The first visualization made for the conference Piracy Imaginaries was mapping the Commons from the perspective of Richard Bartle's player types.
The new isometric visualization was a playful way to suggest different scenarios formed around the limits of institutionalization on network potential, on creativity, participation, and transparency. The central narrative of the visualization is similar to the course proposal, but it also forms the context of my research. There is a field of thinking tinkers, which I exemplify with activists, hackers, and pirates, that represents a vital potential based on new forms of knowledge production, through self-organizing in open networks. These creative clusters expand the limitations of institutions by new network possibilities and establish alternative models for creativity and organization. In a society where the crisis of hierarchical and closed systems is ongoing, these agencies become important. The main agenda is to further the emancipatory goals of the modern project by open knowledge processes and to point to alternative routes for creativity and survival beyond the enclosures of the state-capitalist logic.
Las Vegas script a scripted visualization, an isometric perspective based on Richard Bartle's player type model. The process of making the visualization also pointed forward. The visualization became a track that later would result in one of the research project installations, Riot Chat, showed in London Autumn of 2014.
Both Bernardi and I work in a visual artistic practice and in the higher education context. Any lock-down and control of free creative investigations concerns us. We also acknowledge that the transgressive possibility of art has a historical record and is still forming critical trajectories of democracy. Institutional rules, norms, and laws can decapitate the democratic potential. In this light, the rejection of the learning from piracy course proposition can symbolize a larger problem of institutional potential.
Adaptation to digital network processes of openness and transparency by individuals, collectives, and institutions forms both risks and opportunities. Next, I want to present a couple of models and ideas that were important in our discussions about knowledge models for contemporary creative ventures, based on the idea of pirates and hackers. The common theme is how security and a sense of the real, forms between predictability and the not yet codified. In the most general terms, it is a question of how we can understand the inherent risks between the “organized” and freedom.
Las Vegas script, the scripted visualization, the institution as an employability factory.
Visual arts education holds an alternative educational ideal that accepts a great deal of insecurity. The process of constant fusion of horizons between professors, teachers and students, between concepts and practice, forms around the materiality of the work, in “subliminal objects of little perceptions”. Christian Wideberg writes about one of the central formats of visual art education, the studio critique, as a form of living knowledge:
This process addresses the challenge of integrating concept and material, the ultimate goal of which must be a seamless fusion of the two if the finished work is to possess sublime qualities. One can regard the studio critique as a process where the student reaches a deeper knowledge of self and his or her artistic goals, where subjective and creative impulses are essential for the developmental growth of this form of living knowledge.[15]
The layering of horizons that interact here cannot be reduced to something objectively secure or predictable. Moreover, the subjective and personal process is hard to codify into hierarchically ordered progressive goals. Exploring, getting to know one's subjectivization process is one of the primary goals of higher artistic education. I would think that a higher education that can harness a diversity of artistic skill sets, is ideal. From the point of view of the curriculum, much of the quality of the art education must remain invisible whether we choose to codify it or not.
Instead of a security based on monitoring with already established goals, we should try to find another kind of security. The security here is to give space to creative processes and take care or give room for the insecurity of the subjectivization process.[16] Now, we can use the insecure knowledge process of the pirate as an artistic model. As we discussed in the first pirate conference, the Greek origins of the word piracy in the concept of "Peria" means "a trial, experience, attempt" or "learn to know by experience". We can go further and see the unpredictable nature of the human condition as a base for practical knowledge ventures. In this unsecure knowledge model, the creative testing spirit of the pirate can create practical virtuosity from the unknown and the open[17]. This leads us directly to the next point.
As the quest for a more formal educational curriculum comes from inside and outside the educational institution, we need to find resistance and inspiration from other knowledge contexts. One thing we can do is to side the management demands of institutions with the vivid pirate and hacker knowledge production of networks defined by change, leaks, transformation, and collective processes.
Ivan Illich[18], Henry Jenkins[19], and Noam Chomsky[20] all have given different perspectives on how education could be reformed. The self-organized hackers, slackers, remixers and pirates that utilize the conditions of the commons and networks that are more open and not controlled by particular institutions, form an ideal. My research is particularly concerned with common knowledge processes and how pirates and hackers self-organize in hackerspaces. It is a vital potentiality in how education and creativity take place elsewhere outside institutions. An illustrating example that can serve as a kind of program for a decentralized, anti-authorial and self-organization production and creativity outside formal education is the purpose of Whole Earth Catalog. As they explained in 1968:
We are as gods and might as well get good at it. So far, remotely done power and glory—as via government, big business, formal education, church—has succeeded to the point where gross defects obscure actual gains. In response to this dilemma and to these gains a realm of intimate, personal power is developing—power of the individual to conduct his own education, find his own inspiration, shape his own environment, and share his adventure with whoever is interested. Tools that aid this process are sought and promoted by the WHOLE EARTH CATALOG.[21]
Detail of page, The Whole Earth Catalog.
The vision has amplified with the sharing potential enabled by the Internet. With digital networks, the self-organized hands-on sharing spirit continues to grow the contemporary common of hacker and DIY culture.[22]
We understand that pirates and hackers are key agencies to engage the leaky open, network potential. Next in our narrative, we A. question the idea of employability. The potential can become a B. force of capital, and we form C. a classical media critique based on the stereotyped and D. how that creates a network risk. In the conclusion of this report, we will return to the potential of formulating a political project of a more open vision of education, forming from the biopolitical opening of the Commons.
If this description is not only hypothetical, it seems to be a lame and dangerous vision and model for the future of knowledge society. The negative feedback should also be a concern for the spirit of capitalism as it could be seen as counter-productive because the unknown is a major trajectory for innovation. (The idea here is that by trying to use too much management, one risks killing potentiality.) By stating that the goal of education is to create workers for the creative industries and make the students employable - institutions put the wrong kind of fate in the hands of the students.[23] If it is a fact that the discourse of higher education rejects certain types of creativity, we could imagine that other ways and sub-strategies within or as a parallel to higher education will surface.
Parallel to this perspective, we can see that the vision of employability still does not capture the spirit of capital[24]. Many hackers and other autodidactic and digital natives flow directly to the industry, as companies bypass higher education in their quest for cognitive power. How enterprises organize so-called hackathons is an example of harnessing the emerging collective spirit of hacking. When the best mathematicians from universities are headhunted to make stock exchange algorithms, employability is out of sync. Because the forces of capital both live from and kill the emerging - employability will always be an inadequate tool that entails risk. As we soon will exemplify, the question in the end is how different models push the risks in various directions.
C. Media critique 101 - stereotypes and the predictable
All of this can be seen as a mass media critique 101 in the age of state capitalist control. The circles of innovation spiral inwards, as education tries to mirror the market. At round tables visions and strategic leadership change for surveys and quarterly reports. As digital services build on monitoring behaviors, higher education makes a model of the world with simplified ends towards a streamlined average, standardization is a goal. Mundane interfaces, products, services and media are rendered through the stereotyped and on the path of predictability. We should consider the risk that, instead of creating diversity and empowered criticality - clichés and already existing power structures continue to build on the reproduction of stereotyped agencies and “marketified” institutions. In this narrative, higher education becomes a restricting service that builds a knowledge debt to the emancipatory goal of equality, transparency, creativity and democracy.
Las Vegas script a scripted visualization, the high-density pirate space.
Finally, I want to bring up two illustrations on how the predictable and unknown entail patterns of risk. Leaks, hacking, and piracy find ways through personal opportunities, within and without institutions, but also form as an endeavor defined by risks. The two examples I want to consider are about openness and leaks at the education networks of Massachusetts Institute of Technology (MIT). MIT is a suiting example because many of the first generations of hackers came out of MIT[25]. With these examples, I want to illustrate two types of risk and possibilities, as a relation between the individual choices and global knowledge contexts.
MIT Example One.
The first example is MIT's OpenCourseWare[26], which is an interesting example that utilizes the networked learning possibilities in an institutional setting. Founded by MIT, OpenCourseWare has become a model for many other universities and provides a set of open and free online courses to a global student body. Here global competition is created based on the open protocols of Internet. It makes it possible for Swedish students as well as any others to enroll in these courses. It is an example of a displacement of the regional dominance of universities, which in the global context risk becoming less relevant. In the network society, the learner’s choice expands. Other universities are not the only bodies that compete for the student’s time; there is also a more unsettled new kind of a leaky-pirate-body of knowledge. As representatives of higher education, we should consider whether these form a threat, possibility, or risk to the dominant fixed order of higher education.
Pirates are those who will deal with the risks of exploring and opening the unknown. Piracy and leaks play a critical role in forming alternative narratives. The state capital creates boundaries and defines elsewheres through expulsions. In the case of Aaron Swartz: suicide, people behind The Pirate Bay (for instance Peter Sunde): incarceration and Edward Snowden: forced migration.[27] In their quests of leaking and facilitating sharing, and in trying to find possibilities for work and life, they transgressed corporate and state laws of property. For most of us, their endeavors present general possibilities for pirate media, new knowledge perspectives, and better network possibilities. Information wants to be free, but individual pirate agencies risk expulsion. In this context, Aaron Swartz suicide becomes the second MIT example. As the legal pressure from copyright lawyers played out around Aaron Swartz JSTOR-leak, the programmer and activist committed suicide. It is a devastating example of our contemporary pirate history and one sad ending in the game of openness and control. Swartz family’s official statement captures the essence of the problem of modern higher education and how we can try to understand the meaning of transparency, equality, and security.
With new technology, a knowledge space forms through the biopolitical conditions of cognitive capitalism. Michel Foucault points to how control becomes decentralized and personalized and how it works on many levels, scales and areas and describes it as the biopolitical. In the biopolitical context, piracy can be one way to define a person to a political trajectory for the new materiality of digital networks. We can pick up the investigation from the first conference and point to the fundamental investigation of the unknown and how pirates embrace and are defined in media res (Latin "in the midst of things"). In the imaginary of trans-piracy, I investigated the possibility to find a global feminist learning model.
From the hackable, pirateable and leakable it is possible to point to how the openness of networks and sharing can become a starting point for a more radical reformation and expansion of education. Education could form as an extended idea of the network as well as a more common knowledge possibility with the potential of accessible networks. As we referred to in the first pirate session, the Piracy Imaginaries, Silvia Federici refers to Antonio Negri and Michael Hardt's work of the multitude and the Commonwealth. Federici writes about how network society and cognitive capitalism is based on informal relations and how through rerouting of property relations knowledge production can flow into a greater commons to enable the multitude. Access to knowledge becomes a disruptive and educational endeavor as well as an alternative route and an alternative model for society. On the edge of this possibility, the spirit of testing is critical. What we are interested in is how pirates and hackers can create a field of sovereignty. It is a position that can engage other possible models outside institutional protocols and potentially escape the capitalist logic of enclosures. Here we can rest on Foucault’s discourse of madness and how the law and institutions can be shaken by the sovereignty of self-organized autodidacticism. With biopolitical networks to recreate the human by sharing, we have to become post-queer witches, mad bio-scientist, and trans-pirates.
The next two presentations continue to explore how networked media offers a gray zone of creativity that entails both personal and institutional risks and possibilities.
Garvest Boon is an artwork by Arcuri Rossoni
The next two presentations informed my research in an interesting way: Magnus Eriksson's Piracy, code and law, and Ana Betancourt’s Mapping the Commons. The central theme for both presentations is models and standards of organization and protocols of networks and cities. Beneath the surface of “the ordered”, it is about how leakage and piracy of dominant control structures shape society, culture, and politics. Here, rather than an anomaly, leaks, piracy, and hacking continue to be a rule and a possibility to open up new meaningful contexts of the everyday. The primary model of a hegemonic system provides and transforms patterns of living, and lay out the possibility of the everyday life to be pirated or hacked, to make life livable.
In his presentation, Eriksson begins in empires, in the opposite of leakage and piracy - in how to create compliance, predictability, and standardization. We can call what he describe a kind of Ohm's law of control (the law of power). It is about how the relation of resistance, flow, and power can make messages work. The law decides how the power of command and control can perform an action at distance. Power needs a medium to deliver messages between the central administration to other places and still maintain message integrity. For example, the public road in the Roman Empire (cursus publicus) leading power, paved the way for crucial decisions. Remote messaging used these roads as its command and control medium. The sovereignty of messages was dependent on the power flows, the integrity of laws, infrastructure between cities, roads, and outposts. These roads were founded for the logic of rent systems, for rent to be collected and central ruling to prosper.
Before something can happen, there has to be power, creating consistency between materiality, control, and flow. Eriksson takes the power consuming process of forging and packing transistors on a microchip to make microprocessors, as an example. As a military organization, control circuits with command potentiality must be “drilled” before being able to execute commands. Next, with this alignment produced by power, power can be abstracted as command over material conditions. Then, code and commands can be activated by a button and become infrastructure and architecture that “just work”. We can look at today's marvels of planning. Facebook data centers and Amazon's warehouses, stock market algorithms, drone attacks all striving for perfect alignment between materiality and organizational possibilities. The underlying processes are unseen and abstracted executing under the hood of today's society - far away from public scrutiny or transparency.
Eriksson then elaborates on Lawrence Lessig’s idea of Code as Law[33]. The idea is that possible flows are embodied in digital systems and closely connected to performativity and affordance of users. What piracy and hacking then simply offers, is a starting point of resistance to alternate flows of the remote control. To be understood as a form of decolonization where power is retaken, rerouted, and recreated as local powers, formed from the remains of central power using the necessary standard infrastructure. “Piracy is a performative statement of law,” Eriksson says. What defines piracy is a changing matter of ambiguous and ongoing alignments of central powers.[34] Against the power of law, we have the law of power. Between what is possible and what is legal, there is a virtual[35] anti-space of power, ruled by pirate norms.
Eriksson next envisions the abstraction between code and law as a spell by the Wizards of power. Software coupled with hardware, the digital/electronic/mechanical forms the TCP/IP stack of remote command and control. The alignment between computer command and analog control creates a temporal space of sovereignty, as long as power can flow without interruption. As power stacks up with time, the cloud can remotely enforce rent and overpriced goods. In the prevailing server-client model of the Internet, sorcerers cast spells and perform actions at remote screens. In Facebook, Instagram, and Google, we trust. Like in patriarchs before, Fathers, Gods, and Empires, Wizards of the clouds enforce control. Certainly away from us, codes running the machines of the cloud, not only for storage but also, with expanding machine process power amplified remote control. The cloud, another word for remote control, is making the clients thinner and thinner.
One way to look at the ambiguity of the central order is to recognize that what is considered piracy in one cycle can change into innovation or be a question of survival in the next. We can try to understand the validity of piracy in a state of emergency. Think of what happens in any urban environment when there is a power outage. Everything stops for a while, but instantly, strategies for survival kick in to restore normalcy. Production can resume with diesel generators and with local solar power. Here piracy-like acts can reroute flow through local initiatives, and this is considered the sane thing to do.[36] In this thought experiment, the unsecured central power is sided with local solutions for continued normalcy. In cities, like Delhi and Lagos, where the central power grid is unreliable and power outages are typical, local backup systems, and illegal rerouting of power can be necessary. With an imperfect central infrastructure, backup system and the pirate solution are vital for the production of normalcy and safety.
To conclude the argument of normalcy and safety we should turn to another emergency and security definition - the state of emergency that had been enforced by liberal governments after 9/11 by instating the US Patriot Act. Giorgio Agamben has described it as The State of Exception - prolonged in the War on Terror - defining laws without borders[37].
In the days before the conference, the Snowden documents had been released. They revealed that trusted services such as Facebook had served profile data to NSA and that US had spied on European and UN state officials. It verified what civil right defenders had argued, that the privacy depraving laws working in non-transparent security institutions would lead to unintended measures.
Democracies are ideally defined by the separation of law, capital, and power. The hidden agenda that formed between state (NSA) and capital (Facebook), revealed by the Snowden leaks, was made possible by a centralization and monopolization of network communications. In this light, we could reconsider the position of the state-capital foundation, ownership and control of standard protocols.
In a democratic society, we need the openness of common spaces and virtual possibilities for sovereign agency for creativity to form. I think these spaces form in between and beyond the monopolies of state and capital of surveillance, monitoring and control. In this narrative, hidden power seems to be a sure recipe for corruption of the commons and virtuality in a wider sense. To side state-capital hegemony with self-ruling, hacking, piracy and piracy-like acts becomes a pressing matter.
Eriksson stated that piracy is a performative statement of law. To further understand how we could create democratic agency and individual sovereignty and what we can learn from piracy I quote Agamben:
To live in a state of exception means that to experience both possibilities and separating and dividing each time these two elements, means to attack, to break, to interrupt and arrest the function of the machine that is leading the world to a permanent state of [illegible]. So to exceed it in some way, the law, in its non-relation to life and to exhibit life in its normal relationship to law means to open up between them a space for a human action which we used once, a long time ago, to make politics. Politics has undergone perhaps a lasting eclipse because it has contaminated itself with law. Thus it has conceived itself either as 'pouvoir constituant' (constituted power.. so that it is to say low-posited violence) or, even worse, it has reduced itself to an endless exhibition with law. On the contrary, the truly political is only that action that is able to cut the relationship between violence and law.[38]
To understand the network agency in the context of a state of exception and capitalism, we can return to Foucault’s discourse of madness. The discussion points in the same direction as Agamben and can help us understand how the path of the pirate is one that creates sovereignty beyond the law. According to Agamben, it is necessary to break the bond between law and state for the political to occur. Here one way to reverse the power of undemocratic institution we have to become pirates - that is how we create a position of sovereignty. Piracy is a quest to find a model of sovereignty. Suggesting ways to find, look for and modify local learning patterns where we can figure out to what extent we should, and can be dependent on the central models of communication and to what extent we can and should build alternative structures of communication. Some questions: Can one find a good middle ground between trust and ruling of remote powers? Can we trust central control with the common stack of communication? Is freedom possible without central control? Can we ensure a safe society where non-transparent protocols, in the hands of powerful governments and enterprises rule our communications?
In the first piracy conference, Piracy Imaginaries, I suggested that practices in relation to such question are a model for a trans-piracy. A feminist learning model is forming from global connections and out of the mist of global patriarchally controlled technology. The following presentation can, in many regards, be seen as a practical implication of such a learning model.
The next presentation was on a collective project “mapping” common urban spaces that Ana Betancourt had initiated and co-organized. Mapping the Commons was mobilized in the protests sparked by conflicts over urban development plan of Istanbul’s Taksim Square.[39] The conflict peaked on the night of the conference as police evicted Gezi Park on 15 June 2013.
The conflict around Taksim Square started because of reorganization of the square to allow traffic flow. As part of a neoliberal logic of enclosure and privatization, the city planners planned new shopping venues, not recognizing the life already there. The reorganization privatized a public space with symbolical value for many. It seems that city officials were too blind to understand the value and importance of the square as a public space and an informal Commons. Additionally, the process was opaque, symbolized by temporary walls cutting the park off. With the slow progress and insecurity about the schedule for the reopening, frustration grew. The sit-in organized at Taksim Square was evicted by the police on the 1st of June 2013. The eviction led to protests all over Turkey for press freedom, freedom of expression and the right to assembly. Simultaneously an activist camp established in Gezi Park.
As Betancourt says, what should be part of the Commons is a matter of belief, and has been debated and struggled and fought over. It is an important part of what defines our creative possibilities, democratic rights, and sustainability of life.
The virtual can be understood as possibilities, affordance, what can be imagined and realized. I think it is closely connected to the transgressive goals of the pirate. The virtual applies to all of the themes of the conference session; in education, remix culture, and urban reorganization.
Free software has worked well in regulating the enclosures of software development by producing many positive examples. Internet was in many regards an open liberating space of difference. The successful model of openness promised new organizational forms and visions for a less hierarchical organization. While activists turned to the open models for inspiration, there has been a backlash in the possibilities of online communication. State-capital surveillance and centralization of a diversity of services have reduced the capacity for variety in online communication. It has also become apparent how easy it is to pollute and dominate open forums and conversations with sexist and racist opinions. Self-organization in itself lacks the moral and ability to inspire openness in a more ethical sense. Anyone can utilize the Commons for their purpose. When racist and sexist (de)activism has become the new “normal” and when openness is used in the hands of surveillance, we need new thinking: a model that takes care of the risks while not destroying its purpose.
Illustration of Vinay Gupta’s model Simple critical infrastructure.
In the call for papers for the conference we write:
“Piracy can be envisioned as a struggle over resources that are located in the borderlands between the public and the private, encouraging us to imagine a new vision of space; a struggle that creates and exploits leakages between enclosed properties and the commons.”[45]
This struggle implies a fundamental not yet realized redefinition of the relationship between information and technology, and the human endeavor and digital control. Piracy can intervene in the path of technology that creates new control models of our cognitive processes while state-capital seems to be aiming for seamless control between consumers and digital services. The pirate figure works as a reminder of the normative force of late capitalism and harbors a potentiality of rerouting capitalisms universal claim. I hope that some of these open questions can be addressed in the upcoming conference Whitewashing piracy, also organized by the Piracy Cluster.
[1] See the application online here: Link to articipation.se
[2] It was Donatella Bernardi and Robert Brečević from The Royal Institute of Art, Konstantin Economou; Martin Fredriksson and myself from Linköping University and Leif Dahlberg Royal College of Technology.
[3] https://mitpress.mit.edu/index.php?q=books/learning-las-vegas
[4] See the call for paper online here
[5] The ACSIS Cultural Studies Conference was titled On the move. Find more information here http://www.isak.liu.se/acsis/nyhetsarkiv/1.534126?l=sv
[6] the abstract can be found online here: https://docs.google.com/document/d/1u2PSLCPMx8m8JyKYgRYxwqX2zCmauol6KxLvQkHCrDc/edit
[7] also see text about text at articipation.se
[8] see the wikipedia page: https://en.wikipedia.org/wiki/Bartle_Test
[9] https://en.wikipedia.org/wiki/New_public_management
[10] https://en.wikipedia.org/wiki/Bologna_Process
[11] Bernardi raised this pointed. During a period in 2013 an assessment of the Royal College of Art in Stockholm was made. As a professor in Fine art Bernardi had encountered a government official, explaining the demand.
[12] The text can be found online here: http://www.eurozine.com/articles/2010-07-01-power-en.html
[13] I want to refer to “What Use Is the Imagination?” Jenny Sharpe “Spivak's deployment of the term aesthetic education is intended to demonstrate that poetry and philosophy are about not only truth and beauty but also politics and ethics. Her invoking of the ethical imperative in the aesthetic is a strategic response to what she calls the trivialization of the humanities and the privatization of the imagination in the university (Aesthetic Education xv).” (516)
[14] Gilles Deleuze, Difference and repetition, trans. Paul Patton. (Columbia University Press, 1994), pp. 23, 165.
[15] from the abstract of Ateljésamtalets utmaning – ett bildningsperspektiv. http://konst.gu.se/english/ArtMonitor/dissertations/christian-wideberg
[16] Or what Deleuze would call individuation
[17] here an interesting link can be drawn to Aristotle and Gadamer from the Fornesis.
[18] for instance Deschooling and Tools for Conviviality.
[19] see for instance Confronting the Challenges of Participatory Culture: Media Education for the 21st Century
[20] see for instance Noam Chomsky - The Purpose of Education
[21] Whole Earth Catalog - Wikipedia, the free encyclopedia. (n.d.). Retrieved from http://en.wikipedia.org/wiki/Whole_Earth_Catalog see https://en.wikipedia.org/wiki/Whole_Earth_Catalog#Organization
[22] For instance see Call for Participation: Chaos Communication Camp 2015: https://events.ccc.de/2015/04/09/call-for-participation-chaos-communication-camp-2015/
[23] Eu -note
[24] see http://www.cs.berkeley.edu/~bh/hacker.html
[25] https://en.wikipedia.org/wiki/Hacks_at_the_Massachusetts_Institute_of_Technology
[26] http://ocw.mit.edu/index.htm
[27] From http://www.wired.co.uk/news/archive/2014-12/11/peter-sunde I later read “We have our own celebrities. We had Wikileaks. We had Snowden. We had Manning. We had Aaron Swartz. Some are dead, some are in jail forever. Some are in hiding -- scared for their actual lives. What people reveal, what people fight for, are major causes. Freedom of information. Liberty. Democracy. Governmental transparency and due process.”
[28] In Memory of Aaron Swartz | e-flux. (n.d.). Retrieved from http://www.e-flux.com/journal/in-memory-of-aaron-swartz/
[29] Forthcoming article, Childhood re-edits: challenging norms and forming lay professional competence on YouTube, Journal of AESTHETICS & CULTURE Vol. 7, 2015.
[30] Further reading https://en.wikipedia.org/wiki/Adverse_selection
[31] The Read Only culture (RO) is the culture consumed more or less passively. https://en.wikipedia.org/wiki/Remix_culture#Read-Only_Culture_vs._Read.2FWrite_Culture
[32] https://en.wikipedia.org/wiki/Virtuality_%28philosophy%29
[33] http://harvardmagazine.com/2000/01/code-is-law-html
[34] As Piracy was defined for the upcoming Berlin session as a: “process of creating or embracing emerging, alternative structures in order to destabilize, delegitimize and exploit an existing structure (of philosophical or political collective, of technology, of legal or economic context).”
[35] see https://en.wikipedia.org/wiki/Virtuality_%28philosophy%29
[36] see https://en.wikipedia.org/wiki/Katiyabaaz. Katiyabaaz (English : Powerless) is a 2014 Indian Hindi documentary about the problem of power piracy in Kanpur.
[37] See this quote from http://www.egs.edu/faculty/giorgio-agamben/articles/the-state-of-exception/ The state of exception is not a special juridical order (the law which regulates the state of war,) rather it is a suspension of the whole juridical order itself which marks it for the limits, the threshold of the juridical order. It is for that reason that in public law there is not such a thing as a theory for the 'state of exception.' Although the proximity between the state of exception and sovereignty has been established by the German jurist Carl Schmitt in his 1922 book 'Political Theology,' his obvious definition of the sovereign as the 'one who decides on the state of exception' has been widely debated. Nevertheless the jurist could continue to ignore this phenomena and treat it more as a quaesti facti than as a true juridical problem. According to opinions which are very common, the 'state of exception' constitutes a point of imbalance between public law and politics which, like civil war, insurrection and resistance, is located in an ambiguous zone at the border between the juridical and the political. But precisely for that reason it seems to me that the question of the state of exception's) limits becomes particularly urgent.
[38] Giorgio Agamben - The State of Exception. (n.d.). Retrieved from http://www.egs.edu/faculty/giorgio-agamben/articles/the-state-of-exception/ Giorgio Agamben. The State of Exception - Der Ausnahmezustand. Lecture at European Graduate School. August 2003. Transcription by: Anton Pulvirenti
[40] http://mappingthecommons.net/pt/blog/2012/11/16/taksim-square/
[41] http://www.hatjecantz.de/michael-hardt-5236-1.html
[42] http://www.jofreeman.com/joreen/tyranny.htm
[43] See the outline of his talk here http://vinay.howtolivewiki.com/blog/personal/talk-outline-for-jan-7th-in-london-infrastructure-for-anarchists-1144.
[44] christoph spehr | free cooperation. (n.d.). Retrieved from http://republicart.net/art/concept/alttransspehr_en.htm
[45] Program: Conferences: ISAK: Linköping University. (n.d.). Retrieved from http://www.isak.liu.se/acsis/konferenser/program?l=en Call for paper learning from Piracy