Millennium Essay, Research Paper
My expedition into cyber-communism began when I read Brock Meeks’ “Hackers Stumble Toward Legitimacy”[1]. The article addressed a recent hackers’ convention. Interestingly, the keynote speaker was Eric Boucher[2] (alias Jello Biafra[3]), a rock star with no technical background. Numerous questions ensue. Who is Eric Boucher (alias Jello Biafra)? What does he believe? More importantly, why schedule someone with no technical background to speak at a hackers’ convention? Addressing his beliefs, his proposed Green Party platform[4] is not inconsistent with the “Manifesto of Libertarian Communism”[5]. This answer produces a more troubling question. Was his speech against corporate America mere socialist babbling or was his speech part of something more sinister, a subversive cyber-communist movement?
I am not the first to see possible communist subversion of the digerati[6]. Corey Winesett’s “Are Linux Users Really Communists?”[7] questions the nature of the relationship, if any, between open source and communism. Scott Billings’ “Heresy and Communism”[8] ponders that the Linux community’s knee-jerk reaction to negative opinions about Linux could be the result of being “under the [communists'] spell.” Before I can evaluate cyber-communism’s merits, I must define communism’s true nature and communism’s real threat to America.
Communism Revisited
Theoretical communism and practical communism have long been held as different political sociologies. Despite Marx’s call for the working class to revolt, the communist revolution’s leaders always ascend from the intelligentsia. John Stormer’s “None Dare Call It Treason” supports this fact saying:
“Fidel Castro was a product, not of the cane fields of Cuba, but of the halls of Havana University.”
“Joseph Stalin was not a simple peasant rebelling at the oppression of the Czar. He became a communist while studying for the priesthood in a Russian Orthodox seminary.”
“The membership of the first Communist spy ring uncovered in the U.S. Government was not spawned in the sweat shops of New York’s lower east side or the tenant farms of the South. [The conspirators] came to high government posts from Harvard Law School.”
Communism’s fallacy is the belief in everyone’s benevolence; yet, human nature proves otherwise. Communism cannot create a perfect society with imperfect people. Hence, to direct Utopia, communism produces a totalitarian government over the less-perfect people, ruled by the perfect people – communists. Thus, communism’s true nature creates a controlling government in the name of a better world.
Not every supporter needs be a knowing conspirator. Supporters could be “under the [communists'] spell.” Therefore, the true communist threat comes from people who can be deluded into supporting a controlling government in the name of a better world. John Stormer’s “None Dare Call It Treason” concurs with this conclusion saying:
“Communism is a disease of the intellect. It promises universal brotherhood, peace and prosperity to lure humanitarians and idealists into participating in a conspiracy which gains power through deceit and deception and stays in power with brute force.”
From Communism to Cyber-Communism
Richard Barbrook’s “The::Cyber.Com/Munist::Manifesto”[9] and “Cyber-Communism: How Americans are Superseding Capitalism in Cyberspace” (parts 1[10], 2[11], 3[12], 4[13]) draw parallels between communism and cyber-communism. He associates the Soviet Union’s gift/communist economy, where people freely exchange material goods, with the open source gift/cyber-communist economy, where people freely exchange source code. He concludes that cyber-communism promises a digital Utopia.
However, like communism’s promises, cyber-communism’s promises are not manifesting themselves. Monty Manley’s “Be an Engineer, Not an Artist”[14] cites poorly designed code to assert that unpaid programmers will work only on “sexy” projects. Scott Billings’ “Where’s the Creativity?”[15] challenges Linux supporters to show one original idea in Linux, reminding us that Linux itself is not an original idea.
Now, I am not condemning open source itself. Cyber-communism’s fallacy is funding the open source development method. Xavier Basora’s “Open Source and Nag Screens: Contradictions of the Bazaar”[16] mentions a shareware open source program to demonstrate the difficulty of funding “free” software. Eric Raymond’s “The Magic Cauldron”[17] provides many theoretical economic models, but he fails to provide any case studies to demonstrate their practicality. Red Hat follows Eric Raymond’s economic model and still suffers fiscal losses. Richard Stallman’s “The GNU Manifesto”[18] admits programmers will “not [be] paid as much as now.” Therefore, cyber-communism’s true nature moves software development to an unfeasible economic model. Andrew Leonard’s “The Cybercommunist Manifesto”[19] concurs with this conclusion in his critique of Richard Barbrook saying:
“Barbrook’s analysis does jibe well with fears expressed by some software programmers concerning the possibility that free software could prove to be an economic disaster for the software industry.”
Cyber-communism, like communism, is about control. John Zedlewski’s “Winning the Open-Source Support Game”[20] proposes that one company provide technical support for all open source software. Instead, his plan would only create an open source support monopoly. Liviu Andreescu’s “What to do about Monopolies?”[21] says, “Communism has nothing to do with turning… [Microsoft's] code in open source.” To the contrary, cyber-communism wants all products to move into open source to shift control from the corporation to the digerati. Thus, the true cyber-communist threat comes from the digerati’s members who can be duped into supporting an economically unfeasible development method.
Subversion is already in progress. “Hacker”[22] originally meant highly skilled programmer. Eric Raymond’s “How to Become a Hacker”[23] redefines “hacker” as a programmer who supports open source. Robert Lemos’ “The New Age of Hacktivism”[24] observes hacking being done for political reasons. Still, halting cyber-communism is not difficult.
Halting the Red Menace
Stopping cyber-communism is simple. We need only break the cyber-communists’ source of control. End-users depend on the digerati/hackers to provide technical support. To break the dependency, we need to made technology so easy that everyone can use it, as said in John Holmes’ “The Age of Everyman Tech: The End of Geekdom As We Know It”[25]. However, Michael Kellen’s “Death to Wizards!”[26] illustrates that some, mostly cyber-communists, will oppose easy-to-use. Besides, an easy-to-use program translates into little technical support revenue for an already failing economic model.
1 http://www.msnbc.com/news/435153.asp
2 http://music.excite.com/artist/biography/2089
3 http://www.ipass.net/~jthrush/biafra.htm
4 http://www.angelfire.com/punk/jello2000/platform.html
5 http://flag.blackened.net/daver/anarchism/mlc/mlc1.html
6 http://www.techweb.com/encyclopedia/defineterm?term=digerati
7 http://www.osopinion.com/Opinions/CoreyWinesett/CoreyWinesett2.html
8 http://www.osopinion.com/Opinions/ScottBillings/ScottBillings5.html
9 http://www.nettime.org/nettime.w3archive/199912/msg00146.html
10 http://www.nettime.org/nettime.w3archive/199909/msg00046.html
11 http://www.nettime.org/nettime.w3archive/199909/msg00047.html
12 http://www.nettime.org/nettime.w3archive/199909/msg00049.html
13 http://www.nettime.org/nettime.w3archive/199909/msg00045.html
14 http://www.osopinion.net/Opinions/MontyManley/MontyManley17.html
15 http://www.osopinion.com/Opinions/ScottBillings/ScottBillings3.html
16 http://www.osopinion.net/Opinions/XavierBasora/XavierBasora80.html
17 http://www.tuxedo.org/~esr/writings/magic-cauldron/magic-cauldron.html
18 http://www.gnu.org/gnu/manifesto.html
19 http://www.salon.com/tech/log/1999/09/10/cybercommunism/
20 http://www.osopinion.net/Opinions/JohnZedlewski/JohnZedlewski4.html
21 http://www.osopinion.com/Opinions/LiviuAndreescu/LiviuAndreescu2.html
22 http://www.techweb.com/encyclopedia/defineterm?term=hacker
23 http://www.tuxedo.org/~esr/faqs/hacker-howto.html
24 http://www.zdnet.com/zdnn/stories/news/0,4586,2651320,00.html
25 http://www.osopinion.com/Opinions/JohnHolmes/JohnHolmes3.html
26 http://www.osopinion.com/perl/story/6123.html
370
! |
Как писать рефераты Практические рекомендации по написанию студенческих рефератов. |
! | План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом. |
! | Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач. |
! | Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты. |
! | Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ. |
→ | Виды рефератов Какими бывают рефераты по своему назначению и структуре. |