Advertisement

Nietzsche’s Snowden: Tightrope Walking the Posthuman Dispositif

  • Richard J. Carlson
Chapter

Abstract

Edward Snowden’s disclosures on the National Security Agency (NSA) surveillance programs confirm exponential advances in pioneering, what Gilles Deleuze called, ‘societies of control.’ What makes Snowden’s revelations seem so futuristic and dystopian is the total interoperability and full spectrum dominance of Big Data technologies have produced a surveillance dispositif that aims to ‘Collect it All.’ Just as there is a periodicity shift in the transition from Michel Foucault‘s ‘disciplinary societies’ to Deleuze’s ‘societies of control’ today, approximately a quarter of century from when his postscript was penned, the advent of Big Data signals a shift from the early cybernetic control systems that Deleuze theorized. The first part of this paper describes societies of control in terms of emerging Big Data technologies, that I call the ‘posthuman dispositif.’ The second part develops resistance strategies by riffing on statements Deleuze makes in his book ‘Foucault’: “What resistance extracts… is the forces of a life…. Life is a sort of counter-power, a return flow of forces aimed backward toward the source of exploitation” (p. 92). As a concrete example of resistance I instance Edward Snowden’s transformation from C.I.A/N.S.A systems analyst to government whistle-blower. I contextualize Snowden’s flip by invoking Nietzsche’s ‘Thus Spake Zarathustra.’ Finally, I deploy Gilbert Simondon’s notion of the transindividual to explore resistance to the posthuman dispositif.

Keywords

National Security National Security Agency Bare Life Dangerous Offender Exceptional Nation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Agamben, G. (1998). Homo Sacer: Sovereign power and bare life. Stanford: Stanford University Press.Google Scholar
  2. Benjamin, W. (1969). The work of art in the age of mechanical reproduction. In Illuminations. New York: Schocken Books.Google Scholar
  3. Bigo, D. (2006). Globalized (in)security: The field and the ban-opticon, http://www.people.fas.harvard.edu/~ces/conferences/muslims/Bigo.pdf. Accessed February 5, 2015.
  4. Bogard, W. (1996). The simulation of surveillance: Hypercontrol in telematic societies. Cambridge: Cambridge University Press.Google Scholar
  5. Bogard, W. (2007). The coils of a serpent haptic space and control societies. http://www.ctheory.net/articles.aspx?id=581
  6. Bourdieu, P. (1977). Outline of a Theory of Practice. Cambridge University Press. p. 164.Google Scholar
  7. Braidotti, R., Bio-power and Necro-politics. (2007). http://www.hum.uu.nl/medewerkers/r.braidotti/files/biopower.pdf. Accessed August 20, 2015.
  8. Butler, J. (1997). The psychic life of power: Theories in Subjection. Redwood City: Stanford University Press.Google Scholar
  9. Butler, J. (2003). Frames of war: When is life grievable?. New York: Verso.Google Scholar
  10. Currior, C., & Marquis-Boire, M. (2015). A detailed look at hacking team’s emails about its repressive clients. The Intercept, July 8, the intercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/. Accessed December 4, 2015.Google Scholar
  11. Cole, D. (2015). The New America: Little privacy, big terror. The New York Review of Books. http://www.nybooks.com/articles/archives/2015/aug/13/new-america-little-privacy-big-terror/
  12. Combes, M. (2013). Gilbert Simondon and the transindividual. Cambridge, MA: MIT Press.Google Scholar
  13. de Beistegui, M. (2004). Truth and genesis: Philosophy as differential ontology. Indianapolis: Indiana University Press.Google Scholar
  14. Deleuze, G. (1988). Foucault (S. Hand, Trans.). Minneapolis: University of Minnesota Press.Google Scholar
  15. Deleuze, G. (1992). Postscript on the societies of control. October, 59(Winter), 3–7. MIT PressGoogle Scholar
  16. Deleuze, G., & Guattari, F. (2009). Anti-oedipus: Capitalism and schizophrenia. New York City: Penguin.Google Scholar
  17. Deleuze, G., & Negri, A. (1990). Futur Anterieur (M. Joughin, Trans). http://www.uib.no/sites/w3.uib.no/files/attachments/6._deleuze-control_and_becoming_0.pdf. Accessed June 1, 2015.
  18. Foucault, M. (1988). The history of sexuality, Vol. 3: The care of the self.Google Scholar
  19. Foucault, M. (1995). Discipline & punish: The birth of the prison. New York: Vintage Books.Google Scholar
  20. Foucault, M. (2007). Security, territory, population: Lectures at the Collège de France 1977–1978 (Vol. 4). New York City: Picador.Google Scholar
  21. Galloway, A. R. (2011). Deleuze and Computers. Lecture at the University of Massachusetts. Amherst, MA, December 2, 2011.Google Scholar
  22. Galloway, A., & Thacker, E. (2007). The exploit: A theory of networks. Minneapolis: University of Minnesota Press.Google Scholar
  23. Gellmann, B. (2013). Edward Snowden, after months of NSA revelations, says his mission’s accomplished. The Washington Post, December 23, 2013.Google Scholar
  24. Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Picador Press.Google Scholar
  25. Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.CrossRefGoogle Scholar
  26. Haraway, D. (1991). Simians, cyborgs and women: The reinvention of nature. New York: Routledge.Google Scholar
  27. Harcourt, B. (2015). Exposed desire and disobedience in the digital age. Boston, MA: Harvard University Press.CrossRefGoogle Scholar
  28. Harding, L. (2014). How Edward Snowden went from loyal NSA contractor to whistleblower. The Guardian, January 31, excerpted from The Inside Story of the World’s Most Wanted Man (2014), Vintage, a division of Penguin Random House LLC. http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract. Accessed January 19, 2015.
  29. Hardt, M., & Negri, A. (2008). Reflections on empire. Polity Press.Google Scholar
  30. Hassan, I. (1977). Prometheus as performer: Toward a posthuman culture? Georgia Review, 31(4), 830–850.Google Scholar
  31. Hayles, K. N. (1999). How we became posthuman: Virtual bodies in cybernetics, literature, and informatics. Chicago: University of Chicago Press.Google Scholar
  32. Johnson, B. (2014). American spies want Edward Snowden Dead. http://www.buzzfeed.com/bennyjohnson/americas-spies-want-edward-snowden-dead#.ewQDQPZNb. Accessed January 2, 2016.
  33. Kitchin, R. (2013). Big data and human geography: Opportunities, challenges and risks. Dialogues in Human Geography, 3(3), 262–267.CrossRefGoogle Scholar
  34. Kroker, A. (1994). Data trash: The theory of the virtual class. London: Palgrave Macmillan.Google Scholar
  35. Kroker, A. (2005). Born again ideology. http://www.ctheory.net/articles.aspx?id=487. Accessed January 2, 2015.
  36. Kroker, A. (2014). Exits to the posthuman future. Boston: Polity Press.Google Scholar
  37. Lohr, S. (2015). Dataism: The revolution transforming decision making, consumer behavior, and almost everything else. HarperCollins.Google Scholar
  38. Ludlow, P. (2013). The strange case of Barrett Brown. The Nation, June 18. http://www.thenation.com/article/strange-case-barrett-brown/. Accessed December 5, 2015.
  39. Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data and Society. doi: 10.1177/2053951714541861. http://bds.sagepub.com/content/1/2/2053951714541861#ref-45. Accessed May 19, 2015.
  40. McLaughlin, J. (2015). NSA chief wants to watch, as well as listen and read. The Intercept, June 24, 2015. https://firstlook.org/theintercept/2015/06/24/nsa-chief-wants-watch-well-listen-read/
  41. Nietzsche, F. (1968). The will to power. New York City: Vintage Press.Google Scholar
  42. Nietzsche, F. (1999). Thus Spake Zarathustra. New York: Dover Publications.Google Scholar
  43. Nietzsche, F. (2009). Ecce homo: How one becomes what one is (D. Large, Trans). Oxford: Oxford University Press.Google Scholar
  44. Nietzsche, F. (2010). Thus Spake Zarathustra. http://nationalvanguard.org/books/Thus-Spoke-Zarathustra-by-F.-Nietzsche.pdf. Accessed June 5, 2015.
  45. Orwell, G. 1984 (1948). https://ebooks.adelaide.edu.au/o/orwell/george/o79n/index.html. Accessed June 11, 2015.
  46. Raley, R. (2013). Dataveillance and countervailance. In Raw data is an oxymoron (pp. 121–145). Cambridge, MA: MIT Press.Google Scholar
  47. Regalado, A. (2015). Engineering the perfect baby. MIT Technology Review, 118(3), 27–33.Google Scholar
  48. Rodowick, D. N. (1999). Memory of resistance. In I. Buchanan (Ed.), A Deleuzian century? (pp. 44–45). Durham: Duke University Press.Google Scholar
  49. Saunders, F. S. (2016). Where on Earth are you? London Review of Books, 38(5), 7–12.Google Scholar
  50. Scott, D. (2014). Gilbert Simondon’s psychic and collective individuation. Edinburgh: University of Edinburgh Press.Google Scholar
  51. Simondon, G. (1989). L’individuation psychique et collective. Auber.Google Scholar
  52. Simondon, G. (1995). L’individu et sa genese physic-biologique. Paris: Presses Universitaires de France (1964, Editions Jerome Mullion).Google Scholar
  53. Sri Aurobindo. (1972). The synthesis of yoga and the life divine. Pondicherry: Sri Aurobindo Ashram Press.Google Scholar
  54. Stiegler, B. (2003). Philosophizing by accident (D. Barison, D. Ross, & P. Crogan, Trans) Excerpt from an unpublished translation of Stiegler’s book, Posser aI’oete. Paris: Galilee. http://public.journals.yorku.ca/index.php/public/article/viewFile/30090/27651
  55. Stiegler, B. (2004). De la misère symbolique 1. L’époque hyperindustrielle. Paris: Galilée.Google Scholar
  56. Stroud, M. (2014). The minority report: Chicago’s new police computer predicts crimes, but is it racist? The Verge. http://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist. Accessed February 3, 2015.

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Independent ScholarPort AngelesUSA

Personalised recommendations