USDC
Opinion: Elsevier against SciHub and LibGen
2015


UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
----------------------------------------

15 Civ. 4282(RWS)
OPINION

ELSEVIER INC., ELSEVIER B.V., and ELSEVIER LTD.,

Plaintiffs,

- against -

WWW.SCI-HUB.ORG, THE LIBRARY GENESIS PROJECT, d/b/a LIBGEN.ORG, ALEXANDRA ELBAKYAN, and JOHN DOES 1-99,

Defendants.

----------------------------------------

APPEARANCES

Attorneys for the Plaintiffs

DEVORE & DEMARCO LLP
99 Park Avenue, Suite 1100
New York, NY 1001 6
By:
Joseph DeMarco, Esq.
David Hirschberg, Esq.
Urvashi Sen, Esq.

Pro Se

Alexandra Elbakyan
Almaty, Kazakhstan

1

Sweet, D.J.,

Plaintiffs Elsevier Inc., Elsevier B.V., and Elsevier, Ltd. (collectively, "Elsevier" or the "Plaintiffs") have moved for a preliminary injunction preventing defendants Sci-Hub, Library Genesis Project (the " Project"), Alexandra Elbakyan ("Elbakyan"), Bookfi.org, Elibgen.org, Erestroresollege.org, and Libgen.info (collectively, the "Defendants") from distributing works to which Elsevier owns the copyright. Based upon the facts and conclusions below, the motion is granted and the Defendants are prohibited from distributing the Plaintiffs' copyrighted works.

Prior Proceedings

Elsevier, a major publisher of scientific journal articles and book chapters, brought this action on June 2, 2015, alleging that the Defendants, a series of websites affiliated with the Project (the "Website Defendants") and their owner and operator, Alexandra Elbakyan, infringed Elsevier's copyrighted works and violated the Computer Fraud and Abuse Act. (See generally Complaint, Dkt. No. 1.) Elsevier filed the instant motion for a preliminary injunction on June 11, 2015, via an Order to Show Cause. (Dkt. Nos. 5-13.) On June 18, 2015, the Court granted

2

Plaintiffs' Order to Show Cause and authorized service on the

Defendants via email.
week,

(Dkt.

No.

1 5.)

During the following

the Plaintiffs served the Website Defendants via email and

Elbakyan via email and postal mail.
On July 7,
Part One Judge,
and Elbakyan,

2015,

See Dkt.

Nos.

the Honorable Ronnie Abrams,

24-31. )
acting as

held a telephone conference with the Plaintiffs

during which Elbakyan acknowledged receiving the

papers concerning this case and declared that she did not intend
to obtain a lawyer.
conference,

(See Transcript,

Dkt.

No.

38. )

After the

Judge Abrams issued an Order directing Elbakyan to

notify the Court whether she wished assistance in obtaining pro
bono counsel,
se,

and advising her that while she could proceed pro

the Website Defendants,

not being natural persons,
(Dkt. No.

obtain counsel or risk default.

telephonic conference was held on July 14 ,

must

3 6. )

A second

2015,

during which

Elbakyan stated that she needed additional time to find a
lawyer.

( See Transcript,

the request,

Dkt.

No.

4 2. )

Judge Abrams granted

but warned Elbakyan th�t "you have to move quickly

both in attempting to retain an attorney and you' ll have to
stick to the schedule that is set once it' s set. "
After the telephone conference,

(Id.

at 6. )

Judge Abrams issued another

Order setting the preliminary injunction hearing for September
1 6 and directing Elbakyan to inform the Court by July 21 if she
wished assistance in obtaining pro bono counsel.
3

(Dkt. No.

4 0. )

The motion for a preliminary injunction was heard on
September 1 6,
hearing,

201 5.

None of the Defendants appeared at the

although Elbakyan sent a two-page letter to the court

the day before.

(Dkt. No.

50.)

Applicable Standard

Preliminary injunctions are "extraordinary and drastic
remed[ies]

that should not be granted unless the movant,

clear showing,
Armstrong,

carries the burden of persuasion. "

5 20 U. S.

district court may,

9 68,

972 (1997).

by a

Mazurek v.

In a copyright case,

at its discretion,

a

grant a preliminary

injunction when the plaintiffs demonstrate 1) a likelihood of
success on the merits,
injunction,
favor,

2) irreparable harm in the absence of an

3) a balance of the hardships tipping in their

and 4 ) that issuance of an injunction would not do a

disservice to the public interest.
F. 3d 27 5,

278 ( 2d Cir.

W PIX,

Inc.

v. ivi,

Inc.,

691

2012).

The Motion is Granted

With the exception of Elbakyan,

none of the Defendants

filed any opposition to the instant motion,

participated in any

hearing or telephone conference, or in any other way appeared in
4

the case.

Although Elbakyan acknowledges that she is the "main

operator of sci-hub. erg website"
only represent herself pro

se;

(Dkt.

No.

50 at 1. ), she may

since the Website Defendants are

not natural persons, they may only be represented by an attorney
See Max Cash Media, Inc.

admitted to practice in federal court.
v.

Prism Corp. , No.

(S.D. N. Y.

12 Civ.

147, 2012 WL 2861 162, at *1

July 9, 2012);

Auth. , 722 F. 2d 20, 22

(2d Cir.

1983)

(stating reasons for the

rule and noting that it is "venerable and widespread").

Because

the Website Defendants did not retain an attorney to defend this
action, they are in default.
However, the Website Defendants' default does not
the Plaintiffs to an injunction, nor does

automatically entit

the fact that Elbakyan's submission raises no mer
challenge to the Plaintiffs' claims.
Music, No.
2015).

13 Civ.

s-based

See Thurman v.

5194, 2015 WL 2 168134, at *4

Bun Bun
May 7,

(S. D. N. Y.

Instead, notwithstanding the default, the Plaintiffs

must present evidence sufficient to establish that they are
entitled to injunctive relief.
Curveal Fashion, No.
(S. D. N. Y.
Cir.

09 Civ.

Jan 20, 2010);

See id. ;

Inc.

v.

8458, 2010 WL 308303, at *2

CFTC v.

Vartuli, 228 F. 3d 94, 98

2000).

A. Likelihood of S

Gucci Am.,

ss on the
5

rits

(2d

, -

Elsevier has established that the Defendants have
reproduced and distributed its copyrighted works,
of the exclusive rights established by 17
Complaint,

Dkt. No. 1,

at 11-13.)

(1)

"two elements must be

ownership of a valid copyright,

and

(2)

copying of

constituent elements of the work that are original."
Records,

LLC v. Doe 3,

Feist Publ'ns,

See

U.S.C. § 106.

In order to prevail on a

claim for infringement of copyright,
proven:

in violation

604 F.3d 110,

117

Arista

(2d Cir. 2010)

Inc. v. Rural Tel. Serv. Co.,

499 U.S.

(quoting

340,

361

(1991) ) .
Elsevier has made a substantial evidentiary showing,
documenting the manner in which the Defendants access its
ScienceDirect database of scientific literature and post
copyrighted material on their own websites free of charge.
According to Elsevier,

the Defendants gain access to

ScienceDirect by using credentials fraudulently obtained from
educational institutions,

including educational institutions

located in the Southern District of New York,
legitimate access to ScienceDirect.
Woltermann

(the "Woltermann Dec.") ,

which are granted

(See Declaration of Anthony
Dkt. No. 8,

at 13-14.)

As

an attachment to one of the supporting declarations to this
motion,

Elsevier includes a sequence of screenshots showing how

a user could go to �ww.sc�-hub.org,
6

one of the Website

Defendants,

search for information on a scientific article,

a set of search results, click on a link,
copyrighted article on ScienceDirect,

get

and be redirected to a

via a proxy.

See

Elsevier also points to a

Walterman Dec. at 41-44 and Ex. U.)

Twitter post (in Russian) indicating that whenever an article is
downloaded via this method,
own servers.
1 2,

Ex.

B.)

the Defendants save a copy on their

(See Declaration of David M. Hirschberg,
As specific examples,

with their copyright registrations.
Dkt.

No. 9,

Exs. B-D.)

No.

Elsevier includes copies of

two of its articles accessed via the Defendants'

Doda,

Dkt.

websites,

along

(Declaration of Paul F.

This showing demonstrates a

likelihood of success on Elsevier' s copyright infringement
claims.
Elsevier also shows a likelihood of success on its claim
under the Computer Fraud and Abuse Act ("CFAA").
prohibits,

inter alia,

The CFAA

obtaining information from "any protected

computer" without authorization,

18 U.S. C. § 1030(a)(2)(C),

and

obtaining anything of value by accessing any protected computer
with intent to defraud.

Id.

§ (a) (4).

The definition of

"protected computer" includes one "which is used in or affecting
interstate or foreign commerce or communication,

including a

computer located outside the United States that

is used in a

manner that affects interstate or foreign commerce or
communication of the United States."
7

I .

§ (e) (2) (B);

Nexans

Wires S. A.
2006).

v.

Sa

Inc.

166 F.

App'x 559, 562 n. 5

(2d Cir.

Elsevier's ScienceDirect database is located on multiple

servers throughout the world and is accessed by educational
institutions and their students, and qualifies as a computer
used in interstate commerce, and therefore as a protected
computer under the CFAA.

See Woltermann Dec.

at 2-3. )

As

found above, Elsevier has shown that the Defendants' access to
ScienceDirect was unauthorized and accomplished via fraudulent
university credentials.

While the C fAA requires a civil

plaintiff to have suffered over $5,000 in damage or loss, see
Register. com, Inc.

v.

Verio, Inc. , 356 F. 3d 393, 439

(2d Cir.

2004), Elsevier has made the necessary showing since it
documented between 2,000 and 8,500 of its articles being added
to the LibGen database each day

(Woltermann Dec.

at 8, Exs.

G &

H) and because its articles carry purchase prices of between
$19. 95 and $41. 95 each.
Leon, No.

12 Civ.

Id.

at 2;

see Millennium TGA, Inc.

1360, 2013 WL 5719079, at *10

(E. D. N.Y.

v.

Oct.

18, 2013). 1
Elsevier's evidence is also buttressed by Elbakyan's
submission, in which she frankly admits to copyright
infringement.

1

(See Dkt.

No.

50.)

She discusses her time as a

While Elsevier's articles are likely sufficient on their own to qualify as

"[]thing[s]

of value" under the CFAA,

Elbakyan acknowledges in her submission

that the Defendants derive revenue from their website.
50,

at

1

{"That is true that website collects donations,

pressure anyone to send them.").)

8

Letter,

Dkt. No.

however we do not

student at a university in Kazakhstan, where she did not have
access to research papers and found the prices charged to be
just insane.
(Id.

at 1.)

She obtained the papers she needed

"by pirating them," and found may similar students and
researchers, predominantly in developing count

s, who were in

similar situations and helped each other illicitly obtain
research materials that they could not access legitimately or
afford on the open market.

Id.)

As Elbakyan describes it, "I

could obtain any paper by pirating it, so I solved many requests
and people always were very grateful for my help.

After that, I

created sci-hub.org website that simply makes this process
automatic and the website immediately became popular."

(Id.)

Given Elsevier's strong evidentiary showing and Elbakyan's
admissions, the first prong of the preliminary injunction test
is firmly established.

B. Irreparable Harm

Irreparable harm is present "where, but for the grant of
equitable relief, there is a substantial chance that upon final
resolution of the action the parties cannot be returned to the
positions they previously occupied."

Brenntag Int'l Chems.,

Inc. v. Bank of India, 175 F.3d 245, 249

(2d Cir. 1999).

Here,

there is irreparable harm because it is entirely likely that the
9

•'

damage to Elsevier could not be effectively quantified.
Register.com,

356 F.3d at 404

{"irreparable harm may be found

where damages are difficult to establish and measure.").
would be difficult,

if not impossible,

It

to determine how much

money the Plaintiffs have lost due to the availability of
thousands of their articles on the Defendant websites;

some

percentage of those articles would no doubt have been paid for
legitimately if they were not downloadable for free,

but there

appears to be no way of determining how many that would be.
There is also the matter of harm caused by "viral infringement, "
where Elsevier's content could be transmitted and retransmitted
by third parties who acquired it from the Defendants even after
the Defendants' websites were shut down.
Inc.,
275

765 F. Supp. 2d 594,

(2d Cir. 2012).

620

(S.D.N.Y.

See WPIX,
2011),

'to prove the loss of sales due to

infringement is .

notoriously difficult.'"

Colting,

81

607 F.3d 6 8,

(2d Cir. 2010)

Corp. v. Petri-Kine Camera Co.,
(Friendly,

aff'd 691 F.3d

"(C]ourts have tended to issue injunctions

in this context because

1971)

Inc. v. ivi,

Salinger v.

(quoting Omega Importing

451 F.2d 1190,

1195

(2d Cir.

J.)).

Additionally,

the harm done to the Plaintiffs is likely

irreparable because the scale of any money damages would
dramatically exceed Defendants' ability to pay.
F.3d at 249-50

Brenntag,

175

(explaining that even where money damages can be
10

quantified, there is irreparable harm when a defendant will be
unable to cover the damages).
Defendants'

It is highly likely that the

activities will be found to be willful - Elbakyan

herself refers to the websites'

activities as "pirating" (Dkt.

No. 50 at 1) - in which case they would be liable for between
$750 and $150,000 in statutory damages for each pirated work.
See 17 U.S.C.

§ 504(c);

HarperCollins Publishers LLC v. Open

Road Integrated Media, LLP, 58 F.
2014).

Supp. 3d 380, 38 7 (S.D.N.Y.

Since the Plaintiffs credibly allege that the Defendants

infringe an average of over 3,000 new articles each day
(Woltermann Deel. at 7), even if the Court were to award damages
at the lower end of the statutory range the Defendants'
liability could be extensive.

Since the Defendants are an

individual and a set of websites supported by voluntary
donations, the potential damages are likely to be far beyond the
Defendants'

ability to pay.

C. Balance of Hardships

The balance of hardships clearly tips in favor of the
Plaintiffs.

Elsevier has shown that it is likely to succeed on

the merits, and that it continues to suffer irreparable harm due
to the Defendants'
free.

making its copyrighted material available for

As for the Defendants, "it is axiomatic that an infringer
11

of copyright cannot complain about the loss of ability to offer
its infringing product."
omitted).

W PIX,

691 F.3d at 287 (quotation

The Defendants cannot be legally harmed by the fact

that they cannot continue to steal the Plaintiff' s content,

even

See id.

if they tried to do so for public-spirited reasons.

D. Public Interest

To the extent that Elbakyan mounts a legal challenge to the
motion for a preliminary injunction,
interest prong of the test.

it is on the public

In her letter to the Court,

notes that there are "lots of researchers .

she

. especially in

developing countries" who do not have access to key scientific
papers owned by Elsevier and similar organizations,

and who

cannot afford to pay the high fees that Elsevier charges.
No.

50,

at 1.)

Elbakyan states in her letter that Elsevier
operates by racket:
any papers.

(Dkt.

if you do not send money,

On my website,

as they want for free,

you will not read

any person can read as many papers

and sending donations is their free will.

Why Elsevier cannot work like this,

(Id.)

I wonder?
Elbakyan

also notes that researchers do not actually receive money in
exchange for granting Elsevier a copyright.

Id.)

Rather,

she

alleges they give Elsevier ownership of their works "because
Elsevier is an owner of so-called
12

'high-impact'

journals.

If a

researcher wants to be recognized,

make a career - he or she

needs to have publications in such journals.n

{ Id. at 1-2.)

Elbakyan notes that prominent researchers have made attempts to
boycott Elsevier and states that "[t]he general opinion in
research community is that research papers should be distributed
for free (open access),

not sold.

And practices of such

companies like Elsevier are unacceptable,
distribution of knowledge."

because they limit

ld. at 2.)

Elsevier contends that the public interest favors the
issuance of an injunction because doing so will "protect the
delicate ecosystem which supports scientific research
worldwide."

(Pl.'s Br.,

Dkt. No. 6,

at 21.)

It states that the

money it generates by selling access. to scientific research is
used to support new discoveries,
maintain a "de
discovery."

to create new journals,

and to

nitive and accurate record of scientif

( Id.)

It also argues that allowing its articles to

be widely distributed

sks the spread of bad science - while

Elsevier corrects and retracts articles whose conclusions are
later found to be flawed,

it has no way of doing so when the

content is taken out of its control.

Id. at 22.)

Lastly,

Elsevier argues that injunctive relief against the Defendants is
important to deter "cyber-crime," while

ling to issue an

injunction will incentivize pirates to continue to publish
copyrighted works.
13

It cannot be denied that there is a compelling public
interest in fostering scientific achievement, and that ensuring
broad access to scientific research is an important component of
that effort.

As the Second Circuit has noted, "[c]opyright law

inherently balances [] two competing public interests .

.

. the

rights of users and the public interest in broad accessibility
of creative works, and the rights of copyright owners and the
public interest in rewarding and incentivizing creative efforts
(the

'owner-user balance' )."

WPIX, 691 F.3d at 287 .

Elbakyan' s

solution to the problems she identifies, simply making
copyrighted content available for free via a foreign website,
disserves the public interest.

As the Plaintiffs have

established, there is a "delicate ecosystem which supports
scientific research worldwide,"

( Pl.' s Br., Dkt. No. 6 at 21),

and copyright law pays a critical function within that system.
"Inadequate protections for copyright owners can threaten the
very store of knowledge to be accessed; encouraging the
production of creative work thus ultimately serves the public' s
interest in promoting the accessibility of such works. "
691 F.3d at 287 .

W PIX,

The existence of Elsevier shows that

publication of scient ific research

generates substantial

economic value.
The public' s interest in the broad diffusion of scientific
knowledge is sustained by two critical exceptions in copyright
14

law.

First,

the "idea/expression dichotomy" ensures that while

a scientific article may be subject to copyright,

the ideas and

See 17 U. S.C. § 102(b)

insights within that article are not.

("In no case does copyright protection for an original work of
authorship extend to any idea,

procedure,

method of operation,

concept,

to this distinction,

every idea,

principle,

process,

system,

or discovery").

theory,

"Due

and fact in a

copyrighted work becomes instantly available for public
exploitation at the moment of publication."
537 U.S. 186,

219

(2003).

So while Elsevier may be able to keep

its actual articles behind a paywall,
them are fair game for anyone.
doctrine,

comment,

the discoveries within

Secondly,

codified at 17 U.S.C. § 107,

expressions,

as well as ideas,

news reporting,

Eldred v. Ashcroft,

the "fair use"

allows the public to use

nfor purposes such as criticism,

teaching .

.

.

scholarship,

or

research" without being liable for copyright infringement.

(emphasis added)

Under this doctrine,

themselves may be taken and used,
purposes,

Elsevier' s articles

bu.t only for legitimate

and not for wholesale infringement.

U.S. at 219.2

See Eldred,

537

The public interest in the broad dissemination and

use of scientific research is protected by the idea/expression
dichotomy and the fair use doctrine.

2

See Golan v. Holder,

The public interest in wide d1sseminat1on of scientific works

by the fact that copyrights are given only limited

464

15

U.S.

duration.

417, 431-32

132

is also served

See Sony Corp.

(1984).

S.

Ct. 873,

890 (2012);

Eldred,

537 U.S. at 219.

Given the

importance of scientific research and the critical role that
copyright plays in promoting it,

the public interest weighs in

favor of an injunction.

Conclusion

For the reasons set forth above,

It is hereby ordered that:

preliminary injunction is granted.

1. The Defendants,
agents,

their officers,

servants,

employees,

the motion for a

directors,

principals,

successors and assigns,

and

all persons and entities in active concert or participation
with them,

are hereby temporarily restrained from unlawful

access to,

use,

reproduction,

and/or distribution of

Elsevier's copyrighted works and from assisting,

aiding,

or

abetting any other person or business entity in engaging in
unlawful access to,

use,

reproduction,

and/or distribution

of Elsevier' s copyrighted works.
2. Upon the Plaintiffs'

request,

have registered Defendants'

those organizations which

domain names on behalf of

Defendants shall disclose immediately to the Plaintiffs all
information in their possession concerning the identity of
the operator or registrant of such domain names and of any
16

bank accounts or financial accounts owned or used by such
operator or registrant.
3. Defendants shall not transfer ownership of the Defendants'
websites during the pendency of this Action,

or until

further Order of the Court.
4. The TLD Registries for the Defendants'
administrators,

websites,

or their

shall place the domain names on

registryHold/serverHold as well as serverUpdate,
serverDelete,

and serverTransfer prohibited statuses,

until

further Order of the Court.
5. The Defendants shall preserve copies of all computer files
relating to the use of the websites and shall take all
necessary steps to retrieve computer files relating to the
use of the websites that may have been deleted before entry
of this Order.
6. That security in the amount of $ 5, 000 be posted by the
Plaintiffs within one week of the entry of this Order.
Fed.

R.

Civ.

P. 6 5(c).

17

See

It is so ordered.

New York,

fY
October ? ;--1

2015
R BERT W. SWEET

U.S.D.J.

18


Hamerman
Pirate Libraries and the Fight for Open Information
2015


| | SEPTEMBER 11TH, 2015 | A BI-WEEKLY WEBPAPER | ISSUE 61

|
---|---|---|---|---
PIRATE LIBRARIES and the fight for open information
/ by _Sarah Hamerman_ |

In a digital era that destabilizes traditional notions of intellectual
property, cultural producers must rethink information access.

Over the last several years, a number of _pirate libraries_ have done just
that. Collaboratively run digital libraries such as
[_Aaaaaarg_](http://aaaaarg.fail/),
_[Monoskop](http://www.monoskop.org/Monoskop)_ , _[Public
Library](https://www.memoryoftheworld.org/)_ , and
_[UbuWeb_](http://www.ubuweb.tv/) have emerged, offering access to humanities
texts and audiovisual resources that are technically ‘pirated’ and often hard
to find elsewhere.

Though these sites differ somewhat in content, architecture, and ideological
bent, all of them disavow intellectual copyright law to varying degrees,
offering up pirated books and media with the aim of advancing information
access.

“Information wants to be free,” has served as a catchphrase in recent internet
activism, calling for information democracy, led by media, library and
information advocates.

As online information access is increasingly embedded within the networks of
capital, the digital text-sharing underground actualizes the Internet’s
potential to build a true information commons.

With such projects, the archive becomes a record of collective power, not
corporate or state power; the digital book becomes unlocked, linkable, and
shareable.

Still, these sites comprise but a small subset of the networks of peer-to-peer
file sharing. Many legal battles waged over the explosion of audiovisual file
sharing through p2p services such as Napster, BitTorrent and MediaFire. At its
peak, Napster boasted over 80 million users; the p2p music-sharing service was
shut down after a high-profile lawsuit by the RIAA in 2001.

The US Department of Justice brought charges against open access activist
_[Aaron Swartz](http://www.fvckthemedia.com/issue51/editorial)_ in 2011 for
his large-scale unauthorized downloading of files from the JStor Academic
database. Swartz, who sadly committed suicide before his trial, was an
organizer for Demand Progress, a campaign against the Stop Online Piracy Act,
which was defeated in 2012. Swartz’s actions and the fight around SOPA
represent a benchmark in the struggle for open-access and anti-copyright
practices surrounding the digital book.

Aaaaaarg, Monoskop, UbuWeb and Public Library are representative cases of the
pirate library because of their explicit engagement with archival form, their
embrace of ideas of the _[digital commons](https://en.wikipedia.org/wiki/Digital_Commons)_ within current left-leaning thought, and their like-minded focus on critical theory and the arts.

All of these projects lend themselves to be considered _as libraries_ ,
retooled for open digital networks.

_Aaaaaarg.org_ , started by Los Angeles based artist Sean Dockray, hosts
full-text pdfs of over 50,000 books and articles. The library is connected to a an
alternative education project called the Public School, which serves as a
platform for self-organizing lectures, workshops and projects in cities across
the globe. _Aaaaaarg_ ’s catalog is viewable by the public, but
upload/download privileges are restricted through an invite system, thus
circumventing copyright law.

![](http://i.imgur.com/rbdvPIG.png)

The site is divided into a “Library,” in which users can search for texts by
author; “Collections,” or user-generated grouping of texts designed for
reading groups or research interests; and “Discussions,” a message board where
participants can request texts and volunteer for working groups. Most
recently, _Aaaaaarg_ has introduced a “compiler” tool that allows readers to
select excerpts from longer texts and assemble them into new PDFs, and a
reading tool that allows readers to save reference points and insert comments
into texts. Though the library is easily searchable, it doesn’t maintain
high-quality _[metadata](https://en.wikipedia.org/wiki/Metadata)_. Dockray and
other organizers intend to preserve a certain subjective and informal quality,
focusing more on discussion and collaboration than correct preservation and
classification practice.

_Aaaaaarg_ has been threatened with takedowns a few times, but has survived by
creating mirrored sites and reconstituted itself by varying the number of A’s
in the URL. Its shifts in location, organization, and capabilities reflect
both the decentralized, ad-hoc nature of its maintenance and the organizers’
attempts to elude copyright regulations. Text-sharing sites such as _Aaaaaarg_
have also been referred to as _[shadow
libraries_](http://supercommunity.e-flux.com/texts/sharing-instinct/),
reflecting their quasi-covert status and their efforts to evade shutdown.

Monoskop.org, a project founded by media artist _[Dušan
Barok](http://monoskop.org/Du%C5%A1an_Barok)_ , is a wiki for collaborative
studies of art, media and the humanities that was born in 2004 out of Barok’s
study of media art and related cultural practices. Its significant holdings -
about 3,000 full-length texts and many more excerpts, links and citations -
include avant-garde and modernist magazines, writings on sound art, scanned
illustrations, and media theory texts.

As a wiki, any user can edit any article or upload content, and see their
changes reflected immediately. Monoskop is comprised of two sister sites: the
Monoskop wiki and Monoskop Log, the accompanying text repository. Monoskop Log
is structured as a Wordpress site with links hosted on third-party sites, much
like the rare-music download blogs that became popular in the mid-2000s.
Though this architecture is relatively unstable, links are fixed on-demand and
site mirroring and redundancy balance out some of the instability.

Monoskop makes clear that it is offering content under the fair-use doctrine
and that this content is for personal and scholarly use, not commercial use.
Barok notes that though there have been a small number of takedowns, people
generally appreciate unrestricted access to the types of materials in Monoskop
log, whether they are authors or publishers.

_Public Library_ , a somewhat newer pirate library founded by Croatian
Internet activist and researcher Marcell Mars and his collaborators, currently
offers a collection of about 6,300 texts. The project frames itself through a
utopian philosophy of building a truly universal library, radically extending
enlightenment-era conceptions of democracy. Through democratizing the _tools
of librarianship_ – book scanning, classification systems, cataloging,
information – it promises a broader, de-institutionalized public library.

In __[Public Library: An
Essay](https://www.memoryoftheworld.org/blog/2014/10/27/public-library-an-essay/#sdendnote19sym)__ , Public Library’s organizers frame p2p libraries as
“fragile knowledge infrastructures built and maintained by brave librarians
practicing civil disobedience which the world of researchers in the humanities
rely on.” This civil disobedience is a politically motivated refutation of
intellectual property law and the orientation of information networks toward
venture capital and advertising. While the pirate libraries fulfill this
dissident function as a kind of experimental provocation, their content is
audience-specific rather than universal.

_[UbuWeb](http://www.ubuweb.com/resources/index.html)_ , founded in 1996 by
conceptual artist/ writer Kenneth Goldsmith, is the largest online archive of
avant-garde art resources. Its holdings include sound, video and text-based
works dating from the historical avant-garde era to today. While many of the
sites in the “pirate library” continuum source their content through
community-based or peer-to-peer models, UbuWeb focuses on making available out
of print, obscure or difficult to access artistic media, stating that
uploading such historical artifacts doesn’t detract from the physical value of
the work; rather, it enhances it. The website’s philosophy blends the utopian
ideals of avant-garde concrete poetry with the ideals of the digital gift
economy, and it has specifically refused to accept corporate or foundation
funding or adopt a more market-oriented business model.

![](http://i.imgur.com/pHdiL9S.png)

**Pirate Libraries vs. “The Sharing Economy”**

In pirate libraries, information users become archive builders by uploading
often-copyrighted content to shared networks.

Within the so-called “ _[sharing
economy](https://en.wikipedia.org/wiki/Sharing_economy)_ ,” users essentially
lease e-book content from information corporations such as Amazon, which
markets both the Kindle as platform. This centralization of intellectual
property has dire impacts on the openness of the digital book as a
collaborative knowledge-sharing device.

In contrast, the pirate library actualizes a gift economy based on qualitative
and communal rather than monetized exchange. As Mackenzie Wark writes in _A
Hacker Manifesto_ (2004), “The gift is marginal, but nevertheless plays a
vital role in cementing reciprocal and communal relations among people who
otherwise can only confront each other as buyers and sellers of commodities.”

From theorizing new media art to building solidarity against repressive
regimes, such communal information networks can crucially articulate shared
bodies of political and aesthetic desire and meaning. According to author
Matthew Stadler, literature is by nature communal. “Literature is not owned,”
he writes. “It is, by definition, a space of mutually negotiated meanings that
never closes or concludes, a space that thrives on — indeed requires — open
access and sharing.”

In a roundtable discussion published in _New Formations_ , _Aaaaaarg_ founder
Sean Dockray remarks that the site “actively explored and exploited the
affordances of asynchronous, networked communication,” functioning upon the
logic of the hack. Dockray continues: “But all of this is rather commonplace
for what’s called ‘piracy,’ isn’t it?” Pirate librarianship can be thought of
as a practice of civil disobedience within the stringent information
environment of today.

These projects promise both the realization and destruction of the public
library. They promote information democracy while calling the _professional_
institution of the Library into question, allowing amateurs to upload,
catalog, lend and maintain collections. In _Public Library: An Essay_ , Public
Library’s organizers _[write](https://www.memoryoftheworld.org/blog/2014/10/27
/public-library-an-essay/)_ : “With the emergence of the internet…
librarianship has been given an opportunity… to include thousands of amateur
librarians who will, together with the experts, build a distributed peer-to-peer network to care for the catalog of available knowledge.”

Public Library frames amateur librarianship as a free, collaboratively
maintained and democratic activity, drawing upon the language of the French
Revolution and extending it for the 21st century. While these practices are
democratic in form, they are not necessarily democratic in the populist sense;
rather, they focus on bringing high theoretical discourses to people outside
the academy. Accordingly, they attract a modest but engaged audience of
critics, artists, designers, activists, and scholars.

The activities of Aaaaaarg and Public Library may fall closer to ‘ _[peer
preservation](http://computationalculture.net/article/book-piracy-as-peer-preservation)_ ’
than ‘peer production,’ as the desires to share information
widely and to preserve these collections against shutdown often come into
conflict. In a _[recent piece](http://supercommunity.e-flux.com/texts/sharing-instinct/)_ for e-flux coauthored with Lawrence Liang, Dockray accordingly
laments “the unfortunate fact that digital shadow libraries have to operate
somewhat below the radar: it introduces a precariousness that doesn’t allow
imagination to really expand, as it becomes stuck on techniques of evasion,
distribution, and redundancy.”

![](http://i.imgur.com/KFe3chu.png)

UbuWeb and Monoskop, which digitize rare, out-of-print art texts and media
rather than in-print titles, can be said to fulfill the aims of preservation
and access. UbuWeb and Monoskop are openly used and discussed as classroom
resources and in online arts journalism more frequently than the more
aggressively anti-copyright sources; more on-the-record and mainstream
visibility likely -- but doesn’t necessarily -- equate to wider usage.

**From Alternative Space to Alternative Media**

Aaaaaarg _[locates itself as a
‘scaffolding’](http://chtodelat.org/b9-texts-2/vilensky/materialities-of-independent-publishing-a-conversation-with-aaaaarg-chto-delat-i-cite-mute-and-neural/)_ between institutions, a platform that unfolds between institutional
gaps and fills them in, rather than directly opposing them. Over ten years
after it was founded, it continues to provide a community for “niche”
varieties of political critique.

Drawing upon different strains of ‘alternative networking,’ the digital
text-sharing underground gives a voice to those quieted by the mechanisms of
institutional archives, publishing, and galleries. On the one hand, pirate
libraries extend the logic of alternative art spaces/artist-run spaces that
challenge the “white cube” and the art market; instead, they showcase ways of
making that are often ephemeral, performative, and anti-commercial.

Lawrence Liang refers to projects such as Aaaaaarg as “ _[ludic
libraries](http://supercommunity.e-flux.com/texts/sharing-instinct/)_ ,” as
they encourage a sense of intellectual play that deviates from well-
established norms of utility, seriousness, purpose, and property.

Just as alternative, community-oriented art spaces promote “fringe” art forms,
the pirate libraries build upon open digital architectures to promote “fringe”
scholarship, art, technological and archival practices. Though the comparison
between physical architecture and virtual architecture is a metaphor here, the
impact upon creative communities runs parallel.

At the same time, the digital text-sharing underground builds upon Robert W.
McChesney’s calls in _Digital Disconnect_ for a democratic media system that
promotes the expansion of public, student and community journalism. A truly
heterogeneous media system, for McChesney, would promote a multiplicity of
opinions, supplementing for-profit mass media with a substantial and varied
portion of nonprofit and independent media.

In order to create a political system – and a media system – that reflects
multiple interests, rather than the supposedly neutral status quo, we must
support truly free, not-for-profit alternatives to corporate journalism and
“clickbait” media designed to lure traffic for advertisers. We must support
creative platforms that encourage blending high-academic language with pop-
culture; quantitative analysis with art-making; appropriation with
authenticity: the pirate libraries serve just these purposes.

Pirate libraries help bring about what Gary Hall calls the “unbound book” as
text-form; as he writes, we can perceive such a digital book “as liquid and
living, open to being continually updated and collaboratively written, edited,
annotated, critiqued, updated, shared, supplemented, revised, re-ordered,
reiterated and reimagined.” These projects allow us to re-imagine both
archival practices and the digital book for social networks based on the gift.

Aaaaaarg, Monoskop, UbuWeb, and Public Library build a record of critical and
artistic discourse that is held in common, user-responsive and networkable.
Amateur librarians sustain these projects through technological ‘hacks’ that
innovate upon present archival tools and push digital preservation practices
forward.

Pirate libraries critique the ivory tower’s monopoly over the digital book.
They posit a space where alternative communities can flourish.

Between the cracks of the new information capital, the digital text-sharing
underground fosters the coming-into-being of another kind of information
society, one in which the historical record is the democratically-shared basis
for new forms of knowledge.

From this we should take away the understanding that _piracy is normal_ and
the public domain it builds is abundant. While these practices will continue
just beneath the official surface of the information economy, it is high time
for us to demand that our legal structures catch up.


Dockray
Interface Access Loss
2013


Interface Access Loss

I want to begin this talk at the end -- by which I mean the end of property - at least according to
the cyber-utopian account of things, where digital file sharing and online communication liberate
culture from corporations and their drive for profit. This is just one of the promised forms of
emancipation -- property, in a sense, was undone. People, on a massive scale, used their
computers and their internet connections to share digitized versions of their objects with each
other, quickly producing a different, common form of ownership. The crisis that this provoked is
well-known -- it could be described in one word: Napster. What is less recognized - because it is
still very much in process - is the subsequent undoing of property, of both the private and common
kind. What follows is one story of "the cloud" -- the post-dot-com bubble techno-super-entity -which sucks up property, labor, and free time.

Object, Interface

It's debated whether the growing automation of production leads to global structural
unemployment or not -- Karl Marx wrote that "the self-expansion of capital by means of machinery
is thenceforward directly proportional to the number of the workpeople, whose means of
livelihood have been destroyed by that machinery" - but the promise is, of course, that when
robots do the work, we humans are free to be creative. Karl Kautsky predicted that increasing
automation would actually lead, not to a mass surplus population or widespread creativity, but
something much more mundane: the growth of clerks and bookkeepers, and the expansion of
unproductive sectors like "the banking system, the credit system, insurance empires and
advertising."

Marx was analyzing the number of people employed by some of the new industries in the middle
of the 19th century: "gas-works, telegraphy, photography, steam navigation, and railways." The
facts were that these industries were incredibly important, expansive and growing, highly
mechanized.. and employed a very small number of people. It is difficult not to read his study of
these technologies of connection and communication - against the background of our present
moment, in which the rise of the Internet has been accompanied by the deindustrialization of
cities, increased migrant and mobile labor, and jobs made obsolete by computation.

There are obvious examples of the impact of computation on the workplace: at factories and
distribution centers, robots engineered with computer-vision can replace a handful of workers,
with a savings of millions of dollars per robot over the life of the system. And there are less
apparent examples as well, like algorithms determining when and where to hire people and for
how long, according to fluctuating conditions.
Both examples have parallels within computer programming, namely reuse and garbage
collection. Code reuse refers to the practice of writing software in such a way that the code can be
used again later, in another program, to perform the same task. It is considered wasteful to give the
same time, attention, and energy to a function, because the development environment is not an
assembly line - a programmer shouldn't repeat. Such repetition then gives way to copy-andpasting (or merely calling). The analogy here is to the robot, to the replacement of human labor
with technology.

Now, when a program is in the midst of being executed, the computer's memory fills with data -but some of that is obsolete, no longer necessary for that program to run. If left alone, the memory
would become clogged, the program would crash, the computer might crash. It is the role of the
garbage collector to free up memory, deleting what is no longer in use. And here, I'm making the
analogy with flexible labor, workers being made redundant, and so on.

In Object-Oriented Programming, a programmer designs the software that she is writing around
“objects,” where each object is conceptually divided into “public” and “private” parts. The public
parts are accessible to other objects, but the private ones are hidden to the world outside the
boundaries of that object. It's a “black box” - a thing that can be known through its inputs and
outputs - even in total ignorance of its internal mechanisms. What difference does it make if the
code is written in one way versus an other .. if it behaves the same? As William James wrote, “If no
practical difference whatever can be traced, then the alternatives mean practically the same thing,
and all dispute is idle.”

By merely having a public interface, an object is already a social entity. It makes no sense to even
provide access to the outside if there are no potential objects with which to interact! So to

understand the object-oriented program, we must scale up - not by increasing the size or
complexity of the object, but instead by increasing the number and types of objects such that their
relations become more dense. The result is an intricate machine with an on and an off state, rather
than a beginning and an end. Its parts are interchangeable -- provided that they reliably produce
the same behavior, the same inputs and outputs. Furthermore, this machine can be modified:
objects can be added and removed, changing but not destroying the machine; and it might be,
using Gerald Raunig’s appropriate term, “concatenated” with other machines.

Inevitably, this paradigm for describing the relationship between software objects spread outwards,
subsuming more of the universe outside of the immediate code. External programs, powerful
computers, banking institutions, people, and satellites have all been “encapsulated” and
“abstracted” into objects with inputs and outputs. Is this a conceptual reduction of the richness
and complexity of reality? Yes, but only partially. It is also a real description of how people,
institutions, software, and things are being brought into relationship with one another according to
the demands of networked computation.. and the expanding field of objects are exactly those
entities integrated into such a network.

Consider a simple example of decentralized file-sharing: its diagram might represent an objectoriented piece of software, but here each object is a person-computer, shown in potential relation
to every other person-computer. Files might be sent or received at any point in this machine,
which seems particularly oriented towards circulation and movement. Much remains private, but a
collection of files from every person is made public and opened up to the network. Taken as a
whole, the entire collection of all files - which on the one hand exceeds the storage capacity of
any one person’s technical hardware, is on the other hand entirely available to every personcomputer. If the files were books.. then this collective collection would be a public library.

In order for a system like this to work, for the inputs and the outputs to actually engage with one
another to produce action or transmit data, there needs to be something in place already to enable
meaningful couplings. Before there is any interaction or any relationship, there must be some
common ground in place that allows heterogenous objects to ‘talk to each other’ (to use a phrase
from the business casual language of the Californian Ideology). The term used for such a common
ground - especially on the Internet - is platform, a word for that which enables and anticipates

future action without directly producing it. A platform provides tools and resources to the objects
that run “on top” of the platform so that those objects don't need to have their own tools and
resources. In this sense, the platform offers itself as a way for objects to externalize (and reuse)
labor. Communication between objects is one of the most significant actions that a platform can
provide, but it requires that the objects conform some amount of their inputs and outputs to the
specifications dictated by the platform.

But haven’t I only introduced another coupling, instead of between two objects, this time between
the object and the platform? What I'm talking about with "couplings" is the meeting point between
things - in other words, an “interface.” In the terms of OOP, the interface is an abstraction that
defines what kinds of interaction are possible with an object. It maps out the public face of the
object in a way that is legible and accessible to other objects. Similarly, computer interfaces like
screens and keyboards are designed to meet with human interfaces like fingers and eyes, allowing
for a specific form of interaction between person and machine. Any coupling between objects
passes through some interface and every interface obscures as much as it reveals - it establishes
the boundary between what is public and what is private, what is visible and what is not. The
dominant aesthetic values of user interface design actually privilege such concealment as “good
design,” appealing to principles of simplicity, cleanliness, and clarity.
Cloud, Access

One practical outcome of this has been that there can be tectonic shifts behind the interface where entire systems are restructured or revolutionized - without any interruption, as long as the
interface itself remains essentially unchanged. In Pragmatism’s terms, a successful interface keeps
any difference (in back) from making a difference (in front). Using books again as an example: for
consumers to become accustomed to the initial discomfort of purchasing a product online instead
of from a shop, the interface needs to make it so that “buying a book” is something that could be
interchangeably accomplished either by a traditional bookstore or the online "marketplace"
equivalent. But behind the interface is Amazon, which through low prices and wide selection is
the most visible platform for buying books and uses that position to push retailers and publishers
both to, at best, the bare minimum of profitability.

In addition to selling things to people and collecting data about its users (what they look at and
what they buy) to personalize product recommendations, Amazon has also made an effort to be a
platform for the technical and logistical parts of other retailers. Ultimately collecting data from
them as well, Amazon realizes a competitive advantage from having a comprehensive, up-to-theminute perspective on market trends and inventories. This volume of data is so vast and valuable
that warehouses packed with computers are constructed to store it, protect it, and make it readily
available to algorithms. Data centers, such as these, organize how commodities circulate (they run
business applications, store data about retail, manage fulfillment) but also - increasingly - they
hold the commodity itself - for example, the book. Digital book sales started the millennium very
slowly but by 2010 had overtaken hardcover sales.

Amazon’s store of digital books (or Apple’s or Google’s, for that matter) is a distorted reflection of
the collection circulating within the file-sharing network, displaced from personal computers to
corporate data centers. Here are two regimes of digital property: the swarm and the cloud. For
swarms (a reference to swarm downloading where a single file can be downloaded in parallel
from multiple sources) property is held in common between peers -- however, property is
positioned out of reach, on the cloud, accessible only through an interface that has absorbed legal
and business requirements.

It's just half of the story, however, to associate the cloud with mammoth data centers; the other
half is to be found in our hands and laps. Thin computing, including tablets and e-readers, iPads
and Kindles, and mobile phones have co-evolved with data centers, offering powerful, lightweight
computing precisely because so much processing and storage has been externalized.

In this technical configuration of the cloud, the thin computer and the fat data center meet through
an interface, inevitably clean and simple, that manages access to the remote resources. Typically,
a person needs to agree to certain “terms of service,” have a unique, measurable account, and
provide payment information; in return, access is granted. This access is not ownership in the
conventional sense of a book, or even the digital sense of a file, but rather a license that gives the
person a “non-exclusive right to keep a permanent copy… solely for your personal and noncommercial use,” contradicting the First Sale Doctrine, which gives the “owner” the right to sell,
lease, or rent their copy to anyone they choose at any price they choose. The doctrine,

established within America's legal system in 1908, separated the rights of reproduction, from
distribution, as a way to "exhaust" the copyright holder's control over the commodities that people
purchased.. legitimizing institutions like used book stores and public libraries. Computer software
famously attempted to bypass the First Sale Doctrine with its "shrink wrap" licenses that restricted
the rights of the buyer once she broke through the plastic packaging to open the product. This
practice has only evolved and become ubiquitous over the last three decades as software began
being distributed digitally through networks rather than as physical objects in stores. Such
contradictions are symptoms of the shift in property regimes, or what Jeremy Rifkin called “the age
of access.” He writes that “property continues to exist but is far less likely to be exchanged in
markets. Instead, suppliers hold on to property in the new economy and lease, rent, or charge an
admission fee, subscription, or membership dues for its short-term use.”

Thinking again of books, Rifkin’s description gives the image of a paid library emerging as the
synthesis of the public library and the marketplace for commodity exchange. Considering how, on
the one side, traditional public libraries are having their collections deaccessioned, hours of
operation cut, and are in some cases being closed down entirely, and on the other side, the
traditional publishing industry finds its stores, books, and profits dematerialized, the image is
perhaps appropriate. Server racks, in photographs inside data centers, strike an eerie resemblance
to library stacks - - while e-readers are consciously designed to look and feel something like a
book. Yet, when one peers down into the screen of the device, one sees both the book - and the
library.

Like a Facebook account, which must uniquely correspond to a real person, the e-reader is an
individualizing device. It is the object that establishes trusted access with books stored in the cloud
and ensures that each and every person purchases their own rights to read each book. The only
transfer that is allowed is of the device itself, which is the thing that a person actually does own.
But even then, such an act must be reported back to the cloud: the hardware needs to be deregistered and then re-registered with credit card and authentication details about the new owner.

This is no library - or it's only a library in the most impoverished sense of the word. It is a new
enclosure, and it is a familiar story: things in the world (from letters, to photographs, to albums, to
books) are digitized (as emails, JPEGs, MP3s, and PDFs) and subsequently migrate to a remote

location or service (Gmail, Facebook, iTunes, Kindle Store). The middle phase is the biggest
disruption, when the interface does the poorest job concealing the material transformations taking
place, when the work involved in creating those transformations is most apparent, often because
the person themselves is deeply involved in the process (of ripping vinyl, for instance). In the third
phase, the user interface becomes easier, more “frictionless,” and what appears to be just another
application or folder on one’s computer is an engorged, property-and-energy-hungry warehouse a
thousand miles away.

Capture, Loss

Intellectual property's enclosure is easy enough to imagine in warehouses of remote, secure hard
drives. But the cloud internalizes processing as well as storage, capturing the new forms of cooperation and collaboration characterizing the new economy and its immaterial labor. Social
relations are transmuted into database relations on the "social web," which absorbs selforganization as well. Because of this, the cloud impacts as strongly on the production of
publications, as on their consumption, in the tradition sense.

Storage, applications, and services offered in the cloud are marketed for consumption by authors
and publishers alike. Document editing, project management, and accounting are peeled slowly
away from the office staff and personal computers into the data centers; interfaces are established
into various publication channels from print on demand to digital book platforms. In the fully
realized vision of cloud publishing, the entire technical and logistical apparatus is externalized,
leaving only the human labor.. and their thin devices remaining. Little distinguishes the authorobject from the editor-object from the reader-object. All of them.. maintain their position in the
network by paying for lightweight computers and their updates, cloud services, and broadband
internet connections.
On the production side of the book, the promise of the cloud is a recovery of the profits “lost” to
file-sharing, as all that exchange is disciplined, standardized and measured. Consumers are finally
promised the access to the history of human knowledge that they had already improvised by
themselves, but now without the omnipresent threat of legal prosecution. One has the sneaking
suspicion though.. that such a compromise is as hollow.. as the promises to a desperate city of the

jobs that will be created in a new constructed data center - - and that pitting “food on the table”
against “access to knowledge” is both a distraction from and a legitimation of the forms of power
emerging in the cloud. It's a distraction because it's by policing access to knowledge that the
middle-man platform can extract value from publication, both on the writing and reading sides of
the book; and it's a legitimation because the platform poses itself as the only entity that can resolve
the contradiction between the two sides.

When the platform recedes behind the interface, these two sides are the the most visible
antagonism - in a tug-of-war with each other - - yet neither the “producers” nor the “consumers” of
publications are becoming more wealthy, or working less to survive. If we turn the picture
sideways, however, a new contradiction emerges, between the indebted, living labor - of authors,
editors, translators, and readers - on one side, and on the other.. data centers, semiconductors,
mobile technology, expropriated software, power companies, and intellectual property.
The talk in the data center industry of the “industrialization” of the cloud refers to the scientific
approach to improving design, efficiency, and performance. But the term also recalls the basic
narrative of the Industrial Revolution: the movement from home-based manufacturing by hand to
large-scale production in factories. As desktop computers pass into obsolescence, we shift from a
networked, but small-scale, relationship to computation (think of “home publishing”) to a
reorganized form of production that puts the accumulated energy of millions to work through
these cloud companies and their modernized data centers.

What kind of buildings are these blank superstructures? Factories for the 21st century? An engineer
named Ken Patchett described the Facebook data center that way in a television interview, “This is
a factory. It’s just a different kind of factory than you might be used to.” Those factories that we’re
“used to,” continue to exist (at Foxconn, for instance) producing the infrastructure, under
recognizably exploitative conditions, for a “different kind of factory,” - a factory that extends far
beyond the walls of the data center.

But the idea of the factory is only part of the picture - this building is also a mine.. and the
dispersed workforce devote most of their waking hours to mining-in-reverse, packing it full of data,
under the expectation that someone - soon - will figure out how to pull out something valuable.

Both metaphors rely on the image of a mass of workers (dispersed as it may be) and leave a darker
and more difficult possibility: the data center is like the hydroelectric plant, damming up property,
sociality, creativity and knowledge, while engineers and financiers look for the algorithms to
release the accumulated cultural and social resources on demand, as profit.

This returns us to the interface, site of the struggles over the management and control of access to
property and infrastructure. Previously, these struggles were situated within the computer-object
and the implied freedom provided by its computation, storage, and possibilities for connection
with others. Now, however, the eviscerated device is more interface than object, and it is exactly
here at the interface that the new technological enclosures have taken form (for example, see
Apple's iOS products, Google's search box, and Amazon's "marketplace"). Control over the
interface is guaranteed by control over the entire techno-business stack: the distributed hardware
devices, centralized data centers, and the software that mediates the space between. Every major
technology corporation must now operate on all levels to protect against any loss.

There is a centripetal force to the cloud and this essay has been written in its irresistible pull. In
spite of the sheer mass of capital that is organized to produce this gravity and the seeming
insurmountability of it all, there is no chance that the system will absolutely manage and control
the noise within it. Riots break out on the factory floor; algorithmic trading wreaks havoc on the
stock market in an instant; data centers go offline; 100 million Facebook accounts are discovered
to be fake; the list will go on. These cracks in the interface don't point to any possible future, or
any desirable one, but they do draw attention to openings that might circumvent the logic of
access.

"What happens from there is another question." This is where I left things off in the text when I
finished it a year ago. It's a disappointing ending: we just have to invent ways of occupying the
destruction, violence and collapse that emerge out of economic inequality, global warming,
dismantled social welfare, and so on. And there's not much that's happened since then to make us
very optimistic - maybe here I only have to mention the NSA. But as I began with an ending, I
really should end at a beginning.
I think we were obliged to adopt a negative, critical position in response the cyber-utopianism of

the last almost 20 years, whether in its naive or cynical forms. We had to identify and theorize the
darker side of things. But it can become habitual, and when the dark side materializes, as it has
over the past few years - so that everyone knows the truth - then the obligation flips around,
doesn't it? To break out of habitual criticism as the tacit, defeated acceptance of what is. But, what
could be? Where do we find new political imaginaries? Not to ask what is the bright side, or what
can we do to cope, but what are the genuinely emancipatory possibilities that are somehow still
latent, buried under the present - or emerging within those ruptures in it? - - - I can't make it all
the way to a happy ending, to a happy beginning, but at least it's a beginning and not the end.

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.