[Reader-list] digital inequalities
Oli
oli at zeromail.org
Wed Mar 2 20:36:30 IST 2005
Dear all,
here is a proposal of what could be called "digital inequalitities".
Best, Oli Leistert
----
Digital Inequalities
Abstract
The following text raises questions about digital dependencies and
inequalities. Most agendas of development work and computer literacy see
their goals in a distribution of computers and relating hardware.
« Computer » here is seen generally as a means for empowerment, as a means
to access resources of knowledge and as a means for building networks. Left
out, whether consciously or not, is a critical reflection on the product
« computer » and the accompaining regimes of computer products. This text
argues, that a distribution of computer products such as Microsoft through
multiplicators such as NGO's does not diminish digital inequalities, but,
in a way, extends them. With the distribution of a black box, such as
Microsoft Windows, a profound empowerment is prevented, not inforced. The
users of these software bundles are strictly depending on the proprietary
product. With this kind of distribution of computers, the misleading and
wrong equation « Computer is Microsoft » is transported as a gospel, or
ruling motto, into rural areas.
The second issue this text discusses is the general accumulation of data in
a digitally connected environment, that confronts our everyday life more
and more.
This world of data is produced by us while we are acting the way we always
used to do. Our acting gets more and more translated and transported as
data into a dataworld, mostly without that we know about it. Wireless
networks connect everyday life (mobiles, smartcards in the metro, payback
cards while shopping) and produce a counterworld, that consists of data,
intangible and purely informational. This data then feedbacks into the real
world, into everyday life, structures what we do and how we do it,
sometimes even determines it.
Digital inequalities belong to a world of patents, licences and copyright
protection
The digital divide saga goes roughly like this: the poor on this planet do
not only have not enough to eat, no, (even worse) they they don't have
computers. And not having computers seems to be the reason, why they don't
have enough to eat. Other reasons of their poverty, or of poverty in
general, are not touched or even considered in this discourse, because
development aid is not about questioning the political agenda where it gets
its money from. The analytical gap is being replaced by a simple equation:
once the poor have computers, they have access to information and with
that, they have access to resources of knowledge that will help them escape
their poverty. This tale of progress through technology is being used to
implement new dependencies, dependencies that are of an old kind, but with
a new look. Digital dependencies emerge, when western commercial products,
such as Microsoft Windows, are being introduced as bringing salvation in
communities of the paupers. The dependency consists of not more and not
less than the usage of a commercial product, including the introduction of
such concepts as licenses, copyright regimes and patents. And, maybe most
important, the introduction of what a computersystem is, or seems to be: a
commercial product. A deep rooted equal computer system would be one, that
allows full control over its usage, distribution and changing in any way,
including improovement. An equalitiy would allow free choice of
applications and the possibility to deny the usage of some.
So, digital inequalities can in part be seen as a result of a society, that
is shaped by commodities, where social interaction is replaced through an
exchange of commodities and of a society, where important tools are
« protected » by regimes of copyrights, patents and licenses and where a
huge political, juridical and police apparatus takes care of this. These
regimes successfully prevent any emancipation of the consumer to a user
controlling his/her means by her/himself. This is applies to the west as to
any other region (although, surely, there are big differences, the main
line stays the same). A licence defines the terms of usage. It prohibits
that the user appropriates the products in a way not being intended by the
manufacturer of the product. The product is not intended to become a thing
amongst others, which is being determined by the user. Licenses somehow
guarantee the determination and limitation of the user.
A different example of digital inequalities is much deeper situated in the
logique of software products: no matter the customer is allowed to use the
product in a way different from the licence agreement, software products
(including the software running on mobiles) can hardly be changed into
appropriated means. The interface design is strictly determining their
usage. It is not open to any change. Also, the product does not need to
even inform the user about what else it does. By offering the services
mentioned in the licence, the product fullfills its requirements the user
has paid for. The contract between user and manufacurer is not about any
activities of the manufacturer, but solely about the user's. So, the
product may have interfaces and communication channels to a third party,
without even informing the user. The SMS-channel provided by mobiles is
such a case, where a channel, initially made for technical services as
checking remotely the functionality of the mobile, has become popular means
of communication, sold seperately.
Letting connected digital devices give feedbacks and transmit data, with or
without notifying the user, is the contempory challenge of the majority of
IT-companies. Their goal is to build an environment, an ambient, that
permantly transmits data about « events » in real time. The Rfid-technology
(link) is such a case, where little computers, that transmit data, are
being attached onto or implemented into any possible thing surrounding an
individuum, or carried by the individuum. A different approach of bringing
together offline and online worlds is made by the consortium that tries to
establish « Trusted Computing » . They don't even try to hide their
ambitions: a complete control over any connected personal computer,
including the possibility of remotely deleting files, if « appropriate ».
The history of these kind of plans shows that totalitarian goals usually
fail because they underestimate the complexity of reality. But on the other
side, if the transnationals make a combined effort in a connected world,
one should not underestimate their will and power to solve the « problem »
of pirated media and what else they have on their agenda.
With the emergence of a counterworld and its computational infrastructure,
everyday life is being more and more confronted with a data accumulation
innaccessible for most. A kingdom of information for governments,
authorities, companies, sales persons and so on, beyond any legitimation.
Everyday life produces a counterworld
What follows is an example of RFID-technology, that shall serve to explain
the impact of a digital black box computer in everyday life.
The first part of the Delhi Metro is on service for a couple of months now.
This line goes from east to west, connecting the city devided by the river
Yukamo. The Delhi Metro has been equipped with a complete computerized
ticket system by french global player Thales. It offers to types of
« tickets »: one for the single or two-way passage, and one for multiple
passages. The ones for the single/two way passage are looking like plastic
coins, manufactured by Sony (CHECK), they go uner the product name RC-S 890
and have a diameter of 30mm, are 3 mm thick, and weight 2.7 gramm. They
contain a small computer with an antenna. They have themselves no power
supply (a very important aspect of RFID-items), but get their energy
through field induction from a reader-device.
Between the « Ticket » and the reader-device, that is integrated into the
barrier one has to pass to reach the platform, an intense data traffic
takes place:
the computer is activated by induced energy. Then, the reader reads the
data on the « ticket » that has been stored on it. The system now knows
which smart token has been purchased, for what passage and when. Possibly
the smart token stores data given by the reader: the reader might store
place and time of passing the reader on the « ticket ». The communication
between the two runs on 13.56 Mhz. Both, token and card are working within
a so called close coupling distance (distance from reader not more than
some centimeters). The smart token has a memory size of 576 bytes. This
Eeprom-memory can be overwritten up to 50.000 times.
These coins, which have to be placed near the barrier before every passage,
open, if valid, the barriers and the commuter can proceed to the platform.
After the passage, they are thrown into the barrier again. And depending on
the passage done and the one paid for, or better: depending if the passage
done is compatible to the one reserved for the commuter by the system, the
barriers open or don't open.
The traveller does not get any material proof of the passage, like the
paperticket in the old days. The tickets are bought at the ticket counter,
readily configured for the announced passage. A spontanous prolongation of
the passage is not possible without somehow embarrasing procedures at final
station. The ticket system notices the change of passage and the yatri gets
punished with high attention by the uniformed employees.
Furthermore, only a limited timeslot is open for the passage. If the yatri
leaves the train in between and discusses with a fellow the pro's and con's
of the Delhi Metro and then continues the passage, the timeslot will be
closed and again the uniformed personal will pay high attention to this
yatri. This high attention mostly leads to a rising deprivation of the
yatri, She/he is now a disturbing subject, at least disturbing the
continuous flow of the other passengers at the gate.
With the total electronic control, no manual control and no spotting of
faredodger is necessary in the trains. This means less employees and the
end of a possible economy not fully in the hands of the Delhi Metro
Transport Corporation (DMTC). Supposedly, full control of metro usage is
done over two different stages: purchase of ticket at counter and
barrier/reader-device. As some uniformed employees always hang around at
the barriers, it is hard to jump over them - a sport of civil disobedience
very popular in several western old metro systems. It's even harder, as two
barriers have to be passed: at the beginning and the end.
The uniformed employees are mere appendixes of the digital machine: they
are getting active when the machine tells them to, by sending off alarm
clock like sounds that changes the whole place into a location of emergency.
One detail, that arises from the fact, that the tickets are computers, is
the fine of RPs 100 one has to pay, if the « ticket » is not used for
travelling but taken away, removed out of the closed system of the digital
machine. It is not allowed to do this, because these « tickets » are far
too expensive. They cost far more than the prize for the passage. A smart
token ticket system only pays off, if each token is used some hundred
times. Only then it is cheaper than the classic paper ticket system. To
prevent « theft » of tickets, the DMTC has invented so called « souvenir
tokens », simple plastic coins without any computer inside, for 4 rps, that
can be taken home by fans of the metro. That it does not contain a computer
might not matter, as the computer is invisible anyway. The contactless data
traffic does not feel very technical, more magic.
While purchasing a paper ticket in a classical metro system, it is still
the passengers decision to make the journey or not. In the case of the
RFID-System, the passenger has to do the passage or to give back the ticket
at the counter.
The second type of ticket offered by the DMTC is a plastic card in the size
of creditcards. It is intended for those who commute frequently and can be
obtained for a deposit of one hundred rupees, which comes close to the
actual prize for the product on the market. This smartcard can be charged
with data that represents money, from 50 rps upwards. The usage is
identical to the usage of the tokens (but you keep it and don't throw it
into the slot). Some commuters have invented the practice to keep it in the
wallet or bag and to hold the wallet against the reader, which works fine
as long as the wallet or bag does not contain too much metal. The value
« on the card » will be shown each time the card is read. A little discount
is given for users of the smartcard, which means that two classes of users
are invented, token user and card user. Whoever has enough money to pay the
deposit and at least 50 rps gets rewarded with a discount. Technically
seen, the « metrocard » is more sophisticated than the token. It is again a
product by Sony, called FeLica, most reasonably the type RC-S833, made out
of PET-plastic. The Computer has an 8-bit RISC CPU with 1.2 kbytes
usermemory. The most important difference is the Triple-DES Encryption
Algorithm the CPU is equipped with. This Encryption is used everytime the
card gets read by the System. It prevails the « illegitimate » charging of
the card. The metrocard can be used as an electronic wallet, and some shops
in the metro stations supposedly accept it (I haven't tried).
Whether token or card, both are computers, and being a ticket is just one
possible application. It can also be said, that they simulate tickets. The
smart ticket system offers online statistics about the metro usage, because
every single passage is tracked by the system. This is a manager's dream, a
real-time analysis of such a complex company. The possibility of real-time
analysis lowers operational cost and increases profits. Information is of
big value for companies. Today, a lot of products, from toothpaste to milk,
have toll-free number printed on, that can be called by consumers. « We
want to know what you think about this product! » Sure they want. And while
this kind of feedback is based on free will, other feedback channels have
emerged which are much more subtile and imperceptible: City Bank's PayBack
card reports every item purchased to the members of the Payback consortium.
Customers Cards by chains are a different example. They provide special
offers or discounts, which shows how high this kind of informations is
valued by the chains. But in all these cases, it initially was a decision
by the customer to be member of the « club ». This is different in the case
of the Delhi Metro. Every commuter is being reported in real time.
>From the operator's perspective, the ticket system provides a complete
picture of the metro usage, from its first day of operation on. Every token
or card, that had been connected to the reader, gets storaged. So, for
exampe, no inspectors in the trains are needed anymore. Also, the expansive
and inexact counting of passengers, still seen in older metro systems, is
outdated. The system counts everything itself, or better: by counting it
works.
Every metro station is connected via fibre cable or satellite dishes with
the central server. The metro operates its own, closed network, no local
business is envolved. The central database, run by a software system thats
main target is to eliminate costs (SAP, the neoliberal's dream), contains
each single passage: time, places, durage, which token or card used (they
all have unique numbers). The software generates daily analysis of each
stations usage, routes taken. The metrocards are not personalized, but as
video pictures from each station are also transmitted to the headquarters,
tracking of each single yatri is fairly easy. The commuting behaviour of
each metrocard can be visualized with a mouse click.
Okay, well, somehow interesting this, but tell me: what has this to do with
digital inequalities?
Every yatri produces data during her/his voyage, without knowing about it.
No one informs the yatri about this, not during « ticket » « purchase » or
by a leaflet handed out. The signs in the stations inform about video
surveillance and not to touch unknown things.
It seems as if the data is not a matter of the yatri, who produces it. This
raises questions of ownership: whose data is this? Doesn't it belong to the
commuter? Or should not at least the commuter decide what this data is used
for?
In the case of the Delhi Metro, the yatri has no possibilities to interfere
into the production and usage of his/her data. The Metro System needs the
data to operate, so the data is an immanent part of the metro. Any
questioning of the data production means a questioning of the whole metro
system. The only possibility to avoid data production is not using the
metro, definitely not a good choice. The Delhi Metro has implemented a data
regime, that is immanently connected to the metros functionality as a
transport system - real world and virtual world fall together.
Digital inequalities consist in this of the asymmetric dataworld. No
influence possible on the data produced and the way it is used. The way to
any surveillance scenarios is paved. But even without this in mind, the
data production is highly questionable: who has legitimized the DMRC to
maintain a total data collection of their passengers? Can this be
legitimized by the system itself? A technology, that has implemented such
features as being necessary for operation is frightening. What if the next
generation cars only move, if a real time data stream is up and running?
In a wireless connected surrounding, the real, physical world of moving
objects produces a virtual, informational world, a distorted mirror.
Simultaneously and in synchronity this mirror is build. But while the real
world is fluid, passing, fading in its stream of time, the virtual world is
of very different character. It consists of incoherent, but continuously
generated data, that does not fade away in time. It is an evergrowing
accumulation of discrete « moments », that, as data, lack the sense of time
humans have. Data is omnipresent. The virtual world collects passing
moments and preserves them for signification at any possible time in the
future, in a reductionist way, as data never represents the qualities of
real life, the overwhelming number of impressions and emotions one connects
with moments passed. The virtual world is a homogenized substratum, lacking
any sense of time. It can haunt the real world at any arbitrary moment by
« prooving » long forgotten situations or constellations. The temporal
disconnection and, with that, the shortage to an everlasting present is not
only of philosophical interest. Nothing less but everyday life is affected
by it.
The virtual world affects everyday life as an objective narrative
Although much poorer in sensual qualities and details, which makes the
world surrounding us so interesting, the quality of total objectivity is
attributed to the virtual world. This total objectivity is also seen as
universal, meaning the same anywhere at anytime; the « pure truth ». This
authoritarian style data, being always correct, echoes the politics of
those who are building it: technicians, engineers, scientists, and
authorities of states and companies. White male's dreams of omnipotence
rule the data world. A well trained view from above, learned through
centuries of « neutral » science and thinking, a god's view. The data world
is independent of local bindings. It is a register of a divine almanac,
never to be questioned. This objectivity is unquestionable, as there is no
locality to question it from. It lies beyond the living world, a dead(ly)
objecitivity.
This doesn't mean that any data is evil or forever lost in bad politics.
But being in the hands of those, whose interest is control, government,
surveillance, optimization, cost reduction, the virtual world helps
generate images of the real world, that are reduced to parameters belonging
to such regimes. The output, the generated view on the real world, always
appears to be true and unquestionable, independent of how contingent the
meanings given to it are. While emotions and other not quantifyable matters
structure the signification of everyday moments, and truth and objectivity
are of secondary interest, this relation is upside down in the virtual
world. Data of total objectivity generate the meanings of moments. The
parameters used for these operations are contingent, maybe even senseless
and incomprehensible. They are set by the operators of the system, by the
managers, politicians: they generate a world of theirs. The « real » world
is being generated from scratch on the basis of datasets, replayable in any
contingent way, objectified by computers. A good example is the weathershow
on BBC World. A colourful ball appears on the screen, that represents the
« world weather » of, say, the last 24 hours, and some gray spots hurry
around it. We are feeling comfortable with images like that and hardly
notice, that the picture shown by BBC World can not be seen by anyone on
earth. It is generated from the virtual world's data and narrates something
about the real world, that is computated out of billions of data sets. We
are all astronauts, aren't we?
The virtual world acts normatively on the real world because of the
objectivity awarded to it. The power of the virtual world to generate
reductionistic perspectives, views, diagrams, cross-sections by any
possible criteria, that are always true, but never representing something
experienceable in this abstract and contextless way, alienates the real
world from it self step by step. Endless generating of « real » worlds by
the means of virtual worlds change every real world substantially. The
virtual world is a misguided mirror of the real world, in which the real
world never can regain itself. In its reduction to some few parameters,
the virtual reduces the real, that bows to it, anddeclares its own richness
of images, imaginations, emotions more and more irrelevant. The virtual
objectivies the real.
The accumulation of data in a digitally connected world generates a
counterworld, immaterial, informational, of ruling objectivity. It
structures the real, it economises the real and sorts it by contingent,
undiscussed criterias, that reflect the thinking of those who have access
to it. To trace, to govern, to control, to collect, to calculate, to
divide. Quantifyable kingdoms, pure and clean. Classes, modules, segments,
parts.
Most of the time, we don't even notice the production of the counterworld.
The striking thing is, though, that it is us who produce it. Without
movements of objects, of transactions, of sounds and any other dynamics, no
data would be produced, at least no data of interest. Our actions are
connected only one way: into the virtual. The stream goes unidirectional,
away from us. It is only on special occasions that we get an impression
about the accumulation already done, about datamountains and
informationrivers. We are kept away from the data we produce, as if they
had nothing to do with us and as if they would not feedback into our
worlds. It is an inequality of prominent kind, that our data are present in
an unaccessible counterworld, always about to interfere into our lifes.
Besieging our lifes with meanings generated by others, meanings we only can
react on, mostly helpless as the meanings comes in an objectified form.
Personalized data are suspected to be the most problematic data, as a
counterimage of a single person is made up with it. But personalisation of
data at least offers some advantages: a personal reaction is possible, it
is much easier to adress the problem of personal data storage and ask for
access to it. Unpersonaliszed data, however, are in a way a much bigger
challenge, as they also feedback onto single lifes, but on a different,
bigger scale. It's much harder to comprehend and critize their effects, as
they act on whole segments of societies.
An overwhelming case of building constant data flows into the counterwelt
is RFID-technology, pushed by huge transnational companies. They dream of a
permant data emission by individuals and their objects. Putting life
online. A doubled world of data.
Digital inequalities are basically productions of data, that are caused
without the consent and knowing of the individuum, that uses digital
devices such as Personal Computers or the Delhi metro « ticket ».
When Microsoft promotes the connection of every earthling to the net, in
collaboration with huge development agencies, their goal is not to fight
digital inequalities, but to gain control over its definition. Unconnected
people are not of interest to anyone, like unaccessible islands. To connect
them means to connect them with and to an unequal digital world, like it is
done with the wide distribution of MS Products through NGO's. Connection is
always designed by third parties. In the case of most NGO's, a
connectivity and computer distribution is promoted, that is designed by one
of the largest companies in the world. While the small tokens of the Delhi
Metro are hardly to be recognized as computers, the personal computer is
the most significant incarnation of a computer, and what is striking,
always with some proprietary software by a single company running on it.
But this is without any proper reason, as the GNU/Linux solution offers an
open operating system free of charge, completly controllable by the user
and changeable in any imaginable way. This is a setting, that reduces
digital inequalities from the ground. Once the technical knowledge is
spread, the computer is under control of those, who should have it under
control: the users.
Meanwhile, every single newly distributed MS computer only reinforces the
reign of Redmond. As the information politics goes, new user even don't get
told about alternatives. The equation that MS is computer is being passed
on from generation to generation, like some religion.
Some argue, that MS is easy to use and that its desktop is the entry to
computer literacy. This is an interesting claim that internalizes an
element of IT-politics that has undoubtly successfully been brought into
people's mind: the problem of the difficult machine and how to solve it.
Computers are some of the most complex machines build by humans and their
power lies in their ability of calculate in such an enormous speed, that
the calculation can be used to generate representations as graphics, sounds
and so on. But this computational power has also produced fear and anger at
computers. To make them a mass product, it was necessary to give them a
human-touch look.
The promise of simplicity
Computers are of complex and difficult matter. 25 years ago, computers were
part of the world of experts. These experts were and are educated to
understand the processes inside the machine, to configure and programme it.
To operate such a computer was difficult and laymen had lots of respect for
these machines and their commanders. These were understandable fears of
contact with these modern, eerie machines. Images of machines ruling human
kind were born and entered the world of science fiction.
Today, the computer has become an everyday item for a lot of people and it
can be found in many offices and at home. Fear of contact has been reduced
and the computer has become an integral part of contempory life, in many
places of the world. Like radio and television, one can't think about life
without it. But still, computers are complex machines. Nothing has changed
for that. Still, their inner processes are only understood by experts. What
has changed and what made them such a big success is their surface, or
better: its design. With a little training, one feels comfortable with this
surface and one gets the impression to understand a computer. Though, one
has « only » become a user. Computers with desktops such as Windows are
made to look easy understandable at the price of not letting anyone know
what really happens inside. A promise of simplicity is being given, that
builds trust between a higly complex machine and a layman. With this
promise of simplicity, people get initiated into a colourful world, that
provides any means for the consum of digital products. Through this
simplicity, the computer as become a mass product.
But behind the surface, the complex machines still operates in the same way
as 25 years before. And everytime the machines crashes, an event of
regularity, some window pops up that « tells » about errors that happened
in the most cryptical way. In this moment, the user is helpless and
experiences the fragiltiy of her/his relation to the machine.
In these cases, the computer proves its power over the user. But this is
only because it was build this way. Microsoft has no interest in any other
relation. Their software doesn't allow more than a superficial knowledge of
the machine. Errors are not to be solved by the user, but by the hotline,
an expensive service and integral part of the product. The user's
dependency on the manufacturer and other commercial services is part of the
game. The user's kingdom ends with changing the background colour of the
desktop.
In this ambivalence of computer complexity and the politics, to connect
everyone to the internet through pretending computers are simple, a digital
inequality emerges. The prize for simplicity is a black box, a product that
treats the user like a child. The metaphor of the desktop had helped to
spread the equation MS is Computer.
The politics of making people using computers, whether they need them or
not, with the promise of simplicity, has the goal to reduce the number of
those, that have been left out of the computer world so far. In the west,
these are the older people, the last analog generation. As the market
reached its limit in the west, the targetted number of people had to be
increased. The retired people are mostly wealthy (they gained the fruits of
60's and 70's social system), buy laptops and search the internet for
information on old age illnesses. In the computer courses they visit, they
learn how to make spreasheets with MS Excel and other weird things, but no
one tells them about Linux.
The retired in the west are the rural people in big parts of Asia. While
the cities and towns offers internet services in so called cybercafes,
NGO's try to bring the computerblessing to the countryside. Main reason is
the argument, that computers increase knowledge exchange, that a network
of computers also helps to build a network of humans, and finally,
computerliteracy is seen as empowerment. This all might be true, even if
the computer itself serves also as a fetish that makes people move. The
problem is the computer system the NGO's introduce, as it is most of the
time MS Windows. They introduce a western regime, that finds its expression
in the equation MS is computer. It would be an easy task to qualify a
person to administrate Linux machines. Doing this, the network could easily
add applications for free and change their own system in any desired way.
This autonomy is not intended, supposedly. The agenda fighting the
« digital divide » is not an agenda for digital independence, including
operating systems and applications. Moreover, the goal is to redo what has
been done in the west before.
The distribution of western products through NGO's might not be a reflected
part of their work. Having the same computers in their offices, why should
they distribute Linux to the rural people? Multiplicators such as NGO's are
the vehicles to promote the de facto monopoly of one software company.
The Desktop-metaphor was one of the most striking events to make the
computer a mass medium, followed, of course, by the internet. By
succesfully pretending that knowing how to move a mouse and clicking some
windows means being able to operate a computer, millions of computers have
been sold to people lacking any sense of the machine. But the illusion soon
gets into trouble when the first time one of those well-known and weired
messages appears, telling about something happening deep down inside the
machine, completely in cryptic language. This is where the metaphor of the
desktop ends and where the users dependency begins. Knowing how to change
the colour of the desktop's « background » doesn't help here. Microsoft is
not letting anyone understand the inner states of the computer.
Two kinds of PC's exists: unequal and equal ones. The unequal ones are more
popular, because they seem to fulfill the promise of simpleness. But also
because the unequal ones are being promoted by a huge apparatus of
politics, bureaucracy and administrations, not to mention economics. The
whole machinery of patents, copyright, commodities, licences, that comes
with an unequal computer, feeds the power of these promoting agencies. The
entertainment industry finally depends on a machine that can not be
controlled by users themselves. How heavily armed this destructive
apparatus of control and moneymaking is, shall be shown with an example not
entirely realistic today, but very much in a couple of years:
You switch on your comp and open, as every morning, your dairy, a file in
MS Word. At your surprise, a window pops up that announces some irritating
message:
« Your license to use this MS product has expired. To renew it, please
visit microsoft.com .» And the application closes. You think you are smart
and you start OpenOffice, an alternative some computer geek once installed
on your comp. OpenOffice can import doc. files, so what's the problem. But
instead of your dairyfile, again some message pops up:
« This file's license has expired. To renew it, please visit microsoft.com »
This time, you start feeling a bit worried. Not knowing what your computer
does and always living in a subliminal state of panic to loose data while
using it, is normal for you, but not having access to some of your most
personal data is a new chapter in your computer dependency. You worry even
more, in fact start being hectical, as the same happens when you
doubleclick your Phd-Thesis, that is almost finished. Also every letter you
have written is inaccessible. There seems to be no other possibility but to
« visit » the mentioned website and hope for help.
This takes longer than a coffee break. You are being requested to submit a
whole bunch of personal data concerning your person, profession, income,
creditcard number and more of the kind that is absolutely unnecessary to
male your MS Word work again. After having gone through this striptease
process, you doubleclick a small « OK »button on the website. To your
surprise, an even more worrying text appears:
« According to the Trusted Computing guard, your computer system gives host
to the following applications without any licence and therefore illegally.
We remind you that computer piracy is a criminal act:
MS Paint
Adobe Photoshop
QuarkExpress
All data, that has been illegally generated with these applications has
been deleted from your computer. In case any other files carrying the
signature of these illegally used applications are circulating on the
Internet, they will be deleted successively, too. Also, the applications
themselves have been deleted.
You have infringed copyrights and licenses of Microsoft and other companies
by installing and using these applications. It is possible that you have
caused severe financial losses for these companies in doing so. Please
expect a legal case taken against you.
The renewal of your MS Word licence is valid 18 months. We will withdraw $
293 from your account in the next 24 hours. Thank you for using Microsoft! »
Paths to digital independence
This scenario of expired dairies does not seem real since until today,
there has always been a way to use pirated software. But this time, the
past is not much helpful to evalute the near future of computers. Cracking
of programs and the old liberal times of the internet are about to be
replaced by strict regimes of control.
Since 11/9, nearly every government implemented laws and regimes to control
the flow of data. The authorities are prosecuting the sharing of music
files in the name of antiterrorism. And they monitor the data streams. They
store terra bytes of data. Automated filter software works its way through
myriads of information, sorting things out by any criteria imaginable. The
governments oblige internet service providers to hand over log files
without telling their customers; in some countries, the authorities even
have direct access to the ISP's internal data. The governments are driven
by the reduction of liberties on the net. In a networked world, things have
to regulated properly. And it does not take much manpower to do this,
since data is processable by computers easily, even such large quantitites
as the daily internet connections. This counterworld, being generated in
the name of counterterrorism, produces new suspects and delinquents en
masse and en passant. Computertechnology has began to tyrannize everyday
life. Every citizen is a possible bad guy.
But it is not only governments, that have put the counterworld on their
agenda and make intensive use of it. The « Trusted Computing » consortium
is about to change the Personal Computer from an autonomous machine to a
mere appendix of software companies, content providers and entertainment
industries. Intel, Microsoft, HP and others invest huge sums to convert the
PC to a device, which they can trust. This has nothing to do with a secure
computer for the user. The trust is about total control of what is running
on a machine under conditions dictated by them. The biggest inequalitiy so
far in the digital domain. A sophisticated implementation on hardware level
of algorithmns, that ensure proper payment and licensing, that will not be
an easy case for crackers and hackers, if at all. The goal is to define,
what the user is allowed to do with her/his comp. This control is only
possible through a huge connected infrastructure such as the internet. This
computer is definitely not a good place for storage of relevant personal
data. This computer has become an outlet of the transnational company.
Today, the question is not to have or have not a computer. Today, the
question is how a computer can be used, without being a data producer for
governments and companies. It's about the liberty to decide which data one
produces, where it goes and who can access it. It's about the one's
self-defined usage of a technology, that holds immense means of empowerment
by its huge range of applications, whereof email is the killerapplication.
If it is right, that a networking computer is a means of empowerment, than
all the big players involved are trying to take control over this
empowerment, cutting it down to dependencies and consumerism. Microsoft
does not wait until NGO's start to distribute Linux computers. They take
care of it themselves to explore new markets, with the aid of agencies like
UNESCO. A developing world that develops with Linux is a a nightmare for
the big players and would mean the end of the neverending growth of their
market shares. China, India, most parts of Asia are about to be
computerized. A huge market emerges. Every engagement of Microsoft in Asia
is part of a fight against national IT-solutions and Linux. The WTO and
other neoliberalist structuring regimes are the instruments to fight any
development in the IT-sector that differs from the past ones.
But digital inequalities are no natural laws. They are manmade and can be
changed by man. It is not advisable to seek help from governments,
companies or even NGO's. Digital independence is for the most part selfmade
and self empowerment. It doesn't matter to have the latest Computer model.
Linux runs on every old machine just perfect. And a computer that has the
« trusted computing » hardware implemented can't be trusted much. As
digital inequalities are not primarily depending on levels of
« development », but on levels of self empowerment and consciousness,
digital inequalities are not only subject to the « developing world ».
It doesn't cost much money to operate a comp that gets upgraded regularely
and is well documented. Only pay for the Hardware, never for the Software,
since Linux is free. Uncountable online-sites contain helpful postings and
discussions on technical problems. Most of the times, people answer ones
question very fast, because helping others to empower themselves is fun.
Linux supports willingness to help.
It is pretty easy to encrypt your emails. Noone but you and your
communication partner will then be able to read it. The manuals for PGP and
GPG are all out there. To encrypt your email it comparable with the usage
of an envelope in classic mail. Any non encrypted email will automatically
be prossessed by huge keyword search machines, storaged in databases and
maintained for possible later use. It doesn't matter if your mail contains
secrets, poems or whatever, because it simply isn't anyone's elses business
to know the content. What would you say, if all your paper mail letters
arrive with an open envelope or if the postman would tell you what your
mail contains today?
The payments by creditcards, bankcards or any other smart cards is being
pushed because it provides two simple advantages for companies: it is
cheaper, as cash is cost intensive and always a risk and it provides a flow
of data that enters into the counterworld. It is still fairly easy to say
no. Use cash where possible. Everytime you choose electronic payment, you
let a third party participate in your business and you expose yourself to a
situation in that you don't know what happens.
A similar case are RFID chips, that emerges more and more in everydaylife.
They might be attached to products in the supermarket, to CD's in music
stores, and they have already been sewn into clothes. They garnish medical
products and are present in systems like the Delhi Metro. Spare parts for
cars or mobiles, printer cardridges and other items are identified through
their unique number and they have been used to tag dead bodies after the
tsunami in Thailand. RFID is a technology for different purposes and usages
and there is not one single way to deal with them. They will appear more
and more in very different situations of our everyday life. Each specific
usage needs its own reflection. There is not a single solution for or
against it. But what they always do: they partake in the accumulation of
data for the counterworld.
In a world of data transmitting things, more and more problems arise for
people that want to decide about their data themselves. If companies make
it to introduce RFID more broadly in the human environment, we face a
counterworld, that can't be ignored by anyone. Through the huge
concentration in the food sector, the global players can easily do what
they want to. RFID is the effort to eliminate any self-defined data
environment. This won't be total, but still troubling enough.
To raise consciousness against any data transmitting environment is still a
good move, as the business has just started. And as long as the promissary
rhetoric of progress and a better living is being used by its promoters, it
is fairly easy to expose the myths. The intelligent fridge, that notices a
shortage on milk and orders two more litres is not a picture that convinces
anyone to switch to this technology. But tracking of pets with GPS devices
is a reasonable succesful attempt to introduce a complete surveillance
scenario into everyday life. Improvement of security is the keyword of such
interventions. But the same actors that are responsible for the condition
of everyday life are not trustworthy at all.
Some sources, that have been helpful writing this:
A good introduction on the Trusted Computing project:
http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html
How Microsoft describes its engagement with NGO's itself:
http://www.microsoft.com/mscorp/citizenship/report/digitalinclusion.mspx
The wikipedia page about RFID:
http://en.wikipedia.org/wiki/RFID
The GnuPG site, email encryption software:
http://gnupg.org/
One big source of (coorporate) information on RFID
http://www.rfidjournal.com/
More information about the reader-list
mailing list