Cyberspace As Place and the Tragedy of the Digital Anticommons

Total Page:16

File Type:pdf, Size:1020Kb

Cyberspace As Place and the Tragedy of the Digital Anticommons Cyberspace as Place and the Tragedy of the Digital Anticommons Dan Huntert TABLE OF CONTENTS Introduction .............................................................................................. 442 I. Cyberspace as Autonomous Legal Place ........................................... 446 A. The History of Cyberspace as a Legal Place .............................. 447 B. Reconsidering Autonomy and Place ........................................... 452 C. City of Bits, Sense of Place ........................................................ 454 II. M etaphor in L aw ............................................................................... 458 A. Thinking and Talking in Metaphors ........................................... 460 B. Cognitive Metaphors ................................................................... 465 1. Interaction Theory of Metaphor ........................................... 467 2. Lakoff and Metaphor ............................................................ 469 III. Cyberspace as Legal Place ............................................................... 472 A . C rim e O nline .............................................................................. 475 B. Resurrecting Trespass to Chattels ............................................... 483 C. The Cyberspace Constitution ...................................................... 488 1. Public Parks in Cyberspace .................................................. 488 2. Searching Cyberspace .......................................................... 494 D. Zoning, Jurisdiction, and Names ................................................ 497 IV. The Digital Anticommons ................................................................. 500 A. The Cyberspace Enclosure Movement ....................................... 503 1. Property and Invitees ............................................................ 504 2. The Consequences ................................................................ 507 B. The Tragedy of the Digital Anticommons .................................. 509 Copyright © 2003 California Law Review, Inc. California Law Review, Inc. (CLR) is a California nonprofit corporation. CLR and the authors are solely responsible for the content of their publications. t Robert F. Irwin IV Term Assistant Professor of Legal Studies, Wharton School, University of Pennsylvania. Email: [email protected]. 1 am indebted to John Allison, Michael Bimhack, Brian Bix, Mark Eckenwiler, Orin Kerr, Steve Kobrin, Greg Lastowka, Bill Laufer, Michael Madison, Georgette Poindexter, David Post, Thomas Reidel, Ed Rubin, Tom Ulen, Polk Wagner, Jane Winn, Tim Wu, and especially Mark Lemley, for invaluable advice, comments, and ideas. The usual disclaimer applies. I am grateful for the comments of colleagues at workshops at the Singapore Management University and the Warrington College of Business of the University of Florida. Stephen Sempill, Veronica Silva-Minin, and Eleonora Vicchi provided invaluable research assistance. Research support came in part from the Wharton Legal Studies Research Fund, the Wharton-Singapore Management University Research Center, and the Jones Center for Management Policy, Strategy, and Organization and the Mack Center for Technological Innovation at the Wharton School. 440 CALIFORNIA LA W RE VIEW [Vol. 91:439 C. Restoring the Com mons .............................................................. 514 1. Sw itching M etaphors ............................................................ 514 2. Rethinking the Implications ................................................. 516 Conclusion ............................................................................................... 518 2003] CYBERSPACE AS PLACE Cyberspace as Place and the Tragedy of the Digital Anticommons Dan Hunter Cyberspace was once thought to be the modern equivalent of the Western Frontier,a place where land was free for the taking. This is true no longer. This Article argues that we are enclosing cyberspace and im- posing private property conceptions upon it. As a result, we are creating a digital anticommons where suboptimal use of Internet resources will be the norm. Part I shows why initial discussions of the CYBERSPACE AS PLACE metaphor have confused the descriptive question of how we think about cyberspace with the normative question of how we should regulate cyber- space. It suggests that we can bracket the normative question and still an- swer the descriptive question of whether we think of cyberspace as a place. Part H examines the lessons of recent cognitive science studies, and demonstrates the importance of physical metaphors within our cognitive system. It then reviews the evidence of our use of the physical metaphor, CYBERSPACE AS PLACE, in understandingonline communication environ- ments. Part III focuses on this metaphor's unacknowledged and unrecog- nized influence on the development of the legalframework for the Internet. It examines tortious, criminal, and constitutional law responses to cyber- space, and concludes that the CYBERSPACE AS PLACE metaphor exercises a strong and unrecognized influence on the regulatory regimes of cyber- space. Part IV details why the effects of that metaphor's use-including the idea that there is property online, and that this property should be pri- vately owned, parceled out, and exploited-are extremely troubling. Though private ownership of resources is not itselfproblematic, it can lead to the opposite of the tragedy of the commons: the tragedy of the anti- commons. Anticommons property occurs when multiple parties have an effective right to prevent others from using a given resource, and as a re- sult no one has an effective right of use. Part IV argues that this is pre- cisely where the CYBERSPACE AS PLACE metaphor leads. We are moving towards a digital anticommons, where no one will be allowed to access CALIFORNIA LA W REVIEW [Vol. 91:439 competitors' cyberspace "assets" without a license or other transaction- ally expensive or impossible permission mechanism. This Article explains how the CYBERSPACE AS PLACE metaphor leads to undesirableprivate control of the previously commons-like Internet and the emergence of a digital anticommons. As we all stake out our little claims in cyberspace, we destroy the cyberspace commons. INTRODUCTION In the early days of computer networks it seemed a slightly far-fetched metaphor to describe ... sites as "places," since bandwidth was narrow .... As bandwidth burgeons and computing muscle continues to grow, cyberspace places will present themselves in increasingly multisensory and engaging ways .... We will not just look at them; we will feel present in them.' Historians will look back to these early years of the twenty-first century as the moment when the tipping point became apparent. It is not too portentous to say that we stand at the fork between two possible futures of intellectual endeavor. Down one road lies a future of completely proper- tized and privatized ownership of intellectual activity. Down the other road is a future where the interests of society at large are fostered, which at times leads to private ownership of intellectual activity, and at other times demands that some public intellectual space be kept as commons for all. Others have made this observation within the spheres of intellectual property rights such as copyright2 and patent.' The concern also appears to have motivated the Supreme Court's decision to grant certiorari in Eldred v. Ashcroft, a case challenging congressional extension of copyright terms,4 even if the Court concluded that the extension was constitutional. How- ever, the focus on intellectual property interests masks the area where the trend to propertize ideas has exerted its most pernicious effect: the Internet. Cyberspace was once thought to be the modern equivalent of the Western Frontier.' It was a place, albeit an abstract place, where land was free for the taking, explorers could roam, and communities could form with 1. WILLIAM J. MITCHELL, CITY OF BITS: SPACE, PLACE, AND THE INFOBAHN 114-15 (1995). 2. See Lawrence Lessig, The Architecture of Innovation, 51 DUKE L.J. 1783 (2002), available at http://www.law.duke.edu/pd/papers/lessig.pdf, JAMES BOYLE, THE SECOND ENCLOSURE MOVEMENT AND THE CONSTRUCTION OF THE PUBLIC DOMAIN 1-4, at http://www.law.duke.edu/pd/papers/boyle.pdf (last visited Mar. 23, 2002). 3. See BOYLE, supra note 2, at 4-5. 4. Eldred v. Reno, 239 F.3d 372 (D.C. Cir. 2001), aff'd sub nom., Eldred v. Ashcroft, 123 S. Ct. 769 (2003). 5. See, e.g., Jonathan J. Rusch, Cyberspace and the "Devil ' Hatband",24 SEATTLE U. L. REV. 577, 577-79 (2000). 2003] CYBERSPACE AS PLACE their own rules.6 It was an endless expanse of space: open, free, replete with possibility. 7 No longer. As with the Western Frontier, settlers have entered this new land, charted the territory, fenced off their own little claims, and erected "No Trespassing" signs.' Cyberspace is being subdi- vided. Suburbs and SUVs cannot be far off. Since cyberspace seems like a place, this trend seems preor- dained: the progression of property interests over the last five hundred years shows that places tend to be enclosed and privately exploited.9 How- ever, it is a surprising trend because legal commentators have convinced us that cyberspace is not a place at all. Some early scholars argued that cyber- space was a separate space for the purposes of law and regulation," but they were quickly derided for their nafvet6." By the end of the last century, the
Recommended publications
  • Leaving Reality Behind Etoy Vs Etoys Com Other Battles to Control Cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See Detail of This Book on Amazon.Com
    Leaving Reality Behind etoy vs eToys com other battles to control cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See detail of this book on Amazon.com Book served by AMAZON NOIR (www.amazon-noir.com) project by: PAOLO CIRIO paolocirio.net UBERMORGEN.COM ubermorgen.com ALESSANDRO LUDOVICO neural.it Page 1 discovering a new toy "The new artist protests, he no longer paints." -Dadaist artist Tristan Tzara, Zh, 1916 On the balmy evening of June 1, 1990, fleets of expensive cars pulled up outside the Zurich Opera House. Stepping out and passing through the pillared porticoes was a Who's Who of Swiss society-the head of state, national sports icons, former ministers and army generals-all of whom had come to celebrate the sixty-fifth birthday of Werner Spross, the owner of a huge horticultural business empire. As one of Zurich's wealthiest and best-connected men, it was perhaps fitting that 650 of his "close friends" had been invited to attend the event, a lavish banquet followed by a performance of Romeo and Juliet. Defiantly greeting the guests were 200 demonstrators standing in the square in front of the opera house. Mostly young, wearing scruffy clothes and sporting punky haircuts, they whistled and booed, angry that the opera house had been sold out, allowing itself for the first time to be taken over by a rich patron. They were also chanting slogans about the inequity of Swiss society and the wealth of Spross's guests. The glittering horde did its very best to ignore the disturbance. The protest had the added significance of being held on the tenth anniversary of the first spark of the city's most explosive youth revolt of recent years, The Movement.
    [Show full text]
  • To Read John Perry's Full Introduction
    John Perry Barlow, former Wyoming rancher, lyricist for the Grateful Dead, cofounder and vice-chair of the Electronic Frontier Foundation Following is John Perry Barlow's most excellent overview of the experience of the Sixties in his introduction t o Birth of a Psychedelic Culture: Conversations about Leary, the Harvard Experiments, Millbrook and the Sixties by Ram Dass and Ralph Metzner, with Gary Bravo Published by Synergetic Press http://www.synergeticpress.com/shop/birth-of-a- psychedelic-culture/ eBook now available. Foreword In the Beginning … by John Perry Barlow LSD is a drug that produces fear in people who don’t take it. Timothy Leary It’s now almost half a century since that day in September 1961 when a mysterious fellow named Michael Hollingshead made an appointment to meet Professor Timothy Leary over lunch at the Harvard Faculty Club. When they met in the foyer, Hollingshead was carrying with him a quart jar of sugar paste into which he had infused a gram of Sandoz LSD. He had smeared this goo all over his own increasingly abstract conscious- ness and it still contained, by his own reckoning, 4,975 strong (200 mcg) doses of LSD. And the mouth of that jar became perhaps the most sig- nificant of the fumaroles from which the ‘60s blew forth. Everybody who continues to obsess on the hilariously terrifying cultural epoch known as the ‘60s – which is to say, most everybody from “my ge- ge-generation,” the post-War demographic bulge that achieved perma- nent adolescence during that era – has his or her own sense of when the ‘60s really began.
    [Show full text]
  • The Disappearing Human: Gnostic Dreams in a Transhumanist World
    religions Article The Disappearing Human: Gnostic Dreams in a Transhumanist World Jeffrey C. Pugh Department of Religious Studies, Elon University, Elon, NC 27244-2020, USA; [email protected] Academic Editor: Noreen Herzfeld Received: 25 January 2017; Accepted: 18 April 2017; Published: 3 May 2017 Abstract: Transhumanism is dedicated to freeing humankind from the limitations of biological life, creating new bodies that will carry us into the future. In seeking freedom from the constraints of nature, it resembles ancient Gnosticism, but complicates the question of what the human being is. In contrast to the perspective that we are our brains, I argue that human consciousness and subjectivity originate from complex interactions between the body and the surrounding environment. These qualities emerge from a distinct set of structural couplings embodied within multiple organ systems and the multiplicity of connections within the brain. These connections take on different forms, including structural, chemical, and electrical manifestations within the totality of the human body. This embodiment suggests that human consciousness, and the intricate levels of experience that accompany it, cannot be replicated in non-organic forms such as computers or synaptic implants without a significant loss to human identity. The Gnostic desire to escape our embodiment found in transhumanism carries the danger of dissolving the human being. Keywords: Singularity; transhumanism; Merleau-Ponty; Kurzweil; Gnosticism; AI; emergence; technology 1. Introduction In 1993, the mathematician and science fiction writer Vernor Vinge gave a talk at the Vision 21 symposium sponsored by NASA introducing the idea of the Singularity, an evolutionary moment when we would create the capacity for superhuman intelligence that would transcend the human and take us into the posthuman world (Vinge 1993).
    [Show full text]
  • Downloads of Technical Information
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2018 Nuclear Spaces: Simulations of Nuclear Warfare in Film, by the Numbers, and on the Atomic Battlefield Donald J. Kinney Follow this and additional works at the DigiNole: FSU's Digital Repository. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES NUCLEAR SPACES: SIMULATIONS OF NUCLEAR WARFARE IN FILM, BY THE NUMBERS, AND ON THE ATOMIC BATTLEFIELD By DONALD J KINNEY A Dissertation submitted to the Department of History in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2018 Donald J. Kinney defended this dissertation on October 15, 2018. The members of the supervisory committee were: Ronald E. Doel Professor Directing Dissertation Joseph R. Hellweg University Representative Jonathan A. Grant Committee Member Kristine C. Harper Committee Member Guenter Kurt Piehler Committee Member The Graduate School has verified and approved the above-named committee members, and certifies that the dissertation has been approved in accordance with university requirements. ii For Morgan, Nala, Sebastian, Eliza, John, James, and Annette, who all took their turns on watch as I worked. iii ACKNOWLEDGMENTS I would like to thank the members of my committee, Kris Harper, Jonathan Grant, Kurt Piehler, and Joseph Hellweg. I would especially like to thank Ron Doel, without whom none of this would have been possible. It has been a very long road since that afternoon in Powell's City of Books, but Ron made certain that I did not despair. Thank you. iv TABLE OF CONTENTS Abstract..............................................................................................................................................................vii 1.
    [Show full text]
  • The Virtual Worlds of Japanese Cyberpunk
    arts Article New Spaces for Old Motifs? The Virtual Worlds of Japanese Cyberpunk Denis Taillandier College of International Relations, Ritsumeikan University, Kyoto 603-8577, Japan; aelfi[email protected] Received: 3 July 2018; Accepted: 2 October 2018; Published: 5 October 2018 Abstract: North-American cyberpunk’s recurrent use of high-tech Japan as “the default setting for the future,” has generated a Japonism reframed in technological terms. While the renewed representations of techno-Orientalism have received scholarly attention, little has been said about literary Japanese science fiction. This paper attempts to discuss the transnational construction of Japanese cyberpunk through Masaki Goro’s¯ Venus City (V¯ınasu Shiti, 1992) and Tobi Hirotaka’s Angels of the Forsaken Garden series (Haien no tenshi, 2002–). Elaborating on Tatsumi’s concept of synchronicity, it focuses on the intertextual dynamics that underlie the shaping of those texts to shed light on Japanese cyberpunk’s (dis)connections to techno-Orientalism as well as on the relationships between literary works, virtual worlds and reality. Keywords: Japanese science fiction; cyberpunk; techno-Orientalism; Masaki Goro;¯ Tobi Hirotaka; virtual worlds; intertextuality 1. Introduction: Cyberpunk and Techno-Orientalism While the inversion is not a very original one, looking into Japanese cyberpunk in a transnational context first calls for a brief dive into cyberpunk Japan. Anglo-American pioneers of the genre, quite evidently William Gibson, but also Pat Cadigan or Bruce Sterling, have extensively used high-tech, hyper-consumerist Japan as a motif or a setting for their works, so that Japan became in the mid 1980s the very exemplification of the future, or to borrow Gibson’s (2001, p.
    [Show full text]
  • Paper: Wardialing Brief
    Wardialing Brief Kingpin @Stake, Inc. 196 Broadway, Cambridge, MA 02139, USA. http://www.atstake.com E-mail: [email protected] Abstract. Wardialing consists of using a computer to dial a given set of telephone numbers with a modem. Each phone number that answers with modem handshake tones and is successfully connected to is stored in a log. By searching a range of phone numbers for computers, one can find entry points into unprotected systems and backdoors into seemingly secure systems. This brief introduces the wardialing concept, examines concerns with today's network setups, and lists free and commercial software products, whitepapers, news reports, and Internet resources. Keywords: wardialing, telephony, security, modem 1 Introduction to Wardialing Wardialing, or scanning, has been a common activity in the computer underground and computer serucity industry for decades. Hollywood made wardialing popular with the 1983 movie, WarGames, in which a teenager searching for a videogame company ultimately uncovers a government nuclear war warning system [1]. Seventeen years after the mainstream was made aware of wardialing activity, the problem of unprotected dial-up systems still exists in the majority of corporations. The act of wardialing is extremely simple – a host computer dials a given range of telephone numbers using a modem. Every telephone number that answers with a modem and successfully connects to the host is stored in a log. At the conclusion of the scan, the log is reviewed and the phone numbers are individually dialed with a computer. The user then attempts to identify the systems, and, depending on the goals of the wardial, attempts system access.
    [Show full text]
  • "The Infinite Plasticity of the Digital"
    "The Infinite Plasticity of the Digital" http://reconstruction.eserver.org/043/leaver.htm Ever since William Gibson coined the term "cyberspace" in his debut novel Neuromancer , his work has been seen by many as a yardstick for postmodern and, more recently, posthuman possibilities. This article critically examines Gibson's second trilogy ( Virtual Light , Idoru and All Tomorrow's Parties ), focusing on the way digital technologies and identity intersect and interact, with particular emphasis on the role of embodiment. Using the work of Donna Haraway, Judith Butler and N. Katherine Hayles, it is argued that while William Gibson's second trilogy is infused with posthuman possibilities, the role of embodiment is not relegated to one choice among many. Rather the specific materiality of individual existence is presented as both desirable and ultimately necessary to a complete existence, even in a posthuman present or future. "The Infinite Plasticity of the Digital": Posthuman Possibilities, Embodiment and Technology in William Gibson's Interstitial Trilogy Tama Leaver Communications technologies and biotechnologies are the crucial tools recrafting our bodies. --- Donna Haraway, "A Cyborg Manifesto" She is a voice, a face, familiar to millions. She is a sea of code ... Her audience knows that she does not walk among them; that she is media, purely. And that is a large part of her appeal. --- William Gibson, All Tomorrow's Parties <1> In the many, varied academic responses to William Gibson's archetypal cyberpunk novel Neuromancer , the most contested site of meaning has been Gibson's re-deployment of the human body. Feminist critic Veronica Hollinger, for example, argued that Gibson's use of cyborg characters championed the "interface of the human and the machine, radically decentring the human body, the sacred icon of the essential self," thereby disrupting the modernist and humanist dichotomy of human and technology, and associated dualisms of nature/culture, mind/body, and thus the gendered binarism of male/female (33).
    [Show full text]
  • Cyberspace Operations
    Updated December 15, 2020 Defense Primer: Cyberspace Operations Overview force; (2) compete and deter in cyberspace; (3) strengthen The Department of Defense (DOD) defines cyberspace as a alliances and attract new partnerships; (4) reform the global domain within the information environment department; and (5) cultivate talent. consisting of the interdependent network of information technology infrastructures and resident data, including the Three operational concepts identified in the DOD Cyber internet, telecommunications networks, computer systems, Strategy are to conduct cyberspace operations to collect and embedded processors and controllers. The DOD intelligence and prepare military cyber capabilities to be Information Network (DODIN) is a global infrastructure used in the event of crisis or conflict, and to defend forward carrying DOD, national security, and related intelligence to disrupt or halt malicious cyber activity at its source, community information and intelligence. including activity that falls below the level of armed conflict. Defending forward may involve a more aggressive Cyberspace operations are composed of the military, active defense, meaning activities designed to disrupt an intelligence, and ordinary business operations of the DOD adversary’s network when hostile activity is suspected. in and through cyberspace. Military cyberspace operations use cyberspace capabilities to create effects that support Cyber Mission Force operations across the physical domains and cyberspace. DOD began to build a Cyber Mission Force (CMF) in 2012 Cyberspace operations differ from information operations to carry out DOD’s cyber missions. The CMF consists of (IO), which are specifically concerned with the use of 133 teams that are organized to meet DOD’s three cyber information-related capabilities during military operations missions.
    [Show full text]
  • The Disappearance of Cyberspace and the Rise of Code
    September 1998, Draft 3 Andrew L. Shapiro* The Disappearance of Cyberspace and the Rise of Code Imagine the emergence of a remarkable new communications technology. Using this tool, you can interact with anyone located anywhere in the world, provided they have the same minimal hardware that you have. You can stay informed, express yourself in ways never before imaginable, and get access to all the knowledge ever recorded by humankind. This technology fundamentally changes education, work, family life, entertainment, politics, and the economy. Still, it is fairly simple to use. Kids, in fact, will have an easier time than adults learning to use it. Once you get accustomed to using this technology, you'll wonder how you ever lived without it. No single person created this mode of communicating. Rather it developed spontaneously and collectively over time. And today, no single entity owns it or controls it, yet it works remarkably well. Most surprising of all, this innovation is thousands of years old. It is the alphabet. Coyness aside, it is useful to think about the alphabet as we consider the emergence of another communications technology, the Internet. In particular, this comparison will be fruitful as we consider the legal and political implications of the Internet -- or cyberspace, the "place" where online interactions are said to occur. We do not generally think of ourselves as having, or needing, a formal law of the alphabet. Similarly, I will argue here that we should think critically about what we mean when we speak of the “law of cyberspace.” To be sure, the increasing use of new technologies -- particularly a global, interactive, digital communications network such as the Internet -- can profoundly alter social relations.
    [Show full text]
  • A Symposium for John Perry Barlow
    DUKE LAW & TECHNOLOGY REVIEW Volume 18, Special Symposium Issue August 2019 Special Editor: James Boyle THE PAST AND FUTURE OF THE INTERNET: A Symposium for John Perry Barlow Duke University School of Law Duke Law and Technology Review Fall 2019–Spring 2020 Editor-in-Chief YOOJEONG JAYE HAN Managing Editor ROBERT HARTSMITH Chief Executive Editors MICHELLE JACKSON ELENA ‘ELLIE’ SCIALABBA Senior Research Editors JENNA MAZZELLA DALTON POWELL Special Projects Editor JOSEPH CAPUTO Technical Editor JEROME HUGHES Content Editors JOHN BALLETTA ROSHAN PATEL JACOB TAKA WALL ANN DU JASON WASSERMAN Staff Editors ARKADIY ‘DAVID’ ALOYTS ANDREW LINDSAY MOHAMED SATTI JONATHAN B. BASS LINDSAY MARTIN ANTHONY SEVERIN KEVIN CERGOL CHARLES MATULA LUCA TOMASI MICHAEL CHEN DANIEL MUNOZ EMILY TRIBULSKI YUNA CHOI TREVOR NICHOLS CHARLIE TRUSLOW TIM DILL ANDRES PACIUC JOHN W. TURANCHIK PERRY FELDMAN GERARDO PARRAGA MADELEINE WAMSLEY DENISE GO NEHAL PATEL SIQI WANG ZACHARY GRIFFIN MARQUIS J. PULLEN TITUS R. WILLIS CHARLES ‘CHASE’ HAMILTON ANDREA RODRIGUEZ BOUTROS ZIXUAN XIAO DAVID KIM ZAYNAB SALEM CARRIE YANG MAX KING SHAREEF M. SALFITY TOM YU SAMUEL LEWIS TIANYE ZHANG Journals Advisor Faculty Advisor Journals Coordinator JENNIFER BEHRENS JAMES BOYLE KRISTI KUMPOST TABLE OF CONTENTS Authors’ Biographies ................................................................................ i. John Perry Barlow Photograph ............................................................... vi. The Past and Future of the Internet: A Symposium for John Perry Barlow James Boyle
    [Show full text]
  • Wargames Ovvero: Come Applicare La Logica Del Paradosso E Vincere Una Guerra Impossibile
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Institutional Research Information System University of Turin WarGames Ovvero: come applicare la logica del paradosso e vincere una guerra impossibile “WarGames” è un film del 1983, noto in italiano anche con il sottotitolo di “Giochi di guerra”. Al di là della scarsa fantasia mostrata nella traduzione, non si può certo negare che tanto i “giochi” quanto la “guerra” siano i due elementi centrali attorno ai quali ruota l‟intera vicenda narrata nella pellicola. Il film, nonostante la sua scorrevolezza, è generalmente corretto nel presentare elementi di carattere tecnico e militare – se si eccettua qualche piccolo errore1 – e fornisce validi spunti degni di approfondimento. L‟intento di questo breve saggio consiste nell‟evidenziare alcuni aspetti che si pongono in relazione diretta con la realtà strategica della Guerra fredda, vista soprattutto dal lato statunitense. A questo verranno aggiunte anche alcune osservazioni su caratteristiche emergenti, che solo oggi hanno acquisito il vigore e la visibilità che negli anni ‟80 erano ancora in massima parte ipotetici, ma relativamente alle quali la pellicola fornisce già qualche intuizione. Ma al di là e – oserei dire – al di sopra di tutto questo, l‟elemento probabilmente più interessante consiste nella logica del paradosso che permea il film, e che di per se stessa costituisce il tassello fondante del confronto nucleare dell‟epoca bipolare. Il paradosso è stato presentato, in via più generale, come una caratteristica chiave sottesa ad una corretta concezione strategica2, e tale enfasi diviene ancora più evidente in un contesto quale quello atomico. Un ottimo pregio di “WarGames” è il cogliere questo spirito, e proprio in omaggio a tale virtù, non sottrarremo l‟applicazione della medesima logica al film stesso, ottenendone così spesso un ribaltamento di prospettiva che forse può essere utile per fare un po‟ di luce nel contesto strategico-militare di quel periodo.
    [Show full text]
  • The Cyberspace Concept Cyberpunk: the Idea William Gibson Computer
    Cyberpunk: The Idea Term coined in by Bruce Bethke The Cyberspace Concept punk part reflects streetwise attitude Tone tends to be dark, cynical Immersion in computer generated, shared worlds is a key theme Social Informatics Other themes Alteration of human bodies, genes Thomas Haigh Popular culture, music, media power Week 10 Critical of corporate power Often romantic, rebellious Social Informatics - Cyberspace 1 Social Informatics - Cyberspace 2 William Gibson Computer Technology in SF Creates idea of cyberspace Common by mid-1950s Best known in novel Necromancer, 1984 Futuristic technology lags history Early appearance in short story “Burning Chrome” Big, expensive, central computers Science fiction writer then living in Used mostly for mathematics Canada Nobody much predicts No particular knowledge of computers Personal computer Writes Neuromancer & earlier stories on manual typewriter Microchips, miniaturization Imagines technology in very visual, Interactive graphics impressionistic kind of way Main extrapolation is artificial intelligence Vivid, spatial, seedy (film noir influence) Often arrives spontaneously Social Informatics - Cyberspace 3 Social Informatics - Cyberspace 4 Networking: Science Fiction Gibson’s Cyberspace Famously defined as “consensual hallucination” for Little realistic treatment pre-1980 exchange of data Very much like real space John Brunner, Shockwave Rider, 1975 invents idea of computer “worm” Big mainframes are like skyscrapers Valuable data is protected Vernor Vinge, “True
    [Show full text]