Protocols, objects and exceptional topologies

If we are to follow the likes of Anna Munster and Geert Lovink in problematising the concept of the network as a unified or stable object, then perhaps we need a different point of view. As they put it: “the very notion of a network is in conflict with the desire to gain an overview” (2005). Maybe it is that ‘overview’ that leads us astray. Perhaps we need an ‘underview’, a view not from a different level but at a different scale. Protocol studies offers such a perspective… if we account for protocols as objects without foundations. If we locate protocols and standards – Internet in Galloway’s case, Ethernet in Miyazaki’s or imaging in my own – as either the outcome of structural processes (capitalist development, control societies etc) or as some determining essence, we not only fail to address the specific operations of those protocol objects and the alliances within which they enfolded, but also open them up to the sort of counter-protocological struggles or ‘exploits’ that Galloway talks about with Eugene Thacker (2007).

Miyazaki’s focus on time, through rhythm, adds a certain level of dynamism to the imag(in)ing of networks and so network politics, but that needs to be framed within an ontology that also places the emphasis on movement. It is here where I believe an object-oriented philosophical (OOP) approach (drawing on Harman’s reading of Latour (2009) and later speculative realism) offers a way of tracing the connections (or in OOP terms, the alliances) between protocol and corporate interests and state institutions as well as other scales of software. What is particularly useful about OOP is not only its refusal to engage with foundations and its flat ontology (treating protocols as actants equal with other material and immaterial forces and players), but its demand that networks (in the ANT rather than the narrow technical sense) be seen as always in motion, folding and enfolding, fractal and generative. In terms of my own work. The jpeg protocol’s alliances with Google’s search algorithms and business practice, Facebook’s data mining and face-recognition strategies as well as Apple, Nikon and Adobe’s businesses, Police databases etc are themselves enfolded with other software, material and immaterial actants. Those alliances are continually remade as artists and activists imag(in)e through the jpeg scopic apparatus but also as Facebook friends who have no interest in “network politics” use its capacity for metadata to tag, geolocate, link, connect and share.

This movement, the sort of rhythm perhaps that Miyazaki is exploring, demands an analytical framework that is equally fluid. As Galloway says: “we require a method of analysis unique to protocol itself”.

But it is not just at the level of analysis that an object-oriented approach to protocol offers possibilities. Galloway and Thacker say that “to be effective, future political movements must discover a new exploit… an antiweb… an ‘exceptional topology’” (p22). This is not some alternative space but rather the sort of different view, conceptualisation or ontology that OOP allows. By framing protocol as object-actant setting network effects and affects in motion, we are able to not simply deconstruct dominant imag(in)ings but also open the black boxes (OOP’s term for objects that have become so everyday they have become transparent) to reconfiguration. Mashups can be seen as an example of this exceptional topology. Here protocol generates new imag(in)ings. In terms of my own case study (the 2012 Olympics), the same protocol that generates imaginaries around legacy can generate imaginaries of globalised sports-business. My hacking the jpeg metadata to geolocate an image of a sportswear sweatshop inside the Olympic stadium, an exceptional topology is set in motion as soon as a visitor to the opening ceremony uses their iPhone to view “images taken nearby”. This is not to say that such protocol-trickery, such semiotic samizdat is the sum total of scopic network politics. What is more important is that protocol is not a fixed tool but a field of possibilities.

  • Galloway, A.R. & Thacker, E., 2007, The Exploit: A Theory Of Networks, Univ Of Minnesota Press, Minneapolis.
  • Harman, G., 2009, Prince of Networks: Bruno Latour and Metaphysics, Anamnesis, Melbourne.
  • Munster & Lovink, 2005, Theses on Distributed Aesthetics. Or, What a Network is Not, FibreCulture(7).

Added as contribution to Network Politics: Request For Comments.

Tweets for the week :: 2011-01-16

Powered by Twitter Tools

Belay: 16 January 2011

Rock climbers belay. As they head higher, they add an anchor point (a ‘save as’, a ‘snapshot’, a ‘back-up’) in the rockface. Should they fall, they only fall back as far as the belay point. As I head towards summer 2012 (my submission not the Games) hopefully making progress 5(00) at a time, I’m going to pause to belay for three reasons:

  • When people ask me what I’m doing/researching/writing, I’ll have an anchor to point them too
  • I’ll be able to look down on these points and see how the view has got clearer and hopefully more interesting
  • If I fall, well I’ll have something to catch me and a point to start again from.

Belay: 16 January 2011

I am looking at the relationship between the jpeg protocol that compresses digital image data and the new photographic and imaging practices of sharing, publishing, streaming, archiving and remixing online that can be seen as a distributed ‘scopic regime’. My aim is to explore how the powerful implications and issues raised by that regime – issues of intellectual property and copyright, ethics, materiality and affect – are related to the protocol code.

These research questions arise from practice-research, or more correctly the failures at the heart of that practice-research. Through a series of imaging experiments, I have been trying to ‘chase protocol’, to locate it rather than see its effects; to separate it from the image, the signification and the visualisation; to track its relations to corporate and state interests that use it in surveillance, marketing, archiving and social networking businesses . I have failed. I have found the trails of the issues it raises, the traces of its operation and relations but not it.

This has led me to explore a framework for understanding and accounting for that slippery nature, that materiality/immateriality, that reality/virtuality, that stasis and praxis. I am exploring whether object-oriented philosophy can provide an account of this protocol-object that not only explains its position but opens up the possibility for its political reconfiguration or counter-protocological struggle.

Object-oriented philosophy takes all objects seriously. From this perspective, protocol is an object doing things in the world, an object-actant. As with all other objects, whether material or immaterial, real or virtual, the protocol-object is folded into relations with other actants in the network (NB not just computer networks). Its power arises from the relations or alliances in which it is folded. Jpeg’s presence in Google and Facebook’s businesses, Microsoft and Apple’s operating systems and Adobe’s software as well as my iPad and my daughter’s phone and social networking relations means that jpeg has become so enfolded and so everyday and transparent that it can be considered as a ‘black box’, a power-full object so firmly established we take its ‘interior’ (those actant-relations) for granted.

An object-oriented approach allows us to approach and map jpeg without recourse to a foundationalist or essentialist position that would see it as the source of scopic effects or power relations. Rather it can be addressed as a scopic apparatus – a device for imaging – that has a specific position, a history and a future. This view, derived from media-archaeological accounts of apparatuses and technologies as historically located, material and enfolded, means we can look at how jpeg can be a field of struggle, how it can be enfolded into alternative imaging practices such as mashups.

Opening up the “ness” of wirelessness

Adrain Mackenzie’s subject is ‘wirelessness’, the assemblage of practices, forces, ecologies and affects set in motion by Wi-Fi’s technical and cultural workings. He defines it as “an experience trending toward entanglements with things, objects, gadgets, infrastructures and service, and imbued with indistinct sensations and practices of network-associated change”(Mackenzie 2010: 5). His reading of William James drives him towards a focus on experience as a way of approaching the practical “inseparability of thinking and the things” (p14). Wirelessness here is a matter of “transitions and feelings of being in transition” (p39) the same themes that are at the heart of James’ radical empiricism. He often cites James’ insistence: “The relations that connect experience must themselves be experienced relations, and any kind of relation experience must be accounted as ‘real’ as anything else in the system” (James 1996: 42). James dynamic philosophy in motion, with its flat ontology is, for Mackenzie a useful tool to approach the dynamic spaces and relations of wireless urban experience which requires an acceptance of things and thinking as objects of analysis and, it could be argued object-actants.

What is important is how he sees code as part of this conceptual structure. Mackenzie, as in his previous work, is not afraid to deal with the “monstrously complicated” scales of software studies (Mackenzie 2008: 48) whether that is video codecs (2008), languages (2005, 2006) or algorithms (Mackenzie 2006). Here too Mackenzie feels it necessary to draw an account at the scale of algorithms in order to not only present a full picture of the experience of wirelessness but also in order to be able to trace the power relations in operation that his radical empiricism demands remain open and at the centre of analysis.

He argues that Digital Signal Processing (DSP) algorithms, “if acknowledged at all, {…] are treated as the most abstract aspect of electronic media and communication technologies, the part that lies closest to mathematics. We need a much more sensitive treatment of their becomings” (Mackenzie 2010: 66-67). Here algorithms, or protocols, are not looked at as background or foundation or dangerous supplement. Rather it is their ‘becomings’ that is at the heart of the arrivals, departures and transitions within networks and wirelessness as well as network and wireless experience. “They transduce realities,” he says (p67). In my terms they imag(in)e. We will come on to address the subtle difference between Mackenzie’s reading of radical empiricism and object-oriented philosophy but what is important to note here is first that Mackenzie treats software as implicated and in/enfolded in the “ness” he is looking at, within the different scales. Secondly it is important to note that he treats the algorithmic/protocol scale of software as at the heart of the issue. It is here where imag(in)ing works. It is here where analysis and ontology can develop and it is these objects (in his case the fast Fourier transforms, that also under[pin jpeg, and the convolutional coding-Viterbi  decoding (pp72-77)), that open up that “ness” experience, that black box, to analysis.

  • James, 1996, Essays in Radical Empiricism, University of Nebraska Press, Lincoln.
  • Mackenzie, A., 2005, The Performativity of Code : Software and Cultures of Circulation, Theory, Culture & Society, 22, pp. 71-92.
  • Mackenzie, A., 2006, Cutting Code: Software And Sociality, Peter Lang, New York.
  • Mackenzie, A., 2006, Java: the practical virtuality of internet programming, New Media & Society, 8(3), p. 441.
  • Mackenzie, A.,  2008, Codecs, in Fuller (ed), Software Studies : A Lexicon, MIT Press, Cambridge, Mass., pp. 48-54.
  • Mackenzie, A., 2010, Wirelessness: Radical Empiricism In Network Cultures, MIT Press, Cambridge, Mass..

Like Keyser Söze, it just slips out of sight/site.

I teach a postgraduate class at Birkbeck, University of London which explores issues around journalism in an age of the Live Web. In the first session, as a way of the students getting to know each other, and for me to know them, I get the class to interview each other and publish a story. The idea is that they produce something and post it online, raising issues of what is ‘journalism’?, speed, mobility, informality, open and closed source, content relationships etc. As proof of concept, while they are working I take a photograph and post to Flickr and Twitter. I deliberately make the picture as bland and ‘unprofessional’ as possible so that the emphasis is on the issues not the image. This exercise is also an experiment with jpeg.

My iPhone takes the image and the camera software compresses it using the jpeg protocol, adds the suffix .jpg and saves the image file to the phone memory. Already protocol is ‘withdrawing from view’. Having done its work between the capturing and the saving, it retreats, hides, leaving only its trace behind – encapsulated in the suffix. But the jpeg protocol actant, in its network alliances has had real effects. Jpeg is the chosen compression protocol in the iPhone software. Apple’s designers could have chosen GIF, or PNG or even RAW as a way of encoding the digital information its CCD provides to the software. They didn’t. One reason is because of the high compression offered by jpeg. This allows more images to be taken more quickly (writing a large file to memory can be a slow process, forcing the user to wait). This can be a selling point for consumers. It also allows iPhone images to be flexible and interoperable, allowing iPhone app developers to create apps that manipulate or share the images using standards they can work with, building the sort of App ecosystem that Apple is now seeing as central to its business and locking-in the user to that ecosystem and arguably proprietary space. In effect Apple uses an open standard as part of a closed business strategy.

I used one of those closed Apps to upload my image to two social media spaces – Flickr and (via Mobypicture, the default image service with my Twitter app) Twitter. Again the jpeg protocol’s alliances not only enabled these practices but constructed them in particular ways. As a compressed image, my jpeg-encoded photograph, could easily pass through the narrow bandwidth available on mobile networks (itself the site of other protocols and actant-alliances, e.g. TCP/IP, DNS etc). As a jpeg-encoded image, Flickr could recognise and post it to my page immediately. If my image had been encoded using a different standard e.g. Tiff, Flickr would have had to decode and re-encode it using the jpeg protocol to make it work and visible in its databases. Like Apple, Yahoo’s Flickr engineers chose to use the jpeg-protocol to encode the images it archives and displays. To a certain extent they had no choice. As imaging devices standardised around the jpeg protocol and other sites and services defaulted to “upload your jpeg” (sic), Flickr needed to ensure its(!) images were interoperable and the barriers to entry for consumer/imagers was as low as possible, the site was as fast as possible and the tools available were as attractive as possible. This is where again the jpeg protocol established new and powerful alliances around its metadata. The jpeg protocol allows EXIF metadata to be added to the file during compression. Camera and image management software can write information about the moment of taking, the choices the imager made and the location. All of this can be read by Flickr’s software and made added value for the Flickr imager by being added to the database, the page and Flickr as well as the imager’s archive. It is important to separate the metadata that jpeg enables from that Flickr allows a user to add. As I upload, or later I can add other information to my image: title, description, tags etc. This information is added to the file’s entry within the Flickr database. But other information in that database has been provided through the jpeg/EXIF protocol, which during encoding adds metadata to the image file – not the database entry. This information is then read into the Flickr database entry.

Again, in the Flickr practices of uploading, publishing, searching, downloading and printing through a jpeg-aware desktop programme, we are seeing the traces of the jpeg protocol but not the protocol itself. The ‘Flickr image’ both on my page and within Flickr’s databases, searches and streams of imag(in)ings, the sharing, embedding and imagining practices that happen around those streams within the distributed scopic regime, have been enabled and set in motion by a protocol. Flickr’s business (and the ecosystem of apps, programmes, widgets, search engines, artworks and PhD theses that surround it) are in/enfolded with jpeg.

I also uploaded the jpeg-encoded file to Mobypicture. I didn’t choose to. Within my Twitter app I chose to add a picture to my 140 character ‘publication’. Because Twitter itself is only based around textual information, working only with text (and of course network) protocols, another ecosystem has developed around Twitter which allows/encourages users to share non-text information such as images and videos. My app, defaults to Mobypicture. One the reasons it does that (leaving aside any possible commercial tie-ups) is that the iPhone camera software, the Twitterlator app software and the Mobypicture software (as well as the browser software on phones and desktops) are jpeg-aware. They are built with that protocol in mind. They expect to receive jpeg-encoded information from other actants in the network.

The extra-textual information I added to the Tweet – my #birkbeckmedia tag, link to the class website, geolocation, comment etc wraps around the link to Mobypicture. The image (on another site/server), the website, the ecosystem around my tag are brought together within the 140 characters while at the same time remaining distributed objects. This complex in/enfolding/outfolding, distribution/concentration, maybe deterritorialisation/reterritorialisation or exteriority/interiority are the traces of protocol and standards: http, TCP/IP, DNS, XMPP, OAuth and of course jpeg. These protocols withdraw from view. In Heidegger’s terms we don’t see them until they break. In ANT terms, they’re black boxes, so everyday they become transparent like Serafina Pekkala, the witch in Philip Pullman’s His Dark Materials, not invisible, just unnoticed.

The practices of distributed imag(in)ing that make up the new scopic regime create distributed objects. The jpeg-encoded image that was on my phone is now on my phone, my computer, in my computer’s cache, on a Flickr server, a mobypicture server, in viewer’s browser caches and possibly their iPhoto library folders etc. It’s jpeg-encoded metadata is now in databases and search caches. Maybe to even talk of ‘in’ and ‘on’ is problematic. There is no single, simple image-object. Protocols have constructed that object as a distributed multi-object, constantly in motion at different scales, within different alliances. This, of course has profound impact in terms of ideas of intellectual property, privacy and ethics. Jpeg as protocol-actant-object is in/enfolded with those discourses, practices and institutions. But again the only way of approaching that in/enfolding is through the traces. Protocol itself, like Keyser Söze,  just slips out of sight/site.

At one level the jpeg protocol’s work is done when it finishes encoding and compressing digital information from a CCD chip into an image. At another level, its work is just beginning. Given the right equipment and skills we could possible see the protocol working to encode, compress and create a file. It is possible to envisage a laboratory device (or software) that made that process visible, like a microscope showing the wonders of nature in slow motion. What that equipment or software could not show is that other work: the alliances jpeg sets in motion or supports, the business, cultural and political practices it is in/enfolded within, the regimes of truth it is implicated in.

Adding scales to our eyes

Discussing the operations of protocol leads inexorably to the issue of ‘depth’. It is tempting to talk of protocols as the building blocks for software or software relations, to speak of different levels within software architectures or within analysis. Galloway for instance talks of the four nested layers of the Internet suite (2004: 39), themselves part of the ISO’s seven-layer Open Systems Interconnection Reference Model. In engineering terms this makes sense but in ontological, and arguably political terms it is problematic.

Graham Harman reads Bruno Latour as advocating a “flat ontology” (2009). He goes on to argue for a more nuanced account of two-types of objects and a fourfold ontology, but for the present purposes, the key thing is the removal of depth metaphors, levels and foundations. ‘Irreduction’ is central to this Latour (Latour 1993) (of course trying to pin down a single “Latour’ object is similar to trying to pin down the wave/particle object, or indeed any other object-actant). Harman says: “nothing can be reduced to anything else. each thing simply is what it is, in utter concreteness” (17). This gives rise to the famous Latour litanies where lists of ‘objects’, material and mythical are made to bump against each other creating the sort of dialectical images Benjamin the collector would have been proud of (Leslie et al 2007).

So if, philosophically, we need to treat all object-actants as ‘equal’ – not in terms of value so much as in status – how are we to map the relations between protocol and ‘the Internet’, between jpeg and Google? Latour and Harman are clear that they need to be treated in their specific locations, as occupying positions within actant-networks particularly when an actant becomes so everyday and transparent in terms of its alliances with other actants that it becomes a ‘black box’. Adrain Mackenzie, although wary of what he sees as a microemphasis in social constructivist accounts (Mackenzie 2010: 218) reads William James’ focus on ‘conjunctive relations’ as an antidote to “most social and cultural theories that tend to cut realities into things, selves, locations and relations” (p39). Analysis and politics cannot collapse all actants into an ontological soup. It is not just thinking of objects in irreductionist terms, it is finding a language to articulate those relations. Mackenzie argues that ideas (our conceptions of levels and depths), “have an immanent function in concentrating and short-cutting transitions” (p32) (the sort of dynamic movement that he sees at the heart of wirelessness and can be seen in the operations of protocol). Ideas are a way of “establishing a trajectory or modulating a movement by substituting experiential short-cuts” (p35). Ideas like any other actant, do things in the world. That is why we need a conceptual apparatus that can account for a dynamic flat ontology.

As many writers following Deleuze (Deleuze &Guattari 2004: 537) such as De Landa (2000) and Bennett (2010) have shown, the language of fractals and complexity offers a way of conceptualising these alliances and black boxes without recourse to foundationalism. A fractal is self-similar. As James Gleick has it: “self similarity is symmetry across scale. It implies recursion, pattern inside of pattern” (1988: 103). It does not make sense to speak of levels as one falls into a Mandlebrot set or a Lorenz attractor. Each scale at which the equation works is self similar. The fern-like branches at one magnification are recursively present at others.

This is not just a metaphor. Actant networks are complex systems. The relationships, alliances and translations within software and media ecologies and assemblages are complex in a scientific as well as an everyday sense. They are fractal. The alliances and relations around jpeg are self-similar to those around Apple’s imaging software and Google’s image search. They are not the same. They are at different scales but one does not determine or act as the foundation or context for the other.

To speak and think in terms of fractal-scales within and across software ecologies is to leave questions about actant-network-relations open, to raise the importance of alliances as a focus of analysis and to potentially open up black boxes to what Galloway and Thacker call ‘counter-protocological struggle’ (Galloway & Thacker 2007).

  • Bennett, J., 2010, Vibrant matter : A Political Ecology of Things, Duke University Press, Durham.
  • De Landa, M., 2000, A Thousand Years of Non Linear History, Swerve Editions, New York.
  • Deleuze, G. & Guattari, F., 2004, A Thousand Plateaus : Capitalism And Schizophrenia, Translated by Massumi. Continuum, London.
  • Galloway, 2004, Protocol: How Control Exists after Decentralization, MIT Press, Cambridge, Mass.; London.
  • Galloway, A.R. & Thacker, E., 2007, The Exploit: A Theory Of Networks, Univ Of Minnesota Press, Minneapolis.
  • Gleick, J., 1988, Chaos, Cardinal, London.
  • Harman, G., 2009, Prince of Networks: Bruno Latour and Metaphysics, Anamnesis, Melbourne.
  • Latour 1993, Irreductions, in The Pasteurization of France, Harvard University Press, Cambridge, Mass.,.
  • Leslie, E., Marx, U. & Archiv, W.B., 2007, Walter Benjamin’s Archive : Images, Texts, Signs, Verso, London ; New York.
  • Mackenzie, A., 2010, Wirelessness: Radical Empiricism In Network Cultures, MIT Press, Cambridge, Mass..