1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9 "Project-Id-Version: PACKAGE VERSION\n"
10 "POT-Creation-Date: 2020-09-06 11:38+0200\n"
11 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
12 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
19 #. type: Attribute 'lang' of: <book>
20 #: complete-book.xml:4
24 #. type: Content of: <book><bookinfo><title>
25 #: complete-book.xml:6
26 msgid "How to Destroy Surveillance Capitalism"
29 #. type: Content of: <book><bookinfo>
30 #: complete-book.xml:8
31 msgid "<pubdate>2020-??-??</pubdate> <edition>1</edition>"
34 #. type: Content of: <book><bookinfo><releaseinfo>
35 #: complete-book.xml:10
39 #. type: Content of: <book><bookinfo><authorgroup><author><firstname>
40 #: complete-book.xml:13
44 #. type: Content of: <book><bookinfo><authorgroup><author><surname>
45 #: complete-book.xml:14
49 #. type: Content of: <book><bookinfo><publisher><address>
50 #: complete-book.xml:19
52 msgid "<city>Oslo</city>"
55 #. type: Content of: <book><bookinfo>
56 #: complete-book.xml:17
58 "<publisher> <publishername>Petter Reinholdtsen</publishername> <placeholder "
59 "type=\"address\" id=\"0\"/> </publisher>"
62 #. type: Content of: <book><bookinfo><legalnotice><para><inlinemediaobject>
63 #: complete-book.xml:25
65 "<imageobject> <imagedata fileref=\"images/cc.png\" contentdepth=\"3em\" "
66 "width=\"100%\" align=\"center\"/> </imageobject> <imageobject> <imagedata "
67 "fileref=\"images/cc.svg\" contentdepth=\"3em\" width=\"100%\" "
68 "align=\"center\"/> </imageobject>"
71 #. type: Content of: <book><bookinfo><legalnotice><para><inlinemediaobject><textobject><phrase>
72 #: complete-book.xml:32
73 msgid "Creative Commons, Some rights reserved"
76 #. type: Content of: <book><bookinfo><legalnotice><para>
77 #: complete-book.xml:24
78 msgid "<placeholder type=\"inlinemediaobject\" id=\"0\"/>"
81 #. type: Content of: <book><bookinfo><legalnotice><para>
82 #: complete-book.xml:38
84 "This book is licensed under a Creative Commons license. This license permits "
85 "any use of this work, so long as attribution is given. For more information "
86 "about the license visit <ulink "
87 "url=\"http://creativecommons.org/licenses/by/1.0/\"/>."
90 #. type: Content of: <book><chapter><title>
91 #: complete-book.xml:46
92 msgid "The net of a thousand lies"
95 #. type: Content of: <book><chapter><para>
96 #: complete-book.xml:48
98 "The most surprising thing about the rebirth of flat Earthers in the 21st "
99 "century is just how widespread the evidence against them is. You can "
100 "understand how, centuries ago, people who’d never gained a high-enough "
101 "vantage point from which to see the Earth’s curvature might come to the "
102 "commonsense belief that the flat-seeming Earth was, indeed, flat."
105 #. type: Content of: <book><chapter><para>
106 #: complete-book.xml:56
108 "But today, when elementary schools routinely dangle GoPro cameras from "
109 "balloons and loft them high enough to photograph the Earth’s curve — to say "
110 "nothing of the unexceptional sight of the curved Earth from an airplane "
111 "window — it takes a heroic effort to maintain the belief that the world is "
115 #. type: Content of: <book><chapter><para>
116 #: complete-book.xml:63
118 "Likewise for white nationalism and eugenics: In an age where you can become "
119 "a computational genomics datapoint by swabbing your cheek and mailing it to "
120 "a gene-sequencing company along with a modest sum of money, “race science” "
121 "has never been easier to refute."
124 #. type: Content of: <book><chapter><para>
125 #: complete-book.xml:69
127 "We are living through a golden age of both readily available facts and "
128 "denial of those facts. Terrible ideas that have lingered on the fringes for "
129 "decades or even centuries have gone mainstream seemingly overnight."
132 #. type: Content of: <book><chapter><para>
133 #: complete-book.xml:75
135 "When an obscure idea gains currency, there are only two things that can "
136 "explain its ascendance: Either the person expressing that idea has gotten a "
137 "lot better at stating their case, or the proposition has become harder to "
138 "deny in the face of mounting evidence. In other words, if we want people to "
139 "take climate change seriously, we can get a bunch of Greta Thunbergs to make "
140 "eloquent, passionate arguments from podiums, winning our hearts and minds, "
141 "or we can wait for flood, fire, broiling sun, and pandemics to make the case "
142 "for us. In practice, we’ll probably have to do some of both: The more we’re "
143 "boiling and burning and drowning and wasting away, the easier it will be for "
144 "the Greta Thunbergs of the world to convince us."
147 #. type: Content of: <book><chapter><para>
148 #: complete-book.xml:88
150 "The arguments for ridiculous beliefs in odious conspiracies like "
151 "anti-vaccination, climate denial, a flat Earth, and eugenics are no better "
152 "than they were a generation ago. Indeed, they’re worse because they are "
153 "being pitched to people who have at least a background awareness of the "
157 #. type: Content of: <book><chapter><para>
158 #: complete-book.xml:95
160 "Anti-vax has been around since the first vaccines, but the early "
161 "anti-vaxxers were pitching people who were less equipped to understand even "
162 "the most basic ideas from microbiology, and moreover, those people had not "
163 "witnessed the extermination of mass-murdering diseases like polio, smallpox, "
164 "and measles. Today’s anti-vaxxers are no more eloquent than their forebears, "
165 "and they have a much harder job."
168 #. type: Content of: <book><chapter><para>
169 #: complete-book.xml:104
171 "So can these far-fetched conspiracy theorists really be succeeding on the "
172 "basis of superior arguments?"
175 #. type: Content of: <book><chapter><para>
176 #: complete-book.xml:108
178 "Some people think so. Today, there is a widespread belief that machine "
179 "learning and commercial surveillance can turn even the most fumble-tongued "
180 "conspiracy theorist into a svengali who can warp your perceptions and win "
181 "your belief by locating vulnerable people and then pitching them with "
182 "A.I.-refined arguments that bypass their rational faculties and turn "
183 "everyday people into flat Earthers, anti-vaxxers, or even Nazis. When the "
184 "RAND Corporation <ulink "
185 "url=\"https://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf\">blames "
186 "Facebook for “radicalization”</ulink> and when Facebook’s role in spreading "
187 "coronavirus misinformation is <ulink "
188 "url=\"https://secure.avaaz.org/campaign/en/facebook_threat_health/\">blamed "
189 "on its algorithm</ulink>, the implicit message is that machine learning and "
190 "surveillance are causing the changes in our consensus about what’s true."
193 #. type: Content of: <book><chapter><para>
194 #: complete-book.xml:124
196 "After all, in a world where sprawling and incoherent conspiracy theories "
197 "like Pizzagate and its successor, QAnon, have widespread followings, "
198 "<emphasis>something</emphasis> must be afoot."
201 #. type: Content of: <book><chapter><para>
202 #: complete-book.xml:129
204 "But what if there’s another explanation? What if it’s the material "
205 "circumstances, and not the arguments, that are making the difference for "
206 "these conspiracy pitchmen? What if the trauma of living through "
207 "<emphasis>real conspiracies</emphasis> all around us — conspiracies among "
208 "wealthy people, their lobbyists, and lawmakers to bury inconvenient facts "
209 "and evidence of wrongdoing (these conspiracies are commonly known as "
210 "“corruption”) — is making people vulnerable to conspiracy theories?"
213 #. type: Content of: <book><chapter><para>
214 #: complete-book.xml:139
216 "If it’s trauma and not contagion — material conditions and not ideology — "
217 "that is making the difference today and enabling a rise of repulsive "
218 "misinformation in the face of easily observed facts, that doesn’t mean our "
219 "computer networks are blameless. They’re still doing the heavy work of "
220 "locating vulnerable people and guiding them through a series of "
221 "ever-more-extreme ideas and communities."
224 #. type: Content of: <book><chapter><para>
225 #: complete-book.xml:147
227 "Belief in conspiracy is a raging fire that has done real damage and poses "
228 "real danger to our planet and species, from epidemics <ulink "
229 "url=\"https://www.cdc.gov/measles/cases-outbreaks.html\">kicked off by "
230 "vaccine denial</ulink> to genocides <ulink "
231 "url=\"https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html\">kicked "
232 "off by racist conspiracies</ulink> to planetary meltdown caused by "
233 "denial-inspired climate inaction. Our world is on fire, and so we have to "
234 "put the fires out — to figure out how to help people see the truth of the "
235 "world through the conspiracies they’ve been confused by."
238 #. type: Content of: <book><chapter><para>
239 #: complete-book.xml:159
241 "But firefighting is reactive. We need fire "
242 "<emphasis>prevention</emphasis>. We need to strike at the traumatic material "
243 "conditions that make people vulnerable to the contagion of conspiracy. Here, "
244 "too, tech has a role to play."
247 #. type: Content of: <book><chapter><para>
248 #: complete-book.xml:165
250 "There’s no shortage of proposals to address this. From the EU’s <ulink "
251 "url=\"https://edri.org/tag/terreg/\">Terrorist Content Regulation</ulink>, "
252 "which requires platforms to police and remove “extremist” content, to the "
253 "U.S. proposals to <ulink "
254 "url=\"https://www.eff.org/deeplinks/2020/03/earn-it-act-violates-constitution\">force "
255 "tech companies to spy on their users</ulink> and hold them liable <ulink "
256 "url=\"https://www.natlawreview.com/article/repeal-cda-section-230\">for "
257 "their users’ bad speech</ulink>, there’s a lot of energy to force tech "
258 "companies to solve the problems they created."
261 #. type: Content of: <book><chapter><para>
262 #: complete-book.xml:176
264 "There’s a critical piece missing from the debate, though. All these "
265 "solutions assume that tech companies are a fixture, that their dominance "
266 "over the internet is a permanent fact. Proposals to replace Big Tech with a "
267 "more diffused, pluralistic internet are nowhere to be found. Worse: The "
268 "“solutions” on the table today <emphasis>require</emphasis> Big Tech to stay "
269 "big because only the very largest companies can afford to implement the "
270 "systems these laws demand."
273 #. type: Content of: <book><chapter><para>
274 #: complete-book.xml:186
276 "Figuring out what we want our tech to look like is crucial if we’re going to "
277 "get out of this mess. Today, we’re at a crossroads where we’re trying to "
278 "figure out if we want to fix the Big Tech companies that dominate our "
279 "internet or if we want to fix the internet itself by unshackling it from Big "
280 "Tech’s stranglehold. We can’t do both, so we have to choose."
283 #. type: Content of: <book><chapter><para>
284 #: complete-book.xml:194
286 "I want us to choose wisely. Taming Big Tech is integral to fixing the "
287 "internet, and for that, we need digital rights activism."
290 #. type: Content of: <book><chapter><title>
291 #: complete-book.xml:198
292 msgid "Digital rights activism, a quarter-century on"
295 #. type: Content of: <book><chapter><para>
296 #: complete-book.xml:200
298 "Digital rights activism is more than 30 years old now. The Electronic "
299 "Frontier Foundation turned 30 this year; the Free Software Foundation "
300 "launched in 1985. For most of the history of the movement, the most "
301 "prominent criticism leveled against it was that it was irrelevant: The real "
302 "activist causes were real-world causes (think of the skepticism when <ulink "
303 "url=\"https://www.loc.gov/law/foreign-news/article/finland-legal-right-to-broadband-for-all-citizens/#:~:text=Global%20Legal%20Monitor,-Home%20%7C%20Search%20%7C%20Browse&text=(July%206%2C%202010)%20On,connection%20100%20MBPS%20by%202015.\">Finland "
304 "declared broadband a human right in 2010</ulink>), and real-world activism "
305 "was shoe-leather activism (think of Malcolm Gladwell’s <ulink "
306 "url=\"https://www.newyorker.com/magazine/2010/10/04/small-change-malcolm-gladwell\">contempt "
307 "for “clicktivism”</ulink>). But as tech has grown more central to our daily "
308 "lives, these accusations of irrelevance have given way first to accusations "
309 "of insincerity (“You only care about tech because you’re <ulink "
310 "url=\"https://www.ipwatchdog.com/2018/06/04/report-engine-eff-shills-google-patent-reform/id=98007/\">shilling "
311 "for tech companies</ulink>”) to accusations of negligence (“Why didn’t you "
312 "foresee that tech could be such a destructive force?”). But digital rights "
313 "activism is right where it’s always been: looking out for the humans in a "
314 "world where tech is inexorably taking over."
317 #. type: Content of: <book><chapter><para>
318 #: complete-book.xml:221
320 "The latest version of this critique comes in the form of “surveillance "
321 "capitalism,” a term coined by business professor Shoshana Zuboff in her long "
322 "and influential 2019 book, <emphasis>The Age of Surveillance Capitalism: The "
323 "Fight for a Human Future at the New Frontier of Power</emphasis>. Zuboff "
324 "argues that “surveillance capitalism” is a unique creature of the tech "
325 "industry and that it is unlike any other abusive commercial practice in "
326 "history, one that is “constituted by unexpected and often illegible "
327 "mechanisms of extraction, commodification, and control that effectively "
328 "exile persons from their own behavior while producing new markets of "
329 "behavioral prediction and modification. Surveillance capitalism challenges "
330 "democratic norms and departs in key ways from the centuries-long evolution "
331 "of market capitalism.” It is a new and deadly form of capitalism, a “rogue "
332 "capitalism,” and our lack of understanding of its unique capabilities and "
333 "dangers represents an existential, species-wide threat. She’s right that "
334 "capitalism today threatens our species, and she’s right that tech poses "
335 "unique challenges to our species and civilization, but she’s really wrong "
336 "about how tech is different and why it threatens our species."
339 #. type: Content of: <book><chapter><para>
340 #: complete-book.xml:242
342 "What’s more, I think that her incorrect diagnosis will lead us down a path "
343 "that ends up making Big Tech stronger, not weaker. We need to take down Big "
344 "Tech, and to do that, we need to start by correctly identifying the problem."
347 #. type: Content of: <book><chapter><title>
348 #: complete-book.xml:248
349 msgid "Tech exceptionalism, then and now"
352 #. type: Content of: <book><chapter><para>
353 #: complete-book.xml:250
355 "Early critics of the digital rights movement — perhaps best represented by "
356 "campaigning organizations like the Electronic Frontier Foundation, the Free "
357 "Software Foundation, Public Knowledge, and others that focused on preserving "
358 "and enhancing basic human rights in the digital realm — damned activists for "
359 "practicing “tech exceptionalism.” Around the turn of the millennium, serious "
360 "people ridiculed any claim that tech policy mattered in the “real world.” "
361 "Claims that tech rules had implications for speech, association, privacy, "
362 "search and seizure, and fundamental rights and equities were treated as "
363 "ridiculous, an elevation of the concerns of sad nerds arguing about "
364 "<emphasis>Star Trek</emphasis> on bulletin board systems above the struggles "
365 "of the Freedom Riders, Nelson Mandela, or the Warsaw ghetto uprising."
368 #. type: Content of: <book><chapter><para>
369 #: complete-book.xml:265
371 "In the decades since, accusations of “tech exceptionalism” have only "
372 "sharpened as tech’s role in everyday life has expanded: Now that tech has "
373 "infiltrated every corner of our life and our online lives have been "
374 "monopolized by a handful of giants, defenders of digital freedoms are "
375 "accused of carrying water for Big Tech, providing cover for its "
376 "self-interested negligence (or worse, nefarious plots)."
379 #. type: Content of: <book><chapter><para>
380 #: complete-book.xml:273
382 "From my perspective, the digital rights movement has remained stationary "
383 "while the rest of the world has moved. From the earliest days, the "
384 "movement’s concern was users and the toolsmiths who provided the code they "
385 "needed to realize their fundamental rights. Digital rights activists only "
386 "cared about companies to the extent that companies were acting to uphold "
387 "users’ rights (or, just as often, when companies were acting so foolishly "
388 "that they threatened to bring down new rules that would also make it harder "
389 "for good actors to help users)."
392 #. type: Content of: <book><chapter><para>
393 #: complete-book.xml:284
395 "The “surveillance capitalism” critique recasts the digital rights movement "
396 "in a new light again: not as alarmists who overestimate the importance of "
397 "their shiny toys nor as shills for big tech but as serene deck-chair "
398 "rearrangers whose long-standing activism is a liability because it makes "
399 "them incapable of perceiving novel threats as they continue to fight the "
400 "last century’s tech battles."
403 #. type: Content of: <book><chapter><para>
404 #: complete-book.xml:292
405 msgid "But tech exceptionalism is a sin no matter who practices it."
408 #. type: Content of: <book><chapter><title>
409 #: complete-book.xml:295
410 msgid "Don’t believe the hype"
413 #. type: Content of: <book><chapter><para>
414 #: complete-book.xml:297
416 "You’ve probably heard that “if you’re not paying for the product, you’re the "
417 "product.” As we’ll see below, that’s true, if incomplete. But what is "
418 "<emphasis>absolutely</emphasis> true is that ad-driven Big Tech’s customers "
419 "are advertisers, and what companies like Google and Facebook sell is their "
420 "ability to convince <emphasis>you</emphasis> to buy stuff. Big Tech’s "
421 "product is persuasion. The services — social media, search engines, maps, "
422 "messaging, and more — are delivery systems for persuasion."
425 #. type: Content of: <book><chapter><para>
426 #: complete-book.xml:307
428 "The fear of surveillance capitalism starts from the (correct) presumption "
429 "that everything Big Tech says about itself is probably a lie. But the "
430 "surveillance capitalism critique makes an exception for the claims Big Tech "
431 "makes in its sales literature — the breathless hype in the pitches to "
432 "potential advertisers online and in ad-tech seminars about the efficacy of "
433 "its products: It assumes that Big Tech is as good at influencing us as they "
434 "claim they are when they’re selling influencing products to credulous "
435 "customers. That’s a mistake because sales literature is not a reliable "
436 "indicator of a product’s efficacy."
439 #. type: Content of: <book><chapter><para>
440 #: complete-book.xml:319
442 "Surveillance capitalism assumes that because advertisers buy a lot of what "
443 "Big Tech is selling, Big Tech must be selling something real. But Big Tech’s "
444 "massive sales could just as easily be the result of a popular delusion or "
445 "something even more pernicious: monopolistic control over our communications "
449 #. type: Content of: <book><chapter><para>
450 #: complete-book.xml:326
452 "Being watched changes your behavior, and not for the better. It creates "
453 "risks for our social progress. Zuboff’s book features beautifully wrought "
454 "explanations of these phenomena. But Zuboff also claims that surveillance "
455 "literally robs us of our free will — that when our personal data is mixed "
456 "with machine learning, it creates a system of persuasion so devastating that "
457 "we are helpless before it. That is, Facebook uses an algorithm to analyze "
458 "the data it nonconsensually extracts from your daily life and uses it to "
459 "customize your feed in ways that get you to buy stuff. It is a mind-control "
460 "ray out of a 1950s comic book, wielded by mad scientists whose "
461 "supercomputers guarantee them perpetual and total world domination."
464 #. type: Content of: <book><chapter><title>
465 #: complete-book.xml:340
466 msgid "What is persuasion?"
469 #. type: Content of: <book><chapter><para>
470 #: complete-book.xml:342
472 "To understand why you shouldn’t worry about mind-control rays — but why you "
473 "<emphasis>should</emphasis> worry about surveillance "
474 "<emphasis>and</emphasis> Big Tech — we must start by unpacking what we mean "
478 #. type: Content of: <book><chapter><para>
479 #: complete-book.xml:348
481 "Google, Facebook, and other surveillance capitalists promise their customers "
482 "(the advertisers) that if they use machine-learning tools trained on "
483 "unimaginably large data sets of nonconsensually harvested personal "
484 "information, they will be able to uncover ways to bypass the rational "
485 "faculties of the public and direct their behavior, creating a stream of "
486 "purchases, votes, and other desired outcomes."
489 #. type: Content of: <book><chapter><blockquote><para>
490 #: complete-book.xml:357
492 "The impact of dominance far exceeds the impact of manipulation and should be "
493 "central to our analysis and any remedies we seek."
496 #. type: Content of: <book><chapter><para>
497 #: complete-book.xml:362
499 "But there’s little evidence that this is happening. Instead, the predictions "
500 "that surveillance capitalism delivers to its customers are much less "
501 "impressive. Rather than finding ways to bypass our rational faculties, "
502 "surveillance capitalists like Mark Zuckerberg mostly do one or more of three "
506 #. type: Content of: <book><chapter><sect1><title>
507 #: complete-book.xml:369
508 msgid "1. Segmenting"
511 #. type: Content of: <book><chapter><sect1><para>
512 #: complete-book.xml:371
514 "If you’re selling diapers, you have better luck if you pitch them to people "
515 "in maternity wards. Not everyone who enters or leaves a maternity ward just "
516 "had a baby, and not everyone who just had a baby is in the market for "
517 "diapers. But having a baby is a really reliable correlate of being in the "
518 "market for diapers, and being in a maternity ward is highly correlated with "
519 "having a baby. Hence diaper ads around maternity wards (and even pitchmen "
520 "for baby products, who haunt maternity wards with baskets full of freebies)."
523 #. type: Content of: <book><chapter><sect1><para>
524 #: complete-book.xml:382
526 "Surveillance capitalism is segmenting times a billion. Diaper vendors can go "
527 "way beyond people in maternity wards (though they can do that, too, with "
528 "things like location-based mobile ads). They can target you based on "
529 "whether you’re reading articles about child-rearing, diapers, or a host of "
530 "other subjects, and data mining can suggest unobvious keywords to advertise "
531 "against. They can target you based on the articles you’ve recently "
532 "read. They can target you based on what you’ve recently purchased. They can "
533 "target you based on whether you receive emails or private messages about "
534 "these subjects — or even if you speak aloud about them (though Facebook and "
535 "the like convincingly claim that’s not happening — yet)."
538 #. type: Content of: <book><chapter><sect1><para>
539 #: complete-book.xml:396
540 msgid "This is seriously creepy."
543 #. type: Content of: <book><chapter><sect1><para>
544 #: complete-book.xml:399
545 msgid "But it’s not mind control."
548 #. type: Content of: <book><chapter><sect1><para>
549 #: complete-book.xml:402
550 msgid "It doesn’t deprive you of your free will. It doesn’t trick you."
553 #. type: Content of: <book><chapter><sect1><para>
554 #: complete-book.xml:405
556 "Think of how surveillance capitalism works in politics. Surveillance "
557 "capitalist companies sell political operatives the power to locate people "
558 "who might be receptive to their pitch. Candidates campaigning on finance "
559 "industry corruption seek people struggling with debt; candidates campaigning "
560 "on xenophobia seek out racists. Political operatives have always targeted "
561 "their message whether their intentions were honorable or not: Union "
562 "organizers set up pitches at factory gates, and white supremacists hand out "
563 "fliers at John Birch Society meetings."
566 #. type: Content of: <book><chapter><sect1><para>
567 #: complete-book.xml:416
569 "But this is an inexact and thus wasteful practice. The union organizer can’t "
570 "know which worker to approach on the way out of the factory gates and may "
571 "waste their time on a covert John Birch Society member; the white "
572 "supremacist doesn’t know which of the Birchers are so delusional that making "
573 "it to a meeting is as much as they can manage and which ones might be "
574 "convinced to cross the country to carry a tiki torch through the streets of "
575 "Charlottesville, Virginia."
578 #. type: Content of: <book><chapter><sect1><para>
579 #: complete-book.xml:426
581 "Because targeting improves the yields on political pitches, it can "
582 "accelerate the pace of political upheaval by making it possible for everyone "
583 "who has secretly wished for the toppling of an autocrat — or just an 11-term "
584 "incumbent politician — to find everyone else who feels the same way at very "
585 "low cost. This has been critical to the rapid crystallization of recent "
586 "political movements including Black Lives Matter and Occupy Wall Street as "
587 "well as less savory players like the far-right white nationalist movements "
588 "that marched in Charlottesville."
591 #. type: Content of: <book><chapter><sect1><para>
592 #: complete-book.xml:437
594 "It’s important to differentiate this kind of political organizing from "
595 "influence campaigns; finding people who secretly agree with you isn’t the "
596 "same as convincing people to agree with you. The rise of phenomena like "
597 "nonbinary or otherwise nonconforming gender identities is often "
598 "characterized by reactionaries as the result of online brainwashing "
599 "campaigns that convince impressionable people that they have been secretly "
603 #. type: Content of: <book><chapter><sect1><para>
604 #: complete-book.xml:446
606 "But the personal accounts of those who have come out tell a different story "
607 "where people who long harbored a secret about their gender were emboldened "
608 "by others coming forward and where people who knew that they were different "
609 "but lacked a vocabulary for discussing that difference learned the right "
610 "words from these low-cost means of finding people and learning about their "
614 #. type: Content of: <book><chapter><sect1><title>
615 #: complete-book.xml:455
619 #. type: Content of: <book><chapter><sect1><para>
620 #: complete-book.xml:457
622 "Lies and fraud are pernicious, and surveillance capitalism supercharges them "
623 "through targeting. If you want to sell a fraudulent payday loan or subprime "
624 "mortgage, surveillance capitalism can help you find people who are both "
625 "desperate and unsophisticated and thus receptive to your pitch. This "
626 "accounts for the rise of many phenomena, like multilevel marketing schemes, "
627 "in which deceptive claims about potential earnings and the efficacy of sales "
628 "techniques are targeted at desperate people by advertising against search "
629 "queries that indicate, for example, someone struggling with ill-advised "
633 #. type: Content of: <book><chapter><sect1><para>
634 #: complete-book.xml:469
636 "Surveillance capitalism also abets fraud by making it easy to locate other "
637 "people who have been similarly deceived, forming a community of people who "
638 "reinforce one another’s false beliefs. Think of <ulink "
639 "url=\"https://www.vulture.com/2020/01/the-dream-podcast-review.html\">the "
640 "forums</ulink> where people who are being victimized by multilevel marketing "
641 "frauds gather to trade tips on how to improve their luck in peddling the "
645 #. type: Content of: <book><chapter><sect1><para>
646 #: complete-book.xml:479
648 "Sometimes, online deception involves replacing someone’s correct beliefs "
649 "with incorrect ones, as it does in the anti-vaccination movement, whose "
650 "victims are often people who start out believing in vaccines but are "
651 "convinced by seemingly plausible evidence that leads them into the false "
652 "belief that vaccines are harmful."
655 #. type: Content of: <book><chapter><sect1><para>
656 #: complete-book.xml:486
658 "But it’s much more common for fraud to succeed when it doesn’t have to "
659 "displace a true belief. When my daughter contracted head lice at daycare, "
660 "one of the daycare workers told me I could get rid of them by treating her "
661 "hair and scalp with olive oil. I didn’t know anything about head lice, and I "
662 "assumed that the daycare worker did, so I tried it (it didn’t work, and it "
663 "doesn’t work). It’s easy to end up with false beliefs when you simply don’t "
664 "know any better and when those beliefs are conveyed by someone who seems to "
665 "know what they’re doing."
668 #. type: Content of: <book><chapter><sect1><para>
669 #: complete-book.xml:497
671 "This is pernicious and difficult — and it’s also the kind of thing the "
672 "internet can help guard against by making true information available, "
673 "especially in a form that exposes the underlying deliberations among parties "
674 "with sharply divergent views, such as Wikipedia. But it’s not brainwashing; "
675 "it’s fraud. In the <ulink "
676 "url=\"https://datasociety.net/library/data-voids/\">majority of "
677 "cases</ulink>, the victims of these fraud campaigns have an informational "
678 "void filled in the customary way, by consulting a seemingly reliable "
679 "source. If I look up the length of the Brooklyn Bridge and learn that it is "
680 "5,800 feet long, but in reality, it is 5,989 feet long, the underlying "
681 "deception is a problem, but it’s a problem with a simple remedy. It’s a very "
682 "different problem from the anti-vax issue in which someone’s true belief is "
683 "displaced by a false one by means of sophisticated persuasion."
686 #. type: Content of: <book><chapter><sect1><title>
687 #: complete-book.xml:514
688 msgid "3. Domination"
691 #. type: Content of: <book><chapter><sect1><para>
692 #: complete-book.xml:516
694 "Surveillance capitalism is the result of monopoly. Monopoly is the cause, "
695 "and surveillance capitalism and its negative outcomes are the effects of "
696 "monopoly. I’ll get into this in depth later, but for now, suffice it to say "
697 "that the tech industry has grown up with a radical theory of antitrust that "
698 "has allowed companies to grow by merging with their rivals, buying up their "
699 "nascent competitors, and expanding to control whole market verticals."
702 #. type: Content of: <book><chapter><sect1><para>
703 #: complete-book.xml:525
705 "One example of how monopolism aids in persuasion is through dominance: "
706 "Google makes editorial decisions about its algorithms that determine the "
707 "sort order of the responses to our queries. If a cabal of fraudsters have "
708 "set out to trick the world into thinking that the Brooklyn Bridge is 5,800 "
709 "feet long, and if Google gives a high search rank to this group in response "
710 "to queries like “How long is the Brooklyn Bridge?” then the first eight or "
711 "10 screens’ worth of Google results could be wrong. And since most people "
712 "don’t go beyond the first couple of results — let alone the first "
713 "<emphasis>page</emphasis> of results — Google’s choice means that many "
714 "people will be deceived."
717 #. type: Content of: <book><chapter><sect1><para>
718 #: complete-book.xml:538
720 "Google’s dominance over search — more than 86% of web searches are performed "
721 "through Google — means that the way it orders its search results has an "
722 "outsized effect on public beliefs. Ironically, Google claims this is why it "
723 "can’t afford to have any transparency in its algorithm design: Google’s "
724 "search dominance makes the results of its sorting too important to risk "
725 "telling the world how it arrives at those results lest some bad actor "
726 "discover a flaw in the ranking system and exploit it to push its point of "
727 "view to the top of the search results. There’s an obvious remedy to a "
728 "company that is too big to audit: break it up into smaller pieces."
731 #. type: Content of: <book><chapter><sect1><para>
732 #: complete-book.xml:550
734 "Zuboff calls surveillance capitalism a “rogue capitalism” whose "
735 "data-hoarding and machine-learning techniques rob us of our free will. But "
736 "influence campaigns that seek to displace existing, correct beliefs with "
737 "false ones have an effect that is small and temporary while monopolistic "
738 "dominance over informational systems has massive, enduring "
739 "effects. Controlling the results to the world’s search queries means "
740 "controlling access both to arguments and their rebuttals and, thus, control "
741 "over much of the world’s beliefs. If our concern is how corporations are "
742 "foreclosing on our ability to make up our own minds and determine our own "
743 "futures, the impact of dominance far exceeds the impact of manipulation and "
744 "should be central to our analysis and any remedies we seek."
747 #. type: Content of: <book><chapter><sect1><title>
748 #: complete-book.xml:565
749 msgid "4. Bypassing our rational faculties"
752 #. type: Content of: <book><chapter><sect1><para>
753 #: complete-book.xml:567
755 "<emphasis>This</emphasis> is the good stuff: using machine learning, “dark "
756 "patterns,” engagement hacking, and other techniques to get us to do things "
757 "that run counter to our better judgment. This is mind control."
760 #. type: Content of: <book><chapter><sect1><para>
761 #: complete-book.xml:573
763 "Some of these techniques have proven devastatingly effective (if only in the "
764 "short term). The use of countdown timers on a purchase completion page can "
765 "create a sense of urgency that causes you to ignore the nagging internal "
766 "voice suggesting that you should shop around or sleep on your decision. The "
767 "use of people from your social graph in ads can provide “social proof” that "
768 "a purchase is worth making. Even the auction system pioneered by eBay is "
769 "calculated to play on our cognitive blind spots, letting us feel like we "
770 "“own” something because we bid on it, thus encouraging us to bid again when "
771 "we are outbid to ensure that “our” things stay ours."
774 #. type: Content of: <book><chapter><sect1><para>
775 #: complete-book.xml:586
777 "Games are extraordinarily good at this. “Free to play” games manipulate us "
778 "through many techniques, such as presenting players with a series of "
779 "smoothly escalating challenges that create a sense of mastery and "
780 "accomplishment but which sharply transition into a set of challenges that "
781 "are impossible to overcome without paid upgrades. Add some social proof to "
782 "the mix — a stream of notifications about how well your friends are faring — "
783 "and before you know it, you’re buying virtual power-ups to get to the next "
787 #. type: Content of: <book><chapter><sect1><para>
788 #: complete-book.xml:597
790 "Companies have risen and fallen on these techniques, and the “fallen” part "
791 "is worth paying attention to. In general, living things adapt to stimulus: "
792 "Something that is very compelling or noteworthy when you first encounter it "
793 "fades with repetition until you stop noticing it altogether. Consider the "
794 "refrigerator hum that irritates you when it starts up but disappears into "
795 "the background so thoroughly that you only notice it when it stops again."
798 #. type: Content of: <book><chapter><sect1><para>
799 #: complete-book.xml:607
801 "That’s why behavioral conditioning uses “intermittent reinforcement "
802 "schedules.” Instead of giving you a steady drip of encouragement or "
803 "setbacks, games and gamified services scatter rewards on a randomized "
804 "schedule — often enough to keep you interested and random enough that you "
805 "can never quite find the pattern that would make it boring."
808 #. type: Content of: <book><chapter><sect1><para>
809 #: complete-book.xml:615
811 "Intermittent reinforcement is a powerful behavioral tool, but it also "
812 "represents a collective action problem for surveillance capitalism. The "
813 "“engagement techniques” invented by the behaviorists of surveillance "
814 "capitalist companies are quickly copied across the whole sector so that what "
815 "starts as a mysteriously compelling fillip in the design of a service—like "
816 "“pull to refresh” or alerts when someone likes your posts or side quests "
817 "that your characters get invited to while in the midst of main "
818 "quests—quickly becomes dully ubiquitous. The impossible-to-nail-down "
819 "nonpattern of randomized drips from your phone becomes a grey-noise wall of "
820 "sound as every single app and site starts to make use of whatever seems to "
821 "be working at the time."
824 #. type: Content of: <book><chapter><sect1><para>
825 #: complete-book.xml:630
827 "From the surveillance capitalist’s point of view, our adaptive capacity is "
828 "like a harmful bacterium that deprives it of its food source — our attention "
829 "— and novel techniques for snagging that attention are like new antibiotics "
830 "that can be used to breach our defenses and destroy our "
831 "self-determination. And there <emphasis>are</emphasis> techniques like "
832 "that. Who can forget the Great Zynga Epidemic, when all of our friends were "
833 "caught in <emphasis>FarmVille</emphasis>’s endless, mindless dopamine loops? "
834 "But every new attention-commanding technique is jumped on by the whole "
835 "industry and used so indiscriminately that antibiotic resistance sets "
836 "in. Given enough repetition, almost all of us develop immunity to even the "
837 "most powerful techniques — by 2013, two years after Zynga’s peak, its user "
841 #. type: Content of: <book><chapter><sect1><para>
842 #: complete-book.xml:645
844 "Not everyone, of course. Some people never adapt to stimulus, just as some "
845 "people never stop hearing the hum of the refrigerator. This is why most "
846 "people who are exposed to slot machines play them for a while and then move "
847 "on while a small and tragic minority liquidate their kids’ college funds, "
848 "buy adult diapers, and position themselves in front of a machine until they "
852 #. type: Content of: <book><chapter><sect1><para>
853 #: complete-book.xml:653
855 "But surveillance capitalism’s margins on behavioral modification "
856 "suck. Tripling the rate at which someone buys a widget sounds great <ulink "
857 "url=\"https://www.forbes.com/sites/priceonomics/2018/03/09/the-advertising-conversion-rates-for-every-major-tech-platform/#2f6a67485957\">unless "
858 "the base rate is way less than 1%</ulink> with an improved rate of… still "
859 "less than 1%. Even penny slot machines pull down pennies for every spin "
860 "while surveillance capitalism rakes in infinitesimal penny fractions."
863 #. type: Content of: <book><chapter><sect1><para>
864 #: complete-book.xml:663
866 "Slot machines’ high returns mean that they can be profitable just by "
867 "draining the fortunes of the small rump of people who are pathologically "
868 "vulnerable to them and unable to adapt to their tricks. But surveillance "
869 "capitalism can’t survive on the fractional pennies it brings down from that "
870 "vulnerable sliver — that’s why, after the Great Zynga Epidemic had finally "
871 "burned itself out, the small number of still-addicted players left behind "
872 "couldn’t sustain it as a global phenomenon. And new powerful attention "
873 "weapons aren’t easy to find, as is evidenced by the long years since the "
874 "last time Zynga had a hit. Despite the hundreds of millions of dollars that "
875 "Zynga has to spend on developing new tools to blast through our adaptation, "
876 "it has never managed to repeat the lucky accident that let it snag so much "
877 "of our attention for a brief moment in 2009. Powerhouses like Supercell have "
878 "fared a little better, but they are rare and throw away many failures for "
882 #. type: Content of: <book><chapter><sect1><para>
883 #: complete-book.xml:681
885 "The vulnerability of small segments of the population to dramatic, efficient "
886 "corporate manipulation is a real concern that’s worthy of our attention and "
887 "energy. But it’s not an existential threat to society."
890 #. type: Content of: <book><chapter><title>
891 #: complete-book.xml:688
892 msgid "If data is the new oil, then surveillance capitalism’s engine has a leak"
895 #. type: Content of: <book><chapter><para>
896 #: complete-book.xml:691
898 "This adaptation problem offers an explanation for one of surveillance "
899 "capitalism’s most alarming traits: its relentless hunger for data and its "
900 "endless expansion of data-gathering capabilities through the spread of "
901 "sensors, online surveillance, and acquisition of data streams from third "
905 #. type: Content of: <book><chapter><para>
906 #: complete-book.xml:698
908 "Zuboff observes this phenomenon and concludes that data must be very "
909 "valuable if surveillance capitalism is so hungry for it. (In her words: "
910 "“Just as industrial capitalism was driven to the continuous intensification "
911 "of the means of production, so surveillance capitalists and their market "
912 "players are now locked into the continuous intensification of the means of "
913 "behavioral modification and the gathering might of instrumentarian power.”) "
914 "But what if the voracious appetite is because data has such a short "
915 "half-life — because people become inured so quickly to new, data-driven "
916 "persuasion techniques — that the companies are locked in an arms race with "
917 "our limbic system? What if it’s all a Red Queen’s race where they have to "
918 "run ever faster — collect ever-more data — just to stay in the same spot?"
921 #. type: Content of: <book><chapter><para>
922 #: complete-book.xml:713
924 "Of course, all of Big Tech’s persuasion techniques work in concert with one "
925 "another, and collecting data is useful beyond mere behavioral trickery."
928 #. type: Content of: <book><chapter><para>
929 #: complete-book.xml:718
931 "If someone wants to recruit you to buy a refrigerator or join a pogrom, they "
932 "might use profiling and targeting to send messages to people they judge to "
933 "be good sales prospects. The messages themselves may be deceptive, making "
934 "claims about things you’re not very knowledgeable about (food safety and "
935 "energy efficiency or eugenics and historical claims about racial "
936 "superiority). They might use search engine optimization and/or armies of "
937 "fake reviewers and commenters and/or paid placement to dominate the "
938 "discourse so that any search for further information takes you back to their "
939 "messages. And finally, they may refine the different pitches using machine "
940 "learning and other techniques to figure out what kind of pitch works best on "
944 #. type: Content of: <book><chapter><para>
945 #: complete-book.xml:732
947 "Each phase of this process benefits from surveillance: The more data they "
948 "have, the more precisely they can profile you and target you with specific "
949 "messages. Think of how you’d sell a fridge if you knew that the warranty on "
950 "your prospect’s fridge just expired and that they were expecting a tax "
954 #. type: Content of: <book><chapter><para>
955 #: complete-book.xml:739
957 "Also, the more data they have, the better they can craft deceptive messages "
958 "— if I know that you’re into genealogy, I might not try to feed you "
959 "pseudoscience about genetic differences between “races,” sticking instead to "
960 "conspiratorial secret histories of “demographic replacement” and the like."
963 #. type: Content of: <book><chapter><para>
964 #: complete-book.xml:746
966 "Facebook also helps you locate people who have the same odious or antisocial "
967 "views as you. It makes it possible to find other people who want to carry "
968 "tiki torches through the streets of Charlottesville in Confederate "
969 "cosplay. It can help you find other people who want to join your militia and "
970 "go to the border to look for undocumented migrants to terrorize. It can help "
971 "you find people who share your belief that vaccines are poison and that the "
975 #. type: Content of: <book><chapter><para>
976 #: complete-book.xml:756
978 "There is one way in which targeted advertising uniquely benefits those "
979 "advocating for socially unacceptable causes: It is invisible. Racism is "
980 "widely geographically dispersed, and there are few places where racists — "
981 "and only racists — gather. This is similar to the problem of selling "
982 "refrigerators in that potential refrigerator purchasers are geographically "
983 "dispersed and there are few places where you can buy an ad that will be "
984 "primarily seen by refrigerator customers. But buying a refrigerator is "
985 "socially acceptable while being a Nazi is not, so you can buy a billboard or "
986 "advertise in the newspaper sports section for your refrigerator business, "
987 "and the only potential downside is that your ad will be seen by a lot of "
988 "people who don’t want refrigerators, resulting in a lot of wasted expense."
991 #. type: Content of: <book><chapter><para>
992 #: complete-book.xml:771
994 "But even if you wanted to advertise your Nazi movement on a billboard or "
995 "prime-time TV or the sports section, you would struggle to find anyone "
996 "willing to sell you the space for your ad partly because they disagree with "
997 "your views and partly because they fear censure (boycott, reputational "
998 "damage, etc.) from other people who disagree with your views."
1001 #. type: Content of: <book><chapter><para>
1002 #: complete-book.xml:779
1004 "Targeted ads solve this problem: On the internet, every ad unit can be "
1005 "different for every person, meaning that you can buy ads that are only shown "
1006 "to people who appear to be Nazis and not to people who hate Nazis. When "
1007 "there’s spillover — when someone who hates racism is shown a racist "
1008 "recruiting ad — there is some fallout; the platform or publication might get "
1009 "an angry public or private denunciation. But the nature of the risk assumed "
1010 "by an online ad buyer is different than the risks to a traditional publisher "
1011 "or billboard owner who might want to run a Nazi ad."
1014 #. type: Content of: <book><chapter><para>
1015 #: complete-book.xml:790
1017 "Online ads are placed by algorithms that broker between a diverse ecosystem "
1018 "of self-serve ad platforms that anyone can buy an ad through, so the Nazi ad "
1019 "that slips onto your favorite online publication isn’t seen as their moral "
1020 "failing but rather as a failure in some distant, upstream ad supplier. When "
1021 "a publication gets a complaint about an offensive ad that’s appearing in one "
1022 "of its units, it can take some steps to block that ad, but the Nazi might "
1023 "buy a slightly different ad from a different broker serving the same "
1024 "unit. And in any event, internet users increasingly understand that when "
1025 "they see an ad, it’s likely that the advertiser did not choose that "
1026 "publication and that the publication has no idea who its advertisers are."
1029 #. type: Content of: <book><chapter><para>
1030 #: complete-book.xml:804
1032 "These layers of indirection between advertisers and publishers serve as "
1033 "moral buffers: Today’s moral consensus is largely that publishers shouldn’t "
1034 "be held responsible for the ads that appear on their pages because they’re "
1035 "not actively choosing to put those ads there. Because of this, Nazis are "
1036 "able to overcome significant barriers to organizing their movement."
1039 #. type: Content of: <book><chapter><para>
1040 #: complete-book.xml:812
1042 "Data has a complex relationship with domination. Being able to spy on your "
1043 "customers can alert you to their preferences for your rivals and allow you "
1044 "to head off your rivals at the pass."
1047 #. type: Content of: <book><chapter><para>
1048 #: complete-book.xml:817
1050 "More importantly, if you can dominate the information space while also "
1051 "gathering data, then you make other deceptive tactics stronger because it’s "
1052 "harder to break out of the web of deceit you’re spinning. Domination — that "
1053 "is, ultimately becoming a monopoly — and not the data itself is the "
1054 "supercharger that makes every tactic worth pursuing because monopolistic "
1055 "domination deprives your target of an escape route."
1058 #. type: Content of: <book><chapter><para>
1059 #: complete-book.xml:826
1061 "If you’re a Nazi who wants to ensure that your prospects primarily see "
1062 "deceptive, confirming information when they search for more, you can improve "
1063 "your odds by seeding the search terms they use through your initial "
1064 "communications. You don’t need to own the top 10 results for “voter "
1065 "suppression” if you can convince your marks to confine their search terms to "
1066 "“voter fraud,” which throws up a very different set of search results."
1069 #. type: Content of: <book><chapter><para>
1070 #: complete-book.xml:835
1072 "Surveillance capitalists are like stage mentalists who claim that their "
1073 "extraordinary insights into human behavior let them guess the word that you "
1074 "wrote down and folded up in your pocket but who really use shills, hidden "
1075 "cameras, sleight of hand, and brute-force memorization to amaze you."
1078 #. type: Content of: <book><chapter><para>
1079 #: complete-book.xml:842
1081 "Or perhaps they’re more like pick-up artists, the misogynistic cult that "
1082 "promises to help awkward men have sex with women by teaching them "
1083 "“neurolinguistic programming” phrases, body language techniques, and "
1084 "psychological manipulation tactics like “negging” — offering unsolicited "
1085 "negative feedback to women to lower their self-esteem and prick their "
1089 #. type: Content of: <book><chapter><para>
1090 #: complete-book.xml:850
1092 "Some pick-up artists eventually manage to convince women to go home with "
1093 "them, but it’s not because these men have figured out how to bypass women’s "
1094 "critical faculties. Rather, pick-up artists’ “success” stories are a mix of "
1095 "women who were incapable of giving consent, women who were coerced, women "
1096 "who were intoxicated, self-destructive women, and a few women who were sober "
1097 "and in command of their faculties but who didn’t realize straightaway that "
1098 "they were with terrible men but rectified the error as soon as they could."
1101 #. type: Content of: <book><chapter><para>
1102 #: complete-book.xml:861
1104 "Pick-up artists <emphasis>believe</emphasis> they have figured out a secret "
1105 "back door that bypasses women’s critical faculties, but they haven’t. Many "
1106 "of the tactics they deploy, like negging, became the butt of jokes (just "
1107 "like people joke about bad ad targeting), and there’s a good chance that "
1108 "anyone they try these tactics on will immediately recognize them and dismiss "
1109 "the men who use them as irredeemable losers."
1112 #. type: Content of: <book><chapter><para>
1113 #: complete-book.xml:870
1115 "Pick-up artists are proof that people can believe they have developed a "
1116 "system of mind control <emphasis>even when it doesn’t "
1117 "work</emphasis>. Pick-up artists simply exploit the fact that "
1118 "one-in-a-million chances can come through for you if you make a million "
1119 "attempts, and then they assume that the other 999,999 times, they simply "
1120 "performed the technique incorrectly and commit themselves to doing better "
1121 "next time. There’s only one group of people who find pick-up artist lore "
1122 "reliably convincing: other would-be pick-up artists whose anxiety and "
1123 "insecurity make them vulnerable to scammers and delusional men who convince "
1124 "them that if they pay for tutelage and follow instructions, then they will "
1125 "someday succeed. Pick-up artists assume they fail to entice women because "
1126 "they are bad at being pick-up artists, not because pick-up artistry is "
1127 "bullshit. Pick-up artists are bad at selling themselves to women, but "
1128 "they’re much better at selling themselves to men who pay to learn the "
1129 "secrets of pick-up artistry."
1132 #. type: Content of: <book><chapter><para>
1133 #: complete-book.xml:888
1135 "Department store pioneer John Wanamaker is said to have lamented, “Half the "
1136 "money I spend on advertising is wasted; the trouble is I don’t know which "
1137 "half.” The fact that Wanamaker thought that only half of his advertising "
1138 "spending was wasted is a tribute to the persuasiveness of advertising "
1139 "executives, who are <emphasis>much</emphasis> better at convincing potential "
1140 "clients to buy their services than they are at convincing the general public "
1141 "to buy their clients’ wares."
1144 #. type: Content of: <book><chapter><title>
1145 #: complete-book.xml:898
1146 msgid "What is Facebook?"
1149 #. type: Content of: <book><chapter><para>
1150 #: complete-book.xml:900
1152 "Facebook is heralded as the origin of all of our modern plagues, and it’s "
1153 "not hard to see why. Some tech companies want to lock their users in but "
1154 "make their money by monopolizing access to the market for apps for their "
1155 "devices and gouging them on prices rather than by spying on them (like "
1156 "Apple). Some companies don’t care about locking in users because they’ve "
1157 "figured out how to spy on them no matter where they are and what they’re "
1158 "doing and can turn that surveillance into money (Google). Facebook alone "
1159 "among the Western tech giants has built a business based on locking in its "
1160 "users <emphasis>and</emphasis> spying on them all the time."
1163 #. type: Content of: <book><chapter><para>
1164 #: complete-book.xml:912
1166 "Facebook’s surveillance regime is really without parallel in the Western "
1167 "world. Though Facebook tries to prevent itself from being visible on the "
1168 "public web, hiding most of what goes on there from people unless they’re "
1169 "logged into Facebook, the company has nevertheless booby-trapped the entire "
1170 "web with surveillance tools in the form of Facebook “Like” buttons that web "
1171 "publishers include on their sites to boost their Facebook profiles. Facebook "
1172 "also makes various libraries and other useful code snippets available to web "
1173 "publishers that act as surveillance tendrils on the sites where they’re "
1174 "used, funneling information about visitors to the site — newspapers, dating "
1175 "sites, message boards — to Facebook."
1178 #. type: Content of: <book><chapter><blockquote><para>
1179 #: complete-book.xml:926
1181 "Big Tech is able to practice surveillance not just because it is tech but "
1182 "because it is <emphasis>big</emphasis>."
1185 #. type: Content of: <book><chapter><para>
1186 #: complete-book.xml:931
1188 "Facebook offers similar tools to app developers, so the apps — games, fart "
1189 "machines, business review services, apps for keeping abreast of your kid’s "
1190 "schooling — you use will send information about your activities to Facebook "
1191 "even if you don’t have a Facebook account and even if you don’t download or "
1192 "use Facebook apps. On top of all that, Facebook buys data from third-party "
1193 "brokers on shopping habits, physical location, use of “loyalty” programs, "
1194 "financial transactions, etc., and cross-references that with the dossiers it "
1195 "develops on activity on Facebook and with apps and the public web."
1198 #. type: Content of: <book><chapter><para>
1199 #: complete-book.xml:942
1201 "Though it’s easy to integrate the web with Facebook — linking to news "
1202 "stories and such — Facebook products are generally not available to be "
1203 "integrated back into the web itself. You can embed a tweet in a Facebook "
1204 "post, but if you embed a Facebook post in a tweet, you just get a link back "
1205 "to Facebook and must log in before you can see it. Facebook has used extreme "
1206 "technological and legal countermeasures to prevent rivals from allowing "
1207 "their users to embed Facebook snippets in competing services or to create "
1208 "alternative interfaces to Facebook that merge your Facebook inbox with those "
1209 "of other services that you use."
1212 #. type: Content of: <book><chapter><para>
1213 #: complete-book.xml:954
1215 "And Facebook is incredibly popular, with 2.3 billion claimed users (though "
1216 "many believe this figure to be inflated). Facebook has been used to organize "
1217 "genocidal pogroms, racist riots, anti-vaccination movements, flat Earth "
1218 "cults, and the political lives of some of the world’s ugliest, most brutal "
1219 "autocrats. There are some really alarming things going on in the world, and "
1220 "Facebook is implicated in many of them, so it’s easy to conclude that these "
1221 "bad things are the result of Facebook’s mind-control system, which it rents "
1222 "out to anyone with a few bucks to spend."
1225 #. type: Content of: <book><chapter><para>
1226 #: complete-book.xml:965
1228 "To understand what role Facebook plays in the formulation and mobilization "
1229 "of antisocial movements, we need to understand the dual nature of Facebook."
1232 #. type: Content of: <book><chapter><para>
1233 #: complete-book.xml:970
1235 "Because it has a lot of users and a lot of data about those users, Facebook "
1236 "is a very efficient tool for locating people with hard-to-find traits, the "
1237 "kinds of traits that are widely diffused in the population such that "
1238 "advertisers have historically struggled to find a cost-effective way to "
1239 "reach them. Think back to refrigerators: Most of us only replace our major "
1240 "appliances a few times in our entire lives. If you’re a refrigerator "
1241 "manufacturer or retailer, you have these brief windows in the life of a "
1242 "consumer during which they are pondering a purchase, and you have to somehow "
1243 "reach them. Anyone who’s ever registered a title change after buying a house "
1244 "can attest that appliance manufacturers are incredibly desperate to reach "
1245 "anyone who has even the slenderest chance of being in the market for a new "
1249 #. type: Content of: <book><chapter><para>
1250 #: complete-book.xml:985
1252 "Facebook makes finding people shopping for refrigerators a "
1253 "<emphasis>lot</emphasis> easier. It can target ads to people who’ve "
1254 "registered a new home purchase, to people who’ve searched for refrigerator "
1255 "buying advice, to people who have complained about their fridge dying, or "
1256 "any combination thereof. It can even target people who’ve recently bought "
1257 "<emphasis>other</emphasis> kitchen appliances on the theory that someone "
1258 "who’s just replaced their stove and dishwasher might be in a fridge-buying "
1259 "kind of mood. The vast majority of people who are reached by these ads will "
1260 "not be in the market for a new fridge, but — crucially — the percentage of "
1261 "people who <emphasis>are</emphasis> looking for fridges that these ads reach "
1262 "is <emphasis>much</emphasis> larger than it is than for any group that might "
1263 "be subjected to traditional, offline targeted refrigerator marketing."
1266 #. type: Content of: <book><chapter><para>
1267 #: complete-book.xml:1001
1269 "Facebook also makes it a lot easier to find people who have the same rare "
1270 "disease as you, which might have been impossible in earlier eras — the "
1271 "closest fellow sufferer might otherwise be hundreds of miles away. It makes "
1272 "it easier to find people who went to the same high school as you even though "
1273 "decades have passed and your former classmates have all been scattered to "
1274 "the four corners of the Earth."
1277 #. type: Content of: <book><chapter><para>
1278 #: complete-book.xml:1009
1280 "Facebook also makes it much easier to find people who hold the same rare "
1281 "political beliefs as you. If you’ve always harbored a secret affinity for "
1282 "socialism but never dared utter this aloud lest you be demonized by your "
1283 "neighbors, Facebook can help you discover other people who feel the same way "
1284 "(and it might just demonstrate to you that your affinity is more widespread "
1285 "than you ever suspected). It can make it easier to find people who share "
1286 "your sexual identity. And again, it can help you to understand that what "
1287 "you thought was a shameful secret that affected only you was really a widely "
1288 "shared trait, giving you both comfort and the courage to come out to the "
1289 "people in your life."
1292 #. type: Content of: <book><chapter><para>
1293 #: complete-book.xml:1022
1295 "All of this presents a dilemma for Facebook: Targeting makes the company’s "
1296 "ads more effective than traditional ads, but it also lets advertisers see "
1297 "just how effective their ads are. While advertisers are pleased to learn "
1298 "that Facebook ads are more effective than ads on systems with less "
1299 "sophisticated targeting, advertisers can also see that in nearly every case, "
1300 "the people who see their ads ignore them. Or, at best, the ads work on a "
1301 "subconscious level, creating nebulous unmeasurables like “brand "
1302 "recognition.” This means that the price per ad is very low in nearly every "
1306 #. type: Content of: <book><chapter><para>
1307 #: complete-book.xml:1033
1309 "To make things worse, many Facebook groups spark precious little "
1310 "discussion. Your little-league soccer team, the people with the same rare "
1311 "disease as you, and the people you share a political affinity with may "
1312 "exchange the odd flurry of messages at critical junctures, but on a daily "
1313 "basis, there’s not much to say to your old high school chums or other "
1314 "hockey-card collectors."
1317 #. type: Content of: <book><chapter><para>
1318 #: complete-book.xml:1041
1320 "With nothing but “organic” discussion, Facebook would not generate enough "
1321 "traffic to sell enough ads to make the money it needs to continually expand "
1322 "by buying up its competitors while returning handsome sums to its investors."
1325 #. type: Content of: <book><chapter><para>
1326 #: complete-book.xml:1047
1328 "So Facebook has to gin up traffic by sidetracking its own forums: Every time "
1329 "Facebook’s algorithm injects controversial materials — inflammatory "
1330 "political articles, conspiracy theories, outrage stories — into a group, it "
1331 "can hijack that group’s nominal purpose with its desultory discussions and "
1332 "supercharge those discussions by turning them into bitter, unproductive "
1333 "arguments that drag on and on. Facebook is optimized for engagement, not "
1334 "happiness, and it turns out that automated systems are pretty good at "
1335 "figuring out things that people will get angry about."
1338 #. type: Content of: <book><chapter><para>
1339 #: complete-book.xml:1058
1341 "Facebook <emphasis>can</emphasis> modify our behavior but only in a couple "
1342 "of trivial ways. First, it can lock in all your friends and family members "
1343 "so that you check and check and check with Facebook to find out what they "
1344 "are up to; and second, it can make you angry and anxious. It can force you "
1345 "to choose between being interrupted constantly by updates — a process that "
1346 "breaks your concentration and makes it hard to be introspective — and "
1347 "staying in touch with your friends. This is a very limited form of mind "
1348 "control, and it can only really make us miserable, angry, and anxious."
1351 #. type: Content of: <book><chapter><para>
1352 #: complete-book.xml:1069
1354 "This is why Facebook’s targeting systems — both the ones it shows to "
1355 "advertisers and the ones that let users find people who share their "
1356 "interests — are so next-gen and smooth and easy to use as well as why its "
1357 "message boards have a toolset that seems like it hasn’t changed since the "
1358 "mid-2000s. If Facebook delivered an equally flexible, sophisticated "
1359 "message-reading system to its users, those users could defend themselves "
1360 "against being nonconsensually eyeball-fucked with Donald Trump headlines."
1363 #. type: Content of: <book><chapter><para>
1364 #: complete-book.xml:1079
1366 "The more time you spend on Facebook, the more ads it gets to show you. The "
1367 "solution to Facebook’s ads only working one in a thousand times is for the "
1368 "company to try to increase how much time you spend on Facebook by a factor "
1369 "of a thousand. Rather than thinking of Facebook as a company that has "
1370 "figured out how to show you exactly the right ad in exactly the right way to "
1371 "get you to do what its advertisers want, think of it as a company that has "
1372 "figured out how to make you slog through an endless torrent of arguments "
1373 "even though they make you miserable, spending so much time on the site that "
1374 "it eventually shows you at least one ad that you respond to."
1377 #. type: Content of: <book><chapter><title>
1378 #: complete-book.xml:1091
1379 msgid "Monopoly and the right to the future tense"
1382 #. type: Content of: <book><chapter><para>
1383 #: complete-book.xml:1093
1385 "Zuboff and her cohort are particularly alarmed at the extent to which "
1386 "surveillance allows corporations to influence our decisions, taking away "
1387 "something she poetically calls “the right to the future tense” — that is, "
1388 "the right to decide for yourself what you will do in the future."
1391 #. type: Content of: <book><chapter><para>
1392 #: complete-book.xml:1100
1394 "It’s true that advertising can tip the scales one way or another: When "
1395 "you’re thinking of buying a fridge, a timely fridge ad might end the search "
1396 "on the spot. But Zuboff puts enormous and undue weight on the persuasive "
1397 "power of surveillance-based influence techniques. Most of these don’t work "
1398 "very well, and the ones that do won’t work for very long. The makers of "
1399 "these influence tools are confident they will someday refine them into "
1400 "systems of total control, but they are hardly unbiased observers, and the "
1401 "risks from their dreams coming true are very speculative."
1404 #. type: Content of: <book><chapter><para>
1405 #: complete-book.xml:1111
1407 "By contrast, Zuboff is rather sanguine about 40 years of lax antitrust "
1408 "practice that has allowed a handful of companies to dominate the internet, "
1409 "ushering in an information age with, <ulink "
1410 "url=\"https://twitter.com/tveastman/status/1069674780826071040\">as one "
1411 "person on Twitter noted</ulink>, five giant websites each filled with "
1412 "screenshots of the other four."
1415 #. type: Content of: <book><chapter><para>
1416 #: complete-book.xml:1119
1418 "However, if we are to be alarmed that we might lose the right to choose for "
1419 "ourselves what our future will hold, then monopoly’s nonspeculative, "
1420 "concrete, here-and-now harms should be front and center in our debate over "
1424 #. type: Content of: <book><chapter><para>
1425 #: complete-book.xml:1125
1427 "Start with “digital rights management.” In 1998, Bill Clinton signed the "
1428 "Digital Millennium Copyright Act (DMCA) into law. It’s a complex piece of "
1429 "legislation with many controversial clauses but none more so than Section "
1430 "1201, the “anti-circumvention” rule."
1433 #. type: Content of: <book><chapter><para>
1434 #: complete-book.xml:1131
1436 "This is a blanket ban on tampering with systems that restrict access to "
1437 "copyrighted works. The ban is so thoroughgoing that it prohibits removing a "
1438 "copyright lock even when no copyright infringement takes place. This is by "
1439 "design: The activities that the DMCA’s Section 1201 sets out to ban are not "
1440 "copyright infringements; rather, they are legal activities that frustrate "
1441 "manufacturers’ commercial plans."
1444 #. type: Content of: <book><chapter><para>
1445 #: complete-book.xml:1139
1447 "For example, Section 1201’s first major application was on DVD players as a "
1448 "means of enforcing the region coding built into those devices. DVD-CCA, the "
1449 "body that standardized DVDs and DVD players, divided the world into six "
1450 "regions and specified that DVD players must check each disc to determine "
1451 "which regions it was authorized to be played in. DVD players would have "
1452 "their own corresponding region (a DVD player bought in the U.S. would be "
1453 "region 1 while one bought in India would be region 5). If the player and the "
1454 "disc’s region matched, the player would play the disc; otherwise, it would "
1458 #. type: Content of: <book><chapter><para>
1459 #: complete-book.xml:1151
1461 "However, watching a lawfully produced disc in a country other than the one "
1462 "where you purchased it is not copyright infringement — it’s the "
1463 "opposite. Copyright law imposes this duty on customers for a movie: You must "
1464 "go into a store, find a licensed disc, and pay the asking price. Do that — "
1465 "and <emphasis>nothing else</emphasis> — and you and copyright are square "
1469 #. type: Content of: <book><chapter><para>
1470 #: complete-book.xml:1159
1472 "The fact that a movie studio wants to charge Indians less than Americans or "
1473 "release in Australia later than it releases in the U.K. has no bearing on "
1474 "copyright law. Once you lawfully acquire a DVD, it is no copyright "
1475 "infringement to watch it no matter where you happen to be."
1478 #. type: Content of: <book><chapter><para>
1479 #: complete-book.xml:1166
1481 "So DVD and DVD player manufacturers would not be able to use accusations of "
1482 "abetting copyright infringement to punish manufacturers who made "
1483 "noncompliant players that would play discs from any region or repair shops "
1484 "that modified players to let you watch out-of-region discs or software "
1485 "programmers who created programs to let you do this."
1488 #. type: Content of: <book><chapter><para>
1489 #: complete-book.xml:1174
1491 "That’s where Section 1201 of the DMCA comes in: By banning tampering with an "
1492 "“access control,” the rule gave manufacturers and rights holders standing to "
1493 "sue competitors who released superior products with lawful features that the "
1494 "market demanded (in this case, region-free players)."
1497 #. type: Content of: <book><chapter><para>
1498 #: complete-book.xml:1181
1500 "This is an odious scam against consumers, but as time went by, Section 1201 "
1501 "grew to encompass a rapidly expanding constellation of devices and services "
1502 "as canny manufacturers have realized certain things:"
1505 #. type: Content of: <book><chapter><itemizedlist><listitem><para>
1506 #: complete-book.xml:1189
1508 "Any device with software in it contains a “copyrighted work” — i.e., the "
1512 #. type: Content of: <book><chapter><itemizedlist><listitem><para>
1513 #: complete-book.xml:1195
1515 "A device can be designed so that reconfiguring the software requires "
1516 "bypassing an “access control for copyrighted works,” which is a potential "
1517 "felony under Section 1201."
1520 #. type: Content of: <book><chapter><itemizedlist><listitem><para>
1521 #: complete-book.xml:1202
1523 "Thus, companies can control their customers’ behavior after they take home "
1524 "their purchases by designing products so that all unpermitted uses require "
1525 "modifications that fall afoul of Section 1201."
1528 #. type: Content of: <book><chapter><para>
1529 #: complete-book.xml:1210
1531 "Section 1201 then becomes a means for manufacturers of all descriptions to "
1532 "force their customers to arrange their affairs to benefit the manufacturers’ "
1533 "shareholders instead of themselves."
1536 #. type: Content of: <book><chapter><para>
1537 #: complete-book.xml:1215
1539 "This manifests in many ways: from a new generation of inkjet printers that "
1540 "use countermeasures to prevent third-party ink that cannot be bypassed "
1541 "without legal risks to similar systems in tractors that prevent third-party "
1542 "technicians from swapping in the manufacturer’s own parts that are not "
1543 "recognized by the tractor’s control system until it is supplied with a "
1544 "manufacturer’s unlock code."
1547 #. type: Content of: <book><chapter><para>
1548 #: complete-book.xml:1224
1550 "Closer to home, Apple’s iPhones use these measures to prevent both "
1551 "third-party service and third-party software installation. This allows Apple "
1552 "to decide when an iPhone is beyond repair and must be shredded and "
1553 "landfilled as opposed to the iPhone’s purchaser. (Apple is notorious for its "
1554 "environmentally catastrophic policy of destroying old electronics rather "
1555 "than permitting them to be cannibalized for parts.) This is a very useful "
1556 "power to wield, especially in light of CEO Tim Cook’s January 2019 warning "
1557 "to investors that the company’s profits are endangered by customers choosing "
1558 "to hold onto their phones for longer rather than replacing them."
1561 #. type: Content of: <book><chapter><para>
1562 #: complete-book.xml:1237
1564 "Apple’s use of copyright locks also allows it to establish a monopoly over "
1565 "how its customers acquire software for their mobile devices. The App Store’s "
1566 "commercial terms guarantee Apple a share of all revenues generated by the "
1567 "apps sold there, meaning that Apple gets paid when you buy an app from its "
1568 "store and then continues to get paid every time you buy something using that "
1569 "app. This comes out of the bottom line of software developers, who must "
1570 "either charge more or accept lower profits for their products."
1573 #. type: Content of: <book><chapter><para>
1574 #: complete-book.xml:1247
1576 "Crucially, Apple’s use of copyright locks gives it the power to make "
1577 "editorial decisions about which apps you may and may not install on your own "
1578 "device. Apple has used this power to <ulink "
1579 "url=\"https://www.telegraph.co.uk/technology/apple/5982243/Apple-bans-dictionary-from-App-Store-over-swear-words.html\">reject "
1580 "dictionaries</ulink> for containing obscene words; to <ulink "
1581 "url=\"https://www.vice.com/en_us/article/538kan/apple-just-banned-the-app-that-tracks-us-drone-strikes-again\">limit "
1582 "political speech</ulink>, especially from apps that make sensitive political "
1583 "commentary such as an app that notifies you every time a U.S. drone kills "
1584 "someone somewhere in the world; and to <ulink "
1585 "url=\"https://www.eurogamer.net/articles/2016-05-19-palestinian-indie-game-must-not-be-called-a-game-apple-says\">object "
1586 "to a game</ulink> that commented on the Israel-Palestine conflict."
1589 #. type: Content of: <book><chapter><para>
1590 #: complete-book.xml:1260
1592 "Apple often justifies monopoly power over software installation in the name "
1593 "of security, arguing that its vetting of apps for its store means that it "
1594 "can guard its users against apps that contain surveillance code. But this "
1595 "cuts both ways. In China, the government <ulink "
1596 "url=\"https://www.ft.com/content/ad42e536-cf36-11e7-b781-794ce08b24dc\">ordered "
1597 "Apple to prohibit the sale of privacy tools</ulink> like VPNs with the "
1598 "exception of VPNs that had deliberately introduced flaws designed to let the "
1599 "Chinese state eavesdrop on users. Because Apple uses technological "
1600 "countermeasures — with legal backstops — to block customers from installing "
1601 "unauthorized apps, Chinese iPhone owners cannot readily (or legally) acquire "
1602 "VPNs that would protect them from Chinese state snooping."
1605 #. type: Content of: <book><chapter><para>
1606 #: complete-book.xml:1274
1608 "Zuboff calls surveillance capitalism a “rogue capitalism.” Theoreticians of "
1609 "capitalism claim that its virtue is that it <ulink "
1610 "url=\"https://en.wikipedia.org/wiki/Price_signal\">aggregates information in "
1611 "the form of consumers’ decisions</ulink>, producing efficient "
1612 "markets. Surveillance capitalism’s supposed power to rob its victims of "
1613 "their free will through computationally supercharged influence campaigns "
1614 "means that our markets no longer aggregate customers’ decisions because we "
1615 "customers no longer decide — we are given orders by surveillance "
1616 "capitalism’s mind-control rays."
1619 #. type: Content of: <book><chapter><para>
1620 #: complete-book.xml:1285
1622 "If our concern is that markets cease to function when consumers can no "
1623 "longer make choices, then copyright locks should concern us at "
1624 "<emphasis>least</emphasis> as much as influence campaigns. An influence "
1625 "campaign might nudge you to buy a certain brand of phone; but the copyright "
1626 "locks on that phone absolutely determine where you get it serviced, which "
1627 "apps can run on it, and when you have to throw it away rather than fixing "
1631 #. type: Content of: <book><chapter><title>
1632 #: complete-book.xml:1294
1633 msgid "Search order and the right to the future tense"
1636 #. type: Content of: <book><chapter><para>
1637 #: complete-book.xml:1296
1639 "Markets are posed as a kind of magic: By discovering otherwise hidden "
1640 "information conveyed by the free choices of consumers, those consumers’ "
1641 "local knowledge is integrated into a self-correcting system that makes "
1642 "efficient allocations—more efficient than any computer could calculate. But "
1643 "monopolies are incompatible with that notion. When you only have one app "
1644 "store, the owner of the store — not the consumer — decides on the range of "
1645 "choices. As Boss Tweed once said, “I don’t care who does the electing, so "
1646 "long as I get to do the nominating.” A monopolized market is an election "
1647 "whose candidates are chosen by the monopolist."
1650 #. type: Content of: <book><chapter><para>
1651 #: complete-book.xml:1308
1653 "This ballot rigging is made more pernicious by the existence of monopolies "
1654 "over search order. Google’s search market share is about 90%. When Google’s "
1655 "ranking algorithm puts a result for a popular search term in its top 10, "
1656 "that helps determine the behavior of millions of people. If Google’s answer "
1657 "to “Are vaccines dangerous?” is a page that rebuts anti-vax conspiracy "
1658 "theories, then a sizable portion of the public will learn that vaccines are "
1659 "safe. If, on the other hand, Google sends those people to a site affirming "
1660 "the anti-vax conspiracies, a sizable portion of those millions will come "
1661 "away convinced that vaccines are dangerous."
1664 #. type: Content of: <book><chapter><para>
1665 #: complete-book.xml:1320
1667 "Google’s algorithm is often tricked into serving disinformation as a "
1668 "prominent search result. But in these cases, Google isn’t persuading people "
1669 "to change their minds; it’s just presenting something untrue as fact when "
1670 "the user has no cause to doubt it."
1673 #. type: Content of: <book><chapter><para>
1674 #: complete-book.xml:1326
1676 "This is true whether the search is for “Are vaccines dangerous?” or “best "
1677 "restaurants near me.” Most users will never look past the first page of "
1678 "search results, and when the overwhelming majority of people all use the "
1679 "same search engine, the ranking algorithm deployed by that search engine "
1680 "will determine myriad outcomes (whether to adopt a child, whether to have "
1681 "cancer surgery, where to eat dinner, where to move, where to apply for a "
1682 "job) to a degree that vastly outstrips any behavioral outcomes dictated by "
1683 "algorithmic persuasion techniques."
1686 #. type: Content of: <book><chapter><para>
1687 #: complete-book.xml:1337
1689 "Many of the questions we ask search engines have no empirically correct "
1690 "answers: “Where should I eat dinner?” is not an objective question. Even "
1691 "questions that do have correct answers (“Are vaccines dangerous?”) don’t "
1692 "have one empirically superior source for that answer. Many pages affirm the "
1693 "safety of vaccines, so which one goes first? Under conditions of "
1694 "competition, consumers can choose from many search engines and stick with "
1695 "the one whose algorithmic judgment suits them best, but under conditions of "
1696 "monopoly, we all get our answers from the same place."
1699 #. type: Content of: <book><chapter><para>
1700 #: complete-book.xml:1348
1702 "Google’s search dominance isn’t a matter of pure merit: The company has "
1703 "leveraged many tactics that would have been prohibited under classical, "
1704 "pre-Ronald-Reagan antitrust enforcement standards to attain its "
1705 "dominance. After all, this is a company that has developed two major "
1706 "products: a really good search engine and a pretty good Hotmail clone. Every "
1707 "other major success it’s had — Android, YouTube, Google Maps, etc. — has "
1708 "come through an acquisition of a nascent competitor. Many of the company’s "
1709 "key divisions, such as the advertising technology of DoubleClick, violate "
1710 "the historical antitrust principle of structural separation, which forbade "
1711 "firms from owning subsidiaries that competed with their "
1712 "customers. Railroads, for example, were barred from owning freight companies "
1713 "that competed with the shippers whose freight they carried."
1716 #. type: Content of: <book><chapter><para>
1717 #: complete-book.xml:1364
1719 "If we’re worried about giant companies subverting markets by stripping "
1720 "consumers of their ability to make free choices, then vigorous antitrust "
1721 "enforcement seems like an excellent remedy. If we’d denied Google the right "
1722 "to effect its many mergers, we would also have probably denied it its total "
1723 "search dominance. Without that dominance, the pet theories, biases, errors "
1724 "(and good judgment, too) of Google search engineers and product managers "
1725 "would not have such an outsized effect on consumer choice."
1728 #. type: Content of: <book><chapter><para>
1729 #: complete-book.xml:1374
1731 "This goes for many other companies. Amazon, a classic surveillance "
1732 "capitalist, is obviously the dominant tool for searching Amazon — though "
1733 "many people find their way to Amazon through Google searches and Facebook "
1734 "posts — and obviously, Amazon controls Amazon search. That means that "
1735 "Amazon’s own self-serving editorial choices—like promoting its own house "
1736 "brands over rival goods from its sellers as well as its own pet theories, "
1737 "biases, and errors— determine much of what we buy on Amazon. And since "
1738 "Amazon is the dominant e-commerce retailer outside of China and since it "
1739 "attained that dominance by buying up both large rivals and nascent "
1740 "competitors in defiance of historical antitrust rules, we can blame the "
1741 "monopoly for stripping consumers of their right to the future tense and the "
1742 "ability to shape markets by making informed choices."
1745 #. type: Content of: <book><chapter><para>
1746 #: complete-book.xml:1389
1748 "Not every monopolist is a surveillance capitalist, but that doesn’t mean "
1749 "they’re not able to shape consumer choices in wide-ranging ways. Zuboff "
1750 "lauds Apple for its App Store and iTunes Store, insisting that adding price "
1751 "tags to the features on its platforms has been the secret to resisting "
1752 "surveillance and thus creating markets. But Apple is the only retailer "
1753 "allowed to sell on its platforms, and it’s the second-largest mobile device "
1754 "vendor in the world. The independent software vendors that sell through "
1755 "Apple’s marketplace accuse the company of the same surveillance sins as "
1756 "Amazon and other big retailers: spying on its customers to find lucrative "
1757 "new products to launch, effectively using independent software vendors as "
1758 "free-market researchers, then forcing them out of any markets they discover."
1761 #. type: Content of: <book><chapter><para>
1762 #: complete-book.xml:1404
1764 "Because of its use of copyright locks, Apple’s mobile customers are not "
1765 "legally allowed to switch to a rival retailer for its apps if they want to "
1766 "do so on an iPhone. Apple, obviously, is the only entity that gets to decide "
1767 "how it ranks the results of search queries in its stores. These decisions "
1768 "ensure that some apps are often installed (because they appear on page one) "
1769 "and others are never installed (because they appear on page one "
1770 "million). Apple’s search-ranking design decisions have a vastly more "
1771 "significant effect on consumer behaviors than influence campaigns delivered "
1772 "by surveillance capitalism’s ad-serving bots."
1775 #. type: Content of: <book><chapter><title>
1776 #: complete-book.xml:1416
1777 msgid "Monopolists can afford sleeping pills for watchdogs"
1780 #. type: Content of: <book><chapter><para>
1781 #: complete-book.xml:1418
1783 "Only the most extreme market ideologues think that markets can self-regulate "
1784 "without state oversight. Markets need watchdogs — regulators, lawmakers, and "
1785 "other elements of democratic control — to keep them honest. When these "
1786 "watchdogs sleep on the job, then markets cease to aggregate consumer choices "
1787 "because those choices are constrained by illegitimate and deceptive "
1788 "activities that companies are able to get away with because no one is "
1789 "holding them to account."
1792 #. type: Content of: <book><chapter><para>
1793 #: complete-book.xml:1428
1795 "But this kind of regulatory capture doesn’t come cheap. In competitive "
1796 "sectors, where rivals are constantly eroding one another’s margins, "
1797 "individual firms lack the surplus capital to effectively lobby for laws and "
1798 "regulations that serve their ends."
1801 #. type: Content of: <book><chapter><para>
1802 #: complete-book.xml:1434
1804 "Many of the harms of surveillance capitalism are the result of weak or "
1805 "nonexistent regulation. Those regulatory vacuums spring from the power of "
1806 "monopolists to resist stronger regulation and to tailor what regulation "
1807 "exists to permit their existing businesses."
1810 #. type: Content of: <book><chapter><para>
1811 #: complete-book.xml:1440
1813 "Here’s an example: When firms over-collect and over-retain our data, they "
1814 "are at increased risk of suffering a breach — you can’t leak data you never "
1815 "collected, and once you delete all copies of that data, you can no longer "
1816 "leak it. For more than a decade, we’ve lived through an endless parade of "
1817 "ever-worsening data breaches, each one uniquely horrible in the scale of "
1818 "data breached and the sensitivity of that data."
1821 #. type: Content of: <book><chapter><para>
1822 #: complete-book.xml:1449
1824 "But still, firms continue to over-collect and over-retain our data for three "
1828 #. type: Content of: <book><chapter><para>
1829 #: complete-book.xml:1453
1831 "<emphasis role=\"strong\">1. They are locked in the aforementioned limbic "
1832 "arms race with our capacity to shore up our attentional defense systems to "
1833 "resist their new persuasion techniques.</emphasis> They’re also locked in an "
1834 "arms race with their competitors to find new ways to target people for sales "
1835 "pitches. As soon as they discover a soft spot in our attentional defenses (a "
1836 "counterintuitive, unobvious way to target potential refrigerator buyers), "
1837 "the public begins to wise up to the tactic, and their competitors leap on "
1838 "it, hastening the day in which all potential refrigerator buyers have been "
1839 "inured to the pitch."
1842 #. type: Content of: <book><chapter><para>
1843 #: complete-book.xml:1465
1845 "<emphasis role=\"strong\">2. They believe the surveillance capitalism "
1846 "story.</emphasis> Data is cheap to aggregate and store, and both proponents "
1847 "and opponents of surveillance capitalism have assured managers and product "
1848 "designers that if you collect enough data, you will be able to perform "
1849 "sorcerous acts of mind control, thus supercharging your sales. Even if you "
1850 "never figure out how to profit from the data, someone else will eventually "
1851 "offer to buy it from you to give it a try. This is the hallmark of all "
1852 "economic bubbles: acquiring an asset on the assumption that someone else "
1853 "will buy it from you for more than you paid for it, often to sell to someone "
1854 "else at an even greater price."
1857 #. type: Content of: <book><chapter><para>
1858 #: complete-book.xml:1478
1860 "<emphasis role=\"strong\">3. The penalties for leaking data are "
1861 "negligible.</emphasis> Most countries limit these penalties to actual "
1862 "damages, meaning that consumers who’ve had their data breached have to show "
1863 "actual monetary harms to get a reward. In 2014, Home Depot disclosed that it "
1864 "had lost credit-card data for 53 million of its customers, but it settled "
1865 "the matter by paying those customers about $0.34 each — and a third of that "
1866 "$0.34 wasn’t even paid in cash. It took the form of a credit to procure a "
1867 "largely ineffectual credit-monitoring service."
1870 #. type: Content of: <book><chapter><para>
1871 #: complete-book.xml:1489
1873 "But the harms from breaches are much more extensive than these "
1874 "actual-damages rules capture. Identity thieves and fraudsters are wily and "
1875 "endlessly inventive. All the vast breaches of our century are being "
1876 "continuously recombined, the data sets merged and mined for new ways to "
1877 "victimize the people whose data was present in them. Any reasonable, "
1878 "evidence-based theory of deterrence and compensation for breaches would not "
1879 "confine damages to actual damages but rather would allow users to claim "
1880 "these future harms."
1883 #. type: Content of: <book><chapter><para>
1884 #: complete-book.xml:1499
1886 "However, even the most ambitious privacy rules, such as the EU General Data "
1887 "Protection Regulation, fall far short of capturing the negative "
1888 "externalities of the platforms’ negligent over-collection and "
1889 "over-retention, and what penalties they do provide are not aggressively "
1890 "pursued by regulators."
1893 #. type: Content of: <book><chapter><para>
1894 #: complete-book.xml:1506
1896 "This tolerance of — or indifference to — data over-collection and "
1897 "over-retention can be ascribed in part to the sheer lobbying muscle of the "
1898 "platforms. They are so profitable that they can handily afford to divert "
1899 "gigantic sums to fight any real change — that is, change that would force "
1900 "them to internalize the costs of their surveillance activities."
1903 #. type: Content of: <book><chapter><para>
1904 #: complete-book.xml:1514
1906 "And then there’s state surveillance, which the surveillance capitalism story "
1907 "dismisses as a relic of another era when the big worry was being jailed for "
1908 "your dissident speech, not having your free will stripped away with machine "
1912 #. type: Content of: <book><chapter><para>
1913 #: complete-book.xml:1520
1915 "But state surveillance and private surveillance are intimately related. As "
1916 "we saw when Apple was conscripted by the Chinese government as a vital "
1917 "collaborator in state surveillance, the only really affordable and tractable "
1918 "way to conduct mass surveillance on the scale practiced by modern states — "
1919 "both “free” and autocratic states — is to suborn commercial services."
1922 #. type: Content of: <book><chapter><para>
1923 #: complete-book.xml:1528
1925 "Whether it’s Google being used as a location tracking tool by local law "
1926 "enforcement across the U.S. or the use of social media tracking by the "
1927 "Department of Homeland Security to build dossiers on participants in "
1928 "protests against Immigration and Customs Enforcement’s family separation "
1929 "practices, any hard limits on surveillance capitalism would hamstring the "
1930 "state’s own surveillance capability. Without Palantir, Amazon, Google, and "
1931 "other major tech contractors, U.S. cops would not be able to spy on Black "
1932 "people, ICE would not be able to manage the caging of children at the U.S. "
1933 "border, and state welfare systems would not be able to purge their rolls by "
1934 "dressing up cruelty as empiricism and claiming that poor and vulnerable "
1935 "people are ineligible for assistance. At least some of the states’ "
1936 "unwillingness to take meaningful action to curb surveillance should be "
1937 "attributed to this symbiotic relationship. There is no mass state "
1938 "surveillance without mass commercial surveillance."
1941 #. type: Content of: <book><chapter><para>
1942 #: complete-book.xml:1546
1944 "Monopolism is key to the project of mass state surveillance. It’s true that "
1945 "smaller tech firms are apt to be less well-defended than Big Tech, whose "
1946 "security experts are drawn from the tops of their field and who are given "
1947 "enormous resources to secure and monitor their systems against "
1948 "intruders. But smaller firms also have less to protect: fewer users whose "
1949 "data is more fragmented across more systems and have to be suborned one at a "
1950 "time by state actors."
1953 #. type: Content of: <book><chapter><para>
1954 #: complete-book.xml:1555
1956 "A concentrated tech sector that works with authorities is a much more "
1957 "powerful ally in the project of mass state surveillance than a fragmented "
1958 "one composed of smaller actors. The U.S. tech sector is small enough that "
1959 "all of its top executives fit around a single boardroom table in Trump Tower "
1960 "in 2017, shortly after Trump’s inauguration. Most of its biggest players bid "
1961 "to win JEDI, the Pentagon’s $10 billion Joint Enterprise Defense "
1962 "Infrastructure cloud contract. Like other highly concentrated industries, "
1963 "Big Tech rotates its key employees in and out of government service, sending "
1964 "them to serve in the Department of Defense and the White House, then hiring "
1965 "ex-Pentagon and ex-DOD top staffers and officers to work in their own "
1966 "government relations departments."
1969 #. type: Content of: <book><chapter><para>
1970 #: complete-book.xml:1569
1972 "They can even make a good case for doing this: After all, when there are "
1973 "only four or five big companies in an industry, everyone qualified to "
1974 "regulate those companies has served as an executive in at least a couple of "
1975 "them — because, likewise, when there are only five companies in an industry, "
1976 "everyone qualified for a senior role at any of them is by definition working "
1977 "at one of the other ones."
1980 #. type: Content of: <book><chapter><blockquote><para>
1981 #: complete-book.xml:1578
1983 "While surveillance doesn’t cause monopolies, monopolies certainly abet "
1987 #. type: Content of: <book><chapter><para>
1988 #: complete-book.xml:1583
1990 "Industries that are competitive are fragmented — composed of companies that "
1991 "are at each other’s throats all the time and eroding one another’s margins "
1992 "in bids to steal their best customers. This leaves them with much more "
1993 "limited capital to use to lobby for favorable rules and a much harder job of "
1994 "getting everyone to agree to pool their resources to benefit the industry as "
1998 #. type: Content of: <book><chapter><para>
1999 #: complete-book.xml:1591
2001 "Surveillance combined with machine learning is supposed to be an existential "
2002 "crisis, a species-defining moment at which our free will is just a few more "
2003 "advances in the field from being stripped away. I am skeptical of this "
2004 "claim, but I <emphasis>do</emphasis> think that tech poses an existential "
2005 "threat to our society and possibly our species."
2008 #. type: Content of: <book><chapter><para>
2009 #: complete-book.xml:1599
2010 msgid "But that threat grows out of monopoly."
2013 #. type: Content of: <book><chapter><para>
2014 #: complete-book.xml:1602
2016 "One of the consequences of tech’s regulatory capture is that it can shift "
2017 "liability for poor security decisions onto its customers and the wider "
2018 "society. It is absolutely normal in tech for companies to obfuscate the "
2019 "workings of their products, to make them deliberately hard to understand, "
2020 "and to threaten security researchers who seek to independently audit those "
2024 #. type: Content of: <book><chapter><para>
2025 #: complete-book.xml:1610
2027 "IT is the only field in which this is practiced: No one builds a bridge or a "
2028 "hospital and keeps the composition of the steel or the equations used to "
2029 "calculate load stresses a secret. It is a frankly bizarre practice that "
2030 "leads, time and again, to grotesque security defects on farcical scales, "
2031 "with whole classes of devices being revealed as vulnerable long after they "
2032 "are deployed in the field and put into sensitive places."
2035 #. type: Content of: <book><chapter><para>
2036 #: complete-book.xml:1619
2038 "The monopoly power that keeps any meaningful consequences for breaches at "
2039 "bay means that tech companies continue to build terrible products that are "
2040 "insecure by design and that end up integrated into our lives, in possession "
2041 "of our data, and connected to our physical world. For years, Boeing has "
2042 "struggled with the aftermath of a series of bad technology decisions that "
2043 "made its 737 fleet a global pariah, a rare instance in which bad tech "
2044 "decisions have been seriously punished in the market."
2047 #. type: Content of: <book><chapter><para>
2048 #: complete-book.xml:1629
2050 "These bad security decisions are compounded yet again by the use of "
2051 "copyright locks to enforce business-model decisions against "
2052 "consumers. Recall that these locks have become the go-to means for shaping "
2053 "consumer behavior, making it technically impossible to use third-party ink, "
2054 "insulin, apps, or service depots in connection with your lawfully acquired "
2058 #. type: Content of: <book><chapter><para>
2059 #: complete-book.xml:1637
2061 "Recall also that these copyright locks are backstopped by legislation (such "
2062 "as Section 1201 of the DMCA or Article 6 of the 2001 EU Copyright Directive) "
2063 "that ban tampering with (“circumventing”) them, and these statutes have been "
2064 "used to threaten security researchers who make disclosures about "
2065 "vulnerabilities without permission from manufacturers."
2068 #. type: Content of: <book><chapter><para>
2069 #: complete-book.xml:1645
2071 "This amounts to a manufacturer’s veto over safety warnings and "
2072 "criticism. While this is far from the legislative intent of the DMCA and its "
2073 "sister statutes around the world, Congress has not intervened to clarify the "
2074 "statute nor will it because to do so would run counter to the interests of "
2075 "powerful, large firms whose lobbying muscle is unstoppable."
2078 #. type: Content of: <book><chapter><para>
2079 #: complete-book.xml:1653
2081 "Copyright locks are a double whammy: They create bad security decisions that "
2082 "can’t be freely investigated or discussed. If markets are supposed to be "
2083 "machines for aggregating information (and if surveillance capitalism’s "
2084 "notional mind-control rays are what make it a “rogue capitalism” because it "
2085 "denies consumers the power to make decisions), then a program of legally "
2086 "enforced ignorance of the risks of products makes monopolism even more of a "
2087 "“rogue capitalism” than surveillance capitalism’s influence campaigns."
2090 #. type: Content of: <book><chapter><para>
2091 #: complete-book.xml:1663
2093 "And unlike mind-control rays, enforced silence over security is an "
2094 "immediate, documented problem, and it <emphasis>does</emphasis> constitute "
2095 "an existential threat to our civilization and possibly our species. The "
2096 "proliferation of insecure devices — especially devices that spy on us and "
2097 "especially when those devices also can manipulate the physical world by, "
2098 "say, steering your car or flipping a breaker at a power station — is a kind "
2099 "of technology debt."
2102 #. type: Content of: <book><chapter><para>
2103 #: complete-book.xml:1672
2105 "In software design, “technology debt” refers to old, baked-in decisions that "
2106 "turn out to be bad ones in hindsight. Perhaps a long-ago developer decided "
2107 "to incorporate a networking protocol made by a vendor that has since stopped "
2108 "supporting it. But everything in the product still relies on that "
2109 "superannuated protocol, and so, with each revision, the product team has to "
2110 "work around this obsolete core, adding compatibility layers, surrounding it "
2111 "with security checks that try to shore up its defenses, and so on. These "
2112 "Band-Aid measures compound the debt because every subsequent revision has to "
2113 "make allowances for <emphasis>them</emphasis>, too, like interest mounting "
2114 "on a predatory subprime loan. And like a subprime loan, the interest mounts "
2115 "faster than you can hope to pay it off: The product team has to put so much "
2116 "energy into maintaining this complex, brittle system that they don’t have "
2117 "any time left over to refactor the product from the ground up and “pay off "
2118 "the debt” once and for all."
2121 #. type: Content of: <book><chapter><para>
2122 #: complete-book.xml:1690
2124 "Typically, technology debt results in a technological bankruptcy: The "
2125 "product gets so brittle and unsustainable that it fails "
2126 "catastrophically. Think of the antiquated COBOL-based banking and accounting "
2127 "systems that fell over at the start of the pandemic emergency when "
2128 "confronted with surges of unemployment claims. Sometimes that ends the "
2129 "product; sometimes it takes the company down with it. Being caught in the "
2130 "default of a technology debt is scary and traumatic, just like losing your "
2131 "house due to bankruptcy is scary and traumatic."
2134 #. type: Content of: <book><chapter><para>
2135 #: complete-book.xml:1701
2137 "But the technology debt created by copyright locks isn’t individual debt; "
2138 "it’s systemic. Everyone in the world is exposed to this over-leverage, as "
2139 "was the case with the 2008 financial crisis. When that debt comes due — when "
2140 "we face a cascade of security breaches that threaten global shipping and "
2141 "logistics, the food supply, pharmaceutical production pipelines, emergency "
2142 "communications, and other critical systems that are accumulating technology "
2143 "debt in part due to the presence of deliberately insecure and deliberately "
2144 "unauditable copyright locks — it will indeed pose an existential risk."
2147 #. type: Content of: <book><chapter><title>
2148 #: complete-book.xml:1713
2149 msgid "Privacy and monopoly"
2152 #. type: Content of: <book><chapter><para>
2153 #: complete-book.xml:1715
2155 "Many tech companies are gripped by an orthodoxy that holds that if they just "
2156 "gather enough data on enough of our activities, everything else is possible "
2157 "— the mind control and endless profits. This is an unfalsifiable hypothesis: "
2158 "If data gives a tech company even a tiny improvement in behavior prediction "
2159 "and modification, the company declares that it has taken the first step "
2160 "toward global domination with no end in sight. If a company "
2161 "<emphasis>fails</emphasis> to attain any improvements from gathering and "
2162 "analyzing data, it declares success to be just around the corner, attainable "
2163 "once more data is in hand."
2166 #. type: Content of: <book><chapter><para>
2167 #: complete-book.xml:1727
2169 "Surveillance tech is far from the first industry to embrace a nonsensical, "
2170 "self-serving belief that harms the rest of the world, and it is not the "
2171 "first industry to profit handsomely from such a delusion. Long before "
2172 "hedge-fund managers were claiming (falsely) that they could beat the "
2173 "S&P 500, there were plenty of other “respectable” industries that have "
2174 "been revealed as quacks in hindsight. From the makers of radium "
2175 "suppositories (a real thing!) to the cruel sociopaths who claimed they "
2176 "could “cure” gay people, history is littered with the formerly respectable "
2177 "titans of discredited industries."
2180 #. type: Content of: <book><chapter><para>
2181 #: complete-book.xml:1739
2183 "This is not to say that there’s nothing wrong with Big Tech and its "
2184 "ideological addiction to data. While surveillance’s benefits are mostly "
2185 "overstated, its harms are, if anything, <emphasis>understated</emphasis>."
2188 #. type: Content of: <book><chapter><para>
2189 #: complete-book.xml:1745
2191 "There’s real irony here. The belief in surveillance capitalism as a “rogue "
2192 "capitalism” is driven by the belief that markets wouldn’t tolerate firms "
2193 "that are gripped by false beliefs. An oil company that has false beliefs "
2194 "about where the oil is will eventually go broke digging dry wells after all."
2197 #. type: Content of: <book><chapter><para>
2198 #: complete-book.xml:1752
2200 "But monopolists get to do terrible things for a long time before they pay "
2201 "the price. Think of how concentration in the finance sector allowed the "
2202 "subprime crisis to fester as bond-rating agencies, regulators, investors, "
2203 "and critics all fell under the sway of a false belief that complex "
2204 "mathematics could construct “fully hedged” debt instruments that could not "
2205 "possibly default. A small bank that engaged in this kind of malfeasance "
2206 "would simply go broke rather than outrunning the inevitable crisis, perhaps "
2207 "growing so big that it averted it altogether. But large banks were able to "
2208 "continue to attract investors, and when they finally "
2209 "<emphasis>did</emphasis> come a-cropper, the world’s governments bailed them "
2210 "out. The worst offenders of the subprime crisis are bigger than they were in "
2211 "2008, bringing home more profits and paying their execs even larger sums."
2214 #. type: Content of: <book><chapter><para>
2215 #: complete-book.xml:1767
2217 "Big Tech is able to practice surveillance not just because it is tech but "
2218 "because it is <emphasis>big</emphasis>. The reason every web publisher "
2219 "embeds a Facebook “Like” button is that Facebook dominates the internet’s "
2220 "social media referrals — and every one of those “Like” buttons spies on "
2221 "everyone who lands on a page that contains them (see also: Google Analytics "
2222 "embeds, Twitter buttons, etc.)."
2225 #. type: Content of: <book><chapter><para>
2226 #: complete-book.xml:1776
2228 "The reason the world’s governments have been slow to create meaningful "
2229 "penalties for privacy breaches is that Big Tech’s concentration produces "
2230 "huge profits that can be used to lobby against those penalties — and Big "
2231 "Tech’s concentration means that the companies involved are able to arrive at "
2232 "a unified negotiating position that supercharges the lobbying."
2235 #. type: Content of: <book><chapter><para>
2236 #: complete-book.xml:1784
2238 "The reason that the smartest engineers in the world want to work for Big "
2239 "Tech is that Big Tech commands the lion’s share of tech industry jobs."
2242 #. type: Content of: <book><chapter><para>
2243 #: complete-book.xml:1789
2245 "The reason people who are aghast at Facebook’s and Google’s and Amazon’s "
2246 "data-handling practices continue to use these services is that all their "
2247 "friends are on Facebook; Google dominates search; and Amazon has put all the "
2248 "local merchants out of business."
2251 #. type: Content of: <book><chapter><para>
2252 #: complete-book.xml:1795
2254 "Competitive markets would weaken the companies’ lobbying muscle by reducing "
2255 "their profits and pitting them against each other in regulatory forums. It "
2256 "would give customers other places to go to get their online services. It "
2257 "would make the companies small enough to regulate and pave the way to "
2258 "meaningful penalties for breaches. It would let engineers with ideas that "
2259 "challenged the surveillance orthodoxy raise capital to compete with the "
2260 "incumbents. It would give web publishers multiple ways to reach audiences "
2261 "and make the case against Facebook and Google and Twitter embeds."
2264 #. type: Content of: <book><chapter><para>
2265 #: complete-book.xml:1806
2267 "In other words, while surveillance doesn’t cause monopolies, monopolies "
2268 "certainly abet surveillance."
2271 #. type: Content of: <book><chapter><title>
2272 #: complete-book.xml:1810
2273 msgid "Ronald Reagan, pioneer of tech monopolism"
2276 #. type: Content of: <book><chapter><para>
2277 #: complete-book.xml:1812
2279 "Technology exceptionalism is a sin, whether it’s practiced by technology’s "
2280 "blind proponents or by its critics. Both of these camps are prone to "
2281 "explaining away monopolistic concentration by citing some special "
2282 "characteristic of the tech industry, like network effects or first-mover "
2283 "advantage. The only real difference between these two groups is that the "
2284 "tech apologists say monopoly is inevitable so we should just let tech get "
2285 "away with its abuses while competition regulators in the U.S. and the EU say "
2286 "monopoly is inevitable so we should punish tech for its abuses but not try "
2287 "to break up the monopolies."
2290 #. type: Content of: <book><chapter><para>
2291 #: complete-book.xml:1824
2293 "To understand how tech became so monopolistic, it’s useful to look at the "
2294 "dawn of the consumer tech industry: 1979, the year the Apple II Plus "
2295 "launched and became the first successful home computer. That also happens to "
2296 "be the year that Ronald Reagan hit the campaign trail for the 1980 "
2297 "presidential race — a race he won, leading to a radical shift in the way "
2298 "that antitrust concerns are handled in America. Reagan’s cohort of "
2299 "politicians — including Margaret Thatcher in the U.K., Brian Mulroney in "
2300 "Canada, Helmut Kohl in Germany, and Augusto Pinochet in Chile — went on to "
2301 "enact similar reforms that eventually spread around the world."
2304 #. type: Content of: <book><chapter><para>
2305 #: complete-book.xml:1836
2307 "Antitrust’s story began nearly a century before all that with laws like the "
2308 "Sherman Act, which took aim at monopolists on the grounds that monopolies "
2309 "were bad in and of themselves — squeezing out competitors, creating "
2310 "“diseconomies of scale” (when a company is so big that its constituent parts "
2311 "go awry and it is seemingly helpless to address the problems), and capturing "
2312 "their regulators to such a degree that they can get away with a host of "
2316 #. type: Content of: <book><chapter><para>
2317 #: complete-book.xml:1845
2319 "Then came a fabulist named Robert Bork, a former solicitor general who "
2320 "Reagan appointed to the powerful U.S. Court of Appeals for the D.C. Circuit "
2321 "and who had created an alternate legislative history of the Sherman Act and "
2322 "its successors out of whole cloth. Bork insisted that these statutes were "
2323 "never targeted at monopolies (despite a wealth of evidence to the contrary, "
2324 "including the transcribed speeches of the acts’ authors) but, rather, that "
2325 "they were intended to prevent “consumer harm” — in the form of higher "
2329 #. type: Content of: <book><chapter><para>
2330 #: complete-book.xml:1855
2332 "Bork was a crank, but he was a crank with a theory that rich people really "
2333 "liked. Monopolies are a great way to make rich people richer by allowing "
2334 "them to receive “monopoly rents” (that is, bigger profits) and capture "
2335 "regulators, leading to a weaker, more favorable regulatory environment with "
2336 "fewer protections for customers, suppliers, the environment, and workers."
2339 #. type: Content of: <book><chapter><para>
2340 #: complete-book.xml:1863
2342 "Bork’s theories were especially palatable to the same power brokers who "
2343 "backed Reagan, and Reagan’s Department of Justice and other agencies began "
2344 "to incorporate Bork’s antitrust doctrine into their enforcement decisions "
2345 "(Reagan even put Bork up for a Supreme Court seat, but Bork flunked the "
2346 "Senate confirmation hearing so badly that, 40 years later, D.C. insiders use "
2347 "the term “borked” to refer to any catastrophically bad political "
2351 #. type: Content of: <book><chapter><para>
2352 #: complete-book.xml:1872
2354 "Little by little, Bork’s theories entered the mainstream, and their backers "
2355 "began to infiltrate the legal education field, even putting on junkets where "
2356 "members of the judiciary were treated to lavish meals, fun outdoor "
2357 "activities, and seminars where they were indoctrinated into the consumer "
2358 "harm theory of antitrust. The more Bork’s theories took hold, the more money "
2359 "the monopolists were making — and the more surplus capital they had at their "
2360 "disposal to lobby for even more Borkian antitrust influence campaigns."
2363 #. type: Content of: <book><chapter><para>
2364 #: complete-book.xml:1882
2366 "The history of Bork’s antitrust theories is a really good example of the "
2367 "kind of covertly engineered shifts in public opinion that Zuboff warns us "
2368 "against, where fringe ideas become mainstream orthodoxy. But Bork didn’t "
2369 "change the world overnight. He played a very long game, for over a "
2370 "generation, and he had a tailwind because the same forces that backed "
2371 "oligarchic antitrust theories also backed many other oligarchic shifts in "
2372 "public opinion. For example, the idea that taxation is theft, that wealth is "
2373 "a sign of virtue, and so on — all of these theories meshed to form a "
2374 "coherent ideology that elevated inequality to a virtue."
2377 #. type: Content of: <book><chapter><para>
2378 #: complete-book.xml:1894
2380 "Today, many fear that machine learning allows surveillance capitalism to "
2381 "sell “Bork-as-a-Service,” at internet speeds, so that you can contract a "
2382 "machine-learning company to engineer <emphasis>rapid</emphasis> shifts in "
2383 "public sentiment without needing the capital to sustain a multipronged, "
2384 "multigenerational project working at the local, state, national, and global "
2385 "levels in business, law, and philosophy. I do not believe that such a "
2386 "project is plausible, though I agree that this is basically what the "
2387 "platforms claim to be selling. They’re just lying about it. Big Tech lies "
2388 "all the time, <emphasis>including</emphasis> in their sales literature."
2391 #. type: Content of: <book><chapter><para>
2392 #: complete-book.xml:1907
2394 "The idea that tech forms “natural monopolies” (monopolies that are the "
2395 "inevitable result of the realities of an industry, such as the monopolies "
2396 "that accrue the first company to run long-haul phone lines or rail lines) is "
2397 "belied by tech’s own history: In the absence of anti-competitive tactics, "
2398 "Google was able to unseat AltaVista and Yahoo; Facebook was able to head off "
2399 "Myspace. There are some advantages to gathering mountains of data, but those "
2400 "mountains of data also have disadvantages: liability (from leaking), "
2401 "diminishing returns (from old data), and institutional inertia (big "
2402 "companies, like science, progress one funeral at a time)."
2405 #. type: Content of: <book><chapter><para>
2406 #: complete-book.xml:1919
2408 "Indeed, the birth of the web saw a mass-extinction event for the existing "
2409 "giant, wildly profitable proprietary technologies that had capital, network "
2410 "effects, and walls and moats surrounding their businesses. The web showed "
2411 "that when a new industry is built around a protocol, rather than a product, "
2412 "the combined might of everyone who uses the protocol to reach their "
2413 "customers or users or communities outweighs even the most massive "
2414 "products. CompuServe, AOL, MSN, and a host of other proprietary walled "
2415 "gardens learned this lesson the hard way: Each believed it could stay "
2416 "separate from the web, offering “curation” and a guarantee of consistency "
2417 "and quality instead of the chaos of an open system. Each was wrong and ended "
2418 "up being absorbed into the public web."
2421 #. type: Content of: <book><chapter><para>
2422 #: complete-book.xml:1933
2424 "Yes, tech is heavily monopolized and is now closely associated with industry "
2425 "concentration, but this has more to do with a matter of timing than its "
2426 "intrinsically monopolistic tendencies. Tech was born at the moment that "
2427 "antitrust enforcement was being dismantled, and tech fell into exactly the "
2428 "same pathologies that antitrust was supposed to guard against. To a first "
2429 "approximation, it is reasonable to assume that tech’s monopolies are the "
2430 "result of a lack of anti-monopoly action and not the much-touted unique "
2431 "characteristics of tech, such as network effects, first-mover advantage, and "
2435 #. type: Content of: <book><chapter><para>
2436 #: complete-book.xml:1945
2438 "In support of this thesis, I offer the concentration that every "
2439 "<emphasis>other</emphasis> industry has undergone over the same period. From "
2440 "professional wrestling to consumer packaged goods to commercial property "
2441 "leasing to banking to sea freight to oil to record labels to newspaper "
2442 "ownership to theme parks, <emphasis>every</emphasis> industry has undergone "
2443 "a massive shift toward concentration. There’s no obvious network effects or "
2444 "first-mover advantage at play in these industries. However, in every case, "
2445 "these industries attained their concentrated status through tactics that "
2446 "were prohibited before Bork’s triumph: merging with major competitors, "
2447 "buying out innovative new market entrants, horizontal and vertical "
2448 "integration, and a suite of anti-competitive tactics that were once illegal "
2449 "but are not any longer."
2452 #. type: Content of: <book><chapter><para>
2453 #: complete-book.xml:1960
2455 "Again: When you change the laws intended to prevent monopolies and then "
2456 "monopolies form in exactly the way the law was supposed to prevent, it is "
2457 "reasonable to suppose that these facts are related. Tech’s concentration "
2458 "can be readily explained without recourse to radical theories of network "
2459 "effects — but only if you’re willing to indict unregulated markets as "
2460 "tending toward monopoly. Just as a lifelong smoker can give you a hundred "
2461 "reasons why their smoking didn’t cause their cancer (“It was the "
2462 "environmental toxins”), true believers in unregulated markets have a whole "
2463 "suite of unconvincing explanations for monopoly in tech that leave "
2464 "capitalism intact."
2467 #. type: Content of: <book><chapter><title>
2468 #: complete-book.xml:1972
2469 msgid "Steering with the windshield wipers"
2472 #. type: Content of: <book><chapter><para>
2473 #: complete-book.xml:1974
2475 "It’s been 40 years since Bork’s project to rehabilitate monopolies achieved "
2476 "liftoff, and that is a generation and a half, which is plenty of time to "
2477 "take a common idea and make it seem outlandish and vice versa. Before the "
2478 "1940s, affluent Americans dressed their baby boys in pink while baby girls "
2479 "wore blue (a “delicate and dainty” color). While gendered colors are "
2480 "obviously totally arbitrary, many still greet this news with amazement and "
2481 "find it hard to imagine a time when pink connoted masculinity."
2484 #. type: Content of: <book><chapter><para>
2485 #: complete-book.xml:1984
2487 "After 40 years of studiously ignoring antitrust analysis and enforcement, "
2488 "it’s not surprising that we’ve all but forgotten that antitrust exists, that "
2489 "in living memory, growth through mergers and acquisitions were largely "
2490 "prohibited under law, that market-cornering strategies like vertical "
2491 "integration could land a company in court."
2494 #. type: Content of: <book><chapter><para>
2495 #: complete-book.xml:1992
2497 "Antitrust is a market society’s steering wheel, the control of first resort "
2498 "to keep would-be masters of the universe in their lanes. But Bork and his "
2499 "cohort ripped out our steering wheel 40 years ago. The car is still "
2500 "barreling along, and so we’re yanking as hard as we can on all the "
2501 "<emphasis>other</emphasis> controls in the car as well as desperately "
2502 "flapping the doors and rolling the windows up and down in the hopes that one "
2503 "of these other controls can be repurposed to let us choose where we’re "
2504 "heading before we careen off a cliff."
2507 #. type: Content of: <book><chapter><para>
2508 #: complete-book.xml:2002
2510 "It’s like a 1960s science-fiction plot come to life: People stuck in a "
2511 "“generation ship,” plying its way across the stars, a ship once piloted by "
2512 "their ancestors; and now, after a great cataclysm, the ship’s crew have "
2513 "forgotten that they’re in a ship at all and no longer remember where the "
2514 "control room is. Adrift, the ship is racing toward its extinction, and "
2515 "unless we can seize the controls and execute emergency course correction, "
2516 "we’re all headed for a fiery death in the heart of a sun."
2519 #. type: Content of: <book><chapter><title>
2520 #: complete-book.xml:2012
2521 msgid "Surveillance still matters"
2524 #. type: Content of: <book><chapter><para>
2525 #: complete-book.xml:2014
2527 "None of this is to minimize the problems with surveillance. Surveillance "
2528 "matters, and Big Tech’s use of surveillance <emphasis>is</emphasis> an "
2529 "existential risk to our species, but that’s not because surveillance and "
2530 "machine learning rob us of our free will."
2533 #. type: Content of: <book><chapter><para>
2534 #: complete-book.xml:2021
2536 "Surveillance has become <emphasis>much</emphasis> more efficient thanks to "
2537 "Big Tech. In 1989, the Stasi — the East German secret police — had the whole "
2538 "country under surveillance, a massive undertaking that recruited one out of "
2539 "every 60 people to serve as an informant or intelligence operative."
2542 #. type: Content of: <book><chapter><para>
2543 #: complete-book.xml:2028
2545 "Today, we know that the NSA is spying on a significant fraction of the "
2546 "entire world’s population, and its ratio of surveillance operatives to the "
2547 "surveilled is more like 1:10,000 (that’s probably on the low side since it "
2548 "assumes that every American with top-secret clearance is working for the NSA "
2549 "on this project — we don’t know how many of those cleared people are "
2550 "involved in NSA spying, but it’s definitely not all of them)."
2553 #. type: Content of: <book><chapter><para>
2554 #: complete-book.xml:2037
2556 "How did the ratio of surveillable citizens expand from 1:60 to 1:10,000 in "
2557 "less than 30 years? It’s thanks to Big Tech. Our devices and services gather "
2558 "most of the data that the NSA mines for its surveillance project. We pay for "
2559 "these devices and the services they connect to, and then we painstakingly "
2560 "perform the data-entry tasks associated with logging facts about our lives, "
2561 "opinions, and preferences. This mass surveillance project has been largely "
2562 "useless for fighting terrorism: The NSA can <ulink "
2563 "url=\"https://www.washingtonpost.com/world/national-security/nsa-cites-case-as-success-of-phone-data-collection-program/2013/08/08/fc915e5a-feda-11e2-96a8-d3b921c0924a_story.html\">only "
2564 "point to a single minor success story</ulink> in which it used its data "
2565 "collection program to foil an attempt by a U.S. resident to wire a few "
2566 "thousand dollars to an overseas terror group. It’s ineffective for much the "
2567 "same reason that commercial surveillance projects are largely ineffective at "
2568 "targeting advertising: The people who want to commit acts of terror, like "
2569 "people who want to buy a refrigerator, are extremely rare. If you’re trying "
2570 "to detect a phenomenon whose base rate is one in a million with an "
2571 "instrument whose accuracy is only 99%, then every true positive will come at "
2572 "the cost of 9,999 false positives."
2575 #. type: Content of: <book><chapter><para>
2576 #: complete-book.xml:2058
2578 "Let me explain that again: If one in a million people is a terrorist, then "
2579 "there will only be about one terrorist in a random sample of one million "
2580 "people. If your test for detecting terrorists is 99% accurate, it will "
2581 "identify 10,000 terrorists in your million-person sample (1% of one million "
2582 "is 10,000). For every true positive, you’ll get 9,999 false positives."
2585 #. type: Content of: <book><chapter><para>
2586 #: complete-book.xml:2066
2588 "In reality, the accuracy of algorithmic terrorism detection falls far short "
2589 "of the 99% mark, as does refrigerator ad targeting. The difference is that "
2590 "being falsely accused of wanting to buy a fridge is a minor nuisance while "
2591 "being falsely accused of planning a terror attack can destroy your life and "
2592 "the lives of everyone you love."
2595 #. type: Content of: <book><chapter><para>
2596 #: complete-book.xml:2073
2598 "Mass state surveillance is only feasible because of surveillance capitalism "
2599 "and its extremely low-yield ad-targeting systems, which require a constant "
2600 "feed of personal data to remain barely viable. Surveillance capitalism’s "
2601 "primary failure mode is mistargeted ads while mass state surveillance’s "
2602 "primary failure mode is grotesque human rights abuses, tending toward "
2606 #. type: Content of: <book><chapter><para>
2607 #: complete-book.xml:2081
2609 "State surveillance is no mere parasite on Big Tech, sucking up its data and "
2610 "giving nothing in return. In truth, the two are symbiotes: Big Tech sucks up "
2611 "our data for spy agencies, and spy agencies ensure that governments don’t "
2612 "limit Big Tech’s activities so severely that it would no longer serve the "
2613 "spy agencies’ needs. There is no firm distinction between state surveillance "
2614 "and surveillance capitalism; they are dependent on one another."
2617 #. type: Content of: <book><chapter><para>
2618 #: complete-book.xml:2090
2620 "To see this at work today, look no further than Amazon’s home surveillance "
2621 "device, the Ring doorbell, and its associated app, Neighbors. Ring — a "
2622 "product that Amazon acquired and did not develop in house — makes a "
2623 "camera-enabled doorbell that streams footage from your front door to your "
2624 "mobile device. The Neighbors app allows you to form a neighborhood-wide "
2625 "surveillance grid with your fellow Ring owners through which you can share "
2626 "clips of “suspicious characters.” If you’re thinking that this sounds like a "
2627 "recipe for letting curtain-twitching racists supercharge their suspicions of "
2628 "people with brown skin who walk down their blocks, <ulink "
2629 "url=\"https://www.eff.org/deeplinks/2020/07/amazons-ring-enables-over-policing-efforts-some-americas-deadliest-law-enforcement\">you’re "
2630 "right</ulink>. Ring has become a <emphasis>de facto,</emphasis> "
2631 "off-the-books arm of the police without any of the pesky oversight or rules."
2634 #. type: Content of: <book><chapter><para>
2635 #: complete-book.xml:2106
2637 "In mid-2019, a series of public records requests revealed that Amazon had "
2638 "struck confidential deals with more than 400 local law enforcement agencies "
2639 "through which the agencies would promote Ring and Neighbors and in exchange "
2640 "get access to footage from Ring cameras. In theory, cops would need to "
2641 "request this footage through Amazon (and internal documents reveal that "
2642 "Amazon devotes substantial resources to coaching cops on how to spin a "
2643 "convincing story when doing so), but in practice, when a Ring customer turns "
2644 "down a police request, Amazon only requires the agency to formally request "
2645 "the footage from the company, which it will then produce."
2648 #. type: Content of: <book><chapter><para>
2649 #: complete-book.xml:2118
2651 "Ring and law enforcement have found many ways to intertwine their "
2652 "activities. Ring strikes secret deals to acquire real-time access to 911 "
2653 "dispatch and then streams alarming crime reports to Neighbors users, which "
2654 "serve as convincers for anyone who’s contemplating a surveillance doorbell "
2655 "but isn’t sure whether their neighborhood is dangerous enough to warrant it."
2658 #. type: Content of: <book><chapter><para>
2659 #: complete-book.xml:2126
2661 "The more the cops buzz-market the surveillance capitalist Ring, the more "
2662 "surveillance capability the state gets. Cops who rely on private entities "
2663 "for law-enforcement roles then brief against any controls on the deployment "
2664 "of that technology while the companies return the favor by lobbying against "
2665 "rules requiring public oversight of police surveillance technology. The more "
2666 "the cops rely on Ring and Neighbors, the harder it will be to pass laws to "
2667 "curb them. The fewer laws there are against them, the more the cops will "
2671 #. type: Content of: <book><chapter><title>
2672 #: complete-book.xml:2137
2673 msgid "Dignity and sanctuary"
2676 #. type: Content of: <book><chapter><para>
2677 #: complete-book.xml:2139
2679 "But even if we could exercise democratic control over our states and force "
2680 "them to stop raiding surveillance capitalism’s reservoirs of behavioral "
2681 "data, surveillance capitalism would still harm us."
2684 #. type: Content of: <book><chapter><para>
2685 #: complete-book.xml:2144
2687 "This is an area where Zuboff shines. Her chapter on “sanctuary” — the "
2688 "feeling of being unobserved — is a beautiful hymn to introspection, "
2689 "calmness, mindfulness, and tranquility."
2692 #. type: Content of: <book><chapter><para>
2693 #: complete-book.xml:2149
2695 "When you are watched, something changes. Anyone who has ever raised a child "
2696 "knows this. You might look up from your book (or more realistically, from "
2697 "your phone) and catch your child in a moment of profound realization and "
2698 "growth, a moment where they are learning something that is right at the edge "
2699 "of their abilities, requiring their entire ferocious concentration. For a "
2700 "moment, you’re transfixed, watching that rare and beautiful moment of focus "
2701 "playing out before your eyes, and then your child looks up and sees you "
2702 "seeing them, and the moment collapses. To grow, you need to be and expose "
2703 "your authentic self, and in that moment, you are vulnerable like a hermit "
2704 "crab scuttling from one shell to the next. The tender, unprotected tissues "
2705 "you expose in that moment are too delicate to reveal in the presence of "
2706 "another, even someone you trust as implicitly as a child trusts their "
2710 #. type: Content of: <book><chapter><para>
2711 #: complete-book.xml:2165
2713 "In the digital age, our authentic selves are inextricably tied to our "
2714 "digital lives. Your search history is a running ledger of the questions "
2715 "you’ve pondered. Your location history is a record of the places you’ve "
2716 "sought out and the experiences you’ve had there. Your social graph reveals "
2717 "the different facets of your identity, the people you’ve connected with."
2720 #. type: Content of: <book><chapter><para>
2721 #: complete-book.xml:2173
2723 "To be observed in these activities is to lose the sanctuary of your "
2727 #. type: Content of: <book><chapter><para>
2728 #: complete-book.xml:2177
2730 "There’s another way in which surveillance capitalism robs us of our capacity "
2731 "to be our authentic selves: by making us anxious. Surveillance capitalism "
2732 "isn’t really a mind-control ray, but you don’t need a mind-control ray to "
2733 "make someone anxious. After all, another word for anxiety is agitation, and "
2734 "to make someone experience agitation, you need merely to agitate them. To "
2735 "poke them and prod them and beep at them and buzz at them and bombard them "
2736 "on an intermittent schedule that is just random enough that our limbic "
2737 "systems never quite become inured to it."
2740 #. type: Content of: <book><chapter><para>
2741 #: complete-book.xml:2188
2743 "Our devices and services are “general purpose” in that they can connect "
2744 "anything or anyone to anything or anyone else and that they can run any "
2745 "program that can be written. This means that the distraction rectangles in "
2746 "our pockets hold our most precious moments with our most beloved people and "
2747 "their most urgent or time-sensitive communications (from “running late can "
2748 "you get the kid?” to “doctor gave me bad news and I need to talk to you "
2749 "RIGHT NOW”) as well as ads for refrigerators and recruiting messages from "
2753 #. type: Content of: <book><chapter><para>
2754 #: complete-book.xml:2198
2756 "All day and all night, our pockets buzz, shattering our concentration and "
2757 "tearing apart the fragile webs of connection we spin as we think through "
2758 "difficult ideas. If you locked someone in a cell and agitated them like "
2759 "this, we’d call it “sleep deprivation torture,” and it would be <ulink "
2760 "url=\"https://www.youtube.com/watch?v=1SKpRbvnx6g\">a war crime under the "
2761 "Geneva Conventions</ulink>."
2764 #. type: Content of: <book><chapter><title>
2765 #: complete-book.xml:2207
2766 msgid "Afflicting the afflicted"
2769 #. type: Content of: <book><chapter><para>
2770 #: complete-book.xml:2209
2772 "The effects of surveillance on our ability to be our authentic selves are "
2773 "not equal for all people. Some of us are lucky enough to live in a time and "
2774 "place in which all the most important facts of our lives are widely and "
2775 "roundly socially acceptable and can be publicly displayed without the risk "
2776 "of social consequence."
2779 #. type: Content of: <book><chapter><para>
2780 #: complete-book.xml:2216
2782 "But for many of us, this is not true. Recall that in living memory, many of "
2783 "the ways of being that we think of as socially acceptable today were once "
2784 "cause for dire social sanction or even imprisonment. If you are 65 years "
2785 "old, you have lived through a time in which people living in “free "
2786 "societies” could be imprisoned or sanctioned for engaging in homosexual "
2787 "activity, for falling in love with a person whose skin was a different color "
2788 "than their own, or for smoking weed."
2791 #. type: Content of: <book><chapter><para>
2792 #: complete-book.xml:2226
2794 "Today, these activities aren’t just decriminalized in much of the world, "
2795 "they’re considered normal, and the fallen prohibitions are viewed as "
2796 "shameful, regrettable relics of the past."
2799 #. type: Content of: <book><chapter><para>
2800 #: complete-book.xml:2231
2802 "How did we get from prohibition to normalization? Through private, personal "
2803 "activity: People who were secretly gay or secret pot-smokers or who secretly "
2804 "loved someone with a different skin color were vulnerable to retaliation if "
2805 "they made their true selves known and were limited in how much they could "
2806 "advocate for their own right to exist in the world and be true to "
2807 "themselves. But because there was a private sphere, these people could form "
2808 "alliances with their friends and loved ones who did not share their "
2809 "disfavored traits by having private conversations in which they came out, "
2810 "disclosing their true selves to the people around them and bringing them to "
2811 "their cause one conversation at a time."
2814 #. type: Content of: <book><chapter><para>
2815 #: complete-book.xml:2244
2817 "The right to choose the time and manner of these conversations was key to "
2818 "their success. It’s one thing to come out to your dad while you’re on a "
2819 "fishing trip away from the world and another thing entirely to blurt it out "
2820 "over the Christmas dinner table while your racist Facebook uncle is there to "
2824 #. type: Content of: <book><chapter><para>
2825 #: complete-book.xml:2251
2827 "Without a private sphere, there’s a chance that none of these changes would "
2828 "have come to pass and that the people who benefited from these changes would "
2829 "have either faced social sanction for coming out to a hostile world or would "
2830 "have never been able to reveal their true selves to the people they love."
2833 #. type: Content of: <book><chapter><para>
2834 #: complete-book.xml:2258
2836 "The corollary is that, unless you think that our society has attained social "
2837 "perfection — that your grandchildren in 50 years will ask you to tell them "
2838 "the story of how, in 2020, every injustice had been righted and no further "
2839 "change had to be made — then you should expect that right now, at this "
2840 "minute, there are people you love, whose happiness is key to your own, who "
2841 "have a secret in their hearts that stops them from ever being their "
2842 "authentic selves with you. These people are sorrowing and will go to their "
2843 "graves with that secret sorrow in their hearts, and the source of that "
2844 "sorrow will be the falsity of their relationship to you."
2847 #. type: Content of: <book><chapter><para>
2848 #: complete-book.xml:2270
2849 msgid "A private realm is necessary for human progress."
2852 #. type: Content of: <book><chapter><title>
2853 #: complete-book.xml:2273
2854 msgid "Any data you collect and retain will eventually leak"
2857 #. type: Content of: <book><chapter><para>
2858 #: complete-book.xml:2275
2860 "The lack of a private life can rob vulnerable people of the chance to be "
2861 "their authentic selves and constrain our actions by depriving us of "
2862 "sanctuary, but there is another risk that is borne by everyone, not just "
2863 "people with a secret: crime."
2866 #. type: Content of: <book><chapter><para>
2867 #: complete-book.xml:2281
2869 "Personally identifying information is of very limited use for the purpose of "
2870 "controlling peoples’ minds, but identity theft — really a catchall term for "
2871 "a whole constellation of terrible criminal activities that can destroy your "
2872 "finances, compromise your personal integrity, ruin your reputation, or even "
2873 "expose you to physical danger — thrives on it."
2876 #. type: Content of: <book><chapter><para>
2877 #: complete-book.xml:2289
2879 "Attackers are not limited to using data from one breached source, "
2880 "either. Multiple services have suffered breaches that exposed names, "
2881 "addresses, phone numbers, passwords, sexual tastes, school grades, work "
2882 "performance, brushes with the criminal justice system, family details, "
2883 "genetic information, fingerprints and other biometrics, reading habits, "
2884 "search histories, literary tastes, pseudonymous identities, and other "
2885 "sensitive information. Attackers can merge data from these different "
2886 "breaches to build up extremely detailed dossiers on random subjects and then "
2887 "use different parts of the data for different criminal purposes."
2890 #. type: Content of: <book><chapter><para>
2891 #: complete-book.xml:2301
2893 "For example, attackers can use leaked username and password combinations to "
2894 "hijack whole fleets of commercial vehicles that <ulink "
2895 "url=\"https://www.vice.com/en_us/article/zmpx4x/hacker-monitor-cars-kill-engine-gps-tracking-apps\">have "
2896 "been fitted with anti-theft GPS trackers and immobilizers</ulink> or to "
2897 "hijack baby monitors in order to <ulink "
2898 "url=\"https://www.washingtonpost.com/technology/2019/04/23/how-nest-designed-keep-intruders-out-peoples-homes-effectively-allowed-hackers-get/?utm_term=.15220e98c550\">terrorize "
2899 "toddlers with the audio tracks from pornography</ulink>. Attackers use "
2900 "leaked data to trick phone companies into giving them your phone number, "
2901 "then they intercept SMS-based two-factor authentication codes in order to "
2902 "take over your email, bank account, and/or cryptocurrency wallets."
2905 #. type: Content of: <book><chapter><para>
2906 #: complete-book.xml:2314
2908 "Attackers are endlessly inventive in the pursuit of creative ways to "
2909 "weaponize leaked data. One common use of leaked data is to penetrate "
2910 "companies in order to access <emphasis>more</emphasis> data."
2913 #. type: Content of: <book><chapter><para>
2914 #: complete-book.xml:2319
2916 "Like spies, online fraudsters are totally dependent on companies "
2917 "over-collecting and over-retaining our data. Spy agencies sometimes pay "
2918 "companies for access to their data or intimidate them into giving it up, but "
2919 "sometimes they work just like criminals do — by <ulink "
2920 "url=\"https://www.bbc.com/news/world-us-canada-24751821\">sneaking data out "
2921 "of companies’ databases</ulink>."
2924 #. type: Content of: <book><chapter><para>
2925 #: complete-book.xml:2327
2927 "The over-collection of data has a host of terrible social consequences, from "
2928 "the erosion of our authentic selves to the undermining of social progress, "
2929 "from state surveillance to an epidemic of online crime. Commercial "
2930 "surveillance is also a boon to people running influence campaigns, but "
2931 "that’s the least of our troubles."
2934 #. type: Content of: <book><chapter><title>
2935 #: complete-book.xml:2335
2936 msgid "Critical tech exceptionalism is still tech exceptionalism"
2939 #. type: Content of: <book><chapter><para>
2940 #: complete-book.xml:2338
2942 "Big Tech has long practiced technology exceptionalism: the idea that it "
2943 "should not be subject to the mundane laws and norms of “meatspace.” Mottoes "
2944 "like Facebook’s “move fast and break things” attracted justifiable scorn of "
2945 "the companies’ self-serving rhetoric."
2948 #. type: Content of: <book><chapter><para>
2949 #: complete-book.xml:2344
2951 "Tech exceptionalism got us all into a lot of trouble, so it’s ironic and "
2952 "distressing to see Big Tech’s critics committing the same sin."
2955 #. type: Content of: <book><chapter><para>
2956 #: complete-book.xml:2348
2958 "Big Tech is not a “rogue capitalism” that cannot be cured through the "
2959 "traditional anti-monopoly remedies of trustbusting (forcing companies to "
2960 "divest of competitors they have acquired) and bans on mergers to monopoly "
2961 "and other anti-competitive tactics. Big Tech does not have the power to use "
2962 "machine learning to influence our behavior so thoroughly that markets lose "
2963 "the ability to punish bad actors and reward superior competitors. Big Tech "
2964 "has no rule-writing mind-control ray that necessitates ditching our old "
2968 #. type: Content of: <book><chapter><para>
2969 #: complete-book.xml:2358
2971 "The thing is, people have been claiming to have perfected mind-control rays "
2972 "for centuries, and every time, it turned out to be a con — though sometimes "
2973 "the con artists were also conning themselves."
2976 #. type: Content of: <book><chapter><para>
2977 #: complete-book.xml:2364
2979 "For generations, the advertising industry has been steadily improving its "
2980 "ability to sell advertising services to businesses while only making "
2981 "marginal gains in selling those businesses’ products to prospective "
2982 "customers. John Wanamaker’s lament that “50% of my advertising budget is "
2983 "wasted, I just don’t know which 50%” is a testament to the triumph of "
2984 "<emphasis>ad executives</emphasis>, who successfully convinced Wanamaker "
2985 "that only half of the money he spent went to waste."
2988 #. type: Content of: <book><chapter><para>
2989 #: complete-book.xml:2374
2991 "The tech industry has made enormous improvements in the science of "
2992 "convincing businesses that they’re good at advertising while their actual "
2993 "improvements to advertising — as opposed to targeting — have been pretty "
2994 "ho-hum. The vogue for machine learning — and the mystical invocation of "
2995 "“artificial intelligence” as a synonym for straightforward statistical "
2996 "inference techniques — has greatly boosted the efficacy of Big Tech’s sales "
2997 "pitch as marketers have exploited potential customers’ lack of technical "
2998 "sophistication to get away with breathtaking acts of overpromising and "
3002 #. type: Content of: <book><chapter><para>
3003 #: complete-book.xml:2386
3005 "It’s tempting to think that if businesses are willing to pour billions into "
3006 "a venture that the venture must be a good one. Yet there are plenty of times "
3007 "when this rule of thumb has led us astray. For example, it’s virtually "
3008 "unheard of for managed investment funds to outperform simple index funds, "
3009 "and investors who put their money into the hands of expert money managers "
3010 "overwhelmingly fare worse than those who entrust their savings to index "
3011 "funds. But managed funds still account for the majority of the money "
3012 "invested in the markets, and they are patronized by some of the richest, "
3013 "most sophisticated investors in the world. Their vote of confidence in an "
3014 "underperforming sector is a parable about the role of luck in wealth "
3015 "accumulation, not a sign that managed funds are a good buy."
3018 #. type: Content of: <book><chapter><para>
3019 #: complete-book.xml:2400
3021 "The claims of Big Tech’s mind-control system are full of tells that the "
3022 "enterprise is a con. For example, <ulink "
3023 "url=\"https://www.frontiersin.org/articles/10.3389/fpsyg.2020.01415/full\">the "
3024 "reliance on the “Big Five” personality traits</ulink> as a primary means of "
3025 "influencing people even though the “Big Five” theory is unsupported by any "
3026 "large-scale, peer-reviewed studies and is <ulink "
3027 "url=\"https://www.wired.com/story/the-noisy-fallacies-of-psychographic-targeting/\">mostly "
3028 "the realm of marketing hucksters and pop psych</ulink>."
3031 #. type: Content of: <book><chapter><para>
3032 #: complete-book.xml:2410
3034 "Big Tech’s promotional materials also claim that their algorithms can "
3035 "accurately perform “sentiment analysis” or detect peoples’ moods based on "
3036 "their “microexpressions,” but <ulink "
3037 "url=\"https://www.npr.org/2018/09/12/647040758/advertising-on-facebook-is-it-worth-it\">these "
3038 "are marketing claims, not scientific ones</ulink>. These methods are largely "
3039 "untested by independent scientific experts, and where they have been tested, "
3040 "they’ve been found sorely wanting. Microexpressions are particularly "
3041 "suspect as the companies that specialize in training people to detect them "
3043 "url=\"https://theintercept.com/2017/02/08/tsas-own-files-show-doubtful-science-behind-its-behavior-screening-program/\">have "
3044 "been shown</ulink> to underperform relative to random chance."
3047 #. type: Content of: <book><chapter><para>
3048 #: complete-book.xml:2423
3050 "Big Tech has been so good at marketing its own supposed superpowers that "
3051 "it’s easy to believe that they can market everything else with similar "
3052 "acumen, but it’s a mistake to believe the hype. Any statement a company "
3053 "makes about the quality of its products is clearly not impartial. The fact "
3054 "that we distrust all the things that Big Tech says about its data handling, "
3055 "compliance with privacy laws, etc., is only reasonable — but why on Earth "
3056 "would we treat Big Tech’s marketing literature as the gospel truth? Big Tech "
3057 "lies about just about <emphasis>everything</emphasis>, including how well "
3058 "its machine-learning fueled persuasion systems work."
3061 #. type: Content of: <book><chapter><para>
3062 #: complete-book.xml:2435
3064 "That skepticism should infuse all of our evaluations of Big Tech and its "
3065 "supposed abilities, including our perusal of its patents. Zuboff vests these "
3066 "patents with enormous significance, pointing out that Google claimed "
3067 "extensive new persuasion capabilities in <ulink "
3068 "url=\"https://patents.google.com/patent/US20050131762A1/en\">its patent "
3069 "filings</ulink>. These claims are doubly suspect: first, because they are so "
3070 "self-serving, and second, because the patent itself is so notoriously an "
3071 "invitation to exaggeration."
3074 #. type: Content of: <book><chapter><para>
3075 #: complete-book.xml:2445
3077 "Patent applications take the form of a series of claims and range from broad "
3078 "to narrow. A typical patent starts out by claiming that its authors have "
3079 "invented a method or system for doing every conceivable thing that anyone "
3080 "might do, ever, with any tool or device. Then it narrows that claim in "
3081 "successive stages until we get to the actual “invention” that is the true "
3082 "subject of the patent. The hope is that the patent examiner — who is almost "
3083 "certainly overworked and underinformed — will miss the fact that some or all "
3084 "of these claims are ridiculous, or at least suspect, and grant the patent’s "
3085 "broader claims. Patents for unpatentable things are still incredibly useful "
3086 "because they can be wielded against competitors who might license that "
3087 "patent or steer clear of its claims rather than endure the lengthy, "
3088 "expensive process of contesting it."
3091 #. type: Content of: <book><chapter><para>
3092 #: complete-book.xml:2460
3094 "What’s more, software patents are routinely granted even though the filer "
3095 "doesn’t have any evidence that they can do the thing claimed by the "
3096 "patent. That is, you can patent an “invention” that you haven’t actually "
3097 "made and that you don’t know how to make."
3100 #. type: Content of: <book><chapter><para>
3101 #: complete-book.xml:2466
3103 "With these considerations in hand, it becomes obvious that the fact that a "
3104 "Big Tech company has patented what it <emphasis>says</emphasis> is an "
3105 "effective mind-control ray is largely irrelevant to whether Big Tech can in "
3106 "fact control our minds."
3109 #. type: Content of: <book><chapter><para>
3110 #: complete-book.xml:2473
3112 "Big Tech collects our data for many reasons, including the diminishing "
3113 "returns on existing stores of data. But many tech companies also collect "
3114 "data out of a mistaken tech exceptionalist belief in the network effects of "
3115 "data. Network effects occur when each new user in a system increases its "
3116 "value. The classic example is fax machines: A single fax machine is of no "
3117 "use, two fax machines are of limited use, but every new fax machine that’s "
3118 "put to use after the first doubles the number of possible fax-to-fax links."
3121 #. type: Content of: <book><chapter><para>
3122 #: complete-book.xml:2483
3124 "Data mined for predictive systems doesn’t necessarily produce these "
3125 "dividends. Think of Netflix: The predictive value of the data mined from a "
3126 "million English-speaking Netflix viewers is hardly improved by the addition "
3127 "of one more user’s viewing data. Most of the data Netflix acquires after "
3128 "that first minimum viable sample duplicates existing data and produces only "
3129 "minimal gains. Meanwhile, retraining models with new data gets progressively "
3130 "more expensive as the number of data points increases, and manual tasks like "
3131 "labeling and validating data do not get cheaper at scale."
3134 #. type: Content of: <book><chapter><para>
3135 #: complete-book.xml:2494
3137 "Businesses pursue fads to the detriment of their profits all the time, "
3138 "especially when the businesses and their investors are not motivated by the "
3139 "prospect of becoming profitable but rather by the prospect of being acquired "
3140 "by a Big Tech giant or by having an IPO. For these firms, ticking faddish "
3141 "boxes like “collects as much data as possible” might realize a bigger return "
3142 "on investment than “collects a business-appropriate quantity of data.”"
3145 #. type: Content of: <book><chapter><para>
3146 #: complete-book.xml:2503
3148 "This is another harm of tech exceptionalism: The belief that more data "
3149 "always produces more profits in the form of more insights that can be "
3150 "translated into better mind-control rays drives firms to over-collect and "
3151 "over-retain data beyond all rationality. And since the firms are behaving "
3152 "irrationally, a good number of them will go out of business and become ghost "
3153 "ships whose cargo holds are stuffed full of data that can harm people in "
3154 "myriad ways — but which no one is responsible for antey longer. Even if the "
3155 "companies don’t go under, the data they collect is maintained behind the "
3156 "minimum viable security — just enough security to keep the company viable "
3157 "while it waits to get bought out by a tech giant, an amount calculated to "
3158 "spend not one penny more than is necessary on protecting data."
3161 #. type: Content of: <book><chapter><title>
3162 #: complete-book.xml:2517
3164 "How monopolies, not mind control, drive surveillance capitalism: The "
3168 #. type: Content of: <book><chapter><para>
3169 #: complete-book.xml:2520
3171 "For the first decade of its existence, Facebook competed with the social "
3172 "media giants of the day (Myspace, Orkut, etc.) by presenting itself as the "
3173 "pro-privacy alternative. Indeed, Facebook justified its walled garden — "
3174 "which let users bring in data from the web but blocked web services like "
3175 "Google Search from indexing and caching Facebook pages — as a pro-privacy "
3176 "measure that protected users from the surveillance-happy winners of the "
3177 "social media wars like Myspace."
3180 #. type: Content of: <book><chapter><para>
3181 #: complete-book.xml:2530
3183 "Despite frequent promises that it would never collect or analyze its users’ "
3184 "data, Facebook periodically created initiatives that did just that, like the "
3185 "creepy, ham-fisted Beacon tool, which spied on you as you moved around the "
3186 "web and then added your online activities to your public timeline, allowing "
3187 "your friends to monitor your browsing habits. Beacon sparked a user "
3188 "revolt. Every time, Facebook backed off from its surveillance initiative, "
3189 "but not all the way; inevitably, the new Facebook would be more surveilling "
3190 "than the old Facebook, though not quite as surveilling as the intermediate "
3191 "Facebook following the launch of the new product or service."
3194 #. type: Content of: <book><chapter><para>
3195 #: complete-book.xml:2542
3197 "The pace at which Facebook ramped up its surveillance efforts seems to have "
3198 "been set by Facebook’s competitive landscape. The more competitors Facebook "
3199 "had, the better it behaved. Every time a major competitor foundered, "
3200 "Facebook’s behavior <ulink "
3201 "url=\"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3247362\">got "
3202 "markedly worse</ulink>."
3205 #. type: Content of: <book><chapter><para>
3206 #: complete-book.xml:2550
3208 "All the while, Facebook was prodigiously acquiring companies, including a "
3209 "company called Onavo. Nominally, Onavo made a battery-monitoring mobile "
3210 "app. But the permissions that Onavo required were so expansive that the app "
3211 "was able to gather fine-grained telemetry on everything users did with their "
3212 "phones, including which apps they used and how they were using them."
3215 #. type: Content of: <book><chapter><para>
3216 #: complete-book.xml:2558
3218 "Through Onavo, Facebook discovered that it was losing market share to "
3219 "Snapchat, an app that — like Facebook a decade before — billed itself as the "
3220 "pro-privacy alternative to the status quo. Through Onavo, Facebook was able "
3221 "to mine data from the devices of Snapchat users, including both current and "
3222 "former Snapchat users. This spurred Facebook to acquire Instagram — some "
3223 "features of which competed with Snapchat — and then allowed Facebook to "
3224 "fine-tune Instagram’s features and sales pitch to erode Snapchat’s gains and "
3225 "ensure that Facebook would not have to face the kinds of competitive "
3226 "pressures it had earlier inflicted on Myspace and Orkut."
3229 #. type: Content of: <book><chapter><para>
3230 #: complete-book.xml:2570
3232 "The story of how Facebook crushed Snapchat reveals the relationship between "
3233 "monopoly and surveillance capitalism. Facebook combined surveillance with "
3234 "lax antitrust enforcement to spot the competitive threat of Snapchat on its "
3235 "horizon and then take decisive action against it. Facebook’s surveillance "
3236 "capitalism let it avert competitive pressure with anti-competitive "
3237 "tactics. Facebook users still want privacy — Facebook hasn’t used "
3238 "surveillance to brainwash them out of it — but they can’t get it because "
3239 "Facebook’s surveillance lets it destroy any hope of a rival service emerging "
3240 "that competes on privacy features."
3243 #. type: Content of: <book><chapter><title>
3244 #: complete-book.xml:2582
3245 msgid "A monopoly over your friends"
3248 #. type: Content of: <book><chapter><para>
3249 #: complete-book.xml:2584
3251 "A decentralization movement has tried to erode the dominance of Facebook and "
3252 "other Big Tech companies by fielding “indieweb” alternatives — Mastodon as a "
3253 "Twitter alternative, Diaspora as a Facebook alternative, etc. — but these "
3254 "efforts have failed to attain any kind of liftoff."
3257 #. type: Content of: <book><chapter><para>
3258 #: complete-book.xml:2591
3260 "Fundamentally, each of these services is hamstrung by the same problem: "
3261 "Every potential user for a Facebook or Twitter alternative has to convince "
3262 "all their friends to follow them to a decentralized web alternative in order "
3263 "to continue to realize the benefit of social media. For many of us, the only "
3264 "reason to have a Facebook account is that our friends have Facebook "
3265 "accounts, and the reason they have Facebook accounts is that "
3266 "<emphasis>we</emphasis> have Facebook accounts."
3269 #. type: Content of: <book><chapter><para>
3270 #: complete-book.xml:2601
3272 "All of this has conspired to make Facebook — and other dominant platforms — "
3273 "into “kill zones” that investors will not fund new entrants for."
3276 #. type: Content of: <book><chapter><para>
3277 #: complete-book.xml:2606
3279 "And yet, all of today’s tech giants came into existence despite the "
3280 "entrenched advantage of the companies that came before them. To understand "
3281 "how that happened, you have to understand both interoperability and "
3282 "adversarial interoperability."
3285 #. type: Content of: <book><chapter><blockquote><para>
3286 #: complete-book.xml:2613
3287 msgid "The hard problem of our species is coordination."
3290 #. type: Content of: <book><chapter><para>
3291 #: complete-book.xml:2617
3293 "“Interoperability” is the ability of two technologies to work with one "
3294 "another: Anyone can make an LP that will play on any record player, anyone "
3295 "can make a filter you can install in your stove’s extractor fan, anyone can "
3296 "make gasoline for your car, anyone can make a USB phone charger that fits in "
3297 "your car’s cigarette lighter receptacle, anyone can make a light bulb that "
3298 "works in your light socket, anyone can make bread that will toast in your "
3302 #. type: Content of: <book><chapter><para>
3303 #: complete-book.xml:2626
3305 "Interoperability is often a source of innovation and consumer benefit: Apple "
3306 "made the first commercially successful PC, but millions of independent "
3307 "software vendors made interoperable programs that ran on the Apple II "
3308 "Plus. The simple analog antenna inputs on the back of TVs first allowed "
3309 "cable operators to connect directly to TVs, then they allowed game console "
3310 "companies and then personal computer companies to use standard televisions "
3311 "as displays. Standard RJ-11 telephone jacks allowed for the production of "
3312 "phones from a variety of vendors in a variety of forms, from the free "
3313 "football-shaped phone that came with a <emphasis>Sports "
3314 "Illustrated</emphasis> subscription to business phones with speakers, hold "
3315 "functions, and so on and then answering machines and finally modems, paving "
3316 "the way for the internet revolution."
3319 #. type: Content of: <book><chapter><para>
3320 #: complete-book.xml:2641
3322 "“Interoperability” is often used interchangeably with “standardization,” "
3323 "which is the process when manufacturers and other stakeholders hammer out a "
3324 "set of agreed-upon rules for implementing a technology, such as the "
3325 "electrical plug on your wall, the CAN bus used by your car’s computer "
3326 "systems, or the HTML instructions that your browser interprets."
3329 #. type: Content of: <book><chapter><para>
3330 #: complete-book.xml:2649
3332 "But interoperability doesn’t require standardization — indeed, "
3333 "standardization often proceeds from the chaos of ad hoc interoperability "
3334 "measures. The inventor of the cigarette-lighter USB charger didn’t need to "
3335 "get permission from car manufacturers or even the manufacturers of the "
3336 "dashboard lighter subcomponent. The automakers didn’t take any "
3337 "countermeasures to prevent the use of these aftermarket accessories by their "
3338 "customers, but they also didn’t do anything to make life easier for the "
3339 "chargers’ manufacturers. This is a kind of “neutral interoperability.”"
3342 #. type: Content of: <book><chapter><para>
3343 #: complete-book.xml:2660
3345 "Beyond neutral interoperability, there is “adversarial interoperability.” "
3346 "That’s when a manufacturer makes a product that interoperates with another "
3347 "manufacturer’s product <emphasis>despite the second manufacturer’s "
3348 "objections</emphasis> and <emphasis>even if that means bypassing a security "
3349 "system designed to prevent interoperability</emphasis>."
3352 #. type: Content of: <book><chapter><para>
3353 #: complete-book.xml:2668
3355 "Probably the most familiar form of adversarial interoperability is "
3356 "third-party printer ink. Printer manufacturers claim that they sell printers "
3357 "below cost and that the only way they can recoup the losses they incur is by "
3358 "charging high markups on ink. To prevent the owners of printers from buying "
3359 "ink elsewhere, the printer companies deploy a suite of anti-customer "
3360 "security systems that detect and reject both refilled and third-party "
3364 #. type: Content of: <book><chapter><para>
3365 #: complete-book.xml:2677
3367 "Owners of printers take the position that HP and Epson and Brother are not "
3368 "charities and that customers for their wares have no obligation to help them "
3369 "survive, and so if the companies choose to sell their products at a loss, "
3370 "that’s their foolish choice and their consequences to live with. Likewise, "
3371 "competitors who make ink or refill kits observe that they don’t owe printer "
3372 "companies anything, and their erosion of printer companies’ margins are the "
3373 "printer companies’ problems, not their competitors’. After all, the printer "
3374 "companies shed no tears when they drive a refiller out of business, so why "
3375 "should the refillers concern themselves with the economic fortunes of the "
3376 "printer companies?"
3379 #. type: Content of: <book><chapter><para>
3380 #: complete-book.xml:2690
3382 "Adversarial interoperability has played an outsized role in the history of "
3383 "the tech industry: from the founding of the “alt.*” Usenet hierarchy (which "
3384 "was started against the wishes of Usenet’s maintainers and which grew to be "
3385 "bigger than all of Usenet combined) to the browser wars (when Netscape and "
3386 "Microsoft devoted massive engineering efforts to making their browsers "
3387 "incompatible with the other’s special commands and peccadilloes) to Facebook "
3388 "(whose success was built in part by helping its new users stay in touch with "
3389 "friends they’d left behind on Myspace because Facebook supplied them with a "
3390 "tool that scraped waiting messages from Myspace and imported them into "
3391 "Facebook, effectively creating an Facebook-based Myspace reader)."
3394 #. type: Content of: <book><chapter><para>
3395 #: complete-book.xml:2704
3397 "Today, incumbency is seen as an unassailable advantage. Facebook is where "
3398 "all of your friends are, so no one can start a Facebook competitor. But "
3399 "adversarial compatibility reverses the competitive advantage: If you were "
3400 "allowed to compete with Facebook by providing a tool that imported all your "
3401 "users’ waiting Facebook messages into an environment that competed on lines "
3402 "that Facebook couldn’t cross, like eliminating surveillance and ads, then "
3403 "Facebook would be at a huge disadvantage. It would have assembled all "
3404 "possible ex-Facebook users into a single, easy-to-find service; it would "
3405 "have educated them on how a Facebook-like service worked and what its "
3406 "potential benefits were; and it would have provided an easy means for "
3407 "disgruntled Facebook users to tell their friends where they might expect "
3411 #. type: Content of: <book><chapter><para>
3412 #: complete-book.xml:2719
3414 "Adversarial interoperability was once the norm and a key contributor to the "
3415 "dynamic, vibrant tech scene, but now it is stuck behind a thicket of laws "
3416 "and regulations that add legal risks to the tried-and-true tactics of "
3417 "adversarial interoperability. New rules and new interpretations of existing "
3418 "rules mean that a would-be adversarial interoperator needs to steer clear of "
3419 "claims under copyright, terms of service, trade secrecy, tortious "
3420 "interference, and patent."
3423 #. type: Content of: <book><chapter><para>
3424 #: complete-book.xml:2729
3426 "In the absence of a competitive market, lawmakers have resorted to assigning "
3427 "expensive, state-like duties to Big Tech firms, such as automatically "
3428 "filtering user contributions for copyright infringement or terrorist and "
3429 "extremist content or detecting and preventing harassment in real time or "
3430 "controlling access to sexual material."
3433 #. type: Content of: <book><chapter><para>
3434 #: complete-book.xml:2737
3436 "These measures put a floor under how small we can make Big Tech because only "
3437 "the very largest companies can afford the humans and automated filters "
3438 "needed to perform these duties."
3441 #. type: Content of: <book><chapter><para>
3442 #: complete-book.xml:2742
3444 "But that’s not the only way in which making platforms responsible for "
3445 "policing their users undermines competition. A platform that is expected to "
3446 "police its users’ conduct must prevent many vital adversarial "
3447 "interoperability techniques lest these subvert its policing measures. For "
3448 "example, if someone using a Twitter replacement like Mastodon is able to "
3449 "push messages into Twitter and read messages out of Twitter, they could "
3450 "avoid being caught by automated systems that detect and prevent harassment "
3451 "(such as systems that use the timing of messages or IP-based rules to make "
3452 "guesses about whether someone is a harasser)."
3455 #. type: Content of: <book><chapter><para>
3456 #: complete-book.xml:2754
3458 "To the extent that we are willing to let Big Tech police itself — rather "
3459 "than making Big Tech small enough that users can leave bad platforms for "
3460 "better ones and small enough that a regulation that simply puts a platform "
3461 "out of business will not destroy billions of users’ access to their "
3462 "communities and data — we build the case that Big Tech should be able to "
3463 "block its competitors and make it easier for Big Tech to demand legal "
3464 "enforcement tools to ban and punish attempts at adversarial "
3468 #. type: Content of: <book><chapter><para>
3469 #: complete-book.xml:2764
3471 "Ultimately, we can try to fix Big Tech by making it responsible for bad acts "
3472 "by its users, or we can try to fix the internet by cutting Big Tech down to "
3473 "size. But we can’t do both. To replace today’s giant products with "
3474 "pluralistic protocols, we need to clear the legal thicket that prevents "
3475 "adversarial interoperability so that tomorrow’s nimble, personal, "
3476 "small-scale products can federate themselves with giants like Facebook, "
3477 "allowing the users who’ve left to continue to communicate with users who "
3478 "haven’t left yet, reaching tendrils over Facebook’s garden wall that "
3479 "Facebook’s trapped users can use to scale the walls and escape to the "
3483 #. type: Content of: <book><chapter><title>
3484 #: complete-book.xml:2776
3485 msgid "Fake news is an epistemological crisis"
3488 #. type: Content of: <book><chapter><para>
3489 #: complete-book.xml:2778
3491 "Tech is not the only industry that has undergone massive concentration since "
3492 "the Reagan era. Virtually every major industry — from oil to newspapers to "
3493 "meatpacking to sea freight to eyewear to online pornography — has become a "
3494 "clubby oligarchy that just a few players dominate."
3497 #. type: Content of: <book><chapter><para>
3498 #: complete-book.xml:2785
3500 "At the same time, every industry has become something of a tech industry as "
3501 "general-purpose computers and general-purpose networks and the promise of "
3502 "efficiencies through data-driven analysis infuse every device, process, and "
3506 #. type: Content of: <book><chapter><para>
3507 #: complete-book.xml:2791
3509 "This phenomenon of industrial concentration is part of a wider story about "
3510 "wealth concentration overall as a smaller and smaller number of people own "
3511 "more and more of our world. This concentration of both wealth and industries "
3512 "means that our political outcomes are increasingly beholden to the parochial "
3513 "interests of the people and companies with all the money."
3516 #. type: Content of: <book><chapter><para>
3517 #: complete-book.xml:2799
3519 "That means that whenever a regulator asks a question with an obvious, "
3520 "empirical answer (“Are humans causing climate change?” or “Should we let "
3521 "companies conduct commercial mass surveillance?” or “Does society benefit "
3522 "from allowing network neutrality violations?”), the answer that comes out is "
3523 "only correct if that correctness meets with the approval of rich people and "
3524 "the industries that made them so wealthy."
3527 #. type: Content of: <book><chapter><para>
3528 #: complete-book.xml:2808
3530 "Rich people have always played an outsized role in politics and more so "
3531 "since the Supreme Court’s <emphasis>Citizens United</emphasis> decision "
3532 "eliminated key controls over political spending. Widening inequality and "
3533 "wealth concentration means that the very richest people are now a lot richer "
3534 "and can afford to spend a lot more money on political projects than ever "
3535 "before. Think of the Koch brothers or George Soros or Bill Gates."
3538 #. type: Content of: <book><chapter><para>
3539 #: complete-book.xml:2817
3541 "But the policy distortions of rich individuals pale in comparison to the "
3542 "policy distortions that concentrated industries are capable of. The "
3543 "companies in highly concentrated industries are much more profitable than "
3544 "companies in competitive industries — no competition means not having to "
3545 "reduce prices or improve quality to win customers — leaving them with bigger "
3546 "capital surpluses to spend on lobbying."
3549 #. type: Content of: <book><chapter><para>
3550 #: complete-book.xml:2826
3552 "Concentrated industries also find it easier to collaborate on policy "
3553 "objectives than competitive ones. When all the top execs from your industry "
3554 "can fit around a single boardroom table, they often do. And "
3555 "<emphasis>when</emphasis> they do, they can forge a consensus position on "
3559 #. type: Content of: <book><chapter><para>
3560 #: complete-book.xml:2833
3562 "Rising through the ranks in a concentrated industry generally means working "
3563 "at two or three of the big companies. When there are only relatively few "
3564 "companies in a given industry, each company has a more ossified executive "
3565 "rank, leaving ambitious execs with fewer paths to higher positions unless "
3566 "they are recruited to a rival. This means that the top execs in concentrated "
3567 "industries are likely to have been colleagues at some point and socialize in "
3568 "the same circles — connected through social ties or, say, serving as "
3569 "trustees for each others’ estates. These tight social bonds foster a "
3570 "collegial, rather than competitive, attitude."
3573 #. type: Content of: <book><chapter><para>
3574 #: complete-book.xml:2845
3576 "Highly concentrated industries also present a regulatory conundrum. When an "
3577 "industry is dominated by just four or five companies, the only people who "
3578 "are likely to truly understand the industry’s practices are its veteran "
3579 "executives. This means that top regulators are often former execs of the "
3580 "companies they are supposed to be regulating. These turns in government are "
3581 "often tacitly understood to be leaves of absence from industry, with former "
3582 "employers welcoming their erstwhile watchdogs back into their executive "
3583 "ranks once their terms have expired."
3586 #. type: Content of: <book><chapter><para>
3587 #: complete-book.xml:2856
3589 "All this is to say that the tight social bonds, small number of firms, and "
3590 "regulatory capture of concentrated industries give the companies that "
3591 "comprise them the power to dictate many, if not all, of the regulations that "
3595 #. type: Content of: <book><chapter><para>
3596 #: complete-book.xml:2862
3598 "This is increasingly obvious. Whether it’s payday lenders <ulink "
3599 "url=\"https://www.washingtonpost.com/business/2019/02/25/how-payday-lending-industry-insider-tilted-academic-research-its-favor/\">winning "
3600 "the right to practice predatory lending</ulink> or Apple <ulink "
3601 "url=\"https://www.vice.com/en_us/article/mgxayp/source-apple-will-fight-right-to-repair-legislation\">winning "
3602 "the right to decide who can fix your phone</ulink> or Google and Facebook "
3603 "winning the right to breach your private data without suffering meaningful "
3604 "consequences or victories for pipeline companies or impunity for opioid "
3605 "manufacturers or massive tax subsidies for incredibly profitable dominant "
3606 "businesses, it’s increasingly apparent that many of our official, "
3607 "evidence-based truth-seeking processes are, in fact, auctions for sale to "
3608 "the highest bidder."
3611 #. type: Content of: <book><chapter><para>
3612 #: complete-book.xml:2876
3614 "It’s really impossible to overstate what a terrifying prospect this is. We "
3615 "live in an incredibly high-tech society, and none of us could acquire the "
3616 "expertise to evaluate every technological proposition that stands between us "
3617 "and our untimely, horrible deaths. You might devote your life to acquiring "
3618 "the media literacy to distinguish good scientific journals from corrupt "
3619 "pay-for-play lookalikes and the statistical literacy to evaluate the quality "
3620 "of the analysis in the journals as well as the microbiology and epidemiology "
3621 "knowledge to determine whether you can trust claims about the safety of "
3622 "vaccines — but that would still leave you unqualified to judge whether the "
3623 "wiring in your home will give you a lethal shock <emphasis>and</emphasis> "
3624 "whether your car’s brakes’ software will cause them to fail unpredictably "
3625 "<emphasis>and</emphasis> whether the hygiene standards at your butcher are "
3626 "sufficient to keep you from dying after you finish your dinner."
3629 #. type: Content of: <book><chapter><para>
3630 #: complete-book.xml:2893
3632 "In a world as complex as this one, we have to defer to authorities, and we "
3633 "keep them honest by making those authorities accountable to us and binding "
3634 "them with rules to prevent conflicts of interest. We can’t possibly acquire "
3635 "the expertise to adjudicate conflicting claims about the best way to make "
3636 "the world safe and prosperous, but we <emphasis>can</emphasis> determine "
3637 "whether the adjudication process itself is trustworthy."
3640 #. type: Content of: <book><chapter><para>
3641 #: complete-book.xml:2902
3642 msgid "Right now, it’s obviously not."
3645 #. type: Content of: <book><chapter><para>
3646 #: complete-book.xml:2905
3648 "The past 40 years of rising inequality and industry concentration, together "
3649 "with increasingly weak accountability and transparency for expert agencies, "
3650 "has created an increasingly urgent sense of impending doom, the sense that "
3651 "there are vast conspiracies afoot that operate with tacit official approval "
3652 "despite the likelihood they are working to better themselves by ruining the "
3656 #. type: Content of: <book><chapter><para>
3657 #: complete-book.xml:2913
3659 "For example, it’s been decades since Exxon’s own scientists concluded that "
3660 "its products would render the Earth uninhabitable by humans. And yet those "
3661 "decades were lost to us, in large part because Exxon lobbied governments and "
3662 "sowed doubt about the dangers of its products and did so with the "
3663 "cooperation of many public officials. When the survival of you and everyone "
3664 "you love is threatened by conspiracies, it’s not unreasonable to start "
3665 "questioning the things you think you know in an attempt to determine whether "
3666 "they, too, are the outcome of another conspiracy."
3669 #. type: Content of: <book><chapter><para>
3670 #: complete-book.xml:2924
3672 "The collapse of the credibility of our systems for divining and upholding "
3673 "truths has left us in a state of epistemological chaos. Once, most of us "
3674 "might have assumed that the system was working and that our regulations "
3675 "reflected our best understanding of the empirical truths of the world as "
3676 "they were best understood — now we have to find our own experts to help us "
3677 "sort the true from the false."
3680 #. type: Content of: <book><chapter><para>
3681 #: complete-book.xml:2933
3683 "If you’re like me, you probably believe that vaccines are safe, but you "
3684 "(like me) probably also can’t explain the microbiology or statistics. Few of "
3685 "us have the math skills to review the literature on vaccine safety and "
3686 "describe why their statistical reasoning is sound. Likewise, few of us can "
3687 "review the stats in the (now discredited) literature on opioid safety and "
3688 "explain how those stats were manipulated. Both vaccines and opioids were "
3689 "embraced by medical authorities, after all, and one is safe while the other "
3690 "could ruin your life. You’re left with a kind of inchoate constellation of "
3691 "rules of thumb about which experts you trust to fact-check controversial "
3692 "claims and then to explain how all those respectable doctors with their "
3693 "peer-reviewed research on opioid safety <emphasis>were</emphasis> an "
3694 "aberration and then how you know that the doctors writing about vaccine "
3695 "safety are <emphasis>not</emphasis> an aberration."
3698 #. type: Content of: <book><chapter><para>
3699 #: complete-book.xml:2950
3701 "I’m 100% certain that vaccinating is safe and effective, but I’m also at "
3702 "something of a loss to explain exactly, <emphasis>precisely,</emphasis> why "
3703 "I believe this, given all the corruption I know about and the many times the "
3704 "stamp of certainty has turned out to be a parochial lie told to further "
3705 "enrich the super rich."
3708 #. type: Content of: <book><chapter><para>
3709 #: complete-book.xml:2958
3711 "Fake news — conspiracy theories, racist ideologies, scientific denialism — "
3712 "has always been with us. What’s changed today is not the mix of ideas in the "
3713 "public discourse but the popularity of the worst ideas in that "
3714 "mix. Conspiracy and denial have skyrocketed in lockstep with the growth of "
3715 "Big Inequality, which has also tracked the rise of Big Tech and Big Pharma "
3716 "and Big Wrestling and Big Car and Big Movie Theater and Big Everything Else."
3719 #. type: Content of: <book><chapter><para>
3720 #: complete-book.xml:2967
3722 "No one can say for certain why this has happened, but the two dominant camps "
3723 "are idealism (the belief that the people who argue for these conspiracies "
3724 "have gotten better at explaining them, maybe with the help of "
3725 "machine-learning tools) or materialism (the ideas have become more "
3726 "attractive because of material conditions in the world)."
3729 #. type: Content of: <book><chapter><para>
3730 #: complete-book.xml:2975
3732 "I’m a materialist. I’ve been exposed to the arguments of conspiracy "
3733 "theorists all my life, and I have not experienced any qualitative leap in "
3734 "the quality of those arguments."
3737 #. type: Content of: <book><chapter><para>
3738 #: complete-book.xml:2980
3740 "The major difference is in the world, not the arguments. In a time where "
3741 "actual conspiracies are commonplace, conspiracy theories acquire a ring of "
3745 #. type: Content of: <book><chapter><para>
3746 #: complete-book.xml:2985
3748 "We have always had disagreements about what’s true, but today, we have a "
3749 "disagreement over how we know whether something is true. This is an "
3750 "epistemological crisis, not a crisis over belief. It’s a crisis over the "
3751 "credibility of our truth-seeking exercises, from scientific journals (in an "
3752 "era where the biggest journal publishers have been caught producing "
3753 "pay-to-play journals for junk science) to regulations (in an era where "
3754 "regulators are routinely cycling in and out of business) to education (in an "
3755 "era where universities are dependent on corporate donations to keep their "
3759 #. type: Content of: <book><chapter><para>
3760 #: complete-book.xml:2996
3762 "Targeting — surveillance capitalism — makes it easier to find people who are "
3763 "undergoing this epistemological crisis, but it doesn’t create the "
3764 "crisis. For that, you need to look to corruption."
3767 #. type: Content of: <book><chapter><para>
3768 #: complete-book.xml:3001
3770 "And, conveniently enough, it’s corruption that allows surveillance "
3771 "capitalism to grow by dismantling monopoly protections, by permitting "
3772 "reckless collection and retention of personal data, by allowing ads to be "
3773 "targeted in secret, and by foreclosing on the possibility of going somewhere "
3774 "else where you might continue to enjoy your friends without subjecting "
3775 "yourself to commercial surveillance."
3778 #. type: Content of: <book><chapter><title>
3779 #: complete-book.xml:3010
3780 msgid "Tech is different"
3783 #. type: Content of: <book><chapter><para>
3784 #: complete-book.xml:3012
3786 "I reject both iterations of technological exceptionalism. I reject the idea "
3787 "that tech is uniquely terrible and led by people who are greedier or worse "
3788 "than the leaders of other industries, and I reject the idea that tech is so "
3789 "good — or so intrinsically prone to concentration — that it can’t be blamed "
3790 "for its present-day monopolistic status."
3793 #. type: Content of: <book><chapter><para>
3794 #: complete-book.xml:3020
3796 "I think tech is just another industry, albeit one that grew up in the "
3797 "absence of real monopoly constraints. It may have been first, but it isn’t "
3798 "the worst nor will it be the last."
3801 #. type: Content of: <book><chapter><para>
3802 #: complete-book.xml:3025
3804 "But there’s one way in which I <emphasis>am</emphasis> a tech "
3805 "exceptionalist. I believe that online tools are the key to overcoming "
3806 "problems that are much more urgent than tech monopolization: climate change, "
3807 "inequality, misogyny, and discrimination on the basis of race, gender "
3808 "identity, and other factors. The internet is how we will recruit people to "
3809 "fight those fights, and how we will coordinate their labor. Tech is not a "
3810 "substitute for democratic accountability, the rule of law, fairness, or "
3811 "stability — but it’s a means to achieve these things."
3814 #. type: Content of: <book><chapter><para>
3815 #: complete-book.xml:3036
3817 "The hard problem of our species is coordination. Everything from climate "
3818 "change to social change to running a business to making a family work can be "
3819 "viewed as a collective action problem."
3822 #. type: Content of: <book><chapter><para>
3823 #: complete-book.xml:3041
3825 "The internet makes it easier than at any time before to find people who want "
3826 "to work on a project with you — hence the success of free and open-source "
3827 "software, crowdfunding, and racist terror groups — and easier than ever to "
3828 "coordinate the work you do."
3831 #. type: Content of: <book><chapter><para>
3832 #: complete-book.xml:3047
3834 "The internet and the computers we connect to it also possess an exceptional "
3835 "quality: general-purposeness. The internet is designed to allow any two "
3836 "parties to communicate any data, using any protocol, without permission from "
3837 "anyone else. The only production design we have for computers is the "
3838 "general-purpose, “Turing complete” computer that can run every program we "
3839 "can express in symbolic logic."
3842 #. type: Content of: <book><chapter><para>
3843 #: complete-book.xml:3056
3845 "This means that every time someone with a special communications need "
3846 "invests in infrastructure and techniques to make the internet faster, "
3847 "cheaper, and more robust, this benefit redounds to everyone else who is "
3848 "using the internet to communicate. And this also means that every time "
3849 "someone with a special computing need invests to make computers faster, "
3850 "cheaper, and more robust, every other computing application is a potential "
3851 "beneficiary of this work."
3854 #. type: Content of: <book><chapter><para>
3855 #: complete-book.xml:3065
3857 "For these reasons, every type of communication is gradually absorbed into "
3858 "the internet, and every type of device — from airplanes to pacemakers — "
3859 "eventually becomes a computer in a fancy case."
3862 #. type: Content of: <book><chapter><para>
3863 #: complete-book.xml:3070
3865 "While these considerations don’t preclude regulating networks and computers, "
3866 "they do call for gravitas and caution when doing so because changes to "
3867 "regulatory frameworks could ripple out to have unintended consequences in "
3868 "many, many other domains."
3871 #. type: Content of: <book><chapter><para>
3872 #: complete-book.xml:3076
3874 "The upshot of this is that our best hope of solving the big coordination "
3875 "problems — climate change, inequality, etc. — is with free, fair, and open "
3876 "tech. Our best hope of keeping tech free, fair, and open is to exercise "
3877 "caution in how we regulate tech and to attend closely to the ways in which "
3878 "interventions to solve one problem might create problems in other domains."
3881 #. type: Content of: <book><chapter><title>
3882 #: complete-book.xml:3084
3883 msgid "Ownership of facts"
3886 #. type: Content of: <book><chapter><para>
3887 #: complete-book.xml:3086
3889 "Big Tech has a funny relationship with information. When you’re generating "
3890 "information — anything from the location data streaming off your mobile "
3891 "device to the private messages you send to friends on a social network — it "
3892 "claims the rights to make unlimited use of that data."
3895 #. type: Content of: <book><chapter><para>
3896 #: complete-book.xml:3093
3898 "But when you have the audacity to turn the tables — to use a tool that "
3899 "blocks ads or slurps your waiting updates out of a social network and puts "
3900 "them in another app that lets you set your own priorities and suggestions or "
3901 "crawls their system to allow you to start a rival business — they claim that "
3902 "you’re stealing from them."
3905 #. type: Content of: <book><chapter><para>
3906 #: complete-book.xml:3100
3908 "The thing is, information is a very bad fit for any kind of private property "
3909 "regime. Property rights are useful for establishing markets that can lead to "
3910 "the effective development of fallow assets. These markets depend on clear "
3911 "titles to ensure that the things being bought and sold in them can, in fact, "
3912 "be bought and sold."
3915 #. type: Content of: <book><chapter><para>
3916 #: complete-book.xml:3107
3918 "Information rarely has such a clear title. Take phone numbers: There’s "
3919 "clearly something going wrong when Facebook slurps up millions of users’ "
3920 "address books and uses the phone numbers it finds in them to plot out social "
3921 "graphs and fill in missing information about other users."
3924 #. type: Content of: <book><chapter><para>
3925 #: complete-book.xml:3114
3927 "But the phone numbers Facebook nonconsensually acquires in this transaction "
3928 "are not the “property” of the users they’re taken from nor do they belong to "
3929 "the people whose phones ring when you dial those numbers. The numbers are "
3930 "mere integers, 10 digits in the U.S. and Canada, and they appear in "
3931 "millions of places, including somewhere deep in pi as well as numerous other "
3932 "contexts. Giving people ownership titles to integers is an obviously "
3936 #. type: Content of: <book><chapter><para>
3937 #: complete-book.xml:3123
3939 "Likewise for the facts that Facebook and other commercial surveillance "
3940 "operators acquire about us, like that we are the children of our parents or "
3941 "the parents to our children or that we had a conversation with someone else "
3942 "or went to a public place. These data points can’t be property in the sense "
3943 "that your house or your shirt is your property because the title to them is "
3944 "intrinsically muddy: Does your mom own the fact that she is your mother? Do "
3945 "you? Do both of you? What about your dad — does he own this fact too, or "
3946 "does he have to license the fact from you (or your mom or both of you) in "
3947 "order to use this fact? What about the hundreds or thousands of other people "
3948 "who know these facts?"
3951 #. type: Content of: <book><chapter><para>
3952 #: complete-book.xml:3136
3954 "If you go to a Black Lives Matter demonstration, do the other demonstrators "
3955 "need your permission to post their photos from the event? The online fights "
3957 "url=\"https://www.wired.com/story/how-to-take-photos-at-protests/\">when and "
3958 "how to post photos from demonstrations</ulink> reveal a nuanced, complex "
3959 "issue that cannot be easily hand-waved away by giving one party a property "
3960 "right that everyone else in the mix has to respect."
3963 #. type: Content of: <book><chapter><para>
3964 #: complete-book.xml:3145
3966 "The fact that information isn’t a good fit with property and markets doesn’t "
3967 "mean that it’s not valuable. Babies aren’t property, but they’re inarguably "
3968 "valuable. In fact, we have a whole set of rules just for babies as well as a "
3969 "subset of those rules that apply to humans more generally. Someone who "
3970 "argues that babies won’t be truly valuable until they can be bought and sold "
3971 "like loaves of bread would be instantly and rightfully condemned as a "
3975 #. type: Content of: <book><chapter><para>
3976 #: complete-book.xml:3154
3978 "It’s tempting to reach for the property hammer when Big Tech treats your "
3979 "information like a nail — not least because Big Tech are such prolific "
3980 "abusers of property hammers when it comes to <emphasis>their</emphasis> "
3981 "information. But this is a mistake. If we allow markets to dictate the use "
3982 "of our information, then we’ll find that we’re sellers in a buyers’ market "
3983 "where the Big Tech monopolies set a price for our data that is so low as to "
3984 "be insignificant or, more likely, set at a nonnegotiable price of zero in a "
3985 "click-through agreement that you don’t have the opportunity to modify."
3988 #. type: Content of: <book><chapter><para>
3989 #: complete-book.xml:3165
3991 "Meanwhile, establishing property rights over information will create "
3992 "insurmountable barriers to independent data processing. Imagine that we "
3993 "require a license to be negotiated when a translated document is compared "
3994 "with its original, something Google has done and continues to do billions of "
3995 "times to train its automated language translation tools. Google can afford "
3996 "this, but independent third parties cannot. Google can staff a clearances "
3997 "department to negotiate one-time payments to the likes of the EU (one of the "
3998 "major repositories of translated documents) while independent watchdogs "
3999 "wanting to verify that the translations are well-prepared, or to root out "
4000 "bias in translations, will find themselves needing a staffed-up legal "
4001 "department and millions for licenses before they can even get started."
4004 #. type: Content of: <book><chapter><para>
4005 #: complete-book.xml:3180
4007 "The same goes for things like search indexes of the web or photos of "
4008 "peoples’ houses, which have become contentious thanks to Google’s Street "
4009 "View project. Whatever problems may exist with Google’s photographing of "
4010 "street scenes, resolving them by letting people decide who can take pictures "
4011 "of the facades of their homes from a public street will surely create even "
4012 "worse ones. Think of how street photography is important for newsgathering — "
4013 "including informal newsgathering, like photographing abuses of authority — "
4014 "and how being able to document housing and street life are important for "
4015 "contesting eminent domain, advocating for social aid, reporting planning and "
4016 "zoning violations, documenting discriminatory and unequal living conditions, "
4020 #. type: Content of: <book><chapter><para>
4021 #: complete-book.xml:3194
4023 "The ownership of facts is antithetical to many kinds of human progress. It’s "
4024 "hard to imagine a rule that limits Big Tech’s exploitation of our collective "
4025 "labors without inadvertently banning people from gathering data on online "
4026 "harassment or compiling indexes of changes in language or simply "
4027 "investigating how the platforms are shaping our discourse — all of which "
4028 "require scraping data that other people have created and subjecting it to "
4029 "scrutiny and analysis."
4032 #. type: Content of: <book><chapter><title>
4033 #: complete-book.xml:3204
4034 msgid "Persuasion works… slowly"
4037 #. type: Content of: <book><chapter><para>
4038 #: complete-book.xml:3206
4040 "The platforms may oversell their ability to persuade people, but obviously, "
4041 "persuasion works sometimes. Whether it’s the private realm that LGBTQ people "
4042 "used to recruit allies and normalize sexual diversity or the decadeslong "
4043 "project to convince people that markets are the only efficient way to solve "
4044 "complicated resource allocation problems, it’s clear that our societal "
4045 "attitudes <emphasis>can</emphasis> change."
4048 #. type: Content of: <book><chapter><para>
4049 #: complete-book.xml:3215
4051 "The project of shifting societal attitudes is a game of inches and "
4052 "years. For centuries, svengalis have purported to be able to accelerate this "
4053 "process, but even the most brutal forms of propaganda have struggled to make "
4054 "permanent changes. Joseph Goebbels was able to subject Germans to daily, "
4055 "mandatory, hourslong radio broadcasts, to round up and torture and murder "
4056 "dissidents, and to seize full control over their children’s education while "
4057 "banning any literature, broadcasts, or films that did not comport with his "
4061 #. type: Content of: <book><chapter><para>
4062 #: complete-book.xml:3226
4064 "Yet, after 12 years of terror, once the war ended, Nazi ideology was largely "
4065 "discredited in both East and West Germany, and a program of national truth "
4066 "and reconciliation was put in its place. Racism and authoritarianism were "
4067 "never fully abolished in Germany, but neither were the majority of Germans "
4068 "irrevocably convinced of Nazism — and the rise of racist authoritarianism in "
4069 "Germany today tells us that the liberal attitudes that replaced Nazism were "
4070 "no more permanent than Nazism itself."
4073 #. type: Content of: <book><chapter><para>
4074 #: complete-book.xml:3236
4076 "Racism and authoritarianism have also always been with us. Anyone who’s "
4077 "reviewed the kind of messages and arguments that racists put forward today "
4078 "would be hard-pressed to say that they have gotten better at presenting "
4079 "their ideas. The same pseudoscience, appeals to fear, and circular logic "
4080 "that racists presented in the 1980s, when the cause of white supremacy was "
4081 "on the wane, are to be found in the communications of leading white "
4082 "nationalists today."
4085 #. type: Content of: <book><chapter><para>
4086 #: complete-book.xml:3245
4088 "If racists haven’t gotten more convincing in the past decade, then how is it "
4089 "that more people were convinced to be openly racist at that time? I believe "
4090 "that the answer lies in the material world, not the world of ideas. The "
4091 "ideas haven’t gotten more convincing, but people have become more "
4092 "afraid. Afraid that the state can’t be trusted to act as an honest broker in "
4093 "life-or-death decisions, from those regarding the management of the economy "
4094 "to the regulation of painkillers to the rules for handling private "
4095 "information. Afraid that the world has become a game of musical chairs in "
4096 "which the chairs are being taken away at a never-before-seen rate. Afraid "
4097 "that justice for others will come at their expense. Monopolism isn’t the "
4098 "cause of these fears, but the inequality and material desperation and policy "
4099 "malpractice that monopolism contributes to is a significant contributor to "
4100 "these conditions. Inequality creates the conditions for both conspiracies "
4101 "and violent racist ideologies, and then surveillance capitalism lets "
4102 "opportunists target the fearful and the conspiracy-minded."
4105 #. type: Content of: <book><chapter><title>
4106 #: complete-book.xml:3264
4107 msgid "Paying won’t help"
4110 #. type: Content of: <book><chapter><para>
4111 #: complete-book.xml:3266
4113 "As the old saw goes, “If you’re not paying for the product, you’re the "
4117 #. type: Content of: <book><chapter><para>
4118 #: complete-book.xml:3270
4120 "It’s a commonplace belief today that the advent of free, ad-supported media "
4121 "was the original sin of surveillance capitalism. The reasoning is that the "
4122 "companies that charged for access couldn’t “compete with free” and so they "
4123 "were driven out of business. Their ad-supported competitors, meanwhile, "
4124 "declared open season on their users’ data in a bid to improve their ad "
4125 "targeting and make more money and then resorted to the most sensationalist "
4126 "tactics to generate clicks on those ads. If only we’d pay for media again, "
4127 "we’d have a better, more responsible, more sober discourse that would be "
4128 "better for democracy."
4131 #. type: Content of: <book><chapter><para>
4132 #: complete-book.xml:3282
4134 "But the degradation of news products long precedes the advent of "
4135 "ad-supported online news. Long before newspapers were online, lax antitrust "
4136 "enforcement had opened the door for unprecedented waves of consolidation and "
4137 "roll-ups in newsrooms. Rival newspapers were merged, reporters and ad sales "
4138 "staff were laid off, physical plants were sold and leased back, leaving the "
4139 "companies loaded up with debt through leveraged buyouts and subsequent "
4140 "profit-taking by the new owners. In other words, it wasn’t merely shifts in "
4141 "the classified advertising market, which was long held to be the primary "
4142 "driver in the decline of the traditional newsroom, that made news companies "
4143 "unable to adapt to the internet — it was monopolism."
4146 #. type: Content of: <book><chapter><para>
4147 #: complete-book.xml:3295
4149 "Then, as news companies <emphasis>did</emphasis> come online, the ad "
4150 "revenues they commanded dropped even as the number of internet users (and "
4151 "thus potential online readers) increased. That shift was a function of "
4152 "consolidation in the ad sales market, with Google and Facebook emerging as "
4153 "duopolists who made more money every year from advertising while paying less "
4154 "and less of it to the publishers whose work the ads appeared "
4155 "alongside. Monopolism created a buyer’s market for ad inventory with "
4156 "Facebook and Google acting as gatekeepers."
4159 #. type: Content of: <book><chapter><para>
4160 #: complete-book.xml:3305
4162 "Paid services continue to exist alongside free ones, and often it is these "
4163 "paid services — anxious to prevent people from bypassing their paywalls or "
4164 "sharing paid media with freeloaders — that exert the most control over their "
4165 "customers. Apple’s iTunes and App Stores are paid services, but to maximize "
4166 "their profitability, Apple has to lock its platforms so that third parties "
4167 "can’t make compatible software without permission. These locks allow the "
4168 "company to exercise both editorial control (enabling it to exclude <ulink "
4169 "url=\"https://ncac.org/news/blog/does-apples-strict-app-store-content-policy-limit-freedom-of-expression\">controversial "
4170 "political material</ulink>) and technological control, including control "
4171 "over who can repair the devices it makes. If we’re worried that ad-supported "
4172 "products deprive people of their right to self-determination by using "
4173 "persuasion techniques to nudge their purchase decisions a few degrees in one "
4174 "direction or the other, then the near-total control a single company holds "
4175 "over the decision of who gets to sell you software, parts, and service for "
4176 "your iPhone should have us very worried indeed."
4179 #. type: Content of: <book><chapter><para>
4180 #: complete-book.xml:3324
4182 "We shouldn’t just be concerned about payment and control: The idea that "
4183 "paying will improve discourse is also dangerously wrong. The poor success "
4184 "rate of targeted advertising means that the platforms have to incentivize "
4185 "you to “engage” with posts at extremely high levels to generate enough "
4186 "pageviews to safeguard their profits. As discussed earlier, to increase "
4187 "engagement, platforms like Facebook use machine learning to guess which "
4188 "messages will be most inflammatory and make a point of shoving those into "
4189 "your eyeballs at every turn so that you will hate-click and argue with "
4193 #. type: Content of: <book><chapter><para>
4194 #: complete-book.xml:3335
4196 "Perhaps paying would fix this, the reasoning goes. If platforms could be "
4197 "economically viable even if you stopped clicking on them once your "
4198 "intellectual and social curiosity had been slaked, then they would have no "
4199 "reason to algorithmically enrage you to get more clicks out of you, right?"
4202 #. type: Content of: <book><chapter><para>
4203 #: complete-book.xml:3342
4205 "There may be something to that argument, but it still ignores the wider "
4206 "economic and political context of the platforms and the world that allowed "
4207 "them to grow so dominant."
4210 #. type: Content of: <book><chapter><para>
4211 #: complete-book.xml:3347
4213 "Platforms are world-spanning and all-encompassing because they are "
4214 "monopolies, and they are monopolies because we have gutted our most "
4215 "important and reliable anti-monopoly rules. Antitrust was neutered as a key "
4216 "part of the project to make the wealthy wealthier, and that project has "
4217 "worked. The vast majority of people on Earth have a negative net worth, and "
4218 "even the dwindling middle class is in a precarious state, undersaved for "
4219 "retirement, underinsured for medical disasters, and undersecured against "
4220 "climate and technology shocks."
4223 #. type: Content of: <book><chapter><para>
4224 #: complete-book.xml:3358
4226 "In this wildly unequal world, paying doesn’t improve the discourse; it "
4227 "simply prices discourse out of the range of the majority of people. Paying "
4228 "for the product is dandy, if you can afford it."
4231 #. type: Content of: <book><chapter><para>
4232 #: complete-book.xml:3363
4234 "If you think today’s filter bubbles are a problem for our discourse, imagine "
4235 "what they’d be like if rich people inhabited free-flowing Athenian "
4236 "marketplaces of ideas where you have to pay for admission while everyone "
4237 "else lives in online spaces that are subsidized by wealthy benefactors who "
4238 "relish the chance to establish conversational spaces where the “house rules” "
4239 "forbid questioning the status quo. That is, imagine if the rich seceded from "
4240 "Facebook, and then, instead of running ads that made money for shareholders, "
4241 "Facebook became a billionaire’s vanity project that also happened to ensure "
4242 "that nobody talked about whether it was fair that only billionaires could "
4243 "afford to hang out in the rarified corners of the internet."
4246 #. type: Content of: <book><chapter><para>
4247 #: complete-book.xml:3377
4249 "Behind the idea of paying for access is a belief that free markets will "
4250 "address Big Tech’s dysfunction. After all, to the extent that people have a "
4251 "view of surveillance at all, it is generally an unfavorable one, and the "
4252 "longer and more thoroughly one is surveilled, the less one tends to like "
4253 "it. Same goes for lock-in: If HP’s ink or Apple’s App Store were really "
4254 "obviously fantastic, they wouldn’t need technical measures to prevent users "
4255 "from choosing a rival’s product. The only reason these technical "
4256 "countermeasures exist is that the companies don’t believe their customers "
4257 "would <emphasis>voluntarily</emphasis> submit to their terms, and they want "
4258 "to deprive them of the choice to take their business elsewhere."
4261 #. type: Content of: <book><chapter><para>
4262 #: complete-book.xml:3390
4264 "Advocates for markets laud their ability to aggregate the diffused knowledge "
4265 "of buyers and sellers across a whole society through demand signals, price "
4266 "signals, and so on. The argument for surveillance capitalism being a “rogue "
4267 "capitalism” is that machine-learning-driven persuasion techniques distort "
4268 "decision-making by consumers, leading to incorrect signals — consumers don’t "
4269 "buy what they prefer, they buy what they’re tricked into preferring. It "
4270 "follows that the monopolistic practices of lock-in, which do far more to "
4271 "constrain consumers’ free choices, are even more of a “rogue capitalism.”"
4274 #. type: Content of: <book><chapter><para>
4275 #: complete-book.xml:3402
4277 "The profitability of any business is constrained by the possibility that its "
4278 "customers will take their business elsewhere. Both surveillance and lock-in "
4279 "are anti-features that no customer wants. But monopolies can capture their "
4280 "regulators, crush their competitors, insert themselves into their customers’ "
4281 "lives, and corral people into “choosing” their services regardless of "
4282 "whether they want them — it’s fine to be terrible when there is no "
4286 #. type: Content of: <book><chapter><para>
4287 #: complete-book.xml:3412
4289 "Ultimately, surveillance and lock-in are both simply business strategies "
4290 "that monopolists can choose. Surveillance companies like Google are "
4291 "perfectly capable of deploying lock-in technologies — just look at the "
4292 "onerous Android licensing terms that require device-makers to bundle in "
4293 "Google’s suite of applications. And lock-in companies like Apple are "
4294 "perfectly capable of subjecting their users to surveillance if it means "
4295 "keeping the Chinese government happy and preserving ongoing access to "
4296 "Chinese markets. Monopolies may be made up of good, ethical people, but as "
4297 "institutions, they are not your friend — they will do whatever they can get "
4298 "away with to maximize their profits, and the more monopolistic they are, the "
4299 "more they <emphasis>can</emphasis> get away with."
4302 #. type: Content of: <book><chapter><title>
4303 #: complete-book.xml:3427
4304 msgid "An “ecology” moment for trustbusting"
4307 #. type: Content of: <book><chapter><para>
4308 #: complete-book.xml:3429
4310 "If we’re going to break Big Tech’s death grip on our digital lives, we’re "
4311 "going to have to fight monopolies. That may sound pretty mundane and "
4312 "old-fashioned, something out of the New Deal era, while ending the use of "
4313 "automated behavioral modification feels like the plotline of a really cool "
4317 #. type: Content of: <book><chapter><para>
4318 #: complete-book.xml:3436
4320 "Meanwhile, breaking up monopolies is something we seem to have forgotten how "
4321 "to do. There is a bipartisan, trans-Atlantic consensus that breaking up "
4322 "companies is a fool’s errand at best — liable to mire your federal "
4323 "prosecutors in decades of litigation — and counterproductive at worst, "
4324 "eroding the “consumer benefits” of large companies with massive efficiencies "
4328 #. type: Content of: <book><chapter><para>
4329 #: complete-book.xml:3444
4331 "But trustbusters once strode the nation, brandishing law books, terrorizing "
4332 "robber barons, and shattering the illusion of monopolies’ all-powerful grip "
4333 "on our society. The trustbusting era could not begin until we found the "
4334 "political will — until the people convinced politicians they’d have their "
4335 "backs when they went up against the richest, most powerful men in the world."
4338 #. type: Content of: <book><chapter><para>
4339 #: complete-book.xml:3452
4340 msgid "Could we find that political will again?"
4343 #. type: Content of: <book><chapter><para>
4344 #: complete-book.xml:3455
4346 "Copyright scholar James Boyle has described how the term “ecology” marked a "
4347 "turning point in environmental activism. Prior to the adoption of this term, "
4348 "people who wanted to preserve whale populations didn’t necessarily see "
4349 "themselves as fighting the same battle as people who wanted to protect the "
4350 "ozone layer or fight freshwater pollution or beat back smog or acid rain."
4353 #. type: Content of: <book><chapter><para>
4354 #: complete-book.xml:3463
4356 "But the term “ecology” welded these disparate causes together into a single "
4357 "movement, and the members of this movement found solidarity with one "
4358 "another. The people who cared about smog signed petitions circulated by the "
4359 "people who wanted to end whaling, and the anti-whalers marched alongside the "
4360 "people demanding action on acid rain. This uniting behind a common cause "
4361 "completely changed the dynamics of environmentalism, setting the stage for "
4362 "today’s climate activism and the sense that preserving the habitability of "
4363 "the planet Earth is a shared duty among all people."
4366 #. type: Content of: <book><chapter><para>
4367 #: complete-book.xml:3474
4369 "I believe we are on the verge of a new “ecology” moment dedicated to "
4370 "combating monopolies. After all, tech isn’t the only concentrated industry "
4371 "nor is it even the <emphasis>most</emphasis> concentrated of industries."
4374 #. type: Content of: <book><chapter><para>
4375 #: complete-book.xml:3480
4377 "You can find partisans for trustbusting in every sector of the "
4378 "economy. Everywhere you look, you can find people who’ve been wronged by "
4379 "monopolists who’ve trashed their finances, their health, their privacy, "
4380 "their educations, and the lives of people they love. Those people have the "
4381 "same cause as the people who want to break up Big Tech and the same "
4382 "enemies. When most of the world’s wealth is in the hands of a very few, it "
4383 "follows that nearly every large company will have overlapping shareholders."
4386 #. type: Content of: <book><chapter><para>
4387 #: complete-book.xml:3490
4389 "That’s the good news: With a little bit of work and a little bit of "
4390 "coalition building, we have more than enough political will to break up Big "
4391 "Tech and every other concentrated industry besides. First we take Facebook, "
4392 "then we take AT&T/WarnerMedia."
4395 #. type: Content of: <book><chapter><para>
4396 #: complete-book.xml:3496
4398 "But here’s the bad news: Much of what we’re doing to tame Big Tech "
4399 "<emphasis>instead</emphasis> of breaking up the big companies also "
4400 "forecloses on the possibility of breaking them up later."
4403 #. type: Content of: <book><chapter><para>
4404 #: complete-book.xml:3501
4406 "Big Tech’s concentration currently means that their inaction on harassment, "
4407 "for example, leaves users with an impossible choice: absent themselves from "
4408 "public discourse by, say, quitting Twitter or endure vile, constant "
4409 "abuse. Big Tech’s over-collection and over-retention of data results in "
4410 "horrific identity theft. And their inaction on extremist recruitment means "
4411 "that white supremacists who livestream their shooting rampages can reach an "
4412 "audience of billions. The combination of tech concentration and media "
4413 "concentration means that artists’ incomes are falling even as the revenue "
4414 "generated by their creations are increasing."
4417 #. type: Content of: <book><chapter><para>
4418 #: complete-book.xml:3513
4420 "Yet governments confronting all of these problems all inevitably converge on "
4421 "the same solution: deputize the Big Tech giants to police their users and "
4422 "render them liable for their users’ bad actions. The drive to force Big Tech "
4423 "to use automated filters to block everything from copyright infringement to "
4424 "sex-trafficking to violent extremism means that tech companies will have to "
4425 "allocate hundreds of millions to run these compliance systems."
4428 #. type: Content of: <book><chapter><para>
4429 #: complete-book.xml:3522
4431 "These rules — the EU’s new Directive on Copyright, Australia’s new terror "
4432 "regulation, America’s FOSTA/SESTA sex-trafficking law and more — are not "
4433 "just death warrants for small, upstart competitors that might challenge Big "
4434 "Tech’s dominance but who lack the deep pockets of established incumbents to "
4435 "pay for all these automated systems. Worse still, these rules put a floor "
4436 "under how small we can hope to make Big Tech."
4439 #. type: Content of: <book><chapter><para>
4440 #: complete-book.xml:3531
4442 "That’s because any move to break up Big Tech and cut it down to size will "
4443 "have to cope with the hard limit of not making these companies so small that "
4444 "they can no longer afford to perform these duties — and it’s "
4445 "<emphasis>expensive</emphasis> to invest in those automated filters and "
4446 "outsource content moderation. It’s already going to be hard to unwind these "
4447 "deeply concentrated, chimeric behemoths that have been welded together in "
4448 "the pursuit of monopoly profits. Doing so while simultaneously finding some "
4449 "way to fill the regulatory void that will be left behind if these "
4450 "self-policing rulers were forced to suddenly abdicate will be much, much "
4454 #. type: Content of: <book><chapter><para>
4455 #: complete-book.xml:3543
4457 "Allowing the platforms to grow to their present size has given them a "
4458 "dominance that is nearly insurmountable — deputizing them with public duties "
4459 "to redress the pathologies created by their size makes it virtually "
4460 "impossible to reduce that size. Lather, rinse, repeat: If the platforms "
4461 "don’t get smaller, they will get larger, and as they get larger, they will "
4462 "create more problems, which will give rise to more public duties for the "
4463 "companies, which will make them bigger still."
4466 #. type: Content of: <book><chapter><para>
4467 #: complete-book.xml:3553
4469 "We can work to fix the internet by breaking up Big Tech and depriving them "
4470 "of monopoly profits, or we can work to fix Big Tech by making them spend "
4471 "their monopoly profits on governance. But we can’t do both. We have to "
4472 "choose between a vibrant, open internet or a dominated, monopolized internet "
4473 "commanded by Big Tech giants that we struggle with constantly to get them to "
4474 "behave themselves."
4477 #. type: Content of: <book><chapter><title>
4478 #: complete-book.xml:3561
4479 msgid "Make Big Tech small again"
4482 #. type: Content of: <book><chapter><para>
4483 #: complete-book.xml:3563
4485 "Trustbusting is hard. Breaking big companies into smaller ones is expensive "
4486 "and time-consuming. So time-consuming that by the time you’re done, the "
4487 "world has often moved on and rendered years of litigation irrelevant. From "
4488 "1969 to 1982, the U.S. government pursued an antitrust case against IBM over "
4489 "its dominance of mainframe computing — but the case collapsed in 1982 "
4490 "because mainframes were being speedily replaced by PCs."
4493 #. type: Content of: <book><chapter><blockquote><para>
4494 #: complete-book.xml:3573
4496 "A future U.S. president could simply direct their attorney general to "
4497 "enforce the law as it was written."
4500 #. type: Content of: <book><chapter><para>
4501 #: complete-book.xml:3578
4503 "It’s far easier to prevent concentration than to fix it, and reinstating the "
4504 "traditional contours of U.S. antitrust enforcement will, at the very least, "
4505 "prevent further concentration. That means bans on mergers between large "
4506 "companies, on big companies acquiring nascent competitors, and on platform "
4507 "companies competing directly with the companies that rely on the platforms."
4510 #. type: Content of: <book><chapter><para>
4511 #: complete-book.xml:3586
4513 "These powers are all in the plain language of U.S. antitrust laws, so in "
4514 "theory, a future U.S. president could simply direct their attorney general "
4515 "to enforce the law as it was written. But after decades of judicial "
4516 "“education” in the benefits of monopolies, after multiple administrations "
4517 "that have packed the federal courts with lifetime-appointed monopoly "
4518 "cheerleaders, it’s not clear that mere administrative action would do the "
4522 #. type: Content of: <book><chapter><para>
4523 #: complete-book.xml:3595
4525 "If the courts frustrate the Justice Department and the president, the next "
4526 "stop would be Congress, which could eliminate any doubt about how antitrust "
4527 "law should be enforced in the U.S. by passing new laws that boil down to "
4528 "saying, “Knock it off. We all know what the Sherman Act says. Robert Bork "
4529 "was a deranged fantasist. For avoidance of doubt, <emphasis>fuck that "
4530 "guy</emphasis>.” In other words, the problem with monopolies is "
4531 "<emphasis>monopolism</emphasis> — the concentration of power into too few "
4532 "hands, which erodes our right to self-determination. If there is a monopoly, "
4533 "the law wants it gone, period. Sure, get rid of monopolies that create "
4534 "“consumer harm” in the form of higher prices, but also, <emphasis>get rid of "
4535 "other monopolies, too.</emphasis>"
4538 #. type: Content of: <book><chapter><para>
4539 #: complete-book.xml:3609
4541 "But this only prevents things from getting worse. To help them get better, "
4542 "we will have to build coalitions with other activists in the anti-monopoly "
4543 "ecology movement — a pluralism movement or a self-determination movement — "
4544 "and target existing monopolies in every industry for breakup and structural "
4545 "separation rules that prevent, for example, the giant eyewear monopolist "
4546 "Luxottica from dominating both the sale and the manufacture of spectacles."
4549 #. type: Content of: <book><chapter><para>
4550 #: complete-book.xml:3618
4552 "In an important sense, it doesn’t matter which industry the breakups begin "
4553 "in. Once they start, shareholders in <emphasis>every</emphasis> industry "
4554 "will start to eye their investments in monopolists skeptically. As "
4555 "trustbusters ride into town and start making lives miserable for "
4556 "monopolists, the debate around every corporate boardroom’s table will "
4557 "shift. People within corporations who’ve always felt uneasy about monopolism "
4558 "will gain a powerful new argument to fend off their evil rivals in the "
4559 "corporate hierarchy: “If we do it my way, we make less money; if we do it "
4560 "your way, a judge will fine us billions and expose us to ridicule and public "
4561 "disapprobation. So even though I get that it would be really cool to do that "
4562 "merger, lock out that competitor, or buy that little company and kill it "
4563 "before it can threaten it, we really shouldn’t — not if we don’t want to get "
4564 "tied to the DOJ’s bumper and get dragged up and down Trustbuster Road for "
4565 "the next 10 years.”"
4568 #. type: Content of: <book><chapter><title>
4569 #: complete-book.xml:3635
4573 #. type: Content of: <book><chapter><para>
4574 #: complete-book.xml:3637
4576 "Fixing Big Tech will require a lot of iteration. As cyber lawyer Lawrence "
4577 "Lessig wrote in his 1999 book, <emphasis>Code and Other Laws of "
4578 "Cyberspace</emphasis>, our lives are regulated by four forces: law (what’s "
4579 "legal), code (what’s technologically possible), norms (what’s socially "
4580 "acceptable), and markets (what’s profitable)."
4583 #. type: Content of: <book><chapter><para>
4584 #: complete-book.xml:3644
4586 "If you could wave a wand and get Congress to pass a law that re-fanged the "
4587 "Sherman Act tomorrow, you could use the impending breakups to convince "
4588 "venture capitalists to fund competitors to Facebook, Google, Twitter, and "
4589 "Apple that would be waiting in the wings after they were cut down to size."
4592 #. type: Content of: <book><chapter><para>
4593 #: complete-book.xml:3651
4595 "But getting Congress to act will require a massive normative shift, a mass "
4596 "movement of people who care about monopolies — and pulling them apart."
4599 #. type: Content of: <book><chapter><para>
4600 #: complete-book.xml:3656
4602 "Getting people to care about monopolies will take technological "
4603 "interventions that help them to see what a world free from Big Tech might "
4604 "look like. Imagine if someone could make a beloved (but unauthorized) "
4605 "third-party Facebook or Twitter client that dampens the anxiety-producing "
4606 "algorithmic drumbeat and still lets you talk to your friends without being "
4607 "spied upon — something that made social media more sociable and less "
4608 "toxic. Now imagine that it gets shut down in a brutal legal battle. It’s "
4609 "always easier to convince people that something must be done to save a thing "
4610 "they love than it is to excite them about something that doesn’t even exist "
4614 #. type: Content of: <book><chapter><para>
4615 #: complete-book.xml:3668
4617 "Neither tech nor law nor code nor markets are sufficient to reform Big "
4618 "Tech. But a profitable competitor to Big Tech could bankroll a legislative "
4619 "push; legal reform can embolden a toolsmith to make a better tool; the tool "
4620 "can create customers for a potential business who value the benefits of the "
4621 "internet but want them delivered without Big Tech; and that business can get "
4622 "funded and divert some of its profits to legal reform. 20 GOTO 10 (or "
4623 "lather, rinse, repeat). Do it again, but this time, get farther! After all, "
4624 "this time you’re starting with weaker Big Tech adversaries, a constituency "
4625 "that understands things can be better, Big Tech rivals who’ll help ensure "
4626 "their own future by bankrolling reform, and code that other programmers can "
4627 "build on to weaken Big Tech even further."
4630 #. type: Content of: <book><chapter><para>
4631 #: complete-book.xml:3682
4633 "The surveillance capitalism hypothesis — that Big Tech’s products really "
4634 "work as well as they say they do and that’s why everything is so screwed up "
4635 "— is way too easy on surveillance and even easier on capitalism. Companies "
4636 "spy because they believe their own BS, and companies spy because governments "
4637 "let them, and companies spy because any advantage from spying is so "
4638 "short-lived and minor that they have to do more and more of it just to stay "
4642 #. type: Content of: <book><chapter><para>
4643 #: complete-book.xml:3691
4645 "As to why things are so screwed up? Capitalism. Specifically, the monopolism "
4646 "that creates inequality and the inequality that creates monopolism. It’s a "
4647 "form of capitalism that rewards sociopaths who destroy the real economy to "
4648 "inflate the bottom line, and they get away with it for the same reason "
4649 "companies get away with spying: because our governments are in thrall to "
4650 "both the ideology that says monopolies are actually just fine and in thrall "
4651 "to the ideology that says that in a monopolistic world, you’d better not "
4652 "piss off the monopolists."
4655 #. type: Content of: <book><chapter><para>
4656 #: complete-book.xml:3702
4658 "Surveillance doesn’t make capitalism rogue. Capitalism’s unchecked rule "
4659 "begets surveillance. Surveillance isn’t bad because it lets people "
4660 "manipulate us. It’s bad because it crushes our ability to be our authentic "
4661 "selves — and because it lets the rich and powerful figure out who might be "
4662 "thinking of building guillotines and what dirt they can use to discredit "
4663 "those embryonic guillotine-builders before they can even get to the "
4667 #. type: Content of: <book><chapter><title>
4668 #: complete-book.xml:3711
4669 msgid "Up and through"
4672 #. type: Content of: <book><chapter><para>
4673 #: complete-book.xml:3713
4675 "With all the problems of Big Tech, it’s tempting to imagine solving the "
4676 "problem by returning to a world without tech at all. Resist that temptation."
4679 #. type: Content of: <book><chapter><para>
4680 #: complete-book.xml:3718
4682 "The only way out of our Big Tech problem is up and through. If our future is "
4683 "not reliant upon high tech, it will be because civilization has fallen. Big "
4684 "Tech wired together a planetary, species-wide nervous system that, with the "
4685 "proper reforms and course corrections, is capable of seeing us through the "
4686 "existential challenge of our species and planet. Now it’s up to us to seize "
4687 "the means of computation, putting that electronic nervous system under "
4688 "democratic, accountable control."
4691 #. type: Content of: <book><chapter><para>
4692 #: complete-book.xml:3728
4694 "I am, secretly, despite what I have said earlier, a tech exceptionalist. Not "
4695 "in the sense of thinking that tech should be given a free pass to monopolize "
4696 "because it has “economies of scale” or some other nebulous feature. I’m a "
4697 "tech exceptionalist because I believe that getting tech right matters and "
4698 "that getting it wrong will be an unmitigated catastrophe — and doing it "
4699 "right can give us the power to work together to save our civilization, our "
4700 "species, and our planet."