The Exploit: A Theory of Networks
“The Exploit is that rare thing: a book with a clear grasp of how networks operate that also understands the political implications of this emerging form of power. It cuts through the nonsense about how 'free' and 'democratic' networks supposedly are, and it offers a rich analysis of how network protocols create a new kind of control. Essential reading for all theorists, artists, activists, techheads, and hackers of the Net.” —McKenzie Wark, author of A Hacker Manifesto
The network has become the core organizational structure for postmodern politics, culture, and life, replacing the modern era’s hierarchical systems. From peer-to-peer file sharing and massive multiplayer online games to contagion vectors of digital or biological viruses and global affiliations of terrorist organizations, the network form has become so invasive that nearly every aspect of contemporary society can be located within it.
Borrowing their title from the hacker term for a program that takes advantage of a flaw in a network system, Alexander R. Galloway and Eugene Thacker challenge the widespread assumption that networks are inherently egalitarian. Instead, they contend that there exist new modes of control entirely native to networks, modes that are at once highly centralized and dispersed, corporate and subversive.
In this provocative book-length essay, Galloway and Thacker argue that a whole new topology must be invented to resist and reshape the network form, one that is as asymmetrical in relationship to networks as the network is in relation to hierarchy.
Alexander R. Galloway is associate professor of culture and communications at New York University and the author of Gaming: Essays on Algorithmic Culture (Minnesota, 2006) and Protocol: How Control Exists after Decentralization.
Eugene Thacker is associate professor of new media at the Georgia Institute of Technology and the author of Biomedia (Minnesota, 2004) and The Global Genome: Biotechnology, Politics, and Culture.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
algorithms antivirus Arquilla and Ronfeldt base pair base pair complementarity biological network biopolitics bioterrorism body politic called central communications computer viruses concept conflict context curating cybernetics databases decentralized defined Deleuze distributed networks DNA computing dynamic e-mail edges emerging infectious diseases entity epidemics example existence exploit Fork Bomb Foucault gene genetic Gilles Deleuze Giorgio Agamben global graph theory Hardt and Negri human immanent individuation informatic interaction interface Internet protocols John Arquilla layer Life-resistance living logic Lovink machine means Michael Hardt Michel Foucault military mode molecular multitude netwar network form networked power nodes nonhuman notion one’s operate organization Paul Baran population power relations problem protocological control question relationship resistance SARS sense sequence simply social societies sovereign sovereignty spam specific structure surveillance swarm technical technologies terrorism thing threat tion today’s topology unhuman users Vilém Flusser virus