Advertisement

Algorithmic Tumult and the Brilliance of Chelsea Manning

  • Matthew Fuller
Chapter

The term posthuman is sometimes used to denote a supercession of the human by means of multiple kinds of enhancement: with the brain and sensual organs becoming part of a service core providing key emotional, reflexive and phenomenological glue to a more advanced cognitive, immunological and performance-enhanced superstructure. Sleek persons with complex electromagnetic auras perform labour, proceduralise compensatory erotic behaviours, and divine important subatomic truths with a glance of their analytically enhanced irises. In the future they will have gone through so many upgrades that not even their souls have an end-user license agreement to neutrally click “okay” on every time they awake to feel their veins squirted with artisan meta-smoothie.

Frankly, that this is not the kind of posthuman discussed here in this chapter is a bit of a let down. The perfect future of heightened productivity and emails that are largely attended to by an enhanced sub-processing unit of neural tissue...

Notes

Acknowledgements

Thanks to Nikita Mazurov and Luciana Parisi for their help.

References

  1. Beecher Stowe, Harriet. 1999. Uncle Tom’s cabin. Knoxville: Wordsworth Classics.Google Scholar
  2. Calvino, Italo. 2003. American diary 1959–60. In Hermit in Paris. Trans. M. McLaughlin, 16-120. London: Penguin.Google Scholar
  3. Chelsea Manning Support Network. 2014. http://www.chelseamanning.org/. Accessed 15 June 2015.
  4. Coleman, E. Gabriella. 2013. Coding freedom, the ethics and aesthetics of hacking. Princeton: Princeton University Press.Google Scholar
  5. Einstein, Elizabeth. 1979. The printing press as an agent of change. Cambridge: Cambridge University Press.Google Scholar
  6. Fazi, M. Beatrice, and Fuller, Matthew. In press. Computational aesthetics. In A Companion to digital art, eds. Christiane Paul. Oxford: Blackwell.Google Scholar
  7. Fuller, Matthew, and Andrew Goffey. 2012. Evil media. Cambridge: MIT Press.Google Scholar
  8. Gaboury, Jacob. 2013. A queer history of computing. Rhizome. http://rhizome.org/editorial/2013/feb/19/queer-computing-1/. Accessed 15 June 2015.
  9. Goriunova, Olga. 2013. Die Kraft der Digitalen Ästhetik, uber meme, hacking und individuation. Zeitschrift fur Medienwissenschaft 8: 70–87.Google Scholar
  10. Israel, Jonathan I. 2001. Radical enlightenment, philosophy and the making of modernity, 1650–1750. Oxford: Oxford University Press, Oxford.CrossRefGoogle Scholar
  11. Kay, Alan, and Adele Goldberg. 2003. Personal dynamic media. In The New Media Reader, eds. Noah Wardrip-Fruin, and Nick Montford, 93–404. Cambridge: MIT Press.Google Scholar
  12. Kurzweil, Ray. 2005. The singularity is near, when humans transcend biology. New York: Viking.Google Scholar
  13. Li, Yue, Lidong Zhai, Zhilei Wang, and Yunlong Ren. 2013. Control method of Twitter- and SMS-based mobile botnet. In Trustworthy computing and services: International conference, ISCTCS 2012, Beijing, China, May 28-June 2, 2012, Revised Selected Papers, eds. Xu. Wu Yuyu Yuan, and Yueming Lu, 644–650. Heidelberg: Springer.CrossRefGoogle Scholar
  14. Mendez, Juan. 2012. Report of the Special Rapporteur on torture, and other cruel, inhuman or degrading treatment or punishment, Addendum, observations on communications transmitted to governments and replies received, United Nations General Assembly, 74–75.Google Scholar
  15. Northup, Solomon. 2014. Twelve years a slave. London: Penguin.Google Scholar
  16. Parisi, Luciana. 2013. Contagious architecture, computation, aesthetics and space. Cambridge: MIT Press.Google Scholar
  17. Sampson, Tony. 2012. Virality, contagion theory in the age of networks. Minneapolis: University of Minnesota Press.CrossRefGoogle Scholar
  18. Statement in Support of Providence Inquiry – US vs Private First Class (PFC) Bradley E. Manning (U). 29 January 2013. https://docs.google.com/file/d/0B_zC44SBaZPoQmJUYURBUnBycUk/edit?pli=1. Accessed 15 Jun 2015.
  19. Stone-Gross, Brett, Thorsten Holz, Gianluca Stringhini, and Giovanni Vigna. 2011. The underground economy of spam: A botmaster’s perspective of coordinating large-scale spam campaigns. In LEET’11 Proceedings of the 4th USENIX Conference on large-scale exploits and emergent threats. Berkley: USENIX Association.Google Scholar
  20. Terranova, Tiziana. 2014. Debt and autonomy: Lazzarato and the constituent powers of the social, The New Reader 1, http://thenewreader.org/Issues/1/DebtAndAutonomy. Accessed 15 June 2015.
  21. Watkins, Ali, Jonathan S. Landay, and Marisa Taylor. 2014. CIA’s use of harsh interrogation went beyond legal authority. Senate report says, McClatchyDC, 11 April. http://www.mcclatchydc.com/2014/04/11/224085/cias-use-of-harsh-interrogation.html#storylink=cpy/. Accessed 15 Jun 2015.
  22. Welch, Peter. 2014. Programming sucks. In Still Drinking, http://www.stilldrinking.org/programming-sucks. 27th April. Accessed 15 Jun 2015.
  23. Woolf, Virginia. 2004. The waves. London: Vintage.Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Goldsmiths University of LondonLondonUnited Kingdom

Personalised recommendations