• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.



Page history last edited by dax 9 years, 7 months ago

English 473



Office Hours: Thursday, 3:15-4:15, Center for the Study of Altered Consciousness, 501 Carpenter & Friday, 11-1, Center for Sustainability (Porter Road)



Metaprogramming the Society of Control: Rhetoric and Contemporary Security Interfaces

There is no need to invoke the extraordinary pharmaceutical productions, the molecular engineering, the genetic manipulations, although these are slated to enter the new process. There is no need to ask which is the toughest regime, for it's within each of them that liberating and enslaving forces confront one another....There is no need to fear or hope, but only to look for new weapons. Gilles Deleuze, Society of Control






This course will focus student attention on the tools, practices and assumptions of the contemporary security state as it seeks to govern the constantly proliferating information commons in the Wars on Terror(isms) and Drugs. Students will collaboratively investigate and creatively alter discourses of filesharing, hacking, biometrics and identification, data mining, surveillence and Temporary Autonomous Zones. As a course in rhetoric (the science of attention), the seminar will offer theories and practices for navigating and altering contemporary rhetorical ecologies featuring internet telephony, rfid systems and multimedia technical composition in the open source commons and its constantly differentiating subcultures. Participants will help compose global open source standards for emerging technologies such as nanotechnology and biotelemetrics.

Course Requirements

As practice in the inhabitation of temporary autonomous zones, students will compose for wiki three times per week, working with texts, images and sound. Students will compose a collaborative as well as individual final project analogous to a 15-20 page research paper.





Cached Syllabus - In case the current one is down


Blog Pile - Student Blogs are created here, where they are banged upon, composed. dreamed, intertwingled three times weekly.




A Primer on the History of Programming Languages


 Draft of New GPL License

2600 The Hacker Quarterly


The Cryptoanarchist Manifesto


Bey, Hakim Temporary Autonomous Zones and Ontological Anarchy


Burrroughs, William S. The Electronic Revolution


Clastres, Pierre. Society Against the State


Dick, Philip K. Ubik


Doyle, Richard. The Transgenic Involution


Department of Homeland Security, National Strategy to Secure Cyberspace


Lessig, Free Culture


Yu Wei Lin    Hacking Practices and Software Development: A Social Worlds Analysis of ICT Innovation and the Role of Free/Libre Open Source Software


The Political Economy of Open Source Software


Wilson, Robert Anton Cosmic Trigger (Volume 1)


A Rulebook for Argument

The Social Engineering FAQ





Entropy Growing a Surveillence-Free Peer to Peer Network Inside the Internet

Bittorrent - You'll Need This or another Bittorrent client to download the Lessig torrent




Hope So Many MP3s of digital culture, so little time]


A Torrent of Hope





Operating Systems

Ubuntu - Linux For Human Beings


Open BSD









Latest Softwares





computer help forum





Comments (0)

You don't have permission to comment on this page.