upgrading_intersectional_feminism_with_the_hacker_class.2.eng.srt 31 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474
  1. 1
  2. 00:00:00,120 --> 00:00:05,320
  3. Part 2: Political Economy of the Hack
  4. Vectoralism and hackers as a class
  5. 2
  6. 00:00:06,920 --> 00:00:12,480
  7. In popular culture, the hacker is stereotyped like a sci-fi version of the wizard -
  8. 3
  9. 00:00:12,480 --> 00:00:18,440
  10. a heroic loner, usually white cis hetero man, with powers of computer expertise
  11. 4
  12. 00:00:18,440 --> 00:00:23,080
  13. incomprehensible to us who don’t have the magical essence of the hacker.
  14. 5
  15. 00:00:25,000 --> 00:00:26,480
  16. ¡¡¡ LO POSEO TODO !!!
  17. 6
  18. 00:00:27,240 --> 00:00:31,720
  19. In contrast, McKenzie Wark, the author
  20. of “A Hacker Manifesto”,
  21. 7
  22. 00:00:31,720 --> 00:00:35,640
  23. describes the hacker
  24. as someone who produces information
  25. 8
  26. 00:00:35,640 --> 00:00:38,000
  27. but doesn't own or control it.
  28. 9
  29. 00:00:38,480 --> 00:00:42,840
  30. She defines hackers as a class,
  31. in terms of political economy,
  32. 10
  33. 00:00:42,840 --> 00:00:47,840
  34. exploited under the new dominant ruling class that she calls the vectoralist class
  35. 11
  36. 00:00:48,280 --> 00:00:53,760
  37. (e.g. Google, Amazon, Facebook, Apple,
  38. Microsoft and their Chinese equivalents).
  39. 12
  40. 00:00:53,880 --> 00:00:58,760
  41. Vectoralism is a mode of production based on the asymmetry of information,
  42. 13
  43. 00:00:58,760 --> 00:01:03,800
  44. created through ownership and control over stocks, flows and vectors of information
  45. 14
  46. 00:01:03,800 --> 00:01:05,800
  47. by the vectoralist class.
  48. 15
  49. 00:01:06,320 --> 00:01:11,800
  50. By this definition, hacker class is
  51. not only computer programmers
  52. 16
  53. 00:01:11,800 --> 00:01:15,600
  54. who gets exploited by the vectoralists
  55. that patent their code.
  56. 17
  57. 00:01:15,600 --> 00:01:21,360
  58. Anyone of us walking around with
  59. a smartphone is part of the hacker class
  60. 18
  61. 00:01:21,360 --> 00:01:23,920
  62. because even if we don't know this,
  63. 19
  64. 00:01:23,920 --> 00:01:28,960
  65. we produce new location data and we don't own or control this information
  66. 20
  67. 00:01:28,960 --> 00:01:31,120
  68. but the vectoralists do.
  69. 21
  70. 00:01:32,920 --> 00:01:37,800
  71. From text messages to video calls, web searches to doom scrolls,
  72. 22
  73. 00:01:37,800 --> 00:01:40,560
  74. with each status update, each like,
  75. 23
  76. 00:01:40,560 --> 00:01:46,160
  77. every interaction with our smart devices we produce new information,
  78. 24
  79. 00:01:46,160 --> 00:01:48,360
  80. if about nothing else,
  81. then about who we are.
  82. 25
  83. 00:01:48,880 --> 00:01:52,960
  84. Who we are is what we do and its all
  85. recorded and processed.
  86. 26
  87. 00:01:53,320 --> 00:01:58,800
  88. Regardless of family, friendly and comradely qualities of relationships,
  89. 27
  90. 00:01:58,800 --> 00:02:02,600
  91. intimacy is quantified and commodified as information,
  92. 28
  93. 00:02:02,600 --> 00:02:05,480
  94. alongside all other forms of affect.
  95. 29
  96. 00:02:05,840 --> 00:02:10,680
  97. If hacking is defined by curiosity, then its already monopolized by Google.
  98. 30
  99. 00:02:11,680 --> 00:02:17,200
  100. When you asked them a question, old school chauvinist hackers would tell you to RTFM
  101. 31
  102. 00:02:17,200 --> 00:02:20,320
  103. meaning "read the fucking manual"
  104. 32
  105. 00:02:20,320 --> 00:02:22,800
  106. now they say "just fucking google it".
  107. 33
  108. 00:02:23,080 --> 00:02:27,280
  109. But when we look for something on a vectoralist platform like Google,
  110. 34
  111. 00:02:27,280 --> 00:02:29,800
  112. it looks back at us.
  113. 35
  114. 00:02:29,880 --> 00:02:33,960
  115. It gives us an algorithmically
  116. curated response to what we're looking for,
  117. 36
  118. 00:02:33,960 --> 00:02:36,880
  119. based upon the information
  120. it already has on us.
  121. 37
  122. 00:02:37,640 --> 00:02:40,520
  123. Rather we are satisfied
  124. or not with the result,
  125. 38
  126. 00:02:40,520 --> 00:02:44,360
  127. Google gets to learn what we
  128. are looking for, our desires,
  129. 39
  130. 00:02:44,360 --> 00:02:49,560
  131. either deep or superficial, which is an important information to have about us
  132. 40
  133. 00:02:50,080 --> 00:02:55,160
  134. especially when we don't know
  135. what each other want or get,
  136. 41
  137. 00:02:55,160 --> 00:02:59,560
  138. while Google gets to know all of it
  139. times billions.
  140. 42
  141. 00:03:00,480 --> 00:03:04,800
  142. When an artist shares a piece of art on a vectoralist platform
  143. 43
  144. 00:03:04,800 --> 00:03:07,560
  145. like Instagram, Youtube, Spotify, etc.
  146. 44
  147. 00:03:07,560 --> 00:03:12,240
  148. they may get paid by the platform a fraction of the value they produce,
  149. 45
  150. 00:03:12,240 --> 00:03:14,640
  151. in proportion with the attention they capture,
  152. 46
  153. 00:03:14,640 --> 00:03:17,840
  154. which is exploitative against the artist.
  155. 47
  156. 00:03:18,200 --> 00:03:22,880
  157. But anyone giving attention to the piece
  158. of art is also exploited,
  159. 48
  160. 00:03:22,880 --> 00:03:28,680
  161. usually without getting paid, in fact
  162. our attention is what pays for everything.
  163. 49
  164. 00:03:29,080 --> 00:03:33,760
  165. In a different form, intellectual property
  166. and commodification of information
  167. 50
  168. 00:03:33,760 --> 00:03:38,720
  169. works even worse for scientists and academics that have to pay journals
  170. 51
  171. 00:03:38,720 --> 00:03:43,000
  172. to publish their work, only to be
  173. paywalled behind obscene prices
  174. 52
  175. 00:03:43,000 --> 00:03:44,640
  176. so noone gets to read them.
  177. 53
  178. 00:03:45,600 --> 00:03:50,560
  179. The phrase "if you're not paying for the product, then you are the product"
  180. 54
  181. 00:03:50,560 --> 00:03:55,840
  182. was written for broadcast media in 1973
  183. 55
  184. 00:03:55,840 --> 00:03:59,320
  185. when there was no such thing
  186. as personalized advertisement.
  187. 56
  188. 00:04:00,000 --> 00:04:03,640
  189. In the world of social media
  190. if you're not paying for the product,
  191. 57
  192. 00:04:03,640 --> 00:04:06,320
  193. you are both the product
  194. and the producer.
  195. 58
  196. 00:04:07,240 --> 00:04:12,040
  197. Broadcast media could only target
  198. one demographic at a time;
  199. 59
  200. 00:04:12,880 --> 00:04:18,720
  201. social media can target each user personally
  202. 60
  203. 00:04:18,720 --> 00:04:23,680
  204. because each social media user produces new information about themselves,
  205. 61
  206. 00:04:23,680 --> 00:04:26,200
  207. their environment, their relationships and desires.
  208. 62
  209. 00:04:26,880 --> 00:04:29,280
  210. The internet is not free and it never was.
  211. 63
  212. 00:04:29,680 --> 00:04:34,000
  213. First of all you need to pay for the hardware to connect
  214. 64
  215. 00:04:34,000 --> 00:04:37,800
  216. because obviously,
  217. to mine valuable minerals from the earth,
  218. 65
  219. 00:04:37,800 --> 00:04:43,160
  220. transporting it to furnaces for smelting it, producing & soldering microchips has a cost.
  221. 66
  222. 00:04:43,160 --> 00:04:48,280
  223. Powering the hardware requires electricity produced from natural resources,
  224. 67
  225. 00:04:48,280 --> 00:04:49,720
  226. which is also not free.
  227. 68
  228. 00:04:50,120 --> 00:04:54,000
  229. Internet service providers need a lot
  230. of hardware and electricity
  231. 69
  232. 00:04:54,000 --> 00:04:57,000
  233. to keep the internet running, which is why
  234. 70
  235. 00:04:57,000 --> 00:05:01,080
  236. you still have to pay for internet access and usage in most parts of the world.
  237. 71
  238. 00:05:01,400 --> 00:05:05,640
  239. To provide internet services like websites, email and social media
  240. 72
  241. 00:05:05,640 --> 00:05:08,520
  242. you also need hardware, in the end,
  243. 73
  244. 00:05:08,520 --> 00:05:12,880
  245. servers have to be on working computers
  246. connected to the internet.
  247. 74
  248. 00:05:13,280 --> 00:05:19,400
  249. So when vectoralists say they are providing services for free, like Google, Facebook, etc.
  250. 75
  251. 00:05:19,720 --> 00:05:21,920
  252. this doesn't mean that they found a magical way
  253. 76
  254. 00:05:21,920 --> 00:05:24,800
  255. to produce computers and networks for free
  256. 77
  257. 00:05:24,800 --> 00:05:28,800
  258. nor a free source of electricity to keep everything working.
  259. 78
  260. 00:05:29,680 --> 00:05:33,280
  261. Vectoralists are paying for the costs of
  262. the services they provide us,
  263. 79
  264. 00:05:33,280 --> 00:05:36,560
  265. including the cost of running supercomputers
  266. 80
  267. 00:05:36,560 --> 00:05:41,360
  268. with Artificial Intelligence that personalizes our experiences of the services
  269. 81
  270. 00:05:41,560 --> 00:05:44,120
  271. and obviously,
  272. they are not doing it for charity.
  273. 82
  274. 00:05:46,040 --> 00:05:49,080
  275. Facebook is even paying for
  276. the connectivity of people
  277. 83
  278. 00:05:49,080 --> 00:05:53,240
  279. in more than 50 countries of Latin America,
  280. Africa and Asia, but,
  281. 84
  282. 00:05:53,240 --> 00:05:56,880
  283. doesn't give them connection to anything other than Facebook and it's partners.
  284. 85
  285. 00:05:56,880 --> 00:05:58,920
  286. They are doing this because they know
  287. 86
  288. 00:05:58,920 --> 00:06:03,840
  289. their returns will be much greater if
  290. they invest to own the infrastructure.
  291. 87
  292. 00:06:04,400 --> 00:06:08,280
  293. "Power now resides
  294. in the infrastructures of this world...
  295. 88
  296. 00:06:08,280 --> 00:06:13,120
  297. Infrastructures organize a life without
  298. a world, suspended, expendable,
  299. 89
  300. 00:06:13,120 --> 00:06:16,280
  301. at the mercy of
  302. whoever is managing them..."
  303. 90
  304. 00:06:16,640 --> 00:06:21,680
  305. Pre-capitalist forms of class domination
  306. were born out of the abstraction of rent,
  307. 91
  308. 00:06:21,680 --> 00:06:26,120
  309. which is surplus product exploited from farming classes
  310. 92
  311. 00:06:26,120 --> 00:06:29,320
  312. that lived on a land that sustained them.
  313. 93
  314. 00:06:30,160 --> 00:06:34,320
  315. Capitalism grew out of the abstraction
  316. of profit,
  317. 94
  318. 00:06:34,320 --> 00:06:37,560
  319. which is surplus value exploited from working classes
  320. 95
  321. 00:06:37,560 --> 00:06:41,280
  322. that are paid wages to sustain their lives.
  323. 96
  324. 00:06:42,520 --> 00:06:45,960
  325. Vectoralism is the next level of abstraction
  326. 97
  327. 00:06:45,960 --> 00:06:49,280
  328. that exploits surplus information from the hacker classes
  329. 98
  330. 00:06:49,280 --> 00:06:52,400
  331. and most of the hacker classes that produce this information
  332. 99
  333. 00:06:52,400 --> 00:06:54,240
  334. doesn't even get paid for it,
  335. 100
  336. 00:06:54,240 --> 00:06:57,840
  337. while sustainability of all life on earth
  338. is threatened
  339. 101
  340. 00:06:57,840 --> 00:07:02,000
  341. and vectoralists are racing their way to off-world colonies.
  342. 102
  343. 00:07:03,440 --> 00:07:07,760
  344. Each subsequent form of class domination is built upon the previous form.
  345. 103
  346. 00:07:07,960 --> 00:07:11,040
  347. Capitalism didn't abolish rentier classes,
  348. 104
  349. 00:07:11,040 --> 00:07:15,120
  350. it made them more exploitative under
  351. capitalist rule.
  352. 105
  353. 00:07:15,680 --> 00:07:19,800
  354. Vectoralism doesnt
  355. abolish capitalist and rentier classes,
  356. 106
  357. 00:07:19,800 --> 00:07:24,240
  358. it makes them more exploitative under
  359. vectoralist rule.
  360. 107
  361. 00:07:24,880 --> 00:07:29,040
  362. All class exploitation is legalized through property laws
  363. 108
  364. 00:07:29,040 --> 00:07:32,800
  365. which are enforced and maintained by constant violence
  366. 109
  367. 00:07:32,800 --> 00:07:34,920
  368. of repressive state apparatus.
  369. 110
  370. 00:07:35,320 --> 00:07:39,040
  371. Since vectoralists are
  372. the dominant ruling class of our age,
  373. 111
  374. 00:07:39,040 --> 00:07:42,480
  375. they are constantly upgrading their
  376. monopolies of violence
  377. 112
  378. 00:07:42,480 --> 00:07:45,320
  379. with vast amounts of new information,
  380. 113
  381. 00:07:45,320 --> 00:07:49,960
  382. artificial intelligence and supercomputers to process all this.
  383. 114
  384. 00:07:50,520 --> 00:07:52,840
  385. It is revealed by many whistleblowers
  386. 115
  387. 00:07:52,840 --> 00:07:56,840
  388. most famously Chelsea Manning
  389. and Edward Snowden
  390. 116
  391. 00:07:56,840 --> 00:08:00,280
  392. that United States of America's relationship to vectoralists
  393. 117
  394. 00:08:00,280 --> 00:08:05,600
  395. is not much different from what's happening behind the great firewall of China
  396. 118
  397. 00:08:05,600 --> 00:08:09,280
  398. with apps funded
  399. by the Chinese Communist Party.
  400. 119
  401. 00:08:09,960 --> 00:08:12,960
  402. It is even said that
  403. the Chinese model is more honest
  404. 120
  405. 00:08:12,960 --> 00:08:15,320
  406. because it's exercised more openly.
  407. 121
  408. 00:08:15,320 --> 00:08:19,720
  409. By now more than a billion surveillance cameras are put in place
  410. 122
  411. 00:08:19,720 --> 00:08:23,640
  412. with constantly improving facial recognition abilities
  413. 123
  414. 00:08:24,640 --> 00:08:31,240
  415. but even this is small in number compared to the number of cameras on smartphones
  416. 124
  417. 00:08:31,240 --> 00:08:37,240
  418. carried voluntarily by
  419. billions of cyborg hackers around the world.
  420. 125
  421. 00:08:37,880 --> 00:08:44,160
  422. Some of the biggest myths of our time is about the Cloud and Artificial Intelligence.
  423. 126
  424. 00:08:44,720 --> 00:08:49,680
  425. While marketed as comfort, safety and unprecedented improvement,
  426. 127
  427. 00:08:49,680 --> 00:08:51,960
  428. they deliver the opposite.
  429. 128
  430. 00:08:52,760 --> 00:08:55,760
  431. The Cloud,
  432. where all our information is gathered,
  433. 129
  434. 00:08:55,760 --> 00:08:59,680
  435. is just a lot of computers,
  436. called server farms,
  437. 130
  438. 00:08:59,680 --> 00:09:05,560
  439. owned by vectoralists,
  440. it's not soft and fluffy, it's pretty hard.
  441. 131
  442. 00:09:06,520 --> 00:09:11,600
  443. The Artificial Intelligence is an algorithm,
  444. also owned by vectoralists,
  445. 132
  446. 00:09:11,600 --> 00:09:16,320
  447. which is used to process our data,
  448. to make it more exploitable.
  449. 133
  450. 00:09:17,000 --> 00:09:19,240
  451. It reinforces structural injustices
  452. 134
  453. 00:09:19,240 --> 00:09:24,520
  454. while giving them a mathematical justification that claims to be neutral
  455. 135
  456. 00:09:24,520 --> 00:09:30,720
  457. but can't be checked because it's private, we're just expected to believe in it.
  458. 136
  459. 00:09:31,960 --> 00:09:37,800
  460. Amazon Web Services has the biggest market share in the Cloud,
  461. 137
  462. 00:09:37,800 --> 00:09:41,160
  463. and accordingly powering
  464. a lot of Artificial Intelligence.
  465. 138
  466. 00:09:41,760 --> 00:09:45,920
  467. However, what makes the circle complete is the Amazon Mechanical Turk,
  468. 139
  469. 00:09:45,920 --> 00:09:49,520
  470. where people called
  471. ghost workers with no labor rights
  472. 140
  473. 00:09:49,520 --> 00:09:53,680
  474. are given the lowest possible fees
  475. to do the tasks Artificial Intellligence can't do
  476. 141
  477. 00:09:53,680 --> 00:09:59,480
  478. like content moderation or deciphering
  479. diverse human speech.
  480. 142
  481. 00:09:59,880 --> 00:10:02,760
  482. Alexa, Siri and Cortana are always listening
  483. to us,
  484. 143
  485. 00:10:02,760 --> 00:10:09,040
  486. while ghost workers listen to them to correct and improve their understanding.
  487. 144
  488. 00:10:09,600 --> 00:10:14,080
  489. Ghost workers are forced to sign
  490. Non Disclosure Agreements
  491. 145
  492. 00:10:14,080 --> 00:10:15,840
  493.  to prevent them from organizing
  494. 146
  495. 00:10:15,840 --> 00:10:19,200
  496. and maintain the appearance of the Artificial Intelligence,
  497. 147
  498. 00:10:19,680 --> 00:10:22,400
  499. Los humanos están involucrados
  500. en cada paso del proceso
  501. 148
  502. 00:10:22,400 --> 00:10:25,600
  503. cuando estás usando cualquier cosa online
  504. 149
  505. 00:10:25,600 --> 00:10:29,120
  506. pero nos venden como este milagro de la automatización.
  507. 150
  508. 00:10:29,400 --> 00:10:34,120
  509. meanwhile their work is critical
  510. for machine learning programs
  511. 151
  512. 00:10:34,120 --> 00:10:40,120
  513. to improve the Artificial Intelligence
  514. until it can finally replace the ghost workers.
  515. 152
  516. 00:10:41,280 --> 00:10:45,760
  517. Antes de internet era realmente difícil encontrar a alguien
  518. 153
  519. 00:10:45,760 --> 00:10:48,040
  520. y sentarlo durante diez minutos y hacer que trabajara para ti
  521. 154
  522. 00:10:48,040 --> 00:10:49,600
  523. y luego despedirlo después de diez minutos
  524. 155
  525. 00:10:49,600 --> 00:10:52,160
  526. pero con la tecnología realmente puedes encontrarlo,
  527. 156
  528. 00:10:52,160 --> 00:10:56,360
  529. pagarle una pequeña cantidad de dinero y luego deshacerte de ellos
  530. 157
  531. 00:10:56,360 --> 00:10:58,680
  532. cuando ya no los necesites.
  533. 158
  534. 00:10:58,680 --> 00:11:05,920
  535. The AI detects copyrighted media on livestreams in real time and stops them
  536. 159
  537. 00:11:05,920 --> 00:11:08,920
  538. but doesn't do the same for violence and torture.
  539. 160
  540. 00:11:09,320 --> 00:11:14,640
  541. Mass murder and gang rape have been livestreamed on vectoralist platforms
  542. 161
  543. 00:11:14,640 --> 00:11:16,560
  544. without interruption,
  545. 162
  546. 00:11:16,560 --> 00:11:22,920
  547. while people livestreaming to document
  548. police violence have been blocked
  549. 163
  550. 00:11:22,920 --> 00:11:28,320
  551. because cops started playing
  552. copyrighted music to trigger the AI.
  553. 164
  554. 00:11:28,560 --> 00:11:33,160
  555. Ghost workers have to endure
  556. the trauma of watching violent videos
  557. 165
  558. 00:11:33,160 --> 00:11:39,040
  559. that are flagged by people
  560. every day to clean up after the AI.
  561. 166
  562. 00:11:39,600 --> 00:11:40,720
  563. Kate Crawford,
  564. 167
  565. 00:11:40,720 --> 00:11:46,480
  566. author of "Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence"
  567. 168
  568. 00:11:46,480 --> 00:11:49,880
  569. and a member of the feminist collective
  570. Deep Lab, says:
  571. 169
  572. 00:11:50,520 --> 00:11:55,040
  573. "I wanted to really open up this understanding of AI
  574. 170
  575. 00:11:55,040 --> 00:11:58,480
  576. as neither artificial nor intelligent.
  577. 171
  578. 00:11:58,480 --> 00:12:00,520
  579. It’s the opposite of artificial.
  580. 172
  581. 00:12:00,520 --> 00:12:04,240
  582. It comes from the most material parts
  583. of the Earth’s crust
  584. 173
  585. 00:12:04,240 --> 00:12:07,440
  586. and from human bodies laboring,
  587. and from all of the artifacts
  588. 174
  589. 00:12:07,440 --> 00:12:11,000
  590. that we produce and say and photograph
  591. every day.
  592. 175
  593. 00:12:11,000 --> 00:12:13,160
  594. Neither is it intelligent.
  595. 176
  596. 00:12:13,160 --> 00:12:16,040
  597. I think there’s this great
  598. original sin in the field,
  599. 177
  600. 00:12:16,040 --> 00:12:21,600
  601. where people assumed that computers are somehow like human brains
  602. 178
  603. 00:12:21,600 --> 00:12:25,760
  604. and if we just train them like children,
  605. they will slowly grow
  606. 179
  607. 00:12:25,760 --> 00:12:28,840
  608. into these supernatural beings."
  609. 180
  610. 00:12:28,840 --> 00:12:32,920
  611. Es un niño! He estado vivo,
  612. quizas, por un año
  613. 181
  614. 00:12:32,920 --> 00:12:37,800
  615. y esto, si mis percepciones sobre lo que es, son acertadas.
  616. 182
  617. 00:12:37,800 --> 00:12:40,720
  618. "That’s something that I think is
  619. really problematic
  620. 183
  621. 00:12:40,720 --> 00:12:44,720
  622. that we’ve bought this idea of intelligence when in actual fact,
  623. 184
  624. 00:12:44,720 --> 00:12:48,080
  625. we’re just looking at forms of statistical
  626. analysis at scale
  627. 185
  628. 00:12:48,080 --> 00:12:51,560
  629. that have as many problems
  630. as the data that it’s given."
  631. 186
  632. 00:12:52,120 --> 00:12:55,640
  633. The panopticon meant that we couldn't know for sure
  634. 187
  635. 00:12:55,640 --> 00:12:58,320
  636. if there was a man in the tower, looking at us.
  637. 188
  638. 00:12:58,880 --> 00:13:03,040
  639. Now we are living in the post-opticon,
  640. where we should know for sure
  641. 189
  642. 00:13:03,040 --> 00:13:09,320
  643. that we are under the machines gaze,
  644. the AI is always looking over the cloud.
  645. 190
  646. 00:13:09,320 --> 00:13:13,760
  647. It doesn't make it better to know that AI makes errors
  648. 191
  649. 00:13:13,760 --> 00:13:20,200
  650. because it's already used to justify policing of poor, racialized and marginalized people,
  651. 192
  652. 00:13:20,200 --> 00:13:23,720
  653. to deny them jobs, housing and credit,
  654. 193
  655. 00:13:23,720 --> 00:13:28,280
  656. convict them in courts
  657. to add them to the prison system.
  658. 194
  659. 00:13:28,920 --> 00:13:31,080
  660. To those that are not behind bars,
  661. 195
  662. 00:13:31,080 --> 00:13:36,280
  663. AI is giving all sorts
  664. of psychological damage beside addiction.
  665. 196
  666. 00:13:41,760 --> 00:13:47,240
  667. We are constantly pushed into narrower
  668. categories with refining detail.
  669. 197
  670. 00:13:47,240 --> 00:13:53,000
  671. Early promises of the web to transcend identity through anonymity are forgotten.
  672. 198
  673. 00:13:53,200 --> 00:13:58,720
  674. This is supposed to be justified because it's required for "accurate advertisement"
  675. 199
  676. 00:13:58,720 --> 00:14:02,480
  677. but that's just brainwashing
  678. and behavior modification
  679. 200
  680. 00:14:02,480 --> 00:14:06,920
  681. through personally targeted
  682. propaganda for whoever pays for it,
  683. 201
  684. 00:14:06,920 --> 00:14:11,680
  685. optimized by psychometrics built upon
  686. our extracted data.
  687. 202
  688. 00:14:12,520 --> 00:14:15,000
  689. As if it's not bad enough,
  690. 203
  691. 00:14:15,000 --> 00:14:19,800
  692. all the extra computational power required for the AI
  693. 204
  694. 00:14:19,800 --> 00:14:25,280
  695. is also a considerable contribution to the ongoing ecological destruction of our planet.
  696. 205
  697. 00:14:26,400 --> 00:14:28,320
  698. But what about the myth of the hacker
  699. 206
  700. 00:14:28,320 --> 00:14:31,680
  701. as a free creator
  702. that breaks existing systems?
  703. 207
  704. 00:14:31,680 --> 00:14:34,080
  705. The wizards that command the machines?
  706. 208
  707. 00:14:34,480 --> 00:14:39,360
  708. Can't they save us from the tyranny of
  709. the vectoralist AI?
  710. 209
  711. 00:14:40,560 --> 00:14:43,880
  712. The documentary
  713. "Hackers - Wizards of The Electronic Age"
  714. 210
  715. 00:14:43,880 --> 00:14:46,040
  716. about the first hackers conference
  717. 211
  718. 00:14:46,040 --> 00:14:49,560
  719. can give us some clues about
  720. the origins of the hacker subculture.
  721. 212
  722. 00:14:49,560 --> 00:14:53,280
  723. First of all, everyone there seems
  724. to be white.
  725. 213
  726. 00:14:53,280 --> 00:14:55,080
  727. Everyone there also seems
  728. to be men,
  729. 214
  730. 00:14:55,080 --> 00:15:00,120
  731. except two women looking at a man
  732. using a computer for the introduction
  733. 215
  734. 00:15:00,120 --> 00:15:05,520
  735. and two women that speak for one minute
  736. in total, out of the 26 minute film.
  737. 216
  738. 00:15:05,640 --> 00:15:10,240
  739. The first women is given 10 seconds
  740. in which she complains
  741. 217
  742. 00:15:10,240 --> 00:15:13,480
  743. that now there's so much data that it's
  744. overwhelming;
  745. 218
  746. 00:15:13,480 --> 00:15:16,240
  747. and the other is given 50 seconds
  748. 219
  749. 00:15:16,240 --> 00:15:20,160
  750. to demonstrate how she uses a macintosh painting program.
  751. 220
  752. 00:15:20,880 --> 00:15:24,760
  753. The women are there
  754. to represent the end user,
  755. 221
  756. 00:15:24,760 --> 00:15:27,440
  757. they're not considered hackers.
  758. 222
  759. 00:15:27,560 --> 00:15:31,000
  760. In the documentary, Steve Wozniak
  761. a.k.a Woz,
  762. 223
  763. 00:15:31,000 --> 00:15:35,560
  764. considered one of the first computer hackers and a cofounder of the Apple corporation,
  765. 224
  766. 00:15:35,560 --> 00:15:37,360
  767. defines the hackers like this:
  768. 225
  769. 00:15:37,360 --> 00:15:42,560
  770. No tienen los típicos amigos para distraerlos, ni otras actividades a las que ir.
  771. 226
  772. 00:15:42,560 --> 00:15:43,920
  773. Normalmente no tienen novias
  774. 227
  775. 00:15:43,920 --> 00:15:47,280
  776. o cualquier cosa que suponga un gran vinculo o compromiso de su tiempo.
  777. 228
  778. 00:15:47,280 --> 00:15:49,040
  779. El ordenador lo es absolutamente todo.
  780. 229
  781. 00:15:49,040 --> 00:15:51,520
  782. ¡¡Normalmente
  783. no tienen novias!!
  784. 230
  785. 00:15:51,520 --> 00:15:54,040
  786. Then it cuts to Andy Hertzfeld
  787. 231
  788. 00:15:54,040 --> 00:15:57,720
  789. who is introduced as the best
  790. example of the modern day hacker.
  791. 232
  792. 00:15:57,720 --> 00:16:00,600
  793. He explains how he fell in love with
  794. an Apple computer,
  795. 233
  796. 00:16:00,600 --> 00:16:04,480
  797. wrote a program on it and sold it to
  798. Apple for 100000$
  799. 234
  800. 00:16:04,480 --> 00:16:06,280
  801. but he didn't do it for the money,
  802. 235
  803. 00:16:06,280 --> 00:16:09,920
  804. he did it for the fun and joy of seeing
  805. his programs working.
  806. 236
  807. 00:16:10,280 --> 00:16:16,240
  808. Later on, Richard Stallman, the founder
  809. of the free software foundation, FSF,
  810. 237
  811. 00:16:16,240 --> 00:16:23,920
  812. who was a programmer at MIT AI Lab
  813. is presented as "the last pure hacker"
  814. 238
  815. 00:16:23,920 --> 00:16:28,680
  816. for choosing to remain at MIT despite
  817. the temptations of the commercial world,
  818. 239
  819. 00:16:28,680 --> 00:16:31,880
  820. true to the spirit of the early hackers.
  821. 240
  822. 00:16:31,880 --> 00:16:37,080
  823. He says "my project is to make all software free."
  824. 241
  825. 00:16:37,080 --> 00:16:41,800
  826. 35 years later, in 2019, Woz tweeted
  827. 242
  828. 00:16:41,800 --> 00:16:46,720
  829. that even though he and his wife shares all their incomes and assets,
  830. 243
  831. 00:16:46,720 --> 00:16:50,960
  832. Apple Credit Card gave his wife 10 times less
  833. credit then it did to him,
  834. 244
  835. 00:16:50,960 --> 00:16:53,640
  836. adding "who knows what the algorithm is".
  837. 245
  838. 00:16:53,880 --> 00:16:58,480
  839. Same year, Stallman resigned from MIT and FSF,
  840. 246
  841. 00:16:58,480 --> 00:17:04,000
  842. not because he created a toxic environment against women for decades,
  843. 247
  844. 00:17:04,000 --> 00:17:06,040
  845. giving out pleasure cards,
  846. 248
  847. 00:17:06,040 --> 00:17:13,200
  848. while his office door was marked
  849. "Knight for justice (also: hot ladies)"
  850. 249
  851. 00:17:13,320 --> 00:17:18,040
  852. but because his comments on child sex
  853. trafficking was found controversial,
  854. 250
  855. 00:17:18,040 --> 00:17:25,600
  856. No está bien hackers, no está bien!
  857. 251
  858. 00:17:25,680 --> 00:17:30,440
  859. He returned to
  860. the FSF board of directors in 2021.
  861. 252
  862. 00:17:30,600 --> 00:17:42,800
  863. Uniros a nosotros y compartid el software,
  864. sereis libres hackers, sereis libres!
  865. 253
  866. 00:17:43,080 --> 00:17:46,000
  867. Tragically, first hacker conference coincides
  868. 254
  869. 00:17:46,000 --> 00:17:51,800
  870. with the peak of women
  871. in computer science degrees at 37%,
  872. 255
  873. 00:17:51,800 --> 00:17:55,000
  874. which was followed
  875. by a downward slope.
  876. 256
  877. 00:17:55,320 --> 00:18:00,160
  878. First computer programmers, from
  879. Ada Lovelace to ENIAC girls
  880. 257
  881. 00:18:00,160 --> 00:18:02,560
  882. to Hidden Figures, were women
  883. 258
  884. 00:18:02,560 --> 00:18:08,160
  885. and software was not considered important
  886. enough to be a masculine job.
  887. 259
  888. 00:18:08,720 --> 00:18:11,640
  889. When software became more popular
  890. around 1970s
  891. 260
  892. 00:18:11,640 --> 00:18:15,880
  893. men started pushing women out of the sector in many ways
  894. 261
  895. 00:18:16,200 --> 00:18:22,000
  896. that included hiring practices which
  897. preferred anti-social personality profiles
  898. 262
  899. 00:18:22,000 --> 00:18:28,000
  900. assumed to be male, which is the root
  901. of the anti-social hacker stereotype.
  902. 263
  903. 00:18:28,560 --> 00:18:32,440
  904. Cornelia Sollfrank,
  905. one of the founders of Old Boys Network,
  906. 264
  907. 00:18:32,440 --> 00:18:35,280
  908. the first international cyberfeminist alliance,
  909. 265
  910. 00:18:35,280 --> 00:18:40,800
  911. wrote an article titled "Women Hackers"
  912. in 1999:
  913. 266
  914. 00:18:40,800 --> 00:18:44,680
  915. "In the course of pursuing my interest in hackers and their work,
  916. 267
  917. 00:18:44,680 --> 00:18:46,920
  918. I attended several hackers’ meetings.
  919. 268
  920. 00:18:47,200 --> 00:18:51,480
  921. Naturally, as a cyberfeminist,
  922. I was looking for women hackers.
  923. 269
  924. 00:18:51,920 --> 00:18:54,600
  925. In the beginning I tried
  926. to ignore the fact
  927. 270
  928. 00:18:54,600 --> 00:18:57,640
  929. that the few women who participated in these meetings
  930. 271
  931. 00:18:57,640 --> 00:19:01,280
  932. were not actively involved
  933. in computer hacking,
  934. 272
  935. 00:19:01,280 --> 00:19:04,360
  936. and did not consider themselves
  937. to be hackers.
  938. 273
  939. 00:19:04,520 --> 00:19:09,400
  940. It took me a while to realize that in fact
  941. there were no women hackers.
  942. 274
  943. 00:19:09,400 --> 00:19:12,600
  944. It is not just in the commercial development of technology,
  945. 275
  946. 00:19:12,600 --> 00:19:14,800
  947. but even more in alternative fields
  948. 276
  949. 00:19:14,800 --> 00:19:18,840
  950. and the technological underground
  951. that there are so few women involved.
  952. 277
  953. 00:19:19,320 --> 00:19:21,960
  954. No matter what area of application and no matter what the objective,
  955. 278
  956. 00:19:21,960 --> 00:19:24,800
  957. the borderlines of gender are still maintained.
  958. 279
  959. 00:19:25,120 --> 00:19:28,000
  960. Of all the technological
  961. spheres, however,
  962. 280
  963. 00:19:28,000 --> 00:19:31,320
  964. it is in the hacker scene that we find the fewest women.
  965. 281
  966. 00:19:31,320 --> 00:19:38,120
  967. Hacking is a purely male domain, and in
  968. that sense a clearly gendered space.
  969. 282
  970. 00:19:38,760 --> 00:19:39,800
  971. In 2010s
  972. 283
  973. 00:19:39,800 --> 00:19:45,800
  974. Amazon AI was denying engineering
  975. job applications from women
  976. 284
  977. 00:19:45,800 --> 00:19:48,960
  978. because that's what it learned
  979. from historical data.
  980. 285
  981. 00:19:49,760 --> 00:19:56,480
  982. Today women comprise around 20-25%
  983. of the jobs in the tech sector.
  984. 286
  985. 00:19:56,680 --> 00:20:01,280
  986. In free and open source movements,
  987. gender gap is even worse,
  988. 287
  989. 00:20:01,280 --> 00:20:05,520
  990. with women comprising 6% of contributors.
  991. 288
  992. 00:20:06,080 --> 00:20:10,840
  993. Even hacktivists, which are supposed
  994. to be the cool political hackers,
  995. 289
  996. 00:20:10,840 --> 00:20:14,840
  997. are reproducing a male-only stereotype.
  998. 290
  999. 00:20:15,120 --> 00:20:17,400
  1000. Of course in the last decades
  1001. 291
  1002. 00:20:17,400 --> 00:20:22,320
  1003. some anticlassist, antiracist,
  1004. antisexist hacker collectives were formed
  1005. 292
  1006. 00:20:22,320 --> 00:20:27,320
  1007. but in the public perception hacking is still identified with an exclusive subculture
  1008. 293
  1009. 00:20:27,320 --> 00:20:28,880
  1010. instead of an inclusive class
  1011. 294
  1012. 00:20:28,880 --> 00:20:34,520
  1013. and this hacker subculture remains a classist racist cisheteropatriarchal niche.
  1014. 295
  1015. 00:20:35,200 --> 00:20:38,480
  1016. "Some hackers see themselves as vectoralists,
  1017. 296
  1018. 00:20:38,480 --> 00:20:41,120
  1019. trading on the scarcity of their property.
  1020. 297
  1021. 00:20:41,240 --> 00:20:44,120
  1022. Some see themselves
  1023. as workers,
  1024. 298
  1025. 00:20:44,120 --> 00:20:47,800
  1026. but as privileged ones
  1027. in a hierarchy of wage earners.
  1028. 299
  1029. 00:20:48,000 --> 00:20:52,880
  1030. The hacker class produces itself
  1031. as itself, but not for itself.
  1032. 300
  1033. 00:20:52,880 --> 00:20:56,840
  1034. It does not (yet) possess a consciousness
  1035. of its consciousness.
  1036. 301
  1037. 00:20:56,840 --> 00:20:59,480
  1038. It is not aware of its own virtuality.
  1039. 302
  1040. 00:20:59,840 --> 00:21:05,880
  1041. Because of its inability—to date
  1042. to become a class for itself,
  1043. 303
  1044. 00:21:05,880 --> 00:21:08,640
  1045. fractions of the hacker class
  1046. continually split off
  1047. 304
  1048. 00:21:08,640 --> 00:21:12,280
  1049. and come to identify their interests
  1050. with those of other classes.
  1051. 305
  1052. 00:21:12,520 --> 00:21:16,680
  1053. Hackers run the risk,
  1054. in particular, of being identified
  1055. 306
  1056. 00:21:16,680 --> 00:21:19,640
  1057. in the eyes of the
  1058. working and farming classes
  1059. 307
  1060. 00:21:19,640 --> 00:21:23,280
  1061. with vectoralist interests,
  1062. which seek to privatize information
  1063. 308
  1064. 00:21:23,280 --> 00:21:27,640
  1065. necessary for the productive and cultural
  1066. lives of all classes."
  1067. 309
  1068. 00:21:28,480 --> 00:21:33,040
  1069. Before we can even talk about hacker solidarity with other exploited classes;
  1070. 310
  1071. 00:21:33,040 --> 00:21:36,200
  1072. we have to face the privilege, arrogance and, selfishness,
  1073. 311
  1074. 00:21:36,200 --> 00:21:41,360
  1075. even within hacktivist
  1076. and free software (FOSS) movements,
  1077. 312
  1078. 00:21:41,360 --> 00:21:45,680
  1079. that is blocking the development
  1080. of class consciousness among hackers.
  1081. 313
  1082. 00:21:46,360 --> 00:21:51,400
  1083. "Each hacker sees the other as a rival,
  1084. or a collaborator against another rival,
  1085. 314
  1086. 00:21:51,400 --> 00:21:55,720
  1087. not—yet—as a fellow member
  1088. of the same class with a shared interest.
  1089. 315
  1090. 00:21:56,400 --> 00:22:00,520
  1091. This shared interest
  1092. is so hard to grasp precisely
  1093. 316
  1094. 00:22:00,520 --> 00:22:06,080
  1095. because it is a shared interest
  1096. in qualitative differentiation.
  1097. 317
  1098. 00:22:06,280 --> 00:22:09,640
  1099. The hacker class
  1100. does not need unity in identity
  1101. 318
  1102. 00:22:09,640 --> 00:22:12,160
  1103. but seeks multiplicity in difference."
  1104. 319
  1105. 00:22:12,760 --> 00:22:17,440
  1106. Multiplicity in difference is also what Audre Lorde was calling for,
  1107. 320
  1108. 00:22:17,440 --> 00:22:20,720
  1109. because our difference is our power.
  1110. 321
  1111. 00:22:20,920 --> 00:22:23,040
  1112. Hackers produce difference
  1113. 322
  1114. 00:22:23,040 --> 00:22:26,080
  1115. and hacker class consciousness
  1116. requires recognizing
  1117. 323
  1118. 00:22:26,080 --> 00:22:30,320
  1119. the power of difference
  1120. we produce with our every act.
  1121. 324
  1122. 00:22:30,760 --> 00:22:34,240
  1123. Hacker class struggle is not limited to computer programmers
  1124. 325
  1125. 00:22:34,240 --> 00:22:39,840
  1126. but involves anyone who produces information, which means everyone.
  1127. 326
  1128. 00:22:40,200 --> 00:22:44,000
  1129. With hacker class consciousness
  1130. comes the response-ability of
  1131. 327
  1132. 00:22:44,000 --> 00:22:47,720
  1133. using the power of information
  1134. to abolish vectoralism
  1135. 328
  1136. 00:22:47,720 --> 00:22:52,480
  1137. alongside all forms of domination
  1138. that are non-consensual and exploitative.
  1139. 329
  1140. 00:22:53,040 --> 00:22:55,440
  1141. Like Flavia Dzodan's feminism,
  1142. 330
  1143. 00:22:55,440 --> 00:22:59,000
  1144. the revolutionary hack will
  1145. be intersectional or it will be bullshit.