Trevor Paglen talk 8PM @ the Machine Project L.A.

Secret Black-ops Iron-ons, and the Wrath of KHAN! this weekend at Machine

[Update 11/1/15 Trevor Paglen at Artsy.]

On  Friday, May 23rd at 8pm, geographer and artist  Trevor Paglen  will be giving a talk on the network of hidden budgets, state secrets, covert military bases, and disappeared people that military and intelligence insiders call the "black world." Suprisingly, these "black sites" and non-existent military installations have also given rise to an incredible catalog of black-ops iron-on membership patches that have to be seen to be believed. Trevor recently compiled these patches into a book called  I Could Tell You But Then You Would Have To Be Destroyed By Me, which can be seen (and may be for sale?) at the event.http://www.machineproject.com/  1200 D North Alvarado StreetLos Angeles, CA 90026213-483-8761

WARK! a UCLA 22 April 12:30 PM talk followUP^!

Ken Wark gave a mind-blowin' talk yesterday at UCLA!  Hopefullly, video/audio should be available from D!MA archives. A Wonderful flow of jargon, tags, andnew categories!  Someday we will have tags here on our WordPress app! Wark mentioned WordPress more than once.See a piece here from his new book due out laterfrom Sit  

Game

Sunday, April 13
The Guy Debord that is best known is the one who is the author of The Society of the Spectacle, but in many ways it is not quite a representative text. Lately there has also been a revival of Debord the film maker, but here I want to think about Debord is a slightly different light. So I will discuss not so much his writing or his films, and still less his biography, but a game. Beside being a writer, a film maker, an editor, and a first rate professional of no profession, he was also, of all things, a game designer.http://totality.tv/2008/4/13/game  

MACKENZIE WARK, GAMER THEORY

THEORY PROFESSOR CANDIDATE

 

April 22, 2008, 12:30 pm       »  

McKenzie Wark is the author of Gamer Theory (Harvard UP), A Hacker Manifesto (Harvard UP), and various other things.

http://www.dma.ucla.edu/events/calendar.php?ID=536

 

 

 

Keep the InterNETS Free! Stanford FCC event for Net Neutrality

online liveJoin the conversation at the Free Press Action Network where we'll be live blogging during the hearing. We'll be discussing the hearing, current Internet policies, and what we can do to protect Internet freedom for the future.Live Chat During the FCC HearingDATE: Thursday, April 17TIME: 3- 10 p.m. ET / 12-7 p.m. PTLOCATION:  www.freepress.net/actionIn recent months, Comcast, AT&T and Verizon have been caught blocking, filtering and spying on your Internet activities. This event is one of our best chances to tell Washington policymakers that the Internet must remain open.  http://www.smartmobs.com/2008/04/16/tune-in-online-to-fcc-hearing-on-future-of-the-internet/

 

       okAn  FCC hearing  schedule for Thursday at Stanford University will focus on whether ISPs can shape, filter and even block content that travels over their networks. (The public –more than 1.5 million  of whom have spoken out against such violations – has a rare opportunity to testify before the commission during the hearing.)http://savetheinternet.com/=stanford  

Six Degrees of Separation/Connection may be in trouble. Why can't 6/degrees find Osama bin laden?

Six Degrees has problems

ScienceFriday.com's version

Chances are you've heard of the 'small world' idea of six degrees of separation. But is it correct?

The idea traces back to an experiment begun in 1967 by Stanley Milgram, in which he tried to trace how many acquaintances it would take to pass a letter between two randomly selected people. The result that entered the public consciousness was that in general it took six steps or fewer to bridge the gap between any two people. But is that result accurate? Judith Kleinfeld,

http://www.sciencefriday.com/program/archives/200801256

tags, 6 degrees, Kevin Bacon Effect, six degrees, Milgram,

Michael Silverblatt, 'Bookworm', Interviews William Gibson

Unfortunately I can't link directly to the audio. You can subscribe to Bookworm in iTunes (and I highly recommend it). You can listen from this KCRW link to the Gibson interview page.

Spook Country (Putnam)
What's happened to William Gibson? Along with the most sophisticated future-predictions, speculations about the sociology of cities, and adventures in virtual post-realities, he has finally learned how to get his characters from one room to another. We explore this accomplishment (in which he takes a good deal of pride)

"your papers, please!", Air travelers to need permission to travel TSA

from


Edward Hasbrouck
<edward@hasbrouck.org>
<http://hasbrouck.org>


The deadline for public comments on the USA Transportation Security
Administration's proposed rules to make would-be travellers obtain
individualized prior permission for all journeys by air to, from,
overflying, or even *within* the USA is this Monday, 22 October 2007.

If you have a chance before 5 p.m. Washington time on Monday, I urge
you to go to http://www.regulations.gov and tell the TSA what you
think of their scheme. You don't have to be a citizen of the USA to
submit comments, and you can even do so anonymously. The docket
number is TSA-2007-28572, and there are more details at:

http://hasbrouck.org/blog/archives/001286.html

latest " 'Net Neutrality" outrage by Tel-Co's: How Comcast blocks your Internet traffic

from http://machinist.salon.com/

How Comcast blocks your Internet traffic

The broadband company's audacious scheme to interrupt your data proves why network neutrality rules are crucial.

By Farhad Manjoo

Oct. 19, 2007 |

Bless the Associated Press for unearthing, through careful and diligent investigation, Comcast's shameful, hidden Internet traffic-management scheme.

Comcast, the AP determined, actively manages data on its network by using software to essentially masquerade as its subscribers' machines. When non-Comcast Internet subscribers request files from your Comcast-connected machine — as happens in peer-to-peer file-sharing applications — Comcast's technology steps in and tells the non-Comcast subscriber you're not available.

This is a difficult story to explain, but it's quite important. For years, consumer advocates have been demanding that Congress and/or the Federal Communications Commission impose "network neutrality" regulations that would force broadband providers (like Comcast) to treat all data on a network equally. Lawmakers have so far failed to do so.

Broadband providers, meanwhile, insist that they do treat all traffic equally, but they reserve the right to use certain technologies to "manage" data on their network. The Comcast plan suggests that broadband providers mean something very broad by "traffic management" — including, it appears, purposefully stepping into your network sessions to shut them down.

To understand why this whole process is so egregious, let's look at it in FAQ format.

What is Comcast doing, and why?

Iran labels CIA 'terrorist organization' by Ali Akbar Dareini.

this is priceless! tit for tat? equal treatment under the Law? How will Americans like it now when Iran or other countries treats us like we treat them? When Americans are held with suspended Human Rights?! Look out! don't notice these double -standards! Really one good Bateson binding Bonds! Is this the begining of Fair Play on the US by all the other countries of the Planet?

ok from

Iran labels CIA 'terrorist organization'

 

By ALI AKBAR DAREINI, Associated Press WriterSat Sep 29, 6:09 PM ET

Iran's parliament voted Saturday to designate the CIA and the U.S. Army as "terrorist organizations," a largely symbolic response to a U.S. Senate resolution seeking a similar designation for Iran's Revolutionary Guards.

The parliament said the Army and the CIA were terrorists because of the atomic bombing of Japan; the use of depleted uranium munitions in the Balkans, Afghanistan and Iraq; support of the killings of Palestinians by Israel; the bombing and killing Iraqi civilians and the torture of imprisoned terror suspects.

Burning Men, Part 2: the Order of Things by Erik Davis of techgnosis

How does Erik think this stuff UP^! too much and very nice. R eally gettin' a Clue!

The Perp! above ^

eDavis:

So when Burners invoked specifically legalistic categories like "arson" and "reckless endangerment"–and I did it too at times–they were not just rationally debating Addis' fate. They were actively deflating the productive legal ambiguity of Black Rock City as a self-governing political and territorial space by capitulating, too quickly and without consciousness, to the reality tunnel of the State and, particularly, to its conception of property.

and

Look, for example, at the constricted lives of so many kids today, with their helmets and knee pads and car-seats, their time managed, their piss checked, their movements tracked by cell phones and prohibitions against aimless wandering. What has been killed in the process of making them less likely to be killed? Perhaps, in our fearful genuflection before safety, we are deadening our taste for the raw and nervy exultation of cognitive and physical liberty–a liberty which most certainly should include the freedom to attend dangerous and wayward festivals where, if your aren't careful or even lucky, large burning things might fall on your head.

Burning Men
Part One: Chaosmos

book: Digital Contagions: A Media Archaeology of Computer Viruses (Digital Formations) by Jussi Parikka

by

image

x.

Joseph Nechvatal
Mid-September 2007, Marrakech
http://www.nechvatal.net

from

http://transition.turbulence.org/blog/2007/09/28/review-of-digital-contagions/trackback/

Though no J. G. Ballard or William S. Burroughs, Jussi Parikka nevertheless sucks us into a fantastic black tour-de-force narrative of virulence and the cultural history of computer viruses (*), followed by innumerable inquisitive innuendoes

We may wish to recall here that for Deleuze and Guattari, media ecologies are machinic operations (the term machinic here refers to the production of consistencies between heterogeneous elements) based in particular

To begin this caliginous expedition, Digital Contagions plunges us into a haunting, shifting and dislocating array of source material that thrills. Parikka launches his degenerate seduction by drawing from, and intertwining in a non-linear fashion, the theories of Gilles Deleuze and Felix Guattari (for whom my unending love is verging on obsession), Friedrich Kittler, Eugene Thacker, Tiziana Terranova, N. Katherine Hayles, Lynn Margulis, Manuel DeLanda, Brian Massumi, Bruno Latour, Charlie Gere, Sherry Turkle, Humberto Maturana and Francisco Varela, Deborah Lupton, and Paul Virilio. These thinkers are then linked with ripe examples from prankster net art, stealth biopolitics, immunological incubations, the disassembly significance of noise, ribald sexual

Jussi Parikka

Jussi Parikka studied Cultural History at the University of Turku, Finland, and is currently Visiting Lecturer and Research Scholar in Media Studies, Humboldt University, Berlin. His Digital Contagions: A Media Archaeology of Computer Viruses is published by Peter Lang, New York, in the Digital Formations series (2007). In addition, two co-edited books are forthcoming: The Spam Book: On Viruses, Spam, and Other Anomalies from the Dark Side of Digital Culture and Media Archaeologies. Parikka's homepage is <http://users.utu.fi/juspar>.

Back to article.

book on amazon

Node magazine started based on William Gibson's new novel, Spook Country!

Listen to latest Gibson audio interview here

William Gibson

Listen to William Gibson
Part one (runs 13:16) | Part two (runs 17:03)

CBC Radio One site and info

 September 19, 2007

 

William Gibson Bookclub

This week on the podcast a special audio bookclub with award-winning author William Gibson.

fromhttp://www.nodemagazine.com/

WGibson

"Someone's already named a Web site after NODE, the nonexistent magazine in "˜Spook Country,' " [Gibson] said. "It's sort of scary." – Chris Watson, Bookends: William Gibson explores the science fiction of the here-and-now in his new novel [Santa Cruz Sentinel]

http://nodemagazine.com/

From

http://node.tumblr.com/ from

" "Someone has a website going where every single thing mentioned in Spook Country has a blog entry and usually an illustration so, every reference, someone has taken it, researched it and written a sort of little Wikipedia entry for it and all in the format of a website that pretends to be from a magazine called Node,

W. Gibson shows up in Second Life!

Turning Ahmadinejad into public enemy No. 17 by Juan Cole on Salon.com

from Salon.com

Turning Ahmadinejad into public enemy No. 1

Demonizing the Iranian president and making his visit to New York seem controversial are all part of the neoconservative push for yet another war.

By Juan Cole

Sep. 24, 2007 | Iranian President Mahmoud Ahmadinejad's visit to New York to address the United Nations General Assembly has become a media circus. But the controversy does not stem from the reasons usually cited.

no evidence for any US Media/govt. Lies

Washington is also unhappy with Mohammad ElBaradei, head of the International Atomic Energy Agency. He has been unable to find credible evidence that Iran has a weapons program, and he told Italian television this week, "Iran does not constitute a certain and immediate threat for the international community." He stressed that no evidence had been found for underground production sites or hidden radioactive substances, and he urged a three-month waiting period before the U.N. Security Council drew negative conclusions.

The neoconservatives are even claiming that the United States has been at war with Iran since 1979. As Glenn Greenwald points out, this assertion is absurd. In the '80s, the Reagan administration sold substantial numbers of arms to Iran. Some of those beating the war drums most loudly now, like think-tank rat Michael Ledeen, were middlemen in the Reagan administration's unconstitutional weapons sales to Tehran. The sales would have been a form of treason if in fact the United States had been at war with Iran at that time, so Ledeen is apparently accusing himself of treason.

Constitution Day Program — Interrogation and Intelligence Gathering What happened to the 5th. Amendment?

Seton Hall Law CONSTITUTION DAY
September 17, 2007

Constitution Day will be held in the Law School Auditorium


Press Release (September 7, 2007)
Seton Hall School of Law on Second Life: Constitution Day Program on Interrogation and Intelligence Gathering to be Featured at Virtual Guantánamo Bay Detention Center [Read Press Release here]


Seton Hall Law School is pleased to offer you an outstanding simulcast program in celebration of Constitution Day on September 17, 2007. As you may recall, the 2006 Guantánamo Teach-In was an amazing success, with three hundred colleges, universities, medical schools, divinity schools and law schools participating. A DVD of the Guantánamo Teach-In program sponsored last year by Seton Hall Law School is available.

http://law.shu.edu/constitutionday/

Constitution Day Program — Interrogation and Intelligence Gathering

(To view this webcast, you must register a user name and password which you will be prompted for when
entering the event. If you haven't already registered, click here to REGISTER )
 
 
  Monday, September 17, 2007 01:30 PM EDT
Click Here For Your Local Time
Connect via Streaming
Audio/Video
 
 
  1:30 – 1:45pm EDT Welcome & Introductions
   
 
Professor Mark Denbeaux
  Seton Hall Law School
 
 
 
  1:45 – 2:00pm EDT FBI Interrogation Seeking
   
 
Mr. Jack Cloonan
  Clayton Consultants and Retired FBI Counter Terrorism Expert
 

http://event.netbriefings.com/event/seton/Live/constitutionday/

CIA, Not! RIP 1941-2003 Chalmers Johnson reviews Legacy of Ashes by 100% failure rate

Copyright 2007 Chalmers Johnson
This article was originally posted at TomDispatch.com.

Suprise Attacks

As an idea, if not an actual entity, the Central Intelligence Agency came into being as a result of December 7, 1941, when the Japanese attacked the U.S. naval base at Pearl Harbor. It functionally came to an end, as Weiner makes clear, on September 11, 2001, when operatives of al-Qaeda flew hijacked airliners into the World Trade towers in Manhattan and the Pentagon in Washington, DC. Both assaults were successful surprise attacks.

The Central Intelligence Agency itself was created during the Truman administration in order to prevent future surprise attacks like Pearl Harbor by uncovering planning for them and so forewarning against them. On September 11th, 2001, the CIA was revealed to be a failure precisely because it had been unable to discover the al-Qaeda plot and sound the alarm against a surprise attack that would prove almost as devastating as Pearl Harbor. After 9/11, the Agency, having largely discredited itself, went into a steep decline and finished the job. Weiner concludes: "Under [CIA Director George Tenet's] leadership, the agency produced the worst body of work in its long history: a special national intelligence estimate titled "˜Iraq's Continuing Programs for Weapons of Mass Destruction.'" It is axiomatic that, as political leaders lose faith in an intelligence agency and quit listening to it, its functional life is over, even if the people working there continue to report to their offices.

http://aep.typepad.com/american_empire_project/2007/07/the-life-and-ti.html

and so on!

The Agency gathered under one roof Wall Street brokers, Ivy League professors, soldiers of fortune, ad men, newsmen, stunt men, second-story men, and con men. They never learned to work together — the ultimate result being a series of failures in both intelligence and covert operations. In January 1961, on leaving office after two terms, President Eisenhower had already grasped the situation fully. "Nothing has changed since Pearl Harbor," he told his director of central intelligence, Allen Dulles. "I leave a legacy of ashes to my successor." Weiner, of course, draws his title from Eisenhower's metaphor. It would only get worse in the years to come.

The historical record is unequivocal. The United States is ham-handed and brutal in conceiving and executing clandestine operations, and it is simply no good at espionage; its operatives never have enough linguistic and cultural knowledge of target countries to recruit spies effectively. The CIA also appears to be one of the most easily penetrated espionage organizations on the planet. From the beginning, it repeatedly lost its assets to double agents.

and on and on!

Nothing has done more to undercut the reputation of the United States than the CIA's "clandestine" (only in terms of the American people) murders of the presidents of South Vietnam and the Congo, its ravishing of the governments of Iran, Indonesia (three times), South Korea (twice), all of the Indochinese states, virtually every government in Latin America, and Lebanon, Afghanistan, and Iraq. The deaths from these armed assaults run into the millions. After 9/11, President Bush asked "Why do they hate us?" From Iran (1953) to Iraq (2003), the better question would be, "Who does not?"

his book is one of the best possible places for a serious citizen to begin to understand the depths to which our government has sunk. It also brings home the lesson that an incompetent or unscrupulous intelligence agency can be as great a threat to national security as not having one at all.

Chalmers Johnson's latest book is Nemesis: The Last Days of the American Republic (Metropolitan Books, 2007). It is the third volume of his Blowback Trilogy, which also includes Blowback and The Sorrows of Empire. A retired professor of international relations from the University of California (Berkeley and San Diego campuses) and the author of some seventeen books primarily on the politics and economics of East Asia, Johnson is president of the Japan Policy Research Institute.

http://www.americanempireproject.com/