]> pere.pagekite.me Git - text-destroy-surveillance.git/blob - po/how-to-destroy-surveillance-capitalism.fr.po
Fix link.
[text-destroy-surveillance.git] / po / how-to-destroy-surveillance-capitalism.fr.po
1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Cory Doctorow
3 # This file is distributed under the same license as the How to Destroy Surveillance Capitalism package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
5 #
6 msgid ""
7 msgstr ""
8 "Project-Id-Version: How to Destroy Surveillance Capitalism n/a\n"
9 "POT-Creation-Date: 2021-01-24 19:27+0100\n"
10 "PO-Revision-Date: 2020-12-30 06:17+0000\n"
11 "Last-Translator: J. Lavoie <j.lavoie@net-c.ca>\n"
12 "Language-Team: French <https://hosted.weblate.org/projects/rms-personal-data-"
13 "safe/how-to-destroy-surveillance-capitalism/fr/>\n"
14 "Language: fr\n"
15 "MIME-Version: 1.0\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
18 "Plural-Forms: nplurals=2; plural=n > 1;\n"
19 "X-Generator: Weblate 4.4.1-dev\n"
20
21 #. type: Attribute 'lang' of: <article>
22 msgid "en"
23 msgstr "fr"
24
25 #. type: Content of: <article><articleinfo><title>
26 msgid "How to Destroy Surveillance Capitalism"
27 msgstr "Comment détruire le capitalisme de la surveillance"
28
29 #. type: Content of: <article><articleinfo><authorgroup><author><firstname>
30 msgid "Cory"
31 msgstr "Cory"
32
33 #. type: Content of: <article><articleinfo><authorgroup><author><surname>
34 msgid "Doctorow"
35 msgstr "Doctorow"
36
37 #. type: Content of: <article><articleinfo><publisher><address>
38 #, no-wrap
39 msgid "<city>Oslo</city>"
40 msgstr "<city>Oslo</city>"
41
42 #. type: Content of: <article><articleinfo>
43 msgid ""
44 "<publisher> <publishername>Petter Reinholdtsen</publishername> <placeholder "
45 "type=\"address\" id=\"0\"/> </publisher> <copyright> <year>2020</year> "
46 "<holder>Cory Doctorow</holder> </copyright> <copyright> <year>2021</year> "
47 "<holder>Petter Reinholdtsen</holder> </copyright>"
48 msgstr ""
49 "<publisher> <publishername>Petter Reinholdtsen</publishername> <placeholder "
50 "type=\"address\" id=\"0\"/> </publisher> <copyright> <year>2020</year> "
51 "<holder>Cory Doctorow</holder> </copyright> <copyright> <year>2021</year> "
52 "<holder>Petter Reinholdtsen</holder> </copyright>"
53
54 #. type: Content of: <article><articleinfo><legalnotice><para>
55 msgid "How to Destroy Surveillance Capitalism by Cory Doctorow."
56 msgstr "Comment détruire le capitalisme de la surveillance par Cory Doctorow."
57
58 #. type: Content of: <article><articleinfo><legalnotice><para>
59 msgid "Published by Petter Reinholdtsen."
60 msgstr "Publié par Petter Reinholdtsen."
61
62 #. type: Content of: <article><articleinfo><legalnotice><para>
63 msgid "<ulink url=\"http://www.hungry.com/~pere/publisher/\"/>."
64 msgstr ""
65
66 #. type: Content of: <article><articleinfo><legalnotice><para>
67 msgid "ISBN 978-82-93828-XX-X (paperback)"
68 msgstr "ISBN 978-82-93828-XX-X (livre de poche)"
69
70 #. type: Content of: <article><articleinfo><legalnotice><para>
71 msgid "ISBN 978-82-93828-XX-X (ePub)"
72 msgstr "ISBN 978-82-93828-XX-X (ePub)"
73
74 #. type: Content of: <article><articleinfo><legalnotice><para>
75 msgid ""
76 "This book is available for purchase from <ulink url=\"https://www.lulu.com/"
77 "\"/>."
78 msgstr ""
79 "Ce livre est disponible à la vente sur <ulink url=\"https://www.lulu.com/\"/"
80 ">."
81
82 #. type: Content of: <article><articleinfo><legalnotice><para><inlinemediaobject>
83 msgid ""
84 "<imageobject> <imagedata fileref=\"images/cc-some-rights-reserved.png\" "
85 "contentdepth=\"3em\" width=\"100%\" align=\"center\"/> </imageobject> "
86 "<imageobject> <imagedata fileref=\"images/cc-some-rights-reserved.svg\" "
87 "contentdepth=\"3em\" width=\"100%\" align=\"center\"/> </imageobject>"
88 msgstr ""
89 "<imageobject> <imagedata fileref=\"images/cc-some-rights-reserved.png\" "
90 "contentdepth=\"3em\" width=\"100%\" align=\"center\"/> </imageobject> "
91 "<imageobject> <imagedata fileref=\"images/cc-some-rights-reserved.svg\" "
92 "contentdepth=\"3em\" width=\"100%\" align=\"center\"/> </imageobject>"
93
94 #. type: Content of: <article><articleinfo><legalnotice><para><inlinemediaobject><textobject><phrase>
95 msgid "Creative Commons, Some rights reserved"
96 msgstr "Creative Commons, certains droits réservés"
97
98 #. type: Content of: <article><articleinfo><legalnotice><para>
99 msgid "<placeholder type=\"inlinemediaobject\" id=\"0\"/>"
100 msgstr "<placeholder type=\"inlinemediaobject\" id=\"0\"/>"
101
102 #. type: Content of: <article><articleinfo><legalnotice><para>
103 msgid ""
104 "This book is licensed under a Creative Commons license. This license permits "
105 "any use of this work, so long as attribution is given and no derivatived "
106 "material is distributed. For more information about the license visit "
107 "<ulink url=\"https://creativecommons.org/licenses/by-nd/4.0/\"/>."
108 msgstr ""
109 "Ce livre est sous licence Creative Commons. Cette licence permet toute "
110 "utilisation de ce travail, tant que l'attribution est donnée et qu'aucun "
111 "matériel dérivé n'est distribué. Pour plus d'informations sur la licence, "
112 "visitez <ulink url=\"https://creativecommons.org/licenses/by-nd/4.0/\"/>."
113
114 #. type: Content of: <article><sect1><title>
115 msgid "The net of a thousand lies"
116 msgstr ""
117
118 #. type: Content of: <article><sect1><para>
119 msgid ""
120 "The most surprising thing about the rebirth of flat Earthers in the 21st "
121 "century is just how widespread the evidence against them is. You can "
122 "understand how, centuries ago, people who’d never gained a high-enough "
123 "vantage point from which to see the Earth’s curvature might come to the "
124 "commonsense belief that the flat-seeming Earth was, indeed, flat."
125 msgstr ""
126
127 #. type: Content of: <article><sect1><para>
128 msgid ""
129 "But today, when elementary schools routinely dangle GoPro cameras from "
130 "balloons and loft them high enough to photograph the Earth’s curve — to say "
131 "nothing of the unexceptional sight of the curved Earth from an airplane "
132 "window — it takes a heroic effort to maintain the belief that the world is "
133 "flat."
134 msgstr ""
135
136 #. type: Content of: <article><sect1><para>
137 msgid ""
138 "Likewise for white nationalism and eugenics: In an age where you can become "
139 "a computational genomics datapoint by swabbing your cheek and mailing it to "
140 "a gene-sequencing company along with a modest sum of money, <quote>race "
141 "science</quote> has never been easier to refute."
142 msgstr ""
143
144 #. type: Content of: <article><sect1><para>
145 msgid ""
146 "We are living through a golden age of both readily available facts and "
147 "denial of those facts. Terrible ideas that have lingered on the fringes for "
148 "decades or even centuries have gone mainstream seemingly overnight."
149 msgstr ""
150
151 #. type: Content of: <article><sect1><para>
152 msgid ""
153 "When an obscure idea gains currency, there are only two things that can "
154 "explain its ascendance: Either the person expressing that idea has gotten a "
155 "lot better at stating their case, or the proposition has become harder to "
156 "deny in the face of mounting evidence. In other words, if we want people to "
157 "take climate change seriously, we can get a bunch of Greta Thunbergs to make "
158 "eloquent, passionate arguments from podiums, winning our hearts and minds, "
159 "or we can wait for flood, fire, broiling sun, and pandemics to make the case "
160 "for us. In practice, we’ll probably have to do some of both: The more we’re "
161 "boiling and burning and drowning and wasting away, the easier it will be for "
162 "the Greta Thunbergs of the world to convince us."
163 msgstr ""
164
165 #. type: Content of: <article><sect1><para>
166 msgid ""
167 "The arguments for ridiculous beliefs in odious conspiracies like anti-"
168 "vaccination, climate denial, a flat Earth, and eugenics are no better than "
169 "they were a generation ago. Indeed, they’re worse because they are being "
170 "pitched to people who have at least a background awareness of the refuting "
171 "facts."
172 msgstr ""
173
174 #. type: Content of: <article><sect1><para>
175 msgid ""
176 "Anti-vax has been around since the first vaccines, but the early anti-"
177 "vaxxers were pitching people who were less equipped to understand even the "
178 "most basic ideas from microbiology, and moreover, those people had not "
179 "witnessed the extermination of mass-murdering diseases like polio, smallpox, "
180 "and measles. Today’s anti-vaxxers are no more eloquent than their forebears, "
181 "and they have a much harder job."
182 msgstr ""
183
184 #. type: Content of: <article><sect1><para>
185 msgid ""
186 "So can these far-fetched conspiracy theorists really be succeeding on the "
187 "basis of superior arguments?"
188 msgstr ""
189
190 #. type: Content of: <article><sect1><para>
191 msgid ""
192 "Some people think so. Today, there is a widespread belief that machine "
193 "learning and commercial surveillance can turn even the most fumble-tongued "
194 "conspiracy theorist into a svengali who can warp your perceptions and win "
195 "your belief by locating vulnerable people and then pitching them with A.I.-"
196 "refined arguments that bypass their rational faculties and turn everyday "
197 "people into flat Earthers, anti-vaxxers, or even Nazis. When the RAND "
198 "Corporation <ulink url=\"https://www.rand.org/content/dam/rand/pubs/"
199 "research_reports/RR400/RR453/RAND_RR453.pdf\">blames Facebook for "
200 "<quote>radicalization</quote></ulink> and when Facebook’s role in spreading "
201 "coronavirus misinformation is <ulink url=\"https://secure.avaaz.org/campaign/"
202 "en/facebook_threat_health/\">blamed on its algorithm</ulink>, the implicit "
203 "message is that machine learning and surveillance are causing the changes in "
204 "our consensus about what’s true."
205 msgstr ""
206
207 #. type: Content of: <article><sect1><para>
208 msgid ""
209 "After all, in a world where sprawling and incoherent conspiracy theories "
210 "like Pizzagate and its successor, QAnon, have widespread followings, "
211 "<emphasis>something</emphasis> must be afoot."
212 msgstr ""
213
214 #. type: Content of: <article><sect1><para>
215 msgid ""
216 "But what if there’s another explanation? What if it’s the material "
217 "circumstances, and not the arguments, that are making the difference for "
218 "these conspiracy pitchmen? What if the trauma of living through "
219 "<emphasis>real conspiracies</emphasis> all around us — conspiracies among "
220 "wealthy people, their lobbyists, and lawmakers to bury inconvenient facts "
221 "and evidence of wrongdoing (these conspiracies are commonly known as "
222 "<quote>corruption</quote>) — is making people vulnerable to conspiracy "
223 "theories?"
224 msgstr ""
225
226 #. type: Content of: <article><sect1><para>
227 msgid ""
228 "If it’s trauma and not contagion — material conditions and not ideology — "
229 "that is making the difference today and enabling a rise of repulsive "
230 "misinformation in the face of easily observed facts, that doesn’t mean our "
231 "computer networks are blameless. They’re still doing the heavy work of "
232 "locating vulnerable people and guiding them through a series of ever-more-"
233 "extreme ideas and communities."
234 msgstr ""
235
236 #. type: Content of: <article><sect1><para>
237 msgid ""
238 "Belief in conspiracy is a raging fire that has done real damage and poses "
239 "real danger to our planet and species, from epidemics <ulink url=\"https://"
240 "www.cdc.gov/measles/cases-outbreaks.html\">kicked off by vaccine denial</"
241 "ulink> to genocides <ulink url=\"https://www.nytimes.com/2018/10/15/"
242 "technology/myanmar-facebook-genocide.html\">kicked off by racist "
243 "conspiracies</ulink> to planetary meltdown caused by denial-inspired climate "
244 "inaction. Our world is on fire, and so we have to put the fires out — to "
245 "figure out how to help people see the truth of the world through the "
246 "conspiracies they’ve been confused by."
247 msgstr ""
248
249 #. type: Content of: <article><sect1><para>
250 msgid ""
251 "But firefighting is reactive. We need fire <emphasis>prevention</emphasis>. "
252 "We need to strike at the traumatic material conditions that make people "
253 "vulnerable to the contagion of conspiracy. Here, too, tech has a role to "
254 "play."
255 msgstr ""
256
257 #. type: Content of: <article><sect1><para>
258 msgid ""
259 "There’s no shortage of proposals to address this. From the EU’s <ulink url="
260 "\"https://edri.org/tag/terreg/\">Terrorist Content Regulation</ulink>, which "
261 "requires platforms to police and remove <quote>extremist</quote> content, to "
262 "the U.S. proposals to <ulink url=\"https://www.eff.org/deeplinks/2020/03/"
263 "earn-it-act-violates-constitution\">force tech companies to spy on their "
264 "users</ulink> and hold them liable <ulink url=\"https://www.natlawreview.com/"
265 "article/repeal-cda-section-230\">for their users’ bad speech</ulink>, "
266 "there’s a lot of energy to force tech companies to solve the problems they "
267 "created."
268 msgstr ""
269
270 #. type: Content of: <article><sect1><para>
271 msgid ""
272 "There’s a critical piece missing from the debate, though. All these "
273 "solutions assume that tech companies are a fixture, that their dominance "
274 "over the internet is a permanent fact. Proposals to replace Big Tech with a "
275 "more diffused, pluralistic internet are nowhere to be found. Worse: The "
276 "<quote>solutions</quote> on the table today <emphasis>require</emphasis> Big "
277 "Tech to stay big because only the very largest companies can afford to "
278 "implement the systems these laws demand."
279 msgstr ""
280
281 #. type: Content of: <article><sect1><para>
282 msgid ""
283 "Figuring out what we want our tech to look like is crucial if we’re going to "
284 "get out of this mess. Today, we’re at a crossroads where we’re trying to "
285 "figure out if we want to fix the Big Tech companies that dominate our "
286 "internet or if we want to fix the internet itself by unshackling it from Big "
287 "Tech’s stranglehold. We can’t do both, so we have to choose."
288 msgstr ""
289
290 #. type: Content of: <article><sect1><para>
291 msgid ""
292 "I want us to choose wisely. Taming Big Tech is integral to fixing the "
293 "Internet, and for that, we need digital rights activism."
294 msgstr ""
295
296 #. type: Content of: <article><sect1><title>
297 msgid "Digital rights activism, a quarter-century on"
298 msgstr ""
299
300 #. type: Content of: <article><sect1><para>
301 msgid ""
302 "Digital rights activism is more than 30 years old now. The Electronic "
303 "Frontier Foundation turned 30 this year; the Free Software Foundation "
304 "launched in 1985. For most of the history of the movement, the most "
305 "prominent criticism leveled against it was that it was irrelevant: The real "
306 "activist causes were real-world causes (think of the skepticism when <ulink "
307 "url=\"https://www.loc.gov/law/foreign-news/article/finland-legal-right-to-"
308 "broadband-for-all-citizens/#:~:text=Global%20Legal%20Monitor,-Home%20%7C"
309 "%20Search%20%7C%20Browse&amp;text=(July%206%2C%202010)%20On,connection"
310 "%20100%20MBPS%20by%202015.\">Finland declared broadband a human right in "
311 "2010</ulink>), and real-world activism was shoe-leather activism (think of "
312 "Malcolm Gladwell’s <ulink url=\"https://www.newyorker.com/"
313 "magazine/2010/10/04/small-change-malcolm-gladwell\">contempt for "
314 "<quote>clicktivism</quote></ulink>). But as tech has grown more central to "
315 "our daily lives, these accusations of irrelevance have given way first to "
316 "accusations of insincerity (<quote>You only care about tech because you’re "
317 "<ulink url=\"https://www.ipwatchdog.com/2018/06/04/report-engine-eff-shills-"
318 "google-patent-reform/id=98007/\">shilling for tech companies</ulink></"
319 "quote>) to accusations of negligence (<quote>Why didn’t you foresee that "
320 "tech could be such a destructive force?</quote>). But digital rights "
321 "activism is right where it’s always been: looking out for the humans in a "
322 "world where tech is inexorably taking over."
323 msgstr ""
324
325 #. type: Content of: <article><sect1><para>
326 msgid ""
327 "The latest version of this critique comes in the form of <quote>surveillance "
328 "capitalism,</quote> a term coined by business professor Shoshana Zuboff in "
329 "her long and influential 2019 book, <emphasis>The Age of Surveillance "
330 "Capitalism: The Fight for a Human Future at the New Frontier of Power</"
331 "emphasis>. Zuboff argues that <quote>surveillance capitalism</quote> is a "
332 "unique creature of the tech industry and that it is unlike any other abusive "
333 "commercial practice in history, one that is <quote>constituted by unexpected "
334 "and often illegible mechanisms of extraction, commodification, and control "
335 "that effectively exile persons from their own behavior while producing new "
336 "markets of behavioral prediction and modification. Surveillance capitalism "
337 "challenges democratic norms and departs in key ways from the centuries-long "
338 "evolution of market capitalism.</quote> It is a new and deadly form of "
339 "capitalism, a <quote>rogue capitalism,</quote> and our lack of understanding "
340 "of its unique capabilities and dangers represents an existential, species-"
341 "wide threat. She’s right that capitalism today threatens our species, and "
342 "she’s right that tech poses unique challenges to our species and "
343 "civilization, but she’s really wrong about how tech is different and why it "
344 "threatens our species."
345 msgstr ""
346
347 #. type: Content of: <article><sect1><para>
348 msgid ""
349 "What’s more, I think that her incorrect diagnosis will lead us down a path "
350 "that ends up making Big Tech stronger, not weaker. We need to take down Big "
351 "Tech, and to do that, we need to start by correctly identifying the problem."
352 msgstr ""
353
354 #. type: Content of: <article><sect1><title>
355 msgid "Tech exceptionalism, then and now"
356 msgstr ""
357
358 #. type: Content of: <article><sect1><para>
359 msgid ""
360 "Early critics of the digital rights movement — perhaps best represented by "
361 "campaigning organizations like the Electronic Frontier Foundation, the Free "
362 "Software Foundation, Public Knowledge, and others that focused on preserving "
363 "and enhancing basic human rights in the digital realm — damned activists for "
364 "practicing <quote>tech exceptionalism.</quote> Around the turn of the "
365 "millennium, serious people ridiculed any claim that tech policy mattered in "
366 "the <quote>real world.</quote> Claims that tech rules had implications for "
367 "speech, association, privacy, search and seizure, and fundamental rights and "
368 "equities were treated as ridiculous, an elevation of the concerns of sad "
369 "nerds arguing about <emphasis>Star Trek</emphasis> on bulletin board systems "
370 "above the struggles of the Freedom Riders, Nelson Mandela, or the Warsaw "
371 "ghetto uprising."
372 msgstr ""
373
374 #. type: Content of: <article><sect1><para>
375 msgid ""
376 "In the decades since, accusations of <quote>tech exceptionalism</quote> have "
377 "only sharpened as tech’s role in everyday life has expanded: Now that tech "
378 "has infiltrated every corner of our life and our online lives have been "
379 "monopolized by a handful of giants, defenders of digital freedoms are "
380 "accused of carrying water for Big Tech, providing cover for its self-"
381 "interested negligence (or worse, nefarious plots)."
382 msgstr ""
383
384 #. type: Content of: <article><sect1><para>
385 msgid ""
386 "From my perspective, the digital rights movement has remained stationary "
387 "while the rest of the world has moved. From the earliest days, the "
388 "movement’s concern was users and the toolsmiths who provided the code they "
389 "needed to realize their fundamental rights. Digital rights activists only "
390 "cared about companies to the extent that companies were acting to uphold "
391 "users’ rights (or, just as often, when companies were acting so foolishly "
392 "that they threatened to bring down new rules that would also make it harder "
393 "for good actors to help users)."
394 msgstr ""
395
396 #. type: Content of: <article><sect1><para>
397 msgid ""
398 "The <quote>surveillance capitalism</quote> critique recasts the digital "
399 "rights movement in a new light again: not as alarmists who overestimate the "
400 "importance of their shiny toys nor as shills for big tech but as serene deck-"
401 "chair rearrangers whose long-standing activism is a liability because it "
402 "makes them incapable of perceiving novel threats as they continue to fight "
403 "the last century’s tech battles."
404 msgstr ""
405
406 #. type: Content of: <article><sect1><para>
407 msgid "But tech exceptionalism is a sin no matter who practices it."
408 msgstr ""
409
410 #. type: Content of: <article><sect1><title>
411 msgid "Don’t believe the hype"
412 msgstr ""
413
414 #. type: Content of: <article><sect1><para>
415 msgid ""
416 "You’ve probably heard that <quote>if you’re not paying for the product, "
417 "you’re the product.</quote> As we’ll see below, that’s true, if incomplete. "
418 "But what is <emphasis>absolutely</emphasis> true is that ad-driven Big "
419 "Tech’s customers are advertisers, and what companies like Google and "
420 "Facebook sell is their ability to convince <emphasis>you</emphasis> to buy "
421 "stuff. Big Tech’s product is persuasion. The services — social media, search "
422 "engines, maps, messaging, and more — are delivery systems for persuasion."
423 msgstr ""
424
425 #. type: Content of: <article><sect1><para>
426 msgid ""
427 "The fear of surveillance capitalism starts from the (correct) presumption "
428 "that everything Big Tech says about itself is probably a lie. But the "
429 "surveillance capitalism critique makes an exception for the claims Big Tech "
430 "makes in its sales literature — the breathless hype in the pitches to "
431 "potential advertisers online and in ad-tech seminars about the efficacy of "
432 "its products: It assumes that Big Tech is as good at influencing us as they "
433 "claim they are when they’re selling influencing products to credulous "
434 "customers. That’s a mistake because sales literature is not a reliable "
435 "indicator of a product’s efficacy."
436 msgstr ""
437
438 #. type: Content of: <article><sect1><para>
439 msgid ""
440 "Surveillance capitalism assumes that because advertisers buy a lot of what "
441 "Big Tech is selling, Big Tech must be selling something real. But Big Tech’s "
442 "massive sales could just as easily be the result of a popular delusion or "
443 "something even more pernicious: monopolistic control over our communications "
444 "and commerce."
445 msgstr ""
446
447 #. type: Content of: <article><sect1><para>
448 msgid ""
449 "Being watched changes your behavior, and not for the better. It creates "
450 "risks for our social progress. Zuboff’s book features beautifully wrought "
451 "explanations of these phenomena. But Zuboff also claims that surveillance "
452 "literally robs us of our free will — that when our personal data is mixed "
453 "with machine learning, it creates a system of persuasion so devastating that "
454 "we are helpless before it. That is, Facebook uses an algorithm to analyze "
455 "the data it nonconsensually extracts from your daily life and uses it to "
456 "customize your feed in ways that get you to buy stuff. It is a mind-control "
457 "ray out of a 1950s comic book, wielded by mad scientists whose "
458 "supercomputers guarantee them perpetual and total world domination."
459 msgstr ""
460
461 #. type: Content of: <article><sect1><title>
462 msgid "What is persuasion?"
463 msgstr ""
464
465 #. type: Content of: <article><sect1><para>
466 msgid ""
467 "To understand why you shouldn’t worry about mind-control rays — but why you "
468 "<emphasis>should</emphasis> worry about surveillance <emphasis>and</"
469 "emphasis> Big Tech — we must start by unpacking what we mean by "
470 "<quote>persuasion.</quote>"
471 msgstr ""
472
473 #. type: Content of: <article><sect1><para>
474 msgid ""
475 "Google, Facebook, and other surveillance capitalists promise their customers "
476 "(the advertisers) that if they use machine-learning tools trained on "
477 "unimaginably large data sets of nonconsensually harvested personal "
478 "information, they will be able to uncover ways to bypass the rational "
479 "faculties of the public and direct their behavior, creating a stream of "
480 "purchases, votes, and other desired outcomes."
481 msgstr ""
482
483 #. type: Content of: <article><sect1><blockquote><para>
484 msgid ""
485 "The impact of dominance far exceeds the impact of manipulation and should be "
486 "central to our analysis and any remedies we seek."
487 msgstr ""
488
489 #. type: Content of: <article><sect1><para>
490 msgid ""
491 "But there’s little evidence that this is happening. Instead, the predictions "
492 "that surveillance capitalism delivers to its customers are much less "
493 "impressive. Rather than finding ways to bypass our rational faculties, "
494 "surveillance capitalists like Mark Zuckerberg mostly do one or more of three "
495 "things:"
496 msgstr ""
497
498 #. type: Content of: <article><sect1><sect2><title>
499 msgid "1. Segmenting"
500 msgstr ""
501
502 #. type: Content of: <article><sect1><sect2><para>
503 msgid ""
504 "If you’re selling diapers, you have better luck if you pitch them to people "
505 "in maternity wards. Not everyone who enters or leaves a maternity ward just "
506 "had a baby, and not everyone who just had a baby is in the market for "
507 "diapers. But having a baby is a really reliable correlate of being in the "
508 "market for diapers, and being in a maternity ward is highly correlated with "
509 "having a baby. Hence diaper ads around maternity wards (and even pitchmen "
510 "for baby products, who haunt maternity wards with baskets full of freebies)."
511 msgstr ""
512
513 #. type: Content of: <article><sect1><sect2><para>
514 msgid ""
515 "Surveillance capitalism is segmenting times a billion. Diaper vendors can go "
516 "way beyond people in maternity wards (though they can do that, too, with "
517 "things like location-based mobile ads). They can target you based on "
518 "whether you’re reading articles about child-rearing, diapers, or a host of "
519 "other subjects, and data mining can suggest unobvious keywords to advertise "
520 "against. They can target you based on the articles you’ve recently read. "
521 "They can target you based on what you’ve recently purchased. They can target "
522 "you based on whether you receive emails or private messages about these "
523 "subjects — or even if you speak aloud about them (though Facebook and the "
524 "like convincingly claim that’s not happening — yet)."
525 msgstr ""
526 "Le capitalisme de surveillance se segmente par milliard. Les vendeurs de "
527 "couches peuvent aller bien au-delà des personnes dans les maternités (bien "
528 "qu’ils puissent le faire aussi, avec des choses comme les annonces mobiles "
529 "basées sur la localisation). Ils peuvent vous cibler selon que vous lisez "
530 "des articles sur l’éducation des enfants, les couches ou une foule d’autres "
531 "sujets, et l’exploration de données peut suggérer des mots-clés non évidents "
532 "sur lesquels faire de la publicité. Ils peuvent vous cibler en fonction des "
533 "articles que vous avez récemment lus. Ils peuvent vous cibler en fonction de "
534 "ce que vous avez récemment acheté. Ils peuvent vous cibler selon que vous "
535 "recevez des courriels ou des messages privés sur ces sujets – ou même si "
536 "vous en parlez à haute voix (bien que Facebook et autres affirment de "
537 "manière convaincante que cela ne se produit pas encore)."
538
539 #. type: Content of: <article><sect1><sect2><para>
540 msgid "This is seriously creepy."
541 msgstr ""
542
543 #. type: Content of: <article><sect1><sect2><para>
544 msgid "But it’s not mind control."
545 msgstr ""
546
547 #. type: Content of: <article><sect1><sect2><para>
548 msgid "It doesn’t deprive you of your free will. It doesn’t trick you."
549 msgstr ""
550
551 #. type: Content of: <article><sect1><sect2><para>
552 msgid ""
553 "Think of how surveillance capitalism works in politics. Surveillance "
554 "capitalist companies sell political operatives the power to locate people "
555 "who might be receptive to their pitch. Candidates campaigning on finance "
556 "industry corruption seek people struggling with debt; candidates campaigning "
557 "on xenophobia seek out racists. Political operatives have always targeted "
558 "their message whether their intentions were honorable or not: Union "
559 "organizers set up pitches at factory gates, and white supremacists hand out "
560 "fliers at John Birch Society meetings."
561 msgstr ""
562
563 #. type: Content of: <article><sect1><sect2><para>
564 msgid ""
565 "But this is an inexact and thus wasteful practice. The union organizer can’t "
566 "know which worker to approach on the way out of the factory gates and may "
567 "waste their time on a covert John Birch Society member; the white "
568 "supremacist doesn’t know which of the Birchers are so delusional that making "
569 "it to a meeting is as much as they can manage and which ones might be "
570 "convinced to cross the country to carry a tiki torch through the streets of "
571 "Charlottesville, Virginia."
572 msgstr ""
573
574 #. type: Content of: <article><sect1><sect2><para>
575 msgid ""
576 "Because targeting improves the yields on political pitches, it can "
577 "accelerate the pace of political upheaval by making it possible for everyone "
578 "who has secretly wished for the toppling of an autocrat — or just an 11-term "
579 "incumbent politician — to find everyone else who feels the same way at very "
580 "low cost. This has been critical to the rapid crystallization of recent "
581 "political movements including Black Lives Matter and Occupy Wall Street as "
582 "well as less savory players like the far-right white nationalist movements "
583 "that marched in Charlottesville."
584 msgstr ""
585
586 #. type: Content of: <article><sect1><sect2><para>
587 msgid ""
588 "It’s important to differentiate this kind of political organizing from "
589 "influence campaigns; finding people who secretly agree with you isn’t the "
590 "same as convincing people to agree with you. The rise of phenomena like "
591 "nonbinary or otherwise nonconforming gender identities is often "
592 "characterized by reactionaries as the result of online brainwashing "
593 "campaigns that convince impressionable people that they have been secretly "
594 "queer all along."
595 msgstr ""
596
597 #. type: Content of: <article><sect1><sect2><para>
598 msgid ""
599 "But the personal accounts of those who have come out tell a different story "
600 "where people who long harbored a secret about their gender were emboldened "
601 "by others coming forward and where people who knew that they were different "
602 "but lacked a vocabulary for discussing that difference learned the right "
603 "words from these low-cost means of finding people and learning about their "
604 "ideas."
605 msgstr ""
606
607 #. type: Content of: <article><sect1><sect2><title>
608 msgid "2. Deception"
609 msgstr ""
610
611 #. type: Content of: <article><sect1><sect2><para>
612 msgid ""
613 "Lies and fraud are pernicious, and surveillance capitalism supercharges them "
614 "through targeting. If you want to sell a fraudulent payday loan or subprime "
615 "mortgage, surveillance capitalism can help you find people who are both "
616 "desperate and unsophisticated and thus receptive to your pitch. This "
617 "accounts for the rise of many phenomena, like multilevel marketing schemes, "
618 "in which deceptive claims about potential earnings and the efficacy of sales "
619 "techniques are targeted at desperate people by advertising against search "
620 "queries that indicate, for example, someone struggling with ill-advised "
621 "loans."
622 msgstr ""
623
624 #. type: Content of: <article><sect1><sect2><para>
625 msgid ""
626 "Surveillance capitalism also abets fraud by making it easy to locate other "
627 "people who have been similarly deceived, forming a community of people who "
628 "reinforce one another’s false beliefs. Think of <ulink url=\"https://www."
629 "vulture.com/2020/01/the-dream-podcast-review.html\">the forums</ulink> where "
630 "people who are being victimized by multilevel marketing frauds gather to "
631 "trade tips on how to improve their luck in peddling the product."
632 msgstr ""
633
634 #. type: Content of: <article><sect1><sect2><para>
635 msgid ""
636 "Sometimes, online deception involves replacing someone’s correct beliefs "
637 "with incorrect ones, as it does in the anti-vaccination movement, whose "
638 "victims are often people who start out believing in vaccines but are "
639 "convinced by seemingly plausible evidence that leads them into the false "
640 "belief that vaccines are harmful."
641 msgstr ""
642
643 #. type: Content of: <article><sect1><sect2><para>
644 msgid ""
645 "But it’s much more common for fraud to succeed when it doesn’t have to "
646 "displace a true belief. When my daughter contracted head lice at daycare, "
647 "one of the daycare workers told me I could get rid of them by treating her "
648 "hair and scalp with olive oil. I didn’t know anything about head lice, and I "
649 "assumed that the daycare worker did, so I tried it (it didn’t work, and it "
650 "doesn’t work). It’s easy to end up with false beliefs when you simply don’t "
651 "know any better and when those beliefs are conveyed by someone who seems to "
652 "know what they’re doing."
653 msgstr ""
654
655 #. type: Content of: <article><sect1><sect2><para>
656 msgid ""
657 "This is pernicious and difficult — and it’s also the kind of thing the "
658 "internet can help guard against by making true information available, "
659 "especially in a form that exposes the underlying deliberations among parties "
660 "with sharply divergent views, such as Wikipedia. But it’s not brainwashing; "
661 "it’s fraud. In the <ulink url=\"https://datasociety.net/library/data-voids/"
662 "\">majority of cases</ulink>, the victims of these fraud campaigns have an "
663 "informational void filled in the customary way, by consulting a seemingly "
664 "reliable source. If I look up the length of the Brooklyn Bridge and learn "
665 "that it is 5,800 feet long, but in reality, it is 5,989 feet long, the "
666 "underlying deception is a problem, but it’s a problem with a simple remedy. "
667 "It’s a very different problem from the anti-vax issue in which someone’s "
668 "true belief is displaced by a false one by means of sophisticated persuasion."
669 msgstr ""
670
671 #. type: Content of: <article><sect1><sect2><title>
672 msgid "3. Domination"
673 msgstr ""
674
675 #. type: Content of: <article><sect1><sect2><para>
676 msgid ""
677 "Surveillance capitalism is the result of monopoly. Monopoly is the cause, "
678 "and surveillance capitalism and its negative outcomes are the effects of "
679 "monopoly. I’ll get into this in depth later, but for now, suffice it to say "
680 "that the tech industry has grown up with a radical theory of antitrust that "
681 "has allowed companies to grow by merging with their rivals, buying up their "
682 "nascent competitors, and expanding to control whole market verticals."
683 msgstr ""
684
685 #. type: Content of: <article><sect1><sect2><para>
686 msgid ""
687 "One example of how monopolism aids in persuasion is through dominance: "
688 "Google makes editorial decisions about its algorithms that determine the "
689 "sort order of the responses to our queries. If a cabal of fraudsters have "
690 "set out to trick the world into thinking that the Brooklyn Bridge is 5,800 "
691 "feet long, and if Google gives a high search rank to this group in response "
692 "to queries like <quote>How long is the Brooklyn Bridge?</quote> then the "
693 "first eight or 10 screens’ worth of Google results could be wrong. And since "
694 "most people don’t go beyond the first couple of results — let alone the "
695 "first <emphasis>page</emphasis> of results — Google’s choice means that many "
696 "people will be deceived."
697 msgstr ""
698
699 #. type: Content of: <article><sect1><sect2><para>
700 msgid ""
701 "Google’s dominance over search — more than 86% of web searches are performed "
702 "through Google — means that the way it orders its search results has an "
703 "outsized effect on public beliefs. Ironically, Google claims this is why it "
704 "can’t afford to have any transparency in its algorithm design: Google’s "
705 "search dominance makes the results of its sorting too important to risk "
706 "telling the world how it arrives at those results lest some bad actor "
707 "discover a flaw in the ranking system and exploit it to push its point of "
708 "view to the top of the search results. There’s an obvious remedy to a "
709 "company that is too big to audit: break it up into smaller pieces."
710 msgstr ""
711
712 #. type: Content of: <article><sect1><sect2><para>
713 msgid ""
714 "Zuboff calls surveillance capitalism a <quote>rogue capitalism</quote> whose "
715 "data-hoarding and machine-learning techniques rob us of our free will. But "
716 "influence campaigns that seek to displace existing, correct beliefs with "
717 "false ones have an effect that is small and temporary while monopolistic "
718 "dominance over informational systems has massive, enduring effects. "
719 "Controlling the results to the world’s search queries means controlling "
720 "access both to arguments and their rebuttals and, thus, control over much of "
721 "the world’s beliefs. If our concern is how corporations are foreclosing on "
722 "our ability to make up our own minds and determine our own futures, the "
723 "impact of dominance far exceeds the impact of manipulation and should be "
724 "central to our analysis and any remedies we seek."
725 msgstr ""
726
727 #. type: Content of: <article><sect1><sect2><title>
728 msgid "4. Bypassing our rational faculties"
729 msgstr ""
730
731 #. type: Content of: <article><sect1><sect2><para>
732 msgid ""
733 "<emphasis>This</emphasis> is the good stuff: using machine learning, "
734 "<quote>dark patterns,</quote> engagement hacking, and other techniques to "
735 "get us to do things that run counter to our better judgment. This is mind "
736 "control."
737 msgstr ""
738
739 #. type: Content of: <article><sect1><sect2><para>
740 msgid ""
741 "Some of these techniques have proven devastatingly effective (if only in the "
742 "short term). The use of countdown timers on a purchase completion page can "
743 "create a sense of urgency that causes you to ignore the nagging internal "
744 "voice suggesting that you should shop around or sleep on your decision. The "
745 "use of people from your social graph in ads can provide <quote>social proof</"
746 "quote> that a purchase is worth making. Even the auction system pioneered by "
747 "eBay is calculated to play on our cognitive blind spots, letting us feel "
748 "like we <quote>own</quote> something because we bid on it, thus encouraging "
749 "us to bid again when we are outbid to ensure that <quote>our</quote> things "
750 "stay ours."
751 msgstr ""
752
753 #. type: Content of: <article><sect1><sect2><para>
754 msgid ""
755 "Games are extraordinarily good at this. <quote>Free to play</quote> games "
756 "manipulate us through many techniques, such as presenting players with a "
757 "series of smoothly escalating challenges that create a sense of mastery and "
758 "accomplishment but which sharply transition into a set of challenges that "
759 "are impossible to overcome without paid upgrades. Add some social proof to "
760 "the mix — a stream of notifications about how well your friends are faring — "
761 "and before you know it, you’re buying virtual power-ups to get to the next "
762 "level."
763 msgstr ""
764
765 #. type: Content of: <article><sect1><sect2><para>
766 msgid ""
767 "Companies have risen and fallen on these techniques, and the <quote>fallen</"
768 "quote> part is worth paying attention to. In general, living things adapt to "
769 "stimulus: Something that is very compelling or noteworthy when you first "
770 "encounter it fades with repetition until you stop noticing it altogether. "
771 "Consider the refrigerator hum that irritates you when it starts up but "
772 "disappears into the background so thoroughly that you only notice it when it "
773 "stops again."
774 msgstr ""
775
776 #. type: Content of: <article><sect1><sect2><para>
777 msgid ""
778 "That’s why behavioral conditioning uses <quote>intermittent reinforcement "
779 "schedules.</quote> Instead of giving you a steady drip of encouragement or "
780 "setbacks, games and gamified services scatter rewards on a randomized "
781 "schedule — often enough to keep you interested and random enough that you "
782 "can never quite find the pattern that would make it boring."
783 msgstr ""
784
785 #. type: Content of: <article><sect1><sect2><para>
786 msgid ""
787 "Intermittent reinforcement is a powerful behavioral tool, but it also "
788 "represents a collective action problem for surveillance capitalism. The "
789 "<quote>engagement techniques</quote> invented by the behaviorists of "
790 "surveillance capitalist companies are quickly copied across the whole sector "
791 "so that what starts as a mysteriously compelling fillip in the design of a "
792 "service—like <quote>pull to refresh</quote> or alerts when someone likes "
793 "your posts or side quests that your characters get invited to while in the "
794 "midst of main quests—quickly becomes dully ubiquitous. The impossible-to-"
795 "nail-down nonpattern of randomized drips from your phone becomes a grey-"
796 "noise wall of sound as every single app and site starts to make use of "
797 "whatever seems to be working at the time."
798 msgstr ""
799
800 #. type: Content of: <article><sect1><sect2><para>
801 msgid ""
802 "From the surveillance capitalist’s point of view, our adaptive capacity is "
803 "like a harmful bacterium that deprives it of its food source — our attention "
804 "— and novel techniques for snagging that attention are like new antibiotics "
805 "that can be used to breach our defenses and destroy our self-determination. "
806 "And there <emphasis>are</emphasis> techniques like that. Who can forget the "
807 "Great Zynga Epidemic, when all of our friends were caught in "
808 "<emphasis>FarmVille</emphasis>’s endless, mindless dopamine loops? But every "
809 "new attention-commanding technique is jumped on by the whole industry and "
810 "used so indiscriminately that antibiotic resistance sets in. Given enough "
811 "repetition, almost all of us develop immunity to even the most powerful "
812 "techniques — by 2013, two years after Zynga’s peak, its user base had halved."
813 msgstr ""
814
815 #. type: Content of: <article><sect1><sect2><para>
816 msgid ""
817 "Not everyone, of course. Some people never adapt to stimulus, just as some "
818 "people never stop hearing the hum of the refrigerator. This is why most "
819 "people who are exposed to slot machines play them for a while and then move "
820 "on while a small and tragic minority liquidate their kids’ college funds, "
821 "buy adult diapers, and position themselves in front of a machine until they "
822 "collapse."
823 msgstr ""
824
825 #. type: Content of: <article><sect1><sect2><para>
826 msgid ""
827 "But surveillance capitalism’s margins on behavioral modification suck. "
828 "Tripling the rate at which someone buys a widget sounds great <ulink url="
829 "\"https://www.forbes.com/sites/priceonomics/2018/03/09/the-advertising-"
830 "conversion-rates-for-every-major-tech-platform/#2f6a67485957\">unless the "
831 "base rate is way less than 1%</ulink> with an improved rate of… still less "
832 "than 1%. Even penny slot machines pull down pennies for every spin while "
833 "surveillance capitalism rakes in infinitesimal penny fractions."
834 msgstr ""
835
836 #. type: Content of: <article><sect1><sect2><para>
837 msgid ""
838 "Slot machines’ high returns mean that they can be profitable just by "
839 "draining the fortunes of the small rump of people who are pathologically "
840 "vulnerable to them and unable to adapt to their tricks. But surveillance "
841 "capitalism can’t survive on the fractional pennies it brings down from that "
842 "vulnerable sliver — that’s why, after the Great Zynga Epidemic had finally "
843 "burned itself out, the small number of still-addicted players left behind "
844 "couldn’t sustain it as a global phenomenon. And new powerful attention "
845 "weapons aren’t easy to find, as is evidenced by the long years since the "
846 "last time Zynga had a hit. Despite the hundreds of millions of dollars that "
847 "Zynga has to spend on developing new tools to blast through our adaptation, "
848 "it has never managed to repeat the lucky accident that let it snag so much "
849 "of our attention for a brief moment in 2009. Powerhouses like Supercell have "
850 "fared a little better, but they are rare and throw away many failures for "
851 "every success."
852 msgstr ""
853
854 #. type: Content of: <article><sect1><sect2><para>
855 msgid ""
856 "The vulnerability of small segments of the population to dramatic, efficient "
857 "corporate manipulation is a real concern that’s worthy of our attention and "
858 "energy. But it’s not an existential threat to society."
859 msgstr ""
860
861 #. type: Content of: <article><sect1><title>
862 msgid ""
863 "If data is the new oil, then surveillance capitalism’s engine has a leak"
864 msgstr ""
865
866 #. type: Content of: <article><sect1><para>
867 msgid ""
868 "This adaptation problem offers an explanation for one of surveillance "
869 "capitalism’s most alarming traits: its relentless hunger for data and its "
870 "endless expansion of data-gathering capabilities through the spread of "
871 "sensors, online surveillance, and acquisition of data streams from third "
872 "parties."
873 msgstr ""
874
875 #. type: Content of: <article><sect1><para>
876 msgid ""
877 "Zuboff observes this phenomenon and concludes that data must be very "
878 "valuable if surveillance capitalism is so hungry for it. (In her words: "
879 "<quote>Just as industrial capitalism was driven to the continuous "
880 "intensification of the means of production, so surveillance capitalists and "
881 "their market players are now locked into the continuous intensification of "
882 "the means of behavioral modification and the gathering might of "
883 "instrumentarian power.</quote>) But what if the voracious appetite is "
884 "because data has such a short half-life — because people become inured so "
885 "quickly to new, data-driven persuasion techniques — that the companies are "
886 "locked in an arms race with our limbic system? What if it’s all a Red "
887 "Queen’s race where they have to run ever faster — collect ever-more data — "
888 "just to stay in the same spot?"
889 msgstr ""
890
891 #. type: Content of: <article><sect1><para>
892 msgid ""
893 "Of course, all of Big Tech’s persuasion techniques work in concert with one "
894 "another, and collecting data is useful beyond mere behavioral trickery."
895 msgstr ""
896
897 #. type: Content of: <article><sect1><para>
898 msgid ""
899 "If someone wants to recruit you to buy a refrigerator or join a pogrom, they "
900 "might use profiling and targeting to send messages to people they judge to "
901 "be good sales prospects. The messages themselves may be deceptive, making "
902 "claims about things you’re not very knowledgeable about (food safety and "
903 "energy efficiency or eugenics and historical claims about racial "
904 "superiority). They might use search engine optimization and/or armies of "
905 "fake reviewers and commenters and/or paid placement to dominate the "
906 "discourse so that any search for further information takes you back to their "
907 "messages. And finally, they may refine the different pitches using machine "
908 "learning and other techniques to figure out what kind of pitch works best on "
909 "someone like you."
910 msgstr ""
911
912 #. type: Content of: <article><sect1><para>
913 msgid ""
914 "Each phase of this process benefits from surveillance: The more data they "
915 "have, the more precisely they can profile you and target you with specific "
916 "messages. Think of how you’d sell a fridge if you knew that the warranty on "
917 "your prospect’s fridge just expired and that they were expecting a tax "
918 "rebate in April."
919 msgstr ""
920
921 #. type: Content of: <article><sect1><para>
922 msgid ""
923 "Also, the more data they have, the better they can craft deceptive messages "
924 "— if I know that you’re into genealogy, I might not try to feed you "
925 "pseudoscience about genetic differences between <quote>races,</quote> "
926 "sticking instead to conspiratorial secret histories of <quote>demographic "
927 "replacement</quote> and the like."
928 msgstr ""
929
930 #. type: Content of: <article><sect1><para>
931 msgid ""
932 "Facebook also helps you locate people who have the same odious or antisocial "
933 "views as you. It makes it possible to find other people who want to carry "
934 "tiki torches through the streets of Charlottesville in Confederate cosplay. "
935 "It can help you find other people who want to join your militia and go to "
936 "the border to look for undocumented migrants to terrorize. It can help you "
937 "find people who share your belief that vaccines are poison and that the "
938 "Earth is flat."
939 msgstr ""
940
941 #. type: Content of: <article><sect1><para>
942 msgid ""
943 "There is one way in which targeted advertising uniquely benefits those "
944 "advocating for socially unacceptable causes: It is invisible. Racism is "
945 "widely geographically dispersed, and there are few places where racists — "
946 "and only racists — gather. This is similar to the problem of selling "
947 "refrigerators in that potential refrigerator purchasers are geographically "
948 "dispersed and there are few places where you can buy an ad that will be "
949 "primarily seen by refrigerator customers. But buying a refrigerator is "
950 "socially acceptable while being a Nazi is not, so you can buy a billboard or "
951 "advertise in the newspaper sports section for your refrigerator business, "
952 "and the only potential downside is that your ad will be seen by a lot of "
953 "people who don’t want refrigerators, resulting in a lot of wasted expense."
954 msgstr ""
955
956 #. type: Content of: <article><sect1><para>
957 msgid ""
958 "But even if you wanted to advertise your Nazi movement on a billboard or "
959 "prime-time TV or the sports section, you would struggle to find anyone "
960 "willing to sell you the space for your ad partly because they disagree with "
961 "your views and partly because they fear censure (boycott, reputational "
962 "damage, etc.) from other people who disagree with your views."
963 msgstr ""
964
965 #. type: Content of: <article><sect1><para>
966 msgid ""
967 "Targeted ads solve this problem: On the internet, every ad unit can be "
968 "different for every person, meaning that you can buy ads that are only shown "
969 "to people who appear to be Nazis and not to people who hate Nazis. When "
970 "there’s spillover — when someone who hates racism is shown a racist "
971 "recruiting ad — there is some fallout; the platform or publication might get "
972 "an angry public or private denunciation. But the nature of the risk assumed "
973 "by an online ad buyer is different than the risks to a traditional publisher "
974 "or billboard owner who might want to run a Nazi ad."
975 msgstr ""
976
977 #. type: Content of: <article><sect1><para>
978 msgid ""
979 "Online ads are placed by algorithms that broker between a diverse ecosystem "
980 "of self-serve ad platforms that anyone can buy an ad through, so the Nazi ad "
981 "that slips onto your favorite online publication isn’t seen as their moral "
982 "failing but rather as a failure in some distant, upstream ad supplier. When "
983 "a publication gets a complaint about an offensive ad that’s appearing in one "
984 "of its units, it can take some steps to block that ad, but the Nazi might "
985 "buy a slightly different ad from a different broker serving the same unit. "
986 "And in any event, internet users increasingly understand that when they see "
987 "an ad, it’s likely that the advertiser did not choose that publication and "
988 "that the publication has no idea who its advertisers are."
989 msgstr ""
990
991 #. type: Content of: <article><sect1><para>
992 msgid ""
993 "These layers of indirection between advertisers and publishers serve as "
994 "moral buffers: Today’s moral consensus is largely that publishers shouldn’t "
995 "be held responsible for the ads that appear on their pages because they’re "
996 "not actively choosing to put those ads there. Because of this, Nazis are "
997 "able to overcome significant barriers to organizing their movement."
998 msgstr ""
999
1000 #. type: Content of: <article><sect1><para>
1001 msgid ""
1002 "Data has a complex relationship with domination. Being able to spy on your "
1003 "customers can alert you to their preferences for your rivals and allow you "
1004 "to head off your rivals at the pass."
1005 msgstr ""
1006
1007 #. type: Content of: <article><sect1><para>
1008 msgid ""
1009 "More importantly, if you can dominate the information space while also "
1010 "gathering data, then you make other deceptive tactics stronger because it’s "
1011 "harder to break out of the web of deceit you’re spinning. Domination — that "
1012 "is, ultimately becoming a monopoly — and not the data itself is the "
1013 "supercharger that makes every tactic worth pursuing because monopolistic "
1014 "domination deprives your target of an escape route."
1015 msgstr ""
1016
1017 #. type: Content of: <article><sect1><para>
1018 msgid ""
1019 "If you’re a Nazi who wants to ensure that your prospects primarily see "
1020 "deceptive, confirming information when they search for more, you can improve "
1021 "your odds by seeding the search terms they use through your initial "
1022 "communications. You don’t need to own the top 10 results for <quote>voter "
1023 "suppression</quote> if you can convince your marks to confine their search "
1024 "terms to <quote>voter fraud,</quote> which throws up a very different set of "
1025 "search results."
1026 msgstr ""
1027
1028 #. type: Content of: <article><sect1><para>
1029 msgid ""
1030 "Surveillance capitalists are like stage mentalists who claim that their "
1031 "extraordinary insights into human behavior let them guess the word that you "
1032 "wrote down and folded up in your pocket but who really use shills, hidden "
1033 "cameras, sleight of hand, and brute-force memorization to amaze you."
1034 msgstr ""
1035
1036 #. type: Content of: <article><sect1><para>
1037 msgid ""
1038 "Or perhaps they’re more like pick-up artists, the misogynistic cult that "
1039 "promises to help awkward men have sex with women by teaching them "
1040 "<quote>neurolinguistic programming</quote> phrases, body language "
1041 "techniques, and psychological manipulation tactics like <quote>negging</"
1042 "quote> — offering unsolicited negative feedback to women to lower their self-"
1043 "esteem and prick their interest."
1044 msgstr ""
1045
1046 #. type: Content of: <article><sect1><para>
1047 msgid ""
1048 "Some pick-up artists eventually manage to convince women to go home with "
1049 "them, but it’s not because these men have figured out how to bypass women’s "
1050 "critical faculties. Rather, pick-up artists’ <quote>success</quote> stories "
1051 "are a mix of women who were incapable of giving consent, women who were "
1052 "coerced, women who were intoxicated, self-destructive women, and a few women "
1053 "who were sober and in command of their faculties but who didn’t realize "
1054 "straightaway that they were with terrible men but rectified the error as "
1055 "soon as they could."
1056 msgstr ""
1057
1058 #. type: Content of: <article><sect1><para>
1059 msgid ""
1060 "Pick-up artists <emphasis>believe</emphasis> they have figured out a secret "
1061 "back door that bypasses women’s critical faculties, but they haven’t. Many "
1062 "of the tactics they deploy, like negging, became the butt of jokes (just "
1063 "like people joke about bad ad targeting), and there’s a good chance that "
1064 "anyone they try these tactics on will immediately recognize them and dismiss "
1065 "the men who use them as irredeemable losers."
1066 msgstr ""
1067
1068 #. type: Content of: <article><sect1><para>
1069 msgid ""
1070 "Pick-up artists are proof that people can believe they have developed a "
1071 "system of mind control <emphasis>even when it doesn’t work</emphasis>. Pick-"
1072 "up artists simply exploit the fact that one-in-a-million chances can come "
1073 "through for you if you make a million attempts, and then they assume that "
1074 "the other 999,999 times, they simply performed the technique incorrectly and "
1075 "commit themselves to doing better next time. There’s only one group of "
1076 "people who find pick-up artist lore reliably convincing: other would-be pick-"
1077 "up artists whose anxiety and insecurity make them vulnerable to scammers and "
1078 "delusional men who convince them that if they pay for tutelage and follow "
1079 "instructions, then they will someday succeed. Pick-up artists assume they "
1080 "fail to entice women because they are bad at being pick-up artists, not "
1081 "because pick-up artistry is bullshit. Pick-up artists are bad at selling "
1082 "themselves to women, but they’re much better at selling themselves to men "
1083 "who pay to learn the secrets of pick-up artistry."
1084 msgstr ""
1085
1086 #. type: Content of: <article><sect1><para>
1087 msgid ""
1088 "Department store pioneer John Wanamaker is said to have lamented, "
1089 "<quote>Half the money I spend on advertising is wasted; the trouble is I "
1090 "don’t know which half.</quote> The fact that Wanamaker thought that only "
1091 "half of his advertising spending was wasted is a tribute to the "
1092 "persuasiveness of advertising executives, who are <emphasis>much</emphasis> "
1093 "better at convincing potential clients to buy their services than they are "
1094 "at convincing the general public to buy their clients’ wares."
1095 msgstr ""
1096
1097 #. type: Content of: <article><sect1><title>
1098 msgid "What is Facebook?"
1099 msgstr ""
1100
1101 #. type: Content of: <article><sect1><para>
1102 msgid ""
1103 "Facebook is heralded as the origin of all of our modern plagues, and it’s "
1104 "not hard to see why. Some tech companies want to lock their users in but "
1105 "make their money by monopolizing access to the market for apps for their "
1106 "devices and gouging them on prices rather than by spying on them (like "
1107 "Apple). Some companies don’t care about locking in users because they’ve "
1108 "figured out how to spy on them no matter where they are and what they’re "
1109 "doing and can turn that surveillance into money (Google). Facebook alone "
1110 "among the Western tech giants has built a business based on locking in its "
1111 "users <emphasis>and</emphasis> spying on them all the time."
1112 msgstr ""
1113
1114 #. type: Content of: <article><sect1><para>
1115 msgid ""
1116 "Facebook’s surveillance regime is really without parallel in the Western "
1117 "world. Though Facebook tries to prevent itself from being visible on the "
1118 "public web, hiding most of what goes on there from people unless they’re "
1119 "logged into Facebook, the company has nevertheless booby-trapped the entire "
1120 "web with surveillance tools in the form of Facebook <quote>Like</quote> "
1121 "buttons that web publishers include on their sites to boost their Facebook "
1122 "profiles. Facebook also makes various libraries and other useful code "
1123 "snippets available to web publishers that act as surveillance tendrils on "
1124 "the sites where they’re used, funneling information about visitors to the "
1125 "site — newspapers, dating sites, message boards — to Facebook."
1126 msgstr ""
1127
1128 #. type: Content of: <article><sect1><blockquote><para>
1129 msgid ""
1130 "Big Tech is able to practice surveillance not just because it is tech but "
1131 "because it is <emphasis>big</emphasis>."
1132 msgstr ""
1133
1134 #. type: Content of: <article><sect1><para>
1135 msgid ""
1136 "Facebook offers similar tools to app developers, so the apps — games, fart "
1137 "machines, business review services, apps for keeping abreast of your kid’s "
1138 "schooling — you use will send information about your activities to Facebook "
1139 "even if you don’t have a Facebook account and even if you don’t download or "
1140 "use Facebook apps. On top of all that, Facebook buys data from third-party "
1141 "brokers on shopping habits, physical location, use of <quote>loyalty</quote> "
1142 "programs, financial transactions, etc., and cross-references that with the "
1143 "dossiers it develops on activity on Facebook and with apps and the public "
1144 "web."
1145 msgstr ""
1146
1147 #. type: Content of: <article><sect1><para>
1148 msgid ""
1149 "Though it’s easy to integrate the web with Facebook — linking to news "
1150 "stories and such — Facebook products are generally not available to be "
1151 "integrated back into the web itself. You can embed a tweet in a Facebook "
1152 "post, but if you embed a Facebook post in a tweet, you just get a link back "
1153 "to Facebook and must log in before you can see it. Facebook has used extreme "
1154 "technological and legal countermeasures to prevent rivals from allowing "
1155 "their users to embed Facebook snippets in competing services or to create "
1156 "alternative interfaces to Facebook that merge your Facebook inbox with those "
1157 "of other services that you use."
1158 msgstr ""
1159
1160 #. type: Content of: <article><sect1><para>
1161 msgid ""
1162 "And Facebook is incredibly popular, with 2.3 billion claimed users (though "
1163 "many believe this figure to be inflated). Facebook has been used to organize "
1164 "genocidal pogroms, racist riots, anti-vaccination movements, flat Earth "
1165 "cults, and the political lives of some of the world’s ugliest, most brutal "
1166 "autocrats. There are some really alarming things going on in the world, and "
1167 "Facebook is implicated in many of them, so it’s easy to conclude that these "
1168 "bad things are the result of Facebook’s mind-control system, which it rents "
1169 "out to anyone with a few bucks to spend."
1170 msgstr ""
1171
1172 #. type: Content of: <article><sect1><para>
1173 msgid ""
1174 "To understand what role Facebook plays in the formulation and mobilization "
1175 "of antisocial movements, we need to understand the dual nature of Facebook."
1176 msgstr ""
1177
1178 #. type: Content of: <article><sect1><para>
1179 msgid ""
1180 "Because it has a lot of users and a lot of data about those users, Facebook "
1181 "is a very efficient tool for locating people with hard-to-find traits, the "
1182 "kinds of traits that are widely diffused in the population such that "
1183 "advertisers have historically struggled to find a cost-effective way to "
1184 "reach them. Think back to refrigerators: Most of us only replace our major "
1185 "appliances a few times in our entire lives. If you’re a refrigerator "
1186 "manufacturer or retailer, you have these brief windows in the life of a "
1187 "consumer during which they are pondering a purchase, and you have to somehow "
1188 "reach them. Anyone who’s ever registered a title change after buying a house "
1189 "can attest that appliance manufacturers are incredibly desperate to reach "
1190 "anyone who has even the slenderest chance of being in the market for a new "
1191 "fridge."
1192 msgstr ""
1193
1194 #. type: Content of: <article><sect1><para>
1195 msgid ""
1196 "Facebook makes finding people shopping for refrigerators a <emphasis>lot</"
1197 "emphasis> easier. It can target ads to people who’ve registered a new home "
1198 "purchase, to people who’ve searched for refrigerator buying advice, to "
1199 "people who have complained about their fridge dying, or any combination "
1200 "thereof. It can even target people who’ve recently bought <emphasis>other</"
1201 "emphasis> kitchen appliances on the theory that someone who’s just replaced "
1202 "their stove and dishwasher might be in a fridge-buying kind of mood. The "
1203 "vast majority of people who are reached by these ads will not be in the "
1204 "market for a new fridge, but — crucially — the percentage of people who "
1205 "<emphasis>are</emphasis> looking for fridges that these ads reach is "
1206 "<emphasis>much</emphasis> larger than it is than for any group that might be "
1207 "subjected to traditional, offline targeted refrigerator marketing."
1208 msgstr ""
1209
1210 #. type: Content of: <article><sect1><para>
1211 msgid ""
1212 "Facebook also makes it a lot easier to find people who have the same rare "
1213 "disease as you, which might have been impossible in earlier eras — the "
1214 "closest fellow sufferer might otherwise be hundreds of miles away. It makes "
1215 "it easier to find people who went to the same high school as you even though "
1216 "decades have passed and your former classmates have all been scattered to "
1217 "the four corners of the Earth."
1218 msgstr ""
1219
1220 #. type: Content of: <article><sect1><para>
1221 msgid ""
1222 "Facebook also makes it much easier to find people who hold the same rare "
1223 "political beliefs as you. If you’ve always harbored a secret affinity for "
1224 "socialism but never dared utter this aloud lest you be demonized by your "
1225 "neighbors, Facebook can help you discover other people who feel the same way "
1226 "(and it might just demonstrate to you that your affinity is more widespread "
1227 "than you ever suspected). It can make it easier to find people who share "
1228 "your sexual identity. And again, it can help you to understand that what "
1229 "you thought was a shameful secret that affected only you was really a widely "
1230 "shared trait, giving you both comfort and the courage to come out to the "
1231 "people in your life."
1232 msgstr ""
1233
1234 #. type: Content of: <article><sect1><para>
1235 msgid ""
1236 "All of this presents a dilemma for Facebook: Targeting makes the company’s "
1237 "ads more effective than traditional ads, but it also lets advertisers see "
1238 "just how effective their ads are. While advertisers are pleased to learn "
1239 "that Facebook ads are more effective than ads on systems with less "
1240 "sophisticated targeting, advertisers can also see that in nearly every case, "
1241 "the people who see their ads ignore them. Or, at best, the ads work on a "
1242 "subconscious level, creating nebulous unmeasurables like <quote>brand "
1243 "recognition.</quote> This means that the price per ad is very low in nearly "
1244 "every case."
1245 msgstr ""
1246
1247 #. type: Content of: <article><sect1><para>
1248 msgid ""
1249 "To make things worse, many Facebook groups spark precious little discussion. "
1250 "Your little-league soccer team, the people with the same rare disease as "
1251 "you, and the people you share a political affinity with may exchange the odd "
1252 "flurry of messages at critical junctures, but on a daily basis, there’s not "
1253 "much to say to your old high school chums or other hockey-card collectors."
1254 msgstr ""
1255
1256 #. type: Content of: <article><sect1><para>
1257 msgid ""
1258 "With nothing but <quote>organic</quote> discussion, Facebook would not "
1259 "generate enough traffic to sell enough ads to make the money it needs to "
1260 "continually expand by buying up its competitors while returning handsome "
1261 "sums to its investors."
1262 msgstr ""
1263
1264 #. type: Content of: <article><sect1><para>
1265 msgid ""
1266 "So Facebook has to gin up traffic by sidetracking its own forums: Every time "
1267 "Facebook’s algorithm injects controversial materials — inflammatory "
1268 "political articles, conspiracy theories, outrage stories — into a group, it "
1269 "can hijack that group’s nominal purpose with its desultory discussions and "
1270 "supercharge those discussions by turning them into bitter, unproductive "
1271 "arguments that drag on and on. Facebook is optimized for engagement, not "
1272 "happiness, and it turns out that automated systems are pretty good at "
1273 "figuring out things that people will get angry about."
1274 msgstr ""
1275
1276 #. type: Content of: <article><sect1><para>
1277 msgid ""
1278 "Facebook <emphasis>can</emphasis> modify our behavior but only in a couple "
1279 "of trivial ways. First, it can lock in all your friends and family members "
1280 "so that you check and check and check with Facebook to find out what they "
1281 "are up to; and second, it can make you angry and anxious. It can force you "
1282 "to choose between being interrupted constantly by updates — a process that "
1283 "breaks your concentration and makes it hard to be introspective — and "
1284 "staying in touch with your friends. This is a very limited form of mind "
1285 "control, and it can only really make us miserable, angry, and anxious."
1286 msgstr ""
1287
1288 #. type: Content of: <article><sect1><para>
1289 msgid ""
1290 "This is why Facebook’s targeting systems — both the ones it shows to "
1291 "advertisers and the ones that let users find people who share their "
1292 "interests — are so next-gen and smooth and easy to use as well as why its "
1293 "message boards have a toolset that seems like it hasn’t changed since the "
1294 "mid-2000s. If Facebook delivered an equally flexible, sophisticated message-"
1295 "reading system to its users, those users could defend themselves against "
1296 "being nonconsensually eyeball-fucked with Donald Trump headlines."
1297 msgstr ""
1298
1299 #. type: Content of: <article><sect1><para>
1300 msgid ""
1301 "The more time you spend on Facebook, the more ads it gets to show you. The "
1302 "solution to Facebook’s ads only working one in a thousand times is for the "
1303 "company to try to increase how much time you spend on Facebook by a factor "
1304 "of a thousand. Rather than thinking of Facebook as a company that has "
1305 "figured out how to show you exactly the right ad in exactly the right way to "
1306 "get you to do what its advertisers want, think of it as a company that has "
1307 "figured out how to make you slog through an endless torrent of arguments "
1308 "even though they make you miserable, spending so much time on the site that "
1309 "it eventually shows you at least one ad that you respond to."
1310 msgstr ""
1311
1312 #. type: Content of: <article><sect1><title>
1313 msgid "Monopoly and the right to the future tense"
1314 msgstr ""
1315
1316 #. type: Content of: <article><sect1><para>
1317 msgid ""
1318 "Zuboff and her cohort are particularly alarmed at the extent to which "
1319 "surveillance allows corporations to influence our decisions, taking away "
1320 "something she poetically calls <quote>the right to the future tense</quote> "
1321 "— that is, the right to decide for yourself what you will do in the future."
1322 msgstr ""
1323
1324 #. type: Content of: <article><sect1><para>
1325 msgid ""
1326 "It’s true that advertising can tip the scales one way or another: When "
1327 "you’re thinking of buying a fridge, a timely fridge ad might end the search "
1328 "on the spot. But Zuboff puts enormous and undue weight on the persuasive "
1329 "power of surveillance-based influence techniques. Most of these don’t work "
1330 "very well, and the ones that do won’t work for very long. The makers of "
1331 "these influence tools are confident they will someday refine them into "
1332 "systems of total control, but they are hardly unbiased observers, and the "
1333 "risks from their dreams coming true are very speculative."
1334 msgstr ""
1335
1336 #. type: Content of: <article><sect1><para>
1337 msgid ""
1338 "By contrast, Zuboff is rather sanguine about 40 years of lax antitrust "
1339 "practice that has allowed a handful of companies to dominate the internet, "
1340 "ushering in an information age with, <ulink url=\"https://twitter.com/"
1341 "tveastman/status/1069674780826071040\">as one person on Twitter noted</"
1342 "ulink>, five giant websites each filled with screenshots of the other four."
1343 msgstr ""
1344
1345 #. type: Content of: <article><sect1><para>
1346 msgid ""
1347 "However, if we are to be alarmed that we might lose the right to choose for "
1348 "ourselves what our future will hold, then monopoly’s nonspeculative, "
1349 "concrete, here-and-now harms should be front and center in our debate over "
1350 "tech policy."
1351 msgstr ""
1352
1353 #. type: Content of: <article><sect1><para>
1354 msgid ""
1355 "Start with <quote>digital rights management.</quote> In 1998, Bill Clinton "
1356 "signed the Digital Millennium Copyright Act (DMCA) into law. It’s a complex "
1357 "piece of legislation with many controversial clauses but none more so than "
1358 "Section 1201, the <quote>anti-circumvention</quote> rule."
1359 msgstr ""
1360
1361 #. type: Content of: <article><sect1><para>
1362 msgid ""
1363 "This is a blanket ban on tampering with systems that restrict access to "
1364 "copyrighted works. The ban is so thoroughgoing that it prohibits removing a "
1365 "copyright lock even when no copyright infringement takes place. This is by "
1366 "design: The activities that the DMCA’s Section 1201 sets out to ban are not "
1367 "copyright infringements; rather, they are legal activities that frustrate "
1368 "manufacturers’ commercial plans."
1369 msgstr ""
1370
1371 #. type: Content of: <article><sect1><para>
1372 msgid ""
1373 "For example, Section 1201’s first major application was on DVD players as a "
1374 "means of enforcing the region coding built into those devices. DVD-CCA, the "
1375 "body that standardized DVDs and DVD players, divided the world into six "
1376 "regions and specified that DVD players must check each disc to determine "
1377 "which regions it was authorized to be played in. DVD players would have "
1378 "their own corresponding region (a DVD player bought in the U.S. would be "
1379 "region 1 while one bought in India would be region 5). If the player and the "
1380 "disc’s region matched, the player would play the disc; otherwise, it would "
1381 "reject it."
1382 msgstr ""
1383
1384 #. type: Content of: <article><sect1><para>
1385 msgid ""
1386 "However, watching a lawfully produced disc in a country other than the one "
1387 "where you purchased it is not copyright infringement — it’s the opposite. "
1388 "Copyright law imposes this duty on customers for a movie: You must go into a "
1389 "store, find a licensed disc, and pay the asking price. Do that — and "
1390 "<emphasis>nothing else</emphasis> — and you and copyright are square with "
1391 "one another."
1392 msgstr ""
1393
1394 #. type: Content of: <article><sect1><para>
1395 msgid ""
1396 "The fact that a movie studio wants to charge Indians less than Americans or "
1397 "release in Australia later than it releases in the U.K. has no bearing on "
1398 "copyright law. Once you lawfully acquire a DVD, it is no copyright "
1399 "infringement to watch it no matter where you happen to be."
1400 msgstr ""
1401
1402 #. type: Content of: <article><sect1><para>
1403 msgid ""
1404 "So DVD and DVD player manufacturers would not be able to use accusations of "
1405 "abetting copyright infringement to punish manufacturers who made "
1406 "noncompliant players that would play discs from any region or repair shops "
1407 "that modified players to let you watch out-of-region discs or software "
1408 "programmers who created programs to let you do this."
1409 msgstr ""
1410
1411 #. type: Content of: <article><sect1><para>
1412 msgid ""
1413 "That’s where Section 1201 of the DMCA comes in: By banning tampering with an "
1414 "<quote>access control,</quote> the rule gave manufacturers and rights "
1415 "holders standing to sue competitors who released superior products with "
1416 "lawful features that the market demanded (in this case, region-free players)."
1417 msgstr ""
1418
1419 #. type: Content of: <article><sect1><para>
1420 msgid ""
1421 "This is an odious scam against consumers, but as time went by, Section 1201 "
1422 "grew to encompass a rapidly expanding constellation of devices and services "
1423 "as canny manufacturers have realized certain things:"
1424 msgstr ""
1425
1426 #. type: Content of: <article><sect1><itemizedlist><listitem><para>
1427 msgid ""
1428 "Any device with software in it contains a <quote>copyrighted work</quote> — "
1429 "i.e., the software."
1430 msgstr ""
1431
1432 #. type: Content of: <article><sect1><itemizedlist><listitem><para>
1433 msgid ""
1434 "A device can be designed so that reconfiguring the software requires "
1435 "bypassing an <quote>access control for copyrighted works,</quote> which is a "
1436 "potential felony under Section 1201."
1437 msgstr ""
1438
1439 #. type: Content of: <article><sect1><itemizedlist><listitem><para>
1440 msgid ""
1441 "Thus, companies can control their customers’ behavior after they take home "
1442 "their purchases by designing products so that all unpermitted uses require "
1443 "modifications that fall afoul of Section 1201."
1444 msgstr ""
1445
1446 #. type: Content of: <article><sect1><para>
1447 msgid ""
1448 "Section 1201 then becomes a means for manufacturers of all descriptions to "
1449 "force their customers to arrange their affairs to benefit the manufacturers’ "
1450 "shareholders instead of themselves."
1451 msgstr ""
1452
1453 #. type: Content of: <article><sect1><para>
1454 msgid ""
1455 "This manifests in many ways: from a new generation of inkjet printers that "
1456 "use countermeasures to prevent third-party ink that cannot be bypassed "
1457 "without legal risks to similar systems in tractors that prevent third-party "
1458 "technicians from swapping in the manufacturer’s own parts that are not "
1459 "recognized by the tractor’s control system until it is supplied with a "
1460 "manufacturer’s unlock code."
1461 msgstr ""
1462
1463 #. type: Content of: <article><sect1><para>
1464 msgid ""
1465 "Closer to home, Apple’s iPhones use these measures to prevent both third-"
1466 "party service and third-party software installation. This allows Apple to "
1467 "decide when an iPhone is beyond repair and must be shredded and landfilled "
1468 "as opposed to the iPhone’s purchaser. (Apple is notorious for its "
1469 "environmentally catastrophic policy of destroying old electronics rather "
1470 "than permitting them to be cannibalized for parts.) This is a very useful "
1471 "power to wield, especially in light of CEO Tim Cook’s January 2019 warning "
1472 "to investors that the company’s profits are endangered by customers choosing "
1473 "to hold onto their phones for longer rather than replacing them."
1474 msgstr ""
1475
1476 #. type: Content of: <article><sect1><para>
1477 msgid ""
1478 "Apple’s use of copyright locks also allows it to establish a monopoly over "
1479 "how its customers acquire software for their mobile devices. The App Store’s "
1480 "commercial terms guarantee Apple a share of all revenues generated by the "
1481 "apps sold there, meaning that Apple gets paid when you buy an app from its "
1482 "store and then continues to get paid every time you buy something using that "
1483 "app. This comes out of the bottom line of software developers, who must "
1484 "either charge more or accept lower profits for their products."
1485 msgstr ""
1486
1487 #. type: Content of: <article><sect1><para>
1488 msgid ""
1489 "Crucially, Apple’s use of copyright locks gives it the power to make "
1490 "editorial decisions about which apps you may and may not install on your own "
1491 "device. Apple has used this power to <ulink url=\"https://www.telegraph.co."
1492 "uk/technology/apple/5982243/Apple-bans-dictionary-from-App-Store-over-swear-"
1493 "words.html\">reject dictionaries</ulink> for containing obscene words; to "
1494 "<ulink url=\"https://www.vice.com/en_us/article/538kan/apple-just-banned-the-"
1495 "app-that-tracks-us-drone-strikes-again\">limit political speech</ulink>, "
1496 "especially from apps that make sensitive political commentary such as an app "
1497 "that notifies you every time a U.S. drone kills someone somewhere in the "
1498 "world; and to <ulink url=\"https://www.eurogamer.net/articles/2016-05-19-"
1499 "palestinian-indie-game-must-not-be-called-a-game-apple-says\">object to a "
1500 "game</ulink> that commented on the Israel-Palestine conflict."
1501 msgstr ""
1502
1503 #. type: Content of: <article><sect1><para>
1504 msgid ""
1505 "Apple often justifies monopoly power over software installation in the name "
1506 "of security, arguing that its vetting of apps for its store means that it "
1507 "can guard its users against apps that contain surveillance code. But this "
1508 "cuts both ways. In China, the government <ulink url=\"https://www.ft.com/"
1509 "content/ad42e536-cf36-11e7-b781-794ce08b24dc\">ordered Apple to prohibit the "
1510 "sale of privacy tools</ulink> like VPNs with the exception of VPNs that had "
1511 "deliberately introduced flaws designed to let the Chinese state eavesdrop on "
1512 "users. Because Apple uses technological countermeasures — with legal "
1513 "backstops — to block customers from installing unauthorized apps, Chinese "
1514 "iPhone owners cannot readily (or legally) acquire VPNs that would protect "
1515 "them from Chinese state snooping."
1516 msgstr ""
1517
1518 #. type: Content of: <article><sect1><para>
1519 msgid ""
1520 "Zuboff calls surveillance capitalism a <quote>rogue capitalism.</quote> "
1521 "Theoreticians of capitalism claim that its virtue is that it <ulink url="
1522 "\"https://en.wikipedia.org/wiki/Price_signal\">aggregates information in the "
1523 "form of consumers’ decisions</ulink>, producing efficient markets. "
1524 "Surveillance capitalism’s supposed power to rob its victims of their free "
1525 "will through computationally supercharged influence campaigns means that our "
1526 "markets no longer aggregate customers’ decisions because we customers no "
1527 "longer decide — we are given orders by surveillance capitalism’s mind-"
1528 "control rays."
1529 msgstr ""
1530
1531 #. type: Content of: <article><sect1><para>
1532 msgid ""
1533 "If our concern is that markets cease to function when consumers can no "
1534 "longer make choices, then copyright locks should concern us at "
1535 "<emphasis>least</emphasis> as much as influence campaigns. An influence "
1536 "campaign might nudge you to buy a certain brand of phone; but the copyright "
1537 "locks on that phone absolutely determine where you get it serviced, which "
1538 "apps can run on it, and when you have to throw it away rather than fixing it."
1539 msgstr ""
1540
1541 #. type: Content of: <article><sect1><title>
1542 msgid "Search order and the right to the future tense"
1543 msgstr ""
1544
1545 #. type: Content of: <article><sect1><para>
1546 msgid ""
1547 "Markets are posed as a kind of magic: By discovering otherwise hidden "
1548 "information conveyed by the free choices of consumers, those consumers’ "
1549 "local knowledge is integrated into a self-correcting system that makes "
1550 "efficient allocations—more efficient than any computer could calculate. But "
1551 "monopolies are incompatible with that notion. When you only have one app "
1552 "store, the owner of the store — not the consumer — decides on the range of "
1553 "choices. As Boss Tweed once said, <quote>I don’t care who does the electing, "
1554 "so long as I get to do the nominating.</quote> A monopolized market is an "
1555 "election whose candidates are chosen by the monopolist."
1556 msgstr ""
1557
1558 #. type: Content of: <article><sect1><para>
1559 msgid ""
1560 "This ballot rigging is made more pernicious by the existence of monopolies "
1561 "over search order. Google’s search market share is about 90%. When Google’s "
1562 "ranking algorithm puts a result for a popular search term in its top 10, "
1563 "that helps determine the behavior of millions of people. If Google’s answer "
1564 "to <quote>Are vaccines dangerous?</quote> is a page that rebuts anti-vax "
1565 "conspiracy theories, then a sizable portion of the public will learn that "
1566 "vaccines are safe. If, on the other hand, Google sends those people to a "
1567 "site affirming the anti-vax conspiracies, a sizable portion of those "
1568 "millions will come away convinced that vaccines are dangerous."
1569 msgstr ""
1570
1571 #. type: Content of: <article><sect1><para>
1572 msgid ""
1573 "Google’s algorithm is often tricked into serving disinformation as a "
1574 "prominent search result. But in these cases, Google isn’t persuading people "
1575 "to change their minds; it’s just presenting something untrue as fact when "
1576 "the user has no cause to doubt it."
1577 msgstr ""
1578
1579 #. type: Content of: <article><sect1><para>
1580 msgid ""
1581 "This is true whether the search is for <quote>Are vaccines dangerous?</"
1582 "quote> or <quote>best restaurants near me.</quote> Most users will never "
1583 "look past the first page of search results, and when the overwhelming "
1584 "majority of people all use the same search engine, the ranking algorithm "
1585 "deployed by that search engine will determine myriad outcomes (whether to "
1586 "adopt a child, whether to have cancer surgery, where to eat dinner, where to "
1587 "move, where to apply for a job) to a degree that vastly outstrips any "
1588 "behavioral outcomes dictated by algorithmic persuasion techniques."
1589 msgstr ""
1590
1591 #. type: Content of: <article><sect1><para>
1592 msgid ""
1593 "Many of the questions we ask search engines have no empirically correct "
1594 "answers: <quote>Where should I eat dinner?</quote> is not an objective "
1595 "question. Even questions that do have correct answers (<quote>Are vaccines "
1596 "dangerous?</quote>) don’t have one empirically superior source for that "
1597 "answer. Many pages affirm the safety of vaccines, so which one goes first? "
1598 "Under conditions of competition, consumers can choose from many search "
1599 "engines and stick with the one whose algorithmic judgment suits them best, "
1600 "but under conditions of monopoly, we all get our answers from the same place."
1601 msgstr ""
1602
1603 #. type: Content of: <article><sect1><para>
1604 msgid ""
1605 "Google’s search dominance isn’t a matter of pure merit: The company has "
1606 "leveraged many tactics that would have been prohibited under classical, pre-"
1607 "Ronald-Reagan antitrust enforcement standards to attain its dominance. After "
1608 "all, this is a company that has developed two major products: a really good "
1609 "search engine and a pretty good Hotmail clone. Every other major success "
1610 "it’s had — Android, YouTube, Google Maps, etc. — has come through an "
1611 "acquisition of a nascent competitor. Many of the company’s key divisions, "
1612 "such as the advertising technology of DoubleClick, violate the historical "
1613 "antitrust principle of structural separation, which forbade firms from "
1614 "owning subsidiaries that competed with their customers. Railroads, for "
1615 "example, were barred from owning freight companies that competed with the "
1616 "shippers whose freight they carried."
1617 msgstr ""
1618
1619 #. type: Content of: <article><sect1><para>
1620 msgid ""
1621 "If we’re worried about giant companies subverting markets by stripping "
1622 "consumers of their ability to make free choices, then vigorous antitrust "
1623 "enforcement seems like an excellent remedy. If we’d denied Google the right "
1624 "to effect its many mergers, we would also have probably denied it its total "
1625 "search dominance. Without that dominance, the pet theories, biases, errors "
1626 "(and good judgment, too) of Google search engineers and product managers "
1627 "would not have such an outsized effect on consumer choice."
1628 msgstr ""
1629
1630 #. type: Content of: <article><sect1><para>
1631 msgid ""
1632 "This goes for many other companies. Amazon, a classic surveillance "
1633 "capitalist, is obviously the dominant tool for searching Amazon — though "
1634 "many people find their way to Amazon through Google searches and Facebook "
1635 "posts — and obviously, Amazon controls Amazon search. That means that "
1636 "Amazon’s own self-serving editorial choices—like promoting its own house "
1637 "brands over rival goods from its sellers as well as its own pet theories, "
1638 "biases, and errors— determine much of what we buy on Amazon. And since "
1639 "Amazon is the dominant e-commerce retailer outside of China and since it "
1640 "attained that dominance by buying up both large rivals and nascent "
1641 "competitors in defiance of historical antitrust rules, we can blame the "
1642 "monopoly for stripping consumers of their right to the future tense and the "
1643 "ability to shape markets by making informed choices."
1644 msgstr ""
1645
1646 #. type: Content of: <article><sect1><para>
1647 msgid ""
1648 "Not every monopolist is a surveillance capitalist, but that doesn’t mean "
1649 "they’re not able to shape consumer choices in wide-ranging ways. Zuboff "
1650 "lauds Apple for its App Store and iTunes Store, insisting that adding price "
1651 "tags to the features on its platforms has been the secret to resisting "
1652 "surveillance and thus creating markets. But Apple is the only retailer "
1653 "allowed to sell on its platforms, and it’s the second-largest mobile device "
1654 "vendor in the world. The independent software vendors that sell through "
1655 "Apple’s marketplace accuse the company of the same surveillance sins as "
1656 "Amazon and other big retailers: spying on its customers to find lucrative "
1657 "new products to launch, effectively using independent software vendors as "
1658 "free-market researchers, then forcing them out of any markets they discover."
1659 msgstr ""
1660
1661 #. type: Content of: <article><sect1><para>
1662 msgid ""
1663 "Because of its use of copyright locks, Apple’s mobile customers are not "
1664 "legally allowed to switch to a rival retailer for its apps if they want to "
1665 "do so on an iPhone. Apple, obviously, is the only entity that gets to decide "
1666 "how it ranks the results of search queries in its stores. These decisions "
1667 "ensure that some apps are often installed (because they appear on page one) "
1668 "and others are never installed (because they appear on page one million). "
1669 "Apple’s search-ranking design decisions have a vastly more significant "
1670 "effect on consumer behaviors than influence campaigns delivered by "
1671 "surveillance capitalism’s ad-serving bots."
1672 msgstr ""
1673
1674 #. type: Content of: <article><sect1><title>
1675 msgid "Monopolists can afford sleeping pills for watchdogs"
1676 msgstr ""
1677
1678 #. type: Content of: <article><sect1><para>
1679 msgid ""
1680 "Only the most extreme market ideologues think that markets can self-regulate "
1681 "without state oversight. Markets need watchdogs — regulators, lawmakers, and "
1682 "other elements of democratic control — to keep them honest. When these "
1683 "watchdogs sleep on the job, then markets cease to aggregate consumer choices "
1684 "because those choices are constrained by illegitimate and deceptive "
1685 "activities that companies are able to get away with because no one is "
1686 "holding them to account."
1687 msgstr ""
1688
1689 #. type: Content of: <article><sect1><para>
1690 msgid ""
1691 "But this kind of regulatory capture doesn’t come cheap. In competitive "
1692 "sectors, where rivals are constantly eroding one another’s margins, "
1693 "individual firms lack the surplus capital to effectively lobby for laws and "
1694 "regulations that serve their ends."
1695 msgstr ""
1696
1697 #. type: Content of: <article><sect1><para>
1698 msgid ""
1699 "Many of the harms of surveillance capitalism are the result of weak or "
1700 "nonexistent regulation. Those regulatory vacuums spring from the power of "
1701 "monopolists to resist stronger regulation and to tailor what regulation "
1702 "exists to permit their existing businesses."
1703 msgstr ""
1704
1705 #. type: Content of: <article><sect1><para>
1706 msgid ""
1707 "Here’s an example: When firms over-collect and over-retain our data, they "
1708 "are at increased risk of suffering a breach — you can’t leak data you never "
1709 "collected, and once you delete all copies of that data, you can no longer "
1710 "leak it. For more than a decade, we’ve lived through an endless parade of "
1711 "ever-worsening data breaches, each one uniquely horrible in the scale of "
1712 "data breached and the sensitivity of that data."
1713 msgstr ""
1714
1715 #. type: Content of: <article><sect1><para>
1716 msgid ""
1717 "But still, firms continue to over-collect and over-retain our data for three "
1718 "reasons:"
1719 msgstr ""
1720
1721 #. type: Content of: <article><sect1><para>
1722 msgid ""
1723 "<emphasis role=\"strong\">1. They are locked in the aforementioned limbic "
1724 "arms race with our capacity to shore up our attentional defense systems to "
1725 "resist their new persuasion techniques.</emphasis> They’re also locked in an "
1726 "arms race with their competitors to find new ways to target people for sales "
1727 "pitches. As soon as they discover a soft spot in our attentional defenses (a "
1728 "counterintuitive, unobvious way to target potential refrigerator buyers), "
1729 "the public begins to wise up to the tactic, and their competitors leap on "
1730 "it, hastening the day in which all potential refrigerator buyers have been "
1731 "inured to the pitch."
1732 msgstr ""
1733
1734 #. type: Content of: <article><sect1><para>
1735 msgid ""
1736 "<emphasis role=\"strong\">2. They believe the surveillance capitalism story."
1737 "</emphasis> Data is cheap to aggregate and store, and both proponents and "
1738 "opponents of surveillance capitalism have assured managers and product "
1739 "designers that if you collect enough data, you will be able to perform "
1740 "sorcerous acts of mind control, thus supercharging your sales. Even if you "
1741 "never figure out how to profit from the data, someone else will eventually "
1742 "offer to buy it from you to give it a try. This is the hallmark of all "
1743 "economic bubbles: acquiring an asset on the assumption that someone else "
1744 "will buy it from you for more than you paid for it, often to sell to someone "
1745 "else at an even greater price."
1746 msgstr ""
1747
1748 #. type: Content of: <article><sect1><para>
1749 msgid ""
1750 "<emphasis role=\"strong\">3. The penalties for leaking data are negligible.</"
1751 "emphasis> Most countries limit these penalties to actual damages, meaning "
1752 "that consumers who’ve had their data breached have to show actual monetary "
1753 "harms to get a reward. In 2014, Home Depot disclosed that it had lost credit-"
1754 "card data for 53 million of its customers, but it settled the matter by "
1755 "paying those customers about $0.34 each — and a third of that $0.34 wasn’t "
1756 "even paid in cash. It took the form of a credit to procure a largely "
1757 "ineffectual credit-monitoring service."
1758 msgstr ""
1759
1760 #. type: Content of: <article><sect1><para>
1761 msgid ""
1762 "But the harms from breaches are much more extensive than these actual-"
1763 "damages rules capture. Identity thieves and fraudsters are wily and "
1764 "endlessly inventive. All the vast breaches of our century are being "
1765 "continuously recombined, the data sets merged and mined for new ways to "
1766 "victimize the people whose data was present in them. Any reasonable, "
1767 "evidence-based theory of deterrence and compensation for breaches would not "
1768 "confine damages to actual damages but rather would allow users to claim "
1769 "these future harms."
1770 msgstr ""
1771
1772 #. type: Content of: <article><sect1><para>
1773 msgid ""
1774 "However, even the most ambitious privacy rules, such as the EU General Data "
1775 "Protection Regulation, fall far short of capturing the negative "
1776 "externalities of the platforms’ negligent over-collection and over-"
1777 "retention, and what penalties they do provide are not aggressively pursued "
1778 "by regulators."
1779 msgstr ""
1780
1781 #. type: Content of: <article><sect1><para>
1782 msgid ""
1783 "This tolerance of — or indifference to — data over-collection and over-"
1784 "retention can be ascribed in part to the sheer lobbying muscle of the "
1785 "platforms. They are so profitable that they can handily afford to divert "
1786 "gigantic sums to fight any real change — that is, change that would force "
1787 "them to internalize the costs of their surveillance activities."
1788 msgstr ""
1789
1790 #. type: Content of: <article><sect1><para>
1791 msgid ""
1792 "And then there’s state surveillance, which the surveillance capitalism story "
1793 "dismisses as a relic of another era when the big worry was being jailed for "
1794 "your dissident speech, not having your free will stripped away with machine "
1795 "learning."
1796 msgstr ""
1797
1798 #. type: Content of: <article><sect1><para>
1799 msgid ""
1800 "But state surveillance and private surveillance are intimately related. As "
1801 "we saw when Apple was conscripted by the Chinese government as a vital "
1802 "collaborator in state surveillance, the only really affordable and tractable "
1803 "way to conduct mass surveillance on the scale practiced by modern states — "
1804 "both <quote>free</quote> and autocratic states — is to suborn commercial "
1805 "services."
1806 msgstr ""
1807
1808 #. type: Content of: <article><sect1><para>
1809 msgid ""
1810 "Whether it’s Google being used as a location tracking tool by local law "
1811 "enforcement across the U.S. or the use of social media tracking by the "
1812 "Department of Homeland Security to build dossiers on participants in "
1813 "protests against Immigration and Customs Enforcement’s family separation "
1814 "practices, any hard limits on surveillance capitalism would hamstring the "
1815 "state’s own surveillance capability. Without Palantir, Amazon, Google, and "
1816 "other major tech contractors, U.S. cops would not be able to spy on Black "
1817 "people, ICE would not be able to manage the caging of children at the U.S. "
1818 "border, and state welfare systems would not be able to purge their rolls by "
1819 "dressing up cruelty as empiricism and claiming that poor and vulnerable "
1820 "people are ineligible for assistance. At least some of the states’ "
1821 "unwillingness to take meaningful action to curb surveillance should be "
1822 "attributed to this symbiotic relationship. There is no mass state "
1823 "surveillance without mass commercial surveillance."
1824 msgstr ""
1825
1826 #. type: Content of: <article><sect1><para>
1827 msgid ""
1828 "Monopolism is key to the project of mass state surveillance. It’s true that "
1829 "smaller tech firms are apt to be less well-defended than Big Tech, whose "
1830 "security experts are drawn from the tops of their field and who are given "
1831 "enormous resources to secure and monitor their systems against intruders. "
1832 "But smaller firms also have less to protect: fewer users whose data is more "
1833 "fragmented across more systems and have to be suborned one at a time by "
1834 "state actors."
1835 msgstr ""
1836
1837 #. type: Content of: <article><sect1><para>
1838 msgid ""
1839 "A concentrated tech sector that works with authorities is a much more "
1840 "powerful ally in the project of mass state surveillance than a fragmented "
1841 "one composed of smaller actors. The U.S. tech sector is small enough that "
1842 "all of its top executives fit around a single boardroom table in Trump Tower "
1843 "in 2017, shortly after Trump’s inauguration. Most of its biggest players bid "
1844 "to win JEDI, the Pentagon’s $10 billion Joint Enterprise Defense "
1845 "Infrastructure cloud contract. Like other highly concentrated industries, "
1846 "Big Tech rotates its key employees in and out of government service, sending "
1847 "them to serve in the Department of Defense and the White House, then hiring "
1848 "ex-Pentagon and ex-DOD top staffers and officers to work in their own "
1849 "government relations departments."
1850 msgstr ""
1851
1852 #. type: Content of: <article><sect1><para>
1853 msgid ""
1854 "They can even make a good case for doing this: After all, when there are "
1855 "only four or five big companies in an industry, everyone qualified to "
1856 "regulate those companies has served as an executive in at least a couple of "
1857 "them — because, likewise, when there are only five companies in an industry, "
1858 "everyone qualified for a senior role at any of them is by definition working "
1859 "at one of the other ones."
1860 msgstr ""
1861
1862 #. type: Content of: <article><sect1><blockquote><para>
1863 msgid ""
1864 "While surveillance doesn’t cause monopolies, monopolies certainly abet "
1865 "surveillance."
1866 msgstr ""
1867
1868 #. type: Content of: <article><sect1><para>
1869 msgid ""
1870 "Industries that are competitive are fragmented — composed of companies that "
1871 "are at each other’s throats all the time and eroding one another’s margins "
1872 "in bids to steal their best customers. This leaves them with much more "
1873 "limited capital to use to lobby for favorable rules and a much harder job of "
1874 "getting everyone to agree to pool their resources to benefit the industry as "
1875 "a whole."
1876 msgstr ""
1877
1878 #. type: Content of: <article><sect1><para>
1879 msgid ""
1880 "Surveillance combined with machine learning is supposed to be an existential "
1881 "crisis, a species-defining moment at which our free will is just a few more "
1882 "advances in the field from being stripped away. I am skeptical of this "
1883 "claim, but I <emphasis>do</emphasis> think that tech poses an existential "
1884 "threat to our society and possibly our species."
1885 msgstr ""
1886
1887 #. type: Content of: <article><sect1><para>
1888 msgid "But that threat grows out of monopoly."
1889 msgstr ""
1890
1891 #. type: Content of: <article><sect1><para>
1892 msgid ""
1893 "One of the consequences of tech’s regulatory capture is that it can shift "
1894 "liability for poor security decisions onto its customers and the wider "
1895 "society. It is absolutely normal in tech for companies to obfuscate the "
1896 "workings of their products, to make them deliberately hard to understand, "
1897 "and to threaten security researchers who seek to independently audit those "
1898 "products."
1899 msgstr ""
1900
1901 #. type: Content of: <article><sect1><para>
1902 msgid ""
1903 "IT is the only field in which this is practiced: No one builds a bridge or a "
1904 "hospital and keeps the composition of the steel or the equations used to "
1905 "calculate load stresses a secret. It is a frankly bizarre practice that "
1906 "leads, time and again, to grotesque security defects on farcical scales, "
1907 "with whole classes of devices being revealed as vulnerable long after they "
1908 "are deployed in the field and put into sensitive places."
1909 msgstr ""
1910
1911 #. type: Content of: <article><sect1><para>
1912 msgid ""
1913 "The monopoly power that keeps any meaningful consequences for breaches at "
1914 "bay means that tech companies continue to build terrible products that are "
1915 "insecure by design and that end up integrated into our lives, in possession "
1916 "of our data, and connected to our physical world. For years, Boeing has "
1917 "struggled with the aftermath of a series of bad technology decisions that "
1918 "made its 737 fleet a global pariah, a rare instance in which bad tech "
1919 "decisions have been seriously punished in the market."
1920 msgstr ""
1921
1922 #. type: Content of: <article><sect1><para>
1923 msgid ""
1924 "These bad security decisions are compounded yet again by the use of "
1925 "copyright locks to enforce business-model decisions against consumers. "
1926 "Recall that these locks have become the go-to means for shaping consumer "
1927 "behavior, making it technically impossible to use third-party ink, insulin, "
1928 "apps, or service depots in connection with your lawfully acquired property."
1929 msgstr ""
1930
1931 #. type: Content of: <article><sect1><para>
1932 msgid ""
1933 "Recall also that these copyright locks are backstopped by legislation (such "
1934 "as Section 1201 of the DMCA or Article 6 of the 2001 EU Copyright Directive) "
1935 "that ban tampering with (<quote>circumventing</quote>) them, and these "
1936 "statutes have been used to threaten security researchers who make "
1937 "disclosures about vulnerabilities without permission from manufacturers."
1938 msgstr ""
1939
1940 #. type: Content of: <article><sect1><para>
1941 msgid ""
1942 "This amounts to a manufacturer’s veto over safety warnings and criticism. "
1943 "While this is far from the legislative intent of the DMCA and its sister "
1944 "statutes around the world, Congress has not intervened to clarify the "
1945 "statute nor will it because to do so would run counter to the interests of "
1946 "powerful, large firms whose lobbying muscle is unstoppable."
1947 msgstr ""
1948
1949 #. type: Content of: <article><sect1><para>
1950 msgid ""
1951 "Copyright locks are a double whammy: They create bad security decisions that "
1952 "can’t be freely investigated or discussed. If markets are supposed to be "
1953 "machines for aggregating information (and if surveillance capitalism’s "
1954 "notional mind-control rays are what make it a <quote>rogue capitalism</"
1955 "quote> because it denies consumers the power to make decisions), then a "
1956 "program of legally enforced ignorance of the risks of products makes "
1957 "monopolism even more of a <quote>rogue capitalism</quote> than surveillance "
1958 "capitalism’s influence campaigns."
1959 msgstr ""
1960
1961 #. type: Content of: <article><sect1><para>
1962 msgid ""
1963 "And unlike mind-control rays, enforced silence over security is an "
1964 "immediate, documented problem, and it <emphasis>does</emphasis> constitute "
1965 "an existential threat to our civilization and possibly our species. The "
1966 "proliferation of insecure devices — especially devices that spy on us and "
1967 "especially when those devices also can manipulate the physical world by, "
1968 "say, steering your car or flipping a breaker at a power station — is a kind "
1969 "of technology debt."
1970 msgstr ""
1971
1972 #. type: Content of: <article><sect1><para>
1973 msgid ""
1974 "In software design, <quote>technology debt</quote> refers to old, baked-in "
1975 "decisions that turn out to be bad ones in hindsight. Perhaps a long-ago "
1976 "developer decided to incorporate a networking protocol made by a vendor that "
1977 "has since stopped supporting it. But everything in the product still relies "
1978 "on that superannuated protocol, and so, with each revision, the product team "
1979 "has to work around this obsolete core, adding compatibility layers, "
1980 "surrounding it with security checks that try to shore up its defenses, and "
1981 "so on. These Band-Aid measures compound the debt because every subsequent "
1982 "revision has to make allowances for <emphasis>them</emphasis>, too, like "
1983 "interest mounting on a predatory subprime loan. And like a subprime loan, "
1984 "the interest mounts faster than you can hope to pay it off: The product team "
1985 "has to put so much energy into maintaining this complex, brittle system that "
1986 "they don’t have any time left over to refactor the product from the ground "
1987 "up and <quote>pay off the debt</quote> once and for all."
1988 msgstr ""
1989
1990 #. type: Content of: <article><sect1><para>
1991 msgid ""
1992 "Typically, technology debt results in a technological bankruptcy: The "
1993 "product gets so brittle and unsustainable that it fails catastrophically. "
1994 "Think of the antiquated COBOL-based banking and accounting systems that fell "
1995 "over at the start of the pandemic emergency when confronted with surges of "
1996 "unemployment claims. Sometimes that ends the product; sometimes it takes "
1997 "the company down with it. Being caught in the default of a technology debt "
1998 "is scary and traumatic, just like losing your house due to bankruptcy is "
1999 "scary and traumatic."
2000 msgstr ""
2001
2002 #. type: Content of: <article><sect1><para>
2003 msgid ""
2004 "But the technology debt created by copyright locks isn’t individual debt; "
2005 "it’s systemic. Everyone in the world is exposed to this over-leverage, as "
2006 "was the case with the 2008 financial crisis. When that debt comes due — when "
2007 "we face a cascade of security breaches that threaten global shipping and "
2008 "logistics, the food supply, pharmaceutical production pipelines, emergency "
2009 "communications, and other critical systems that are accumulating technology "
2010 "debt in part due to the presence of deliberately insecure and deliberately "
2011 "unauditable copyright locks — it will indeed pose an existential risk."
2012 msgstr ""
2013
2014 #. type: Content of: <article><sect1><title>
2015 msgid "Privacy and monopoly"
2016 msgstr ""
2017
2018 #. type: Content of: <article><sect1><para>
2019 msgid ""
2020 "Many tech companies are gripped by an orthodoxy that holds that if they just "
2021 "gather enough data on enough of our activities, everything else is possible "
2022 "— the mind control and endless profits. This is an unfalsifiable hypothesis: "
2023 "If data gives a tech company even a tiny improvement in behavior prediction "
2024 "and modification, the company declares that it has taken the first step "
2025 "toward global domination with no end in sight. If a company <emphasis>fails</"
2026 "emphasis> to attain any improvements from gathering and analyzing data, it "
2027 "declares success to be just around the corner, attainable once more data is "
2028 "in hand."
2029 msgstr ""
2030
2031 #. type: Content of: <article><sect1><para>
2032 msgid ""
2033 "Surveillance tech is far from the first industry to embrace a nonsensical, "
2034 "self-serving belief that harms the rest of the world, and it is not the "
2035 "first industry to profit handsomely from such a delusion. Long before hedge-"
2036 "fund managers were claiming (falsely) that they could beat the S&amp;P 500, "
2037 "there were plenty of other <quote>respectable</quote> industries that have "
2038 "been revealed as quacks in hindsight. From the makers of radium "
2039 "suppositories (a real thing!) to the cruel sociopaths who claimed they "
2040 "could <quote>cure</quote> gay people, history is littered with the formerly "
2041 "respectable titans of discredited industries."
2042 msgstr ""
2043
2044 #. type: Content of: <article><sect1><para>
2045 msgid ""
2046 "This is not to say that there’s nothing wrong with Big Tech and its "
2047 "ideological addiction to data. While surveillance’s benefits are mostly "
2048 "overstated, its harms are, if anything, <emphasis>understated</emphasis>."
2049 msgstr ""
2050
2051 #. type: Content of: <article><sect1><para>
2052 msgid ""
2053 "There’s real irony here. The belief in surveillance capitalism as a "
2054 "<quote>rogue capitalism</quote> is driven by the belief that markets "
2055 "wouldn’t tolerate firms that are gripped by false beliefs. An oil company "
2056 "that has false beliefs about where the oil is will eventually go broke "
2057 "digging dry wells after all."
2058 msgstr ""
2059
2060 #. type: Content of: <article><sect1><para>
2061 msgid ""
2062 "But monopolists get to do terrible things for a long time before they pay "
2063 "the price. Think of how concentration in the finance sector allowed the "
2064 "subprime crisis to fester as bond-rating agencies, regulators, investors, "
2065 "and critics all fell under the sway of a false belief that complex "
2066 "mathematics could construct <quote>fully hedged</quote> debt instruments "
2067 "that could not possibly default. A small bank that engaged in this kind of "
2068 "malfeasance would simply go broke rather than outrunning the inevitable "
2069 "crisis, perhaps growing so big that it averted it altogether. But large "
2070 "banks were able to continue to attract investors, and when they finally "
2071 "<emphasis>did</emphasis> come a-cropper, the world’s governments bailed them "
2072 "out. The worst offenders of the subprime crisis are bigger than they were in "
2073 "2008, bringing home more profits and paying their execs even larger sums."
2074 msgstr ""
2075
2076 #. type: Content of: <article><sect1><para>
2077 msgid ""
2078 "Big Tech is able to practice surveillance not just because it is tech but "
2079 "because it is <emphasis>big</emphasis>. The reason every web publisher "
2080 "embeds a Facebook <quote>Like</quote> button is that Facebook dominates the "
2081 "internet’s social media referrals — and every one of those <quote>Like</"
2082 "quote> buttons spies on everyone who lands on a page that contains them (see "
2083 "also: Google Analytics embeds, Twitter buttons, etc.)."
2084 msgstr ""
2085
2086 #. type: Content of: <article><sect1><para>
2087 msgid ""
2088 "The reason the world’s governments have been slow to create meaningful "
2089 "penalties for privacy breaches is that Big Tech’s concentration produces "
2090 "huge profits that can be used to lobby against those penalties — and Big "
2091 "Tech’s concentration means that the companies involved are able to arrive at "
2092 "a unified negotiating position that supercharges the lobbying."
2093 msgstr ""
2094
2095 #. type: Content of: <article><sect1><para>
2096 msgid ""
2097 "The reason that the smartest engineers in the world want to work for Big "
2098 "Tech is that Big Tech commands the lion’s share of tech industry jobs."
2099 msgstr ""
2100
2101 #. type: Content of: <article><sect1><para>
2102 msgid ""
2103 "The reason people who are aghast at Facebook’s and Google’s and Amazon’s "
2104 "data-handling practices continue to use these services is that all their "
2105 "friends are on Facebook; Google dominates search; and Amazon has put all the "
2106 "local merchants out of business."
2107 msgstr ""
2108
2109 #. type: Content of: <article><sect1><para>
2110 msgid ""
2111 "Competitive markets would weaken the companies’ lobbying muscle by reducing "
2112 "their profits and pitting them against each other in regulatory forums. It "
2113 "would give customers other places to go to get their online services. It "
2114 "would make the companies small enough to regulate and pave the way to "
2115 "meaningful penalties for breaches. It would let engineers with ideas that "
2116 "challenged the surveillance orthodoxy raise capital to compete with the "
2117 "incumbents. It would give web publishers multiple ways to reach audiences "
2118 "and make the case against Facebook and Google and Twitter embeds."
2119 msgstr ""
2120
2121 #. type: Content of: <article><sect1><para>
2122 msgid ""
2123 "In other words, while surveillance doesn’t cause monopolies, monopolies "
2124 "certainly abet surveillance."
2125 msgstr ""
2126
2127 #. type: Content of: <article><sect1><title>
2128 msgid "Ronald Reagan, pioneer of tech monopolism"
2129 msgstr ""
2130
2131 #. type: Content of: <article><sect1><para>
2132 msgid ""
2133 "Technology exceptionalism is a sin, whether it’s practiced by technology’s "
2134 "blind proponents or by its critics. Both of these camps are prone to "
2135 "explaining away monopolistic concentration by citing some special "
2136 "characteristic of the tech industry, like network effects or first-mover "
2137 "advantage. The only real difference between these two groups is that the "
2138 "tech apologists say monopoly is inevitable so we should just let tech get "
2139 "away with its abuses while competition regulators in the U.S. and the EU say "
2140 "monopoly is inevitable so we should punish tech for its abuses but not try "
2141 "to break up the monopolies."
2142 msgstr ""
2143
2144 #. type: Content of: <article><sect1><para>
2145 msgid ""
2146 "To understand how tech became so monopolistic, it’s useful to look at the "
2147 "dawn of the consumer tech industry: 1979, the year the Apple II Plus "
2148 "launched and became the first successful home computer. That also happens to "
2149 "be the year that Ronald Reagan hit the campaign trail for the 1980 "
2150 "presidential race — a race he won, leading to a radical shift in the way "
2151 "that antitrust concerns are handled in America. Reagan’s cohort of "
2152 "politicians — including Margaret Thatcher in the U.K., Brian Mulroney in "
2153 "Canada, Helmut Kohl in Germany, and Augusto Pinochet in Chile — went on to "
2154 "enact similar reforms that eventually spread around the world."
2155 msgstr ""
2156
2157 #. type: Content of: <article><sect1><para>
2158 msgid ""
2159 "Antitrust’s story began nearly a century before all that with laws like the "
2160 "Sherman Act, which took aim at monopolists on the grounds that monopolies "
2161 "were bad in and of themselves — squeezing out competitors, creating "
2162 "<quote>diseconomies of scale</quote> (when a company is so big that its "
2163 "constituent parts go awry and it is seemingly helpless to address the "
2164 "problems), and capturing their regulators to such a degree that they can get "
2165 "away with a host of evils."
2166 msgstr ""
2167
2168 #. type: Content of: <article><sect1><para>
2169 msgid ""
2170 "Then came a fabulist named Robert Bork, a former solicitor general who "
2171 "Reagan appointed to the powerful U.S. Court of Appeals for the D.C. Circuit "
2172 "and who had created an alternate legislative history of the Sherman Act and "
2173 "its successors out of whole cloth. Bork insisted that these statutes were "
2174 "never targeted at monopolies (despite a wealth of evidence to the contrary, "
2175 "including the transcribed speeches of the acts’ authors) but, rather, that "
2176 "they were intended to prevent <quote>consumer harm</quote> — in the form of "
2177 "higher prices."
2178 msgstr ""
2179
2180 #. type: Content of: <article><sect1><para>
2181 msgid ""
2182 "Bork was a crank, but he was a crank with a theory that rich people really "
2183 "liked. Monopolies are a great way to make rich people richer by allowing "
2184 "them to receive <quote>monopoly rents</quote> (that is, bigger profits) and "
2185 "capture regulators, leading to a weaker, more favorable regulatory "
2186 "environment with fewer protections for customers, suppliers, the "
2187 "environment, and workers."
2188 msgstr ""
2189
2190 #. type: Content of: <article><sect1><para>
2191 msgid ""
2192 "Bork’s theories were especially palatable to the same power brokers who "
2193 "backed Reagan, and Reagan’s Department of Justice and other agencies began "
2194 "to incorporate Bork’s antitrust doctrine into their enforcement decisions "
2195 "(Reagan even put Bork up for a Supreme Court seat, but Bork flunked the "
2196 "Senate confirmation hearing so badly that, 40 years later, D.C. insiders use "
2197 "the term <quote>borked</quote> to refer to any catastrophically bad "
2198 "political performance)."
2199 msgstr ""
2200
2201 #. type: Content of: <article><sect1><para>
2202 msgid ""
2203 "Little by little, Bork’s theories entered the mainstream, and their backers "
2204 "began to infiltrate the legal education field, even putting on junkets where "
2205 "members of the judiciary were treated to lavish meals, fun outdoor "
2206 "activities, and seminars where they were indoctrinated into the consumer "
2207 "harm theory of antitrust. The more Bork’s theories took hold, the more money "
2208 "the monopolists were making — and the more surplus capital they had at their "
2209 "disposal to lobby for even more Borkian antitrust influence campaigns."
2210 msgstr ""
2211
2212 #. type: Content of: <article><sect1><para>
2213 msgid ""
2214 "The history of Bork’s antitrust theories is a really good example of the "
2215 "kind of covertly engineered shifts in public opinion that Zuboff warns us "
2216 "against, where fringe ideas become mainstream orthodoxy. But Bork didn’t "
2217 "change the world overnight. He played a very long game, for over a "
2218 "generation, and he had a tailwind because the same forces that backed "
2219 "oligarchic antitrust theories also backed many other oligarchic shifts in "
2220 "public opinion. For example, the idea that taxation is theft, that wealth is "
2221 "a sign of virtue, and so on — all of these theories meshed to form a "
2222 "coherent ideology that elevated inequality to a virtue."
2223 msgstr ""
2224
2225 #. type: Content of: <article><sect1><para>
2226 msgid ""
2227 "Today, many fear that machine learning allows surveillance capitalism to "
2228 "sell <quote>Bork-as-a-Service,</quote> at internet speeds, so that you can "
2229 "contract a machine-learning company to engineer <emphasis>rapid</emphasis> "
2230 "shifts in public sentiment without needing the capital to sustain a "
2231 "multipronged, multigenerational project working at the local, state, "
2232 "national, and global levels in business, law, and philosophy. I do not "
2233 "believe that such a project is plausible, though I agree that this is "
2234 "basically what the platforms claim to be selling. They’re just lying about "
2235 "it. Big Tech lies all the time, <emphasis>including</emphasis> in their "
2236 "sales literature."
2237 msgstr ""
2238
2239 #. type: Content of: <article><sect1><para>
2240 msgid ""
2241 "The idea that tech forms <quote>natural monopolies</quote> (monopolies that "
2242 "are the inevitable result of the realities of an industry, such as the "
2243 "monopolies that accrue the first company to run long-haul phone lines or "
2244 "rail lines) is belied by tech’s own history: In the absence of anti-"
2245 "competitive tactics, Google was able to unseat AltaVista and Yahoo; Facebook "
2246 "was able to head off Myspace. There are some advantages to gathering "
2247 "mountains of data, but those mountains of data also have disadvantages: "
2248 "liability (from leaking), diminishing returns (from old data), and "
2249 "institutional inertia (big companies, like science, progress one funeral at "
2250 "a time)."
2251 msgstr ""
2252
2253 #. type: Content of: <article><sect1><para>
2254 msgid ""
2255 "Indeed, the birth of the web saw a mass-extinction event for the existing "
2256 "giant, wildly profitable proprietary technologies that had capital, network "
2257 "effects, and walls and moats surrounding their businesses. The web showed "
2258 "that when a new industry is built around a protocol, rather than a product, "
2259 "the combined might of everyone who uses the protocol to reach their "
2260 "customers or users or communities outweighs even the most massive products. "
2261 "CompuServe, AOL, MSN, and a host of other proprietary walled gardens learned "
2262 "this lesson the hard way: Each believed it could stay separate from the web, "
2263 "offering <quote>curation</quote> and a guarantee of consistency and quality "
2264 "instead of the chaos of an open system. Each was wrong and ended up being "
2265 "absorbed into the public web."
2266 msgstr ""
2267
2268 #. type: Content of: <article><sect1><para>
2269 msgid ""
2270 "Yes, tech is heavily monopolized and is now closely associated with industry "
2271 "concentration, but this has more to do with a matter of timing than its "
2272 "intrinsically monopolistic tendencies. Tech was born at the moment that "
2273 "antitrust enforcement was being dismantled, and tech fell into exactly the "
2274 "same pathologies that antitrust was supposed to guard against. To a first "
2275 "approximation, it is reasonable to assume that tech’s monopolies are the "
2276 "result of a lack of anti-monopoly action and not the much-touted unique "
2277 "characteristics of tech, such as network effects, first-mover advantage, and "
2278 "so on."
2279 msgstr ""
2280
2281 #. type: Content of: <article><sect1><para>
2282 msgid ""
2283 "In support of this thesis, I offer the concentration that every "
2284 "<emphasis>other</emphasis> industry has undergone over the same period. From "
2285 "professional wrestling to consumer packaged goods to commercial property "
2286 "leasing to banking to sea freight to oil to record labels to newspaper "
2287 "ownership to theme parks, <emphasis>every</emphasis> industry has undergone "
2288 "a massive shift toward concentration. There’s no obvious network effects or "
2289 "first-mover advantage at play in these industries. However, in every case, "
2290 "these industries attained their concentrated status through tactics that "
2291 "were prohibited before Bork’s triumph: merging with major competitors, "
2292 "buying out innovative new market entrants, horizontal and vertical "
2293 "integration, and a suite of anti-competitive tactics that were once illegal "
2294 "but are not any longer."
2295 msgstr ""
2296
2297 #. type: Content of: <article><sect1><para>
2298 msgid ""
2299 "Again: When you change the laws intended to prevent monopolies and then "
2300 "monopolies form in exactly the way the law was supposed to prevent, it is "
2301 "reasonable to suppose that these facts are related. Tech’s concentration "
2302 "can be readily explained without recourse to radical theories of network "
2303 "effects — but only if you’re willing to indict unregulated markets as "
2304 "tending toward monopoly. Just as a lifelong smoker can give you a hundred "
2305 "reasons why their smoking didn’t cause their cancer (<quote>It was the "
2306 "environmental toxins</quote>), true believers in unregulated markets have a "
2307 "whole suite of unconvincing explanations for monopoly in tech that leave "
2308 "capitalism intact."
2309 msgstr ""
2310
2311 #. type: Content of: <article><sect1><title>
2312 msgid "Steering with the windshield wipers"
2313 msgstr ""
2314
2315 #. type: Content of: <article><sect1><para>
2316 msgid ""
2317 "It’s been 40 years since Bork’s project to rehabilitate monopolies achieved "
2318 "liftoff, and that is a generation and a half, which is plenty of time to "
2319 "take a common idea and make it seem outlandish and vice versa. Before the "
2320 "1940s, affluent Americans dressed their baby boys in pink while baby girls "
2321 "wore blue (a <quote>delicate and dainty</quote> color). While gendered "
2322 "colors are obviously totally arbitrary, many still greet this news with "
2323 "amazement and find it hard to imagine a time when pink connoted masculinity."
2324 msgstr ""
2325
2326 #. type: Content of: <article><sect1><para>
2327 msgid ""
2328 "After 40 years of studiously ignoring antitrust analysis and enforcement, "
2329 "it’s not surprising that we’ve all but forgotten that antitrust exists, that "
2330 "in living memory, growth through mergers and acquisitions were largely "
2331 "prohibited under law, that market-cornering strategies like vertical "
2332 "integration could land a company in court."
2333 msgstr ""
2334
2335 #. type: Content of: <article><sect1><para>
2336 msgid ""
2337 "Antitrust is a market society’s steering wheel, the control of first resort "
2338 "to keep would-be masters of the universe in their lanes. But Bork and his "
2339 "cohort ripped out our steering wheel 40 years ago. The car is still "
2340 "barreling along, and so we’re yanking as hard as we can on all the "
2341 "<emphasis>other</emphasis> controls in the car as well as desperately "
2342 "flapping the doors and rolling the windows up and down in the hopes that one "
2343 "of these other controls can be repurposed to let us choose where we’re "
2344 "heading before we careen off a cliff."
2345 msgstr ""
2346
2347 #. type: Content of: <article><sect1><para>
2348 msgid ""
2349 "It’s like a 1960s science-fiction plot come to life: People stuck in a "
2350 "<quote>generation ship,</quote> plying its way across the stars, a ship once "
2351 "piloted by their ancestors; and now, after a great cataclysm, the ship’s "
2352 "crew have forgotten that they’re in a ship at all and no longer remember "
2353 "where the control room is. Adrift, the ship is racing toward its extinction, "
2354 "and unless we can seize the controls and execute emergency course "
2355 "correction, we’re all headed for a fiery death in the heart of a sun."
2356 msgstr ""
2357
2358 #. type: Content of: <article><sect1><title>
2359 msgid "Surveillance still matters"
2360 msgstr ""
2361
2362 #. type: Content of: <article><sect1><para>
2363 msgid ""
2364 "None of this is to minimize the problems with surveillance. Surveillance "
2365 "matters, and Big Tech’s use of surveillance <emphasis>is</emphasis> an "
2366 "existential risk to our species, but that’s not because surveillance and "
2367 "machine learning rob us of our free will."
2368 msgstr ""
2369
2370 #. type: Content of: <article><sect1><para>
2371 msgid ""
2372 "Surveillance has become <emphasis>much</emphasis> more efficient thanks to "
2373 "Big Tech. In 1989, the Stasi — the East German secret police — had the whole "
2374 "country under surveillance, a massive undertaking that recruited one out of "
2375 "every 60 people to serve as an informant or intelligence operative."
2376 msgstr ""
2377
2378 #. type: Content of: <article><sect1><para>
2379 msgid ""
2380 "Today, we know that the NSA is spying on a significant fraction of the "
2381 "entire world’s population, and its ratio of surveillance operatives to the "
2382 "surveilled is more like 1:10,000 (that’s probably on the low side since it "
2383 "assumes that every American with top-secret clearance is working for the NSA "
2384 "on this project — we don’t know how many of those cleared people are "
2385 "involved in NSA spying, but it’s definitely not all of them)."
2386 msgstr ""
2387
2388 #. type: Content of: <article><sect1><para>
2389 msgid ""
2390 "How did the ratio of surveillable citizens expand from 1:60 to 1:10,000 in "
2391 "less than 30 years? It’s thanks to Big Tech. Our devices and services gather "
2392 "most of the data that the NSA mines for its surveillance project. We pay for "
2393 "these devices and the services they connect to, and then we painstakingly "
2394 "perform the data-entry tasks associated with logging facts about our lives, "
2395 "opinions, and preferences. This mass surveillance project has been largely "
2396 "useless for fighting terrorism: The NSA can <ulink url=\"https://www."
2397 "washingtonpost.com/world/national-security/nsa-cites-case-as-success-of-"
2398 "phone-data-collection-program/2013/08/08/fc915e5a-feda-11e2-96a8-"
2399 "d3b921c0924a_story.html\">only point to a single minor success story</ulink> "
2400 "in which it used its data collection program to foil an attempt by a U.S. "
2401 "resident to wire a few thousand dollars to an overseas terror group. It’s "
2402 "ineffective for much the same reason that commercial surveillance projects "
2403 "are largely ineffective at targeting advertising: The people who want to "
2404 "commit acts of terror, like people who want to buy a refrigerator, are "
2405 "extremely rare. If you’re trying to detect a phenomenon whose base rate is "
2406 "one in a million with an instrument whose accuracy is only 99%, then every "
2407 "true positive will come at the cost of 9,999 false positives."
2408 msgstr ""
2409
2410 #. type: Content of: <article><sect1><para>
2411 msgid ""
2412 "Let me explain that again: If one in a million people is a terrorist, then "
2413 "there will only be about one terrorist in a random sample of one million "
2414 "people. If your test for detecting terrorists is 99% accurate, it will "
2415 "identify 10,000 terrorists in your million-person sample (1% of one million "
2416 "is 10,000). For every true positive, you’ll get 9,999 false positives."
2417 msgstr ""
2418
2419 #. type: Content of: <article><sect1><para>
2420 msgid ""
2421 "In reality, the accuracy of algorithmic terrorism detection falls far short "
2422 "of the 99% mark, as does refrigerator ad targeting. The difference is that "
2423 "being falsely accused of wanting to buy a fridge is a minor nuisance while "
2424 "being falsely accused of planning a terror attack can destroy your life and "
2425 "the lives of everyone you love."
2426 msgstr ""
2427
2428 #. type: Content of: <article><sect1><para>
2429 msgid ""
2430 "Mass state surveillance is only feasible because of surveillance capitalism "
2431 "and its extremely low-yield ad-targeting systems, which require a constant "
2432 "feed of personal data to remain barely viable. Surveillance capitalism’s "
2433 "primary failure mode is mistargeted ads while mass state surveillance’s "
2434 "primary failure mode is grotesque human rights abuses, tending toward "
2435 "totalitarianism."
2436 msgstr ""
2437
2438 #. type: Content of: <article><sect1><para>
2439 msgid ""
2440 "State surveillance is no mere parasite on Big Tech, sucking up its data and "
2441 "giving nothing in return. In truth, the two are symbiotes: Big Tech sucks up "
2442 "our data for spy agencies, and spy agencies ensure that governments don’t "
2443 "limit Big Tech’s activities so severely that it would no longer serve the "
2444 "spy agencies’ needs. There is no firm distinction between state surveillance "
2445 "and surveillance capitalism; they are dependent on one another."
2446 msgstr ""
2447
2448 #. type: Content of: <article><sect1><para>
2449 msgid ""
2450 "To see this at work today, look no further than Amazon’s home surveillance "
2451 "device, the Ring doorbell, and its associated app, Neighbors. Ring — a "
2452 "product that Amazon acquired and did not develop in house — makes a camera-"
2453 "enabled doorbell that streams footage from your front door to your mobile "
2454 "device. The Neighbors app allows you to form a neighborhood-wide "
2455 "surveillance grid with your fellow Ring owners through which you can share "
2456 "clips of <quote>suspicious characters.</quote> If you’re thinking that this "
2457 "sounds like a recipe for letting curtain-twitching racists supercharge their "
2458 "suspicions of people with brown skin who walk down their blocks, <ulink url="
2459 "\"https://www.eff.org/deeplinks/2020/07/amazons-ring-enables-over-policing-"
2460 "efforts-some-americas-deadliest-law-enforcement\">you’re right</ulink>. Ring "
2461 "has become a <emphasis>de facto,</emphasis> off-the-books arm of the police "
2462 "without any of the pesky oversight or rules."
2463 msgstr ""
2464
2465 #. type: Content of: <article><sect1><para>
2466 msgid ""
2467 "In mid-2019, a series of public records requests revealed that Amazon had "
2468 "struck confidential deals with more than 400 local law enforcement agencies "
2469 "through which the agencies would promote Ring and Neighbors and in exchange "
2470 "get access to footage from Ring cameras. In theory, cops would need to "
2471 "request this footage through Amazon (and internal documents reveal that "
2472 "Amazon devotes substantial resources to coaching cops on how to spin a "
2473 "convincing story when doing so), but in practice, when a Ring customer turns "
2474 "down a police request, Amazon only requires the agency to formally request "
2475 "the footage from the company, which it will then produce."
2476 msgstr ""
2477
2478 #. type: Content of: <article><sect1><para>
2479 msgid ""
2480 "Ring and law enforcement have found many ways to intertwine their "
2481 "activities. Ring strikes secret deals to acquire real-time access to 911 "
2482 "dispatch and then streams alarming crime reports to Neighbors users, which "
2483 "serve as convincers for anyone who’s contemplating a surveillance doorbell "
2484 "but isn’t sure whether their neighborhood is dangerous enough to warrant it."
2485 msgstr ""
2486
2487 #. type: Content of: <article><sect1><para>
2488 msgid ""
2489 "The more the cops buzz-market the surveillance capitalist Ring, the more "
2490 "surveillance capability the state gets. Cops who rely on private entities "
2491 "for law-enforcement roles then brief against any controls on the deployment "
2492 "of that technology while the companies return the favor by lobbying against "
2493 "rules requiring public oversight of police surveillance technology. The more "
2494 "the cops rely on Ring and Neighbors, the harder it will be to pass laws to "
2495 "curb them. The fewer laws there are against them, the more the cops will "
2496 "rely on them."
2497 msgstr ""
2498
2499 #. type: Content of: <article><sect1><title>
2500 msgid "Dignity and sanctuary"
2501 msgstr ""
2502
2503 #. type: Content of: <article><sect1><para>
2504 msgid ""
2505 "But even if we could exercise democratic control over our states and force "
2506 "them to stop raiding surveillance capitalism’s reservoirs of behavioral "
2507 "data, surveillance capitalism would still harm us."
2508 msgstr ""
2509
2510 #. type: Content of: <article><sect1><para>
2511 msgid ""
2512 "This is an area where Zuboff shines. Her chapter on <quote>sanctuary</quote> "
2513 "— the feeling of being unobserved — is a beautiful hymn to introspection, "
2514 "calmness, mindfulness, and tranquility."
2515 msgstr ""
2516
2517 #. type: Content of: <article><sect1><para>
2518 msgid ""
2519 "When you are watched, something changes. Anyone who has ever raised a child "
2520 "knows this. You might look up from your book (or more realistically, from "
2521 "your phone) and catch your child in a moment of profound realization and "
2522 "growth, a moment where they are learning something that is right at the edge "
2523 "of their abilities, requiring their entire ferocious concentration. For a "
2524 "moment, you’re transfixed, watching that rare and beautiful moment of focus "
2525 "playing out before your eyes, and then your child looks up and sees you "
2526 "seeing them, and the moment collapses. To grow, you need to be and expose "
2527 "your authentic self, and in that moment, you are vulnerable like a hermit "
2528 "crab scuttling from one shell to the next. The tender, unprotected tissues "
2529 "you expose in that moment are too delicate to reveal in the presence of "
2530 "another, even someone you trust as implicitly as a child trusts their parent."
2531 msgstr ""
2532
2533 #. type: Content of: <article><sect1><para>
2534 msgid ""
2535 "In the digital age, our authentic selves are inextricably tied to our "
2536 "digital lives. Your search history is a running ledger of the questions "
2537 "you’ve pondered. Your location history is a record of the places you’ve "
2538 "sought out and the experiences you’ve had there. Your social graph reveals "
2539 "the different facets of your identity, the people you’ve connected with."
2540 msgstr ""
2541
2542 #. type: Content of: <article><sect1><para>
2543 msgid ""
2544 "To be observed in these activities is to lose the sanctuary of your "
2545 "authentic self."
2546 msgstr ""
2547
2548 #. type: Content of: <article><sect1><para>
2549 msgid ""
2550 "There’s another way in which surveillance capitalism robs us of our capacity "
2551 "to be our authentic selves: by making us anxious. Surveillance capitalism "
2552 "isn’t really a mind-control ray, but you don’t need a mind-control ray to "
2553 "make someone anxious. After all, another word for anxiety is agitation, and "
2554 "to make someone experience agitation, you need merely to agitate them. To "
2555 "poke them and prod them and beep at them and buzz at them and bombard them "
2556 "on an intermittent schedule that is just random enough that our limbic "
2557 "systems never quite become inured to it."
2558 msgstr ""
2559
2560 #. type: Content of: <article><sect1><para>
2561 msgid ""
2562 "Our devices and services are <quote>general purpose</quote> in that they can "
2563 "connect anything or anyone to anything or anyone else and that they can run "
2564 "any program that can be written. This means that the distraction rectangles "
2565 "in our pockets hold our most precious moments with our most beloved people "
2566 "and their most urgent or time-sensitive communications (from <quote>running "
2567 "late can you get the kid?</quote> to <quote>doctor gave me bad news and I "
2568 "need to talk to you RIGHT NOW</quote>) as well as ads for refrigerators and "
2569 "recruiting messages from Nazis."
2570 msgstr ""
2571
2572 #. type: Content of: <article><sect1><para>
2573 msgid ""
2574 "All day and all night, our pockets buzz, shattering our concentration and "
2575 "tearing apart the fragile webs of connection we spin as we think through "
2576 "difficult ideas. If you locked someone in a cell and agitated them like "
2577 "this, we’d call it <quote>sleep deprivation torture,</quote> and it would be "
2578 "<ulink url=\"https://www.youtube.com/watch?v=1SKpRbvnx6g\">a war crime under "
2579 "the Geneva Conventions</ulink>."
2580 msgstr ""
2581
2582 #. type: Content of: <article><sect1><title>
2583 msgid "Afflicting the afflicted"
2584 msgstr ""
2585
2586 #. type: Content of: <article><sect1><para>
2587 msgid ""
2588 "The effects of surveillance on our ability to be our authentic selves are "
2589 "not equal for all people. Some of us are lucky enough to live in a time and "
2590 "place in which all the most important facts of our lives are widely and "
2591 "roundly socially acceptable and can be publicly displayed without the risk "
2592 "of social consequence."
2593 msgstr ""
2594
2595 #. type: Content of: <article><sect1><para>
2596 msgid ""
2597 "But for many of us, this is not true. Recall that in living memory, many of "
2598 "the ways of being that we think of as socially acceptable today were once "
2599 "cause for dire social sanction or even imprisonment. If you are 65 years "
2600 "old, you have lived through a time in which people living in <quote>free "
2601 "societies</quote> could be imprisoned or sanctioned for engaging in "
2602 "homosexual activity, for falling in love with a person whose skin was a "
2603 "different color than their own, or for smoking weed."
2604 msgstr ""
2605
2606 #. type: Content of: <article><sect1><para>
2607 msgid ""
2608 "Today, these activities aren’t just decriminalized in much of the world, "
2609 "they’re considered normal, and the fallen prohibitions are viewed as "
2610 "shameful, regrettable relics of the past."
2611 msgstr ""
2612
2613 #. type: Content of: <article><sect1><para>
2614 msgid ""
2615 "How did we get from prohibition to normalization? Through private, personal "
2616 "activity: People who were secretly gay or secret pot-smokers or who secretly "
2617 "loved someone with a different skin color were vulnerable to retaliation if "
2618 "they made their true selves known and were limited in how much they could "
2619 "advocate for their own right to exist in the world and be true to "
2620 "themselves. But because there was a private sphere, these people could form "
2621 "alliances with their friends and loved ones who did not share their "
2622 "disfavored traits by having private conversations in which they came out, "
2623 "disclosing their true selves to the people around them and bringing them to "
2624 "their cause one conversation at a time."
2625 msgstr ""
2626
2627 #. type: Content of: <article><sect1><para>
2628 msgid ""
2629 "The right to choose the time and manner of these conversations was key to "
2630 "their success. It’s one thing to come out to your dad while you’re on a "
2631 "fishing trip away from the world and another thing entirely to blurt it out "
2632 "over the Christmas dinner table while your racist Facebook uncle is there to "
2633 "make a scene."
2634 msgstr ""
2635
2636 #. type: Content of: <article><sect1><para>
2637 msgid ""
2638 "Without a private sphere, there’s a chance that none of these changes would "
2639 "have come to pass and that the people who benefited from these changes would "
2640 "have either faced social sanction for coming out to a hostile world or would "
2641 "have never been able to reveal their true selves to the people they love."
2642 msgstr ""
2643
2644 #. type: Content of: <article><sect1><para>
2645 msgid ""
2646 "The corollary is that, unless you think that our society has attained social "
2647 "perfection — that your grandchildren in 50 years will ask you to tell them "
2648 "the story of how, in 2020, every injustice had been righted and no further "
2649 "change had to be made — then you should expect that right now, at this "
2650 "minute, there are people you love, whose happiness is key to your own, who "
2651 "have a secret in their hearts that stops them from ever being their "
2652 "authentic selves with you. These people are sorrowing and will go to their "
2653 "graves with that secret sorrow in their hearts, and the source of that "
2654 "sorrow will be the falsity of their relationship to you."
2655 msgstr ""
2656
2657 #. type: Content of: <article><sect1><para>
2658 msgid "A private realm is necessary for human progress."
2659 msgstr ""
2660
2661 #. type: Content of: <article><sect1><title>
2662 msgid "Any data you collect and retain will eventually leak"
2663 msgstr ""
2664
2665 #. type: Content of: <article><sect1><para>
2666 msgid ""
2667 "The lack of a private life can rob vulnerable people of the chance to be "
2668 "their authentic selves and constrain our actions by depriving us of "
2669 "sanctuary, but there is another risk that is borne by everyone, not just "
2670 "people with a secret: crime."
2671 msgstr ""
2672
2673 #. type: Content of: <article><sect1><para>
2674 msgid ""
2675 "Personally identifying information is of very limited use for the purpose of "
2676 "controlling peoples’ minds, but identity theft — really a catchall term for "
2677 "a whole constellation of terrible criminal activities that can destroy your "
2678 "finances, compromise your personal integrity, ruin your reputation, or even "
2679 "expose you to physical danger — thrives on it."
2680 msgstr ""
2681
2682 #. type: Content of: <article><sect1><para>
2683 msgid ""
2684 "Attackers are not limited to using data from one breached source, either. "
2685 "Multiple services have suffered breaches that exposed names, addresses, "
2686 "phone numbers, passwords, sexual tastes, school grades, work performance, "
2687 "brushes with the criminal justice system, family details, genetic "
2688 "information, fingerprints and other biometrics, reading habits, search "
2689 "histories, literary tastes, pseudonymous identities, and other sensitive "
2690 "information. Attackers can merge data from these different breaches to build "
2691 "up extremely detailed dossiers on random subjects and then use different "
2692 "parts of the data for different criminal purposes."
2693 msgstr ""
2694
2695 #. type: Content of: <article><sect1><para>
2696 msgid ""
2697 "For example, attackers can use leaked username and password combinations to "
2698 "hijack whole fleets of commercial vehicles that <ulink url=\"https://www."
2699 "vice.com/en_us/article/zmpx4x/hacker-monitor-cars-kill-engine-gps-tracking-"
2700 "apps\">have been fitted with anti-theft GPS trackers and immobilizers</"
2701 "ulink> or to hijack baby monitors in order to <ulink url=\"https://www."
2702 "washingtonpost.com/technology/2019/04/23/how-nest-designed-keep-intruders-"
2703 "out-peoples-homes-effectively-allowed-hackers-get/?"
2704 "utm_term=.15220e98c550\">terrorize toddlers with the audio tracks from "
2705 "pornography</ulink>. Attackers use leaked data to trick phone companies into "
2706 "giving them your phone number, then they intercept SMS-based two-factor "
2707 "authentication codes in order to take over your email, bank account, and/or "
2708 "cryptocurrency wallets."
2709 msgstr ""
2710
2711 #. type: Content of: <article><sect1><para>
2712 msgid ""
2713 "Attackers are endlessly inventive in the pursuit of creative ways to "
2714 "weaponize leaked data. One common use of leaked data is to penetrate "
2715 "companies in order to access <emphasis>more</emphasis> data."
2716 msgstr ""
2717
2718 #. type: Content of: <article><sect1><para>
2719 msgid ""
2720 "Like spies, online fraudsters are totally dependent on companies over-"
2721 "collecting and over-retaining our data. Spy agencies sometimes pay companies "
2722 "for access to their data or intimidate them into giving it up, but sometimes "
2723 "they work just like criminals do — by <ulink url=\"https://www.bbc.com/news/"
2724 "world-us-canada-24751821\">sneaking data out of companies’ databases</ulink>."
2725 msgstr ""
2726
2727 #. type: Content of: <article><sect1><para>
2728 msgid ""
2729 "The over-collection of data has a host of terrible social consequences, from "
2730 "the erosion of our authentic selves to the undermining of social progress, "
2731 "from state surveillance to an epidemic of online crime. Commercial "
2732 "surveillance is also a boon to people running influence campaigns, but "
2733 "that’s the least of our troubles."
2734 msgstr ""
2735
2736 #. type: Content of: <article><sect1><title>
2737 msgid "Critical tech exceptionalism is still tech exceptionalism"
2738 msgstr ""
2739
2740 #. type: Content of: <article><sect1><para>
2741 msgid ""
2742 "Big Tech has long practiced technology exceptionalism: the idea that it "
2743 "should not be subject to the mundane laws and norms of <quote>meatspace.</"
2744 "quote> Mottoes like Facebook’s <quote>move fast and break things</quote> "
2745 "attracted justifiable scorn of the companies’ self-serving rhetoric."
2746 msgstr ""
2747
2748 #. type: Content of: <article><sect1><para>
2749 msgid ""
2750 "Tech exceptionalism got us all into a lot of trouble, so it’s ironic and "
2751 "distressing to see Big Tech’s critics committing the same sin."
2752 msgstr ""
2753
2754 #. type: Content of: <article><sect1><para>
2755 msgid ""
2756 "Big Tech is not a <quote>rogue capitalism</quote> that cannot be cured "
2757 "through the traditional anti-monopoly remedies of trustbusting (forcing "
2758 "companies to divest of competitors they have acquired) and bans on mergers "
2759 "to monopoly and other anti-competitive tactics. Big Tech does not have the "
2760 "power to use machine learning to influence our behavior so thoroughly that "
2761 "markets lose the ability to punish bad actors and reward superior "
2762 "competitors. Big Tech has no rule-writing mind-control ray that necessitates "
2763 "ditching our old toolbox."
2764 msgstr ""
2765
2766 #. type: Content of: <article><sect1><para>
2767 msgid ""
2768 "The thing is, people have been claiming to have perfected mind-control rays "
2769 "for centuries, and every time, it turned out to be a con — though sometimes "
2770 "the con artists were also conning themselves."
2771 msgstr ""
2772
2773 #. type: Content of: <article><sect1><para>
2774 msgid ""
2775 "For generations, the advertising industry has been steadily improving its "
2776 "ability to sell advertising services to businesses while only making "
2777 "marginal gains in selling those businesses’ products to prospective "
2778 "customers. John Wanamaker’s lament that <quote>50% of my advertising budget "
2779 "is wasted, I just don’t know which 50%</quote> is a testament to the triumph "
2780 "of <emphasis>ad executives</emphasis>, who successfully convinced Wanamaker "
2781 "that only half of the money he spent went to waste."
2782 msgstr ""
2783
2784 #. type: Content of: <article><sect1><para>
2785 msgid ""
2786 "The tech industry has made enormous improvements in the science of "
2787 "convincing businesses that they’re good at advertising while their actual "
2788 "improvements to advertising — as opposed to targeting — have been pretty ho-"
2789 "hum. The vogue for machine learning — and the mystical invocation of "
2790 "<quote>artificial intelligence</quote> as a synonym for straightforward "
2791 "statistical inference techniques — has greatly boosted the efficacy of Big "
2792 "Tech’s sales pitch as marketers have exploited potential customers’ lack of "
2793 "technical sophistication to get away with breathtaking acts of overpromising "
2794 "and underdelivering."
2795 msgstr ""
2796
2797 #. type: Content of: <article><sect1><para>
2798 msgid ""
2799 "It’s tempting to think that if businesses are willing to pour billions into "
2800 "a venture that the venture must be a good one. Yet there are plenty of times "
2801 "when this rule of thumb has led us astray. For example, it’s virtually "
2802 "unheard of for managed investment funds to outperform simple index funds, "
2803 "and investors who put their money into the hands of expert money managers "
2804 "overwhelmingly fare worse than those who entrust their savings to index "
2805 "funds. But managed funds still account for the majority of the money "
2806 "invested in the markets, and they are patronized by some of the richest, "
2807 "most sophisticated investors in the world. Their vote of confidence in an "
2808 "underperforming sector is a parable about the role of luck in wealth "
2809 "accumulation, not a sign that managed funds are a good buy."
2810 msgstr ""
2811
2812 #. type: Content of: <article><sect1><para>
2813 msgid ""
2814 "The claims of Big Tech’s mind-control system are full of tells that the "
2815 "enterprise is a con. For example, <ulink url=\"https://www.frontiersin.org/"
2816 "articles/10.3389/fpsyg.2020.01415/full\">the reliance on the <quote>Big "
2817 "Five</quote> personality traits</ulink> as a primary means of influencing "
2818 "people even though the <quote>Big Five</quote> theory is unsupported by any "
2819 "large-scale, peer-reviewed studies and is <ulink url=\"https://www.wired.com/"
2820 "story/the-noisy-fallacies-of-psychographic-targeting/\">mostly the realm of "
2821 "marketing hucksters and pop psych</ulink>."
2822 msgstr ""
2823
2824 #. type: Content of: <article><sect1><para>
2825 msgid ""
2826 "Big Tech’s promotional materials also claim that their algorithms can "
2827 "accurately perform <quote>sentiment analysis</quote> or detect peoples’ "
2828 "moods based on their <quote>microexpressions,</quote> but <ulink url="
2829 "\"https://www.npr.org/2018/09/12/647040758/advertising-on-facebook-is-it-"
2830 "worth-it\">these are marketing claims, not scientific ones</ulink>. These "
2831 "methods are largely untested by independent scientific experts, and where "
2832 "they have been tested, they’ve been found sorely wanting. Microexpressions "
2833 "are particularly suspect as the companies that specialize in training people "
2834 "to detect them <ulink url=\"https://theintercept.com/2017/02/08/tsas-own-"
2835 "files-show-doubtful-science-behind-its-behavior-screening-program/\">have "
2836 "been shown</ulink> to underperform relative to random chance."
2837 msgstr ""
2838
2839 #. type: Content of: <article><sect1><para>
2840 msgid ""
2841 "Big Tech has been so good at marketing its own supposed superpowers that "
2842 "it’s easy to believe that they can market everything else with similar "
2843 "acumen, but it’s a mistake to believe the hype. Any statement a company "
2844 "makes about the quality of its products is clearly not impartial. The fact "
2845 "that we distrust all the things that Big Tech says about its data handling, "
2846 "compliance with privacy laws, etc., is only reasonable — but why on Earth "
2847 "would we treat Big Tech’s marketing literature as the gospel truth? Big Tech "
2848 "lies about just about <emphasis>everything</emphasis>, including how well "
2849 "its machine-learning fueled persuasion systems work."
2850 msgstr ""
2851
2852 #. type: Content of: <article><sect1><para>
2853 msgid ""
2854 "That skepticism should infuse all of our evaluations of Big Tech and its "
2855 "supposed abilities, including our perusal of its patents. Zuboff vests these "
2856 "patents with enormous significance, pointing out that Google claimed "
2857 "extensive new persuasion capabilities in <ulink url=\"https://patents.google."
2858 "com/patent/US20050131762A1/en\">its patent filings</ulink>. These claims are "
2859 "doubly suspect: first, because they are so self-serving, and second, because "
2860 "the patent itself is so notoriously an invitation to exaggeration."
2861 msgstr ""
2862
2863 #. type: Content of: <article><sect1><para>
2864 msgid ""
2865 "Patent applications take the form of a series of claims and range from broad "
2866 "to narrow. A typical patent starts out by claiming that its authors have "
2867 "invented a method or system for doing every conceivable thing that anyone "
2868 "might do, ever, with any tool or device. Then it narrows that claim in "
2869 "successive stages until we get to the actual <quote>invention</quote> that "
2870 "is the true subject of the patent. The hope is that the patent examiner — "
2871 "who is almost certainly overworked and underinformed — will miss the fact "
2872 "that some or all of these claims are ridiculous, or at least suspect, and "
2873 "grant the patent’s broader claims. Patents for unpatentable things are still "
2874 "incredibly useful because they can be wielded against competitors who might "
2875 "license that patent or steer clear of its claims rather than endure the "
2876 "lengthy, expensive process of contesting it."
2877 msgstr ""
2878
2879 #. type: Content of: <article><sect1><para>
2880 msgid ""
2881 "What’s more, software patents are routinely granted even though the filer "
2882 "doesn’t have any evidence that they can do the thing claimed by the patent. "
2883 "That is, you can patent an <quote>invention</quote> that you haven’t "
2884 "actually made and that you don’t know how to make."
2885 msgstr ""
2886
2887 #. type: Content of: <article><sect1><para>
2888 msgid ""
2889 "With these considerations in hand, it becomes obvious that the fact that a "
2890 "Big Tech company has patented what it <emphasis>says</emphasis> is an "
2891 "effective mind-control ray is largely irrelevant to whether Big Tech can in "
2892 "fact control our minds."
2893 msgstr ""
2894
2895 #. type: Content of: <article><sect1><para>
2896 msgid ""
2897 "Big Tech collects our data for many reasons, including the diminishing "
2898 "returns on existing stores of data. But many tech companies also collect "
2899 "data out of a mistaken tech exceptionalist belief in the network effects of "
2900 "data. Network effects occur when each new user in a system increases its "
2901 "value. The classic example is fax machines: A single fax machine is of no "
2902 "use, two fax machines are of limited use, but every new fax machine that’s "
2903 "put to use after the first doubles the number of possible fax-to-fax links."
2904 msgstr ""
2905
2906 #. type: Content of: <article><sect1><para>
2907 msgid ""
2908 "Data mined for predictive systems doesn’t necessarily produce these "
2909 "dividends. Think of Netflix: The predictive value of the data mined from a "
2910 "million English-speaking Netflix viewers is hardly improved by the addition "
2911 "of one more user’s viewing data. Most of the data Netflix acquires after "
2912 "that first minimum viable sample duplicates existing data and produces only "
2913 "minimal gains. Meanwhile, retraining models with new data gets progressively "
2914 "more expensive as the number of data points increases, and manual tasks like "
2915 "labeling and validating data do not get cheaper at scale."
2916 msgstr ""
2917
2918 #. type: Content of: <article><sect1><para>
2919 msgid ""
2920 "Businesses pursue fads to the detriment of their profits all the time, "
2921 "especially when the businesses and their investors are not motivated by the "
2922 "prospect of becoming profitable but rather by the prospect of being acquired "
2923 "by a Big Tech giant or by having an IPO. For these firms, ticking faddish "
2924 "boxes like <quote>collects as much data as possible</quote> might realize a "
2925 "bigger return on investment than <quote>collects a business-appropriate "
2926 "quantity of data.</quote>"
2927 msgstr ""
2928
2929 #. type: Content of: <article><sect1><para>
2930 msgid ""
2931 "This is another harm of tech exceptionalism: The belief that more data "
2932 "always produces more profits in the form of more insights that can be "
2933 "translated into better mind-control rays drives firms to over-collect and "
2934 "over-retain data beyond all rationality. And since the firms are behaving "
2935 "irrationally, a good number of them will go out of business and become ghost "
2936 "ships whose cargo holds are stuffed full of data that can harm people in "
2937 "myriad ways — but which no one is responsible for antey longer. Even if the "
2938 "companies don’t go under, the data they collect is maintained behind the "
2939 "minimum viable security — just enough security to keep the company viable "
2940 "while it waits to get bought out by a tech giant, an amount calculated to "
2941 "spend not one penny more than is necessary on protecting data."
2942 msgstr ""
2943
2944 #. type: Content of: <article><sect1><title>
2945 msgid ""
2946 "How monopolies, not mind control, drive surveillance capitalism: The "
2947 "Snapchat story"
2948 msgstr ""
2949
2950 #. type: Content of: <article><sect1><para>
2951 msgid ""
2952 "For the first decade of its existence, Facebook competed with the social "
2953 "media giants of the day (Myspace, Orkut, etc.) by presenting itself as the "
2954 "pro-privacy alternative. Indeed, Facebook justified its walled garden — "
2955 "which let users bring in data from the web but blocked web services like "
2956 "Google Search from indexing and caching Facebook pages — as a pro-privacy "
2957 "measure that protected users from the surveillance-happy winners of the "
2958 "social media wars like Myspace."
2959 msgstr ""
2960
2961 #. type: Content of: <article><sect1><para>
2962 msgid ""
2963 "Despite frequent promises that it would never collect or analyze its users’ "
2964 "data, Facebook periodically created initiatives that did just that, like the "
2965 "creepy, ham-fisted Beacon tool, which spied on you as you moved around the "
2966 "web and then added your online activities to your public timeline, allowing "
2967 "your friends to monitor your browsing habits. Beacon sparked a user revolt. "
2968 "Every time, Facebook backed off from its surveillance initiative, but not "
2969 "all the way; inevitably, the new Facebook would be more surveilling than the "
2970 "old Facebook, though not quite as surveilling as the intermediate Facebook "
2971 "following the launch of the new product or service."
2972 msgstr ""
2973
2974 #. type: Content of: <article><sect1><para>
2975 msgid ""
2976 "The pace at which Facebook ramped up its surveillance efforts seems to have "
2977 "been set by Facebook’s competitive landscape. The more competitors Facebook "
2978 "had, the better it behaved. Every time a major competitor foundered, "
2979 "Facebook’s behavior <ulink url=\"https://papers.ssrn.com/sol3/papers.cfm?"
2980 "abstract_id=3247362\">got markedly worse</ulink>."
2981 msgstr ""
2982
2983 #. type: Content of: <article><sect1><para>
2984 msgid ""
2985 "All the while, Facebook was prodigiously acquiring companies, including a "
2986 "company called Onavo. Nominally, Onavo made a battery-monitoring mobile app. "
2987 "But the permissions that Onavo required were so expansive that the app was "
2988 "able to gather fine-grained telemetry on everything users did with their "
2989 "phones, including which apps they used and how they were using them."
2990 msgstr ""
2991
2992 #. type: Content of: <article><sect1><para>
2993 msgid ""
2994 "Through Onavo, Facebook discovered that it was losing market share to "
2995 "Snapchat, an app that — like Facebook a decade before — billed itself as the "
2996 "pro-privacy alternative to the status quo. Through Onavo, Facebook was able "
2997 "to mine data from the devices of Snapchat users, including both current and "
2998 "former Snapchat users. This spurred Facebook to acquire Instagram — some "
2999 "features of which competed with Snapchat — and then allowed Facebook to fine-"
3000 "tune Instagram’s features and sales pitch to erode Snapchat’s gains and "
3001 "ensure that Facebook would not have to face the kinds of competitive "
3002 "pressures it had earlier inflicted on Myspace and Orkut."
3003 msgstr ""
3004
3005 #. type: Content of: <article><sect1><para>
3006 msgid ""
3007 "The story of how Facebook crushed Snapchat reveals the relationship between "
3008 "monopoly and surveillance capitalism. Facebook combined surveillance with "
3009 "lax antitrust enforcement to spot the competitive threat of Snapchat on its "
3010 "horizon and then take decisive action against it. Facebook’s surveillance "
3011 "capitalism let it avert competitive pressure with anti-competitive tactics. "
3012 "Facebook users still want privacy — Facebook hasn’t used surveillance to "
3013 "brainwash them out of it — but they can’t get it because Facebook’s "
3014 "surveillance lets it destroy any hope of a rival service emerging that "
3015 "competes on privacy features."
3016 msgstr ""
3017
3018 #. type: Content of: <article><sect1><title>
3019 msgid "A monopoly over your friends"
3020 msgstr ""
3021
3022 #. type: Content of: <article><sect1><para>
3023 msgid ""
3024 "A decentralization movement has tried to erode the dominance of Facebook and "
3025 "other Big Tech companies by fielding <quote>indieweb</quote> alternatives — "
3026 "Mastodon as a Twitter alternative, Diaspora as a Facebook alternative, etc. "
3027 "— but these efforts have failed to attain any kind of liftoff."
3028 msgstr ""
3029
3030 #. type: Content of: <article><sect1><para>
3031 msgid ""
3032 "Fundamentally, each of these services is hamstrung by the same problem: "
3033 "Every potential user for a Facebook or Twitter alternative has to convince "
3034 "all their friends to follow them to a decentralized web alternative in order "
3035 "to continue to realize the benefit of social media. For many of us, the only "
3036 "reason to have a Facebook account is that our friends have Facebook "
3037 "accounts, and the reason they have Facebook accounts is that <emphasis>we</"
3038 "emphasis> have Facebook accounts."
3039 msgstr ""
3040
3041 #. type: Content of: <article><sect1><para>
3042 msgid ""
3043 "All of this has conspired to make Facebook — and other dominant platforms — "
3044 "into <quote>kill zones</quote> that investors will not fund new entrants for."
3045 msgstr ""
3046
3047 #. type: Content of: <article><sect1><para>
3048 msgid ""
3049 "And yet, all of today’s tech giants came into existence despite the "
3050 "entrenched advantage of the companies that came before them. To understand "
3051 "how that happened, you have to understand both interoperability and "
3052 "adversarial interoperability."
3053 msgstr ""
3054
3055 #. type: Content of: <article><sect1><blockquote><para>
3056 msgid "The hard problem of our species is coordination."
3057 msgstr ""
3058
3059 #. type: Content of: <article><sect1><para>
3060 msgid ""
3061 "<quote>Interoperability</quote> is the ability of two technologies to work "
3062 "with one another: Anyone can make an LP that will play on any record player, "
3063 "anyone can make a filter you can install in your stove’s extractor fan, "
3064 "anyone can make gasoline for your car, anyone can make a USB phone charger "
3065 "that fits in your car’s cigarette lighter receptacle, anyone can make a "
3066 "light bulb that works in your light socket, anyone can make bread that will "
3067 "toast in your toaster."
3068 msgstr ""
3069
3070 #. type: Content of: <article><sect1><para>
3071 msgid ""
3072 "Interoperability is often a source of innovation and consumer benefit: Apple "
3073 "made the first commercially successful PC, but millions of independent "
3074 "software vendors made interoperable programs that ran on the Apple II Plus. "
3075 "The simple analog antenna inputs on the back of TVs first allowed cable "
3076 "operators to connect directly to TVs, then they allowed game console "
3077 "companies and then personal computer companies to use standard televisions "
3078 "as displays. Standard RJ-11 telephone jacks allowed for the production of "
3079 "phones from a variety of vendors in a variety of forms, from the free "
3080 "football-shaped phone that came with a <emphasis>Sports Illustrated</"
3081 "emphasis> subscription to business phones with speakers, hold functions, and "
3082 "so on and then answering machines and finally modems, paving the way for the "
3083 "internet revolution."
3084 msgstr ""
3085
3086 #. type: Content of: <article><sect1><para>
3087 msgid ""
3088 "<quote>Interoperability</quote> is often used interchangeably with "
3089 "<quote>standardization,</quote> which is the process when manufacturers and "
3090 "other stakeholders hammer out a set of agreed-upon rules for implementing a "
3091 "technology, such as the electrical plug on your wall, the CAN bus used by "
3092 "your car’s computer systems, or the HTML instructions that your browser "
3093 "interprets."
3094 msgstr ""
3095
3096 #. type: Content of: <article><sect1><para>
3097 msgid ""
3098 "But interoperability doesn’t require standardization — indeed, "
3099 "standardization often proceeds from the chaos of ad hoc interoperability "
3100 "measures. The inventor of the cigarette-lighter USB charger didn’t need to "
3101 "get permission from car manufacturers or even the manufacturers of the "
3102 "dashboard lighter subcomponent. The automakers didn’t take any "
3103 "countermeasures to prevent the use of these aftermarket accessories by their "
3104 "customers, but they also didn’t do anything to make life easier for the "
3105 "chargers’ manufacturers. This is a kind of <quote>neutral interoperability.</"
3106 "quote>"
3107 msgstr ""
3108
3109 #. type: Content of: <article><sect1><para>
3110 msgid ""
3111 "Beyond neutral interoperability, there is <quote>adversarial "
3112 "interoperability.</quote> That’s when a manufacturer makes a product that "
3113 "interoperates with another manufacturer’s product <emphasis>despite the "
3114 "second manufacturer’s objections</emphasis> and <emphasis>even if that means "
3115 "bypassing a security system designed to prevent interoperability</emphasis>."
3116 msgstr ""
3117
3118 #. type: Content of: <article><sect1><para>
3119 msgid ""
3120 "Probably the most familiar form of adversarial interoperability is third-"
3121 "party printer ink. Printer manufacturers claim that they sell printers below "
3122 "cost and that the only way they can recoup the losses they incur is by "
3123 "charging high markups on ink. To prevent the owners of printers from buying "
3124 "ink elsewhere, the printer companies deploy a suite of anti-customer "
3125 "security systems that detect and reject both refilled and third-party "
3126 "cartridges."
3127 msgstr ""
3128
3129 #. type: Content of: <article><sect1><para>
3130 msgid ""
3131 "Owners of printers take the position that HP and Epson and Brother are not "
3132 "charities and that customers for their wares have no obligation to help them "
3133 "survive, and so if the companies choose to sell their products at a loss, "
3134 "that’s their foolish choice and their consequences to live with. Likewise, "
3135 "competitors who make ink or refill kits observe that they don’t owe printer "
3136 "companies anything, and their erosion of printer companies’ margins are the "
3137 "printer companies’ problems, not their competitors’. After all, the printer "
3138 "companies shed no tears when they drive a refiller out of business, so why "
3139 "should the refillers concern themselves with the economic fortunes of the "
3140 "printer companies?"
3141 msgstr ""
3142
3143 #. type: Content of: <article><sect1><para>
3144 msgid ""
3145 "Adversarial interoperability has played an outsized role in the history of "
3146 "the tech industry: from the founding of the <quote>alt.*</quote> Usenet "
3147 "hierarchy (which was started against the wishes of Usenet’s maintainers and "
3148 "which grew to be bigger than all of Usenet combined) to the browser wars "
3149 "(when Netscape and Microsoft devoted massive engineering efforts to making "
3150 "their browsers incompatible with the other’s special commands and "
3151 "peccadilloes) to Facebook (whose success was built in part by helping its "
3152 "new users stay in touch with friends they’d left behind on Myspace because "
3153 "Facebook supplied them with a tool that scraped waiting messages from "
3154 "Myspace and imported them into Facebook, effectively creating an Facebook-"
3155 "based Myspace reader)."
3156 msgstr ""
3157
3158 #. type: Content of: <article><sect1><para>
3159 msgid ""
3160 "Today, incumbency is seen as an unassailable advantage. Facebook is where "
3161 "all of your friends are, so no one can start a Facebook competitor. But "
3162 "adversarial compatibility reverses the competitive advantage: If you were "
3163 "allowed to compete with Facebook by providing a tool that imported all your "
3164 "users’ waiting Facebook messages into an environment that competed on lines "
3165 "that Facebook couldn’t cross, like eliminating surveillance and ads, then "
3166 "Facebook would be at a huge disadvantage. It would have assembled all "
3167 "possible ex-Facebook users into a single, easy-to-find service; it would "
3168 "have educated them on how a Facebook-like service worked and what its "
3169 "potential benefits were; and it would have provided an easy means for "
3170 "disgruntled Facebook users to tell their friends where they might expect "
3171 "better treatment."
3172 msgstr ""
3173
3174 #. type: Content of: <article><sect1><para>
3175 msgid ""
3176 "Adversarial interoperability was once the norm and a key contributor to the "
3177 "dynamic, vibrant tech scene, but now it is stuck behind a thicket of laws "
3178 "and regulations that add legal risks to the tried-and-true tactics of "
3179 "adversarial interoperability. New rules and new interpretations of existing "
3180 "rules mean that a would-be adversarial interoperator needs to steer clear of "
3181 "claims under copyright, terms of service, trade secrecy, tortious "
3182 "interference, and patent."
3183 msgstr ""
3184
3185 #. type: Content of: <article><sect1><para>
3186 msgid ""
3187 "In the absence of a competitive market, lawmakers have resorted to assigning "
3188 "expensive, state-like duties to Big Tech firms, such as automatically "
3189 "filtering user contributions for copyright infringement or terrorist and "
3190 "extremist content or detecting and preventing harassment in real time or "
3191 "controlling access to sexual material."
3192 msgstr ""
3193
3194 #. type: Content of: <article><sect1><para>
3195 msgid ""
3196 "These measures put a floor under how small we can make Big Tech because only "
3197 "the very largest companies can afford the humans and automated filters "
3198 "needed to perform these duties."
3199 msgstr ""
3200
3201 #. type: Content of: <article><sect1><para>
3202 msgid ""
3203 "But that’s not the only way in which making platforms responsible for "
3204 "policing their users undermines competition. A platform that is expected to "
3205 "police its users’ conduct must prevent many vital adversarial "
3206 "interoperability techniques lest these subvert its policing measures. For "
3207 "example, if someone using a Twitter replacement like Mastodon is able to "
3208 "push messages into Twitter and read messages out of Twitter, they could "
3209 "avoid being caught by automated systems that detect and prevent harassment "
3210 "(such as systems that use the timing of messages or IP-based rules to make "
3211 "guesses about whether someone is a harasser)."
3212 msgstr ""
3213
3214 #. type: Content of: <article><sect1><para>
3215 msgid ""
3216 "To the extent that we are willing to let Big Tech police itself — rather "
3217 "than making Big Tech small enough that users can leave bad platforms for "
3218 "better ones and small enough that a regulation that simply puts a platform "
3219 "out of business will not destroy billions of users’ access to their "
3220 "communities and data — we build the case that Big Tech should be able to "
3221 "block its competitors and make it easier for Big Tech to demand legal "
3222 "enforcement tools to ban and punish attempts at adversarial interoperability."
3223 msgstr ""
3224
3225 #. type: Content of: <article><sect1><para>
3226 msgid ""
3227 "Ultimately, we can try to fix Big Tech by making it responsible for bad acts "
3228 "by its users, or we can try to fix the internet by cutting Big Tech down to "
3229 "size. But we can’t do both. To replace today’s giant products with "
3230 "pluralistic protocols, we need to clear the legal thicket that prevents "
3231 "adversarial interoperability so that tomorrow’s nimble, personal, small-"
3232 "scale products can federate themselves with giants like Facebook, allowing "
3233 "the users who’ve left to continue to communicate with users who haven’t left "
3234 "yet, reaching tendrils over Facebook’s garden wall that Facebook’s trapped "
3235 "users can use to scale the walls and escape to the global, open web."
3236 msgstr ""
3237
3238 #. type: Content of: <article><sect1><title>
3239 msgid "Fake news is an epistemological crisis"
3240 msgstr ""
3241
3242 #. type: Content of: <article><sect1><para>
3243 msgid ""
3244 "Tech is not the only industry that has undergone massive concentration since "
3245 "the Reagan era. Virtually every major industry — from oil to newspapers to "
3246 "meatpacking to sea freight to eyewear to online pornography — has become a "
3247 "clubby oligarchy that just a few players dominate."
3248 msgstr ""
3249
3250 #. type: Content of: <article><sect1><para>
3251 msgid ""
3252 "At the same time, every industry has become something of a tech industry as "
3253 "general-purpose computers and general-purpose networks and the promise of "
3254 "efficiencies through data-driven analysis infuse every device, process, and "
3255 "firm with tech."
3256 msgstr ""
3257
3258 #. type: Content of: <article><sect1><para>
3259 msgid ""
3260 "This phenomenon of industrial concentration is part of a wider story about "
3261 "wealth concentration overall as a smaller and smaller number of people own "
3262 "more and more of our world. This concentration of both wealth and industries "
3263 "means that our political outcomes are increasingly beholden to the parochial "
3264 "interests of the people and companies with all the money."
3265 msgstr ""
3266
3267 #. type: Content of: <article><sect1><para>
3268 msgid ""
3269 "That means that whenever a regulator asks a question with an obvious, "
3270 "empirical answer (<quote>Are humans causing climate change?</quote> or "
3271 "<quote>Should we let companies conduct commercial mass surveillance?</quote> "
3272 "or <quote>Does society benefit from allowing network neutrality violations?</"
3273 "quote>), the answer that comes out is only correct if that correctness meets "
3274 "with the approval of rich people and the industries that made them so "
3275 "wealthy."
3276 msgstr ""
3277
3278 #. type: Content of: <article><sect1><para>
3279 msgid ""
3280 "Rich people have always played an outsized role in politics and more so "
3281 "since the Supreme Court’s <emphasis>Citizens United</emphasis> decision "
3282 "eliminated key controls over political spending. Widening inequality and "
3283 "wealth concentration means that the very richest people are now a lot richer "
3284 "and can afford to spend a lot more money on political projects than ever "
3285 "before. Think of the Koch brothers or George Soros or Bill Gates."
3286 msgstr ""
3287
3288 #. type: Content of: <article><sect1><para>
3289 msgid ""
3290 "But the policy distortions of rich individuals pale in comparison to the "
3291 "policy distortions that concentrated industries are capable of. The "
3292 "companies in highly concentrated industries are much more profitable than "
3293 "companies in competitive industries — no competition means not having to "
3294 "reduce prices or improve quality to win customers — leaving them with bigger "
3295 "capital surpluses to spend on lobbying."
3296 msgstr ""
3297
3298 #. type: Content of: <article><sect1><para>
3299 msgid ""
3300 "Concentrated industries also find it easier to collaborate on policy "
3301 "objectives than competitive ones. When all the top execs from your industry "
3302 "can fit around a single boardroom table, they often do. And <emphasis>when</"
3303 "emphasis> they do, they can forge a consensus position on regulation."
3304 msgstr ""
3305
3306 #. type: Content of: <article><sect1><para>
3307 msgid ""
3308 "Rising through the ranks in a concentrated industry generally means working "
3309 "at two or three of the big companies. When there are only relatively few "
3310 "companies in a given industry, each company has a more ossified executive "
3311 "rank, leaving ambitious execs with fewer paths to higher positions unless "
3312 "they are recruited to a rival. This means that the top execs in concentrated "
3313 "industries are likely to have been colleagues at some point and socialize in "
3314 "the same circles — connected through social ties or, say, serving as "
3315 "trustees for each others’ estates. These tight social bonds foster a "
3316 "collegial, rather than competitive, attitude."
3317 msgstr ""
3318
3319 #. type: Content of: <article><sect1><para>
3320 msgid ""
3321 "Highly concentrated industries also present a regulatory conundrum. When an "
3322 "industry is dominated by just four or five companies, the only people who "
3323 "are likely to truly understand the industry’s practices are its veteran "
3324 "executives. This means that top regulators are often former execs of the "
3325 "companies they are supposed to be regulating. These turns in government are "
3326 "often tacitly understood to be leaves of absence from industry, with former "
3327 "employers welcoming their erstwhile watchdogs back into their executive "
3328 "ranks once their terms have expired."
3329 msgstr ""
3330
3331 #. type: Content of: <article><sect1><para>
3332 msgid ""
3333 "All this is to say that the tight social bonds, small number of firms, and "
3334 "regulatory capture of concentrated industries give the companies that "
3335 "comprise them the power to dictate many, if not all, of the regulations that "
3336 "bind them."
3337 msgstr ""
3338
3339 #. type: Content of: <article><sect1><para>
3340 msgid ""
3341 "This is increasingly obvious. Whether it’s payday lenders <ulink url="
3342 "\"https://www.washingtonpost.com/business/2019/02/25/how-payday-lending-"
3343 "industry-insider-tilted-academic-research-its-favor/\">winning the right to "
3344 "practice predatory lending</ulink> or Apple <ulink url=\"https://www.vice."
3345 "com/en_us/article/mgxayp/source-apple-will-fight-right-to-repair-legislation"
3346 "\">winning the right to decide who can fix your phone</ulink> or Google and "
3347 "Facebook winning the right to breach your private data without suffering "
3348 "meaningful consequences or victories for pipeline companies or impunity for "
3349 "opioid manufacturers or massive tax subsidies for incredibly profitable "
3350 "dominant businesses, it’s increasingly apparent that many of our official, "
3351 "evidence-based truth-seeking processes are, in fact, auctions for sale to "
3352 "the highest bidder."
3353 msgstr ""
3354
3355 #. type: Content of: <article><sect1><para>
3356 msgid ""
3357 "It’s really impossible to overstate what a terrifying prospect this is. We "
3358 "live in an incredibly high-tech society, and none of us could acquire the "
3359 "expertise to evaluate every technological proposition that stands between us "
3360 "and our untimely, horrible deaths. You might devote your life to acquiring "
3361 "the media literacy to distinguish good scientific journals from corrupt pay-"
3362 "for-play lookalikes and the statistical literacy to evaluate the quality of "
3363 "the analysis in the journals as well as the microbiology and epidemiology "
3364 "knowledge to determine whether you can trust claims about the safety of "
3365 "vaccines — but that would still leave you unqualified to judge whether the "
3366 "wiring in your home will give you a lethal shock <emphasis>and</emphasis> "
3367 "whether your car’s brakes’ software will cause them to fail unpredictably "
3368 "<emphasis>and</emphasis> whether the hygiene standards at your butcher are "
3369 "sufficient to keep you from dying after you finish your dinner."
3370 msgstr ""
3371
3372 #. type: Content of: <article><sect1><para>
3373 msgid ""
3374 "In a world as complex as this one, we have to defer to authorities, and we "
3375 "keep them honest by making those authorities accountable to us and binding "
3376 "them with rules to prevent conflicts of interest. We can’t possibly acquire "
3377 "the expertise to adjudicate conflicting claims about the best way to make "
3378 "the world safe and prosperous, but we <emphasis>can</emphasis> determine "
3379 "whether the adjudication process itself is trustworthy."
3380 msgstr ""
3381
3382 #. type: Content of: <article><sect1><para>
3383 msgid "Right now, it’s obviously not."
3384 msgstr ""
3385
3386 #. type: Content of: <article><sect1><para>
3387 msgid ""
3388 "The past 40 years of rising inequality and industry concentration, together "
3389 "with increasingly weak accountability and transparency for expert agencies, "
3390 "has created an increasingly urgent sense of impending doom, the sense that "
3391 "there are vast conspiracies afoot that operate with tacit official approval "
3392 "despite the likelihood they are working to better themselves by ruining the "
3393 "rest of us."
3394 msgstr ""
3395
3396 #. type: Content of: <article><sect1><para>
3397 msgid ""
3398 "For example, it’s been decades since Exxon’s own scientists concluded that "
3399 "its products would render the Earth uninhabitable by humans. And yet those "
3400 "decades were lost to us, in large part because Exxon lobbied governments and "
3401 "sowed doubt about the dangers of its products and did so with the "
3402 "cooperation of many public officials. When the survival of you and everyone "
3403 "you love is threatened by conspiracies, it’s not unreasonable to start "
3404 "questioning the things you think you know in an attempt to determine whether "
3405 "they, too, are the outcome of another conspiracy."
3406 msgstr ""
3407
3408 #. type: Content of: <article><sect1><para>
3409 msgid ""
3410 "The collapse of the credibility of our systems for divining and upholding "
3411 "truths has left us in a state of epistemological chaos. Once, most of us "
3412 "might have assumed that the system was working and that our regulations "
3413 "reflected our best understanding of the empirical truths of the world as "
3414 "they were best understood — now we have to find our own experts to help us "
3415 "sort the true from the false."
3416 msgstr ""
3417
3418 #. type: Content of: <article><sect1><para>
3419 msgid ""
3420 "If you’re like me, you probably believe that vaccines are safe, but you "
3421 "(like me) probably also can’t explain the microbiology or statistics. Few of "
3422 "us have the math skills to review the literature on vaccine safety and "
3423 "describe why their statistical reasoning is sound. Likewise, few of us can "
3424 "review the stats in the (now discredited) literature on opioid safety and "
3425 "explain how those stats were manipulated. Both vaccines and opioids were "
3426 "embraced by medical authorities, after all, and one is safe while the other "
3427 "could ruin your life. You’re left with a kind of inchoate constellation of "
3428 "rules of thumb about which experts you trust to fact-check controversial "
3429 "claims and then to explain how all those respectable doctors with their peer-"
3430 "reviewed research on opioid safety <emphasis>were</emphasis> an aberration "
3431 "and then how you know that the doctors writing about vaccine safety are "
3432 "<emphasis>not</emphasis> an aberration."
3433 msgstr ""
3434
3435 #. type: Content of: <article><sect1><para>
3436 msgid ""
3437 "I’m 100% certain that vaccinating is safe and effective, but I’m also at "
3438 "something of a loss to explain exactly, <emphasis>precisely,</emphasis> why "
3439 "I believe this, given all the corruption I know about and the many times the "
3440 "stamp of certainty has turned out to be a parochial lie told to further "
3441 "enrich the super rich."
3442 msgstr ""
3443
3444 #. type: Content of: <article><sect1><para>
3445 msgid ""
3446 "Fake news — conspiracy theories, racist ideologies, scientific denialism — "
3447 "has always been with us. What’s changed today is not the mix of ideas in the "
3448 "public discourse but the popularity of the worst ideas in that mix. "
3449 "Conspiracy and denial have skyrocketed in lockstep with the growth of Big "
3450 "Inequality, which has also tracked the rise of Big Tech and Big Pharma and "
3451 "Big Wrestling and Big Car and Big Movie Theater and Big Everything Else."
3452 msgstr ""
3453
3454 #. type: Content of: <article><sect1><para>
3455 msgid ""
3456 "No one can say for certain why this has happened, but the two dominant camps "
3457 "are idealism (the belief that the people who argue for these conspiracies "
3458 "have gotten better at explaining them, maybe with the help of machine-"
3459 "learning tools) or materialism (the ideas have become more attractive "
3460 "because of material conditions in the world)."
3461 msgstr ""
3462
3463 #. type: Content of: <article><sect1><para>
3464 msgid ""
3465 "I’m a materialist. I’ve been exposed to the arguments of conspiracy "
3466 "theorists all my life, and I have not experienced any qualitative leap in "
3467 "the quality of those arguments."
3468 msgstr ""
3469
3470 #. type: Content of: <article><sect1><para>
3471 msgid ""
3472 "The major difference is in the world, not the arguments. In a time where "
3473 "actual conspiracies are commonplace, conspiracy theories acquire a ring of "
3474 "plausibility."
3475 msgstr ""
3476
3477 #. type: Content of: <article><sect1><para>
3478 msgid ""
3479 "We have always had disagreements about what’s true, but today, we have a "
3480 "disagreement over how we know whether something is true. This is an "
3481 "epistemological crisis, not a crisis over belief. It’s a crisis over the "
3482 "credibility of our truth-seeking exercises, from scientific journals (in an "
3483 "era where the biggest journal publishers have been caught producing pay-to-"
3484 "play journals for junk science) to regulations (in an era where regulators "
3485 "are routinely cycling in and out of business) to education (in an era where "
3486 "universities are dependent on corporate donations to keep their lights on)."
3487 msgstr ""
3488
3489 #. type: Content of: <article><sect1><para>
3490 msgid ""
3491 "Targeting — surveillance capitalism — makes it easier to find people who are "
3492 "undergoing this epistemological crisis, but it doesn’t create the crisis. "
3493 "For that, you need to look to corruption."
3494 msgstr ""
3495
3496 #. type: Content of: <article><sect1><para>
3497 msgid ""
3498 "And, conveniently enough, it’s corruption that allows surveillance "
3499 "capitalism to grow by dismantling monopoly protections, by permitting "
3500 "reckless collection and retention of personal data, by allowing ads to be "
3501 "targeted in secret, and by foreclosing on the possibility of going somewhere "
3502 "else where you might continue to enjoy your friends without subjecting "
3503 "yourself to commercial surveillance."
3504 msgstr ""
3505
3506 #. type: Content of: <article><sect1><title>
3507 msgid "Tech is different"
3508 msgstr ""
3509
3510 #. type: Content of: <article><sect1><para>
3511 msgid ""
3512 "I reject both iterations of technological exceptionalism. I reject the idea "
3513 "that tech is uniquely terrible and led by people who are greedier or worse "
3514 "than the leaders of other industries, and I reject the idea that tech is so "
3515 "good — or so intrinsically prone to concentration — that it can’t be blamed "
3516 "for its present-day monopolistic status."
3517 msgstr ""
3518
3519 #. type: Content of: <article><sect1><para>
3520 msgid ""
3521 "I think tech is just another industry, albeit one that grew up in the "
3522 "absence of real monopoly constraints. It may have been first, but it isn’t "
3523 "the worst nor will it be the last."
3524 msgstr ""
3525
3526 #. type: Content of: <article><sect1><para>
3527 msgid ""
3528 "But there’s one way in which I <emphasis>am</emphasis> a tech "
3529 "exceptionalist. I believe that online tools are the key to overcoming "
3530 "problems that are much more urgent than tech monopolization: climate change, "
3531 "inequality, misogyny, and discrimination on the basis of race, gender "
3532 "identity, and other factors. The internet is how we will recruit people to "
3533 "fight those fights, and how we will coordinate their labor. Tech is not a "
3534 "substitute for democratic accountability, the rule of law, fairness, or "
3535 "stability — but it’s a means to achieve these things."
3536 msgstr ""
3537
3538 #. type: Content of: <article><sect1><para>
3539 msgid ""
3540 "The hard problem of our species is coordination. Everything from climate "
3541 "change to social change to running a business to making a family work can be "
3542 "viewed as a collective action problem."
3543 msgstr ""
3544
3545 #. type: Content of: <article><sect1><para>
3546 msgid ""
3547 "The internet makes it easier than at any time before to find people who want "
3548 "to work on a project with you — hence the success of free and open-source "
3549 "software, crowdfunding, and racist terror groups — and easier than ever to "
3550 "coordinate the work you do."
3551 msgstr ""
3552
3553 #. type: Content of: <article><sect1><para>
3554 msgid ""
3555 "The internet and the computers we connect to it also possess an exceptional "
3556 "quality: general-purposeness. The internet is designed to allow any two "
3557 "parties to communicate any data, using any protocol, without permission from "
3558 "anyone else. The only production design we have for computers is the general-"
3559 "purpose, <quote>Turing complete</quote> computer that can run every program "
3560 "we can express in symbolic logic."
3561 msgstr ""
3562
3563 #. type: Content of: <article><sect1><para>
3564 msgid ""
3565 "This means that every time someone with a special communications need "
3566 "invests in infrastructure and techniques to make the internet faster, "
3567 "cheaper, and more robust, this benefit redounds to everyone else who is "
3568 "using the internet to communicate. And this also means that every time "
3569 "someone with a special computing need invests to make computers faster, "
3570 "cheaper, and more robust, every other computing application is a potential "
3571 "beneficiary of this work."
3572 msgstr ""
3573
3574 #. type: Content of: <article><sect1><para>
3575 msgid ""
3576 "For these reasons, every type of communication is gradually absorbed into "
3577 "the internet, and every type of device — from airplanes to pacemakers — "
3578 "eventually becomes a computer in a fancy case."
3579 msgstr ""
3580
3581 #. type: Content of: <article><sect1><para>
3582 msgid ""
3583 "While these considerations don’t preclude regulating networks and computers, "
3584 "they do call for gravitas and caution when doing so because changes to "
3585 "regulatory frameworks could ripple out to have unintended consequences in "
3586 "many, many other domains."
3587 msgstr ""
3588
3589 #. type: Content of: <article><sect1><para>
3590 msgid ""
3591 "The upshot of this is that our best hope of solving the big coordination "
3592 "problems — climate change, inequality, etc. — is with free, fair, and open "
3593 "tech. Our best hope of keeping tech free, fair, and open is to exercise "
3594 "caution in how we regulate tech and to attend closely to the ways in which "
3595 "interventions to solve one problem might create problems in other domains."
3596 msgstr ""
3597
3598 #. type: Content of: <article><sect1><title>
3599 msgid "Ownership of facts"
3600 msgstr ""
3601
3602 #. type: Content of: <article><sect1><para>
3603 msgid ""
3604 "Big Tech has a funny relationship with information. When you’re generating "
3605 "information — anything from the location data streaming off your mobile "
3606 "device to the private messages you send to friends on a social network — it "
3607 "claims the rights to make unlimited use of that data."
3608 msgstr ""
3609
3610 #. type: Content of: <article><sect1><para>
3611 msgid ""
3612 "But when you have the audacity to turn the tables — to use a tool that "
3613 "blocks ads or slurps your waiting updates out of a social network and puts "
3614 "them in another app that lets you set your own priorities and suggestions or "
3615 "crawls their system to allow you to start a rival business — they claim that "
3616 "you’re stealing from them."
3617 msgstr ""
3618
3619 #. type: Content of: <article><sect1><para>
3620 msgid ""
3621 "The thing is, information is a very bad fit for any kind of private property "
3622 "regime. Property rights are useful for establishing markets that can lead to "
3623 "the effective development of fallow assets. These markets depend on clear "
3624 "titles to ensure that the things being bought and sold in them can, in fact, "
3625 "be bought and sold."
3626 msgstr ""
3627
3628 #. type: Content of: <article><sect1><para>
3629 msgid ""
3630 "Information rarely has such a clear title. Take phone numbers: There’s "
3631 "clearly something going wrong when Facebook slurps up millions of users’ "
3632 "address books and uses the phone numbers it finds in them to plot out social "
3633 "graphs and fill in missing information about other users."
3634 msgstr ""
3635
3636 #. type: Content of: <article><sect1><para>
3637 msgid ""
3638 "But the phone numbers Facebook nonconsensually acquires in this transaction "
3639 "are not the <quote>property</quote> of the users they’re taken from nor do "
3640 "they belong to the people whose phones ring when you dial those numbers. The "
3641 "numbers are mere integers, 10 digits in the U.S. and Canada, and they "
3642 "appear in millions of places, including somewhere deep in pi as well as "
3643 "numerous other contexts. Giving people ownership titles to integers is an "
3644 "obviously terrible idea."
3645 msgstr ""
3646
3647 #. type: Content of: <article><sect1><para>
3648 msgid ""
3649 "Likewise for the facts that Facebook and other commercial surveillance "
3650 "operators acquire about us, like that we are the children of our parents or "
3651 "the parents to our children or that we had a conversation with someone else "
3652 "or went to a public place. These data points can’t be property in the sense "
3653 "that your house or your shirt is your property because the title to them is "
3654 "intrinsically muddy: Does your mom own the fact that she is your mother? Do "
3655 "you? Do both of you? What about your dad — does he own this fact too, or "
3656 "does he have to license the fact from you (or your mom or both of you) in "
3657 "order to use this fact? What about the hundreds or thousands of other people "
3658 "who know these facts?"
3659 msgstr ""
3660
3661 #. type: Content of: <article><sect1><para>
3662 msgid ""
3663 "If you go to a Black Lives Matter demonstration, do the other demonstrators "
3664 "need your permission to post their photos from the event? The online fights "
3665 "over <ulink url=\"https://www.wired.com/story/how-to-take-photos-at-protests/"
3666 "\">when and how to post photos from demonstrations</ulink> reveal a nuanced, "
3667 "complex issue that cannot be easily hand-waved away by giving one party a "
3668 "property right that everyone else in the mix has to respect."
3669 msgstr ""
3670
3671 #. type: Content of: <article><sect1><para>
3672 msgid ""
3673 "The fact that information isn’t a good fit with property and markets doesn’t "
3674 "mean that it’s not valuable. Babies aren’t property, but they’re inarguably "
3675 "valuable. In fact, we have a whole set of rules just for babies as well as a "
3676 "subset of those rules that apply to humans more generally. Someone who "
3677 "argues that babies won’t be truly valuable until they can be bought and sold "
3678 "like loaves of bread would be instantly and rightfully condemned as a "
3679 "monster."
3680 msgstr ""
3681
3682 #. type: Content of: <article><sect1><para>
3683 msgid ""
3684 "It’s tempting to reach for the property hammer when Big Tech treats your "
3685 "information like a nail — not least because Big Tech are such prolific "
3686 "abusers of property hammers when it comes to <emphasis>their</emphasis> "
3687 "information. But this is a mistake. If we allow markets to dictate the use "
3688 "of our information, then we’ll find that we’re sellers in a buyers’ market "
3689 "where the Big Tech monopolies set a price for our data that is so low as to "
3690 "be insignificant or, more likely, set at a nonnegotiable price of zero in a "
3691 "click-through agreement that you don’t have the opportunity to modify."
3692 msgstr ""
3693
3694 #. type: Content of: <article><sect1><para>
3695 msgid ""
3696 "Meanwhile, establishing property rights over information will create "
3697 "insurmountable barriers to independent data processing. Imagine that we "
3698 "require a license to be negotiated when a translated document is compared "
3699 "with its original, something Google has done and continues to do billions of "
3700 "times to train its automated language translation tools. Google can afford "
3701 "this, but independent third parties cannot. Google can staff a clearances "
3702 "department to negotiate one-time payments to the likes of the EU (one of the "
3703 "major repositories of translated documents) while independent watchdogs "
3704 "wanting to verify that the translations are well-prepared, or to root out "
3705 "bias in translations, will find themselves needing a staffed-up legal "
3706 "department and millions for licenses before they can even get started."
3707 msgstr ""
3708
3709 #. type: Content of: <article><sect1><para>
3710 msgid ""
3711 "The same goes for things like search indexes of the web or photos of "
3712 "peoples’ houses, which have become contentious thanks to Google’s Street "
3713 "View project. Whatever problems may exist with Google’s photographing of "
3714 "street scenes, resolving them by letting people decide who can take pictures "
3715 "of the facades of their homes from a public street will surely create even "
3716 "worse ones. Think of how street photography is important for newsgathering — "
3717 "including informal newsgathering, like photographing abuses of authority — "
3718 "and how being able to document housing and street life are important for "
3719 "contesting eminent domain, advocating for social aid, reporting planning and "
3720 "zoning violations, documenting discriminatory and unequal living conditions, "
3721 "and more."
3722 msgstr ""
3723
3724 #. type: Content of: <article><sect1><para>
3725 msgid ""
3726 "The ownership of facts is antithetical to many kinds of human progress. It’s "
3727 "hard to imagine a rule that limits Big Tech’s exploitation of our collective "
3728 "labors without inadvertently banning people from gathering data on online "
3729 "harassment or compiling indexes of changes in language or simply "
3730 "investigating how the platforms are shaping our discourse — all of which "
3731 "require scraping data that other people have created and subjecting it to "
3732 "scrutiny and analysis."
3733 msgstr ""
3734
3735 #. type: Content of: <article><sect1><title>
3736 msgid "Persuasion works… slowly"
3737 msgstr ""
3738
3739 #. type: Content of: <article><sect1><para>
3740 msgid ""
3741 "The platforms may oversell their ability to persuade people, but obviously, "
3742 "persuasion works sometimes. Whether it’s the private realm that LGBTQ people "
3743 "used to recruit allies and normalize sexual diversity or the decadeslong "
3744 "project to convince people that markets are the only efficient way to solve "
3745 "complicated resource allocation problems, it’s clear that our societal "
3746 "attitudes <emphasis>can</emphasis> change."
3747 msgstr ""
3748
3749 #. type: Content of: <article><sect1><para>
3750 msgid ""
3751 "The project of shifting societal attitudes is a game of inches and years. "
3752 "For centuries, svengalis have purported to be able to accelerate this "
3753 "process, but even the most brutal forms of propaganda have struggled to make "
3754 "permanent changes. Joseph Goebbels was able to subject Germans to daily, "
3755 "mandatory, hourslong radio broadcasts, to round up and torture and murder "
3756 "dissidents, and to seize full control over their children’s education while "
3757 "banning any literature, broadcasts, or films that did not comport with his "
3758 "worldview."
3759 msgstr ""
3760
3761 #. type: Content of: <article><sect1><para>
3762 msgid ""
3763 "Yet, after 12 years of terror, once the war ended, Nazi ideology was largely "
3764 "discredited in both East and West Germany, and a program of national truth "
3765 "and reconciliation was put in its place. Racism and authoritarianism were "
3766 "never fully abolished in Germany, but neither were the majority of Germans "
3767 "irrevocably convinced of Nazism — and the rise of racist authoritarianism in "
3768 "Germany today tells us that the liberal attitudes that replaced Nazism were "
3769 "no more permanent than Nazism itself."
3770 msgstr ""
3771
3772 #. type: Content of: <article><sect1><para>
3773 msgid ""
3774 "Racism and authoritarianism have also always been with us. Anyone who’s "
3775 "reviewed the kind of messages and arguments that racists put forward today "
3776 "would be hard-pressed to say that they have gotten better at presenting "
3777 "their ideas. The same pseudoscience, appeals to fear, and circular logic "
3778 "that racists presented in the 1980s, when the cause of white supremacy was "
3779 "on the wane, are to be found in the communications of leading white "
3780 "nationalists today."
3781 msgstr ""
3782
3783 #. type: Content of: <article><sect1><para>
3784 msgid ""
3785 "If racists haven’t gotten more convincing in the past decade, then how is it "
3786 "that more people were convinced to be openly racist at that time? I believe "
3787 "that the answer lies in the material world, not the world of ideas. The "
3788 "ideas haven’t gotten more convincing, but people have become more afraid. "
3789 "Afraid that the state can’t be trusted to act as an honest broker in life-or-"
3790 "death decisions, from those regarding the management of the economy to the "
3791 "regulation of painkillers to the rules for handling private information. "
3792 "Afraid that the world has become a game of musical chairs in which the "
3793 "chairs are being taken away at a never-before-seen rate. Afraid that justice "
3794 "for others will come at their expense. Monopolism isn’t the cause of these "
3795 "fears, but the inequality and material desperation and policy malpractice "
3796 "that monopolism contributes to is a significant contributor to these "
3797 "conditions. Inequality creates the conditions for both conspiracies and "
3798 "violent racist ideologies, and then surveillance capitalism lets "
3799 "opportunists target the fearful and the conspiracy-minded."
3800 msgstr ""
3801
3802 #. type: Content of: <article><sect1><title>
3803 msgid "Paying won’t help"
3804 msgstr ""
3805
3806 #. type: Content of: <article><sect1><para>
3807 msgid ""
3808 "As the old saw goes, <quote>If you’re not paying for the product, you’re the "
3809 "product.</quote>"
3810 msgstr ""
3811
3812 #. type: Content of: <article><sect1><para>
3813 msgid ""
3814 "It’s a commonplace belief today that the advent of free, ad-supported media "
3815 "was the original sin of surveillance capitalism. The reasoning is that the "
3816 "companies that charged for access couldn’t <quote>compete with free</quote> "
3817 "and so they were driven out of business. Their ad-supported competitors, "
3818 "meanwhile, declared open season on their users’ data in a bid to improve "
3819 "their ad targeting and make more money and then resorted to the most "
3820 "sensationalist tactics to generate clicks on those ads. If only we’d pay for "
3821 "media again, we’d have a better, more responsible, more sober discourse that "
3822 "would be better for democracy."
3823 msgstr ""
3824
3825 #. type: Content of: <article><sect1><para>
3826 msgid ""
3827 "But the degradation of news products long precedes the advent of ad-"
3828 "supported online news. Long before newspapers were online, lax antitrust "
3829 "enforcement had opened the door for unprecedented waves of consolidation and "
3830 "roll-ups in newsrooms. Rival newspapers were merged, reporters and ad sales "
3831 "staff were laid off, physical plants were sold and leased back, leaving the "
3832 "companies loaded up with debt through leveraged buyouts and subsequent "
3833 "profit-taking by the new owners. In other words, it wasn’t merely shifts in "
3834 "the classified advertising market, which was long held to be the primary "
3835 "driver in the decline of the traditional newsroom, that made news companies "
3836 "unable to adapt to the internet — it was monopolism."
3837 msgstr ""
3838
3839 #. type: Content of: <article><sect1><para>
3840 msgid ""
3841 "Then, as news companies <emphasis>did</emphasis> come online, the ad "
3842 "revenues they commanded dropped even as the number of internet users (and "
3843 "thus potential online readers) increased. That shift was a function of "
3844 "consolidation in the ad sales market, with Google and Facebook emerging as "
3845 "duopolists who made more money every year from advertising while paying less "
3846 "and less of it to the publishers whose work the ads appeared alongside. "
3847 "Monopolism created a buyer’s market for ad inventory with Facebook and "
3848 "Google acting as gatekeepers."
3849 msgstr ""
3850
3851 #. type: Content of: <article><sect1><para>
3852 msgid ""
3853 "Paid services continue to exist alongside free ones, and often it is these "
3854 "paid services — anxious to prevent people from bypassing their paywalls or "
3855 "sharing paid media with freeloaders — that exert the most control over their "
3856 "customers. Apple’s iTunes and App Stores are paid services, but to maximize "
3857 "their profitability, Apple has to lock its platforms so that third parties "
3858 "can’t make compatible software without permission. These locks allow the "
3859 "company to exercise both editorial control (enabling it to exclude <ulink "
3860 "url=\"https://ncac.org/news/blog/does-apples-strict-app-store-content-policy-"
3861 "limit-freedom-of-expression\">controversial political material</ulink>) and "
3862 "technological control, including control over who can repair the devices it "
3863 "makes. If we’re worried that ad-supported products deprive people of their "
3864 "right to self-determination by using persuasion techniques to nudge their "
3865 "purchase decisions a few degrees in one direction or the other, then the "
3866 "near-total control a single company holds over the decision of who gets to "
3867 "sell you software, parts, and service for your iPhone should have us very "
3868 "worried indeed."
3869 msgstr ""
3870
3871 #. type: Content of: <article><sect1><para>
3872 msgid ""
3873 "We shouldn’t just be concerned about payment and control: The idea that "
3874 "paying will improve discourse is also dangerously wrong. The poor success "
3875 "rate of targeted advertising means that the platforms have to incentivize "
3876 "you to <quote>engage</quote> with posts at extremely high levels to generate "
3877 "enough pageviews to safeguard their profits. As discussed earlier, to "
3878 "increase engagement, platforms like Facebook use machine learning to guess "
3879 "which messages will be most inflammatory and make a point of shoving those "
3880 "into your eyeballs at every turn so that you will hate-click and argue with "
3881 "people."
3882 msgstr ""
3883
3884 #. type: Content of: <article><sect1><para>
3885 msgid ""
3886 "Perhaps paying would fix this, the reasoning goes. If platforms could be "
3887 "economically viable even if you stopped clicking on them once your "
3888 "intellectual and social curiosity had been slaked, then they would have no "
3889 "reason to algorithmically enrage you to get more clicks out of you, right?"
3890 msgstr ""
3891
3892 #. type: Content of: <article><sect1><para>
3893 msgid ""
3894 "There may be something to that argument, but it still ignores the wider "
3895 "economic and political context of the platforms and the world that allowed "
3896 "them to grow so dominant."
3897 msgstr ""
3898
3899 #. type: Content of: <article><sect1><para>
3900 msgid ""
3901 "Platforms are world-spanning and all-encompassing because they are "
3902 "monopolies, and they are monopolies because we have gutted our most "
3903 "important and reliable anti-monopoly rules. Antitrust was neutered as a key "
3904 "part of the project to make the wealthy wealthier, and that project has "
3905 "worked. The vast majority of people on Earth have a negative net worth, and "
3906 "even the dwindling middle class is in a precarious state, undersaved for "
3907 "retirement, underinsured for medical disasters, and undersecured against "
3908 "climate and technology shocks."
3909 msgstr ""
3910
3911 #. type: Content of: <article><sect1><para>
3912 msgid ""
3913 "In this wildly unequal world, paying doesn’t improve the discourse; it "
3914 "simply prices discourse out of the range of the majority of people. Paying "
3915 "for the product is dandy, if you can afford it."
3916 msgstr ""
3917
3918 #. type: Content of: <article><sect1><para>
3919 msgid ""
3920 "If you think today’s filter bubbles are a problem for our discourse, imagine "
3921 "what they’d be like if rich people inhabited free-flowing Athenian "
3922 "marketplaces of ideas where you have to pay for admission while everyone "
3923 "else lives in online spaces that are subsidized by wealthy benefactors who "
3924 "relish the chance to establish conversational spaces where the <quote>house "
3925 "rules</quote> forbid questioning the status quo. That is, imagine if the "
3926 "rich seceded from Facebook, and then, instead of running ads that made money "
3927 "for shareholders, Facebook became a billionaire’s vanity project that also "
3928 "happened to ensure that nobody talked about whether it was fair that only "
3929 "billionaires could afford to hang out in the rarified corners of the "
3930 "internet."
3931 msgstr ""
3932
3933 #. type: Content of: <article><sect1><para>
3934 msgid ""
3935 "Behind the idea of paying for access is a belief that free markets will "
3936 "address Big Tech’s dysfunction. After all, to the extent that people have a "
3937 "view of surveillance at all, it is generally an unfavorable one, and the "
3938 "longer and more thoroughly one is surveilled, the less one tends to like it. "
3939 "Same goes for lock-in: If HP’s ink or Apple’s App Store were really "
3940 "obviously fantastic, they wouldn’t need technical measures to prevent users "
3941 "from choosing a rival’s product. The only reason these technical "
3942 "countermeasures exist is that the companies don’t believe their customers "
3943 "would <emphasis>voluntarily</emphasis> submit to their terms, and they want "
3944 "to deprive them of the choice to take their business elsewhere."
3945 msgstr ""
3946
3947 #. type: Content of: <article><sect1><para>
3948 msgid ""
3949 "Advocates for markets laud their ability to aggregate the diffused knowledge "
3950 "of buyers and sellers across a whole society through demand signals, price "
3951 "signals, and so on. The argument for surveillance capitalism being a "
3952 "<quote>rogue capitalism</quote> is that machine-learning-driven persuasion "
3953 "techniques distort decision-making by consumers, leading to incorrect "
3954 "signals — consumers don’t buy what they prefer, they buy what they’re "
3955 "tricked into preferring. It follows that the monopolistic practices of lock-"
3956 "in, which do far more to constrain consumers’ free choices, are even more of "
3957 "a <quote>rogue capitalism.</quote>"
3958 msgstr ""
3959
3960 #. type: Content of: <article><sect1><para>
3961 msgid ""
3962 "The profitability of any business is constrained by the possibility that its "
3963 "customers will take their business elsewhere. Both surveillance and lock-in "
3964 "are anti-features that no customer wants. But monopolies can capture their "
3965 "regulators, crush their competitors, insert themselves into their customers’ "
3966 "lives, and corral people into <quote>choosing</quote> their services "
3967 "regardless of whether they want them — it’s fine to be terrible when there "
3968 "is no alternative."
3969 msgstr ""
3970
3971 #. type: Content of: <article><sect1><para>
3972 msgid ""
3973 "Ultimately, surveillance and lock-in are both simply business strategies "
3974 "that monopolists can choose. Surveillance companies like Google are "
3975 "perfectly capable of deploying lock-in technologies — just look at the "
3976 "onerous Android licensing terms that require device-makers to bundle in "
3977 "Google’s suite of applications. And lock-in companies like Apple are "
3978 "perfectly capable of subjecting their users to surveillance if it means "
3979 "keeping the Chinese government happy and preserving ongoing access to "
3980 "Chinese markets. Monopolies may be made up of good, ethical people, but as "
3981 "institutions, they are not your friend — they will do whatever they can get "
3982 "away with to maximize their profits, and the more monopolistic they are, the "
3983 "more they <emphasis>can</emphasis> get away with."
3984 msgstr ""
3985
3986 #. type: Content of: <article><sect1><title>
3987 msgid "An <quote>ecology</quote> moment for trustbusting"
3988 msgstr ""
3989
3990 #. type: Content of: <article><sect1><para>
3991 msgid ""
3992 "If we’re going to break Big Tech’s death grip on our digital lives, we’re "
3993 "going to have to fight monopolies. That may sound pretty mundane and old-"
3994 "fashioned, something out of the New Deal era, while ending the use of "
3995 "automated behavioral modification feels like the plotline of a really cool "
3996 "cyberpunk novel."
3997 msgstr ""
3998
3999 #. type: Content of: <article><sect1><para>
4000 msgid ""
4001 "Meanwhile, breaking up monopolies is something we seem to have forgotten how "
4002 "to do. There is a bipartisan, trans-Atlantic consensus that breaking up "
4003 "companies is a fool’s errand at best — liable to mire your federal "
4004 "prosecutors in decades of litigation — and counterproductive at worst, "
4005 "eroding the <quote>consumer benefits</quote> of large companies with massive "
4006 "efficiencies of scale."
4007 msgstr ""
4008
4009 #. type: Content of: <article><sect1><para>
4010 msgid ""
4011 "But trustbusters once strode the nation, brandishing law books, terrorizing "
4012 "robber barons, and shattering the illusion of monopolies’ all-powerful grip "
4013 "on our society. The trustbusting era could not begin until we found the "
4014 "political will — until the people convinced politicians they’d have their "
4015 "backs when they went up against the richest, most powerful men in the world."
4016 msgstr ""
4017
4018 #. type: Content of: <article><sect1><para>
4019 msgid "Could we find that political will again?"
4020 msgstr ""
4021
4022 #. type: Content of: <article><sect1><para>
4023 msgid ""
4024 "Copyright scholar James Boyle has described how the term <quote>ecology</"
4025 "quote> marked a turning point in environmental activism. Prior to the "
4026 "adoption of this term, people who wanted to preserve whale populations "
4027 "didn’t necessarily see themselves as fighting the same battle as people who "
4028 "wanted to protect the ozone layer or fight freshwater pollution or beat back "
4029 "smog or acid rain."
4030 msgstr ""
4031
4032 #. type: Content of: <article><sect1><para>
4033 msgid ""
4034 "But the term <quote>ecology</quote> welded these disparate causes together "
4035 "into a single movement, and the members of this movement found solidarity "
4036 "with one another. The people who cared about smog signed petitions "
4037 "circulated by the people who wanted to end whaling, and the anti-whalers "
4038 "marched alongside the people demanding action on acid rain. This uniting "
4039 "behind a common cause completely changed the dynamics of environmentalism, "
4040 "setting the stage for today’s climate activism and the sense that preserving "
4041 "the habitability of the planet Earth is a shared duty among all people."
4042 msgstr ""
4043
4044 #. type: Content of: <article><sect1><para>
4045 msgid ""
4046 "I believe we are on the verge of a new <quote>ecology</quote> moment "
4047 "dedicated to combating monopolies. After all, tech isn’t the only "
4048 "concentrated industry nor is it even the <emphasis>most</emphasis> "
4049 "concentrated of industries."
4050 msgstr ""
4051
4052 #. type: Content of: <article><sect1><para>
4053 msgid ""
4054 "You can find partisans for trustbusting in every sector of the economy. "
4055 "Everywhere you look, you can find people who’ve been wronged by monopolists "
4056 "who’ve trashed their finances, their health, their privacy, their "
4057 "educations, and the lives of people they love. Those people have the same "
4058 "cause as the people who want to break up Big Tech and the same enemies. When "
4059 "most of the world’s wealth is in the hands of a very few, it follows that "
4060 "nearly every large company will have overlapping shareholders."
4061 msgstr ""
4062
4063 #. type: Content of: <article><sect1><para>
4064 msgid ""
4065 "That’s the good news: With a little bit of work and a little bit of "
4066 "coalition building, we have more than enough political will to break up Big "
4067 "Tech and every other concentrated industry besides. First we take Facebook, "
4068 "then we take AT&amp;T/WarnerMedia."
4069 msgstr ""
4070
4071 #. type: Content of: <article><sect1><para>
4072 msgid ""
4073 "But here’s the bad news: Much of what we’re doing to tame Big Tech "
4074 "<emphasis>instead</emphasis> of breaking up the big companies also "
4075 "forecloses on the possibility of breaking them up later."
4076 msgstr ""
4077
4078 #. type: Content of: <article><sect1><para>
4079 msgid ""
4080 "Big Tech’s concentration currently means that their inaction on harassment, "
4081 "for example, leaves users with an impossible choice: absent themselves from "
4082 "public discourse by, say, quitting Twitter or endure vile, constant abuse. "
4083 "Big Tech’s over-collection and over-retention of data results in horrific "
4084 "identity theft. And their inaction on extremist recruitment means that white "
4085 "supremacists who livestream their shooting rampages can reach an audience of "
4086 "billions. The combination of tech concentration and media concentration "
4087 "means that artists’ incomes are falling even as the revenue generated by "
4088 "their creations are increasing."
4089 msgstr ""
4090
4091 #. type: Content of: <article><sect1><para>
4092 msgid ""
4093 "Yet governments confronting all of these problems all inevitably converge on "
4094 "the same solution: deputize the Big Tech giants to police their users and "
4095 "render them liable for their users’ bad actions. The drive to force Big Tech "
4096 "to use automated filters to block everything from copyright infringement to "
4097 "sex-trafficking to violent extremism means that tech companies will have to "
4098 "allocate hundreds of millions to run these compliance systems."
4099 msgstr ""
4100
4101 #. type: Content of: <article><sect1><para>
4102 msgid ""
4103 "These rules — the EU’s new Directive on Copyright, Australia’s new terror "
4104 "regulation, America’s FOSTA/SESTA sex-trafficking law and more — are not "
4105 "just death warrants for small, upstart competitors that might challenge Big "
4106 "Tech’s dominance but who lack the deep pockets of established incumbents to "
4107 "pay for all these automated systems. Worse still, these rules put a floor "
4108 "under how small we can hope to make Big Tech."
4109 msgstr ""
4110
4111 #. type: Content of: <article><sect1><para>
4112 msgid ""
4113 "That’s because any move to break up Big Tech and cut it down to size will "
4114 "have to cope with the hard limit of not making these companies so small that "
4115 "they can no longer afford to perform these duties — and it’s "
4116 "<emphasis>expensive</emphasis> to invest in those automated filters and "
4117 "outsource content moderation. It’s already going to be hard to unwind these "
4118 "deeply concentrated, chimeric behemoths that have been welded together in "
4119 "the pursuit of monopoly profits. Doing so while simultaneously finding some "
4120 "way to fill the regulatory void that will be left behind if these self-"
4121 "policing rulers were forced to suddenly abdicate will be much, much harder."
4122 msgstr ""
4123
4124 #. type: Content of: <article><sect1><para>
4125 msgid ""
4126 "Allowing the platforms to grow to their present size has given them a "
4127 "dominance that is nearly insurmountable — deputizing them with public duties "
4128 "to redress the pathologies created by their size makes it virtually "
4129 "impossible to reduce that size. Lather, rinse, repeat: If the platforms "
4130 "don’t get smaller, they will get larger, and as they get larger, they will "
4131 "create more problems, which will give rise to more public duties for the "
4132 "companies, which will make them bigger still."
4133 msgstr ""
4134
4135 #. type: Content of: <article><sect1><para>
4136 msgid ""
4137 "We can work to fix the internet by breaking up Big Tech and depriving them "
4138 "of monopoly profits, or we can work to fix Big Tech by making them spend "
4139 "their monopoly profits on governance. But we can’t do both. We have to "
4140 "choose between a vibrant, open internet or a dominated, monopolized internet "
4141 "commanded by Big Tech giants that we struggle with constantly to get them to "
4142 "behave themselves."
4143 msgstr ""
4144
4145 #. type: Content of: <article><sect1><title>
4146 msgid "Make Big Tech small again"
4147 msgstr ""
4148
4149 #. type: Content of: <article><sect1><para>
4150 msgid ""
4151 "Trustbusting is hard. Breaking big companies into smaller ones is expensive "
4152 "and time-consuming. So time-consuming that by the time you’re done, the "
4153 "world has often moved on and rendered years of litigation irrelevant. From "
4154 "1969 to 1982, the U.S. government pursued an antitrust case against IBM over "
4155 "its dominance of mainframe computing — but the case collapsed in 1982 "
4156 "because mainframes were being speedily replaced by PCs."
4157 msgstr ""
4158
4159 #. type: Content of: <article><sect1><blockquote><para>
4160 msgid ""
4161 "A future U.S. president could simply direct their attorney general to "
4162 "enforce the law as it was written."
4163 msgstr ""
4164
4165 #. type: Content of: <article><sect1><para>
4166 msgid ""
4167 "It’s far easier to prevent concentration than to fix it, and reinstating the "
4168 "traditional contours of U.S. antitrust enforcement will, at the very least, "
4169 "prevent further concentration. That means bans on mergers between large "
4170 "companies, on big companies acquiring nascent competitors, and on platform "
4171 "companies competing directly with the companies that rely on the platforms."
4172 msgstr ""
4173
4174 #. type: Content of: <article><sect1><para>
4175 msgid ""
4176 "These powers are all in the plain language of U.S. antitrust laws, so in "
4177 "theory, a future U.S. president could simply direct their attorney general "
4178 "to enforce the law as it was written. But after decades of judicial "
4179 "<quote>education</quote> in the benefits of monopolies, after multiple "
4180 "administrations that have packed the federal courts with lifetime-appointed "
4181 "monopoly cheerleaders, it’s not clear that mere administrative action would "
4182 "do the trick."
4183 msgstr ""
4184
4185 #. type: Content of: <article><sect1><para>
4186 msgid ""
4187 "If the courts frustrate the Justice Department and the president, the next "
4188 "stop would be Congress, which could eliminate any doubt about how antitrust "
4189 "law should be enforced in the U.S. by passing new laws that boil down to "
4190 "saying, <quote>Knock it off. We all know what the Sherman Act says. Robert "
4191 "Bork was a deranged fantasist. For avoidance of doubt, <emphasis>fuck that "
4192 "guy</emphasis>.</quote> In other words, the problem with monopolies is "
4193 "<emphasis>monopolism</emphasis> — the concentration of power into too few "
4194 "hands, which erodes our right to self-determination. If there is a monopoly, "
4195 "the law wants it gone, period. Sure, get rid of monopolies that create "
4196 "<quote>consumer harm</quote> in the form of higher prices, but also, "
4197 "<emphasis>get rid of other monopolies, too</emphasis>."
4198 msgstr ""
4199
4200 #. type: Content of: <article><sect1><para>
4201 msgid ""
4202 "But this only prevents things from getting worse. To help them get better, "
4203 "we will have to build coalitions with other activists in the anti-monopoly "
4204 "ecology movement — a pluralism movement or a self-determination movement — "
4205 "and target existing monopolies in every industry for breakup and structural "
4206 "separation rules that prevent, for example, the giant eyewear monopolist "
4207 "Luxottica from dominating both the sale and the manufacture of spectacles."
4208 msgstr ""
4209
4210 #. type: Content of: <article><sect1><para>
4211 msgid ""
4212 "In an important sense, it doesn’t matter which industry the breakups begin "
4213 "in. Once they start, shareholders in <emphasis>every</emphasis> industry "
4214 "will start to eye their investments in monopolists skeptically. As "
4215 "trustbusters ride into town and start making lives miserable for "
4216 "monopolists, the debate around every corporate boardroom’s table will shift. "
4217 "People within corporations who’ve always felt uneasy about monopolism will "
4218 "gain a powerful new argument to fend off their evil rivals in the corporate "
4219 "hierarchy: <quote>If we do it my way, we make less money; if we do it your "
4220 "way, a judge will fine us billions and expose us to ridicule and public "
4221 "disapprobation. So even though I get that it would be really cool to do that "
4222 "merger, lock out that competitor, or buy that little company and kill it "
4223 "before it can threaten it, we really shouldn’t — not if we don’t want to get "
4224 "tied to the DOJ’s bumper and get dragged up and down Trustbuster Road for "
4225 "the next 10 years.</quote>"
4226 msgstr ""
4227
4228 #. type: Content of: <article><sect1><title>
4229 msgid "20 GOTO 10"
4230 msgstr ""
4231
4232 #. type: Content of: <article><sect1><para>
4233 msgid ""
4234 "Fixing Big Tech will require a lot of iteration. As cyber lawyer Lawrence "
4235 "Lessig wrote in his 1999 book, <emphasis>Code and Other Laws of Cyberspace</"
4236 "emphasis>, our lives are regulated by four forces: law (what’s legal), code "
4237 "(what’s technologically possible), norms (what’s socially acceptable), and "
4238 "markets (what’s profitable)."
4239 msgstr ""
4240
4241 #. type: Content of: <article><sect1><para>
4242 msgid ""
4243 "If you could wave a wand and get Congress to pass a law that re-fanged the "
4244 "Sherman Act tomorrow, you could use the impending breakups to convince "
4245 "venture capitalists to fund competitors to Facebook, Google, Twitter, and "
4246 "Apple that would be waiting in the wings after they were cut down to size."
4247 msgstr ""
4248
4249 #. type: Content of: <article><sect1><para>
4250 msgid ""
4251 "But getting Congress to act will require a massive normative shift, a mass "
4252 "movement of people who care about monopolies — and pulling them apart."
4253 msgstr ""
4254
4255 #. type: Content of: <article><sect1><para>
4256 msgid ""
4257 "Getting people to care about monopolies will take technological "
4258 "interventions that help them to see what a world free from Big Tech might "
4259 "look like. Imagine if someone could make a beloved (but unauthorized) third-"
4260 "party Facebook or Twitter client that dampens the anxiety-producing "
4261 "algorithmic drumbeat and still lets you talk to your friends without being "
4262 "spied upon — something that made social media more sociable and less toxic. "
4263 "Now imagine that it gets shut down in a brutal legal battle. It’s always "
4264 "easier to convince people that something must be done to save a thing they "
4265 "love than it is to excite them about something that doesn’t even exist yet."
4266 msgstr ""
4267
4268 #. type: Content of: <article><sect1><para>
4269 msgid ""
4270 "Neither tech nor law nor code nor markets are sufficient to reform Big Tech. "
4271 "But a profitable competitor to Big Tech could bankroll a legislative push; "
4272 "legal reform can embolden a toolsmith to make a better tool; the tool can "
4273 "create customers for a potential business who value the benefits of the "
4274 "internet but want them delivered without Big Tech; and that business can get "
4275 "funded and divert some of its profits to legal reform. 20 GOTO 10 (or "
4276 "lather, rinse, repeat). Do it again, but this time, get farther! After all, "
4277 "this time you’re starting with weaker Big Tech adversaries, a constituency "
4278 "that understands things can be better, Big Tech rivals who’ll help ensure "
4279 "their own future by bankrolling reform, and code that other programmers can "
4280 "build on to weaken Big Tech even further."
4281 msgstr ""
4282
4283 #. type: Content of: <article><sect1><para>
4284 msgid ""
4285 "The surveillance capitalism hypothesis — that Big Tech’s products really "
4286 "work as well as they say they do and that’s why everything is so screwed up "
4287 "— is way too easy on surveillance and even easier on capitalism. Companies "
4288 "spy because they believe their own BS, and companies spy because governments "
4289 "let them, and companies spy because any advantage from spying is so short-"
4290 "lived and minor that they have to do more and more of it just to stay in "
4291 "place."
4292 msgstr ""
4293
4294 #. type: Content of: <article><sect1><para>
4295 msgid ""
4296 "As to why things are so screwed up? Capitalism. Specifically, the monopolism "
4297 "that creates inequality and the inequality that creates monopolism. It’s a "
4298 "form of capitalism that rewards sociopaths who destroy the real economy to "
4299 "inflate the bottom line, and they get away with it for the same reason "
4300 "companies get away with spying: because our governments are in thrall to "
4301 "both the ideology that says monopolies are actually just fine and in thrall "
4302 "to the ideology that says that in a monopolistic world, you’d better not "
4303 "piss off the monopolists."
4304 msgstr ""
4305
4306 #. type: Content of: <article><sect1><para>
4307 msgid ""
4308 "Surveillance doesn’t make capitalism rogue. Capitalism’s unchecked rule "
4309 "begets surveillance. Surveillance isn’t bad because it lets people "
4310 "manipulate us. It’s bad because it crushes our ability to be our authentic "
4311 "selves — and because it lets the rich and powerful figure out who might be "
4312 "thinking of building guillotines and what dirt they can use to discredit "
4313 "those embryonic guillotine-builders before they can even get to the "
4314 "lumberyard."
4315 msgstr ""
4316
4317 #. type: Content of: <article><sect1><title>
4318 msgid "Up and through"
4319 msgstr ""
4320
4321 #. type: Content of: <article><sect1><para>
4322 msgid ""
4323 "With all the problems of Big Tech, it’s tempting to imagine solving the "
4324 "problem by returning to a world without tech at all. Resist that temptation."
4325 msgstr ""
4326
4327 #. type: Content of: <article><sect1><para>
4328 msgid ""
4329 "The only way out of our Big Tech problem is up and through. If our future is "
4330 "not reliant upon high tech, it will be because civilization has fallen. Big "
4331 "Tech wired together a planetary, species-wide nervous system that, with the "
4332 "proper reforms and course corrections, is capable of seeing us through the "
4333 "existential challenge of our species and planet. Now it’s up to us to seize "
4334 "the means of computation, putting that electronic nervous system under "
4335 "democratic, accountable control."
4336 msgstr ""
4337
4338 #. type: Content of: <article><sect1><para>
4339 msgid ""
4340 "I am, secretly, despite what I have said earlier, a tech exceptionalist. Not "
4341 "in the sense of thinking that tech should be given a free pass to monopolize "
4342 "because it has <quote>economies of scale</quote> or some other nebulous "
4343 "feature. I’m a tech exceptionalist because I believe that getting tech right "
4344 "matters and that getting it wrong will be an unmitigated catastrophe — and "
4345 "doing it right can give us the power to work together to save our "
4346 "civilization, our species, and our planet."
4347 msgstr ""
4348
4349 #~ msgid "ISBN 978-82-93828-XX-X (hard cover)"
4350 #~ msgstr "ISBN 978-82-93828-XX-X (édition reliée)"
4351
4352 #~ msgid ""
4353 #~ "If you find typos, error or have other corrections to the translated "
4354 #~ "text, please update on <ulink url=\"https://hosted.weblate.org/projects/"
4355 #~ "rms-personal-data-safe/how-to-destroy-surveillance-capitalism/nb_NO/\"/>."
4356 #~ msgstr ""
4357 #~ "Si vous trouvez des fautes de frappe, des erreurs ou si vous avez "
4358 #~ "d'autres corrections sur le texte traduit, veuillez mettre à jour <ulink "
4359 #~ "url=\"https://hosted.weblate.org/projects/rms-personal-data-safe/how-to-"
4360 #~ "destroy-surveillance-capitalism/fr/\"/>."