JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2001

CYBER-SOCIETY-LIVE 2001

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: THE INFORMATION TECHNOLOGY, WAR AND PEACE PROJECT

From:

John Armitage <[log in to unmask]>

Reply-To:

The Cyber-Society-Live mailing list is a moderated discussion list for those interested <[log in to unmask]>

Date:

Mon, 1 Oct 2001 20:32:10 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (105 lines)

[Hi all, James Der Derian has set up a new website at Brown University =in
the US covering all things to do with the events of 9.11 in New York. Web
address and some details below. John.]
====================================================== 
THE INFORMATION TECHNOLOGY, WAR AND PEACE PROJECT 

www.infopeace.org  

September 23, 2001


9-11: States of Emergency, Technologies of Terror, and the War of
Networks


A message from James Der Derian, Director ITWP

On 9-11, in the blink of an eye, the United States was plunged into a
state of emergency. In a carefully coordinated suicide attack, terrorist
hijackers transformed three commercial jetliners into highly explosive
kinetic weapons, which toppled the twin towers of the World Trade
Center, substantially damaged the Pentagon, and killed over five
thousand people. Shortly after the attack, in the midst of the horror
and grief unleashed by the tragedy, demands for quick answers to angry
questions escalated: How could this happen? Who was to blame? How best
to respond? 


For a prolonged moment, tragic images of destruction and loss, looped in
24/7 cycles, induced a state of emergency and trauma at all levels of
society. At this point it is important to remember Freud's insight that
while trauma can be re-enacted, even re-experienced, the inability to
understand what is happening, to assign a meaning to the event at the
moment of shock, is characteristic of trauma. This is what Michael Herr
meant when he wrote about his own experience with the trauma of Vietnam:
"It took the war to teach it, that you were as responsible for
everything you saw as you were for everything you did. The problem was
that you didnít always know what you were seeing until later, maybe
years later, that a lot of it never made it in at all, it just stayed
stored there in your eyes." 


In the rush to judgment there has been little time for deliberation, for
understanding the motivations of the attackers, or for assessing the
potential consequences, intended as well as unintended, of a military
response. It is time to take time, to understand the full significance
of the 9-11 attack, and to transform these images of horror into
responsible discourses of reflection and action. 


The 9.11 website is dedicated to providing a deeper, broader, yet timely
analysis, with a particular focus on questions raised by the pervasive
role that information technology plays in these events. What role has
the media played in this crisis? Cell phones, satellite phones, and
videophones? The Internet? Did web encryption provide the terrorists
with the means to command and control the attack with impunity? What new
laws and forms of technological surveillance are likely to result? Did
new technologies of simulation, developed by the military and adopted by
the airline industries, enhance the success of the terrorist mission?
Did a shift from human to technical intelligence in the intelligence
community leave the U.S. vulnerable? Is the 9-11 attack a reaction to or
the product of globalization? Can a military response follow in the
example of the Gulf War and the Kosovo campaign, with high-precision
weapons and low casualty rates (at least for the
technologically-advantaged side of the conflicts)? Or will it be more
like Somalia, a virtuous war with unholy consequences? 


We are soliciting responses from a wide range of experts and concerned
individuals, from the university, business, military, government, NGO
and activist circles, which will be posted on a regular basis. We are
also organizing global online forums around these questions, and we
encourage all parties to participate in the spirit of openness,
civility, and democracy that has been so severely tested by recent
events. We are seeking rapid yet responsible responses. 


This week we are featuring a chronicle of the events as they appeared in
emails around the world. Some of the emails were later published in the
print media, some became the subject of primetime television programs.
They represent the internetís first response. Next week we will feature
international relations and internet expert Ron Deibert on 'Wars of the
Wide Area Networks', a critical examination of the integration of global
communication networks with 21st century forms of warfare. Future
features will include essays by David Campbell on the power of images in
the 9-11 attack; Monroe Price on the contest between Constitution,
circumstance and the internet in shaping US national security policy;
Laura Kurgan on the role of surveillance imagery; Lene Hansen on
European networks; Tom Keenan on media coverage and human rights
discourse; and many others. Anyone interested in writing a feature
essay, forwarding INFOinterventions, or providing links for the website
should contact [log in to unmask] <mailto:[log in to unmask]> . 


This was, and will continue to be, a war of networks. We will do our
best to expose, study, and counter networks that propagate violence,
fear, and disinformation. 

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager