1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Cory Doctorow
3 # This file is distributed under the same license as the How to Destroy Surveillance Capitalism package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9 "Project-Id-Version: How to Destroy Surveillance Capitalism n/a\n"
10 "POT-Creation-Date: 2020-09-07 22:34+0200\n"
11 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
12 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
19 #. type: Attribute 'lang' of: <book>
20 #: complete-book.xml:4
24 #. type: Content of: <book><chapter><title>
25 #: complete-book.xml:6 complete-book.xml:65
26 msgid "How to Destroy Surveillance Capitalism"
29 #. type: Content of: <book><bookinfo><authorgroup><author><firstname>
30 #: complete-book.xml:11
34 #. type: Content of: <book><bookinfo><authorgroup><author><surname>
35 #: complete-book.xml:12
39 #. type: Content of: <book><bookinfo><publisher><address>
40 #: complete-book.xml:17
42 msgid "<city>Oslo</city>"
45 #. type: Content of: <book><bookinfo>
46 #: complete-book.xml:15
48 "<publisher> <publishername>Petter Reinholdtsen</publishername> <placeholder "
49 "type=\"address\" id=\"0\"/> </publisher> <copyright> <year>2020</year> "
50 "<holder>Petter Reinholdtsen</holder> </copyright>"
53 #. type: Content of: <book><bookinfo><legalnotice><para>
54 #: complete-book.xml:27
55 msgid "How to Destroy Surveillance Capitalism by Cory Doctorow."
58 #. type: Content of: <book><bookinfo><legalnotice><para>
59 #: complete-book.xml:30
60 msgid "Published by Petter Reinholdtsen."
63 #. type: Content of: <book><bookinfo><legalnotice><para><inlinemediaobject>
64 #: complete-book.xml:34
66 "<imageobject> <imagedata fileref=\"images/cc.png\" contentdepth=\"3em\" "
67 "width=\"100%\" align=\"center\"/> </imageobject> <imageobject> <imagedata "
68 "fileref=\"images/cc.svg\" contentdepth=\"3em\" width=\"100%\" "
69 "align=\"center\"/> </imageobject>"
72 #. type: Content of: <book><bookinfo><legalnotice><para><inlinemediaobject><textobject><phrase>
73 #: complete-book.xml:41
74 msgid "Creative Commons, Some rights reserved"
77 #. type: Content of: <book><bookinfo><legalnotice><para>
78 #: complete-book.xml:33
79 msgid "<placeholder type=\"inlinemediaobject\" id=\"0\"/>"
82 #. type: Content of: <book><bookinfo><legalnotice><para>
83 #: complete-book.xml:47
85 "This book is licensed under a Creative Commons license. This license permits "
86 "any use of this work, so long as attribution is given and no derivatived "
87 "material is distributed. For more information about the license visit "
88 "<ulink url=\"https://creativecommons.org/licenses/by-nd/4.0/\"/>."
91 #. type: Content of: <book><bookinfo><legalnotice><para>
92 #: complete-book.xml:54
93 msgid "ISBN 978-82-93828-05-1 (hard cover)"
96 #. type: Content of: <book><bookinfo><legalnotice><para>
97 #: complete-book.xml:57
98 msgid "ISBN 978-82-93828-06-8 (paperback)"
101 #. type: Content of: <book><bookinfo><legalnotice><para>
102 #: complete-book.xml:60
103 msgid "ISBN 978-82-93828-07-5 (ePub)"
106 #. type: Content of: <book><chapter><sect1><title>
107 #: complete-book.xml:67
108 msgid "The net of a thousand lies"
111 #. type: Content of: <book><chapter><sect1><para>
112 #: complete-book.xml:69
114 "The most surprising thing about the rebirth of flat Earthers in the 21st "
115 "century is just how widespread the evidence against them is. You can "
116 "understand how, centuries ago, people who’d never gained a high-enough "
117 "vantage point from which to see the Earth’s curvature might come to the "
118 "commonsense belief that the flat-seeming Earth was, indeed, flat."
121 #. type: Content of: <book><chapter><sect1><para>
122 #: complete-book.xml:77
124 "But today, when elementary schools routinely dangle GoPro cameras from "
125 "balloons and loft them high enough to photograph the Earth’s curve — to say "
126 "nothing of the unexceptional sight of the curved Earth from an airplane "
127 "window — it takes a heroic effort to maintain the belief that the world is "
131 #. type: Content of: <book><chapter><sect1><para>
132 #: complete-book.xml:84
134 "Likewise for white nationalism and eugenics: In an age where you can become "
135 "a computational genomics datapoint by swabbing your cheek and mailing it to "
136 "a gene-sequencing company along with a modest sum of money, <quote>race "
137 "science</quote> has never been easier to refute."
140 #. type: Content of: <book><chapter><sect1><para>
141 #: complete-book.xml:90
143 "We are living through a golden age of both readily available facts and "
144 "denial of those facts. Terrible ideas that have lingered on the fringes for "
145 "decades or even centuries have gone mainstream seemingly overnight."
148 #. type: Content of: <book><chapter><sect1><para>
149 #: complete-book.xml:96
151 "When an obscure idea gains currency, there are only two things that can "
152 "explain its ascendance: Either the person expressing that idea has gotten a "
153 "lot better at stating their case, or the proposition has become harder to "
154 "deny in the face of mounting evidence. In other words, if we want people to "
155 "take climate change seriously, we can get a bunch of Greta Thunbergs to make "
156 "eloquent, passionate arguments from podiums, winning our hearts and minds, "
157 "or we can wait for flood, fire, broiling sun, and pandemics to make the case "
158 "for us. In practice, we’ll probably have to do some of both: The more we’re "
159 "boiling and burning and drowning and wasting away, the easier it will be for "
160 "the Greta Thunbergs of the world to convince us."
163 #. type: Content of: <book><chapter><sect1><para>
164 #: complete-book.xml:109
166 "The arguments for ridiculous beliefs in odious conspiracies like "
167 "anti-vaccination, climate denial, a flat Earth, and eugenics are no better "
168 "than they were a generation ago. Indeed, they’re worse because they are "
169 "being pitched to people who have at least a background awareness of the "
173 #. type: Content of: <book><chapter><sect1><para>
174 #: complete-book.xml:116
176 "Anti-vax has been around since the first vaccines, but the early "
177 "anti-vaxxers were pitching people who were less equipped to understand even "
178 "the most basic ideas from microbiology, and moreover, those people had not "
179 "witnessed the extermination of mass-murdering diseases like polio, smallpox, "
180 "and measles. Today’s anti-vaxxers are no more eloquent than their forebears, "
181 "and they have a much harder job."
184 #. type: Content of: <book><chapter><sect1><para>
185 #: complete-book.xml:125
187 "So can these far-fetched conspiracy theorists really be succeeding on the "
188 "basis of superior arguments?"
191 #. type: Content of: <book><chapter><sect1><para>
192 #: complete-book.xml:129
194 "Some people think so. Today, there is a widespread belief that machine "
195 "learning and commercial surveillance can turn even the most fumble-tongued "
196 "conspiracy theorist into a svengali who can warp your perceptions and win "
197 "your belief by locating vulnerable people and then pitching them with "
198 "A.I.-refined arguments that bypass their rational faculties and turn "
199 "everyday people into flat Earthers, anti-vaxxers, or even Nazis. When the "
200 "RAND Corporation <ulink "
201 "url=\"https://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf\">blames "
202 "Facebook for <quote>radicalization</quote></ulink> and when Facebook’s role "
203 "in spreading coronavirus misinformation is <ulink "
204 "url=\"https://secure.avaaz.org/campaign/en/facebook_threat_health/\">blamed "
205 "on its algorithm</ulink>, the implicit message is that machine learning and "
206 "surveillance are causing the changes in our consensus about what’s true."
209 #. type: Content of: <book><chapter><sect1><para>
210 #: complete-book.xml:145
212 "After all, in a world where sprawling and incoherent conspiracy theories "
213 "like Pizzagate and its successor, QAnon, have widespread followings, "
214 "<emphasis>something</emphasis> must be afoot."
217 #. type: Content of: <book><chapter><sect1><para>
218 #: complete-book.xml:150
220 "But what if there’s another explanation? What if it’s the material "
221 "circumstances, and not the arguments, that are making the difference for "
222 "these conspiracy pitchmen? What if the trauma of living through "
223 "<emphasis>real conspiracies</emphasis> all around us — conspiracies among "
224 "wealthy people, their lobbyists, and lawmakers to bury inconvenient facts "
225 "and evidence of wrongdoing (these conspiracies are commonly known as "
226 "<quote>corruption</quote>) — is making people vulnerable to conspiracy "
230 #. type: Content of: <book><chapter><sect1><para>
231 #: complete-book.xml:160
233 "If it’s trauma and not contagion — material conditions and not ideology — "
234 "that is making the difference today and enabling a rise of repulsive "
235 "misinformation in the face of easily observed facts, that doesn’t mean our "
236 "computer networks are blameless. They’re still doing the heavy work of "
237 "locating vulnerable people and guiding them through a series of "
238 "ever-more-extreme ideas and communities."
241 #. type: Content of: <book><chapter><sect1><para>
242 #: complete-book.xml:168
244 "Belief in conspiracy is a raging fire that has done real damage and poses "
245 "real danger to our planet and species, from epidemics <ulink "
246 "url=\"https://www.cdc.gov/measles/cases-outbreaks.html\">kicked off by "
247 "vaccine denial</ulink> to genocides <ulink "
248 "url=\"https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html\">kicked "
249 "off by racist conspiracies</ulink> to planetary meltdown caused by "
250 "denial-inspired climate inaction. Our world is on fire, and so we have to "
251 "put the fires out — to figure out how to help people see the truth of the "
252 "world through the conspiracies they’ve been confused by."
255 #. type: Content of: <book><chapter><sect1><para>
256 #: complete-book.xml:180
258 "But firefighting is reactive. We need fire "
259 "<emphasis>prevention</emphasis>. We need to strike at the traumatic material "
260 "conditions that make people vulnerable to the contagion of conspiracy. Here, "
261 "too, tech has a role to play."
264 #. type: Content of: <book><chapter><sect1><para>
265 #: complete-book.xml:186
267 "There’s no shortage of proposals to address this. From the EU’s <ulink "
268 "url=\"https://edri.org/tag/terreg/\">Terrorist Content Regulation</ulink>, "
269 "which requires platforms to police and remove <quote>extremist</quote> "
270 "content, to the U.S. proposals to <ulink "
271 "url=\"https://www.eff.org/deeplinks/2020/03/earn-it-act-violates-constitution\">force "
272 "tech companies to spy on their users</ulink> and hold them liable <ulink "
273 "url=\"https://www.natlawreview.com/article/repeal-cda-section-230\">for "
274 "their users’ bad speech</ulink>, there’s a lot of energy to force tech "
275 "companies to solve the problems they created."
278 #. type: Content of: <book><chapter><sect1><para>
279 #: complete-book.xml:197
281 "There’s a critical piece missing from the debate, though. All these "
282 "solutions assume that tech companies are a fixture, that their dominance "
283 "over the internet is a permanent fact. Proposals to replace Big Tech with a "
284 "more diffused, pluralistic internet are nowhere to be found. Worse: The "
285 "<quote>solutions</quote> on the table today <emphasis>require</emphasis> Big "
286 "Tech to stay big because only the very largest companies can afford to "
287 "implement the systems these laws demand."
290 #. type: Content of: <book><chapter><sect1><para>
291 #: complete-book.xml:207
293 "Figuring out what we want our tech to look like is crucial if we’re going to "
294 "get out of this mess. Today, we’re at a crossroads where we’re trying to "
295 "figure out if we want to fix the Big Tech companies that dominate our "
296 "internet or if we want to fix the internet itself by unshackling it from Big "
297 "Tech’s stranglehold. We can’t do both, so we have to choose."
300 #. type: Content of: <book><chapter><sect1><para>
301 #: complete-book.xml:215
303 "I want us to choose wisely. Taming Big Tech is integral to fixing the "
304 "internet, and for that, we need digital rights activism."
307 #. type: Content of: <book><chapter><sect1><title>
308 #: complete-book.xml:219
309 msgid "Digital rights activism, a quarter-century on"
312 #. type: Content of: <book><chapter><sect1><para>
313 #: complete-book.xml:221
315 "Digital rights activism is more than 30 years old now. The Electronic "
316 "Frontier Foundation turned 30 this year; the Free Software Foundation "
317 "launched in 1985. For most of the history of the movement, the most "
318 "prominent criticism leveled against it was that it was irrelevant: The real "
319 "activist causes were real-world causes (think of the skepticism when <ulink "
320 "url=\"https://www.loc.gov/law/foreign-news/article/finland-legal-right-to-broadband-for-all-citizens/#:~:text=Global%20Legal%20Monitor,-Home%20%7C%20Search%20%7C%20Browse&text=(July%206%2C%202010)%20On,connection%20100%20MBPS%20by%202015.\">Finland "
321 "declared broadband a human right in 2010</ulink>), and real-world activism "
322 "was shoe-leather activism (think of Malcolm Gladwell’s <ulink "
323 "url=\"https://www.newyorker.com/magazine/2010/10/04/small-change-malcolm-gladwell\">contempt "
324 "for <quote>clicktivism</quote></ulink>). But as tech has grown more central "
325 "to our daily lives, these accusations of irrelevance have given way first to "
326 "accusations of insincerity (<quote>You only care about tech because you’re "
328 "url=\"https://www.ipwatchdog.com/2018/06/04/report-engine-eff-shills-google-patent-reform/id=98007/\">shilling "
329 "for tech companies</ulink></quote>) to accusations of negligence (<quote>Why "
330 "didn’t you foresee that tech could be such a destructive force?</quote>). "
331 "But digital rights activism is right where it’s always been: looking out for "
332 "the humans in a world where tech is inexorably taking over."
335 #. type: Content of: <book><chapter><sect1><para>
336 #: complete-book.xml:242
338 "The latest version of this critique comes in the form of <quote>surveillance "
339 "capitalism,</quote> a term coined by business professor Shoshana Zuboff in "
340 "her long and influential 2019 book, <emphasis>The Age of Surveillance "
341 "Capitalism: The Fight for a Human Future at the New Frontier of "
342 "Power</emphasis>. Zuboff argues that <quote>surveillance capitalism</quote> "
343 "is a unique creature of the tech industry and that it is unlike any other "
344 "abusive commercial practice in history, one that is <quote>constituted by "
345 "unexpected and often illegible mechanisms of extraction, commodification, "
346 "and control that effectively exile persons from their own behavior while "
347 "producing new markets of behavioral prediction and "
348 "modification. Surveillance capitalism challenges democratic norms and "
349 "departs in key ways from the centuries-long evolution of market "
350 "capitalism.</quote> It is a new and deadly form of capitalism, a "
351 "<quote>rogue capitalism,</quote> and our lack of understanding of its unique "
352 "capabilities and dangers represents an existential, species-wide "
353 "threat. She’s right that capitalism today threatens our species, and she’s "
354 "right that tech poses unique challenges to our species and civilization, but "
355 "she’s really wrong about how tech is different and why it threatens our "
359 #. type: Content of: <book><chapter><sect1><para>
360 #: complete-book.xml:263
362 "What’s more, I think that her incorrect diagnosis will lead us down a path "
363 "that ends up making Big Tech stronger, not weaker. We need to take down Big "
364 "Tech, and to do that, we need to start by correctly identifying the problem."
367 #. type: Content of: <book><chapter><sect1><title>
368 #: complete-book.xml:269
369 msgid "Tech exceptionalism, then and now"
372 #. type: Content of: <book><chapter><sect1><para>
373 #: complete-book.xml:271
375 "Early critics of the digital rights movement — perhaps best represented by "
376 "campaigning organizations like the Electronic Frontier Foundation, the Free "
377 "Software Foundation, Public Knowledge, and others that focused on preserving "
378 "and enhancing basic human rights in the digital realm — damned activists for "
379 "practicing <quote>tech exceptionalism.</quote> Around the turn of the "
380 "millennium, serious people ridiculed any claim that tech policy mattered in "
381 "the <quote>real world.</quote> Claims that tech rules had implications for "
382 "speech, association, privacy, search and seizure, and fundamental rights and "
383 "equities were treated as ridiculous, an elevation of the concerns of sad "
384 "nerds arguing about <emphasis>Star Trek</emphasis> on bulletin board systems "
385 "above the struggles of the Freedom Riders, Nelson Mandela, or the Warsaw "
389 #. type: Content of: <book><chapter><sect1><para>
390 #: complete-book.xml:286
392 "In the decades since, accusations of <quote>tech exceptionalism</quote> have "
393 "only sharpened as tech’s role in everyday life has expanded: Now that tech "
394 "has infiltrated every corner of our life and our online lives have been "
395 "monopolized by a handful of giants, defenders of digital freedoms are "
396 "accused of carrying water for Big Tech, providing cover for its "
397 "self-interested negligence (or worse, nefarious plots)."
400 #. type: Content of: <book><chapter><sect1><para>
401 #: complete-book.xml:294
403 "From my perspective, the digital rights movement has remained stationary "
404 "while the rest of the world has moved. From the earliest days, the "
405 "movement’s concern was users and the toolsmiths who provided the code they "
406 "needed to realize their fundamental rights. Digital rights activists only "
407 "cared about companies to the extent that companies were acting to uphold "
408 "users’ rights (or, just as often, when companies were acting so foolishly "
409 "that they threatened to bring down new rules that would also make it harder "
410 "for good actors to help users)."
413 #. type: Content of: <book><chapter><sect1><para>
414 #: complete-book.xml:305
416 "The <quote>surveillance capitalism</quote> critique recasts the digital "
417 "rights movement in a new light again: not as alarmists who overestimate the "
418 "importance of their shiny toys nor as shills for big tech but as serene "
419 "deck-chair rearrangers whose long-standing activism is a liability because "
420 "it makes them incapable of perceiving novel threats as they continue to "
421 "fight the last century’s tech battles."
424 #. type: Content of: <book><chapter><sect1><para>
425 #: complete-book.xml:313
426 msgid "But tech exceptionalism is a sin no matter who practices it."
429 #. type: Content of: <book><chapter><sect1><title>
430 #: complete-book.xml:316
431 msgid "Don’t believe the hype"
434 #. type: Content of: <book><chapter><sect1><para>
435 #: complete-book.xml:318
437 "You’ve probably heard that <quote>if you’re not paying for the product, "
438 "you’re the product.</quote> As we’ll see below, that’s true, if incomplete. "
439 "But what is <emphasis>absolutely</emphasis> true is that ad-driven Big "
440 "Tech’s customers are advertisers, and what companies like Google and "
441 "Facebook sell is their ability to convince <emphasis>you</emphasis> to buy "
442 "stuff. Big Tech’s product is persuasion. The services — social media, search "
443 "engines, maps, messaging, and more — are delivery systems for persuasion."
446 #. type: Content of: <book><chapter><sect1><para>
447 #: complete-book.xml:328
449 "The fear of surveillance capitalism starts from the (correct) presumption "
450 "that everything Big Tech says about itself is probably a lie. But the "
451 "surveillance capitalism critique makes an exception for the claims Big Tech "
452 "makes in its sales literature — the breathless hype in the pitches to "
453 "potential advertisers online and in ad-tech seminars about the efficacy of "
454 "its products: It assumes that Big Tech is as good at influencing us as they "
455 "claim they are when they’re selling influencing products to credulous "
456 "customers. That’s a mistake because sales literature is not a reliable "
457 "indicator of a product’s efficacy."
460 #. type: Content of: <book><chapter><sect1><para>
461 #: complete-book.xml:340
463 "Surveillance capitalism assumes that because advertisers buy a lot of what "
464 "Big Tech is selling, Big Tech must be selling something real. But Big Tech’s "
465 "massive sales could just as easily be the result of a popular delusion or "
466 "something even more pernicious: monopolistic control over our communications "
470 #. type: Content of: <book><chapter><sect1><para>
471 #: complete-book.xml:347
473 "Being watched changes your behavior, and not for the better. It creates "
474 "risks for our social progress. Zuboff’s book features beautifully wrought "
475 "explanations of these phenomena. But Zuboff also claims that surveillance "
476 "literally robs us of our free will — that when our personal data is mixed "
477 "with machine learning, it creates a system of persuasion so devastating that "
478 "we are helpless before it. That is, Facebook uses an algorithm to analyze "
479 "the data it nonconsensually extracts from your daily life and uses it to "
480 "customize your feed in ways that get you to buy stuff. It is a mind-control "
481 "ray out of a 1950s comic book, wielded by mad scientists whose "
482 "supercomputers guarantee them perpetual and total world domination."
485 #. type: Content of: <book><chapter><sect1><title>
486 #: complete-book.xml:361
487 msgid "What is persuasion?"
490 #. type: Content of: <book><chapter><sect1><para>
491 #: complete-book.xml:363
493 "To understand why you shouldn’t worry about mind-control rays — but why you "
494 "<emphasis>should</emphasis> worry about surveillance "
495 "<emphasis>and</emphasis> Big Tech — we must start by unpacking what we mean "
496 "by <quote>persuasion.</quote>"
499 #. type: Content of: <book><chapter><sect1><para>
500 #: complete-book.xml:369
502 "Google, Facebook, and other surveillance capitalists promise their customers "
503 "(the advertisers) that if they use machine-learning tools trained on "
504 "unimaginably large data sets of nonconsensually harvested personal "
505 "information, they will be able to uncover ways to bypass the rational "
506 "faculties of the public and direct their behavior, creating a stream of "
507 "purchases, votes, and other desired outcomes."
510 #. type: Content of: <book><chapter><sect1><blockquote><para>
511 #: complete-book.xml:378
513 "The impact of dominance far exceeds the impact of manipulation and should be "
514 "central to our analysis and any remedies we seek."
517 #. type: Content of: <book><chapter><sect1><para>
518 #: complete-book.xml:383
520 "But there’s little evidence that this is happening. Instead, the predictions "
521 "that surveillance capitalism delivers to its customers are much less "
522 "impressive. Rather than finding ways to bypass our rational faculties, "
523 "surveillance capitalists like Mark Zuckerberg mostly do one or more of three "
527 #. type: Content of: <book><chapter><sect1><sect2><title>
528 #: complete-book.xml:390
529 msgid "1. Segmenting"
532 #. type: Content of: <book><chapter><sect1><sect2><para>
533 #: complete-book.xml:392
535 "If you’re selling diapers, you have better luck if you pitch them to people "
536 "in maternity wards. Not everyone who enters or leaves a maternity ward just "
537 "had a baby, and not everyone who just had a baby is in the market for "
538 "diapers. But having a baby is a really reliable correlate of being in the "
539 "market for diapers, and being in a maternity ward is highly correlated with "
540 "having a baby. Hence diaper ads around maternity wards (and even pitchmen "
541 "for baby products, who haunt maternity wards with baskets full of freebies)."
544 #. type: Content of: <book><chapter><sect1><sect2><para>
545 #: complete-book.xml:403
547 "Surveillance capitalism is segmenting times a billion. Diaper vendors can go "
548 "way beyond people in maternity wards (though they can do that, too, with "
549 "things like location-based mobile ads). They can target you based on "
550 "whether you’re reading articles about child-rearing, diapers, or a host of "
551 "other subjects, and data mining can suggest unobvious keywords to advertise "
552 "against. They can target you based on the articles you’ve recently "
553 "read. They can target you based on what you’ve recently purchased. They can "
554 "target you based on whether you receive emails or private messages about "
555 "these subjects — or even if you speak aloud about them (though Facebook and "
556 "the like convincingly claim that’s not happening — yet)."
559 #. type: Content of: <book><chapter><sect1><sect2><para>
560 #: complete-book.xml:417
561 msgid "This is seriously creepy."
564 #. type: Content of: <book><chapter><sect1><sect2><para>
565 #: complete-book.xml:420
566 msgid "But it’s not mind control."
569 #. type: Content of: <book><chapter><sect1><sect2><para>
570 #: complete-book.xml:423
571 msgid "It doesn’t deprive you of your free will. It doesn’t trick you."
574 #. type: Content of: <book><chapter><sect1><sect2><para>
575 #: complete-book.xml:426
577 "Think of how surveillance capitalism works in politics. Surveillance "
578 "capitalist companies sell political operatives the power to locate people "
579 "who might be receptive to their pitch. Candidates campaigning on finance "
580 "industry corruption seek people struggling with debt; candidates campaigning "
581 "on xenophobia seek out racists. Political operatives have always targeted "
582 "their message whether their intentions were honorable or not: Union "
583 "organizers set up pitches at factory gates, and white supremacists hand out "
584 "fliers at John Birch Society meetings."
587 #. type: Content of: <book><chapter><sect1><sect2><para>
588 #: complete-book.xml:437
590 "But this is an inexact and thus wasteful practice. The union organizer can’t "
591 "know which worker to approach on the way out of the factory gates and may "
592 "waste their time on a covert John Birch Society member; the white "
593 "supremacist doesn’t know which of the Birchers are so delusional that making "
594 "it to a meeting is as much as they can manage and which ones might be "
595 "convinced to cross the country to carry a tiki torch through the streets of "
596 "Charlottesville, Virginia."
599 #. type: Content of: <book><chapter><sect1><sect2><para>
600 #: complete-book.xml:447
602 "Because targeting improves the yields on political pitches, it can "
603 "accelerate the pace of political upheaval by making it possible for everyone "
604 "who has secretly wished for the toppling of an autocrat — or just an 11-term "
605 "incumbent politician — to find everyone else who feels the same way at very "
606 "low cost. This has been critical to the rapid crystallization of recent "
607 "political movements including Black Lives Matter and Occupy Wall Street as "
608 "well as less savory players like the far-right white nationalist movements "
609 "that marched in Charlottesville."
612 #. type: Content of: <book><chapter><sect1><sect2><para>
613 #: complete-book.xml:458
615 "It’s important to differentiate this kind of political organizing from "
616 "influence campaigns; finding people who secretly agree with you isn’t the "
617 "same as convincing people to agree with you. The rise of phenomena like "
618 "nonbinary or otherwise nonconforming gender identities is often "
619 "characterized by reactionaries as the result of online brainwashing "
620 "campaigns that convince impressionable people that they have been secretly "
624 #. type: Content of: <book><chapter><sect1><sect2><para>
625 #: complete-book.xml:467
627 "But the personal accounts of those who have come out tell a different story "
628 "where people who long harbored a secret about their gender were emboldened "
629 "by others coming forward and where people who knew that they were different "
630 "but lacked a vocabulary for discussing that difference learned the right "
631 "words from these low-cost means of finding people and learning about their "
635 #. type: Content of: <book><chapter><sect1><sect2><title>
636 #: complete-book.xml:476
640 #. type: Content of: <book><chapter><sect1><sect2><para>
641 #: complete-book.xml:478
643 "Lies and fraud are pernicious, and surveillance capitalism supercharges them "
644 "through targeting. If you want to sell a fraudulent payday loan or subprime "
645 "mortgage, surveillance capitalism can help you find people who are both "
646 "desperate and unsophisticated and thus receptive to your pitch. This "
647 "accounts for the rise of many phenomena, like multilevel marketing schemes, "
648 "in which deceptive claims about potential earnings and the efficacy of sales "
649 "techniques are targeted at desperate people by advertising against search "
650 "queries that indicate, for example, someone struggling with ill-advised "
654 #. type: Content of: <book><chapter><sect1><sect2><para>
655 #: complete-book.xml:490
657 "Surveillance capitalism also abets fraud by making it easy to locate other "
658 "people who have been similarly deceived, forming a community of people who "
659 "reinforce one another’s false beliefs. Think of <ulink "
660 "url=\"https://www.vulture.com/2020/01/the-dream-podcast-review.html\">the "
661 "forums</ulink> where people who are being victimized by multilevel marketing "
662 "frauds gather to trade tips on how to improve their luck in peddling the "
666 #. type: Content of: <book><chapter><sect1><sect2><para>
667 #: complete-book.xml:500
669 "Sometimes, online deception involves replacing someone’s correct beliefs "
670 "with incorrect ones, as it does in the anti-vaccination movement, whose "
671 "victims are often people who start out believing in vaccines but are "
672 "convinced by seemingly plausible evidence that leads them into the false "
673 "belief that vaccines are harmful."
676 #. type: Content of: <book><chapter><sect1><sect2><para>
677 #: complete-book.xml:507
679 "But it’s much more common for fraud to succeed when it doesn’t have to "
680 "displace a true belief. When my daughter contracted head lice at daycare, "
681 "one of the daycare workers told me I could get rid of them by treating her "
682 "hair and scalp with olive oil. I didn’t know anything about head lice, and I "
683 "assumed that the daycare worker did, so I tried it (it didn’t work, and it "
684 "doesn’t work). It’s easy to end up with false beliefs when you simply don’t "
685 "know any better and when those beliefs are conveyed by someone who seems to "
686 "know what they’re doing."
689 #. type: Content of: <book><chapter><sect1><sect2><para>
690 #: complete-book.xml:518
692 "This is pernicious and difficult — and it’s also the kind of thing the "
693 "internet can help guard against by making true information available, "
694 "especially in a form that exposes the underlying deliberations among parties "
695 "with sharply divergent views, such as Wikipedia. But it’s not brainwashing; "
696 "it’s fraud. In the <ulink "
697 "url=\"https://datasociety.net/library/data-voids/\">majority of "
698 "cases</ulink>, the victims of these fraud campaigns have an informational "
699 "void filled in the customary way, by consulting a seemingly reliable "
700 "source. If I look up the length of the Brooklyn Bridge and learn that it is "
701 "5,800 feet long, but in reality, it is 5,989 feet long, the underlying "
702 "deception is a problem, but it’s a problem with a simple remedy. It’s a very "
703 "different problem from the anti-vax issue in which someone’s true belief is "
704 "displaced by a false one by means of sophisticated persuasion."
707 #. type: Content of: <book><chapter><sect1><sect2><title>
708 #: complete-book.xml:535
709 msgid "3. Domination"
712 #. type: Content of: <book><chapter><sect1><sect2><para>
713 #: complete-book.xml:537
715 "Surveillance capitalism is the result of monopoly. Monopoly is the cause, "
716 "and surveillance capitalism and its negative outcomes are the effects of "
717 "monopoly. I’ll get into this in depth later, but for now, suffice it to say "
718 "that the tech industry has grown up with a radical theory of antitrust that "
719 "has allowed companies to grow by merging with their rivals, buying up their "
720 "nascent competitors, and expanding to control whole market verticals."
723 #. type: Content of: <book><chapter><sect1><sect2><para>
724 #: complete-book.xml:546
726 "One example of how monopolism aids in persuasion is through dominance: "
727 "Google makes editorial decisions about its algorithms that determine the "
728 "sort order of the responses to our queries. If a cabal of fraudsters have "
729 "set out to trick the world into thinking that the Brooklyn Bridge is 5,800 "
730 "feet long, and if Google gives a high search rank to this group in response "
731 "to queries like <quote>How long is the Brooklyn Bridge?</quote> then the "
732 "first eight or 10 screens’ worth of Google results could be wrong. And since "
733 "most people don’t go beyond the first couple of results — let alone the "
734 "first <emphasis>page</emphasis> of results — Google’s choice means that many "
735 "people will be deceived."
738 #. type: Content of: <book><chapter><sect1><sect2><para>
739 #: complete-book.xml:559
741 "Google’s dominance over search — more than 86% of web searches are performed "
742 "through Google — means that the way it orders its search results has an "
743 "outsized effect on public beliefs. Ironically, Google claims this is why it "
744 "can’t afford to have any transparency in its algorithm design: Google’s "
745 "search dominance makes the results of its sorting too important to risk "
746 "telling the world how it arrives at those results lest some bad actor "
747 "discover a flaw in the ranking system and exploit it to push its point of "
748 "view to the top of the search results. There’s an obvious remedy to a "
749 "company that is too big to audit: break it up into smaller pieces."
752 #. type: Content of: <book><chapter><sect1><sect2><para>
753 #: complete-book.xml:571
755 "Zuboff calls surveillance capitalism a <quote>rogue capitalism</quote> whose "
756 "data-hoarding and machine-learning techniques rob us of our free will. But "
757 "influence campaigns that seek to displace existing, correct beliefs with "
758 "false ones have an effect that is small and temporary while monopolistic "
759 "dominance over informational systems has massive, enduring "
760 "effects. Controlling the results to the world’s search queries means "
761 "controlling access both to arguments and their rebuttals and, thus, control "
762 "over much of the world’s beliefs. If our concern is how corporations are "
763 "foreclosing on our ability to make up our own minds and determine our own "
764 "futures, the impact of dominance far exceeds the impact of manipulation and "
765 "should be central to our analysis and any remedies we seek."
768 #. type: Content of: <book><chapter><sect1><sect2><title>
769 #: complete-book.xml:586
770 msgid "4. Bypassing our rational faculties"
773 #. type: Content of: <book><chapter><sect1><sect2><para>
774 #: complete-book.xml:588
776 "<emphasis>This</emphasis> is the good stuff: using machine learning, "
777 "<quote>dark patterns,</quote> engagement hacking, and other techniques to "
778 "get us to do things that run counter to our better judgment. This is mind "
782 #. type: Content of: <book><chapter><sect1><sect2><para>
783 #: complete-book.xml:594
785 "Some of these techniques have proven devastatingly effective (if only in the "
786 "short term). The use of countdown timers on a purchase completion page can "
787 "create a sense of urgency that causes you to ignore the nagging internal "
788 "voice suggesting that you should shop around or sleep on your decision. The "
789 "use of people from your social graph in ads can provide <quote>social "
790 "proof</quote> that a purchase is worth making. Even the auction system "
791 "pioneered by eBay is calculated to play on our cognitive blind spots, "
792 "letting us feel like we <quote>own</quote> something because we bid on it, "
793 "thus encouraging us to bid again when we are outbid to ensure that "
794 "<quote>our</quote> things stay ours."
797 #. type: Content of: <book><chapter><sect1><sect2><para>
798 #: complete-book.xml:607
800 "Games are extraordinarily good at this. <quote>Free to play</quote> games "
801 "manipulate us through many techniques, such as presenting players with a "
802 "series of smoothly escalating challenges that create a sense of mastery and "
803 "accomplishment but which sharply transition into a set of challenges that "
804 "are impossible to overcome without paid upgrades. Add some social proof to "
805 "the mix — a stream of notifications about how well your friends are faring — "
806 "and before you know it, you’re buying virtual power-ups to get to the next "
810 #. type: Content of: <book><chapter><sect1><sect2><para>
811 #: complete-book.xml:618
813 "Companies have risen and fallen on these techniques, and the "
814 "<quote>fallen</quote> part is worth paying attention to. In general, living "
815 "things adapt to stimulus: Something that is very compelling or noteworthy "
816 "when you first encounter it fades with repetition until you stop noticing it "
817 "altogether. Consider the refrigerator hum that irritates you when it starts "
818 "up but disappears into the background so thoroughly that you only notice it "
819 "when it stops again."
822 #. type: Content of: <book><chapter><sect1><sect2><para>
823 #: complete-book.xml:628
825 "That’s why behavioral conditioning uses <quote>intermittent reinforcement "
826 "schedules.</quote> Instead of giving you a steady drip of encouragement or "
827 "setbacks, games and gamified services scatter rewards on a randomized "
828 "schedule — often enough to keep you interested and random enough that you "
829 "can never quite find the pattern that would make it boring."
832 #. type: Content of: <book><chapter><sect1><sect2><para>
833 #: complete-book.xml:636
835 "Intermittent reinforcement is a powerful behavioral tool, but it also "
836 "represents a collective action problem for surveillance capitalism. The "
837 "<quote>engagement techniques</quote> invented by the behaviorists of "
838 "surveillance capitalist companies are quickly copied across the whole sector "
839 "so that what starts as a mysteriously compelling fillip in the design of a "
840 "service—like <quote>pull to refresh</quote> or alerts when someone likes "
841 "your posts or side quests that your characters get invited to while in the "
842 "midst of main quests—quickly becomes dully ubiquitous. The "
843 "impossible-to-nail-down nonpattern of randomized drips from your phone "
844 "becomes a grey-noise wall of sound as every single app and site starts to "
845 "make use of whatever seems to be working at the time."
848 #. type: Content of: <book><chapter><sect1><sect2><para>
849 #: complete-book.xml:651
851 "From the surveillance capitalist’s point of view, our adaptive capacity is "
852 "like a harmful bacterium that deprives it of its food source — our attention "
853 "— and novel techniques for snagging that attention are like new antibiotics "
854 "that can be used to breach our defenses and destroy our "
855 "self-determination. And there <emphasis>are</emphasis> techniques like "
856 "that. Who can forget the Great Zynga Epidemic, when all of our friends were "
857 "caught in <emphasis>FarmVille</emphasis>’s endless, mindless dopamine loops? "
858 "But every new attention-commanding technique is jumped on by the whole "
859 "industry and used so indiscriminately that antibiotic resistance sets "
860 "in. Given enough repetition, almost all of us develop immunity to even the "
861 "most powerful techniques — by 2013, two years after Zynga’s peak, its user "
865 #. type: Content of: <book><chapter><sect1><sect2><para>
866 #: complete-book.xml:666
868 "Not everyone, of course. Some people never adapt to stimulus, just as some "
869 "people never stop hearing the hum of the refrigerator. This is why most "
870 "people who are exposed to slot machines play them for a while and then move "
871 "on while a small and tragic minority liquidate their kids’ college funds, "
872 "buy adult diapers, and position themselves in front of a machine until they "
876 #. type: Content of: <book><chapter><sect1><sect2><para>
877 #: complete-book.xml:674
879 "But surveillance capitalism’s margins on behavioral modification "
880 "suck. Tripling the rate at which someone buys a widget sounds great <ulink "
881 "url=\"https://www.forbes.com/sites/priceonomics/2018/03/09/the-advertising-conversion-rates-for-every-major-tech-platform/#2f6a67485957\">unless "
882 "the base rate is way less than 1%</ulink> with an improved rate of… still "
883 "less than 1%. Even penny slot machines pull down pennies for every spin "
884 "while surveillance capitalism rakes in infinitesimal penny fractions."
887 #. type: Content of: <book><chapter><sect1><sect2><para>
888 #: complete-book.xml:684
890 "Slot machines’ high returns mean that they can be profitable just by "
891 "draining the fortunes of the small rump of people who are pathologically "
892 "vulnerable to them and unable to adapt to their tricks. But surveillance "
893 "capitalism can’t survive on the fractional pennies it brings down from that "
894 "vulnerable sliver — that’s why, after the Great Zynga Epidemic had finally "
895 "burned itself out, the small number of still-addicted players left behind "
896 "couldn’t sustain it as a global phenomenon. And new powerful attention "
897 "weapons aren’t easy to find, as is evidenced by the long years since the "
898 "last time Zynga had a hit. Despite the hundreds of millions of dollars that "
899 "Zynga has to spend on developing new tools to blast through our adaptation, "
900 "it has never managed to repeat the lucky accident that let it snag so much "
901 "of our attention for a brief moment in 2009. Powerhouses like Supercell have "
902 "fared a little better, but they are rare and throw away many failures for "
906 #. type: Content of: <book><chapter><sect1><sect2><para>
907 #: complete-book.xml:702
909 "The vulnerability of small segments of the population to dramatic, efficient "
910 "corporate manipulation is a real concern that’s worthy of our attention and "
911 "energy. But it’s not an existential threat to society."
914 #. type: Content of: <book><chapter><sect1><title>
915 #: complete-book.xml:709
916 msgid "If data is the new oil, then surveillance capitalism’s engine has a leak"
919 #. type: Content of: <book><chapter><sect1><para>
920 #: complete-book.xml:712
922 "This adaptation problem offers an explanation for one of surveillance "
923 "capitalism’s most alarming traits: its relentless hunger for data and its "
924 "endless expansion of data-gathering capabilities through the spread of "
925 "sensors, online surveillance, and acquisition of data streams from third "
929 #. type: Content of: <book><chapter><sect1><para>
930 #: complete-book.xml:719
932 "Zuboff observes this phenomenon and concludes that data must be very "
933 "valuable if surveillance capitalism is so hungry for it. (In her words: "
934 "<quote>Just as industrial capitalism was driven to the continuous "
935 "intensification of the means of production, so surveillance capitalists and "
936 "their market players are now locked into the continuous intensification of "
937 "the means of behavioral modification and the gathering might of "
938 "instrumentarian power.</quote>) But what if the voracious appetite is "
939 "because data has such a short half-life — because people become inured so "
940 "quickly to new, data-driven persuasion techniques — that the companies are "
941 "locked in an arms race with our limbic system? What if it’s all a Red "
942 "Queen’s race where they have to run ever faster — collect ever-more data — "
943 "just to stay in the same spot?"
946 #. type: Content of: <book><chapter><sect1><para>
947 #: complete-book.xml:734
949 "Of course, all of Big Tech’s persuasion techniques work in concert with one "
950 "another, and collecting data is useful beyond mere behavioral trickery."
953 #. type: Content of: <book><chapter><sect1><para>
954 #: complete-book.xml:739
956 "If someone wants to recruit you to buy a refrigerator or join a pogrom, they "
957 "might use profiling and targeting to send messages to people they judge to "
958 "be good sales prospects. The messages themselves may be deceptive, making "
959 "claims about things you’re not very knowledgeable about (food safety and "
960 "energy efficiency or eugenics and historical claims about racial "
961 "superiority). They might use search engine optimization and/or armies of "
962 "fake reviewers and commenters and/or paid placement to dominate the "
963 "discourse so that any search for further information takes you back to their "
964 "messages. And finally, they may refine the different pitches using machine "
965 "learning and other techniques to figure out what kind of pitch works best on "
969 #. type: Content of: <book><chapter><sect1><para>
970 #: complete-book.xml:753
972 "Each phase of this process benefits from surveillance: The more data they "
973 "have, the more precisely they can profile you and target you with specific "
974 "messages. Think of how you’d sell a fridge if you knew that the warranty on "
975 "your prospect’s fridge just expired and that they were expecting a tax "
979 #. type: Content of: <book><chapter><sect1><para>
980 #: complete-book.xml:760
982 "Also, the more data they have, the better they can craft deceptive messages "
983 "— if I know that you’re into genealogy, I might not try to feed you "
984 "pseudoscience about genetic differences between <quote>races,</quote> "
985 "sticking instead to conspiratorial secret histories of <quote>demographic "
986 "replacement</quote> and the like."
989 #. type: Content of: <book><chapter><sect1><para>
990 #: complete-book.xml:767
992 "Facebook also helps you locate people who have the same odious or antisocial "
993 "views as you. It makes it possible to find other people who want to carry "
994 "tiki torches through the streets of Charlottesville in Confederate "
995 "cosplay. It can help you find other people who want to join your militia and "
996 "go to the border to look for undocumented migrants to terrorize. It can help "
997 "you find people who share your belief that vaccines are poison and that the "
1001 #. type: Content of: <book><chapter><sect1><para>
1002 #: complete-book.xml:777
1004 "There is one way in which targeted advertising uniquely benefits those "
1005 "advocating for socially unacceptable causes: It is invisible. Racism is "
1006 "widely geographically dispersed, and there are few places where racists — "
1007 "and only racists — gather. This is similar to the problem of selling "
1008 "refrigerators in that potential refrigerator purchasers are geographically "
1009 "dispersed and there are few places where you can buy an ad that will be "
1010 "primarily seen by refrigerator customers. But buying a refrigerator is "
1011 "socially acceptable while being a Nazi is not, so you can buy a billboard or "
1012 "advertise in the newspaper sports section for your refrigerator business, "
1013 "and the only potential downside is that your ad will be seen by a lot of "
1014 "people who don’t want refrigerators, resulting in a lot of wasted expense."
1017 #. type: Content of: <book><chapter><sect1><para>
1018 #: complete-book.xml:792
1020 "But even if you wanted to advertise your Nazi movement on a billboard or "
1021 "prime-time TV or the sports section, you would struggle to find anyone "
1022 "willing to sell you the space for your ad partly because they disagree with "
1023 "your views and partly because they fear censure (boycott, reputational "
1024 "damage, etc.) from other people who disagree with your views."
1027 #. type: Content of: <book><chapter><sect1><para>
1028 #: complete-book.xml:800
1030 "Targeted ads solve this problem: On the internet, every ad unit can be "
1031 "different for every person, meaning that you can buy ads that are only shown "
1032 "to people who appear to be Nazis and not to people who hate Nazis. When "
1033 "there’s spillover — when someone who hates racism is shown a racist "
1034 "recruiting ad — there is some fallout; the platform or publication might get "
1035 "an angry public or private denunciation. But the nature of the risk assumed "
1036 "by an online ad buyer is different than the risks to a traditional publisher "
1037 "or billboard owner who might want to run a Nazi ad."
1040 #. type: Content of: <book><chapter><sect1><para>
1041 #: complete-book.xml:811
1043 "Online ads are placed by algorithms that broker between a diverse ecosystem "
1044 "of self-serve ad platforms that anyone can buy an ad through, so the Nazi ad "
1045 "that slips onto your favorite online publication isn’t seen as their moral "
1046 "failing but rather as a failure in some distant, upstream ad supplier. When "
1047 "a publication gets a complaint about an offensive ad that’s appearing in one "
1048 "of its units, it can take some steps to block that ad, but the Nazi might "
1049 "buy a slightly different ad from a different broker serving the same "
1050 "unit. And in any event, internet users increasingly understand that when "
1051 "they see an ad, it’s likely that the advertiser did not choose that "
1052 "publication and that the publication has no idea who its advertisers are."
1055 #. type: Content of: <book><chapter><sect1><para>
1056 #: complete-book.xml:825
1058 "These layers of indirection between advertisers and publishers serve as "
1059 "moral buffers: Today’s moral consensus is largely that publishers shouldn’t "
1060 "be held responsible for the ads that appear on their pages because they’re "
1061 "not actively choosing to put those ads there. Because of this, Nazis are "
1062 "able to overcome significant barriers to organizing their movement."
1065 #. type: Content of: <book><chapter><sect1><para>
1066 #: complete-book.xml:833
1068 "Data has a complex relationship with domination. Being able to spy on your "
1069 "customers can alert you to their preferences for your rivals and allow you "
1070 "to head off your rivals at the pass."
1073 #. type: Content of: <book><chapter><sect1><para>
1074 #: complete-book.xml:838
1076 "More importantly, if you can dominate the information space while also "
1077 "gathering data, then you make other deceptive tactics stronger because it’s "
1078 "harder to break out of the web of deceit you’re spinning. Domination — that "
1079 "is, ultimately becoming a monopoly — and not the data itself is the "
1080 "supercharger that makes every tactic worth pursuing because monopolistic "
1081 "domination deprives your target of an escape route."
1084 #. type: Content of: <book><chapter><sect1><para>
1085 #: complete-book.xml:847
1087 "If you’re a Nazi who wants to ensure that your prospects primarily see "
1088 "deceptive, confirming information when they search for more, you can improve "
1089 "your odds by seeding the search terms they use through your initial "
1090 "communications. You don’t need to own the top 10 results for <quote>voter "
1091 "suppression</quote> if you can convince your marks to confine their search "
1092 "terms to <quote>voter fraud,</quote> which throws up a very different set of "
1096 #. type: Content of: <book><chapter><sect1><para>
1097 #: complete-book.xml:856
1099 "Surveillance capitalists are like stage mentalists who claim that their "
1100 "extraordinary insights into human behavior let them guess the word that you "
1101 "wrote down and folded up in your pocket but who really use shills, hidden "
1102 "cameras, sleight of hand, and brute-force memorization to amaze you."
1105 #. type: Content of: <book><chapter><sect1><para>
1106 #: complete-book.xml:863
1108 "Or perhaps they’re more like pick-up artists, the misogynistic cult that "
1109 "promises to help awkward men have sex with women by teaching them "
1110 "<quote>neurolinguistic programming</quote> phrases, body language "
1111 "techniques, and psychological manipulation tactics like "
1112 "<quote>negging</quote> — offering unsolicited negative feedback to women to "
1113 "lower their self-esteem and prick their interest."
1116 #. type: Content of: <book><chapter><sect1><para>
1117 #: complete-book.xml:871
1119 "Some pick-up artists eventually manage to convince women to go home with "
1120 "them, but it’s not because these men have figured out how to bypass women’s "
1121 "critical faculties. Rather, pick-up artists’ <quote>success</quote> stories "
1122 "are a mix of women who were incapable of giving consent, women who were "
1123 "coerced, women who were intoxicated, self-destructive women, and a few women "
1124 "who were sober and in command of their faculties but who didn’t realize "
1125 "straightaway that they were with terrible men but rectified the error as "
1126 "soon as they could."
1129 #. type: Content of: <book><chapter><sect1><para>
1130 #: complete-book.xml:882
1132 "Pick-up artists <emphasis>believe</emphasis> they have figured out a secret "
1133 "back door that bypasses women’s critical faculties, but they haven’t. Many "
1134 "of the tactics they deploy, like negging, became the butt of jokes (just "
1135 "like people joke about bad ad targeting), and there’s a good chance that "
1136 "anyone they try these tactics on will immediately recognize them and dismiss "
1137 "the men who use them as irredeemable losers."
1140 #. type: Content of: <book><chapter><sect1><para>
1141 #: complete-book.xml:891
1143 "Pick-up artists are proof that people can believe they have developed a "
1144 "system of mind control <emphasis>even when it doesn’t "
1145 "work</emphasis>. Pick-up artists simply exploit the fact that "
1146 "one-in-a-million chances can come through for you if you make a million "
1147 "attempts, and then they assume that the other 999,999 times, they simply "
1148 "performed the technique incorrectly and commit themselves to doing better "
1149 "next time. There’s only one group of people who find pick-up artist lore "
1150 "reliably convincing: other would-be pick-up artists whose anxiety and "
1151 "insecurity make them vulnerable to scammers and delusional men who convince "
1152 "them that if they pay for tutelage and follow instructions, then they will "
1153 "someday succeed. Pick-up artists assume they fail to entice women because "
1154 "they are bad at being pick-up artists, not because pick-up artistry is "
1155 "bullshit. Pick-up artists are bad at selling themselves to women, but "
1156 "they’re much better at selling themselves to men who pay to learn the "
1157 "secrets of pick-up artistry."
1160 #. type: Content of: <book><chapter><sect1><para>
1161 #: complete-book.xml:909
1163 "Department store pioneer John Wanamaker is said to have lamented, "
1164 "<quote>Half the money I spend on advertising is wasted; the trouble is I "
1165 "don’t know which half.</quote> The fact that Wanamaker thought that only "
1166 "half of his advertising spending was wasted is a tribute to the "
1167 "persuasiveness of advertising executives, who are <emphasis>much</emphasis> "
1168 "better at convincing potential clients to buy their services than they are "
1169 "at convincing the general public to buy their clients’ wares."
1172 #. type: Content of: <book><chapter><sect1><title>
1173 #: complete-book.xml:919
1174 msgid "What is Facebook?"
1177 #. type: Content of: <book><chapter><sect1><para>
1178 #: complete-book.xml:921
1180 "Facebook is heralded as the origin of all of our modern plagues, and it’s "
1181 "not hard to see why. Some tech companies want to lock their users in but "
1182 "make their money by monopolizing access to the market for apps for their "
1183 "devices and gouging them on prices rather than by spying on them (like "
1184 "Apple). Some companies don’t care about locking in users because they’ve "
1185 "figured out how to spy on them no matter where they are and what they’re "
1186 "doing and can turn that surveillance into money (Google). Facebook alone "
1187 "among the Western tech giants has built a business based on locking in its "
1188 "users <emphasis>and</emphasis> spying on them all the time."
1191 #. type: Content of: <book><chapter><sect1><para>
1192 #: complete-book.xml:933
1194 "Facebook’s surveillance regime is really without parallel in the Western "
1195 "world. Though Facebook tries to prevent itself from being visible on the "
1196 "public web, hiding most of what goes on there from people unless they’re "
1197 "logged into Facebook, the company has nevertheless booby-trapped the entire "
1198 "web with surveillance tools in the form of Facebook <quote>Like</quote> "
1199 "buttons that web publishers include on their sites to boost their Facebook "
1200 "profiles. Facebook also makes various libraries and other useful code "
1201 "snippets available to web publishers that act as surveillance tendrils on "
1202 "the sites where they’re used, funneling information about visitors to the "
1203 "site — newspapers, dating sites, message boards — to Facebook."
1206 #. type: Content of: <book><chapter><sect1><blockquote><para>
1207 #: complete-book.xml:947
1209 "Big Tech is able to practice surveillance not just because it is tech but "
1210 "because it is <emphasis>big</emphasis>."
1213 #. type: Content of: <book><chapter><sect1><para>
1214 #: complete-book.xml:952
1216 "Facebook offers similar tools to app developers, so the apps — games, fart "
1217 "machines, business review services, apps for keeping abreast of your kid’s "
1218 "schooling — you use will send information about your activities to Facebook "
1219 "even if you don’t have a Facebook account and even if you don’t download or "
1220 "use Facebook apps. On top of all that, Facebook buys data from third-party "
1221 "brokers on shopping habits, physical location, use of <quote>loyalty</quote> "
1222 "programs, financial transactions, etc., and cross-references that with the "
1223 "dossiers it develops on activity on Facebook and with apps and the public "
1227 #. type: Content of: <book><chapter><sect1><para>
1228 #: complete-book.xml:963
1230 "Though it’s easy to integrate the web with Facebook — linking to news "
1231 "stories and such — Facebook products are generally not available to be "
1232 "integrated back into the web itself. You can embed a tweet in a Facebook "
1233 "post, but if you embed a Facebook post in a tweet, you just get a link back "
1234 "to Facebook and must log in before you can see it. Facebook has used extreme "
1235 "technological and legal countermeasures to prevent rivals from allowing "
1236 "their users to embed Facebook snippets in competing services or to create "
1237 "alternative interfaces to Facebook that merge your Facebook inbox with those "
1238 "of other services that you use."
1241 #. type: Content of: <book><chapter><sect1><para>
1242 #: complete-book.xml:975
1244 "And Facebook is incredibly popular, with 2.3 billion claimed users (though "
1245 "many believe this figure to be inflated). Facebook has been used to organize "
1246 "genocidal pogroms, racist riots, anti-vaccination movements, flat Earth "
1247 "cults, and the political lives of some of the world’s ugliest, most brutal "
1248 "autocrats. There are some really alarming things going on in the world, and "
1249 "Facebook is implicated in many of them, so it’s easy to conclude that these "
1250 "bad things are the result of Facebook’s mind-control system, which it rents "
1251 "out to anyone with a few bucks to spend."
1254 #. type: Content of: <book><chapter><sect1><para>
1255 #: complete-book.xml:986
1257 "To understand what role Facebook plays in the formulation and mobilization "
1258 "of antisocial movements, we need to understand the dual nature of Facebook."
1261 #. type: Content of: <book><chapter><sect1><para>
1262 #: complete-book.xml:991
1264 "Because it has a lot of users and a lot of data about those users, Facebook "
1265 "is a very efficient tool for locating people with hard-to-find traits, the "
1266 "kinds of traits that are widely diffused in the population such that "
1267 "advertisers have historically struggled to find a cost-effective way to "
1268 "reach them. Think back to refrigerators: Most of us only replace our major "
1269 "appliances a few times in our entire lives. If you’re a refrigerator "
1270 "manufacturer or retailer, you have these brief windows in the life of a "
1271 "consumer during which they are pondering a purchase, and you have to somehow "
1272 "reach them. Anyone who’s ever registered a title change after buying a house "
1273 "can attest that appliance manufacturers are incredibly desperate to reach "
1274 "anyone who has even the slenderest chance of being in the market for a new "
1278 #. type: Content of: <book><chapter><sect1><para>
1279 #: complete-book.xml:1006
1281 "Facebook makes finding people shopping for refrigerators a "
1282 "<emphasis>lot</emphasis> easier. It can target ads to people who’ve "
1283 "registered a new home purchase, to people who’ve searched for refrigerator "
1284 "buying advice, to people who have complained about their fridge dying, or "
1285 "any combination thereof. It can even target people who’ve recently bought "
1286 "<emphasis>other</emphasis> kitchen appliances on the theory that someone "
1287 "who’s just replaced their stove and dishwasher might be in a fridge-buying "
1288 "kind of mood. The vast majority of people who are reached by these ads will "
1289 "not be in the market for a new fridge, but — crucially — the percentage of "
1290 "people who <emphasis>are</emphasis> looking for fridges that these ads reach "
1291 "is <emphasis>much</emphasis> larger than it is than for any group that might "
1292 "be subjected to traditional, offline targeted refrigerator marketing."
1295 #. type: Content of: <book><chapter><sect1><para>
1296 #: complete-book.xml:1022
1298 "Facebook also makes it a lot easier to find people who have the same rare "
1299 "disease as you, which might have been impossible in earlier eras — the "
1300 "closest fellow sufferer might otherwise be hundreds of miles away. It makes "
1301 "it easier to find people who went to the same high school as you even though "
1302 "decades have passed and your former classmates have all been scattered to "
1303 "the four corners of the Earth."
1306 #. type: Content of: <book><chapter><sect1><para>
1307 #: complete-book.xml:1030
1309 "Facebook also makes it much easier to find people who hold the same rare "
1310 "political beliefs as you. If you’ve always harbored a secret affinity for "
1311 "socialism but never dared utter this aloud lest you be demonized by your "
1312 "neighbors, Facebook can help you discover other people who feel the same way "
1313 "(and it might just demonstrate to you that your affinity is more widespread "
1314 "than you ever suspected). It can make it easier to find people who share "
1315 "your sexual identity. And again, it can help you to understand that what "
1316 "you thought was a shameful secret that affected only you was really a widely "
1317 "shared trait, giving you both comfort and the courage to come out to the "
1318 "people in your life."
1321 #. type: Content of: <book><chapter><sect1><para>
1322 #: complete-book.xml:1043
1324 "All of this presents a dilemma for Facebook: Targeting makes the company’s "
1325 "ads more effective than traditional ads, but it also lets advertisers see "
1326 "just how effective their ads are. While advertisers are pleased to learn "
1327 "that Facebook ads are more effective than ads on systems with less "
1328 "sophisticated targeting, advertisers can also see that in nearly every case, "
1329 "the people who see their ads ignore them. Or, at best, the ads work on a "
1330 "subconscious level, creating nebulous unmeasurables like <quote>brand "
1331 "recognition.</quote> This means that the price per ad is very low in nearly "
1335 #. type: Content of: <book><chapter><sect1><para>
1336 #: complete-book.xml:1054
1338 "To make things worse, many Facebook groups spark precious little "
1339 "discussion. Your little-league soccer team, the people with the same rare "
1340 "disease as you, and the people you share a political affinity with may "
1341 "exchange the odd flurry of messages at critical junctures, but on a daily "
1342 "basis, there’s not much to say to your old high school chums or other "
1343 "hockey-card collectors."
1346 #. type: Content of: <book><chapter><sect1><para>
1347 #: complete-book.xml:1062
1349 "With nothing but <quote>organic</quote> discussion, Facebook would not "
1350 "generate enough traffic to sell enough ads to make the money it needs to "
1351 "continually expand by buying up its competitors while returning handsome "
1352 "sums to its investors."
1355 #. type: Content of: <book><chapter><sect1><para>
1356 #: complete-book.xml:1068
1358 "So Facebook has to gin up traffic by sidetracking its own forums: Every time "
1359 "Facebook’s algorithm injects controversial materials — inflammatory "
1360 "political articles, conspiracy theories, outrage stories — into a group, it "
1361 "can hijack that group’s nominal purpose with its desultory discussions and "
1362 "supercharge those discussions by turning them into bitter, unproductive "
1363 "arguments that drag on and on. Facebook is optimized for engagement, not "
1364 "happiness, and it turns out that automated systems are pretty good at "
1365 "figuring out things that people will get angry about."
1368 #. type: Content of: <book><chapter><sect1><para>
1369 #: complete-book.xml:1079
1371 "Facebook <emphasis>can</emphasis> modify our behavior but only in a couple "
1372 "of trivial ways. First, it can lock in all your friends and family members "
1373 "so that you check and check and check with Facebook to find out what they "
1374 "are up to; and second, it can make you angry and anxious. It can force you "
1375 "to choose between being interrupted constantly by updates — a process that "
1376 "breaks your concentration and makes it hard to be introspective — and "
1377 "staying in touch with your friends. This is a very limited form of mind "
1378 "control, and it can only really make us miserable, angry, and anxious."
1381 #. type: Content of: <book><chapter><sect1><para>
1382 #: complete-book.xml:1090
1384 "This is why Facebook’s targeting systems — both the ones it shows to "
1385 "advertisers and the ones that let users find people who share their "
1386 "interests — are so next-gen and smooth and easy to use as well as why its "
1387 "message boards have a toolset that seems like it hasn’t changed since the "
1388 "mid-2000s. If Facebook delivered an equally flexible, sophisticated "
1389 "message-reading system to its users, those users could defend themselves "
1390 "against being nonconsensually eyeball-fucked with Donald Trump headlines."
1393 #. type: Content of: <book><chapter><sect1><para>
1394 #: complete-book.xml:1100
1396 "The more time you spend on Facebook, the more ads it gets to show you. The "
1397 "solution to Facebook’s ads only working one in a thousand times is for the "
1398 "company to try to increase how much time you spend on Facebook by a factor "
1399 "of a thousand. Rather than thinking of Facebook as a company that has "
1400 "figured out how to show you exactly the right ad in exactly the right way to "
1401 "get you to do what its advertisers want, think of it as a company that has "
1402 "figured out how to make you slog through an endless torrent of arguments "
1403 "even though they make you miserable, spending so much time on the site that "
1404 "it eventually shows you at least one ad that you respond to."
1407 #. type: Content of: <book><chapter><sect1><title>
1408 #: complete-book.xml:1112
1409 msgid "Monopoly and the right to the future tense"
1412 #. type: Content of: <book><chapter><sect1><para>
1413 #: complete-book.xml:1114
1415 "Zuboff and her cohort are particularly alarmed at the extent to which "
1416 "surveillance allows corporations to influence our decisions, taking away "
1417 "something she poetically calls <quote>the right to the future tense</quote> "
1418 "— that is, the right to decide for yourself what you will do in the future."
1421 #. type: Content of: <book><chapter><sect1><para>
1422 #: complete-book.xml:1121
1424 "It’s true that advertising can tip the scales one way or another: When "
1425 "you’re thinking of buying a fridge, a timely fridge ad might end the search "
1426 "on the spot. But Zuboff puts enormous and undue weight on the persuasive "
1427 "power of surveillance-based influence techniques. Most of these don’t work "
1428 "very well, and the ones that do won’t work for very long. The makers of "
1429 "these influence tools are confident they will someday refine them into "
1430 "systems of total control, but they are hardly unbiased observers, and the "
1431 "risks from their dreams coming true are very speculative."
1434 #. type: Content of: <book><chapter><sect1><para>
1435 #: complete-book.xml:1132
1437 "By contrast, Zuboff is rather sanguine about 40 years of lax antitrust "
1438 "practice that has allowed a handful of companies to dominate the internet, "
1439 "ushering in an information age with, <ulink "
1440 "url=\"https://twitter.com/tveastman/status/1069674780826071040\">as one "
1441 "person on Twitter noted</ulink>, five giant websites each filled with "
1442 "screenshots of the other four."
1445 #. type: Content of: <book><chapter><sect1><para>
1446 #: complete-book.xml:1140
1448 "However, if we are to be alarmed that we might lose the right to choose for "
1449 "ourselves what our future will hold, then monopoly’s nonspeculative, "
1450 "concrete, here-and-now harms should be front and center in our debate over "
1454 #. type: Content of: <book><chapter><sect1><para>
1455 #: complete-book.xml:1146
1457 "Start with <quote>digital rights management.</quote> In 1998, Bill Clinton "
1458 "signed the Digital Millennium Copyright Act (DMCA) into law. It’s a complex "
1459 "piece of legislation with many controversial clauses but none more so than "
1460 "Section 1201, the <quote>anti-circumvention</quote> rule."
1463 #. type: Content of: <book><chapter><sect1><para>
1464 #: complete-book.xml:1152
1466 "This is a blanket ban on tampering with systems that restrict access to "
1467 "copyrighted works. The ban is so thoroughgoing that it prohibits removing a "
1468 "copyright lock even when no copyright infringement takes place. This is by "
1469 "design: The activities that the DMCA’s Section 1201 sets out to ban are not "
1470 "copyright infringements; rather, they are legal activities that frustrate "
1471 "manufacturers’ commercial plans."
1474 #. type: Content of: <book><chapter><sect1><para>
1475 #: complete-book.xml:1160
1477 "For example, Section 1201’s first major application was on DVD players as a "
1478 "means of enforcing the region coding built into those devices. DVD-CCA, the "
1479 "body that standardized DVDs and DVD players, divided the world into six "
1480 "regions and specified that DVD players must check each disc to determine "
1481 "which regions it was authorized to be played in. DVD players would have "
1482 "their own corresponding region (a DVD player bought in the U.S. would be "
1483 "region 1 while one bought in India would be region 5). If the player and the "
1484 "disc’s region matched, the player would play the disc; otherwise, it would "
1488 #. type: Content of: <book><chapter><sect1><para>
1489 #: complete-book.xml:1172
1491 "However, watching a lawfully produced disc in a country other than the one "
1492 "where you purchased it is not copyright infringement — it’s the "
1493 "opposite. Copyright law imposes this duty on customers for a movie: You must "
1494 "go into a store, find a licensed disc, and pay the asking price. Do that — "
1495 "and <emphasis>nothing else</emphasis> — and you and copyright are square "
1499 #. type: Content of: <book><chapter><sect1><para>
1500 #: complete-book.xml:1180
1502 "The fact that a movie studio wants to charge Indians less than Americans or "
1503 "release in Australia later than it releases in the U.K. has no bearing on "
1504 "copyright law. Once you lawfully acquire a DVD, it is no copyright "
1505 "infringement to watch it no matter where you happen to be."
1508 #. type: Content of: <book><chapter><sect1><para>
1509 #: complete-book.xml:1187
1511 "So DVD and DVD player manufacturers would not be able to use accusations of "
1512 "abetting copyright infringement to punish manufacturers who made "
1513 "noncompliant players that would play discs from any region or repair shops "
1514 "that modified players to let you watch out-of-region discs or software "
1515 "programmers who created programs to let you do this."
1518 #. type: Content of: <book><chapter><sect1><para>
1519 #: complete-book.xml:1195
1521 "That’s where Section 1201 of the DMCA comes in: By banning tampering with an "
1522 "<quote>access control,</quote> the rule gave manufacturers and rights "
1523 "holders standing to sue competitors who released superior products with "
1524 "lawful features that the market demanded (in this case, region-free "
1528 #. type: Content of: <book><chapter><sect1><para>
1529 #: complete-book.xml:1202
1531 "This is an odious scam against consumers, but as time went by, Section 1201 "
1532 "grew to encompass a rapidly expanding constellation of devices and services "
1533 "as canny manufacturers have realized certain things:"
1536 #. type: Content of: <book><chapter><sect1><itemizedlist><listitem><para>
1537 #: complete-book.xml:1210
1539 "Any device with software in it contains a <quote>copyrighted work</quote> — "
1540 "i.e., the software."
1543 #. type: Content of: <book><chapter><sect1><itemizedlist><listitem><para>
1544 #: complete-book.xml:1216
1546 "A device can be designed so that reconfiguring the software requires "
1547 "bypassing an <quote>access control for copyrighted works,</quote> which is a "
1548 "potential felony under Section 1201."
1551 #. type: Content of: <book><chapter><sect1><itemizedlist><listitem><para>
1552 #: complete-book.xml:1223
1554 "Thus, companies can control their customers’ behavior after they take home "
1555 "their purchases by designing products so that all unpermitted uses require "
1556 "modifications that fall afoul of Section 1201."
1559 #. type: Content of: <book><chapter><sect1><para>
1560 #: complete-book.xml:1231
1562 "Section 1201 then becomes a means for manufacturers of all descriptions to "
1563 "force their customers to arrange their affairs to benefit the manufacturers’ "
1564 "shareholders instead of themselves."
1567 #. type: Content of: <book><chapter><sect1><para>
1568 #: complete-book.xml:1236
1570 "This manifests in many ways: from a new generation of inkjet printers that "
1571 "use countermeasures to prevent third-party ink that cannot be bypassed "
1572 "without legal risks to similar systems in tractors that prevent third-party "
1573 "technicians from swapping in the manufacturer’s own parts that are not "
1574 "recognized by the tractor’s control system until it is supplied with a "
1575 "manufacturer’s unlock code."
1578 #. type: Content of: <book><chapter><sect1><para>
1579 #: complete-book.xml:1245
1581 "Closer to home, Apple’s iPhones use these measures to prevent both "
1582 "third-party service and third-party software installation. This allows Apple "
1583 "to decide when an iPhone is beyond repair and must be shredded and "
1584 "landfilled as opposed to the iPhone’s purchaser. (Apple is notorious for its "
1585 "environmentally catastrophic policy of destroying old electronics rather "
1586 "than permitting them to be cannibalized for parts.) This is a very useful "
1587 "power to wield, especially in light of CEO Tim Cook’s January 2019 warning "
1588 "to investors that the company’s profits are endangered by customers choosing "
1589 "to hold onto their phones for longer rather than replacing them."
1592 #. type: Content of: <book><chapter><sect1><para>
1593 #: complete-book.xml:1258
1595 "Apple’s use of copyright locks also allows it to establish a monopoly over "
1596 "how its customers acquire software for their mobile devices. The App Store’s "
1597 "commercial terms guarantee Apple a share of all revenues generated by the "
1598 "apps sold there, meaning that Apple gets paid when you buy an app from its "
1599 "store and then continues to get paid every time you buy something using that "
1600 "app. This comes out of the bottom line of software developers, who must "
1601 "either charge more or accept lower profits for their products."
1604 #. type: Content of: <book><chapter><sect1><para>
1605 #: complete-book.xml:1268
1607 "Crucially, Apple’s use of copyright locks gives it the power to make "
1608 "editorial decisions about which apps you may and may not install on your own "
1609 "device. Apple has used this power to <ulink "
1610 "url=\"https://www.telegraph.co.uk/technology/apple/5982243/Apple-bans-dictionary-from-App-Store-over-swear-words.html\">reject "
1611 "dictionaries</ulink> for containing obscene words; to <ulink "
1612 "url=\"https://www.vice.com/en_us/article/538kan/apple-just-banned-the-app-that-tracks-us-drone-strikes-again\">limit "
1613 "political speech</ulink>, especially from apps that make sensitive political "
1614 "commentary such as an app that notifies you every time a U.S. drone kills "
1615 "someone somewhere in the world; and to <ulink "
1616 "url=\"https://www.eurogamer.net/articles/2016-05-19-palestinian-indie-game-must-not-be-called-a-game-apple-says\">object "
1617 "to a game</ulink> that commented on the Israel-Palestine conflict."
1620 #. type: Content of: <book><chapter><sect1><para>
1621 #: complete-book.xml:1281
1623 "Apple often justifies monopoly power over software installation in the name "
1624 "of security, arguing that its vetting of apps for its store means that it "
1625 "can guard its users against apps that contain surveillance code. But this "
1626 "cuts both ways. In China, the government <ulink "
1627 "url=\"https://www.ft.com/content/ad42e536-cf36-11e7-b781-794ce08b24dc\">ordered "
1628 "Apple to prohibit the sale of privacy tools</ulink> like VPNs with the "
1629 "exception of VPNs that had deliberately introduced flaws designed to let the "
1630 "Chinese state eavesdrop on users. Because Apple uses technological "
1631 "countermeasures — with legal backstops — to block customers from installing "
1632 "unauthorized apps, Chinese iPhone owners cannot readily (or legally) acquire "
1633 "VPNs that would protect them from Chinese state snooping."
1636 #. type: Content of: <book><chapter><sect1><para>
1637 #: complete-book.xml:1295
1639 "Zuboff calls surveillance capitalism a <quote>rogue capitalism.</quote> "
1640 "Theoreticians of capitalism claim that its virtue is that it <ulink "
1641 "url=\"https://en.wikipedia.org/wiki/Price_signal\">aggregates information in "
1642 "the form of consumers’ decisions</ulink>, producing efficient "
1643 "markets. Surveillance capitalism’s supposed power to rob its victims of "
1644 "their free will through computationally supercharged influence campaigns "
1645 "means that our markets no longer aggregate customers’ decisions because we "
1646 "customers no longer decide — we are given orders by surveillance "
1647 "capitalism’s mind-control rays."
1650 #. type: Content of: <book><chapter><sect1><para>
1651 #: complete-book.xml:1306
1653 "If our concern is that markets cease to function when consumers can no "
1654 "longer make choices, then copyright locks should concern us at "
1655 "<emphasis>least</emphasis> as much as influence campaigns. An influence "
1656 "campaign might nudge you to buy a certain brand of phone; but the copyright "
1657 "locks on that phone absolutely determine where you get it serviced, which "
1658 "apps can run on it, and when you have to throw it away rather than fixing "
1662 #. type: Content of: <book><chapter><sect1><title>
1663 #: complete-book.xml:1315
1664 msgid "Search order and the right to the future tense"
1667 #. type: Content of: <book><chapter><sect1><para>
1668 #: complete-book.xml:1317
1670 "Markets are posed as a kind of magic: By discovering otherwise hidden "
1671 "information conveyed by the free choices of consumers, those consumers’ "
1672 "local knowledge is integrated into a self-correcting system that makes "
1673 "efficient allocations—more efficient than any computer could calculate. But "
1674 "monopolies are incompatible with that notion. When you only have one app "
1675 "store, the owner of the store — not the consumer — decides on the range of "
1676 "choices. As Boss Tweed once said, <quote>I don’t care who does the electing, "
1677 "so long as I get to do the nominating.</quote> A monopolized market is an "
1678 "election whose candidates are chosen by the monopolist."
1681 #. type: Content of: <book><chapter><sect1><para>
1682 #: complete-book.xml:1329
1684 "This ballot rigging is made more pernicious by the existence of monopolies "
1685 "over search order. Google’s search market share is about 90%. When Google’s "
1686 "ranking algorithm puts a result for a popular search term in its top 10, "
1687 "that helps determine the behavior of millions of people. If Google’s answer "
1688 "to <quote>Are vaccines dangerous?</quote> is a page that rebuts anti-vax "
1689 "conspiracy theories, then a sizable portion of the public will learn that "
1690 "vaccines are safe. If, on the other hand, Google sends those people to a "
1691 "site affirming the anti-vax conspiracies, a sizable portion of those "
1692 "millions will come away convinced that vaccines are dangerous."
1695 #. type: Content of: <book><chapter><sect1><para>
1696 #: complete-book.xml:1341
1698 "Google’s algorithm is often tricked into serving disinformation as a "
1699 "prominent search result. But in these cases, Google isn’t persuading people "
1700 "to change their minds; it’s just presenting something untrue as fact when "
1701 "the user has no cause to doubt it."
1704 #. type: Content of: <book><chapter><sect1><para>
1705 #: complete-book.xml:1347
1707 "This is true whether the search is for <quote>Are vaccines "
1708 "dangerous?</quote> or <quote>best restaurants near me.</quote> Most users "
1709 "will never look past the first page of search results, and when the "
1710 "overwhelming majority of people all use the same search engine, the ranking "
1711 "algorithm deployed by that search engine will determine myriad outcomes "
1712 "(whether to adopt a child, whether to have cancer surgery, where to eat "
1713 "dinner, where to move, where to apply for a job) to a degree that vastly "
1714 "outstrips any behavioral outcomes dictated by algorithmic persuasion "
1718 #. type: Content of: <book><chapter><sect1><para>
1719 #: complete-book.xml:1358
1721 "Many of the questions we ask search engines have no empirically correct "
1722 "answers: <quote>Where should I eat dinner?</quote> is not an objective "
1723 "question. Even questions that do have correct answers (<quote>Are vaccines "
1724 "dangerous?</quote>) don’t have one empirically superior source for that "
1725 "answer. Many pages affirm the safety of vaccines, so which one goes first? "
1726 "Under conditions of competition, consumers can choose from many search "
1727 "engines and stick with the one whose algorithmic judgment suits them best, "
1728 "but under conditions of monopoly, we all get our answers from the same "
1732 #. type: Content of: <book><chapter><sect1><para>
1733 #: complete-book.xml:1369
1735 "Google’s search dominance isn’t a matter of pure merit: The company has "
1736 "leveraged many tactics that would have been prohibited under classical, "
1737 "pre-Ronald-Reagan antitrust enforcement standards to attain its "
1738 "dominance. After all, this is a company that has developed two major "
1739 "products: a really good search engine and a pretty good Hotmail clone. Every "
1740 "other major success it’s had — Android, YouTube, Google Maps, etc. — has "
1741 "come through an acquisition of a nascent competitor. Many of the company’s "
1742 "key divisions, such as the advertising technology of DoubleClick, violate "
1743 "the historical antitrust principle of structural separation, which forbade "
1744 "firms from owning subsidiaries that competed with their "
1745 "customers. Railroads, for example, were barred from owning freight companies "
1746 "that competed with the shippers whose freight they carried."
1749 #. type: Content of: <book><chapter><sect1><para>
1750 #: complete-book.xml:1385
1752 "If we’re worried about giant companies subverting markets by stripping "
1753 "consumers of their ability to make free choices, then vigorous antitrust "
1754 "enforcement seems like an excellent remedy. If we’d denied Google the right "
1755 "to effect its many mergers, we would also have probably denied it its total "
1756 "search dominance. Without that dominance, the pet theories, biases, errors "
1757 "(and good judgment, too) of Google search engineers and product managers "
1758 "would not have such an outsized effect on consumer choice."
1761 #. type: Content of: <book><chapter><sect1><para>
1762 #: complete-book.xml:1395
1764 "This goes for many other companies. Amazon, a classic surveillance "
1765 "capitalist, is obviously the dominant tool for searching Amazon — though "
1766 "many people find their way to Amazon through Google searches and Facebook "
1767 "posts — and obviously, Amazon controls Amazon search. That means that "
1768 "Amazon’s own self-serving editorial choices—like promoting its own house "
1769 "brands over rival goods from its sellers as well as its own pet theories, "
1770 "biases, and errors— determine much of what we buy on Amazon. And since "
1771 "Amazon is the dominant e-commerce retailer outside of China and since it "
1772 "attained that dominance by buying up both large rivals and nascent "
1773 "competitors in defiance of historical antitrust rules, we can blame the "
1774 "monopoly for stripping consumers of their right to the future tense and the "
1775 "ability to shape markets by making informed choices."
1778 #. type: Content of: <book><chapter><sect1><para>
1779 #: complete-book.xml:1410
1781 "Not every monopolist is a surveillance capitalist, but that doesn’t mean "
1782 "they’re not able to shape consumer choices in wide-ranging ways. Zuboff "
1783 "lauds Apple for its App Store and iTunes Store, insisting that adding price "
1784 "tags to the features on its platforms has been the secret to resisting "
1785 "surveillance and thus creating markets. But Apple is the only retailer "
1786 "allowed to sell on its platforms, and it’s the second-largest mobile device "
1787 "vendor in the world. The independent software vendors that sell through "
1788 "Apple’s marketplace accuse the company of the same surveillance sins as "
1789 "Amazon and other big retailers: spying on its customers to find lucrative "
1790 "new products to launch, effectively using independent software vendors as "
1791 "free-market researchers, then forcing them out of any markets they discover."
1794 #. type: Content of: <book><chapter><sect1><para>
1795 #: complete-book.xml:1425
1797 "Because of its use of copyright locks, Apple’s mobile customers are not "
1798 "legally allowed to switch to a rival retailer for its apps if they want to "
1799 "do so on an iPhone. Apple, obviously, is the only entity that gets to decide "
1800 "how it ranks the results of search queries in its stores. These decisions "
1801 "ensure that some apps are often installed (because they appear on page one) "
1802 "and others are never installed (because they appear on page one "
1803 "million). Apple’s search-ranking design decisions have a vastly more "
1804 "significant effect on consumer behaviors than influence campaigns delivered "
1805 "by surveillance capitalism’s ad-serving bots."
1808 #. type: Content of: <book><chapter><sect1><title>
1809 #: complete-book.xml:1437
1810 msgid "Monopolists can afford sleeping pills for watchdogs"
1813 #. type: Content of: <book><chapter><sect1><para>
1814 #: complete-book.xml:1439
1816 "Only the most extreme market ideologues think that markets can self-regulate "
1817 "without state oversight. Markets need watchdogs — regulators, lawmakers, and "
1818 "other elements of democratic control — to keep them honest. When these "
1819 "watchdogs sleep on the job, then markets cease to aggregate consumer choices "
1820 "because those choices are constrained by illegitimate and deceptive "
1821 "activities that companies are able to get away with because no one is "
1822 "holding them to account."
1825 #. type: Content of: <book><chapter><sect1><para>
1826 #: complete-book.xml:1449
1828 "But this kind of regulatory capture doesn’t come cheap. In competitive "
1829 "sectors, where rivals are constantly eroding one another’s margins, "
1830 "individual firms lack the surplus capital to effectively lobby for laws and "
1831 "regulations that serve their ends."
1834 #. type: Content of: <book><chapter><sect1><para>
1835 #: complete-book.xml:1455
1837 "Many of the harms of surveillance capitalism are the result of weak or "
1838 "nonexistent regulation. Those regulatory vacuums spring from the power of "
1839 "monopolists to resist stronger regulation and to tailor what regulation "
1840 "exists to permit their existing businesses."
1843 #. type: Content of: <book><chapter><sect1><para>
1844 #: complete-book.xml:1461
1846 "Here’s an example: When firms over-collect and over-retain our data, they "
1847 "are at increased risk of suffering a breach — you can’t leak data you never "
1848 "collected, and once you delete all copies of that data, you can no longer "
1849 "leak it. For more than a decade, we’ve lived through an endless parade of "
1850 "ever-worsening data breaches, each one uniquely horrible in the scale of "
1851 "data breached and the sensitivity of that data."
1854 #. type: Content of: <book><chapter><sect1><para>
1855 #: complete-book.xml:1470
1857 "But still, firms continue to over-collect and over-retain our data for three "
1861 #. type: Content of: <book><chapter><sect1><para>
1862 #: complete-book.xml:1474
1864 "<emphasis role=\"strong\">1. They are locked in the aforementioned limbic "
1865 "arms race with our capacity to shore up our attentional defense systems to "
1866 "resist their new persuasion techniques.</emphasis> They’re also locked in an "
1867 "arms race with their competitors to find new ways to target people for sales "
1868 "pitches. As soon as they discover a soft spot in our attentional defenses (a "
1869 "counterintuitive, unobvious way to target potential refrigerator buyers), "
1870 "the public begins to wise up to the tactic, and their competitors leap on "
1871 "it, hastening the day in which all potential refrigerator buyers have been "
1872 "inured to the pitch."
1875 #. type: Content of: <book><chapter><sect1><para>
1876 #: complete-book.xml:1486
1878 "<emphasis role=\"strong\">2. They believe the surveillance capitalism "
1879 "story.</emphasis> Data is cheap to aggregate and store, and both proponents "
1880 "and opponents of surveillance capitalism have assured managers and product "
1881 "designers that if you collect enough data, you will be able to perform "
1882 "sorcerous acts of mind control, thus supercharging your sales. Even if you "
1883 "never figure out how to profit from the data, someone else will eventually "
1884 "offer to buy it from you to give it a try. This is the hallmark of all "
1885 "economic bubbles: acquiring an asset on the assumption that someone else "
1886 "will buy it from you for more than you paid for it, often to sell to someone "
1887 "else at an even greater price."
1890 #. type: Content of: <book><chapter><sect1><para>
1891 #: complete-book.xml:1499
1893 "<emphasis role=\"strong\">3. The penalties for leaking data are "
1894 "negligible.</emphasis> Most countries limit these penalties to actual "
1895 "damages, meaning that consumers who’ve had their data breached have to show "
1896 "actual monetary harms to get a reward. In 2014, Home Depot disclosed that it "
1897 "had lost credit-card data for 53 million of its customers, but it settled "
1898 "the matter by paying those customers about $0.34 each — and a third of that "
1899 "$0.34 wasn’t even paid in cash. It took the form of a credit to procure a "
1900 "largely ineffectual credit-monitoring service."
1903 #. type: Content of: <book><chapter><sect1><para>
1904 #: complete-book.xml:1510
1906 "But the harms from breaches are much more extensive than these "
1907 "actual-damages rules capture. Identity thieves and fraudsters are wily and "
1908 "endlessly inventive. All the vast breaches of our century are being "
1909 "continuously recombined, the data sets merged and mined for new ways to "
1910 "victimize the people whose data was present in them. Any reasonable, "
1911 "evidence-based theory of deterrence and compensation for breaches would not "
1912 "confine damages to actual damages but rather would allow users to claim "
1913 "these future harms."
1916 #. type: Content of: <book><chapter><sect1><para>
1917 #: complete-book.xml:1520
1919 "However, even the most ambitious privacy rules, such as the EU General Data "
1920 "Protection Regulation, fall far short of capturing the negative "
1921 "externalities of the platforms’ negligent over-collection and "
1922 "over-retention, and what penalties they do provide are not aggressively "
1923 "pursued by regulators."
1926 #. type: Content of: <book><chapter><sect1><para>
1927 #: complete-book.xml:1527
1929 "This tolerance of — or indifference to — data over-collection and "
1930 "over-retention can be ascribed in part to the sheer lobbying muscle of the "
1931 "platforms. They are so profitable that they can handily afford to divert "
1932 "gigantic sums to fight any real change — that is, change that would force "
1933 "them to internalize the costs of their surveillance activities."
1936 #. type: Content of: <book><chapter><sect1><para>
1937 #: complete-book.xml:1535
1939 "And then there’s state surveillance, which the surveillance capitalism story "
1940 "dismisses as a relic of another era when the big worry was being jailed for "
1941 "your dissident speech, not having your free will stripped away with machine "
1945 #. type: Content of: <book><chapter><sect1><para>
1946 #: complete-book.xml:1541
1948 "But state surveillance and private surveillance are intimately related. As "
1949 "we saw when Apple was conscripted by the Chinese government as a vital "
1950 "collaborator in state surveillance, the only really affordable and tractable "
1951 "way to conduct mass surveillance on the scale practiced by modern states — "
1952 "both <quote>free</quote> and autocratic states — is to suborn commercial "
1956 #. type: Content of: <book><chapter><sect1><para>
1957 #: complete-book.xml:1549
1959 "Whether it’s Google being used as a location tracking tool by local law "
1960 "enforcement across the U.S. or the use of social media tracking by the "
1961 "Department of Homeland Security to build dossiers on participants in "
1962 "protests against Immigration and Customs Enforcement’s family separation "
1963 "practices, any hard limits on surveillance capitalism would hamstring the "
1964 "state’s own surveillance capability. Without Palantir, Amazon, Google, and "
1965 "other major tech contractors, U.S. cops would not be able to spy on Black "
1966 "people, ICE would not be able to manage the caging of children at the U.S. "
1967 "border, and state welfare systems would not be able to purge their rolls by "
1968 "dressing up cruelty as empiricism and claiming that poor and vulnerable "
1969 "people are ineligible for assistance. At least some of the states’ "
1970 "unwillingness to take meaningful action to curb surveillance should be "
1971 "attributed to this symbiotic relationship. There is no mass state "
1972 "surveillance without mass commercial surveillance."
1975 #. type: Content of: <book><chapter><sect1><para>
1976 #: complete-book.xml:1567
1978 "Monopolism is key to the project of mass state surveillance. It’s true that "
1979 "smaller tech firms are apt to be less well-defended than Big Tech, whose "
1980 "security experts are drawn from the tops of their field and who are given "
1981 "enormous resources to secure and monitor their systems against "
1982 "intruders. But smaller firms also have less to protect: fewer users whose "
1983 "data is more fragmented across more systems and have to be suborned one at a "
1984 "time by state actors."
1987 #. type: Content of: <book><chapter><sect1><para>
1988 #: complete-book.xml:1576
1990 "A concentrated tech sector that works with authorities is a much more "
1991 "powerful ally in the project of mass state surveillance than a fragmented "
1992 "one composed of smaller actors. The U.S. tech sector is small enough that "
1993 "all of its top executives fit around a single boardroom table in Trump Tower "
1994 "in 2017, shortly after Trump’s inauguration. Most of its biggest players bid "
1995 "to win JEDI, the Pentagon’s $10 billion Joint Enterprise Defense "
1996 "Infrastructure cloud contract. Like other highly concentrated industries, "
1997 "Big Tech rotates its key employees in and out of government service, sending "
1998 "them to serve in the Department of Defense and the White House, then hiring "
1999 "ex-Pentagon and ex-DOD top staffers and officers to work in their own "
2000 "government relations departments."
2003 #. type: Content of: <book><chapter><sect1><para>
2004 #: complete-book.xml:1590
2006 "They can even make a good case for doing this: After all, when there are "
2007 "only four or five big companies in an industry, everyone qualified to "
2008 "regulate those companies has served as an executive in at least a couple of "
2009 "them — because, likewise, when there are only five companies in an industry, "
2010 "everyone qualified for a senior role at any of them is by definition working "
2011 "at one of the other ones."
2014 #. type: Content of: <book><chapter><sect1><blockquote><para>
2015 #: complete-book.xml:1599
2017 "While surveillance doesn’t cause monopolies, monopolies certainly abet "
2021 #. type: Content of: <book><chapter><sect1><para>
2022 #: complete-book.xml:1604
2024 "Industries that are competitive are fragmented — composed of companies that "
2025 "are at each other’s throats all the time and eroding one another’s margins "
2026 "in bids to steal their best customers. This leaves them with much more "
2027 "limited capital to use to lobby for favorable rules and a much harder job of "
2028 "getting everyone to agree to pool their resources to benefit the industry as "
2032 #. type: Content of: <book><chapter><sect1><para>
2033 #: complete-book.xml:1612
2035 "Surveillance combined with machine learning is supposed to be an existential "
2036 "crisis, a species-defining moment at which our free will is just a few more "
2037 "advances in the field from being stripped away. I am skeptical of this "
2038 "claim, but I <emphasis>do</emphasis> think that tech poses an existential "
2039 "threat to our society and possibly our species."
2042 #. type: Content of: <book><chapter><sect1><para>
2043 #: complete-book.xml:1620
2044 msgid "But that threat grows out of monopoly."
2047 #. type: Content of: <book><chapter><sect1><para>
2048 #: complete-book.xml:1623
2050 "One of the consequences of tech’s regulatory capture is that it can shift "
2051 "liability for poor security decisions onto its customers and the wider "
2052 "society. It is absolutely normal in tech for companies to obfuscate the "
2053 "workings of their products, to make them deliberately hard to understand, "
2054 "and to threaten security researchers who seek to independently audit those "
2058 #. type: Content of: <book><chapter><sect1><para>
2059 #: complete-book.xml:1631
2061 "IT is the only field in which this is practiced: No one builds a bridge or a "
2062 "hospital and keeps the composition of the steel or the equations used to "
2063 "calculate load stresses a secret. It is a frankly bizarre practice that "
2064 "leads, time and again, to grotesque security defects on farcical scales, "
2065 "with whole classes of devices being revealed as vulnerable long after they "
2066 "are deployed in the field and put into sensitive places."
2069 #. type: Content of: <book><chapter><sect1><para>
2070 #: complete-book.xml:1640
2072 "The monopoly power that keeps any meaningful consequences for breaches at "
2073 "bay means that tech companies continue to build terrible products that are "
2074 "insecure by design and that end up integrated into our lives, in possession "
2075 "of our data, and connected to our physical world. For years, Boeing has "
2076 "struggled with the aftermath of a series of bad technology decisions that "
2077 "made its 737 fleet a global pariah, a rare instance in which bad tech "
2078 "decisions have been seriously punished in the market."
2081 #. type: Content of: <book><chapter><sect1><para>
2082 #: complete-book.xml:1650
2084 "These bad security decisions are compounded yet again by the use of "
2085 "copyright locks to enforce business-model decisions against "
2086 "consumers. Recall that these locks have become the go-to means for shaping "
2087 "consumer behavior, making it technically impossible to use third-party ink, "
2088 "insulin, apps, or service depots in connection with your lawfully acquired "
2092 #. type: Content of: <book><chapter><sect1><para>
2093 #: complete-book.xml:1658
2095 "Recall also that these copyright locks are backstopped by legislation (such "
2096 "as Section 1201 of the DMCA or Article 6 of the 2001 EU Copyright Directive) "
2097 "that ban tampering with (<quote>circumventing</quote>) them, and these "
2098 "statutes have been used to threaten security researchers who make "
2099 "disclosures about vulnerabilities without permission from manufacturers."
2102 #. type: Content of: <book><chapter><sect1><para>
2103 #: complete-book.xml:1666
2105 "This amounts to a manufacturer’s veto over safety warnings and "
2106 "criticism. While this is far from the legislative intent of the DMCA and its "
2107 "sister statutes around the world, Congress has not intervened to clarify the "
2108 "statute nor will it because to do so would run counter to the interests of "
2109 "powerful, large firms whose lobbying muscle is unstoppable."
2112 #. type: Content of: <book><chapter><sect1><para>
2113 #: complete-book.xml:1674
2115 "Copyright locks are a double whammy: They create bad security decisions that "
2116 "can’t be freely investigated or discussed. If markets are supposed to be "
2117 "machines for aggregating information (and if surveillance capitalism’s "
2118 "notional mind-control rays are what make it a <quote>rogue "
2119 "capitalism</quote> because it denies consumers the power to make decisions), "
2120 "then a program of legally enforced ignorance of the risks of products makes "
2121 "monopolism even more of a <quote>rogue capitalism</quote> than surveillance "
2122 "capitalism’s influence campaigns."
2125 #. type: Content of: <book><chapter><sect1><para>
2126 #: complete-book.xml:1684
2128 "And unlike mind-control rays, enforced silence over security is an "
2129 "immediate, documented problem, and it <emphasis>does</emphasis> constitute "
2130 "an existential threat to our civilization and possibly our species. The "
2131 "proliferation of insecure devices — especially devices that spy on us and "
2132 "especially when those devices also can manipulate the physical world by, "
2133 "say, steering your car or flipping a breaker at a power station — is a kind "
2134 "of technology debt."
2137 #. type: Content of: <book><chapter><sect1><para>
2138 #: complete-book.xml:1693
2140 "In software design, <quote>technology debt</quote> refers to old, baked-in "
2141 "decisions that turn out to be bad ones in hindsight. Perhaps a long-ago "
2142 "developer decided to incorporate a networking protocol made by a vendor that "
2143 "has since stopped supporting it. But everything in the product still relies "
2144 "on that superannuated protocol, and so, with each revision, the product team "
2145 "has to work around this obsolete core, adding compatibility layers, "
2146 "surrounding it with security checks that try to shore up its defenses, and "
2147 "so on. These Band-Aid measures compound the debt because every subsequent "
2148 "revision has to make allowances for <emphasis>them</emphasis>, too, like "
2149 "interest mounting on a predatory subprime loan. And like a subprime loan, "
2150 "the interest mounts faster than you can hope to pay it off: The product team "
2151 "has to put so much energy into maintaining this complex, brittle system that "
2152 "they don’t have any time left over to refactor the product from the ground "
2153 "up and <quote>pay off the debt</quote> once and for all."
2156 #. type: Content of: <book><chapter><sect1><para>
2157 #: complete-book.xml:1711
2159 "Typically, technology debt results in a technological bankruptcy: The "
2160 "product gets so brittle and unsustainable that it fails "
2161 "catastrophically. Think of the antiquated COBOL-based banking and accounting "
2162 "systems that fell over at the start of the pandemic emergency when "
2163 "confronted with surges of unemployment claims. Sometimes that ends the "
2164 "product; sometimes it takes the company down with it. Being caught in the "
2165 "default of a technology debt is scary and traumatic, just like losing your "
2166 "house due to bankruptcy is scary and traumatic."
2169 #. type: Content of: <book><chapter><sect1><para>
2170 #: complete-book.xml:1722
2172 "But the technology debt created by copyright locks isn’t individual debt; "
2173 "it’s systemic. Everyone in the world is exposed to this over-leverage, as "
2174 "was the case with the 2008 financial crisis. When that debt comes due — when "
2175 "we face a cascade of security breaches that threaten global shipping and "
2176 "logistics, the food supply, pharmaceutical production pipelines, emergency "
2177 "communications, and other critical systems that are accumulating technology "
2178 "debt in part due to the presence of deliberately insecure and deliberately "
2179 "unauditable copyright locks — it will indeed pose an existential risk."
2182 #. type: Content of: <book><chapter><sect1><title>
2183 #: complete-book.xml:1734
2184 msgid "Privacy and monopoly"
2187 #. type: Content of: <book><chapter><sect1><para>
2188 #: complete-book.xml:1736
2190 "Many tech companies are gripped by an orthodoxy that holds that if they just "
2191 "gather enough data on enough of our activities, everything else is possible "
2192 "— the mind control and endless profits. This is an unfalsifiable hypothesis: "
2193 "If data gives a tech company even a tiny improvement in behavior prediction "
2194 "and modification, the company declares that it has taken the first step "
2195 "toward global domination with no end in sight. If a company "
2196 "<emphasis>fails</emphasis> to attain any improvements from gathering and "
2197 "analyzing data, it declares success to be just around the corner, attainable "
2198 "once more data is in hand."
2201 #. type: Content of: <book><chapter><sect1><para>
2202 #: complete-book.xml:1748
2204 "Surveillance tech is far from the first industry to embrace a nonsensical, "
2205 "self-serving belief that harms the rest of the world, and it is not the "
2206 "first industry to profit handsomely from such a delusion. Long before "
2207 "hedge-fund managers were claiming (falsely) that they could beat the "
2208 "S&P 500, there were plenty of other <quote>respectable</quote> "
2209 "industries that have been revealed as quacks in hindsight. From the makers "
2210 "of radium suppositories (a real thing!) to the cruel sociopaths who claimed "
2211 "they could <quote>cure</quote> gay people, history is littered with the "
2212 "formerly respectable titans of discredited industries."
2215 #. type: Content of: <book><chapter><sect1><para>
2216 #: complete-book.xml:1760
2218 "This is not to say that there’s nothing wrong with Big Tech and its "
2219 "ideological addiction to data. While surveillance’s benefits are mostly "
2220 "overstated, its harms are, if anything, <emphasis>understated</emphasis>."
2223 #. type: Content of: <book><chapter><sect1><para>
2224 #: complete-book.xml:1766
2226 "There’s real irony here. The belief in surveillance capitalism as a "
2227 "<quote>rogue capitalism</quote> is driven by the belief that markets "
2228 "wouldn’t tolerate firms that are gripped by false beliefs. An oil company "
2229 "that has false beliefs about where the oil is will eventually go broke "
2230 "digging dry wells after all."
2233 #. type: Content of: <book><chapter><sect1><para>
2234 #: complete-book.xml:1773
2236 "But monopolists get to do terrible things for a long time before they pay "
2237 "the price. Think of how concentration in the finance sector allowed the "
2238 "subprime crisis to fester as bond-rating agencies, regulators, investors, "
2239 "and critics all fell under the sway of a false belief that complex "
2240 "mathematics could construct <quote>fully hedged</quote> debt instruments "
2241 "that could not possibly default. A small bank that engaged in this kind of "
2242 "malfeasance would simply go broke rather than outrunning the inevitable "
2243 "crisis, perhaps growing so big that it averted it altogether. But large "
2244 "banks were able to continue to attract investors, and when they finally "
2245 "<emphasis>did</emphasis> come a-cropper, the world’s governments bailed them "
2246 "out. The worst offenders of the subprime crisis are bigger than they were in "
2247 "2008, bringing home more profits and paying their execs even larger sums."
2250 #. type: Content of: <book><chapter><sect1><para>
2251 #: complete-book.xml:1788
2253 "Big Tech is able to practice surveillance not just because it is tech but "
2254 "because it is <emphasis>big</emphasis>. The reason every web publisher "
2255 "embeds a Facebook <quote>Like</quote> button is that Facebook dominates the "
2256 "internet’s social media referrals — and every one of those "
2257 "<quote>Like</quote> buttons spies on everyone who lands on a page that "
2258 "contains them (see also: Google Analytics embeds, Twitter buttons, etc.)."
2261 #. type: Content of: <book><chapter><sect1><para>
2262 #: complete-book.xml:1797
2264 "The reason the world’s governments have been slow to create meaningful "
2265 "penalties for privacy breaches is that Big Tech’s concentration produces "
2266 "huge profits that can be used to lobby against those penalties — and Big "
2267 "Tech’s concentration means that the companies involved are able to arrive at "
2268 "a unified negotiating position that supercharges the lobbying."
2271 #. type: Content of: <book><chapter><sect1><para>
2272 #: complete-book.xml:1805
2274 "The reason that the smartest engineers in the world want to work for Big "
2275 "Tech is that Big Tech commands the lion’s share of tech industry jobs."
2278 #. type: Content of: <book><chapter><sect1><para>
2279 #: complete-book.xml:1810
2281 "The reason people who are aghast at Facebook’s and Google’s and Amazon’s "
2282 "data-handling practices continue to use these services is that all their "
2283 "friends are on Facebook; Google dominates search; and Amazon has put all the "
2284 "local merchants out of business."
2287 #. type: Content of: <book><chapter><sect1><para>
2288 #: complete-book.xml:1816
2290 "Competitive markets would weaken the companies’ lobbying muscle by reducing "
2291 "their profits and pitting them against each other in regulatory forums. It "
2292 "would give customers other places to go to get their online services. It "
2293 "would make the companies small enough to regulate and pave the way to "
2294 "meaningful penalties for breaches. It would let engineers with ideas that "
2295 "challenged the surveillance orthodoxy raise capital to compete with the "
2296 "incumbents. It would give web publishers multiple ways to reach audiences "
2297 "and make the case against Facebook and Google and Twitter embeds."
2300 #. type: Content of: <book><chapter><sect1><para>
2301 #: complete-book.xml:1827
2303 "In other words, while surveillance doesn’t cause monopolies, monopolies "
2304 "certainly abet surveillance."
2307 #. type: Content of: <book><chapter><sect1><title>
2308 #: complete-book.xml:1831
2309 msgid "Ronald Reagan, pioneer of tech monopolism"
2312 #. type: Content of: <book><chapter><sect1><para>
2313 #: complete-book.xml:1833
2315 "Technology exceptionalism is a sin, whether it’s practiced by technology’s "
2316 "blind proponents or by its critics. Both of these camps are prone to "
2317 "explaining away monopolistic concentration by citing some special "
2318 "characteristic of the tech industry, like network effects or first-mover "
2319 "advantage. The only real difference between these two groups is that the "
2320 "tech apologists say monopoly is inevitable so we should just let tech get "
2321 "away with its abuses while competition regulators in the U.S. and the EU say "
2322 "monopoly is inevitable so we should punish tech for its abuses but not try "
2323 "to break up the monopolies."
2326 #. type: Content of: <book><chapter><sect1><para>
2327 #: complete-book.xml:1845
2329 "To understand how tech became so monopolistic, it’s useful to look at the "
2330 "dawn of the consumer tech industry: 1979, the year the Apple II Plus "
2331 "launched and became the first successful home computer. That also happens to "
2332 "be the year that Ronald Reagan hit the campaign trail for the 1980 "
2333 "presidential race — a race he won, leading to a radical shift in the way "
2334 "that antitrust concerns are handled in America. Reagan’s cohort of "
2335 "politicians — including Margaret Thatcher in the U.K., Brian Mulroney in "
2336 "Canada, Helmut Kohl in Germany, and Augusto Pinochet in Chile — went on to "
2337 "enact similar reforms that eventually spread around the world."
2340 #. type: Content of: <book><chapter><sect1><para>
2341 #: complete-book.xml:1857
2343 "Antitrust’s story began nearly a century before all that with laws like the "
2344 "Sherman Act, which took aim at monopolists on the grounds that monopolies "
2345 "were bad in and of themselves — squeezing out competitors, creating "
2346 "<quote>diseconomies of scale</quote> (when a company is so big that its "
2347 "constituent parts go awry and it is seemingly helpless to address the "
2348 "problems), and capturing their regulators to such a degree that they can get "
2349 "away with a host of evils."
2352 #. type: Content of: <book><chapter><sect1><para>
2353 #: complete-book.xml:1866
2355 "Then came a fabulist named Robert Bork, a former solicitor general who "
2356 "Reagan appointed to the powerful U.S. Court of Appeals for the D.C. Circuit "
2357 "and who had created an alternate legislative history of the Sherman Act and "
2358 "its successors out of whole cloth. Bork insisted that these statutes were "
2359 "never targeted at monopolies (despite a wealth of evidence to the contrary, "
2360 "including the transcribed speeches of the acts’ authors) but, rather, that "
2361 "they were intended to prevent <quote>consumer harm</quote> — in the form of "
2365 #. type: Content of: <book><chapter><sect1><para>
2366 #: complete-book.xml:1876
2368 "Bork was a crank, but he was a crank with a theory that rich people really "
2369 "liked. Monopolies are a great way to make rich people richer by allowing "
2370 "them to receive <quote>monopoly rents</quote> (that is, bigger profits) and "
2371 "capture regulators, leading to a weaker, more favorable regulatory "
2372 "environment with fewer protections for customers, suppliers, the "
2373 "environment, and workers."
2376 #. type: Content of: <book><chapter><sect1><para>
2377 #: complete-book.xml:1884
2379 "Bork’s theories were especially palatable to the same power brokers who "
2380 "backed Reagan, and Reagan’s Department of Justice and other agencies began "
2381 "to incorporate Bork’s antitrust doctrine into their enforcement decisions "
2382 "(Reagan even put Bork up for a Supreme Court seat, but Bork flunked the "
2383 "Senate confirmation hearing so badly that, 40 years later, D.C. insiders use "
2384 "the term <quote>borked</quote> to refer to any catastrophically bad "
2385 "political performance)."
2388 #. type: Content of: <book><chapter><sect1><para>
2389 #: complete-book.xml:1893
2391 "Little by little, Bork’s theories entered the mainstream, and their backers "
2392 "began to infiltrate the legal education field, even putting on junkets where "
2393 "members of the judiciary were treated to lavish meals, fun outdoor "
2394 "activities, and seminars where they were indoctrinated into the consumer "
2395 "harm theory of antitrust. The more Bork’s theories took hold, the more money "
2396 "the monopolists were making — and the more surplus capital they had at their "
2397 "disposal to lobby for even more Borkian antitrust influence campaigns."
2400 #. type: Content of: <book><chapter><sect1><para>
2401 #: complete-book.xml:1903
2403 "The history of Bork’s antitrust theories is a really good example of the "
2404 "kind of covertly engineered shifts in public opinion that Zuboff warns us "
2405 "against, where fringe ideas become mainstream orthodoxy. But Bork didn’t "
2406 "change the world overnight. He played a very long game, for over a "
2407 "generation, and he had a tailwind because the same forces that backed "
2408 "oligarchic antitrust theories also backed many other oligarchic shifts in "
2409 "public opinion. For example, the idea that taxation is theft, that wealth is "
2410 "a sign of virtue, and so on — all of these theories meshed to form a "
2411 "coherent ideology that elevated inequality to a virtue."
2414 #. type: Content of: <book><chapter><sect1><para>
2415 #: complete-book.xml:1915
2417 "Today, many fear that machine learning allows surveillance capitalism to "
2418 "sell <quote>Bork-as-a-Service,</quote> at internet speeds, so that you can "
2419 "contract a machine-learning company to engineer <emphasis>rapid</emphasis> "
2420 "shifts in public sentiment without needing the capital to sustain a "
2421 "multipronged, multigenerational project working at the local, state, "
2422 "national, and global levels in business, law, and philosophy. I do not "
2423 "believe that such a project is plausible, though I agree that this is "
2424 "basically what the platforms claim to be selling. They’re just lying about "
2425 "it. Big Tech lies all the time, <emphasis>including</emphasis> in their "
2429 #. type: Content of: <book><chapter><sect1><para>
2430 #: complete-book.xml:1928
2432 "The idea that tech forms <quote>natural monopolies</quote> (monopolies that "
2433 "are the inevitable result of the realities of an industry, such as the "
2434 "monopolies that accrue the first company to run long-haul phone lines or "
2435 "rail lines) is belied by tech’s own history: In the absence of "
2436 "anti-competitive tactics, Google was able to unseat AltaVista and Yahoo; "
2437 "Facebook was able to head off Myspace. There are some advantages to "
2438 "gathering mountains of data, but those mountains of data also have "
2439 "disadvantages: liability (from leaking), diminishing returns (from old "
2440 "data), and institutional inertia (big companies, like science, progress one "
2441 "funeral at a time)."
2444 #. type: Content of: <book><chapter><sect1><para>
2445 #: complete-book.xml:1940
2447 "Indeed, the birth of the web saw a mass-extinction event for the existing "
2448 "giant, wildly profitable proprietary technologies that had capital, network "
2449 "effects, and walls and moats surrounding their businesses. The web showed "
2450 "that when a new industry is built around a protocol, rather than a product, "
2451 "the combined might of everyone who uses the protocol to reach their "
2452 "customers or users or communities outweighs even the most massive "
2453 "products. CompuServe, AOL, MSN, and a host of other proprietary walled "
2454 "gardens learned this lesson the hard way: Each believed it could stay "
2455 "separate from the web, offering <quote>curation</quote> and a guarantee of "
2456 "consistency and quality instead of the chaos of an open system. Each was "
2457 "wrong and ended up being absorbed into the public web."
2460 #. type: Content of: <book><chapter><sect1><para>
2461 #: complete-book.xml:1954
2463 "Yes, tech is heavily monopolized and is now closely associated with industry "
2464 "concentration, but this has more to do with a matter of timing than its "
2465 "intrinsically monopolistic tendencies. Tech was born at the moment that "
2466 "antitrust enforcement was being dismantled, and tech fell into exactly the "
2467 "same pathologies that antitrust was supposed to guard against. To a first "
2468 "approximation, it is reasonable to assume that tech’s monopolies are the "
2469 "result of a lack of anti-monopoly action and not the much-touted unique "
2470 "characteristics of tech, such as network effects, first-mover advantage, and "
2474 #. type: Content of: <book><chapter><sect1><para>
2475 #: complete-book.xml:1966
2477 "In support of this thesis, I offer the concentration that every "
2478 "<emphasis>other</emphasis> industry has undergone over the same period. From "
2479 "professional wrestling to consumer packaged goods to commercial property "
2480 "leasing to banking to sea freight to oil to record labels to newspaper "
2481 "ownership to theme parks, <emphasis>every</emphasis> industry has undergone "
2482 "a massive shift toward concentration. There’s no obvious network effects or "
2483 "first-mover advantage at play in these industries. However, in every case, "
2484 "these industries attained their concentrated status through tactics that "
2485 "were prohibited before Bork’s triumph: merging with major competitors, "
2486 "buying out innovative new market entrants, horizontal and vertical "
2487 "integration, and a suite of anti-competitive tactics that were once illegal "
2488 "but are not any longer."
2491 #. type: Content of: <book><chapter><sect1><para>
2492 #: complete-book.xml:1981
2494 "Again: When you change the laws intended to prevent monopolies and then "
2495 "monopolies form in exactly the way the law was supposed to prevent, it is "
2496 "reasonable to suppose that these facts are related. Tech’s concentration "
2497 "can be readily explained without recourse to radical theories of network "
2498 "effects — but only if you’re willing to indict unregulated markets as "
2499 "tending toward monopoly. Just as a lifelong smoker can give you a hundred "
2500 "reasons why their smoking didn’t cause their cancer (<quote>It was the "
2501 "environmental toxins</quote>), true believers in unregulated markets have a "
2502 "whole suite of unconvincing explanations for monopoly in tech that leave "
2503 "capitalism intact."
2506 #. type: Content of: <book><chapter><sect1><title>
2507 #: complete-book.xml:1993
2508 msgid "Steering with the windshield wipers"
2511 #. type: Content of: <book><chapter><sect1><para>
2512 #: complete-book.xml:1995
2514 "It’s been 40 years since Bork’s project to rehabilitate monopolies achieved "
2515 "liftoff, and that is a generation and a half, which is plenty of time to "
2516 "take a common idea and make it seem outlandish and vice versa. Before the "
2517 "1940s, affluent Americans dressed their baby boys in pink while baby girls "
2518 "wore blue (a <quote>delicate and dainty</quote> color). While gendered "
2519 "colors are obviously totally arbitrary, many still greet this news with "
2520 "amazement and find it hard to imagine a time when pink connoted masculinity."
2523 #. type: Content of: <book><chapter><sect1><para>
2524 #: complete-book.xml:2005
2526 "After 40 years of studiously ignoring antitrust analysis and enforcement, "
2527 "it’s not surprising that we’ve all but forgotten that antitrust exists, that "
2528 "in living memory, growth through mergers and acquisitions were largely "
2529 "prohibited under law, that market-cornering strategies like vertical "
2530 "integration could land a company in court."
2533 #. type: Content of: <book><chapter><sect1><para>
2534 #: complete-book.xml:2013
2536 "Antitrust is a market society’s steering wheel, the control of first resort "
2537 "to keep would-be masters of the universe in their lanes. But Bork and his "
2538 "cohort ripped out our steering wheel 40 years ago. The car is still "
2539 "barreling along, and so we’re yanking as hard as we can on all the "
2540 "<emphasis>other</emphasis> controls in the car as well as desperately "
2541 "flapping the doors and rolling the windows up and down in the hopes that one "
2542 "of these other controls can be repurposed to let us choose where we’re "
2543 "heading before we careen off a cliff."
2546 #. type: Content of: <book><chapter><sect1><para>
2547 #: complete-book.xml:2023
2549 "It’s like a 1960s science-fiction plot come to life: People stuck in a "
2550 "<quote>generation ship,</quote> plying its way across the stars, a ship once "
2551 "piloted by their ancestors; and now, after a great cataclysm, the ship’s "
2552 "crew have forgotten that they’re in a ship at all and no longer remember "
2553 "where the control room is. Adrift, the ship is racing toward its extinction, "
2554 "and unless we can seize the controls and execute emergency course "
2555 "correction, we’re all headed for a fiery death in the heart of a sun."
2558 #. type: Content of: <book><chapter><sect1><title>
2559 #: complete-book.xml:2033
2560 msgid "Surveillance still matters"
2563 #. type: Content of: <book><chapter><sect1><para>
2564 #: complete-book.xml:2035
2566 "None of this is to minimize the problems with surveillance. Surveillance "
2567 "matters, and Big Tech’s use of surveillance <emphasis>is</emphasis> an "
2568 "existential risk to our species, but that’s not because surveillance and "
2569 "machine learning rob us of our free will."
2572 #. type: Content of: <book><chapter><sect1><para>
2573 #: complete-book.xml:2042
2575 "Surveillance has become <emphasis>much</emphasis> more efficient thanks to "
2576 "Big Tech. In 1989, the Stasi — the East German secret police — had the whole "
2577 "country under surveillance, a massive undertaking that recruited one out of "
2578 "every 60 people to serve as an informant or intelligence operative."
2581 #. type: Content of: <book><chapter><sect1><para>
2582 #: complete-book.xml:2049
2584 "Today, we know that the NSA is spying on a significant fraction of the "
2585 "entire world’s population, and its ratio of surveillance operatives to the "
2586 "surveilled is more like 1:10,000 (that’s probably on the low side since it "
2587 "assumes that every American with top-secret clearance is working for the NSA "
2588 "on this project — we don’t know how many of those cleared people are "
2589 "involved in NSA spying, but it’s definitely not all of them)."
2592 #. type: Content of: <book><chapter><sect1><para>
2593 #: complete-book.xml:2058
2595 "How did the ratio of surveillable citizens expand from 1:60 to 1:10,000 in "
2596 "less than 30 years? It’s thanks to Big Tech. Our devices and services gather "
2597 "most of the data that the NSA mines for its surveillance project. We pay for "
2598 "these devices and the services they connect to, and then we painstakingly "
2599 "perform the data-entry tasks associated with logging facts about our lives, "
2600 "opinions, and preferences. This mass surveillance project has been largely "
2601 "useless for fighting terrorism: The NSA can <ulink "
2602 "url=\"https://www.washingtonpost.com/world/national-security/nsa-cites-case-as-success-of-phone-data-collection-program/2013/08/08/fc915e5a-feda-11e2-96a8-d3b921c0924a_story.html\">only "
2603 "point to a single minor success story</ulink> in which it used its data "
2604 "collection program to foil an attempt by a U.S. resident to wire a few "
2605 "thousand dollars to an overseas terror group. It’s ineffective for much the "
2606 "same reason that commercial surveillance projects are largely ineffective at "
2607 "targeting advertising: The people who want to commit acts of terror, like "
2608 "people who want to buy a refrigerator, are extremely rare. If you’re trying "
2609 "to detect a phenomenon whose base rate is one in a million with an "
2610 "instrument whose accuracy is only 99%, then every true positive will come at "
2611 "the cost of 9,999 false positives."
2614 #. type: Content of: <book><chapter><sect1><para>
2615 #: complete-book.xml:2079
2617 "Let me explain that again: If one in a million people is a terrorist, then "
2618 "there will only be about one terrorist in a random sample of one million "
2619 "people. If your test for detecting terrorists is 99% accurate, it will "
2620 "identify 10,000 terrorists in your million-person sample (1% of one million "
2621 "is 10,000). For every true positive, you’ll get 9,999 false positives."
2624 #. type: Content of: <book><chapter><sect1><para>
2625 #: complete-book.xml:2087
2627 "In reality, the accuracy of algorithmic terrorism detection falls far short "
2628 "of the 99% mark, as does refrigerator ad targeting. The difference is that "
2629 "being falsely accused of wanting to buy a fridge is a minor nuisance while "
2630 "being falsely accused of planning a terror attack can destroy your life and "
2631 "the lives of everyone you love."
2634 #. type: Content of: <book><chapter><sect1><para>
2635 #: complete-book.xml:2094
2637 "Mass state surveillance is only feasible because of surveillance capitalism "
2638 "and its extremely low-yield ad-targeting systems, which require a constant "
2639 "feed of personal data to remain barely viable. Surveillance capitalism’s "
2640 "primary failure mode is mistargeted ads while mass state surveillance’s "
2641 "primary failure mode is grotesque human rights abuses, tending toward "
2645 #. type: Content of: <book><chapter><sect1><para>
2646 #: complete-book.xml:2102
2648 "State surveillance is no mere parasite on Big Tech, sucking up its data and "
2649 "giving nothing in return. In truth, the two are symbiotes: Big Tech sucks up "
2650 "our data for spy agencies, and spy agencies ensure that governments don’t "
2651 "limit Big Tech’s activities so severely that it would no longer serve the "
2652 "spy agencies’ needs. There is no firm distinction between state surveillance "
2653 "and surveillance capitalism; they are dependent on one another."
2656 #. type: Content of: <book><chapter><sect1><para>
2657 #: complete-book.xml:2111
2659 "To see this at work today, look no further than Amazon’s home surveillance "
2660 "device, the Ring doorbell, and its associated app, Neighbors. Ring — a "
2661 "product that Amazon acquired and did not develop in house — makes a "
2662 "camera-enabled doorbell that streams footage from your front door to your "
2663 "mobile device. The Neighbors app allows you to form a neighborhood-wide "
2664 "surveillance grid with your fellow Ring owners through which you can share "
2665 "clips of <quote>suspicious characters.</quote> If you’re thinking that this "
2666 "sounds like a recipe for letting curtain-twitching racists supercharge their "
2667 "suspicions of people with brown skin who walk down their blocks, <ulink "
2668 "url=\"https://www.eff.org/deeplinks/2020/07/amazons-ring-enables-over-policing-efforts-some-americas-deadliest-law-enforcement\">you’re "
2669 "right</ulink>. Ring has become a <emphasis>de facto,</emphasis> "
2670 "off-the-books arm of the police without any of the pesky oversight or rules."
2673 #. type: Content of: <book><chapter><sect1><para>
2674 #: complete-book.xml:2127
2676 "In mid-2019, a series of public records requests revealed that Amazon had "
2677 "struck confidential deals with more than 400 local law enforcement agencies "
2678 "through which the agencies would promote Ring and Neighbors and in exchange "
2679 "get access to footage from Ring cameras. In theory, cops would need to "
2680 "request this footage through Amazon (and internal documents reveal that "
2681 "Amazon devotes substantial resources to coaching cops on how to spin a "
2682 "convincing story when doing so), but in practice, when a Ring customer turns "
2683 "down a police request, Amazon only requires the agency to formally request "
2684 "the footage from the company, which it will then produce."
2687 #. type: Content of: <book><chapter><sect1><para>
2688 #: complete-book.xml:2139
2690 "Ring and law enforcement have found many ways to intertwine their "
2691 "activities. Ring strikes secret deals to acquire real-time access to 911 "
2692 "dispatch and then streams alarming crime reports to Neighbors users, which "
2693 "serve as convincers for anyone who’s contemplating a surveillance doorbell "
2694 "but isn’t sure whether their neighborhood is dangerous enough to warrant it."
2697 #. type: Content of: <book><chapter><sect1><para>
2698 #: complete-book.xml:2147
2700 "The more the cops buzz-market the surveillance capitalist Ring, the more "
2701 "surveillance capability the state gets. Cops who rely on private entities "
2702 "for law-enforcement roles then brief against any controls on the deployment "
2703 "of that technology while the companies return the favor by lobbying against "
2704 "rules requiring public oversight of police surveillance technology. The more "
2705 "the cops rely on Ring and Neighbors, the harder it will be to pass laws to "
2706 "curb them. The fewer laws there are against them, the more the cops will "
2710 #. type: Content of: <book><chapter><sect1><title>
2711 #: complete-book.xml:2158
2712 msgid "Dignity and sanctuary"
2715 #. type: Content of: <book><chapter><sect1><para>
2716 #: complete-book.xml:2160
2718 "But even if we could exercise democratic control over our states and force "
2719 "them to stop raiding surveillance capitalism’s reservoirs of behavioral "
2720 "data, surveillance capitalism would still harm us."
2723 #. type: Content of: <book><chapter><sect1><para>
2724 #: complete-book.xml:2165
2726 "This is an area where Zuboff shines. Her chapter on <quote>sanctuary</quote> "
2727 "— the feeling of being unobserved — is a beautiful hymn to introspection, "
2728 "calmness, mindfulness, and tranquility."
2731 #. type: Content of: <book><chapter><sect1><para>
2732 #: complete-book.xml:2170
2734 "When you are watched, something changes. Anyone who has ever raised a child "
2735 "knows this. You might look up from your book (or more realistically, from "
2736 "your phone) and catch your child in a moment of profound realization and "
2737 "growth, a moment where they are learning something that is right at the edge "
2738 "of their abilities, requiring their entire ferocious concentration. For a "
2739 "moment, you’re transfixed, watching that rare and beautiful moment of focus "
2740 "playing out before your eyes, and then your child looks up and sees you "
2741 "seeing them, and the moment collapses. To grow, you need to be and expose "
2742 "your authentic self, and in that moment, you are vulnerable like a hermit "
2743 "crab scuttling from one shell to the next. The tender, unprotected tissues "
2744 "you expose in that moment are too delicate to reveal in the presence of "
2745 "another, even someone you trust as implicitly as a child trusts their "
2749 #. type: Content of: <book><chapter><sect1><para>
2750 #: complete-book.xml:2186
2752 "In the digital age, our authentic selves are inextricably tied to our "
2753 "digital lives. Your search history is a running ledger of the questions "
2754 "you’ve pondered. Your location history is a record of the places you’ve "
2755 "sought out and the experiences you’ve had there. Your social graph reveals "
2756 "the different facets of your identity, the people you’ve connected with."
2759 #. type: Content of: <book><chapter><sect1><para>
2760 #: complete-book.xml:2194
2762 "To be observed in these activities is to lose the sanctuary of your "
2766 #. type: Content of: <book><chapter><sect1><para>
2767 #: complete-book.xml:2198
2769 "There’s another way in which surveillance capitalism robs us of our capacity "
2770 "to be our authentic selves: by making us anxious. Surveillance capitalism "
2771 "isn’t really a mind-control ray, but you don’t need a mind-control ray to "
2772 "make someone anxious. After all, another word for anxiety is agitation, and "
2773 "to make someone experience agitation, you need merely to agitate them. To "
2774 "poke them and prod them and beep at them and buzz at them and bombard them "
2775 "on an intermittent schedule that is just random enough that our limbic "
2776 "systems never quite become inured to it."
2779 #. type: Content of: <book><chapter><sect1><para>
2780 #: complete-book.xml:2209
2782 "Our devices and services are <quote>general purpose</quote> in that they can "
2783 "connect anything or anyone to anything or anyone else and that they can run "
2784 "any program that can be written. This means that the distraction rectangles "
2785 "in our pockets hold our most precious moments with our most beloved people "
2786 "and their most urgent or time-sensitive communications (from <quote>running "
2787 "late can you get the kid?</quote> to <quote>doctor gave me bad news and I "
2788 "need to talk to you RIGHT NOW</quote>) as well as ads for refrigerators and "
2789 "recruiting messages from Nazis."
2792 #. type: Content of: <book><chapter><sect1><para>
2793 #: complete-book.xml:2219
2795 "All day and all night, our pockets buzz, shattering our concentration and "
2796 "tearing apart the fragile webs of connection we spin as we think through "
2797 "difficult ideas. If you locked someone in a cell and agitated them like "
2798 "this, we’d call it <quote>sleep deprivation torture,</quote> and it would be "
2799 "<ulink url=\"https://www.youtube.com/watch?v=1SKpRbvnx6g\">a war crime under "
2800 "the Geneva Conventions</ulink>."
2803 #. type: Content of: <book><chapter><sect1><title>
2804 #: complete-book.xml:2228
2805 msgid "Afflicting the afflicted"
2808 #. type: Content of: <book><chapter><sect1><para>
2809 #: complete-book.xml:2230
2811 "The effects of surveillance on our ability to be our authentic selves are "
2812 "not equal for all people. Some of us are lucky enough to live in a time and "
2813 "place in which all the most important facts of our lives are widely and "
2814 "roundly socially acceptable and can be publicly displayed without the risk "
2815 "of social consequence."
2818 #. type: Content of: <book><chapter><sect1><para>
2819 #: complete-book.xml:2237
2821 "But for many of us, this is not true. Recall that in living memory, many of "
2822 "the ways of being that we think of as socially acceptable today were once "
2823 "cause for dire social sanction or even imprisonment. If you are 65 years "
2824 "old, you have lived through a time in which people living in <quote>free "
2825 "societies</quote> could be imprisoned or sanctioned for engaging in "
2826 "homosexual activity, for falling in love with a person whose skin was a "
2827 "different color than their own, or for smoking weed."
2830 #. type: Content of: <book><chapter><sect1><para>
2831 #: complete-book.xml:2247
2833 "Today, these activities aren’t just decriminalized in much of the world, "
2834 "they’re considered normal, and the fallen prohibitions are viewed as "
2835 "shameful, regrettable relics of the past."
2838 #. type: Content of: <book><chapter><sect1><para>
2839 #: complete-book.xml:2252
2841 "How did we get from prohibition to normalization? Through private, personal "
2842 "activity: People who were secretly gay or secret pot-smokers or who secretly "
2843 "loved someone with a different skin color were vulnerable to retaliation if "
2844 "they made their true selves known and were limited in how much they could "
2845 "advocate for their own right to exist in the world and be true to "
2846 "themselves. But because there was a private sphere, these people could form "
2847 "alliances with their friends and loved ones who did not share their "
2848 "disfavored traits by having private conversations in which they came out, "
2849 "disclosing their true selves to the people around them and bringing them to "
2850 "their cause one conversation at a time."
2853 #. type: Content of: <book><chapter><sect1><para>
2854 #: complete-book.xml:2265
2856 "The right to choose the time and manner of these conversations was key to "
2857 "their success. It’s one thing to come out to your dad while you’re on a "
2858 "fishing trip away from the world and another thing entirely to blurt it out "
2859 "over the Christmas dinner table while your racist Facebook uncle is there to "
2863 #. type: Content of: <book><chapter><sect1><para>
2864 #: complete-book.xml:2272
2866 "Without a private sphere, there’s a chance that none of these changes would "
2867 "have come to pass and that the people who benefited from these changes would "
2868 "have either faced social sanction for coming out to a hostile world or would "
2869 "have never been able to reveal their true selves to the people they love."
2872 #. type: Content of: <book><chapter><sect1><para>
2873 #: complete-book.xml:2279
2875 "The corollary is that, unless you think that our society has attained social "
2876 "perfection — that your grandchildren in 50 years will ask you to tell them "
2877 "the story of how, in 2020, every injustice had been righted and no further "
2878 "change had to be made — then you should expect that right now, at this "
2879 "minute, there are people you love, whose happiness is key to your own, who "
2880 "have a secret in their hearts that stops them from ever being their "
2881 "authentic selves with you. These people are sorrowing and will go to their "
2882 "graves with that secret sorrow in their hearts, and the source of that "
2883 "sorrow will be the falsity of their relationship to you."
2886 #. type: Content of: <book><chapter><sect1><para>
2887 #: complete-book.xml:2291
2888 msgid "A private realm is necessary for human progress."
2891 #. type: Content of: <book><chapter><sect1><title>
2892 #: complete-book.xml:2294
2893 msgid "Any data you collect and retain will eventually leak"
2896 #. type: Content of: <book><chapter><sect1><para>
2897 #: complete-book.xml:2296
2899 "The lack of a private life can rob vulnerable people of the chance to be "
2900 "their authentic selves and constrain our actions by depriving us of "
2901 "sanctuary, but there is another risk that is borne by everyone, not just "
2902 "people with a secret: crime."
2905 #. type: Content of: <book><chapter><sect1><para>
2906 #: complete-book.xml:2302
2908 "Personally identifying information is of very limited use for the purpose of "
2909 "controlling peoples’ minds, but identity theft — really a catchall term for "
2910 "a whole constellation of terrible criminal activities that can destroy your "
2911 "finances, compromise your personal integrity, ruin your reputation, or even "
2912 "expose you to physical danger — thrives on it."
2915 #. type: Content of: <book><chapter><sect1><para>
2916 #: complete-book.xml:2310
2918 "Attackers are not limited to using data from one breached source, "
2919 "either. Multiple services have suffered breaches that exposed names, "
2920 "addresses, phone numbers, passwords, sexual tastes, school grades, work "
2921 "performance, brushes with the criminal justice system, family details, "
2922 "genetic information, fingerprints and other biometrics, reading habits, "
2923 "search histories, literary tastes, pseudonymous identities, and other "
2924 "sensitive information. Attackers can merge data from these different "
2925 "breaches to build up extremely detailed dossiers on random subjects and then "
2926 "use different parts of the data for different criminal purposes."
2929 #. type: Content of: <book><chapter><sect1><para>
2930 #: complete-book.xml:2322
2932 "For example, attackers can use leaked username and password combinations to "
2933 "hijack whole fleets of commercial vehicles that <ulink "
2934 "url=\"https://www.vice.com/en_us/article/zmpx4x/hacker-monitor-cars-kill-engine-gps-tracking-apps\">have "
2935 "been fitted with anti-theft GPS trackers and immobilizers</ulink> or to "
2936 "hijack baby monitors in order to <ulink "
2937 "url=\"https://www.washingtonpost.com/technology/2019/04/23/how-nest-designed-keep-intruders-out-peoples-homes-effectively-allowed-hackers-get/?utm_term=.15220e98c550\">terrorize "
2938 "toddlers with the audio tracks from pornography</ulink>. Attackers use "
2939 "leaked data to trick phone companies into giving them your phone number, "
2940 "then they intercept SMS-based two-factor authentication codes in order to "
2941 "take over your email, bank account, and/or cryptocurrency wallets."
2944 #. type: Content of: <book><chapter><sect1><para>
2945 #: complete-book.xml:2335
2947 "Attackers are endlessly inventive in the pursuit of creative ways to "
2948 "weaponize leaked data. One common use of leaked data is to penetrate "
2949 "companies in order to access <emphasis>more</emphasis> data."
2952 #. type: Content of: <book><chapter><sect1><para>
2953 #: complete-book.xml:2340
2955 "Like spies, online fraudsters are totally dependent on companies "
2956 "over-collecting and over-retaining our data. Spy agencies sometimes pay "
2957 "companies for access to their data or intimidate them into giving it up, but "
2958 "sometimes they work just like criminals do — by <ulink "
2959 "url=\"https://www.bbc.com/news/world-us-canada-24751821\">sneaking data out "
2960 "of companies’ databases</ulink>."
2963 #. type: Content of: <book><chapter><sect1><para>
2964 #: complete-book.xml:2348
2966 "The over-collection of data has a host of terrible social consequences, from "
2967 "the erosion of our authentic selves to the undermining of social progress, "
2968 "from state surveillance to an epidemic of online crime. Commercial "
2969 "surveillance is also a boon to people running influence campaigns, but "
2970 "that’s the least of our troubles."
2973 #. type: Content of: <book><chapter><sect1><title>
2974 #: complete-book.xml:2356
2975 msgid "Critical tech exceptionalism is still tech exceptionalism"
2978 #. type: Content of: <book><chapter><sect1><para>
2979 #: complete-book.xml:2359
2981 "Big Tech has long practiced technology exceptionalism: the idea that it "
2982 "should not be subject to the mundane laws and norms of "
2983 "<quote>meatspace.</quote> Mottoes like Facebook’s <quote>move fast and break "
2984 "things</quote> attracted justifiable scorn of the companies’ self-serving "
2988 #. type: Content of: <book><chapter><sect1><para>
2989 #: complete-book.xml:2365
2991 "Tech exceptionalism got us all into a lot of trouble, so it’s ironic and "
2992 "distressing to see Big Tech’s critics committing the same sin."
2995 #. type: Content of: <book><chapter><sect1><para>
2996 #: complete-book.xml:2369
2998 "Big Tech is not a <quote>rogue capitalism</quote> that cannot be cured "
2999 "through the traditional anti-monopoly remedies of trustbusting (forcing "
3000 "companies to divest of competitors they have acquired) and bans on mergers "
3001 "to monopoly and other anti-competitive tactics. Big Tech does not have the "
3002 "power to use machine learning to influence our behavior so thoroughly that "
3003 "markets lose the ability to punish bad actors and reward superior "
3004 "competitors. Big Tech has no rule-writing mind-control ray that necessitates "
3005 "ditching our old toolbox."
3008 #. type: Content of: <book><chapter><sect1><para>
3009 #: complete-book.xml:2379
3011 "The thing is, people have been claiming to have perfected mind-control rays "
3012 "for centuries, and every time, it turned out to be a con — though sometimes "
3013 "the con artists were also conning themselves."
3016 #. type: Content of: <book><chapter><sect1><para>
3017 #: complete-book.xml:2385
3019 "For generations, the advertising industry has been steadily improving its "
3020 "ability to sell advertising services to businesses while only making "
3021 "marginal gains in selling those businesses’ products to prospective "
3022 "customers. John Wanamaker’s lament that <quote>50% of my advertising budget "
3023 "is wasted, I just don’t know which 50%</quote> is a testament to the triumph "
3024 "of <emphasis>ad executives</emphasis>, who successfully convinced Wanamaker "
3025 "that only half of the money he spent went to waste."
3028 #. type: Content of: <book><chapter><sect1><para>
3029 #: complete-book.xml:2395
3031 "The tech industry has made enormous improvements in the science of "
3032 "convincing businesses that they’re good at advertising while their actual "
3033 "improvements to advertising — as opposed to targeting — have been pretty "
3034 "ho-hum. The vogue for machine learning — and the mystical invocation of "
3035 "<quote>artificial intelligence</quote> as a synonym for straightforward "
3036 "statistical inference techniques — has greatly boosted the efficacy of Big "
3037 "Tech’s sales pitch as marketers have exploited potential customers’ lack of "
3038 "technical sophistication to get away with breathtaking acts of overpromising "
3039 "and underdelivering."
3042 #. type: Content of: <book><chapter><sect1><para>
3043 #: complete-book.xml:2407
3045 "It’s tempting to think that if businesses are willing to pour billions into "
3046 "a venture that the venture must be a good one. Yet there are plenty of times "
3047 "when this rule of thumb has led us astray. For example, it’s virtually "
3048 "unheard of for managed investment funds to outperform simple index funds, "
3049 "and investors who put their money into the hands of expert money managers "
3050 "overwhelmingly fare worse than those who entrust their savings to index "
3051 "funds. But managed funds still account for the majority of the money "
3052 "invested in the markets, and they are patronized by some of the richest, "
3053 "most sophisticated investors in the world. Their vote of confidence in an "
3054 "underperforming sector is a parable about the role of luck in wealth "
3055 "accumulation, not a sign that managed funds are a good buy."
3058 #. type: Content of: <book><chapter><sect1><para>
3059 #: complete-book.xml:2421
3061 "The claims of Big Tech’s mind-control system are full of tells that the "
3062 "enterprise is a con. For example, <ulink "
3063 "url=\"https://www.frontiersin.org/articles/10.3389/fpsyg.2020.01415/full\">the "
3064 "reliance on the <quote>Big Five</quote> personality traits</ulink> as a "
3065 "primary means of influencing people even though the <quote>Big Five</quote> "
3066 "theory is unsupported by any large-scale, peer-reviewed studies and is "
3068 "url=\"https://www.wired.com/story/the-noisy-fallacies-of-psychographic-targeting/\">mostly "
3069 "the realm of marketing hucksters and pop psych</ulink>."
3072 #. type: Content of: <book><chapter><sect1><para>
3073 #: complete-book.xml:2431
3075 "Big Tech’s promotional materials also claim that their algorithms can "
3076 "accurately perform <quote>sentiment analysis</quote> or detect peoples’ "
3077 "moods based on their <quote>microexpressions,</quote> but <ulink "
3078 "url=\"https://www.npr.org/2018/09/12/647040758/advertising-on-facebook-is-it-worth-it\">these "
3079 "are marketing claims, not scientific ones</ulink>. These methods are largely "
3080 "untested by independent scientific experts, and where they have been tested, "
3081 "they’ve been found sorely wanting. Microexpressions are particularly "
3082 "suspect as the companies that specialize in training people to detect them "
3084 "url=\"https://theintercept.com/2017/02/08/tsas-own-files-show-doubtful-science-behind-its-behavior-screening-program/\">have "
3085 "been shown</ulink> to underperform relative to random chance."
3088 #. type: Content of: <book><chapter><sect1><para>
3089 #: complete-book.xml:2444
3091 "Big Tech has been so good at marketing its own supposed superpowers that "
3092 "it’s easy to believe that they can market everything else with similar "
3093 "acumen, but it’s a mistake to believe the hype. Any statement a company "
3094 "makes about the quality of its products is clearly not impartial. The fact "
3095 "that we distrust all the things that Big Tech says about its data handling, "
3096 "compliance with privacy laws, etc., is only reasonable — but why on Earth "
3097 "would we treat Big Tech’s marketing literature as the gospel truth? Big Tech "
3098 "lies about just about <emphasis>everything</emphasis>, including how well "
3099 "its machine-learning fueled persuasion systems work."
3102 #. type: Content of: <book><chapter><sect1><para>
3103 #: complete-book.xml:2456
3105 "That skepticism should infuse all of our evaluations of Big Tech and its "
3106 "supposed abilities, including our perusal of its patents. Zuboff vests these "
3107 "patents with enormous significance, pointing out that Google claimed "
3108 "extensive new persuasion capabilities in <ulink "
3109 "url=\"https://patents.google.com/patent/US20050131762A1/en\">its patent "
3110 "filings</ulink>. These claims are doubly suspect: first, because they are so "
3111 "self-serving, and second, because the patent itself is so notoriously an "
3112 "invitation to exaggeration."
3115 #. type: Content of: <book><chapter><sect1><para>
3116 #: complete-book.xml:2466
3118 "Patent applications take the form of a series of claims and range from broad "
3119 "to narrow. A typical patent starts out by claiming that its authors have "
3120 "invented a method or system for doing every conceivable thing that anyone "
3121 "might do, ever, with any tool or device. Then it narrows that claim in "
3122 "successive stages until we get to the actual <quote>invention</quote> that "
3123 "is the true subject of the patent. The hope is that the patent examiner — "
3124 "who is almost certainly overworked and underinformed — will miss the fact "
3125 "that some or all of these claims are ridiculous, or at least suspect, and "
3126 "grant the patent’s broader claims. Patents for unpatentable things are still "
3127 "incredibly useful because they can be wielded against competitors who might "
3128 "license that patent or steer clear of its claims rather than endure the "
3129 "lengthy, expensive process of contesting it."
3132 #. type: Content of: <book><chapter><sect1><para>
3133 #: complete-book.xml:2481
3135 "What’s more, software patents are routinely granted even though the filer "
3136 "doesn’t have any evidence that they can do the thing claimed by the "
3137 "patent. That is, you can patent an <quote>invention</quote> that you haven’t "
3138 "actually made and that you don’t know how to make."
3141 #. type: Content of: <book><chapter><sect1><para>
3142 #: complete-book.xml:2487
3144 "With these considerations in hand, it becomes obvious that the fact that a "
3145 "Big Tech company has patented what it <emphasis>says</emphasis> is an "
3146 "effective mind-control ray is largely irrelevant to whether Big Tech can in "
3147 "fact control our minds."
3150 #. type: Content of: <book><chapter><sect1><para>
3151 #: complete-book.xml:2494
3153 "Big Tech collects our data for many reasons, including the diminishing "
3154 "returns on existing stores of data. But many tech companies also collect "
3155 "data out of a mistaken tech exceptionalist belief in the network effects of "
3156 "data. Network effects occur when each new user in a system increases its "
3157 "value. The classic example is fax machines: A single fax machine is of no "
3158 "use, two fax machines are of limited use, but every new fax machine that’s "
3159 "put to use after the first doubles the number of possible fax-to-fax links."
3162 #. type: Content of: <book><chapter><sect1><para>
3163 #: complete-book.xml:2504
3165 "Data mined for predictive systems doesn’t necessarily produce these "
3166 "dividends. Think of Netflix: The predictive value of the data mined from a "
3167 "million English-speaking Netflix viewers is hardly improved by the addition "
3168 "of one more user’s viewing data. Most of the data Netflix acquires after "
3169 "that first minimum viable sample duplicates existing data and produces only "
3170 "minimal gains. Meanwhile, retraining models with new data gets progressively "
3171 "more expensive as the number of data points increases, and manual tasks like "
3172 "labeling and validating data do not get cheaper at scale."
3175 #. type: Content of: <book><chapter><sect1><para>
3176 #: complete-book.xml:2515
3178 "Businesses pursue fads to the detriment of their profits all the time, "
3179 "especially when the businesses and their investors are not motivated by the "
3180 "prospect of becoming profitable but rather by the prospect of being acquired "
3181 "by a Big Tech giant or by having an IPO. For these firms, ticking faddish "
3182 "boxes like <quote>collects as much data as possible</quote> might realize a "
3183 "bigger return on investment than <quote>collects a business-appropriate "
3184 "quantity of data.</quote>"
3187 #. type: Content of: <book><chapter><sect1><para>
3188 #: complete-book.xml:2524
3190 "This is another harm of tech exceptionalism: The belief that more data "
3191 "always produces more profits in the form of more insights that can be "
3192 "translated into better mind-control rays drives firms to over-collect and "
3193 "over-retain data beyond all rationality. And since the firms are behaving "
3194 "irrationally, a good number of them will go out of business and become ghost "
3195 "ships whose cargo holds are stuffed full of data that can harm people in "
3196 "myriad ways — but which no one is responsible for antey longer. Even if the "
3197 "companies don’t go under, the data they collect is maintained behind the "
3198 "minimum viable security — just enough security to keep the company viable "
3199 "while it waits to get bought out by a tech giant, an amount calculated to "
3200 "spend not one penny more than is necessary on protecting data."
3203 #. type: Content of: <book><chapter><sect1><title>
3204 #: complete-book.xml:2538
3206 "How monopolies, not mind control, drive surveillance capitalism: The "
3210 #. type: Content of: <book><chapter><sect1><para>
3211 #: complete-book.xml:2541
3213 "For the first decade of its existence, Facebook competed with the social "
3214 "media giants of the day (Myspace, Orkut, etc.) by presenting itself as the "
3215 "pro-privacy alternative. Indeed, Facebook justified its walled garden — "
3216 "which let users bring in data from the web but blocked web services like "
3217 "Google Search from indexing and caching Facebook pages — as a pro-privacy "
3218 "measure that protected users from the surveillance-happy winners of the "
3219 "social media wars like Myspace."
3222 #. type: Content of: <book><chapter><sect1><para>
3223 #: complete-book.xml:2551
3225 "Despite frequent promises that it would never collect or analyze its users’ "
3226 "data, Facebook periodically created initiatives that did just that, like the "
3227 "creepy, ham-fisted Beacon tool, which spied on you as you moved around the "
3228 "web and then added your online activities to your public timeline, allowing "
3229 "your friends to monitor your browsing habits. Beacon sparked a user "
3230 "revolt. Every time, Facebook backed off from its surveillance initiative, "
3231 "but not all the way; inevitably, the new Facebook would be more surveilling "
3232 "than the old Facebook, though not quite as surveilling as the intermediate "
3233 "Facebook following the launch of the new product or service."
3236 #. type: Content of: <book><chapter><sect1><para>
3237 #: complete-book.xml:2563
3239 "The pace at which Facebook ramped up its surveillance efforts seems to have "
3240 "been set by Facebook’s competitive landscape. The more competitors Facebook "
3241 "had, the better it behaved. Every time a major competitor foundered, "
3242 "Facebook’s behavior <ulink "
3243 "url=\"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3247362\">got "
3244 "markedly worse</ulink>."
3247 #. type: Content of: <book><chapter><sect1><para>
3248 #: complete-book.xml:2571
3250 "All the while, Facebook was prodigiously acquiring companies, including a "
3251 "company called Onavo. Nominally, Onavo made a battery-monitoring mobile "
3252 "app. But the permissions that Onavo required were so expansive that the app "
3253 "was able to gather fine-grained telemetry on everything users did with their "
3254 "phones, including which apps they used and how they were using them."
3257 #. type: Content of: <book><chapter><sect1><para>
3258 #: complete-book.xml:2579
3260 "Through Onavo, Facebook discovered that it was losing market share to "
3261 "Snapchat, an app that — like Facebook a decade before — billed itself as the "
3262 "pro-privacy alternative to the status quo. Through Onavo, Facebook was able "
3263 "to mine data from the devices of Snapchat users, including both current and "
3264 "former Snapchat users. This spurred Facebook to acquire Instagram — some "
3265 "features of which competed with Snapchat — and then allowed Facebook to "
3266 "fine-tune Instagram’s features and sales pitch to erode Snapchat’s gains and "
3267 "ensure that Facebook would not have to face the kinds of competitive "
3268 "pressures it had earlier inflicted on Myspace and Orkut."
3271 #. type: Content of: <book><chapter><sect1><para>
3272 #: complete-book.xml:2591
3274 "The story of how Facebook crushed Snapchat reveals the relationship between "
3275 "monopoly and surveillance capitalism. Facebook combined surveillance with "
3276 "lax antitrust enforcement to spot the competitive threat of Snapchat on its "
3277 "horizon and then take decisive action against it. Facebook’s surveillance "
3278 "capitalism let it avert competitive pressure with anti-competitive "
3279 "tactics. Facebook users still want privacy — Facebook hasn’t used "
3280 "surveillance to brainwash them out of it — but they can’t get it because "
3281 "Facebook’s surveillance lets it destroy any hope of a rival service emerging "
3282 "that competes on privacy features."
3285 #. type: Content of: <book><chapter><sect1><title>
3286 #: complete-book.xml:2603
3287 msgid "A monopoly over your friends"
3290 #. type: Content of: <book><chapter><sect1><para>
3291 #: complete-book.xml:2605
3293 "A decentralization movement has tried to erode the dominance of Facebook and "
3294 "other Big Tech companies by fielding <quote>indieweb</quote> alternatives — "
3295 "Mastodon as a Twitter alternative, Diaspora as a Facebook alternative, "
3296 "etc. — but these efforts have failed to attain any kind of liftoff."
3299 #. type: Content of: <book><chapter><sect1><para>
3300 #: complete-book.xml:2612
3302 "Fundamentally, each of these services is hamstrung by the same problem: "
3303 "Every potential user for a Facebook or Twitter alternative has to convince "
3304 "all their friends to follow them to a decentralized web alternative in order "
3305 "to continue to realize the benefit of social media. For many of us, the only "
3306 "reason to have a Facebook account is that our friends have Facebook "
3307 "accounts, and the reason they have Facebook accounts is that "
3308 "<emphasis>we</emphasis> have Facebook accounts."
3311 #. type: Content of: <book><chapter><sect1><para>
3312 #: complete-book.xml:2622
3314 "All of this has conspired to make Facebook — and other dominant platforms — "
3315 "into <quote>kill zones</quote> that investors will not fund new entrants "
3319 #. type: Content of: <book><chapter><sect1><para>
3320 #: complete-book.xml:2627
3322 "And yet, all of today’s tech giants came into existence despite the "
3323 "entrenched advantage of the companies that came before them. To understand "
3324 "how that happened, you have to understand both interoperability and "
3325 "adversarial interoperability."
3328 #. type: Content of: <book><chapter><sect1><blockquote><para>
3329 #: complete-book.xml:2634
3330 msgid "The hard problem of our species is coordination."
3333 #. type: Content of: <book><chapter><sect1><para>
3334 #: complete-book.xml:2638
3336 "<quote>Interoperability</quote> is the ability of two technologies to work "
3337 "with one another: Anyone can make an LP that will play on any record player, "
3338 "anyone can make a filter you can install in your stove’s extractor fan, "
3339 "anyone can make gasoline for your car, anyone can make a USB phone charger "
3340 "that fits in your car’s cigarette lighter receptacle, anyone can make a "
3341 "light bulb that works in your light socket, anyone can make bread that will "
3342 "toast in your toaster."
3345 #. type: Content of: <book><chapter><sect1><para>
3346 #: complete-book.xml:2647
3348 "Interoperability is often a source of innovation and consumer benefit: Apple "
3349 "made the first commercially successful PC, but millions of independent "
3350 "software vendors made interoperable programs that ran on the Apple II "
3351 "Plus. The simple analog antenna inputs on the back of TVs first allowed "
3352 "cable operators to connect directly to TVs, then they allowed game console "
3353 "companies and then personal computer companies to use standard televisions "
3354 "as displays. Standard RJ-11 telephone jacks allowed for the production of "
3355 "phones from a variety of vendors in a variety of forms, from the free "
3356 "football-shaped phone that came with a <emphasis>Sports "
3357 "Illustrated</emphasis> subscription to business phones with speakers, hold "
3358 "functions, and so on and then answering machines and finally modems, paving "
3359 "the way for the internet revolution."
3362 #. type: Content of: <book><chapter><sect1><para>
3363 #: complete-book.xml:2662
3365 "<quote>Interoperability</quote> is often used interchangeably with "
3366 "<quote>standardization,</quote> which is the process when manufacturers and "
3367 "other stakeholders hammer out a set of agreed-upon rules for implementing a "
3368 "technology, such as the electrical plug on your wall, the CAN bus used by "
3369 "your car’s computer systems, or the HTML instructions that your browser "
3373 #. type: Content of: <book><chapter><sect1><para>
3374 #: complete-book.xml:2670
3376 "But interoperability doesn’t require standardization — indeed, "
3377 "standardization often proceeds from the chaos of ad hoc interoperability "
3378 "measures. The inventor of the cigarette-lighter USB charger didn’t need to "
3379 "get permission from car manufacturers or even the manufacturers of the "
3380 "dashboard lighter subcomponent. The automakers didn’t take any "
3381 "countermeasures to prevent the use of these aftermarket accessories by their "
3382 "customers, but they also didn’t do anything to make life easier for the "
3383 "chargers’ manufacturers. This is a kind of <quote>neutral "
3384 "interoperability.</quote>"
3387 #. type: Content of: <book><chapter><sect1><para>
3388 #: complete-book.xml:2681
3390 "Beyond neutral interoperability, there is <quote>adversarial "
3391 "interoperability.</quote> That’s when a manufacturer makes a product that "
3392 "interoperates with another manufacturer’s product <emphasis>despite the "
3393 "second manufacturer’s objections</emphasis> and <emphasis>even if that means "
3394 "bypassing a security system designed to prevent interoperability</emphasis>."
3397 #. type: Content of: <book><chapter><sect1><para>
3398 #: complete-book.xml:2689
3400 "Probably the most familiar form of adversarial interoperability is "
3401 "third-party printer ink. Printer manufacturers claim that they sell printers "
3402 "below cost and that the only way they can recoup the losses they incur is by "
3403 "charging high markups on ink. To prevent the owners of printers from buying "
3404 "ink elsewhere, the printer companies deploy a suite of anti-customer "
3405 "security systems that detect and reject both refilled and third-party "
3409 #. type: Content of: <book><chapter><sect1><para>
3410 #: complete-book.xml:2698
3412 "Owners of printers take the position that HP and Epson and Brother are not "
3413 "charities and that customers for their wares have no obligation to help them "
3414 "survive, and so if the companies choose to sell their products at a loss, "
3415 "that’s their foolish choice and their consequences to live with. Likewise, "
3416 "competitors who make ink or refill kits observe that they don’t owe printer "
3417 "companies anything, and their erosion of printer companies’ margins are the "
3418 "printer companies’ problems, not their competitors’. After all, the printer "
3419 "companies shed no tears when they drive a refiller out of business, so why "
3420 "should the refillers concern themselves with the economic fortunes of the "
3421 "printer companies?"
3424 #. type: Content of: <book><chapter><sect1><para>
3425 #: complete-book.xml:2711
3427 "Adversarial interoperability has played an outsized role in the history of "
3428 "the tech industry: from the founding of the <quote>alt.*</quote> Usenet "
3429 "hierarchy (which was started against the wishes of Usenet’s maintainers and "
3430 "which grew to be bigger than all of Usenet combined) to the browser wars "
3431 "(when Netscape and Microsoft devoted massive engineering efforts to making "
3432 "their browsers incompatible with the other’s special commands and "
3433 "peccadilloes) to Facebook (whose success was built in part by helping its "
3434 "new users stay in touch with friends they’d left behind on Myspace because "
3435 "Facebook supplied them with a tool that scraped waiting messages from "
3436 "Myspace and imported them into Facebook, effectively creating an "
3437 "Facebook-based Myspace reader)."
3440 #. type: Content of: <book><chapter><sect1><para>
3441 #: complete-book.xml:2725
3443 "Today, incumbency is seen as an unassailable advantage. Facebook is where "
3444 "all of your friends are, so no one can start a Facebook competitor. But "
3445 "adversarial compatibility reverses the competitive advantage: If you were "
3446 "allowed to compete with Facebook by providing a tool that imported all your "
3447 "users’ waiting Facebook messages into an environment that competed on lines "
3448 "that Facebook couldn’t cross, like eliminating surveillance and ads, then "
3449 "Facebook would be at a huge disadvantage. It would have assembled all "
3450 "possible ex-Facebook users into a single, easy-to-find service; it would "
3451 "have educated them on how a Facebook-like service worked and what its "
3452 "potential benefits were; and it would have provided an easy means for "
3453 "disgruntled Facebook users to tell their friends where they might expect "
3457 #. type: Content of: <book><chapter><sect1><para>
3458 #: complete-book.xml:2740
3460 "Adversarial interoperability was once the norm and a key contributor to the "
3461 "dynamic, vibrant tech scene, but now it is stuck behind a thicket of laws "
3462 "and regulations that add legal risks to the tried-and-true tactics of "
3463 "adversarial interoperability. New rules and new interpretations of existing "
3464 "rules mean that a would-be adversarial interoperator needs to steer clear of "
3465 "claims under copyright, terms of service, trade secrecy, tortious "
3466 "interference, and patent."
3469 #. type: Content of: <book><chapter><sect1><para>
3470 #: complete-book.xml:2750
3472 "In the absence of a competitive market, lawmakers have resorted to assigning "
3473 "expensive, state-like duties to Big Tech firms, such as automatically "
3474 "filtering user contributions for copyright infringement or terrorist and "
3475 "extremist content or detecting and preventing harassment in real time or "
3476 "controlling access to sexual material."
3479 #. type: Content of: <book><chapter><sect1><para>
3480 #: complete-book.xml:2758
3482 "These measures put a floor under how small we can make Big Tech because only "
3483 "the very largest companies can afford the humans and automated filters "
3484 "needed to perform these duties."
3487 #. type: Content of: <book><chapter><sect1><para>
3488 #: complete-book.xml:2763
3490 "But that’s not the only way in which making platforms responsible for "
3491 "policing their users undermines competition. A platform that is expected to "
3492 "police its users’ conduct must prevent many vital adversarial "
3493 "interoperability techniques lest these subvert its policing measures. For "
3494 "example, if someone using a Twitter replacement like Mastodon is able to "
3495 "push messages into Twitter and read messages out of Twitter, they could "
3496 "avoid being caught by automated systems that detect and prevent harassment "
3497 "(such as systems that use the timing of messages or IP-based rules to make "
3498 "guesses about whether someone is a harasser)."
3501 #. type: Content of: <book><chapter><sect1><para>
3502 #: complete-book.xml:2775
3504 "To the extent that we are willing to let Big Tech police itself — rather "
3505 "than making Big Tech small enough that users can leave bad platforms for "
3506 "better ones and small enough that a regulation that simply puts a platform "
3507 "out of business will not destroy billions of users’ access to their "
3508 "communities and data — we build the case that Big Tech should be able to "
3509 "block its competitors and make it easier for Big Tech to demand legal "
3510 "enforcement tools to ban and punish attempts at adversarial "
3514 #. type: Content of: <book><chapter><sect1><para>
3515 #: complete-book.xml:2785
3517 "Ultimately, we can try to fix Big Tech by making it responsible for bad acts "
3518 "by its users, or we can try to fix the internet by cutting Big Tech down to "
3519 "size. But we can’t do both. To replace today’s giant products with "
3520 "pluralistic protocols, we need to clear the legal thicket that prevents "
3521 "adversarial interoperability so that tomorrow’s nimble, personal, "
3522 "small-scale products can federate themselves with giants like Facebook, "
3523 "allowing the users who’ve left to continue to communicate with users who "
3524 "haven’t left yet, reaching tendrils over Facebook’s garden wall that "
3525 "Facebook’s trapped users can use to scale the walls and escape to the "
3529 #. type: Content of: <book><chapter><sect1><title>
3530 #: complete-book.xml:2797
3531 msgid "Fake news is an epistemological crisis"
3534 #. type: Content of: <book><chapter><sect1><para>
3535 #: complete-book.xml:2799
3537 "Tech is not the only industry that has undergone massive concentration since "
3538 "the Reagan era. Virtually every major industry — from oil to newspapers to "
3539 "meatpacking to sea freight to eyewear to online pornography — has become a "
3540 "clubby oligarchy that just a few players dominate."
3543 #. type: Content of: <book><chapter><sect1><para>
3544 #: complete-book.xml:2806
3546 "At the same time, every industry has become something of a tech industry as "
3547 "general-purpose computers and general-purpose networks and the promise of "
3548 "efficiencies through data-driven analysis infuse every device, process, and "
3552 #. type: Content of: <book><chapter><sect1><para>
3553 #: complete-book.xml:2812
3555 "This phenomenon of industrial concentration is part of a wider story about "
3556 "wealth concentration overall as a smaller and smaller number of people own "
3557 "more and more of our world. This concentration of both wealth and industries "
3558 "means that our political outcomes are increasingly beholden to the parochial "
3559 "interests of the people and companies with all the money."
3562 #. type: Content of: <book><chapter><sect1><para>
3563 #: complete-book.xml:2820
3565 "That means that whenever a regulator asks a question with an obvious, "
3566 "empirical answer (<quote>Are humans causing climate change?</quote> or "
3567 "<quote>Should we let companies conduct commercial mass surveillance?</quote> "
3568 "or <quote>Does society benefit from allowing network neutrality "
3569 "violations?</quote>), the answer that comes out is only correct if that "
3570 "correctness meets with the approval of rich people and the industries that "
3571 "made them so wealthy."
3574 #. type: Content of: <book><chapter><sect1><para>
3575 #: complete-book.xml:2829
3577 "Rich people have always played an outsized role in politics and more so "
3578 "since the Supreme Court’s <emphasis>Citizens United</emphasis> decision "
3579 "eliminated key controls over political spending. Widening inequality and "
3580 "wealth concentration means that the very richest people are now a lot richer "
3581 "and can afford to spend a lot more money on political projects than ever "
3582 "before. Think of the Koch brothers or George Soros or Bill Gates."
3585 #. type: Content of: <book><chapter><sect1><para>
3586 #: complete-book.xml:2838
3588 "But the policy distortions of rich individuals pale in comparison to the "
3589 "policy distortions that concentrated industries are capable of. The "
3590 "companies in highly concentrated industries are much more profitable than "
3591 "companies in competitive industries — no competition means not having to "
3592 "reduce prices or improve quality to win customers — leaving them with bigger "
3593 "capital surpluses to spend on lobbying."
3596 #. type: Content of: <book><chapter><sect1><para>
3597 #: complete-book.xml:2847
3599 "Concentrated industries also find it easier to collaborate on policy "
3600 "objectives than competitive ones. When all the top execs from your industry "
3601 "can fit around a single boardroom table, they often do. And "
3602 "<emphasis>when</emphasis> they do, they can forge a consensus position on "
3606 #. type: Content of: <book><chapter><sect1><para>
3607 #: complete-book.xml:2854
3609 "Rising through the ranks in a concentrated industry generally means working "
3610 "at two or three of the big companies. When there are only relatively few "
3611 "companies in a given industry, each company has a more ossified executive "
3612 "rank, leaving ambitious execs with fewer paths to higher positions unless "
3613 "they are recruited to a rival. This means that the top execs in concentrated "
3614 "industries are likely to have been colleagues at some point and socialize in "
3615 "the same circles — connected through social ties or, say, serving as "
3616 "trustees for each others’ estates. These tight social bonds foster a "
3617 "collegial, rather than competitive, attitude."
3620 #. type: Content of: <book><chapter><sect1><para>
3621 #: complete-book.xml:2866
3623 "Highly concentrated industries also present a regulatory conundrum. When an "
3624 "industry is dominated by just four or five companies, the only people who "
3625 "are likely to truly understand the industry’s practices are its veteran "
3626 "executives. This means that top regulators are often former execs of the "
3627 "companies they are supposed to be regulating. These turns in government are "
3628 "often tacitly understood to be leaves of absence from industry, with former "
3629 "employers welcoming their erstwhile watchdogs back into their executive "
3630 "ranks once their terms have expired."
3633 #. type: Content of: <book><chapter><sect1><para>
3634 #: complete-book.xml:2877
3636 "All this is to say that the tight social bonds, small number of firms, and "
3637 "regulatory capture of concentrated industries give the companies that "
3638 "comprise them the power to dictate many, if not all, of the regulations that "
3642 #. type: Content of: <book><chapter><sect1><para>
3643 #: complete-book.xml:2883
3645 "This is increasingly obvious. Whether it’s payday lenders <ulink "
3646 "url=\"https://www.washingtonpost.com/business/2019/02/25/how-payday-lending-industry-insider-tilted-academic-research-its-favor/\">winning "
3647 "the right to practice predatory lending</ulink> or Apple <ulink "
3648 "url=\"https://www.vice.com/en_us/article/mgxayp/source-apple-will-fight-right-to-repair-legislation\">winning "
3649 "the right to decide who can fix your phone</ulink> or Google and Facebook "
3650 "winning the right to breach your private data without suffering meaningful "
3651 "consequences or victories for pipeline companies or impunity for opioid "
3652 "manufacturers or massive tax subsidies for incredibly profitable dominant "
3653 "businesses, it’s increasingly apparent that many of our official, "
3654 "evidence-based truth-seeking processes are, in fact, auctions for sale to "
3655 "the highest bidder."
3658 #. type: Content of: <book><chapter><sect1><para>
3659 #: complete-book.xml:2897
3661 "It’s really impossible to overstate what a terrifying prospect this is. We "
3662 "live in an incredibly high-tech society, and none of us could acquire the "
3663 "expertise to evaluate every technological proposition that stands between us "
3664 "and our untimely, horrible deaths. You might devote your life to acquiring "
3665 "the media literacy to distinguish good scientific journals from corrupt "
3666 "pay-for-play lookalikes and the statistical literacy to evaluate the quality "
3667 "of the analysis in the journals as well as the microbiology and epidemiology "
3668 "knowledge to determine whether you can trust claims about the safety of "
3669 "vaccines — but that would still leave you unqualified to judge whether the "
3670 "wiring in your home will give you a lethal shock <emphasis>and</emphasis> "
3671 "whether your car’s brakes’ software will cause them to fail unpredictably "
3672 "<emphasis>and</emphasis> whether the hygiene standards at your butcher are "
3673 "sufficient to keep you from dying after you finish your dinner."
3676 #. type: Content of: <book><chapter><sect1><para>
3677 #: complete-book.xml:2914
3679 "In a world as complex as this one, we have to defer to authorities, and we "
3680 "keep them honest by making those authorities accountable to us and binding "
3681 "them with rules to prevent conflicts of interest. We can’t possibly acquire "
3682 "the expertise to adjudicate conflicting claims about the best way to make "
3683 "the world safe and prosperous, but we <emphasis>can</emphasis> determine "
3684 "whether the adjudication process itself is trustworthy."
3687 #. type: Content of: <book><chapter><sect1><para>
3688 #: complete-book.xml:2923
3689 msgid "Right now, it’s obviously not."
3692 #. type: Content of: <book><chapter><sect1><para>
3693 #: complete-book.xml:2926
3695 "The past 40 years of rising inequality and industry concentration, together "
3696 "with increasingly weak accountability and transparency for expert agencies, "
3697 "has created an increasingly urgent sense of impending doom, the sense that "
3698 "there are vast conspiracies afoot that operate with tacit official approval "
3699 "despite the likelihood they are working to better themselves by ruining the "
3703 #. type: Content of: <book><chapter><sect1><para>
3704 #: complete-book.xml:2934
3706 "For example, it’s been decades since Exxon’s own scientists concluded that "
3707 "its products would render the Earth uninhabitable by humans. And yet those "
3708 "decades were lost to us, in large part because Exxon lobbied governments and "
3709 "sowed doubt about the dangers of its products and did so with the "
3710 "cooperation of many public officials. When the survival of you and everyone "
3711 "you love is threatened by conspiracies, it’s not unreasonable to start "
3712 "questioning the things you think you know in an attempt to determine whether "
3713 "they, too, are the outcome of another conspiracy."
3716 #. type: Content of: <book><chapter><sect1><para>
3717 #: complete-book.xml:2945
3719 "The collapse of the credibility of our systems for divining and upholding "
3720 "truths has left us in a state of epistemological chaos. Once, most of us "
3721 "might have assumed that the system was working and that our regulations "
3722 "reflected our best understanding of the empirical truths of the world as "
3723 "they were best understood — now we have to find our own experts to help us "
3724 "sort the true from the false."
3727 #. type: Content of: <book><chapter><sect1><para>
3728 #: complete-book.xml:2954
3730 "If you’re like me, you probably believe that vaccines are safe, but you "
3731 "(like me) probably also can’t explain the microbiology or statistics. Few of "
3732 "us have the math skills to review the literature on vaccine safety and "
3733 "describe why their statistical reasoning is sound. Likewise, few of us can "
3734 "review the stats in the (now discredited) literature on opioid safety and "
3735 "explain how those stats were manipulated. Both vaccines and opioids were "
3736 "embraced by medical authorities, after all, and one is safe while the other "
3737 "could ruin your life. You’re left with a kind of inchoate constellation of "
3738 "rules of thumb about which experts you trust to fact-check controversial "
3739 "claims and then to explain how all those respectable doctors with their "
3740 "peer-reviewed research on opioid safety <emphasis>were</emphasis> an "
3741 "aberration and then how you know that the doctors writing about vaccine "
3742 "safety are <emphasis>not</emphasis> an aberration."
3745 #. type: Content of: <book><chapter><sect1><para>
3746 #: complete-book.xml:2971
3748 "I’m 100% certain that vaccinating is safe and effective, but I’m also at "
3749 "something of a loss to explain exactly, <emphasis>precisely,</emphasis> why "
3750 "I believe this, given all the corruption I know about and the many times the "
3751 "stamp of certainty has turned out to be a parochial lie told to further "
3752 "enrich the super rich."
3755 #. type: Content of: <book><chapter><sect1><para>
3756 #: complete-book.xml:2979
3758 "Fake news — conspiracy theories, racist ideologies, scientific denialism — "
3759 "has always been with us. What’s changed today is not the mix of ideas in the "
3760 "public discourse but the popularity of the worst ideas in that "
3761 "mix. Conspiracy and denial have skyrocketed in lockstep with the growth of "
3762 "Big Inequality, which has also tracked the rise of Big Tech and Big Pharma "
3763 "and Big Wrestling and Big Car and Big Movie Theater and Big Everything Else."
3766 #. type: Content of: <book><chapter><sect1><para>
3767 #: complete-book.xml:2988
3769 "No one can say for certain why this has happened, but the two dominant camps "
3770 "are idealism (the belief that the people who argue for these conspiracies "
3771 "have gotten better at explaining them, maybe with the help of "
3772 "machine-learning tools) or materialism (the ideas have become more "
3773 "attractive because of material conditions in the world)."
3776 #. type: Content of: <book><chapter><sect1><para>
3777 #: complete-book.xml:2996
3779 "I’m a materialist. I’ve been exposed to the arguments of conspiracy "
3780 "theorists all my life, and I have not experienced any qualitative leap in "
3781 "the quality of those arguments."
3784 #. type: Content of: <book><chapter><sect1><para>
3785 #: complete-book.xml:3001
3787 "The major difference is in the world, not the arguments. In a time where "
3788 "actual conspiracies are commonplace, conspiracy theories acquire a ring of "
3792 #. type: Content of: <book><chapter><sect1><para>
3793 #: complete-book.xml:3006
3795 "We have always had disagreements about what’s true, but today, we have a "
3796 "disagreement over how we know whether something is true. This is an "
3797 "epistemological crisis, not a crisis over belief. It’s a crisis over the "
3798 "credibility of our truth-seeking exercises, from scientific journals (in an "
3799 "era where the biggest journal publishers have been caught producing "
3800 "pay-to-play journals for junk science) to regulations (in an era where "
3801 "regulators are routinely cycling in and out of business) to education (in an "
3802 "era where universities are dependent on corporate donations to keep their "
3806 #. type: Content of: <book><chapter><sect1><para>
3807 #: complete-book.xml:3017
3809 "Targeting — surveillance capitalism — makes it easier to find people who are "
3810 "undergoing this epistemological crisis, but it doesn’t create the "
3811 "crisis. For that, you need to look to corruption."
3814 #. type: Content of: <book><chapter><sect1><para>
3815 #: complete-book.xml:3022
3817 "And, conveniently enough, it’s corruption that allows surveillance "
3818 "capitalism to grow by dismantling monopoly protections, by permitting "
3819 "reckless collection and retention of personal data, by allowing ads to be "
3820 "targeted in secret, and by foreclosing on the possibility of going somewhere "
3821 "else where you might continue to enjoy your friends without subjecting "
3822 "yourself to commercial surveillance."
3825 #. type: Content of: <book><chapter><sect1><title>
3826 #: complete-book.xml:3031
3827 msgid "Tech is different"
3830 #. type: Content of: <book><chapter><sect1><para>
3831 #: complete-book.xml:3033
3833 "I reject both iterations of technological exceptionalism. I reject the idea "
3834 "that tech is uniquely terrible and led by people who are greedier or worse "
3835 "than the leaders of other industries, and I reject the idea that tech is so "
3836 "good — or so intrinsically prone to concentration — that it can’t be blamed "
3837 "for its present-day monopolistic status."
3840 #. type: Content of: <book><chapter><sect1><para>
3841 #: complete-book.xml:3041
3843 "I think tech is just another industry, albeit one that grew up in the "
3844 "absence of real monopoly constraints. It may have been first, but it isn’t "
3845 "the worst nor will it be the last."
3848 #. type: Content of: <book><chapter><sect1><para>
3849 #: complete-book.xml:3046
3851 "But there’s one way in which I <emphasis>am</emphasis> a tech "
3852 "exceptionalist. I believe that online tools are the key to overcoming "
3853 "problems that are much more urgent than tech monopolization: climate change, "
3854 "inequality, misogyny, and discrimination on the basis of race, gender "
3855 "identity, and other factors. The internet is how we will recruit people to "
3856 "fight those fights, and how we will coordinate their labor. Tech is not a "
3857 "substitute for democratic accountability, the rule of law, fairness, or "
3858 "stability — but it’s a means to achieve these things."
3861 #. type: Content of: <book><chapter><sect1><para>
3862 #: complete-book.xml:3057
3864 "The hard problem of our species is coordination. Everything from climate "
3865 "change to social change to running a business to making a family work can be "
3866 "viewed as a collective action problem."
3869 #. type: Content of: <book><chapter><sect1><para>
3870 #: complete-book.xml:3062
3872 "The internet makes it easier than at any time before to find people who want "
3873 "to work on a project with you — hence the success of free and open-source "
3874 "software, crowdfunding, and racist terror groups — and easier than ever to "
3875 "coordinate the work you do."
3878 #. type: Content of: <book><chapter><sect1><para>
3879 #: complete-book.xml:3068
3881 "The internet and the computers we connect to it also possess an exceptional "
3882 "quality: general-purposeness. The internet is designed to allow any two "
3883 "parties to communicate any data, using any protocol, without permission from "
3884 "anyone else. The only production design we have for computers is the "
3885 "general-purpose, <quote>Turing complete</quote> computer that can run every "
3886 "program we can express in symbolic logic."
3889 #. type: Content of: <book><chapter><sect1><para>
3890 #: complete-book.xml:3077
3892 "This means that every time someone with a special communications need "
3893 "invests in infrastructure and techniques to make the internet faster, "
3894 "cheaper, and more robust, this benefit redounds to everyone else who is "
3895 "using the internet to communicate. And this also means that every time "
3896 "someone with a special computing need invests to make computers faster, "
3897 "cheaper, and more robust, every other computing application is a potential "
3898 "beneficiary of this work."
3901 #. type: Content of: <book><chapter><sect1><para>
3902 #: complete-book.xml:3086
3904 "For these reasons, every type of communication is gradually absorbed into "
3905 "the internet, and every type of device — from airplanes to pacemakers — "
3906 "eventually becomes a computer in a fancy case."
3909 #. type: Content of: <book><chapter><sect1><para>
3910 #: complete-book.xml:3091
3912 "While these considerations don’t preclude regulating networks and computers, "
3913 "they do call for gravitas and caution when doing so because changes to "
3914 "regulatory frameworks could ripple out to have unintended consequences in "
3915 "many, many other domains."
3918 #. type: Content of: <book><chapter><sect1><para>
3919 #: complete-book.xml:3097
3921 "The upshot of this is that our best hope of solving the big coordination "
3922 "problems — climate change, inequality, etc. — is with free, fair, and open "
3923 "tech. Our best hope of keeping tech free, fair, and open is to exercise "
3924 "caution in how we regulate tech and to attend closely to the ways in which "
3925 "interventions to solve one problem might create problems in other domains."
3928 #. type: Content of: <book><chapter><sect1><title>
3929 #: complete-book.xml:3105
3930 msgid "Ownership of facts"
3933 #. type: Content of: <book><chapter><sect1><para>
3934 #: complete-book.xml:3107
3936 "Big Tech has a funny relationship with information. When you’re generating "
3937 "information — anything from the location data streaming off your mobile "
3938 "device to the private messages you send to friends on a social network — it "
3939 "claims the rights to make unlimited use of that data."
3942 #. type: Content of: <book><chapter><sect1><para>
3943 #: complete-book.xml:3114
3945 "But when you have the audacity to turn the tables — to use a tool that "
3946 "blocks ads or slurps your waiting updates out of a social network and puts "
3947 "them in another app that lets you set your own priorities and suggestions or "
3948 "crawls their system to allow you to start a rival business — they claim that "
3949 "you’re stealing from them."
3952 #. type: Content of: <book><chapter><sect1><para>
3953 #: complete-book.xml:3121
3955 "The thing is, information is a very bad fit for any kind of private property "
3956 "regime. Property rights are useful for establishing markets that can lead to "
3957 "the effective development of fallow assets. These markets depend on clear "
3958 "titles to ensure that the things being bought and sold in them can, in fact, "
3959 "be bought and sold."
3962 #. type: Content of: <book><chapter><sect1><para>
3963 #: complete-book.xml:3128
3965 "Information rarely has such a clear title. Take phone numbers: There’s "
3966 "clearly something going wrong when Facebook slurps up millions of users’ "
3967 "address books and uses the phone numbers it finds in them to plot out social "
3968 "graphs and fill in missing information about other users."
3971 #. type: Content of: <book><chapter><sect1><para>
3972 #: complete-book.xml:3135
3974 "But the phone numbers Facebook nonconsensually acquires in this transaction "
3975 "are not the <quote>property</quote> of the users they’re taken from nor do "
3976 "they belong to the people whose phones ring when you dial those numbers. The "
3977 "numbers are mere integers, 10 digits in the U.S. and Canada, and they "
3978 "appear in millions of places, including somewhere deep in pi as well as "
3979 "numerous other contexts. Giving people ownership titles to integers is an "
3980 "obviously terrible idea."
3983 #. type: Content of: <book><chapter><sect1><para>
3984 #: complete-book.xml:3144
3986 "Likewise for the facts that Facebook and other commercial surveillance "
3987 "operators acquire about us, like that we are the children of our parents or "
3988 "the parents to our children or that we had a conversation with someone else "
3989 "or went to a public place. These data points can’t be property in the sense "
3990 "that your house or your shirt is your property because the title to them is "
3991 "intrinsically muddy: Does your mom own the fact that she is your mother? Do "
3992 "you? Do both of you? What about your dad — does he own this fact too, or "
3993 "does he have to license the fact from you (or your mom or both of you) in "
3994 "order to use this fact? What about the hundreds or thousands of other people "
3995 "who know these facts?"
3998 #. type: Content of: <book><chapter><sect1><para>
3999 #: complete-book.xml:3157
4001 "If you go to a Black Lives Matter demonstration, do the other demonstrators "
4002 "need your permission to post their photos from the event? The online fights "
4004 "url=\"https://www.wired.com/story/how-to-take-photos-at-protests/\">when and "
4005 "how to post photos from demonstrations</ulink> reveal a nuanced, complex "
4006 "issue that cannot be easily hand-waved away by giving one party a property "
4007 "right that everyone else in the mix has to respect."
4010 #. type: Content of: <book><chapter><sect1><para>
4011 #: complete-book.xml:3166
4013 "The fact that information isn’t a good fit with property and markets doesn’t "
4014 "mean that it’s not valuable. Babies aren’t property, but they’re inarguably "
4015 "valuable. In fact, we have a whole set of rules just for babies as well as a "
4016 "subset of those rules that apply to humans more generally. Someone who "
4017 "argues that babies won’t be truly valuable until they can be bought and sold "
4018 "like loaves of bread would be instantly and rightfully condemned as a "
4022 #. type: Content of: <book><chapter><sect1><para>
4023 #: complete-book.xml:3175
4025 "It’s tempting to reach for the property hammer when Big Tech treats your "
4026 "information like a nail — not least because Big Tech are such prolific "
4027 "abusers of property hammers when it comes to <emphasis>their</emphasis> "
4028 "information. But this is a mistake. If we allow markets to dictate the use "
4029 "of our information, then we’ll find that we’re sellers in a buyers’ market "
4030 "where the Big Tech monopolies set a price for our data that is so low as to "
4031 "be insignificant or, more likely, set at a nonnegotiable price of zero in a "
4032 "click-through agreement that you don’t have the opportunity to modify."
4035 #. type: Content of: <book><chapter><sect1><para>
4036 #: complete-book.xml:3186
4038 "Meanwhile, establishing property rights over information will create "
4039 "insurmountable barriers to independent data processing. Imagine that we "
4040 "require a license to be negotiated when a translated document is compared "
4041 "with its original, something Google has done and continues to do billions of "
4042 "times to train its automated language translation tools. Google can afford "
4043 "this, but independent third parties cannot. Google can staff a clearances "
4044 "department to negotiate one-time payments to the likes of the EU (one of the "
4045 "major repositories of translated documents) while independent watchdogs "
4046 "wanting to verify that the translations are well-prepared, or to root out "
4047 "bias in translations, will find themselves needing a staffed-up legal "
4048 "department and millions for licenses before they can even get started."
4051 #. type: Content of: <book><chapter><sect1><para>
4052 #: complete-book.xml:3201
4054 "The same goes for things like search indexes of the web or photos of "
4055 "peoples’ houses, which have become contentious thanks to Google’s Street "
4056 "View project. Whatever problems may exist with Google’s photographing of "
4057 "street scenes, resolving them by letting people decide who can take pictures "
4058 "of the facades of their homes from a public street will surely create even "
4059 "worse ones. Think of how street photography is important for newsgathering — "
4060 "including informal newsgathering, like photographing abuses of authority — "
4061 "and how being able to document housing and street life are important for "
4062 "contesting eminent domain, advocating for social aid, reporting planning and "
4063 "zoning violations, documenting discriminatory and unequal living conditions, "
4067 #. type: Content of: <book><chapter><sect1><para>
4068 #: complete-book.xml:3215
4070 "The ownership of facts is antithetical to many kinds of human progress. It’s "
4071 "hard to imagine a rule that limits Big Tech’s exploitation of our collective "
4072 "labors without inadvertently banning people from gathering data on online "
4073 "harassment or compiling indexes of changes in language or simply "
4074 "investigating how the platforms are shaping our discourse — all of which "
4075 "require scraping data that other people have created and subjecting it to "
4076 "scrutiny and analysis."
4079 #. type: Content of: <book><chapter><sect1><title>
4080 #: complete-book.xml:3225
4081 msgid "Persuasion works… slowly"
4084 #. type: Content of: <book><chapter><sect1><para>
4085 #: complete-book.xml:3227
4087 "The platforms may oversell their ability to persuade people, but obviously, "
4088 "persuasion works sometimes. Whether it’s the private realm that LGBTQ people "
4089 "used to recruit allies and normalize sexual diversity or the decadeslong "
4090 "project to convince people that markets are the only efficient way to solve "
4091 "complicated resource allocation problems, it’s clear that our societal "
4092 "attitudes <emphasis>can</emphasis> change."
4095 #. type: Content of: <book><chapter><sect1><para>
4096 #: complete-book.xml:3236
4098 "The project of shifting societal attitudes is a game of inches and "
4099 "years. For centuries, svengalis have purported to be able to accelerate this "
4100 "process, but even the most brutal forms of propaganda have struggled to make "
4101 "permanent changes. Joseph Goebbels was able to subject Germans to daily, "
4102 "mandatory, hourslong radio broadcasts, to round up and torture and murder "
4103 "dissidents, and to seize full control over their children’s education while "
4104 "banning any literature, broadcasts, or films that did not comport with his "
4108 #. type: Content of: <book><chapter><sect1><para>
4109 #: complete-book.xml:3247
4111 "Yet, after 12 years of terror, once the war ended, Nazi ideology was largely "
4112 "discredited in both East and West Germany, and a program of national truth "
4113 "and reconciliation was put in its place. Racism and authoritarianism were "
4114 "never fully abolished in Germany, but neither were the majority of Germans "
4115 "irrevocably convinced of Nazism — and the rise of racist authoritarianism in "
4116 "Germany today tells us that the liberal attitudes that replaced Nazism were "
4117 "no more permanent than Nazism itself."
4120 #. type: Content of: <book><chapter><sect1><para>
4121 #: complete-book.xml:3257
4123 "Racism and authoritarianism have also always been with us. Anyone who’s "
4124 "reviewed the kind of messages and arguments that racists put forward today "
4125 "would be hard-pressed to say that they have gotten better at presenting "
4126 "their ideas. The same pseudoscience, appeals to fear, and circular logic "
4127 "that racists presented in the 1980s, when the cause of white supremacy was "
4128 "on the wane, are to be found in the communications of leading white "
4129 "nationalists today."
4132 #. type: Content of: <book><chapter><sect1><para>
4133 #: complete-book.xml:3266
4135 "If racists haven’t gotten more convincing in the past decade, then how is it "
4136 "that more people were convinced to be openly racist at that time? I believe "
4137 "that the answer lies in the material world, not the world of ideas. The "
4138 "ideas haven’t gotten more convincing, but people have become more "
4139 "afraid. Afraid that the state can’t be trusted to act as an honest broker in "
4140 "life-or-death decisions, from those regarding the management of the economy "
4141 "to the regulation of painkillers to the rules for handling private "
4142 "information. Afraid that the world has become a game of musical chairs in "
4143 "which the chairs are being taken away at a never-before-seen rate. Afraid "
4144 "that justice for others will come at their expense. Monopolism isn’t the "
4145 "cause of these fears, but the inequality and material desperation and policy "
4146 "malpractice that monopolism contributes to is a significant contributor to "
4147 "these conditions. Inequality creates the conditions for both conspiracies "
4148 "and violent racist ideologies, and then surveillance capitalism lets "
4149 "opportunists target the fearful and the conspiracy-minded."
4152 #. type: Content of: <book><chapter><sect1><title>
4153 #: complete-book.xml:3285
4154 msgid "Paying won’t help"
4157 #. type: Content of: <book><chapter><sect1><para>
4158 #: complete-book.xml:3287
4160 "As the old saw goes, <quote>If you’re not paying for the product, you’re the "
4164 #. type: Content of: <book><chapter><sect1><para>
4165 #: complete-book.xml:3291
4167 "It’s a commonplace belief today that the advent of free, ad-supported media "
4168 "was the original sin of surveillance capitalism. The reasoning is that the "
4169 "companies that charged for access couldn’t <quote>compete with free</quote> "
4170 "and so they were driven out of business. Their ad-supported competitors, "
4171 "meanwhile, declared open season on their users’ data in a bid to improve "
4172 "their ad targeting and make more money and then resorted to the most "
4173 "sensationalist tactics to generate clicks on those ads. If only we’d pay for "
4174 "media again, we’d have a better, more responsible, more sober discourse that "
4175 "would be better for democracy."
4178 #. type: Content of: <book><chapter><sect1><para>
4179 #: complete-book.xml:3303
4181 "But the degradation of news products long precedes the advent of "
4182 "ad-supported online news. Long before newspapers were online, lax antitrust "
4183 "enforcement had opened the door for unprecedented waves of consolidation and "
4184 "roll-ups in newsrooms. Rival newspapers were merged, reporters and ad sales "
4185 "staff were laid off, physical plants were sold and leased back, leaving the "
4186 "companies loaded up with debt through leveraged buyouts and subsequent "
4187 "profit-taking by the new owners. In other words, it wasn’t merely shifts in "
4188 "the classified advertising market, which was long held to be the primary "
4189 "driver in the decline of the traditional newsroom, that made news companies "
4190 "unable to adapt to the internet — it was monopolism."
4193 #. type: Content of: <book><chapter><sect1><para>
4194 #: complete-book.xml:3316
4196 "Then, as news companies <emphasis>did</emphasis> come online, the ad "
4197 "revenues they commanded dropped even as the number of internet users (and "
4198 "thus potential online readers) increased. That shift was a function of "
4199 "consolidation in the ad sales market, with Google and Facebook emerging as "
4200 "duopolists who made more money every year from advertising while paying less "
4201 "and less of it to the publishers whose work the ads appeared "
4202 "alongside. Monopolism created a buyer’s market for ad inventory with "
4203 "Facebook and Google acting as gatekeepers."
4206 #. type: Content of: <book><chapter><sect1><para>
4207 #: complete-book.xml:3326
4209 "Paid services continue to exist alongside free ones, and often it is these "
4210 "paid services — anxious to prevent people from bypassing their paywalls or "
4211 "sharing paid media with freeloaders — that exert the most control over their "
4212 "customers. Apple’s iTunes and App Stores are paid services, but to maximize "
4213 "their profitability, Apple has to lock its platforms so that third parties "
4214 "can’t make compatible software without permission. These locks allow the "
4215 "company to exercise both editorial control (enabling it to exclude <ulink "
4216 "url=\"https://ncac.org/news/blog/does-apples-strict-app-store-content-policy-limit-freedom-of-expression\">controversial "
4217 "political material</ulink>) and technological control, including control "
4218 "over who can repair the devices it makes. If we’re worried that ad-supported "
4219 "products deprive people of their right to self-determination by using "
4220 "persuasion techniques to nudge their purchase decisions a few degrees in one "
4221 "direction or the other, then the near-total control a single company holds "
4222 "over the decision of who gets to sell you software, parts, and service for "
4223 "your iPhone should have us very worried indeed."
4226 #. type: Content of: <book><chapter><sect1><para>
4227 #: complete-book.xml:3345
4229 "We shouldn’t just be concerned about payment and control: The idea that "
4230 "paying will improve discourse is also dangerously wrong. The poor success "
4231 "rate of targeted advertising means that the platforms have to incentivize "
4232 "you to <quote>engage</quote> with posts at extremely high levels to generate "
4233 "enough pageviews to safeguard their profits. As discussed earlier, to "
4234 "increase engagement, platforms like Facebook use machine learning to guess "
4235 "which messages will be most inflammatory and make a point of shoving those "
4236 "into your eyeballs at every turn so that you will hate-click and argue with "
4240 #. type: Content of: <book><chapter><sect1><para>
4241 #: complete-book.xml:3356
4243 "Perhaps paying would fix this, the reasoning goes. If platforms could be "
4244 "economically viable even if you stopped clicking on them once your "
4245 "intellectual and social curiosity had been slaked, then they would have no "
4246 "reason to algorithmically enrage you to get more clicks out of you, right?"
4249 #. type: Content of: <book><chapter><sect1><para>
4250 #: complete-book.xml:3363
4252 "There may be something to that argument, but it still ignores the wider "
4253 "economic and political context of the platforms and the world that allowed "
4254 "them to grow so dominant."
4257 #. type: Content of: <book><chapter><sect1><para>
4258 #: complete-book.xml:3368
4260 "Platforms are world-spanning and all-encompassing because they are "
4261 "monopolies, and they are monopolies because we have gutted our most "
4262 "important and reliable anti-monopoly rules. Antitrust was neutered as a key "
4263 "part of the project to make the wealthy wealthier, and that project has "
4264 "worked. The vast majority of people on Earth have a negative net worth, and "
4265 "even the dwindling middle class is in a precarious state, undersaved for "
4266 "retirement, underinsured for medical disasters, and undersecured against "
4267 "climate and technology shocks."
4270 #. type: Content of: <book><chapter><sect1><para>
4271 #: complete-book.xml:3379
4273 "In this wildly unequal world, paying doesn’t improve the discourse; it "
4274 "simply prices discourse out of the range of the majority of people. Paying "
4275 "for the product is dandy, if you can afford it."
4278 #. type: Content of: <book><chapter><sect1><para>
4279 #: complete-book.xml:3384
4281 "If you think today’s filter bubbles are a problem for our discourse, imagine "
4282 "what they’d be like if rich people inhabited free-flowing Athenian "
4283 "marketplaces of ideas where you have to pay for admission while everyone "
4284 "else lives in online spaces that are subsidized by wealthy benefactors who "
4285 "relish the chance to establish conversational spaces where the <quote>house "
4286 "rules</quote> forbid questioning the status quo. That is, imagine if the "
4287 "rich seceded from Facebook, and then, instead of running ads that made money "
4288 "for shareholders, Facebook became a billionaire’s vanity project that also "
4289 "happened to ensure that nobody talked about whether it was fair that only "
4290 "billionaires could afford to hang out in the rarified corners of the "
4294 #. type: Content of: <book><chapter><sect1><para>
4295 #: complete-book.xml:3398
4297 "Behind the idea of paying for access is a belief that free markets will "
4298 "address Big Tech’s dysfunction. After all, to the extent that people have a "
4299 "view of surveillance at all, it is generally an unfavorable one, and the "
4300 "longer and more thoroughly one is surveilled, the less one tends to like "
4301 "it. Same goes for lock-in: If HP’s ink or Apple’s App Store were really "
4302 "obviously fantastic, they wouldn’t need technical measures to prevent users "
4303 "from choosing a rival’s product. The only reason these technical "
4304 "countermeasures exist is that the companies don’t believe their customers "
4305 "would <emphasis>voluntarily</emphasis> submit to their terms, and they want "
4306 "to deprive them of the choice to take their business elsewhere."
4309 #. type: Content of: <book><chapter><sect1><para>
4310 #: complete-book.xml:3411
4312 "Advocates for markets laud their ability to aggregate the diffused knowledge "
4313 "of buyers and sellers across a whole society through demand signals, price "
4314 "signals, and so on. The argument for surveillance capitalism being a "
4315 "<quote>rogue capitalism</quote> is that machine-learning-driven persuasion "
4316 "techniques distort decision-making by consumers, leading to incorrect "
4317 "signals — consumers don’t buy what they prefer, they buy what they’re "
4318 "tricked into preferring. It follows that the monopolistic practices of "
4319 "lock-in, which do far more to constrain consumers’ free choices, are even "
4320 "more of a <quote>rogue capitalism.</quote>"
4323 #. type: Content of: <book><chapter><sect1><para>
4324 #: complete-book.xml:3423
4326 "The profitability of any business is constrained by the possibility that its "
4327 "customers will take their business elsewhere. Both surveillance and lock-in "
4328 "are anti-features that no customer wants. But monopolies can capture their "
4329 "regulators, crush their competitors, insert themselves into their customers’ "
4330 "lives, and corral people into <quote>choosing</quote> their services "
4331 "regardless of whether they want them — it’s fine to be terrible when there "
4332 "is no alternative."
4335 #. type: Content of: <book><chapter><sect1><para>
4336 #: complete-book.xml:3433
4338 "Ultimately, surveillance and lock-in are both simply business strategies "
4339 "that monopolists can choose. Surveillance companies like Google are "
4340 "perfectly capable of deploying lock-in technologies — just look at the "
4341 "onerous Android licensing terms that require device-makers to bundle in "
4342 "Google’s suite of applications. And lock-in companies like Apple are "
4343 "perfectly capable of subjecting their users to surveillance if it means "
4344 "keeping the Chinese government happy and preserving ongoing access to "
4345 "Chinese markets. Monopolies may be made up of good, ethical people, but as "
4346 "institutions, they are not your friend — they will do whatever they can get "
4347 "away with to maximize their profits, and the more monopolistic they are, the "
4348 "more they <emphasis>can</emphasis> get away with."
4351 #. type: Content of: <book><chapter><sect1><title>
4352 #: complete-book.xml:3448
4353 msgid "An <quote>ecology</quote> moment for trustbusting"
4356 #. type: Content of: <book><chapter><sect1><para>
4357 #: complete-book.xml:3450
4359 "If we’re going to break Big Tech’s death grip on our digital lives, we’re "
4360 "going to have to fight monopolies. That may sound pretty mundane and "
4361 "old-fashioned, something out of the New Deal era, while ending the use of "
4362 "automated behavioral modification feels like the plotline of a really cool "
4366 #. type: Content of: <book><chapter><sect1><para>
4367 #: complete-book.xml:3457
4369 "Meanwhile, breaking up monopolies is something we seem to have forgotten how "
4370 "to do. There is a bipartisan, trans-Atlantic consensus that breaking up "
4371 "companies is a fool’s errand at best — liable to mire your federal "
4372 "prosecutors in decades of litigation — and counterproductive at worst, "
4373 "eroding the <quote>consumer benefits</quote> of large companies with massive "
4374 "efficiencies of scale."
4377 #. type: Content of: <book><chapter><sect1><para>
4378 #: complete-book.xml:3465
4380 "But trustbusters once strode the nation, brandishing law books, terrorizing "
4381 "robber barons, and shattering the illusion of monopolies’ all-powerful grip "
4382 "on our society. The trustbusting era could not begin until we found the "
4383 "political will — until the people convinced politicians they’d have their "
4384 "backs when they went up against the richest, most powerful men in the world."
4387 #. type: Content of: <book><chapter><sect1><para>
4388 #: complete-book.xml:3473
4389 msgid "Could we find that political will again?"
4392 #. type: Content of: <book><chapter><sect1><para>
4393 #: complete-book.xml:3476
4395 "Copyright scholar James Boyle has described how the term "
4396 "<quote>ecology</quote> marked a turning point in environmental "
4397 "activism. Prior to the adoption of this term, people who wanted to preserve "
4398 "whale populations didn’t necessarily see themselves as fighting the same "
4399 "battle as people who wanted to protect the ozone layer or fight freshwater "
4400 "pollution or beat back smog or acid rain."
4403 #. type: Content of: <book><chapter><sect1><para>
4404 #: complete-book.xml:3484
4406 "But the term <quote>ecology</quote> welded these disparate causes together "
4407 "into a single movement, and the members of this movement found solidarity "
4408 "with one another. The people who cared about smog signed petitions "
4409 "circulated by the people who wanted to end whaling, and the anti-whalers "
4410 "marched alongside the people demanding action on acid rain. This uniting "
4411 "behind a common cause completely changed the dynamics of environmentalism, "
4412 "setting the stage for today’s climate activism and the sense that preserving "
4413 "the habitability of the planet Earth is a shared duty among all people."
4416 #. type: Content of: <book><chapter><sect1><para>
4417 #: complete-book.xml:3495
4419 "I believe we are on the verge of a new <quote>ecology</quote> moment "
4420 "dedicated to combating monopolies. After all, tech isn’t the only "
4421 "concentrated industry nor is it even the <emphasis>most</emphasis> "
4422 "concentrated of industries."
4425 #. type: Content of: <book><chapter><sect1><para>
4426 #: complete-book.xml:3501
4428 "You can find partisans for trustbusting in every sector of the "
4429 "economy. Everywhere you look, you can find people who’ve been wronged by "
4430 "monopolists who’ve trashed their finances, their health, their privacy, "
4431 "their educations, and the lives of people they love. Those people have the "
4432 "same cause as the people who want to break up Big Tech and the same "
4433 "enemies. When most of the world’s wealth is in the hands of a very few, it "
4434 "follows that nearly every large company will have overlapping shareholders."
4437 #. type: Content of: <book><chapter><sect1><para>
4438 #: complete-book.xml:3511
4440 "That’s the good news: With a little bit of work and a little bit of "
4441 "coalition building, we have more than enough political will to break up Big "
4442 "Tech and every other concentrated industry besides. First we take Facebook, "
4443 "then we take AT&T/WarnerMedia."
4446 #. type: Content of: <book><chapter><sect1><para>
4447 #: complete-book.xml:3517
4449 "But here’s the bad news: Much of what we’re doing to tame Big Tech "
4450 "<emphasis>instead</emphasis> of breaking up the big companies also "
4451 "forecloses on the possibility of breaking them up later."
4454 #. type: Content of: <book><chapter><sect1><para>
4455 #: complete-book.xml:3522
4457 "Big Tech’s concentration currently means that their inaction on harassment, "
4458 "for example, leaves users with an impossible choice: absent themselves from "
4459 "public discourse by, say, quitting Twitter or endure vile, constant "
4460 "abuse. Big Tech’s over-collection and over-retention of data results in "
4461 "horrific identity theft. And their inaction on extremist recruitment means "
4462 "that white supremacists who livestream their shooting rampages can reach an "
4463 "audience of billions. The combination of tech concentration and media "
4464 "concentration means that artists’ incomes are falling even as the revenue "
4465 "generated by their creations are increasing."
4468 #. type: Content of: <book><chapter><sect1><para>
4469 #: complete-book.xml:3534
4471 "Yet governments confronting all of these problems all inevitably converge on "
4472 "the same solution: deputize the Big Tech giants to police their users and "
4473 "render them liable for their users’ bad actions. The drive to force Big Tech "
4474 "to use automated filters to block everything from copyright infringement to "
4475 "sex-trafficking to violent extremism means that tech companies will have to "
4476 "allocate hundreds of millions to run these compliance systems."
4479 #. type: Content of: <book><chapter><sect1><para>
4480 #: complete-book.xml:3543
4482 "These rules — the EU’s new Directive on Copyright, Australia’s new terror "
4483 "regulation, America’s FOSTA/SESTA sex-trafficking law and more — are not "
4484 "just death warrants for small, upstart competitors that might challenge Big "
4485 "Tech’s dominance but who lack the deep pockets of established incumbents to "
4486 "pay for all these automated systems. Worse still, these rules put a floor "
4487 "under how small we can hope to make Big Tech."
4490 #. type: Content of: <book><chapter><sect1><para>
4491 #: complete-book.xml:3552
4493 "That’s because any move to break up Big Tech and cut it down to size will "
4494 "have to cope with the hard limit of not making these companies so small that "
4495 "they can no longer afford to perform these duties — and it’s "
4496 "<emphasis>expensive</emphasis> to invest in those automated filters and "
4497 "outsource content moderation. It’s already going to be hard to unwind these "
4498 "deeply concentrated, chimeric behemoths that have been welded together in "
4499 "the pursuit of monopoly profits. Doing so while simultaneously finding some "
4500 "way to fill the regulatory void that will be left behind if these "
4501 "self-policing rulers were forced to suddenly abdicate will be much, much "
4505 #. type: Content of: <book><chapter><sect1><para>
4506 #: complete-book.xml:3564
4508 "Allowing the platforms to grow to their present size has given them a "
4509 "dominance that is nearly insurmountable — deputizing them with public duties "
4510 "to redress the pathologies created by their size makes it virtually "
4511 "impossible to reduce that size. Lather, rinse, repeat: If the platforms "
4512 "don’t get smaller, they will get larger, and as they get larger, they will "
4513 "create more problems, which will give rise to more public duties for the "
4514 "companies, which will make them bigger still."
4517 #. type: Content of: <book><chapter><sect1><para>
4518 #: complete-book.xml:3574
4520 "We can work to fix the internet by breaking up Big Tech and depriving them "
4521 "of monopoly profits, or we can work to fix Big Tech by making them spend "
4522 "their monopoly profits on governance. But we can’t do both. We have to "
4523 "choose between a vibrant, open internet or a dominated, monopolized internet "
4524 "commanded by Big Tech giants that we struggle with constantly to get them to "
4525 "behave themselves."
4528 #. type: Content of: <book><chapter><sect1><title>
4529 #: complete-book.xml:3582
4530 msgid "Make Big Tech small again"
4533 #. type: Content of: <book><chapter><sect1><para>
4534 #: complete-book.xml:3584
4536 "Trustbusting is hard. Breaking big companies into smaller ones is expensive "
4537 "and time-consuming. So time-consuming that by the time you’re done, the "
4538 "world has often moved on and rendered years of litigation irrelevant. From "
4539 "1969 to 1982, the U.S. government pursued an antitrust case against IBM over "
4540 "its dominance of mainframe computing — but the case collapsed in 1982 "
4541 "because mainframes were being speedily replaced by PCs."
4544 #. type: Content of: <book><chapter><sect1><blockquote><para>
4545 #: complete-book.xml:3594
4547 "A future U.S. president could simply direct their attorney general to "
4548 "enforce the law as it was written."
4551 #. type: Content of: <book><chapter><sect1><para>
4552 #: complete-book.xml:3599
4554 "It’s far easier to prevent concentration than to fix it, and reinstating the "
4555 "traditional contours of U.S. antitrust enforcement will, at the very least, "
4556 "prevent further concentration. That means bans on mergers between large "
4557 "companies, on big companies acquiring nascent competitors, and on platform "
4558 "companies competing directly with the companies that rely on the platforms."
4561 #. type: Content of: <book><chapter><sect1><para>
4562 #: complete-book.xml:3607
4564 "These powers are all in the plain language of U.S. antitrust laws, so in "
4565 "theory, a future U.S. president could simply direct their attorney general "
4566 "to enforce the law as it was written. But after decades of judicial "
4567 "<quote>education</quote> in the benefits of monopolies, after multiple "
4568 "administrations that have packed the federal courts with lifetime-appointed "
4569 "monopoly cheerleaders, it’s not clear that mere administrative action would "
4573 #. type: Content of: <book><chapter><sect1><para>
4574 #: complete-book.xml:3616
4576 "If the courts frustrate the Justice Department and the president, the next "
4577 "stop would be Congress, which could eliminate any doubt about how antitrust "
4578 "law should be enforced in the U.S. by passing new laws that boil down to "
4579 "saying, <quote>Knock it off. We all know what the Sherman Act says. Robert "
4580 "Bork was a deranged fantasist. For avoidance of doubt, <emphasis>fuck that "
4581 "guy</emphasis>.</quote> In other words, the problem with monopolies is "
4582 "<emphasis>monopolism</emphasis> — the concentration of power into too few "
4583 "hands, which erodes our right to self-determination. If there is a monopoly, "
4584 "the law wants it gone, period. Sure, get rid of monopolies that create "
4585 "<quote>consumer harm</quote> in the form of higher prices, but also, "
4586 "<emphasis>get rid of other monopolies, too.</emphasis>"
4589 #. type: Content of: <book><chapter><sect1><para>
4590 #: complete-book.xml:3630
4592 "But this only prevents things from getting worse. To help them get better, "
4593 "we will have to build coalitions with other activists in the anti-monopoly "
4594 "ecology movement — a pluralism movement or a self-determination movement — "
4595 "and target existing monopolies in every industry for breakup and structural "
4596 "separation rules that prevent, for example, the giant eyewear monopolist "
4597 "Luxottica from dominating both the sale and the manufacture of spectacles."
4600 #. type: Content of: <book><chapter><sect1><para>
4601 #: complete-book.xml:3639
4603 "In an important sense, it doesn’t matter which industry the breakups begin "
4604 "in. Once they start, shareholders in <emphasis>every</emphasis> industry "
4605 "will start to eye their investments in monopolists skeptically. As "
4606 "trustbusters ride into town and start making lives miserable for "
4607 "monopolists, the debate around every corporate boardroom’s table will "
4608 "shift. People within corporations who’ve always felt uneasy about monopolism "
4609 "will gain a powerful new argument to fend off their evil rivals in the "
4610 "corporate hierarchy: <quote>If we do it my way, we make less money; if we do "
4611 "it your way, a judge will fine us billions and expose us to ridicule and "
4612 "public disapprobation. So even though I get that it would be really cool to "
4613 "do that merger, lock out that competitor, or buy that little company and "
4614 "kill it before it can threaten it, we really shouldn’t — not if we don’t "
4615 "want to get tied to the DOJ’s bumper and get dragged up and down Trustbuster "
4616 "Road for the next 10 years.</quote>"
4619 #. type: Content of: <book><chapter><sect1><title>
4620 #: complete-book.xml:3656
4624 #. type: Content of: <book><chapter><sect1><para>
4625 #: complete-book.xml:3658
4627 "Fixing Big Tech will require a lot of iteration. As cyber lawyer Lawrence "
4628 "Lessig wrote in his 1999 book, <emphasis>Code and Other Laws of "
4629 "Cyberspace</emphasis>, our lives are regulated by four forces: law (what’s "
4630 "legal), code (what’s technologically possible), norms (what’s socially "
4631 "acceptable), and markets (what’s profitable)."
4634 #. type: Content of: <book><chapter><sect1><para>
4635 #: complete-book.xml:3665
4637 "If you could wave a wand and get Congress to pass a law that re-fanged the "
4638 "Sherman Act tomorrow, you could use the impending breakups to convince "
4639 "venture capitalists to fund competitors to Facebook, Google, Twitter, and "
4640 "Apple that would be waiting in the wings after they were cut down to size."
4643 #. type: Content of: <book><chapter><sect1><para>
4644 #: complete-book.xml:3672
4646 "But getting Congress to act will require a massive normative shift, a mass "
4647 "movement of people who care about monopolies — and pulling them apart."
4650 #. type: Content of: <book><chapter><sect1><para>
4651 #: complete-book.xml:3677
4653 "Getting people to care about monopolies will take technological "
4654 "interventions that help them to see what a world free from Big Tech might "
4655 "look like. Imagine if someone could make a beloved (but unauthorized) "
4656 "third-party Facebook or Twitter client that dampens the anxiety-producing "
4657 "algorithmic drumbeat and still lets you talk to your friends without being "
4658 "spied upon — something that made social media more sociable and less "
4659 "toxic. Now imagine that it gets shut down in a brutal legal battle. It’s "
4660 "always easier to convince people that something must be done to save a thing "
4661 "they love than it is to excite them about something that doesn’t even exist "
4665 #. type: Content of: <book><chapter><sect1><para>
4666 #: complete-book.xml:3689
4668 "Neither tech nor law nor code nor markets are sufficient to reform Big "
4669 "Tech. But a profitable competitor to Big Tech could bankroll a legislative "
4670 "push; legal reform can embolden a toolsmith to make a better tool; the tool "
4671 "can create customers for a potential business who value the benefits of the "
4672 "internet but want them delivered without Big Tech; and that business can get "
4673 "funded and divert some of its profits to legal reform. 20 GOTO 10 (or "
4674 "lather, rinse, repeat). Do it again, but this time, get farther! After all, "
4675 "this time you’re starting with weaker Big Tech adversaries, a constituency "
4676 "that understands things can be better, Big Tech rivals who’ll help ensure "
4677 "their own future by bankrolling reform, and code that other programmers can "
4678 "build on to weaken Big Tech even further."
4681 #. type: Content of: <book><chapter><sect1><para>
4682 #: complete-book.xml:3703
4684 "The surveillance capitalism hypothesis — that Big Tech’s products really "
4685 "work as well as they say they do and that’s why everything is so screwed up "
4686 "— is way too easy on surveillance and even easier on capitalism. Companies "
4687 "spy because they believe their own BS, and companies spy because governments "
4688 "let them, and companies spy because any advantage from spying is so "
4689 "short-lived and minor that they have to do more and more of it just to stay "
4693 #. type: Content of: <book><chapter><sect1><para>
4694 #: complete-book.xml:3712
4696 "As to why things are so screwed up? Capitalism. Specifically, the monopolism "
4697 "that creates inequality and the inequality that creates monopolism. It’s a "
4698 "form of capitalism that rewards sociopaths who destroy the real economy to "
4699 "inflate the bottom line, and they get away with it for the same reason "
4700 "companies get away with spying: because our governments are in thrall to "
4701 "both the ideology that says monopolies are actually just fine and in thrall "
4702 "to the ideology that says that in a monopolistic world, you’d better not "
4703 "piss off the monopolists."
4706 #. type: Content of: <book><chapter><sect1><para>
4707 #: complete-book.xml:3723
4709 "Surveillance doesn’t make capitalism rogue. Capitalism’s unchecked rule "
4710 "begets surveillance. Surveillance isn’t bad because it lets people "
4711 "manipulate us. It’s bad because it crushes our ability to be our authentic "
4712 "selves — and because it lets the rich and powerful figure out who might be "
4713 "thinking of building guillotines and what dirt they can use to discredit "
4714 "those embryonic guillotine-builders before they can even get to the "
4718 #. type: Content of: <book><chapter><sect1><title>
4719 #: complete-book.xml:3732
4720 msgid "Up and through"
4723 #. type: Content of: <book><chapter><sect1><para>
4724 #: complete-book.xml:3734
4726 "With all the problems of Big Tech, it’s tempting to imagine solving the "
4727 "problem by returning to a world without tech at all. Resist that temptation."
4730 #. type: Content of: <book><chapter><sect1><para>
4731 #: complete-book.xml:3739
4733 "The only way out of our Big Tech problem is up and through. If our future is "
4734 "not reliant upon high tech, it will be because civilization has fallen. Big "
4735 "Tech wired together a planetary, species-wide nervous system that, with the "
4736 "proper reforms and course corrections, is capable of seeing us through the "
4737 "existential challenge of our species and planet. Now it’s up to us to seize "
4738 "the means of computation, putting that electronic nervous system under "
4739 "democratic, accountable control."
4742 #. type: Content of: <book><chapter><sect1><para>
4743 #: complete-book.xml:3749
4745 "I am, secretly, despite what I have said earlier, a tech exceptionalist. Not "
4746 "in the sense of thinking that tech should be given a free pass to monopolize "
4747 "because it has <quote>economies of scale</quote> or some other nebulous "
4748 "feature. I’m a tech exceptionalist because I believe that getting tech right "
4749 "matters and that getting it wrong will be an unmitigated catastrophe — and "
4750 "doing it right can give us the power to work together to save our "
4751 "civilization, our species, and our planet."