Sign in or register
for additional privileges

Communicable Disease: Towards a Political Ontology of the Computer Virus

Jason Lipshin, Author

You appear to be using an older verion of Internet Explorer. For the best experience please upgrade your IE version or switch to a another web browser.

1-10: point one, endnotes

Point One Endnotes

[1] John McAfee and Colin Haynes,
Computer Viruses, Worms, Data Diddlers, Killer Programs and Other Threats to Your System. New York: St. Martin's Press, 1989, p.36.

[2] Julian Dibbell, "Viruses are Good for You," in
New Media, Old Media: A History and Theory Reader. Ed. Wendy Hui Kyong Chun and Thomas Keenan. New York: Routledge, 2006, p. 220.   

[3] Here I am referring to recent buzz around the term "viral marketing," which describes the practice of outsourcing the labor of marketing from content producers to Internet users. For more details, see Gabrielle Brandstetter, "Swarms and Enthusiasts. Transfers in/as Choreography," in
Parallax 14:1 (2008), p. 92.

[4] Barlow's manifesto is perhaps the most canonical example of this libertarian-anarchist view and its positioning of digital networks and "real-world" hierarchies in a relation of binary opposition.


[5] This tradition has been incisively critiqued by a number of contemporary critics of new media, first by Gilles Deleuze in his prophetic "Postscript on Societies of Control" and then by Wendy Chun and Alexander Galloway in their work extending many of Deleuze's concepts. However, a less explored thread in all of these works is the complex negotiation between the swarm and the subject, and in particular the feedback loops between humans and non-humans imminent to the swarm.


[6] Jacques Derrida. "Plato's Pharmacy." In
Dissemination. Translated by Barbara Johnson. Chicago: University of Chicago Press, 1981.

[7] SKISM stands for Smart Kids into Sick Methods. See Dibbell, p.221.


[8] Ibid., p. 221.


[9] Alexander R. Galloway,
Protocol: How Control Exists After Decentralization. Cambridge: MIT Press, 2004, p. 183.

[10] Morris was the first to be convicted under the 1986 Computer Fraud and Abuse Act. Ibid., 183.


[11] Jussi Parikka posits this fascinating genealogy for popular perceptions of the virus writer: harmless computer geeks prior to the 1970s, communist Eastern Europeans in the late 1980s, and "cyber-terrorists" post 9/11. Clearly, the virus writer, like so many archetypes in the mass media's moralizing campaigns, takes on a different paranoid guise depending on the flavor of the month.


[12] Brandstetter, p.94.


[13] Eugene Thacker, "Networks, Swarms and Multitudes: Part One,"
CTheory, 5/18/2004. <http://www.ctheory.net/articles.aspx?id=422>. Accessed 4/2/2011.

[14] Thacker, Ibid.


[15] Kevin Kelly,
Out of Control: The New Biology of Machines, Social Systems, and the Economic World. Cambridge: Perseus Books, 1994.

[16] This natural language code comes from Argu Sagturk, "Flocking" collection, at openprocessing.org. Accessed 4/3/2011.


[17] Processing is a Java-inspired programming language created by Casey Raes and Ben Fry and is specifically tailored to the needs of artists and designers. The simulation was created by my tweaking of Daniel Shiffman's implementation of the Boids algorithm for the needs of the Processing environment.  


[18] Parikka,
Digital Contagions, p.248.

[19] Jussi Parikka,
Insect Media: An Archeology of Animals and Technology. Minneapolis: University of Minnesota Press, p. 158.

[20] Other examples of collective singularities include: "the Internet," "a network," and "the media." These assemblages may also be productively compared with Alain Badiou's concept of the "count-as-one," Lynn Margulis' concept of the "body as ecosystem," and Bruno Latour's fascinating etymology of the word "thing," which comes from the Icelandic
allthing meaning gathering or coming together, rather than reified object. See Geoffrey Winthrop-Young, "Hardware/Software/Wetware," in Critical Terms for Media Studies. Ed. W.J.T. Mitchell and Mark B.N. Hansen. Chicago: University of Chicago Press, 2010.
    

[21] Galloway and Thacker, The Exploit, p. 95.

[22] Parikka, Digital Contagions, p.241.

[23] John Johnston, "Mutant and Viral: Artifical Evolution and Software Ecology," in
The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture. Cresskill, NJ: Hampton Press, p. 37.

[24] Ibid., p.38.


[25] Thacker, "Networks, Swarms, and Multitudes: Part Two," p.12.
Comment on this page
 

Discussion of "1-10: point one, endnotes"

Add your voice to this discussion.

Checking your signed in status ...

Previous page on path Point 1 Path, page 10 of 10 Path end, return home