Use of ‘Killer Robots’ in Wars Would Breach Law, Say Campaigners”, The Guardian, August 21, 2018. Available at : https://web.archive.org/web/20181203074423/https://www.theguardian.com/science/2018/aug/21/use-of-killer-robots-in-wars-would-breach-law-say-campaigners [accessed October 25, 2019]. |
||||
|
[^3]: Cp. A. Hadzi, “Social Justice and Artificial Intelligence”, Body, Space & Technology, 18 (1), 2019, pp. 145–174. Available at: https://doi.org/10.16995/bst.318 [accessed October 25, 2019]. |
||||
|
[^4]: Cp. A. Kaplan and M. Haenlein, “Siri, Siri, in my Hand: Who’s the Fairest in the Land? On the Interpretations, Illustrations, and Implications of Artificial Intelligence”, Business Horizons, 62 (1), 2019, pp. 15–25. https://doi.org/10.1016/j.bushor.2018.08.0 04; S. Legg and M. Hutter, A Collection of Definitions of Intelligence, Lugano, Switzerland, IDSIA, 2007. Available at: http://arxiv.org/abs/0706.3639 [accessed October 25, 2019].2 |
||||
|
[^5]: |
||||
|
[^6]: |
||||
|
[^7]: |
||||
|
[^8]: |
||||
|
[^9]: N. Bostrom, Superintelligence: Paths, Dangers, Strategies, Oxford, Oxford University Press, 2014. Cp. T. King, N. Aggarwal, M. Taddeo and L. Floridi, “Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions”, SSRN Scholarly Paper No. ID 3183238, Rochester, NY, Social Science Research Network, 2018. Available at: https://papers.ssrn.com/abstract=3183238 [accessed October 25, 2019]. P. Mason, Clear Bright Future, London, Allen Lane Publishers, 2019. Mason, Clear Bright Future. S. Omohundro, “Autonomous Technology and the Greater Human Good”, Journal of Experimental & Theoretical Artificial Intelligence, 26 (3), 2014, pp. 303–315, here: p. 303.3 |
||||
|
[^10]: Cp. C. Cadwalladr, “Elizabeth Denham: ‘Data Crimes are Real Crimes”, The Guardian, July 15, 2018. Available at: https://web.archive.org/web/20181121235057/https://www.theguardian.com/uk-news/2018/jul/15/elizabeth-denham-data-protection-inf ormation-commissioner-facebook-cambridge-analytica [accessed October 25, 2019]. |
||||
|
[^11]: Cp. B. Olivier, “Cyberspace, Simulation, Artificial Intelligence, Affectionate Machines and Being Human”, Communicatio, 38 (3), 2012, pp. 261–278. https://doi.org/10.1080 /02500167.2012.716763 [accessed October 25, 2019]; E.A. Wilson, Affect and Artificial Intelligence, Washington, University of Washington Press, 2011. |
||||
|
[^12]: Cp. P.G. Ossorio, The Behavior of Persons, Ann Arbor, Descriptive Psychology Press, 2013. Available at: http://www.sdp.org/sdppubs- publications/the-behavior-of-perso ns/ [accessed October 25, 2019]. |
||||
|
[^13]: Cp. J. Jeffrey, “Knowledge Engineering: Theory and Practice”, Society for Descriptive Psychology, 5, 1990, pp. 105–122. |
||||
|
[^14]: Cp. P.G. Ossorio, Persons: The Collected Works of Peter G. Ossorio, Volume I. Ann Arbor, Descriptive Psychology Press, 1995. Available at: http://www.sdp.org/sdppubs-publications/persons-the-collected-works-of-peter-g-ossorio-volume-1/ [accessed October 25, 2019]. |
||||
|
[^15]: Cp. M. Mountain, “Lawsuit Filed Today on Behalf of Chimpanzee Seeking Legal Personhood”, Nonhuman Rights Blog, December 2, 2013. Available at: https://www.nonhumanrights.org/blog/lawsuit-filed-today-on-behalf-of-chimpanzee-seeking-legal-personhood/ [accessed January 8, 2019]; M. Midgley, “Fellow Champions Dolphins as ‘Non-Human Persons’”, Oxford Centre for Animal Ethics, January 10, 2010. Available at: https://www.oxfordanimalethics.com/2010/01/fellow -champions-dolphins-as-%E2%80%9Cnon-human-persons%E2%80%9D/ [accessed January 8, 2019]. |
||||
|
[^16]: Cp. R. Bergner, “The Tolstoy Dilemma: A Paradigm Case Formulation and Some Therapeutic Interventions”, in K.E. Davis, F. Lubuguin and W. Schwartz (eds.), Advances in Descriptive Psychology, Vol. 9, 2010, pp. 143–160. Available at: http://www.sdp.org/sdppubs-publications/advances-in-descriptive-psychology-vol-9; P. Laungani, “Mindless Psychiatry and Dubious Ethics”, Counselling Psychology4 Quarterly, 15 (1), 2002, pp. 23–33. Available at: https://doi.org/10.1080/09515070110102305 [accessed October 26, 2019]. |
||||
|
[^17]: W. Schwartz, “What Is a Person and How Can We Be Sure? A Paradigm Case Formulation”, SSRN Scholarly Paper No. ID 2511486, Rochester, NY: Social Science Research Network, 2014. Available at: https://papers.ssrn.com/abstract=2511486 [accessed October 25, 2019]. |
||||
|
[^18]: Cp. Mason, Clear Bright Future. |
||||
|
[^19]: Cp. M. Hoffman, and R. Pfeifer, “The Implications of Embodiment for Behavior and Cognition: Animal and Robotic Case Studies”, in W. Tschacher and C. Bergomi (eds.), The Implications of Embodiment: Cognition and Communication, Exeter, Andrews UK Limited, 2015, pp. 31– 58. Available at: https://arxiv.org/abs/1202.0440 |
||||
|
[^20]: N.J. Nilsson, The Quest for Artificial Intelligence, Cambridge, Cambridge University Press, 2009. |
||||
|
[^21]: Cp. R. Brooks, Cambrian Intelligence: The Early History of the New AI, Cambridge, MA, A Bradford Book, 1999. |
||||
|
[^22]: Cp. D. Crevier, AI: The Tumultuous History of the Search for Artificial Intelligence, New York, Basic Books, 1993; H.P. Newquist, The Brain Makers, Indianapolis, Ind: Sams., 1994. |
||||
|
[^23]: Cp. R. Brooks, “A Robust Layered Control System for a Mobile Robot”, IEEE Journal on Robotics and Automation, 2 (1), 1986, pp. 14–23. Available at: https://doi.org/510.1109/JRA.1986.1087032 [accessed October 25, 2019]. |
||||
|
24 |
||||
|
Cp. Brooks, Cambrian Intelligence. |
||||
|
25 |
||||
|
Cp. R. Pfeifer, “Embodied Artificial Intelligence”, presented at the |
||||
|
International Interdisciplinary Seminar on New Robotics, Evolution and |
||||
|
Embodied |
||||
|
Cognition, |
||||
|
Lisbon, |
||||
|
November, |
||||
|
2002. |
||||
|
Available |
||||
|
at: |
||||
|
https://www.informatics.indiana.edu/rocha/ |
||||
|
publications/embrob/pfeifer.html [accessed October 25, 2019]. |
||||
|
26 |
||||
|
Cp. T. Renzenbrink, “Embodiment of Artificial Intelligence |
||||
|
Improves Cognition”, Elektormagazine, February 9, 2012. Available at: |
||||
|
https://www.elektormagazine.com/art |
||||
|
icles/embodiment-of-artificial-intelligence-improves-cognition |
||||
|
[accessed |
||||
|
January 10, 2019]; G. Zarkadakis, “Artificial Intelligence & Embodiment: |
||||
|
Does Alexa Have a Body?”, Medium, May 6, 2018. Available at: |
||||
|
https://medium.com/@georgezarkadakis |
||||
|
/artificial-intelligence-embodiment-does-alexa-have-a-body-d5b97521a201 |
||||
|
[accessed January 10, 2019]. |
||||
|
27 |
||||
|
Cp. L. Steels and R. Brooks, The Artificial Life Route to Artificial |
||||
|
Intelligence: Building Embodied, Situated Agents, London/New York, Taylor |
||||
|
& Francis, 1995. |
||||
|
28 |
||||
|
M. Foucault, “Disciplinary Power and Subjection”, in S. Lukes (ed.), |
||||
|
Power, New York, NYU Press, 1986, pp. 229–242, here: p. 230. |
||||
|
29 |
||||
|
M. Foucault, Power, edited by C. Gordon, London, Penguin, 1980, |
||||
|
p. 34.6 |
||||
|
30 |
||||
|
A.R. Galloway, Protocol: How Control Exists After Decentralization, |
||||
|
Cambridge, MA, MIT Press, 2004, p. 81. |
||||
|
31 |
||||
|
Cp. M. Foucault, The Birth of Biopolitics: Lectures at the |
||||
|
Collège de France, 1978–1979, London, Pan Macmillan, 2008. |
||||
|
32 |
||||
|
Galloway, Protocol, p. 81. |
||||
|
33 |
||||
|
Cp. Galloway, Protocol, p. 147. |
||||
|
34 |
||||
|
Galloway, Protocol, p. 146. |
||||
|
35 |
||||
|
Galloway, Protocol, p. 157. |
||||
|
36 |
||||
|
Crook, Comparative Media Law and Ethics, p. 310.7 |
||||
|
37 |
||||
|
Cp. R. Courtland, “Bias Detectives: The Researchers Striving to |
||||
|
Make Algorithms Fair”, Nature, 558, 2018, pp. 357–360. Available at: |
||||
|
https://doi.org/10.1038/d41586-018-05469-3 [accessed October 25, 2019]. |
||||
|
38 |
||||
|
Cp. H. Fry, “We Hold People With Power to Account. Why Not |
||||
|
Algorithms?” The Guardian, September 17, 2018. Available at: |
||||
|
https://web.archive.org/web/201901021 |
||||
|
94739/https://www.theguardian.com/commentisfree/2018/sep/17/power- |
||||
|
algorithms-technology-regulate [accessed October 25, 2019]. |
||||
|
39 |
||||
|
Cp. O. Etzioni, “How to Regulate Artificial Intelligence”, The New |
||||
|
York |
||||
|
Times, |
||||
|
January |
||||
|
20, |
||||
|
2018. |
||||
|
Available |
||||
|
at: |
||||
|
https://www.nytimes.com/2017/09/01/opinion/artificial-intelligence- |
||||
|
regulations-rules.html [accessed October 25, 2019]; A. Goel, “Ethics and |
||||
|
Artificial Intelligence”, The New York Times, December 22, 2017. Available |
||||
|
at: https://www.nytimes.com/2017/09/14/opinion/artificial-intelligence.html |
||||
|
[accessed October 25, 2019]. |
||||
|
40 |
||||
|
Cp. N. Vidmar and D.T. Miller, “Socialpsychological Processes |
||||
|
Underlying Attitudes Toward Legal Punishment”, Law and Society Review, |
||||
|
1980, pp. 565–602. |
||||
|
41 |
||||
|
Cp. M. Wenzel and T.G. Okimoto, “How Acts of Forgiveness Restore |
||||
|
a Sense of Justice: Addressing Status/Power and Value Concerns Raised by |
||||
|
Transgressions”, European Journal of Social Psychology, 40 (3), 2010, pp. |
||||
|
401–417. |
||||
|
42 |
||||
|
Cp. N. Bostrom and E. Yudkowsky, “The Ethics of Artificial |
||||
|
Intelligence”, in K. Frankish and W.M. Ramsey (ed.), The Cambridge |
||||
|
Handbook of Artificial Intelligence, Cambridge, Cambridge University Press, |
||||
|
2014, pp. 316–334; Frankish and Ramsey, The Cambridge Handbook of |
||||
|
Artificial Intelligence. |
||||
|
43 |
||||
|
Cp. J. Fionda, Devils and Angels: Youth Policy and Crime, London, |
||||
|
Hart, 2005.8 |
||||
|
|
||||
|
44 |
||||
|
Cp. Nils Christie, “Conflicts as Property”, The British Journal of |
||||
|
Criminology, 17 (1), 1977, pp. 1–15. |
||||
|
45 |
||||
|
Cp. J. Braithwaite, “Restorative Justice and a Better Future”, in E. |
||||
|
McLaughlin and G. Hughes (eds.), Restorative Justice: Critical Issues, |
||||
|
London, SAGE, 2003, pp. 54–67. |
||||
|
46 |
||||
|
Cp. J. Braithwaite, Crime, Shame and Reintegration, Cambridge, |
||||
|
Cambridge University Press, 1989. |
||||
|
47 |
||||
|
Cp. A. Conn, “Podcast: Law and Ethics of Artificial Intelligence”, |
||||
|
Future |
||||
|
of |
||||
|
Life, |
||||
|
March |
||||
|
31, |
||||
|
2017. |
||||
|
Available |
||||
|
at: |
||||
|
https://futureoflife.org/2017/03/31/podcast-law-ethics-artificial-intelligence/ |
||||
|
[accessed September, 22 2018]. |
||||
|
48 |
||||
|
Cp. A. Rawnsley, “Madeleine Albright: ‘The Things that are |
||||
|
Happening are Genuinely, Seriously Bad’”, The Guardian, July 8, 2018. |
||||
|
Available |
||||
|
at: |
||||
|
https://web.archive.org/web/20190106193657/https://www.theguardian.com9 |
||||
|
|
||||
|
/books/2018/jul/08/madeleine-albright-fascism-is-not-an-ideology-its-a- |
||||
|
method-interview-fascism-a-warning [accessed October 25, 2019]. |
||||
|
49 |
||||
|
Cp. D. Haraway, “A Cyborg Manifesto”, Socialist Review, 15 (2), |
||||
|
1985. |
||||
|
Available |
||||
|
at: |
||||
|
http://www.stanford.edu/dept/HPS/Haraway/CyborgManifesto.html |
||||
|
[accessed October 25, 2019]; C. Thompson, “The Cyborg Advantage”, Wired, |
||||
|
March 22, 2010. Available at: https://www.wired.com/2010/03/st-thompson- |
||||
|
cyborgs/ [accessed October 25, 2019]. |
||||
|
50 |
||||
|
Cp. J. Hipp et al., “Computer Aided Diagnostic Tools Aim to |
||||
|
Empower Rather than Replace Pathologists: Lessons Learned from |
||||
|
Computational Chess”, Journal of Pathology Informatics, 2, 2011. Available |
||||
|
at: https://doi.org/10.4103/2153-3539.82050 [accessed October 25, 2019]. |
||||
|
51 |
||||
|
Cp. J. Baggini, “Memo to Those Seeking to Live for Ever: Eternal |
||||
|
Life Would be Deathly Dull”, The Guardian, July 8, 2018. Available at: |
||||
|
https://web.archive.org/web/20181225111455/https://www.theguardian.com |
||||
|
/commentisfree/2018/jul/08/live-for-ever-eternal-life-deathly-dull-immortality |
||||
|
[accessed October 25, 2019]. |
||||
|
|
||||
|
|
||||
|
|
||||
|
|
@ -1,5 +0,0 @@ |
|||||
Title: First thing |
|
||||
Date: 2020-11-13 16:46 |
|
||||
Category: Projections |
|
||||
|
|
||||
First website page! |
|
@ -1,134 +0,0 @@ |
|||||
Title: The Philosophy of Warnings |
|
||||
Author: Santiago Zabala |
|
||||
Category: Articles |
|
||||
<div class="colophon"> |
|
||||
<p> Published by: <br> Editing: <br> Design <br> Paper <br> Typeface <br> |
|
||||
</p><p id="colophon_right"> Sponsors: <br> Thanks: <br> Other <br> |
|
||||
</p></div> |
|
||||
<div class="first-page"> |
|
||||
<div id="title_edition">Of Whirlpools and Tornadoes <br> A Nourishing Network</div> |
|
||||
<div id="amro">AMRO 2020</div> |
|
||||
|
|
||||
<div id="author">Santiago Zabala</div> |
|
||||
<div id="title">The Philosophy of Warnings</div> |
|
||||
|
|
||||
|
|
||||
|
|
||||
<div id="published">Published in the *Institute of Arts and Ideas* </div> |
|
||||
</div> |
|
||||
<header id="pageheader-issue">A Nourishing Network</header> |
|
||||
<header id="pageheader-theme">The Philosophy of Warnings</header> |
|
||||
<header id="pagefooter">)))))</header> |
|
||||
|
|
||||
<div class="essay_content"> |
|
||||
<p>This month an undergraduate student told me his parents were using the |
|
||||
pandemic to persuade him to avoid philosophy as it could not prevent or |
|
||||
solve real emergencies. I told him to let them know that we find |
|
||||
ourselves in this global emergency because we haven't thought |
|
||||
philosophically *enough*. The increasingly narrow focus of experts this |
|
||||
century has prevented us from addressing problems from a global |
|
||||
perspective, which has always been the distinctive approach of |
|
||||
philosophy. This is evident in the little consideration we give to |
|
||||
warnings. Too often these are discarded as useless or |
|
||||
insignificant---much like philosophy---when in fact they are vital. |
|
||||
Though philosophers can't solve an ongoing emergency---philosophy was |
|
||||
never meant to solve anything---we can interpret their signs through a |
|
||||
"philosophy of warnings." Although this philosophy probably won't change |
|
||||
the views of my student's parents, it might help us to reevaluate our |
|
||||
political, environmental, and technological priorities for the future.</p> |
|
||||
|
|
||||
<p>Like recent philosophies of plants or |
|
||||
[[insects]{.underline}](http://cup.columbia.edu/book/a-philosophy-of-the-insect/9780231175791), |
|
||||
which emerged as a response to a global environmental crisis, a |
|
||||
"philosophy of warnings" is also a reaction to a global emergency that |
|
||||
requires philosophical elucidation. Although the ongoing pandemic has |
|
||||
triggered this new stance it isn't limited to this event. Nor is it |
|
||||
completely new. Warnings have been a topic of philosophical |
|
||||
investigation for centuries. The difference lies in the meaning these |
|
||||
concepts have acquired now. Before philosophy we had prophets to tell us |
|
||||
to be alert to the warnings of the Gods, but we secularized that office |
|
||||
into that of the philosopher, who, as one among equals, advised to heed |
|
||||
the signs; to use our imagination, because that is all we got. The |
|
||||
current pandemic has shown how little prepared we were for a global |
|
||||
emergency, even one whose coming has been |
|
||||
[[announced]{.underline}](https://www.nationalgeographic.com/science/2020/04/experts-warned-pandemic-decades-ago-why-not-ready-for-coronavirus/) |
|
||||
for decades. But why haven't we been able to take these warnings |
|
||||
seriously? Before tackling this question, let's recall how warnings have |
|
||||
been addressed philosophically.</p> |
|
||||
|
|
||||
<p>Examples of warning philosophy can be traced back to Greek mythology and |
|
||||
Plato\'s *Apology*. Apollo provided Cassandra with the gift of prophecy |
|
||||
even though she could not convince others of the validity of her |
|
||||
predictions, and Socrates warned the Athenians---after he was sentenced |
|
||||
to death---that their inequity and mendacity undermined the democracy |
|
||||
they claimed to honor. Against Gaston Bachelard, who coined the term |
|
||||
"Cassandra complex" to refer to the idea that events could be known in |
|
||||
advance, Theodore Adorno warned that any claim to know the future should |
|
||||
be avoided. It is probably in this spirit that Walter Benjamin warned we |
|
||||
should pull the brake on the train of progress as it was stacking |
|
||||
disaster upon disaster. In line with Hannah Arendt's warnings of the |
|
||||
reemergence of totalitarianism after the Second World War, Giorgio |
|
||||
Agamben began his book on the current pandemic with "A Warning": |
|
||||
biosecurity will now serve governments to rule through a new form of |
|
||||
tyranny called "technological-sanitary" despotism.</p> |
|
||||
|
|
||||
<p>These examples illustrate the difference between warnings and |
|
||||
predictions. Warnings are sustained by signs in the present that request |
|
||||
our involvement, as Benjamin suggests. Predictions call out what will |
|
||||
take place regardless of our actions, a future as the only continuation |
|
||||
of the present, but warnings instead point toward what is to come and |
|
||||
are meant involve us in a radical break, a discontinuity with the |
|
||||
present signaled by alarming signs that we are asked to confront. The |
|
||||
problem is not the involvement warnings request from us but rather |
|
||||
whether we are willing to confront them at all. The volume of vital |
|
||||
warnings that we ignore---climate change, social inequality, refugee |
|
||||
crises---is alarming; it has become our greatest emergency.</p> |
|
||||
|
|
||||
<p>Indifference towards warnings is rooted in the ongoing global return to |
|
||||
order and realism in the twenty-first century. This return is not only |
|
||||
political, as demonstrated by the various right-wing populist forces |
|
||||
that have taken office around the world, but also cultural as the return |
|
||||
of some contemporary |
|
||||
[[intellectuals]{.underline}](https://arcade.stanford.edu/blogs/returning-order-through-realism) |
|
||||
to Eurocentric Cartesian realism demonstrates. The idea that we can |
|
||||
still claim access to truth without being dependent upon interpretation |
|
||||
presupposes that knowledge of objective facts is enough to guide our |
|
||||
lives. Within this theoretical framework warnings are cast off as |
|
||||
unfounded, contingent, and subjective, even though philosophers of |
|
||||
science such as Bruno Latour continue to |
|
||||
[[remind]{.underline}](https://www.wiley.com/en-us/Down+to+Earth%3A+Politics+in+the+New+Climatic+Regime-p-9781509530564) |
|
||||
us that no "attested knowledge can stand on its own." The internet and, |
|
||||
in particular, social media have intensified this realist view, further |
|
||||
discrediting traditional vectors of legitimation (international |
|
||||
agencies, major newspapers, or credentialed academics) and rendering any |
|
||||
tweet by an anonymous blogger credible because it presents itself as |
|
||||
transparent, direct, and genuine. "The quickness of social media, as |
|
||||
Judith Butler [[pointed |
|
||||
out]{.underline}](https://www.newstatesman.com/international/2020/09/judith-butler-culture-wars-jk-rowling-and-living-anti-intellectual-times), |
|
||||
allows for forms of vitriol that do not exactly support thoughtful |
|
||||
debate."</p> |
|
||||
|
|
||||
<p>Our inability to take warnings seriously has devastating consequences, |
|
||||
as recent months make clear. The central argument in favor of a |
|
||||
philosophy of warnings is not whether what it warns of comes to pass but |
|
||||
rather the pressure it exercises against those emergencies hidden and |
|
||||
subsumed under the global call to order. This pressure demands that our |
|
||||
political, environmental, and technological priorities be reconsidered, |
|
||||
revealing the alarming signs of democratic backsliding, biodiversity |
|
||||
loss, and commodification of our lives by surveillance capitalism. These |
|
||||
warnings are also why we should oppose any demand to "return to |
|
||||
normality," which signals primarily a desire to ignore what caused this |
|
||||
pandemic in the first place. A philosophy of warnings seeks to alter and |
|
||||
interrupt the reality we've become accustomed to.</p> |
|
||||
|
|
||||
<p>Although a philosophy of warnings will not prevent future emergencies, |
|
||||
it will resist the ongoing silencing of emergencies under the guise of |
|
||||
realism by challenging our framed global order and its realist |
|
||||
advocates. This philosophy is not meant to rescue us *from* emergencies |
|
||||
but rather rescue us *into* emergencies that we are trained to ignore.</p> |
|
||||
</div> |
|
||||
<div class="bio"> |
|
||||
[[Santiago Zabala]{.underline}](http://www.santiagozabala.com/) is ICREA |
|
||||
Research Professor of Philosophy at the Pompeu Fabra University in |
|
||||
Barcelona. His most recent book is *Being at Large: Freedom in the Age |
|
||||
of Alternative Facts* (McGill-Queen's University Press, 2020).</div> |
|
Loading…
Reference in new issue