alicestrt 4 years ago
parent
commit
28bd03d237
  1. 4
      Makefile
  2. 715
      content/Essays/Kris_De_Decker-how_to_build_a_low_tech_internet.md
  3. 5
      content/Essays/Mel-Hogan_Pandemics-Dark-Cloud.md
  4. 398
      content/Essays/Re-Centralization-of-AI.md
  5. 5
      content/text.md
  6. 134
      content/zabala_warning.md
  7. 6
      pelicanconf.py
  8. 1
      themes/basic/static/css/main.css
  9. 8
      themes/basic/static/css/print.css
  10. 2
      themes/basic/templates/base.html
  11. 1
      themes/basic/templates/index.html

4
Makefile

@ -77,8 +77,10 @@ md=$(wildcard content/Essays/*.md)
md2pdf=$(md:%.md=%.pdf) md2pdf=$(md:%.md=%.pdf)
%.pdf: %.md themes/basic/static/css/print.css %.pdf: %.md themes/basic/static/css/print.css
pandoc -f markdown_mmd --pdf-engine=weasyprint -c themes/basic/static/css/print.css $< -o $@ pandoc -f markdown -t html -c themes/basic/static/css/print.css $< -o $@.html
pandoc --pdf-engine=weasyprint -c themes/basic/static/css/print.css $< -o $@
print: $(md2pdf) print: $(md2pdf)
$(shell mv content/Essays/*.html content/print/)
$(shell mv content/Essays/*.pdf content/print/) $(shell mv content/Essays/*.pdf content/print/)

715
content/Essays/Kris_De_Decker-how_to_build_a_low_tech_internet.md

@ -0,0 +1,715 @@
### How to Build a Low-tech Internet
Wireless internet access is on the rise in both modern consumer
societies and in the developing world.
In rich countries, however, the focus is on always-on connectivity and
ever higher access speeds. In poor countries, on the other hand,
connectivity is achieved through much more low-tech, often asynchronous
networks. 
While the high-tech approach pushes the costs and energy use of the
internet [higher and
higher](https://www.lowtechmagazine.com/2015/10/can-the-internet-run-on-renewable-energy.html),
the low-tech alternatives result in much cheaper and very energy
efficient networks that combine well with renewable power production and
are resistant to disruptions.
If we want the internet to keep working in circumstances where access to
energy is more limited, we can learn important lessons from alternative
network technologies. Best of all, there\'s no need to wait for
governments or companies to facilitate: we can build our own resilient
communication infrastructure if we cooperate with one another. This is
demonstrated by several community networks in Europe, of which the
largest has more than 35,000 users already.
[]{#anchor}Picture: A node in the [Scottish Tegola
Network](http://www.tegola.org.uk/hebnet/).
More than half of the global population does not have access to the
\"worldwide\" web. Up to now, the internet is mainly an urban
phenomenon, especially in \"developing\" countries. Telecommunication
companies are usually reluctant to extend their network outside cities
due to a combination of high infrastructure costs, low population
density, limited ability to pay for services, and an unreliable or
non-existent electricity infrastructure. Even in remote regions of
\"developed\" countries, internet connectivity isn\'t always available.
Internet companies such as Facebook and Google regularly make headlines
with plans for connecting these remote regions to the internet. Facebook
tries to achieve this with drones, while Google counts on high-altitude
balloons. There are major technological challenges, but the main
objection to these plans is their commercial character. Obviously,
Google and Facebook want to connect more people to the internet because
that would increase their revenues. Facebook especially receives lots of
criticism because their network promotes their own site in particular,
and blocks most other internet applications. \[1\]
Meanwhile, several research groups and network enthusiasts have
developed and implemented much cheaper alternative network technologies
to solve these issues. Although these low-tech networks have proven
their worth, they have received much less attention. Contrary to the
projects of internet companies, they are set up by small organisations
or by the users themselves. This guarantees an open network that
benefits the users instead of a handful of corporations. At the same
time, these low-tech networks are very energy efficient.
****WiFi-based Long Distance Networks****
Most low-tech networks are based on WiFi, the same technology that
allows mobile access to the internet in most western households. As we
have seen in the previous article, [sharing these devices could provide
free mobile access across densely populated
cities](https://www.lowtechmagazine.com/2015/10/the-4g-network-thats-already-there.html).
But the technology can be equally useful in sparsely populated areas.
Although the WiFi-standard was developed for short-distance data
communication (with a typical range of about 30 metres), its reach can
be extended through modifications of the Media Access Control (MAC)
layer in the networking protocol, and through the use of range extender
amplifiers and directional antennas. \[2\]
Although the WiFi-standard was developed for short-distance data
communication, its reach can be extended to cover distances of more than
100 kilometres.
The longest unamplified WiFi link is a 384 km wireless point-to-point
connection between Pico El Águila and Platillón in Venezuela,
established a few years ago. \[3,4\] However, WiFi-based long distance
networks usually consist of a combination of shorter point-to-point
links, each between a few kilometres and one hundred kilometers long at
most. These are combined to create larger, multihop networks.
Point-to-points links, which form the backbone of a long range WiFi
network, are combined with omnidirectional antennas that distribute the
signal to individual households (or public institutions) of a community.
Picture: A relay with three point-to-point links and three sectoral
antennae.
[Tegola](http://www.tegola.org.uk/howto/network-planning.html).
Long-distance WiFi links require line of sight to make a connection \--
in this sense, the technology resembles the [18th century optical
telegraph](https://www.lowtechmagazine.com/2007/12/email-in-the-18.html).
\[5\] If there\'s no line of sight between two points, a third relay is
required that can see both points, and the signal is sent to the
intermediate relay first. Depending on the terrain and particular
obstacles, more hubs may be necessary. \[6\]
Point-to-point links typically consist of two directional antennas, one
focused on the next node and the other on the previous node in the
network. Nodes can have multiple antennas with one antenna per fixed
point-to-point link to each neighbour. \[7\] This allows mesh routing
protocols that can dynamically select which links to choose for routing
among the available ones. \[8\]
Long-distance WiFi links require line of sight to make a connection \--
in this sense, the technology resembles the 18th century optical
telegraph.
Distribution nodes usually consist of a sectoral antenna (a small
version of the things you see on mobile phone masts) or a conventional
WiFi-router, together with a number of receivers in the community. \[6\]
For short distance WiFi-communication, there is no requirement for line
of sight between the transmitter and the receiver. \[9\]
To provide users with access to the worldwide internet, a long range
WiFi network should be connected to the main backbone of the internet
using at least one \"backhaul\" or \"gateway node\". This can be a
dial-up or broadband connection (DSL, fibre or satellite). If such a
link is not established, users would still be able to communicate with
each other and view websites set up on local servers, but they would not
be able to access the internet. \[10\]
****Advantages of Long Range WiFi****
Long range WiFi offers high bandwidth (up to 54 Mbps) combined with very
low capital costs. Because the WiFi standard enjoys widespread
acceptance and has huge production volumes, off-the-shelf antennas and
wireless cards can be bought for very little money. \[11\]
Alternatively, components can be put together [from discarded
materials](http://roelof.info/projects/%282014%29Pretty_Fly_For_A_Wifi/)
such as old routers, satellite dish antennas and laptops. Protocols like
WiLDNet run on a 266 Mhz processor with only 128 MB memory, so an old
computer will do the trick. \[7\]
The WiFi-nodes are lightweight and don\'t need expensive towers \--
further decreasing capital costs, and minimizing the impact of the
structures to be built. \[7\] More recently, single units that combine
antenna, wireless card and processor have become available. These are
very convenient for installation. To build a relay, one simply connects
such units together with ethernet cables that carry both signal and
power. \[6\] The units can be mounted in towers or slim masts, given
that they offer little windload. \[3\] Examples of suppliers of long
range WiFi components are [Ubiquity](https://www.ubnt.com/),
[Alvarion](http://www.alvarion.com/) and
[MikroTik](http://www.mikrotik.com/), and
[simpleWiFi](https://www.simplewifi.com/).
Long Range WiFi makes use of unlicensed spectrum and offers high
bandwidth, low capital costs, easy installation, and low power
requirements.
Long range WiFi also has low operational costs due to low power
requirements. A typical mast installation consisting of two long
distance links and one or two wireless cards for local distribution
consumes around 30 watts. \[6,12\] In several low-tech networks, nodes
are entirely powered by solar panels and batteries. Another important
advantage of long range WiFi is that it makes use of unlicensed spectrum
(2.4 and 5 GHz), and thus avoids negotiations with telecom operators and
government. This adds to the cost advantage and allows basically anyone
to start a WiFi-based long distance network. \[9\]
****Long Range WiFi Networks in Poor Countries****
The first long range WiFi networks were set up ten to fifteen years ago.
In poor countries, two main types have been built. The first is aimed at
providing internet access to people in remote villages. An example is
the Akshaya network in India, which covers the entire Kerala State and
is one of the largest wireless networks in the world. The infrastructure
is built around approximately 2,500 \"computer access centers\", which
are open to the local population \-- direct ownership of computers is
minimal in the region. \[13\]
Another example, also in India, are the AirJaldi networks which provide
internet access to approximately 20,000 users in six states, all in
remote regions and on difficult terrain. Most nodes in this network are
solar-powered and the distance between them can range up to 50 km or
more. \[14\] In some African countries, local WiFi-networks distribute
internet access from a satellite gateway. \[15,16\]
A node in the AirJaldi network. Picture: AirJaldi.
A second type of long distance WiFi network in poor countries is aimed
at providing telemedicine to remote communities. In remote regions,
health care is often provided through health posts scarcely equipped and
attended by health technicians who are barely trained. \[17\] Long-range
WiFi networks can connect urban hospitals with these outlying health
posts, allowing doctors to remotely support health technicians using
high-resolution file transfers and real-time communication tools based
on voice and video.
An example is the link between Cabo Pantoja and Iquitos in the Loreto
province in Peru, which was established in 2007. The 450 km network
consists of 17 towers which are 16 to 50 km apart. The line connects 15
medical outposts in remote villages with the main hospital in Iquitos
and is aimed at remote diagnosis of patients. \[17,18\] All equipment is
powered by solar panels. \[18,19\] Other succesful examples of long
range WiFi telemedicine networks have been built in India, Malawi and
Ghana. \[20,21\]
****WiFi-Based Community Networks in Europe****
The low-tech networks in poor countries are set up by NGO\'s,
governments, universities or businesses. In contrast, most of the
WiFi-based long distance networks in remote regions of rich countries
are so-called \"community networks\": the users themselves build, own,
power and maintain the infrastructure. Similar to the shared wireless
approach in cities, reciprocal resource sharing forms the basis of these
networks: participants can set up their own node and connect to the
network (for free), as long as their node also allows traffic of other
members. Each node acts as a WiFi routing device that provides IP
forwarding services and a data link to all users and nodes connected to
it. \[8,22\]
In a community network, the users themselves build, own, power and
maintain the infrastructure.
Consequently, with each new user, the network becomes larger. There is
no a-priori overall planning. A community network grows bottom-up,
driven by the needs of its users, as nodes and links are added or
upgraded following demand patterns. The only consideration is to connect
a node from a new participant to an existing one. As a node is powered
on, it discovers it neighbours, attributes itself a unique IP adress,
and then establishes the most appropriate routes to the rest of the
network, taking into account the quality of the links. Community
networks are open to participation to everyone, sometimes according to
an open peering agreement. \[8,9,19,22\]
Wireless links in the Spanish Guifi network.
[Credit](https://iuliinet.github.io/presentazione_ottobre_2014/img/barcellona.jpg).
Despite the lack of reliable statistics, community networks seem to be
rather succesful, and there are several large ones in Europe, such as
[Guifi.net](https://guifi.net/) (Spain), [Athens Wireless Metropolitan
Network](http://www.awmn.gr/content.php?s=ce506a41ab245641d6934638c6f6f107)
(Greece), [FunkFeuer](http://www.funkfeuer.at/) (Austria), and
[Freifunk](https://freifunk.net/en/) (Germany). \[8,22,23,24\] The
Spanish network  is the largest WiFi-based long distance network in the
world with more than 50,000 kilometres of links, although a small part
is based on optic fibre links. Most of it is located in the Catalan
Pyrenees, one of the least populated areas in Spain. The network was
initiated in 2004 and now has close to 30,000 nodes, up from 17,000 in
2012. \[8,22\]
Guifi.net provides internet access to individuals, companies,
administrations and universities. In principle, the network is
installed, powered and maintained by its users, although volunteer teams
and even commercial installers are present to help. Some nodes and
backbone upgrades have been succesfully crowdfunded by indirect
beneficiaries of the network. \[8,22\]
****Performance of Low-tech Networks****
So how about the performance of low-tech networks? What can you do with
them? The available bandwidth per user can vary enormously, depending on
the bandwidth of the gateway node(s) and the number of users, among
other factors. The long-distance WiFi networks aimed at telemedicine in
poor countries have few users and a good backhaul, resulting in high
bandwidth (+ 40 Mbps). This gives them a similar performance to fibre
connections in the developed world. A study of (a small part of) the
Guifi.net community network, which has dozens of gateway nodes and
thousands of users, showed an average throughput of 2 Mbps, which is
comparable to a relatively slow DSL connection. Actual throughput per
user varies from 700 kbps to 8 Mbps. \[25\]
The available bandwidth per user can vary enormously, depending on the
bandwidth of the gateway node(s) and the number of users, among other
factors
However, the low-tech networks that distribute internet access to a
large user base in developing countries can have much more limited
bandwidth per user. For example, a university campus in Kerala (India)
uses a 750 kbps internet connection that is shared across 3,000 faculty
members and students operating from 400 machines, where during peak
hours nearly every machine is being used. 
Therefore, the worst-case average bandwidth available per machine is
approximately 1.9 kbps, which is slow even in comparison to a dial-up
connection (56 kbps). And this can be considered a really good
connectivity compared to typical rural settings in poor countries.
\[26\] To make matters worse, such networks often have to deal with an
intermittent power supply.
Under these circumstances, even the most common internet applications
have poor performance, or don\'t work at all. The communication model of
the internet is based on a set of network assumptions, called the TCP/IP
protocol suite. These include the existence of a bi-directional
end-to-end path between the source (for example a website\'s server) and
the destination (the user\'s computer), short round-trip delays, and low
error rates.
Many low-tech networks in poor countries do not comform to these
assumptions. They are characterized by intermittent connectivity or
\"network partitioning\" \-- the absence of an end-to-end path between
source and destination \-- long and variable delays, and high error
rates. \[21,27,28\]
****Delay-Tolerant Networks****
Nevertheless, even in such conditions, the internet could work perfectly
fine. The technical issues can be solved by moving away from the
always-on model of traditional networks, and instead design networks
based upon asynchronous communication and intermittent connectivity.
These so-called \"delay-tolerant networks\" (DTNs) have their own
specialized protocols overlayed on top of the lower protocols and do not
utilize TCP. They overcome the problems of intermittent connectivity and
long delays by using store-and-forward message switching.
Information is forwarded from a storage place on one node to a storage
place on another node, along a path that *eventually* reaches its
destination. In contrast to traditional internet routers, which only
store incoming packets for a few milliseconds on memory chips, the nodes
of a delay-tolerant network have persistent storage (such as hard disks)
that can hold information indefinitely. \[27,28\]
Delay-tolerant networks combine well with renewable energy: solar panels
or wind turbines could power network nodes only when the sun shines or
the wind blows, eliminating the need for energy storage.
Delay-tolerant networks don\'t require an end-to-end path between source
and destination. Data is simply transferred from node to node. If the
next node is unavailable because of long delays or a power outage, the
data is stored on the hard disk until the node becomes available again.
While it might take a long time for data to travel from source to
destination, a delay-tolerant network ensures that it will eventually
arrive.
Delay-tolerant networks further decrease capital costs and energy use,
leading to the most efficient use of scarce resources. They keep working
with an intermittent energy supply and they combine well with renewable
energy sources: solar panels or wind turbines could power network nodes
only when the sun shines or the wind blows, eliminating the need for
energy storage.
****Data Mules****
Delay-tolerant networking can take surprising forms, especially when
they take advantage of some non-traditional means of communication, such
as \"data mules\". \[11,29\] In such networks, conventional
transportation technologies \-- buses, cars, motorcycles, trains, boats,
airplanes \-- are used to ferry messages from one location to another in
a store-and-forward manner.
Examples are DakNet and KioskNet, which use buses as data mules.
\[30-34\] In many developing regions, rural bus routes regularly visit
villages and towns that have no network connectivity. By equipping each
vehicle with a computer, a storage device and a mobile WiFi-node on the
one hand, and by installing a stationary WiFi-node in each village on
the other hand, the local transport infrastructure can substitute for a
wireless internet link. \[11\]
Picture: AirJaldi.
Outgoing data (such as sent emails or requests for webpages) is stored
on local computers in the village until the bus comes withing range. At
this point, the fixed WiFi-node of the local computer automatically
transmits the data to the mobile WiFi-node of the bus. Later, when the
bus arrives at a hub that is connected to the internet, the outgoing
data is transmitted from the mobile WiFi-node to the gateway node, and
then to the internet. Data sent to the village takes the opposite route.
The bus \-- or data \-- driver doesn\'t require any special skills and
is completely oblivious to the data transfers taking place. He or she
does not need to do anything other than come in range of the nodes.
\[30,31\]
In a data mules network, the local transport infrastructure substitutes
for a wireless internet link.
The use of data mules offers some extra advantages over more
\"sophisticated\" delay-tolerant networks. A \"drive-by\" WiFi network
allows for small, low-cost and low-power radio devices to be used, which
don\'t require line of sight and consequently no towers \-- further
lowering capital costs and energy use compared to other low-tech
networks. \[30,31,32\]
The use of short-distance WiFi-links also results in a higher bandwidth
compared to long-distance WiFi-links, which makes data mules better
suited to transfer larger files. On average, 20 MB of data can be moved
in each direction when a bus passes a fixed WiFi-node. \[30,32\] On the
other hand, latency (the time interval between sending and receiving
data) is usually higher than on long-range WiFi-links. A single bus
passing by a village once a day gives a latency of 24 hours.
****Delay-Tolerant Software****
Obviously, a delay-tolerant network (DTN) \-- whatever its form \-- also
requires new software: applications that function without a connected
end-to-end networking path. \[11\] Such custom applications are also
useful for synchronous, low bandwidth networks. Email is relatively easy
to adapt to intermittent connectivity, because it\'s an asynchronous
communication method by itself. A DTN-enabled email client stores
outgoing messages until a connection is available. Although emails may
take longer to reach their destination, the user experience doesn\'t
really change.
A Freifunk WiFi-node is installed in Berlin, Germany. Picture:[
Wikipedia
Commons](https://upload.wikimedia.org/wikipedia/commons/5/51/Freifunk-Initiative_in_Berlin-Kreuzberg.jpg).
Browsing and searching the web requires more adaptations. For example,
most search engines optimize for speed, assuming that a user can quickly
look through the returned links and immediately run a second modified
search if the first result is inadequate. However, in intermittent
networks, multiple rounds of interactive search would be impractical.
\[26,35\] Asynchronous search engines optimize for bandwith rather than
response time. \[26,30,31,35,36\] For example, RuralCafe desynchronizes
the search process by performing many search tasks in an offline manner,
refining the search request based on a database of similar searches. The
actual retrieval of information using the network is only done when
absolutely necessary.
Many internet applications could be adapted to intermittent networks,
such as webbrowsing, email, electronic form filling, interaction with
e-commerce sites, blogsoftware, large file downloads, or social media.
Some DTN-enabled browsers download not only the explicitly requested
webpages but also the pages that are linked to by the requested pages.
\[30\] Others are optimized to return low-bandwidth results, which are
achieved by filtering, analysis, and compression on the server site. A
similar effect can be achieved through the use of a service like
[Loband](http://www.loband.org/loband/), which strips webpages of
images, video, advertisements, social media buttons, and so on, merely
presenting the textual content. \[26\]
Browsing and searching on intermittent networks can also be improved by
local caching (storing already downloaded pages) and prefetching
(downloading pages that might be retrieved in the future). \[206\] Many
other internet applications could also be adapted to intermittent
networks, such as electronic form filling, interaction with e-commerce
sites, blogsoftware, large file downloads, social media, and so on.
\[11,30\] All these applications would remain possible, though at lower
speeds.
****Sneakernets****
Obviously, real-time applications such as internet telephony, media
streaming, chatting or videoconferencing are impossible to adapt to
intermittent networks, which provide only asynchronous communication.
These applications are also difficult to run on synchronous networks
that have limited bandwidth. Because these are the applications that are
in large part responsible for the growing energy use of the internet,
one could argue that their incompatibility with low-tech networks is
actually a good thing (see the [previous
article](https://www.lowtechmagazine.com/2015/10/can-the-internet-run-on-renewable-energy.html)).
Furthermore, many of these applications could be organized in different
ways. While real-time voice or video conversations won\'t work, it\'s
perfectly possible to send and receive voice or video messages. And
while streaming media can\'t happen, downloading music albums and video
remains possible. Moreover, these files could be \"transmitted\" by the
most low-tech internet technology available: a sneakernet. In a
sneakernet, digital data is \"wirelessly\" transmitted using a storage
medium such as a hard disk, a USB-key, a flash card, or a CD or DVD.
Before the arrival of the internet, all computer files were exchanged
via a sneakernet, using tape or floppy disks as a storage medium.
Stuffing a cargo train full of digital storage media would beat any
digital network in terms of speed, cost and energy efficiency. Picture:
Wikipedia Commons.
Just like a data mules network, a sneakernet involves a vehicle, a
messenger on foot, or an animal (such as a [carrier
pigeon](https://www.lowtechmagazine.com/2009/02/sneakernet-beats-internet.html)).
However, in a sneakernet there is no automatic data transfer between the
mobile node (for instance, a vehicle) and the stationary nodes (sender
and recipient). Instead, the data first have to be transferred from the
sender\'s computer to a portable storage medium. Then, upon arrival, the
data have to be transferred from the portable storage medium to the
receiver\'s computer. \[30\] A sneakernet thus requires manual
intervention and this makes it less convenient for many internet
applications.
There are exceptions, though. For example, a movie doesn\'t have to be
transferred to the hard disk of your computer in order to watch it. You
play it straight from a portable hard disk or slide a disc into the
DVD-player. Moreover, a sneakernet also offers an important advantage:
of all low-tech networks, it has the most bandwidth available. This
makes it perfectly suited for the distribution of large files such as
movies or computer games. In fact, when very large files are involved, a
sneakernet even beats the fastest fibre internet connection. At lower
internet speeds, sneakernets can be advantageous for much smaller files.
Technological progress will not lower the advantage of a sneakernet.
Digital storage media evolve at least as fast as internet connections
and they both improve communication in an equal way.
****Resilient Networks****
While most low-tech networks are aimed at regions where the alternative
is often no internet connection at all, their usefulness for
well-connected areas cannot be overlooked. The internet as we know it in
the industrialized world is a product of an abundant energy supply, a
robust electricity infrastructure, and sustained economic growth. This
\"high-tech\" internet might offer some fancy advantages over the
low-tech networks, but it cannot survive if these conditions change.
This makes it extremely vulnerable.
The internet as we know it in the industrialized world is a product of
an abundant energy supply, a robust electricity infrastructure, and
sustained economic growth. It cannot survive if these conditions change.
Depending on their level of resilience, low-tech networks can remain in
operation when the supply of fossil fuels is interrupted, when the
electricity infrastructure deteriorates, when the economy grinds to a
halt, or if other calamities should hit. Such a low-tech internet would
allow us to surf the web, send and receive e-mails, shop online, share
content, and so on. Meanwhile, data mules and sneakernets could serve to
handle the distribution of large files such as videos. Stuffing a cargo
vessel or a train full of digital storage media would beat any digital
network in terms of speed, cost and energy efficiency. And if such a
transport infrastructure would no longer be available, we could still
rely on messengers on foot, [cargo
bikes](https://www.lowtechmagazine.com/2014/05/modular-cargo-cycles.html)
and [sailing vessels](https://www.lowtechmagazine.com/sailing-ships/).
Such a hybrid system of online and offline applications would remain a
very powerful communication network \-- unlike anything we had even in
the late twentieth century. Even if we envision a doom scenario in which
the wider internet infrastructure would disintegrate, isolated low-tech
networks would still be very useful local and regional communication
technologies. Furthermore, they could obtain content from other remote
networks through the exchange of portable storage media. The internet,
it appears, can be as low-tech or high-tech as we can afford it to be.
Kris De Decker (edited by [Jenna
Collett](https://www.linkedin.com/pub/jenna-collett/1a/925/b3))
This article has been translated into
[Spanish](https://solar.lowtechmagazine.com/es/2015/10/how-to-build-a-low-tech-internet.html).
****Sources & Notes:****
DIY: [Wireless networking in the developing
world](http://wndw.net/book.html#readBook) (Third Edition) is a free
book about designing, implementing and maintaining low-cost wireless
networks. Available in English, French, and Spanish.
\[1\] [Connecting the unwired world with balloons, satellites, lasers &
drones](https://tech.slashdot.org/story/15/09/03/214256/connecting-the-unwired-world-with-balloons-satellites-lasers-drones),
Slashdot, 2015
\[2\] [A QoS-aware dynamic bandwidth allocation scheme for multi-hop
WiFi-based long distance
networks](https://link.springer.com/article/10.1186%2Fs13638-015-0352-z#/page-1),
Iftekhar Hussain et al., 2015
\[3\] [Long-distance, Low-Cost Wireless Data
Transmission](http://www.ursi.org/files/RSBissues/RSB_339_2011_12.pdf)
(PDF), Ermanno Pietrosemoli, 2011
\[4\] This link could only be established thanks to the height of the
endpoints (4,200 and 1,500 km) and the flatness of the middle ground.
The curvature of the Earth makes longer point-to-point WiFi-links
difficult to achieve because line of sight between two points is
required.
\[5\] Radio waves occupy a volume around the optical line, which must be
unemcumbered from obstacles. This volume is known as the Fresnel
ellipsoid and its size grows with the distance between the two end
points and with the wavelength of the signal, which is in turn inversely
proportional to the frequency. Thus, it is required to leave extra
\"elbow room\" for the Fresnel zone. \[9\]
\[6\] [A Brief History of the Tegola
Project](http://www.tegola.org.uk/tegola-history.html), Tegola Project,
retrieved October 2015
\[7\] [WiLDNet: Design and Implementation of High Performance WiFi based
Long Distance
Networks](http://tier.cs.berkeley.edu/docs/wireless/wild_multihop.pdf)
(PDF), Rabin Patra et al., 2007
\[8\] [Topology Patterns of a Community Network:
Guifi.net](http://dsg.ac.upc.edu/sites/default/files/1569633605.pdf)
(PDF), Davide Vega et al., 2012
\[9\] [Global Access to the Internet for All, internet
draft](https://trac.tools.ietf.org/group/irtf/trac/wiki/gaia), Internet
Engineering Task Force (IETF), 2015
\[10\] This is what happened to Afghanistan\'s JLINK network when
[funding for the network\'s satellite link ran dry in
2012](https://www.wired.com/2012/05/jlink/).
\[11\] [The case for technology in developing
regions](https://www.cs.cmu.edu/~mattkam/lab/publications/Computer2005.pdf)
(PDF), Eric Brewer et al., 2005
\[12\] [Beyond Pilots: Keeping Rural Wireless Networks
Alive](https://www.usenix.org/legacy/event/nsdi08/tech/full_papers/surana/surana.pdf)
(PDF), Sonesh Surana et al., 2008
\[13\] <http://www.akshaya.kerala.gov.in/>
\[14\] <http://main.airjaldi.com/>
\[15\] [VillageCell: Cost Effective Cellular Connectivity in Rural
Areas](http://www.cs.bham.ac.uk/~pejovicv/docs/Anand12ICTD.pdf) (PDF),
Abhinav Anand et al., 2012
\[16\] [Deployment and Extensio of a Converged WiMAX/WiFi Network for
Dwesa Community Area South
Africa](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.452.7357&rep=rep1&type=pdf)
(PDF), N. Ndlovu et al., 2009
\[17\] \"[A telemedicine network optimized for long distances in the
Amazonian jungle of
Peru](http://www.ehas.org/wp-content/uploads/2012/01/Extremecomm_sig_ISBN.pdf)\"
(PDF), Carlos Rey-Moreno, ExtremeCom \'11, September 2011
\[18\] \"[Telemedicine networks of EHAS Foundation in Latin
America](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4197650/)\",
Ignacio Prieto-Egido et al., in \"Frontiers in Public Health\", October
15, 2014.
\[19\] \"[The design of a wireless solar-powered router for rural
environments isolated from health
facilities](https://eciencia.urjc.es/bitstream/handle/10115/2293/THE%20DESIGN%20OF%20A%20WIRELESS%20SOLAR-POWERED-2008.pdf?sequence=1)\"
(PDF), Francisco Javier Simo Reigadas et al., in \"IEEE Wireless
Communications\", June 2008.
\[20\] [On a long wireless link for rural telemedicine in
Malawi](http://users.ictp.it/~mzennaro/Malawi.pdf) (PDF), M. Zennaro et
al., 2008
\[21\] [A Survey of Delay- and Disruption-Tolerant Networking
Applications](http://www.jie-online.org/index.php/jie/article/view/91),
Artemios G. Voyiatzis, 2012
\[22\] [Supporting Cloud Deployment in the Guifi Community
Network](https://www.sics.se/~amir/files/download/papers/guifi.pdf)
(PDF), Roger Baig et al., 2013
\[23\] [A Case for Research with and on Community
Networks](http://www.sigcomm.org/sites/default/files/ccr/papers/2013/July/2500098-2500108.pdf)
(PDF), Bart Braem et.al, 2013
\[24\] There are smaller networks in Scotland
([Tegola](http://www.tegola.org.uk/)), Slovenia ([wlan
slovenija](https://wlan-si.net/)), Belgium ([Wireless
Antwerpen](http://www.wirelessantwerpen.be/)), and the Netherlands
([Wireless Leiden](https://www.wirelessleiden.nl/)), among others.
Australia has [Melbourne Wireless](http://melbourne.wireless.org.au/).
In Latin America, numerous examples exists, such as [Bogota
Mesh](https://www.facebook.com/BogotaMesh) (Colombia) and [Monte Video
Libre](http://picandocodigo.net/2008/montevideolibre-redes-libres-en-montevideo/)
(Uruguay). Some of these networks are interconnected. This is the case
for the Belgian and Dutch community networks, and for the Slovenian and
Austrian networks. \[8,22,23\]
\[25\] [Proxy performance analysis in a community wireless
network](http://upcommons.upc.edu/handle/2099.1/19710), Pablo Pitarch
Miguel, 2013
\[26\] [RuralCafe: Web Search in the Rural Developing
World](http://www.ambuehler.ethz.ch/CDstore/www2009/proc/docs/p411.pdf)
(PDF), Jay Chen et al., 2009
\[27\] [A Delay-Tolerant Network Architecture for Challenged
Networks](http://www.kevinfall.com/seipage/papers/p27-fall.pdf) (PDF),
Kevin Fall, 2003
\[28\] [Delay- and Disruption-Tolerant Networks (DTNs) \-- A Tutorial
(version
2.0)](http://ipnsig.org/wp-content/uploads/2012/07/DTN_Tutorial_v2.04.pdf)
(PDF), Forrest Warthman, 2012
\[29\] [Healthcare Supported by Data Mule Networks in Remote Communities
of the Amazon
Region](http://www.hindawi.com/journals/isrn/2014/730760/), Mauro
Margalho Coutinho et al., 2014
\[30\] [First Mile Solutions\' Daknet Takes Rural Communities
Online](http://www.firstmilesolutions.com/documents/FMS_Case_Study.pdf)
(PDF), Carol Chyau and Jean-Francois Raymond, 2005
\[31\] [DakNet: A Road to Universal Broadband
Connectivity](http://courses.media.mit.edu/2003fall/de/DakNet-Case.pdf)
(PDF), Amir Alexander Hasson et al., 2003
\[32\] [DakNet: Architecture and Connectivity in Developing
Nations](http://ijpret.com/publishedarticle/2015/4/IJPRET%20-%20ECN%20115.pdf)
(PDF), Madhuri Bhole, 2015
\[33\] [Delay Tolerant Networks and Their
Applications](http://www.citeulike.org/user/tnhh/article/13517347),
Longxiang Gao et al., 2015
\[34\] [Low-cost communication for rural internet kiosks using
mechanical
backhaul](https://people.csail.mit.edu/matei/papers/2006/mobicom_kiosks.pdf),
A. Seth et al., 2006
\[35\] [Searching the World Wide Web in Low-Connectivity
Communities](http://tek.sourceforge.net/papers/tek-www02.pdf) (PDF),
William Thies et al., 2002
\[36\] [Slow Search: Information Retrieval without Time
Constraints](https://www.cs.cmu.edu/~yubink/hcir2013.pdf) (PDF), Jaime
Teevan, 2013
\[37\] [Potential for Collaborative Caching and Prefetching in
Largely-Disconnected
Villages](http://mrmgroup.cs.princeton.edu/papers/isaacman-winsdr503.pdf)
(PDF), Sibren Isaacman et al., 2008
--
--
Posted on October 26, 2015 at 12:26 AM in [Access to
information](https://www.lowtechmagazine.com/copyright_and_access_to_information/),
[Communications](https://www.lowtechmagazine.com/communications/),
[Cover story](https://www.lowtechmagazine.com/cover-story/),
[DIY](https://www.lowtechmagazine.com/diy/),
[Internet](https://www.lowtechmagazine.com/internet/), [Wireless
technology](https://www.lowtechmagazine.com/wireless_technology/) \|
[Permalink](https://www.lowtechmagazine.com/2015/10/how-to-build-a-low-tech-internet.html)

5
content/Essays/Mel-Hogan_Pandemics-Dark-Cloud.md

@ -1,6 +1,3 @@
Title: 'The Pandemic's Dark Cloud'
Author: Mel Hogan
"The Pandemic\'s Dark Cloud" was written in November 2020 as a "The Pandemic\'s Dark Cloud" was written in November 2020 as a
reflection on the relationship between the pandemic and environmental reflection on the relationship between the pandemic and environmental
media, with a focus on "the cloud" and its undergirding networked media, with a focus on "the cloud" and its undergirding networked
@ -21,7 +18,7 @@ McLuhan lecture at the Canadian Embassy in Berlin, and giving a plenary
at transmediale 2020.\ at transmediale 2020.\
\@mel\_hogan / melhogan.com / mhogan\@ucalgary.ca* \@mel\_hogan / melhogan.com / mhogan\@ucalgary.ca*
# The Pandemic\'s Dark Cloud by Mél Hogan **The Pandemic\'s Dark Cloud **by Mél Hogan
As the pandemic settled into consciousness across the globe, humans As the pandemic settled into consciousness across the globe, humans
devolved. People in countries where the response to COVID-19 was most devolved. People in countries where the response to COVID-19 was most

398
content/Essays/Re-Centralization-of-AI.md

@ -0,0 +1,398 @@
Title: Re-Centralization of AI focusing on Social Justice
Author: Adnan Hadzi, Denis Roio
# RE - CENTRALIZATION OF AI FOCUSING ON SOCIAL JUSTICE
In order to lay the foundations for a discussion around
the argument that the adoption of artificial
intelligence (AI) technologies benefits the powerful
few, 1 focussing on their own existential concerns, 2 we
decided to narrow down our analysis of the argument
to social justic (i.e. restorative justice). This paper
signifies an edited version of Adnan Hadzi’s text on
Social Justice and Artificial Intelligence, 3 exploring the
notion of humanised artificial intelligence 4 in order to
discuss potential challenges society might face in the
future. The paper does not discuss current forms and
applications of artificial intelligence, as, so far, there
is no AI technology, which is self-conscious and self-
aware, being able to deal with emotional and social
intelligence. 5 It is a discussion around AI as a speculative
hypothetical entity. One could then ask, if such a speculative
self-conscious hardware/software system were created, at what
point could one talk of personhood? And what criteria could
there be in order to say an AI system was capable of
committing AI crimes?
Concerning what constitutes AI crimes the paper uses the
criteria given in Thomas King et al.’s paper Artificial
Intelligence Crime: An Interdisciplinary Analysis of Foreseeable
Threats and Solutions, 6 where King et al. coin the term “AI
crime”. We discuss the construction of the legal system through
the lens of political involvement of what one may want to
consider to be ‘powerful elites’ 7 . In doing so we will be
demonstrating that it is difficult to prove that the adoption of AI
technologies is undertaken in a way, which mainly serves a
powerful class in society. Nevertheless, analysing the culture
around AI technologies with regard to the nature of law with a
philosophical and sociological focus enables us to demonstrate
a utilitarian and authoritarian trend in the adoption of AI
technologies. Mason argues that “virtue ethics is the only
ethics fit for the task of imposing collective human control on
thinking machines” 8 and AI. We will apply virtue ethics to our
discourse around artificial intelligence and ethics.
As expert in AI safety Steve Omonhundro believes that AI is
“likely to behave in antisocial and harmful ways unless they are
very carefully designed.” 9 It is through virtue ethics that this
paper will propose for such a design to be centred around
restorative justice in order to take control over AI and thinking
machines, following Mason’s radical defence of the human and
his critique of current thoughts within trans- and post-
humanism as a submission to machine logic.
The paper will conclude by proposing an alternative
practically unattainable, approach to the current legal system
by looking into restorative justice for AI crimes, 10 and how the
ethics of care could be applied to AI technologies. In conclusion
the paper will discuss affect 11 and humanised artificial
intelligence with regards to the emotion of shame, when
dealing with AI crimes.
In order to discuss AI in relation to personhood this paper
follows the descriptive psychology method 12 of the paradigm
case formulation 13 developed by Peter Ossorio. 14 Similar to how
some animal rights activists call for certain animals to be
recognised as non-human persons, 15 this paper speculates on
the notion of AI as a non-human person being able to reflect on
ethical concerns. 16 Here Wynn Schwartz argues that “it is
reasonable to include non-humans as persons and to have
legitimate grounds for disagreeing where the line is properly
drawn. In good faith, competent judges using this formulation
can clearly point to where and why they agree or disagree on
what is to be included in the category of persons.” 17
In the case of AI technologies we ask whether the current
vision for the adoption of AI technologies, a vision which is
mainly supporting the military-industrial complex through vast
investments in army AI, 18 is a vision that benefits mainly
powerful elites. In order to discuss these questions, one has to
analyse the history of AI technologies leading to the kind of
‘humanised’ AI system this paper posits. The old-fashioned
approach, 19 some may still say contemporary approach, was to
primarily research into ‘mind-only’ 20 AI technologies/systems.
Through high level reasoning, researchers were optimistic that
AI technology would quickly become a reality.
Those early AI technologies were a disembodied approach
using high level logical and abstract symbols. By the end of the
80s researchers found that the disembodied approach was not
even achieving low level tasks humans could easily perform. 21
During that period many researchers stopped working on AI
technologies and systems, and the period is often referred to as
the “AI winter”. 22
Rodney Brooks then came forward with the proposition of
“Nouvelle AI”, 23 arguing that the old-fashioned approach did
not take into consideration motor skills and neural networks.
Only by the end of the 90s did researchers develop statistical
AI systems without the need for any high-level logical
reasoning; 24 instead AI systems were ‘guessing’ through
algorithms and machine learning. This signalled a first step
towards humanistic artificial intelligence, as this resembles
how humans make intuitive decisions; 25 here researchers
suggest that embodiment improves cognition. 26
With embodiment theory Brooks argued that AI systems
would operate best when computing only the data that was
absolutely necessary. 27 Further in Developing Embodied
Multisensory Dialogue Agents Michal Paradowski argues that
without considering embodiment, e.g. the physics of the brain,
it is not possible to create AI technologies/systems capable of
comprehension.
Foucault’s theories are especially helpful in discussing how
the “rule of truth” has disciplined civilisation, allowing for an
adoption of AI technologies which seem to benefit mainly the
upper-class. But then should we think of a notion of ‘deep-truth’
as the unwieldy product of deep learning AI algorithms?
Discussions around truth, Foucault states, form legislation into
something that “decides, transmits and itself extends upon the
effects of power” 28 . Foucault’s theories help to explain how
legislation, as an institution, is rolled out throughout society
with very little resistance, or “proletarian counter-justice” 29 .
Foucault explains that this has made the justice system and
legislation a for-profit system. With this understanding of
legislation, and social justice, one does need to reflect further
on Foucault’s notion of how disciplinary power seeks to express
its distributed nature in the modern state. Namely one has to
analyse the distributed nature of those AI technologies,
especially through networks and protocols, so that the link can
now be made to AI technologies becoming ‘legally’ more
profitable, in the hands of the upper-class.
In Protocol, Alexander Galloway describes how these
protocols changed the notion of power and how “control exists
after decentralization” 30 . Galloway argues that protocol has a
close connection to both Deleuze’s concept of control and
Foucault’s concept of biopolitics 31 by claiming that the key to
perceiving protocol as power is to acknowledge that “protocol
is an affective, aesthetic force that has control over life itself.” 32
Galloway suggests that it is important to discuss more than the
technologies, and to look into the structures of control within
technological systems, which also include underlying codes and
protocols, in order to distinguish between methods that can
support collective production, e.g. sharing of AI technologies
within society, and those that put the AI technologies in the
hands of the powerful few. 33 Galloway’s argument in the
chapter Hacking is that the existence of protocols “not only
installs control into a terrain that on its surface appears
actively to resist it” 34 , but goes on to create the highly
controlled network environment. For Galloway hacking is “an
index of protocological transformations taking place in the
broader world of techno-culture.” 35
Having said this, the prospect could be raised that
restorative justice might offer “a solution that could deliver
more meaningful justice” 36 . With respect to AI technologies,
and the potential inherent in them for AI crimes, instead of
following a retributive legislative approach, an ethical
discourse, 37 with a deeper consideration for the sufferers of AI
crimes should be adopted. 38 We ask: could restorative justice
offer an alternative way of dealing with the occurrence of AI
crimes? 39
Dale Millar and Neil Vidmar described two psychological
perceptions of justice. 40 One is behavioural control, following
the legal code as strictly as possible, punishing any
wrongdoer, 41 and second the restorative justice system, which
focuses on restoration where harm was done. Thus an
alternative approach for the ethical implementation of AI
technologies, with respect to legislation, might be to follow
restorative justice principles. Restorative justice would allow
for AI technologies to learn how to care about ethics. 42 Julia
Fionda describes restorative justice as a conciliation between
victim and offender, during which the offence is deliberated
upon. 43 Both parties try to come to an agreement on how to
achieve restoration for the damage done, to the situation
before the crime (here an AI crime) happened. Restorative
justice advocates compassion for the victim and offender, and a
consciousness on the part of the offenders as to the
repercussion of their crimes. The victims of AI crimes would
not only be placed in front of a court, but also be offered
engagement in the process of seeking justice and restoration. 44
Restorative justice might support victims of AI crimes better
than the punitive legal system, as it allows for the sufferers of
AI crimes to be heard in a personalised way, which could be
adopted to the needs of the victims (and offenders). As victims
and offenders represent themselves in restorative conferencing
sessions, these become much more affordable, 45 meaning that
the barrier to seeking justice due to the financial costs would
be partly eliminated, allowing for poor parties to be able to
contribute to the process of justice. This would benefit wider
society and AI technologies would not only be defined by a
powerful elite. Restorative justice could hold the potential not
only to discuss the AI crimes themselves, but also to get to the
root of the problem and discuss the cause of an AI crime. For
John Braithwaite restorative justice makes re-offending
harder. 46
In such a scenario, a future AI system capable of committing
AI crimes would need to have knowledge of ethics around the
particular discourse of restorative justice. The implementation
of AI technologies will lead to a discourse around who is
responsible for actions taken by AI technologies. Even when
considering clearly defined ethical guidelines, these might be
difficult to implement, 47 due to the pressure of competition AI
systems find themselves in. That said, this speculation is
restricted to humanised artificial intelligence systems. The
main hindrance for AI technologies to be part of a restorative
justice system might be that of the very human emotion of
shame. Without a clear understanding of shame it will be
impossible to resolve AI crimes in a restorative manner. 48
Thus one might want to think about a humanised symbiosis
between humans and technology, 49 along the lines of Garry
Kasparov’s advanced chess, 50 as in advanced jurisprudence. 51 A
legal system where human and machine work together on
restoring justice, for social justice. Furthering this perspective,
we suggest that reflections brought by new materialism should
also be taken into account: not only as a critical perspective on
the engendering and anthropomorphic representation of AI, but
also to broaden the spectrum of what we consider to be justice
in relation to all the living world. Without this new perspective
the sort of idealized AI image of a non-living intelligence that
deals with enormous amounts of information risks to serve the
abstraction of anthropocentric views into a computationalist
acceleration, with deafening results. Rather than such an
implosive perspective, the application of law and jurisprudence
may take advantage of AI’s computational and sensorial
enhanced capabilities by including all information gathered
from the environment, also that produced by plants, animals
and soil.
[^1]: Cp. G. Chaslot, “YouTube’s A.I. was divisive in the US presidential election”, Medium, November 27, 2016. Available at: https://medium.com/the-graph/youtubes-ai-is-neutral-towards-clicks-but-is-biased-towards-people-and-ideas-3a2f643dea9a#.tjuusil7 d [accessed February 25, 2018]; E. Morozov, “The Geopolitics Of Artificial Intelligence”, FutureFest, London, 2018. Available at: https://www.youtube.com/watch?v=7g0hx9LPBq8 [accessed October 25, 2019].
[^2]: Cp. M. Busby, “Use of ‘Killer Robots’ in Wars Would Breach Law, Say Campaigners”, The Guardian, August 21, 2018. Available at : https://web.archive.org/web/20181203074423/https://www.theguardian.com/science/2018/aug/21/use-of-killer-robots-in-wars-would-breach-law-say-campaigners [accessed October 25, 2019].
[^3]: Cp. A. Hadzi, “Social Justice and Artificial Intelligence”, Body, Space & Technology, 18 (1), 2019, pp. 145–174. Available at: https://doi.org/10.16995/bst.318 [accessed October 25, 2019].
[^4]: Cp. A. Kaplan and M. Haenlein, “Siri, Siri, in my Hand: Who’s the Fairest in the Land? On the Interpretations, Illustrations, and Implications of Artificial Intelligence”, Business Horizons, 62 (1), 2019, pp. 15–25. https://doi.org/10.1016/j.bushor.2018.08.0 04; S. Legg and M. Hutter, A Collection of Definitions of Intelligence, Lugano, Switzerland, IDSIA, 2007. Available at: http://arxiv.org/abs/0706.3639 [accessed October 25, 2019].2
[^5]:
[^6]:
[^7]:
[^8]:
[^9]: N. Bostrom, Superintelligence: Paths, Dangers, Strategies, Oxford, Oxford University Press, 2014. Cp. T. King, N. Aggarwal, M. Taddeo and L. Floridi, “Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions”, SSRN Scholarly Paper No. ID 3183238, Rochester, NY, Social Science Research Network, 2018. Available at: https://papers.ssrn.com/abstract=3183238 [accessed October 25, 2019]. P. Mason, Clear Bright Future, London, Allen Lane Publishers, 2019. Mason, Clear Bright Future. S. Omohundro, “Autonomous Technology and the Greater Human Good”, Journal of Experimental & Theoretical Artificial Intelligence, 26 (3), 2014, pp. 303–315, here: p. 303.3
[^10]: Cp. C. Cadwalladr, “Elizabeth Denham: ‘Data Crimes are Real Crimes”, The Guardian, July 15, 2018. Available at: https://web.archive.org/web/20181121235057/https://www.theguardian.com/uk-news/2018/jul/15/elizabeth-denham-data-protection-inf ormation-commissioner-facebook-cambridge-analytica [accessed October 25, 2019].
[^11]: Cp. B. Olivier, “Cyberspace, Simulation, Artificial Intelligence, Affectionate Machines and Being Human”, Communicatio, 38 (3), 2012, pp. 261–278. https://doi.org/10.1080 /02500167.2012.716763 [accessed October 25, 2019]; E.A. Wilson, Affect and Artificial Intelligence, Washington, University of Washington Press, 2011.
[^12]: Cp. P.G. Ossorio, The Behavior of Persons, Ann Arbor, Descriptive Psychology Press, 2013. Available at: http://www.sdp.org/sdppubs- publications/the-behavior-of-perso ns/ [accessed October 25, 2019].
[^13]: Cp. J. Jeffrey, “Knowledge Engineering: Theory and Practice”, Society for Descriptive Psychology, 5, 1990, pp. 105–122.
[^14]: Cp. P.G. Ossorio, Persons: The Collected Works of Peter G. Ossorio, Volume I. Ann Arbor, Descriptive Psychology Press, 1995. Available at: http://www.sdp.org/sdppubs-publications/persons-the-collected-works-of-peter-g-ossorio-volume-1/ [accessed October 25, 2019].
[^15]: Cp. M. Mountain, “Lawsuit Filed Today on Behalf of Chimpanzee Seeking Legal Personhood”, Nonhuman Rights Blog, December 2, 2013. Available at: https://www.nonhumanrights.org/blog/lawsuit-filed-today-on-behalf-of-chimpanzee-seeking-legal-personhood/ [accessed January 8, 2019]; M. Midgley, “Fellow Champions Dolphins as ‘Non-Human Persons’”, Oxford Centre for Animal Ethics, January 10, 2010. Available at: https://www.oxfordanimalethics.com/2010/01/fellow -champions-dolphins-as-%E2%80%9Cnon-human-persons%E2%80%9D/ [accessed January 8, 2019].
[^16]: Cp. R. Bergner, “The Tolstoy Dilemma: A Paradigm Case Formulation and Some Therapeutic Interventions”, in K.E. Davis, F. Lubuguin and W. Schwartz (eds.), Advances in Descriptive Psychology, Vol. 9, 2010, pp. 143–160. Available at: http://www.sdp.org/sdppubs-publications/advances-in-descriptive-psychology-vol-9; P. Laungani, “Mindless Psychiatry and Dubious Ethics”, Counselling Psychology4 Quarterly, 15 (1), 2002, pp. 23–33. Available at: https://doi.org/10.1080/09515070110102305 [accessed October 26, 2019].
[^17]: W. Schwartz, “What Is a Person and How Can We Be Sure? A Paradigm Case Formulation”, SSRN Scholarly Paper No. ID 2511486, Rochester, NY: Social Science Research Network, 2014. Available at: https://papers.ssrn.com/abstract=2511486 [accessed October 25, 2019].
[^18]: Cp. Mason, Clear Bright Future.
[^19]: Cp. M. Hoffman, and R. Pfeifer, “The Implications of Embodiment for Behavior and Cognition: Animal and Robotic Case Studies”, in W. Tschacher and C. Bergomi (eds.), The Implications of Embodiment: Cognition and Communication, Exeter, Andrews UK Limited, 2015, pp. 31– 58. Available at: https://arxiv.org/abs/1202.0440
[^20]: N.J. Nilsson, The Quest for Artificial Intelligence, Cambridge, Cambridge University Press, 2009.
[^21]: Cp. R. Brooks, Cambrian Intelligence: The Early History of the New AI, Cambridge, MA, A Bradford Book, 1999.
[^22]: Cp. D. Crevier, AI: The Tumultuous History of the Search for Artificial Intelligence, New York, Basic Books, 1993; H.P. Newquist, The Brain Makers, Indianapolis, Ind: Sams., 1994.
[^23]: Cp. R. Brooks, “A Robust Layered Control System for a Mobile Robot”, IEEE Journal on Robotics and Automation, 2 (1), 1986, pp. 14–23. Available at: https://doi.org/510.1109/JRA.1986.1087032 [accessed October 25, 2019].
24
Cp. Brooks, Cambrian Intelligence.
25
Cp. R. Pfeifer, “Embodied Artificial Intelligence”, presented at the
International Interdisciplinary Seminar on New Robotics, Evolution and
Embodied
Cognition,
Lisbon,
November,
2002.
Available
at:
https://www.informatics.indiana.edu/rocha/
publications/embrob/pfeifer.html [accessed October 25, 2019].
26
Cp. T. Renzenbrink, “Embodiment of Artificial Intelligence
Improves Cognition”, Elektormagazine, February 9, 2012. Available at:
https://www.elektormagazine.com/art
icles/embodiment-of-artificial-intelligence-improves-cognition
[accessed
January 10, 2019]; G. Zarkadakis, “Artificial Intelligence & Embodiment:
Does Alexa Have a Body?”, Medium, May 6, 2018. Available at:
https://medium.com/@georgezarkadakis
/artificial-intelligence-embodiment-does-alexa-have-a-body-d5b97521a201
[accessed January 10, 2019].
27
Cp. L. Steels and R. Brooks, The Artificial Life Route to Artificial
Intelligence: Building Embodied, Situated Agents, London/New York, Taylor
& Francis, 1995.
28
M. Foucault, “Disciplinary Power and Subjection”, in S. Lukes (ed.),
Power, New York, NYU Press, 1986, pp. 229–242, here: p. 230.
29
M. Foucault, Power, edited by C. Gordon, London, Penguin, 1980,
p. 34.6
30
A.R. Galloway, Protocol: How Control Exists After Decentralization,
Cambridge, MA, MIT Press, 2004, p. 81.
31
Cp. M. Foucault, The Birth of Biopolitics: Lectures at the
Collège de France, 1978–1979, London, Pan Macmillan, 2008.
32
Galloway, Protocol, p. 81.
33
Cp. Galloway, Protocol, p. 147.
34
Galloway, Protocol, p. 146.
35
Galloway, Protocol, p. 157.
36
Crook, Comparative Media Law and Ethics, p. 310.7
37
Cp. R. Courtland, “Bias Detectives: The Researchers Striving to
Make Algorithms Fair”, Nature, 558, 2018, pp. 357–360. Available at:
https://doi.org/10.1038/d41586-018-05469-3 [accessed October 25, 2019].
38
Cp. H. Fry, “We Hold People With Power to Account. Why Not
Algorithms?” The Guardian, September 17, 2018. Available at:
https://web.archive.org/web/201901021
94739/https://www.theguardian.com/commentisfree/2018/sep/17/power-
algorithms-technology-regulate [accessed October 25, 2019].
39
Cp. O. Etzioni, “How to Regulate Artificial Intelligence”, The New
York
Times,
January
20,
2018.
Available
at:
https://www.nytimes.com/2017/09/01/opinion/artificial-intelligence-
regulations-rules.html [accessed October 25, 2019]; A. Goel, “Ethics and
Artificial Intelligence”, The New York Times, December 22, 2017. Available
at: https://www.nytimes.com/2017/09/14/opinion/artificial-intelligence.html
[accessed October 25, 2019].
40
Cp. N. Vidmar and D.T. Miller, “Socialpsychological Processes
Underlying Attitudes Toward Legal Punishment”, Law and Society Review,
1980, pp. 565–602.
41
Cp. M. Wenzel and T.G. Okimoto, “How Acts of Forgiveness Restore
a Sense of Justice: Addressing Status/Power and Value Concerns Raised by
Transgressions”, European Journal of Social Psychology, 40 (3), 2010, pp.
401–417.
42
Cp. N. Bostrom and E. Yudkowsky, “The Ethics of Artificial
Intelligence”, in K. Frankish and W.M. Ramsey (ed.), The Cambridge
Handbook of Artificial Intelligence, Cambridge, Cambridge University Press,
2014, pp. 316–334; Frankish and Ramsey, The Cambridge Handbook of
Artificial Intelligence.
43
Cp. J. Fionda, Devils and Angels: Youth Policy and Crime, London,
Hart, 2005.8
44
Cp. Nils Christie, “Conflicts as Property”, The British Journal of
Criminology, 17 (1), 1977, pp. 1–15.
45
Cp. J. Braithwaite, “Restorative Justice and a Better Future”, in E.
McLaughlin and G. Hughes (eds.), Restorative Justice: Critical Issues,
London, SAGE, 2003, pp. 54–67.
46
Cp. J. Braithwaite, Crime, Shame and Reintegration, Cambridge,
Cambridge University Press, 1989.
47
Cp. A. Conn, “Podcast: Law and Ethics of Artificial Intelligence”,
Future
of
Life,
March
31,
2017.
Available
at:
https://futureoflife.org/2017/03/31/podcast-law-ethics-artificial-intelligence/
[accessed September, 22 2018].
48
Cp. A. Rawnsley, “Madeleine Albright: ‘The Things that are
Happening are Genuinely, Seriously Bad’”, The Guardian, July 8, 2018.
Available
at:
https://web.archive.org/web/20190106193657/https://www.theguardian.com9
/books/2018/jul/08/madeleine-albright-fascism-is-not-an-ideology-its-a-
method-interview-fascism-a-warning [accessed October 25, 2019].
49
Cp. D. Haraway, “A Cyborg Manifesto”, Socialist Review, 15 (2),
1985.
Available
at:
http://www.stanford.edu/dept/HPS/Haraway/CyborgManifesto.html
[accessed October 25, 2019]; C. Thompson, “The Cyborg Advantage”, Wired,
March 22, 2010. Available at: https://www.wired.com/2010/03/st-thompson-
cyborgs/ [accessed October 25, 2019].
50
Cp. J. Hipp et al., “Computer Aided Diagnostic Tools Aim to
Empower Rather than Replace Pathologists: Lessons Learned from
Computational Chess”, Journal of Pathology Informatics, 2, 2011. Available
at: https://doi.org/10.4103/2153-3539.82050 [accessed October 25, 2019].
51
Cp. J. Baggini, “Memo to Those Seeking to Live for Ever: Eternal
Life Would be Deathly Dull”, The Guardian, July 8, 2018. Available at:
https://web.archive.org/web/20181225111455/https://www.theguardian.com
/commentisfree/2018/jul/08/live-for-ever-eternal-life-deathly-dull-immortality
[accessed October 25, 2019].

5
content/text.md

@ -1,5 +0,0 @@
Title: First thing
Date: 2020-11-13 16:46
Category: Projections
First website page!

134
content/zabala_warning.md

@ -1,134 +0,0 @@
Title: The Philosophy of Warnings
Author: Santiago Zabala
Category: Articles
<div class="colophon">
<p> Published by: <br> Editing: <br> Design <br> Paper <br> Typeface <br>
</p><p id="colophon_right"> Sponsors: <br> Thanks: <br> Other <br>
</p></div>
<div class="first-page">
<div id="title_edition">Of Whirlpools and Tornadoes <br> A Nourishing Network</div>
<div id="amro">AMRO 2020</div>
<div id="author">Santiago Zabala</div>
<div id="title">The Philosophy of Warnings</div>
<div id="published">Published in the *Institute of Arts and Ideas* </div>
</div>
<header id="pageheader-issue">A Nourishing Network</header>
<header id="pageheader-theme">The Philosophy of Warnings</header>
<header id="pagefooter">)))))</header>
<div class="essay_content">
<p>This month an undergraduate student told me his parents were using the
pandemic to persuade him to avoid philosophy as it could not prevent or
solve real emergencies. I told him to let them know that we find
ourselves in this global emergency because we haven't thought
philosophically *enough*. The increasingly narrow focus of experts this
century has prevented us from addressing problems from a global
perspective, which has always been the distinctive approach of
philosophy. This is evident in the little consideration we give to
warnings. Too often these are discarded as useless or
insignificant---much like philosophy---when in fact they are vital.
Though philosophers can't solve an ongoing emergency---philosophy was
never meant to solve anything---we can interpret their signs through a
"philosophy of warnings." Although this philosophy probably won't change
the views of my student's parents, it might help us to reevaluate our
political, environmental, and technological priorities for the future.</p>
<p>Like recent philosophies of plants or
[[insects]{.underline}](http://cup.columbia.edu/book/a-philosophy-of-the-insect/9780231175791),
which emerged as a response to a global environmental crisis, a
"philosophy of warnings" is also a reaction to a global emergency that
requires philosophical elucidation. Although the ongoing pandemic has
triggered this new stance it isn't limited to this event. Nor is it
completely new. Warnings have been a topic of philosophical
investigation for centuries. The difference lies in the meaning these
concepts have acquired now. Before philosophy we had prophets to tell us
to be alert to the warnings of the Gods, but we secularized that office
into that of the philosopher, who, as one among equals, advised to heed
the signs; to use our imagination, because that is all we got. The
current pandemic has shown how little prepared we were for a global
emergency, even one whose coming has been
[[announced]{.underline}](https://www.nationalgeographic.com/science/2020/04/experts-warned-pandemic-decades-ago-why-not-ready-for-coronavirus/)
for decades. But why haven't we been able to take these warnings
seriously? Before tackling this question, let's recall how warnings have
been addressed philosophically.</p>
<p>Examples of warning philosophy can be traced back to Greek mythology and
Plato\'s *Apology*. Apollo provided Cassandra with the gift of prophecy
even though she could not convince others of the validity of her
predictions, and Socrates warned the Athenians---after he was sentenced
to death---that their inequity and mendacity undermined the democracy
they claimed to honor. Against Gaston Bachelard, who coined the term
"Cassandra complex" to refer to the idea that events could be known in
advance, Theodore Adorno warned that any claim to know the future should
be avoided. It is probably in this spirit that Walter Benjamin warned we
should pull the brake on the train of progress as it was stacking
disaster upon disaster. In line with Hannah Arendt's warnings of the
reemergence of totalitarianism after the Second World War, Giorgio
Agamben began his book on the current pandemic with "A Warning":
biosecurity will now serve governments to rule through a new form of
tyranny called "technological-sanitary" despotism.</p>
<p>These examples illustrate the difference between warnings and
predictions. Warnings are sustained by signs in the present that request
our involvement, as Benjamin suggests. Predictions call out what will
take place regardless of our actions, a future as the only continuation
of the present, but warnings instead point toward what is to come and
are meant involve us in a radical break, a discontinuity with the
present signaled by alarming signs that we are asked to confront. The
problem is not the involvement warnings request from us but rather
whether we are willing to confront them at all. The volume of vital
warnings that we ignore---climate change, social inequality, refugee
crises---is alarming; it has become our greatest emergency.</p>
<p>Indifference towards warnings is rooted in the ongoing global return to
order and realism in the twenty-first century. This return is not only
political, as demonstrated by the various right-wing populist forces
that have taken office around the world, but also cultural as the return
of some contemporary
[[intellectuals]{.underline}](https://arcade.stanford.edu/blogs/returning-order-through-realism)
to Eurocentric Cartesian realism demonstrates. The idea that we can
still claim access to truth without being dependent upon interpretation
presupposes that knowledge of objective facts is enough to guide our
lives. Within this theoretical framework warnings are cast off as
unfounded, contingent, and subjective, even though philosophers of
science such as Bruno Latour continue to
[[remind]{.underline}](https://www.wiley.com/en-us/Down+to+Earth%3A+Politics+in+the+New+Climatic+Regime-p-9781509530564)
us that no "attested knowledge can stand on its own." The internet and,
in particular, social media have intensified this realist view, further
discrediting traditional vectors of legitimation (international
agencies, major newspapers, or credentialed academics) and rendering any
tweet by an anonymous blogger credible because it presents itself as
transparent, direct, and genuine. "The quickness of social media, as
Judith Butler [[pointed
out]{.underline}](https://www.newstatesman.com/international/2020/09/judith-butler-culture-wars-jk-rowling-and-living-anti-intellectual-times),
allows for forms of vitriol that do not exactly support thoughtful
debate."</p>
<p>Our inability to take warnings seriously has devastating consequences,
as recent months make clear. The central argument in favor of a
philosophy of warnings is not whether what it warns of comes to pass but
rather the pressure it exercises against those emergencies hidden and
subsumed under the global call to order. This pressure demands that our
political, environmental, and technological priorities be reconsidered,
revealing the alarming signs of democratic backsliding, biodiversity
loss, and commodification of our lives by surveillance capitalism. These
warnings are also why we should oppose any demand to "return to
normality," which signals primarily a desire to ignore what caused this
pandemic in the first place. A philosophy of warnings seeks to alter and
interrupt the reality we've become accustomed to.</p>
<p>Although a philosophy of warnings will not prevent future emergencies,
it will resist the ongoing silencing of emergencies under the guise of
realism by challenging our framed global order and its realist
advocates. This philosophy is not meant to rescue us *from* emergencies
but rather rescue us *into* emergencies that we are trained to ignore.</p>
</div>
<div class="bio">
[[Santiago Zabala]{.underline}](http://www.santiagozabala.com/) is ICREA
Research Professor of Philosophy at the Pompeu Fabra University in
Barcelona. His most recent book is *Being at Large: Freedom in the Age
of Alternative Facts* (McGill-Queen's University Press, 2020).</div>

6
pelicanconf.py

@ -13,8 +13,8 @@ TIMEZONE = 'Europe/Amsterdam'
DEFAULT_DATE = 'fs' DEFAULT_DATE = 'fs'
DEFAULT_LANG = 'en' DEFAULT_LANG = 'en'
# DISPLAY_PAGES_ON_MENU = True DISPLAY_PAGES_ON_MENU = True
# DISPLAY_CATEGORIES_ON_MENU = True DISPLAY_CATEGORIES_ON_MENU = False
# Feed settings # Feed settings
FEED_DOMAIN = SITEURL FEED_DOMAIN = SITEURL
@ -32,7 +32,7 @@ AUTHOR_FEED_ATOM = None
PATH = 'content' PATH = 'content'
PAGE_PATHS = ['pages'] PAGE_PATHS = ['pages']
STATIC_PATHS = [ 'images', 'favicon.ico', 'ascii-art' ] STATIC_PATHS = [ 'images', 'favicon.ico' ]
THEME = 'themes/basic' THEME = 'themes/basic'
THEME_STATIC_DIR = 'theme' THEME_STATIC_DIR = 'theme'

1
themes/basic/static/css/main.css

@ -12,7 +12,6 @@ body {
header, header,
#subscribe, #subscribe,
#instructions,
footer{ footer{
position: relative; position: relative;
width: calc(100% - 4em); width: calc(100% - 4em);

8
themes/basic/static/css/print.css

@ -32,14 +32,14 @@
size:A4; size:A4;
margin-bottom: 2in; margin-bottom: 2in;
@bottom-center { @bottom-center {
content: counter(page, first-except); content: counter(page);
font-size: 16px; font-size: 16px;
font-family: "White Rabbit"; font-family: "White Rabbit";
} }
@bottom-left { @bottom-left {
/* content: " ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (( \A ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ((";*/ /* content: " ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (( \A ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ((";*/
content: "o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o"; content: "o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o";
font-size: 18px; font-size: 16px;
white-space: pre-wrap; white-space: pre-wrap;
font-family: "Unifont"; font-family: "Unifont";
margin-bottom: 1.2in; margin-bottom: 1.2in;
@ -166,7 +166,7 @@
.essay_content { .essay_content {
font-family: 'Unifont'; font-family: 'Unifont';
font-size: 18px; font-size: 16px;
line-height: 1.6; line-height: 1.6;
page-break-before: always; page-break-before: always;
@ -179,7 +179,7 @@
.bio { .bio {
font-family: 'Unifont'; font-family: 'Unifont';
font-size: 18px; font-size: 16px;
margin-top: 500px; margin-top: 500px;
margin-left: 400px; margin-left: 400px;
page-break-after: always; page-break-after: always;

2
themes/basic/templates/base.html

@ -26,7 +26,7 @@
{% endfor %} {% endfor %}
{% endif %} {% endif %}
{% for page in pages %} {% for page in pages %}
<a href="{{ SITEURL }}/{{ page.link }}">{{ page.title }}</a> <a href="{{ SITEURL }}/{{ page.url }}">{{ page.title }}</a>
{% endfor %} {% endfor %}
</div> </div>
</nav> </nav>

1
themes/basic/templates/index.html

@ -31,7 +31,6 @@ o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
</div> </div>
</article> </article>
<pre> <pre>
) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ))
</pre> </pre>
{% endfor %} {% endfor %}

Loading…
Cancel
Save