Magnus Lawrie

TRASH VERSIONALITY FOR POST-DIGITAL CULTURE

APRJA Volume 3, Issue 1, 2014 ISSN 2245-7755

CC license: ‘Attribution-NonCommercial-ShareAlike’. Magnus Lawrie: TRASH VERSIONALITY...

Media Trash continual re-writing of the standards affect- ing social and network-based encounter. The processes renew shared conceptions RHETORIC and pictures, prompt self-refection and pose Following a 14-day visit to parts of the UK, the questions, “whose truth?” and, “whose the United Nations’ special rapporteur on value(s)?”. adequate housing Raquel Rolnik, issued an end-of mission press statement.[1] She INDISPENSABILITY recommended immediate suspension of As quickly as attention has switched away controversial reforms affecting social hous- from the aforementioned episodes, they offer ing tenants.[2] Researched according to us a snapshot of a media landscape in which UN protocol (Gentleman), the advice was trash, as dispensable news and information, however vehemently rejected by the UK is merging with public opinion and political government; the rapporteur’s personal and rhetoric. The combination of booming mass professional credibility were then attacked in culture and creativity produces a variety of the media and elsewhere.[3] images — including data images — which are These changing dynamics, between not easily locatable within the apparatus’ of public and political spheres are especially political, social and economic assemblages. visible online, where social media is infu- Consequently, these images (whether per- encing many areas. In one instance a court sonal or institutional) are open to conjecture. trial was abandoned after new evidence, Their position on the continuum between obtained from a disused account, media, platform and network transport ren- came to light. Details of the accused were ders them equivocal — ambiguous entities, nevertheless reported in print and on the where identity, trust and authenticity come Web.[4] Elsewhere, legal proceedings have under review. been derailed because of jurors’ activity on- These are issues which are problema- line (Davis). Incautious tweets have resulted tized in an artwork by Kripe, Schraffenberger in prosecutions for libel (BBC News). and Terpstra; The Formamat (2010) inves- This article attempts an overview of tigates the value individuals place on data phenomena, which exemplify informational they have stored on their mobile devices. The and conceptual instances (or ‘versions’) work is a vending machine, “which returns characteristic of current ‘post-digital’ condi- candy in exchange for the deletion of [an tions. By counter-posing a variety of mate- individual’s] digital data”. The authors, “invite rial, I aim to explore the role and position of people to experience the joy of deletion in a different kinds of images (foremost social public space and encourage them to think and visual) as they constitute post-digital about the value and (in-)dispensability of relations. These are relations in which the their fles while also researching the subject primacy of computerized digital objects is in a broader sense by storing and analysing moot. The versions presented in this text are their deletion-behavior.” (Formamat) the social, cultural and organizational confu- ences which fnd expression in differing data REVISION formats — originals and copies subject to With the hindsight of just a few years, The fuctuating, moment-to-moment alteration. Formamat can also be seen to capture Together with the growth in communica- uncertainties — of ownership and iden- tion and exchange, these versions imply a tifcation — in our relationship with data.

43 APRJA Volume 3, Issue 1, 2014

Our understanding of the work encounters was created to manage all the code for the an unexpected revision, reformulating the Linux kernel. It solves problems of ownership question, not of which, but of whose fles are and responsibility with its own purpose built going to be deleted. Taken together with the command: git-blame.[8] The command fnds ’s long memory — from the Internet the author of an edit or addition and reports Archive’s Way Back Machine[5] to play- when changes were made. This is one way fully macabre, assisted Facebook-identity in which Git addresses the techno-social suicides[6] — this observation underlines problems of making and releasing new ver- the attention now being given to choice and sions of the kernel image (the core of the control of data. Here, Nissenbaum’s ‘con- GNU/Linux operating system; a large-scale textual integrity’ is relevant. It advocates the project with more than nine million lines of individual’s right to manage the fow of their code). personal information, rather than exert ab- The Git software was created with solute control (Nissenbaum). The emphasis security, authentication and traceability as seems to be on the subjective way we value paramount concerns. Contributors to any information, where one person’s waste can Git-maintained project are encouraged to become another’s livelihood. advance development by regularly com- Such perspectives might be welcomed mitting smaller changes into a main line of by the Sunlight Foundation, known for co- development. Additions and revisions can ordinating crowd sourced analysis of US be written and tested in isolation before be- government records. Transparency initia- ing introduced to the main line or ‘branch’. tives like this commonly use Wikis to man- Copies of this branch become distributed age document revisions made by multiple as changes are written back to the comput- authors (Sifry). In the case of Wikipedia, ers of other developers as they also submit software for ‘version control’ becomes the their work. Files ‘checked out’ from the main image of a community and its knowledge, a development tree can be added to newly cre- refection of that community in code: ated branches. Typically, these development threads are later merged into the project’s People can and do trust works main branch or abandoned. In some in- produced by people they don’t know. stances, new branches diverge substantially The real world is still trying to fgure out from the main development effort. This is how Wikipedia works…Open source basically the concept of project forking. It is produced by people that you can’t might be apparent from this summary that track down, but you can trust it in very talk about governance in Git is necessarily deep ways. People can trust works also a discussion about technical operation. by people they don’t know in this low Issues of governance are also dealt cost communication environment. with in creative projects which utilize and (Cunningham qtd in many2many) discuss version control. Simon Yuill’s Social Versioning System [9] and Matthew Fuller VERSION CONTROL and Usman Haque’s Urban Versioning Other types of version control system System 1.0 [10] concern the relevance of (VCS) are useful, especially in co-ordinating Free Software principles to consensus and software development groups. The Linux co-operation in design practice: kernel project is one example. For this, a very specifc VCS was conceived: Git [7]

44 Magnus Lawrie: TRASH VERSIONALITY...

Figure 1: “Benevolent dictator workfow”. Illustration. Figure 2: Marcosleal. “Matryoshka dolls in street fair n.d. Distributed-workfows, git-scm.com. Web. 29 Sep. – Budapest”. Photograph. 2008. Matryoshka dolls in 2013. Budapest.jpg. Wikimedia Commons. Web. 29 Sep. 2013. one of the most interesting aspects Social overload of open source software is the continuous interleaving of production, implementation, usage and repurpos- ETHICS AND ETIQUETTE ing processes, all of which can and Besides the sense of community that data sometimes must be open — not just an sharing in this way inspires, proliferating “open design” that then gets imple- codes also produce tensions. Where levels mented in a closed manner. (Fuller of interest from the public increase, the scale and Haque 17) and relative value of contributions can in turn challenge a project’s direction. WikiLeaks’ Soon after Git was released, GitHub [11] release in 2010 of hundreds of thousands appeared. Using the apparatus (the ‘plumb- of classifed US Army feld reports (the so- ing and porcelain’) which comprises the Git called Iraq War Logs) is an example where software, GitHub establishes a web-based the relevance and reliability of material have repository for software projects whose been key considerations (Domscheit-Berg). source code is released in the public domain. In other guises, this problem of managing GitHub has been adopted by a huge and contributions has been encountered in pro- rapidly expanding user community, as a plat- jects from Community Memory (an electronic form for developing and publishing software bulletin board), through to contemporary and a range of other creative works. GitHub spaces and Open Source tech com- provides a large-scale, distributed means munities. In all these instances, it seems that to recognize and pin point different stages mutual agreement — whether or not this has in the production of these works. It has also been explicitly defned — is a central issue. become home to a mass of never changing, Arguments often focus on leadership, per- user-generated software confguration fles. sonal style and the possibility of ‘benevolent In GitHub these can be Git confguration dictatorship’ (Lovink). Though positive feed- fles, stored in a Git repository, on a platform back generated by self-enhancing ‘recursive built using Git. geek publics’ is not without drawbacks (Kelty), neither is it clear how this energy can work best — in the case of the Debian

45 APRJA Volume 3, Issue 1, 2014

Software Project there is the Debian Social apparatus’ (as well as the methods by which Contract,[12] enshrining free speech and they constitute one another) have gained enough hierarchy to manage the fow of con- visibility. Journalistic reporting of this data at tributions. Free speech has been central to frst underlined governments’ ability to track the development of Free-Libre Open Source and target individuals at will (for example, Software (Turner), as it has to the protocols by following calls and data from mobile and conduct written into projects such as phones). Subsequently, attention has moved Wikipedia. somewhat away from wireless networks and Away from hacker-styled communities, ‘eyes in the sky’ to the image of massive in observing public sector adoption of open submerged and underground data pipes, source software, Maha Shaikh explains that, connecting (really big) data centres routinely “information technology and users are not serving information to government secret defned outside their relationship but in their services. Documents detailing these prac- relational networks”. Hence the focus moves tices provoked strong objections from busi- away from actors, “towards a more com- nesses who insisted on the ‘right to reveal’. plex, and less defned phenomenon… the [13] This twist on the ‘right to know’ placed interaction”. This perspective, emphasizing mutability and truth centre stage. mutability and becoming is advantageous Besides this totalizing image of state to understanding materializing of public control and vested corporate interests, is sector adoption of open source software: the changing interplay between humans, “performativity leaves open the possibility machines and geography. The activities of events that might refute, or even happen of , and organizations such as independently of what humans believe or WikiLeaks and The Pirate Bay continue think”. We are presented with a different to demonstrate the actually fragmented, means to envision interaction, “drawing on disorganized and dis-regulated condition ideas of becoming, tracing versus map- of government and businesses, which are ping and multiplicity alongside the shared not always pulling in the same direction. ontology of Actor Network Theory”. Shaikh Meanwhile, activist groups fnd identities concludes that, outside of pre-existing ones (of public friend or foe) as their operations compose the becoming of adoption can be new and revised networks, in street action, both constrained and precipitated engagement with news media, and in online by various forms of materiality (of provocations. the assemblage of the open source ecosystem)… open source software — a much touted transparent and open phenomenon — is by its nuanced mutability able to make the process and practices surrounding it less visible. (Shaikh 123-140)

BENEATH THE STREET, THE NETWORK Conversely, since the release of NSA fles by Edward Snowden, meshing and Figure 3: Anon617. “Anonymous Crowd”. Illustration. co-dependent network assemblages and 2008. Anonymous Crowd, fickr.com. Web. 10 Jan. 2014.

46 Magnus Lawrie: TRASH VERSIONALITY...

In the encounter between Anonymous imagery — issue from anonymous channels and their targets, a frmament of politics and and deviant locations.[14] These creations, identity shows the interconnectedness of designed for modifcation, are then absorbed free speech and anonymity. Alternatively, the into the melee engaging internet memes and evidence in revelations about state surveil- personalities. One notable example of this lance precisely demonstrates that anonymity recursion and modifcation concerns a promi- is not an essential aspect of digital networks, nent UK politician, . In April 2011 he but rather is a set of standards which in many inadvertently tweeted an empty message places is already compromised. Cloud com- along with his name. This spawned a long puting, Software as a Service and skeuomor- chain of varyingly humorous and teasing phic interfaces readily belie the real sense in responses, facebook likes, as well as many which data is exposed. With the changed retweets. The action entered meatspace at connotations of ‘access’, Ted Nelson’s in- the time of the original tweet’s two year an- vocation, ‘you must understand computers niversary, when Ed Balls acknowledged the now’ (Nelson) is renewed by under-reporting joke by retweeting the following image: in the media (Jarvis).

ABUNDANCE AND MODIFICATION Anonymous is one contemporary expression of this will to understand computers (as well as other network forms). In a moment of self- refexive wonder, in February 2008, members of Anonymous turning up for street protests were themselves surprised — in numerous ways — by the people converging on that day, and by the network image this manifes- tation bodily performed. In one documentary, protesters describe their feelings of being a part of Anonymous and how, as it entered the world, it came to exist in a signifcantly new way, for them and others. Information activist Barrett Brown explains:

Anonymous is a series of relationships. Hundreds and hundreds of people who are very active in it — who have vary- ing skill sets, and who have varying Figure 4: Balls, Ed (edballsmp). “Sorry… But this is getting really weird.. RT @FelicityMorse: Ed Balls issues they want to advance — these makes it onto a train sign.” 10:01 PM – 12 Apr 2013. people are collaborating in different Tweet. ways each day. (Brown in BBC) REDUCTION AND OVERLOADING Emerging platforms allow recursive The impact of fourishing social media (and representations of existing creative forms, its refective potential) receives additional whilst re-versioned political slogans and validation through public acquisition of art- insider nods — to Surrealist and Situationist works such as The Cybraphon,[15] through

47 APRJA Volume 3, Issue 1, 2014

Wikimedia outreach projects[16] and in met- Trash versionality ric analysis of the public mood via twitter and the blogosphere.[17] Refecting this change, networks of users now create, “fast, fuid and DISRUPTIVE CONVERGENCE innovative projects that outperform those of In these forms of representation which we the largest and best-fnanced enterprises” see entering mainstream narratives, a kind (Tapscott and Williams qtd in Heath Cull 78). of collective and competitive vandalism is The value of such observations was not esteemed. The multiplicity of voices — for lost on Julian Assange and Daniel Domscheit- which the expanding net has become more Berg as they went about building WikiLeaks. lightning conductor than conduit — increas- Starting with only minimal funds and relying ingly provides its own self-fulflling cycle of on their own technical expertise, the two news, serving 24-hour comment and analy- activists would typically exaggerate the scale sis for comment and analysis. A re-writing of WikiLeaks (for example by using fctional is under way, in which messages combining identities of people working in purely notional text and visual images, produce networks departments). During this time Domscheit- within networks. These communications Berg used the pseudonym Daniel Schmitt. become the mutable containers of doubt and Assange used his own name, but was occa- disinformation, of intent and ignorance: sionally still identifed by his old hacker handle of MENDAX (Domscheit-Berg). Alongside since images are two-dimensional the this overloading, re-purposing and extension representations in them form a circle, of identity within WikiLeaks, there has been that is, one draws its meaning from the the task of gathering, sifting and reproducing other, which in turn lends its meaning large quantities of data. This was achieved to the next. Such a relationship of through various means, partnerships and exchangeable meanings is magical. collaborations. However, Domscheit-Berg’s (Flusser 9) subsequent criticism was that WikiLeaks has fundamentally always been a network of one DISEASEFUL MEDIA (Domscheit-Berg). From miniature artefacts to large network By contrast, Anonymous forms (includ- entities, whether as discrete objects or ing memes, reddit and 4chan forums) lend grand-scale public conceptions, the repre- themselves rather less to analysis — their sentations and mental images can seem direction being to continually circumvent and diffuse, untraceable, and in contradictory override. However, what these forms do pre- states. Nodes, which constitute networks, sent us with, are collaboratively made crea- are themselves potentially networks and tive network entities. In the changing dynamic networks are collapsible forms, in which by which these appear, new conventions are processes, “are recurrent [processes]… being worked out; overloading standards of which typically involve entirely different taste and acceptability are stimulating alter- mechanisms… larger scale assemblages of natives to the ordinary narratives of confict which some of the members of the original and resolution. population become component parts.” (De Landa 19). Little wonder if the scale and defnition of networks should induce feelings of disorientation, even anxiety.

48 Magnus Lawrie: TRASH VERSIONALITY...

However, overload also gives rise social-media-sanctioning broadcast-media to easeful interactions. These go against discourse. In legal proceedings (as with any supposed separation of relations on subterfuge against enemy combatants, and the Internet and those In Real Life (IRL); leaders of states), a game of cat and mouse In The Pirate Bay: Away From Keyboard is being played; in litigation, plaintiffs become (TPB:AFK), Pirate Bay founder Peter Sund complicit in a mystifying data hide-and-seek, explains assuredly to a Swedish courtroom, where bytes are transferred, as if seamlessly “We prefer not to use IRL. We believe the across frontiers, until reaching new data internet is for real”.[18] Whilst the motiva- housing facilities (fortresses of this age). tion and affliations of the the Pirate Bay trio Other means of outwitting covetous have remained opaque to state and private censorial desires have been conceived. prosecutors, in this flm the question which Perhaps none has scored higher than the achieves over-arching signifcance is, “Who self-mutilation of computers enacted by do you trust?”. This may be a point around newspaper in response to a which easeful interactions revolve. As trojan threatened injunction on reporting leaked links to the Internet meme Goatse.cx [19] NSA data: showed, the merriment of a practical joke can be a hair’s breadth away from the abuse in a deserted basement of The of trust. Guardian’s King’s Cross offces, a senior editor and a Guardian computer expert used angle grinders and other tools to pulverise the hard drives and memory chips on which the encrypted fles had been stored. As they worked they were watched by technicians from Government Communications Headquarters (GCHQ) who took notes and photographs… (Borger)

Figure 5: Montage inspired by the Goatse Internet meme. Digital montage. n.d. Finding Goatse: The Mystery Man Behind the Most Disturbing Internet Meme in History. gawker.com. Web. 29 Sep. 2013.

FETISH As social media has refreshed the status of the Internet troll, the nuanced subterfuge of social engineering, of spreading Fear, Uncertainty and Doubt, appears dimin- ished. Flames, defamation and libel have Figure 6: Shockblast underground data centre. Photograph. n.d. TPB:AFK watch.tpbafk.tv. Web. 29 become the norm. The specialized rules Sep. 2013. of email etiquette have evaporated. In the merging of media, products and social interaction, trolling itself has gone viral; self- validating intercourse has been upstaged by

49 APRJA Volume 3, Issue 1, 2014

OBJECTIFICATION of this, activist Caroline Criado-Perez was The fxation on data and hardware objects; driven to delete her twitter account after the advance of our litigious cultures; these she received a series of rape threats online elements may contribute to conditions in (Topping); in 2012, as a consequence of which bullying can be blended into human bullying which began online and followed her interactions. As much as hardware and new during several years and different schools, platforms may enable discourse, they also the Canadian teenager Amanda Todd com- become the sites for abuse, where differenc- mitted suicide (Amanda Todd’s Death). es between trolling and harassment easily merge: In the UK, during 2013, a number of women in the public eye (among them MPs, Afterglow campaigners and journalists) became the tar- get of insults and threats intended to silence their contribution to public debates. Often VERSIONING AS METHOD these communications were sent through In a broad sense, and in different domains, Twitter. In what was possibly the most high we are now seeing truth and responsibility profle case, the abuse followed a successful increasingly under review; In the widening campaign to have the Bank of England print push to deliver up to the minute news, the a female historical fgure on its banknotes. sources and verifability of content are an [20] Online, the equivocal status of networks ever more present consideration (think of the is further evident where derogatory, self- Yes Men’s Bhopal anniversary action [23]). aggrandising ‘trash-talk’ between computer Concern for information ethics, in public game players[21] turns to harassment and and private domains, means questions ‘the gamifcation of misogyny’ (Lewis). In the of accountability and trust (the veracity of competition for kudos, questions about the versions) gain signifcant attention: The ex- liberating potential of the Internet abound. tended reach of media is changing the act of refection; propagating images, collectivizing DISAPPEARANCE values. In the networked era, reduction is Such identity fetishism promises certainty going global. in a moment of profound uncertainty, and Away from the context of news and en- harks back to a time in which physical media tertainment media, images also circulate in trash appeared more present than today; it obscure ways. In the apparatus’ of political, is a moment where, in many ways, absence social and economic assemblages, images may be more desirable than presence. The now appear as agents. They are the sub- contradiction in interfaces is that in the mo- jects of viral exchange on social networks ment they renounce claims on materiality, and potentially convey malicious executable they may still expose us to physical threat computer code — this is no longer specula- (whether actual or perceived). Accordingly, tion (Tung). Intrinsic to this agency, in the Internet trolls revel in their ability to circum- dissemination of images, is the creation of vent blocks, hide or adopt new identities copies. These copies are the multiplying and to label messages in ways that reach trash by-products of networks’ movements, targets indirectly.[22] The collision between “diverse objects brought together in particular anonymity and free speech makes clear why relations, such as the detritus of everyday life for some, disappearance is preferable to the unearthed in an archaeological dig” (Wise 78). advice, ‘do not feed the trolls’. In examples Whilst networked computer assemblages

50 Magnus Lawrie: TRASH VERSIONALITY... generate data in ever greater volume, other unspoken: The joke is ruined if you spell it assemblages constitute networks in a similar out (Harman). vein: in digital cameras images are made in However, the targets of abuse are multiple versions, modelling ‘pipeline’ work standing up against such misrepresentation. fows and invoking the trope of ‘relation’; Their narratives are the alternative versions Images constitute networks where value, ex- flling gaps in communication. In this way change, and mutability are implicit. They are identities are re-presented; self-images are pixel-assemblages to be seen as networks in recomposed. Projects such as unslut [25] and of themselves. have this same end, of allowing individuals Relating Michael Callon’s work on the to positively re-enact negative stories.[26] ‘performativity of networks’, Iain Hardie and Intimate refections like these are in contrast Donald Mackenzie write, to celebrity relationships lived through media and social media, where the open-ended For Callon, an actor ‘is made up of repetition of text and image insinuates an- human bodies but also of prostheses, other kind of performance.[27] In a quieter tools, equipment, technical devices, way, self-representation is also self-creation: algorithms etc’. – in other words is made up of an agencement. The no- my proliferation of selfes is a small tion… involves a deliberate word-play. way of fghting back. The more I look Agencer is to arrange or to ft together: at myself (in a mirror or in pictures), in one sense, un agencement is thus the easier it becomes to accept that an assemblage… The other side of this is really me, and this is my skin… the word-play… is agence, agency. I feel that the more pictures I post of (Hardie and Mackenzie 58) me, sure I’m putting myself out there to be judged, but I am also adding We can envisage networks as aggre- to images out there (in the minds of gated versions, sites of recursion and refex- friends and strangers alike) of who I ivity, in which circular relations establish the am. (Stufcionado) inter-relation of medium and method.

Post-irony for a post-digital age

The activities of comment trolls and websites such as ask.fm demonstrate other ways in which the Internet has become a machine for refectivity: Interactions dominated by glib and clever epithets invariably promote self-image over self-knowledge (though with notable exceptions[24]). Rhetoric turns the joke upon those who have missed the joke. These episodes thrive on lack of understand- ing and the connoisseur’s appreciation of the Figure 7: Mekhitarian, Vahram. “Recursive Cell.” Photograph. 2013. File:Recursive Cell.jpg Wikimedia Commons. Web. 10 Jan. 2014. 51 APRJA Volume 3, Issue 1, 2014

As images and self-images re-instate Notes a sense of place, absent themselves from rhetoric and generate their own associations, they obtain a peculiar sense of agency. They [1] http://www.ohchr.org/en/ are re-entering the world as prosaic remind- NewsEvents/Pages/DisplayNews. ers of the real — hermetic emblems of an aspx?NewsID=13706&LangID=E. already present, post-ironic post-digital age: [2] For an explanation see http://www. housing.org.uk/policy/welfare-reform/ bedroom-tax.

[3] http://www.dailymail.co.uk/news/arti- cle-2418194/Outrage-loopy-UN-inspector- lectures-Britain-Shes-violent-slum-ridden- Brazil-attacks-housing-human-rights.html.

[4] http://www.dailymail.co.uk/news/arti- cle-2418993/Trial-collapses-men-accused- rape-police-discover-new-evidence-old- Twitter-account-14.html. Figure 8: Advertisement posters for a dry cleaner’s shop, apparently inspired by Internet memes. [5] http://www.archive.org/web/web.php. Edinburgh, 2013. Photograph by author. [6] http://www.seppukoo.com.

[7] http://www.git-scm.com.

[8] http://www.git-scm.com/docs/git-blame.

[9] http://www.spring-alpha.org/svs/.

[10] http://www.situatedtechnologies. net/?q=node/85.

[11] https://www.github.com/explore.

[12] http://www.debian.org/social_contract.

[13] http://www.blogs.technet.com/b/micro- soft_on_the_issues/archive/2013/08/30/ standing-together-for-greater-transparency. aspx.

[14] http://www.opgraffti.deviantart.com/ gallery/.

52 Magnus Lawrie: TRASH VERSIONALITY...

[15] http://www.nms.ac.uk/highlights/ [27] See remarks about Kayne West and objects_in_focus/cybraphon.aspx. Kim Kardashian’s relationship: http://www. theguardian.com/lifeandstyle/2013/oct/27/ [16] http://www.en.wikipedia.org/wiki/ instagram-selfe-reveal-kim-kardashian- Wikipedia:GLAM/NLS. tweet.

[17] http://www.bbc.co.uk/news/ technology-24001692. Works cited [18] http://www.watch.tpbafk.tv/. “Amanda Todd’s Death.” knowyourmeme. [19] http://www.gawker.com/5899787/ com. Cheezburger Inc., n.d. Web. 5 Dec. fnding-goatse-the-mystery-man-behind-the- 2013. most-disturbing-internet-meme-in-history. BBC News. “High Court: Sally Bercow’s [20] http://www.thewomensroom.org.uk/ Lord McAlpine Tweet Was Libel.” bbc.co.uk. banknotes. British Broadcasting Corporation, 24 May 2013. Web. 29 Nov. 2013. [21] For examples of trash-talk in online gaming see: http://www.kotaku.com/ Borger, Julian. “NSA fles: Why the Guardian the-problem-with-trash-talk-707113214. in London Destroyed Hard Drives of Leaked Files.” theguardian.com. Guardian News [22] “online abusers continued to fnd and Media Limited, 20 Aug. 2013. Web. 29 “new and imaginative ways” to contact Sept. 2013. her, through her blog”. See http://www. theguardian.com/uk-news/2013/sep/03/ Brown, Barrett in “How Changed caroline-criado-perez-rape-threats-continue. the World – We Are Legion.” Storyville. BBC, HD. 12 Mar. 2013. Television. [23] http://www.museumof- hoaxes.com/hoax/archive/permalink/ Cunningham, Ward quoted in many2many. the_yes_mens_bhopal_hoax. “Ward Cunningham on the Crucible of Creativity.” corante.com. Corante, 17 Oct. [24] http://www.theguard- 2005. Web. 5 Dec. 2013. ian.com/technology/2013/sep/09/ jake-davis-topiary--answers. Domscheit-Berg, Daniel with Klopp, Tina. Inside WikiLeaks. Trans. Chase, Jefferson. [25] http://www.unslutproject.com/ London: Jonathan Cape, 2012. Print.

[26] “I felt like the chat box could see me Davis, David. “We Can’t Let 12 Good Men through the computer screen.” See: http:// and True Be Undone by the Internet.” www.theguardian.com/society/2013/sep/21/ theguardian.com. Guardian News and unslut-project-against-sexual-bullying. Media Limited, 19 Jun. 2011. Web. 5 Dec. 2013.

53 APRJA Volume 3, Issue 1, 2014

De Landa, Manuel. New Philosophy of Kelty, Christopher. Two Bits: The Cultural Society: Assemblage Theory and Social Signifcance of Free Software. Durham NC: Complexity. London: Continuum, 2006. Duke University Press, 2008. Print. Print. Lewis, Helen. “Yes, It’s Misogynistic and Formamat. “About – Formamat.” formamat. Violent, but I Still Admire Grand Theft Auto.” com. n.p., n.d. Web. 29 Sept. 2013. theguardian.com. Guardian News and Media Limited, 21 Sep. 2013. Web. 29 Sep. Flusser, Vilem. Into the Universe of 2013. Technical Images. Minneapolis: University of Minnesota Press, 2011. Print. Lovink, Geert. Zero Comments: Blogging and Critical Internet Culture. Abingdon and Fuller, Matthew and Haque, Usman. New York: Routledge, 2008. Print. “Urban Versioning System 1.0” Situated Technologies Pamphlets 2. The Nelson, Ted. Computer Lib/Dream Machine. Architectural League of New York, 2008. Self-published, 1974. Print. PDF. Nissenbaum, Helen. Privacy in Context: Gentleman, Amelia. “UN Housing Expert’s Technology, Policy, and the Integrity of Call to Axe Bedroom Tax ‘A Disgrace’– Social Life. Stanford: Stanford Law Books, Senior Tory.” theguardian.com. Guardian 2011. Print. News and Media Limited, Sep. 2013. Web. 29 Sep. 2013. Shaikh, Maha. “Mutability and Becoming: Materializing of Public Sector Adoption of Hardie, Iain and Mackenzie, Donald. Open Source Software.” Shaping the Future “Assembling an Economic Actor: The of ICT Research. Methods and Approaches. Agencement of a Hedge Fund.” The 389 (2013): 123-140. Print. Sociological Review 55.1 (2007): 57-80. Print. Sifry, Micah L. WikiLeaks and the Age of Transparency. New Haven: Yale University Harman, Graham. Weird Realism – Press, 2011. Print. Lovecraft and Philosophy. Alresford: Zero Books, 2012. Print. Stufcionado. “Just Shoot Me”. stufcionado. net. n.p., n.d. Web. 5 Dec. 2013. Heath Cull, Daniel. The Ethics of Emerging Media. Information, Social Norms, and New Topping, Alexandra. “Caroline Criado-Perez Media Technology. London: Bloomsbury Deletes Twitter Account After New Rape Publishing, 2011. Print. Threats”. theguardian.com. Guardian News and Media Limited, 6 Sep 2013. Web. 5 Jarvis, Jeff. “I fear the chilling effect of NSA Dec. 2013. surveillance on the open internet.” theguard- ian.com. Guardian News and Media Limited, Tung, Liam. “BlackBerry Enterprise Server 17 Jun. 2013. Web. 29 Sep. 2013. Malicious TIFF Attack Discovered.” zdnet. com. CBS Interactive, 19 Feb. 2013. Web. 5 Dec. 2013.

54 Magnus Lawrie: TRASH VERSIONALITY...

Turner, Fred. From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. University of Chicago Press: Chicago, 2005. Print.

Wise, J. MacGregor. “Assemblages”. Gilles Deleuze: Key Concepts. Ed. Stivale, Charles J. Chesham: Acumen, 2005. 77-87. Print.

55