Abstract
Edward Snowden’s disclosures on the National Security Agency (NSA) surveillance programs confirm exponential advances in pioneering, what Gilles Deleuze called, ‘societies of control.’ What makes Snowden’s revelations seem so futuristic and dystopian is the total interoperability and full spectrum dominance of Big Data technologies have produced a surveillance dispositif that aims to ‘Collect it All.’ Just as there is a periodicity shift in the transition from Michel Foucault‘s ‘disciplinary societies’ to Deleuze’s ‘societies of control’ today, approximately a quarter of century from when his postscript was penned, the advent of Big Data signals a shift from the early cybernetic control systems that Deleuze theorized. The first part of this paper describes societies of control in terms of emerging Big Data technologies, that I call the ‘posthuman dispositif.’ The second part develops resistance strategies by riffing on statements Deleuze makes in his book ‘Foucault’: “What resistance extracts… is the forces of a life…. Life is a sort of counter-power, a return flow of forces aimed backward toward the source of exploitation” (p. 92). As a concrete example of resistance I instance Edward Snowden’s transformation from C.I.A/N.S.A systems analyst to government whistle-blower. I contextualize Snowden’s flip by invoking Nietzsche’s ‘Thus Spake Zarathustra.’ Finally, I deploy Gilbert Simondon’s notion of the transindividual to explore resistance to the posthuman dispositif.
During long periods of history, the mode of human sense perception changes with humanity’s entire mode of existence.
—Benjamin (1969, p. 222)
So he laid the dead man into a hollow tree – for he wanted to protect him from the wolves.
—Nietzsche (2010, p. 19)
Ethical reality is structured in networks, that is acts take on resonance with one another (and) contains in itself a power of amplification.
—Simondon (1995, p. 245)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
In addition to its ability to process enormous amounts of information the term Big Data includes its capacity to deploy A.I. or artificial intelligence.
- 2.
Estimates of the storage capacity of the NSA data storage center in Utah range from ‘yottabytes’ to ‘zettabytes.’
- 3.
In 1984, George Orwell describes the same psychological machinery at work in his futuristic dystopia as follows: “There was of course no way of knowing when you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized”. Orwell (1948).
- 4.
Deleuze writes: “Marketing has become the center or the ‘soul’ of the corporation. We are taught that corporations have a soul, which is the most terrifying news in the world. The operation of markets is now the instrument of social control and forms the impudent breed of our masters.”
- 5.
Harcourt (2015) refers to the pervasive forms of self, or do-it-yourself (DIY), surveillance as the expository society.
- 6.
See Jay Stanley, ACLU.org, 5 April 2013: https://www.aclu.org/blog/report-details-governments-ability-analyze-massive-aerial-surveillance-video-streams accessed 2/27/2015.
- 7.
- 8.
Metadata refer to files, communications, and programs that when modified, transmitted, or received can be used to pinpoint a suspect’s actions.
- 9.
“We use the term biopower when thinking of the sources and wellsprings of state power, and the specific technologies that the state produces, … to control populations: we speak of the biopolitical context when referring to the complex resistances, and occasions and measures of the clash between social dispositifs of power” (Hardt and Negri 2008: 73, 74).
- 10.
In Foucault’s archeology, the knowledge structures of any historical stratum are defined by a double articulation: ‘the seeable,’ a material field of ’visibilities,’ and ‘the sayable,’ a discursive field of ‘statements.’ “Each historical formation reveals all it can within the spectrum of its visible field, just as it says all it can within its epistemological range of discursive statements” (Deleuze 1988: 59).
- 11.
Deleuze (1988) concludes his book on Foucault by envisioning the historical subject vis-à-vis the unfold (infinitude/medieval, religious), fold (finitude/enlightenment, humanist), and superfold (unlimited finitude/post-modernity/post-humanist).
- 12.
Kim Zetter, Countdown-to-Zero-Day-Stuxnet/ Crown (11 November 2014).
- 13.
While acknowledging the real threats posed by state and terrorist networks, the cryptographer Bruce Schneier advocates the use of encryption technologies, like the Web browser TOR, but believes that unless one foregoes the Internet, social media, smartphones, driving a car or using any form of personal identification that there is no fail-safe way to avoid detection. He promotes support for grass roots citizen movements to pressure legislators to change intelligence data mining operations and for adoption of legislation similar to the ‘right to be forgotten’ laws that currently prevail in the European Union and Japan. Interview with Amy Goodman, Democracy Now (March 3, 2015): www.democracynow.org/blog/2015/3/13/part_2_bruce_schneier_on_the (Accessed March 4, 2015).
- 14.
Silicon Valley corporations pose a more symmetrical resistance to NSA surveillance. Having lost significant global business, when their complicity with NSA spying operations was discovered, they responded by encrypting products without retaining encryption keys (end-to-end encryption). However, evoking fear of a terrorist attack, the indispensable nation in the name of the FBI has begun to challenge end-to-end encryption. The showdown between the exceptional nation and its most successful corporations has, as of this time, yet to be fought. However, it is thought by many experts that the NSA already possesses ways to hack current end-to-end encryption technology.
- 15.
The omniscient/omnipotent dream that the Enlightenment hatched of the progress of reason and technology is quickly overwhelmed by the cataclysmic imagination of nature entrained in a positive feedback loop that rapidly outstrips human capacity to cope, as evidenced in natural disasters, global pandemics and such technological backfires as the reactor meltdowns at Chernobyl and Fukushima.
- 16.
It has been pointed out notably by Slavoj Zizek that practices of self-care, both Western and Asiatic, may become occasions for narcissistic/hegemonic disconnection. Oft cited is the Me generation of the 1970s and generations of organizational psychologists thereafter, who cultivate self-care as stress reduction techniques for coping with neoliberal workplace pressures. see Zizek’s critique of Star Wars III, http://mariborchan.si/text/articles/slavoj-zizek/revenge-of-global-finance/ (Accessed Jan 2, 2016).
Today, practices of self-care are increasingly outsourced to algorithms programmed into smart watches, smartphone apps that augment the will by triggering alarms or messages throughout the day to serve as reminders to keep focus on the goals one sets for purposes of self-improvement.
- 17.
While Foucault traces these inner technologies back to the Ancient Greeks, he admits his ignorance of self-making practices developed in Asia. Nietzsche’s misreading of worldly Buddhist practices is a notable embarrassment. In fact, Nietzsche inherits notions of the will from Schopenhauer, who derived them from the Upanishads. For his part, in his book, Foucault, Deleuze renders an Orientalist interpretation that smooth out Eastern spiritual practices into a striated transcendence (unfold). But self-making practices exist in Asian societies. One example is the integral yoga of the revolutionary/yogi Sri Aurobindo of the Indian Independence movement, who was educated at Cambridge and a scholar of Latin, and Greek, (1872–1950) Aurobindo’s draws on the ancient Indian yogas, to constitute a practice for cultivating excellence in head, heart, and hands (jnana, bhakti, karma) that aims at an immanent transfiguration of matter, he calls purna, or integral, yoga. As praxis (sadhana), it is a form of self-making involving the sublimation of desire (tapas), and the cultivation of the ‘psychic being’ whose genealogy, Aurobindo traces back to the Socratic, Daemon. Like Nietzsche, Aurobindo believed the human to be a transitional being also positing the coming of a super human form. In Aurobindo, ‘will to power’ has affinities with what he calls ‘nature’s yoga.’ See Aurobindo (1972).
- 18.
‘To speak truth,’ Euripides [c.484–407 BC].
- 19.
Doxa is common belief or popular opinion “When there is a quasi-perfect correspondence between the objective order and the subjective principles of organization, the natural and social world appears as self-evident. This experience we shall call doxa” (Bourdieu 1977: 164).
- 20.
This relationship is mediated by technical elements, objects and ensembles that also express the preindividual, which had been deposited in them through the process of invention. Bernard Stiegler, who has done the most of any philosopher in recent years to expound on Simondon’s work, deploys the preindividual (and transindividual) in a different way. For Stiegler, the preindividual is not so much a movement of primordial ‘apeiron’ as it signifies human immersion in systems of knowledge and signification—grammatization—that are archived and transmitted over generations through mnemotechnologies or retentional apparatuses, (he calls the ‘What’). It is the mnemotechnological (What) that conjoins the individual (I) and collective (We). “What links the I with the We in this individuation is a preindividual milieu, which has positive conditions of effectivity, related to what I have called the retentional apparatuses… (What)… These retentional apparatuses are supported by the technical milieu, which is the condition of the meeting of the I and the We: the individuation of I and of We is equally in a sense the individuation of a technical system (this is what Simondon, strangely, did not see)” (Stiegler 2004: 106).
- 21.
Allagmatic comes from the Greek word for change, allagma.
- 22.
In context of Simondon, a singularity is a momentary pause in individuation. See Scott (2014: 17).
- 23.
Notable among American national security whistle-blowers are the recent cases of John Kiriakou, Jeffrey Sterling, Thomas Drake, William Binney, Diane Roark, Kirk Wiebe, Ed Loomis.
- 24.
While empathizing with the victims whom terror strikes and being sure not minimize the psychological effects of contagious panic fear in an age of Fox News, the number of terrorist attacks in the indispensable nation is notably low compared to those nations it has preemptively attacked. The definition of terrorism from this statistical sampling is: “the threatened or actual use of illegal force and violence by a non-state actor to attain a political, economic, religious, or social goal through fear, coercion, or intimidation.” Reported Terrorist attacks between 2011 and 2014/100,000 people were as follows: Iraq (9522/27.4), Afghanistan (5153/16.3), Yemen (1614/6.2), Libya (1082/17.3), United States (57/.02) (Global Terrorism Data Base: https://www.start.umd.edu/gtd/globe/index.html, accessed Feb 2, 2016). In 2014 (one year), cause of death in the United States were: (1) heart disease: 611,105, (2) cancer: 584,881, (3) chronic lower respiratory diseases: 149,205, (4) accidents (unintentional injuries): 130,557, (5) stroke (cerebrovascular diseases): 128,978, (6) Alzheimer’s disease: 84,767, (7) diabetes: 75,578, (8) influenza and pneumonia: 56,979, (9) nephritis: 47,112, (10) intentional self-harm (suicide): 41,149. In contrast, from 2005 to 2015, the number of Americans killed by terrorism = 71 (Juan Cole, http://www.juancole.com/2016/03/30-americans-die-worldwide-from-terrorism-annually-while-130000-die-by-accident.html, accessed Feb 2, 2016).
- 25.
WashingtonsBlog, “You’re More Likely to be Killed by a Toddler than a Terrorist.” washingtonsblog.com. http://www.washingtonsblog.com/2013/06/youre-more-likely-to-be-killed-by-a-toddler-than-a-terrorist.html accessed May 2, 2015.
- 26.
This trade-off of civil liberties for security and comfort is not confined to the USA, and has occurred in other democratic nations as well, as the ongoing state of emergency in France, for instance. Many of its draconian security measures such as warrantless police intrusions into private homes and placing suspects under house arrest without the prior consent of a judge have the support of up to 90 % of its population, months after the Paris attacks in 2015. Moreover, these laws have been used to persecute groups not affiliated with terrorism such as environmental activists.
- 27.
- 28.
Chelsea Manning, “Why speaking out is worth the risk,” Amnesty International Blog. https://www.amnesty.org/en/latest/news/2015/08/chelsea-manning-why-speaking-out-worth-risk/ (accessed June 23, 2015).
- 29.
Similarly, Snowden’s disclosures have not been demonstrated to have seriously undermined counter-terrorism operations or American national security, given its multi-billion dollar R&D budget for adapting to change. There have been no credible claims made that anyone has lost their life on account of either the Snowden or Manning leaks. To help safeguard the identities of individuals who may have been identified in the leaks, both allowed journalists to vet the material before release.
References
Agamben, G. (1998). Homo Sacer: Sovereign power and bare life. Stanford: Stanford University Press.
Benjamin, W. (1969). The work of art in the age of mechanical reproduction. In Illuminations. New York: Schocken Books.
Bigo, D. (2006). Globalized (in)security: The field and the ban-opticon, http://www.people.fas.harvard.edu/~ces/conferences/muslims/Bigo.pdf. Accessed February 5, 2015.
Bogard, W. (1996). The simulation of surveillance: Hypercontrol in telematic societies. Cambridge: Cambridge University Press.
Bogard, W. (2007). The coils of a serpent haptic space and control societies. http://www.ctheory.net/articles.aspx?id=581
Bourdieu, P. (1977). Outline of a Theory of Practice. Cambridge University Press. p. 164.
Braidotti, R., Bio-power and Necro-politics. (2007). http://www.hum.uu.nl/medewerkers/r.braidotti/files/biopower.pdf. Accessed August 20, 2015.
Butler, J. (1997). The psychic life of power: Theories in Subjection. Redwood City: Stanford University Press.
Butler, J. (2003). Frames of war: When is life grievable?. New York: Verso.
Currior, C., & Marquis-Boire, M. (2015). A detailed look at hacking team’s emails about its repressive clients. The Intercept, July 8, the intercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/. Accessed December 4, 2015.
Cole, D. (2015). The New America: Little privacy, big terror. The New York Review of Books. http://www.nybooks.com/articles/archives/2015/aug/13/new-america-little-privacy-big-terror/
Combes, M. (2013). Gilbert Simondon and the transindividual. Cambridge, MA: MIT Press.
de Beistegui, M. (2004). Truth and genesis: Philosophy as differential ontology. Indianapolis: Indiana University Press.
Deleuze, G. (1988). Foucault (S. Hand, Trans.). Minneapolis: University of Minnesota Press.
Deleuze, G. (1992). Postscript on the societies of control. October, 59(Winter), 3–7. MIT Press
Deleuze, G., & Guattari, F. (2009). Anti-oedipus: Capitalism and schizophrenia. New York City: Penguin.
Deleuze, G., & Negri, A. (1990). Futur Anterieur (M. Joughin, Trans). http://www.uib.no/sites/w3.uib.no/files/attachments/6._deleuze-control_and_becoming_0.pdf. Accessed June 1, 2015.
Foucault, M. (1988). The history of sexuality, Vol. 3: The care of the self.
Foucault, M. (1995). Discipline & punish: The birth of the prison. New York: Vintage Books.
Foucault, M. (2007). Security, territory, population: Lectures at the Collège de France 1977–1978 (Vol. 4). New York City: Picador.
Galloway, A. R. (2011). Deleuze and Computers. Lecture at the University of Massachusetts. Amherst, MA, December 2, 2011.
Galloway, A., & Thacker, E. (2007). The exploit: A theory of networks. Minneapolis: University of Minnesota Press.
Gellmann, B. (2013). Edward Snowden, after months of NSA revelations, says his mission’s accomplished. The Washington Post, December 23, 2013.
Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Picador Press.
Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.
Haraway, D. (1991). Simians, cyborgs and women: The reinvention of nature. New York: Routledge.
Harcourt, B. (2015). Exposed desire and disobedience in the digital age. Boston, MA: Harvard University Press.
Harding, L. (2014). How Edward Snowden went from loyal NSA contractor to whistleblower. The Guardian, January 31, excerpted from The Inside Story of the World’s Most Wanted Man (2014), Vintage, a division of Penguin Random House LLC. http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract. Accessed January 19, 2015.
Hardt, M., & Negri, A. (2008). Reflections on empire. Polity Press.
Hassan, I. (1977). Prometheus as performer: Toward a posthuman culture? Georgia Review, 31(4), 830–850.
Hayles, K. N. (1999). How we became posthuman: Virtual bodies in cybernetics, literature, and informatics. Chicago: University of Chicago Press.
Johnson, B. (2014). American spies want Edward Snowden Dead. http://www.buzzfeed.com/bennyjohnson/americas-spies-want-edward-snowden-dead#.ewQDQPZNb. Accessed January 2, 2016.
Kitchin, R. (2013). Big data and human geography: Opportunities, challenges and risks. Dialogues in Human Geography, 3(3), 262–267.
Kroker, A. (1994). Data trash: The theory of the virtual class. London: Palgrave Macmillan.
Kroker, A. (2005). Born again ideology. http://www.ctheory.net/articles.aspx?id=487. Accessed January 2, 2015.
Kroker, A. (2014). Exits to the posthuman future. Boston: Polity Press.
Lohr, S. (2015). Dataism: The revolution transforming decision making, consumer behavior, and almost everything else. HarperCollins.
Ludlow, P. (2013). The strange case of Barrett Brown. The Nation, June 18. http://www.thenation.com/article/strange-case-barrett-brown/. Accessed December 5, 2015.
Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data and Society. doi:10.1177/2053951714541861. http://bds.sagepub.com/content/1/2/2053951714541861#ref-45. Accessed May 19, 2015.
McLaughlin, J. (2015). NSA chief wants to watch, as well as listen and read. The Intercept, June 24, 2015. https://firstlook.org/theintercept/2015/06/24/nsa-chief-wants-watch-well-listen-read/
Mullin, J. (2013) arstechnica.com June 26, 2013. http://arstechnica.com/tech-policy/2013/06/exclusive-in-2009-edsnowden-said-leakers-should-be-shot-then-he-became-one/3/ (accessed July 11, 2015).
Nietzsche, F. (1968). The will to power. New York City: Vintage Press.
Nietzsche, F. (1999). Thus Spake Zarathustra. New York: Dover Publications.
Nietzsche, F. (2009). Ecce homo: How one becomes what one is (D. Large, Trans). Oxford: Oxford University Press.
Nietzsche, F. (2010). Thus Spake Zarathustra. http://nationalvanguard.org/books/Thus-Spoke-Zarathustra-by-F.-Nietzsche.pdf. Accessed June 5, 2015.
Orwell, G. 1984 (1948). https://ebooks.adelaide.edu.au/o/orwell/george/o79n/index.html. Accessed June 11, 2015.
Raley, R. (2013). Dataveillance and countervailance. In Raw data is an oxymoron (pp. 121–145). Cambridge, MA: MIT Press.
Regalado, A. (2015). Engineering the perfect baby. MIT Technology Review, 118(3), 27–33.
Rodowick, D. N. (1999). Memory of resistance. In I. Buchanan (Ed.), A Deleuzian century? (pp. 44–45). Durham: Duke University Press.
Saunders, F. S. (2016). Where on Earth are you? London Review of Books, 38(5), 7–12.
Scott, D. (2014). Gilbert Simondon’s psychic and collective individuation. Edinburgh: University of Edinburgh Press.
Simondon, G. (1989). L’individuation psychique et collective. Auber.
Simondon, G. (1995). L’individu et sa genese physic-biologique. Paris: Presses Universitaires de France (1964, Editions Jerome Mullion).
Sri Aurobindo. (1972). The synthesis of yoga and the life divine. Pondicherry: Sri Aurobindo Ashram Press.
Stiegler, B. (2003). Philosophizing by accident (D. Barison, D. Ross, & P. Crogan, Trans) Excerpt from an unpublished translation of Stiegler’s book, Posser aI’oete. Paris: Galilee. http://public.journals.yorku.ca/index.php/public/article/viewFile/30090/27651
Stiegler, B. (2004). De la misère symbolique 1. L’époque hyperindustrielle. Paris: Galilée.
Stroud, M. (2014). The minority report: Chicago’s new police computer predicts crimes, but is it racist? The Verge. http://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist. Accessed February 3, 2015.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this chapter
Cite this chapter
Carlson, R.J. (2016). Nietzsche’s Snowden: Tightrope Walking the Posthuman Dispositif. In: Banerji, D., Paranjape, M. (eds) Critical Posthumanism and Planetary Futures . Springer, New Delhi. https://doi.org/10.1007/978-81-322-3637-5_4
Download citation
DOI: https://doi.org/10.1007/978-81-322-3637-5_4
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-3635-1
Online ISBN: 978-81-322-3637-5
eBook Packages: Social SciencesSocial Sciences (R0)