[D-G] An Unmoderated Discussion List

charles hubaker solntsepyati at yahoo.com
Mon Aug 16 15:12:59 PDT 2010





________________________________

From: John Young <jya at pipeline.com>
To: deleuze-guattari at lists.driftline.org
Sent: Mon, August 16, 2010 2:32:12 PM
Subject: Re: [D-G] An Unmoderated Discussion List


And thus, when theology wishes to colonize, it takes out the local shamans 
first. That is why the Arkansas mafias in connection with Clintonian connections 
to Bildburg, decided to advertise 'for your convenience' the bar-coding of 
library books at Conway, Arkansas. This is the first place this writer noticed 
it, back in about 1994 or so. The actual history of this bar-coding would be an 
interesting endeavor, because the local 'podunk' is either unaware of the 
implications of removing books (peop;le) to concentration camps and crematoria: 
you have been thefted of serendipity Or more astonishingly, the local may well 
desire his or her own repression. Years later we see a Clinton library arise on 
the kudzu-infested banks of the Arkansas River, a monument to Stupidity and its 
Ego, accompanied by the fact that Capitalism could not get the Indians to work 
for it, they would rather die. Just take a stroll into the funky ghettos of 
Little Rock, and one will capture the paradox: kudzu = antabuse. Drunk on the 
Lord's power, the Brownsville Agreement is also another irony of primal 
knowledge envy. When Clinton's buddies met at Bildburg, they were simply 
re-imitating the Nazi practice to watch Stag beetles in an aquarium fight with 
each other so as to get ideas for military strategy. The pretext presented at 
Bildburg, though, was such costly things as the price of publishiung and acid 
rain in the Black Forest. Surveillance forges on in the societies of control.

Similarly the imposition of such regimes in digital world derives from
the growing enterprise of protection against attack, from hackers, from
thieves, from criminal companies, from governmental spies and
law enforcement. To wit, we must imposed these conditions to protect
your from you gullibility. The national military argument nearly ubiquitous
around the planet. Centralized, to be sure, national protection is guided
by a select few cleared for highest classified information.

There will eventually be levels of classified access to the Internet, presaged
by military and intelligence networks now in force, and coming soon
from Google and Verizon, and after them the deluge of market protection
against competitors.

Yes, but what about graffiti? The history of Italian pamphleteers may be up for 
a refresher course. Pirate radio won't work if the journals publishing new 
information require membership. What does the pamphleteer write about? He or she 
cannot write about a 2.1 billion-year-old recently discovered microorganism 
unless there is access to that initial information. This resonates with D&G's 
lines on familial Oedipus, because of such things as the 
stick-and-carrot corecion of the Inheritance. Maybe one should have said, 
Corinthian tyrrany. This coercion is one reason why there is difficulty in 
teaching evolution, even though a teen-ager may not admit it. They are already 
compromised by hormones and inexperience.

It would be expected that the previously marginalized hacker will become
the key actor in these systems due to their fine granular knowledge of
how the systems work and their vulnerabilities, in particular their
vulnerability to social engineering of senior officials and bosses who
don't know squat beyond how to climb the career ladder.

Buildings are being more reifieed than people. One can recall around 
Massumi-Kent State times, when the idea of a anti-personnel bomb that would 
leave buildings intact was circulating. The police are now deliberately 
reifying the idea that someone is near the building. In the middlewest, this has 
not occurred perhaps before the last half decade.

Most interestingly, hackers are in many ways illiterate in the sense
of conventional language and literature. But they most certainly have
a language and literature of their own, a somewhat androidal mix
of verbiage and machinic intimacy, an intercourse of flesh and
materiality. If you can, observe a hacker in action (not being interviewed
which is always phony). Watch the ease with which they cross or
ignore borders, not only geographical and territorial, but against
logic, grammar, syntax and other prothesis of passing away
enlightenment, i.e., advanced education. There is a crumbling
of the legacy epistemology, still inebriated with text of the book.
Gutenbergian conceit can be sustained by scanning the world's
volumes, that is a delusion.

Finally, only hackers, that is, system administrators (not the bosses,
those who caress equipment with their imagination), know what
takes place in digital terrain where reason has no place.

One addition is the possiblity of more projections and more intensity of 
projections west of the Mississippi. The midllewesterner-Petainist is much more 
subdued than what is noticed 'Out West.' If there is any truth to the increase 
of fencing in the East, why more intense projections in the West, where fencing 
has a longer history?

At 03:33 PM 8/16/2010, you wrote:
>An unmoderated discussion list would serve to eliminate the glossing 
>over of the
>three-dimensional problem, which has been manifest on this list in 
>the past. The
>problem is defined as that which the moderator cannot know about the 
>poster of
>the message sent to this list. It's not a little matter, because 
>some of us have
>seen the slowly operating sanctions inside the American rhizome:
>deterritorializations are taking on new forms.
>
>An example is the fencing-in of construction sites in the U.S. Not many were
>paying attention, because this practice had already been part and 
>parcel of the
>American West. East of the Mississippi, however, this practice only began in
>intensity within the last decade. Therefore, capitalism and communism have at
>least this in common: the ground under one's feet is being reified 
>as it relates
>to the State. This would imply the concept of it being 'only support for the
>nomad,' as per D&G. But to admit one already has an email account 
>just to obtain
>another one places the scapegoat-victim in the sights of 
>fascism....a schizoid
>fascism: you the desirer of email did it to yourself, so the fascist 
>cannot be
>blamed.
>
>
>Now, fascist forces are taking advantage of this compromised schiz-flux and
>applying new rules: one cannot have an email acount without first 
>already having
>(another[italics]) email account. That is to say, the two email accounts the
>victim had before is being split so that emails bounce. The Cyberspace Pimp
>first got the masses addicted, and now they dance their victims like
>marionettes, because the split makes all the difference when emails start to
>bounce. The Pimp is now playing with the puppets in this way: by causing the
>alternate email to bounce. A very special delirium.
>
>
>
>_______________________________________________
>List address: deleuze-guattari at driftline.org
>Info: http://lists.driftline.org/listinfo.cgi/deleuze-guattari-driftline.org
>Archives: www.driftline.org

_______________________________________________
List address: deleuze-guattari at driftline.org
Info: http://lists.driftline.org/listinfo.cgi/deleuze-guattari-driftline.org
Archives: www.driftline.org

Excellent observations. A couple of offerings:

Fencing of construction sites is directly related to complying with insurance
and liability requirements, similar to the necessity of hard hats, safety belts
and harnesses, licensed construction safety inspectors, and lawsuits.

Fencing first appeared as a barrier to thievery but that was surpassed by
the cost of insurance and its kissing cousin, bonding. No insurance and
bonding, no contract. These conditions were inherited from up the line,
property owners, design professionals and consultants were required to
comply with financial and legal obligations imposed by those who hired
them, and those came from higher up the line of fiduciary responsibility
and distributed CYA of all parties. Some 25-27 percent of construction
cost is attributable to multiple protection regimes fiercely armored against
legal attack from a host of interest groups who have historically been
harmed by dangerous construction practices and are now fully prepared
to push back, even take over the holdings of miscreants who try to evade
responsiblity for predatory practices.


      


More information about the Deleuze-Guattari mailing list