Merge branch 'master' of https://git.vvvvvvaria.org/mb/AMRO-2020-publication
This commit is contained in:
commit
28bd03d237
4
Makefile
4
Makefile
@ -77,8 +77,10 @@ md=$(wildcard content/Essays/*.md)
|
|||||||
md2pdf=$(md:%.md=%.pdf)
|
md2pdf=$(md:%.md=%.pdf)
|
||||||
|
|
||||||
%.pdf: %.md themes/basic/static/css/print.css
|
%.pdf: %.md themes/basic/static/css/print.css
|
||||||
pandoc -f markdown_mmd --pdf-engine=weasyprint -c themes/basic/static/css/print.css $< -o $@
|
pandoc -f markdown -t html -c themes/basic/static/css/print.css $< -o $@.html
|
||||||
|
pandoc --pdf-engine=weasyprint -c themes/basic/static/css/print.css $< -o $@
|
||||||
|
|
||||||
print: $(md2pdf)
|
print: $(md2pdf)
|
||||||
|
$(shell mv content/Essays/*.html content/print/)
|
||||||
$(shell mv content/Essays/*.pdf content/print/)
|
$(shell mv content/Essays/*.pdf content/print/)
|
||||||
|
|
||||||
|
@ -0,0 +1,715 @@
|
|||||||
|
### How to Build a Low-tech Internet
|
||||||
|
|
||||||
|
Wireless internet access is on the rise in both modern consumer
|
||||||
|
societies and in the developing world.
|
||||||
|
|
||||||
|
In rich countries, however, the focus is on always-on connectivity and
|
||||||
|
ever higher access speeds. In poor countries, on the other hand,
|
||||||
|
connectivity is achieved through much more low-tech, often asynchronous
|
||||||
|
networks.
|
||||||
|
|
||||||
|
While the high-tech approach pushes the costs and energy use of the
|
||||||
|
internet [higher and
|
||||||
|
higher](https://www.lowtechmagazine.com/2015/10/can-the-internet-run-on-renewable-energy.html),
|
||||||
|
the low-tech alternatives result in much cheaper and very energy
|
||||||
|
efficient networks that combine well with renewable power production and
|
||||||
|
are resistant to disruptions.
|
||||||
|
|
||||||
|
If we want the internet to keep working in circumstances where access to
|
||||||
|
energy is more limited, we can learn important lessons from alternative
|
||||||
|
network technologies. Best of all, there\'s no need to wait for
|
||||||
|
governments or companies to facilitate: we can build our own resilient
|
||||||
|
communication infrastructure if we cooperate with one another. This is
|
||||||
|
demonstrated by several community networks in Europe, of which the
|
||||||
|
largest has more than 35,000 users already.
|
||||||
|
|
||||||
|
[]{#anchor}Picture: A node in the [Scottish Tegola
|
||||||
|
Network](http://www.tegola.org.uk/hebnet/).
|
||||||
|
|
||||||
|
More than half of the global population does not have access to the
|
||||||
|
\"worldwide\" web. Up to now, the internet is mainly an urban
|
||||||
|
phenomenon, especially in \"developing\" countries. Telecommunication
|
||||||
|
companies are usually reluctant to extend their network outside cities
|
||||||
|
due to a combination of high infrastructure costs, low population
|
||||||
|
density, limited ability to pay for services, and an unreliable or
|
||||||
|
non-existent electricity infrastructure. Even in remote regions of
|
||||||
|
\"developed\" countries, internet connectivity isn\'t always available.
|
||||||
|
|
||||||
|
Internet companies such as Facebook and Google regularly make headlines
|
||||||
|
with plans for connecting these remote regions to the internet. Facebook
|
||||||
|
tries to achieve this with drones, while Google counts on high-altitude
|
||||||
|
balloons. There are major technological challenges, but the main
|
||||||
|
objection to these plans is their commercial character. Obviously,
|
||||||
|
Google and Facebook want to connect more people to the internet because
|
||||||
|
that would increase their revenues. Facebook especially receives lots of
|
||||||
|
criticism because their network promotes their own site in particular,
|
||||||
|
and blocks most other internet applications. \[1\]
|
||||||
|
|
||||||
|
Meanwhile, several research groups and network enthusiasts have
|
||||||
|
developed and implemented much cheaper alternative network technologies
|
||||||
|
to solve these issues. Although these low-tech networks have proven
|
||||||
|
their worth, they have received much less attention. Contrary to the
|
||||||
|
projects of internet companies, they are set up by small organisations
|
||||||
|
or by the users themselves. This guarantees an open network that
|
||||||
|
benefits the users instead of a handful of corporations. At the same
|
||||||
|
time, these low-tech networks are very energy efficient.
|
||||||
|
|
||||||
|
****WiFi-based Long Distance Networks****
|
||||||
|
|
||||||
|
Most low-tech networks are based on WiFi, the same technology that
|
||||||
|
allows mobile access to the internet in most western households. As we
|
||||||
|
have seen in the previous article, [sharing these devices could provide
|
||||||
|
free mobile access across densely populated
|
||||||
|
cities](https://www.lowtechmagazine.com/2015/10/the-4g-network-thats-already-there.html).
|
||||||
|
But the technology can be equally useful in sparsely populated areas.
|
||||||
|
Although the WiFi-standard was developed for short-distance data
|
||||||
|
communication (with a typical range of about 30 metres), its reach can
|
||||||
|
be extended through modifications of the Media Access Control (MAC)
|
||||||
|
layer in the networking protocol, and through the use of range extender
|
||||||
|
amplifiers and directional antennas. \[2\]
|
||||||
|
|
||||||
|
Although the WiFi-standard was developed for short-distance data
|
||||||
|
communication, its reach can be extended to cover distances of more than
|
||||||
|
100 kilometres.
|
||||||
|
|
||||||
|
The longest unamplified WiFi link is a 384 km wireless point-to-point
|
||||||
|
connection between Pico El Águila and Platillón in Venezuela,
|
||||||
|
established a few years ago. \[3,4\] However, WiFi-based long distance
|
||||||
|
networks usually consist of a combination of shorter point-to-point
|
||||||
|
links, each between a few kilometres and one hundred kilometers long at
|
||||||
|
most. These are combined to create larger, multihop networks.
|
||||||
|
Point-to-points links, which form the backbone of a long range WiFi
|
||||||
|
network, are combined with omnidirectional antennas that distribute the
|
||||||
|
signal to individual households (or public institutions) of a community.
|
||||||
|
|
||||||
|
Picture: A relay with three point-to-point links and three sectoral
|
||||||
|
antennae.
|
||||||
|
[Tegola](http://www.tegola.org.uk/howto/network-planning.html).
|
||||||
|
|
||||||
|
Long-distance WiFi links require line of sight to make a connection \--
|
||||||
|
in this sense, the technology resembles the [18th century optical
|
||||||
|
telegraph](https://www.lowtechmagazine.com/2007/12/email-in-the-18.html).
|
||||||
|
\[5\] If there\'s no line of sight between two points, a third relay is
|
||||||
|
required that can see both points, and the signal is sent to the
|
||||||
|
intermediate relay first. Depending on the terrain and particular
|
||||||
|
obstacles, more hubs may be necessary. \[6\]
|
||||||
|
|
||||||
|
Point-to-point links typically consist of two directional antennas, one
|
||||||
|
focused on the next node and the other on the previous node in the
|
||||||
|
network. Nodes can have multiple antennas with one antenna per fixed
|
||||||
|
point-to-point link to each neighbour. \[7\] This allows mesh routing
|
||||||
|
protocols that can dynamically select which links to choose for routing
|
||||||
|
among the available ones. \[8\]
|
||||||
|
|
||||||
|
Long-distance WiFi links require line of sight to make a connection \--
|
||||||
|
in this sense, the technology resembles the 18th century optical
|
||||||
|
telegraph.
|
||||||
|
|
||||||
|
Distribution nodes usually consist of a sectoral antenna (a small
|
||||||
|
version of the things you see on mobile phone masts) or a conventional
|
||||||
|
WiFi-router, together with a number of receivers in the community. \[6\]
|
||||||
|
For short distance WiFi-communication, there is no requirement for line
|
||||||
|
of sight between the transmitter and the receiver. \[9\]
|
||||||
|
|
||||||
|
To provide users with access to the worldwide internet, a long range
|
||||||
|
WiFi network should be connected to the main backbone of the internet
|
||||||
|
using at least one \"backhaul\" or \"gateway node\". This can be a
|
||||||
|
dial-up or broadband connection (DSL, fibre or satellite). If such a
|
||||||
|
link is not established, users would still be able to communicate with
|
||||||
|
each other and view websites set up on local servers, but they would not
|
||||||
|
be able to access the internet. \[10\]
|
||||||
|
|
||||||
|
****Advantages of Long Range WiFi****
|
||||||
|
|
||||||
|
Long range WiFi offers high bandwidth (up to 54 Mbps) combined with very
|
||||||
|
low capital costs. Because the WiFi standard enjoys widespread
|
||||||
|
acceptance and has huge production volumes, off-the-shelf antennas and
|
||||||
|
wireless cards can be bought for very little money. \[11\]
|
||||||
|
Alternatively, components can be put together [from discarded
|
||||||
|
materials](http://roelof.info/projects/%282014%29Pretty_Fly_For_A_Wifi/)
|
||||||
|
such as old routers, satellite dish antennas and laptops. Protocols like
|
||||||
|
WiLDNet run on a 266 Mhz processor with only 128 MB memory, so an old
|
||||||
|
computer will do the trick. \[7\]
|
||||||
|
|
||||||
|
The WiFi-nodes are lightweight and don\'t need expensive towers \--
|
||||||
|
further decreasing capital costs, and minimizing the impact of the
|
||||||
|
structures to be built. \[7\] More recently, single units that combine
|
||||||
|
antenna, wireless card and processor have become available. These are
|
||||||
|
very convenient for installation. To build a relay, one simply connects
|
||||||
|
such units together with ethernet cables that carry both signal and
|
||||||
|
power. \[6\] The units can be mounted in towers or slim masts, given
|
||||||
|
that they offer little windload. \[3\] Examples of suppliers of long
|
||||||
|
range WiFi components are [Ubiquity](https://www.ubnt.com/),
|
||||||
|
[Alvarion](http://www.alvarion.com/) and
|
||||||
|
[MikroTik](http://www.mikrotik.com/), and
|
||||||
|
[simpleWiFi](https://www.simplewifi.com/).
|
||||||
|
|
||||||
|
Long Range WiFi makes use of unlicensed spectrum and offers high
|
||||||
|
bandwidth, low capital costs, easy installation, and low power
|
||||||
|
requirements.
|
||||||
|
|
||||||
|
Long range WiFi also has low operational costs due to low power
|
||||||
|
requirements. A typical mast installation consisting of two long
|
||||||
|
distance links and one or two wireless cards for local distribution
|
||||||
|
consumes around 30 watts. \[6,12\] In several low-tech networks, nodes
|
||||||
|
are entirely powered by solar panels and batteries. Another important
|
||||||
|
advantage of long range WiFi is that it makes use of unlicensed spectrum
|
||||||
|
(2.4 and 5 GHz), and thus avoids negotiations with telecom operators and
|
||||||
|
government. This adds to the cost advantage and allows basically anyone
|
||||||
|
to start a WiFi-based long distance network. \[9\]
|
||||||
|
|
||||||
|
****Long Range WiFi Networks in Poor Countries****
|
||||||
|
|
||||||
|
The first long range WiFi networks were set up ten to fifteen years ago.
|
||||||
|
In poor countries, two main types have been built. The first is aimed at
|
||||||
|
providing internet access to people in remote villages. An example is
|
||||||
|
the Akshaya network in India, which covers the entire Kerala State and
|
||||||
|
is one of the largest wireless networks in the world. The infrastructure
|
||||||
|
is built around approximately 2,500 \"computer access centers\", which
|
||||||
|
are open to the local population \-- direct ownership of computers is
|
||||||
|
minimal in the region. \[13\]
|
||||||
|
|
||||||
|
Another example, also in India, are the AirJaldi networks which provide
|
||||||
|
internet access to approximately 20,000 users in six states, all in
|
||||||
|
remote regions and on difficult terrain. Most nodes in this network are
|
||||||
|
solar-powered and the distance between them can range up to 50 km or
|
||||||
|
more. \[14\] In some African countries, local WiFi-networks distribute
|
||||||
|
internet access from a satellite gateway. \[15,16\]
|
||||||
|
|
||||||
|
A node in the AirJaldi network. Picture: AirJaldi.
|
||||||
|
|
||||||
|
A second type of long distance WiFi network in poor countries is aimed
|
||||||
|
at providing telemedicine to remote communities. In remote regions,
|
||||||
|
health care is often provided through health posts scarcely equipped and
|
||||||
|
attended by health technicians who are barely trained. \[17\] Long-range
|
||||||
|
WiFi networks can connect urban hospitals with these outlying health
|
||||||
|
posts, allowing doctors to remotely support health technicians using
|
||||||
|
high-resolution file transfers and real-time communication tools based
|
||||||
|
on voice and video.
|
||||||
|
|
||||||
|
An example is the link between Cabo Pantoja and Iquitos in the Loreto
|
||||||
|
province in Peru, which was established in 2007. The 450 km network
|
||||||
|
consists of 17 towers which are 16 to 50 km apart. The line connects 15
|
||||||
|
medical outposts in remote villages with the main hospital in Iquitos
|
||||||
|
and is aimed at remote diagnosis of patients. \[17,18\] All equipment is
|
||||||
|
powered by solar panels. \[18,19\] Other succesful examples of long
|
||||||
|
range WiFi telemedicine networks have been built in India, Malawi and
|
||||||
|
Ghana. \[20,21\]
|
||||||
|
|
||||||
|
****WiFi-Based Community Networks in Europe****
|
||||||
|
|
||||||
|
The low-tech networks in poor countries are set up by NGO\'s,
|
||||||
|
governments, universities or businesses. In contrast, most of the
|
||||||
|
WiFi-based long distance networks in remote regions of rich countries
|
||||||
|
are so-called \"community networks\": the users themselves build, own,
|
||||||
|
power and maintain the infrastructure. Similar to the shared wireless
|
||||||
|
approach in cities, reciprocal resource sharing forms the basis of these
|
||||||
|
networks: participants can set up their own node and connect to the
|
||||||
|
network (for free), as long as their node also allows traffic of other
|
||||||
|
members. Each node acts as a WiFi routing device that provides IP
|
||||||
|
forwarding services and a data link to all users and nodes connected to
|
||||||
|
it. \[8,22\]
|
||||||
|
|
||||||
|
In a community network, the users themselves build, own, power and
|
||||||
|
maintain the infrastructure.
|
||||||
|
|
||||||
|
Consequently, with each new user, the network becomes larger. There is
|
||||||
|
no a-priori overall planning. A community network grows bottom-up,
|
||||||
|
driven by the needs of its users, as nodes and links are added or
|
||||||
|
upgraded following demand patterns. The only consideration is to connect
|
||||||
|
a node from a new participant to an existing one. As a node is powered
|
||||||
|
on, it discovers it neighbours, attributes itself a unique IP adress,
|
||||||
|
and then establishes the most appropriate routes to the rest of the
|
||||||
|
network, taking into account the quality of the links. Community
|
||||||
|
networks are open to participation to everyone, sometimes according to
|
||||||
|
an open peering agreement. \[8,9,19,22\]
|
||||||
|
|
||||||
|
Wireless links in the Spanish Guifi network.
|
||||||
|
[Credit](https://iuliinet.github.io/presentazione_ottobre_2014/img/barcellona.jpg).
|
||||||
|
|
||||||
|
Despite the lack of reliable statistics, community networks seem to be
|
||||||
|
rather succesful, and there are several large ones in Europe, such as
|
||||||
|
[Guifi.net](https://guifi.net/) (Spain), [Athens Wireless Metropolitan
|
||||||
|
Network](http://www.awmn.gr/content.php?s=ce506a41ab245641d6934638c6f6f107)
|
||||||
|
(Greece), [FunkFeuer](http://www.funkfeuer.at/) (Austria), and
|
||||||
|
[Freifunk](https://freifunk.net/en/) (Germany). \[8,22,23,24\] The
|
||||||
|
Spanish network is the largest WiFi-based long distance network in the
|
||||||
|
world with more than 50,000 kilometres of links, although a small part
|
||||||
|
is based on optic fibre links. Most of it is located in the Catalan
|
||||||
|
Pyrenees, one of the least populated areas in Spain. The network was
|
||||||
|
initiated in 2004 and now has close to 30,000 nodes, up from 17,000 in
|
||||||
|
2012. \[8,22\]
|
||||||
|
|
||||||
|
Guifi.net provides internet access to individuals, companies,
|
||||||
|
administrations and universities. In principle, the network is
|
||||||
|
installed, powered and maintained by its users, although volunteer teams
|
||||||
|
and even commercial installers are present to help. Some nodes and
|
||||||
|
backbone upgrades have been succesfully crowdfunded by indirect
|
||||||
|
beneficiaries of the network. \[8,22\]
|
||||||
|
|
||||||
|
****Performance of Low-tech Networks****
|
||||||
|
|
||||||
|
So how about the performance of low-tech networks? What can you do with
|
||||||
|
them? The available bandwidth per user can vary enormously, depending on
|
||||||
|
the bandwidth of the gateway node(s) and the number of users, among
|
||||||
|
other factors. The long-distance WiFi networks aimed at telemedicine in
|
||||||
|
poor countries have few users and a good backhaul, resulting in high
|
||||||
|
bandwidth (+ 40 Mbps). This gives them a similar performance to fibre
|
||||||
|
connections in the developed world. A study of (a small part of) the
|
||||||
|
Guifi.net community network, which has dozens of gateway nodes and
|
||||||
|
thousands of users, showed an average throughput of 2 Mbps, which is
|
||||||
|
comparable to a relatively slow DSL connection. Actual throughput per
|
||||||
|
user varies from 700 kbps to 8 Mbps. \[25\]
|
||||||
|
|
||||||
|
The available bandwidth per user can vary enormously, depending on the
|
||||||
|
bandwidth of the gateway node(s) and the number of users, among other
|
||||||
|
factors
|
||||||
|
|
||||||
|
However, the low-tech networks that distribute internet access to a
|
||||||
|
large user base in developing countries can have much more limited
|
||||||
|
bandwidth per user. For example, a university campus in Kerala (India)
|
||||||
|
uses a 750 kbps internet connection that is shared across 3,000 faculty
|
||||||
|
members and students operating from 400 machines, where during peak
|
||||||
|
hours nearly every machine is being used.
|
||||||
|
|
||||||
|
Therefore, the worst-case average bandwidth available per machine is
|
||||||
|
approximately 1.9 kbps, which is slow even in comparison to a dial-up
|
||||||
|
connection (56 kbps). And this can be considered a really good
|
||||||
|
connectivity compared to typical rural settings in poor countries.
|
||||||
|
\[26\] To make matters worse, such networks often have to deal with an
|
||||||
|
intermittent power supply.
|
||||||
|
|
||||||
|
Under these circumstances, even the most common internet applications
|
||||||
|
have poor performance, or don\'t work at all. The communication model of
|
||||||
|
the internet is based on a set of network assumptions, called the TCP/IP
|
||||||
|
protocol suite. These include the existence of a bi-directional
|
||||||
|
end-to-end path between the source (for example a website\'s server) and
|
||||||
|
the destination (the user\'s computer), short round-trip delays, and low
|
||||||
|
error rates.
|
||||||
|
|
||||||
|
Many low-tech networks in poor countries do not comform to these
|
||||||
|
assumptions. They are characterized by intermittent connectivity or
|
||||||
|
\"network partitioning\" \-- the absence of an end-to-end path between
|
||||||
|
source and destination \-- long and variable delays, and high error
|
||||||
|
rates. \[21,27,28\]
|
||||||
|
|
||||||
|
****Delay-Tolerant Networks****
|
||||||
|
|
||||||
|
Nevertheless, even in such conditions, the internet could work perfectly
|
||||||
|
fine. The technical issues can be solved by moving away from the
|
||||||
|
always-on model of traditional networks, and instead design networks
|
||||||
|
based upon asynchronous communication and intermittent connectivity.
|
||||||
|
These so-called \"delay-tolerant networks\" (DTNs) have their own
|
||||||
|
specialized protocols overlayed on top of the lower protocols and do not
|
||||||
|
utilize TCP. They overcome the problems of intermittent connectivity and
|
||||||
|
long delays by using store-and-forward message switching.
|
||||||
|
|
||||||
|
Information is forwarded from a storage place on one node to a storage
|
||||||
|
place on another node, along a path that *eventually* reaches its
|
||||||
|
destination. In contrast to traditional internet routers, which only
|
||||||
|
store incoming packets for a few milliseconds on memory chips, the nodes
|
||||||
|
of a delay-tolerant network have persistent storage (such as hard disks)
|
||||||
|
that can hold information indefinitely. \[27,28\]
|
||||||
|
|
||||||
|
Delay-tolerant networks combine well with renewable energy: solar panels
|
||||||
|
or wind turbines could power network nodes only when the sun shines or
|
||||||
|
the wind blows, eliminating the need for energy storage.
|
||||||
|
|
||||||
|
Delay-tolerant networks don\'t require an end-to-end path between source
|
||||||
|
and destination. Data is simply transferred from node to node. If the
|
||||||
|
next node is unavailable because of long delays or a power outage, the
|
||||||
|
data is stored on the hard disk until the node becomes available again.
|
||||||
|
While it might take a long time for data to travel from source to
|
||||||
|
destination, a delay-tolerant network ensures that it will eventually
|
||||||
|
arrive.
|
||||||
|
|
||||||
|
Delay-tolerant networks further decrease capital costs and energy use,
|
||||||
|
leading to the most efficient use of scarce resources. They keep working
|
||||||
|
with an intermittent energy supply and they combine well with renewable
|
||||||
|
energy sources: solar panels or wind turbines could power network nodes
|
||||||
|
only when the sun shines or the wind blows, eliminating the need for
|
||||||
|
energy storage.
|
||||||
|
|
||||||
|
****Data Mules****
|
||||||
|
|
||||||
|
Delay-tolerant networking can take surprising forms, especially when
|
||||||
|
they take advantage of some non-traditional means of communication, such
|
||||||
|
as \"data mules\". \[11,29\] In such networks, conventional
|
||||||
|
transportation technologies \-- buses, cars, motorcycles, trains, boats,
|
||||||
|
airplanes \-- are used to ferry messages from one location to another in
|
||||||
|
a store-and-forward manner.
|
||||||
|
|
||||||
|
Examples are DakNet and KioskNet, which use buses as data mules.
|
||||||
|
\[30-34\] In many developing regions, rural bus routes regularly visit
|
||||||
|
villages and towns that have no network connectivity. By equipping each
|
||||||
|
vehicle with a computer, a storage device and a mobile WiFi-node on the
|
||||||
|
one hand, and by installing a stationary WiFi-node in each village on
|
||||||
|
the other hand, the local transport infrastructure can substitute for a
|
||||||
|
wireless internet link. \[11\]
|
||||||
|
|
||||||
|
Picture: AirJaldi.
|
||||||
|
|
||||||
|
Outgoing data (such as sent emails or requests for webpages) is stored
|
||||||
|
on local computers in the village until the bus comes withing range. At
|
||||||
|
this point, the fixed WiFi-node of the local computer automatically
|
||||||
|
transmits the data to the mobile WiFi-node of the bus. Later, when the
|
||||||
|
bus arrives at a hub that is connected to the internet, the outgoing
|
||||||
|
data is transmitted from the mobile WiFi-node to the gateway node, and
|
||||||
|
then to the internet. Data sent to the village takes the opposite route.
|
||||||
|
The bus \-- or data \-- driver doesn\'t require any special skills and
|
||||||
|
is completely oblivious to the data transfers taking place. He or she
|
||||||
|
does not need to do anything other than come in range of the nodes.
|
||||||
|
\[30,31\]
|
||||||
|
|
||||||
|
In a data mules network, the local transport infrastructure substitutes
|
||||||
|
for a wireless internet link.
|
||||||
|
|
||||||
|
The use of data mules offers some extra advantages over more
|
||||||
|
\"sophisticated\" delay-tolerant networks. A \"drive-by\" WiFi network
|
||||||
|
allows for small, low-cost and low-power radio devices to be used, which
|
||||||
|
don\'t require line of sight and consequently no towers \-- further
|
||||||
|
lowering capital costs and energy use compared to other low-tech
|
||||||
|
networks. \[30,31,32\]
|
||||||
|
|
||||||
|
The use of short-distance WiFi-links also results in a higher bandwidth
|
||||||
|
compared to long-distance WiFi-links, which makes data mules better
|
||||||
|
suited to transfer larger files. On average, 20 MB of data can be moved
|
||||||
|
in each direction when a bus passes a fixed WiFi-node. \[30,32\] On the
|
||||||
|
other hand, latency (the time interval between sending and receiving
|
||||||
|
data) is usually higher than on long-range WiFi-links. A single bus
|
||||||
|
passing by a village once a day gives a latency of 24 hours.
|
||||||
|
|
||||||
|
****Delay-Tolerant Software****
|
||||||
|
|
||||||
|
Obviously, a delay-tolerant network (DTN) \-- whatever its form \-- also
|
||||||
|
requires new software: applications that function without a connected
|
||||||
|
end-to-end networking path. \[11\] Such custom applications are also
|
||||||
|
useful for synchronous, low bandwidth networks. Email is relatively easy
|
||||||
|
to adapt to intermittent connectivity, because it\'s an asynchronous
|
||||||
|
communication method by itself. A DTN-enabled email client stores
|
||||||
|
outgoing messages until a connection is available. Although emails may
|
||||||
|
take longer to reach their destination, the user experience doesn\'t
|
||||||
|
really change.
|
||||||
|
|
||||||
|
A Freifunk WiFi-node is installed in Berlin, Germany. Picture:[
|
||||||
|
Wikipedia
|
||||||
|
Commons](https://upload.wikimedia.org/wikipedia/commons/5/51/Freifunk-Initiative_in_Berlin-Kreuzberg.jpg).
|
||||||
|
|
||||||
|
Browsing and searching the web requires more adaptations. For example,
|
||||||
|
most search engines optimize for speed, assuming that a user can quickly
|
||||||
|
look through the returned links and immediately run a second modified
|
||||||
|
search if the first result is inadequate. However, in intermittent
|
||||||
|
networks, multiple rounds of interactive search would be impractical.
|
||||||
|
\[26,35\] Asynchronous search engines optimize for bandwith rather than
|
||||||
|
response time. \[26,30,31,35,36\] For example, RuralCafe desynchronizes
|
||||||
|
the search process by performing many search tasks in an offline manner,
|
||||||
|
refining the search request based on a database of similar searches. The
|
||||||
|
actual retrieval of information using the network is only done when
|
||||||
|
absolutely necessary.
|
||||||
|
|
||||||
|
Many internet applications could be adapted to intermittent networks,
|
||||||
|
such as webbrowsing, email, electronic form filling, interaction with
|
||||||
|
e-commerce sites, blogsoftware, large file downloads, or social media.
|
||||||
|
|
||||||
|
Some DTN-enabled browsers download not only the explicitly requested
|
||||||
|
webpages but also the pages that are linked to by the requested pages.
|
||||||
|
\[30\] Others are optimized to return low-bandwidth results, which are
|
||||||
|
achieved by filtering, analysis, and compression on the server site. A
|
||||||
|
similar effect can be achieved through the use of a service like
|
||||||
|
[Loband](http://www.loband.org/loband/), which strips webpages of
|
||||||
|
images, video, advertisements, social media buttons, and so on, merely
|
||||||
|
presenting the textual content. \[26\]
|
||||||
|
|
||||||
|
Browsing and searching on intermittent networks can also be improved by
|
||||||
|
local caching (storing already downloaded pages) and prefetching
|
||||||
|
(downloading pages that might be retrieved in the future). \[206\] Many
|
||||||
|
other internet applications could also be adapted to intermittent
|
||||||
|
networks, such as electronic form filling, interaction with e-commerce
|
||||||
|
sites, blogsoftware, large file downloads, social media, and so on.
|
||||||
|
\[11,30\] All these applications would remain possible, though at lower
|
||||||
|
speeds.
|
||||||
|
|
||||||
|
****Sneakernets****
|
||||||
|
|
||||||
|
Obviously, real-time applications such as internet telephony, media
|
||||||
|
streaming, chatting or videoconferencing are impossible to adapt to
|
||||||
|
intermittent networks, which provide only asynchronous communication.
|
||||||
|
These applications are also difficult to run on synchronous networks
|
||||||
|
that have limited bandwidth. Because these are the applications that are
|
||||||
|
in large part responsible for the growing energy use of the internet,
|
||||||
|
one could argue that their incompatibility with low-tech networks is
|
||||||
|
actually a good thing (see the [previous
|
||||||
|
article](https://www.lowtechmagazine.com/2015/10/can-the-internet-run-on-renewable-energy.html)).
|
||||||
|
|
||||||
|
Furthermore, many of these applications could be organized in different
|
||||||
|
ways. While real-time voice or video conversations won\'t work, it\'s
|
||||||
|
perfectly possible to send and receive voice or video messages. And
|
||||||
|
while streaming media can\'t happen, downloading music albums and video
|
||||||
|
remains possible. Moreover, these files could be \"transmitted\" by the
|
||||||
|
most low-tech internet technology available: a sneakernet. In a
|
||||||
|
sneakernet, digital data is \"wirelessly\" transmitted using a storage
|
||||||
|
medium such as a hard disk, a USB-key, a flash card, or a CD or DVD.
|
||||||
|
Before the arrival of the internet, all computer files were exchanged
|
||||||
|
via a sneakernet, using tape or floppy disks as a storage medium.
|
||||||
|
|
||||||
|
Stuffing a cargo train full of digital storage media would beat any
|
||||||
|
digital network in terms of speed, cost and energy efficiency. Picture:
|
||||||
|
Wikipedia Commons.
|
||||||
|
|
||||||
|
Just like a data mules network, a sneakernet involves a vehicle, a
|
||||||
|
messenger on foot, or an animal (such as a [carrier
|
||||||
|
pigeon](https://www.lowtechmagazine.com/2009/02/sneakernet-beats-internet.html)).
|
||||||
|
However, in a sneakernet there is no automatic data transfer between the
|
||||||
|
mobile node (for instance, a vehicle) and the stationary nodes (sender
|
||||||
|
and recipient). Instead, the data first have to be transferred from the
|
||||||
|
sender\'s computer to a portable storage medium. Then, upon arrival, the
|
||||||
|
data have to be transferred from the portable storage medium to the
|
||||||
|
receiver\'s computer. \[30\] A sneakernet thus requires manual
|
||||||
|
intervention and this makes it less convenient for many internet
|
||||||
|
applications.
|
||||||
|
|
||||||
|
There are exceptions, though. For example, a movie doesn\'t have to be
|
||||||
|
transferred to the hard disk of your computer in order to watch it. You
|
||||||
|
play it straight from a portable hard disk or slide a disc into the
|
||||||
|
DVD-player. Moreover, a sneakernet also offers an important advantage:
|
||||||
|
of all low-tech networks, it has the most bandwidth available. This
|
||||||
|
makes it perfectly suited for the distribution of large files such as
|
||||||
|
movies or computer games. In fact, when very large files are involved, a
|
||||||
|
sneakernet even beats the fastest fibre internet connection. At lower
|
||||||
|
internet speeds, sneakernets can be advantageous for much smaller files.
|
||||||
|
|
||||||
|
Technological progress will not lower the advantage of a sneakernet.
|
||||||
|
Digital storage media evolve at least as fast as internet connections
|
||||||
|
and they both improve communication in an equal way.
|
||||||
|
|
||||||
|
****Resilient Networks****
|
||||||
|
|
||||||
|
While most low-tech networks are aimed at regions where the alternative
|
||||||
|
is often no internet connection at all, their usefulness for
|
||||||
|
well-connected areas cannot be overlooked. The internet as we know it in
|
||||||
|
the industrialized world is a product of an abundant energy supply, a
|
||||||
|
robust electricity infrastructure, and sustained economic growth. This
|
||||||
|
\"high-tech\" internet might offer some fancy advantages over the
|
||||||
|
low-tech networks, but it cannot survive if these conditions change.
|
||||||
|
This makes it extremely vulnerable.
|
||||||
|
|
||||||
|
The internet as we know it in the industrialized world is a product of
|
||||||
|
an abundant energy supply, a robust electricity infrastructure, and
|
||||||
|
sustained economic growth. It cannot survive if these conditions change.
|
||||||
|
|
||||||
|
Depending on their level of resilience, low-tech networks can remain in
|
||||||
|
operation when the supply of fossil fuels is interrupted, when the
|
||||||
|
electricity infrastructure deteriorates, when the economy grinds to a
|
||||||
|
halt, or if other calamities should hit. Such a low-tech internet would
|
||||||
|
allow us to surf the web, send and receive e-mails, shop online, share
|
||||||
|
content, and so on. Meanwhile, data mules and sneakernets could serve to
|
||||||
|
handle the distribution of large files such as videos. Stuffing a cargo
|
||||||
|
vessel or a train full of digital storage media would beat any digital
|
||||||
|
network in terms of speed, cost and energy efficiency. And if such a
|
||||||
|
transport infrastructure would no longer be available, we could still
|
||||||
|
rely on messengers on foot, [cargo
|
||||||
|
bikes](https://www.lowtechmagazine.com/2014/05/modular-cargo-cycles.html)
|
||||||
|
and [sailing vessels](https://www.lowtechmagazine.com/sailing-ships/).
|
||||||
|
|
||||||
|
Such a hybrid system of online and offline applications would remain a
|
||||||
|
very powerful communication network \-- unlike anything we had even in
|
||||||
|
the late twentieth century. Even if we envision a doom scenario in which
|
||||||
|
the wider internet infrastructure would disintegrate, isolated low-tech
|
||||||
|
networks would still be very useful local and regional communication
|
||||||
|
technologies. Furthermore, they could obtain content from other remote
|
||||||
|
networks through the exchange of portable storage media. The internet,
|
||||||
|
it appears, can be as low-tech or high-tech as we can afford it to be.
|
||||||
|
|
||||||
|
Kris De Decker (edited by [Jenna
|
||||||
|
Collett](https://www.linkedin.com/pub/jenna-collett/1a/925/b3))
|
||||||
|
|
||||||
|
This article has been translated into
|
||||||
|
[Spanish](https://solar.lowtechmagazine.com/es/2015/10/how-to-build-a-low-tech-internet.html).
|
||||||
|
|
||||||
|
****Sources & Notes:****
|
||||||
|
|
||||||
|
DIY: [Wireless networking in the developing
|
||||||
|
world](http://wndw.net/book.html#readBook) (Third Edition) is a free
|
||||||
|
book about designing, implementing and maintaining low-cost wireless
|
||||||
|
networks. Available in English, French, and Spanish.
|
||||||
|
|
||||||
|
\[1\] [Connecting the unwired world with balloons, satellites, lasers &
|
||||||
|
drones](https://tech.slashdot.org/story/15/09/03/214256/connecting-the-unwired-world-with-balloons-satellites-lasers-drones),
|
||||||
|
Slashdot, 2015
|
||||||
|
|
||||||
|
\[2\] [A QoS-aware dynamic bandwidth allocation scheme for multi-hop
|
||||||
|
WiFi-based long distance
|
||||||
|
networks](https://link.springer.com/article/10.1186%2Fs13638-015-0352-z#/page-1),
|
||||||
|
Iftekhar Hussain et al., 2015
|
||||||
|
|
||||||
|
\[3\] [Long-distance, Low-Cost Wireless Data
|
||||||
|
Transmission](http://www.ursi.org/files/RSBissues/RSB_339_2011_12.pdf)
|
||||||
|
(PDF), Ermanno Pietrosemoli, 2011
|
||||||
|
|
||||||
|
\[4\] This link could only be established thanks to the height of the
|
||||||
|
endpoints (4,200 and 1,500 km) and the flatness of the middle ground.
|
||||||
|
The curvature of the Earth makes longer point-to-point WiFi-links
|
||||||
|
difficult to achieve because line of sight between two points is
|
||||||
|
required.
|
||||||
|
|
||||||
|
\[5\] Radio waves occupy a volume around the optical line, which must be
|
||||||
|
unemcumbered from obstacles. This volume is known as the Fresnel
|
||||||
|
ellipsoid and its size grows with the distance between the two end
|
||||||
|
points and with the wavelength of the signal, which is in turn inversely
|
||||||
|
proportional to the frequency. Thus, it is required to leave extra
|
||||||
|
\"elbow room\" for the Fresnel zone. \[9\]
|
||||||
|
|
||||||
|
\[6\] [A Brief History of the Tegola
|
||||||
|
Project](http://www.tegola.org.uk/tegola-history.html), Tegola Project,
|
||||||
|
retrieved October 2015
|
||||||
|
|
||||||
|
\[7\] [WiLDNet: Design and Implementation of High Performance WiFi based
|
||||||
|
Long Distance
|
||||||
|
Networks](http://tier.cs.berkeley.edu/docs/wireless/wild_multihop.pdf)
|
||||||
|
(PDF), Rabin Patra et al., 2007
|
||||||
|
|
||||||
|
\[8\] [Topology Patterns of a Community Network:
|
||||||
|
Guifi.net](http://dsg.ac.upc.edu/sites/default/files/1569633605.pdf)
|
||||||
|
(PDF), Davide Vega et al., 2012
|
||||||
|
|
||||||
|
\[9\] [Global Access to the Internet for All, internet
|
||||||
|
draft](https://trac.tools.ietf.org/group/irtf/trac/wiki/gaia), Internet
|
||||||
|
Engineering Task Force (IETF), 2015
|
||||||
|
|
||||||
|
\[10\] This is what happened to Afghanistan\'s JLINK network when
|
||||||
|
[funding for the network\'s satellite link ran dry in
|
||||||
|
2012](https://www.wired.com/2012/05/jlink/).
|
||||||
|
|
||||||
|
\[11\] [The case for technology in developing
|
||||||
|
regions](https://www.cs.cmu.edu/~mattkam/lab/publications/Computer2005.pdf)
|
||||||
|
(PDF), Eric Brewer et al., 2005
|
||||||
|
|
||||||
|
\[12\] [Beyond Pilots: Keeping Rural Wireless Networks
|
||||||
|
Alive](https://www.usenix.org/legacy/event/nsdi08/tech/full_papers/surana/surana.pdf)
|
||||||
|
(PDF), Sonesh Surana et al., 2008
|
||||||
|
|
||||||
|
\[13\] <http://www.akshaya.kerala.gov.in/>
|
||||||
|
|
||||||
|
\[14\] <http://main.airjaldi.com/>
|
||||||
|
|
||||||
|
\[15\] [VillageCell: Cost Effective Cellular Connectivity in Rural
|
||||||
|
Areas](http://www.cs.bham.ac.uk/~pejovicv/docs/Anand12ICTD.pdf) (PDF),
|
||||||
|
Abhinav Anand et al., 2012
|
||||||
|
|
||||||
|
\[16\] [Deployment and Extensio of a Converged WiMAX/WiFi Network for
|
||||||
|
Dwesa Community Area South
|
||||||
|
Africa](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.452.7357&rep=rep1&type=pdf)
|
||||||
|
(PDF), N. Ndlovu et al., 2009
|
||||||
|
|
||||||
|
\[17\] \"[A telemedicine network optimized for long distances in the
|
||||||
|
Amazonian jungle of
|
||||||
|
Peru](http://www.ehas.org/wp-content/uploads/2012/01/Extremecomm_sig_ISBN.pdf)\"
|
||||||
|
(PDF), Carlos Rey-Moreno, ExtremeCom \'11, September 2011
|
||||||
|
|
||||||
|
\[18\] \"[Telemedicine networks of EHAS Foundation in Latin
|
||||||
|
America](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4197650/)\",
|
||||||
|
Ignacio Prieto-Egido et al., in \"Frontiers in Public Health\", October
|
||||||
|
15, 2014.
|
||||||
|
|
||||||
|
\[19\] \"[The design of a wireless solar-powered router for rural
|
||||||
|
environments isolated from health
|
||||||
|
facilities](https://eciencia.urjc.es/bitstream/handle/10115/2293/THE%20DESIGN%20OF%20A%20WIRELESS%20SOLAR-POWERED-2008.pdf?sequence=1)\"
|
||||||
|
(PDF), Francisco Javier Simo Reigadas et al., in \"IEEE Wireless
|
||||||
|
Communications\", June 2008.
|
||||||
|
|
||||||
|
\[20\] [On a long wireless link for rural telemedicine in
|
||||||
|
Malawi](http://users.ictp.it/~mzennaro/Malawi.pdf) (PDF), M. Zennaro et
|
||||||
|
al., 2008
|
||||||
|
|
||||||
|
\[21\] [A Survey of Delay- and Disruption-Tolerant Networking
|
||||||
|
Applications](http://www.jie-online.org/index.php/jie/article/view/91),
|
||||||
|
Artemios G. Voyiatzis, 2012
|
||||||
|
|
||||||
|
\[22\] [Supporting Cloud Deployment in the Guifi Community
|
||||||
|
Network](https://www.sics.se/~amir/files/download/papers/guifi.pdf)
|
||||||
|
(PDF), Roger Baig et al., 2013
|
||||||
|
|
||||||
|
\[23\] [A Case for Research with and on Community
|
||||||
|
Networks](http://www.sigcomm.org/sites/default/files/ccr/papers/2013/July/2500098-2500108.pdf)
|
||||||
|
(PDF), Bart Braem et.al, 2013
|
||||||
|
|
||||||
|
\[24\] There are smaller networks in Scotland
|
||||||
|
([Tegola](http://www.tegola.org.uk/)), Slovenia ([wlan
|
||||||
|
slovenija](https://wlan-si.net/)), Belgium ([Wireless
|
||||||
|
Antwerpen](http://www.wirelessantwerpen.be/)), and the Netherlands
|
||||||
|
([Wireless Leiden](https://www.wirelessleiden.nl/)), among others.
|
||||||
|
Australia has [Melbourne Wireless](http://melbourne.wireless.org.au/).
|
||||||
|
In Latin America, numerous examples exists, such as [Bogota
|
||||||
|
Mesh](https://www.facebook.com/BogotaMesh) (Colombia) and [Monte Video
|
||||||
|
Libre](http://picandocodigo.net/2008/montevideolibre-redes-libres-en-montevideo/)
|
||||||
|
(Uruguay). Some of these networks are interconnected. This is the case
|
||||||
|
for the Belgian and Dutch community networks, and for the Slovenian and
|
||||||
|
Austrian networks. \[8,22,23\]
|
||||||
|
|
||||||
|
\[25\] [Proxy performance analysis in a community wireless
|
||||||
|
network](http://upcommons.upc.edu/handle/2099.1/19710), Pablo Pitarch
|
||||||
|
Miguel, 2013
|
||||||
|
|
||||||
|
\[26\] [RuralCafe: Web Search in the Rural Developing
|
||||||
|
World](http://www.ambuehler.ethz.ch/CDstore/www2009/proc/docs/p411.pdf)
|
||||||
|
(PDF), Jay Chen et al., 2009
|
||||||
|
|
||||||
|
\[27\] [A Delay-Tolerant Network Architecture for Challenged
|
||||||
|
Networks](http://www.kevinfall.com/seipage/papers/p27-fall.pdf) (PDF),
|
||||||
|
Kevin Fall, 2003
|
||||||
|
|
||||||
|
\[28\] [Delay- and Disruption-Tolerant Networks (DTNs) \-- A Tutorial
|
||||||
|
(version
|
||||||
|
2.0)](http://ipnsig.org/wp-content/uploads/2012/07/DTN_Tutorial_v2.04.pdf)
|
||||||
|
(PDF), Forrest Warthman, 2012
|
||||||
|
|
||||||
|
\[29\] [Healthcare Supported by Data Mule Networks in Remote Communities
|
||||||
|
of the Amazon
|
||||||
|
Region](http://www.hindawi.com/journals/isrn/2014/730760/), Mauro
|
||||||
|
Margalho Coutinho et al., 2014
|
||||||
|
|
||||||
|
\[30\] [First Mile Solutions\' Daknet Takes Rural Communities
|
||||||
|
Online](http://www.firstmilesolutions.com/documents/FMS_Case_Study.pdf)
|
||||||
|
(PDF), Carol Chyau and Jean-Francois Raymond, 2005
|
||||||
|
|
||||||
|
\[31\] [DakNet: A Road to Universal Broadband
|
||||||
|
Connectivity](http://courses.media.mit.edu/2003fall/de/DakNet-Case.pdf)
|
||||||
|
(PDF), Amir Alexander Hasson et al., 2003
|
||||||
|
|
||||||
|
\[32\] [DakNet: Architecture and Connectivity in Developing
|
||||||
|
Nations](http://ijpret.com/publishedarticle/2015/4/IJPRET%20-%20ECN%20115.pdf)
|
||||||
|
(PDF), Madhuri Bhole, 2015
|
||||||
|
|
||||||
|
\[33\] [Delay Tolerant Networks and Their
|
||||||
|
Applications](http://www.citeulike.org/user/tnhh/article/13517347),
|
||||||
|
Longxiang Gao et al., 2015
|
||||||
|
|
||||||
|
\[34\] [Low-cost communication for rural internet kiosks using
|
||||||
|
mechanical
|
||||||
|
backhaul](https://people.csail.mit.edu/matei/papers/2006/mobicom_kiosks.pdf),
|
||||||
|
A. Seth et al., 2006
|
||||||
|
|
||||||
|
\[35\] [Searching the World Wide Web in Low-Connectivity
|
||||||
|
Communities](http://tek.sourceforge.net/papers/tek-www02.pdf) (PDF),
|
||||||
|
William Thies et al., 2002
|
||||||
|
|
||||||
|
\[36\] [Slow Search: Information Retrieval without Time
|
||||||
|
Constraints](https://www.cs.cmu.edu/~yubink/hcir2013.pdf) (PDF), Jaime
|
||||||
|
Teevan, 2013
|
||||||
|
|
||||||
|
\[37\] [Potential for Collaborative Caching and Prefetching in
|
||||||
|
Largely-Disconnected
|
||||||
|
Villages](http://mrmgroup.cs.princeton.edu/papers/isaacman-winsdr503.pdf)
|
||||||
|
(PDF), Sibren Isaacman et al., 2008
|
||||||
|
|
||||||
|
--
|
||||||
|
--
|
||||||
|
|
||||||
|
Posted on October 26, 2015 at 12:26 AM in [Access to
|
||||||
|
information](https://www.lowtechmagazine.com/copyright_and_access_to_information/),
|
||||||
|
[Communications](https://www.lowtechmagazine.com/communications/),
|
||||||
|
[Cover story](https://www.lowtechmagazine.com/cover-story/),
|
||||||
|
[DIY](https://www.lowtechmagazine.com/diy/),
|
||||||
|
[Internet](https://www.lowtechmagazine.com/internet/), [Wireless
|
||||||
|
technology](https://www.lowtechmagazine.com/wireless_technology/) \|
|
||||||
|
[Permalink](https://www.lowtechmagazine.com/2015/10/how-to-build-a-low-tech-internet.html)
|
@ -1,6 +1,3 @@
|
|||||||
Title: 'The Pandemic's Dark Cloud'
|
|
||||||
Author: Mel Hogan
|
|
||||||
|
|
||||||
"The Pandemic\'s Dark Cloud" was written in November 2020 as a
|
"The Pandemic\'s Dark Cloud" was written in November 2020 as a
|
||||||
reflection on the relationship between the pandemic and environmental
|
reflection on the relationship between the pandemic and environmental
|
||||||
media, with a focus on "the cloud" and its undergirding networked
|
media, with a focus on "the cloud" and its undergirding networked
|
||||||
@ -21,7 +18,7 @@ McLuhan lecture at the Canadian Embassy in Berlin, and giving a plenary
|
|||||||
at transmediale 2020.\
|
at transmediale 2020.\
|
||||||
\@mel\_hogan / melhogan.com / mhogan\@ucalgary.ca*
|
\@mel\_hogan / melhogan.com / mhogan\@ucalgary.ca*
|
||||||
|
|
||||||
# The Pandemic\'s Dark Cloud by Mél Hogan
|
**The Pandemic\'s Dark Cloud **by Mél Hogan
|
||||||
|
|
||||||
As the pandemic settled into consciousness across the globe, humans
|
As the pandemic settled into consciousness across the globe, humans
|
||||||
devolved. People in countries where the response to COVID-19 was most
|
devolved. People in countries where the response to COVID-19 was most
|
||||||
|
398
content/Essays/Re-Centralization-of-AI.md
Normal file
398
content/Essays/Re-Centralization-of-AI.md
Normal file
@ -0,0 +1,398 @@
|
|||||||
|
Title: Re-Centralization of AI focusing on Social Justice
|
||||||
|
Author: Adnan Hadzi, Denis Roio
|
||||||
|
|
||||||
|
# RE - CENTRALIZATION OF AI FOCUSING ON SOCIAL JUSTICE
|
||||||
|
|
||||||
|
In order to lay the foundations for a discussion around
|
||||||
|
the argument that the adoption of artificial
|
||||||
|
intelligence (AI) technologies benefits the powerful
|
||||||
|
few, 1 focussing on their own existential concerns, 2 we
|
||||||
|
decided to narrow down our analysis of the argument
|
||||||
|
to social justic (i.e. restorative justice). This paper
|
||||||
|
signifies an edited version of Adnan Hadzi’s text on
|
||||||
|
Social Justice and Artificial Intelligence, 3 exploring the
|
||||||
|
notion of humanised artificial intelligence 4 in order to
|
||||||
|
discuss potential challenges society might face in the
|
||||||
|
future. The paper does not discuss current forms and
|
||||||
|
applications of artificial intelligence, as, so far, there
|
||||||
|
is no AI technology, which is self-conscious and self-
|
||||||
|
aware, being able to deal with emotional and social
|
||||||
|
intelligence. 5 It is a discussion around AI as a speculative
|
||||||
|
hypothetical entity. One could then ask, if such a speculative
|
||||||
|
self-conscious hardware/software system were created, at what
|
||||||
|
point could one talk of personhood? And what criteria could
|
||||||
|
there be in order to say an AI system was capable of
|
||||||
|
committing AI crimes?
|
||||||
|
Concerning what constitutes AI crimes the paper uses the
|
||||||
|
criteria given in Thomas King et al.’s paper Artificial
|
||||||
|
Intelligence Crime: An Interdisciplinary Analysis of Foreseeable
|
||||||
|
Threats and Solutions, 6 where King et al. coin the term “AI
|
||||||
|
crime”. We discuss the construction of the legal system through
|
||||||
|
the lens of political involvement of what one may want to
|
||||||
|
consider to be ‘powerful elites’ 7 . In doing so we will be
|
||||||
|
demonstrating that it is difficult to prove that the adoption of AI
|
||||||
|
technologies is undertaken in a way, which mainly serves a
|
||||||
|
powerful class in society. Nevertheless, analysing the culture
|
||||||
|
around AI technologies with regard to the nature of law with a
|
||||||
|
philosophical and sociological focus enables us to demonstrate
|
||||||
|
a utilitarian and authoritarian trend in the adoption of AI
|
||||||
|
technologies. Mason argues that “virtue ethics is the only
|
||||||
|
ethics fit for the task of imposing collective human control on
|
||||||
|
thinking machines” 8 and AI. We will apply virtue ethics to our
|
||||||
|
discourse around artificial intelligence and ethics.
|
||||||
|
As expert in AI safety Steve Omonhundro believes that AI is
|
||||||
|
“likely to behave in antisocial and harmful ways unless they are
|
||||||
|
very carefully designed.” 9 It is through virtue ethics that this
|
||||||
|
paper will propose for such a design to be centred around
|
||||||
|
restorative justice in order to take control over AI and thinking
|
||||||
|
machines, following Mason’s radical defence of the human and
|
||||||
|
his critique of current thoughts within trans- and post-
|
||||||
|
humanism as a submission to machine logic.
|
||||||
|
|
||||||
|
The paper will conclude by proposing an alternative
|
||||||
|
practically unattainable, approach to the current legal system
|
||||||
|
by looking into restorative justice for AI crimes, 10 and how the
|
||||||
|
ethics of care could be applied to AI technologies. In conclusion
|
||||||
|
the paper will discuss affect 11 and humanised artificial
|
||||||
|
intelligence with regards to the emotion of shame, when
|
||||||
|
dealing with AI crimes.
|
||||||
|
In order to discuss AI in relation to personhood this paper
|
||||||
|
follows the descriptive psychology method 12 of the paradigm
|
||||||
|
case formulation 13 developed by Peter Ossorio. 14 Similar to how
|
||||||
|
some animal rights activists call for certain animals to be
|
||||||
|
recognised as non-human persons, 15 this paper speculates on
|
||||||
|
the notion of AI as a non-human person being able to reflect on
|
||||||
|
ethical concerns. 16 Here Wynn Schwartz argues that “it is
|
||||||
|
reasonable to include non-humans as persons and to have
|
||||||
|
legitimate grounds for disagreeing where the line is properly
|
||||||
|
drawn. In good faith, competent judges using this formulation
|
||||||
|
can clearly point to where and why they agree or disagree on
|
||||||
|
what is to be included in the category of persons.” 17
|
||||||
|
In the case of AI technologies we ask whether the current
|
||||||
|
vision for the adoption of AI technologies, a vision which is
|
||||||
|
mainly supporting the military-industrial complex through vast
|
||||||
|
investments in army AI, 18 is a vision that benefits mainly
|
||||||
|
powerful elites. In order to discuss these questions, one has to
|
||||||
|
analyse the history of AI technologies leading to the kind of
|
||||||
|
‘humanised’ AI system this paper posits. The old-fashioned
|
||||||
|
approach, 19 some may still say contemporary approach, was to
|
||||||
|
primarily research into ‘mind-only’ 20 AI technologies/systems.
|
||||||
|
Through high level reasoning, researchers were optimistic that
|
||||||
|
AI technology would quickly become a reality.
|
||||||
|
Those early AI technologies were a disembodied approach
|
||||||
|
using high level logical and abstract symbols. By the end of the
|
||||||
|
80s researchers found that the disembodied approach was not
|
||||||
|
even achieving low level tasks humans could easily perform. 21
|
||||||
|
During that period many researchers stopped working on AI
|
||||||
|
technologies and systems, and the period is often referred to as
|
||||||
|
the “AI winter”. 22
|
||||||
|
Rodney Brooks then came forward with the proposition of
|
||||||
|
“Nouvelle AI”, 23 arguing that the old-fashioned approach did
|
||||||
|
|
||||||
|
not take into consideration motor skills and neural networks.
|
||||||
|
Only by the end of the 90s did researchers develop statistical
|
||||||
|
AI systems without the need for any high-level logical
|
||||||
|
reasoning; 24 instead AI systems were ‘guessing’ through
|
||||||
|
algorithms and machine learning. This signalled a first step
|
||||||
|
towards humanistic artificial intelligence, as this resembles
|
||||||
|
how humans make intuitive decisions; 25 here researchers
|
||||||
|
suggest that embodiment improves cognition. 26
|
||||||
|
With embodiment theory Brooks argued that AI systems
|
||||||
|
would operate best when computing only the data that was
|
||||||
|
absolutely necessary. 27 Further in Developing Embodied
|
||||||
|
Multisensory Dialogue Agents Michal Paradowski argues that
|
||||||
|
without considering embodiment, e.g. the physics of the brain,
|
||||||
|
it is not possible to create AI technologies/systems capable of
|
||||||
|
comprehension.
|
||||||
|
Foucault’s theories are especially helpful in discussing how
|
||||||
|
the “rule of truth” has disciplined civilisation, allowing for an
|
||||||
|
adoption of AI technologies which seem to benefit mainly the
|
||||||
|
upper-class. But then should we think of a notion of ‘deep-truth’
|
||||||
|
as the unwieldy product of deep learning AI algorithms?
|
||||||
|
Discussions around truth, Foucault states, form legislation into
|
||||||
|
something that “decides, transmits and itself extends upon the
|
||||||
|
effects of power” 28 . Foucault’s theories help to explain how
|
||||||
|
legislation, as an institution, is rolled out throughout society
|
||||||
|
with very little resistance, or “proletarian counter-justice” 29 .
|
||||||
|
|
||||||
|
Foucault explains that this has made the justice system and
|
||||||
|
legislation a for-profit system. With this understanding of
|
||||||
|
legislation, and social justice, one does need to reflect further
|
||||||
|
on Foucault’s notion of how disciplinary power seeks to express
|
||||||
|
its distributed nature in the modern state. Namely one has to
|
||||||
|
analyse the distributed nature of those AI technologies,
|
||||||
|
especially through networks and protocols, so that the link can
|
||||||
|
now be made to AI technologies becoming ‘legally’ more
|
||||||
|
profitable, in the hands of the upper-class.
|
||||||
|
In Protocol, Alexander Galloway describes how these
|
||||||
|
protocols changed the notion of power and how “control exists
|
||||||
|
after decentralization” 30 . Galloway argues that protocol has a
|
||||||
|
close connection to both Deleuze’s concept of control and
|
||||||
|
Foucault’s concept of biopolitics 31 by claiming that the key to
|
||||||
|
perceiving protocol as power is to acknowledge that “protocol
|
||||||
|
is an affective, aesthetic force that has control over life itself.” 32
|
||||||
|
Galloway suggests that it is important to discuss more than the
|
||||||
|
technologies, and to look into the structures of control within
|
||||||
|
technological systems, which also include underlying codes and
|
||||||
|
protocols, in order to distinguish between methods that can
|
||||||
|
support collective production, e.g. sharing of AI technologies
|
||||||
|
within society, and those that put the AI technologies in the
|
||||||
|
hands of the powerful few. 33 Galloway’s argument in the
|
||||||
|
chapter Hacking is that the existence of protocols “not only
|
||||||
|
installs control into a terrain that on its surface appears
|
||||||
|
actively to resist it” 34 , but goes on to create the highly
|
||||||
|
controlled network environment. For Galloway hacking is “an
|
||||||
|
index of protocological transformations taking place in the
|
||||||
|
broader world of techno-culture.” 35
|
||||||
|
Having said this, the prospect could be raised that
|
||||||
|
restorative justice might offer “a solution that could deliver
|
||||||
|
more meaningful justice” 36 . With respect to AI technologies,
|
||||||
|
and the potential inherent in them for AI crimes, instead of
|
||||||
|
following a retributive legislative approach, an ethical
|
||||||
|
|
||||||
|
discourse, 37 with a deeper consideration for the sufferers of AI
|
||||||
|
crimes should be adopted. 38 We ask: could restorative justice
|
||||||
|
offer an alternative way of dealing with the occurrence of AI
|
||||||
|
crimes? 39
|
||||||
|
Dale Millar and Neil Vidmar described two psychological
|
||||||
|
perceptions of justice. 40 One is behavioural control, following
|
||||||
|
the legal code as strictly as possible, punishing any
|
||||||
|
wrongdoer, 41 and second the restorative justice system, which
|
||||||
|
focuses on restoration where harm was done. Thus an
|
||||||
|
alternative approach for the ethical implementation of AI
|
||||||
|
technologies, with respect to legislation, might be to follow
|
||||||
|
restorative justice principles. Restorative justice would allow
|
||||||
|
for AI technologies to learn how to care about ethics. 42 Julia
|
||||||
|
Fionda describes restorative justice as a conciliation between
|
||||||
|
victim and offender, during which the offence is deliberated
|
||||||
|
upon. 43 Both parties try to come to an agreement on how to
|
||||||
|
achieve restoration for the damage done, to the situation
|
||||||
|
before the crime (here an AI crime) happened. Restorative
|
||||||
|
justice advocates compassion for the victim and offender, and a
|
||||||
|
consciousness on the part of the offenders as to the
|
||||||
|
repercussion of their crimes. The victims of AI crimes would
|
||||||
|
|
||||||
|
not only be placed in front of a court, but also be offered
|
||||||
|
engagement in the process of seeking justice and restoration. 44
|
||||||
|
Restorative justice might support victims of AI crimes better
|
||||||
|
than the punitive legal system, as it allows for the sufferers of
|
||||||
|
AI crimes to be heard in a personalised way, which could be
|
||||||
|
adopted to the needs of the victims (and offenders). As victims
|
||||||
|
and offenders represent themselves in restorative conferencing
|
||||||
|
sessions, these become much more affordable, 45 meaning that
|
||||||
|
the barrier to seeking justice due to the financial costs would
|
||||||
|
be partly eliminated, allowing for poor parties to be able to
|
||||||
|
contribute to the process of justice. This would benefit wider
|
||||||
|
society and AI technologies would not only be defined by a
|
||||||
|
powerful elite. Restorative justice could hold the potential not
|
||||||
|
only to discuss the AI crimes themselves, but also to get to the
|
||||||
|
root of the problem and discuss the cause of an AI crime. For
|
||||||
|
John Braithwaite restorative justice makes re-offending
|
||||||
|
harder. 46
|
||||||
|
In such a scenario, a future AI system capable of committing
|
||||||
|
AI crimes would need to have knowledge of ethics around the
|
||||||
|
particular discourse of restorative justice. The implementation
|
||||||
|
of AI technologies will lead to a discourse around who is
|
||||||
|
responsible for actions taken by AI technologies. Even when
|
||||||
|
considering clearly defined ethical guidelines, these might be
|
||||||
|
difficult to implement, 47 due to the pressure of competition AI
|
||||||
|
systems find themselves in. That said, this speculation is
|
||||||
|
restricted to humanised artificial intelligence systems. The
|
||||||
|
main hindrance for AI technologies to be part of a restorative
|
||||||
|
justice system might be that of the very human emotion of
|
||||||
|
shame. Without a clear understanding of shame it will be
|
||||||
|
impossible to resolve AI crimes in a restorative manner. 48
|
||||||
|
|
||||||
|
Thus one might want to think about a humanised symbiosis
|
||||||
|
between humans and technology, 49 along the lines of Garry
|
||||||
|
Kasparov’s advanced chess, 50 as in advanced jurisprudence. 51 A
|
||||||
|
legal system where human and machine work together on
|
||||||
|
restoring justice, for social justice. Furthering this perspective,
|
||||||
|
we suggest that reflections brought by new materialism should
|
||||||
|
also be taken into account: not only as a critical perspective on
|
||||||
|
the engendering and anthropomorphic representation of AI, but
|
||||||
|
also to broaden the spectrum of what we consider to be justice
|
||||||
|
in relation to all the living world. Without this new perspective
|
||||||
|
the sort of idealized AI image of a non-living intelligence that
|
||||||
|
deals with enormous amounts of information risks to serve the
|
||||||
|
abstraction of anthropocentric views into a computationalist
|
||||||
|
acceleration, with deafening results. Rather than such an
|
||||||
|
implosive perspective, the application of law and jurisprudence
|
||||||
|
may take advantage of AI’s computational and sensorial
|
||||||
|
enhanced capabilities by including all information gathered
|
||||||
|
from the environment, also that produced by plants, animals
|
||||||
|
and soil.
|
||||||
|
|
||||||
|
|
||||||
|
[^1]: Cp. G. Chaslot, “YouTube’s A.I. was divisive in the US presidential election”, Medium, November 27, 2016. Available at: https://medium.com/the-graph/youtubes-ai-is-neutral-towards-clicks-but-is-biased-towards-people-and-ideas-3a2f643dea9a#.tjuusil7 d [accessed February 25, 2018]; E. Morozov, “The Geopolitics Of Artificial Intelligence”, FutureFest, London, 2018. Available at: https://www.youtube.com/watch?v=7g0hx9LPBq8 [accessed October 25, 2019].
|
||||||
|
[^2]: Cp. M. Busby, “Use of ‘Killer Robots’ in Wars Would Breach Law, Say Campaigners”, The Guardian, August 21, 2018. Available at : https://web.archive.org/web/20181203074423/https://www.theguardian.com/science/2018/aug/21/use-of-killer-robots-in-wars-would-breach-law-say-campaigners [accessed October 25, 2019].
|
||||||
|
[^3]: Cp. A. Hadzi, “Social Justice and Artificial Intelligence”, Body, Space & Technology, 18 (1), 2019, pp. 145–174. Available at: https://doi.org/10.16995/bst.318 [accessed October 25, 2019].
|
||||||
|
[^4]: Cp. A. Kaplan and M. Haenlein, “Siri, Siri, in my Hand: Who’s the Fairest in the Land? On the Interpretations, Illustrations, and Implications of Artificial Intelligence”, Business Horizons, 62 (1), 2019, pp. 15–25. https://doi.org/10.1016/j.bushor.2018.08.0 04; S. Legg and M. Hutter, A Collection of Definitions of Intelligence, Lugano, Switzerland, IDSIA, 2007. Available at: http://arxiv.org/abs/0706.3639 [accessed October 25, 2019].2
|
||||||
|
[^5]:
|
||||||
|
[^6]:
|
||||||
|
[^7]:
|
||||||
|
[^8]:
|
||||||
|
[^9]: N. Bostrom, Superintelligence: Paths, Dangers, Strategies, Oxford, Oxford University Press, 2014. Cp. T. King, N. Aggarwal, M. Taddeo and L. Floridi, “Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions”, SSRN Scholarly Paper No. ID 3183238, Rochester, NY, Social Science Research Network, 2018. Available at: https://papers.ssrn.com/abstract=3183238 [accessed October 25, 2019]. P. Mason, Clear Bright Future, London, Allen Lane Publishers, 2019. Mason, Clear Bright Future. S. Omohundro, “Autonomous Technology and the Greater Human Good”, Journal of Experimental & Theoretical Artificial Intelligence, 26 (3), 2014, pp. 303–315, here: p. 303.3
|
||||||
|
[^10]: Cp. C. Cadwalladr, “Elizabeth Denham: ‘Data Crimes are Real Crimes”, The Guardian, July 15, 2018. Available at: https://web.archive.org/web/20181121235057/https://www.theguardian.com/uk-news/2018/jul/15/elizabeth-denham-data-protection-inf ormation-commissioner-facebook-cambridge-analytica [accessed October 25, 2019].
|
||||||
|
[^11]: Cp. B. Olivier, “Cyberspace, Simulation, Artificial Intelligence, Affectionate Machines and Being Human”, Communicatio, 38 (3), 2012, pp. 261–278. https://doi.org/10.1080 /02500167.2012.716763 [accessed October 25, 2019]; E.A. Wilson, Affect and Artificial Intelligence, Washington, University of Washington Press, 2011.
|
||||||
|
[^12]: Cp. P.G. Ossorio, The Behavior of Persons, Ann Arbor, Descriptive Psychology Press, 2013. Available at: http://www.sdp.org/sdppubs- publications/the-behavior-of-perso ns/ [accessed October 25, 2019].
|
||||||
|
[^13]: Cp. J. Jeffrey, “Knowledge Engineering: Theory and Practice”, Society for Descriptive Psychology, 5, 1990, pp. 105–122.
|
||||||
|
[^14]: Cp. P.G. Ossorio, Persons: The Collected Works of Peter G. Ossorio, Volume I. Ann Arbor, Descriptive Psychology Press, 1995. Available at: http://www.sdp.org/sdppubs-publications/persons-the-collected-works-of-peter-g-ossorio-volume-1/ [accessed October 25, 2019].
|
||||||
|
[^15]: Cp. M. Mountain, “Lawsuit Filed Today on Behalf of Chimpanzee Seeking Legal Personhood”, Nonhuman Rights Blog, December 2, 2013. Available at: https://www.nonhumanrights.org/blog/lawsuit-filed-today-on-behalf-of-chimpanzee-seeking-legal-personhood/ [accessed January 8, 2019]; M. Midgley, “Fellow Champions Dolphins as ‘Non-Human Persons’”, Oxford Centre for Animal Ethics, January 10, 2010. Available at: https://www.oxfordanimalethics.com/2010/01/fellow -champions-dolphins-as-%E2%80%9Cnon-human-persons%E2%80%9D/ [accessed January 8, 2019].
|
||||||
|
[^16]: Cp. R. Bergner, “The Tolstoy Dilemma: A Paradigm Case Formulation and Some Therapeutic Interventions”, in K.E. Davis, F. Lubuguin and W. Schwartz (eds.), Advances in Descriptive Psychology, Vol. 9, 2010, pp. 143–160. Available at: http://www.sdp.org/sdppubs-publications/advances-in-descriptive-psychology-vol-9; P. Laungani, “Mindless Psychiatry and Dubious Ethics”, Counselling Psychology4 Quarterly, 15 (1), 2002, pp. 23–33. Available at: https://doi.org/10.1080/09515070110102305 [accessed October 26, 2019].
|
||||||
|
[^17]: W. Schwartz, “What Is a Person and How Can We Be Sure? A Paradigm Case Formulation”, SSRN Scholarly Paper No. ID 2511486, Rochester, NY: Social Science Research Network, 2014. Available at: https://papers.ssrn.com/abstract=2511486 [accessed October 25, 2019].
|
||||||
|
[^18]: Cp. Mason, Clear Bright Future.
|
||||||
|
[^19]: Cp. M. Hoffman, and R. Pfeifer, “The Implications of Embodiment for Behavior and Cognition: Animal and Robotic Case Studies”, in W. Tschacher and C. Bergomi (eds.), The Implications of Embodiment: Cognition and Communication, Exeter, Andrews UK Limited, 2015, pp. 31– 58. Available at: https://arxiv.org/abs/1202.0440
|
||||||
|
[^20]: N.J. Nilsson, The Quest for Artificial Intelligence, Cambridge, Cambridge University Press, 2009.
|
||||||
|
[^21]: Cp. R. Brooks, Cambrian Intelligence: The Early History of the New AI, Cambridge, MA, A Bradford Book, 1999.
|
||||||
|
[^22]: Cp. D. Crevier, AI: The Tumultuous History of the Search for Artificial Intelligence, New York, Basic Books, 1993; H.P. Newquist, The Brain Makers, Indianapolis, Ind: Sams., 1994.
|
||||||
|
[^23]: Cp. R. Brooks, “A Robust Layered Control System for a Mobile Robot”, IEEE Journal on Robotics and Automation, 2 (1), 1986, pp. 14–23. Available at: https://doi.org/510.1109/JRA.1986.1087032 [accessed October 25, 2019].
|
||||||
|
24
|
||||||
|
Cp. Brooks, Cambrian Intelligence.
|
||||||
|
25
|
||||||
|
Cp. R. Pfeifer, “Embodied Artificial Intelligence”, presented at the
|
||||||
|
International Interdisciplinary Seminar on New Robotics, Evolution and
|
||||||
|
Embodied
|
||||||
|
Cognition,
|
||||||
|
Lisbon,
|
||||||
|
November,
|
||||||
|
2002.
|
||||||
|
Available
|
||||||
|
at:
|
||||||
|
https://www.informatics.indiana.edu/rocha/
|
||||||
|
publications/embrob/pfeifer.html [accessed October 25, 2019].
|
||||||
|
26
|
||||||
|
Cp. T. Renzenbrink, “Embodiment of Artificial Intelligence
|
||||||
|
Improves Cognition”, Elektormagazine, February 9, 2012. Available at:
|
||||||
|
https://www.elektormagazine.com/art
|
||||||
|
icles/embodiment-of-artificial-intelligence-improves-cognition
|
||||||
|
[accessed
|
||||||
|
January 10, 2019]; G. Zarkadakis, “Artificial Intelligence & Embodiment:
|
||||||
|
Does Alexa Have a Body?”, Medium, May 6, 2018. Available at:
|
||||||
|
https://medium.com/@georgezarkadakis
|
||||||
|
/artificial-intelligence-embodiment-does-alexa-have-a-body-d5b97521a201
|
||||||
|
[accessed January 10, 2019].
|
||||||
|
27
|
||||||
|
Cp. L. Steels and R. Brooks, The Artificial Life Route to Artificial
|
||||||
|
Intelligence: Building Embodied, Situated Agents, London/New York, Taylor
|
||||||
|
& Francis, 1995.
|
||||||
|
28
|
||||||
|
M. Foucault, “Disciplinary Power and Subjection”, in S. Lukes (ed.),
|
||||||
|
Power, New York, NYU Press, 1986, pp. 229–242, here: p. 230.
|
||||||
|
29
|
||||||
|
M. Foucault, Power, edited by C. Gordon, London, Penguin, 1980,
|
||||||
|
p. 34.6
|
||||||
|
30
|
||||||
|
A.R. Galloway, Protocol: How Control Exists After Decentralization,
|
||||||
|
Cambridge, MA, MIT Press, 2004, p. 81.
|
||||||
|
31
|
||||||
|
Cp. M. Foucault, The Birth of Biopolitics: Lectures at the
|
||||||
|
Collège de France, 1978–1979, London, Pan Macmillan, 2008.
|
||||||
|
32
|
||||||
|
Galloway, Protocol, p. 81.
|
||||||
|
33
|
||||||
|
Cp. Galloway, Protocol, p. 147.
|
||||||
|
34
|
||||||
|
Galloway, Protocol, p. 146.
|
||||||
|
35
|
||||||
|
Galloway, Protocol, p. 157.
|
||||||
|
36
|
||||||
|
Crook, Comparative Media Law and Ethics, p. 310.7
|
||||||
|
37
|
||||||
|
Cp. R. Courtland, “Bias Detectives: The Researchers Striving to
|
||||||
|
Make Algorithms Fair”, Nature, 558, 2018, pp. 357–360. Available at:
|
||||||
|
https://doi.org/10.1038/d41586-018-05469-3 [accessed October 25, 2019].
|
||||||
|
38
|
||||||
|
Cp. H. Fry, “We Hold People With Power to Account. Why Not
|
||||||
|
Algorithms?” The Guardian, September 17, 2018. Available at:
|
||||||
|
https://web.archive.org/web/201901021
|
||||||
|
94739/https://www.theguardian.com/commentisfree/2018/sep/17/power-
|
||||||
|
algorithms-technology-regulate [accessed October 25, 2019].
|
||||||
|
39
|
||||||
|
Cp. O. Etzioni, “How to Regulate Artificial Intelligence”, The New
|
||||||
|
York
|
||||||
|
Times,
|
||||||
|
January
|
||||||
|
20,
|
||||||
|
2018.
|
||||||
|
Available
|
||||||
|
at:
|
||||||
|
https://www.nytimes.com/2017/09/01/opinion/artificial-intelligence-
|
||||||
|
regulations-rules.html [accessed October 25, 2019]; A. Goel, “Ethics and
|
||||||
|
Artificial Intelligence”, The New York Times, December 22, 2017. Available
|
||||||
|
at: https://www.nytimes.com/2017/09/14/opinion/artificial-intelligence.html
|
||||||
|
[accessed October 25, 2019].
|
||||||
|
40
|
||||||
|
Cp. N. Vidmar and D.T. Miller, “Socialpsychological Processes
|
||||||
|
Underlying Attitudes Toward Legal Punishment”, Law and Society Review,
|
||||||
|
1980, pp. 565–602.
|
||||||
|
41
|
||||||
|
Cp. M. Wenzel and T.G. Okimoto, “How Acts of Forgiveness Restore
|
||||||
|
a Sense of Justice: Addressing Status/Power and Value Concerns Raised by
|
||||||
|
Transgressions”, European Journal of Social Psychology, 40 (3), 2010, pp.
|
||||||
|
401–417.
|
||||||
|
42
|
||||||
|
Cp. N. Bostrom and E. Yudkowsky, “The Ethics of Artificial
|
||||||
|
Intelligence”, in K. Frankish and W.M. Ramsey (ed.), The Cambridge
|
||||||
|
Handbook of Artificial Intelligence, Cambridge, Cambridge University Press,
|
||||||
|
2014, pp. 316–334; Frankish and Ramsey, The Cambridge Handbook of
|
||||||
|
Artificial Intelligence.
|
||||||
|
43
|
||||||
|
Cp. J. Fionda, Devils and Angels: Youth Policy and Crime, London,
|
||||||
|
Hart, 2005.8
|
||||||
|
|
||||||
|
44
|
||||||
|
Cp. Nils Christie, “Conflicts as Property”, The British Journal of
|
||||||
|
Criminology, 17 (1), 1977, pp. 1–15.
|
||||||
|
45
|
||||||
|
Cp. J. Braithwaite, “Restorative Justice and a Better Future”, in E.
|
||||||
|
McLaughlin and G. Hughes (eds.), Restorative Justice: Critical Issues,
|
||||||
|
London, SAGE, 2003, pp. 54–67.
|
||||||
|
46
|
||||||
|
Cp. J. Braithwaite, Crime, Shame and Reintegration, Cambridge,
|
||||||
|
Cambridge University Press, 1989.
|
||||||
|
47
|
||||||
|
Cp. A. Conn, “Podcast: Law and Ethics of Artificial Intelligence”,
|
||||||
|
Future
|
||||||
|
of
|
||||||
|
Life,
|
||||||
|
March
|
||||||
|
31,
|
||||||
|
2017.
|
||||||
|
Available
|
||||||
|
at:
|
||||||
|
https://futureoflife.org/2017/03/31/podcast-law-ethics-artificial-intelligence/
|
||||||
|
[accessed September, 22 2018].
|
||||||
|
48
|
||||||
|
Cp. A. Rawnsley, “Madeleine Albright: ‘The Things that are
|
||||||
|
Happening are Genuinely, Seriously Bad’”, The Guardian, July 8, 2018.
|
||||||
|
Available
|
||||||
|
at:
|
||||||
|
https://web.archive.org/web/20190106193657/https://www.theguardian.com9
|
||||||
|
|
||||||
|
/books/2018/jul/08/madeleine-albright-fascism-is-not-an-ideology-its-a-
|
||||||
|
method-interview-fascism-a-warning [accessed October 25, 2019].
|
||||||
|
49
|
||||||
|
Cp. D. Haraway, “A Cyborg Manifesto”, Socialist Review, 15 (2),
|
||||||
|
1985.
|
||||||
|
Available
|
||||||
|
at:
|
||||||
|
http://www.stanford.edu/dept/HPS/Haraway/CyborgManifesto.html
|
||||||
|
[accessed October 25, 2019]; C. Thompson, “The Cyborg Advantage”, Wired,
|
||||||
|
March 22, 2010. Available at: https://www.wired.com/2010/03/st-thompson-
|
||||||
|
cyborgs/ [accessed October 25, 2019].
|
||||||
|
50
|
||||||
|
Cp. J. Hipp et al., “Computer Aided Diagnostic Tools Aim to
|
||||||
|
Empower Rather than Replace Pathologists: Lessons Learned from
|
||||||
|
Computational Chess”, Journal of Pathology Informatics, 2, 2011. Available
|
||||||
|
at: https://doi.org/10.4103/2153-3539.82050 [accessed October 25, 2019].
|
||||||
|
51
|
||||||
|
Cp. J. Baggini, “Memo to Those Seeking to Live for Ever: Eternal
|
||||||
|
Life Would be Deathly Dull”, The Guardian, July 8, 2018. Available at:
|
||||||
|
https://web.archive.org/web/20181225111455/https://www.theguardian.com
|
||||||
|
/commentisfree/2018/jul/08/live-for-ever-eternal-life-deathly-dull-immortality
|
||||||
|
[accessed October 25, 2019].
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -1,5 +0,0 @@
|
|||||||
Title: First thing
|
|
||||||
Date: 2020-11-13 16:46
|
|
||||||
Category: Projections
|
|
||||||
|
|
||||||
First website page!
|
|
@ -1,134 +0,0 @@
|
|||||||
Title: The Philosophy of Warnings
|
|
||||||
Author: Santiago Zabala
|
|
||||||
Category: Articles
|
|
||||||
<div class="colophon">
|
|
||||||
<p> Published by: <br> Editing: <br> Design <br> Paper <br> Typeface <br>
|
|
||||||
</p><p id="colophon_right"> Sponsors: <br> Thanks: <br> Other <br>
|
|
||||||
</p></div>
|
|
||||||
<div class="first-page">
|
|
||||||
<div id="title_edition">Of Whirlpools and Tornadoes <br> A Nourishing Network</div>
|
|
||||||
<div id="amro">AMRO 2020</div>
|
|
||||||
|
|
||||||
<div id="author">Santiago Zabala</div>
|
|
||||||
<div id="title">The Philosophy of Warnings</div>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<div id="published">Published in the *Institute of Arts and Ideas* </div>
|
|
||||||
</div>
|
|
||||||
<header id="pageheader-issue">A Nourishing Network</header>
|
|
||||||
<header id="pageheader-theme">The Philosophy of Warnings</header>
|
|
||||||
<header id="pagefooter">)))))</header>
|
|
||||||
|
|
||||||
<div class="essay_content">
|
|
||||||
<p>This month an undergraduate student told me his parents were using the
|
|
||||||
pandemic to persuade him to avoid philosophy as it could not prevent or
|
|
||||||
solve real emergencies. I told him to let them know that we find
|
|
||||||
ourselves in this global emergency because we haven't thought
|
|
||||||
philosophically *enough*. The increasingly narrow focus of experts this
|
|
||||||
century has prevented us from addressing problems from a global
|
|
||||||
perspective, which has always been the distinctive approach of
|
|
||||||
philosophy. This is evident in the little consideration we give to
|
|
||||||
warnings. Too often these are discarded as useless or
|
|
||||||
insignificant---much like philosophy---when in fact they are vital.
|
|
||||||
Though philosophers can't solve an ongoing emergency---philosophy was
|
|
||||||
never meant to solve anything---we can interpret their signs through a
|
|
||||||
"philosophy of warnings." Although this philosophy probably won't change
|
|
||||||
the views of my student's parents, it might help us to reevaluate our
|
|
||||||
political, environmental, and technological priorities for the future.</p>
|
|
||||||
|
|
||||||
<p>Like recent philosophies of plants or
|
|
||||||
[[insects]{.underline}](http://cup.columbia.edu/book/a-philosophy-of-the-insect/9780231175791),
|
|
||||||
which emerged as a response to a global environmental crisis, a
|
|
||||||
"philosophy of warnings" is also a reaction to a global emergency that
|
|
||||||
requires philosophical elucidation. Although the ongoing pandemic has
|
|
||||||
triggered this new stance it isn't limited to this event. Nor is it
|
|
||||||
completely new. Warnings have been a topic of philosophical
|
|
||||||
investigation for centuries. The difference lies in the meaning these
|
|
||||||
concepts have acquired now. Before philosophy we had prophets to tell us
|
|
||||||
to be alert to the warnings of the Gods, but we secularized that office
|
|
||||||
into that of the philosopher, who, as one among equals, advised to heed
|
|
||||||
the signs; to use our imagination, because that is all we got. The
|
|
||||||
current pandemic has shown how little prepared we were for a global
|
|
||||||
emergency, even one whose coming has been
|
|
||||||
[[announced]{.underline}](https://www.nationalgeographic.com/science/2020/04/experts-warned-pandemic-decades-ago-why-not-ready-for-coronavirus/)
|
|
||||||
for decades. But why haven't we been able to take these warnings
|
|
||||||
seriously? Before tackling this question, let's recall how warnings have
|
|
||||||
been addressed philosophically.</p>
|
|
||||||
|
|
||||||
<p>Examples of warning philosophy can be traced back to Greek mythology and
|
|
||||||
Plato\'s *Apology*. Apollo provided Cassandra with the gift of prophecy
|
|
||||||
even though she could not convince others of the validity of her
|
|
||||||
predictions, and Socrates warned the Athenians---after he was sentenced
|
|
||||||
to death---that their inequity and mendacity undermined the democracy
|
|
||||||
they claimed to honor. Against Gaston Bachelard, who coined the term
|
|
||||||
"Cassandra complex" to refer to the idea that events could be known in
|
|
||||||
advance, Theodore Adorno warned that any claim to know the future should
|
|
||||||
be avoided. It is probably in this spirit that Walter Benjamin warned we
|
|
||||||
should pull the brake on the train of progress as it was stacking
|
|
||||||
disaster upon disaster. In line with Hannah Arendt's warnings of the
|
|
||||||
reemergence of totalitarianism after the Second World War, Giorgio
|
|
||||||
Agamben began his book on the current pandemic with "A Warning":
|
|
||||||
biosecurity will now serve governments to rule through a new form of
|
|
||||||
tyranny called "technological-sanitary" despotism.</p>
|
|
||||||
|
|
||||||
<p>These examples illustrate the difference between warnings and
|
|
||||||
predictions. Warnings are sustained by signs in the present that request
|
|
||||||
our involvement, as Benjamin suggests. Predictions call out what will
|
|
||||||
take place regardless of our actions, a future as the only continuation
|
|
||||||
of the present, but warnings instead point toward what is to come and
|
|
||||||
are meant involve us in a radical break, a discontinuity with the
|
|
||||||
present signaled by alarming signs that we are asked to confront. The
|
|
||||||
problem is not the involvement warnings request from us but rather
|
|
||||||
whether we are willing to confront them at all. The volume of vital
|
|
||||||
warnings that we ignore---climate change, social inequality, refugee
|
|
||||||
crises---is alarming; it has become our greatest emergency.</p>
|
|
||||||
|
|
||||||
<p>Indifference towards warnings is rooted in the ongoing global return to
|
|
||||||
order and realism in the twenty-first century. This return is not only
|
|
||||||
political, as demonstrated by the various right-wing populist forces
|
|
||||||
that have taken office around the world, but also cultural as the return
|
|
||||||
of some contemporary
|
|
||||||
[[intellectuals]{.underline}](https://arcade.stanford.edu/blogs/returning-order-through-realism)
|
|
||||||
to Eurocentric Cartesian realism demonstrates. The idea that we can
|
|
||||||
still claim access to truth without being dependent upon interpretation
|
|
||||||
presupposes that knowledge of objective facts is enough to guide our
|
|
||||||
lives. Within this theoretical framework warnings are cast off as
|
|
||||||
unfounded, contingent, and subjective, even though philosophers of
|
|
||||||
science such as Bruno Latour continue to
|
|
||||||
[[remind]{.underline}](https://www.wiley.com/en-us/Down+to+Earth%3A+Politics+in+the+New+Climatic+Regime-p-9781509530564)
|
|
||||||
us that no "attested knowledge can stand on its own." The internet and,
|
|
||||||
in particular, social media have intensified this realist view, further
|
|
||||||
discrediting traditional vectors of legitimation (international
|
|
||||||
agencies, major newspapers, or credentialed academics) and rendering any
|
|
||||||
tweet by an anonymous blogger credible because it presents itself as
|
|
||||||
transparent, direct, and genuine. "The quickness of social media, as
|
|
||||||
Judith Butler [[pointed
|
|
||||||
out]{.underline}](https://www.newstatesman.com/international/2020/09/judith-butler-culture-wars-jk-rowling-and-living-anti-intellectual-times),
|
|
||||||
allows for forms of vitriol that do not exactly support thoughtful
|
|
||||||
debate."</p>
|
|
||||||
|
|
||||||
<p>Our inability to take warnings seriously has devastating consequences,
|
|
||||||
as recent months make clear. The central argument in favor of a
|
|
||||||
philosophy of warnings is not whether what it warns of comes to pass but
|
|
||||||
rather the pressure it exercises against those emergencies hidden and
|
|
||||||
subsumed under the global call to order. This pressure demands that our
|
|
||||||
political, environmental, and technological priorities be reconsidered,
|
|
||||||
revealing the alarming signs of democratic backsliding, biodiversity
|
|
||||||
loss, and commodification of our lives by surveillance capitalism. These
|
|
||||||
warnings are also why we should oppose any demand to "return to
|
|
||||||
normality," which signals primarily a desire to ignore what caused this
|
|
||||||
pandemic in the first place. A philosophy of warnings seeks to alter and
|
|
||||||
interrupt the reality we've become accustomed to.</p>
|
|
||||||
|
|
||||||
<p>Although a philosophy of warnings will not prevent future emergencies,
|
|
||||||
it will resist the ongoing silencing of emergencies under the guise of
|
|
||||||
realism by challenging our framed global order and its realist
|
|
||||||
advocates. This philosophy is not meant to rescue us *from* emergencies
|
|
||||||
but rather rescue us *into* emergencies that we are trained to ignore.</p>
|
|
||||||
</div>
|
|
||||||
<div class="bio">
|
|
||||||
[[Santiago Zabala]{.underline}](http://www.santiagozabala.com/) is ICREA
|
|
||||||
Research Professor of Philosophy at the Pompeu Fabra University in
|
|
||||||
Barcelona. His most recent book is *Being at Large: Freedom in the Age
|
|
||||||
of Alternative Facts* (McGill-Queen's University Press, 2020).</div>
|
|
@ -13,8 +13,8 @@ TIMEZONE = 'Europe/Amsterdam'
|
|||||||
DEFAULT_DATE = 'fs'
|
DEFAULT_DATE = 'fs'
|
||||||
DEFAULT_LANG = 'en'
|
DEFAULT_LANG = 'en'
|
||||||
|
|
||||||
# DISPLAY_PAGES_ON_MENU = True
|
DISPLAY_PAGES_ON_MENU = True
|
||||||
# DISPLAY_CATEGORIES_ON_MENU = True
|
DISPLAY_CATEGORIES_ON_MENU = False
|
||||||
|
|
||||||
# Feed settings
|
# Feed settings
|
||||||
FEED_DOMAIN = SITEURL
|
FEED_DOMAIN = SITEURL
|
||||||
@ -32,7 +32,7 @@ AUTHOR_FEED_ATOM = None
|
|||||||
|
|
||||||
PATH = 'content'
|
PATH = 'content'
|
||||||
PAGE_PATHS = ['pages']
|
PAGE_PATHS = ['pages']
|
||||||
STATIC_PATHS = [ 'images', 'favicon.ico', 'ascii-art' ]
|
STATIC_PATHS = [ 'images', 'favicon.ico' ]
|
||||||
|
|
||||||
THEME = 'themes/basic'
|
THEME = 'themes/basic'
|
||||||
THEME_STATIC_DIR = 'theme'
|
THEME_STATIC_DIR = 'theme'
|
||||||
|
@ -12,7 +12,6 @@ body {
|
|||||||
|
|
||||||
header,
|
header,
|
||||||
#subscribe,
|
#subscribe,
|
||||||
#instructions,
|
|
||||||
footer{
|
footer{
|
||||||
position: relative;
|
position: relative;
|
||||||
width: calc(100% - 4em);
|
width: calc(100% - 4em);
|
||||||
|
@ -32,14 +32,14 @@
|
|||||||
size:A4;
|
size:A4;
|
||||||
margin-bottom: 2in;
|
margin-bottom: 2in;
|
||||||
@bottom-center {
|
@bottom-center {
|
||||||
content: counter(page, first-except);
|
content: counter(page);
|
||||||
font-size: 16px;
|
font-size: 16px;
|
||||||
font-family: "White Rabbit";
|
font-family: "White Rabbit";
|
||||||
}
|
}
|
||||||
@bottom-left {
|
@bottom-left {
|
||||||
/* content: " ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (( \A ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ((";*/
|
/* content: " ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (( \A ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )) \A ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ((";*/
|
||||||
content: "o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o";
|
content: "o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o o o o \A o o o o o o o o o o o o o o o";
|
||||||
font-size: 18px;
|
font-size: 16px;
|
||||||
white-space: pre-wrap;
|
white-space: pre-wrap;
|
||||||
font-family: "Unifont";
|
font-family: "Unifont";
|
||||||
margin-bottom: 1.2in;
|
margin-bottom: 1.2in;
|
||||||
@ -166,7 +166,7 @@
|
|||||||
|
|
||||||
.essay_content {
|
.essay_content {
|
||||||
font-family: 'Unifont';
|
font-family: 'Unifont';
|
||||||
font-size: 18px;
|
font-size: 16px;
|
||||||
line-height: 1.6;
|
line-height: 1.6;
|
||||||
page-break-before: always;
|
page-break-before: always;
|
||||||
|
|
||||||
@ -179,7 +179,7 @@
|
|||||||
|
|
||||||
.bio {
|
.bio {
|
||||||
font-family: 'Unifont';
|
font-family: 'Unifont';
|
||||||
font-size: 18px;
|
font-size: 16px;
|
||||||
margin-top: 500px;
|
margin-top: 500px;
|
||||||
margin-left: 400px;
|
margin-left: 400px;
|
||||||
page-break-after: always;
|
page-break-after: always;
|
||||||
|
@ -26,7 +26,7 @@
|
|||||||
{% endfor %}
|
{% endfor %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% for page in pages %}
|
{% for page in pages %}
|
||||||
<a href="{{ SITEURL }}/{{ page.link }}">{{ page.title }}</a>
|
<a href="{{ SITEURL }}/{{ page.url }}">{{ page.title }}</a>
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
</div>
|
</div>
|
||||||
</nav>
|
</nav>
|
||||||
|
@ -31,7 +31,6 @@ o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
|
|||||||
</div>
|
</div>
|
||||||
</article>
|
</article>
|
||||||
<pre>
|
<pre>
|
||||||
) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ))
|
|
||||||
</pre>
|
</pre>
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user