boundary 2

Tag: evgeny morozov

  • Gavin Mueller – Civil Disobedience in the Age of Cyberwar

    Gavin Mueller – Civil Disobedience in the Age of Cyberwar

    a review of Molly Sauter, The Coming Swarm: DDoS Actions, Hacktivism, and Civil Disobedience on the Internet (Bloomsbury Academic, 2014)

    by Gavin Mueller

    ~

    Molly Sauter’s The Coming Swarm begins in an odd way. Ethan Zuckerman, director of MIT’s Center for Civic Media, confesses in the book’s foreword that he disagrees with the book’s central argument: that distributed denial of service (DDoS) actions, where specific websites and/or internet servers are overwhelmed by traffic and knocked offline via the coordinated activity of many computers acting together, should be viewed as a legitimate means of protest.[1] “My research demonstrated that these attacks, once mounted by online extortionists as a form of digital protection racket, were increasingly being mounted by governments as a way of silencing critics,” Zuckerman writes (xii). Sauter’s argument, which takes the form of this slim and knotty book, ultimately does not convince Zuckerman, though he admits he is “a better scholar and a better person” for having engaged with the arguments contained within. “We value civic arguments, whether they unfold in the halls of government, a protest encampment, or the comments thread of an internet post because we believe in the power of deliberation” (xv). This promise of the liberal public sphere is what Sauter grapples with throughout the work, to varying levels of success.

    The Coming Swarm is not a book about DDoS activities in general. As Sauter notes, “DDoS is a popular tactic of extortion, harassment, and silencing” (6): its most common uses come from criminal organizations and government cyberwar operations. Sauter is not interested in these kinds of actions, which encompass the vast majority of DDoS uses. (DDoS itself is a subset of all denial of service or DoS attacks.) Instead they focus on self-consciously political DDoS attacks, first carried out by artist-hacker groups in the 1990s (the electrohippies and the Electronic Disturbance Theater) and more recent actions by the group Anonymous.[2] All told, these are a handful of actions, barely numbering in the double digits, and spread out over two decades. The focus on this small minority of cases can make the book’s argument seem question-begging, since Sauter does not make clear how and why it is legitimate to analyze exclusively those few instances of a widespread phenomenon that happen to conform to an author’s desired outlook. At one level, this is a general problem throughout the book, since Sauter’s analysis is confined to what they call “activist DDoS,” yet the actual meaning of this term is rarely interrogated: viewed from the perspective of the actors, many of the DDoS actions Sauter dismisses by stipulation could also be–and likely are–viewed as “activism.”

    From its earliest inception, political DDoS actions were likened to “virtual sit-ins”: activists use their computers’ ability to ping a server to clog up its functioning, potentially slowing or bringing its activity to a stand-still. This situated the technique within a history of nonviolent civil disobedience, particularly that of the Civil Rights Movement. This metaphor has tended to overdetermine the debate over the use of DDoS in activist contexts, and Sauter is keen to move on from the connection: “such comparisons on the part of the media and the public serve to only stifle innovation within social movements and political action, while at the same time cultivating a deep and unproductive nostalgia for a kind of ‘ideal activism’ that never existed” (22-3). Sauter argues that not only does this leave out contributions to the Civil Rights Movement that the mainstream finds less than respectable; it helps rule out the use of disruptive and destructive forms of activism in future movements.

    This argument has merit, and many activists who want to move beyond nonviolent civil disobedience into direct action forms of political action appear to agree with it. Yet Sauter still wants to claim the label of civil disobedience for DDoS actions that they at other moments discard: “activist DDoS actions are not meaningfully different from other actions within the history of civil disobedience… novelty cannot properly exempt activist DDoS from being classified as a tactic of civil disobedience” (27). However, the main criticisms of DDoS as civil disobedience have nothing to do with its novelty. As Evgeny Morozov points out in his defense of DDoS as a political tactic, “I’d argue, however, that the DDoS attacks launched by Anonymous were not acts of civil disobedience because they failed one crucial test implicit in Rawls’s account: Most attackers were not willing to accept the legal consequences of their actions.” Novelist and digital celebrity Cory Doctorow, who opposes DDoS-based activism, echoes this concern: “A sit-in derives its efficacy not from merely blocking the door to some objectionable place, but from the public willingness to stand before your neighbours and risk arrest and bodily harm in service of a moral cause, which is itself a force for moral suasion.” The complaint is not that DDoS fails to live up to the standards of the Civil Rights Movement, or that it is too novel. It is that it often fails the basic test of civil disobedience: potentially subjecting oneself to punishment as a form of protest that lays bare the workings of the state.

    Zuckerman’s principle critique of Sauter’s arguments is that DDoS, by shutting down sites, censors speech opposed by activists rather than promoting their dissenting messages. Sauter has a two-pronged response to this. First, they say that DDoS attacks make the important point that the internet is not really a public space. Instead, it is controlled by private interests, with large corporations managing the vast majority of online space. This means that no arguments may rest, implicitly or explicitly, on the assumption that the internet is a Habermasian public sphere. Second, Sauter argues, by their own admission counterintuitively, that DDoS, properly contextualized as part of “communicative capitalism,” is itself a form of speech.

    Communicative capitalism is a term developed by Jodi Dean as part of her critique of the Habermasian vision of the internet as a public sphere. With the commodification of online speech, “the exchange value of messages overtakes their use value” (58). The communication of messages is overwhelmed by the priority to circulate content of any kind: “communicative exchanges, rather than being fundamental to democratic politics, are the basic elements of capitalist production” (56). For Dean, this logic undermines political effects from internet communication: “The proliferation, distribution, acceleration and intensification of communicative access and opportunity, far from enhancing democratic governance or resistance, results in precisely the opposite – the post-political formation of communicative capitalism” (53). If, Sauter argues, circulation itself becomes the object of communication, the power of DDoS is to disrupt that circulation of context. “In that context the interruption of that signal becomes an equally powerful contribution…. Under communicative capitalism, it is possible that it is the intentional creation of disruptions and silence that is the most powerful contribution” (29).

    However, this move is contrary to the point of Dean’s concept; Dean specifically rejects the idea that any kind of communicative activity puts forth real political antagonism. Dean’s argument is, admittedly, an overreach. While capital cares little for the specificity of messages, human beings do: as Marx notes, exchange value cannot exist without a use value. Sauter’s own “counterintuitive” use of Dean points to a larger difficulty with Sauter’s argument: it remains wedded to a liberal understanding of political action grounded in the idea of a public sphere. Even when Sauter moves on to discussing DDoS as disruptive direct action, rather than civil disobedience, they return to the discursive tropes of the public sphere: DDoS is “an attempt to assert a fundamental view of the internet as a ‘public forum’ in the face of its attempted designation as ‘private property’” (45). Direct action is evaluated by its contribution to “public debate,” and Sauter even argues that DDoS actions during the 1999 Seattle WTO protests did not infringe on the “rights” of delegates to attend the event because they were totally ineffective. This overlooks the undemocratic and illiberal character of the WTO itself, whose meetings were held behind closed doors (one of the major rhetorical points of the protest), and it implies that the varieties of direct action that successfully blockaded meetings could be morally compromised. These kinds of actions, bereft of an easy classification as forms of speech or communication, are the forms of antagonistic political action Dean argues cannot be found in online space.

    In this light, it is worth returning to some of the earlier theorizations of DDoS actions. The earliest DDoS activists the electrohippies and Electronic Disturbance Theater documented the philosophies behind their work, and Rita Raley’s remarkable book Tactical Media presented a bracing theoretical synthesis of DDoS as an emergent critical art-activist practice. EDT’s most famous action deployed its FloodNet DDoS tool in pro-Zapatista protests. Its novel design incorporated something akin to speech acts: for example, it pinged servers belonging to the Mexican government with requests for “human rights,” leading to a return message “human rights not found on this server,” a kind of technopolitical pun. Yet Raley rejects a theorization of online political interventions strictly in terms of their communicative value. Rather they are a curious hybrid of artistic experiment and militant interrogation, a Deleuzian event where one endeavors “to act without knowing the situation into which one will be propelled, to change things as they exist” (26).

    The goal of EDT’s actions was not simply to have a message be heard, or even to garner media attention: as EDT’s umbrella organization the Critical Art Ensemble puts it in Electronic Civil Disobedience, “The indirect approach of media manipulation using a spectacle of disobedience designed to muster public sympathy and support is a losing proposition” (15). Instead, EDT took on the prerogatives of conceptual art — to use creative practice to pose questions and provoke response — in order to probe the contours of the emerging digital terrain and determine who would control it and how. That their experiments quickly raised the specter of terrorism, even in a pre-9/11 context, seemed to answer this. As Raley describes, drawing from RAND cyberwar researchers, DDoS and related tactics “shift the Internet ‘from the public sphere model and casts it more as conflicted territory bordering on a war zone.’” (44).

    While Sauter repeatedly criticizes treating DDoS actions as criminal, rather than political, acts, the EDT saw its work as both, and even analogous to terrorism. “Not that the activists are initiating terrorist practice, since no one dies in hyperreality, but the effect of this practice can have the  same consequence as terrorism, in that state and corporate power vectors will haphazardly return fire with weapons that have destructive material (and even mortal) consequences” (25). Indeed, civil disobedience is premised on exploiting the ambiguities of activities that can be considered both crime and politics. Rather than attempt to fix distinctions after the fact, EDT recognized the power of such actions precisely in collapsing these distinctions. EDT did criticize the overcriminalization of online activity, as does Sauter, whose analysis of the use of the Computer Fraud and Abuse Act to prosecute DDoS activities is some of the book’s strongest and most useful material.

    Sauter prefers the activities of Anonymous to the earlier actions by the electrohippies and EDT (although EDT co-founder Ricardo Dominguez has been up to his old tricks: he was investigated by the FBI and threatened with revocation of tenure for a “virtual sit-in” against the University of California system during the student occupations of 2010). This is because Anonymous’ actions, with their unpretentious lulzy ardor and open-source tools, “lower the barriers to entry” to activism (104): in other words, they leverage the internet’s capacity to increase participation. For Sauter, the value in Anonymous’ use of its DDoS tool, the Low Orbit Ion Cannon, against targets such as the MPAA and PayPal “lay in the media attention and new participants it attracted, who sympathized with Anonymous’ views and could participate in future actions” (115). The benefit of collaborative open-source development is similar, as is the tool’s feature that allows a user to contribute their computer to a “voluntary botnet” called the “FUCKING HIVE MIND” which “allows for the temporary sharing of an activist identity, which subsequently becomes more easily adopted by those participants who opt to remain involved” (130). This tip of the hat to theorists of participatory media once again reveals the notion of a democratic public sphere as a regulative ideal for the text.

    The price of all this participation is that a “lower level of commitment was required” (129) from activists, which is oddly put forth as a benefit. In fact, Sauter criticizes FloodNet’s instructions — “send your own message to the error log of the institution/symbol of Mexican Neo-Liberalism of your choice” — as relying upon “specialized language that creates a gulf between those who already understand it and those who do not” (112). Not only is it unclear to me what the specialized language in this case is (“neoliberalism” is a widely used, albeit not universally understood term), but it seems paramount that individuals opting to engage in risky political action should understand the causes for which they are putting themselves on the line. Expanding political participation is a laudable goal, but not at the expense of losing the content of politics. Furthermore, good activism requires training: several novice Anons were caught and prosecuted for participating in DDoS actions due to insufficient operational security measures.

    What would it mean to take seriously the idea that the internet is not, in fact, a public sphere, and that, furthermore, the liberal notion of discursive and communicative activities impacting the decisions of rational individuals does not, in fact, adequately describe contemporary politics? Sauter ends up in a compelling place, one akin to the earlier theorists of DDoS: war. After all, states are one of the major participants in DDoS, and Sauter documents how Britain’s Government Communications Headquarters (GCHQ) used Denial of Service attacks, even though deemed illegal, against Anonymous itself. The involvement of state actors “could portend the establishment of a semipermanent state of cyberwar” with activists rebranded as criminals and even terrorists. This is consonant with Raley’s analysis of EDT’s own forays into online space. It also recalls the radical political work of ultraleft formations such as Tiqqun (I had anticipated that The Coming Swarm was a reference to The Coming Insurrection though this does not seem to be the case), for whom war, specifically civil war, becomes the governing metaphor for antagonistic political practice under Empire.

    This would mean that the future of DDoS actions and other disruptive online activism would not be in its mobilization of speech, but in its building of capacities and organization of larger politicized formations. This could potentially be an opportunity to consider the varieties of DDoS so often bracketed away, which often rely on botnets and operate in undeniably criminal ways. Current hacker formations use these practices in political ways (Ghost Squad has recently targeted the U.S. military, cable news stations, the KKK and Black Lives Matters among others with DDoS, accompanying each action with political manifestos). While Sauter claims, no doubt correctly, that these activities are “damaging to [DDoS’s] perceived legitimacy as an activist tactic (160), they also note that measures to circumvent DDoS “continue to outstrip the capabilities of nearly all activist campaigns” (159). If DDoS has a future as a political tactic, it may be in the zones beyond what liberal political theory can touch.

    Notes

    [1] Instances of DDoS are typically referred to in both the popular press and by hacktivsts as “attacks.” Sauter prefers the term “actions,” a usage I follow here.

    [2] I follow Sauter’s preferred usage of the pronouns “they” and “them.”

    Works Cited

    • Critical Art Ensemble. 1996. Electronic Civil Disobedience. Brooklyn: Autonomedia.
    • Dean, Jodi. 2005. “Communicative Capitalism: Circulation and the Foreclosure of Politics.” Cultural Politics 1.1. 51-74.
    • Raley, Rita. 2009. Tactical Media. Minneapolis: University of Minnesota Press.
    • Sauter, Molly. 2014. The Coming Swarm: DDoS Actions, Hacktivism, and Civil Disobedience on the Internet. New York: Bloomsbury Academic.

    _____

    Gavin Mueller (@gavinsaywhat) holds a Ph.D. in Cultural Studies from George Mason University. He is currently a Visiting Assistant Professor of Emerging Media and Communication at the University of Texas-Dallas. He previously reviewed Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous for The b2 Review.

    Back to the essay

  • Is the Network a Brain?

    Is the Network a Brain?

    Pickering, Cybernetic Braina review of Andrew Pickering, The Cybernetic Brain: Sketches of Another Future (University of Chicago Press, 2011)
    by Jonathan Goodwin
    ~

    Evgeny Morozov’s recent New Yorker article about Project Cybersyn in Allende’s Chile caused some controversy when critics accused Morozov of not fully acknowledging his sources. One of those sources was sociologist of science Andrew Pickering’s The Cybernetic Brain. Morozov is quoted as finding Pickering’s book “awful.” It’s unlikely that Morozov meant “awful” in the sense of “awe-inspiring,” but that was closer to my reaction after reading Pickering’s 500+ pp. work on the British tradition in cybernetics. This tradition was less militarist and more artistic, among other qualities, in Pickering’s account, than is popularly understood. I found myself greatly intrigued—if not awed—by the alternate future that his subtitle and final chapter announces. Cybernetics is now a largely forgotten dead-end in science. And the British tradition that Pickering describes had relatively little influence within cybernetics itself. So what is important about it now, and what is the nature of this other future that Pickering sketches?

    The major figures of this book, which proceeds with overviews of their careers, views, and accomplishments, are Grey Walter, Ross Ashby, Gregory Bateson, R. D. Laing, Stafford Beer, and Gordon Pask. Stuart Kauffman’s and Stephen Wolfram’s work on complexity theory also makes an appearance.[1] Laing and Bateson’s relevance may not be immediately clear. Pickering’s interest in them derives from their extension of cybernetic ideas to the emerging technologies of the self in the 1960s. Both Bateson and Laing approached schizophrenia as an adaptation to the increasing “double-binds” of Western culture, and both looked to Eastern spiritual traditions and chemical methods of consciousness-alteration as potential treatments. The Bateson and Laing material makes the most direct reference to the connection between the cybernetic tradition and the “Californian Ideology” that animates much Silicon Valley thinking. Stewart Brand was influenced by Bateson’s Steps to an Ecology of Mind (183), for example. Pickering identifies Northern California as the site where cybernetics migrated into the counterculture. As a technology of control, it is arguable that this countercultural migration has become part of the ruling ideology of the present moment. Pickering recognizes this but seems to concede that the inherent topicality would detract from the focus of his work. It is a facet that would be of interest to the readers of this “Digital Studies” section of The b2 Review, however, and I will thus return to it at the end of this review.

    Pickering’s path to Bateson and Laing originates with Grey Walter’s and Ross Ashby’s pursuit of cybernetic models of the brain. Computational models of the brain, though originally informed by cybernetic research, quickly replaced it in Pickering’s account (62). He asks why computational models of the brain quickly gathered so much cultural interest. Rodney Brooks’s robots, with their more embodied approach, Pickering argues, are in the tradition of Walter’s tortoises and outside the symbolic tradition of artificial intelligence. I find it noteworthy that the neurological underpinnings of early cybernetics were so strongly influenced by behaviorism. Computationalist approaches, associated by Pickering with the establishment or “royal” science, here, were intellectually formed by an attack on behaviorism. Pickering even addresses this point obliquely, when he wonders why literary scholars had not noticed that the octopus in Gravity’s Rainbow was apparently named “Grigori” in homage to Gregory Bateson (439n13).[2] I think one reason this hasn’t been noticed is that it’s much more likely that the name was random but for its Slavic form, which is clearly in the same pattern of references to Russian behaviorist psychology that informs Pynchon’s novel. An offshoot of behaviorism inspiring a countercultural movement devoted to freedom and experimentation seems peculiar.

    One of Pickering’s key insights into this alternate tradition of cybernetics is that its science is performative. Rather than being as theory-laden as are the strictly computationalist approaches, cybernetic science often studied complex systems as assemblages whose interactions generated novel insights. Contrast this epistemology to what critics point to as the frequent invocation of the Duhem-Quine thesis by Noam Chomsky.[3] For Pickering, Ross Ashby’s version of cybernetics was a “supremely general and protean science” (147). As it developed, the brain lost its central place and cybernetics became a “freestanding general science” (147). As I mentioned, the chapter on Ashby closes with a consideration of the complexity science of Stuart Kauffman and Stephen Wolfram. That Kauffman and Wolfram largely have worked outside mainstream academic institutions is important for Pickering.[4] Christopher Alexander’s pattern language in architecture is a third example. Pickering mentions that Alexander’s concept was influential in some areas of computer science; the notion of “object-oriented programming” is sometimes considered to have been influenced by Alexander’s ideas.

    I mention this connection because many of the alternate traditions in cybernetics have become mainstream influences in contemporary digital culture. It is difficult to imagine Laing and Bateson’s alternative therapeutic ideas having any resonance in that culture, however. The doctrine that “selves are endlessly complex and endlessly explorable” (211) is sometimes proposed as something the internet facilitates, but the inevitable result of anonymity and pseudonymity in internet discourse is the enframing of hierarchical relations. I realize this point may sound controversial to those with a more benign or optimistic view of digital culture. That this countercultural strand of cybernetic practice has clear parallels with much digital libertarian rhetoric is hard to dispute. Again, Pickering is not concerned in the book with tracing these contemporary parallels. I mention them because of my own interest and this venue’s presumed interest in the subject.

    The progression that begins with some variety of conventional rationalism, extends through a career in cybernetics, and ends in some variety of mysticism is seen with almost all of the figures that Pickering profiles in The Cybernetic Brain. Perhaps the clearest example—and most fascinating in general—is that of Stafford Beer. Philip Mirowski’s review of Pickering’s book refers to Beer as “a slightly wackier Herbert Simon.” Pickering enjoys recounting the adventures of the wizard of Prang, a work that Beer composed after he had moved to a remote Welsh village and renounced many of the world’s pleasures. Beer’s involvement in Project Cybersyn makes him perhaps the most well-known of the figures profiled in this book.[5] What perhaps fascinate Pickering more than anything else in Beer’s work is the concept of viability. From early in his career, Beer advocated for upwardly viable management strategies. The firm would not need a brain, in his model, “it would react to changing circumstances; it would grow and evolve like an organism or species, all without any human intervention at all” (225). Mirowski’s review compares Beer to Friedrich Hayek and accuses Pickering of refusing to engage with this seemingly obvious intellectual affinity.[6] Beer’s intuitions in this area led him to experiment with biological and ecological computing; Pickering surmises that Douglas Adams’s superintelligent mice derived from Beer’s murine experiments in this area (241).

    In a review of a recent translation of Stanislaw Lem’s Summa Technologiae, Pickering mentions that natural adaptive systems being like brains and being able to be utilized for intelligence amplification is the most “amazing idea in the history of cybernetics” (247).[7] Despite its association with the dreaded “synergy” (the original “syn” of Project Cybersyn), Beer’s viable system model never became a management fad (256). Alexander Galloway has recently written here about the “reticular fallacy,” the notion that de-centralized forms of organization are necessarily less repressive than are centralized or hierachical forms. Beer’s viable system model proposes an emergent and non-hierarchical management system that would increase the general “eudemony” (general well-being, another of Beer’s not-quite original neologisms [272]). Beer’s turn towards Tantric mysticism seems somehow inevitable in Pickering’s narrative of his career. The syntegric icosahedron, one of Beer’s late baroque flourishes, reminded me quite a bit of a Paul Laffoley painting. Syntegration as a concept takes reticularity to a level of mysticism rarely achieved by digital utopians. Pickering concludes the chapter on Beer with a discussion of his influence on Brian Eno’s ambient music.

    Laffoley, "The Orgone Motor"
    Paul Laffoley, “The Orgone Motor” (1981). Image source: paullaffoley.net.

    The discussion of Eno chides him for not reading Gordon Pask’s explicitly aesthetic cybernetics (308). Pask is the final cybernetician of Pickering’s study and perhaps the most eccentric. Pickering describes him as a model for Patrick Troughton’s Dr. Who (475n3), and his synaesthetic work in cybernetics with projects like the Musicolor are explicitly theatrical. A theatrical performance that directly incorporates audience feedback into the production, not just at the level of applause or hiss, but in audience interest in a particular character—a kind of choose-your-own adventure theater—was planned with Joan Littlewood (348-49). Pask’s work in interface design has been identified as an influence on hypertext (464n17). A great deal of the chapter on Pask involves his influence on British countercultural arts and architecture movements in the 1960s. Mirowski’s review shortly notes that even the anti-establishment Gordon Pask was funded by the Office of Naval Research for fifteen years (194). Mirowski also accuses Pickering of ignoring the computer as the emblematic cultural artifact of the cybernetic worldview (195). Pask is the strongest example offered of an alternate future of computation and social organization, but it is difficult to imagine his cybernetic present.

    The final chapter of Pickering’s book is entitled “Sketches of Another Future.” What is called “maker culture” combined with the “internet of things” might lead some prognosticators to imagine an increasingly cybernetic digital future. Cybernetic, that is, not in the sense of increasing what Mirowski refers to as the neoliberal “background noise of modern culture” but as a “challenge to the hegemony of modernity” (393). Before reading Pickering’s book, I would have regarded such a prediction with skepticism. I still do, but Pickering has argued that an alternate—and more optimistic—perspective is worth taking seriously.

    _____

    Jonathan Goodwin is Associate Professor of English at the University of Louisiana, Lafayette. He is working on a book about cultural representations of statistics and probability in the twentieth century.

    Back to the essay

    _____

    [1] Wolfram was born in England, though he has lived in the United States since the 1970s. Pickering taught at the University of Illinois while this book was being written, and he mentions having several interviews with Wolfram, whose company Wolfram Research is based in Champaign, Illinois (457n73). Pickering’s discussion of Wolfram’s A New Kind of Science is largely neutral; for a more skeptical view, see Cosma Shalizi’s review.

    [2] Bateson experimented with octopuses, as Pickering describes. Whether Pynchon knew about this, however, remains doubtful. Pickering’s note may also be somewhat facetious.

    [3] See the interview with George Lakoff in Ideology and Linguistic Theory: Noam Chomsky and the Deep Structure Debates, ed. Geoffrey J. Huck and John A. Goldsmith (New York: Routledge, 1995), p. 115. Lakoff’s account of Chomsky’s philosophical justification for his linguistic theories is tendentious; I mention it here because of the strong contrast, even in caricature, with the performative quality of the cybernetic research Pickering describes. (1999).

    [4] Though it is difficult to think of the Santa Fe Institute this way now.

    [5] For a detailed cultural history of Project Cybersyn, see Eden Medina, Cybernetic Revolutionaries: Technology and Politics in Allende’s Chile (MIT Press, 2011). Medina notes that Beer formed the word “algedonic” from two words meaning “pain” and “pleasure,” but the OED notes an example in the same sense from 1894. This citation does not rule out independent coinage, of course. Curiously enough, John Fowles uses the term in The Magus (1966), where it could have easily been derived from Beer.

    [6] Hayek’s name appears neither in the index nor the reference list. It does seem a curious omission in the broader intellectual context of cybernetics.

    [7] Though there is a reference to Lem’s fiction in an endnote (427n25), Summa Technologiae, a visionary exploration of cybernetic philosophy dating from the early 1960s, does not appear in Pickering’s work. A complete English translation only recently appeared, and I know of no evidence that Pickering’s principal figures were influenced by Lem at all. The book, as Pickering’s review acknowledges, is astonishingly prescient and highly recommended for anyone interested in the culture of cybernetics.