The document discusses several reviews and responses related to theories of networks. It covers topics like how networks are used for control and surveillance. One review discusses the book "The Exploit" which analyzes networks and how their flaws can be exploited for change. The authors respond that networks should also be viewed as post-human and beyond human control. They raise questions about the ontology of networks and how humans should relate to increasingly technological systems.