www.nettime.org
Nettime mailing list archives

<nettime> Ippolita Collective, In the Facebook Aquarium Part Two,
Patrice Riemens on Sun, 13 Jul 2014 21:22:51 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> Ippolita Collective, In the Facebook Aquarium Part Two,


Ippolita Collective, In the Facebook Aquarium Part Two


Pirate parties, or technology in politics (section #6)

2003 saw digital pirates getting on board of Sweden's social-democratic
society. The Pirate Bay indexes torrent files since that year: it saves
name and IP addresses of shared files through the /peer-to-peer torrent/
protocol, a meta-data format that identifies text-, audio-, and video-
files [47]. Shared files are not kept on a centralized, single server:
they are only indexed so as to make them accessible to users. Thus, the
issue of complicity to copyright infringement, which led to Napster's
closure in 2001, and that of Morpheus and Grocker in 2003, as well as of
many other file-sharing systems, is deftly side-stepped. According to the
pirates' reasoning, violations, if they occur, are entirely the users'
responsibility. The Swedish pirates regularly publish on their site the
legal letters they receive (from Microsoft, Apple, Dreamworks, Adobe - to
name just a few), as well as the mocking responses they return to the
technology giants.

But what, then, is the (specific) crime these (particular) pirates stand
accused of? Here, the concept of piracy must be seen in the context of the
conflict between big media enterprises (operating like a cartel) and
people sharing copyright protected files. The organizations representing
the interests of big firms which produce and distribute multi-media
content make use the 'piracy' monicker to stigmatize the theft of
copyrighted content, which, they say, lowers their earnings. Their
argument goes like this: every time someone downloads a copyright
protected film (or an audio file, or a book, or a video game, or ...),
that person will not go to the movies, nor will sHe purchase the product
in any other way. Hence there is an economic prejudice arising from theft.

Let us now admit (for the sake of the argument) that (private) property
should be defended at the point where someone else's interests are at
stake.  The principled ['a priori'] argument that can be put forward
(against this) is that one's budget is the constraining element amidst the
ever increasing proliferation of available content. With other words: if I
have only ten Euros to spend on records, there is no way I will be able to
spend one hundred. But I can download music for free - at the cost of much
lesser quality however, as mp3 cannot compete with a good record player,
nor can video-streaming compare with a cinema screen. Sure, I would like
to have more books, of films, or records/CDs - yet I must limit myself to
what my wallet can bear. Were these contents not for free, I would not
'consume' them. Hence, there is no actual loss of earnings. But there is
also an argument with the benefit of hindsight ['a posteriori']: the ever
growing turnover of the entertainment industry worldwide proves that
cultural contents are a source of profits. Yet greed knows no limit and
the idea that profits can grow exponentially is what makes the culture
majors' bosses nipples hard [##**].

There are also legal reasons making this definition of 'piracy'
problematic. Theft - to call it like that - of a digital good that can be
identically reproduced at very low cost (memory drive plus the electricity
needed to make a copy) is naturally very different from the theft of a non
digital good [48]. A copied file does not take the original away from its
owner. From that follows that intellectual property of this type of goods
needs to be distinguished from the property of non-digital goods. Besides,
making the share of files illegal under any circumstance tends to erase
the difference between commercial and personal use. Yet it is evident that
the re-sale for profit of a copyright-protected digital good and making
use to it without any profit-making aim are very different things
altogether. In fact, it is the architecture of the content distribution
system itself that traditionally makes an extensive personal usage
possible. A book, once bought, can be given away, or read aloud, or lend
out. Its sentences can be memorized, repeated, rehearsed, modified, and
reproduced for personal use. On can even add that to quote that book in
another book is a tribute to the author. In no way can all this be defined
as theft [49].

In Europe and in the United States, never mind the rest of the world, the
law is inadequate. Where (specific, IT-related) law has been enacted it
tends to limit and suppress personal usage for the benefit of media
oligopolies which have found in governments enthusiastic helpers willing
to protect and advance their corporate interests by legislative means. But
far from being universally accepted, allegations and accusations of theft
are raising objections without end. Sites like The Pirate Bay's are true
'repositories of collective actions', to quote the term used by
(sociologist and political scientists) Charles Tilly and Sidney Tarrow
[50]. The massive usage of identical duplication services leads to the
emergence of zones of economic counter-power, something that (economist)
John Kenneth Galbraith has dubbed /compensatory power/ [51], a concept
quite close to the post-marxist 'counter-power'. Such zones

"(...) make possible the emergence of 'autonomous zones' or 'strategic
sovereigns' that resist lines of prevailing power in the /absence/ of
competition, and in the particular example in question - Sweden - in the
presence of state collusion with anti-market forces. The collusion of
governments with oligopolies raises serious problems for
citizen-constituencies, and is discussed as a kind of 'organized crime'
related to a wave of de-democratization. What makes such alliances more
troubling is the fact that file-sharing has not demonstrably 'damaged' the
creative industries as a whole, but appears to have contributed to
world-economic transformations including an increase in creative
production and an expansion and globalization of media markets."[52]

In a landmark decision, the Pirate Bay people were condemned in 2009 to a
prison term (one year) and a hefty fine. This judgment is now being
appealed. Apparently under pressure of powerful cultural lobbies, the
Swedish state went for the repressive approach. However, it turned out
that one of the judges had a (undisclosed) conflict of interests, so the
case is far from clear-cut. Now, having announced the sale of the company,
something that did not happen in the end, The Pirate Bay is still indexing
millions of files. And it continue to inspire fear (and loathing). The
Italian government, for one, decided to block access to the site. Hence
the site is theoretically beyond reach of Italians, but indirect access is
still possible: by making the use of a proxy, e.g. Google Translate, or
other systems, this umpteenth clumsy attempt at censorship can easily be
circumvented [53].

The idea that a swarm of 'netizens' deliberately breaks the law, online,
thus making clear its disagreement with the concentration of economic
power (in the hands of a few actors) is not new. This is clearly something
of a key concept, since pressure from consumers, as for example with
on-line boycotts, can engender real changes. But (on the other hand) it is
much more contentious to affirm, as some political theories inspired by
this phenomenon do, that on-line strikes, calls for action, demos, and
other networked activities, constitute the incubator of a new form popular
sovereignty beyond the traditional forms of the same [54]. As we will see
further on, on-line activism tends to weaken traditional forms of
political commitment. The benefit of this approach is that it redirects
the attention from what is less important - the economic aspect, largely
overstated in this case also - in order to focus on social and political
issues. [I am not totally sure about the meaning of this sentence, which I
have translated quite literally - I'll refer to the authors - transl.]

(to be continued)
Next time: more on Pirate Bay and associated politics.



. . . . . . .

[47] Since 2009 p2p sharing systems have increasingly shifted towards the
use of /magnet links/, the files' traces (/hash/) rather than names and
addresses, substantially reducing metadata flow, and hence bandwidth
demand. The Pirate Bay, like many other similar services started to
promote the use of DHT (/Distributed Hash Table/) and PEX (/Peer
Exchange/) as substitute for traditional centralized /trackers/. Their
main benefit is to avoid the need for users (aka /peers/) to refer to one
single server keeping and distributing the names and traces of torrent
files. Combined with the use of crypto for in- and out-going data flows at
the /peers/ level, decentralized protocols strengthens the network, making
it both safer and more reliable, and, of course, also much less prone to
interception and take-down.
[##**] I playfully borrow this expression from Jean-Louis Gassee, a French-
Californian technology venturist quoted in Wired Magazine (1996):
http://archive.wired.com/wired/archive/4.05/gassee.html?pg=2
[48] The commonly applied distinction between so-called material and non-
material (immaterial) goods is not only inappropriate, but also
misleading. It only serves to endorse the balderdash conveyed by the mass
media. Files are not 'immaterial': they are precise sequences of electric
impulses stocked on enhanced silicium supports. And besides you cannot
access them  without computers and networks. And few things are more
material than computers and networks!
[49] Nonetheless, this is exactly what happens in the case of proprietary
programs (software): the Windows ('shrink-wrap') user license states that
you are not the owner of the digital good, but that you are only allowed
to use it, without modifying, copying, or sharing it. Same thing, and
actually even worse, with Apple, whose OS, by the way are derived from now
locked-down software previously distributed under a BSD license.
[50] Charles Tilly & Sidney Tarrow, /Contentious Politics/ Boulder, Paradigm,
2007.
[51] see: http://en.wikipedia.org/wiki/The_Anatomy_of_Power
[52] Leon Tan, The Pirate Bay, Countervailing power and the problem of
state organized crime, /Ctheory/ November 25, 2010:
http://www.ctheory.net/articles.aspx?id=672
[53] see: http://piratebayitalia.com/
[54] Provided one disregards the fighting talk about masses opposing
empires, it makes sense to read Alexander R Galloway's and Eugene
Thacker's /The Exploit. A Theory of Networks, Minneapolis U of Minnesota
Press, 2007. This despite the fact that their argument is rather
sophisticated in the extreme, and actually not a little confused.



-----------------------------
Translated by Patrice Riemens
This translation project is supported and facilitated by:
The Institute of Network Cultures, Amsterdam University of Applied Sciences
(http://networkcultures.org/wpmu/portal/)
The Antenna Foundation, Nijmegen
(http://www.antenna.nl - Dutch site)
(http://www.antenna.nl/indexeng.html - english site under construction)
Casa Nostra, Vogogna-Ossola, Italy


#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime {AT} kein.org