Practical Anarchy

Total Page:16

File Type:pdf, Size:1020Kb

Practical Anarchy Practical Anarchy “Practical Anarchy ” is the second in a three-volume series on anarchy. The first volume is “Everyday Anarchy” – the third is “Achieving Anarchy.” Freedomain Radio is the largest and most popular philosophy show on the Web, and was a “Top 10 Finalist” in the 2007 Podcast Awards. Please visit us at www.freedomainradio.com . The show survives entirely on voluntary donations – if you find this book helpful in any way, please donate at www.freedomainradio.com/donate.html For more books, or to purchase a print version of this book, please visit www.freedomainradio.com/books.html You can download more free books at www.freedomainradio.com/free Please feel free to distribute this book to whomever you think would benefit from it, but please do not modify the contents. Stefan Mo lyneux, MA 1 | P a g e By the same author: On Truth: The Tyranny of Illusion Universally Preferable Behavior: A Rational Proof of Secular Ethics Real–Time Relationships: The Logic of Love The God of Atheists (A Novel) Available at http://www.freedomainradio.com/books.html For my beloved wife Christina, who teaches me all that is true, and shows me everything that is possible… I would like to thank the listeners of Freedomain Radio, whose passion, generosity and participation has made this book – and all the books to come – possible. Thank you for the gift of this time. Thanks also to my most excellent reviewers and proofreaders, Charlotte and Greg – as well as Karl Bennion for his wonderful cello playing. For more, please visit http://www.youtube.com/KarlCello . Any errors that remain are, of course, solely my responsibility. Freedomain Radio is one of the most popular philosophy podcasts on the Internet, and was a Top 10 Finalist in the 2007 Podcast Awards. Please visit Freedomain Radio at www.freedomainradio.com for more free podcasts, books and videos – as well as a thriving message board. The Freedomain Library, Volume 6 Version 1.0, June 25, 2008 2 | P a g e CONTENTS Preface ..................................................................................................................................................................................... 8 Part 1: Methodology .................................................................................. 10 Introduction ........................................................................................................................................................................ 10 Limitations........................................................................................................................................................................... 11 The Answer? ....................................................................................................................................................................... 14 The Argument from Apocalypse ................................................................................................................................. 17 A Merely Personal Confession… ................................................................................................................................. 23 A Few Principles… ............................................................................................................................................................ 26 Using the past to justify the future… .................................................................................................................... 28 You are not the only kind person on the planet… .......................................................................................... 28 Statism and Isolation .................................................................................................................................................. 32 Relative Risk................................................................................................................................................................... 36 Collective Defense: An Example of Methodology ................................................................................................ 36 Why Invade? ................................................................................................................................................................... 37 Invading Anarchy ......................................................................................................................................................... 38 Deactivated Money ...................................................................................................................................................... 41 Statist National “Defense”: A Critical Example ..................................................................................................... 42 Which sector does more to protect you and your property – the public or the private?.......... 44 Part 2: Reasoning ..................................................................................... 45 Introduction: The Six Questions ................................................................................................................................. 45 Anarchism – Frequently Asked Questions ............................................................................................................. 47 Isn’t Anarchism ‘Bad’? ................................................................................................................................................ 47 But if there is no government, how can the inevitable conflicts in human society be resolved?47 3 | P a g e For somebody who is an anarchist, you sure do sound like a politician! Wasn’t that just a complete dodge of the question? ........................................................................................................................... 48 But what about the roads? ....................................................................................................................................... 48 Okay – here’s a scenario for you: a guy builds a road that completely encircles a suburban neighborhood, and then charges $1 million for anyone to cross that road. Isn’t he holding everyone who lives in that neighborhood hostage? ...................................................................................... 49 All right, smarty-pants – what about this: the company that supplies water to a neighborhood suddenly decides to increase its rates Tenfold – people are going to be forced to pay the exorbitant price, right? .............................................................................................................................................. 49 Okay – what if two DROs have different rules – isn’t that just going to result in endless civil war? ................................................................................................................................................................................... 49 But – won’t the most successful DRO just arm itself, violently eliminate all the other DROs, and emerge as a new government? ............................................................................................................................... 50 Are There Any Examples Of Anarchic Societies Being Successful In The Past? ................................. 50 How can a society without a government pay for national defense? ..................................................... 51 What about education? .............................................................................................................................................. 52 Yes, but how will poor children get an education if it is not paid for through taxes? ..................... 53 Disproving the State: Four Arguments Against Government ......................................................................... 54 Anarchy, Violence and the State ................................................................................................................................. 56 Does more government equal less violence? ................................................................................................... 56 Principle 1: Risk ............................................................................................................................................................ 57 Principle 2: Proximity ................................................................................................................................................ 58 Principle 3: Externalization of Costs .................................................................................................................... 58 Principle 4: Deferment ............................................................................................................................................... 59 Principle 5: Propaganda ............................................................................................................................................ 59 War, Profit and the State ................................................................................................................................................ 60 The Cost of Destruction ............................................................................................................................................. 62 The Risks of Destruction ........................................................................................................................................... 63 The Risks of Personal Retaliation.........................................................................................................................
Recommended publications
  • What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
    What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter.
    [Show full text]
  • Link to Today's Pdf Package
    TRANSCENDENCE “Every Place at Once,” by Crystal Abidin “Remote Control,” by Linda Besner “Seeing Stars,” by Alex Ronan “Advanced Search,” by Franceska Rouzard As a kid bored on a car ride or a teen stoned in afternoon class I imagined zones of psychic communion, immaterial common rooms where everyone I knew lived a second life. These spaces are now mundane, although, if anything, the internet proves that mundanity is an illusion and that everything is shot through with magic, or whatever you want to call it. Online doesn’t feel new at all. It feels like the home version of a concept that used to be esoteric. Online is a layer of reality, a dimension of life. It doesn’t solve or replace any great mysteries, but it turns them under the light. If the spark of an individual is the part of you that decides, your self will outlast you online, as an artifact, or a program. You can leave it there. —Alexandra Molotkow TRANSCENDENCE EVERYEVERY PLACEPLACE ATAT ONCEONCE Where do the dead go when tangible, singing onscreen. by CRYSTAL ABIDIN There she is, my sister, in two places at once. they die? No one in the congregation seems to flinch. As neatly as they filed into the pews, am sitting at a memorial service in a church everyone stands up and sings along tutti. But snug in the east end of Singapore. The master it doesn’t take long for the white-lit screens of Iof ceremony goes up to the pulpit. He tells us smartphones to emerge from the sea of heads.
    [Show full text]
  • Capitol Insurrection at Center of Conservative Movement
    Capitol Insurrection At Center Of Conservative Movement: At Least 43 Governors, Senators And Members Of Congress Have Ties To Groups That Planned January 6th Rally And Riots. SUMMARY: On January 6, 2021, a rally in support of overturning the results of the 2020 presidential election “turned deadly” when thousands of people stormed the U.S. Capitol at Donald Trump’s urging. Even Senate Republican leader Mitch McConnell, who rarely broke with Trump, has explicitly said, “the mob was fed lies. They were provoked by the President and other powerful people.” These “other powerful people” include a vast array of conservative officials and Trump allies who perpetuated false claims of fraud in the 2020 election after enjoying critical support from the groups that fueled the Capitol riot. In fact, at least 43 current Governors or elected federal office holders have direct ties to the groups that helped plan the January 6th rally, along with at least 15 members of Donald Trump’s former administration. The links that these Trump-allied officials have to these groups are: Turning Point Action, an arm of right-wing Turning Point USA, claimed to send “80+ buses full of patriots” to the rally that led to the Capitol riot, claiming the event would be one of the most “consequential” in U.S. history. • The group spent over $1.5 million supporting Trump and his Georgia senate allies who claimed the election was fraudulent and supported efforts to overturn it. • The organization hosted Trump at an event where he claimed Democrats were trying to “rig the election,” which he said would be “the most corrupt election in the history of our country.” • At a Turning Point USA event, Rep.
    [Show full text]
  • The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
    The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons
    [Show full text]
  • Responses to the White-Supremacist Terrorist Attacks
    | 11 Editorial After 15 March: Responses to the White-Supremacist Terrorist Attacks MURDOCH STEPHENS, JACK FOSTER, DYLAN TAYLOR, AMANDA THOMAS & CHAMSY EL-OJEILI For many of us who do not encounter forms of racial and religious hatred in daily life, the white-supremacist terrorist attacks of 15 March, which killed 51 people and injured 49 others at the Al-Noor mosque and Linwood Islamic Centre in Christchurch, were experienced as a traumatic blow seemingly from nowhere. Explaining and politically responding to the tragedy felt imperative, but collective grief, indignation, and empathy were quite rightly the most immediate feelings and responses in the weeks that followed. Here, writing from a Pākehā, non- Muslim perspective, we want to consider some of the wider explanatory and strategic questions that the Left must face in the wake of these attacks. A call to prioritise Muslim voices in the country’s media followed the shootings. We begin this editorial by briefly surveying some of the key themes that appeared across Muslim responses to the attacks and their aftermath. This discussion draws on a selection of the responses produced in the immediate wake of the attacks or in the weeks that followed.1 This survey is only a partial coverage of the responses, and we do not claim to be representing 1 These references were drawn from those compiled by the Grappling with Ethnography blog, https:// grapplingwithethnography.net/ 12 | COUNTERFUTURES 7 the full range of positions held within the Muslim community. Many of the responses welcomed the sympathy and support the Muslim community received after the attacks.
    [Show full text]
  • Fortif Ing Hate
    )ORULGD6WDWH8QLYHUVLW\/LEUDULHV 2020 Fortifying Hate: How Social Media Acts as a Tool for White Supremacist Groups Allison Bloomer Follow this and additional works at DigiNole: FSU's Digital Repository. For more information, please contact [email protected] Bloomer 1 THE FLORIDA STATE UNIVERSITY COLLEGE OF SOCIAL SCIENCES FORTIFYING HATE: HOW SOCIAL MEDIA ACTS AS A TOOL FOR WHITE SUPREMACIST GROUPS By ALLISON BLOOMER A Thesis submitted to the Department of Political Science in partial fulfillment of the requirements for graduation with Honors in the Major Degree Awarded: Spring, 2021 The members of the Defense Committee approve the thesis of Allison Bloomer defended on November 19, 2020. Dr. Matthew Pietryka Ph.D. Thesis Director Dr. Deana Rohlinger Ph.D. Thesis Co-Director Dr. Amanda Driscoll PhD. Committee Member Bloomer 3 Abstract In this paper, I seek to gain a better understanding of the alt right presence on YouTube. This research focuses on two particular YouTube channels hosted by the alt-right figures, Stefan Molyneux and Hunter Avallone. Videos published during the 2019 calendar year from both channels are analyzed for content and videos are placed into categories. From there, the categories are subdivided into ‘institutional political’ and ‘social issue’ based on content. T-tests for both channels examine the significance of engagement with each category of content. Engagement in this research is based on exact numerical value of views, likes, and comments received on each YouTube video. The alt-right is not only a growing movement, but it is also crossing over into more mainstream media. With this, tolerance for alt-right rhetoric expands and fringe groups can follow their lead.
    [Show full text]
  • Reportedly at the Hands of White Nationalists
    TRUMP AND HIS SURROGATES LOUDLY PEDDLED DEBUNKED RIGHT-WING CONSPIRACY THEORIES TIED TO QANON AND WHITE SUPREMACISTS, GIVING THEM FALSE LEGITIMACY SUMMARY As Trump and his allies searched for justifications to claim electoral victory, the far-right online community played a pivotal role in originating claims for the campaign to push. Conspiracies from white supremacists, QAnon supporters, and long-time conspiracy theorists were elevated, disseminated, and pushed out by the president and his allies. There seems to be a direct flow from the furthest right reaches of the internet and the official spokespeople of the president —including the president himself — such as: • The president promoting numerical figures developed by “TheDonald.Win” — an online community founded to openly post hate speech and calls to violence — in an attempt to prove his false voter fraud claims. • Promoting “Stop The Steal” events planned by white supremacists, including one that led to a stabbing reportedly at the hands of white nationalists. • Lending credibility to the mysterious, propagandic twitter account “Election Wizard,” which promotes election conspiracy theories and follows noted white supremacists and QAnon accounts. • Using a QAnon promoted conspiracy to fire a top elections cybersecurity official. TABLE OF CONTENTS Donald Trump Promoted Numerical Figures Developed By “TheDonald.Win”—An Online Community Founded To Openly Post Hate Speech And Calls To Violence In An Attempt To Prove His False Voter Fraud Claims ................................................................................................3
    [Show full text]
  • Deplatforming Misogyny
    Copyright © 2021 Women’s Legal Education and Action Fund (LEAF) Published by Women’s Legal Education and Action Fund (LEAF) 180 Dundas Street West, Suite 1420 Toronto, Ontario, Canada M5G 1C7 www.leaf.ca LEAF is a national, charitable, non-profit organization, founded in 1985. LEAF works to advance the substantive equality rights of women and girls in Canada through litigation, law reform and public education using the Canadian Charter of Rights and Freedoms. This publication was created as part of LEAF's Technology-Facilitated Violence (TFV) Project. The TFV Project brings together feminist lawyers and academics to conduct research and produce publications imagining legal responses to TFV against women and gender-diverse people that are informed by equality principles. The project also supports and informs LEAF’s law reform efforts and potential upcoming interventions concerning TFV. Acknowledgements Deep gratitude and appreciation go to the many people whose efforts and support made this publication possible. This report was researched and written by Cynthia Khoo, a technology and human rights lawyer and researcher. Cynthia holds an LL.M. (Concentration in Law and Technology) from the University of Ottawa, where she worked on cases as junior counsel at the Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic (CIPPIC). Her paper on platform liability for emergent systemic harm to historically marginalized groups received the inaugural Ian R. Kerr Robotnik Memorial Award for the Best Paper by an Emerging Scholar at We Robot 2020. She has managed a sole practice law firm, Tekhnos Law, and obtained her J.D. from the University of Victoria.
    [Show full text]
  • BY Galen Stocking, Patrick Van Kessel, Michael Barthel, Katerina Eva Matsa and Maya Khuzam
    FOR RELEASE SEPTEMBER 28, 2020 BY Galen Stocking, Patrick van Kessel, Michael Barthel, Katerina Eva Matsa and Maya Khuzam FOR MEDIA OR OTHER INQUIRIES: Katerina Eva Matsa, Associate Director, Journalism Research Galen Stocking, Senior Computational Social Scientist Hannah Klein, Communications Manager Andrew Grant, Communications Associate 202.419.4372 www.pewresearch.org RECOMMENDED CITATION Pew Research Center, September, 2020, “Many Americans Get News on YouTube, Where News Organizations and Independent Producers Thrive Side by Side” 1 PEW RESEARCH CENTER About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It does not take policy positions. The Center conducts public opinion polling, demographic research, content analysis and other data-driven social science research. It studies U.S. politics and policy; journalism and media; internet, science and technology; religion and public life; Hispanic trends; global attitudes and trends; and U.S. social and demographic trends. All of the Center’s reports are available at www.pewresearch.org. Pew Research Center is a subsidiary of The Pew Charitable Trusts, its primary funder. © Pew Research Center 2020 www.pewresearch.org 2 PEW RESEARCH CENTER Terminology [FORMAT AS DROPDOWN BOX W/LINK] This study explores the landscape of news on YouTube through a survey of YouTube news consumers alongside an analysis of the most popular YouTube channels that produce news and the videos published by a subset of these channels. Here are some definitions of key terms used throughout this report: ▪ YouTube news consumers: Those who said they get news from YouTube in a Pew Research Center survey of U.S.
    [Show full text]
  • Hatescape: an In-Depth Analysis of Extremism and Hate Speech On
    Hatescape: An In-Depth Analysis of Extremism and Hate Speech on TikTok Ciarán O’Connor About this paper About the Author This report aims to provide an in-depth analysis on Ciarán O’Connor is an analyst and investigator on ISD’s the state of extremism and hate on TikTok. It is the Digital Analysis Unit. He focuses on the intersection of culmination of three months of research on a sample extremism and technology and with specific expertise of 1,030 videos posted on TikTok, equivalent to just on the far-right and disinformation environment online over eight hours of content, that were used to promote and use of open-source research methodologies. hatred and glorify extremism and terrorism on the Since the start of 2021, Ciarán has led ISD’s COVID-19 platform. Vaccine Misinformation Monitor, a series of short-form reports examining the nature and scale of vaccine- ISD set out to examine the state of hate and extremism related misinformation in Ireland, Canada, MENA and on TikTok in two ways. The first objective involved the Netherlands. Before joining ISD, Ciarán worked analysing how individuals or groups promote hateful with Storyful news agency. He has an MSc in Political ideologies and target people on the platform based Communication Science from the University of on numerous protected attributes such as ethnicity, Amsterdam and is currently learning Dutch. religion, gender or others. Second, using the same framework, ISD investigated how features on TikTok Acknowledgements like profiles, hashtags, share functions, video effects This research was made possible thanks to the support, and music are used to spread hate.
    [Show full text]
  • "A Different Light"
    Read our CEO Jonny Wilkinson's regular column in The Northern Advocate "A different Light" A Different Light 18 August 2018 – Speech Marks You have got to know when to hold them, know when to fold them, and know when to bugger off back to Canada. Lauren Southern and Stefan Molyneux, Canada’s Alt- Righters knew this when they wanted to peddle their white supremist wears in New Zealand to the turn of $99 a pop(minimum). Phil Goff told them to bog off from his Town Hall and Aucklander’s protestations caused them a cessation. “They were not wanted. When they were in New Zealand. Knowing this they left.” A Haiku leaving them bemused but they got what they wanted, publicity and know doubt a bigger demand for their next gig. It certainly freed up a lot of speech in New Zealand. I am always gobsmacked at how easy it is to awaken amoebic logic and how people who you thought were relatively sophisticated revert to the most basic of arguments. “Free speech is free speech end of”, “everyone is allowed to speak their point of view”, and “there is no harm in a point of view”. There has been some very good pieces written on the differences between free speech and hate speech. I think a very good way of recognising hate speech is when the speaker starts to wine about their rights to free speech. When people speak about free speech there is always an agenda and it’s usually self serving. Re-wind to 2004 in Orewa where Donald(familiar?) Brash made a brash speech that cajoled and regurgitated support for then flailing National Party by what many people felt was fuelling racist sentiment toward Māoridom The speech itself was framed in terms of equality and pragmatism, arguing for doing away with policies that proactively targeted Maori to address the obvious marginalisation and obscure references to the principles of the Treaty of Waitangi.
    [Show full text]
  • 'Alt-Right', and from the Margins to the Mainstream Aaron Winter (UEL)
    Online Hate: From the Far-Right to the ‘Alt-Right’, and from the Margins to the Mainstream Aaron Winter (UEL) DRAFT. For citation: Winter, Aaron. 2019. ‘Online Hate: From the Far-Right to the ‘Alt-Right’, and from the Margins to the Mainstream’. Online Othering: Exploring violence and discrimination on the web. eds. Karen Lumsden and Emily Harmer. London: Palgrave. Abstract In the 1990s and early 2000s, there was much discussion about the democratic and anti-democratic implications of the internet, the latter particularly focused on the far-right using it to spread hate and recruit. Despite this, the American far-right did not harness it quickly, effectively or widely. More recently though, they have experienced a resurgence and mainstreaming, benefitting greatly from social media. This chapter will examine the history of the American far-right’s use of the internet in light of this, in respect to: 1. How this history developed in response to political changes and emerging technologies; 2. How it reflected and changed the status of such movements and their brand of hate; and 3. The relationship between online activity and traditional forms and methods of communication. Introduction In the late 1990s and early 2000s there was much discussion of both the democratizing and anti-democratic implications of the internet, in the absence of clear controls or regulations and boundaries. In relation to the former thesis were progressive social movements, and in the latter, the far-right using the internet to spread their racist hate, network and recruit both domestically and globally (Back, Keith and Solomos 1998, 73; Daniels 2009, 39-40; Neiwert 2017, 215-216).
    [Show full text]