Everything is Art

It’s become a hackneyed platitude. It’s been accepted as a brilliant insight. It’s been attributed to one name. It’s been refuted by many and still it persists. “The medium is the message.” You’ve probably heard it many times. Probably wondered what it means. And probably just accepted it, since, without thinking about it, it seems so profound.

On the title page of the book are three names, not one, Jerome Agel, Marshall McLuhan, Quentin Fiore. As is common, humans can’t seem to deal with such complexities and in general pare things down with over simplification. Consequently only one of those names gets credit. Maybe he deserves it; maybe the others don’t want it.

For years I wondered what does this cryptic phrase mean? How can a medium, such as TV, or radio, or print, be a message? I couldn’t help but think it’s inane. Finally, I deciphered the message. Or, so I believed. Agel and company don’t mean it literally. What they really mean is, the medium molds the message. By carrying the message, it shapes it, contains it, filters it, modifies it, perhaps even, manipulates it. But, no, a medium is not a message. TV and radio, without modulated content, are snow and static. Newspapers and magazines are paper stained with ink. Painting and sculpture are pigments and pebbles. But who am I to tell them what they mean?

Then, finally, I read the book. It’s. . , interesting.

There are some good reasons it made a splash. Occasionally it hits the mark with surprising precision. “The family circle has widened. . . Character no longer is shaped by only two earnest, fumbling experts. Now all the world’s a sage.” Maybe not remarkable, but true enough. Influences are not limited to one’s parents and immediate acquaintances in the village. High speed communications and travel become media for exchange, learning, influence. Yet, is there an undercurrent of irony? Wisdom is not known to be a common trait.

“Electrical information devices for universal, tyrannical womb-to-tomb surveillance are causing a very serious dilemma between our claim to privacy and the community’s need to know.” Quite an insightful statement for the mid-60s, a time before massive data collection by social media, and cameras in our stores and on our streets and in everyone’s pocket.

“When this circuit learns your job, what are you going to do?” is another example of their prognostication. The new medium of electronic computation, still in its infancy at the time, foreshadows the redundancy technology makes of people, even more so, and more completely, than the industrial revolution had. Their crystal ball was clearly working.

“A new form of ‘politics’ is emerging, and in ways we haven’t yet noticed. The living room has become a voting booth. Participation via television in Freedom Marches, in war, revolution, pollution, and other events is changing everything.” More irony, or are they predicting the passivity of the mass audience, and the demise of democracy? Or both? Or just letting loose a random stream of unconsciousness?

“In an electronic information environment, minority groups can no longer be contained—ignored. . . Our new environment compels commitment and participation. We have become irrevocably involved with, and responsible for, each other.” This may be the most profound statement in the entire book, and unfortunately, the end of their wisdom. Yet, in spite of these rich insights, the book is only known for its ridiculous title.

Those few precocious tidbits, signaling the limits of their insight, are but little gems hidden midst a steaming puddle of postmodernist vomit. You can’t imagine my disappointment.

Throughout the book are pronouncements made without substance or support. Reams of disconnected thoughts mingle with simpleminded tautologies, and seasoned with dashes of ad hoc and ad hominem blathering. The claptrap eclipses the brilliance.

Try this for disconnected. “Environments are not passive wrappings, but are, rather, active processes which are invisible. The groundrules [sic], pervasive structures, and overall patterns of environments, or countersituations [sic] made by artists, provide means of direct attention and enable us to see and understand more clearly.” You might object that that quotation has been taken out of context, however, neither the preceding paragraph nor the following would offer any clues to help one’s mind grope through invisible environments of direct attention enabled by counter-situational-artists’ passive structures, the overall patterns of passive wrappings.

“The technology of the railway created the myth of a green pasture world of innocence.” [What? How?] It satisfied man’s desire to withdraw from society, symbolized by the city, to a rural setting where he could recover his animal and natural self. It was the pastoral ideal, a Jeffersonian world, an agrarian democracy which was intended to serve as a guide to social policy. It gave us the darkest suburbia and its lasting symbol: the lawnmower.” The city as symbol for society? The lawnmower as symbol for suburbia? Pastoral ideals existed before the railway. Suburbs may have begun with the railway, but their explosion and darkest expression were made possible by the automobile.

“Electronic circuitry confers a mythic dimension on our ordinary individual and group actions. Our technology forces us to live mythically, but we continue to think fragmentarily, and on single, separate planes.” I must agree. The authors’ thinking is fragmented. Whether they are living mythically is another question. How circuits bestow a dimension of any kind is never explained.

It becomes evident that their use of the word medium is in its broadest definition, not just its specific meaning of information transfer. Electronics, railways, airplanes, telescopes, scientific instruments, anything used for extending the senses, any means or vehicle of human exchange is a medium. But it also becomes evident that their use of the word message is stretched beyond comprehension.

They even venture into a definition of art. They hit the soul of postmodernism with it. “Art is anything you can get away with”[sic] After that turd, is the following, quoted without citation or support, apocryphal Balinese thought about art. “We have no art. We do everything as well as we can.” Out of context its implications are headache provoking. I had to investigate this. Attempting to find the source of the “quote” partially raises the fog. I found this, “When an explorer from the ‘civilized world’ asked the Balinese to show him their art, they were puzzled. The explorer tried to explain what art is to the very capable but rather uncomfortable interpreter who insisted, however, that in Bali they had no word for ‘art.’ Finally, the explorer clarified, ‘Art is what you do best.’ [Ask that the next time you go into an art gallery.] To which the Balinese man answered, ‘Then everything we do is art, since we always do our best.'” Are either true or accurate quotes of an actual conversation? Can the response of one Balinese represent all Balinese? Is this mythic?

Despite the grotesque idiocies of the book, I am perversely intrigued by it. I’m drawn by a love-hate fascination with its hints of brilliance and its heaps of bullocks. I’m tempted to buy a copy for myself—on second thought—I should copy it. “Xerography—every man’s brain-picker—heralds the times of instant publishing. Anybody can now become both author and publisher. Take any books on any subject and custom-make your own book by simply Xeroxing a chapter from this one, a chapter from that one—instant steal!” Instant guano. (I decided not to bother scanning any of it.)

“The invention of printing did away with anonymity, fostering ideas of literary fame and the habit of considering intellectual effort as private property. . .The rising consumer-oriented culture became concerned with labels of authenticity and protection against theft and piracy.” Consumer culture became concerned with piracy? This raises the issue of the ethics of ownership—Can ideas or knowledge be owned? Is knowledge a right? It also insinuates the source of celebrity and fame. If one claims the “rights” to thoughts, no matter how many others have had the same ones, he/she can take the fame, and own the “authorship” of them. And with billions of people in the world, we have a super abundance of thoughts, ideas, talent, and genius. It’s not out of scarcity that fame and greatness arises, rather, it’s paradoxically out of the superfluousness of it. For some inexplicable reason, the masses give up their rights and mound what belongs to many on a select few who, easy to remember through super-repetition, stumble into the media’s clutches and get ladened with concentrated fame. Media feed on the flames of fame, create it out of nothingness, promote it, honor it, and insist on its survival no matter how inequitable, unearned, or unjust. Twisted as it appears, because there is no scarcity of talent, the media artificially manufacture fame and exaggerate its specialty to create value, not for the objects of their attention, but for the media’s own inequitable, unearned, and unjust gain.

“Real, total war has become information war. It is being fought by subtle electric informational media—under cold conditions, and constantly. The cold war is the real war front—a surround—involving everybody—all the time—everywhere. Whenever hot wars are necessary these days, we conduct them in the backyards of the world with old technologies. These wars are happenings, tragic games. It is no longer convenient, or suitable, to use the latest technologies for fighting our wars, because the latest technologies have rendered war meaningless. The hydrogen bomb is history’s exclamation point. It ends an age-long sentence of manifest violence!”

It’s said to be an “important” mid-century milestone. After reading the book, it’s makes manifest that any value within its cover boards has been manufactured by the same media factory that contrives other familiar faux-fame. The gems hidden in the pictures are accidental. The end medium is, “anything you can get away with”

The Medium is the Message, Marshall McLuhan, Quentin Fiore, co-ordinated by Jerome Agel, Random House, 1967

Posted in Book reviews, Discover, Thoughts | Tagged , , , , , , , , | Leave a comment

I[di]oT[s] & ToS[sers]

Marc Goodman’s Future Crimes, a book about the frightening vulnerabilities of the internet, privacy violations, and the currency of data (data as a commodity), is an old story with a new digital twist. The book needs competent editing, yet despite its shortcomings, and follies, most of the content can’t be discounted. It’s one more siren alerting us that business as usual is heading the wrong direction. One more warning that complacency is equal in culpability. One more flashing red light indicating an immediate need to put on the brakes.

Goodman recounts for us countless, unendurable real world examples of the power and powerlessness of today’s computer code. The susceptibility of our daily digital activities to fraud is hammered. Showing side by side the good and evil of IT, and sometimes a strange grayness in between, leaves one wanting to run for the hills to become a hermit fool. He projects an image of the internet wildly out of control as the progress of information technology careens towards a terrific, awesome, uncontrollable clash of the data-Titans, with ordinary people getting the butt end of their bludgeons. In blood-curdling narrative after narrative, and frequent reminders and recaps, we are pummeled with fearmongering stories. Goodman also supplies us with his extrapolations into the possibilities yet to be explored by, mostly but not exclusively, foreign criminals. If you can suffer his battering, there are urgent messages to be heeded, the consequences of which are already being felt.

Message : Overexposure. [Anti]social media ostensibly provides us with a valuable service for keeping in touch. Goodman shines a light on its duplicity in the title of chapter two, “You’re not the Customer, You’re the Product.” Everything you post on these sites is public. Those “privacy settings” are superficial restrictions that apply only to other participating products, not to the service providers, nor their customers. But that’s not all! Your information is not secure. It can be broken into by lone pimply faced hackers just for kicks, or by government agencies, corporations, and crime syndicates for various nefarious reasons. (The last three being nearly synonymous.) Google mail is a prime example. Not only do Google computers ‘read’ your email, they collect, store, and analyze every bit in order to leverage its domination; to bolster its information prowess and sell it to other monster corporations. That’s only the tip of the Google-berg.

Facefook is another egregious abuser of your privacy. The subterfuge of its interface and concocted usefulness is bad enough, but its tentacles corkscrew deep into its users, their connections, and their other online activities. They’ve even conducted psychological experiments on their users without user consent. Then, and only after the abuse, they altered the ToS (Terms of Service) to give themselves “your consent” and the “legal permission” to violate you more.

Google and Facefook are not alone in this subterfuge. They are only the top predators in the insatiable collection of data. Dozens of other multinational corporations engage in these manipulative games, all under the guise of “free,” and never with your overt consent. Even if the ToSser agreement allows it, you’re probably not aware that you’ve given up your rights, or more accurately, your rights have been stolen from you. It may be legal to voluntarily give up your rights to be a slave, but it is unconditionally not legal to own a slave. It may be legal to give up your rights by checking “I’ve read and agree to the terms and conditions,” but is it legal to take away those rights? Whenever you’re presented with a “free” app, or “free” service, stop, ask yourself, “How is free possible?” “What am I giving up?” “How much is this going to cost me?” “Is this really beneficial?” “Do I want to be violated?”

Message : Reality warping. Not only is your personal information prone to abuse by the smiley corporations giving you their internet candy; not only is it subject to break-ins and theft, it’s also, and more deviously, subject to alteration, fabrication, and selective filtering. Imagine having your records changed, your credit report damaged, your medical records faked, and the consequences. The reliability of our data, and everything that we access online, is critical. As we depend evermore on a digital life, we need to be able to rely on its accuracy. While we leak parts of our personal lives, scattering it around the internet, storing it in the cloud, and as digital life becomes increasingly insecure, we could find our real lives disrupted in ways we haven’t imagined.

We put trust in friends we’ve never met. We’ve all had connection requests from people we don’t know. Millions, actually hundreds of millions of registered users on the face, the twit, the yelp, etc., are fakes. Yes, you could be friends with one of the over 140 million fraudulent antisocial media entities. We put our trust in online reviews. Fake users are not uncommon or passive. They take active roles when their puppet masters choose. It’s estimated that 25% percent of Yelp reviews are paid. Zoowie! Followers, comments, and “likes,” are readily disseminated by computer programs or paid disinformation workers. Those millions of followers can be bought by virtual zombies whose job is to fabricate an onscreen fantasy. The possible corruption of everything we see on our displays challenges credulity, and prompts paranoia.

Each and every day around the world, display wars are taking place as governments, multinational corporations, criminals, and terrorists battle to shape and control what is seen online. What ensues is a real but covert war on reality, one that is meant to blind us to the truth.

Trending, mass opinion, and popularity can be manufactured in a flash. There’s no way to tell on the surface. In the virtual world everything is equally virtual, virtueless, and viral.

Message : Fraud enabled. A large portion of the book is spent on cybercrime, a multifaceted field. Crime utilizing the internet for the sale of contraban and criminal services; collecting and selling credit card numbers, and identity theft; the development, distribution, and running of crimeware. The last is a particularly insidious group of applications that hijack your computer for fraudulent purposes, running in the background without your knowledge as part of a botnet. In other cases, the malware commandeers your computer, holding it ransom for a fee : cyber-extortion.

The questions are, how rampant is cyber-crime? How much will it accelerate? Is it a minor or major threat? His argument is that it is BIG, and growing as fast as technology. I would caution that, like other businesses, crime is self-limiting. But how far will it go? Why does it seem not as bad as he claims? The big break-ins have hit the news many times—large retail chains and banks infiltrated by hackers who have pilfered millions of credit card numbers. (And another one reported just this morning targeting the IRS.) Well, if this problem were as big as he suggests, we’d be in a heap of trouble. Why haven’t we heard more about this? In large enough quantity, illicit credit card activity could destabilize the entire system. Then, I think about my own experience. I have had suspicious activity on my credit cards on three occasions. Each time quickly assessed, the card suspended even before I was aware, costing me nothing (directly), and with limited cost to the issuer. And a minor incident of identify theft—someone tried to open a credit account at a national hardware retailer using my name and Social Security number—thwarted because the perpetrator, on the other coast, used a local address, thereby raising a red flag. After that incident my credit was on a watch list for a couple of years. One friend has had his credit cards replaced at least four times due to unauthorized activity. A quick survey of other acquaintances confirms that, indeed, this is common. Fortunately, banks have rather good programs in place that monitor suspicious charges, mismatched addresses, and other irregularities that signal alarms, and limit the damage. Nonetheless, the problem is big, and worse, it’s a never ending struggle that costs billions annually.

Message : I[di]oTs are not smart. The Internet of Things (IoT) is underway. Processors are being inserted into the most unlikely products to make them “smart” by connecting them to the internet. Oh, how I need to control my thermostat when away from home. Oh, how I need my refrigerator to tell me the milk is spoiling. Oh, give me a frigging break. Home security systems are being put online. The advantage of this inane “upgrade” is that now security systems can be controlled remotely by anyone with basic computer/internet skills. Not secure. Every new I[di]oT product coming out, or any product labeled “smart,” further adds to the insecurity of the digital world. As more I[di]oT products come online, more of our modern technology is subject to hacking. The implications are that these stupid silicon-chipped and code-controlled things are more vulnerable to catastrophic failure and criminal tampering. Instead of improving the quality of life, I[di]oT enabled products are injecting turmoil to the wired world.

As participants in the inter-netted electroscape, it is impossible not to be exposed. We are being attacked from both sides, the corporate and the criminal. There are techniques to protect ourselves, but no matter how hard a shell we try to put around our electronic lives, there will always be inevitable leaks and exploitable weaknesses, some by design, some by accident. The only full protection is to drop out, disavow, disconnect.

Message : The law is lagging. We can mail a letter and be secure that it will arrive intact and unopened; not so with email. We can go to the library to read without anyone knowing our interests, even if we borrow the book; not so with internet searches and website visits. (Libraries have been under attack to release lending records. To their credit most have refused to comply, but the battle is ongoing.) We can use cash without a trace; not so with plastic. And we can travel by land freely from state to state without being tracked (if we leave our electronic devices at home); not so by air.

Even if the law were to protect our electronic activity, that won’t stop the relentless attacks from those who aim to take over control. This is more than a legal issue. It is a two pronged issue : the law and the computer code. The legal side could be quickly and easily remedied. It’s the starting point for establishing standards of ethics. On the code side, although security stands to be greatly improved, there will always be a way in. For any program to be functional, it can’t be impenetrable. Nevertheless, it is possible, with present capabilities, to greatly improve security.

WordPress sites are under constant attack. This site is barraged by administration login attempts, thousands a month, for the purpose of hijacking the site. There would be hundreds of spam comments, too. To thwart these attacks, registration is required using captcha verification, and IP address lock-out after three wrong password entries. I’ve also permanently blocked over 1200 IP addresses for repeated lock-outs. These are effective tools to keep spammers and hijackers out, but it’s annoying. And I wonder, what is all this fraudulent traffic costing the system? Everyday spam email, spam comments, DDoS, and referrer spam goes out by the millions, all intended to take unfair, unearned, unethical advantage. What’s it going to take to discourage it?

Message : Code is King — Data is Power. As information collection, processing, and data correlation grows ever more pervasive, those without the massive data banks and the knowledge of code will increasingly find their usefulness, bank accounts, and lives shrinking. There wasn’t a chapter in the book that didn’t mention some new tech company, only years old, being sucked up by one of the leviathans, Google, Facefook, Yahoo, Microsoft. This coincides with the continued hoovering up of one corporation after another by a few of the biggest mega-multinational conglomerates. It wasn’t long ago that laws were put in place to break up oversized trusts and monopolies because of the dangers and the abuses engender, but today those laws are being ignored. Here is the single most frightening message from the book, one that is barely mentioned directly, but that emerges inadvertently on every page. The power and wealth held within data and digital technologies are being amassed in ever greater quantities, and controlled by an exceptionally small number of digital elites. The discrepancy between the techno-data haves and have-nots is growing along with the growth of technology. The rise of robotics exacerbates the conditions, widening the gap to the point that even those well educated in any other field besides IT will become redundant.

We have arranged things so that almost no one understands science and technology. This is a prescription for disaster. We might get away with it for a while, but sooner or later this combustible mixture of ignorance and power is going to blow up in our faces.   — Carl Sagan

Future Crimes covers much more than the title indicates. He rambles on about the expected future of technology, some foreseeable, some speculative, some absurd. He repeats, repeats, yet there’s so much he’s trying to cover, and still he leaves the reader wanting, not because the read is so compelling, but because there’s little help offered.

Message : Free is a ripoff. It’s estimated that each antisocial media user generates about $8 in ad revenue—per year. Goodman states, “I’d rather [pay] ten bucks and be left alone.” MIT researcher Ethan Zuckerman calls advertising the web’s original sin, and further declares, “The fallen state of our internet is a direct consequence of choosing advertising as the default model to support online content and services.” I am, without qualification, in agreement. I’d rather pay—pay for search services, email, entertainment, etc.—pay for what I use and be free, completely free, from the unsightly, unethical torment of advertising, tracking, and privacy intrusion. I’d rather pay with dollars than pay with my rights. Paying for commercial-free services negates the incentive to invade privacy through data collection, and removes the distracting sensory pollution of advertising.

He finally offers a few solutions, but only one which you and I can apply. Educate yourself on the basic workings of digital technology. You don’t need to know how to code, just a working knowledge about how the system operates. Number one in this category is passwords—they can’t be words, can’t be short, can’t be easy, and the same one shouldn’t be used everywhere. His other suggestions need to be grappled with by the designers of hardware and the coders of software. 1) Establish two-factor authentication to replace passwords. 2) Fix faulty code. 3) Encrypt everything. Encryption is the fastest, easiest solution that’s being insufficiently applied. The faults in the code are due to the sloppiness inherent in rushing. The hurry, hurry, hurry, faster, faster, faster mantra is not merely flawed, it’s wrong, wrong, wrong. . .  Fast accomplishes one thing exceedingly well : blunders. It’s time to slow down. Computer code, sales, or whatever one does, doesn’t need to be done yesterday; it needs to be done well.

Future Crimes, Marc Goodman, Doubleday, 2015

Read the article “How to Survive Cyberwar,” by Keren Elazari, in the April 2015 issue of Scientific American.
Previous related post [Info-Elitism].

Posted in Book reviews, Discover | Tagged , , , , , , , , , | Leave a comment