Monday, December 01, 2008

FINAL

Many of you will be presenting original work connected to the themes of our course on the last day as your final project. Please remember that together with this presentation you should hand in a short description of the project and its connection to a text or texts from our class that I can use as a reference in assessing your work.

Those of you who would rather not do such a presentation are welcome to produce a short (5pp.) final essay responding to the following prompt:
What is the shape and what might be the significance of a transformation from a mass mediated public sphere into more p2p networked public sphere? Choose any two texts from the course to describe how, in your own view, the emerging peer-to-peer networked public sphere differs most significantly from the mass mediated public sphere that preceded it.

I have no expectation at all about how sweeping, how deep, how hopeful, how fragile, how illusory you have come to believe this transformation truly is, nor do I have any expectation about what each of you will finally decide the significance of this transformation truly amounts to.

Berube

Well, I've looked all over the place, but to no avail. When Berube migrated his site some of the essays available on the old site vanished down the memory hole and the beautiful essay I assigned for Thursday is among them. I cannot find it anywhere else. Unless somebody has had luck finding it through some other route I suppose we'll have to confine our discussion to the remaining three pieces Thurs. The essay became the basis for a wonderful book by the same title that I recommend to your attention. Hope your holiday went well and that everybody is working on their keywords assignment. Word about the final forthcoming in my next post.

Saturday, November 22, 2008

Keywords!

1. accountability
2. basic income guarantee
3. body
4. California Ideology
5. canon
6. code
7. commons
8. control
9. credential
10. crypto-anarchy
11. culture
12. cybernetic totalism
13. cyberspace
14. democracy
15. digital
16. elite
17. end-to-end principle (e2e)
18. enframing
19. enhancement
20. filtering
21. finitude
22. free software
23. industrial model
24. linking
25. mass culture
26. media
27. neoliberalism
28. Netroots
29. objectivity
30. open source
31. panopticon
32. peer to peer (p2p)
33. popular
34. post-humanist
35. privacy
36. private property
37. professional
38. propaganda
39. public
40. publication
41. public good
42. reductionism
43. representative
44. retro-futurism
45. secrecy
46. sousveillance
47. spontaneous order
48. techno-utopianism
49. transparency
50. -- WILD CARD: Good for one term I've failed to include in the list.

Choose thirty Keywords from this list. Organize your chosen Keywords into three separate, conceptually connected, sets. You can use any criteria that seems useful to you to organize these sets. The only rule is that no resulting set can contain fewer than six Keywords.

Each set should have a title or heading that indicates the criteria governing inclusion into that set. Once you have organized your three sets in this way, briefly define each one of the Keywords you have included in each set in your own words. Ideally, your definitions should be as clear and as concise as possible. These definitions should be a matter of a sentence or two, NOT a paragraph or two. They are definitions, not essays or explanations. It should be clear from your definitions why each of the Keywords in each of the three sets are conceptually connected to each other, but it is also crucial that no terms within a set are to be treated as synonymous, and that your definitions distinguish Keywords from one another (even if the resulting distinctions are sometimes matters of nuance).

Once you have defined all these Keywords, provide a short quotation (feel free to edit and prune to keep your chosen citations properly pithy) from one of the texts we have read this term to accompany your definition. The quotation you choose can be a definition you found helpful in crafting your own definition, it can be an example or illustration you found especially clarifying, it can a matter of contextualization, framing, or history that you found illuminating, it can even be something you disagreed with so strongly it helped you understand better what you really think yourself.

Obviously, there are endless ways of organizing these sets, defining their Keywords, distinguishing them from one another, and connecting them up to the texts we have read. What matters here is that you follow the rules of the exercise, not that you arrive at some single "right answer" you may think I have in mind.

Wednesday, October 08, 2008

Hello, everybody...

I'm posting this message to the blog and also sending it out as a mass mailing to many of your e-mail addresses. I suspect I'm going to miss some of you this way, so please forward or mention this message to folks you know who are in class but aren't listed among the recipients to this e-pistle.

I have noticed that no précis has been posted to the blog and that there are no new links posted to organizations or artists or events on the blog either, even though I do believe that there are co-facilitators and people giving reports for tomorrow's class.

This makes me very nervous.

It makes me especially nervous because last week's class was really terrible and I don't want a repeat of that tomorrow.

Let me make something very clear that I shouldn't have to make clear at all.

Attending this class is not optional if you are enrolled in it. Arriving to class on time is not optional if you are enrolled in it. Reading the texts assigned for our class meetings and being prepared to discuss them is not optional if you are enrolled in it.

An unbelievable number of you asked special permission to enroll in this class. I had assumed that this meant you had an enthusiasm for the topic or for the style of teaching or for the community of the classroom you were expecting. I let everybody into the class who wanted to be here. Now I fully expect you to repay that generosity by contributing to the class you have joined.

You all know that I am pretty anarchic when it comes to class structure. I tend to think your engagement with this difficult material is more productive for everybody when we grapple with it as peers.

But you all need to meet me halfway. And that is not yet happening in our class together this term in too many cases.

If you need to miss a class, let me know before hand or immediately afterward. I tend to be very affable about such things. If you miss the class more than three times, however, there may be a real question whether you are really even participating in the class in any meaningful sense, and if you miss without ever doing me the service of explaining why I have little reason or inclination to be generous with you.

I'm taking attendance from here on out and if you arrive too late I'm treating you as absent. It is a ridiculous and infantilizing sort of thing to do, in my opinion, and I truly hate that sort of thing, but that's how it's going to be until you demonstrate to me that I can dispense with this sort of idiocy by coming to class on time and ready to talk.

Again, I get it that many of these texts are alienating and dense. Critical theory is already unfamiliar and complex and many of these texts add the complexity of obscure technological details to the already weirdly complex attentions of a theoretical vantage.

But nobody expects you to spin crystal clear lectures on these topics after a couple of readings! If you don't understand a text, try to figure out what is making it especially difficult for you. Come up with actual questions to ask your peers and me about the text, rather than just giving up. or dismissing it, or whatever it is that you want to do instead of reading the text carefully.

We are reaching a place in the syllabus in which the texts deal with more general issues that apply to all sorts of issues, not just to the specific historical moment of the 90s digirati we've been focusing on up to this point. This is a perfect moment to reconnect with the course and try to dig in a bit.

There are a few of you who are excused tomorrow but there are so many more of you that I still expect a full house tomorrow. I'm not interested in excuses or explanations, just come tomorrow, find something you are prepared to talk about in these texts, and let's all move on.

That is all. Dale

Wednesday, October 01, 2008

Report

I am going to give a presentation on Geert Lovink: bio
Blogging, the nihilist impulse: link

Brittany McCall
www.bamtron.com

Wednesday, September 17, 2008

I Don't Usually Do This Sort of Thing, But, Since People Are Asking for Basics: This Is From My DIssertation --

A whispered voice, a closed door, a sealed envelope –- these are all familiar, everyday techniques and technologies by means of which people routinely seek to maintain their secrets and preserve a measure of personal privacy.

Cryptography, the art of making ciphers and codes, provides an additional array of powerful techniques to accomplish the same purposes under different circumstances. Cryptographic techniques attempt to protect information from unwanted scrutiny by transforming or encrypting it into an otherwise unintelligible form called a cipher-text. This cipher-text ideally cannot be deciphered back into an intelligible plain-text without the use of a key to which only those who are the intended recipients of the information have access. The use of ever more powerful computers to facilitate the construction and application of encryption algorithms and keys has made the effort to discern the original plain-text from an encrypted cipher-text without recourse to its proper key incomparably more difficult than has been the case historically. This kind of code-breaking is called cryptanalysis. Cryptology is a more general term encompassing both cryptography and cryptanalysis.

There are two basic kinds of encryption scheme in contemporary cryptography, symmetric and asymmetric systems. In classic symmetric encryption or secret key cryptology, messages are enciphered and deciphered by recourse to a secret key available to all (but only) the relevant parties to a transaction. Such systems are called symmetrical simply because both the processes of scrambling text into cipher-text and descrambling cipher-text back to plain-text require access to exactly the same information. The obvious difficulty with such symmetric systems is their reliance on a secret key that cannot always itself be distributed with ease or comparable security. This dilemma constituted in fact one of the definitive quandaries of cryptography for centuries, but it was overcome in a series of breakthroughs in relatively recent history. The result is called asymmetric or public key cryptology.

Public key encryption, as we know it, was devised by 1976 by Whitfield Diffie (of whom Simon Singh writes: “In hindsight, he was the first cypherpunk” ), Martin Hellman, and Ralph Merkle. Asymmetric encryption schemes require not one but two keys, a public or published key available to everyone as well as a secret key known, as usual, only by deliberately chosen individuals, and often known only by a single person and never revealed to anyone else at all. These two coded keys stand in the unique mathematical relation to one another that once a text has been scrambled into cipher-text by means of the public key, it can be subsequently descrambled from cipher-text back into intelligible plan-text only by means of the private or secret key associated with it. With this breakthrough the dilemma of insecure key distribution was solved, and it became possible even for parties whose identities are secrets kept from one another to communicate and conduct transactions with one another in a way that was likewise perfectly secret to anyone but themselves.

Public-key encryption systems soon also demonstrated useful and unexpected applications that had not hitherto been associated with traditional cryptography at all. New forms of authentication for otherwise anonymous transactions were suddenly possible and soon implemented. Digital time-stamping of documents and the creation of reliable “digital signatures” for otherwise anonymous or pseudonymous participants in various kinds of transactions were among the authenticating applications that especially excited the interest of the Cypherpunks.

These applications can facilitate the ongoing protection of anonymous sources of information and whistleblowers, for example, or the otherwise difficult authentication of censored texts or politically dangerous reportage, or provide for the secure, ongoing pseudonymous disputation of experts on controversial subjects over online networks. They also make it possible to re-create the kind of anonymity that roughly prevails when one makes a purchase with cash -– a kind of anonymity that more or less evaporates once one makes the transition to purchasing by means primarily of conventional credit or debit cards or when shopping online or over the phone. Needless to say, regaining this kind of purchasing privacy isn’t only appealing for those who want to engage in illegal economic activity. It is easy enough to understand the desire for anonymity in making a mildly or even only potentially embarrassing purchase, for example, or to elude a torrent of unsolicited targeted advertising.

It remains mysterious just why the arrival of even these powerful new cryptographic applications would inspire in anybody the sense of an upcoming or impending transformation of society in the image of crypto anarchy, however. And it is interesting to note that according to Simon Singh, there is an alternative version available to the conventional history of the development of public-key cryptography itself which suggests lessons that may cut somewhat against the grain of the contours of the Cypherpunk imaginary. “Over the past twenty years,” writes Singh in The Code Book, “Diffie, Hellman, and Merkle have become world famous as the cryptogaphers who invented public-key cryptography, while [Ronald] Rivest, [Adi] Shamir, and [Leonard] Adleman have been credited with developing RSA [–- the acronym derives from their initials –-], the most beautiful [and, as it happens, influential] implementation of public-key cryptography.” Contrary to this canonical history, however, Singh points out that “[b]y 1975, James Ellis, Clifford Cocks, and Malcom Williamson had discovered all the fundamental aspects of public-key cryptography, yet they had to remain silent [since their work was undertaken under the auspices of the British Government and was classified top-secret].”

Singh insists, exactly rightly, that “[a]lthough G[overnment] C[ommunications] H[ead]Q[uarters] were the first to discover public-key cryptography, this should not diminish the achievements of the academics who rediscovered it.” But his next point is the more provocative one, to my mind. “It was the academics who were the first to realize the potential of public-key encryption, and it was they who drove its implementation. Furthermore, it is quite possible that GCHQ would never have revealed their work” at all. For me, then, this appendix to the story of the invention of public-key encryption provides an example of how an open research culture grasped the significance of a discovery and implemented it incomparably more effectively than a closed and controlled, secretive culture managed to do -– even when the subject of that research and of its practical implementation was a matter of the technical facilitation of secrecy itself.

“For a long time,” writes James Boyle in his essay “Foucault in Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors,” “the internet’s enthusiasts… believed that it would be largely immune from state regulation.... forestalled by the technology of the medium, the geographical distribution of its users and the nature of its content.” Boyle characterizes “[t]his tripartite immunity” as “a kind of Internet Holy Trinity, faith in [which] was a condition of acceptance into the community [of enthusiasts].” Boyle proposes that these “beliefs about the state’s supposed inability to regulate the Internet” stand in an indicative relationship to “a set of political and legal assumptions that [he calls] the jurisprudence of digital libertarianism.” Certainly all three premises of this Internet Trinity exert their force over the imagination of Tim May and the version of digital libertarianism embodied in his crypto anarchy.

But when Boyle alludes to the “technology of the medium” here, he is not referring to the computer-facilitated cryptographic transformation of network communications, but to the more general and ubiquitous protocols and technologies that constitute the internet as such. It is useful to dwell on these more general assumptions about the internet, because they constitute the wider technical and cultural context from which May’s crypto-anarchic case emerges and hence their examination puts us in a better position to understand how some of the Cypherpunks’ otherwise rather improbably apocalyptic conclusions might acquire a compelling veneer of plausibility, especially for many of the Internet’s early partisans and participants.

“The Internet was originally designed to survive a nuclear war,” notes Boyle in “Foucault in Cyberspace.” “[I]ts distributed architecture and its technique of packet switching were built around the problem of getting messages delivered despite blockages, holes and malfunctions.”

“Imagine the poor censor faced with such a system,” he continues. “There is no central exchange to seize and hold; messages actively ‘seek out’ alternative routes so that even if one path is blocked another may open up.” All this amounts to a “civil libertarian's dream.” This is especially so because “[t]he Net offers obvious advantages to the countries, research communities, cultures and companies that use it, but it is extremely hard to control the amount and type of information available; access is like a tap that only has two settings –- ‘off’ and ‘full.’” He concludes the point: “For the Net's devotees, most of whom embrace some variety of libertarianism, the Net's structural resistance to censorship –- or any externally imposed selectivity –- is ‘not a bug but a feature.’”

Although it is true that digital networks have managed to an important and appealing extent to flummox and resist efforts to regulate their content, it is also true, as Boyle is the first to insist himself, that this capacity for resistance is the consequence of particular decisions by coders, engineers, policy-makers, and many others any number of which could have been decided otherwise with considerably different consequences, and which remain to this day more susceptible to alteration than the “civil libertarian’s dream” recited above would seem to credit. The specificity and ongoing contingency of these decisions belies any technological determinism that would destine or commend as an “ought” the architecture of a given social order from the “is” of just which tools happen to prevail for a time here or there.

The “Internet” is, in its somewhat enigmatic classical definition, a network of networks. And so, for example, writes Lawrence Lessig, “[t]he Internet is not the telephone network,” though certainly sometimes “it,” or at any rate some of it, “sometimes [runs] on the telephone lines.” Similarly, the internet is not a cable network, nor a wireless network, while it just as surely partakes of these. Different regulations and architectural protocols govern these many networks the Network networks. The ongoing implementation of the internet is private, public, corporate, governmental, academic.

What people talk about when they talk about the “Internet” tends to consist of expectations they have formed for familiar machines, or of experiences such machines have facilitated for them.

And so, the internet is very likely not the “thing” you think it is. For one thing, whatever you think of it, to be sure the internet is already transforming into something else. Consider, for example, how breathtakingly different would be the experiences of surfing the web from a desktop in 1993, to moblogging via cell in 2003, to immersion in ubicomp environments in 2013 (I am assuming that the omnipresence of these jazz-riffs of kooky jargon will continue to provide one of the few constants among the successive generations of network access and interactivity). What difference does it make that in one generation of its life the internet stood in a literally definitive relation to the Department of Defense, and in another generation more to Amazon.com? What difference does it make that in one generation of its life, a majority of those who access the internet are primary speakers of English, but that in another generation only a minority are? What difference will it make when more non-sentient appliances than human beings routinely access the internet (cars constantly reporting the state of their maintenance to their manufacturer, refrigerators reporting the state of their contents to the grocery store, factories reporting emissions to state regulators, etc.)?

Monday, September 15, 2008

Writing A Precis, Co-Facilitating Discussion: A Guide

Critical Theory B: Fall 2008

One of the key assignments for our course will be your co-facilitation of class discussion of an assigned text. This assignment also requires that you generate a précis of the text you are taking responsibility for. This precis should provide a point of departure for your contribution to the discussion in class, and you will also hand it in to me at the end of the session. I expect you to post your precis to our course blog the Friday prior to the Tuesday class meeting you are co-facilitating.

Think of this precis as a basic paraphrase of the argumentative content of a text.

Here is a broad and informal guide for a precis, consisting of question you should ask of a text as you are reading it, and again after you have finished reading it. Don't treat this as an ironclad template, but as a rough approach to producing a precis -- knowing that a truly fine and useful précis need not necessarily satisfy all of these interventions.

A precis should try to answer fairly basic questions such as:
1. What is the basic gist of the argument?
2. To what audience is it pitched primarily? Does it anticipate and respond to possible objections?
3. What do you think are the argument's stakes in general? To what end is the argument made?
a. To call assumptions into question?
b. To change convictions?
c. To alter conduct?
d. To find acceptable compromises between contending positions?

4. Does it have an explicit thesis? If not, could you provide one in your own words for it?
5. What are the reasons and evidence offered up in the argument to support what you take to be its primary end? What crucial or questionable warrants (unstated assumptions the argument takes to be shared by its audience, often general attitudes of a political, moral, social, cultural nature) does the argument seem to depend on? Are any of these reasons, evidences, or warrants questionable in your view? Do they support one another or introduce tensions under closer scrutiny?
6. What, if any, kind of argumentative work is being done by metaphors and other figurative language in the piece?
7. Are there key terms in the piece that seem to have idiosyncratic definitions, or whose usages seem to change over the course of the argument?

As you see, a piece that interrogates a text from these angles of view will yield something between a general book report and a close reading, but one that focuses on the argumentative force of a text. For the purposes of our class, such a precis succeeds if it manages
1. to convey the basic flavor of the argument and
2. provides a good point of departure for a class discussion.

For Thursday

Links for Thurs. are hot. I'm expecting some precis/co-facilitation questions, quotes to appear on the blog very soon?

Wednesday, September 03, 2008

Syllabus for Critical Theory B, Fall 2008

Theory and Technoscience, Peer to Peer

Instructor: Dale Carrico, dalec@berkeley.edu
Course Blog: http://tecblogging.blogspot.com/

Att/Part: 20%; Report: 20%; Precis and Co-Facilitation: 20% Keywords: 20% Final Project: 20% (Approximately and Provisionally)

Provisional Schedule of Meetings

Week One | September 4
Introductions

Week Two | September 11
Lessig, Code
Benkler, Wealth of Networks

Week Three | September 18
May, The Crypto-Anarchist Manifesto [ian]
Hughes, A Cypherpunk's Manifesto [jessie]
Shirky, RIAA Succeeds Where Cypherpunks Failed

Week Four | September 25
Barlow, A Declaration of the Independence of Cyberspace [charlie]
Barbrook, The California Ideology [katy]
Purdy, God of the Digirati [peter]

Week Five | October 2
Hayles, Liberal Subjectivity Imperiled: Norbert Weiner and Cybernetic Anxiety [brittany]
Lanier, One Half of a Manifesto [jeremy]

Week Six | October 9
Heidegger, Question Concerning Technology
Noble, Religion of Technology [kimmy]

Week Seven | October 16
Arendt, Conquest of Space and the Stature of Man
Lewis, The Abolition of Man [rachel]
Steigler, The Gentle Seduction [kati]

Week Eight | October 23
Film: Desk Set

Week Nine | October 30
Litman, Sharing and Stealing [lisa]
Boyle, Second Enclosure
Boyle, Enclosing the Genome

Week Ten | November 6
Chomsky and Herman, Propaganda Model [jennifer]
Digby, Netroots As A Revolutionary Force
Shirky, Here Comes Everybody
Bollier, Commoners As An Emerging Political Force [ling]

Week Eleven | November 13
Bauwens, The Political Economy of Peer Production
Lessig, Insanely Destructive Devices [jeramee]
Sterling, Maneki Neko

Week Twelve | November 20
Chun, Control and Freedom
Brin, Three Cheers for the Surveillance Society! [manae]
Cascio, Participatory Panopticon [nicki]
Mann, Sousveillance

Week Thirteen | November 27 -- Academic and Administrative Holiday

Week Fourteen | December 4
Berube, Life As We Know It [daniel]
Mundy, Bionic Parents and Techno-Children
Newitz, Breeding the Future [lauren]
Zizek, Bring Me My Philips Mental Jacket

Week Fifteen | December 11
Haraway, The Promises of Monsters [janett]
Latour, A Plea for Earthly Sciences

Thursday, November 22, 2007

FINAL!

You will be handing in your final exam to me at the beginning of our last scheduled class meeting together.

PART I

Here, in alphabetical order, are seventy-one Green Keywords that have figured centrally in various ways in a number of the texts we have read and discussed over the course of this term.

1. "Abrasion,"
2. "Agroforestry,"
3. "Backstory,"
4. "Biodiversity,"
5. "Biomimicry,"
6. "Biopiracy,"
7. "Bioregional"
8. "Biosphere,"
9. "Capital,"
10. "Climate Change,"
11. "Commodification,"
12. "Commons,"
13. "Companion Planting,"
14. "Consensus Science,"
15. "Cradle-to-Cradle,"
16. "Culture Industry,"
17. "Deep Ecology,"
18. "Democracy,"
19. "Denial,"
20. "Depletion,"
21. "Ecofeminism,"
22. "Ecology,"
23. "Economy,"
24. "Ecosocialism,"
25. "Ecosystem,"
26. "Ecotage,"
27. "Endangered Species,"
28. "Energy Descent,"
29. "Environmentalism,"
30. "Externality,"
31. "Field Worker,"
32. "Footprint,"
33. "Greenhouse Gas,"
34. "Greenwashing,"
35. "Guerilla Gardening,"
36. "Heirloom Produce,"
37. "Industrial Agriculture,"
38. "Integrated Pest Management,"
39. "Leapfrogging,"
40. "Limit,"
41. "Luddite,"
42. "Malthusian,"
43. "Monoculture,"
44. "Native,"
45. "Natural Capitalism,"
46. "Natural Capital,"
47. "Naturalist,"
48. "Nature,"
49. "Objectification,"
50. "Offsets,"
51. "Organic,"
52. "Recycling/Downcycling,"
53. "Permaculture,"
54. "Pollution,"
55. "Polyculture,"
56. "Post-Scarcity,"
57. "Precautionary Principle,"
58. "Primitivism,"
59. "Profit,"
60. "Renewable,"
61. "Seed Saving/Seed Sharing,"
62. "Service/End Use,"
63. "Sustainability,"
64. "Technical Metabolism,"
65. "Toxicity,"
66. "Triple Bottom Line,"
67. "Use Value/Exchange Value,"
68. "Vegetarianism,"
69. "Viridian,"
70. "Waste,"
71. "Wilderness"

Choose fifty Keywords from this list. Organize your chosen Keywords into three separate, conceptually connected, sets. You can use any criteria that seems useful to you to organize these sets. The only rule is that no resulting set can contain fewer than six Keywords.

Each set should have a title or heading that indicates the criteria governing inclusion to that set. Once you have organized your three sets in this way, briefly define each one of the Keywords you have included in each set in your own words. Ideally, your definitions should be as clear and as concise as possible. These definitions should be a matter of a sentence or two rather than a paragraph or two. They are definitions, not essays or explanations. It should be clear from your definitions why each of the Keywords in each of the three sets are conceptually connected to each other, but it is also crucial that no terms within a set are to be treated as synonymous, and that your definitions distinguish Keywords from one another (even if the resulting distinctions are sometimes matters of nuance).

Once you have defined all these Keywords, provide a short quotation (feel free to edit and prune to keep your chosen citations properly pithy) from one of the texts we have read this term to accompany your definition. The quotation you choose can be a definition you found helpful in crafting your own definition, it can be an example or illustration you found especially clarifying, it can a matter of contextualization, framing, or history that you found illuminating, it can even be something you disagreed with so strongly it helped you understand better what you really think yourself.

Obviously, there are endless ways of organizing these sets, defining their Keywords, distinguishing them from one another, and connecting them up to the texts we have read. What matters for this first part of the exam is that you follow the rules of the exercise, not that you arrive at some single "right answer" you may think I have in mind.

PART II:

Write a short essay (5pp.), in which you show that the conception(s) of "nature" -- understood as intelligibility, as sublimity, as home, as resource, as object, as wilderness, as custom, or what have you -- assumed or expressed in the argument of one or two (at most two) of the texts we have read together this term yields unexpected insights or problems for that text, or provides the basis for an unexpected commonality or continuity between two texts texts you are comparing in your reading. (How do you know the problem or insight you are calling attention to in your reading is sufficiently strong to warrant consideration as "unexpected" in the sense I mean? That's easy: It must simply be a strong enough claim that you can imagine an intelligent opposition to it.)

Thursday, November 08, 2007

Some Terms

Some of the terms we've discussed the past few weeks, most of which are likely to appear on the final. The list is not yet complete. But it would be a good idea to start thinking about these terms in advance. Also, I thought it might be fun to open the list to you all. What are terms that should appear but are not yet here? Add them in Comments. Check back here over the next couple of weeks, the list will continue to expand.

"Abrasion,"
"Backstory,"
"Biodiversity,"
"Biomimicry,"
"Biopiracy,"
"Biosphere,"
"Climate Change,"
"Commons,"
"Companion Planting,"
"Consensus Science,"
"Cradle-to-Cradle,"
"Deep Ecology,"
"Democracy,"
"Denial,"
"Ecology,"
"Ecofeminism,"
"Ecosocialism,"
"Endangered Species,"
"Externality,"
"Footprint,"
"Integrated Pest Management,"
"Leapfrogging,"
"Limit,"
"Monoculture,"
"Natural Capitalism,"
"Nature,"
"Organic,"
"Recycling/Downcycling,"
"Permaculture,"
"Pollution,"
"Polyculture,"
"Post-Scarcity,"
"Precautionary Principle,"
"Sustainability,"
"Technical Metabolism,"
"Toxicity/Abrasion,"
"Triple Bottom Line,"
"Viridian,"
"Wilderness"

Wednesday, October 31, 2007

Syllabus

Those having trouble scrolling back to the syllabus links, this should take you there. Those who have a chance, check out this piece by Vandana Shiva as well. Lots to talk about tomorrow, see you then!

Monday, September 03, 2007

Provisional Syllabus

Critical Theory B: Nature in Theory, Fall 2007

Instructor: Dale Carrico; dalec@berkeley.edu
Course Site: http://tecblogging.blogspot.com/

Grade Breakdown:
Attendance/Participation 20%
Co-facilitate Class Discussion/Precis 20%
In-Class Report 20%
Final Exam: 40%

Week One | Introductions

August 30
Administrative Introduction, Personal Introductions

Week Two | Contemporary Environmentalist Idols and Transcendentalists Precursors

September 6

Curtis White, Idols of Environmentalism, Ecology of Work
Ralph Waldo Emerson, from Nature; Henry David Thoreau, from Walden

Week Three | Ecofeminism

September 13

Cathleen McGuire and Colleen McGuire, Ecofeminist Visions
Rosemary Radford, Ruether, Ecofeminism: Symbolic and Social Connections of the Oppression of Women and the Domination of Nature, from Carol Adams, ed., Ecofeminism and the Sacred
Catherine Keller, Dark Vibrations: Ecofeminism and the Democracy of Creation
Greta Gaard, Toward a Queer Ecofeminism

Week Four | Ecosocialism

September 20

An Ecosocialist Manifesto by Joel Kovel and Michael Lowy
Joel Kovel, Why Ecosocialism Today?
Common Voice, Ecosocialism
James O'Conner: Selling Nature
Mike Davis, Slum Ecology
Walter R. Sheasby's Amazon Guide: "So You'd Like to… Replace Capitalism with Green Socialism"

Week Five | Natural Capitalism

September 27

Paul Hawken: Natural Capitalism
A Roadmap for Natural Capitalism, Amory Lovins, Hunter Lovins, Paul Hawken
Michael Albert: Natural Capitalism?
Wayne Normand and Chris MacDonald, Getting to the Triple Bottom Line
James Boyle, Enclosing the Genome
Peter Barnes: Capitalism, 3.0
Time to Upgrade
A Short History of Capitalism
The Limits of Government
The Limits of Privatization
Reinventing the Commons
Trusteeship of Creation
Universal Birthrights
Sharing Culture
Building the Commons Sector
What You Can Do

Week Six | Deep Ecology

October 4

Arne Naess, The Shallow and the Deep
Introduction to Deep Ecology, An Interview with Michael E. Zimmerman, by Alan Atkisson
E.P. Pister, The Rights of Species and Ecosystems
Church of Deep Ecology
Murray Bookchin, Social Ecology Versus Deep Ecology

Week Seven | Some Victoriana

October 11

Guardian UK Review: Victorian Holocausts
Amartya Sen NYT Review, Victorian Holocausts
Mike Davis, Victorian Holocausts, Chapter One.
Oscar Wilde, The Decay of Lying
John Stuart Mill, On Nature

Week Eight | Critique of Technological Society

October 18

Theodor Adorno and Max Horkheimer, The Culture Industry: Enlightenment as Mass Deception
Jacques Ellul, The Technological Society
John Zerzan, Agriculture
John Zerzan, Technology
John Zerzan, Why Primitivism?
Marc Stiegler, The Gentle Seduction

Week Nine | Bright Green or Dim?


October 25

Bruce Sterling, Viridian Design
Grist on Worldchanging's Bright Green Principles (read the Comments!)
Apple Computer: Fun for You, Toxic for the Environment
When 1st Life Meets 2nd Life
Kirkpatrick Sale, Lessons from the Luddites
The Californian Ideology

Week Ten | Toxic World

November 1

Al Gore on Silent Spring
Rachel Carson, Silent Spring, The Obligation to Endure
Michael Braungart, Intelligent Materials Pooling: Evolving a Profitable Technical Metabolism
What Happened at Bhopal?
Alex Kirby, Contaminated Breastmilk
Blacksmith Institute, 10 Most Polluted Places

Week Eleven | Alternative Agricultures

November 8

Malcome Scully, The Destructive Nature of Our Bountiful Harvests
Introduction to Permaculture: Concepts and Resources
Deborah Madison, Grace Before Dinner
Ted Nace, Breadcast of Democracy
Jack Kittredge, Pesticides in Food
AMS/USDA, Organic Food Standards and Labels
Sustainable Agrigulture Delivers the Crops

Week Twelve | Extracting Ourselves from Extraction

November 15

Saul Landau, Ronald Reagan and Bottled Water
National Resources Defense Council, Bottled Water: Pure Drink or Pure Hype?
BBC: World Water Crisis
The Coming Water Wars: Demography and Water Resources
The Coming Water Wars: Chart
Dale Allen Pfeiffer, Eating Fossil Fuels
Howard Kunstler, The Long Emergency
Howard Kunstler, A Five Part Online Video Exploration: The Long Emergency
Chris Vernon, Agriculture Meets Peak Oil

Week Thirteen

November 22 Thanksgiving Holiday

Week Fourteen | The Death of Environmentalism

November 29

Michael Shellenberger and Ted Nordhaus, The Death of Environmentalism

Don't Fear the Reapers
, A Grist Special Series on the Alleged Death of Environmentalism

Week Fifteen | An Inconvenient Truth

December 6

"An Inconvenient Truth" (Screening)
Closing Remarks Hand in Take Home Final Exam

Thursday, August 30, 2007

Readings for Week Two

A Provisional Syllabus for the Whole Term will be ready in a few days. But here's what we're covering next week:

Part One:

Curtis White: Idols of Environmentalism and Part Two: The Ecology of Work

Break

Part Two:

From Nature, by Ralph Waldo Emerson, Nature, Beauty. Read more, if you like.

From Walden, by Henry David Thoreau, Where I Lives and What I Lived For, Spring, Conclusion. Read more, if you like.

It would be great to have at least a couple of folks step up to co-facilitate the discussion of these early texts. Talk to me after class tomorrow or e-mail me over the weekend if any of these texts appeals to you with special forcefulness.

Co-facilitating Discussions and Writing a Precis

One of the key assignments for our course will be your co-facilitation of class discussion of an assigned text. This assignment also requires that you generate a précis of the text you are taking responsibility for. This precis should provide a point of departure for your contribution to the discussion in class, and you will also hand it in to me at the end of the session.

Think of this precis as a basic paraphrase of the argumentative content of a text.

Here is a broad and informal guide for a precis, consisting of question you should ask of a text as you are reading it, and again after you have finished reading it. Don't treat this as an ironclad template, but as a rough approach to producing a precis -- knowing that a truly fine and useful précis need not necessarily satisfy all of these interventions.

A precis should try to answer fairly basic questions such as:

1. What is the basic gist of the argument?
2. To what audience is it pitched primarily? Does it anticipate and respond to possible objections?
3. What do you think are the argument's stakes in general? To what end is the argument made?

a. To call assumptions into question?
b. To change convictions?
c. To alter conduct?
d. To find acceptable compromises between contending positions?

4. Does it have an explicit thesis? If not, could you provide one in your own words for it?
5. What are the reasons and evidence offered up in the argument to support what you take to be its primary end? What crucial or questionable warrants (unstated assumptions the argument takes to be shared by its audience, often general attitudes of a political, moral, social, cultural nature) does the argument seem to depend on? Are any of these reasons, evidences, or warrants questionable in your view? Do they support one another or introduce tensions under closer scrutiny?
6. What, if any, kind of argumentative work is being done by metaphors and other figurative language in the piece?
7. Are there key terms in the piece that seem to have idiosyncratic definitions, or whose usages seem to change over the course of the argument?

As you see, a piece that interrogates a text from these angles of view will yield something between a general book report and a close reading, but one that focuses on the argumentative force of a text. For the purposes of our class, such a precis succeeds if it manages
1. to convey the basic flavor of the argument and
2. provides a good point of departure for a class discussion.

Thursday, December 07, 2006

Class discussions

I found some interesting similarities between Litman's arguments and arguments concerning basic income guarantee, and I wanted to kind of locate their connective tissue. Actually, I guess I should be more specific: there were moments during past class discussions regarding basic income guarantee that could have been applied to today's arguments, so I suppose this is actually more about the particulars of our class dynamic as opposed to texts that make certain claims.

That being said, I remember that when basic income guarantee became a topic of discussion, there were a number of reactions that sounded something like this: what incentive will there be to work certain kinds of jobs which "must be done" if the fiscal backing does not exist? Isn't it too close to an idealist, utopian myth that can't function because skill=monetary incentive fueling a desire to develop certain skill=application of skill? Won't there be too great of a leveling effect that will render individualism inactive because we will somehow [based solely on our income] lose a sense of "purposeful work"? Communism? Assimilation? Lack of definable, class and social differences?

All of these assumptions or fears have a definite weight and legitimacy, and should not be immediately dismissed because they are the product of our shared contemporary experiences and make a lot of sense in THIS CONTEXT (the context being contemporary life). What developed out of that argument, however, was the notion that how we identify "work" and what constitutes the process of working and production would have to become or WOULD become radically different because if you are paid simply to exist, then the activities you do everyday can BECOME what work means {a really really really great argument for Artists, with a capital A, D.C.).

Ok, so there's that. That in and of itself isn't the connection I'm trying to make. What connects these two discussions more directly is the ideology shift. There was an almost intrinsic agreement initially that determined what constituted "work" that wasn't necessarily a vocalized claim, but I think parallels could have been made among individual philosophies of what work represented to each of us that could form a sort of general consensus of what we think of as productive labor. Keeping that in mind, it was necessary for us to reaffirm what we dictate to be work in order for something like basic income guarantee to make any amount of sense.

Similarly, I found that the discussion of the Litman piece today required an adjustment of what we believe constitutes property and how we think about the exchange of information. I think it's interesting that Litman explained the history of copyright laws in order to kind of demonstrate that what are consider common-placed notions of intellectual property haven't actually existed for all that long. In the same way that [and this is not the best example, but something relatable to critical theory and the course overall], when we speak about Nature, we need to remember the history of how Nature developed as an ideology, we need to keep in mind that WE, the contemporaries of every historical moment, are the inventors of these compartments. Therefore, we have full license to change our minds.

This is oversimplified, obviously. It's not like flicking on a switch. But it is an interesting, gradual exercise that I feel can free us of a number of unnecessary binds.

Just a thought.

Wednesday, December 06, 2006

I'm watching me

internet=panopticon?

well, maybe...

after getting past the wrong idea I originally had, I still cant see how the internet is parrelled to Foucault's panopticon. the thing that gets me is the freedom of activity in the participants. in the panoptic prison, the prisoners had no activity, ie- were stuck in a cell and therefore in the mechanism of the panopticon. Internet users however, have a very different experience. they are actively seeking out information to use in each persons own way. theres no coercion or intimidation(unless you bring up the recording industry suits) about viewing or creating websites as long as they confine to the law. true kiddie porn is off limits but I think it's for the best...really. other than that governments and organizations have no power (that I'm aware of) to control what content you consume. every so often I hear about how AOL or some other demon company sold customer activity lists to the CIA or FBI and I say get educated about how the net works, get a floating IP or change web providers! Or better yet lobby the government to change these invasive practices. anyway.

the internet is a decentralized network made up of many large corporate pages but far more personal sites and blogs. in the prison, it' a top down, one way, direct contact, 'oh my god I'm in a fucking prison with armed guards watching my ass' kind of place.

perhaps its something more. maybe its about ISP providers having the power to control content. if the internet is an ocean, then the providers are the boats that get everyone around. what if those boats only went to certain destinations?? destinations that those wanting to keep an eye on everyone wanted you to see and those that they did not. I do not think the latter is the case. there are many out there that have the knowledge of the behind the scenes stuff that really help keep info flowing in the face of restrictions. so log off myspace for once and check out hackaday.com or reddit.com or or or....hey! cheap DVD players on amazon..........


adam day

Tomorrow's Readings:

Just a reminder, tomorrow is a Law Day.

We're discussing Jessica Litman's Sharing and Stealing and James Boyle's Enclosing the Genome?

Those of you who have not yet co-facilitated a class discussion really need to figure out how that is going to happen. Next week we will be reading selections from the Precarity issue of fibreculture. Look it over in advance and have a sense of the pieces you might be interested in talking about in class a bit.

Sunday, November 26, 2006

Your Final Exam

Here is your final exam. Choose to answer two from the following four questions. Each of your answers should be approximately 3-4 pages long. You may spend as much time as you wish on the exam and you should use your texts to help substantiate your points. Stick to the questions and be sure to finish on time. You are to submit a physical copy of your exam to me on the last scheduled meeting of the course.

(a) Summarize what you take to be the key insight in any single one of the theoretical texts we have read over the course of the term and then show how that insight illuminates your reading of “The Gentle Seduction,” “Desk Set,” or “Colossus: The Forbin Project” (choose one).

(b) Summarize what you take to be the central argument of C.S. Lewis’ “The Abolition of Man” and then propose two other texts we have read over the course of the term that reiterate key features (these can include either strengths or limitations, depending on your viewpoint) of Lewis’ argument.

(c) Compare and contrast two works in which the theme of an emerging technologically facilitated “spiritualization” or “dematerialization” is central, but in each case importantly different, in your view of the arguments the authors are making.

(d) Compare and contrast two works in which the theme of an emerging technologically facilitated “global” or “planetary” perspective is central, but in each case importantly different, in your view of the arguments the authors are making.

Sunday, September 24, 2006

Next Week

Don't forget to click on the syllabus for the latest info about what we are reading and who will be facilitating discussion. If you are faciliating soon and your choice of texts isn't on the syllabus yet -- e-mail me to remind me so the information appears as soon as possible. Speaking of as soon as possible... that's when your blog-posts need to arrive for the first assignment. Kick it into gear, people.