then reproduce a text whose translation was one of the events of my life that eventually led me to Islam. My support for the ideas expressed here (which led me to translate the text for my account, which also allowed me to have direct contact with the author of it) was part of a series of searches to find answers in Islam. Today, more than five years after it is released at a forum of experts in technology, an interested reader called me back and reminded me of my defense of the ideas presented here and how, today, I see these same ideas represented in my life as a Muslim. To give just one example, take this apart:
"It is not land or capital that can be totally free of the commodity form, but information. All other forms of property are unique. The property of one excludes, by definition, the property of another. But as property information can be shared without diminishing anything different from their scarcity. The information is that which can escape the commodity form. [...] Expressive policy does not seek to overthrow the society, or reforming its major structures, or to preserve their structure in order to maintain an existing coalition of interests. Seeks to permeate existing states with a new state of existence, spreading the seeds of an alternative practice of everyday life. "McKenzie Wark, Hacker Manifesto.
And precisely, in Islam there is no provision against property privada. Pero el Islam ordena al Musulmán buscar el conocimiento incesantemente, y compartirlo con los demás. Está registrado que el Profeta Mujámmad (que las Bendiciones y la Paz de Dios sean con él) dijo al respecto:
"El conocimiento es mejor que las posesiones, porque el conocimiento te guarda a ti mientras tú guardas las posesiones. El conocimiento gobierna mientras que las posesiones son gobernadas. Las posesiones disminuyen al gastar mientras que el conocimiento se incrementa con ello" (recopilado por Bujari) .
Así es como el Islam establece el fundamento de un nuevo estado de existencia, ordenando el libre flow of knowledge and the dissemination of it through example and teaching practice (knowledge that is not constrained by the academy or for an educational system to service the system) so as to establish a company in which scholars transmitted his knowledge without reserve, and teach godly wisdom at every step, while others seek tirelessly to learn from them and teach others in turn. Thus, the Muslim, as the hacker, the self-questioning and self-analysis, research and discoveries, but with a roadmap that has historically proven to be useful and functional Islamic law. This guide leads to a society in which each member participates in all that relates to him as an individual and as a community (no "representation of the people" but leaders obedient to the divine law that meet the governed, who are providers that such obedience is fulfilled), and in which each believer communicates directly with the Creator (no "representation of God" because there is no clergy). But also, a pluralistic society, unique in history where there has been a true freedom of religion (the Jews and Christians had for 1,000 years of the Caliphate, their own courts, where they were tried under their own laws and not under the law Islam).
Wark, Australian professor of cultural and media studies at Lang College, New School University, and author of several books. For him and many other authors, the economy is based on the idea of \u200b\u200bscarcity, but the information is abundant, cheap, and more than that, is non-rivalizante: if I download the Internet the entire album The Secrets of the Runes, the Therion, I'll have the music for me, but I will not deprive others of having it, for all who wish may download a copy of the musical work. The fact that I take for me does not mean it ceases to be available to others. That is one reason why call 'piracy' to downloads by P2P is an absurdity, the concept of private property in such an environment is blurred.
The wealth of information comes with the digital age, which also appear three classes: Those who Wark called 'vectoriality', also called 'transnational capitalist "by others, which are those with the vectors , ie the routes and networks through which information flows. Another class are the 'pastoral', which are the feudal landowners who have modernized their fiefdoms and thus, have obviated the need for farmers who work the land. And the other are the hackers, as defined in Wark are a class of producers who struggle to liberate to information from the chains of consumerism, and whose scope is virtual. The vectors are those leading this so-called crusade against piracy, which hides behind its screen of "fighting for the rights of authors' interests darker. In this vein, the lawsuits from record labels against users of P2P, Microsoft anti-piracy campaigns, the pressure they are doing oligopolies in the form of lobbying in the European parliament, and negotiations of trade agreements with USA , for approval of software patents in Europe and Latin America, the fees on digital media copied to computers and even digital formats, and disinformation campaign led by the managing bodies of copyright, such as threats in the form of messages "warning" sent by the P2P networks are not only the determined struggle of the class Vector to bring private property information the form of 'intellectual property', which in fact is a term that packs all forms of intellectual production, including culture, to which vectoriality considered only as a commercially sensitive content.
On the other hand, the emergence of Napster, and Napster's response to the attack in the form of new decentralized P2P networks like Gnutella and más adelante, Kazaa, eMule y BitTorrent, son la muestra de la lucha de la clase hacker por liberar a la información del dominio de la clase vectorialista. Esta lucha, según Wark, no obedece a que los hackers quieran cambiar al mundo o que hayan grupos de hackers revolucionarios decididos a derrocar el orden establecido. La lucha por liberar la información es el interés principal de la clase hacker, por la sencilla razón de que los hackers necesitan la libertad de información para existir. Las leyes de propiedad intelectual buscan asfixiar a la clase hacker, restringiendo la información, convirtiéndola en propiedad privada, ahogando así a movimientos como el software libre y la música libre. Los vectorialistas hackers need to innovate, to create, but want them completely dominated, subordinated to strict laws of 'intellectual property'.
From this it follows that software patents (and patents in general) are only one form of oppression against developers who develop the ideas. Large corporations take the ideas developed by hackers and turned into products that are mere commodities. Patents give corporations the ownership of ideas, and the copyright ownership of the products. In this way, corporations dominate the information and vectors, which are its source of power. The hackers, Instead, they need free access to information, not to appropriate it, and it is this need that gives rise to networks for sharing files over P2P: The hacker class does not take possession of information as property, because their interest is not the property passes from the hands of the owners of the means of production information into the hands of those who generate information but to abolish the concept of proprietary information. Thus, not only hackers, but all social classes, even dominant, have free access to the information that flows through P2P networks. This does not mean eliminating the concept of property as such.
for vectors (oligopolies industries and entertainment software, mainly) is a priority to control the P2P networks, because their main interest is to ensure that the information is a property and that such property belongs to them, contrary to the interests hackers, who are complete opposites. Unfortunately, many creators (artists, programmers, etc..) Consider the idea of \u200b\u200binformation as property is fair, that is, fall into the trap of "copyright", arguing that if someone creates something, it should be of property. Actually, copyright does not benefit the authors, but corporations are those that possess them.
The free exchange through P2P and movements by the release of information as free software, contradict the very raison d'etre of oligopolies and entertainment software, and undermine the ideological and conceptual foundations on which are built corporations like Microsoft. It is understood, why the witch hunt against P2P users. Allow large corporations to impose copyright laws and piracy laws that only benefit their interests is to allow information to be converted into a mechanism of oppression. But not enough to release the information, you must release knowledge. And Islam has an entire socio-economic and political designed so that knowledge flows freely.
"Of all His servants, only those endowed with knowledge truly fear God, because only they understand that, indeed, God is Almighty, Forgiving." Qur'an 35:28
said the Messenger God: "Who took a path seeking knowledge, God thus provides a path to paradise." (Compiled by Bukhari)
accompany this text with a video that pretty much sums up the central idea of \u200b\u200bit.
HACKER MANIFESTO [1] (version 4.0)
by McKenzie Wark
Original text in English: http://subsol.c3.hu/ subsol_2/contributors0/warktext.html
English translation: Néstor Pedraza
Demonstration
01. A specter is haunting the world, the specter of abstraction, from which depend the fortunes of states and armies, companies and communities. All contending classes, landowners and peasants, workers and capitalists-reverence with fear of the relentless abstraction of the world from which their fortunes yet depend. All classes except one. The hacker class. [2]
02. Whatever the hacked code, [3] whether it is a programming language, poetic language, math or music, curves or colors, we create the possibility of new things entering the world. Not always great things, even good things, but they are something new. In art, science, philosophy and culture, in any production of knowledge where data can be collected, where you can extract information and where such information is producing new opportunities for the world, there are hackers extracting the new from the old. While hackers create these new worlds, we do not possess. What we create is mortgaged to others and the interests of others, to states and corporations who control the means of creating the worlds we discover themselves. We do not own what we produce - we have.
03. And still do not really know who we are. While we recognize our distinctive existence as a group, as programmers, as artists or writers or scientists or musicians, we rarely see these ways of representing ourselves as mere fragments of a class experience that is still struggling to show itself as it is, as expressions of the process of producing abstraction in the world. Geeks [4] and freaks [5] become what they are negatively, through their exclusion by others, but together they form a class. [6] Hackers are a class, but an abstract class, a case that has yet to hack themselves to express their own existence.
Abstraction
04. Abstraction may be discovered or produced, material or immaterial, but abstraction is what every hack [7] produces and affirms. Abstract is to build a plane on which they can set many possible relations between things that otherwise would be different and would have no connection to each other. Through abstraction, identifies causes and triggers the virtual. The virtual is not just the potential latent in things, is the potential of potential. Hack is to produce or apply abstraction to the information and express the possibility of new worlds.
05. All abstractions are abstractions of nature. Abstract is to express the virtuality of nature, to make known some instance of its manifold possibilities, to extract a relation of a relational infinite possibility. The abstractions trigger the potential of physical things. Moreover, the abstractions depend on something that has an existence independent of physical appearance information. The information is no less real than physical matter, and depends on it for their existence. Because information can not exist in a pure form and intangible, nor can the hacker class. Of necessity it must deal with a ruling class that has the material means of extracting or distributing information, or a productive class that extracts and distributes. Class interest of hackers is to release information about their oppression materials.
06. By extending the abstract Private ownership of information, there was the hacker class as a class. Hackers must sell their capacity for abstraction to the class that owns the means of production, the vector case [8], the ruling class emerging in our time. The class Vector is undertaking an intense effort by hackers to steal their intellectual property. Patents and copyrights all end up in the hands, not their creators, but the vector class has the means to exploit the value of these abstractions. The class strives to monopolize vector abstraction. Hackers find themselves homeless as individuals and as a class. Hackers have been making an ongoing effort against the particular ways in which abstraction is converted into a commodity and private property of the class vector. Hackers are collectively fighting against usury costs that extort vectoriality to provide access to information that hackers collectively produce, but the vectoriality collectively have come to possess. Hackers are recognized as a class that their class interests are better expressed through the struggle, not only to liberate the production of abstraction from the fetters of this or that form of ownership, but by abstracting the form of property itself .
07. What makes them different from our times is that now appears on the horizon the possibility of a free society at the end of the needs, real and imaginary, by an explosion of innovation abstract. Abstraction with the potential to break, once and for all, the shackles that keep hacking [9] tied to class interests outdated and backward. It is a thing of the past, when hackers should be attached to all kinds of world-productive to productive resources and innovative release from the myth of scarcity. "The world is already dreaming of a time whose consciousness must have now to actually live."
Production
08. Production creates all things and all things producers. The production not only creates the object of the production process, but the producer as a subject. [10] The hack is the production yield. The hack produces a production of a new type, which results in a singular and unique product and a singular and unique producer. Every hacker is both producer and product of the hack, and emerges in its singularity as the memory of hacking as a process.
09. Production takes place based on a previous hack that gives the production its formal shape, social, repetitive and reproducible. All production is a formalized and repeated hacking based on their behalf. Produce is to repeat, hacking is a difference.
10. The hack produces surplus [11] both useful and useless, although the utility of any surplus is socially and historically determined. Useful surplus will expand the realm of freedom taken away from the need. Are useless surplus gain freedom itself, the margin of unrestricted free production to produce out of necessity.
11. The production of surplus creates the possibility of extending freedom beyond necessity. But in class society, the surplus production also creates new needs. Class domination turns into the capture of the productive potential of society, and its connection with the production not of freedom, but of the class domination. The ruling class makes the hack to the generation of production methods that can link the growth of class power, and the elimination or marginalization of other forms of hacking. What the productive classes, farmers, workers and hackers "have in common is an interest in the production release of its subordination to the ruling classes, which make the production into production of new needs, making us slaves of goodwill. The elements of a free productivity already in atomized form on the productive classes. What they expect is the release of its virtuality. [12]
Class
12. The class struggle, with its endless setbacks, setbacks and compromises, returns again and again to the unanswered question, own, and the contending classes return again and again with new answers. The working class questioned the need for private property, and the Communist Party rose, saying answer the wishes of the working class. The answer, expressed in the Communist Manifesto, was "to centralize all instruments of production in the hands of the state. " However, making the state monopolized the property, only produced a new ruling class, and a new and more brutal class struggle. But perhaps this was not the final answer, and the course of the class struggle is not over yet. Perhaps there is another class that can put the issue of ownership in a new perspective, and offer new questions to break the monopoly of the ruling classes on the property.
13. There is a dynamic class running every stage of development of the vector world in which we are now. The pastoralist class [13] dispersed the mass of peasants who traditionally worked the land under the yoke of the feudal landlords. Pastoralists supplant the feudal landlords, releasing the productivity of the land they claim as their private property. As new forms of abstraction make it possible to produce profits of the land with fewer and fewer farmers, pastoralists throw them off their land, depriving them of their livelihood. Landless peasants seeking work and a new home in the cities. Here the workers are peasants, where the capital puts them to work in their factories. Capital as property allows the emergence of a class of capitalists who own the means of production, and a class of workers, dispossessed of them, and them. Dispossessed peasants become workers, only to be dispossessed again. Having lost their land, they lose both their culture. Capital in their factories produce not only the necessities of existence, but a way of life that expects its workers to consume. Consumerism takes away the worker the information traditionally transmitted from generation to generation outside the realm of private property as a culture, and replaces it with information as a commodity.
14. Information, like land or capital, becomes a form of ownership is monopolized by a class of vector control so named because the vectors by which information is abstracted and the capitalists control the material means with which goods are produced, and pastoralists the land on which food is produced. Information flows within the working class culture as a social property that belongs to everyone. But when the information becomes a form of private property, workers are dispossessed of it, and should buy back its own owner culture, class Vector. The whole time, time itself becomes a consumer experience.
15. The vectoriality try to break the monopoly that has the capital on processes production, and to make productive assets to the flow of information. The leading corporations divest themselves of their productive capacity, it is no longer a source of power. Its power lies in monopolizing intellectual property, patents and trademarks, and media to play its value-the vectors of communication. The privatization of information becomes a dominant feature, rather than alternative, consumer life. As private property advances from land to capital to information, property itself becomes more abstract. As capital frees land from its holder space, information and free property the capital of their attachment to a particular object.
16. The hacker class, producer of new abstractions, becomes more important to each successive ruling class, as each depends more and more of the information as a resource. The hacker class arises from the transformation of information property, in the form of intellectual property, including patents, trademarks, copyrights and moral rights of authors. The hacker class is the class with the ability to create not only new types of objects and subjects in the world, and new forms of property in which they can be represented, but new kinds of relationships beyond the form of ownership. The hacker class as a class is formed just at the time the freedom from want and class domination appears on the horizon as a possibility.
Property
17. The property is an abstract level in which all things must have a common quality, the quality of property. The land is the primary form of property. Pastoralists acquire the land as private property through the forced displacement of peasants who once shared a portion of it in a public office. The capital is the second property, privatization of productive resources in the form of tools, machinery and construction materials. The capital, unlike land, is in fixed supply or disposal. Can be made and remade, moved, added and dispersed. A degree far greater potential in the world can be issued as a productive resource once the abstract plan property includes both land and capital, this is the 'advantage' of capital.
18. The capitalist class recognizes the value of the hack in the abstract, while the pastoralists were slow to appreciate the productivity that can flow from the application of abstraction to the processes of production. Under the influence of capital, the forms of sanctions state of intellectual property such as patents and copyrights, ensure the independent existence of the hacker as a class, and a flow of scientific and cultural innovations of the things they develop. The information, once it becomes a form of ownership is developed beyond a mere support for capital base becomes a way of accumulation in its own right.
19. The hackers should consider their interests not as owners but as producers, as this is what distinguishes them from the Vector class. Hackers are not limited to own and profit from the ownership of information. Produce new information, and as producers need access to it, free of the absolute domination of the market. Hacking as an experimental activity pure and free, to be released from any restrictions that are not self-imposed. Only with this freedom will develop the means to produce a gain of freedom, and freedom as profit.
20. Private property not only arose in opposition to feudal property, but also to traditional forms of barter, [14] that were an obstacle to increased productivity of the consumer economy. The quality of barter exchange was replaced by the quantitative monetary exchange. Money is the medium through which land, capital, information and work confront each other as abstract entities, reduced to an abstract plane of measurement. Bartering becomes a marginal form of property, seized everywhere for the goods, and become mere consumption. The exchange is marginal, however plays a vital role in strengthening mutual relations and community among people who otherwise could only confront each other as buyers and sellers of goods. As production developed vector, showed the means of renewing the economy of barter. Whenever the vector reached, brings the orbit of consumption. But wherever the vector arrives, it also carries with it the possibility of the relationship of barter.
21. The hacker class has a close affinity with the barter economy. The hacker fight to produce a subjectivity that is qualitative and unique, in part through the act of hacking itself. [15] The barter, exchange quality between individual parts, allowing each party to be recognized as a unique producer and subject of production, rather than as a commodity and targets. Barter expressed in a social and collective subjectivity production output, while the mercantile property represents the producer as an object, a commodity quantifiable like any other, only relative value. The exchange of information does not give space to the debate on information as property, since information need not suffer the artificial shortage in the market once released.
22. Vector class contributed, unwittingly, to the development of the vector space within which the exchange as the property could return, but soon recognized his error. A vector as the economy develops, increasingly takes the form of a social space free and open exchange, and increasingly takes the form of production of goods for private sale. The Vector class can accommodate a range reluctantly information socialized, as the price to pay in a democracy for the greatest of his main interests. But the reality is vector class in barter a threat not only against their benefits against their very existence. Barter is tacit evidence for parasitic and superfluous nature of the vector and class.
Vector
23. In epidemiology, a vector is the particular means by which a given pathogen travels from one population to another. Water is a vector for cholera, bodily fluids for HIV. By extension, a vector can be any means by which information moves. Telegraph, telephone, television, telecommunications: these terms are not only named individual vectors, but a general abstract capacity that they bring to the world and expands. All are forms of telestesia, or distance perception. A particular vector has certain fixed properties of speed, bandwidth, scope and scale, but can be deployed anywhere, at least in principle. The uneven development of vector is a political and economic, not technical.
24. With the commodification of information has its vectorization. Profit from the information requires technologies capable of carrying information across space, but also over time. The file is a vector through time and communication is a vector through space. The vector class itself is as it is in possession of powerful technologies to vectoralized information. The vector class can become repositories of information goods, flows, or vectors themselves. An information repository is an archive, a body of information maintained through time that has lasting value. A flow of information is the ability to extract information from event time value, and distribute it widely and rapidly. A vector is the means of achieving both the timing of a deposit or the spatial distribution of information flow. Generally seeks power vector through the possession of these three aspects.
25. The vector class comes from the illusion of an instantaneous and global plan of calculation and control. But it is the vector class which is to maintain the subjective power of the objective world. The vector itself usurps the role subjective, making it the only repository available to a world that can only be grasped in its commercial form. The kingdom of the vector is one in which everything can be apprehended as an object. The vector is a power over everyone, but that is not distributed evenly. Nothing in vector technology determine their possible use. Everything is determined by technology, is how information is converted into an object.
26. The vector class struggle at every moment to maintain his power on the target vector, but as it continues to benefit from the proliferation of the vector, some of the possibilities beyond control. To market and profit from the traffic information on the vector, should be addressed to some degree to the great mass of the productive classes as subjects, not as commercial objects. The hacker class seeks to liberate the vector of the realm of consumerism, not to make it free indiscriminately, but to submit to the collective development and democratic. The hacker class can trigger the virtuality of the vector only in principle. Depends on an alliance of all the productive classes, making this potential a reality, organized subjectively and using the vectors available for community and become subjects.
Education
27. Education is slavery, chain the mind and becomes a resource for class power. When the ruling class preaches the need for education, they invariably talk about education as needed. Education is not the same as knowledge, nor is the necessary means to acquire knowledge. Education is the organization of knowledge within the constraints of scarcity. Education 'discipline' knowledge, segregating in 'fields' homogeneous adequately addressed by guards 'qualified' in charge of monitoring the representation of the field. One can get an education, like a thing, but one becomes acquainted through a process of transformation. Knowledge as such is only partially captured by education, its practice always eludes and exceeds it.
28. The pastoralist class has resisted any indoctrination than education in obedience. When the required capital 'choice' to do their dirty work, the bulk of education was devoted to hands trained to care for machine tools, and docile bodies to accept the social order in which they were as natural. When the capital required to implement their brains more complex operations and to apply themselves to work to consume their products are required to spend more time in jail for education to be admitted to the ranks of the working class paid.
29. The so-called middle class maintained their privileged access to consumption and security through education, in which they are obliged to invest a substantial portion of their income. But most remain workers, even while working with information and not to cotton or metal. They work in factories, but are trained to see them as offices. Receive a wage of net work, but are trained to view as wages. They wear uniforms, but are trained to see it as a suit. The only difference is that education has taught them to give different names to the instruments of exploitation, and despise those of their own kind they call it differently.
30. Where the capitalist class sees education as a means to an end, the class vector seen as an end in itself. They see the opportunity to make education a profitable industry in itself, based on strengthening intellectual property as a form of private property. For vectors, education, and culture, it's just 'content' to be traded as a commodity.
31. The hacker class has an ambivalent relationship with education. The hacker class desires knowledge, not education. However, the hacker has to be pure freedom and self-knowledge. The hacker expresses knowledge in its virtuality, by producing new abstractions that not necessarily are restricted to the discipline of education and market control. Hacker knowledge implies in practice a policy of free information, free learning, barter as a result of a peer network. Hacker knowledge also implies an ethics of knowledge subject to the clamor of the public interest and free from subordination to commodity production. This puts a hacker in an antagonistic relationship with the capitalist class to fight to make education an induction into wage slavery.
32. Only an intellectual conflict is relevant to the issue of class for hackers: Who owns knowledge? Is it the role of knowledge subjects authorize through education, which is only recognized for his role in an economy to manipulate their authorized representatives as objects? Or is the function of producing knowledge of hacking always different phenomena, whose subjects are none other than themselves, and discover that the objective world has more potential than we think?
Hacking
33. The virtual is the real domain of the hacker. Is what the hacker virtual produces ever new ways of today. For the hacker, which is represented as being real is always partial, limited, perhaps even false. For there is always a potential hacker of possibilities expressed in what is today the addition [16] of the virtual. This is the inexhaustible domain of what is real without being present, it is not but it can be. Hack is to release the virtual into reality, express the difference of the real.
34. Through the application of abstraction, the hacker class produces the possibility of production, the possibility of doing something and the world and live off the surplus produced by the application of abstraction to nature, for any nature. Through the production of new forms of abstraction, the hacker class produces the possibility of future-not just the future, but a infinite set of possible futures, the future itself as virtuality.
35. Under the sanction of law, the hack becomes a finite property, and the hacker class emerges, as all emerging classes unrelated to a form of property. Like all forms of property, intellectual property requires a relationship of scarcity. Assigns a right to property to an owner at the expense of non-owners, in a class of owners at the expense of the dispossessed.
36. By its very nature, the act of hacking is over the ownership limits imposed. New hacks supersede old and devalue the property. Hacking as new information is produced from previously existing information. This makes the hacker class is more interested in the free availability of an exclusive right over it. The intangible nature of information implies that the possession of information by not mean someone else loses it.
37. To the extent that the hack itself is personified in the form of property gives the hacker class interests very different from other classes, classes are exploitative or exploited. The main interest of the hacker class is the free flow of information, which is a prerequisite for the renewed manifestation of the hack. But the class hacker as a class is also interested in the representation of hacking as property, as something that can be derived a source of income, giving the hacker a certain independence from the ruling classes.
38. The nature of the hacker hack generates an identity crisis. The hacker looks for a representation of what is to be hacker in the identities of other classes. Some see themselves as vector, the lack of trading in property. Some are seen as privileged workers in a wage hierarchy. The hacker class produces itself as itself, but not for herself. Has not (yet) aware of their consciousness. Not aware of own virtuality. You must distinguish between their competing interests in the hack, and their collective interest in discovering a relationship between hackers to express an open future and continued.
39. Information wants to be free but is everywhere in chains. The information is the potential of potential. When triggered, it releases the latent capacities of all things and people, objects and subjects. The information is in fact the only potential there to be objects and subjects. It is the medium in which there are now the objects and subjects, and is the medium in which our virtual lives. When information is not free, the class that owns or controls its ability to pour their own interests, away from their inherent potentiality.
40. The information has nothing to do with communication or the media. "We do not lack communication. On the contrary, we have it in abundance. We lack creation. We lack resistance to this. "Information is precisely this resistance, this friction. At the insistence of the class vector, the state recognizes as belonging to any communication, any media product with a minimum degree of recognizable difference in the trade. Where communication requires just the repetition of this difference commercial information is the production of difference of difference.
41. The imprisonment of the free flow of information involves subjecting the world to the interests of those who gain from the lack of information, the class vector. Slavery of information means the enslavement of its producers to the interests of their owners. The hacker class is the key that opens the virtuality of information, but it is the Vector class which owns and controls the means of information production on an industrial scale. Privatising culture, education and communication as commodified content, distorts and deforms its free development, and avoids the concept of freedom of your own self development. While the information remains subject to the property, it is not possible for producers to consider their interests freely, or discover what true freedom of information might have on the world.
42. The free information must be free in all respects-as a backup, as flow and as a vector. The classification of information is the raw material from which history is abstracted. The flow of information is the raw material from which the present is abstracted, a present that is on the horizon line of a cross abstract knowledge history, pointing to a future. Neither the file nor the flow of information, there are no vectors through which can be updated. The spatial and temporal axes of free information should offer more a representation of things, that a thing apart. Must become the means of coordination of the manifestation of a movement, both object and subject, capable of connecting the objective representation of things with the presentation of a subjective action.
43. Not only the information should be free, also the knowledge of how to use it. The information itself is a mere thing. Requires an ability to be active and subjective productive. The information is not free for the purpose of representing the world perfectly, but to express its difference from what it is, and to express the force that transforms the cooperative is as can be. Evidence that a free society is not the freedom to consume information or to produce, or even to implement their potential in the private world of one's choice. Evidence that a free society is the freedom for the collective transformation of the world through abstractions freely chosen and performed.
Representation
44. All representation is false. One similarity necessarily differs from what it represents. If not, would be what it represents, and is not a representation. The false representation is the belief in the possibility of true representation. Criticism is not a solution but the problem itself. Criticism is the representation of an action monitoring, which only serves to maintain the value of the property through the establishment of its own value.
45. The politics of representation is always the policy of the state. The state is simply that monitors the adequacy of the representation of the body it represents. Even in its radical form, the politics of representation provided presupposes an abstract or ideal state would act as guarantor of their elected representatives. He longs for a state that would recognize ethnic or oppressed sexualities, while not desirable for the state, and a state that, in doing so, is not confronted as a manifestation of class interest, but is accepted as the judge of performance.
46. And they are always excluded even in this enlightened state, imaginary, will be those who reject representation, specifically, the hacker class as a class. Hack is to reject the representation, to express things differently. Hack always make a difference, whether a difference tiny, in the production of information. Hacking is disturbing the subject or the subject, somehow transforming the entire production process in which objects and subjects come to be recognized and to others for their performances.
47. The politics of information, knowledge, does not progress through a critical negation of the false representations, but rather a positive politics of virtuality of the event. Inexhaustible potential of the statement is that aspect of the information upon which the class interest of hackers. Hack brings into existence the endless multiplicity of all codes, whether natural or social computer or poetic. But as the act of hacking up both the hacker and the hack, hack does not recognize artificial scarcity, or official license or certification other than policing force which is composed of the tradeoff between these hackers.
48. A policy that embraces its existence as a manifestation, as the difference so, not as a denial, you can escape the state policy. Skip plagiarism representation, refusing to give him what he claims as debt, is to initiate a policy of non-state. A policy that rejects the authority of the state to recognize what a valuable event and what is not. A policy that is always temporary, which is always transformed into something different from itself. Even the useless hacks may come, in their stubbornness, to be valued for the purity of uselessness. There is nothing that can not be valued as a representation. The hack should be always in motion.
49. Everywhere dissatisfaction with representations is extended. Sometimes the way is to break the windows of some shops, others is to break some heads. The so-called "violence" against the state, which rarely reaches more than throwing stones at police, is just the state's desire expressed in his masochistic. While some call for a state that recognizes their representation, others call by a state that the slurry again. No policy is a desire to escape from cultivated within the subject by the educational apparatus.
50. Sometimes it gets to direct democracy as the alternative. But this only changes the time of political representation-puts in the hands of those who want active representation rather than an election. Sometimes what is required of the politics of representation is to recognize a new subject. The racial and gender minorities, prefer to demand the right to representation. But they soon discover the cost. Now they must monitor the media for such representation, and monitor the adherence of its members to it. Even at best, in its most abstract form, on their best behavior, the state multicultural, gender-neutral and blind to color, only handles the value of representation based on a mercantilist. While this is progress, particularly for those oppressed by the failures of the state to recognize their identity as legitimate, it falls short in recognizing expressions of subjectivity that seek to be more than a representation that the state can recognize and that the market can value.
51. But there is something looming on the horizon of the representable. There is a policy of non-representable, a policy of submission of non-negotiable demand. This is a policy that rejects the representation itself, not a policy of rejecting this or that representation. A policy which, although abstract, is not utopian. In its infinite and limitless demand, it may even be the best way to get commitments precisely through its refusal to put a name-or price-to what you want the rebellion.
Rebellion
52. The riots of 1989 are the events that mark our time. What the revolts of 1989 achieved was the overthrow of regimes that fail to recognize the value of the hack, which had deprived not only to hackers, but to its workers and farmers of any increase in goodwill. With your patronage and corruption, bureaucracy and ideology, their police and spies, deprived even their pastoralists and capitalists of innovative transformation and growth.
53. The revolts of 1989 overthrew boredom and necessity. At least for a while. Brought back to the world historical agenda the limitless demand for free expression. At least for a while. Unveiled the latent destiny of world history to express the pure virtuality of transformation. At least for a while before new states joined to themselves and claim to be representations legitimate revolts what they wanted. The revolts of 1989 opened the door to virtual, but the states were grouped around this opening, they closed early. What the revolt was actually able to make the world safe for the power inverter.
54. The so-called anti-globalization protests of the 1990 are a wave caused by the wake of the events of 1989, but a wave that did not know what power actually belonged. This movement of revolt in the overdeveloped world identifies the vector to emerging as a class enemy, but too often left to be captured by the partial and temporary interests of local capitalists and classes pastoralists. It was a rebellion in the state of childhood, which has yet to discover the connection between his unlimited desire and motivation of free expression, and the art of making tactical demands.
55. The class struggle within nations and the imperial struggle between nations has taken shape in two forms of politics. One type of policy is retrograde. Looking back to an imaginary past. Seeks to use national borders as a new wall, a neon screen behind which, unwanted alliances might protect their interests in the name of a glorious past. The other is the progressive political movement. The policy seeks to accelerate movement toward a future unknown. Seeks to use international information flows, marketing or media activism as eclectic to fight for new sources of wealth or freedom to overcome the limitations imposed by national coalitions.
56. None of these policies is to the old notion of left or right, that definitely exceeded the 1989 revolutions. Unifies policy impulses retrograde Luddites [17] on the left with the racist and reactionary impulses of the right in a non-holy alliance against new sources of power. Progressive politics rarely takes the form of an alliance, but two parallel processes is locked in a dialogue of mutual suspicion, in which the liberal forces of the right and the forces of social justice and human rights on the left seek solutions together and transnational non-nationals to unlock the power system still accumulates at the national level.
57. There is a third policy, which remains outside the alliance and the commitments of the post-89. Where retrograde and progressive policies are political representative who agree alliances and interests with added parts, the third policy is a policy of non-state, which seeks to escape from politics as such. A policy of hacking, inventing relationships outside the representation.
58. Expressive politics is a struggle against the same property mercantilist. Expressive politics is the struggle for collectivization of property, as this is still a form of property. Expressive politics is the struggle to free what can be released for both versions of the form mercantilist totalising market form, and its status as a bureaucrat. It is not land or capital that can be totally free of the commodity form, but information. All other forms of property are unique. The property of one excludes, by definition, the property of another. But as property information can be shared without diminishing anything different from their scarcity. The information is that which can escape the commodity form.
59. The policy can be expressed only when a policy of freeing the virtuality of information. To release information of its objectification as a commodity, also released the subjective force of the demonstration. Subject and object known each other beyond the lack of another, by their very desires of others. Expressive policy does not seek to overthrow the society, or reforming its major structures, or to preserve their structure in order to maintain an existing coalition of interests. Seeks to permeate existing states with a new state of existence, spreading the seeds of an alternative practice of everyday life.
---------- NOTES
[1] Hacker understood as passionate person to analyze, solve problems, develop their minds and offer the fruit of their intellectual work for the common good. There is a Latin term or castizo that could be used as a translation. While the word hacker is not included in the dictionary of the English Royal Academy, is expanding its use in the current usual Castilian. Unfortunately, the term is associated with computer experts, and is usually translated as' pirate computer ', which is far from the sense that it acquires in the text. [N. T.]
[2] The hacker class can be seen as part of an intellectual class, is both a kind of production. The hacker and seen, is a kind of worker-philosopher-craftsman result of the digital age. [N. T.]
[3] Hacking involves decoding a code, decipher and to publish it. [N. T.]
[4] Manic computer fans sullen, antisocial and careless in their personal appearance. By extension, everyone absorbed in intellectual work, do not waste time thinking or worrying about the trivial. It is widely believed that all hackers are geeks, but they are only within the first group. [N. T.]
[5] Those who are engaged in violating telephone systems (clone phones, intercept calls, etc.). By extension, any telecommunications expert hacker.
[6] But together form a class. [Taken from version 2.0 of this manifesto, N. T.]
[7] Intellectual work that produces new information, in which abstraction is applied to information. [N. T.]
[8] A class that handles vectors, ie, the systems and networks through which information flows. Leslie Sklair calls transnational capitalist class, consisting of four factions: corporate (corporate executives and their local affiliates), state (bureaucrats and politicians of globalization), technical (professional globalization) and consumer (marketers and media). [The Transnational Capitalist Class and Global Politics, 2002. N. T.]
[9] Hacking understood as the production of abstraction by the hacker class. [N. T.]
[10] Producers goods are also products of their production. But they live their objective existence objectively, as objects, not subjectively, as agents of production. [Taken from version 2.0 of this manifesto, N. T.]
[11] The word surplus (surplus, excess) is used in this text in a broad sense, refers both to the production of something in excess (supply greater than demand) as the production of something that has no application and is to be defined utility (free or non-production based on the need) and products of a production process that can be useful or not. It also refers to the benefit obtained by a production process (gain, monetary or otherwise). In some parts of the text is verified a close relationship between the term used surplus Wark, and Marx's concept of surplus value. In other connotes addition (NAPA). Throughout the text, translated surplus in different ways depending on the context [N. T.]
[12] The vector class knows and does everything possible to reduce consumption productivity, property information, expression representation, nature of need. [Taken from version 2.0 of this manifesto, N. T.]
[13] Basically, what Wark called pastoralists are feudal landlords, landowners, but also have high tech production as land, reaching higher levels of productivity and obviating the need for farmers who work the land. [N. T.]
[14] In the original speaks of 'grant economy' or 'gift' ( gift economy). According to Marilyn Strathern (The gender of the gift, 1988), "in a gift economy, people and things are defined in its interface, the result of work is the production of social relations." This is clearly Barter definition of economic activity (looking builders exchanges as elements of relationships and not simply swap goods. Huprey, Caroline and Stephen Hugh-Jones, Barter, exchange and value, 1996). [N. T.]
[15] A hacker, regardless of their area of \u200b\u200bwork and intellectual development is self-questioning and self-analysis, ie, the hack itself, as part of his passion for research, discover and produce new abstractions. [N. T.]
[16] The surplus of the virtual , which is contained in the virtual world beyond what is real, and offers as a non-cash gain for the hacker. [N. T.]
[17] This refers to the movement of Luddites. Weavers of Nottingham had enjoyed for over 300 years of status and a reward commensurate with the quality of their work. Its average market dominated English and were an important export product. Working independently in their own workshops. However, in the early nineteenth century the industrial revolution, machines replace them. Because of its high cost, the machines were only available to owners of factories. It is said that a man named Ned Ludd broke into one night two machines for manufacturing average. The damage was minor, but in three weeks, more than 200 machines had been damaged by the workers. Although the riots were mainly against the exploitation of workers in British factories, Luddism was consolidated as a movement of opposition to technology, believes that it makes a man lose his creative ability and is a slave to the ways technology. Currently, neoluddistas believe that mankind has become too dependent on technology, particularly computers. [N. T.]
Related Articles
interests and their role in the economy and the life ( http://mensajesenlaruta.blogspot.com/2010/11/los-intereses-y-su-papel-en-la- economia.html ).
Financial System Crisis: Islam is the Alternative ( http://mensajesenlaruta.blogspot.com/2010/02/la-crisis-del-sistema-financiero-el.html ).
"Donations", "condom" and other falsehoods about the alleged "debt" of Haiti ( http://mensajesenlaruta.blogspot.com/2010/03/donaciones-condonaciones-y-otras.html .)
Islam and Real Money ( http://mensajesenlaruta.blogspot.com/2010/03/islam-y-el-dinero-real.html ).
Reading Economics Rodolfo Llinas ( http://mensajesenlaruta.blogspot.com/2009/11/leyendo-la-economia-de-rodolfo-llinas.html ).
The Bible and the Koran Against Poverty and Hunger ( http://mensajesenlaruta.blogspot.com/2009/11/la-biblia-y-el-coran-frente-la-pobreza.html ).
0 comments:
Post a Comment