Nonkilling Geography

Total Page:16

File Type:pdf, Size:1020Kb

Nonkilling Geography Nonkilling Geography Edited by James Tyner and Joshua Inwood Center for Global Nonkilling CREATIVE COMMONS LICENCE Attribution-Noncommercial-No Derivative Works 3.0 You are free to share, copy, distribute and transmit this work* Under the following conditions: Attribution. You must attribute this work in the manner specified by the author/licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial. You may not use this work for commercial purposes. No Derivative Works. You may not alter, transform or build upon this work. * For any reuse or distribution, you must make clear to others the license terms of this work. * Any of the above conditions can be waived if you gain permission from the copyright holders. Nothing in this license impairs or restricts the Authors’ moral and legal rights. Parts of this volume have been released under GFDL and Creative Commons Attribution-Share Alike 3.0 as part of Wikiversity’s School of Nonkilling Studies (http://en.wikiversity.org/wiki/School:Nonkilling_studies). The Center for Global Nonkilling does not necessarily endorse the views expressed by the authors. Also available for free download at: http://www.nonkilling.org © The Authors, 2011 © Center for Global Nonkilling, 2011 (this edition) First Edition: June 2011 ISBN-13 978-0-9822983-9-8 ISBN-10 0-9822983-9-0 ____________________________________________________ Cataloging in Publication Data (CIP) Nonkilling Geography / Edited by James Tyner and Joshua Inwood ISBN 978-0-9822983-9-8 1. Nonkilling 2. Peace. 3. Pacifism – Nonviolence. I. Title. II. Tyner, James, ed. lit. III. Inwood, Joshua, ed. lit. CDU - 172.4 : 327.36 ____________________________________________________ A catalogue record is also available from the Library of Congress. Center for Global Nonkilling Post Office Box 12232 Honolulu, Hawaiʻi 96828 United States of America Email: [email protected] http://www.nonkilling.org “…there is no need for wars or violence… There are no problems that cannot be solved around a table…” Primo Levi, The Drowned and the Saved, 1989. Contents An Introduction to Nonkilling Geographies 11 James Tyner and Joshua F.J. Inwood Toward a Nonkilling Geography 23 James Tyner Geography as Enabler of a Killing World 43 Colin Flint Killing for Liberalism 55 Nik Heynen and Graham Pickren The Territories of “Civility” and Killing in Brazil 67 Alcindo José de Sá The New Military Urbanism 85 Stephen Graham American Exceptionalism, Abolition and the Possibilities for Nonkilling Futures 103 Jenna M. Loyd Google Bombs, Warblogs, and Hacktivism 127 Barney Warf Killing with Kindness? 149 Kathryn Gillespie 7 Introduction An Introduction to Nonkilling Geographies Opening New Spaces James Tyner Kent State University Joshua F.J. Inwood University of Tennessee In April 4, 1967, one year to the day of his assassination, Dr. Martin Lu- ther King, Jr. publically denounced the war in Vietnam. It was imperative, morally and spiritually, to speak out. According to King (1986a; 231), “A time comes when silence is betrayal.” King explained that throughout his public work within the Civil Rights movement, he began to view the on-going war in Vietnam as commensurate with the entrenched poverty and racism that permeated the United States. In other words, the massive killing of Vietnam- ese by American forces occupied the same moral plane as the discrimination, exploitation, and oppression of African-Americans in the U.S. Moreover, King realized that to remain silent on the war was to betray his core values. Spe- cifically, it would be immoral to attempt to build his Beloved Community at home while ignoring the plight of Vietnamese abroad (Inwood, 2009). During his sermon, King powerfully linked the growth of militarism, ma- terialism, and racism through time and space. In so doing, he implicated wider social, religious, and academic institutions in American society as be- ing complicit in the death and destruction that is meted out every day in the name of the American Empire. The promotion of empire, in other words, does carry a cost; most often measured in the lives of oppressed peoples of color that have the misfortune of living in those spaces deemed of strategic economic or military value by American politicians. King’s imploring of his audience to make the connection between Vietnam and the American Civil Rights movement was an attempt to connect the direct, physical violence— the killing—with the institutional and structural violence that was to founda- tional to the economic and political systems of the United States. 11 12 Nonkilling Geography Nearly a half-century later, in the shadow of innumerable interventions across the global, in the shadow of genocides and famines, in the shadow of rampant gun violence in the United States, King’s call to ‘break the silence’ looms over us in uncomfortable ways. It is again time to break the silence. Stated differently, as educators—but more immediately as citizens of the world—we have a responsibility to act to end the violence that perme- ates our culture and our institutions in ways that do not just end conflict, but also lay the foundations for a positive peace and a nonkilling society to take root. At this moment, within the United States, when a war culture so dominates geopolitical discourse, to not do something is an ultraconserva- tive response that maintains a status quo that more often than not impacts the marginalized and most vulnerable in our society most directly. To know that poverty exists, and do nothing; to know that infants and children are starving, and do nothing; to know that women are being raped and killed through organized mass violence, and do nothing, is to participate in a cul- ture of impunity (Tyner, 2009). As Susan Opotow (1990: 3) explains, “Al- though harm that results from unconcern … may not involve malevolent in- tent, [this] can nevertheless result in exploitation, disruption of crucial ser- vices, suffering, the destruction of communities, and death.” As long as kill- ing—and here we refer quite explicitly to the direct, physical violence of taking life—remains an organizing principle of our modern society, we can neither deny or ignore our responsibility to address the interrelationships of war, violence, and inequality and to help our students and colleagues under- stand the linkages between these seemingly intractable problems. Glenn Paige, professor emeritus of political science at the University of Hawai’i and the founder and Chair of the Governing Council of the Center for Global Nonkilling (formerly Center for Global Nonviolence), provides a working definition of a nonkilling society. According to Paige (2002: 1), such a society is “a human community, smallest to largest, local to global, character- ized by no killing of humans and no threats to kill; no weapons designed to kill humans and no justifications for using them; and no conditions of society de- pendent upon threat or use of killing force for maintenance or change.” This is a tall order—but certainly a laudable goal. There are some, of course, who will decry this as utopian thinking; that violence, but especially kill- ing, is a natural part of humanity; that geopolitics requires violence. How else, it is asked, are we to stop this century’s hitlers, stalins, or pol pots? Of course, we could counter with the question of what types of society permit the emergence of these brutal rulers? Is there not space to promote a more just society—to eliminate the structural and institutional inequalities that lead to violence? An Introduction to Nonkilling Geographies 13 Glenn Paige (2002: 161) maintains that a nonkilling (and more broadly, nonviolent) society is possible—but any effort to promote such as society must be global. In other words, geography must figure prominently in such an effort. Indeed, as outlined by Paige (2002: 74-75), a beginning point in the promotion of a nonkilling society is to concentrate on the various zones—or spaces—of a nonkilling society; attention, both scholarly and po- litically, must be directed toward those spaces in which violence is (re)produced, maintained, justified, and legitimated. At a most immediate, proximate level, we must direct attention to the ‘space of killing’: the space where actual violence takes place—the space of the murderer, for exam- ple, or the rapist. These personal spaces are produced through social rela- tions and interactions; these are the spaces where men and women act. However, these spaces are themselves coded by dominant and embodied conceptions of ‘race’, sex, gender, and so on—the ‘spaces of socialization’. Here is where people learn to kill, directly by training or vicariously by ob- servation. These are the spaces in which violence is learned—and learned to be accepted. More broadly, we are confronted with the ‘spaces of cul- tural conditioning’. It is within these spaces that we observe how religion, for example, and other ideologies have provided reasons and justifications for violence more broadly and killing more specifically. We see here also the salience of media, education, and other institutions. Lastly, we need to direct attention to those ‘spaces of structural reinforcement’: the economic and political practices that permeate society, such as the promotion of capi- talism and attendant colonial and neo-colonial practices. In total, we must direct attention as to how structural and institutional violence likewise pro- vides the context for direct, personal violence and, ultimately, killing. These spaces are not exclusive, but instead operate in tandem, produc- ing a militarized society that both condones and in fact promotes violence and killing as justifiable solutions. This is seen most clearly, but by no means solely, in the emergence of ‘war culture’. Thus, as an initial testing of the waters, of a preliminary sketch of the spaces of violence, we provide a brief narrative of war culture and militarism.
Recommended publications
  • An Ahimsa Crisis: You Decide
    AN AHIMSA CRISIS: YOU DECIDE An Ahimsa Crisis: You Decide 1 2Prakrit Bharati academy,An Ahimsa Crisis: Jai YouP Decideur Prakrit Bharati Pushpa - 356 AN AHIMSA CRISIS: YOU DECIDE Sulekh C. Jain An Ahimsa Crisis: You Decide 3 Publisher: * D.R. Mehta Founder & Chief Patron Prakrit Bharati Academy, 13-A, Main Malviya Nagar, Jaipur - 302017 Phone: 0141 - 2524827, 2520230 E-mail : [email protected] * First Edition 2016 * ISBN No. 978-93-81571-62-0 * © Author * Price : 700/- 10 $ * Computerisation: Prakrit Bharati Academy, Jaipur * Printed at: Sankhla Printers Vinayak Shikhar Shivbadi Road, Bikaner 334003 An Ahimsa Crisis: You Decide 4by Sulekh C. Jain An Ahimsa Crisis: You Decide Contents Dedication 11 Publishers Note 12 Preface 14 Acknowledgement 18 About the Author 19 Apologies 22 I am honored 23 Foreword by Glenn D. Paige 24 Foreword by Gary Francione 26 Foreword by Philip Clayton 37 Meanings of Some Hindi & Prakrit Words Used Here 42 Why this book? 45 An overview of ahimsa 54 Jainism: a living tradition 55 The connection between ahimsa and Jainism 58 What differentiates a Jain from a non-Jain? 60 Four stages of karmas 62 History of ahimsa 69 The basis of ahimsa in Jainism 73 The two types of ahimsa 76 The three ways to commit himsa 77 The classifications of himsa 80 The intensity, degrees, and level of inflow of karmas due 82 to himsa The broad landscape of himsa 86 The minimum Jain code of conduct 90 Traits of an ahimsak 90 The net benefits of observing ahimsa 91 Who am I? 91 Jain scriptures on ahimsa 91 Jain prayers and thoughts 93
    [Show full text]
  • PC Magazine Fighting Spyware Viruses And
    01_577697 ffirs.qxd 12/7/04 11:49 PM Page i PC Magazine® Fighting Spyware, Viruses, and Malware Ed Tittel TEAM LinG - Live, Informative, Non-cost and Genuine ! 01_577697 ffirs.qxd 12/7/04 11:49 PM Page ii PC Magazine® Fighting Spyware, Viruses, and Malware Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256-5774 www.wiley.com Copyright © 2005 by Wiley Publishing Published simultaneously in Canada ISBN: 0-7645-7769-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/RW/RS/QU/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, e-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Nonviolent Alternatives for Social Change
    CONTENTS NONVIOLENT ALTERNATIVES FOR SOCIAL CHANGE Nonviolent Alternatives for Social Change - Volume 1 No. of Pages: 450 ISBN: 978-1-84826-220-1 (eBook) ISBN: 978-1-84826-670-4 (Print Volume) For more information of e-book and Print Volume(s) order, please click here Or contact : [email protected] ©Encyclopedia of Life Support Systems (EOLSS) NONVIOLENT ALTERNATIVES FOR SOCIAL CHANGE CONTENTS Understanding Nonviolence in Theory and Practice 1 Ralph Summy, The Australian Centre for Peace and Conflict Studies, The University of Queensland, Brisbane, Australia 1. Introduction 2. Difference between Peace and Nonviolence 3. Different Roads to Peace 4. Obstacles to Nonviolent Option 5. Typology of Nonviolence (4 ‘P’s) 6. Quadrant A – Principled/Personal 6.1. Christianity 6.1.1. Anabaptists 6.1.2. Other sects 6.1.3. Leo Tolstoy 6.2. Judaism 6.3. Buddhism 6.4. Jainism 6.5. Islam 6.6. Stoicism 6.7. Humanism 7. Quadrant B – Pragmatic/Personal 8. Quadrant C – Principled/Public 8.1. Gandhi 8.2. Martin Luther King 8.3. Archbishop Desmond Tutu 8.4. Dalai Lama XIV 8.5. Aung San Suu Kyi 8.6. Daisaku Ikeda 8.7. Native Hawai’ian Society 8.8. Society of Friends 9. Quadrant D – Pragmatic/Public 9.1. Dependency Theory of Power 9.1.1. Ruler’s Sources of Power 9.1.2. Why People Obey 9.1.3. Matrix of Dependency 9.2. Independence (10 ’S’s) 9.3. Blueprint of a Critique 10. Conclusion Countering with Nonviolence the Pervasive Structural Violence of Everyday Life- The Case of a Small Italian Townships 40 Piero P.
    [Show full text]
  • 10 ICPNA Brochure
    th ANUVIBHA 10INTERNATIONAL CONFERENCE ON PEACE AND NONVIOLENT ACTION 17 Dec - 20 Dec, 2019 Theme Educating and Training Children and Youths in Nonviolence An Imperative for the Creation of Nonkilling Societies and a Sustainable Future organized by ANUVRAT GLOBAL ORGANIZATION (ANUVIBHA) associated with UN-DGC in academic collaboration with THE CENTRE FOR GLOBAL NONKILLING Honolulu, USA in Special Consultative Status ECOSOC with UN and INTERNATIONAL INSTITUTE OF PEACE STUDIES AND GLOBAL PHILOSOPHY (IIPSGP), UK, FRANCE ANUVRAT GLOBAL ORGANIZATION (ANUVIBHA) v.kqozr fo'o Hkkjrh ¼v.kqfoHkk½ Opp. Gaurav Tower, JLN Marg, JAIPUR - 302 017 INDIA Our Spiritual Patron Anuvrat Anushasta His Holiness Acharya Mahashraman His Holiness Acharya Mahashraman is successor to his many-splendoured guru HH Acharya Mahapragya. He is the eleventh Acharya of the Jain Swetamber Terapanth sect and the Spiritual Head of Anuvrat Movement which aims at the rejuvenation of moral and spiritual values among people of the world. He is also a Jain monk who strictly observes the vow of ahimsa (nonviolence) in its entirety in thought, word and deed in addition to the other four great vows of truth, non-stealing, non-possession and celibacy. He is young, dynamic, sagacious and is an embodiment of spirituality. Currently, he is leading Ahimsa Yatra (a journey on foot) across the country to create nonviolence awareness among the masses. th 10INTERNATIONAL CONFERENCE ON PEACE AND NONVIOLENT ACTION (10th ICPNA) Aims and Objectives of the 10th ICPNA The 10th ICPNA aims to discuss and propose a viable system for training the children, youths and adults across the world in nonviolence.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • Infosec Year in Review -- 1999
    InfoSec Year In Review -- 1999 M. E. Kabay, PhD, CISSP. Security Leader, INFOSEC Group, AtomicTangerine Inc. Category 11 Breaches of confidentiality Date 1999-01-29 Keyword data leakage privacy confidentiality control Web Source, Vol, No. RISKS 20 18 The Canadian consumer-tracking service Air Miles inadvertently left 50,000 records of applicants for its loyalty program publicly accessible on their Web site for an undetermined length of time. The Web site was offline as of 21 January until the problem was fixed. Date 1999-02-03 Keyword data leakage Web script QA vulnerability confidentiality Source, Vol, No. WIRED via PointCast An error in the configuration or programming of the F. A. O. Schwarz Web site resulted paradoxically in weakening the security of transactions deliberately completed by FAX instead of through SSL. Customers who declined to send their credit-card numbers via SSL ended up having their personal details — address and so forth — stored in a Web page that could be accessed by anyone entering a URL with an appropriate (even if randomly chosen) numerical component. Date 1999-02-10 Keyword e-commerce credit card personal information password privacy Source, Vol, No. RISKS 20 20 Prof. Ross Anderson of Cambridge University analyzed requirements on the AMAZON.COM online bookstore for credit card number, password, and personal details such as phone number. He identified several risks: (1) merchant retention of credit card numbers poses a far higher risk of capture than of capture in transit; (2) adding a password increases the likelihood of compromise because so many naïve users choose bad passwords and then write them down; (3) even the British site for Amazon contravenes European rules on protecting consumer privacy; (3) such practices make it easier for banks to reject their clients' claims of fraudulent use of their credit-card numbers.
    [Show full text]
  • Honeypots: Tracking Hackers by Lance Spitzner Publisher: Addison Wesley Pub Date: September 13, 2002 ISBN: 0-321-10895-7 Pages: 480 • Examples
    Honeypots: Tracking Hackers By Lance Spitzner Publisher: Addison Wesley Pub Date: September 13, 2002 ISBN: 0-321-10895-7 Pages: 480 • Examples Copyright Foreword: Giving the Hackers a Kick Where It Hurts Preface Audience CD-ROM Web Site References Network Diagrams About the Author Acknowledgments Chapter 1. The Sting: My Fascination with Honeypots The Lure of Honeypots How I Got Started with Honeypots Perceptions and Misconceptions of Honeypots Summary References Chapter 2. The Threat: Tools, Tactics, and Motives of Attackers Script Kiddies and Advanced Blackhats Everyone Is a Target Methods of Attackers Motives of Attackers Adapting and Changing Threats Summary References Chapter 3. History and Definition of Honeypots The History of Honeypots Definitions of Honeypots Summary References Chapter 4. The Value of Honeypots Advantages of Honeypots Disadvantages of Honeypots The Role of Honeypots in Overall Security Honeypot Policies Summary References Chapter 5. Classifying Honeypots by Level of Interaction Tradeoffs Between Levels of Interaction Low-Interaction Honeypots Medium-Interaction Honeypots High-Interaction Honeypots An Overview of Six Honeypots Summary References Chapter 6. BackOfficer Friendly Overview of BOF The Value of BOF How BOF Works Installing, Configuring, and Deploying BOF Information Gathering and Alerting Capabilities Risk Associated with BOF Summary Tutorial References Chapter 7. Specter Overview of Specter The Value of Specter How Specter Works Installing and Configuring Specter Deploying and Maintaining Specter Information-Gathering and Alerting Capabilities Risk Associated with Specter Summary References Chapter 8. Honeyd Overview of Honeyd Value of Honeyd How Honeyd Works Installing and Configuring Honeyd Deploying and Maintaining Honeyd Information Gathering Risk Associated with Honeyd Summary References Chapter 9.
    [Show full text]
  • Cult of the Dead Cow by Menn, June 2019 : a Fundamental Misunderstanding
    Cult of the Dead Cow by Menn, June 2019 : a fundamental misunderstanding. Camille Akmut June 14, 2019 Abstract Beginning or end of a culture? The old model of the journalist-turned- historian by default. { a book review. 1 Introduction : isomorphic structures \I have not slept with any of my subjects." If such were a condition to be a journalist or documentary filmmaker of technology today, as it is commonly understood to be the rule amongst political reporters, for obvious reasons, their fates would be settled faster than they had settled Applebaum's own. |{ It is hard to observe the doings of this peculiar circle from afar without being reminded of their predecessors, who were the rock bands of the 1960s, 1970s, 1980s and 1990s, and their groupies (e.g. journalist Annik Honore and Ian Curtis). In the 2000s, they emerged, and replaced them; all of their habits and ways included, almost identical. We will forgo any longer discussions or descriptions of this incestu- ous crowd, of \crypto-anarchists" and \cyber-libertarians" with doubtful understanding of political theory, or history, \theoretical physicists" who conduct their own trials by fire, as churchmen had done in the Middle Ages of queers; and the rest of side characters, who too often land on their backs. The bottom is nearly bottomless with them, and they know their mu- tual orifices a little too well for their own good. Their courtship scenes are like those that could be observed, not with- out embarrassment by some, in the gymnasiums of ancient Athens in the middle of summer, June; the remains of which we find now in various comedy plays.
    [Show full text]
  • ABSTRACT the Rhetorical Construction of Hacktivism
    ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................................
    [Show full text]
  • Buddhism and Weapons of Mass Destruction: an Oxymoron?
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Works 12 Buddhism and Weapons of Mass Destruction An Oxymoron? Donald K. Swearer taking stock of a dilemma One of the most enduring principles of Buddhist ethics is the teaching of nonviolence (ahimsa), and the first of the five basic moral precepts is not to take the life of a sentient being. In the light of these teachings, is a conver- sation about Buddhist perspectives on weapons with the capacity for large- scale death and destruction not a contradiction in terms? David Chappell describes the tensions in the tradition between the normative Buddhist prin- ciples of peace and nonviolence and the actual behaviors of Buddhists both past and present, for example, rulers who have promoted war in defense of nation and religion and clergy who supported militarist regimes. In the light of this tension, Gananath Obeyesekere holds that Buddhism’s noble principles are inevitably compromised by history and politics, a point of view that can be applied to other religious traditions, as well.1 To situate the Buddhist ethical principles of peace, nonviolence, and nonkilling beyond history, however, obviates any capacity they might have to challenge and, it is hoped, to transform violence in any form, including violence associated with weapons of mass destruction. Whether Buddhism and the other world religions have anything uniquely distinctive to contribute to the specific pol- icy decisions related to debates about WMD, such as utilization, deterrence, and proliferation, is moot. What the world’s religions, including Buddhism, do have to offer, however, is a vision of hope where the values of peace, non- violence, compassion, and the opportunity for human beings to flourish cooperatively are uppermost.
    [Show full text]