SlideShare a Scribd company logo
1 of 101
What can we learn from the
      Unabomber?
What can we learn from the
      Unabomber?

      Nothing.
But…
But…


This doesn’t mean our technological system is
benign.
and…
and…


This doesn’t mean radical measures aren’t called
for.
It means…
It means…


The Unabomber is not the go to guy for
answers.
The Plan
The Plan
1) Why the Unabomber Manifesto is Weak
The Plan
1) Why the Unabomber Manifesto is Weak
2) Why the Unabomber Manifesto is Wrong
The Plan
1) Why the Unabomber Manifesto is Weak
2) Why the Unabomber Manifesto is Wrong
3) What is a Better Critique?
The Plan
1)   Why the Unabomber Manifesto is Weak
2)   Why the Unabomber Manifesto is Wrong
3)   What is a Better Critique?
4)   Why are we *Really* Here?
1. Why the Unabomber Manifesto
            is Weak
1. Why the Unabomer Manifesto
               is Weak
1). The bulk of the argument is an ad hominem
attack
1. Why the Unabomer Manifesto
               is Weak
1). The bulk of the argument is ad hominem
attack

2). The argument relies on the genetic fallacy
1. Why the Unabomer Manifesto
               is Weak
1). The bulk of the argument is ad hominem
attack

2). The argument relies on the genetic fallacy

3). The argument from evolution is NOT SOUND
On the ad hominem and genetic
           fallacies
On the ad hominem and genetic
               fallacies
What role do they play in the manifesto?
On the ad hominem and genetic
               fallacies
What role do they play in the manifesto?

The Unabomber uses them to dismiss
arguments that we can use government or
activism to restrain technology.
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
Argument to the person
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
Argument to the person

The genetic fallacy:
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
Argument to the person.

The genetic fallacy:
Thinking that showing the source of a belief
falsifies the belief.
The Unabomber on “leftists”
7. When we speak of leftists in this article we
have in mind mainly socialists, collectivists,
"politically correct" types, feminists, gay and
disability activists, animal rights activists and the
like. But not everyone who is associated with
one of these movements is a leftist. What we
are trying to get at in discussing leftism is not so
much a movement or an ideology as a
psychological type.
9. The two psychological tendencies that
underlie modern leftism we call "feelings of
inferiority" and "oversocialization.”
10. By "feelings of inferiority" we mean not only
inferiority feelings in the strictest sense but a
whole spectrum of related traits: low self-
esteem, feelings of powerlessness, depressive
tendencies,defeatism, guilt, self-hatred, etc. We
argue that modern leftists tend to have such
feelings (possibly more or less repressed) and
that these feelings are decisive in determining
the direction of modern leftism.
14. Feminists are desperately anxious to prove
that women are as strong as capable as men.
Clearly they are nagged by a fear that women
may NOT be as strong and as capable as men.
15. Leftists tend to hate anything that has an
image of being strong, good and successful.
They hate America, they hate Western
civilization, they hate white males, they hate
rationality.
17. Art forms that appeal to modern leftist
intellectuals tend to focus on sordidness, defeat
and despair, or else they take an orgiastic
tone, throwing off rational control as if there
were no hope of accomplishing anything
through rational calculation and all that was left
was to immerse oneself in the sensations of the
moment.
18. Modern leftist philosophers tend to dismiss
reason, science, objective reality and to insist
that everything is culturally relative. …They are
deeply involved emotionally in their attack on
truth and reality. They attack these concepts
because of their own psychological needs.
20. Notice the masochistic tendency of leftist
tactics. Leftists protest by lying down in front of
vehicles, they intentionally provoke police or
racists to abuse them, etc. These tactics may
often be effective, but many leftists use them
not as a means to an end but because they
PREFER masochistic tactics. Self-hatred is a
leftist trait.
Masochist?
Masochists?
Masochists?
Masochists?
Reviewing so far…
Reviewing so far…
• These attacks are ad hominem
Reviewing so far…
• These attacks are ad hominem

• They play a role in the genetic fallacy
Reviewing so far…
• These attacks are ad hominem

• They play a role in the genetic fallacy

• In any case, the psychological claims are
  unsupported and very likely false.
The Core Argument
(1) Humans evolved under primitive, low-tech
    conditions, over the past 2 million years.
(2) Lived in small autonomous groups (25-
    50), amidst vast wilderness.
(3) Modern technological society is radically
    different than this, and imposes
    unprecedented stress on humanity and
    nature.
Core Argument (cont.)
(4) Technological stress will only continue to
     worsen:
      The environment will become simplified,
       manipulated, and contaminated.
      Humanity will become either enslaved, genetically-
       modified, or eliminated.
(5) Such a condition is undignified, abhorrent,
     and profoundly dehumanizing.
(6) It is impossible to fix or reform the system,
     so as to avoid these disastrous outcomes.
Core Argument (cont.)


    THEREFORE: The system must end.

In fact, we have a moral obligation to end it.
This argument is not sound.
The argument is not sound.


The fact that a situation is abhorrent does not
mean we have a moral obligation to
exterminate billions of people to end it.
The argument is not sound.

Furthermore, from the claim that people are
metaphorically “enslaved”, it does not follow
that the enslavement should end at any cost.
The argument is not sound.

Furthermore, from the claim that people are
metaphorically “enslaved”, it does not follow
that the enslavement should end at any cost.

From the fact that the species is at risk it doesn’t
follow that any action is justified.
For example

If we are going to starve if we don’t kill and eat
someone it doesn’t follow that we should kill
and eat someone.
For example

If we are going to starve if we don’t kill and eat
someone it doesn’t follow that we should kill
and eat someone.

It certainly doesn’t follow that we have a moral
obligation to kill and eat someone.
In addition…
There is also a missing premise in the step from this
premise:

“[if we don’t return to the conditions under which we evolved]
Humanity will become either enslaved, genetically-modified, or
eliminated.”

to the conclusion.

The system must end. In fact, we have a moral obligation to end it.
Two missing premises.
Two missing premises.

1) Evolution optimizes for freedom, dignity, genetic
   stability, and survival of the species.
Two missing premises.

1) Evolution optimizes for freedom, dignity, genetic
   stability, and survival of the species.

2) The only way to stay optimized is by being in the
   conditions in which we evolved.
missing premise 1


Evolution optimizes for freedom, dignity, genetic
stability, and survival of the species,

so if we return to the conditions under which we
evolved we optimize for all these.
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.

Evolution only cares about reproductive success.
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.

Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
But that premise is false:
Evolution doesn’t optimize for freedom, dignity,
genetic stability, and survival of the species.

Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
2) It doesn’t promise genetic stability
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.

Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
2) It doesn’t promise genetic stability
3) It doesn’t promise survival of the species
Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?
Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?

No, because that is what human factors
engineering is for. We engineer for people as
they are evolved.
Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?

No, because that is what human factors
engineering is for. We engineer for people as
they are evolved.

And there are other ways…
KU’s Steve Illardi
How to reproduce hunter-gatherer psychology

1)   omega-3 fatty acids
2)   Exercise
3)   Light exposure
4)   Sleep
5)   Social connectedness
6)   Anti-ruminative behavior
Is the background assumption true?
Is the background assumption true?



Background assumption: human technology is
alien to us as human beings.
Perhaps we evolved to be technological
creatures.
bees
beavers
spiders
birds
humans
humans
3. What is a Better Critique?
3. What is a Better Critique?
An Anarchist critique:
3. What is a Better Critique?
An Anarchist critique:

Perhaps we are only alienated by technology
when those in power seize control of it.
3. What is a Better Critique?
An Anarchist critique:

Perhaps we are only alienated by technology
when those in power seize control of it.

We are not alienated by technology
We are alienated from technology
3. What is a Better Critique?

A hacktivist critique:
3. What is a Better Critique?

A hacktivist critique:

We become alienated when the ability is to be
technological is kept from us!
We become alienated from technology when we
aren’t allowed to see and understand how it
works
We become alienated from technology when we
aren’t allowed to see and understand how it
works

–that is, alienation occurs when the ability to
understand and hack technology is withheld
from us.
How do we fix the misuse of
      technology?
How do we fix the misuse of
            technology?


Put control of technology back in the hands of
everyone (not just those in power).
How do we fix the misuse of
            technology?


Put control of technology back in the hands of
everyone (not just those the powerful).

Information wants to be free. Liberate it!
4. So, Why are We *Really* Here?
4. So, Why are We *Really* Here?
The toll…
The toll…
• 16 bombs
The toll…
• 16 bombs
• 3 killed
The toll…
• 16 bombs
• 3 killed
• 13 maimed
one victim
Thomas J. Mosser
                        •   Advertising exec
                        •   North Caldwell, NJ
                        •   Age 50
                        •   Wife, Susan
                        •   Daughter, age 13
                        •   Daughter, 15 months
From the NYT
Some neighbors said yesterday that it was only
luck that others were not injured by the bomb.
Mr. McKay said that he held a party for the
neighborhood on Friday night and that several
children wandered from the party to the
Mossers' house.
From the NYT
"They had half a dozen kids there with the bomb
sitting on the table," Mr. McKay said. "His wife
signed for the package on Friday and left it on
the table."
From the NYT
Robin xxx, 13, stayed over for the night and was
in the house with the Mossers and their
daughters when the explosion occurred. She
said she took the Mossers' daughter Kelly next
door after the blast.
Robert Kusmirowski, Unacabine, 2008
Unabomber Cabin at the Newseum
Newseum
• “Probe the Unabomber Cabin:
  Explore a mad hermit’s life with
  videos and an interactive [sic].”
Jeffrey Dahmer’s Spoon

More Related Content

What's hot

International relations.pptx
International relations.pptxInternational relations.pptx
International relations.pptxShivanshTomar9
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implicationsrajaram.muthukrishnan
 
Political economy
Political  economy Political  economy
Political economy Anmol gupta
 
Karl marks theory of socialism
Karl marks theory of socialismKarl marks theory of socialism
Karl marks theory of socialismMadeha Arif
 
Gandhi's philosophy & planning
Gandhi's philosophy & planningGandhi's philosophy & planning
Gandhi's philosophy & planningSamyuktha Samy
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Controlgueste59d722
 
introduction-to-health-policy
introduction-to-health-policyintroduction-to-health-policy
introduction-to-health-policyNayyar Kazmi
 
Evaluation of group theory
Evaluation of group theoryEvaluation of group theory
Evaluation of group theorymelakubaye
 
Writ Jurisdiction and Public Interest Litigation (PIL) in Bangladesh
Writ Jurisdiction  and  Public Interest  Litigation (PIL) in BangladeshWrit Jurisdiction  and  Public Interest  Litigation (PIL) in Bangladesh
Writ Jurisdiction and Public Interest Litigation (PIL) in BangladeshAhasan Uddin Bhuiyan
 
Healthcare System of Bangladesh
Healthcare System of BangladeshHealthcare System of Bangladesh
Healthcare System of BangladeshArafathRahmanAkash
 
OBJECTIVITY IN SOCIAL SCIENCE RESEARCH
OBJECTIVITY IN SOCIAL SCIENCE RESEARCH OBJECTIVITY IN SOCIAL SCIENCE RESEARCH
OBJECTIVITY IN SOCIAL SCIENCE RESEARCH Ruby Med Plus
 
Factors affecting public policy
Factors affecting public policyFactors affecting public policy
Factors affecting public policyKhadkaprakash2
 
Sanskritization by m.n.srinivas
Sanskritization by m.n.srinivasSanskritization by m.n.srinivas
Sanskritization by m.n.srinivasPradeepKumar3508
 
CSS Governance and Public Policies
CSS Governance and Public PoliciesCSS Governance and Public Policies
CSS Governance and Public PoliciesEntire Education
 
Political participation
Political participationPolitical participation
Political participationMahesh Patil
 
Devolution and health
Devolution and healthDevolution and health
Devolution and healthNayyar Kazmi
 
9. principles of social research
9. principles of social research9. principles of social research
9. principles of social researchsaiyangoku
 

What's hot (20)

International relations.pptx
International relations.pptxInternational relations.pptx
International relations.pptx
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implications
 
Theories of Sovereignty
Theories of SovereigntyTheories of Sovereignty
Theories of Sovereignty
 
Political economy
Political  economy Political  economy
Political economy
 
Karl marks theory of socialism
Karl marks theory of socialismKarl marks theory of socialism
Karl marks theory of socialism
 
Gandhi's philosophy & planning
Gandhi's philosophy & planningGandhi's philosophy & planning
Gandhi's philosophy & planning
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Control
 
introduction-to-health-policy
introduction-to-health-policyintroduction-to-health-policy
introduction-to-health-policy
 
Evaluation of group theory
Evaluation of group theoryEvaluation of group theory
Evaluation of group theory
 
Writ Jurisdiction and Public Interest Litigation (PIL) in Bangladesh
Writ Jurisdiction  and  Public Interest  Litigation (PIL) in BangladeshWrit Jurisdiction  and  Public Interest  Litigation (PIL) in Bangladesh
Writ Jurisdiction and Public Interest Litigation (PIL) in Bangladesh
 
Healthcare System of Bangladesh
Healthcare System of BangladeshHealthcare System of Bangladesh
Healthcare System of Bangladesh
 
OBJECTIVITY IN SOCIAL SCIENCE RESEARCH
OBJECTIVITY IN SOCIAL SCIENCE RESEARCH OBJECTIVITY IN SOCIAL SCIENCE RESEARCH
OBJECTIVITY IN SOCIAL SCIENCE RESEARCH
 
Factors affecting public policy
Factors affecting public policyFactors affecting public policy
Factors affecting public policy
 
Sanskritization by m.n.srinivas
Sanskritization by m.n.srinivasSanskritization by m.n.srinivas
Sanskritization by m.n.srinivas
 
CSS Governance and Public Policies
CSS Governance and Public PoliciesCSS Governance and Public Policies
CSS Governance and Public Policies
 
Political participation
Political participationPolitical participation
Political participation
 
Devolution and health
Devolution and healthDevolution and health
Devolution and health
 
9. principles of social research
9. principles of social research9. principles of social research
9. principles of social research
 
Thomas Hobbes
Thomas HobbesThomas Hobbes
Thomas Hobbes
 
Political Economy
Political EconomyPolitical Economy
Political Economy
 

Similar to What Can We Learn from the Unabomber?: Nothing.

Concise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions ManualConcise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions ManualClemonser
 
Artificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdfArtificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdfvenetianlanguage
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentationsJenny Jeon
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentationsJenny Jeon
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentationsJenny Jeon
 
Artificial intelligence: the challange
Artificial intelligence: the challangeArtificial intelligence: the challange
Artificial intelligence: the challangevenetianlanguage
 
Answer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docxAnswer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docxYASHU40
 
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...Staci Sprout, LICSW, CSAT
 
CAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotesCAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotescapesociology
 
Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...Pozzolini
 
Propaganda 2009
Propaganda 2009Propaganda 2009
Propaganda 2009dansutton
 
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)Werner Sattmann-Frese
 
Living with Exponential Growth
Living with Exponential GrowthLiving with Exponential Growth
Living with Exponential Growthneeraj0808
 
4. Human Perception
4. Human Perception4. Human Perception
4. Human PerceptionJoe Gamore
 
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docxAshford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docxwildmandelorse
 

Similar to What Can We Learn from the Unabomber?: Nothing. (20)

Concise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions ManualConcise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions Manual
 
Artificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdfArtificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdf
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentations
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentations
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentations
 
Artificial intelligence: the challange
Artificial intelligence: the challangeArtificial intelligence: the challange
Artificial intelligence: the challange
 
Answer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docxAnswer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docx
 
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
 
lecture 2ppt.pdf
lecture 2ppt.pdflecture 2ppt.pdf
lecture 2ppt.pdf
 
CAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotesCAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotes
 
2014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.62014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.6
 
Hero Training
Hero TrainingHero Training
Hero Training
 
Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...
 
What is Cultural Psych
What is Cultural PsychWhat is Cultural Psych
What is Cultural Psych
 
Propaganda 2009
Propaganda 2009Propaganda 2009
Propaganda 2009
 
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
 
Defeating aging
Defeating agingDefeating aging
Defeating aging
 
Living with Exponential Growth
Living with Exponential GrowthLiving with Exponential Growth
Living with Exponential Growth
 
4. Human Perception
4. Human Perception4. Human Perception
4. Human Perception
 
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docxAshford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docx
 

More from Peter Ludlow

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Peter Ludlow
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative GuidancePeter Ludlow
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and ConspiracyPeter Ludlow
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Peter Ludlow
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismPeter Ludlow
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfarePeter Ludlow
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Peter Ludlow
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in troublePeter Ludlow
 

More from Peter Ludlow (10)

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative Guidance
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and Conspiracy
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivism
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfare
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018
 
Truth in fanfic
Truth in fanficTruth in fanfic
Truth in fanfic
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in trouble
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

What Can We Learn from the Unabomber?: Nothing.

  • 1. What can we learn from the Unabomber?
  • 2. What can we learn from the Unabomber? Nothing.
  • 4. But… This doesn’t mean our technological system is benign.
  • 6. and… This doesn’t mean radical measures aren’t called for.
  • 8. It means… The Unabomber is not the go to guy for answers.
  • 10. The Plan 1) Why the Unabomber Manifesto is Weak
  • 11. The Plan 1) Why the Unabomber Manifesto is Weak 2) Why the Unabomber Manifesto is Wrong
  • 12. The Plan 1) Why the Unabomber Manifesto is Weak 2) Why the Unabomber Manifesto is Wrong 3) What is a Better Critique?
  • 13. The Plan 1) Why the Unabomber Manifesto is Weak 2) Why the Unabomber Manifesto is Wrong 3) What is a Better Critique? 4) Why are we *Really* Here?
  • 14. 1. Why the Unabomber Manifesto is Weak
  • 15. 1. Why the Unabomer Manifesto is Weak 1). The bulk of the argument is an ad hominem attack
  • 16. 1. Why the Unabomer Manifesto is Weak 1). The bulk of the argument is ad hominem attack 2). The argument relies on the genetic fallacy
  • 17. 1. Why the Unabomer Manifesto is Weak 1). The bulk of the argument is ad hominem attack 2). The argument relies on the genetic fallacy 3). The argument from evolution is NOT SOUND
  • 18. On the ad hominem and genetic fallacies
  • 19. On the ad hominem and genetic fallacies What role do they play in the manifesto?
  • 20. On the ad hominem and genetic fallacies What role do they play in the manifesto? The Unabomber uses them to dismiss arguments that we can use government or activism to restrain technology.
  • 21. On the ad hominem and genetic fallacies The ad hominem fallacy:
  • 22. On the ad hominem and genetic fallacies The ad hominem fallacy: Argument to the person
  • 23. On the ad hominem and genetic fallacies The ad hominem fallacy: Argument to the person The genetic fallacy:
  • 24. On the ad hominem and genetic fallacies The ad hominem fallacy: Argument to the person. The genetic fallacy: Thinking that showing the source of a belief falsifies the belief.
  • 25. The Unabomber on “leftists” 7. When we speak of leftists in this article we have in mind mainly socialists, collectivists, "politically correct" types, feminists, gay and disability activists, animal rights activists and the like. But not everyone who is associated with one of these movements is a leftist. What we are trying to get at in discussing leftism is not so much a movement or an ideology as a psychological type.
  • 26. 9. The two psychological tendencies that underlie modern leftism we call "feelings of inferiority" and "oversocialization.”
  • 27. 10. By "feelings of inferiority" we mean not only inferiority feelings in the strictest sense but a whole spectrum of related traits: low self- esteem, feelings of powerlessness, depressive tendencies,defeatism, guilt, self-hatred, etc. We argue that modern leftists tend to have such feelings (possibly more or less repressed) and that these feelings are decisive in determining the direction of modern leftism.
  • 28. 14. Feminists are desperately anxious to prove that women are as strong as capable as men. Clearly they are nagged by a fear that women may NOT be as strong and as capable as men.
  • 29. 15. Leftists tend to hate anything that has an image of being strong, good and successful. They hate America, they hate Western civilization, they hate white males, they hate rationality.
  • 30. 17. Art forms that appeal to modern leftist intellectuals tend to focus on sordidness, defeat and despair, or else they take an orgiastic tone, throwing off rational control as if there were no hope of accomplishing anything through rational calculation and all that was left was to immerse oneself in the sensations of the moment.
  • 31. 18. Modern leftist philosophers tend to dismiss reason, science, objective reality and to insist that everything is culturally relative. …They are deeply involved emotionally in their attack on truth and reality. They attack these concepts because of their own psychological needs.
  • 32. 20. Notice the masochistic tendency of leftist tactics. Leftists protest by lying down in front of vehicles, they intentionally provoke police or racists to abuse them, etc. These tactics may often be effective, but many leftists use them not as a means to an end but because they PREFER masochistic tactics. Self-hatred is a leftist trait.
  • 38. Reviewing so far… • These attacks are ad hominem
  • 39. Reviewing so far… • These attacks are ad hominem • They play a role in the genetic fallacy
  • 40. Reviewing so far… • These attacks are ad hominem • They play a role in the genetic fallacy • In any case, the psychological claims are unsupported and very likely false.
  • 41. The Core Argument (1) Humans evolved under primitive, low-tech conditions, over the past 2 million years. (2) Lived in small autonomous groups (25- 50), amidst vast wilderness. (3) Modern technological society is radically different than this, and imposes unprecedented stress on humanity and nature.
  • 42. Core Argument (cont.) (4) Technological stress will only continue to worsen:  The environment will become simplified, manipulated, and contaminated.  Humanity will become either enslaved, genetically- modified, or eliminated. (5) Such a condition is undignified, abhorrent, and profoundly dehumanizing. (6) It is impossible to fix or reform the system, so as to avoid these disastrous outcomes.
  • 43. Core Argument (cont.) THEREFORE: The system must end. In fact, we have a moral obligation to end it.
  • 44. This argument is not sound.
  • 45. The argument is not sound. The fact that a situation is abhorrent does not mean we have a moral obligation to exterminate billions of people to end it.
  • 46. The argument is not sound. Furthermore, from the claim that people are metaphorically “enslaved”, it does not follow that the enslavement should end at any cost.
  • 47. The argument is not sound. Furthermore, from the claim that people are metaphorically “enslaved”, it does not follow that the enslavement should end at any cost. From the fact that the species is at risk it doesn’t follow that any action is justified.
  • 48. For example If we are going to starve if we don’t kill and eat someone it doesn’t follow that we should kill and eat someone.
  • 49. For example If we are going to starve if we don’t kill and eat someone it doesn’t follow that we should kill and eat someone. It certainly doesn’t follow that we have a moral obligation to kill and eat someone.
  • 50. In addition… There is also a missing premise in the step from this premise: “[if we don’t return to the conditions under which we evolved] Humanity will become either enslaved, genetically-modified, or eliminated.” to the conclusion. The system must end. In fact, we have a moral obligation to end it.
  • 52. Two missing premises. 1) Evolution optimizes for freedom, dignity, genetic stability, and survival of the species.
  • 53. Two missing premises. 1) Evolution optimizes for freedom, dignity, genetic stability, and survival of the species. 2) The only way to stay optimized is by being in the conditions in which we evolved.
  • 54. missing premise 1 Evolution optimizes for freedom, dignity, genetic stability, and survival of the species, so if we return to the conditions under which we evolved we optimize for all these.
  • 55. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species.
  • 56. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success.
  • 57. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success. 1) It doesn’t care about freedom and dignity
  • 58. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success. 1) It doesn’t care about freedom and dignity 2) It doesn’t promise genetic stability
  • 59. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success. 1) It doesn’t care about freedom and dignity 2) It doesn’t promise genetic stability 3) It doesn’t promise survival of the species
  • 60. Missing premise 2 Is returning to the original evolving conditions the only way to optimize?
  • 61. Missing premise 2 Is returning to the original evolving conditions the only way to optimize? No, because that is what human factors engineering is for. We engineer for people as they are evolved.
  • 62. Missing premise 2 Is returning to the original evolving conditions the only way to optimize? No, because that is what human factors engineering is for. We engineer for people as they are evolved. And there are other ways…
  • 63. KU’s Steve Illardi How to reproduce hunter-gatherer psychology 1) omega-3 fatty acids 2) Exercise 3) Light exposure 4) Sleep 5) Social connectedness 6) Anti-ruminative behavior
  • 64. Is the background assumption true?
  • 65. Is the background assumption true? Background assumption: human technology is alien to us as human beings.
  • 66. Perhaps we evolved to be technological creatures.
  • 67. bees
  • 70. birds
  • 73. 3. What is a Better Critique?
  • 74. 3. What is a Better Critique? An Anarchist critique:
  • 75. 3. What is a Better Critique? An Anarchist critique: Perhaps we are only alienated by technology when those in power seize control of it.
  • 76. 3. What is a Better Critique? An Anarchist critique: Perhaps we are only alienated by technology when those in power seize control of it. We are not alienated by technology We are alienated from technology
  • 77. 3. What is a Better Critique? A hacktivist critique:
  • 78. 3. What is a Better Critique? A hacktivist critique: We become alienated when the ability is to be technological is kept from us!
  • 79. We become alienated from technology when we aren’t allowed to see and understand how it works
  • 80. We become alienated from technology when we aren’t allowed to see and understand how it works –that is, alienation occurs when the ability to understand and hack technology is withheld from us.
  • 81. How do we fix the misuse of technology?
  • 82. How do we fix the misuse of technology? Put control of technology back in the hands of everyone (not just those in power).
  • 83. How do we fix the misuse of technology? Put control of technology back in the hands of everyone (not just those the powerful). Information wants to be free. Liberate it!
  • 84. 4. So, Why are We *Really* Here?
  • 85. 4. So, Why are We *Really* Here?
  • 86.
  • 87.
  • 88.
  • 91. The toll… • 16 bombs • 3 killed
  • 92. The toll… • 16 bombs • 3 killed • 13 maimed
  • 93. one victim Thomas J. Mosser • Advertising exec • North Caldwell, NJ • Age 50 • Wife, Susan • Daughter, age 13 • Daughter, 15 months
  • 94. From the NYT Some neighbors said yesterday that it was only luck that others were not injured by the bomb. Mr. McKay said that he held a party for the neighborhood on Friday night and that several children wandered from the party to the Mossers' house.
  • 95. From the NYT "They had half a dozen kids there with the bomb sitting on the table," Mr. McKay said. "His wife signed for the package on Friday and left it on the table."
  • 96. From the NYT Robin xxx, 13, stayed over for the night and was in the house with the Mossers and their daughters when the explosion occurred. She said she took the Mossers' daughter Kelly next door after the blast.
  • 98. Unabomber Cabin at the Newseum
  • 99. Newseum • “Probe the Unabomber Cabin: Explore a mad hermit’s life with videos and an interactive [sic].”
  • 100.