1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Cory Doctorow
3 # This file is distributed under the same license as the How to Destroy Surveillance Capitalism package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9 "Project-Id-Version: How to Destroy Surveillance Capitalism n/a\n"
10 "POT-Creation-Date: 2020-10-11 16:56+0200\n"
11 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
12 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
19 #. type: Attribute 'lang' of: <book>
20 #: complete-book.xml:4
24 #. type: Content of: <book><chapter><title>
25 #: complete-book.xml:6 complete-book.xml:71
26 msgid "How to Destroy Surveillance Capitalism"
29 #. type: Content of: <book><bookinfo><authorgroup><author><firstname>
30 #: complete-book.xml:11
34 #. type: Content of: <book><bookinfo><authorgroup><author><surname>
35 #: complete-book.xml:12
39 #. type: Content of: <book><bookinfo><publisher><address>
40 #: complete-book.xml:17
42 msgid "<city>Oslo</city>"
45 #. type: Content of: <book><bookinfo>
46 #: complete-book.xml:15
48 "<publisher> <publishername>Petter Reinholdtsen</publishername> <placeholder "
49 "type=\"address\" id=\"0\"/> </publisher> <copyright> <year>2020</year> "
50 "<holder>Cory Doctorow</holder> </copyright> <copyright> <year>2020</year> "
51 "<holder>Petter Reinholdtsen</holder> </copyright>"
54 #. type: Content of: <book><bookinfo><legalnotice><para>
55 #: complete-book.xml:32
56 msgid "How to Destroy Surveillance Capitalism by Cory Doctorow."
59 #. type: Content of: <book><bookinfo><legalnotice><para>
60 #: complete-book.xml:35
61 msgid "Published by Petter Reinholdtsen."
64 #. type: Content of: <book><bookinfo><legalnotice><para>
65 #: complete-book.xml:39
66 msgid "ISBN 978-82-93828-05-1 (hard cover)"
69 #. type: Content of: <book><bookinfo><legalnotice><para>
70 #: complete-book.xml:42
71 msgid "ISBN 978-82-93828-06-8 (paperback)"
74 #. type: Content of: <book><bookinfo><legalnotice><para>
75 #: complete-book.xml:45
76 msgid "ISBN 978-82-93828-07-5 (ePub)"
79 #. type: Content of: <book><bookinfo><legalnotice><para><inlinemediaobject>
80 #: complete-book.xml:50
82 "<imageobject> <imagedata fileref=\"images/cc.png\" contentdepth=\"3em\" "
83 "width=\"100%\" align=\"center\"/> </imageobject> <imageobject> <imagedata "
84 "fileref=\"images/cc.svg\" contentdepth=\"3em\" width=\"100%\" "
85 "align=\"center\"/> </imageobject>"
88 #. type: Content of: <book><bookinfo><legalnotice><para><inlinemediaobject><textobject><phrase>
89 #: complete-book.xml:57
90 msgid "Creative Commons, Some rights reserved"
93 #. type: Content of: <book><bookinfo><legalnotice><para>
94 #: complete-book.xml:49
95 msgid "<placeholder type=\"inlinemediaobject\" id=\"0\"/>"
98 #. type: Content of: <book><bookinfo><legalnotice><para>
99 #: complete-book.xml:63
101 "This book is licensed under a Creative Commons license. This license permits "
102 "any use of this work, so long as attribution is given and no derivatived "
103 "material is distributed. For more information about the license visit "
104 "<ulink url=\"https://creativecommons.org/licenses/by-nd/4.0/\"/>."
107 #. type: Content of: <book><chapter><sect1><title>
108 #: complete-book.xml:73
109 msgid "The net of a thousand lies"
112 #. type: Content of: <book><chapter><sect1><para>
113 #: complete-book.xml:75
115 "The most surprising thing about the rebirth of flat Earthers in the 21st "
116 "century is just how widespread the evidence against them is. You can "
117 "understand how, centuries ago, people who’d never gained a high-enough "
118 "vantage point from which to see the Earth’s curvature might come to the "
119 "commonsense belief that the flat-seeming Earth was, indeed, flat."
122 #. type: Content of: <book><chapter><sect1><para>
123 #: complete-book.xml:83
125 "But today, when elementary schools routinely dangle GoPro cameras from "
126 "balloons and loft them high enough to photograph the Earth’s curve — to say "
127 "nothing of the unexceptional sight of the curved Earth from an airplane "
128 "window — it takes a heroic effort to maintain the belief that the world is "
132 #. type: Content of: <book><chapter><sect1><para>
133 #: complete-book.xml:90
135 "Likewise for white nationalism and eugenics: In an age where you can become "
136 "a computational genomics datapoint by swabbing your cheek and mailing it to "
137 "a gene-sequencing company along with a modest sum of money, <quote>race "
138 "science</quote> has never been easier to refute."
141 #. type: Content of: <book><chapter><sect1><para>
142 #: complete-book.xml:96
144 "We are living through a golden age of both readily available facts and "
145 "denial of those facts. Terrible ideas that have lingered on the fringes for "
146 "decades or even centuries have gone mainstream seemingly overnight."
149 #. type: Content of: <book><chapter><sect1><para>
150 #: complete-book.xml:102
152 "When an obscure idea gains currency, there are only two things that can "
153 "explain its ascendance: Either the person expressing that idea has gotten a "
154 "lot better at stating their case, or the proposition has become harder to "
155 "deny in the face of mounting evidence. In other words, if we want people to "
156 "take climate change seriously, we can get a bunch of Greta Thunbergs to make "
157 "eloquent, passionate arguments from podiums, winning our hearts and minds, "
158 "or we can wait for flood, fire, broiling sun, and pandemics to make the case "
159 "for us. In practice, we’ll probably have to do some of both: The more we’re "
160 "boiling and burning and drowning and wasting away, the easier it will be for "
161 "the Greta Thunbergs of the world to convince us."
164 #. type: Content of: <book><chapter><sect1><para>
165 #: complete-book.xml:115
167 "The arguments for ridiculous beliefs in odious conspiracies like "
168 "anti-vaccination, climate denial, a flat Earth, and eugenics are no better "
169 "than they were a generation ago. Indeed, they’re worse because they are "
170 "being pitched to people who have at least a background awareness of the "
174 #. type: Content of: <book><chapter><sect1><para>
175 #: complete-book.xml:122
177 "Anti-vax has been around since the first vaccines, but the early "
178 "anti-vaxxers were pitching people who were less equipped to understand even "
179 "the most basic ideas from microbiology, and moreover, those people had not "
180 "witnessed the extermination of mass-murdering diseases like polio, smallpox, "
181 "and measles. Today’s anti-vaxxers are no more eloquent than their forebears, "
182 "and they have a much harder job."
185 #. type: Content of: <book><chapter><sect1><para>
186 #: complete-book.xml:131
188 "So can these far-fetched conspiracy theorists really be succeeding on the "
189 "basis of superior arguments?"
192 #. type: Content of: <book><chapter><sect1><para>
193 #: complete-book.xml:135
195 "Some people think so. Today, there is a widespread belief that machine "
196 "learning and commercial surveillance can turn even the most fumble-tongued "
197 "conspiracy theorist into a svengali who can warp your perceptions and win "
198 "your belief by locating vulnerable people and then pitching them with "
199 "A.I.-refined arguments that bypass their rational faculties and turn "
200 "everyday people into flat Earthers, anti-vaxxers, or even Nazis. When the "
201 "RAND Corporation <ulink "
202 "url=\"https://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf\">blames "
203 "Facebook for <quote>radicalization</quote></ulink> and when Facebook’s role "
204 "in spreading coronavirus misinformation is <ulink "
205 "url=\"https://secure.avaaz.org/campaign/en/facebook_threat_health/\">blamed "
206 "on its algorithm</ulink>, the implicit message is that machine learning and "
207 "surveillance are causing the changes in our consensus about what’s true."
210 #. type: Content of: <book><chapter><sect1><para>
211 #: complete-book.xml:151
213 "After all, in a world where sprawling and incoherent conspiracy theories "
214 "like Pizzagate and its successor, QAnon, have widespread followings, "
215 "<emphasis>something</emphasis> must be afoot."
218 #. type: Content of: <book><chapter><sect1><para>
219 #: complete-book.xml:156
221 "But what if there’s another explanation? What if it’s the material "
222 "circumstances, and not the arguments, that are making the difference for "
223 "these conspiracy pitchmen? What if the trauma of living through "
224 "<emphasis>real conspiracies</emphasis> all around us — conspiracies among "
225 "wealthy people, their lobbyists, and lawmakers to bury inconvenient facts "
226 "and evidence of wrongdoing (these conspiracies are commonly known as "
227 "<quote>corruption</quote>) — is making people vulnerable to conspiracy "
231 #. type: Content of: <book><chapter><sect1><para>
232 #: complete-book.xml:166
234 "If it’s trauma and not contagion — material conditions and not ideology — "
235 "that is making the difference today and enabling a rise of repulsive "
236 "misinformation in the face of easily observed facts, that doesn’t mean our "
237 "computer networks are blameless. They’re still doing the heavy work of "
238 "locating vulnerable people and guiding them through a series of "
239 "ever-more-extreme ideas and communities."
242 #. type: Content of: <book><chapter><sect1><para>
243 #: complete-book.xml:174
245 "Belief in conspiracy is a raging fire that has done real damage and poses "
246 "real danger to our planet and species, from epidemics <ulink "
247 "url=\"https://www.cdc.gov/measles/cases-outbreaks.html\">kicked off by "
248 "vaccine denial</ulink> to genocides <ulink "
249 "url=\"https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html\">kicked "
250 "off by racist conspiracies</ulink> to planetary meltdown caused by "
251 "denial-inspired climate inaction. Our world is on fire, and so we have to "
252 "put the fires out — to figure out how to help people see the truth of the "
253 "world through the conspiracies they’ve been confused by."
256 #. type: Content of: <book><chapter><sect1><para>
257 #: complete-book.xml:186
259 "But firefighting is reactive. We need fire "
260 "<emphasis>prevention</emphasis>. We need to strike at the traumatic material "
261 "conditions that make people vulnerable to the contagion of conspiracy. Here, "
262 "too, tech has a role to play."
265 #. type: Content of: <book><chapter><sect1><para>
266 #: complete-book.xml:192
268 "There’s no shortage of proposals to address this. From the EU’s <ulink "
269 "url=\"https://edri.org/tag/terreg/\">Terrorist Content Regulation</ulink>, "
270 "which requires platforms to police and remove <quote>extremist</quote> "
271 "content, to the U.S. proposals to <ulink "
272 "url=\"https://www.eff.org/deeplinks/2020/03/earn-it-act-violates-constitution\">force "
273 "tech companies to spy on their users</ulink> and hold them liable <ulink "
274 "url=\"https://www.natlawreview.com/article/repeal-cda-section-230\">for "
275 "their users’ bad speech</ulink>, there’s a lot of energy to force tech "
276 "companies to solve the problems they created."
279 #. type: Content of: <book><chapter><sect1><para>
280 #: complete-book.xml:203
282 "There’s a critical piece missing from the debate, though. All these "
283 "solutions assume that tech companies are a fixture, that their dominance "
284 "over the internet is a permanent fact. Proposals to replace Big Tech with a "
285 "more diffused, pluralistic internet are nowhere to be found. Worse: The "
286 "<quote>solutions</quote> on the table today <emphasis>require</emphasis> Big "
287 "Tech to stay big because only the very largest companies can afford to "
288 "implement the systems these laws demand."
291 #. type: Content of: <book><chapter><sect1><para>
292 #: complete-book.xml:213
294 "Figuring out what we want our tech to look like is crucial if we’re going to "
295 "get out of this mess. Today, we’re at a crossroads where we’re trying to "
296 "figure out if we want to fix the Big Tech companies that dominate our "
297 "internet or if we want to fix the internet itself by unshackling it from Big "
298 "Tech’s stranglehold. We can’t do both, so we have to choose."
301 #. type: Content of: <book><chapter><sect1><para>
302 #: complete-book.xml:221
304 "I want us to choose wisely. Taming Big Tech is integral to fixing the "
305 "internet, and for that, we need digital rights activism."
308 #. type: Content of: <book><chapter><sect1><title>
309 #: complete-book.xml:225
310 msgid "Digital rights activism, a quarter-century on"
313 #. type: Content of: <book><chapter><sect1><para>
314 #: complete-book.xml:227
316 "Digital rights activism is more than 30 years old now. The Electronic "
317 "Frontier Foundation turned 30 this year; the Free Software Foundation "
318 "launched in 1985. For most of the history of the movement, the most "
319 "prominent criticism leveled against it was that it was irrelevant: The real "
320 "activist causes were real-world causes (think of the skepticism when <ulink "
321 "url=\"https://www.loc.gov/law/foreign-news/article/finland-legal-right-to-broadband-for-all-citizens/#:~:text=Global%20Legal%20Monitor,-Home%20%7C%20Search%20%7C%20Browse&text=(July%206%2C%202010)%20On,connection%20100%20MBPS%20by%202015.\">Finland "
322 "declared broadband a human right in 2010</ulink>), and real-world activism "
323 "was shoe-leather activism (think of Malcolm Gladwell’s <ulink "
324 "url=\"https://www.newyorker.com/magazine/2010/10/04/small-change-malcolm-gladwell\">contempt "
325 "for <quote>clicktivism</quote></ulink>). But as tech has grown more central "
326 "to our daily lives, these accusations of irrelevance have given way first to "
327 "accusations of insincerity (<quote>You only care about tech because you’re "
329 "url=\"https://www.ipwatchdog.com/2018/06/04/report-engine-eff-shills-google-patent-reform/id=98007/\">shilling "
330 "for tech companies</ulink></quote>) to accusations of negligence (<quote>Why "
331 "didn’t you foresee that tech could be such a destructive force?</quote>). "
332 "But digital rights activism is right where it’s always been: looking out for "
333 "the humans in a world where tech is inexorably taking over."
336 #. type: Content of: <book><chapter><sect1><para>
337 #: complete-book.xml:248
339 "The latest version of this critique comes in the form of <quote>surveillance "
340 "capitalism,</quote> a term coined by business professor Shoshana Zuboff in "
341 "her long and influential 2019 book, <emphasis>The Age of Surveillance "
342 "Capitalism: The Fight for a Human Future at the New Frontier of "
343 "Power</emphasis>. Zuboff argues that <quote>surveillance capitalism</quote> "
344 "is a unique creature of the tech industry and that it is unlike any other "
345 "abusive commercial practice in history, one that is <quote>constituted by "
346 "unexpected and often illegible mechanisms of extraction, commodification, "
347 "and control that effectively exile persons from their own behavior while "
348 "producing new markets of behavioral prediction and "
349 "modification. Surveillance capitalism challenges democratic norms and "
350 "departs in key ways from the centuries-long evolution of market "
351 "capitalism.</quote> It is a new and deadly form of capitalism, a "
352 "<quote>rogue capitalism,</quote> and our lack of understanding of its unique "
353 "capabilities and dangers represents an existential, species-wide "
354 "threat. She’s right that capitalism today threatens our species, and she’s "
355 "right that tech poses unique challenges to our species and civilization, but "
356 "she’s really wrong about how tech is different and why it threatens our "
360 #. type: Content of: <book><chapter><sect1><para>
361 #: complete-book.xml:269
363 "What’s more, I think that her incorrect diagnosis will lead us down a path "
364 "that ends up making Big Tech stronger, not weaker. We need to take down Big "
365 "Tech, and to do that, we need to start by correctly identifying the problem."
368 #. type: Content of: <book><chapter><sect1><title>
369 #: complete-book.xml:275
370 msgid "Tech exceptionalism, then and now"
373 #. type: Content of: <book><chapter><sect1><para>
374 #: complete-book.xml:277
376 "Early critics of the digital rights movement — perhaps best represented by "
377 "campaigning organizations like the Electronic Frontier Foundation, the Free "
378 "Software Foundation, Public Knowledge, and others that focused on preserving "
379 "and enhancing basic human rights in the digital realm — damned activists for "
380 "practicing <quote>tech exceptionalism.</quote> Around the turn of the "
381 "millennium, serious people ridiculed any claim that tech policy mattered in "
382 "the <quote>real world.</quote> Claims that tech rules had implications for "
383 "speech, association, privacy, search and seizure, and fundamental rights and "
384 "equities were treated as ridiculous, an elevation of the concerns of sad "
385 "nerds arguing about <emphasis>Star Trek</emphasis> on bulletin board systems "
386 "above the struggles of the Freedom Riders, Nelson Mandela, or the Warsaw "
390 #. type: Content of: <book><chapter><sect1><para>
391 #: complete-book.xml:292
393 "In the decades since, accusations of <quote>tech exceptionalism</quote> have "
394 "only sharpened as tech’s role in everyday life has expanded: Now that tech "
395 "has infiltrated every corner of our life and our online lives have been "
396 "monopolized by a handful of giants, defenders of digital freedoms are "
397 "accused of carrying water for Big Tech, providing cover for its "
398 "self-interested negligence (or worse, nefarious plots)."
401 #. type: Content of: <book><chapter><sect1><para>
402 #: complete-book.xml:300
404 "From my perspective, the digital rights movement has remained stationary "
405 "while the rest of the world has moved. From the earliest days, the "
406 "movement’s concern was users and the toolsmiths who provided the code they "
407 "needed to realize their fundamental rights. Digital rights activists only "
408 "cared about companies to the extent that companies were acting to uphold "
409 "users’ rights (or, just as often, when companies were acting so foolishly "
410 "that they threatened to bring down new rules that would also make it harder "
411 "for good actors to help users)."
414 #. type: Content of: <book><chapter><sect1><para>
415 #: complete-book.xml:311
417 "The <quote>surveillance capitalism</quote> critique recasts the digital "
418 "rights movement in a new light again: not as alarmists who overestimate the "
419 "importance of their shiny toys nor as shills for big tech but as serene "
420 "deck-chair rearrangers whose long-standing activism is a liability because "
421 "it makes them incapable of perceiving novel threats as they continue to "
422 "fight the last century’s tech battles."
425 #. type: Content of: <book><chapter><sect1><para>
426 #: complete-book.xml:319
427 msgid "But tech exceptionalism is a sin no matter who practices it."
430 #. type: Content of: <book><chapter><sect1><title>
431 #: complete-book.xml:322
432 msgid "Don’t believe the hype"
435 #. type: Content of: <book><chapter><sect1><para>
436 #: complete-book.xml:324
438 "You’ve probably heard that <quote>if you’re not paying for the product, "
439 "you’re the product.</quote> As we’ll see below, that’s true, if incomplete. "
440 "But what is <emphasis>absolutely</emphasis> true is that ad-driven Big "
441 "Tech’s customers are advertisers, and what companies like Google and "
442 "Facebook sell is their ability to convince <emphasis>you</emphasis> to buy "
443 "stuff. Big Tech’s product is persuasion. The services — social media, search "
444 "engines, maps, messaging, and more — are delivery systems for persuasion."
447 #. type: Content of: <book><chapter><sect1><para>
448 #: complete-book.xml:334
450 "The fear of surveillance capitalism starts from the (correct) presumption "
451 "that everything Big Tech says about itself is probably a lie. But the "
452 "surveillance capitalism critique makes an exception for the claims Big Tech "
453 "makes in its sales literature — the breathless hype in the pitches to "
454 "potential advertisers online and in ad-tech seminars about the efficacy of "
455 "its products: It assumes that Big Tech is as good at influencing us as they "
456 "claim they are when they’re selling influencing products to credulous "
457 "customers. That’s a mistake because sales literature is not a reliable "
458 "indicator of a product’s efficacy."
461 #. type: Content of: <book><chapter><sect1><para>
462 #: complete-book.xml:346
464 "Surveillance capitalism assumes that because advertisers buy a lot of what "
465 "Big Tech is selling, Big Tech must be selling something real. But Big Tech’s "
466 "massive sales could just as easily be the result of a popular delusion or "
467 "something even more pernicious: monopolistic control over our communications "
471 #. type: Content of: <book><chapter><sect1><para>
472 #: complete-book.xml:353
474 "Being watched changes your behavior, and not for the better. It creates "
475 "risks for our social progress. Zuboff’s book features beautifully wrought "
476 "explanations of these phenomena. But Zuboff also claims that surveillance "
477 "literally robs us of our free will — that when our personal data is mixed "
478 "with machine learning, it creates a system of persuasion so devastating that "
479 "we are helpless before it. That is, Facebook uses an algorithm to analyze "
480 "the data it nonconsensually extracts from your daily life and uses it to "
481 "customize your feed in ways that get you to buy stuff. It is a mind-control "
482 "ray out of a 1950s comic book, wielded by mad scientists whose "
483 "supercomputers guarantee them perpetual and total world domination."
486 #. type: Content of: <book><chapter><sect1><title>
487 #: complete-book.xml:367
488 msgid "What is persuasion?"
491 #. type: Content of: <book><chapter><sect1><para>
492 #: complete-book.xml:369
494 "To understand why you shouldn’t worry about mind-control rays — but why you "
495 "<emphasis>should</emphasis> worry about surveillance "
496 "<emphasis>and</emphasis> Big Tech — we must start by unpacking what we mean "
497 "by <quote>persuasion.</quote>"
500 #. type: Content of: <book><chapter><sect1><para>
501 #: complete-book.xml:375
503 "Google, Facebook, and other surveillance capitalists promise their customers "
504 "(the advertisers) that if they use machine-learning tools trained on "
505 "unimaginably large data sets of nonconsensually harvested personal "
506 "information, they will be able to uncover ways to bypass the rational "
507 "faculties of the public and direct their behavior, creating a stream of "
508 "purchases, votes, and other desired outcomes."
511 #. type: Content of: <book><chapter><sect1><blockquote><para>
512 #: complete-book.xml:384
514 "The impact of dominance far exceeds the impact of manipulation and should be "
515 "central to our analysis and any remedies we seek."
518 #. type: Content of: <book><chapter><sect1><para>
519 #: complete-book.xml:389
521 "But there’s little evidence that this is happening. Instead, the predictions "
522 "that surveillance capitalism delivers to its customers are much less "
523 "impressive. Rather than finding ways to bypass our rational faculties, "
524 "surveillance capitalists like Mark Zuckerberg mostly do one or more of three "
528 #. type: Content of: <book><chapter><sect1><sect2><title>
529 #: complete-book.xml:396
530 msgid "1. Segmenting"
533 #. type: Content of: <book><chapter><sect1><sect2><para>
534 #: complete-book.xml:398
536 "If you’re selling diapers, you have better luck if you pitch them to people "
537 "in maternity wards. Not everyone who enters or leaves a maternity ward just "
538 "had a baby, and not everyone who just had a baby is in the market for "
539 "diapers. But having a baby is a really reliable correlate of being in the "
540 "market for diapers, and being in a maternity ward is highly correlated with "
541 "having a baby. Hence diaper ads around maternity wards (and even pitchmen "
542 "for baby products, who haunt maternity wards with baskets full of freebies)."
545 #. type: Content of: <book><chapter><sect1><sect2><para>
546 #: complete-book.xml:409
548 "Surveillance capitalism is segmenting times a billion. Diaper vendors can go "
549 "way beyond people in maternity wards (though they can do that, too, with "
550 "things like location-based mobile ads). They can target you based on "
551 "whether you’re reading articles about child-rearing, diapers, or a host of "
552 "other subjects, and data mining can suggest unobvious keywords to advertise "
553 "against. They can target you based on the articles you’ve recently "
554 "read. They can target you based on what you’ve recently purchased. They can "
555 "target you based on whether you receive emails or private messages about "
556 "these subjects — or even if you speak aloud about them (though Facebook and "
557 "the like convincingly claim that’s not happening — yet)."
560 #. type: Content of: <book><chapter><sect1><sect2><para>
561 #: complete-book.xml:423
562 msgid "This is seriously creepy."
565 #. type: Content of: <book><chapter><sect1><sect2><para>
566 #: complete-book.xml:426
567 msgid "But it’s not mind control."
570 #. type: Content of: <book><chapter><sect1><sect2><para>
571 #: complete-book.xml:429
572 msgid "It doesn’t deprive you of your free will. It doesn’t trick you."
575 #. type: Content of: <book><chapter><sect1><sect2><para>
576 #: complete-book.xml:432
578 "Think of how surveillance capitalism works in politics. Surveillance "
579 "capitalist companies sell political operatives the power to locate people "
580 "who might be receptive to their pitch. Candidates campaigning on finance "
581 "industry corruption seek people struggling with debt; candidates campaigning "
582 "on xenophobia seek out racists. Political operatives have always targeted "
583 "their message whether their intentions were honorable or not: Union "
584 "organizers set up pitches at factory gates, and white supremacists hand out "
585 "fliers at John Birch Society meetings."
588 #. type: Content of: <book><chapter><sect1><sect2><para>
589 #: complete-book.xml:443
591 "But this is an inexact and thus wasteful practice. The union organizer can’t "
592 "know which worker to approach on the way out of the factory gates and may "
593 "waste their time on a covert John Birch Society member; the white "
594 "supremacist doesn’t know which of the Birchers are so delusional that making "
595 "it to a meeting is as much as they can manage and which ones might be "
596 "convinced to cross the country to carry a tiki torch through the streets of "
597 "Charlottesville, Virginia."
600 #. type: Content of: <book><chapter><sect1><sect2><para>
601 #: complete-book.xml:453
603 "Because targeting improves the yields on political pitches, it can "
604 "accelerate the pace of political upheaval by making it possible for everyone "
605 "who has secretly wished for the toppling of an autocrat — or just an 11-term "
606 "incumbent politician — to find everyone else who feels the same way at very "
607 "low cost. This has been critical to the rapid crystallization of recent "
608 "political movements including Black Lives Matter and Occupy Wall Street as "
609 "well as less savory players like the far-right white nationalist movements "
610 "that marched in Charlottesville."
613 #. type: Content of: <book><chapter><sect1><sect2><para>
614 #: complete-book.xml:464
616 "It’s important to differentiate this kind of political organizing from "
617 "influence campaigns; finding people who secretly agree with you isn’t the "
618 "same as convincing people to agree with you. The rise of phenomena like "
619 "nonbinary or otherwise nonconforming gender identities is often "
620 "characterized by reactionaries as the result of online brainwashing "
621 "campaigns that convince impressionable people that they have been secretly "
625 #. type: Content of: <book><chapter><sect1><sect2><para>
626 #: complete-book.xml:473
628 "But the personal accounts of those who have come out tell a different story "
629 "where people who long harbored a secret about their gender were emboldened "
630 "by others coming forward and where people who knew that they were different "
631 "but lacked a vocabulary for discussing that difference learned the right "
632 "words from these low-cost means of finding people and learning about their "
636 #. type: Content of: <book><chapter><sect1><sect2><title>
637 #: complete-book.xml:482
641 #. type: Content of: <book><chapter><sect1><sect2><para>
642 #: complete-book.xml:484
644 "Lies and fraud are pernicious, and surveillance capitalism supercharges them "
645 "through targeting. If you want to sell a fraudulent payday loan or subprime "
646 "mortgage, surveillance capitalism can help you find people who are both "
647 "desperate and unsophisticated and thus receptive to your pitch. This "
648 "accounts for the rise of many phenomena, like multilevel marketing schemes, "
649 "in which deceptive claims about potential earnings and the efficacy of sales "
650 "techniques are targeted at desperate people by advertising against search "
651 "queries that indicate, for example, someone struggling with ill-advised "
655 #. type: Content of: <book><chapter><sect1><sect2><para>
656 #: complete-book.xml:496
658 "Surveillance capitalism also abets fraud by making it easy to locate other "
659 "people who have been similarly deceived, forming a community of people who "
660 "reinforce one another’s false beliefs. Think of <ulink "
661 "url=\"https://www.vulture.com/2020/01/the-dream-podcast-review.html\">the "
662 "forums</ulink> where people who are being victimized by multilevel marketing "
663 "frauds gather to trade tips on how to improve their luck in peddling the "
667 #. type: Content of: <book><chapter><sect1><sect2><para>
668 #: complete-book.xml:506
670 "Sometimes, online deception involves replacing someone’s correct beliefs "
671 "with incorrect ones, as it does in the anti-vaccination movement, whose "
672 "victims are often people who start out believing in vaccines but are "
673 "convinced by seemingly plausible evidence that leads them into the false "
674 "belief that vaccines are harmful."
677 #. type: Content of: <book><chapter><sect1><sect2><para>
678 #: complete-book.xml:513
680 "But it’s much more common for fraud to succeed when it doesn’t have to "
681 "displace a true belief. When my daughter contracted head lice at daycare, "
682 "one of the daycare workers told me I could get rid of them by treating her "
683 "hair and scalp with olive oil. I didn’t know anything about head lice, and I "
684 "assumed that the daycare worker did, so I tried it (it didn’t work, and it "
685 "doesn’t work). It’s easy to end up with false beliefs when you simply don’t "
686 "know any better and when those beliefs are conveyed by someone who seems to "
687 "know what they’re doing."
690 #. type: Content of: <book><chapter><sect1><sect2><para>
691 #: complete-book.xml:524
693 "This is pernicious and difficult — and it’s also the kind of thing the "
694 "internet can help guard against by making true information available, "
695 "especially in a form that exposes the underlying deliberations among parties "
696 "with sharply divergent views, such as Wikipedia. But it’s not brainwashing; "
697 "it’s fraud. In the <ulink "
698 "url=\"https://datasociety.net/library/data-voids/\">majority of "
699 "cases</ulink>, the victims of these fraud campaigns have an informational "
700 "void filled in the customary way, by consulting a seemingly reliable "
701 "source. If I look up the length of the Brooklyn Bridge and learn that it is "
702 "5,800 feet long, but in reality, it is 5,989 feet long, the underlying "
703 "deception is a problem, but it’s a problem with a simple remedy. It’s a very "
704 "different problem from the anti-vax issue in which someone’s true belief is "
705 "displaced by a false one by means of sophisticated persuasion."
708 #. type: Content of: <book><chapter><sect1><sect2><title>
709 #: complete-book.xml:541
710 msgid "3. Domination"
713 #. type: Content of: <book><chapter><sect1><sect2><para>
714 #: complete-book.xml:543
716 "Surveillance capitalism is the result of monopoly. Monopoly is the cause, "
717 "and surveillance capitalism and its negative outcomes are the effects of "
718 "monopoly. I’ll get into this in depth later, but for now, suffice it to say "
719 "that the tech industry has grown up with a radical theory of antitrust that "
720 "has allowed companies to grow by merging with their rivals, buying up their "
721 "nascent competitors, and expanding to control whole market verticals."
724 #. type: Content of: <book><chapter><sect1><sect2><para>
725 #: complete-book.xml:552
727 "One example of how monopolism aids in persuasion is through dominance: "
728 "Google makes editorial decisions about its algorithms that determine the "
729 "sort order of the responses to our queries. If a cabal of fraudsters have "
730 "set out to trick the world into thinking that the Brooklyn Bridge is 5,800 "
731 "feet long, and if Google gives a high search rank to this group in response "
732 "to queries like <quote>How long is the Brooklyn Bridge?</quote> then the "
733 "first eight or 10 screens’ worth of Google results could be wrong. And since "
734 "most people don’t go beyond the first couple of results — let alone the "
735 "first <emphasis>page</emphasis> of results — Google’s choice means that many "
736 "people will be deceived."
739 #. type: Content of: <book><chapter><sect1><sect2><para>
740 #: complete-book.xml:565
742 "Google’s dominance over search — more than 86% of web searches are performed "
743 "through Google — means that the way it orders its search results has an "
744 "outsized effect on public beliefs. Ironically, Google claims this is why it "
745 "can’t afford to have any transparency in its algorithm design: Google’s "
746 "search dominance makes the results of its sorting too important to risk "
747 "telling the world how it arrives at those results lest some bad actor "
748 "discover a flaw in the ranking system and exploit it to push its point of "
749 "view to the top of the search results. There’s an obvious remedy to a "
750 "company that is too big to audit: break it up into smaller pieces."
753 #. type: Content of: <book><chapter><sect1><sect2><para>
754 #: complete-book.xml:577
756 "Zuboff calls surveillance capitalism a <quote>rogue capitalism</quote> whose "
757 "data-hoarding and machine-learning techniques rob us of our free will. But "
758 "influence campaigns that seek to displace existing, correct beliefs with "
759 "false ones have an effect that is small and temporary while monopolistic "
760 "dominance over informational systems has massive, enduring "
761 "effects. Controlling the results to the world’s search queries means "
762 "controlling access both to arguments and their rebuttals and, thus, control "
763 "over much of the world’s beliefs. If our concern is how corporations are "
764 "foreclosing on our ability to make up our own minds and determine our own "
765 "futures, the impact of dominance far exceeds the impact of manipulation and "
766 "should be central to our analysis and any remedies we seek."
769 #. type: Content of: <book><chapter><sect1><sect2><title>
770 #: complete-book.xml:592
771 msgid "4. Bypassing our rational faculties"
774 #. type: Content of: <book><chapter><sect1><sect2><para>
775 #: complete-book.xml:594
777 "<emphasis>This</emphasis> is the good stuff: using machine learning, "
778 "<quote>dark patterns,</quote> engagement hacking, and other techniques to "
779 "get us to do things that run counter to our better judgment. This is mind "
783 #. type: Content of: <book><chapter><sect1><sect2><para>
784 #: complete-book.xml:600
786 "Some of these techniques have proven devastatingly effective (if only in the "
787 "short term). The use of countdown timers on a purchase completion page can "
788 "create a sense of urgency that causes you to ignore the nagging internal "
789 "voice suggesting that you should shop around or sleep on your decision. The "
790 "use of people from your social graph in ads can provide <quote>social "
791 "proof</quote> that a purchase is worth making. Even the auction system "
792 "pioneered by eBay is calculated to play on our cognitive blind spots, "
793 "letting us feel like we <quote>own</quote> something because we bid on it, "
794 "thus encouraging us to bid again when we are outbid to ensure that "
795 "<quote>our</quote> things stay ours."
798 #. type: Content of: <book><chapter><sect1><sect2><para>
799 #: complete-book.xml:613
801 "Games are extraordinarily good at this. <quote>Free to play</quote> games "
802 "manipulate us through many techniques, such as presenting players with a "
803 "series of smoothly escalating challenges that create a sense of mastery and "
804 "accomplishment but which sharply transition into a set of challenges that "
805 "are impossible to overcome without paid upgrades. Add some social proof to "
806 "the mix — a stream of notifications about how well your friends are faring — "
807 "and before you know it, you’re buying virtual power-ups to get to the next "
811 #. type: Content of: <book><chapter><sect1><sect2><para>
812 #: complete-book.xml:624
814 "Companies have risen and fallen on these techniques, and the "
815 "<quote>fallen</quote> part is worth paying attention to. In general, living "
816 "things adapt to stimulus: Something that is very compelling or noteworthy "
817 "when you first encounter it fades with repetition until you stop noticing it "
818 "altogether. Consider the refrigerator hum that irritates you when it starts "
819 "up but disappears into the background so thoroughly that you only notice it "
820 "when it stops again."
823 #. type: Content of: <book><chapter><sect1><sect2><para>
824 #: complete-book.xml:634
826 "That’s why behavioral conditioning uses <quote>intermittent reinforcement "
827 "schedules.</quote> Instead of giving you a steady drip of encouragement or "
828 "setbacks, games and gamified services scatter rewards on a randomized "
829 "schedule — often enough to keep you interested and random enough that you "
830 "can never quite find the pattern that would make it boring."
833 #. type: Content of: <book><chapter><sect1><sect2><para>
834 #: complete-book.xml:642
836 "Intermittent reinforcement is a powerful behavioral tool, but it also "
837 "represents a collective action problem for surveillance capitalism. The "
838 "<quote>engagement techniques</quote> invented by the behaviorists of "
839 "surveillance capitalist companies are quickly copied across the whole sector "
840 "so that what starts as a mysteriously compelling fillip in the design of a "
841 "service—like <quote>pull to refresh</quote> or alerts when someone likes "
842 "your posts or side quests that your characters get invited to while in the "
843 "midst of main quests—quickly becomes dully ubiquitous. The "
844 "impossible-to-nail-down nonpattern of randomized drips from your phone "
845 "becomes a grey-noise wall of sound as every single app and site starts to "
846 "make use of whatever seems to be working at the time."
849 #. type: Content of: <book><chapter><sect1><sect2><para>
850 #: complete-book.xml:657
852 "From the surveillance capitalist’s point of view, our adaptive capacity is "
853 "like a harmful bacterium that deprives it of its food source — our attention "
854 "— and novel techniques for snagging that attention are like new antibiotics "
855 "that can be used to breach our defenses and destroy our "
856 "self-determination. And there <emphasis>are</emphasis> techniques like "
857 "that. Who can forget the Great Zynga Epidemic, when all of our friends were "
858 "caught in <emphasis>FarmVille</emphasis>’s endless, mindless dopamine loops? "
859 "But every new attention-commanding technique is jumped on by the whole "
860 "industry and used so indiscriminately that antibiotic resistance sets "
861 "in. Given enough repetition, almost all of us develop immunity to even the "
862 "most powerful techniques — by 2013, two years after Zynga’s peak, its user "
866 #. type: Content of: <book><chapter><sect1><sect2><para>
867 #: complete-book.xml:672
869 "Not everyone, of course. Some people never adapt to stimulus, just as some "
870 "people never stop hearing the hum of the refrigerator. This is why most "
871 "people who are exposed to slot machines play them for a while and then move "
872 "on while a small and tragic minority liquidate their kids’ college funds, "
873 "buy adult diapers, and position themselves in front of a machine until they "
877 #. type: Content of: <book><chapter><sect1><sect2><para>
878 #: complete-book.xml:680
880 "But surveillance capitalism’s margins on behavioral modification "
881 "suck. Tripling the rate at which someone buys a widget sounds great <ulink "
882 "url=\"https://www.forbes.com/sites/priceonomics/2018/03/09/the-advertising-conversion-rates-for-every-major-tech-platform/#2f6a67485957\">unless "
883 "the base rate is way less than 1%</ulink> with an improved rate of… still "
884 "less than 1%. Even penny slot machines pull down pennies for every spin "
885 "while surveillance capitalism rakes in infinitesimal penny fractions."
888 #. type: Content of: <book><chapter><sect1><sect2><para>
889 #: complete-book.xml:690
891 "Slot machines’ high returns mean that they can be profitable just by "
892 "draining the fortunes of the small rump of people who are pathologically "
893 "vulnerable to them and unable to adapt to their tricks. But surveillance "
894 "capitalism can’t survive on the fractional pennies it brings down from that "
895 "vulnerable sliver — that’s why, after the Great Zynga Epidemic had finally "
896 "burned itself out, the small number of still-addicted players left behind "
897 "couldn’t sustain it as a global phenomenon. And new powerful attention "
898 "weapons aren’t easy to find, as is evidenced by the long years since the "
899 "last time Zynga had a hit. Despite the hundreds of millions of dollars that "
900 "Zynga has to spend on developing new tools to blast through our adaptation, "
901 "it has never managed to repeat the lucky accident that let it snag so much "
902 "of our attention for a brief moment in 2009. Powerhouses like Supercell have "
903 "fared a little better, but they are rare and throw away many failures for "
907 #. type: Content of: <book><chapter><sect1><sect2><para>
908 #: complete-book.xml:708
910 "The vulnerability of small segments of the population to dramatic, efficient "
911 "corporate manipulation is a real concern that’s worthy of our attention and "
912 "energy. But it’s not an existential threat to society."
915 #. type: Content of: <book><chapter><sect1><title>
916 #: complete-book.xml:715
917 msgid "If data is the new oil, then surveillance capitalism’s engine has a leak"
920 #. type: Content of: <book><chapter><sect1><para>
921 #: complete-book.xml:718
923 "This adaptation problem offers an explanation for one of surveillance "
924 "capitalism’s most alarming traits: its relentless hunger for data and its "
925 "endless expansion of data-gathering capabilities through the spread of "
926 "sensors, online surveillance, and acquisition of data streams from third "
930 #. type: Content of: <book><chapter><sect1><para>
931 #: complete-book.xml:725
933 "Zuboff observes this phenomenon and concludes that data must be very "
934 "valuable if surveillance capitalism is so hungry for it. (In her words: "
935 "<quote>Just as industrial capitalism was driven to the continuous "
936 "intensification of the means of production, so surveillance capitalists and "
937 "their market players are now locked into the continuous intensification of "
938 "the means of behavioral modification and the gathering might of "
939 "instrumentarian power.</quote>) But what if the voracious appetite is "
940 "because data has such a short half-life — because people become inured so "
941 "quickly to new, data-driven persuasion techniques — that the companies are "
942 "locked in an arms race with our limbic system? What if it’s all a Red "
943 "Queen’s race where they have to run ever faster — collect ever-more data — "
944 "just to stay in the same spot?"
947 #. type: Content of: <book><chapter><sect1><para>
948 #: complete-book.xml:740
950 "Of course, all of Big Tech’s persuasion techniques work in concert with one "
951 "another, and collecting data is useful beyond mere behavioral trickery."
954 #. type: Content of: <book><chapter><sect1><para>
955 #: complete-book.xml:745
957 "If someone wants to recruit you to buy a refrigerator or join a pogrom, they "
958 "might use profiling and targeting to send messages to people they judge to "
959 "be good sales prospects. The messages themselves may be deceptive, making "
960 "claims about things you’re not very knowledgeable about (food safety and "
961 "energy efficiency or eugenics and historical claims about racial "
962 "superiority). They might use search engine optimization and/or armies of "
963 "fake reviewers and commenters and/or paid placement to dominate the "
964 "discourse so that any search for further information takes you back to their "
965 "messages. And finally, they may refine the different pitches using machine "
966 "learning and other techniques to figure out what kind of pitch works best on "
970 #. type: Content of: <book><chapter><sect1><para>
971 #: complete-book.xml:759
973 "Each phase of this process benefits from surveillance: The more data they "
974 "have, the more precisely they can profile you and target you with specific "
975 "messages. Think of how you’d sell a fridge if you knew that the warranty on "
976 "your prospect’s fridge just expired and that they were expecting a tax "
980 #. type: Content of: <book><chapter><sect1><para>
981 #: complete-book.xml:766
983 "Also, the more data they have, the better they can craft deceptive messages "
984 "— if I know that you’re into genealogy, I might not try to feed you "
985 "pseudoscience about genetic differences between <quote>races,</quote> "
986 "sticking instead to conspiratorial secret histories of <quote>demographic "
987 "replacement</quote> and the like."
990 #. type: Content of: <book><chapter><sect1><para>
991 #: complete-book.xml:773
993 "Facebook also helps you locate people who have the same odious or antisocial "
994 "views as you. It makes it possible to find other people who want to carry "
995 "tiki torches through the streets of Charlottesville in Confederate "
996 "cosplay. It can help you find other people who want to join your militia and "
997 "go to the border to look for undocumented migrants to terrorize. It can help "
998 "you find people who share your belief that vaccines are poison and that the "
1002 #. type: Content of: <book><chapter><sect1><para>
1003 #: complete-book.xml:783
1005 "There is one way in which targeted advertising uniquely benefits those "
1006 "advocating for socially unacceptable causes: It is invisible. Racism is "
1007 "widely geographically dispersed, and there are few places where racists — "
1008 "and only racists — gather. This is similar to the problem of selling "
1009 "refrigerators in that potential refrigerator purchasers are geographically "
1010 "dispersed and there are few places where you can buy an ad that will be "
1011 "primarily seen by refrigerator customers. But buying a refrigerator is "
1012 "socially acceptable while being a Nazi is not, so you can buy a billboard or "
1013 "advertise in the newspaper sports section for your refrigerator business, "
1014 "and the only potential downside is that your ad will be seen by a lot of "
1015 "people who don’t want refrigerators, resulting in a lot of wasted expense."
1018 #. type: Content of: <book><chapter><sect1><para>
1019 #: complete-book.xml:798
1021 "But even if you wanted to advertise your Nazi movement on a billboard or "
1022 "prime-time TV or the sports section, you would struggle to find anyone "
1023 "willing to sell you the space for your ad partly because they disagree with "
1024 "your views and partly because they fear censure (boycott, reputational "
1025 "damage, etc.) from other people who disagree with your views."
1028 #. type: Content of: <book><chapter><sect1><para>
1029 #: complete-book.xml:806
1031 "Targeted ads solve this problem: On the internet, every ad unit can be "
1032 "different for every person, meaning that you can buy ads that are only shown "
1033 "to people who appear to be Nazis and not to people who hate Nazis. When "
1034 "there’s spillover — when someone who hates racism is shown a racist "
1035 "recruiting ad — there is some fallout; the platform or publication might get "
1036 "an angry public or private denunciation. But the nature of the risk assumed "
1037 "by an online ad buyer is different than the risks to a traditional publisher "
1038 "or billboard owner who might want to run a Nazi ad."
1041 #. type: Content of: <book><chapter><sect1><para>
1042 #: complete-book.xml:817
1044 "Online ads are placed by algorithms that broker between a diverse ecosystem "
1045 "of self-serve ad platforms that anyone can buy an ad through, so the Nazi ad "
1046 "that slips onto your favorite online publication isn’t seen as their moral "
1047 "failing but rather as a failure in some distant, upstream ad supplier. When "
1048 "a publication gets a complaint about an offensive ad that’s appearing in one "
1049 "of its units, it can take some steps to block that ad, but the Nazi might "
1050 "buy a slightly different ad from a different broker serving the same "
1051 "unit. And in any event, internet users increasingly understand that when "
1052 "they see an ad, it’s likely that the advertiser did not choose that "
1053 "publication and that the publication has no idea who its advertisers are."
1056 #. type: Content of: <book><chapter><sect1><para>
1057 #: complete-book.xml:831
1059 "These layers of indirection between advertisers and publishers serve as "
1060 "moral buffers: Today’s moral consensus is largely that publishers shouldn’t "
1061 "be held responsible for the ads that appear on their pages because they’re "
1062 "not actively choosing to put those ads there. Because of this, Nazis are "
1063 "able to overcome significant barriers to organizing their movement."
1066 #. type: Content of: <book><chapter><sect1><para>
1067 #: complete-book.xml:839
1069 "Data has a complex relationship with domination. Being able to spy on your "
1070 "customers can alert you to their preferences for your rivals and allow you "
1071 "to head off your rivals at the pass."
1074 #. type: Content of: <book><chapter><sect1><para>
1075 #: complete-book.xml:844
1077 "More importantly, if you can dominate the information space while also "
1078 "gathering data, then you make other deceptive tactics stronger because it’s "
1079 "harder to break out of the web of deceit you’re spinning. Domination — that "
1080 "is, ultimately becoming a monopoly — and not the data itself is the "
1081 "supercharger that makes every tactic worth pursuing because monopolistic "
1082 "domination deprives your target of an escape route."
1085 #. type: Content of: <book><chapter><sect1><para>
1086 #: complete-book.xml:853
1088 "If you’re a Nazi who wants to ensure that your prospects primarily see "
1089 "deceptive, confirming information when they search for more, you can improve "
1090 "your odds by seeding the search terms they use through your initial "
1091 "communications. You don’t need to own the top 10 results for <quote>voter "
1092 "suppression</quote> if you can convince your marks to confine their search "
1093 "terms to <quote>voter fraud,</quote> which throws up a very different set of "
1097 #. type: Content of: <book><chapter><sect1><para>
1098 #: complete-book.xml:862
1100 "Surveillance capitalists are like stage mentalists who claim that their "
1101 "extraordinary insights into human behavior let them guess the word that you "
1102 "wrote down and folded up in your pocket but who really use shills, hidden "
1103 "cameras, sleight of hand, and brute-force memorization to amaze you."
1106 #. type: Content of: <book><chapter><sect1><para>
1107 #: complete-book.xml:869
1109 "Or perhaps they’re more like pick-up artists, the misogynistic cult that "
1110 "promises to help awkward men have sex with women by teaching them "
1111 "<quote>neurolinguistic programming</quote> phrases, body language "
1112 "techniques, and psychological manipulation tactics like "
1113 "<quote>negging</quote> — offering unsolicited negative feedback to women to "
1114 "lower their self-esteem and prick their interest."
1117 #. type: Content of: <book><chapter><sect1><para>
1118 #: complete-book.xml:877
1120 "Some pick-up artists eventually manage to convince women to go home with "
1121 "them, but it’s not because these men have figured out how to bypass women’s "
1122 "critical faculties. Rather, pick-up artists’ <quote>success</quote> stories "
1123 "are a mix of women who were incapable of giving consent, women who were "
1124 "coerced, women who were intoxicated, self-destructive women, and a few women "
1125 "who were sober and in command of their faculties but who didn’t realize "
1126 "straightaway that they were with terrible men but rectified the error as "
1127 "soon as they could."
1130 #. type: Content of: <book><chapter><sect1><para>
1131 #: complete-book.xml:888
1133 "Pick-up artists <emphasis>believe</emphasis> they have figured out a secret "
1134 "back door that bypasses women’s critical faculties, but they haven’t. Many "
1135 "of the tactics they deploy, like negging, became the butt of jokes (just "
1136 "like people joke about bad ad targeting), and there’s a good chance that "
1137 "anyone they try these tactics on will immediately recognize them and dismiss "
1138 "the men who use them as irredeemable losers."
1141 #. type: Content of: <book><chapter><sect1><para>
1142 #: complete-book.xml:897
1144 "Pick-up artists are proof that people can believe they have developed a "
1145 "system of mind control <emphasis>even when it doesn’t "
1146 "work</emphasis>. Pick-up artists simply exploit the fact that "
1147 "one-in-a-million chances can come through for you if you make a million "
1148 "attempts, and then they assume that the other 999,999 times, they simply "
1149 "performed the technique incorrectly and commit themselves to doing better "
1150 "next time. There’s only one group of people who find pick-up artist lore "
1151 "reliably convincing: other would-be pick-up artists whose anxiety and "
1152 "insecurity make them vulnerable to scammers and delusional men who convince "
1153 "them that if they pay for tutelage and follow instructions, then they will "
1154 "someday succeed. Pick-up artists assume they fail to entice women because "
1155 "they are bad at being pick-up artists, not because pick-up artistry is "
1156 "bullshit. Pick-up artists are bad at selling themselves to women, but "
1157 "they’re much better at selling themselves to men who pay to learn the "
1158 "secrets of pick-up artistry."
1161 #. type: Content of: <book><chapter><sect1><para>
1162 #: complete-book.xml:915
1164 "Department store pioneer John Wanamaker is said to have lamented, "
1165 "<quote>Half the money I spend on advertising is wasted; the trouble is I "
1166 "don’t know which half.</quote> The fact that Wanamaker thought that only "
1167 "half of his advertising spending was wasted is a tribute to the "
1168 "persuasiveness of advertising executives, who are <emphasis>much</emphasis> "
1169 "better at convincing potential clients to buy their services than they are "
1170 "at convincing the general public to buy their clients’ wares."
1173 #. type: Content of: <book><chapter><sect1><title>
1174 #: complete-book.xml:925
1175 msgid "What is Facebook?"
1178 #. type: Content of: <book><chapter><sect1><para>
1179 #: complete-book.xml:927
1181 "Facebook is heralded as the origin of all of our modern plagues, and it’s "
1182 "not hard to see why. Some tech companies want to lock their users in but "
1183 "make their money by monopolizing access to the market for apps for their "
1184 "devices and gouging them on prices rather than by spying on them (like "
1185 "Apple). Some companies don’t care about locking in users because they’ve "
1186 "figured out how to spy on them no matter where they are and what they’re "
1187 "doing and can turn that surveillance into money (Google). Facebook alone "
1188 "among the Western tech giants has built a business based on locking in its "
1189 "users <emphasis>and</emphasis> spying on them all the time."
1192 #. type: Content of: <book><chapter><sect1><para>
1193 #: complete-book.xml:939
1195 "Facebook’s surveillance regime is really without parallel in the Western "
1196 "world. Though Facebook tries to prevent itself from being visible on the "
1197 "public web, hiding most of what goes on there from people unless they’re "
1198 "logged into Facebook, the company has nevertheless booby-trapped the entire "
1199 "web with surveillance tools in the form of Facebook <quote>Like</quote> "
1200 "buttons that web publishers include on their sites to boost their Facebook "
1201 "profiles. Facebook also makes various libraries and other useful code "
1202 "snippets available to web publishers that act as surveillance tendrils on "
1203 "the sites where they’re used, funneling information about visitors to the "
1204 "site — newspapers, dating sites, message boards — to Facebook."
1207 #. type: Content of: <book><chapter><sect1><blockquote><para>
1208 #: complete-book.xml:953
1210 "Big Tech is able to practice surveillance not just because it is tech but "
1211 "because it is <emphasis>big</emphasis>."
1214 #. type: Content of: <book><chapter><sect1><para>
1215 #: complete-book.xml:958
1217 "Facebook offers similar tools to app developers, so the apps — games, fart "
1218 "machines, business review services, apps for keeping abreast of your kid’s "
1219 "schooling — you use will send information about your activities to Facebook "
1220 "even if you don’t have a Facebook account and even if you don’t download or "
1221 "use Facebook apps. On top of all that, Facebook buys data from third-party "
1222 "brokers on shopping habits, physical location, use of <quote>loyalty</quote> "
1223 "programs, financial transactions, etc., and cross-references that with the "
1224 "dossiers it develops on activity on Facebook and with apps and the public "
1228 #. type: Content of: <book><chapter><sect1><para>
1229 #: complete-book.xml:969
1231 "Though it’s easy to integrate the web with Facebook — linking to news "
1232 "stories and such — Facebook products are generally not available to be "
1233 "integrated back into the web itself. You can embed a tweet in a Facebook "
1234 "post, but if you embed a Facebook post in a tweet, you just get a link back "
1235 "to Facebook and must log in before you can see it. Facebook has used extreme "
1236 "technological and legal countermeasures to prevent rivals from allowing "
1237 "their users to embed Facebook snippets in competing services or to create "
1238 "alternative interfaces to Facebook that merge your Facebook inbox with those "
1239 "of other services that you use."
1242 #. type: Content of: <book><chapter><sect1><para>
1243 #: complete-book.xml:981
1245 "And Facebook is incredibly popular, with 2.3 billion claimed users (though "
1246 "many believe this figure to be inflated). Facebook has been used to organize "
1247 "genocidal pogroms, racist riots, anti-vaccination movements, flat Earth "
1248 "cults, and the political lives of some of the world’s ugliest, most brutal "
1249 "autocrats. There are some really alarming things going on in the world, and "
1250 "Facebook is implicated in many of them, so it’s easy to conclude that these "
1251 "bad things are the result of Facebook’s mind-control system, which it rents "
1252 "out to anyone with a few bucks to spend."
1255 #. type: Content of: <book><chapter><sect1><para>
1256 #: complete-book.xml:992
1258 "To understand what role Facebook plays in the formulation and mobilization "
1259 "of antisocial movements, we need to understand the dual nature of Facebook."
1262 #. type: Content of: <book><chapter><sect1><para>
1263 #: complete-book.xml:997
1265 "Because it has a lot of users and a lot of data about those users, Facebook "
1266 "is a very efficient tool for locating people with hard-to-find traits, the "
1267 "kinds of traits that are widely diffused in the population such that "
1268 "advertisers have historically struggled to find a cost-effective way to "
1269 "reach them. Think back to refrigerators: Most of us only replace our major "
1270 "appliances a few times in our entire lives. If you’re a refrigerator "
1271 "manufacturer or retailer, you have these brief windows in the life of a "
1272 "consumer during which they are pondering a purchase, and you have to somehow "
1273 "reach them. Anyone who’s ever registered a title change after buying a house "
1274 "can attest that appliance manufacturers are incredibly desperate to reach "
1275 "anyone who has even the slenderest chance of being in the market for a new "
1279 #. type: Content of: <book><chapter><sect1><para>
1280 #: complete-book.xml:1012
1282 "Facebook makes finding people shopping for refrigerators a "
1283 "<emphasis>lot</emphasis> easier. It can target ads to people who’ve "
1284 "registered a new home purchase, to people who’ve searched for refrigerator "
1285 "buying advice, to people who have complained about their fridge dying, or "
1286 "any combination thereof. It can even target people who’ve recently bought "
1287 "<emphasis>other</emphasis> kitchen appliances on the theory that someone "
1288 "who’s just replaced their stove and dishwasher might be in a fridge-buying "
1289 "kind of mood. The vast majority of people who are reached by these ads will "
1290 "not be in the market for a new fridge, but — crucially — the percentage of "
1291 "people who <emphasis>are</emphasis> looking for fridges that these ads reach "
1292 "is <emphasis>much</emphasis> larger than it is than for any group that might "
1293 "be subjected to traditional, offline targeted refrigerator marketing."
1296 #. type: Content of: <book><chapter><sect1><para>
1297 #: complete-book.xml:1028
1299 "Facebook also makes it a lot easier to find people who have the same rare "
1300 "disease as you, which might have been impossible in earlier eras — the "
1301 "closest fellow sufferer might otherwise be hundreds of miles away. It makes "
1302 "it easier to find people who went to the same high school as you even though "
1303 "decades have passed and your former classmates have all been scattered to "
1304 "the four corners of the Earth."
1307 #. type: Content of: <book><chapter><sect1><para>
1308 #: complete-book.xml:1036
1310 "Facebook also makes it much easier to find people who hold the same rare "
1311 "political beliefs as you. If you’ve always harbored a secret affinity for "
1312 "socialism but never dared utter this aloud lest you be demonized by your "
1313 "neighbors, Facebook can help you discover other people who feel the same way "
1314 "(and it might just demonstrate to you that your affinity is more widespread "
1315 "than you ever suspected). It can make it easier to find people who share "
1316 "your sexual identity. And again, it can help you to understand that what "
1317 "you thought was a shameful secret that affected only you was really a widely "
1318 "shared trait, giving you both comfort and the courage to come out to the "
1319 "people in your life."
1322 #. type: Content of: <book><chapter><sect1><para>
1323 #: complete-book.xml:1049
1325 "All of this presents a dilemma for Facebook: Targeting makes the company’s "
1326 "ads more effective than traditional ads, but it also lets advertisers see "
1327 "just how effective their ads are. While advertisers are pleased to learn "
1328 "that Facebook ads are more effective than ads on systems with less "
1329 "sophisticated targeting, advertisers can also see that in nearly every case, "
1330 "the people who see their ads ignore them. Or, at best, the ads work on a "
1331 "subconscious level, creating nebulous unmeasurables like <quote>brand "
1332 "recognition.</quote> This means that the price per ad is very low in nearly "
1336 #. type: Content of: <book><chapter><sect1><para>
1337 #: complete-book.xml:1060
1339 "To make things worse, many Facebook groups spark precious little "
1340 "discussion. Your little-league soccer team, the people with the same rare "
1341 "disease as you, and the people you share a political affinity with may "
1342 "exchange the odd flurry of messages at critical junctures, but on a daily "
1343 "basis, there’s not much to say to your old high school chums or other "
1344 "hockey-card collectors."
1347 #. type: Content of: <book><chapter><sect1><para>
1348 #: complete-book.xml:1068
1350 "With nothing but <quote>organic</quote> discussion, Facebook would not "
1351 "generate enough traffic to sell enough ads to make the money it needs to "
1352 "continually expand by buying up its competitors while returning handsome "
1353 "sums to its investors."
1356 #. type: Content of: <book><chapter><sect1><para>
1357 #: complete-book.xml:1074
1359 "So Facebook has to gin up traffic by sidetracking its own forums: Every time "
1360 "Facebook’s algorithm injects controversial materials — inflammatory "
1361 "political articles, conspiracy theories, outrage stories — into a group, it "
1362 "can hijack that group’s nominal purpose with its desultory discussions and "
1363 "supercharge those discussions by turning them into bitter, unproductive "
1364 "arguments that drag on and on. Facebook is optimized for engagement, not "
1365 "happiness, and it turns out that automated systems are pretty good at "
1366 "figuring out things that people will get angry about."
1369 #. type: Content of: <book><chapter><sect1><para>
1370 #: complete-book.xml:1085
1372 "Facebook <emphasis>can</emphasis> modify our behavior but only in a couple "
1373 "of trivial ways. First, it can lock in all your friends and family members "
1374 "so that you check and check and check with Facebook to find out what they "
1375 "are up to; and second, it can make you angry and anxious. It can force you "
1376 "to choose between being interrupted constantly by updates — a process that "
1377 "breaks your concentration and makes it hard to be introspective — and "
1378 "staying in touch with your friends. This is a very limited form of mind "
1379 "control, and it can only really make us miserable, angry, and anxious."
1382 #. type: Content of: <book><chapter><sect1><para>
1383 #: complete-book.xml:1096
1385 "This is why Facebook’s targeting systems — both the ones it shows to "
1386 "advertisers and the ones that let users find people who share their "
1387 "interests — are so next-gen and smooth and easy to use as well as why its "
1388 "message boards have a toolset that seems like it hasn’t changed since the "
1389 "mid-2000s. If Facebook delivered an equally flexible, sophisticated "
1390 "message-reading system to its users, those users could defend themselves "
1391 "against being nonconsensually eyeball-fucked with Donald Trump headlines."
1394 #. type: Content of: <book><chapter><sect1><para>
1395 #: complete-book.xml:1106
1397 "The more time you spend on Facebook, the more ads it gets to show you. The "
1398 "solution to Facebook’s ads only working one in a thousand times is for the "
1399 "company to try to increase how much time you spend on Facebook by a factor "
1400 "of a thousand. Rather than thinking of Facebook as a company that has "
1401 "figured out how to show you exactly the right ad in exactly the right way to "
1402 "get you to do what its advertisers want, think of it as a company that has "
1403 "figured out how to make you slog through an endless torrent of arguments "
1404 "even though they make you miserable, spending so much time on the site that "
1405 "it eventually shows you at least one ad that you respond to."
1408 #. type: Content of: <book><chapter><sect1><title>
1409 #: complete-book.xml:1118
1410 msgid "Monopoly and the right to the future tense"
1413 #. type: Content of: <book><chapter><sect1><para>
1414 #: complete-book.xml:1120
1416 "Zuboff and her cohort are particularly alarmed at the extent to which "
1417 "surveillance allows corporations to influence our decisions, taking away "
1418 "something she poetically calls <quote>the right to the future tense</quote> "
1419 "— that is, the right to decide for yourself what you will do in the future."
1422 #. type: Content of: <book><chapter><sect1><para>
1423 #: complete-book.xml:1127
1425 "It’s true that advertising can tip the scales one way or another: When "
1426 "you’re thinking of buying a fridge, a timely fridge ad might end the search "
1427 "on the spot. But Zuboff puts enormous and undue weight on the persuasive "
1428 "power of surveillance-based influence techniques. Most of these don’t work "
1429 "very well, and the ones that do won’t work for very long. The makers of "
1430 "these influence tools are confident they will someday refine them into "
1431 "systems of total control, but they are hardly unbiased observers, and the "
1432 "risks from their dreams coming true are very speculative."
1435 #. type: Content of: <book><chapter><sect1><para>
1436 #: complete-book.xml:1138
1438 "By contrast, Zuboff is rather sanguine about 40 years of lax antitrust "
1439 "practice that has allowed a handful of companies to dominate the internet, "
1440 "ushering in an information age with, <ulink "
1441 "url=\"https://twitter.com/tveastman/status/1069674780826071040\">as one "
1442 "person on Twitter noted</ulink>, five giant websites each filled with "
1443 "screenshots of the other four."
1446 #. type: Content of: <book><chapter><sect1><para>
1447 #: complete-book.xml:1146
1449 "However, if we are to be alarmed that we might lose the right to choose for "
1450 "ourselves what our future will hold, then monopoly’s nonspeculative, "
1451 "concrete, here-and-now harms should be front and center in our debate over "
1455 #. type: Content of: <book><chapter><sect1><para>
1456 #: complete-book.xml:1152
1458 "Start with <quote>digital rights management.</quote> In 1998, Bill Clinton "
1459 "signed the Digital Millennium Copyright Act (DMCA) into law. It’s a complex "
1460 "piece of legislation with many controversial clauses but none more so than "
1461 "Section 1201, the <quote>anti-circumvention</quote> rule."
1464 #. type: Content of: <book><chapter><sect1><para>
1465 #: complete-book.xml:1158
1467 "This is a blanket ban on tampering with systems that restrict access to "
1468 "copyrighted works. The ban is so thoroughgoing that it prohibits removing a "
1469 "copyright lock even when no copyright infringement takes place. This is by "
1470 "design: The activities that the DMCA’s Section 1201 sets out to ban are not "
1471 "copyright infringements; rather, they are legal activities that frustrate "
1472 "manufacturers’ commercial plans."
1475 #. type: Content of: <book><chapter><sect1><para>
1476 #: complete-book.xml:1166
1478 "For example, Section 1201’s first major application was on DVD players as a "
1479 "means of enforcing the region coding built into those devices. DVD-CCA, the "
1480 "body that standardized DVDs and DVD players, divided the world into six "
1481 "regions and specified that DVD players must check each disc to determine "
1482 "which regions it was authorized to be played in. DVD players would have "
1483 "their own corresponding region (a DVD player bought in the U.S. would be "
1484 "region 1 while one bought in India would be region 5). If the player and the "
1485 "disc’s region matched, the player would play the disc; otherwise, it would "
1489 #. type: Content of: <book><chapter><sect1><para>
1490 #: complete-book.xml:1178
1492 "However, watching a lawfully produced disc in a country other than the one "
1493 "where you purchased it is not copyright infringement — it’s the "
1494 "opposite. Copyright law imposes this duty on customers for a movie: You must "
1495 "go into a store, find a licensed disc, and pay the asking price. Do that — "
1496 "and <emphasis>nothing else</emphasis> — and you and copyright are square "
1500 #. type: Content of: <book><chapter><sect1><para>
1501 #: complete-book.xml:1186
1503 "The fact that a movie studio wants to charge Indians less than Americans or "
1504 "release in Australia later than it releases in the U.K. has no bearing on "
1505 "copyright law. Once you lawfully acquire a DVD, it is no copyright "
1506 "infringement to watch it no matter where you happen to be."
1509 #. type: Content of: <book><chapter><sect1><para>
1510 #: complete-book.xml:1193
1512 "So DVD and DVD player manufacturers would not be able to use accusations of "
1513 "abetting copyright infringement to punish manufacturers who made "
1514 "noncompliant players that would play discs from any region or repair shops "
1515 "that modified players to let you watch out-of-region discs or software "
1516 "programmers who created programs to let you do this."
1519 #. type: Content of: <book><chapter><sect1><para>
1520 #: complete-book.xml:1201
1522 "That’s where Section 1201 of the DMCA comes in: By banning tampering with an "
1523 "<quote>access control,</quote> the rule gave manufacturers and rights "
1524 "holders standing to sue competitors who released superior products with "
1525 "lawful features that the market demanded (in this case, region-free "
1529 #. type: Content of: <book><chapter><sect1><para>
1530 #: complete-book.xml:1208
1532 "This is an odious scam against consumers, but as time went by, Section 1201 "
1533 "grew to encompass a rapidly expanding constellation of devices and services "
1534 "as canny manufacturers have realized certain things:"
1537 #. type: Content of: <book><chapter><sect1><itemizedlist><listitem><para>
1538 #: complete-book.xml:1216
1540 "Any device with software in it contains a <quote>copyrighted work</quote> — "
1541 "i.e., the software."
1544 #. type: Content of: <book><chapter><sect1><itemizedlist><listitem><para>
1545 #: complete-book.xml:1222
1547 "A device can be designed so that reconfiguring the software requires "
1548 "bypassing an <quote>access control for copyrighted works,</quote> which is a "
1549 "potential felony under Section 1201."
1552 #. type: Content of: <book><chapter><sect1><itemizedlist><listitem><para>
1553 #: complete-book.xml:1229
1555 "Thus, companies can control their customers’ behavior after they take home "
1556 "their purchases by designing products so that all unpermitted uses require "
1557 "modifications that fall afoul of Section 1201."
1560 #. type: Content of: <book><chapter><sect1><para>
1561 #: complete-book.xml:1237
1563 "Section 1201 then becomes a means for manufacturers of all descriptions to "
1564 "force their customers to arrange their affairs to benefit the manufacturers’ "
1565 "shareholders instead of themselves."
1568 #. type: Content of: <book><chapter><sect1><para>
1569 #: complete-book.xml:1242
1571 "This manifests in many ways: from a new generation of inkjet printers that "
1572 "use countermeasures to prevent third-party ink that cannot be bypassed "
1573 "without legal risks to similar systems in tractors that prevent third-party "
1574 "technicians from swapping in the manufacturer’s own parts that are not "
1575 "recognized by the tractor’s control system until it is supplied with a "
1576 "manufacturer’s unlock code."
1579 #. type: Content of: <book><chapter><sect1><para>
1580 #: complete-book.xml:1251
1582 "Closer to home, Apple’s iPhones use these measures to prevent both "
1583 "third-party service and third-party software installation. This allows Apple "
1584 "to decide when an iPhone is beyond repair and must be shredded and "
1585 "landfilled as opposed to the iPhone’s purchaser. (Apple is notorious for its "
1586 "environmentally catastrophic policy of destroying old electronics rather "
1587 "than permitting them to be cannibalized for parts.) This is a very useful "
1588 "power to wield, especially in light of CEO Tim Cook’s January 2019 warning "
1589 "to investors that the company’s profits are endangered by customers choosing "
1590 "to hold onto their phones for longer rather than replacing them."
1593 #. type: Content of: <book><chapter><sect1><para>
1594 #: complete-book.xml:1264
1596 "Apple’s use of copyright locks also allows it to establish a monopoly over "
1597 "how its customers acquire software for their mobile devices. The App Store’s "
1598 "commercial terms guarantee Apple a share of all revenues generated by the "
1599 "apps sold there, meaning that Apple gets paid when you buy an app from its "
1600 "store and then continues to get paid every time you buy something using that "
1601 "app. This comes out of the bottom line of software developers, who must "
1602 "either charge more or accept lower profits for their products."
1605 #. type: Content of: <book><chapter><sect1><para>
1606 #: complete-book.xml:1274
1608 "Crucially, Apple’s use of copyright locks gives it the power to make "
1609 "editorial decisions about which apps you may and may not install on your own "
1610 "device. Apple has used this power to <ulink "
1611 "url=\"https://www.telegraph.co.uk/technology/apple/5982243/Apple-bans-dictionary-from-App-Store-over-swear-words.html\">reject "
1612 "dictionaries</ulink> for containing obscene words; to <ulink "
1613 "url=\"https://www.vice.com/en_us/article/538kan/apple-just-banned-the-app-that-tracks-us-drone-strikes-again\">limit "
1614 "political speech</ulink>, especially from apps that make sensitive political "
1615 "commentary such as an app that notifies you every time a U.S. drone kills "
1616 "someone somewhere in the world; and to <ulink "
1617 "url=\"https://www.eurogamer.net/articles/2016-05-19-palestinian-indie-game-must-not-be-called-a-game-apple-says\">object "
1618 "to a game</ulink> that commented on the Israel-Palestine conflict."
1621 #. type: Content of: <book><chapter><sect1><para>
1622 #: complete-book.xml:1287
1624 "Apple often justifies monopoly power over software installation in the name "
1625 "of security, arguing that its vetting of apps for its store means that it "
1626 "can guard its users against apps that contain surveillance code. But this "
1627 "cuts both ways. In China, the government <ulink "
1628 "url=\"https://www.ft.com/content/ad42e536-cf36-11e7-b781-794ce08b24dc\">ordered "
1629 "Apple to prohibit the sale of privacy tools</ulink> like VPNs with the "
1630 "exception of VPNs that had deliberately introduced flaws designed to let the "
1631 "Chinese state eavesdrop on users. Because Apple uses technological "
1632 "countermeasures — with legal backstops — to block customers from installing "
1633 "unauthorized apps, Chinese iPhone owners cannot readily (or legally) acquire "
1634 "VPNs that would protect them from Chinese state snooping."
1637 #. type: Content of: <book><chapter><sect1><para>
1638 #: complete-book.xml:1301
1640 "Zuboff calls surveillance capitalism a <quote>rogue capitalism.</quote> "
1641 "Theoreticians of capitalism claim that its virtue is that it <ulink "
1642 "url=\"https://en.wikipedia.org/wiki/Price_signal\">aggregates information in "
1643 "the form of consumers’ decisions</ulink>, producing efficient "
1644 "markets. Surveillance capitalism’s supposed power to rob its victims of "
1645 "their free will through computationally supercharged influence campaigns "
1646 "means that our markets no longer aggregate customers’ decisions because we "
1647 "customers no longer decide — we are given orders by surveillance "
1648 "capitalism’s mind-control rays."
1651 #. type: Content of: <book><chapter><sect1><para>
1652 #: complete-book.xml:1312
1654 "If our concern is that markets cease to function when consumers can no "
1655 "longer make choices, then copyright locks should concern us at "
1656 "<emphasis>least</emphasis> as much as influence campaigns. An influence "
1657 "campaign might nudge you to buy a certain brand of phone; but the copyright "
1658 "locks on that phone absolutely determine where you get it serviced, which "
1659 "apps can run on it, and when you have to throw it away rather than fixing "
1663 #. type: Content of: <book><chapter><sect1><title>
1664 #: complete-book.xml:1321
1665 msgid "Search order and the right to the future tense"
1668 #. type: Content of: <book><chapter><sect1><para>
1669 #: complete-book.xml:1323
1671 "Markets are posed as a kind of magic: By discovering otherwise hidden "
1672 "information conveyed by the free choices of consumers, those consumers’ "
1673 "local knowledge is integrated into a self-correcting system that makes "
1674 "efficient allocations—more efficient than any computer could calculate. But "
1675 "monopolies are incompatible with that notion. When you only have one app "
1676 "store, the owner of the store — not the consumer — decides on the range of "
1677 "choices. As Boss Tweed once said, <quote>I don’t care who does the electing, "
1678 "so long as I get to do the nominating.</quote> A monopolized market is an "
1679 "election whose candidates are chosen by the monopolist."
1682 #. type: Content of: <book><chapter><sect1><para>
1683 #: complete-book.xml:1335
1685 "This ballot rigging is made more pernicious by the existence of monopolies "
1686 "over search order. Google’s search market share is about 90%. When Google’s "
1687 "ranking algorithm puts a result for a popular search term in its top 10, "
1688 "that helps determine the behavior of millions of people. If Google’s answer "
1689 "to <quote>Are vaccines dangerous?</quote> is a page that rebuts anti-vax "
1690 "conspiracy theories, then a sizable portion of the public will learn that "
1691 "vaccines are safe. If, on the other hand, Google sends those people to a "
1692 "site affirming the anti-vax conspiracies, a sizable portion of those "
1693 "millions will come away convinced that vaccines are dangerous."
1696 #. type: Content of: <book><chapter><sect1><para>
1697 #: complete-book.xml:1347
1699 "Google’s algorithm is often tricked into serving disinformation as a "
1700 "prominent search result. But in these cases, Google isn’t persuading people "
1701 "to change their minds; it’s just presenting something untrue as fact when "
1702 "the user has no cause to doubt it."
1705 #. type: Content of: <book><chapter><sect1><para>
1706 #: complete-book.xml:1353
1708 "This is true whether the search is for <quote>Are vaccines "
1709 "dangerous?</quote> or <quote>best restaurants near me.</quote> Most users "
1710 "will never look past the first page of search results, and when the "
1711 "overwhelming majority of people all use the same search engine, the ranking "
1712 "algorithm deployed by that search engine will determine myriad outcomes "
1713 "(whether to adopt a child, whether to have cancer surgery, where to eat "
1714 "dinner, where to move, where to apply for a job) to a degree that vastly "
1715 "outstrips any behavioral outcomes dictated by algorithmic persuasion "
1719 #. type: Content of: <book><chapter><sect1><para>
1720 #: complete-book.xml:1364
1722 "Many of the questions we ask search engines have no empirically correct "
1723 "answers: <quote>Where should I eat dinner?</quote> is not an objective "
1724 "question. Even questions that do have correct answers (<quote>Are vaccines "
1725 "dangerous?</quote>) don’t have one empirically superior source for that "
1726 "answer. Many pages affirm the safety of vaccines, so which one goes first? "
1727 "Under conditions of competition, consumers can choose from many search "
1728 "engines and stick with the one whose algorithmic judgment suits them best, "
1729 "but under conditions of monopoly, we all get our answers from the same "
1733 #. type: Content of: <book><chapter><sect1><para>
1734 #: complete-book.xml:1375
1736 "Google’s search dominance isn’t a matter of pure merit: The company has "
1737 "leveraged many tactics that would have been prohibited under classical, "
1738 "pre-Ronald-Reagan antitrust enforcement standards to attain its "
1739 "dominance. After all, this is a company that has developed two major "
1740 "products: a really good search engine and a pretty good Hotmail clone. Every "
1741 "other major success it’s had — Android, YouTube, Google Maps, etc. — has "
1742 "come through an acquisition of a nascent competitor. Many of the company’s "
1743 "key divisions, such as the advertising technology of DoubleClick, violate "
1744 "the historical antitrust principle of structural separation, which forbade "
1745 "firms from owning subsidiaries that competed with their "
1746 "customers. Railroads, for example, were barred from owning freight companies "
1747 "that competed with the shippers whose freight they carried."
1750 #. type: Content of: <book><chapter><sect1><para>
1751 #: complete-book.xml:1391
1753 "If we’re worried about giant companies subverting markets by stripping "
1754 "consumers of their ability to make free choices, then vigorous antitrust "
1755 "enforcement seems like an excellent remedy. If we’d denied Google the right "
1756 "to effect its many mergers, we would also have probably denied it its total "
1757 "search dominance. Without that dominance, the pet theories, biases, errors "
1758 "(and good judgment, too) of Google search engineers and product managers "
1759 "would not have such an outsized effect on consumer choice."
1762 #. type: Content of: <book><chapter><sect1><para>
1763 #: complete-book.xml:1401
1765 "This goes for many other companies. Amazon, a classic surveillance "
1766 "capitalist, is obviously the dominant tool for searching Amazon — though "
1767 "many people find their way to Amazon through Google searches and Facebook "
1768 "posts — and obviously, Amazon controls Amazon search. That means that "
1769 "Amazon’s own self-serving editorial choices—like promoting its own house "
1770 "brands over rival goods from its sellers as well as its own pet theories, "
1771 "biases, and errors— determine much of what we buy on Amazon. And since "
1772 "Amazon is the dominant e-commerce retailer outside of China and since it "
1773 "attained that dominance by buying up both large rivals and nascent "
1774 "competitors in defiance of historical antitrust rules, we can blame the "
1775 "monopoly for stripping consumers of their right to the future tense and the "
1776 "ability to shape markets by making informed choices."
1779 #. type: Content of: <book><chapter><sect1><para>
1780 #: complete-book.xml:1416
1782 "Not every monopolist is a surveillance capitalist, but that doesn’t mean "
1783 "they’re not able to shape consumer choices in wide-ranging ways. Zuboff "
1784 "lauds Apple for its App Store and iTunes Store, insisting that adding price "
1785 "tags to the features on its platforms has been the secret to resisting "
1786 "surveillance and thus creating markets. But Apple is the only retailer "
1787 "allowed to sell on its platforms, and it’s the second-largest mobile device "
1788 "vendor in the world. The independent software vendors that sell through "
1789 "Apple’s marketplace accuse the company of the same surveillance sins as "
1790 "Amazon and other big retailers: spying on its customers to find lucrative "
1791 "new products to launch, effectively using independent software vendors as "
1792 "free-market researchers, then forcing them out of any markets they discover."
1795 #. type: Content of: <book><chapter><sect1><para>
1796 #: complete-book.xml:1431
1798 "Because of its use of copyright locks, Apple’s mobile customers are not "
1799 "legally allowed to switch to a rival retailer for its apps if they want to "
1800 "do so on an iPhone. Apple, obviously, is the only entity that gets to decide "
1801 "how it ranks the results of search queries in its stores. These decisions "
1802 "ensure that some apps are often installed (because they appear on page one) "
1803 "and others are never installed (because they appear on page one "
1804 "million). Apple’s search-ranking design decisions have a vastly more "
1805 "significant effect on consumer behaviors than influence campaigns delivered "
1806 "by surveillance capitalism’s ad-serving bots."
1809 #. type: Content of: <book><chapter><sect1><title>
1810 #: complete-book.xml:1443
1811 msgid "Monopolists can afford sleeping pills for watchdogs"
1814 #. type: Content of: <book><chapter><sect1><para>
1815 #: complete-book.xml:1445
1817 "Only the most extreme market ideologues think that markets can self-regulate "
1818 "without state oversight. Markets need watchdogs — regulators, lawmakers, and "
1819 "other elements of democratic control — to keep them honest. When these "
1820 "watchdogs sleep on the job, then markets cease to aggregate consumer choices "
1821 "because those choices are constrained by illegitimate and deceptive "
1822 "activities that companies are able to get away with because no one is "
1823 "holding them to account."
1826 #. type: Content of: <book><chapter><sect1><para>
1827 #: complete-book.xml:1455
1829 "But this kind of regulatory capture doesn’t come cheap. In competitive "
1830 "sectors, where rivals are constantly eroding one another’s margins, "
1831 "individual firms lack the surplus capital to effectively lobby for laws and "
1832 "regulations that serve their ends."
1835 #. type: Content of: <book><chapter><sect1><para>
1836 #: complete-book.xml:1461
1838 "Many of the harms of surveillance capitalism are the result of weak or "
1839 "nonexistent regulation. Those regulatory vacuums spring from the power of "
1840 "monopolists to resist stronger regulation and to tailor what regulation "
1841 "exists to permit their existing businesses."
1844 #. type: Content of: <book><chapter><sect1><para>
1845 #: complete-book.xml:1467
1847 "Here’s an example: When firms over-collect and over-retain our data, they "
1848 "are at increased risk of suffering a breach — you can’t leak data you never "
1849 "collected, and once you delete all copies of that data, you can no longer "
1850 "leak it. For more than a decade, we’ve lived through an endless parade of "
1851 "ever-worsening data breaches, each one uniquely horrible in the scale of "
1852 "data breached and the sensitivity of that data."
1855 #. type: Content of: <book><chapter><sect1><para>
1856 #: complete-book.xml:1476
1858 "But still, firms continue to over-collect and over-retain our data for three "
1862 #. type: Content of: <book><chapter><sect1><para>
1863 #: complete-book.xml:1480
1865 "<emphasis role=\"strong\">1. They are locked in the aforementioned limbic "
1866 "arms race with our capacity to shore up our attentional defense systems to "
1867 "resist their new persuasion techniques.</emphasis> They’re also locked in an "
1868 "arms race with their competitors to find new ways to target people for sales "
1869 "pitches. As soon as they discover a soft spot in our attentional defenses (a "
1870 "counterintuitive, unobvious way to target potential refrigerator buyers), "
1871 "the public begins to wise up to the tactic, and their competitors leap on "
1872 "it, hastening the day in which all potential refrigerator buyers have been "
1873 "inured to the pitch."
1876 #. type: Content of: <book><chapter><sect1><para>
1877 #: complete-book.xml:1492
1879 "<emphasis role=\"strong\">2. They believe the surveillance capitalism "
1880 "story.</emphasis> Data is cheap to aggregate and store, and both proponents "
1881 "and opponents of surveillance capitalism have assured managers and product "
1882 "designers that if you collect enough data, you will be able to perform "
1883 "sorcerous acts of mind control, thus supercharging your sales. Even if you "
1884 "never figure out how to profit from the data, someone else will eventually "
1885 "offer to buy it from you to give it a try. This is the hallmark of all "
1886 "economic bubbles: acquiring an asset on the assumption that someone else "
1887 "will buy it from you for more than you paid for it, often to sell to someone "
1888 "else at an even greater price."
1891 #. type: Content of: <book><chapter><sect1><para>
1892 #: complete-book.xml:1505
1894 "<emphasis role=\"strong\">3. The penalties for leaking data are "
1895 "negligible.</emphasis> Most countries limit these penalties to actual "
1896 "damages, meaning that consumers who’ve had their data breached have to show "
1897 "actual monetary harms to get a reward. In 2014, Home Depot disclosed that it "
1898 "had lost credit-card data for 53 million of its customers, but it settled "
1899 "the matter by paying those customers about $0.34 each — and a third of that "
1900 "$0.34 wasn’t even paid in cash. It took the form of a credit to procure a "
1901 "largely ineffectual credit-monitoring service."
1904 #. type: Content of: <book><chapter><sect1><para>
1905 #: complete-book.xml:1516
1907 "But the harms from breaches are much more extensive than these "
1908 "actual-damages rules capture. Identity thieves and fraudsters are wily and "
1909 "endlessly inventive. All the vast breaches of our century are being "
1910 "continuously recombined, the data sets merged and mined for new ways to "
1911 "victimize the people whose data was present in them. Any reasonable, "
1912 "evidence-based theory of deterrence and compensation for breaches would not "
1913 "confine damages to actual damages but rather would allow users to claim "
1914 "these future harms."
1917 #. type: Content of: <book><chapter><sect1><para>
1918 #: complete-book.xml:1526
1920 "However, even the most ambitious privacy rules, such as the EU General Data "
1921 "Protection Regulation, fall far short of capturing the negative "
1922 "externalities of the platforms’ negligent over-collection and "
1923 "over-retention, and what penalties they do provide are not aggressively "
1924 "pursued by regulators."
1927 #. type: Content of: <book><chapter><sect1><para>
1928 #: complete-book.xml:1533
1930 "This tolerance of — or indifference to — data over-collection and "
1931 "over-retention can be ascribed in part to the sheer lobbying muscle of the "
1932 "platforms. They are so profitable that they can handily afford to divert "
1933 "gigantic sums to fight any real change — that is, change that would force "
1934 "them to internalize the costs of their surveillance activities."
1937 #. type: Content of: <book><chapter><sect1><para>
1938 #: complete-book.xml:1541
1940 "And then there’s state surveillance, which the surveillance capitalism story "
1941 "dismisses as a relic of another era when the big worry was being jailed for "
1942 "your dissident speech, not having your free will stripped away with machine "
1946 #. type: Content of: <book><chapter><sect1><para>
1947 #: complete-book.xml:1547
1949 "But state surveillance and private surveillance are intimately related. As "
1950 "we saw when Apple was conscripted by the Chinese government as a vital "
1951 "collaborator in state surveillance, the only really affordable and tractable "
1952 "way to conduct mass surveillance on the scale practiced by modern states — "
1953 "both <quote>free</quote> and autocratic states — is to suborn commercial "
1957 #. type: Content of: <book><chapter><sect1><para>
1958 #: complete-book.xml:1555
1960 "Whether it’s Google being used as a location tracking tool by local law "
1961 "enforcement across the U.S. or the use of social media tracking by the "
1962 "Department of Homeland Security to build dossiers on participants in "
1963 "protests against Immigration and Customs Enforcement’s family separation "
1964 "practices, any hard limits on surveillance capitalism would hamstring the "
1965 "state’s own surveillance capability. Without Palantir, Amazon, Google, and "
1966 "other major tech contractors, U.S. cops would not be able to spy on Black "
1967 "people, ICE would not be able to manage the caging of children at the U.S. "
1968 "border, and state welfare systems would not be able to purge their rolls by "
1969 "dressing up cruelty as empiricism and claiming that poor and vulnerable "
1970 "people are ineligible for assistance. At least some of the states’ "
1971 "unwillingness to take meaningful action to curb surveillance should be "
1972 "attributed to this symbiotic relationship. There is no mass state "
1973 "surveillance without mass commercial surveillance."
1976 #. type: Content of: <book><chapter><sect1><para>
1977 #: complete-book.xml:1573
1979 "Monopolism is key to the project of mass state surveillance. It’s true that "
1980 "smaller tech firms are apt to be less well-defended than Big Tech, whose "
1981 "security experts are drawn from the tops of their field and who are given "
1982 "enormous resources to secure and monitor their systems against "
1983 "intruders. But smaller firms also have less to protect: fewer users whose "
1984 "data is more fragmented across more systems and have to be suborned one at a "
1985 "time by state actors."
1988 #. type: Content of: <book><chapter><sect1><para>
1989 #: complete-book.xml:1582
1991 "A concentrated tech sector that works with authorities is a much more "
1992 "powerful ally in the project of mass state surveillance than a fragmented "
1993 "one composed of smaller actors. The U.S. tech sector is small enough that "
1994 "all of its top executives fit around a single boardroom table in Trump Tower "
1995 "in 2017, shortly after Trump’s inauguration. Most of its biggest players bid "
1996 "to win JEDI, the Pentagon’s $10 billion Joint Enterprise Defense "
1997 "Infrastructure cloud contract. Like other highly concentrated industries, "
1998 "Big Tech rotates its key employees in and out of government service, sending "
1999 "them to serve in the Department of Defense and the White House, then hiring "
2000 "ex-Pentagon and ex-DOD top staffers and officers to work in their own "
2001 "government relations departments."
2004 #. type: Content of: <book><chapter><sect1><para>
2005 #: complete-book.xml:1596
2007 "They can even make a good case for doing this: After all, when there are "
2008 "only four or five big companies in an industry, everyone qualified to "
2009 "regulate those companies has served as an executive in at least a couple of "
2010 "them — because, likewise, when there are only five companies in an industry, "
2011 "everyone qualified for a senior role at any of them is by definition working "
2012 "at one of the other ones."
2015 #. type: Content of: <book><chapter><sect1><blockquote><para>
2016 #: complete-book.xml:1605
2018 "While surveillance doesn’t cause monopolies, monopolies certainly abet "
2022 #. type: Content of: <book><chapter><sect1><para>
2023 #: complete-book.xml:1610
2025 "Industries that are competitive are fragmented — composed of companies that "
2026 "are at each other’s throats all the time and eroding one another’s margins "
2027 "in bids to steal their best customers. This leaves them with much more "
2028 "limited capital to use to lobby for favorable rules and a much harder job of "
2029 "getting everyone to agree to pool their resources to benefit the industry as "
2033 #. type: Content of: <book><chapter><sect1><para>
2034 #: complete-book.xml:1618
2036 "Surveillance combined with machine learning is supposed to be an existential "
2037 "crisis, a species-defining moment at which our free will is just a few more "
2038 "advances in the field from being stripped away. I am skeptical of this "
2039 "claim, but I <emphasis>do</emphasis> think that tech poses an existential "
2040 "threat to our society and possibly our species."
2043 #. type: Content of: <book><chapter><sect1><para>
2044 #: complete-book.xml:1626
2045 msgid "But that threat grows out of monopoly."
2048 #. type: Content of: <book><chapter><sect1><para>
2049 #: complete-book.xml:1629
2051 "One of the consequences of tech’s regulatory capture is that it can shift "
2052 "liability for poor security decisions onto its customers and the wider "
2053 "society. It is absolutely normal in tech for companies to obfuscate the "
2054 "workings of their products, to make them deliberately hard to understand, "
2055 "and to threaten security researchers who seek to independently audit those "
2059 #. type: Content of: <book><chapter><sect1><para>
2060 #: complete-book.xml:1637
2062 "IT is the only field in which this is practiced: No one builds a bridge or a "
2063 "hospital and keeps the composition of the steel or the equations used to "
2064 "calculate load stresses a secret. It is a frankly bizarre practice that "
2065 "leads, time and again, to grotesque security defects on farcical scales, "
2066 "with whole classes of devices being revealed as vulnerable long after they "
2067 "are deployed in the field and put into sensitive places."
2070 #. type: Content of: <book><chapter><sect1><para>
2071 #: complete-book.xml:1646
2073 "The monopoly power that keeps any meaningful consequences for breaches at "
2074 "bay means that tech companies continue to build terrible products that are "
2075 "insecure by design and that end up integrated into our lives, in possession "
2076 "of our data, and connected to our physical world. For years, Boeing has "
2077 "struggled with the aftermath of a series of bad technology decisions that "
2078 "made its 737 fleet a global pariah, a rare instance in which bad tech "
2079 "decisions have been seriously punished in the market."
2082 #. type: Content of: <book><chapter><sect1><para>
2083 #: complete-book.xml:1656
2085 "These bad security decisions are compounded yet again by the use of "
2086 "copyright locks to enforce business-model decisions against "
2087 "consumers. Recall that these locks have become the go-to means for shaping "
2088 "consumer behavior, making it technically impossible to use third-party ink, "
2089 "insulin, apps, or service depots in connection with your lawfully acquired "
2093 #. type: Content of: <book><chapter><sect1><para>
2094 #: complete-book.xml:1664
2096 "Recall also that these copyright locks are backstopped by legislation (such "
2097 "as Section 1201 of the DMCA or Article 6 of the 2001 EU Copyright Directive) "
2098 "that ban tampering with (<quote>circumventing</quote>) them, and these "
2099 "statutes have been used to threaten security researchers who make "
2100 "disclosures about vulnerabilities without permission from manufacturers."
2103 #. type: Content of: <book><chapter><sect1><para>
2104 #: complete-book.xml:1672
2106 "This amounts to a manufacturer’s veto over safety warnings and "
2107 "criticism. While this is far from the legislative intent of the DMCA and its "
2108 "sister statutes around the world, Congress has not intervened to clarify the "
2109 "statute nor will it because to do so would run counter to the interests of "
2110 "powerful, large firms whose lobbying muscle is unstoppable."
2113 #. type: Content of: <book><chapter><sect1><para>
2114 #: complete-book.xml:1680
2116 "Copyright locks are a double whammy: They create bad security decisions that "
2117 "can’t be freely investigated or discussed. If markets are supposed to be "
2118 "machines for aggregating information (and if surveillance capitalism’s "
2119 "notional mind-control rays are what make it a <quote>rogue "
2120 "capitalism</quote> because it denies consumers the power to make decisions), "
2121 "then a program of legally enforced ignorance of the risks of products makes "
2122 "monopolism even more of a <quote>rogue capitalism</quote> than surveillance "
2123 "capitalism’s influence campaigns."
2126 #. type: Content of: <book><chapter><sect1><para>
2127 #: complete-book.xml:1690
2129 "And unlike mind-control rays, enforced silence over security is an "
2130 "immediate, documented problem, and it <emphasis>does</emphasis> constitute "
2131 "an existential threat to our civilization and possibly our species. The "
2132 "proliferation of insecure devices — especially devices that spy on us and "
2133 "especially when those devices also can manipulate the physical world by, "
2134 "say, steering your car or flipping a breaker at a power station — is a kind "
2135 "of technology debt."
2138 #. type: Content of: <book><chapter><sect1><para>
2139 #: complete-book.xml:1699
2141 "In software design, <quote>technology debt</quote> refers to old, baked-in "
2142 "decisions that turn out to be bad ones in hindsight. Perhaps a long-ago "
2143 "developer decided to incorporate a networking protocol made by a vendor that "
2144 "has since stopped supporting it. But everything in the product still relies "
2145 "on that superannuated protocol, and so, with each revision, the product team "
2146 "has to work around this obsolete core, adding compatibility layers, "
2147 "surrounding it with security checks that try to shore up its defenses, and "
2148 "so on. These Band-Aid measures compound the debt because every subsequent "
2149 "revision has to make allowances for <emphasis>them</emphasis>, too, like "
2150 "interest mounting on a predatory subprime loan. And like a subprime loan, "
2151 "the interest mounts faster than you can hope to pay it off: The product team "
2152 "has to put so much energy into maintaining this complex, brittle system that "
2153 "they don’t have any time left over to refactor the product from the ground "
2154 "up and <quote>pay off the debt</quote> once and for all."
2157 #. type: Content of: <book><chapter><sect1><para>
2158 #: complete-book.xml:1717
2160 "Typically, technology debt results in a technological bankruptcy: The "
2161 "product gets so brittle and unsustainable that it fails "
2162 "catastrophically. Think of the antiquated COBOL-based banking and accounting "
2163 "systems that fell over at the start of the pandemic emergency when "
2164 "confronted with surges of unemployment claims. Sometimes that ends the "
2165 "product; sometimes it takes the company down with it. Being caught in the "
2166 "default of a technology debt is scary and traumatic, just like losing your "
2167 "house due to bankruptcy is scary and traumatic."
2170 #. type: Content of: <book><chapter><sect1><para>
2171 #: complete-book.xml:1728
2173 "But the technology debt created by copyright locks isn’t individual debt; "
2174 "it’s systemic. Everyone in the world is exposed to this over-leverage, as "
2175 "was the case with the 2008 financial crisis. When that debt comes due — when "
2176 "we face a cascade of security breaches that threaten global shipping and "
2177 "logistics, the food supply, pharmaceutical production pipelines, emergency "
2178 "communications, and other critical systems that are accumulating technology "
2179 "debt in part due to the presence of deliberately insecure and deliberately "
2180 "unauditable copyright locks — it will indeed pose an existential risk."
2183 #. type: Content of: <book><chapter><sect1><title>
2184 #: complete-book.xml:1740
2185 msgid "Privacy and monopoly"
2188 #. type: Content of: <book><chapter><sect1><para>
2189 #: complete-book.xml:1742
2191 "Many tech companies are gripped by an orthodoxy that holds that if they just "
2192 "gather enough data on enough of our activities, everything else is possible "
2193 "— the mind control and endless profits. This is an unfalsifiable hypothesis: "
2194 "If data gives a tech company even a tiny improvement in behavior prediction "
2195 "and modification, the company declares that it has taken the first step "
2196 "toward global domination with no end in sight. If a company "
2197 "<emphasis>fails</emphasis> to attain any improvements from gathering and "
2198 "analyzing data, it declares success to be just around the corner, attainable "
2199 "once more data is in hand."
2202 #. type: Content of: <book><chapter><sect1><para>
2203 #: complete-book.xml:1754
2205 "Surveillance tech is far from the first industry to embrace a nonsensical, "
2206 "self-serving belief that harms the rest of the world, and it is not the "
2207 "first industry to profit handsomely from such a delusion. Long before "
2208 "hedge-fund managers were claiming (falsely) that they could beat the "
2209 "S&P 500, there were plenty of other <quote>respectable</quote> "
2210 "industries that have been revealed as quacks in hindsight. From the makers "
2211 "of radium suppositories (a real thing!) to the cruel sociopaths who claimed "
2212 "they could <quote>cure</quote> gay people, history is littered with the "
2213 "formerly respectable titans of discredited industries."
2216 #. type: Content of: <book><chapter><sect1><para>
2217 #: complete-book.xml:1766
2219 "This is not to say that there’s nothing wrong with Big Tech and its "
2220 "ideological addiction to data. While surveillance’s benefits are mostly "
2221 "overstated, its harms are, if anything, <emphasis>understated</emphasis>."
2224 #. type: Content of: <book><chapter><sect1><para>
2225 #: complete-book.xml:1772
2227 "There’s real irony here. The belief in surveillance capitalism as a "
2228 "<quote>rogue capitalism</quote> is driven by the belief that markets "
2229 "wouldn’t tolerate firms that are gripped by false beliefs. An oil company "
2230 "that has false beliefs about where the oil is will eventually go broke "
2231 "digging dry wells after all."
2234 #. type: Content of: <book><chapter><sect1><para>
2235 #: complete-book.xml:1779
2237 "But monopolists get to do terrible things for a long time before they pay "
2238 "the price. Think of how concentration in the finance sector allowed the "
2239 "subprime crisis to fester as bond-rating agencies, regulators, investors, "
2240 "and critics all fell under the sway of a false belief that complex "
2241 "mathematics could construct <quote>fully hedged</quote> debt instruments "
2242 "that could not possibly default. A small bank that engaged in this kind of "
2243 "malfeasance would simply go broke rather than outrunning the inevitable "
2244 "crisis, perhaps growing so big that it averted it altogether. But large "
2245 "banks were able to continue to attract investors, and when they finally "
2246 "<emphasis>did</emphasis> come a-cropper, the world’s governments bailed them "
2247 "out. The worst offenders of the subprime crisis are bigger than they were in "
2248 "2008, bringing home more profits and paying their execs even larger sums."
2251 #. type: Content of: <book><chapter><sect1><para>
2252 #: complete-book.xml:1794
2254 "Big Tech is able to practice surveillance not just because it is tech but "
2255 "because it is <emphasis>big</emphasis>. The reason every web publisher "
2256 "embeds a Facebook <quote>Like</quote> button is that Facebook dominates the "
2257 "internet’s social media referrals — and every one of those "
2258 "<quote>Like</quote> buttons spies on everyone who lands on a page that "
2259 "contains them (see also: Google Analytics embeds, Twitter buttons, etc.)."
2262 #. type: Content of: <book><chapter><sect1><para>
2263 #: complete-book.xml:1803
2265 "The reason the world’s governments have been slow to create meaningful "
2266 "penalties for privacy breaches is that Big Tech’s concentration produces "
2267 "huge profits that can be used to lobby against those penalties — and Big "
2268 "Tech’s concentration means that the companies involved are able to arrive at "
2269 "a unified negotiating position that supercharges the lobbying."
2272 #. type: Content of: <book><chapter><sect1><para>
2273 #: complete-book.xml:1811
2275 "The reason that the smartest engineers in the world want to work for Big "
2276 "Tech is that Big Tech commands the lion’s share of tech industry jobs."
2279 #. type: Content of: <book><chapter><sect1><para>
2280 #: complete-book.xml:1816
2282 "The reason people who are aghast at Facebook’s and Google’s and Amazon’s "
2283 "data-handling practices continue to use these services is that all their "
2284 "friends are on Facebook; Google dominates search; and Amazon has put all the "
2285 "local merchants out of business."
2288 #. type: Content of: <book><chapter><sect1><para>
2289 #: complete-book.xml:1822
2291 "Competitive markets would weaken the companies’ lobbying muscle by reducing "
2292 "their profits and pitting them against each other in regulatory forums. It "
2293 "would give customers other places to go to get their online services. It "
2294 "would make the companies small enough to regulate and pave the way to "
2295 "meaningful penalties for breaches. It would let engineers with ideas that "
2296 "challenged the surveillance orthodoxy raise capital to compete with the "
2297 "incumbents. It would give web publishers multiple ways to reach audiences "
2298 "and make the case against Facebook and Google and Twitter embeds."
2301 #. type: Content of: <book><chapter><sect1><para>
2302 #: complete-book.xml:1833
2304 "In other words, while surveillance doesn’t cause monopolies, monopolies "
2305 "certainly abet surveillance."
2308 #. type: Content of: <book><chapter><sect1><title>
2309 #: complete-book.xml:1837
2310 msgid "Ronald Reagan, pioneer of tech monopolism"
2313 #. type: Content of: <book><chapter><sect1><para>
2314 #: complete-book.xml:1839
2316 "Technology exceptionalism is a sin, whether it’s practiced by technology’s "
2317 "blind proponents or by its critics. Both of these camps are prone to "
2318 "explaining away monopolistic concentration by citing some special "
2319 "characteristic of the tech industry, like network effects or first-mover "
2320 "advantage. The only real difference between these two groups is that the "
2321 "tech apologists say monopoly is inevitable so we should just let tech get "
2322 "away with its abuses while competition regulators in the U.S. and the EU say "
2323 "monopoly is inevitable so we should punish tech for its abuses but not try "
2324 "to break up the monopolies."
2327 #. type: Content of: <book><chapter><sect1><para>
2328 #: complete-book.xml:1851
2330 "To understand how tech became so monopolistic, it’s useful to look at the "
2331 "dawn of the consumer tech industry: 1979, the year the Apple II Plus "
2332 "launched and became the first successful home computer. That also happens to "
2333 "be the year that Ronald Reagan hit the campaign trail for the 1980 "
2334 "presidential race — a race he won, leading to a radical shift in the way "
2335 "that antitrust concerns are handled in America. Reagan’s cohort of "
2336 "politicians — including Margaret Thatcher in the U.K., Brian Mulroney in "
2337 "Canada, Helmut Kohl in Germany, and Augusto Pinochet in Chile — went on to "
2338 "enact similar reforms that eventually spread around the world."
2341 #. type: Content of: <book><chapter><sect1><para>
2342 #: complete-book.xml:1863
2344 "Antitrust’s story began nearly a century before all that with laws like the "
2345 "Sherman Act, which took aim at monopolists on the grounds that monopolies "
2346 "were bad in and of themselves — squeezing out competitors, creating "
2347 "<quote>diseconomies of scale</quote> (when a company is so big that its "
2348 "constituent parts go awry and it is seemingly helpless to address the "
2349 "problems), and capturing their regulators to such a degree that they can get "
2350 "away with a host of evils."
2353 #. type: Content of: <book><chapter><sect1><para>
2354 #: complete-book.xml:1872
2356 "Then came a fabulist named Robert Bork, a former solicitor general who "
2357 "Reagan appointed to the powerful U.S. Court of Appeals for the D.C. Circuit "
2358 "and who had created an alternate legislative history of the Sherman Act and "
2359 "its successors out of whole cloth. Bork insisted that these statutes were "
2360 "never targeted at monopolies (despite a wealth of evidence to the contrary, "
2361 "including the transcribed speeches of the acts’ authors) but, rather, that "
2362 "they were intended to prevent <quote>consumer harm</quote> — in the form of "
2366 #. type: Content of: <book><chapter><sect1><para>
2367 #: complete-book.xml:1882
2369 "Bork was a crank, but he was a crank with a theory that rich people really "
2370 "liked. Monopolies are a great way to make rich people richer by allowing "
2371 "them to receive <quote>monopoly rents</quote> (that is, bigger profits) and "
2372 "capture regulators, leading to a weaker, more favorable regulatory "
2373 "environment with fewer protections for customers, suppliers, the "
2374 "environment, and workers."
2377 #. type: Content of: <book><chapter><sect1><para>
2378 #: complete-book.xml:1890
2380 "Bork’s theories were especially palatable to the same power brokers who "
2381 "backed Reagan, and Reagan’s Department of Justice and other agencies began "
2382 "to incorporate Bork’s antitrust doctrine into their enforcement decisions "
2383 "(Reagan even put Bork up for a Supreme Court seat, but Bork flunked the "
2384 "Senate confirmation hearing so badly that, 40 years later, D.C. insiders use "
2385 "the term <quote>borked</quote> to refer to any catastrophically bad "
2386 "political performance)."
2389 #. type: Content of: <book><chapter><sect1><para>
2390 #: complete-book.xml:1899
2392 "Little by little, Bork’s theories entered the mainstream, and their backers "
2393 "began to infiltrate the legal education field, even putting on junkets where "
2394 "members of the judiciary were treated to lavish meals, fun outdoor "
2395 "activities, and seminars where they were indoctrinated into the consumer "
2396 "harm theory of antitrust. The more Bork’s theories took hold, the more money "
2397 "the monopolists were making — and the more surplus capital they had at their "
2398 "disposal to lobby for even more Borkian antitrust influence campaigns."
2401 #. type: Content of: <book><chapter><sect1><para>
2402 #: complete-book.xml:1909
2404 "The history of Bork’s antitrust theories is a really good example of the "
2405 "kind of covertly engineered shifts in public opinion that Zuboff warns us "
2406 "against, where fringe ideas become mainstream orthodoxy. But Bork didn’t "
2407 "change the world overnight. He played a very long game, for over a "
2408 "generation, and he had a tailwind because the same forces that backed "
2409 "oligarchic antitrust theories also backed many other oligarchic shifts in "
2410 "public opinion. For example, the idea that taxation is theft, that wealth is "
2411 "a sign of virtue, and so on — all of these theories meshed to form a "
2412 "coherent ideology that elevated inequality to a virtue."
2415 #. type: Content of: <book><chapter><sect1><para>
2416 #: complete-book.xml:1921
2418 "Today, many fear that machine learning allows surveillance capitalism to "
2419 "sell <quote>Bork-as-a-Service,</quote> at internet speeds, so that you can "
2420 "contract a machine-learning company to engineer <emphasis>rapid</emphasis> "
2421 "shifts in public sentiment without needing the capital to sustain a "
2422 "multipronged, multigenerational project working at the local, state, "
2423 "national, and global levels in business, law, and philosophy. I do not "
2424 "believe that such a project is plausible, though I agree that this is "
2425 "basically what the platforms claim to be selling. They’re just lying about "
2426 "it. Big Tech lies all the time, <emphasis>including</emphasis> in their "
2430 #. type: Content of: <book><chapter><sect1><para>
2431 #: complete-book.xml:1934
2433 "The idea that tech forms <quote>natural monopolies</quote> (monopolies that "
2434 "are the inevitable result of the realities of an industry, such as the "
2435 "monopolies that accrue the first company to run long-haul phone lines or "
2436 "rail lines) is belied by tech’s own history: In the absence of "
2437 "anti-competitive tactics, Google was able to unseat AltaVista and Yahoo; "
2438 "Facebook was able to head off Myspace. There are some advantages to "
2439 "gathering mountains of data, but those mountains of data also have "
2440 "disadvantages: liability (from leaking), diminishing returns (from old "
2441 "data), and institutional inertia (big companies, like science, progress one "
2442 "funeral at a time)."
2445 #. type: Content of: <book><chapter><sect1><para>
2446 #: complete-book.xml:1946
2448 "Indeed, the birth of the web saw a mass-extinction event for the existing "
2449 "giant, wildly profitable proprietary technologies that had capital, network "
2450 "effects, and walls and moats surrounding their businesses. The web showed "
2451 "that when a new industry is built around a protocol, rather than a product, "
2452 "the combined might of everyone who uses the protocol to reach their "
2453 "customers or users or communities outweighs even the most massive "
2454 "products. CompuServe, AOL, MSN, and a host of other proprietary walled "
2455 "gardens learned this lesson the hard way: Each believed it could stay "
2456 "separate from the web, offering <quote>curation</quote> and a guarantee of "
2457 "consistency and quality instead of the chaos of an open system. Each was "
2458 "wrong and ended up being absorbed into the public web."
2461 #. type: Content of: <book><chapter><sect1><para>
2462 #: complete-book.xml:1960
2464 "Yes, tech is heavily monopolized and is now closely associated with industry "
2465 "concentration, but this has more to do with a matter of timing than its "
2466 "intrinsically monopolistic tendencies. Tech was born at the moment that "
2467 "antitrust enforcement was being dismantled, and tech fell into exactly the "
2468 "same pathologies that antitrust was supposed to guard against. To a first "
2469 "approximation, it is reasonable to assume that tech’s monopolies are the "
2470 "result of a lack of anti-monopoly action and not the much-touted unique "
2471 "characteristics of tech, such as network effects, first-mover advantage, and "
2475 #. type: Content of: <book><chapter><sect1><para>
2476 #: complete-book.xml:1972
2478 "In support of this thesis, I offer the concentration that every "
2479 "<emphasis>other</emphasis> industry has undergone over the same period. From "
2480 "professional wrestling to consumer packaged goods to commercial property "
2481 "leasing to banking to sea freight to oil to record labels to newspaper "
2482 "ownership to theme parks, <emphasis>every</emphasis> industry has undergone "
2483 "a massive shift toward concentration. There’s no obvious network effects or "
2484 "first-mover advantage at play in these industries. However, in every case, "
2485 "these industries attained their concentrated status through tactics that "
2486 "were prohibited before Bork’s triumph: merging with major competitors, "
2487 "buying out innovative new market entrants, horizontal and vertical "
2488 "integration, and a suite of anti-competitive tactics that were once illegal "
2489 "but are not any longer."
2492 #. type: Content of: <book><chapter><sect1><para>
2493 #: complete-book.xml:1987
2495 "Again: When you change the laws intended to prevent monopolies and then "
2496 "monopolies form in exactly the way the law was supposed to prevent, it is "
2497 "reasonable to suppose that these facts are related. Tech’s concentration "
2498 "can be readily explained without recourse to radical theories of network "
2499 "effects — but only if you’re willing to indict unregulated markets as "
2500 "tending toward monopoly. Just as a lifelong smoker can give you a hundred "
2501 "reasons why their smoking didn’t cause their cancer (<quote>It was the "
2502 "environmental toxins</quote>), true believers in unregulated markets have a "
2503 "whole suite of unconvincing explanations for monopoly in tech that leave "
2504 "capitalism intact."
2507 #. type: Content of: <book><chapter><sect1><title>
2508 #: complete-book.xml:1999
2509 msgid "Steering with the windshield wipers"
2512 #. type: Content of: <book><chapter><sect1><para>
2513 #: complete-book.xml:2001
2515 "It’s been 40 years since Bork’s project to rehabilitate monopolies achieved "
2516 "liftoff, and that is a generation and a half, which is plenty of time to "
2517 "take a common idea and make it seem outlandish and vice versa. Before the "
2518 "1940s, affluent Americans dressed their baby boys in pink while baby girls "
2519 "wore blue (a <quote>delicate and dainty</quote> color). While gendered "
2520 "colors are obviously totally arbitrary, many still greet this news with "
2521 "amazement and find it hard to imagine a time when pink connoted masculinity."
2524 #. type: Content of: <book><chapter><sect1><para>
2525 #: complete-book.xml:2011
2527 "After 40 years of studiously ignoring antitrust analysis and enforcement, "
2528 "it’s not surprising that we’ve all but forgotten that antitrust exists, that "
2529 "in living memory, growth through mergers and acquisitions were largely "
2530 "prohibited under law, that market-cornering strategies like vertical "
2531 "integration could land a company in court."
2534 #. type: Content of: <book><chapter><sect1><para>
2535 #: complete-book.xml:2019
2537 "Antitrust is a market society’s steering wheel, the control of first resort "
2538 "to keep would-be masters of the universe in their lanes. But Bork and his "
2539 "cohort ripped out our steering wheel 40 years ago. The car is still "
2540 "barreling along, and so we’re yanking as hard as we can on all the "
2541 "<emphasis>other</emphasis> controls in the car as well as desperately "
2542 "flapping the doors and rolling the windows up and down in the hopes that one "
2543 "of these other controls can be repurposed to let us choose where we’re "
2544 "heading before we careen off a cliff."
2547 #. type: Content of: <book><chapter><sect1><para>
2548 #: complete-book.xml:2029
2550 "It’s like a 1960s science-fiction plot come to life: People stuck in a "
2551 "<quote>generation ship,</quote> plying its way across the stars, a ship once "
2552 "piloted by their ancestors; and now, after a great cataclysm, the ship’s "
2553 "crew have forgotten that they’re in a ship at all and no longer remember "
2554 "where the control room is. Adrift, the ship is racing toward its extinction, "
2555 "and unless we can seize the controls and execute emergency course "
2556 "correction, we’re all headed for a fiery death in the heart of a sun."
2559 #. type: Content of: <book><chapter><sect1><title>
2560 #: complete-book.xml:2039
2561 msgid "Surveillance still matters"
2564 #. type: Content of: <book><chapter><sect1><para>
2565 #: complete-book.xml:2041
2567 "None of this is to minimize the problems with surveillance. Surveillance "
2568 "matters, and Big Tech’s use of surveillance <emphasis>is</emphasis> an "
2569 "existential risk to our species, but that’s not because surveillance and "
2570 "machine learning rob us of our free will."
2573 #. type: Content of: <book><chapter><sect1><para>
2574 #: complete-book.xml:2048
2576 "Surveillance has become <emphasis>much</emphasis> more efficient thanks to "
2577 "Big Tech. In 1989, the Stasi — the East German secret police — had the whole "
2578 "country under surveillance, a massive undertaking that recruited one out of "
2579 "every 60 people to serve as an informant or intelligence operative."
2582 #. type: Content of: <book><chapter><sect1><para>
2583 #: complete-book.xml:2055
2585 "Today, we know that the NSA is spying on a significant fraction of the "
2586 "entire world’s population, and its ratio of surveillance operatives to the "
2587 "surveilled is more like 1:10,000 (that’s probably on the low side since it "
2588 "assumes that every American with top-secret clearance is working for the NSA "
2589 "on this project — we don’t know how many of those cleared people are "
2590 "involved in NSA spying, but it’s definitely not all of them)."
2593 #. type: Content of: <book><chapter><sect1><para>
2594 #: complete-book.xml:2064
2596 "How did the ratio of surveillable citizens expand from 1:60 to 1:10,000 in "
2597 "less than 30 years? It’s thanks to Big Tech. Our devices and services gather "
2598 "most of the data that the NSA mines for its surveillance project. We pay for "
2599 "these devices and the services they connect to, and then we painstakingly "
2600 "perform the data-entry tasks associated with logging facts about our lives, "
2601 "opinions, and preferences. This mass surveillance project has been largely "
2602 "useless for fighting terrorism: The NSA can <ulink "
2603 "url=\"https://www.washingtonpost.com/world/national-security/nsa-cites-case-as-success-of-phone-data-collection-program/2013/08/08/fc915e5a-feda-11e2-96a8-d3b921c0924a_story.html\">only "
2604 "point to a single minor success story</ulink> in which it used its data "
2605 "collection program to foil an attempt by a U.S. resident to wire a few "
2606 "thousand dollars to an overseas terror group. It’s ineffective for much the "
2607 "same reason that commercial surveillance projects are largely ineffective at "
2608 "targeting advertising: The people who want to commit acts of terror, like "
2609 "people who want to buy a refrigerator, are extremely rare. If you’re trying "
2610 "to detect a phenomenon whose base rate is one in a million with an "
2611 "instrument whose accuracy is only 99%, then every true positive will come at "
2612 "the cost of 9,999 false positives."
2615 #. type: Content of: <book><chapter><sect1><para>
2616 #: complete-book.xml:2085
2618 "Let me explain that again: If one in a million people is a terrorist, then "
2619 "there will only be about one terrorist in a random sample of one million "
2620 "people. If your test for detecting terrorists is 99% accurate, it will "
2621 "identify 10,000 terrorists in your million-person sample (1% of one million "
2622 "is 10,000). For every true positive, you’ll get 9,999 false positives."
2625 #. type: Content of: <book><chapter><sect1><para>
2626 #: complete-book.xml:2093
2628 "In reality, the accuracy of algorithmic terrorism detection falls far short "
2629 "of the 99% mark, as does refrigerator ad targeting. The difference is that "
2630 "being falsely accused of wanting to buy a fridge is a minor nuisance while "
2631 "being falsely accused of planning a terror attack can destroy your life and "
2632 "the lives of everyone you love."
2635 #. type: Content of: <book><chapter><sect1><para>
2636 #: complete-book.xml:2100
2638 "Mass state surveillance is only feasible because of surveillance capitalism "
2639 "and its extremely low-yield ad-targeting systems, which require a constant "
2640 "feed of personal data to remain barely viable. Surveillance capitalism’s "
2641 "primary failure mode is mistargeted ads while mass state surveillance’s "
2642 "primary failure mode is grotesque human rights abuses, tending toward "
2646 #. type: Content of: <book><chapter><sect1><para>
2647 #: complete-book.xml:2108
2649 "State surveillance is no mere parasite on Big Tech, sucking up its data and "
2650 "giving nothing in return. In truth, the two are symbiotes: Big Tech sucks up "
2651 "our data for spy agencies, and spy agencies ensure that governments don’t "
2652 "limit Big Tech’s activities so severely that it would no longer serve the "
2653 "spy agencies’ needs. There is no firm distinction between state surveillance "
2654 "and surveillance capitalism; they are dependent on one another."
2657 #. type: Content of: <book><chapter><sect1><para>
2658 #: complete-book.xml:2117
2660 "To see this at work today, look no further than Amazon’s home surveillance "
2661 "device, the Ring doorbell, and its associated app, Neighbors. Ring — a "
2662 "product that Amazon acquired and did not develop in house — makes a "
2663 "camera-enabled doorbell that streams footage from your front door to your "
2664 "mobile device. The Neighbors app allows you to form a neighborhood-wide "
2665 "surveillance grid with your fellow Ring owners through which you can share "
2666 "clips of <quote>suspicious characters.</quote> If you’re thinking that this "
2667 "sounds like a recipe for letting curtain-twitching racists supercharge their "
2668 "suspicions of people with brown skin who walk down their blocks, <ulink "
2669 "url=\"https://www.eff.org/deeplinks/2020/07/amazons-ring-enables-over-policing-efforts-some-americas-deadliest-law-enforcement\">you’re "
2670 "right</ulink>. Ring has become a <emphasis>de facto,</emphasis> "
2671 "off-the-books arm of the police without any of the pesky oversight or rules."
2674 #. type: Content of: <book><chapter><sect1><para>
2675 #: complete-book.xml:2133
2677 "In mid-2019, a series of public records requests revealed that Amazon had "
2678 "struck confidential deals with more than 400 local law enforcement agencies "
2679 "through which the agencies would promote Ring and Neighbors and in exchange "
2680 "get access to footage from Ring cameras. In theory, cops would need to "
2681 "request this footage through Amazon (and internal documents reveal that "
2682 "Amazon devotes substantial resources to coaching cops on how to spin a "
2683 "convincing story when doing so), but in practice, when a Ring customer turns "
2684 "down a police request, Amazon only requires the agency to formally request "
2685 "the footage from the company, which it will then produce."
2688 #. type: Content of: <book><chapter><sect1><para>
2689 #: complete-book.xml:2145
2691 "Ring and law enforcement have found many ways to intertwine their "
2692 "activities. Ring strikes secret deals to acquire real-time access to 911 "
2693 "dispatch and then streams alarming crime reports to Neighbors users, which "
2694 "serve as convincers for anyone who’s contemplating a surveillance doorbell "
2695 "but isn’t sure whether their neighborhood is dangerous enough to warrant it."
2698 #. type: Content of: <book><chapter><sect1><para>
2699 #: complete-book.xml:2153
2701 "The more the cops buzz-market the surveillance capitalist Ring, the more "
2702 "surveillance capability the state gets. Cops who rely on private entities "
2703 "for law-enforcement roles then brief against any controls on the deployment "
2704 "of that technology while the companies return the favor by lobbying against "
2705 "rules requiring public oversight of police surveillance technology. The more "
2706 "the cops rely on Ring and Neighbors, the harder it will be to pass laws to "
2707 "curb them. The fewer laws there are against them, the more the cops will "
2711 #. type: Content of: <book><chapter><sect1><title>
2712 #: complete-book.xml:2164
2713 msgid "Dignity and sanctuary"
2716 #. type: Content of: <book><chapter><sect1><para>
2717 #: complete-book.xml:2166
2719 "But even if we could exercise democratic control over our states and force "
2720 "them to stop raiding surveillance capitalism’s reservoirs of behavioral "
2721 "data, surveillance capitalism would still harm us."
2724 #. type: Content of: <book><chapter><sect1><para>
2725 #: complete-book.xml:2171
2727 "This is an area where Zuboff shines. Her chapter on <quote>sanctuary</quote> "
2728 "— the feeling of being unobserved — is a beautiful hymn to introspection, "
2729 "calmness, mindfulness, and tranquility."
2732 #. type: Content of: <book><chapter><sect1><para>
2733 #: complete-book.xml:2176
2735 "When you are watched, something changes. Anyone who has ever raised a child "
2736 "knows this. You might look up from your book (or more realistically, from "
2737 "your phone) and catch your child in a moment of profound realization and "
2738 "growth, a moment where they are learning something that is right at the edge "
2739 "of their abilities, requiring their entire ferocious concentration. For a "
2740 "moment, you’re transfixed, watching that rare and beautiful moment of focus "
2741 "playing out before your eyes, and then your child looks up and sees you "
2742 "seeing them, and the moment collapses. To grow, you need to be and expose "
2743 "your authentic self, and in that moment, you are vulnerable like a hermit "
2744 "crab scuttling from one shell to the next. The tender, unprotected tissues "
2745 "you expose in that moment are too delicate to reveal in the presence of "
2746 "another, even someone you trust as implicitly as a child trusts their "
2750 #. type: Content of: <book><chapter><sect1><para>
2751 #: complete-book.xml:2192
2753 "In the digital age, our authentic selves are inextricably tied to our "
2754 "digital lives. Your search history is a running ledger of the questions "
2755 "you’ve pondered. Your location history is a record of the places you’ve "
2756 "sought out and the experiences you’ve had there. Your social graph reveals "
2757 "the different facets of your identity, the people you’ve connected with."
2760 #. type: Content of: <book><chapter><sect1><para>
2761 #: complete-book.xml:2200
2763 "To be observed in these activities is to lose the sanctuary of your "
2767 #. type: Content of: <book><chapter><sect1><para>
2768 #: complete-book.xml:2204
2770 "There’s another way in which surveillance capitalism robs us of our capacity "
2771 "to be our authentic selves: by making us anxious. Surveillance capitalism "
2772 "isn’t really a mind-control ray, but you don’t need a mind-control ray to "
2773 "make someone anxious. After all, another word for anxiety is agitation, and "
2774 "to make someone experience agitation, you need merely to agitate them. To "
2775 "poke them and prod them and beep at them and buzz at them and bombard them "
2776 "on an intermittent schedule that is just random enough that our limbic "
2777 "systems never quite become inured to it."
2780 #. type: Content of: <book><chapter><sect1><para>
2781 #: complete-book.xml:2215
2783 "Our devices and services are <quote>general purpose</quote> in that they can "
2784 "connect anything or anyone to anything or anyone else and that they can run "
2785 "any program that can be written. This means that the distraction rectangles "
2786 "in our pockets hold our most precious moments with our most beloved people "
2787 "and their most urgent or time-sensitive communications (from <quote>running "
2788 "late can you get the kid?</quote> to <quote>doctor gave me bad news and I "
2789 "need to talk to you RIGHT NOW</quote>) as well as ads for refrigerators and "
2790 "recruiting messages from Nazis."
2793 #. type: Content of: <book><chapter><sect1><para>
2794 #: complete-book.xml:2225
2796 "All day and all night, our pockets buzz, shattering our concentration and "
2797 "tearing apart the fragile webs of connection we spin as we think through "
2798 "difficult ideas. If you locked someone in a cell and agitated them like "
2799 "this, we’d call it <quote>sleep deprivation torture,</quote> and it would be "
2800 "<ulink url=\"https://www.youtube.com/watch?v=1SKpRbvnx6g\">a war crime under "
2801 "the Geneva Conventions</ulink>."
2804 #. type: Content of: <book><chapter><sect1><title>
2805 #: complete-book.xml:2234
2806 msgid "Afflicting the afflicted"
2809 #. type: Content of: <book><chapter><sect1><para>
2810 #: complete-book.xml:2236
2812 "The effects of surveillance on our ability to be our authentic selves are "
2813 "not equal for all people. Some of us are lucky enough to live in a time and "
2814 "place in which all the most important facts of our lives are widely and "
2815 "roundly socially acceptable and can be publicly displayed without the risk "
2816 "of social consequence."
2819 #. type: Content of: <book><chapter><sect1><para>
2820 #: complete-book.xml:2243
2822 "But for many of us, this is not true. Recall that in living memory, many of "
2823 "the ways of being that we think of as socially acceptable today were once "
2824 "cause for dire social sanction or even imprisonment. If you are 65 years "
2825 "old, you have lived through a time in which people living in <quote>free "
2826 "societies</quote> could be imprisoned or sanctioned for engaging in "
2827 "homosexual activity, for falling in love with a person whose skin was a "
2828 "different color than their own, or for smoking weed."
2831 #. type: Content of: <book><chapter><sect1><para>
2832 #: complete-book.xml:2253
2834 "Today, these activities aren’t just decriminalized in much of the world, "
2835 "they’re considered normal, and the fallen prohibitions are viewed as "
2836 "shameful, regrettable relics of the past."
2839 #. type: Content of: <book><chapter><sect1><para>
2840 #: complete-book.xml:2258
2842 "How did we get from prohibition to normalization? Through private, personal "
2843 "activity: People who were secretly gay or secret pot-smokers or who secretly "
2844 "loved someone with a different skin color were vulnerable to retaliation if "
2845 "they made their true selves known and were limited in how much they could "
2846 "advocate for their own right to exist in the world and be true to "
2847 "themselves. But because there was a private sphere, these people could form "
2848 "alliances with their friends and loved ones who did not share their "
2849 "disfavored traits by having private conversations in which they came out, "
2850 "disclosing their true selves to the people around them and bringing them to "
2851 "their cause one conversation at a time."
2854 #. type: Content of: <book><chapter><sect1><para>
2855 #: complete-book.xml:2271
2857 "The right to choose the time and manner of these conversations was key to "
2858 "their success. It’s one thing to come out to your dad while you’re on a "
2859 "fishing trip away from the world and another thing entirely to blurt it out "
2860 "over the Christmas dinner table while your racist Facebook uncle is there to "
2864 #. type: Content of: <book><chapter><sect1><para>
2865 #: complete-book.xml:2278
2867 "Without a private sphere, there’s a chance that none of these changes would "
2868 "have come to pass and that the people who benefited from these changes would "
2869 "have either faced social sanction for coming out to a hostile world or would "
2870 "have never been able to reveal their true selves to the people they love."
2873 #. type: Content of: <book><chapter><sect1><para>
2874 #: complete-book.xml:2285
2876 "The corollary is that, unless you think that our society has attained social "
2877 "perfection — that your grandchildren in 50 years will ask you to tell them "
2878 "the story of how, in 2020, every injustice had been righted and no further "
2879 "change had to be made — then you should expect that right now, at this "
2880 "minute, there are people you love, whose happiness is key to your own, who "
2881 "have a secret in their hearts that stops them from ever being their "
2882 "authentic selves with you. These people are sorrowing and will go to their "
2883 "graves with that secret sorrow in their hearts, and the source of that "
2884 "sorrow will be the falsity of their relationship to you."
2887 #. type: Content of: <book><chapter><sect1><para>
2888 #: complete-book.xml:2297
2889 msgid "A private realm is necessary for human progress."
2892 #. type: Content of: <book><chapter><sect1><title>
2893 #: complete-book.xml:2300
2894 msgid "Any data you collect and retain will eventually leak"
2897 #. type: Content of: <book><chapter><sect1><para>
2898 #: complete-book.xml:2302
2900 "The lack of a private life can rob vulnerable people of the chance to be "
2901 "their authentic selves and constrain our actions by depriving us of "
2902 "sanctuary, but there is another risk that is borne by everyone, not just "
2903 "people with a secret: crime."
2906 #. type: Content of: <book><chapter><sect1><para>
2907 #: complete-book.xml:2308
2909 "Personally identifying information is of very limited use for the purpose of "
2910 "controlling peoples’ minds, but identity theft — really a catchall term for "
2911 "a whole constellation of terrible criminal activities that can destroy your "
2912 "finances, compromise your personal integrity, ruin your reputation, or even "
2913 "expose you to physical danger — thrives on it."
2916 #. type: Content of: <book><chapter><sect1><para>
2917 #: complete-book.xml:2316
2919 "Attackers are not limited to using data from one breached source, "
2920 "either. Multiple services have suffered breaches that exposed names, "
2921 "addresses, phone numbers, passwords, sexual tastes, school grades, work "
2922 "performance, brushes with the criminal justice system, family details, "
2923 "genetic information, fingerprints and other biometrics, reading habits, "
2924 "search histories, literary tastes, pseudonymous identities, and other "
2925 "sensitive information. Attackers can merge data from these different "
2926 "breaches to build up extremely detailed dossiers on random subjects and then "
2927 "use different parts of the data for different criminal purposes."
2930 #. type: Content of: <book><chapter><sect1><para>
2931 #: complete-book.xml:2328
2933 "For example, attackers can use leaked username and password combinations to "
2934 "hijack whole fleets of commercial vehicles that <ulink "
2935 "url=\"https://www.vice.com/en_us/article/zmpx4x/hacker-monitor-cars-kill-engine-gps-tracking-apps\">have "
2936 "been fitted with anti-theft GPS trackers and immobilizers</ulink> or to "
2937 "hijack baby monitors in order to <ulink "
2938 "url=\"https://www.washingtonpost.com/technology/2019/04/23/how-nest-designed-keep-intruders-out-peoples-homes-effectively-allowed-hackers-get/?utm_term=.15220e98c550\">terrorize "
2939 "toddlers with the audio tracks from pornography</ulink>. Attackers use "
2940 "leaked data to trick phone companies into giving them your phone number, "
2941 "then they intercept SMS-based two-factor authentication codes in order to "
2942 "take over your email, bank account, and/or cryptocurrency wallets."
2945 #. type: Content of: <book><chapter><sect1><para>
2946 #: complete-book.xml:2341
2948 "Attackers are endlessly inventive in the pursuit of creative ways to "
2949 "weaponize leaked data. One common use of leaked data is to penetrate "
2950 "companies in order to access <emphasis>more</emphasis> data."
2953 #. type: Content of: <book><chapter><sect1><para>
2954 #: complete-book.xml:2346
2956 "Like spies, online fraudsters are totally dependent on companies "
2957 "over-collecting and over-retaining our data. Spy agencies sometimes pay "
2958 "companies for access to their data or intimidate them into giving it up, but "
2959 "sometimes they work just like criminals do — by <ulink "
2960 "url=\"https://www.bbc.com/news/world-us-canada-24751821\">sneaking data out "
2961 "of companies’ databases</ulink>."
2964 #. type: Content of: <book><chapter><sect1><para>
2965 #: complete-book.xml:2354
2967 "The over-collection of data has a host of terrible social consequences, from "
2968 "the erosion of our authentic selves to the undermining of social progress, "
2969 "from state surveillance to an epidemic of online crime. Commercial "
2970 "surveillance is also a boon to people running influence campaigns, but "
2971 "that’s the least of our troubles."
2974 #. type: Content of: <book><chapter><sect1><title>
2975 #: complete-book.xml:2362
2976 msgid "Critical tech exceptionalism is still tech exceptionalism"
2979 #. type: Content of: <book><chapter><sect1><para>
2980 #: complete-book.xml:2365
2982 "Big Tech has long practiced technology exceptionalism: the idea that it "
2983 "should not be subject to the mundane laws and norms of "
2984 "<quote>meatspace.</quote> Mottoes like Facebook’s <quote>move fast and break "
2985 "things</quote> attracted justifiable scorn of the companies’ self-serving "
2989 #. type: Content of: <book><chapter><sect1><para>
2990 #: complete-book.xml:2371
2992 "Tech exceptionalism got us all into a lot of trouble, so it’s ironic and "
2993 "distressing to see Big Tech’s critics committing the same sin."
2996 #. type: Content of: <book><chapter><sect1><para>
2997 #: complete-book.xml:2375
2999 "Big Tech is not a <quote>rogue capitalism</quote> that cannot be cured "
3000 "through the traditional anti-monopoly remedies of trustbusting (forcing "
3001 "companies to divest of competitors they have acquired) and bans on mergers "
3002 "to monopoly and other anti-competitive tactics. Big Tech does not have the "
3003 "power to use machine learning to influence our behavior so thoroughly that "
3004 "markets lose the ability to punish bad actors and reward superior "
3005 "competitors. Big Tech has no rule-writing mind-control ray that necessitates "
3006 "ditching our old toolbox."
3009 #. type: Content of: <book><chapter><sect1><para>
3010 #: complete-book.xml:2385
3012 "The thing is, people have been claiming to have perfected mind-control rays "
3013 "for centuries, and every time, it turned out to be a con — though sometimes "
3014 "the con artists were also conning themselves."
3017 #. type: Content of: <book><chapter><sect1><para>
3018 #: complete-book.xml:2391
3020 "For generations, the advertising industry has been steadily improving its "
3021 "ability to sell advertising services to businesses while only making "
3022 "marginal gains in selling those businesses’ products to prospective "
3023 "customers. John Wanamaker’s lament that <quote>50% of my advertising budget "
3024 "is wasted, I just don’t know which 50%</quote> is a testament to the triumph "
3025 "of <emphasis>ad executives</emphasis>, who successfully convinced Wanamaker "
3026 "that only half of the money he spent went to waste."
3029 #. type: Content of: <book><chapter><sect1><para>
3030 #: complete-book.xml:2401
3032 "The tech industry has made enormous improvements in the science of "
3033 "convincing businesses that they’re good at advertising while their actual "
3034 "improvements to advertising — as opposed to targeting — have been pretty "
3035 "ho-hum. The vogue for machine learning — and the mystical invocation of "
3036 "<quote>artificial intelligence</quote> as a synonym for straightforward "
3037 "statistical inference techniques — has greatly boosted the efficacy of Big "
3038 "Tech’s sales pitch as marketers have exploited potential customers’ lack of "
3039 "technical sophistication to get away with breathtaking acts of overpromising "
3040 "and underdelivering."
3043 #. type: Content of: <book><chapter><sect1><para>
3044 #: complete-book.xml:2413
3046 "It’s tempting to think that if businesses are willing to pour billions into "
3047 "a venture that the venture must be a good one. Yet there are plenty of times "
3048 "when this rule of thumb has led us astray. For example, it’s virtually "
3049 "unheard of for managed investment funds to outperform simple index funds, "
3050 "and investors who put their money into the hands of expert money managers "
3051 "overwhelmingly fare worse than those who entrust their savings to index "
3052 "funds. But managed funds still account for the majority of the money "
3053 "invested in the markets, and they are patronized by some of the richest, "
3054 "most sophisticated investors in the world. Their vote of confidence in an "
3055 "underperforming sector is a parable about the role of luck in wealth "
3056 "accumulation, not a sign that managed funds are a good buy."
3059 #. type: Content of: <book><chapter><sect1><para>
3060 #: complete-book.xml:2427
3062 "The claims of Big Tech’s mind-control system are full of tells that the "
3063 "enterprise is a con. For example, <ulink "
3064 "url=\"https://www.frontiersin.org/articles/10.3389/fpsyg.2020.01415/full\">the "
3065 "reliance on the <quote>Big Five</quote> personality traits</ulink> as a "
3066 "primary means of influencing people even though the <quote>Big Five</quote> "
3067 "theory is unsupported by any large-scale, peer-reviewed studies and is "
3069 "url=\"https://www.wired.com/story/the-noisy-fallacies-of-psychographic-targeting/\">mostly "
3070 "the realm of marketing hucksters and pop psych</ulink>."
3073 #. type: Content of: <book><chapter><sect1><para>
3074 #: complete-book.xml:2437
3076 "Big Tech’s promotional materials also claim that their algorithms can "
3077 "accurately perform <quote>sentiment analysis</quote> or detect peoples’ "
3078 "moods based on their <quote>microexpressions,</quote> but <ulink "
3079 "url=\"https://www.npr.org/2018/09/12/647040758/advertising-on-facebook-is-it-worth-it\">these "
3080 "are marketing claims, not scientific ones</ulink>. These methods are largely "
3081 "untested by independent scientific experts, and where they have been tested, "
3082 "they’ve been found sorely wanting. Microexpressions are particularly "
3083 "suspect as the companies that specialize in training people to detect them "
3085 "url=\"https://theintercept.com/2017/02/08/tsas-own-files-show-doubtful-science-behind-its-behavior-screening-program/\">have "
3086 "been shown</ulink> to underperform relative to random chance."
3089 #. type: Content of: <book><chapter><sect1><para>
3090 #: complete-book.xml:2450
3092 "Big Tech has been so good at marketing its own supposed superpowers that "
3093 "it’s easy to believe that they can market everything else with similar "
3094 "acumen, but it’s a mistake to believe the hype. Any statement a company "
3095 "makes about the quality of its products is clearly not impartial. The fact "
3096 "that we distrust all the things that Big Tech says about its data handling, "
3097 "compliance with privacy laws, etc., is only reasonable — but why on Earth "
3098 "would we treat Big Tech’s marketing literature as the gospel truth? Big Tech "
3099 "lies about just about <emphasis>everything</emphasis>, including how well "
3100 "its machine-learning fueled persuasion systems work."
3103 #. type: Content of: <book><chapter><sect1><para>
3104 #: complete-book.xml:2462
3106 "That skepticism should infuse all of our evaluations of Big Tech and its "
3107 "supposed abilities, including our perusal of its patents. Zuboff vests these "
3108 "patents with enormous significance, pointing out that Google claimed "
3109 "extensive new persuasion capabilities in <ulink "
3110 "url=\"https://patents.google.com/patent/US20050131762A1/en\">its patent "
3111 "filings</ulink>. These claims are doubly suspect: first, because they are so "
3112 "self-serving, and second, because the patent itself is so notoriously an "
3113 "invitation to exaggeration."
3116 #. type: Content of: <book><chapter><sect1><para>
3117 #: complete-book.xml:2472
3119 "Patent applications take the form of a series of claims and range from broad "
3120 "to narrow. A typical patent starts out by claiming that its authors have "
3121 "invented a method or system for doing every conceivable thing that anyone "
3122 "might do, ever, with any tool or device. Then it narrows that claim in "
3123 "successive stages until we get to the actual <quote>invention</quote> that "
3124 "is the true subject of the patent. The hope is that the patent examiner — "
3125 "who is almost certainly overworked and underinformed — will miss the fact "
3126 "that some or all of these claims are ridiculous, or at least suspect, and "
3127 "grant the patent’s broader claims. Patents for unpatentable things are still "
3128 "incredibly useful because they can be wielded against competitors who might "
3129 "license that patent or steer clear of its claims rather than endure the "
3130 "lengthy, expensive process of contesting it."
3133 #. type: Content of: <book><chapter><sect1><para>
3134 #: complete-book.xml:2487
3136 "What’s more, software patents are routinely granted even though the filer "
3137 "doesn’t have any evidence that they can do the thing claimed by the "
3138 "patent. That is, you can patent an <quote>invention</quote> that you haven’t "
3139 "actually made and that you don’t know how to make."
3142 #. type: Content of: <book><chapter><sect1><para>
3143 #: complete-book.xml:2493
3145 "With these considerations in hand, it becomes obvious that the fact that a "
3146 "Big Tech company has patented what it <emphasis>says</emphasis> is an "
3147 "effective mind-control ray is largely irrelevant to whether Big Tech can in "
3148 "fact control our minds."
3151 #. type: Content of: <book><chapter><sect1><para>
3152 #: complete-book.xml:2500
3154 "Big Tech collects our data for many reasons, including the diminishing "
3155 "returns on existing stores of data. But many tech companies also collect "
3156 "data out of a mistaken tech exceptionalist belief in the network effects of "
3157 "data. Network effects occur when each new user in a system increases its "
3158 "value. The classic example is fax machines: A single fax machine is of no "
3159 "use, two fax machines are of limited use, but every new fax machine that’s "
3160 "put to use after the first doubles the number of possible fax-to-fax links."
3163 #. type: Content of: <book><chapter><sect1><para>
3164 #: complete-book.xml:2510
3166 "Data mined for predictive systems doesn’t necessarily produce these "
3167 "dividends. Think of Netflix: The predictive value of the data mined from a "
3168 "million English-speaking Netflix viewers is hardly improved by the addition "
3169 "of one more user’s viewing data. Most of the data Netflix acquires after "
3170 "that first minimum viable sample duplicates existing data and produces only "
3171 "minimal gains. Meanwhile, retraining models with new data gets progressively "
3172 "more expensive as the number of data points increases, and manual tasks like "
3173 "labeling and validating data do not get cheaper at scale."
3176 #. type: Content of: <book><chapter><sect1><para>
3177 #: complete-book.xml:2521
3179 "Businesses pursue fads to the detriment of their profits all the time, "
3180 "especially when the businesses and their investors are not motivated by the "
3181 "prospect of becoming profitable but rather by the prospect of being acquired "
3182 "by a Big Tech giant or by having an IPO. For these firms, ticking faddish "
3183 "boxes like <quote>collects as much data as possible</quote> might realize a "
3184 "bigger return on investment than <quote>collects a business-appropriate "
3185 "quantity of data.</quote>"
3188 #. type: Content of: <book><chapter><sect1><para>
3189 #: complete-book.xml:2530
3191 "This is another harm of tech exceptionalism: The belief that more data "
3192 "always produces more profits in the form of more insights that can be "
3193 "translated into better mind-control rays drives firms to over-collect and "
3194 "over-retain data beyond all rationality. And since the firms are behaving "
3195 "irrationally, a good number of them will go out of business and become ghost "
3196 "ships whose cargo holds are stuffed full of data that can harm people in "
3197 "myriad ways — but which no one is responsible for antey longer. Even if the "
3198 "companies don’t go under, the data they collect is maintained behind the "
3199 "minimum viable security — just enough security to keep the company viable "
3200 "while it waits to get bought out by a tech giant, an amount calculated to "
3201 "spend not one penny more than is necessary on protecting data."
3204 #. type: Content of: <book><chapter><sect1><title>
3205 #: complete-book.xml:2544
3207 "How monopolies, not mind control, drive surveillance capitalism: The "
3211 #. type: Content of: <book><chapter><sect1><para>
3212 #: complete-book.xml:2547
3214 "For the first decade of its existence, Facebook competed with the social "
3215 "media giants of the day (Myspace, Orkut, etc.) by presenting itself as the "
3216 "pro-privacy alternative. Indeed, Facebook justified its walled garden — "
3217 "which let users bring in data from the web but blocked web services like "
3218 "Google Search from indexing and caching Facebook pages — as a pro-privacy "
3219 "measure that protected users from the surveillance-happy winners of the "
3220 "social media wars like Myspace."
3223 #. type: Content of: <book><chapter><sect1><para>
3224 #: complete-book.xml:2557
3226 "Despite frequent promises that it would never collect or analyze its users’ "
3227 "data, Facebook periodically created initiatives that did just that, like the "
3228 "creepy, ham-fisted Beacon tool, which spied on you as you moved around the "
3229 "web and then added your online activities to your public timeline, allowing "
3230 "your friends to monitor your browsing habits. Beacon sparked a user "
3231 "revolt. Every time, Facebook backed off from its surveillance initiative, "
3232 "but not all the way; inevitably, the new Facebook would be more surveilling "
3233 "than the old Facebook, though not quite as surveilling as the intermediate "
3234 "Facebook following the launch of the new product or service."
3237 #. type: Content of: <book><chapter><sect1><para>
3238 #: complete-book.xml:2569
3240 "The pace at which Facebook ramped up its surveillance efforts seems to have "
3241 "been set by Facebook’s competitive landscape. The more competitors Facebook "
3242 "had, the better it behaved. Every time a major competitor foundered, "
3243 "Facebook’s behavior <ulink "
3244 "url=\"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3247362\">got "
3245 "markedly worse</ulink>."
3248 #. type: Content of: <book><chapter><sect1><para>
3249 #: complete-book.xml:2577
3251 "All the while, Facebook was prodigiously acquiring companies, including a "
3252 "company called Onavo. Nominally, Onavo made a battery-monitoring mobile "
3253 "app. But the permissions that Onavo required were so expansive that the app "
3254 "was able to gather fine-grained telemetry on everything users did with their "
3255 "phones, including which apps they used and how they were using them."
3258 #. type: Content of: <book><chapter><sect1><para>
3259 #: complete-book.xml:2585
3261 "Through Onavo, Facebook discovered that it was losing market share to "
3262 "Snapchat, an app that — like Facebook a decade before — billed itself as the "
3263 "pro-privacy alternative to the status quo. Through Onavo, Facebook was able "
3264 "to mine data from the devices of Snapchat users, including both current and "
3265 "former Snapchat users. This spurred Facebook to acquire Instagram — some "
3266 "features of which competed with Snapchat — and then allowed Facebook to "
3267 "fine-tune Instagram’s features and sales pitch to erode Snapchat’s gains and "
3268 "ensure that Facebook would not have to face the kinds of competitive "
3269 "pressures it had earlier inflicted on Myspace and Orkut."
3272 #. type: Content of: <book><chapter><sect1><para>
3273 #: complete-book.xml:2597
3275 "The story of how Facebook crushed Snapchat reveals the relationship between "
3276 "monopoly and surveillance capitalism. Facebook combined surveillance with "
3277 "lax antitrust enforcement to spot the competitive threat of Snapchat on its "
3278 "horizon and then take decisive action against it. Facebook’s surveillance "
3279 "capitalism let it avert competitive pressure with anti-competitive "
3280 "tactics. Facebook users still want privacy — Facebook hasn’t used "
3281 "surveillance to brainwash them out of it — but they can’t get it because "
3282 "Facebook’s surveillance lets it destroy any hope of a rival service emerging "
3283 "that competes on privacy features."
3286 #. type: Content of: <book><chapter><sect1><title>
3287 #: complete-book.xml:2609
3288 msgid "A monopoly over your friends"
3291 #. type: Content of: <book><chapter><sect1><para>
3292 #: complete-book.xml:2611
3294 "A decentralization movement has tried to erode the dominance of Facebook and "
3295 "other Big Tech companies by fielding <quote>indieweb</quote> alternatives — "
3296 "Mastodon as a Twitter alternative, Diaspora as a Facebook alternative, "
3297 "etc. — but these efforts have failed to attain any kind of liftoff."
3300 #. type: Content of: <book><chapter><sect1><para>
3301 #: complete-book.xml:2618
3303 "Fundamentally, each of these services is hamstrung by the same problem: "
3304 "Every potential user for a Facebook or Twitter alternative has to convince "
3305 "all their friends to follow them to a decentralized web alternative in order "
3306 "to continue to realize the benefit of social media. For many of us, the only "
3307 "reason to have a Facebook account is that our friends have Facebook "
3308 "accounts, and the reason they have Facebook accounts is that "
3309 "<emphasis>we</emphasis> have Facebook accounts."
3312 #. type: Content of: <book><chapter><sect1><para>
3313 #: complete-book.xml:2628
3315 "All of this has conspired to make Facebook — and other dominant platforms — "
3316 "into <quote>kill zones</quote> that investors will not fund new entrants "
3320 #. type: Content of: <book><chapter><sect1><para>
3321 #: complete-book.xml:2633
3323 "And yet, all of today’s tech giants came into existence despite the "
3324 "entrenched advantage of the companies that came before them. To understand "
3325 "how that happened, you have to understand both interoperability and "
3326 "adversarial interoperability."
3329 #. type: Content of: <book><chapter><sect1><blockquote><para>
3330 #: complete-book.xml:2640
3331 msgid "The hard problem of our species is coordination."
3334 #. type: Content of: <book><chapter><sect1><para>
3335 #: complete-book.xml:2644
3337 "<quote>Interoperability</quote> is the ability of two technologies to work "
3338 "with one another: Anyone can make an LP that will play on any record player, "
3339 "anyone can make a filter you can install in your stove’s extractor fan, "
3340 "anyone can make gasoline for your car, anyone can make a USB phone charger "
3341 "that fits in your car’s cigarette lighter receptacle, anyone can make a "
3342 "light bulb that works in your light socket, anyone can make bread that will "
3343 "toast in your toaster."
3346 #. type: Content of: <book><chapter><sect1><para>
3347 #: complete-book.xml:2653
3349 "Interoperability is often a source of innovation and consumer benefit: Apple "
3350 "made the first commercially successful PC, but millions of independent "
3351 "software vendors made interoperable programs that ran on the Apple II "
3352 "Plus. The simple analog antenna inputs on the back of TVs first allowed "
3353 "cable operators to connect directly to TVs, then they allowed game console "
3354 "companies and then personal computer companies to use standard televisions "
3355 "as displays. Standard RJ-11 telephone jacks allowed for the production of "
3356 "phones from a variety of vendors in a variety of forms, from the free "
3357 "football-shaped phone that came with a <emphasis>Sports "
3358 "Illustrated</emphasis> subscription to business phones with speakers, hold "
3359 "functions, and so on and then answering machines and finally modems, paving "
3360 "the way for the internet revolution."
3363 #. type: Content of: <book><chapter><sect1><para>
3364 #: complete-book.xml:2668
3366 "<quote>Interoperability</quote> is often used interchangeably with "
3367 "<quote>standardization,</quote> which is the process when manufacturers and "
3368 "other stakeholders hammer out a set of agreed-upon rules for implementing a "
3369 "technology, such as the electrical plug on your wall, the CAN bus used by "
3370 "your car’s computer systems, or the HTML instructions that your browser "
3374 #. type: Content of: <book><chapter><sect1><para>
3375 #: complete-book.xml:2676
3377 "But interoperability doesn’t require standardization — indeed, "
3378 "standardization often proceeds from the chaos of ad hoc interoperability "
3379 "measures. The inventor of the cigarette-lighter USB charger didn’t need to "
3380 "get permission from car manufacturers or even the manufacturers of the "
3381 "dashboard lighter subcomponent. The automakers didn’t take any "
3382 "countermeasures to prevent the use of these aftermarket accessories by their "
3383 "customers, but they also didn’t do anything to make life easier for the "
3384 "chargers’ manufacturers. This is a kind of <quote>neutral "
3385 "interoperability.</quote>"
3388 #. type: Content of: <book><chapter><sect1><para>
3389 #: complete-book.xml:2687
3391 "Beyond neutral interoperability, there is <quote>adversarial "
3392 "interoperability.</quote> That’s when a manufacturer makes a product that "
3393 "interoperates with another manufacturer’s product <emphasis>despite the "
3394 "second manufacturer’s objections</emphasis> and <emphasis>even if that means "
3395 "bypassing a security system designed to prevent interoperability</emphasis>."
3398 #. type: Content of: <book><chapter><sect1><para>
3399 #: complete-book.xml:2695
3401 "Probably the most familiar form of adversarial interoperability is "
3402 "third-party printer ink. Printer manufacturers claim that they sell printers "
3403 "below cost and that the only way they can recoup the losses they incur is by "
3404 "charging high markups on ink. To prevent the owners of printers from buying "
3405 "ink elsewhere, the printer companies deploy a suite of anti-customer "
3406 "security systems that detect and reject both refilled and third-party "
3410 #. type: Content of: <book><chapter><sect1><para>
3411 #: complete-book.xml:2704
3413 "Owners of printers take the position that HP and Epson and Brother are not "
3414 "charities and that customers for their wares have no obligation to help them "
3415 "survive, and so if the companies choose to sell their products at a loss, "
3416 "that’s their foolish choice and their consequences to live with. Likewise, "
3417 "competitors who make ink or refill kits observe that they don’t owe printer "
3418 "companies anything, and their erosion of printer companies’ margins are the "
3419 "printer companies’ problems, not their competitors’. After all, the printer "
3420 "companies shed no tears when they drive a refiller out of business, so why "
3421 "should the refillers concern themselves with the economic fortunes of the "
3422 "printer companies?"
3425 #. type: Content of: <book><chapter><sect1><para>
3426 #: complete-book.xml:2717
3428 "Adversarial interoperability has played an outsized role in the history of "
3429 "the tech industry: from the founding of the <quote>alt.*</quote> Usenet "
3430 "hierarchy (which was started against the wishes of Usenet’s maintainers and "
3431 "which grew to be bigger than all of Usenet combined) to the browser wars "
3432 "(when Netscape and Microsoft devoted massive engineering efforts to making "
3433 "their browsers incompatible with the other’s special commands and "
3434 "peccadilloes) to Facebook (whose success was built in part by helping its "
3435 "new users stay in touch with friends they’d left behind on Myspace because "
3436 "Facebook supplied them with a tool that scraped waiting messages from "
3437 "Myspace and imported them into Facebook, effectively creating an "
3438 "Facebook-based Myspace reader)."
3441 #. type: Content of: <book><chapter><sect1><para>
3442 #: complete-book.xml:2731
3444 "Today, incumbency is seen as an unassailable advantage. Facebook is where "
3445 "all of your friends are, so no one can start a Facebook competitor. But "
3446 "adversarial compatibility reverses the competitive advantage: If you were "
3447 "allowed to compete with Facebook by providing a tool that imported all your "
3448 "users’ waiting Facebook messages into an environment that competed on lines "
3449 "that Facebook couldn’t cross, like eliminating surveillance and ads, then "
3450 "Facebook would be at a huge disadvantage. It would have assembled all "
3451 "possible ex-Facebook users into a single, easy-to-find service; it would "
3452 "have educated them on how a Facebook-like service worked and what its "
3453 "potential benefits were; and it would have provided an easy means for "
3454 "disgruntled Facebook users to tell their friends where they might expect "
3458 #. type: Content of: <book><chapter><sect1><para>
3459 #: complete-book.xml:2746
3461 "Adversarial interoperability was once the norm and a key contributor to the "
3462 "dynamic, vibrant tech scene, but now it is stuck behind a thicket of laws "
3463 "and regulations that add legal risks to the tried-and-true tactics of "
3464 "adversarial interoperability. New rules and new interpretations of existing "
3465 "rules mean that a would-be adversarial interoperator needs to steer clear of "
3466 "claims under copyright, terms of service, trade secrecy, tortious "
3467 "interference, and patent."
3470 #. type: Content of: <book><chapter><sect1><para>
3471 #: complete-book.xml:2756
3473 "In the absence of a competitive market, lawmakers have resorted to assigning "
3474 "expensive, state-like duties to Big Tech firms, such as automatically "
3475 "filtering user contributions for copyright infringement or terrorist and "
3476 "extremist content or detecting and preventing harassment in real time or "
3477 "controlling access to sexual material."
3480 #. type: Content of: <book><chapter><sect1><para>
3481 #: complete-book.xml:2764
3483 "These measures put a floor under how small we can make Big Tech because only "
3484 "the very largest companies can afford the humans and automated filters "
3485 "needed to perform these duties."
3488 #. type: Content of: <book><chapter><sect1><para>
3489 #: complete-book.xml:2769
3491 "But that’s not the only way in which making platforms responsible for "
3492 "policing their users undermines competition. A platform that is expected to "
3493 "police its users’ conduct must prevent many vital adversarial "
3494 "interoperability techniques lest these subvert its policing measures. For "
3495 "example, if someone using a Twitter replacement like Mastodon is able to "
3496 "push messages into Twitter and read messages out of Twitter, they could "
3497 "avoid being caught by automated systems that detect and prevent harassment "
3498 "(such as systems that use the timing of messages or IP-based rules to make "
3499 "guesses about whether someone is a harasser)."
3502 #. type: Content of: <book><chapter><sect1><para>
3503 #: complete-book.xml:2781
3505 "To the extent that we are willing to let Big Tech police itself — rather "
3506 "than making Big Tech small enough that users can leave bad platforms for "
3507 "better ones and small enough that a regulation that simply puts a platform "
3508 "out of business will not destroy billions of users’ access to their "
3509 "communities and data — we build the case that Big Tech should be able to "
3510 "block its competitors and make it easier for Big Tech to demand legal "
3511 "enforcement tools to ban and punish attempts at adversarial "
3515 #. type: Content of: <book><chapter><sect1><para>
3516 #: complete-book.xml:2791
3518 "Ultimately, we can try to fix Big Tech by making it responsible for bad acts "
3519 "by its users, or we can try to fix the internet by cutting Big Tech down to "
3520 "size. But we can’t do both. To replace today’s giant products with "
3521 "pluralistic protocols, we need to clear the legal thicket that prevents "
3522 "adversarial interoperability so that tomorrow’s nimble, personal, "
3523 "small-scale products can federate themselves with giants like Facebook, "
3524 "allowing the users who’ve left to continue to communicate with users who "
3525 "haven’t left yet, reaching tendrils over Facebook’s garden wall that "
3526 "Facebook’s trapped users can use to scale the walls and escape to the "
3530 #. type: Content of: <book><chapter><sect1><title>
3531 #: complete-book.xml:2803
3532 msgid "Fake news is an epistemological crisis"
3535 #. type: Content of: <book><chapter><sect1><para>
3536 #: complete-book.xml:2805
3538 "Tech is not the only industry that has undergone massive concentration since "
3539 "the Reagan era. Virtually every major industry — from oil to newspapers to "
3540 "meatpacking to sea freight to eyewear to online pornography — has become a "
3541 "clubby oligarchy that just a few players dominate."
3544 #. type: Content of: <book><chapter><sect1><para>
3545 #: complete-book.xml:2812
3547 "At the same time, every industry has become something of a tech industry as "
3548 "general-purpose computers and general-purpose networks and the promise of "
3549 "efficiencies through data-driven analysis infuse every device, process, and "
3553 #. type: Content of: <book><chapter><sect1><para>
3554 #: complete-book.xml:2818
3556 "This phenomenon of industrial concentration is part of a wider story about "
3557 "wealth concentration overall as a smaller and smaller number of people own "
3558 "more and more of our world. This concentration of both wealth and industries "
3559 "means that our political outcomes are increasingly beholden to the parochial "
3560 "interests of the people and companies with all the money."
3563 #. type: Content of: <book><chapter><sect1><para>
3564 #: complete-book.xml:2826
3566 "That means that whenever a regulator asks a question with an obvious, "
3567 "empirical answer (<quote>Are humans causing climate change?</quote> or "
3568 "<quote>Should we let companies conduct commercial mass surveillance?</quote> "
3569 "or <quote>Does society benefit from allowing network neutrality "
3570 "violations?</quote>), the answer that comes out is only correct if that "
3571 "correctness meets with the approval of rich people and the industries that "
3572 "made them so wealthy."
3575 #. type: Content of: <book><chapter><sect1><para>
3576 #: complete-book.xml:2835
3578 "Rich people have always played an outsized role in politics and more so "
3579 "since the Supreme Court’s <emphasis>Citizens United</emphasis> decision "
3580 "eliminated key controls over political spending. Widening inequality and "
3581 "wealth concentration means that the very richest people are now a lot richer "
3582 "and can afford to spend a lot more money on political projects than ever "
3583 "before. Think of the Koch brothers or George Soros or Bill Gates."
3586 #. type: Content of: <book><chapter><sect1><para>
3587 #: complete-book.xml:2844
3589 "But the policy distortions of rich individuals pale in comparison to the "
3590 "policy distortions that concentrated industries are capable of. The "
3591 "companies in highly concentrated industries are much more profitable than "
3592 "companies in competitive industries — no competition means not having to "
3593 "reduce prices or improve quality to win customers — leaving them with bigger "
3594 "capital surpluses to spend on lobbying."
3597 #. type: Content of: <book><chapter><sect1><para>
3598 #: complete-book.xml:2853
3600 "Concentrated industries also find it easier to collaborate on policy "
3601 "objectives than competitive ones. When all the top execs from your industry "
3602 "can fit around a single boardroom table, they often do. And "
3603 "<emphasis>when</emphasis> they do, they can forge a consensus position on "
3607 #. type: Content of: <book><chapter><sect1><para>
3608 #: complete-book.xml:2860
3610 "Rising through the ranks in a concentrated industry generally means working "
3611 "at two or three of the big companies. When there are only relatively few "
3612 "companies in a given industry, each company has a more ossified executive "
3613 "rank, leaving ambitious execs with fewer paths to higher positions unless "
3614 "they are recruited to a rival. This means that the top execs in concentrated "
3615 "industries are likely to have been colleagues at some point and socialize in "
3616 "the same circles — connected through social ties or, say, serving as "
3617 "trustees for each others’ estates. These tight social bonds foster a "
3618 "collegial, rather than competitive, attitude."
3621 #. type: Content of: <book><chapter><sect1><para>
3622 #: complete-book.xml:2872
3624 "Highly concentrated industries also present a regulatory conundrum. When an "
3625 "industry is dominated by just four or five companies, the only people who "
3626 "are likely to truly understand the industry’s practices are its veteran "
3627 "executives. This means that top regulators are often former execs of the "
3628 "companies they are supposed to be regulating. These turns in government are "
3629 "often tacitly understood to be leaves of absence from industry, with former "
3630 "employers welcoming their erstwhile watchdogs back into their executive "
3631 "ranks once their terms have expired."
3634 #. type: Content of: <book><chapter><sect1><para>
3635 #: complete-book.xml:2883
3637 "All this is to say that the tight social bonds, small number of firms, and "
3638 "regulatory capture of concentrated industries give the companies that "
3639 "comprise them the power to dictate many, if not all, of the regulations that "
3643 #. type: Content of: <book><chapter><sect1><para>
3644 #: complete-book.xml:2889
3646 "This is increasingly obvious. Whether it’s payday lenders <ulink "
3647 "url=\"https://www.washingtonpost.com/business/2019/02/25/how-payday-lending-industry-insider-tilted-academic-research-its-favor/\">winning "
3648 "the right to practice predatory lending</ulink> or Apple <ulink "
3649 "url=\"https://www.vice.com/en_us/article/mgxayp/source-apple-will-fight-right-to-repair-legislation\">winning "
3650 "the right to decide who can fix your phone</ulink> or Google and Facebook "
3651 "winning the right to breach your private data without suffering meaningful "
3652 "consequences or victories for pipeline companies or impunity for opioid "
3653 "manufacturers or massive tax subsidies for incredibly profitable dominant "
3654 "businesses, it’s increasingly apparent that many of our official, "
3655 "evidence-based truth-seeking processes are, in fact, auctions for sale to "
3656 "the highest bidder."
3659 #. type: Content of: <book><chapter><sect1><para>
3660 #: complete-book.xml:2903
3662 "It’s really impossible to overstate what a terrifying prospect this is. We "
3663 "live in an incredibly high-tech society, and none of us could acquire the "
3664 "expertise to evaluate every technological proposition that stands between us "
3665 "and our untimely, horrible deaths. You might devote your life to acquiring "
3666 "the media literacy to distinguish good scientific journals from corrupt "
3667 "pay-for-play lookalikes and the statistical literacy to evaluate the quality "
3668 "of the analysis in the journals as well as the microbiology and epidemiology "
3669 "knowledge to determine whether you can trust claims about the safety of "
3670 "vaccines — but that would still leave you unqualified to judge whether the "
3671 "wiring in your home will give you a lethal shock <emphasis>and</emphasis> "
3672 "whether your car’s brakes’ software will cause them to fail unpredictably "
3673 "<emphasis>and</emphasis> whether the hygiene standards at your butcher are "
3674 "sufficient to keep you from dying after you finish your dinner."
3677 #. type: Content of: <book><chapter><sect1><para>
3678 #: complete-book.xml:2920
3680 "In a world as complex as this one, we have to defer to authorities, and we "
3681 "keep them honest by making those authorities accountable to us and binding "
3682 "them with rules to prevent conflicts of interest. We can’t possibly acquire "
3683 "the expertise to adjudicate conflicting claims about the best way to make "
3684 "the world safe and prosperous, but we <emphasis>can</emphasis> determine "
3685 "whether the adjudication process itself is trustworthy."
3688 #. type: Content of: <book><chapter><sect1><para>
3689 #: complete-book.xml:2929
3690 msgid "Right now, it’s obviously not."
3693 #. type: Content of: <book><chapter><sect1><para>
3694 #: complete-book.xml:2932
3696 "The past 40 years of rising inequality and industry concentration, together "
3697 "with increasingly weak accountability and transparency for expert agencies, "
3698 "has created an increasingly urgent sense of impending doom, the sense that "
3699 "there are vast conspiracies afoot that operate with tacit official approval "
3700 "despite the likelihood they are working to better themselves by ruining the "
3704 #. type: Content of: <book><chapter><sect1><para>
3705 #: complete-book.xml:2940
3707 "For example, it’s been decades since Exxon’s own scientists concluded that "
3708 "its products would render the Earth uninhabitable by humans. And yet those "
3709 "decades were lost to us, in large part because Exxon lobbied governments and "
3710 "sowed doubt about the dangers of its products and did so with the "
3711 "cooperation of many public officials. When the survival of you and everyone "
3712 "you love is threatened by conspiracies, it’s not unreasonable to start "
3713 "questioning the things you think you know in an attempt to determine whether "
3714 "they, too, are the outcome of another conspiracy."
3717 #. type: Content of: <book><chapter><sect1><para>
3718 #: complete-book.xml:2951
3720 "The collapse of the credibility of our systems for divining and upholding "
3721 "truths has left us in a state of epistemological chaos. Once, most of us "
3722 "might have assumed that the system was working and that our regulations "
3723 "reflected our best understanding of the empirical truths of the world as "
3724 "they were best understood — now we have to find our own experts to help us "
3725 "sort the true from the false."
3728 #. type: Content of: <book><chapter><sect1><para>
3729 #: complete-book.xml:2960
3731 "If you’re like me, you probably believe that vaccines are safe, but you "
3732 "(like me) probably also can’t explain the microbiology or statistics. Few of "
3733 "us have the math skills to review the literature on vaccine safety and "
3734 "describe why their statistical reasoning is sound. Likewise, few of us can "
3735 "review the stats in the (now discredited) literature on opioid safety and "
3736 "explain how those stats were manipulated. Both vaccines and opioids were "
3737 "embraced by medical authorities, after all, and one is safe while the other "
3738 "could ruin your life. You’re left with a kind of inchoate constellation of "
3739 "rules of thumb about which experts you trust to fact-check controversial "
3740 "claims and then to explain how all those respectable doctors with their "
3741 "peer-reviewed research on opioid safety <emphasis>were</emphasis> an "
3742 "aberration and then how you know that the doctors writing about vaccine "
3743 "safety are <emphasis>not</emphasis> an aberration."
3746 #. type: Content of: <book><chapter><sect1><para>
3747 #: complete-book.xml:2977
3749 "I’m 100% certain that vaccinating is safe and effective, but I’m also at "
3750 "something of a loss to explain exactly, <emphasis>precisely,</emphasis> why "
3751 "I believe this, given all the corruption I know about and the many times the "
3752 "stamp of certainty has turned out to be a parochial lie told to further "
3753 "enrich the super rich."
3756 #. type: Content of: <book><chapter><sect1><para>
3757 #: complete-book.xml:2985
3759 "Fake news — conspiracy theories, racist ideologies, scientific denialism — "
3760 "has always been with us. What’s changed today is not the mix of ideas in the "
3761 "public discourse but the popularity of the worst ideas in that "
3762 "mix. Conspiracy and denial have skyrocketed in lockstep with the growth of "
3763 "Big Inequality, which has also tracked the rise of Big Tech and Big Pharma "
3764 "and Big Wrestling and Big Car and Big Movie Theater and Big Everything Else."
3767 #. type: Content of: <book><chapter><sect1><para>
3768 #: complete-book.xml:2994
3770 "No one can say for certain why this has happened, but the two dominant camps "
3771 "are idealism (the belief that the people who argue for these conspiracies "
3772 "have gotten better at explaining them, maybe with the help of "
3773 "machine-learning tools) or materialism (the ideas have become more "
3774 "attractive because of material conditions in the world)."
3777 #. type: Content of: <book><chapter><sect1><para>
3778 #: complete-book.xml:3002
3780 "I’m a materialist. I’ve been exposed to the arguments of conspiracy "
3781 "theorists all my life, and I have not experienced any qualitative leap in "
3782 "the quality of those arguments."
3785 #. type: Content of: <book><chapter><sect1><para>
3786 #: complete-book.xml:3007
3788 "The major difference is in the world, not the arguments. In a time where "
3789 "actual conspiracies are commonplace, conspiracy theories acquire a ring of "
3793 #. type: Content of: <book><chapter><sect1><para>
3794 #: complete-book.xml:3012
3796 "We have always had disagreements about what’s true, but today, we have a "
3797 "disagreement over how we know whether something is true. This is an "
3798 "epistemological crisis, not a crisis over belief. It’s a crisis over the "
3799 "credibility of our truth-seeking exercises, from scientific journals (in an "
3800 "era where the biggest journal publishers have been caught producing "
3801 "pay-to-play journals for junk science) to regulations (in an era where "
3802 "regulators are routinely cycling in and out of business) to education (in an "
3803 "era where universities are dependent on corporate donations to keep their "
3807 #. type: Content of: <book><chapter><sect1><para>
3808 #: complete-book.xml:3023
3810 "Targeting — surveillance capitalism — makes it easier to find people who are "
3811 "undergoing this epistemological crisis, but it doesn’t create the "
3812 "crisis. For that, you need to look to corruption."
3815 #. type: Content of: <book><chapter><sect1><para>
3816 #: complete-book.xml:3028
3818 "And, conveniently enough, it’s corruption that allows surveillance "
3819 "capitalism to grow by dismantling monopoly protections, by permitting "
3820 "reckless collection and retention of personal data, by allowing ads to be "
3821 "targeted in secret, and by foreclosing on the possibility of going somewhere "
3822 "else where you might continue to enjoy your friends without subjecting "
3823 "yourself to commercial surveillance."
3826 #. type: Content of: <book><chapter><sect1><title>
3827 #: complete-book.xml:3037
3828 msgid "Tech is different"
3831 #. type: Content of: <book><chapter><sect1><para>
3832 #: complete-book.xml:3039
3834 "I reject both iterations of technological exceptionalism. I reject the idea "
3835 "that tech is uniquely terrible and led by people who are greedier or worse "
3836 "than the leaders of other industries, and I reject the idea that tech is so "
3837 "good — or so intrinsically prone to concentration — that it can’t be blamed "
3838 "for its present-day monopolistic status."
3841 #. type: Content of: <book><chapter><sect1><para>
3842 #: complete-book.xml:3047
3844 "I think tech is just another industry, albeit one that grew up in the "
3845 "absence of real monopoly constraints. It may have been first, but it isn’t "
3846 "the worst nor will it be the last."
3849 #. type: Content of: <book><chapter><sect1><para>
3850 #: complete-book.xml:3052
3852 "But there’s one way in which I <emphasis>am</emphasis> a tech "
3853 "exceptionalist. I believe that online tools are the key to overcoming "
3854 "problems that are much more urgent than tech monopolization: climate change, "
3855 "inequality, misogyny, and discrimination on the basis of race, gender "
3856 "identity, and other factors. The internet is how we will recruit people to "
3857 "fight those fights, and how we will coordinate their labor. Tech is not a "
3858 "substitute for democratic accountability, the rule of law, fairness, or "
3859 "stability — but it’s a means to achieve these things."
3862 #. type: Content of: <book><chapter><sect1><para>
3863 #: complete-book.xml:3063
3865 "The hard problem of our species is coordination. Everything from climate "
3866 "change to social change to running a business to making a family work can be "
3867 "viewed as a collective action problem."
3870 #. type: Content of: <book><chapter><sect1><para>
3871 #: complete-book.xml:3068
3873 "The internet makes it easier than at any time before to find people who want "
3874 "to work on a project with you — hence the success of free and open-source "
3875 "software, crowdfunding, and racist terror groups — and easier than ever to "
3876 "coordinate the work you do."
3879 #. type: Content of: <book><chapter><sect1><para>
3880 #: complete-book.xml:3074
3882 "The internet and the computers we connect to it also possess an exceptional "
3883 "quality: general-purposeness. The internet is designed to allow any two "
3884 "parties to communicate any data, using any protocol, without permission from "
3885 "anyone else. The only production design we have for computers is the "
3886 "general-purpose, <quote>Turing complete</quote> computer that can run every "
3887 "program we can express in symbolic logic."
3890 #. type: Content of: <book><chapter><sect1><para>
3891 #: complete-book.xml:3083
3893 "This means that every time someone with a special communications need "
3894 "invests in infrastructure and techniques to make the internet faster, "
3895 "cheaper, and more robust, this benefit redounds to everyone else who is "
3896 "using the internet to communicate. And this also means that every time "
3897 "someone with a special computing need invests to make computers faster, "
3898 "cheaper, and more robust, every other computing application is a potential "
3899 "beneficiary of this work."
3902 #. type: Content of: <book><chapter><sect1><para>
3903 #: complete-book.xml:3092
3905 "For these reasons, every type of communication is gradually absorbed into "
3906 "the internet, and every type of device — from airplanes to pacemakers — "
3907 "eventually becomes a computer in a fancy case."
3910 #. type: Content of: <book><chapter><sect1><para>
3911 #: complete-book.xml:3097
3913 "While these considerations don’t preclude regulating networks and computers, "
3914 "they do call for gravitas and caution when doing so because changes to "
3915 "regulatory frameworks could ripple out to have unintended consequences in "
3916 "many, many other domains."
3919 #. type: Content of: <book><chapter><sect1><para>
3920 #: complete-book.xml:3103
3922 "The upshot of this is that our best hope of solving the big coordination "
3923 "problems — climate change, inequality, etc. — is with free, fair, and open "
3924 "tech. Our best hope of keeping tech free, fair, and open is to exercise "
3925 "caution in how we regulate tech and to attend closely to the ways in which "
3926 "interventions to solve one problem might create problems in other domains."
3929 #. type: Content of: <book><chapter><sect1><title>
3930 #: complete-book.xml:3111
3931 msgid "Ownership of facts"
3934 #. type: Content of: <book><chapter><sect1><para>
3935 #: complete-book.xml:3113
3937 "Big Tech has a funny relationship with information. When you’re generating "
3938 "information — anything from the location data streaming off your mobile "
3939 "device to the private messages you send to friends on a social network — it "
3940 "claims the rights to make unlimited use of that data."
3943 #. type: Content of: <book><chapter><sect1><para>
3944 #: complete-book.xml:3120
3946 "But when you have the audacity to turn the tables — to use a tool that "
3947 "blocks ads or slurps your waiting updates out of a social network and puts "
3948 "them in another app that lets you set your own priorities and suggestions or "
3949 "crawls their system to allow you to start a rival business — they claim that "
3950 "you’re stealing from them."
3953 #. type: Content of: <book><chapter><sect1><para>
3954 #: complete-book.xml:3127
3956 "The thing is, information is a very bad fit for any kind of private property "
3957 "regime. Property rights are useful for establishing markets that can lead to "
3958 "the effective development of fallow assets. These markets depend on clear "
3959 "titles to ensure that the things being bought and sold in them can, in fact, "
3960 "be bought and sold."
3963 #. type: Content of: <book><chapter><sect1><para>
3964 #: complete-book.xml:3134
3966 "Information rarely has such a clear title. Take phone numbers: There’s "
3967 "clearly something going wrong when Facebook slurps up millions of users’ "
3968 "address books and uses the phone numbers it finds in them to plot out social "
3969 "graphs and fill in missing information about other users."
3972 #. type: Content of: <book><chapter><sect1><para>
3973 #: complete-book.xml:3141
3975 "But the phone numbers Facebook nonconsensually acquires in this transaction "
3976 "are not the <quote>property</quote> of the users they’re taken from nor do "
3977 "they belong to the people whose phones ring when you dial those numbers. The "
3978 "numbers are mere integers, 10 digits in the U.S. and Canada, and they "
3979 "appear in millions of places, including somewhere deep in pi as well as "
3980 "numerous other contexts. Giving people ownership titles to integers is an "
3981 "obviously terrible idea."
3984 #. type: Content of: <book><chapter><sect1><para>
3985 #: complete-book.xml:3150
3987 "Likewise for the facts that Facebook and other commercial surveillance "
3988 "operators acquire about us, like that we are the children of our parents or "
3989 "the parents to our children or that we had a conversation with someone else "
3990 "or went to a public place. These data points can’t be property in the sense "
3991 "that your house or your shirt is your property because the title to them is "
3992 "intrinsically muddy: Does your mom own the fact that she is your mother? Do "
3993 "you? Do both of you? What about your dad — does he own this fact too, or "
3994 "does he have to license the fact from you (or your mom or both of you) in "
3995 "order to use this fact? What about the hundreds or thousands of other people "
3996 "who know these facts?"
3999 #. type: Content of: <book><chapter><sect1><para>
4000 #: complete-book.xml:3163
4002 "If you go to a Black Lives Matter demonstration, do the other demonstrators "
4003 "need your permission to post their photos from the event? The online fights "
4005 "url=\"https://www.wired.com/story/how-to-take-photos-at-protests/\">when and "
4006 "how to post photos from demonstrations</ulink> reveal a nuanced, complex "
4007 "issue that cannot be easily hand-waved away by giving one party a property "
4008 "right that everyone else in the mix has to respect."
4011 #. type: Content of: <book><chapter><sect1><para>
4012 #: complete-book.xml:3172
4014 "The fact that information isn’t a good fit with property and markets doesn’t "
4015 "mean that it’s not valuable. Babies aren’t property, but they’re inarguably "
4016 "valuable. In fact, we have a whole set of rules just for babies as well as a "
4017 "subset of those rules that apply to humans more generally. Someone who "
4018 "argues that babies won’t be truly valuable until they can be bought and sold "
4019 "like loaves of bread would be instantly and rightfully condemned as a "
4023 #. type: Content of: <book><chapter><sect1><para>
4024 #: complete-book.xml:3181
4026 "It’s tempting to reach for the property hammer when Big Tech treats your "
4027 "information like a nail — not least because Big Tech are such prolific "
4028 "abusers of property hammers when it comes to <emphasis>their</emphasis> "
4029 "information. But this is a mistake. If we allow markets to dictate the use "
4030 "of our information, then we’ll find that we’re sellers in a buyers’ market "
4031 "where the Big Tech monopolies set a price for our data that is so low as to "
4032 "be insignificant or, more likely, set at a nonnegotiable price of zero in a "
4033 "click-through agreement that you don’t have the opportunity to modify."
4036 #. type: Content of: <book><chapter><sect1><para>
4037 #: complete-book.xml:3192
4039 "Meanwhile, establishing property rights over information will create "
4040 "insurmountable barriers to independent data processing. Imagine that we "
4041 "require a license to be negotiated when a translated document is compared "
4042 "with its original, something Google has done and continues to do billions of "
4043 "times to train its automated language translation tools. Google can afford "
4044 "this, but independent third parties cannot. Google can staff a clearances "
4045 "department to negotiate one-time payments to the likes of the EU (one of the "
4046 "major repositories of translated documents) while independent watchdogs "
4047 "wanting to verify that the translations are well-prepared, or to root out "
4048 "bias in translations, will find themselves needing a staffed-up legal "
4049 "department and millions for licenses before they can even get started."
4052 #. type: Content of: <book><chapter><sect1><para>
4053 #: complete-book.xml:3207
4055 "The same goes for things like search indexes of the web or photos of "
4056 "peoples’ houses, which have become contentious thanks to Google’s Street "
4057 "View project. Whatever problems may exist with Google’s photographing of "
4058 "street scenes, resolving them by letting people decide who can take pictures "
4059 "of the facades of their homes from a public street will surely create even "
4060 "worse ones. Think of how street photography is important for newsgathering — "
4061 "including informal newsgathering, like photographing abuses of authority — "
4062 "and how being able to document housing and street life are important for "
4063 "contesting eminent domain, advocating for social aid, reporting planning and "
4064 "zoning violations, documenting discriminatory and unequal living conditions, "
4068 #. type: Content of: <book><chapter><sect1><para>
4069 #: complete-book.xml:3221
4071 "The ownership of facts is antithetical to many kinds of human progress. It’s "
4072 "hard to imagine a rule that limits Big Tech’s exploitation of our collective "
4073 "labors without inadvertently banning people from gathering data on online "
4074 "harassment or compiling indexes of changes in language or simply "
4075 "investigating how the platforms are shaping our discourse — all of which "
4076 "require scraping data that other people have created and subjecting it to "
4077 "scrutiny and analysis."
4080 #. type: Content of: <book><chapter><sect1><title>
4081 #: complete-book.xml:3231
4082 msgid "Persuasion works… slowly"
4085 #. type: Content of: <book><chapter><sect1><para>
4086 #: complete-book.xml:3233
4088 "The platforms may oversell their ability to persuade people, but obviously, "
4089 "persuasion works sometimes. Whether it’s the private realm that LGBTQ people "
4090 "used to recruit allies and normalize sexual diversity or the decadeslong "
4091 "project to convince people that markets are the only efficient way to solve "
4092 "complicated resource allocation problems, it’s clear that our societal "
4093 "attitudes <emphasis>can</emphasis> change."
4096 #. type: Content of: <book><chapter><sect1><para>
4097 #: complete-book.xml:3242
4099 "The project of shifting societal attitudes is a game of inches and "
4100 "years. For centuries, svengalis have purported to be able to accelerate this "
4101 "process, but even the most brutal forms of propaganda have struggled to make "
4102 "permanent changes. Joseph Goebbels was able to subject Germans to daily, "
4103 "mandatory, hourslong radio broadcasts, to round up and torture and murder "
4104 "dissidents, and to seize full control over their children’s education while "
4105 "banning any literature, broadcasts, or films that did not comport with his "
4109 #. type: Content of: <book><chapter><sect1><para>
4110 #: complete-book.xml:3253
4112 "Yet, after 12 years of terror, once the war ended, Nazi ideology was largely "
4113 "discredited in both East and West Germany, and a program of national truth "
4114 "and reconciliation was put in its place. Racism and authoritarianism were "
4115 "never fully abolished in Germany, but neither were the majority of Germans "
4116 "irrevocably convinced of Nazism — and the rise of racist authoritarianism in "
4117 "Germany today tells us that the liberal attitudes that replaced Nazism were "
4118 "no more permanent than Nazism itself."
4121 #. type: Content of: <book><chapter><sect1><para>
4122 #: complete-book.xml:3263
4124 "Racism and authoritarianism have also always been with us. Anyone who’s "
4125 "reviewed the kind of messages and arguments that racists put forward today "
4126 "would be hard-pressed to say that they have gotten better at presenting "
4127 "their ideas. The same pseudoscience, appeals to fear, and circular logic "
4128 "that racists presented in the 1980s, when the cause of white supremacy was "
4129 "on the wane, are to be found in the communications of leading white "
4130 "nationalists today."
4133 #. type: Content of: <book><chapter><sect1><para>
4134 #: complete-book.xml:3272
4136 "If racists haven’t gotten more convincing in the past decade, then how is it "
4137 "that more people were convinced to be openly racist at that time? I believe "
4138 "that the answer lies in the material world, not the world of ideas. The "
4139 "ideas haven’t gotten more convincing, but people have become more "
4140 "afraid. Afraid that the state can’t be trusted to act as an honest broker in "
4141 "life-or-death decisions, from those regarding the management of the economy "
4142 "to the regulation of painkillers to the rules for handling private "
4143 "information. Afraid that the world has become a game of musical chairs in "
4144 "which the chairs are being taken away at a never-before-seen rate. Afraid "
4145 "that justice for others will come at their expense. Monopolism isn’t the "
4146 "cause of these fears, but the inequality and material desperation and policy "
4147 "malpractice that monopolism contributes to is a significant contributor to "
4148 "these conditions. Inequality creates the conditions for both conspiracies "
4149 "and violent racist ideologies, and then surveillance capitalism lets "
4150 "opportunists target the fearful and the conspiracy-minded."
4153 #. type: Content of: <book><chapter><sect1><title>
4154 #: complete-book.xml:3291
4155 msgid "Paying won’t help"
4158 #. type: Content of: <book><chapter><sect1><para>
4159 #: complete-book.xml:3293
4161 "As the old saw goes, <quote>If you’re not paying for the product, you’re the "
4165 #. type: Content of: <book><chapter><sect1><para>
4166 #: complete-book.xml:3297
4168 "It’s a commonplace belief today that the advent of free, ad-supported media "
4169 "was the original sin of surveillance capitalism. The reasoning is that the "
4170 "companies that charged for access couldn’t <quote>compete with free</quote> "
4171 "and so they were driven out of business. Their ad-supported competitors, "
4172 "meanwhile, declared open season on their users’ data in a bid to improve "
4173 "their ad targeting and make more money and then resorted to the most "
4174 "sensationalist tactics to generate clicks on those ads. If only we’d pay for "
4175 "media again, we’d have a better, more responsible, more sober discourse that "
4176 "would be better for democracy."
4179 #. type: Content of: <book><chapter><sect1><para>
4180 #: complete-book.xml:3309
4182 "But the degradation of news products long precedes the advent of "
4183 "ad-supported online news. Long before newspapers were online, lax antitrust "
4184 "enforcement had opened the door for unprecedented waves of consolidation and "
4185 "roll-ups in newsrooms. Rival newspapers were merged, reporters and ad sales "
4186 "staff were laid off, physical plants were sold and leased back, leaving the "
4187 "companies loaded up with debt through leveraged buyouts and subsequent "
4188 "profit-taking by the new owners. In other words, it wasn’t merely shifts in "
4189 "the classified advertising market, which was long held to be the primary "
4190 "driver in the decline of the traditional newsroom, that made news companies "
4191 "unable to adapt to the internet — it was monopolism."
4194 #. type: Content of: <book><chapter><sect1><para>
4195 #: complete-book.xml:3322
4197 "Then, as news companies <emphasis>did</emphasis> come online, the ad "
4198 "revenues they commanded dropped even as the number of internet users (and "
4199 "thus potential online readers) increased. That shift was a function of "
4200 "consolidation in the ad sales market, with Google and Facebook emerging as "
4201 "duopolists who made more money every year from advertising while paying less "
4202 "and less of it to the publishers whose work the ads appeared "
4203 "alongside. Monopolism created a buyer’s market for ad inventory with "
4204 "Facebook and Google acting as gatekeepers."
4207 #. type: Content of: <book><chapter><sect1><para>
4208 #: complete-book.xml:3332
4210 "Paid services continue to exist alongside free ones, and often it is these "
4211 "paid services — anxious to prevent people from bypassing their paywalls or "
4212 "sharing paid media with freeloaders — that exert the most control over their "
4213 "customers. Apple’s iTunes and App Stores are paid services, but to maximize "
4214 "their profitability, Apple has to lock its platforms so that third parties "
4215 "can’t make compatible software without permission. These locks allow the "
4216 "company to exercise both editorial control (enabling it to exclude <ulink "
4217 "url=\"https://ncac.org/news/blog/does-apples-strict-app-store-content-policy-limit-freedom-of-expression\">controversial "
4218 "political material</ulink>) and technological control, including control "
4219 "over who can repair the devices it makes. If we’re worried that ad-supported "
4220 "products deprive people of their right to self-determination by using "
4221 "persuasion techniques to nudge their purchase decisions a few degrees in one "
4222 "direction or the other, then the near-total control a single company holds "
4223 "over the decision of who gets to sell you software, parts, and service for "
4224 "your iPhone should have us very worried indeed."
4227 #. type: Content of: <book><chapter><sect1><para>
4228 #: complete-book.xml:3351
4230 "We shouldn’t just be concerned about payment and control: The idea that "
4231 "paying will improve discourse is also dangerously wrong. The poor success "
4232 "rate of targeted advertising means that the platforms have to incentivize "
4233 "you to <quote>engage</quote> with posts at extremely high levels to generate "
4234 "enough pageviews to safeguard their profits. As discussed earlier, to "
4235 "increase engagement, platforms like Facebook use machine learning to guess "
4236 "which messages will be most inflammatory and make a point of shoving those "
4237 "into your eyeballs at every turn so that you will hate-click and argue with "
4241 #. type: Content of: <book><chapter><sect1><para>
4242 #: complete-book.xml:3362
4244 "Perhaps paying would fix this, the reasoning goes. If platforms could be "
4245 "economically viable even if you stopped clicking on them once your "
4246 "intellectual and social curiosity had been slaked, then they would have no "
4247 "reason to algorithmically enrage you to get more clicks out of you, right?"
4250 #. type: Content of: <book><chapter><sect1><para>
4251 #: complete-book.xml:3369
4253 "There may be something to that argument, but it still ignores the wider "
4254 "economic and political context of the platforms and the world that allowed "
4255 "them to grow so dominant."
4258 #. type: Content of: <book><chapter><sect1><para>
4259 #: complete-book.xml:3374
4261 "Platforms are world-spanning and all-encompassing because they are "
4262 "monopolies, and they are monopolies because we have gutted our most "
4263 "important and reliable anti-monopoly rules. Antitrust was neutered as a key "
4264 "part of the project to make the wealthy wealthier, and that project has "
4265 "worked. The vast majority of people on Earth have a negative net worth, and "
4266 "even the dwindling middle class is in a precarious state, undersaved for "
4267 "retirement, underinsured for medical disasters, and undersecured against "
4268 "climate and technology shocks."
4271 #. type: Content of: <book><chapter><sect1><para>
4272 #: complete-book.xml:3385
4274 "In this wildly unequal world, paying doesn’t improve the discourse; it "
4275 "simply prices discourse out of the range of the majority of people. Paying "
4276 "for the product is dandy, if you can afford it."
4279 #. type: Content of: <book><chapter><sect1><para>
4280 #: complete-book.xml:3390
4282 "If you think today’s filter bubbles are a problem for our discourse, imagine "
4283 "what they’d be like if rich people inhabited free-flowing Athenian "
4284 "marketplaces of ideas where you have to pay for admission while everyone "
4285 "else lives in online spaces that are subsidized by wealthy benefactors who "
4286 "relish the chance to establish conversational spaces where the <quote>house "
4287 "rules</quote> forbid questioning the status quo. That is, imagine if the "
4288 "rich seceded from Facebook, and then, instead of running ads that made money "
4289 "for shareholders, Facebook became a billionaire’s vanity project that also "
4290 "happened to ensure that nobody talked about whether it was fair that only "
4291 "billionaires could afford to hang out in the rarified corners of the "
4295 #. type: Content of: <book><chapter><sect1><para>
4296 #: complete-book.xml:3404
4298 "Behind the idea of paying for access is a belief that free markets will "
4299 "address Big Tech’s dysfunction. After all, to the extent that people have a "
4300 "view of surveillance at all, it is generally an unfavorable one, and the "
4301 "longer and more thoroughly one is surveilled, the less one tends to like "
4302 "it. Same goes for lock-in: If HP’s ink or Apple’s App Store were really "
4303 "obviously fantastic, they wouldn’t need technical measures to prevent users "
4304 "from choosing a rival’s product. The only reason these technical "
4305 "countermeasures exist is that the companies don’t believe their customers "
4306 "would <emphasis>voluntarily</emphasis> submit to their terms, and they want "
4307 "to deprive them of the choice to take their business elsewhere."
4310 #. type: Content of: <book><chapter><sect1><para>
4311 #: complete-book.xml:3417
4313 "Advocates for markets laud their ability to aggregate the diffused knowledge "
4314 "of buyers and sellers across a whole society through demand signals, price "
4315 "signals, and so on. The argument for surveillance capitalism being a "
4316 "<quote>rogue capitalism</quote> is that machine-learning-driven persuasion "
4317 "techniques distort decision-making by consumers, leading to incorrect "
4318 "signals — consumers don’t buy what they prefer, they buy what they’re "
4319 "tricked into preferring. It follows that the monopolistic practices of "
4320 "lock-in, which do far more to constrain consumers’ free choices, are even "
4321 "more of a <quote>rogue capitalism.</quote>"
4324 #. type: Content of: <book><chapter><sect1><para>
4325 #: complete-book.xml:3429
4327 "The profitability of any business is constrained by the possibility that its "
4328 "customers will take their business elsewhere. Both surveillance and lock-in "
4329 "are anti-features that no customer wants. But monopolies can capture their "
4330 "regulators, crush their competitors, insert themselves into their customers’ "
4331 "lives, and corral people into <quote>choosing</quote> their services "
4332 "regardless of whether they want them — it’s fine to be terrible when there "
4333 "is no alternative."
4336 #. type: Content of: <book><chapter><sect1><para>
4337 #: complete-book.xml:3439
4339 "Ultimately, surveillance and lock-in are both simply business strategies "
4340 "that monopolists can choose. Surveillance companies like Google are "
4341 "perfectly capable of deploying lock-in technologies — just look at the "
4342 "onerous Android licensing terms that require device-makers to bundle in "
4343 "Google’s suite of applications. And lock-in companies like Apple are "
4344 "perfectly capable of subjecting their users to surveillance if it means "
4345 "keeping the Chinese government happy and preserving ongoing access to "
4346 "Chinese markets. Monopolies may be made up of good, ethical people, but as "
4347 "institutions, they are not your friend — they will do whatever they can get "
4348 "away with to maximize their profits, and the more monopolistic they are, the "
4349 "more they <emphasis>can</emphasis> get away with."
4352 #. type: Content of: <book><chapter><sect1><title>
4353 #: complete-book.xml:3454
4354 msgid "An <quote>ecology</quote> moment for trustbusting"
4357 #. type: Content of: <book><chapter><sect1><para>
4358 #: complete-book.xml:3456
4360 "If we’re going to break Big Tech’s death grip on our digital lives, we’re "
4361 "going to have to fight monopolies. That may sound pretty mundane and "
4362 "old-fashioned, something out of the New Deal era, while ending the use of "
4363 "automated behavioral modification feels like the plotline of a really cool "
4367 #. type: Content of: <book><chapter><sect1><para>
4368 #: complete-book.xml:3463
4370 "Meanwhile, breaking up monopolies is something we seem to have forgotten how "
4371 "to do. There is a bipartisan, trans-Atlantic consensus that breaking up "
4372 "companies is a fool’s errand at best — liable to mire your federal "
4373 "prosecutors in decades of litigation — and counterproductive at worst, "
4374 "eroding the <quote>consumer benefits</quote> of large companies with massive "
4375 "efficiencies of scale."
4378 #. type: Content of: <book><chapter><sect1><para>
4379 #: complete-book.xml:3471
4381 "But trustbusters once strode the nation, brandishing law books, terrorizing "
4382 "robber barons, and shattering the illusion of monopolies’ all-powerful grip "
4383 "on our society. The trustbusting era could not begin until we found the "
4384 "political will — until the people convinced politicians they’d have their "
4385 "backs when they went up against the richest, most powerful men in the world."
4388 #. type: Content of: <book><chapter><sect1><para>
4389 #: complete-book.xml:3479
4390 msgid "Could we find that political will again?"
4393 #. type: Content of: <book><chapter><sect1><para>
4394 #: complete-book.xml:3482
4396 "Copyright scholar James Boyle has described how the term "
4397 "<quote>ecology</quote> marked a turning point in environmental "
4398 "activism. Prior to the adoption of this term, people who wanted to preserve "
4399 "whale populations didn’t necessarily see themselves as fighting the same "
4400 "battle as people who wanted to protect the ozone layer or fight freshwater "
4401 "pollution or beat back smog or acid rain."
4404 #. type: Content of: <book><chapter><sect1><para>
4405 #: complete-book.xml:3490
4407 "But the term <quote>ecology</quote> welded these disparate causes together "
4408 "into a single movement, and the members of this movement found solidarity "
4409 "with one another. The people who cared about smog signed petitions "
4410 "circulated by the people who wanted to end whaling, and the anti-whalers "
4411 "marched alongside the people demanding action on acid rain. This uniting "
4412 "behind a common cause completely changed the dynamics of environmentalism, "
4413 "setting the stage for today’s climate activism and the sense that preserving "
4414 "the habitability of the planet Earth is a shared duty among all people."
4417 #. type: Content of: <book><chapter><sect1><para>
4418 #: complete-book.xml:3501
4420 "I believe we are on the verge of a new <quote>ecology</quote> moment "
4421 "dedicated to combating monopolies. After all, tech isn’t the only "
4422 "concentrated industry nor is it even the <emphasis>most</emphasis> "
4423 "concentrated of industries."
4426 #. type: Content of: <book><chapter><sect1><para>
4427 #: complete-book.xml:3507
4429 "You can find partisans for trustbusting in every sector of the "
4430 "economy. Everywhere you look, you can find people who’ve been wronged by "
4431 "monopolists who’ve trashed their finances, their health, their privacy, "
4432 "their educations, and the lives of people they love. Those people have the "
4433 "same cause as the people who want to break up Big Tech and the same "
4434 "enemies. When most of the world’s wealth is in the hands of a very few, it "
4435 "follows that nearly every large company will have overlapping shareholders."
4438 #. type: Content of: <book><chapter><sect1><para>
4439 #: complete-book.xml:3517
4441 "That’s the good news: With a little bit of work and a little bit of "
4442 "coalition building, we have more than enough political will to break up Big "
4443 "Tech and every other concentrated industry besides. First we take Facebook, "
4444 "then we take AT&T/WarnerMedia."
4447 #. type: Content of: <book><chapter><sect1><para>
4448 #: complete-book.xml:3523
4450 "But here’s the bad news: Much of what we’re doing to tame Big Tech "
4451 "<emphasis>instead</emphasis> of breaking up the big companies also "
4452 "forecloses on the possibility of breaking them up later."
4455 #. type: Content of: <book><chapter><sect1><para>
4456 #: complete-book.xml:3528
4458 "Big Tech’s concentration currently means that their inaction on harassment, "
4459 "for example, leaves users with an impossible choice: absent themselves from "
4460 "public discourse by, say, quitting Twitter or endure vile, constant "
4461 "abuse. Big Tech’s over-collection and over-retention of data results in "
4462 "horrific identity theft. And their inaction on extremist recruitment means "
4463 "that white supremacists who livestream their shooting rampages can reach an "
4464 "audience of billions. The combination of tech concentration and media "
4465 "concentration means that artists’ incomes are falling even as the revenue "
4466 "generated by their creations are increasing."
4469 #. type: Content of: <book><chapter><sect1><para>
4470 #: complete-book.xml:3540
4472 "Yet governments confronting all of these problems all inevitably converge on "
4473 "the same solution: deputize the Big Tech giants to police their users and "
4474 "render them liable for their users’ bad actions. The drive to force Big Tech "
4475 "to use automated filters to block everything from copyright infringement to "
4476 "sex-trafficking to violent extremism means that tech companies will have to "
4477 "allocate hundreds of millions to run these compliance systems."
4480 #. type: Content of: <book><chapter><sect1><para>
4481 #: complete-book.xml:3549
4483 "These rules — the EU’s new Directive on Copyright, Australia’s new terror "
4484 "regulation, America’s FOSTA/SESTA sex-trafficking law and more — are not "
4485 "just death warrants for small, upstart competitors that might challenge Big "
4486 "Tech’s dominance but who lack the deep pockets of established incumbents to "
4487 "pay for all these automated systems. Worse still, these rules put a floor "
4488 "under how small we can hope to make Big Tech."
4491 #. type: Content of: <book><chapter><sect1><para>
4492 #: complete-book.xml:3558
4494 "That’s because any move to break up Big Tech and cut it down to size will "
4495 "have to cope with the hard limit of not making these companies so small that "
4496 "they can no longer afford to perform these duties — and it’s "
4497 "<emphasis>expensive</emphasis> to invest in those automated filters and "
4498 "outsource content moderation. It’s already going to be hard to unwind these "
4499 "deeply concentrated, chimeric behemoths that have been welded together in "
4500 "the pursuit of monopoly profits. Doing so while simultaneously finding some "
4501 "way to fill the regulatory void that will be left behind if these "
4502 "self-policing rulers were forced to suddenly abdicate will be much, much "
4506 #. type: Content of: <book><chapter><sect1><para>
4507 #: complete-book.xml:3570
4509 "Allowing the platforms to grow to their present size has given them a "
4510 "dominance that is nearly insurmountable — deputizing them with public duties "
4511 "to redress the pathologies created by their size makes it virtually "
4512 "impossible to reduce that size. Lather, rinse, repeat: If the platforms "
4513 "don’t get smaller, they will get larger, and as they get larger, they will "
4514 "create more problems, which will give rise to more public duties for the "
4515 "companies, which will make them bigger still."
4518 #. type: Content of: <book><chapter><sect1><para>
4519 #: complete-book.xml:3580
4521 "We can work to fix the internet by breaking up Big Tech and depriving them "
4522 "of monopoly profits, or we can work to fix Big Tech by making them spend "
4523 "their monopoly profits on governance. But we can’t do both. We have to "
4524 "choose between a vibrant, open internet or a dominated, monopolized internet "
4525 "commanded by Big Tech giants that we struggle with constantly to get them to "
4526 "behave themselves."
4529 #. type: Content of: <book><chapter><sect1><title>
4530 #: complete-book.xml:3588
4531 msgid "Make Big Tech small again"
4534 #. type: Content of: <book><chapter><sect1><para>
4535 #: complete-book.xml:3590
4537 "Trustbusting is hard. Breaking big companies into smaller ones is expensive "
4538 "and time-consuming. So time-consuming that by the time you’re done, the "
4539 "world has often moved on and rendered years of litigation irrelevant. From "
4540 "1969 to 1982, the U.S. government pursued an antitrust case against IBM over "
4541 "its dominance of mainframe computing — but the case collapsed in 1982 "
4542 "because mainframes were being speedily replaced by PCs."
4545 #. type: Content of: <book><chapter><sect1><blockquote><para>
4546 #: complete-book.xml:3600
4548 "A future U.S. president could simply direct their attorney general to "
4549 "enforce the law as it was written."
4552 #. type: Content of: <book><chapter><sect1><para>
4553 #: complete-book.xml:3605
4555 "It’s far easier to prevent concentration than to fix it, and reinstating the "
4556 "traditional contours of U.S. antitrust enforcement will, at the very least, "
4557 "prevent further concentration. That means bans on mergers between large "
4558 "companies, on big companies acquiring nascent competitors, and on platform "
4559 "companies competing directly with the companies that rely on the platforms."
4562 #. type: Content of: <book><chapter><sect1><para>
4563 #: complete-book.xml:3613
4565 "These powers are all in the plain language of U.S. antitrust laws, so in "
4566 "theory, a future U.S. president could simply direct their attorney general "
4567 "to enforce the law as it was written. But after decades of judicial "
4568 "<quote>education</quote> in the benefits of monopolies, after multiple "
4569 "administrations that have packed the federal courts with lifetime-appointed "
4570 "monopoly cheerleaders, it’s not clear that mere administrative action would "
4574 #. type: Content of: <book><chapter><sect1><para>
4575 #: complete-book.xml:3622
4577 "If the courts frustrate the Justice Department and the president, the next "
4578 "stop would be Congress, which could eliminate any doubt about how antitrust "
4579 "law should be enforced in the U.S. by passing new laws that boil down to "
4580 "saying, <quote>Knock it off. We all know what the Sherman Act says. Robert "
4581 "Bork was a deranged fantasist. For avoidance of doubt, <emphasis>fuck that "
4582 "guy</emphasis>.</quote> In other words, the problem with monopolies is "
4583 "<emphasis>monopolism</emphasis> — the concentration of power into too few "
4584 "hands, which erodes our right to self-determination. If there is a monopoly, "
4585 "the law wants it gone, period. Sure, get rid of monopolies that create "
4586 "<quote>consumer harm</quote> in the form of higher prices, but also, "
4587 "<emphasis>get rid of other monopolies, too.</emphasis>"
4590 #. type: Content of: <book><chapter><sect1><para>
4591 #: complete-book.xml:3636
4593 "But this only prevents things from getting worse. To help them get better, "
4594 "we will have to build coalitions with other activists in the anti-monopoly "
4595 "ecology movement — a pluralism movement or a self-determination movement — "
4596 "and target existing monopolies in every industry for breakup and structural "
4597 "separation rules that prevent, for example, the giant eyewear monopolist "
4598 "Luxottica from dominating both the sale and the manufacture of spectacles."
4601 #. type: Content of: <book><chapter><sect1><para>
4602 #: complete-book.xml:3645
4604 "In an important sense, it doesn’t matter which industry the breakups begin "
4605 "in. Once they start, shareholders in <emphasis>every</emphasis> industry "
4606 "will start to eye their investments in monopolists skeptically. As "
4607 "trustbusters ride into town and start making lives miserable for "
4608 "monopolists, the debate around every corporate boardroom’s table will "
4609 "shift. People within corporations who’ve always felt uneasy about monopolism "
4610 "will gain a powerful new argument to fend off their evil rivals in the "
4611 "corporate hierarchy: <quote>If we do it my way, we make less money; if we do "
4612 "it your way, a judge will fine us billions and expose us to ridicule and "
4613 "public disapprobation. So even though I get that it would be really cool to "
4614 "do that merger, lock out that competitor, or buy that little company and "
4615 "kill it before it can threaten it, we really shouldn’t — not if we don’t "
4616 "want to get tied to the DOJ’s bumper and get dragged up and down Trustbuster "
4617 "Road for the next 10 years.</quote>"
4620 #. type: Content of: <book><chapter><sect1><title>
4621 #: complete-book.xml:3662
4625 #. type: Content of: <book><chapter><sect1><para>
4626 #: complete-book.xml:3664
4628 "Fixing Big Tech will require a lot of iteration. As cyber lawyer Lawrence "
4629 "Lessig wrote in his 1999 book, <emphasis>Code and Other Laws of "
4630 "Cyberspace</emphasis>, our lives are regulated by four forces: law (what’s "
4631 "legal), code (what’s technologically possible), norms (what’s socially "
4632 "acceptable), and markets (what’s profitable)."
4635 #. type: Content of: <book><chapter><sect1><para>
4636 #: complete-book.xml:3671
4638 "If you could wave a wand and get Congress to pass a law that re-fanged the "
4639 "Sherman Act tomorrow, you could use the impending breakups to convince "
4640 "venture capitalists to fund competitors to Facebook, Google, Twitter, and "
4641 "Apple that would be waiting in the wings after they were cut down to size."
4644 #. type: Content of: <book><chapter><sect1><para>
4645 #: complete-book.xml:3678
4647 "But getting Congress to act will require a massive normative shift, a mass "
4648 "movement of people who care about monopolies — and pulling them apart."
4651 #. type: Content of: <book><chapter><sect1><para>
4652 #: complete-book.xml:3683
4654 "Getting people to care about monopolies will take technological "
4655 "interventions that help them to see what a world free from Big Tech might "
4656 "look like. Imagine if someone could make a beloved (but unauthorized) "
4657 "third-party Facebook or Twitter client that dampens the anxiety-producing "
4658 "algorithmic drumbeat and still lets you talk to your friends without being "
4659 "spied upon — something that made social media more sociable and less "
4660 "toxic. Now imagine that it gets shut down in a brutal legal battle. It’s "
4661 "always easier to convince people that something must be done to save a thing "
4662 "they love than it is to excite them about something that doesn’t even exist "
4666 #. type: Content of: <book><chapter><sect1><para>
4667 #: complete-book.xml:3695
4669 "Neither tech nor law nor code nor markets are sufficient to reform Big "
4670 "Tech. But a profitable competitor to Big Tech could bankroll a legislative "
4671 "push; legal reform can embolden a toolsmith to make a better tool; the tool "
4672 "can create customers for a potential business who value the benefits of the "
4673 "internet but want them delivered without Big Tech; and that business can get "
4674 "funded and divert some of its profits to legal reform. 20 GOTO 10 (or "
4675 "lather, rinse, repeat). Do it again, but this time, get farther! After all, "
4676 "this time you’re starting with weaker Big Tech adversaries, a constituency "
4677 "that understands things can be better, Big Tech rivals who’ll help ensure "
4678 "their own future by bankrolling reform, and code that other programmers can "
4679 "build on to weaken Big Tech even further."
4682 #. type: Content of: <book><chapter><sect1><para>
4683 #: complete-book.xml:3709
4685 "The surveillance capitalism hypothesis — that Big Tech’s products really "
4686 "work as well as they say they do and that’s why everything is so screwed up "
4687 "— is way too easy on surveillance and even easier on capitalism. Companies "
4688 "spy because they believe their own BS, and companies spy because governments "
4689 "let them, and companies spy because any advantage from spying is so "
4690 "short-lived and minor that they have to do more and more of it just to stay "
4694 #. type: Content of: <book><chapter><sect1><para>
4695 #: complete-book.xml:3718
4697 "As to why things are so screwed up? Capitalism. Specifically, the monopolism "
4698 "that creates inequality and the inequality that creates monopolism. It’s a "
4699 "form of capitalism that rewards sociopaths who destroy the real economy to "
4700 "inflate the bottom line, and they get away with it for the same reason "
4701 "companies get away with spying: because our governments are in thrall to "
4702 "both the ideology that says monopolies are actually just fine and in thrall "
4703 "to the ideology that says that in a monopolistic world, you’d better not "
4704 "piss off the monopolists."
4707 #. type: Content of: <book><chapter><sect1><para>
4708 #: complete-book.xml:3729
4710 "Surveillance doesn’t make capitalism rogue. Capitalism’s unchecked rule "
4711 "begets surveillance. Surveillance isn’t bad because it lets people "
4712 "manipulate us. It’s bad because it crushes our ability to be our authentic "
4713 "selves — and because it lets the rich and powerful figure out who might be "
4714 "thinking of building guillotines and what dirt they can use to discredit "
4715 "those embryonic guillotine-builders before they can even get to the "
4719 #. type: Content of: <book><chapter><sect1><title>
4720 #: complete-book.xml:3738
4721 msgid "Up and through"
4724 #. type: Content of: <book><chapter><sect1><para>
4725 #: complete-book.xml:3740
4727 "With all the problems of Big Tech, it’s tempting to imagine solving the "
4728 "problem by returning to a world without tech at all. Resist that temptation."
4731 #. type: Content of: <book><chapter><sect1><para>
4732 #: complete-book.xml:3745
4734 "The only way out of our Big Tech problem is up and through. If our future is "
4735 "not reliant upon high tech, it will be because civilization has fallen. Big "
4736 "Tech wired together a planetary, species-wide nervous system that, with the "
4737 "proper reforms and course corrections, is capable of seeing us through the "
4738 "existential challenge of our species and planet. Now it’s up to us to seize "
4739 "the means of computation, putting that electronic nervous system under "
4740 "democratic, accountable control."
4743 #. type: Content of: <book><chapter><sect1><para>
4744 #: complete-book.xml:3755
4746 "I am, secretly, despite what I have said earlier, a tech exceptionalist. Not "
4747 "in the sense of thinking that tech should be given a free pass to monopolize "
4748 "because it has <quote>economies of scale</quote> or some other nebulous "
4749 "feature. I’m a tech exceptionalist because I believe that getting tech right "
4750 "matters and that getting it wrong will be an unmitigated catastrophe — and "
4751 "doing it right can give us the power to work together to save our "
4752 "civilization, our species, and our planet."