The New Aesthetic is an act of noticing, as much as anything: we are already in a machine-vision world, we are already in a world where the digital is erupting into the physical, and we just didn’t really notice it, in the entire breadth of its creeping wave, until now.

Read more

Consensus in a liberal-democratic society is — and all will always be — the expression of a hegemony and the crystallization of power relations.

Chantal Mouffe, The Democratic Paradox
 

This evokes for me Wikipedia’s emergent, ostensibly anarchistic but in actuality crypto-oligarchic decision-making process Consensus. (via varanine)
Read more

Wikipedia is a privately owned public space. Its articles are managed and manicured as carefully as the flora of Zuccotti Park. Just as Wikipedia is groomed for smooth and sensible data retrieval, the privately owned public park is a place for white-collar workers to savor a moment of relaxation so they can return to the bustle of the office feeling refreshed. Zuccotti Park and Wikipedia both make sense in the framework of a neoliberal worldview that understands public spaces—in the city and online—as sites of discrete actions and transactions, as links in logical chains of cause and effect. They are not places so much as they are conduits of productive movement. Ersatz urban environments are built along this principle: the Silicon Valley offices of Google and Facebook eschew cubicles for plazas and promenades, in the belief that shared spaces of locomotion generate productivity and innovation.

Read more

This is the political side of the New Aesthetic, which the discourse of the New Aesthetic has been dancing around since it became a topic of discussion. The New Aesthetic isn’t so much a thing of itself, as the combined sense of oddness that we feel when we discover technology warping or mutating the shape of the world. The New Aesthetic is an aesthetic tag, which James Bridle began attaching to clipped photos and text blocks that demonstrated this warp. The difficulty of confronting the political side of the New Aesthetic is that there is no ideology of it, no state flag or political line to toe. The political side of the New Aesthetic is that politics is everywhere, and anything can be equally political if deployed correctly, depending on who deploys it, and what their next-stage goals are. There is no rubric to assess this politics, no official spokesperson. There is only the vast multitude of instances of links between nodes, whether they are flying missiles, retweeted propaganda, philosophy texts, or the faces of self-Instagrammed soldiers.

And of course, James Bridle is on top of this, only just this past week launching Dronestagram, a Tumblr/Twitter/New Aesthetic/New Politic something, which posts aerial photos of the locations of US drone strikes from throughout the post-national terrain of that war-machine. So very similar to the IDF’s Youtube videos, the effect is entirely different, as it seeks not to brag or threaten, but to document and exhibit.

But could Dronestagram be co-opted by the State? What would be the effect of the IDF’s Twitter account retweeting Dronestagram? What if the president retweeted it? What if Al-Qaeda did? Who does the uncanniness of the New Aesthetic/New Politic work for? Who owns these aspects of the war-machine?

Read more

To summarize all this: the US does not interfere in the Muslim world and maintain an endless war on terror because of the terrorist threat. It has a terrorist threat because of its interference in the Muslim world and its endless war on terror.

Read more

The real Grim Meathook Future, the one I talked about back when I wrote that thing and the one I see now, is the future where a relatively small slice of our species lives in a sort of Edenic Eloi reality where the only problems are what we laughingly refer to as White People Problems, like being able to get four bars’ worth of 4G signal at that incredible pho joint that @ironicguy69 recommended on Twitter, or finding new ways to lifehack all the shit we own into our massive closets…while the rest of the world is reduced to maintaining our lifestyles via a complex process of economically-positioned indentured servitude and clinging with the very tips of their fingernails onto the ragged edge of our consumer leavings, like the dorky dude who shows up the first day of school with the cheap K-Mart knockoffs of the pumped-up kicks the cool kids are wearing this year. In other words, the Grim Meathook Future is the one that looks like the present, the one where nothing changes.

Joshua Ellis revisits the Grim Meathook Future (via paperbits)

grinding.be should be on everyone’s RSS feeds.

(via worsethandetroit)

Pair Josh Ellis’ GMF with his recent Dental Adventures in Juarez, and a compelling picture begins to emerge.

(via wolvensnothere)

Read more

What this means is that if provided a valid username/password pair by Google, law enforcement agencies can gain access to an Android device that is protected with a screen unlock pattern. As I understand it, this assistance takes the form of two password changes: one to a new password that Google shares with law enforcement, followed by another that Google does not share with the police. This second password change takes place sometime after law enforcement agents have bypassed the screen unlock, which prevents the government from having ongoing access to new email messages and other Google account-protected content that would otherwise automatically sync to the device.

It is my understanding, based on discussions with individuals who are familiar with Google’s law enforcement procedures, that the company will provide assistance to law enforcement agencies seeking to bypass screen unlock patterns, provided that the cops get the right kind of court order. The company insists on an anticipatory warrant, which the Supreme Court has defined as “a warrant based upon an affidavit showing probable cause that at some future time, but not presently, certain evidence of crime will be located at a specific place.”

Although a regular search warrant might be sufficient to authorize the police to search a laptop or other computer, the always-connected nature of smartphones means that they will continue to receive new email messages and other communications after they have been seized and searched by the police. It is my understanding that Google insists on an anticipatory warrant in order to cover emails or other communications that might sync during the period between when the phone is unlocked by the police and the completion of the imaging process (which is when the police copy all of the data off of the phone onto another storage medium).

Of the three screen lock methods available on Android (pattern, PIN, password), Google only offers a username/password based bypass for the pattern lock. If you’d rather that the police not be able to gain access to your device this way (and are comfortable with the risk of losing your data if you are locked out of your phone), I recommend not using a pattern-based screen lock, and instead using a PIN or password.

However, it’s important to understand that while locking the screen of your device with a PIN or password is a good first step towards security, it is not sufficient to protect your data. Commercially available forensic analysis tools can be used to directly copy all data off of a device and onto external media. To prevent against such forensic imaging, it is important to encrypt data stored on a device.

Since version 3.0 (Honeycomb) of the OS, Android has included support for full disk encryption, but it is not enabled by default. If you want to keep your data safe, enabling this feature is a must.

Unfortunately, Android currently uses the same PIN or password for both the screen unlock and to decrypt the disk. This design decision makes it extremely likely that users will pick a short PIN or password, since they will probably have to enter their screen unlock dozens of time each day. Entering a 16-character password before making a phone call or obtaining GPS directions is too great of a usability burden to place on most users.

Using a shorter letter/number PIN or password might be good enough for a screen unlock, but disk encryption passwords must be much, much longer to be able to withstand brute force attacks. Case in point: A tool released at the Defcon hacker conference this summer can crack the disk encryption of Android devices that are protected with 4-6 digit numeric PINs in a matter of seconds.

Hopefully, Google’s engineers will at some point add new functionality to Android to let you use a different PIN/password for the screen unlock and full disk encryption. In the meantime, users who have rooted their device can download a third-party app that will allow you to choose a different (and hopefully much longer) password for disk encryption.

Read more

I don’t have a map here to look at the geography, but the border between Israel and the West Bank is obviously right there, right next to Tel Aviv, which is the financial capital, the industrial capital of Israel, the center of Israel. It’s—what the border would be? Maybe seven miles from Tel Aviv to what would be the West Bank…The other side of the West Bank, the other side of what would be this new Palestinian state would either be Syria at one point, or Jordan. And of course the Iranians would want to do through the West Bank exactly what they did through Lebanon, what they did near Gaza. Which is that the Iranians would want to bring missiles and armament into the West Bank and potentially threaten Israel. So Israel of course would have to say, “That can’t happen. We’ve got to keep the Iranians from bringing weaponry into the West Bank.” Well, that means that—who? The Israelis are going to patrol the border between Jordan, Syria, and this new Palestinian nation? Well, the Palestinians would say, “Uh, no way! We’re an independent country. You can’t, you know, guard our border with other Arab nations.” And now how about the airport? How about flying into this Palestinian nation? Are we gonna allow military aircraft to come in and weaponry to come in? And if not, who’s going to keep it from coming in? Well, the Israelis. Well, the Palestinians are gonna say, “We’re not an independent nation if Israel is able to come in and tell us what can land in our airport.” These are problems—these are very hard to solve, all right? And I look at the Palestinians not wanting to see peace anyway, for political purposes, committed to the destruction and elimination of Israel, and these thorny issues, and I say, “There’s just no way.”

Read more

“Someone also swatted my house,” he tells me, smiling. “It happens a lot to me. Well, the SWAT team was only once at my house, but lots of time with the local police department.” Swatting is a vicious prank where a hacker uses an internet call system to report a hostage situation, which scrambles local law enforcement to the victim’s doorstep.

“Through AOL, you can use AT&T Relay to call the SWAT. It’s for handicapped people. You have to sign up, but it’s easy to sign up. You just instant message the username AT&T Relay and then 911. They ask what’s your location, the emergency. That’s what they did to me. That’s what they did to my school too, because there’s less ways of getting caught.”

Cosmo shrugs at this, like it’s all perfectly normal stuff for a teenage boy. And the thing is, in 2012, it is perfectly normal for a bored teenage boy on the edge of delinquency. Instead of egging cars and swinging bats at mailboxes, he’s breaking into e-mail accounts.

Cosmo got into hacking via online gaming. He grew up on Xbox, and played others online competitively. One day, he was knocked offline mid-match, forfeiting the game. He discovered that this was done via a simple trick, where one gamer turns a script on his opponent’s IP address. He began using this same tactic himself. It was easy and required nothing more than off-the-shelf programs, like Cain and Able. It was a veil lifted.

Read more

What, then, is work for? Aristotle has a striking answer: “we work to have leisure, on which happiness depends.” This may at first seem absurd. How can we be happy just doing nothing, however sweetly (dolce far niente)? Doesn’t idleness lead to boredom, the life-destroying ennui portrayed in so many novels, at least since “Madame Bovary”? Everything depends on how we understand leisure. Is it mere idleness, simply doing nothing? Then a life of leisure is at best boring (a lesson of Voltaire’s “Candide”), and at worst terrifying (leaving us, as Pascal says, with nothing to distract from the thought of death). No, the leisure Aristotle has in mind is productive activity enjoyed for its own sake, while work is done for something else. We can pass by for now the question of just what activities are truly enjoyable for their own sake — perhaps eating and drinking, sports, love, adventure, art, contemplation? The point is that engaging in such activities — and sharing them with others — is what makes a good life. Leisure, not work, should be our primary goal.

Read more