Today I return to my blog to recap the next three chapters of Surveillance Valley, still one of two non-fiction books I’ve ever read. While the previous section had a focus on the pre-internet era and reasons for its development, the next section focuses on a time the reader will find much more familiar.
Chapter 4: The hippie Moses.
After leaving off lost history with riots against the development of the ARPANET, a pre-historic military-funded version of the internet, it would seem impossible for the internet to continue development or at the very least change the public opinion surrounding it. But we already know the ending to this story, a spoiler by nature of you reading this blog online: The internet is created, web browsers are made, a small group of companies remain richest in existence until the present day and the internet is so widespread it’s more shocking to not have the internet than to not have clean water. But how exactly did we jump from riots to the new internet timeline? Levine brings light to one man in particular, a hippie by the name of Stewart Brand. In the failure of building societies of hipsters connected by cybernetics, Brand would take a different path towards the popularisation of the internet. Like a murderer becoming a detective, Brand didn’t require much more knowledge besides re-branding himself as someone that was more than a hippie. Describing the internet as a counterculture, Brand successfully dared the youth to support the progress of the internet and got the industry walking with two-feet again. Brand also wrote a catalogue called ‘The Whole Eath Catalogue’ which Levine describes as ‘Google in paperback form’ and created the New Communalists in the 1980’s, a hipster group that by trying to get rid of heirarchies and replace it with cybernetics, ended up forming new heirarchies in their place where more charismatic leaders would drown out the voices of the suffering. It sounds like a dystopian future but the fact it was our past gives more than enough reason to not try building societies around flawed ideals.
Chapter 5: Google: The Life Browser
Historically, Google has always been a fairly successful business and has found its success on one thing alone: surveillance. As I’m sure you’re already aware, Google tracks the data behind each search and stores it to create a profile. However, up until I read this chapter, I didn’t know how detailed an image Google was capable of creating, nor did I realise it was practically the next logical step forward in the internet’s relations to counter-insurgency.
To take a step back, counterinsurgency is the collection of data of a large group of individuals and taking as many datapoints to accurately and efficiently determine their next decisions, possibly preventing conflict before it happens.
With that, I now present to you Google: a company that found success from the collection of data of a large group of individuals and taking as many datapoints to accurately and efficiently determine their next decisions, to grant faster access of information and guarantee successful advertisements to advertisers. While the latter part is certainly a different description of something far from counterinsurgency, the former is not. Google, and all similar businesses that have found their success through collecting datapoints and creating profiles of users, are basically using the same principles as counterinsurgency but commercialised in our new capitalist world.
Google’s accuracy is also scary to think about. When Levine covered a discussions between Google employess and if they were able to create an algorithm to predict stocks, they concluded that ‘it would be illegal’. The fact that it wasn’t a matter of whether Google couldn’t create the algorithm but that they shouldn’t reframes the idea that Google is just a searchbox. It’s clearly capable of much more and when Gmail was created, it granted Google access to more than just searches. Where before anything beyond the search bar was beyond limits, Gmail crafted a door into people’s day to day lives by having accesss to a person’s emails. As a person with 6 used gmail accounts (and more used for creating 1 time use accounts), I realised only then what Google had access to. Every digital receipt I’ve ever received, every promotional email and every actual email I’ve ever sent (which is to say a very limited dataset) can be read by Google and used to increase its accuracy of my personality further.
Levine also brought light many tech companies and their relations to state surveillance. Apparently, Facebook’s Occulus VR system was planned to be integrated into fighting cyberwars, which sounds like something of science fiction at first but when you stop and think about it, it might genuinely work. Other notable companies and their surveillance include: eBay’s police division that lead to the arrests of 3000 people, Amazon’s cloud computing for the CIA, Blue Origin and SpaceX, both missile companies started by Jeff Bezos, founder of Amazon, and Elon Musk, co-founder of paypal respectively. The head of the hydra that is the use of surveillance for the government belonged in sheer volume to Google. Google Earth itself started off as a program inspired and later funded by the CIA to do exactly what it does today: take a satellite image of a map and project a 3D image that can be explored. The CIA funded the project, then owned by Keyhole, and made its way into the CIA itself because of how useful it was. Google also launched a spy satellite (GeoEye-I), bought Boston Dynamics, a robotics company that like poetry was funded by DARPA a.k.a ARPA, the same ARPA that would create the ARPANET. Google even has a way to redirect anyone searching for potential terrorism topics and ‘diverting them to State Department webpages and videos developed to disuade pepople from taking that path’ named the ‘Redirect Method’. With this many forms of surveillance, ties to counterinsurgency and federal agency stakeholders, it’s become quite obvious through Levine’s book that Google might be a spritual succesor to ARPA once you take a look at it.
My favourite quote of these two chapters has to be one of the communes that were built around the idea of flat heirarchies that ended up just forming their own heirarchies where all manners of horror became possible “There was constantly a background of fear in the house – like a virus running in the background, like spyware. You know it’s there but you don’t know how to get rid of it.”
While initially I had plans to cover Chapter 6, I read slower than anticipated and ther was just so much to cover in Chapter 5 on Google alone I’d like to leave that for another blogpost in the near future.
4 Responses
yeehaw
November 24th, 2020 at 6:23 am
1Well laid out and easy to process. I’m guessing that this isn’t the “peak” of the book so to speak so it’s understandable that there’s not much to write I guess. But in any case, the case study of Google specifically is interesting, though not particularly “unsaid” (as is the whole surveillance argument).
immapotaeto
November 24th, 2020 at 6:24 am
2I enjoyed the summary of chapter 5 because it is pretty easy to understand and relate as we use google almost every second we use the internet. But isn’t it obvious that in today’s world nothing is 100% secure so the consequences are pretty much expected?
I liked the mention of the quote, it is a strong ending
rrc123
November 24th, 2020 at 6:24 am
3I think that what you mention about Google is quite interesting, it’s crazy to think that so much of our personal information is stored by these companies and used against us. I think that it would have also been very interesting if you talked about specific examples of how this data collection has affected individuals or groups of people.
drtech
December 3rd, 2020 at 7:15 am
4Well summarised review cicuititgs, do you think however that Google has always said that the reason the service is free is that we collect your data and utilise this. Or in fact have they not been transparent about this. Imapotatoe suggests that this is just expected – and this implicitly suggests that this is the price we should pay – however do you think that the author is trying to get across something more sinister linking the military to a civilian search engine?
RSS feed for comments on this post · TrackBack URI
Leave a reply
Adobe Photoshop apocalypse Book brain cells Chrome Copyright digital Digital Immigrant Digital Native electrodes Facebook Fats Million Firefox Google Image editing Intellectual Property ITGS Jaron Lanier Lawrence Lawrence Lessig Lessig Marc Prensky networks of people and machines Photoshop prensky Privacy Protocols rat Remix robot Schneier scientist Security Spreadsheet Trust tweets twitter warcraft world wow You Are Not A Gadget YouTube Artificial Intelligence (35)
Arts Nd Entertainment (12)
Assignment (62)
Authenticity (11)
Blogroll (3)
Business/Employment (12)
Case Study (5)
Control (14)
Database (8)
Deadlines (4)
Delicious Links (212)
Education (27)
Equality (6)
Examinations (5)
Globalisation (14)
Health (10)
Integrity (8)
Intellectual Property (17)
IT Systems (36)
ITGS (971)
Just for Fun (36)
Models and Simulations (1)
People and Machines (45)
Policues and Standards (13)
Politics and Government (13)
Portfolios (5)
Presentation No Show (7)
Privacy (30)
Quiz (1)
Reliability (24)
Science Nd Environment (8)
Security (26)
Surveillance (4)
video (3)
Web 2.0 (13)
Wiki (2)
WP Cumulus Flash tag cloud by Roy Tanck and Luke Morton requires Flash Player 9 or better.
Recent Comments
Net Neutrality – Help Save It!
Meta
Visit Our ITGS Wiki
Welcome…
A blog to help ITGS students become independent and creative Technology thinkers - Over 10 years in action and ready for the Digital Society Revolution. Any criticisms of the weblog and its working please send me a mature comment and I will rectify it as soon as possible.
Disclaimer: if there are any problems related to copyright or fair-use please contact me immediately and I will remove the offending content from the blog. All content created by Dr Tech is under the Creative Commons License
Categories
Help Feed the World!
Open Rights Group
Archives
Recent Comments
Translate
ITGS Online is proudly powered by WordPress - Dr Tech messed with the theme created by: Design Disease