The Digital Form

Display_digital_form_mosaic

Editorial Intoduction

Digital technology has been celebrated in recent years for its capacity to foment political change - as evidenced by the role of social media networks in the “Arab Spring” - and spur development – as indicated by the popularity of ICT4D [Information and Communication Technologies For Development] projects throughout the world.  Such events offer potent sites for ethnographic examination, as they generate new social relationships, discussions, and types of information.  In such lines of ethnographic inquiry, technology is often explored for the social and political effects it produces, and the kinds of representations it engenders.

While not discounting the profound impact the content produced by digital technologies has on socio-cultural life, this curated collection turns its attention to a less studied aspect of the digital: its materiality, i.e., the objects through which digital technology is constituted. Thus, for our purposes here, we understand “form” to be the technical and infrastructural components of digitality.  This encompasses everything from source code to hardware, network protocols to software.  Such aspects of the digital often go unexamined, both because they are ‘invisible’ (or, to borrow geographer Nigel Thrift's term, ‘nonrepresentational’), and because understanding them requires a technical vocabulary foreign to many anthropologists.

By examining the processes and practices through which technology acquires meaning, all the articles in this collection draw attention to the ways in which culture is made in relation to - and through the production of - the digital form.  While “form” has been opposed to “content” in certain strains of philosophy and art theory, we hope to show that an anthropological investigation of digital technology renders this distinction untenable; indeed, the authors in this collection demonstrate how technology is not merely a vehicle for discourse, but can be considered discourse itself (see especially Kelty 2005 and Coleman 2009).  They illustrate how ethical and political regimes are embedded within the material “stuff” of technology as it is being produced, modified, distributed and exchanged, and how this new ethico-political terrain informs the ways we embody sociotechnical worlds.

The digital forms explored here cover wide geographic and cultural territory – from “geek” and hacker subcultures to Indonesian student protests and Taiwanese puppetry.  Additionally, the collection examines a range of activities, from the production and exchange of source code to the ways in which the remediation of currency and traditional performances shape economic and political futures in the face of hegemonic influences.

Some of the questions that frame this conversation on the digital form are: How do digital technology’s material components (e.g., hardware, software, source code, binary code, network protocols) and properties (e.g., mutability, interactivity, erasability) shape the contours of ethics, politics and sociality today?  What are the competing epistemologies and ideologies that undergird digital technology’s production, and how are subjectivities made and remade in relation to them?  All of the articles contained herein gesture towards answers to these questions, which lie at the heart of an investigation into the significance of the digital in our contemporary moment.

In “Geeks, Social Imaginaries, and Recursive Publics,” for example, Kelty shows how “geeks” – people who devote their lives to writing, modifying, and exchanging source code, software, and networking protocols – organize and refer to themselves as a meaningful social group by engaging in both discursive and technical work.  Building upon the work of Michael Warner and Charles Taylor, Kelty defines geeks as a “recursive public,” in that their existence as a public depends upon having control over the technical and legal tools that enable them to assemble. In contrast to publics formed through analog technologies like print or radio, geeks are centrally concerned with the means of address, i.e., the technical and legal constitution of the Internet.  As such, their explicitly technical work – building, compiling, and patching source code, for example – carries with it a political dimension as potent as the discussions generated about this work.  It is through the immanent critique made possible through “argument-by-technology” and “argument-by-talk” that political and ethical regimes surrounding technology and the law, openness and freedom, and indeed, the meaning of the Internet itself, are made and contested.

Gabriella Coleman, in “Code Is Speech: Legal Tinkering, Expertise, and Protest Among Free and Open Source Software Developers," similarly charts how political and ethical questions lie at the heart of developers’ technical work.  Through an historicization of the Free and Open Source Software (F/OSS) movement – first galvanized by the prosecution of Jon Johansen, a young hacker who produced DeCSS software used to decode DVD content-scrambling mechanisms – Coleman shows how hackers became invested in acquiring informal legal expertise in order to defend their collective autonomy.  In the process, they began to equate the use, modification and distribution of source code and software with speech itself, protected by the legal framework of the First Amendment.  As one hacker writes, “[A]ll mathematics is full of stories...and CSS is no exception to this rule.”  Coleman elucidates how hackers resuscitated a liberal vocabulary of freedom through “tinkering” with software and educating themselves on related legal protocols, and raises the question of how technical and legal expertise enters into conversation with democratic politics.

In “The Face of Money: Currency, Crisis, and Remediation in Post-Suharto Indonesia,” Karen Strassler examines the ways in which money was used as a form of protest during the uprisings in Indonesia.  Currency became a focal point for the protests largely because the fall of the Suharto regime was preceded by a fall in the value of the national currency.  Strassler shows how the material form of money was used by the state as a tool for propaganda: it depicted the achievements of the Suharto regime.  However, this very materiality was used against the regime through a process of remediation, where objects were transferred from one media form to another.  For example, Yuswantoro Adi – an artist/activist – created a large duplicate of the 50,000 rupiah bill with a hole in place of Suharto's head indicating that through this revolution “anyone could be president.”

Remediation is also the theme of Teri Silvio's “Remediation and Local Globalizations: How Taiwan's 'Digital Video Knights-Errant Puppetry' Writes the History of the New Media in Chinese.”  In this article, Silvio offers an account of the history of Budaixi puppetry and how it has been transformed by digital media to imagine a globalization of Chinese culture.  Budaixi puppetry has a long history in the traditional culture of Taiwan dating to the Ming dynasty.  During the 20th Century, Budaixi was integrated into new media forms such as television, and the stories depicted focused more on the knights-errant adventures in order to compete with other media from Japan and the West.  One of the most popular companies – the Pili International Media Company – became well known for its Budaixi mixed with digital effects and “a bricolage of elements from Chinese, Japanese, and U.S. Popular cultures.”  Through the process of remediation – a shift from traditional puppetry to a blend of digital and traditional  forms, Budaixi was transformed into a utopian vision of globalized Chinese culture - “imagining what a global digital technoculture might look like if it traced its roots to Chinese aesthetic and religious traditions and had as its telos the expansion of Taiwanese culture.”

Finally, in “Four Genealogies for a Recombinant Anthropology of Science and Technology,” Michael Fischer explores the history and future of science and technology studies in anthropology.  He traces the history of the field through four “quasidistinctive genealogies” – the cultural skeins and epistemologies of the early sociology of science; the “programming object-oriented languages of SSK, SCOT, and ANT;” the anthropologically informed ethnographies of science and technology; and the emergent, cosmopolitical technoscientific worlds of the 21st century.  These four genealogies are attentive to both the content and form of science and technology, and provide complementary visions that “complicate and make more realistic the demand for attention to the reconstruction of public spheres, civil society, and politics in the technoscientific worlds we are constructing within and around ourselves.”  Together, they offer a sociology of science and technology that will help us to construct reflexive social institutions capable of addressing the “differential cultural sensibilities of affected and invested people in different social and cultural niches.”

Related Readings

Anderson, Benedict

1991 Imagined Communities: Reflections on the Origin and Spread of Nationalism. New York: Routledge.

Axel, Brian

2006 Anthropology and the New Technologies of Communication. Cultural Anthropology 21(3): 354-384.

Benjamin, Walter

1968 The Work of Art in the Age of Mechanical Reproduction. In Illuminations. Hannah Arendt, ed. Harry Zohn, trans. Pp. 217–251. New York: Shocken.

Berger, Peter L., and Thomas Luckmann

1966 The Social Construction of Reality: A Treatise in the Sociology of Knowledge. New York: Doubleday.

Bolter, Jay David and Richard Grusin

2000 Remediation: Understanding New Media. Cambridge, MA: MIT Press.

Coleman, E. Garbriella, and Alex Golub

2008 Hacker Practice: Moral Genres and the Cultural Articulation of Liberalism. Anthropological Theory 8(3): 255-277.

Comaroff, Jean, and John Comaroff

2003 Reflections on Liberalism, Policulturalism, and ID-Ology: Citizenship and Difference in South Africa. Social Identities 9(3): 445-474.

Dominguez, Virginia

1990 Representing Value and the Value of Representation: A Different Look at Money. Cultural Anthropology 5(1):16–44.

Downey, Gary Lee, and Joseph Dumit, eds.

1997 Cyborgs and Citadels: Anthropological Interventions in Emerging Sciences and Technologies. Sante Fe: School of American Research.

Downey, Gary Lee, Joseph Dumit, and Sarah Williams

1995 Cyborg Anthropology. Cultural Anthropology 10(2): 264–269.

Escobar, Arturo

1994  Welcome to Cyberia: Notes on the Anthropology of Cyberculture. Current Anthropology 35(3):211-231.

Feldman, Ilana

2007 Difficult Distinctions: Refugee Law, Humanitarian Practice, and Political Identification in Gaza. Cultural Anthropology 22(1): 129-169.

Fortun, Kim

2001 Advocacy After Bhopal: Environmentalism, Disaster, New Global Orders. Chicago: University of Chicago Press.

Graeber, David

2011 Debt: The First 5,000 Years. New York: Melville House.

Habermas, Jürgen

1989 The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Cambridge: MIT Press.

Haraway, Donna

1991 Simians, Cyborgs and Women: The Reinvention of Nature. New York: Routledge.

2008 When Species Meet. Minneapolis: University of Minnesota Press.

Hart, Keith

1986 Heads or Tails? Two Sides of the Coin. Man (n.s.) 21(4): 637–656.

Helmreich, Stefan

2007 Alien Ocean: An Anthropology of Marine Biology and the Limits of Life. Berkeley: University of California Press.


Jain, Sarah

2004 'Dangerous Instrumentality': The Bystander as Subject in Automobility. Cultural Anthropology 19(1): 61-94.

Jasanoff, Sheila

2005 Designs on Nature: Science and Democracy in Europe and the United States. Princeton: Princeton University Press.

Jenkins, Henry

1992 Textual Poachers: Television Fans and Participatory Culture. New York: Routledge.

Keane, Webb

2001 Money Is No Object: Materiality, Desire, and Modernity in an Indonesian Society. In The Empire of Things: Regimes of Value and Material Culture. Fred Myers, ed. Pp. 65–90. Santa Fe: School of American Research Press.


Kelty, Christopher

2007 Two Bits: Free Software and the Social Imagination after the Internet. Durham, NC: Duke University Press.

2005 Geeks, Social Imaginaries, and Recursive Publics. Cultural Anthropology 20(2): 185-214.

Knorr-Cetina, Karin

1999 Epistemic Cultures: How the Sciences Make Knowledge. Cambridge, MA: Harvard University Press.

Kuhn, Thomas

1955 The Structure of Scientific Revolutions. In The International Encyclopedia of Unified Science, vol.2. Otto Neurath, Rudolph Carnap, and Charles Morris, eds. Chicago: University of Chicago Press.

Latour, Bruno

1987 Science in Action: How to Follow Scientists and Engineers through Society. Philadelphia: Open University Press.

1988 The Pasteurization of France. Cambridge, MA: Harvard University Press.

1993 Aramis, or The Love of Technology. Cambridge, MA: Harvard University Press.

2004 Politics of Nature. Cambridge, MA: Harvard University Press.

2005 Reassembling the Social: An Introduction to Actor Network Theory. Oxford: Oxford University Press.

Lessig, Lawrence

1999  Code: And Other Laws of Cyberspace. New York: Basic Books.

2001 The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random House.

Lysloff, René T. A.

2003 Musical Community on the Internet: An On-line Ethnography. Cultural Anthropology 18(2): 233-263.

Merton, Robert King

1973 The Sociology of Science: Theoretical and Empirical Investigations. Edited with an introduction by Norman W. Storer. Chicago: University of Chicago Press.


Partridge, Damani

2008 We Were Dancing in the Club, Not on the Berlin Wall:  Black Bodies, Street Bureaucrats, and Exclusionary Incorporation into the New Europe. Cultural Anthropology 23(4): 660-687.

Rabinow, Paul

2003 Anthropos Today: Reflections on Modern Equipment. Princeton: Princeton University Press.

Sconce, Jeffrey

2000 Haunted Media: Electronic Presence from Telegraphy to Television. Durham, NC: Duke University Press.

Spitulnik, Deborah

1996 The Social Circulation of Media Discourse and the Mediation of Communities. Journal of Linguistic Anthropology 62:161–187.

Stengers, Isabelle

1993[2000] The Invention of Modern Science. Daniel W. Smith, trans. Minneapolis: University of Minnesota Press.

Strassler, Karen

2004 Material Witnesses: Photographs and the Making of Reformasi Memory. In Beginning to Remember: The Past in Indonesia’s Present. Mary Zurbuchen, Geoffrey Robinson, and Henk Meier, eds. Pp. 278–311. Singapore and Seattle: Singapore National University Press, with University of Washington Press.

Taylor, Charles

2004 Modern Social Imaginaries. Durham: Duke University Press.

Tsing, Anna Lowenhaupt

2005 Friction: An Ethnography of Global Connection. Princeton: Princeton University Press.

Warner, Michael

2002 Publics and Counterpublics. New York: Zone.

Collection Images

http://blog.hudsonhorizons.com/Article/A-Busy-Weekend-for-Hackers-Anonymous.htm

http://www.xn--12cl1cajbd6cxb9bdd8b4clbb.com/2011/07/blog-post_7371.html#mce_temp_url#

http://www.libertadzero.com/2010/09/20/las-6-dimensiones-del-software-libre/

http://www.warepin.com/list-computer-hardware/

http://sunnylam.ca/2010/12/the-top-10-tech-trends-for-2011-and-how-it-affects-you/

http://www.vestaldesign.com/blog/2007/01/

http://www.gratisjuegos.org/descargar/la-pantera-rosa-pc-clasico-animadoportable-espmediafire/

http://www.wi-figreen.com/2012/05/

http://simper-varun.blogspot.com/2010_10_01_archive.html

http://sc.studentboss.com/tb/10192.shtml

http://tycoonwomen.com/hackers-ate-my-website/

http://hrmars.com/register.php

http://alfin2100.blogspot.com/2009/11/russian-hackers-blow-lid-off-global.html

http://www.nya-nyok.co.cc/2011/03/pembalasan-untuk-penjaga-warnet.html#axzz1x5q2yIp9

http://www.fanpop.com/spots/the-no-life-club/images/25754116/title/hey-im-programmer-photo

http://kohkyean.blogspot.com/2010_01_01_archive.html

http://hackaday.com/category/microcontrollers/page/2/

http://nabtron.com/will-code-for-food-images-compilation/4084/

http://ch0cobo.wordpress.com/2008/11/

http://www.123rf.com/photo_12353882_internet-security-and-privacy-issues-with-a-human-eye-and-digital-binary-code-representing-surveilla.html