Computer Juridisms -- Cornelia Vismann & Markus Krajewski Full Citation Vismann, Cornelia, and Markus Krajewski. `Computer Juridisms'. Grey Room 29 (2008): 90 - 109. Print. Notes 1. Symbolic Machines - Law as a transfer system for transferring rights; law is a media system (pp. 91) - The way law disregards its media as "mere tools" that can be regulated (pp. 91) - The upshot being that law attempts to regulate its own mediatic "grounds for existence", forming a paradox (pp. 91) - Outlines how law and media have been competing transfer regimes which stabilized in relation to each other (pp. 91) - But this upset by the emergence of computing which is also a universal media by acting "in a lawlike manner" (pp. 91) - Adopting "access and restriction" as its underlying operation - Both law and media "exert discourse regimes" in the same way structurally: binary decision-making, control mechanisms of inclusion/exclusion (pp. 91) - Redundancies btwn law and computation render law ineffective (pp. 91) - Law is blind to its dependence on computer media and its "structural homologies" (pp. 92) - Outline of that analysis: - Examination of law-computer isomorphism; how their competition is over which system gets to "define reality"; legal fiction vs. digital virtuality (pp. 92) - Def of "virtual" = "a mode of reality that avoids the space-time categories of the law", emerges alongside GUIs (pp. 92) - Virtuality of this kind threatens the law since it has no direct reference, pure representation; undercuts the continuity between sign and thing that underlies law (pp. 92) - Core concepts of law (from this): "corporeality, finitude, and authentication" (pp. 92) - Law attempts to preserve itself through: - Fiction -- "fakes the reality of the physical world", the legal fiction (pp. 92) - Simulation -- Specifically applied to property definition; the production of scarcity and singularity; the production of artificial scarcity in digital condition of near infinitude; production of artificial singularity in a digital condition of interchangeability (pp. 92-93) - Media-Technology -- electronic authentication procedures as a means of connecting machine addresses to human identities, eg. cryptography - The assertion that computation has won out over law for the definition of reality and therefore sovereignty; however, this required computation to go through a process of "juridification", an "adaptation of the computer to the legal framework." (pp. 93) - "...incorporating basic elements of the legal system into its own administrative structure..." (pp. 93) 2. The Silence of Legislators - Legislation ignored computing for its first 3 decades until 1989 (in US) when computational infrastructure was shown to be vulnerable; later legislation when the computer & internet became central to economic operation; US reluctance to popularize internet until 1996, then regulation/legitimization of e-commerce in 2001 (pp. 93-94) - Europe situation very similar with EU standards in 1994 w/o mention of computer, but subsuming it to broadcasting (Germany); regulation for commercial interests in both cases; explicit reg. of internet in 2001 (pp. 94) - Notable that computing became legal matter as soon as it became a means of effecting commerce (pp. 94) - Differing views of legal hole in "cyberspace"; panic from legislators as "unrule-able" & welcome from others to cyberspace as self-regulatory (pp. 94) - "The absence of any manifest law does not amount to absolutely no legality whatsoever; it can mean, rather, that a legal structure has already somehow been internalized." (pp. 94) - Arguing that the computer did this early on through the regulation of multiple users, the hierarchy instituted to grant or deny access through a collection of rights; to regulate access to time; "the power of governance... the power to dispose resources." (pp. 95) A. Personifying the Computer - "Juridicial structure" of computer comes with the hiding of computer's "operational levels", making the lower levels of computation as inaccessible as the law (pp. 95) - Comes in 1971 with the transformation of computers into personal desktop from "engineer's appliance"; this done by Xerox (pp. 95) - Makes the computer an entity that "imputes things to persons." The main activity now being object manipulation at the interface (pp. 95) - New division between "users" (people) and "programmers" (lawgivers) (pp. 95) - Users need not know what else the computer is capable of; the user need not worry about the machine status of operations; machine appears to "..."speak" the user's language" rather than the user needing to write instructions; instantaneity of exercise of will (pp. 95) - Advent of user ends era of the engineer; people use the computer rather than compute and program; the user has none of the engineer's insight or knowledge (pp. 96) - Interaction is welcome but strictly controlled to the interface (pp. 96) - Computer is turned into a system with a technical base (switching core) and "ideologized superstructure" that is the visible surface interface (pp. 96) - The technical media sets the conditions of communication for the users beyond the threshold of their perception/ knowledge (pp. 96) B. The Chip, The Sovereign - Personal computers bear rights granted by the CPU (comparison to legal persons who also bear rights but these are granted by a state enforced law); example of the 80286 with its 4 levels of access (pp. 96) - Commands activated on the outside level are executed inside (pp. 97) - "The chip is sovereign: it establishes prohibitions, protects privileges, and implements laws of inalterability." (pp. 97) - Kittler's insight from "Protected Mode" that binary itself encodes the difference between commands and data, what the system allows to happen and what is prohibited for the user; this difference only appears with the advent of the user; the user cannot intervene on the level of specific addresses (pp. 97) - Most programmers don't even have access to RAM, leaving its responsibility to the computer itself; programmers are treated as users by other programmers; delegation of work is restriction of power towards "error prevention" (pp. 97-98) - The reduction of power towards error prevention reduces the machine's potential extensively (pp. 98) C. The Hierarchy of Operating Systems - Legal design of computer to deal with the scarcity of time - UNIX and how it deals with multiple users through two principles: 1) that users could be serviced in the idle time of other users & 2) that a computer could be made to run multiple processes at once (pp. 98) - This required strict rules to regulate time allocation (pp. 98) - "superuser" (root) as the ultimate authority over the access rights, residing at the top of the hierarchy (pp. 98-99) - System manager, hands over responsibilities to some users while limiting the privileges of others; root as the sovereign of the system and must therefore resist all attempts of "open access" which would put the system's stability and continuity in jeopardy (pp. 99) D. The Law of Media Under the Terms of the Computer - Long absence of legislation of the computer due to the already-legal form of computation: hierarchization of access (pp. 99) - File systems and chips are already designed as a legal system (pp. 99) - This renders outside legal regulation superfluous unless some commercial/state interest demands it (pp. 100) - The law intervenes in computing only when computing becomes a tool in "socioeconomic systems", then law renders itself a "conflict arbiter" (pp. 100) - In this case, only the interface is legally regulated; the person doing the communicating not the technology itself is the "object of legislation" (pp. 100) - This gives rise to the centralization of control over computing in the hands of a few companies; this monopoly "falls under the perceptual threshold" of the law (anti-trust legislation) (pp. 100) - Programmer's power begins where the user's power ends: at the edge of the interface; but programmers themselves are subject to a hierarchy of control/power (pp. 100) - "normal" programmers are really users of another programmer's material which constrains what they can/cannot gain access to/do (pp. 100) - Programmers are law makers; the code is a law (there's more than a homology here) (pp. 100) - It is through the popularization of the computer that the "juridism of the chip's architecture" was produced (pp. 100-101) - With the limitation of access comes the reflex demand for access (relates this to the 21st cen. watchword of "access to____") (pp. 101) - Contemporary laments concerning legal non-access to "cyberspace" betrays a larger non-reflection of law upon its own media-technological supports (its "mediality") (pp. 101) - Media technologies are the "conditions under which all systems, including the legal system, think and speak." - The computer as impetus to review relation between media and law (pp. 101) - Assertion of media as the conditions of possibility for communication (pp. 102) - "Needed is a media theory that liberates media from its teleological confines. It is no longer sufficient to focus on the end of the communication process where the so-called user is supposedly found." (pp. 102) - Necessity to examine the processes of transfer itself! (pp. 102) - "...for neither the bearer nor the guarantor of rights, neither the subject nor the state, can any longer be regarded as preestablished, stable entities." They're already in transition during the transfer process (pp. 102) 3. Codes, Commentaries, and Codifications - Legal organization of code also regulates computational networks, ie. the internet (pp. 102) - Through "protocols" - Distinction between code and law: "code" designates "self-emergent forms of law" as opposed to state established "law" (pp. 102) - Code is collectively produced by "practices and habits among colleagues" and are therefore inherently and easily changeable at any time; they need no "institution of enforcement" and are decided by "voice and exit" (pp. 102) - Each subject to the code either disengages (exit) or expresses their opinion (voice) (pp. 102) - Codes are "rules of inclusion" since they only "...address everyone who wants to be..." (pp. 102) - Codes requires a "higher degree of compliance" that state law; one must actively engage rather than have law imposed (pp. 102-103) - Computer codes, in light of the above, are: "...intrinsic, autonomous, alterable, and thus permanently optimizable norms." (pp. 103) - Computer codes emerge from a commenting process which is collaborative rather dan dictatorial (pp. 103) - Source code is mediated, translated from human to machine readable binary; it's a hybrid text: instructions and comments, documentation (human readable) and sequence (machine readable) (pp. 103) - The example of Donald E. Knuth's LaTEX and WEB as a fusion of code and comments (pp.104) - Preprocessors (eg. compilers) codify the code to machine-executable form, acting as a filter by "the insertion of a juridicial structure at the level of the protocol"; filtering out all comments (pp. 104) - "...tell the desired story..." from the code; "somewhat like telling right from wrong." (pp. 104) - Commenting culture produces "codes and codifications at the network level." (pp. 104) - The RFC process in producing network standards; the word "comment" intending to express that one could say anything and none of it was official (pp. 104) - The ARPANET as the "transformation of a permanently self-commenting commentary into a code..." (pp. 105) - The collaborative process of commenting remains inherently juridical; this "undermines the story of self-regulation in cyberspace" (pp. 105) - Undermines the idea that this was an ideal "organic way to make code" that is fully autonomous in some way by noting that some agent, whether human or "human-built" must filter all the comments and decide which ones should become code (pp. 105) - Not all commentary can become code, the need to meet a level of standardization; Juridism appears as a central agency that defines norms (pp. 105) - In the case of ARPANET, Jon Postel was the central filtering authority (pp. 105) - History of law demonstrates that cultures of commenting are no impediment to codification and often are the source of legal codes [my eg. English Common Law] (pp.106) - The example of Justinian's Digest and the process of filtering, then codifying Roman common law (pp, 106) - The codification of law ends a process of "law in the making" that is often remembered with nostalgia as a "time when comments still had the power to create and overthrow codes." (pp. 106) - Views on the juridism of computation and the codification process - Alexander R. Galloway noting that centralization on the side of the code is a precondition of more freedom for the user; "autonomy requires an "autonomy-granting institution" (pp. 106); that codification is necessary to clean up the "disorder and confusion" of commentary (pp. 107) - The view that codification is unavoidable; a "creeping codification"; this view ignores the fact that some authority does the codification (pp. 107) - V & K propose that juridism is unavoidable in the computational context since codes straddle the legal and engineer's realms; what's necessary is a "perspective on computer developments that is equally well informed in media as in law to sort out the latent juridisms that contradict the predominant tales of self-regulation and autonomy..." in legal and computational contexts (pp. 107)