Source
Automatically imported from: https://pages.gseis.ucla.edu/faculty/agre/notes/00-5-13.html
Content
``` Further notes on Microsoft's irresponsibility, design spaces, eBay, systems analysis courses, and the new jargon, plus recommendations and yet another high-quality batch of URL's. This message is even more indebted than usual to the excellent RRE readers who send me stuff, and I again ask everyone to send me good stuff for the list.
In response to my notes on the slippery language Microsoft has used to evade responsibility for the security problems that were exploited by the most recent e-mail virus, RRE readers sent me a slew of additional quotes from Microsoft personnel, including some that are astounding.
We can begin with another example of defocusing: redefining the issue by eliding certain elements of critics' arguments:
"The issue here isn't scripting. It's the social phenomenon of virus writing. That virus could have been written as an executable or on any platform or in a nonscripting language. Just because this virus was written in a scripting language, and we happen to support scripting in our operating system, doesn't make it a security issue."
http://news.cnet.com/news/0-1003-200-1823167.html
Read this passage closely. Leave aside the question -- hard to even discuss because it is so conveniently vague -- of whether "that virus" could possibly have been written in another language or even on another platform and still been the same virus. The problematic part starts with "Just because ...". It's conceivable that someone, somewhere has argued that the problem is the simple existence of scripting languages. That person would be a convenient foil, but would hardly represent the mainstream of critical opinion. The problem, as everyone knows, is not scripting languages, but email clients that can execute attachments that contain scripts that can perform a wide variety of potentially damaging actions. Blaming "the social phenomenon of virus writing" is not reasonable. A product that can be subverted by a random college student to cause massive worldwide damage is not secure. That's what "secure" means.
Given the scope of the recent disaster, some people were surprised to find the following text in a Microsoft "knowledge base" page entitled "General Information About Using VBScript with Outlook":
VBScript is designed to be a secure programming environment. It lacks various commands that can be potentially damaging if used in a malicious manner. This added security is critical in enterprise solutions.
http://support.microsoft.com/support/kb/articles/Q167/1/38.ASP
(In case the page changes, I copied and pasted above passage on the evening of 5/8/00.)
Rereading the passage I've quoted, one notices that no claim is made that VBScript includes no commands that can cause damage -- only that "various commands" are not included -- and likewise that no claim is made that VBScript under Outlook is secure -- it only has "added security". It sounded good when I read it the first time, though.
Or consider the following passages from a message from Microsoft, dated 5/8/00 and entitled "Special Edition -- Office News Service -- Virus Alert":
Last week a new virus began circulating through e-mail that has the potential to affect a wide range of e-mail users including those users running Microsoft Outlook. If run, the virus could overwrite .jpg, .mp3 and other file types, and attempt to send a copy of itself to everyone in the recipient's address book.
The language here attempts to break any mental association between the virus vulnerability and Outlook. The virus, we are told, "has the potential to affect a wide range of e-mail users including those users running Microsoft Outlook". A hurried reader would take away the impression that the problem is not Outlook-specific. But two seconds' thought will raise doubts. First, the virus will only work on a machine that can execute Visual Basic scripts. That narrows it down quickly to a small range of Microsoft platforms. One might ask, do other Microsoft mailers execute Visual Basic scripts in attachments? But that's not what the passage says. It says only that the virus "has the potential to affect a wide range of e-mail users". Someone who uses a Windows 98 mail client besides Outlook could for whatever reason save the attached VBS file and then specifically execute it from the desktop. This could "affect" the user's machine (damaged files, modified startup, reset Explorer homepage), but it wouldn't propagate the virus because the propagation mechanism relies on the Outlook address book. This particular claim turns out to be correct, but you have to read it carefully.
At least the passages I have quoted so far are just evasive. Some of Microsoft's statements have been outright false. Here is a later passage in the same text:
1) Customers can avoid being affected by this and other viruses by following standard best practices: ++ Never run an executable from someone you don't know. ++ Always have a good-quality virus scanner. ++ Always keep the virus scanner's signature files up to date.
This is just not true. The messages that contained this virus were from people who had you in their address books; they are therefore likely to be people that you know. The suggested policy of not opening attachments (now called "running executables" -- even though the idea that opening an attachment is running an executable will be counterintuitive for most normal users) from people you don't know will not prevent this virus from spreading. Nor will the other suggested policies prevent the virus: the best widely used virus scanners (for some weird reason) do not stop this sort of virus without it being included in a signature file, and the signature files in this case (as in other cases) were not updated until the virus had already spread far and wide. It is little wonder, then, that the same Microsoft message included the following disclaimer:
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND. The user assumes the entire risk as to the accuracy and the use of this document.
The following astonishing passage is from an online column about Microsoft's irresponsibility by Hiawatha Bray of the Boston Globe.
When I raised the issue with Microsoft spokesman Adam Sohn last week, he described his idea of how companies could improve the security of Outlook. "They should commence by beating their employees", Sohn declared.
He chuckled to signify that he was kidding -- but only about the floggings. Sohn was dead serious about Microsoft's utter lack of responsibility for the Love Bug fiasco. Instead, he blamed the silly computer users who go opening e-mail attachments. "People shouldn't open them", said Sohn. "That's the problem."
http://www.digitalmass.com/columns/software/0508.html
A Microsoft spokesman is joking that employees should be beaten for opening an attachment -- an attachment from a friend no less. I am not making this up.
Finally, listen to this quote from Microsoft's inescapable Scott Culp:
In this case the virus author chose to target Outlook probably because it gave him better reach. There isn't a security vulnerability in Outlook involved in this at all.
http://dailynews.yahoo.com/h/nm/20000504/wr/virus_love_11.html
Mr. Culp thinks he is playing a game. Look everyone! I've managed to spin this situation into being something good about Microsoft! Never mind the lack of logical connection between the two sentences. This is the company whose products are being used to rebuild the productive infrastructure of the entire world, including large parts of the US military. We are insane to be doing business with them.
What really causes these endless computer security disasters? We've talked about economic factors, but now I think we have to talk about another factor: weenies. Weenies come in two varieties, tech and marketing. Tech weenies think they're smart but aren't mature enough to do real engineering. Marketing weenies mechanically apply the marketing dogmas of product differentiation but aren't capable of having a real vision for their products. Multics was designed by real engineers and the Mac was designed by marketing visionaries, but Windows was designed by weenies. The most distinctive feature of weenies is the worship of features. Tech weenies want everything to be cool: that means hypergeneral, hyperprogrammable, hyperextensible, no matter what hazards might result. Marketing people obsessively look at the complete list of features in their competitors products and command the tech weenies to include all of them, and then to differentiate the product by adding more.
The tech weenies and marketing weenies typically hate each other, but they have this in common: neither of them will ever voluntarily remove a feature from a product, even if it causes billions of dollars in damage. Tech weenies are basically designing for themselves, and have no conception of human beings and their relationships -- and thus no coherent trust model in their products. Marketing weenies are frantic to get products to market, and have the shortest possible time horizon -- and thus no concern for the world in which their products will soon enough become ineradicable legacy systems. Weenies too often win in high-technology competition because a critical mass of their customers lacks detailed knowledge of the products. (Keep in mind that the real customers of a company like Microsoft -- the ones who sign the checks -- are generally neither the technical people nor the users.) Security catastrophies will not disappear until the weenies are all under adult supervision. This will never happen at Microsoft, which is managed by two-year-olds who hire people just like themselves. One more reason to shut it down.
The Daily Howler has begin a month-long examination of the terrifying pathology of the media in the ongoing presidential campaign.
http://www.dailyhowler.com/
Strongly recommended.
A few people asked for a list of references for my set of informal notes on the new design space. Here are some relevant books, some of which I have recommended here before:
James N. Danziger, William H. Dutton, Rob Kling and Kenneth L. Kraemer, Computers and Politics: High Technology in American Local Governments, New York: Columbia University Press, 1982. Still remarkably relevant, this book is the origin, so far as I know, of the observation that computing is a malleable technology.
William H. Dutton, Society on the Line: Information Politics in the Digital Age, Oxford: Oxford University Press, 1998. Advertised with extensive exerpts here on RRE, this book has a framework for analyzing the social construction of "access" that is broadly compatible with my notion of people using information technology to amplify existing social forces, as well as with my discussion in other articles of problems with online boundaries.
Andrew Feenberg, Critical Theory of Technology, New York: Oxford University Press, 1991. Feenberg observes that computers are a dual technology that can be viewed either as mirroring the world in their representations or as a medium of communication.
Batya Friedman, ed, Human Values and the Design of Computer Technology, Cambridge: Cambridge University Press, 1997. My argument presupposes in a rough way that information technologies are not neutral, that they embody values and views of the world. This volume collects papers that explicate this idea.
John Chris Jones, Internet and Everyone, London: Ellipsis, 2000. The celebrated experimental designer's lengthy meditations on the Internet, told largely through letters about design experiments involving spontaneity and chance.
David G. Messerschmitt, Networked Applications: A Guide to the New Computing Infrastructure, San Francisco: Morgan Kaufman, 1999. This is an introduction to modern networked applications architecture, written in plain English by a hard-core engineer. It is a good source for all the stuff about layered systems and components etc.
Mary Anne Moser and Douglas MacLeod, eds, Immersed in Technology: Art and Virtual Environments, Cambridge: MIT Press, 1996. This is the standard text about environments that are immersive in the sense that I am sort of deprecating.
Donald A. Norman, The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution, Cambridge: MIT Press, 1998. A polemic against the archaic world of personal computing with its excessive generality and physical clumsiness and in favor of computers that melt into the woodwork and let you get on with your life.
Donald A. Schon, The Reflective Practitioner: How Professionals Think in Action, New York: Basic Books, 1983. When I refer to the processes of "design" in the artistic sense, this is what I have in mind. Schon's description of the iterative reconceptualization that goes on in the teaching of architecture -- what he calls design as a "reflective conversation with the materials" -- has been justly influential.
Douglas Schuler and Aki Namioka, eds, Participatory Design: Principles and Practices, Hillsdale, NJ: Erlbaum, 1993. This is a good collection of articles about designers collaborating with users.
Carl Shapiro and Hal Varian, Information Rules: A Strategic Guide to the Network Economy, Boston: Harvard Business School Press, 1998. This is the most accessible reference for the stuff about standards and the reflexivity of network effects.
Marc Smith and Peter Kollock, eds, Communities in Cyberspace, London: Routledge, 1999. This is perhaps the most useful book about the the Internet and community, including both the online and offline sorts.
Etienne Wenger, Communities of Practice: Learning, Meaning and Identity, Cambridge: Cambridge University Press, 1998. In an Internet context, the word "community" has unfortunately come to mean "online community", even though the great majority of real communities employ a wide variety of media including the Internet. Wenger's book presents a productive analytic framework for looking at communities of people who share collective identities and practices.
That's a partial list, and it doesn't dig very deeply into the design literature on either the arts side or the technology side. But it's a start.
The announcement of Bob Smith's book "Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet" somehow included the wrong e-mail address (it should be privacyjournal@prodigy.net) and the wrong Web site URL (it should be ).
In response to my notes on eBay, Paul Resnick directed me to his online directory of researchers on the subject of trust systems:
http://databases.si.umich.edu/reputations/
Giorgos Zacharia also directed me to his master's thesis on reputation mechanisms whose algorithm design is influenced by problems with the eBay-like feedback mechanisms:
http://ecommerce.media.mit.edu/reputations/complete_thesis.pdf
And a dealer in postage stamps sent me the following description of the Byzantine small world of online stamp auctions. I've reformatted it. He asked to remain anonymous for obvious reasons...
You're going to get a lot of commentary. I'm going to confine myself to one argument and be relatively brief in my observations. In addition to my other lives, I am a partner in a philatelic joint venture .... We are running an expanding business on eBay.
RE: Argument 5
Factors not taken into account include the behavior of multiple bidders probing each others' maxima and the perceived status and needs of other bidders. This is a Byzantine game as complex as any played out in the elite auction houses of London and New York (which are rapidly adopting the on-line mode). The similarities are actually very extensive.
Incidentally, all philatelic auctions (brick-and-mortar, mail, telephonic, etc.) have maximum-bid provisions. Unlike eBay, many physically based auctions also have provision for cumulative maxima, allowing a bidder to win lots in a particular sale until a specific figure is reached or closely approached.
a) eBay bidders have access to the recent bidding histories of all competing bidders, including bidding times and other pattern- revealing information.
b) eBay bidders have access to the recent sales history of the seller, including a record of all last bids from each bidder on each auction, with bidding times. Knowledge of bidders as buyers and sellers permits extrapolation of their assessments of item value, while knowledge of THEIR bidders behavior as buyers and sellers permits .... {{{ INFINITE REGRESS: the calculus of Maya }}
c) The professional trade on eBay is semi-collegial and has its own practical ethics: for example, I rarely bid against my clients until they are outbid, nor do I bid against my preferred vendors unless I am bidding for a particular client to repurchase by private treaty and believe the vendor is bidding for stock (the latter is one of the few cases in which I will place an early maximum bid to indicate that I have a firm pricepoint).
d) I can bid in multiple auctions on multiple continents almost simultaneously by opening multiple browser windows. I can also watch other auctions in which competitors for a given lot are bidding: if I know their spending patterns, I can gage their willingness to chase a lot in light of their other current bids and recent expenses.
e) I can select auctions for bidding that close at times inconvenient for particular possible competitors. I can schedule my auctions to close at times most favorable to bidders in a particular country (e.g., I have a lot of clients in the Benelux region but few in former Dutch possessions in the Orient: if I have censored wartime Indonesian covers, I will schedule them to close at prime buying hours in Jakarta, in an effort to expand out clientele in the region).
There are many other wrinkles peculiar to the philatelic business, but market making in this field is just as complicated on eBay as in the world at large. The one huge advantage to both buyer and seller is the ability to display an item on line at no cost: I live by my reputation for honest grading and descriptions, and photographs enable me to substantiate it before a purchase is ever made.
What most struck me is how the online practices of stamp dealers are both embedded in the existing complex social world, and the detail in which these practices nonetheless depend on the workings of the online auction mechanism. Other readers described similar complexities in their own fields.
A while back I called for the creation of Stats Watch, a nonprofit organization of statisticians who issue press releases and conduct publicity stunts when they spot abuses of statistics in the media. Well, the other day I noticed an AP wire report about an organization called Statistical Assessment Service that claimed to have determined in a scientific manner that Al Gore's statistics were bad and George W. Bush's statistics were just fine. Looking more closely, I found that this organization is a partisan conservative activist group that uses public relations tactics but pretends to be scientific and neutral. I was depressed at this disingenuous stuff, which illustrates why it's so hard to main any standards of rationality in a world of public relations.
In response to the course materials from my ongoing systems analysis and design course, Rich Giordano described his own attempt to overthrow the orthodoxy in that area. Our correspondence really brings out the underlying reasons for the difficulty of the project, so I've included an edited version of it here. I've omitted the initial back-and-forth messages in which Rich says "I'm doing something similar and it worked well" and I say "tell me more".
Date: Thu, 20 Apr 2000 10:44:21 -0400 (EDT) From: Richard Giordano
It might be easier to ask me some questions about the course. The course is hard to teach because I have to combine the social with the technical. The way that I do this is to group the students into teams (as you have done), and ask them to be reflective on their collaborations. Each student keeps a journal which they give to me at the end of the course. The purpose isn't to grade the journal, but to help students to reflect on what they are doing. Moreover, at the very beginning of the course, we do a role-play. A group of students act as systems designers and clients, and they have to re-design (or re-do) an existing information system. They have a "preliminary meeting" for about 40 minutes while the entire class observes them. This serves a few purposes: First, it breaks down whatever barriers exist in the class; second, it allows the students to think like designers; third, it allows the class to observe a set of hothouse designers in action. After the role-play, we discuss what we observed. What alliances were forming; what were the power relationships; what effect did existing technologies and solutions have on the design; who controlled the meeting? etc. etc. The students dread doing this, but they love it afterwards.
Like you, I ask them to observe information in-use. The notion here is that information in use is messy -- go to any train station. I ask the students to take something of a constructivist stance. Regarding what they observe -- why is it like this instead of some other way? For example, they can go to Piccadilly Station in Manchester and observe what's happening there, and then ask "Why does it look like this? What's the process behind it all?" Then I go through some tools to help them capture processes -- it used to be the normal SSADM stuff, but I've changed it all to modelling. The idea is that you need to create some form of documentation which can serve as an object for both historical purposes, but mainly to allow stakeholders to participate in a process -- and they can see their participation in some tangible object. (My underlying idea is that the emerging model is something of a boundary object. I can't go into the use of boundary objects or cross-functional communities of practice in the calss in detail because I don't have the time -- but I do get the students to think about the social role of documentation.) Then we go through the object-oriented paradigm -- but I start big, looking at a generic system that consists of resources and services. The connection between resources and services leads to a discussion interfaces and standards. Then we get back to the social again by looking at methods of evaluation. I am guided in that regard principally by participative stakeholder evaluation techniques. [Ray Pawson and Nick Tilley, Realistic Evaluation, Sage, 1997. -- PA]
The students give a presentation every single class meeting. What they do is not so much present their work, but they present their thinking behind the work. For instance, if a group models something in a certain way, the question is why this way instead of some other way? Or why model this at all? These are principally English and Commonwealth kids education to the A-level standard. They are trained to write on paper, not to speak. Giving presentations helps them to build their presentation skills, on the one hand, and to be critical on the other. It also helps them see their work in relation to others, and to see that there are many ways of approaching the same problem.
I can honestly say that the students love the course. This is partly the result of their having something very different from their other CS courses, and partly because they like being taught by an American. But many of them are still in contact with me years later and they say that the course helps them put their current work in perspective. A substantial number have written to say that the experiences in the course helped them when they went on their first job interviews. Although this may not seem like a lofty goal for the course, it does help demonstrate that what we do in the classroom has some relation to what people experience in the world.
Date: Sun, 23 Apr 2000 12:59:17 -0700 (PDT) From: Phil Agre
Cool. I assume you're on the semester system, since you're covering so much more material. The formal analogies between our courses are extensive, but you're trying much harder to make the course map onto the relationships and activities that they'll be engaged in as working systems developers, where I'm going for a more abstract and generalizable experience of design. ... Even though I believe strongly in the stuff about participation and politics, we just don't have time to do that, and the industrial design paradigm we're using doesn't draw out the aspects of social embedding that you rightly emphasize. You're trying to get them to do the existing system developer job the right way, where I'm blowing that stuff away, largely I'll admit because I personally have no patience for it. And as you say, you're getting them to use the technical tools they'll use on the job, where many of my students are probably not going to be using tools like that.
But I think the most important thing you're doing in your course that I'm not is the stuff with the model of the situation-of-use that serves as a boundary object in the design process. In general it sounds like you're teaching them good representational schemes, where I'm encouraging them to invent their own. Each approach is valid enough, but yours has the massive advantage that they really do have this experience of a substantial representation that talks back to them throughout the design process, whereas my students really won't have more than a fragmentary representation of the situation they're designing for. This may reflect my own lack of knowledge, but my problem with the modeling approaches that I've heard about is that they impose false models of the work process (or play process, etc), coming from industrial automation with its emphasis on fixed work routines, rigidly defined divisions of labor, etc. My main purpose in having the students look at real people using information is to break some of these false models and instil a sense of the complexity of that embedding. But I can't go on forever just breaking up intuitions; at some point the conversation can't proceed useful until you get a model in front of everyone. Can you suggest what I read to educate myself on this?
Date: Mon, 24 Apr 2000 12:51:06 -0400 (EDT) From: Richard Giordano
Thanks so much for the kind words. I think you exactly understand what I'm trying to do. I did teach a more speculative systems analysis and design course -- a seminar -- called something like "Topics in Information Systems Design" where the students critically looked at the process of analysis, design and implementation. We also looked at case studies involving fraud, conflict, etc. I liked teaching this course quite a lot, but left Manchester before I could really develop it. This was given to graduate students in a combined CS/MBA program.
The problem I have with modelling is that the tools you use to create the model work to reproduce the world in the image of the tools (or the underlying concepts of the tools themselves). Thus, object-orientation has been used as a foundation for process modelling and business process reengineering with, I think, horrible social results. I've written about this to some extent in a piece with Martin Lea -- "Representations of the Group and Group Processes in CSCW Research: A Case of Premature Closure?" in Bowker, Star, Gasser & Turner, eds. "Social Science, technical Systems and Cooperative Work." Since you have a piece in this volume, you might have it on your bookshelf. The part I'm referring to is on pages 9-14. My general orientation toward modelling has been informed by various work in the social construction of technology. I think you know this literature well, so I won't make specific references. Generally, I'm interested in how social forces influence the shape of tools with in turn influence social forces. Some of this, as you know, is structuration theory, and in that regard I am influenced by Anthony Giddens and, to some extent, Wanda Orlikowski.
I don't have any time to get into this in any detail in the class I teach. For one, the course I teach used to last an entire semester, but the CS Department has changed the MSc timetable--the course lasts one intensive week. (It's hard on everybody, and I'm not sure what the students learn in such a short period. To make it easier for the kids, they know in advance what they have to do, and they get background readings.) For another, the CS MSc students don't know anything about modelling, so I need to give them a foundation from which to move on. I try to have them be critical of what I'm teaching while I'm teaching it, so the kids should know my reservations with modelling and the tools to do this.
About readings related to models as boundary objects. I don't know of any offhand. ... My sources on boundary objects begin with Leigh Star. How boundary objects might transform knowledge in practice (particularly because knowledge in practice is bounded-up with power -- and this is especially true in the process of systems analysis and design, as you know...) I lean somewhat on Bourdieu -- and a colleague named Paul Carlyle at the Sloan School at MIT -- for this.
The deep issue here is that the representational practices of computer science -- data structures, at least as conventionally understood -- presuppose a rigid relationship between the "system" and the reality that it represents. System design methodologies have a way of imposing their own view of the world, and that view is usually wrong. That's one reason why I've moved toward design processes taken from industrial design and architecture. But ultimately one has to contend with seemingly inherent problems with formalism.
When I tell the truth on this list, I sometimes get hate mail. Not that much, really, but enough. When I do get nasty messages, they are obviously from people who have had a lot of practice. And I always go through the same cycle: I send a short, intemperate response; I delete the message; I breathe several times to get the anger out of my system; I regret responding at all; an hour passes; I realize just how sophisticated the rhetoric of the hate message was; and I regret not having saved it. This happens over and over. My last round of notes, however, got so many responses so quickly that one hate message was still retrievable an hour later as I worked my way through subsequent messages. I enclose it here not to seek sympathy, which I truly do not deserve, but because I find it interesting. Note, above all, that at no point does it make logical sense. At the risk of interrupting its trance-like flow, I have interleaved my own commentary.
There was a time when I gleaned much that I considered worthwhile from your articles, but that time has passed. In my opinion, you have put on blinders that restrict your view(s) as much to leftist dogmas and propaganda as any of the "conservative paranoia" you describe.
The high-toned first sentence melodramatically posits the high ground from which he issues the abuse to follow. Then he's right into it. The illogic begins right away, as the second sentence can't decide whether it's accusing me of spouting left-wing views or of blinding myself to them. It falls strangely into the middle, so that I can't figure out what I'm being accused of.
I gather that we should criticize George Bush for never having held a "real job", but the same condition in the life of Bill Clinton is perfectly acceptable.
This is extremely common. Conservatives are trying to bring back the culture of deference in which double standards are a routine way of life, and to this end they continually manufacture bogus accusations of double standards against the egalitarians who have long pointed out double standards as a way of insisting that everyone be treated equally. In this case, the accusation is bogus in a straightforward factual sense; before becoming President, Bill Clinton had at least two real jobs -- as a law professor and as governor of Arkansas -- and pointing that out surely doesn't make one a raving liberal. (Because of conservative media bias, many people are unaware that the Texas constitution, unlike that of Arkansas and most other states, assigns the governor very little power.) Most likely this guy is fabricating his double-standard accusation by distoring, in the blurry fashion of lizard-brain thinking, the conservative accusation that Bill Clinton never held a job in the private sector before he become President. Or perhaps he is twisting language by secretly redefining a "real job" as one in the private sector. In either case he is twisting language.
Notice, too, the routinized innuendo: "I gather", he says, that he is to believe a certain thing, even though I never said that thing or anything like it. "I gather" is one of many devices in the new jargon for poking anything one likes into the mind and mouth of one's opponent. And the innuendos are about to start coming fast and furious.
Regardless of the issues surrounding so-called "father's rights", (and given that no father currently has any say in whether his child is to be born or aborted, I doubt that there is any such thing as "father's rights" in the U.S. law), are you at all concerned about the legal and constitutional aspects of the recent "rescue" of Elian Gonzalez? Or of the lives lost in Waco and the "factory" in the Sudan?
These questions are really accusations; he already knows the answer and isn't waiting around. But because the accusations have been framed as questions, I am left with no way to disprove them. That's the nature of an innuendo.
Look, too, at the logic here, or the lack of it. First of all, it does not follow logically that a man who cannot compel a woman to carry his child has no rights as a father. He claims to "doubt" a buzz phrase ("father's rights") that, like many phrases of the new jargon (e.g., "special rights"), has no real definition, just a hazy set of associations. To rebut this, one would have to enumerate the possible definitions. And note in particular that his rhetoric here depends on a conflation of two such definitions: rights as a father as against the rights of a mother (not at issue in the present case because the mother is not alive) and rights that a father has for being a living parent (which obviously exist in US law in great abundance).
Having stumbled through all that, I next find myself not-quite-accused of indifference to "the legal and constitutional aspects of the recent 'rescue' of Elian Gonzalez" -- the scare-quoted "rescue" being my own word. This is another technique of the new jargon: create a "message", call it M, utter a few random "facts" that would seem to support M, and then immediately start repeating M over and over without mentioning the facts that support it, as if M were fully established. The device works precisely by not laying its cards on the table: one cannot rebut it without reconstructing the full set of "facts" and patiently taking them all apart. As so often, the sophistry takes a few words to say and hours of labor and logic to refute. Of course, society does often come to conclusions whose supporting facts need not be repeated forever afterward, but it's characteristic of the new jargon to pretend that a "message" has been established beyond doubt almost instantaneously after it has been introduced. If one complains that, for example, the most common assertion that is used to support the message is actually false -- in this Tom DeLay's seriously lizard-brained assertion that "This is a frightening event, that American citizens now can expect that the executive branch on their own can decide on whether to raid a home" (AP 4/23/00) -- then you'll get no contrition at all, just a prefabricated line such as "that doesn't matter; what matters is M" or else another "fact" that needs to be laboriously checked out.
But at least the business about Elian Gonzalez was connected in some way to something I said. The next rhetorical question -- "Or of the lives lost in Waco and the 'factory' in the Sudan?" -- has no logical connection at all. One cannot even begin to interpret this question, much less answer it, without providing some account of what it is even doing there. And clearly it is there because this guy, with his lizard brain logic, imagines me to be on the Clinton side, so to speak, and to defend every bad deed and tolerate every lie that that side has ever told. (Also notice the weirdness of putting scare quotes around the word "factory". I'm not aware of anyone having denied that the building that Clinton bombed in Sudan was a factory.) This is the lizard brain at work: it understands only associations. Every possible bad thing is associated with Clinton, and everyone who gets themselves associated with Clinton is also transitively associated with every last one of those bad things. This is another purpose of the rhetorical question: the transitive association and the accusation it implies are not to be rationally investigated; they are left simply to hang in the air. It is the work of innuendo: create a mental association and then stash it on a shelf just beyond the reach of rational inquiry, in this case by first posing it as a rhetorical question and then packing and leaving.
What is the Constitution to you? Does it matter to you that lacking any will or effort on the part of the federal government to enforce it, the Constutution is just another piece of paper? Or that, so far, the "oath" to defend and uphold it, at least for the present administration, has turned out to be just so much hot air?
This guy has been at the hard stuff. A primitive kind of mental electricity is passing through his chain of associations, so that my reference to "the administration's motives in rescuing a Cuban boy who was being held by conservatives in Miami" is enough to create a spiral that leads in a couple of short steps to the conclusion -- another rhetorical question, another innuendo -- that I have no regard for the Constitution. For the lizard brain, a person is either For or Against a powerful symbol such as the Constitution -- always necessarily an emotionally primitive extreme with no in-betweens allowed -- and in this person's lizard brain Clinton is Against the Constitution and so am I. It matters for nothing that I have defended the Constitution against several conservative assaults -- such data cannot even be processed. (Other cultivators of the lizard brain have responded to such things with, "How can you defend that so-and-so?", the innuendo being that I have thereby chosen to associate myself with him in every possible way.)
In your opinion, is there any such thing as "right" or "wrong" in any context that will continue beyond the term of a single President?
Now we reach the ground zero of the lizard brain, for which it's just a few quick steps from a complex issue to the most primitive dichotomy there is. To me, the Elian Gonzalez case is the purest possible example of how primitive the conservative lizard brain has become. Here you have your basic hard case: one where several strong moral imperatives apply equally well and yet contradict one another. Normal people understand that the world is a complicated place, and that this sort of conflict is pretty much the norm. But the lizard brain believes in absolutes. And if the absolutes conflict with one another, the lizard brain is programmed to respond to whichever arbitrary choice of absolutes the most primitive of media screamers happens to make.
This is what is so dangerous about the conservative lizard brain: its judgements are very often absolutely arbitrary. This arbitrariness is not an accident. Conservative society works by breaking down the rational mind and replacing it with a set of primitive associations that can be activated selectively by those in power. People who might otherwise have been rational, powerful, caring human beings are reduced to barking dogs who bark at whoever their master tells them to, all the while shrieking both inwardly and to the world that they are upholding everything that is good and pure and moral against everything that is the absolute opposite. The point is not that all conservatives are in this state, or that conservative philosophy is necessarily expressed in the anti-logic of the lizard brain. The point, rather, is that a conservative society of orders and classes requires ordinary people to internalize a system of arbitrariness and prejudice that cannot be justified, and that such a society cannot exist without crushing the rational mind. That's what's going on right now. The modern technology of crushing the rational mind originated with the associationism of public relations, and it has lately matured in the hands of the professional language-twisters of the punditry. We all have lizard brains, and all of us automatically respond to the strong emotions and vague associations of the new jargon. But some people's rational minds have not yet been fully extinguished, and those people have a responsibility to speak out.
I wonder.
He wonders. Except he doesn't, of course. He has framed the issues to his satisifaction in the anti-rational haze of the lizard brain, in which it suffices to issue innuendos and walk away.
Meanwhile, please arrange for my name and address to be removed from your distribution list. I do not have time to plow through the kind of crap you sent me today.
And walk away he does, gone off to abuse someone else. It used to be that I responded to obnoxious people said "take me off your mailing list" with "take yourself off". Now, having grown older and wiser, I have a form letter that I send, explaining at length and with vacuous good cheer how to take themselves off. This is a trick I learned from Amazon.com: it not only saves your soul, but it also makes the flamer much angrier than an angry response would.
Conservatives have the most highly evolved jargon, but they haven't cornered the market on nastiness. I also got this message from someone who evidently works for the state of North Carolina:
You know, Mr. Pagre, this 'worm design' email may have positive ironic and political undertones, show up the establishment's hypocrisy and all other sorts of positive things.
However, adding one more black mark to rack up to Pagans makes your Karma that much more problematic.
Samhain is a holy time of the year. Why not pick on the Christians? Most of the group you are targeting belong to that group. You've just managed to piss off the witches of the world, and there are a lot more of them than you think.
Having no tolerance for anything that resembles a threat, I reported this message to the sender's site administrator.
Having tired of paying new-book prices on Amazon.com, I've been using online comparison-shopping mechanisms for used bookstores. The one that works best for me is . Of course it's mostly older and better-known books that are available cheaply this way, but I've gotten about forty books this way at an average price well under $10. Just to give you an idea, here is what I've bought:
Peter Ackroyd, The Life of Thomas More, Doubleday, 1998.
Armen A. Alchian, Economic Forces at Work, Liberty Press, 1977.
Carl L. Becker, The Heavenly City of the Eighteenth Century Philosophers, Yale University Press, 1932.
Frederick C. Beiser, The Sovereignty of Reason: The Defense of Rationality in the Early English Enlightenment, Princeton University Press, 1996.
Robert H. Bork, The Antitrust Paradox: A Policy at War With Itself, Basic Books, 1978.
Taylor Branch, Parting the Waters: America in the King Years, 1954-63, Simon and Schuster, 1988.
Owen Chadwick, The Secularization of the European Mind in the Nineteenth Century: The Gifford Lectures in the University of Edinburgh for 1973-4, Cambridge University Press, 1975.
Alfred D. Chandler, Jr., The Visible Hand: The Managerial Revolution in American Business, Harvard University Press, 1977.
Alfred D. Chandler, Jr., Scale and Scope: The Dynamics of Industrial Capitalism, Harvard University Press, 1990.
John R. Commons, Myself, University of Wisconsin Press, 1963.
Ulrich Conrads, Programs and Manifestoes on 20th-Century Architecture, translated by Michael Bullock, MIT Press, 1970.
Edward G. Corrigan and Pearl-Ellen Gordon, eds, The Mind Object: Precocity and Pathology of Self-Sufficiency, Aronson, 1995.
Claude S. Fischer, America Calling: A Social History of the Telephone to 1940, University of California Press, 1992.
Anthony Giddens, The Constitution of Society: Outline of the Theory of Structuration, University of California Press, 1984.
Louis Hartz, The Liberal Tradition in America: An Interpretation of American Political Thought Since the Revolution, Harcourt Brace, 1955.
David Held, Democracy and the Global Order: From the Modern State to Cosmopolitan Governance, Stanford University Press, 1995.
Richard Hofstadter, Anti-Intellectualism in American Life, Knopf, 1963.
Richard Hofstadter, The Paranoid Style in American Politics, and Other Essays, Knopf, 1965.
Arthur R. Hogue, Origins of the Common Law, Indiana University Press, 1966.
John Keane, Tom Paine: A Political Life, Little, Brown, 1995.
Russell Kirk, The Roots of American Order, Open Court, 1974.
Jack Knight, Institutions and Social Conflict, Cambridge University Press, 1992.
Paul Krugman, The Accidental Theorist: And Other Dispatches from the Dismal Science, Norton, 1998.
Arthur O. Lovejoy, The Great Chain of Being: A Study of the History of an Idea, Harvard University Press, 1936.
Robert Markley, Fallen Languages: Crises of Representation in Newtonian England, 1660-1740, Cornell University Press, 1993.
Carolyn Merchant, The Death of Nature: Women, Ecology, and the Scientific Revolution, Harper and Row, 1980.
Rene Moses-Hrushovski, Deployment: Hiding Behind Power Struggles as a Character Defense, Aronson, 1994.
Geoff Mulgan, Connexity: How to Live in a Connected World, Harvard Business School Press, 1998.
Douglass C. North and Robert Paul Thomas, The Rise of the Western World: A New Economic History, Cambridge University Press, 1973.
Douglass C. North, The Economic Growth of the United States, 1790-1860, Prentice-Hall, 1961.
Robert S. Peck, ed, To Govern a Changing Society: Constitutionalism and the Challenge of New Technology, Smithsonian Institution Press, 1990.
Virginia Postrel, The Future and Its Enemies: The Growing Conflict over Creativity, Enterprise, and Progress, Free Press, 1998.
Andras Sajo, Limiting Government: An Introduction to Constitutionalism, Central European University Press, 1999.
Charles Sellers, The Market Revolution: Jacksonian America, 1815-1846, Oxford University Press, 1991.
Darren Staloff, The Making of an American Thinking Class: Intellectuals and Intelligentsia in Puritan Massachusetts, Oxford University Press, 1998.
Cass R. Sunstein, After the Rights Revolution: Reconceiving the Regulatory State, Harvard University Press, 1990.
Karen Kissel Wegela, How to Be a Help Instead of a Nuisance: Practical Approaches to Giving Support, Service, and Encouragement to Others, Shambhala, 1996.
I realized that I've turned into a book collector, which is a scary thought. That's something that middle-aged college professors do. I suppose I'll write a deserving East European library into my will.
Some URL's.
Emerging Antitrust Issues in Electronic Commerce http://www.ftc.gov/speeches/other/ecommerce.htm
Red Escolar Linux http://redesc.linux.org.mx/
Quality of Service: Fact or Fiction? http://www.cisco.com/warp/public/759/ipj_3-1/ipj_3-1_qos.html
venture capitalists' response to the stock market crash http://www.forbes.com/forbes/00/0515/6511182a.htm
FCC Opens Door for New Wireless Technology http://news.cnet.com/news/0-1004-200-1857730.html
Research Council Calls for More Study of Large Information Systems http://chronicle.com/free/2000/05/2000051101t.htm
Internet Explorer "Open Cookie Jar" http://www.peacefire.org/security/iecookies/ http://slashdot.org/articles/00/05/11/173257.shtml
Digital Storytelling http://tech-head.com/dstory.htm
Microsoft's proposed antitrust remedy http://news.cnet.com/News/Pages/Special/Microsoft/issue_of_remedy.html
Rethinking Antitrust Policies for the New Economy http://www.usdoj.gov/atr/public/speeches/4707.htm
for Metallica fans with guilty consciences http://www.paylars.com/
Center for Digital Discourse and Culture http://www.cddc.vt.edu/
Biosphere Data Project http://sims.berkeley.edu/biosphere/
Consumer Financial Privacy Act http://www.epic.org/privacy/financial/HR4380.html
Switches Raise Prospects for Tiny Technology http://www.nytimes.com/library/tech/00/05/biztech/articles/08mems.html
So Far, Big Brother Isn't Big Business http://www.nytimes.com/library/financial/personal/050700personal-privacy.html
Backbone Bottlenecks Burst Broadband Bubble http://www.zdnet.com/zdnn/stories/news/0,4586,2550556,00.html
end ```