{"id":4795,"date":"2019-04-20T18:09:46","date_gmt":"2019-04-20T22:09:46","guid":{"rendered":"http:\/\/blogs.law.columbia.edu\/praxis1313\/?p=4795"},"modified":"2019-04-20T18:09:46","modified_gmt":"2019-04-20T22:09:46","slug":"sami-cleland-epilogue-on-praxis-12-13","status":"publish","type":"post","link":"https:\/\/blogs.law.columbia.edu\/praxis1313\/sami-cleland-epilogue-on-praxis-12-13\/","title":{"rendered":"Sami Cleland | Epilogue on Praxis 12\/13"},"content":{"rendered":"<p><strong>By Sami Cleland<\/strong><\/p>\n<p>Banu Bargu\u2019s <em>Strave and Immolate: The Politics of Human Weapons\u00a0<\/em>and Tarek El-Ariss\u2019 <em>Leaks, Hacks and Scandals: Arab Culture in the Digital Age\u00a0<\/em>were the extremely interesting companion pieces that spurred our Praxis 12\/13 discussion on the old and new tactics that drive contemporary resistance against the late post-capitalist sovereign of our decidedly neoliberal era. Bargu\u2019s book examines the \u201cweaponization of life,<a name=\"_ftnref1\"><\/a>[1]\u201d which \u201centails the militant turning his or her life into a political weapon of struggle\u2026 the practices range from death fasts and self-immolation to other forms of self-mutilation or suicide attacks.<a name=\"_ftnref2\"><\/a>[2]\u201d During our discussion, Karuna Mantena highlighted how such tools of resistance have been circulating in global resistance struggles for centuries, and questioned the efficacy of such tactics. Is it inevitable that extreme acts of self-sacrifice will alienate the public and result in charges of fanaticism?<\/p>\n<p>El-Ariss\u2019 text explores the leak and the hack in the digital age, arguing that \u201cthe intellectual speaking truth to power\u201d is a space now occupied by a new generation of activists, bloggers, hackers and leakers.<a name=\"_ftnref3\"><\/a>[3] The power of the leak is that it creates a spectacle which the public simply cannot ignore: \u201cviewers cannot look away from scandals and leaks\u2026 they are drawn to the unfolding narrative of the secret that <em>must\u00a0<\/em>be revealed, and to the embodied exposure performed in viral videos and acts of hacking.<a name=\"_ftnref4\"><\/a>[4]\u201d While Susan Buck-Morss emphasized that there is likely little about the nature of contemporary State (or corporate) power that could surprise us, the scandalous act of the leak mesmerizes the public and directly confronts abuses of power. There is a meaningful distinction between presuming something is true and acquiring the \u201cconcrete [proof].<a name=\"_ftnref5\"><\/a>[5]\u201d<\/p>\n<h1><strong> Visibility and<\/strong> Efficacy<\/h1>\n<p>In the social media era, with endless content (read: <em>distraction<\/em>) at our fingertips, the primary goal of genuine grassroots political actors is often simply achieving visibility and ensuring their message reaches the public. During Praxis 12\/13, Mantena cited the \u201cenormous pressure to do more shocking things for the press.<a name=\"_ftnref6\"><\/a>[6]\u201d In generating this visibility, the \u201cweaponization of life\u201d and digital tactics such as hacking and leaking vary in terms of efficacy and clarity of message.<\/p>\n<p>Bargu distinguishes \u201cacts that are entirely self-directed (such as death fasts and self-immolations), which [she] refers to as defensive forms of weaponization of life, and acts that are simultaneously other-directed (such as suicide attacks), which [she] refers to as offensive forms of weaponization of life.<a name=\"_ftnref7\"><\/a>[7]\u201d Dealing first with the offensive weaponization of life, it quickly becomes clear that while tactics such as suicide attacks are extremely visible (drawing worldwide attention in the form of near universal condemnation), they fail to convert the public to a political cause and instead tend to retrench the public against perceived fanaticism.<\/p>\n<p>Moreover, with regards to distributing a political message, the offensive weaponization of life is often counterproductive. Famously, after the 9\/11 attacks on the World Trade Center in New York City, President George W. Bush misled to the American people by telling them that the suicide attackers \u201chate us for our freedom.\u201d In terms of publicizing their anti-imperialist, anti-colonialist message, the 9\/11 attackers failed miserably. States can quickly confer illegitimacy on the offensive weaponization of life by their political contestants by labeling such actors \u201cterrorists.\u201d<\/p>\n<p>Defensive forms of \u201cthe weaponization of life\u201d are often tied to the carceral context, where state control of the body and mind is at its pinnacle. As Bargu writes: \u201csince biopolitics functions by extending control over life itself, the argument goes, then resistance to it must accordingly occur as a response to this control and at this level.\u201d In the prison, hunger strikes and death fasts serve to make visible marginal figures and contest the maltreatment (including torture) that occurs in the prison context. Sadly, though, it is not clear that these self-sacrificial tactics galvanize the public. The state often responds aggressively with inhuman tactics such as force-feeding, and reporting around the hunger strike often distorts or clouds the political purpose of the hunger strike action. That said, it is important to remember that the audience for modalities of resistance is not only the public. The defensive weaponization of life reasserts one\u2019s agency over one\u2019s own body. As someone mentioned during Praxis 12\/13, only if you\u2019re alive can the sovereign exercise absolute power over you.<\/p>\n<p>There are many levels at which one can explore the efficacy of leaking as a practice of political contestation. Generally speaking, hacks and leaks generate significant media attention, as hacking and leaking \u201cembarrass, shame and expose, and, in doing so, engage a transnational public with accounts of political abuse and scandal.<a name=\"_ftnref8\"><\/a>[8]\u201d The digital world makes possible engagement across borders: \u201cas a result of the internet, we are now living in a time where it\u2019s a lot easier to convey what we know about our corner of the world and share it with others.<a name=\"_ftnref9\"><\/a>[9]\u201d But to what effect is the outrage generated by high-profile leaks? The most revolutionary outcome might lie in how leaks alter our understanding of State power. While the discrete leak highlights abuse of power, corruption, or dishonesty, on a more fundamental level the leak serves to \u201cexpose fictions of power, making a scene of their porousness and spills.<a name=\"_ftnref10\"><\/a>[10]\u201d Leaking \u201cinvolves a process of desacralizing power and delegitimizing its founding myths or fictions.<a name=\"_ftnref11\"><\/a>[11]\u201d With leaking, the public is empowered to question the legitimacy of State power and\/or how the State deploys its monopoly on the use of violence. This is undoubtedly a positive outcome; power and its legitimacy should constantly be questioned and investigated by the public.<\/p>\n<p>El-Ariss doesn\u2019t stop there, though, and instead emphasizes that our contemporary digital culture has had some decidedly problematic effects. As El-Ariss writes, \u201cin this new [digital] landscape a portal has opened up, unleashing fantasies of archaic violence and group formation, and further eroding idealized models of community, justice, and the law.\u201d The long-term effects of a digital and political culture built around hacking, leaking, exposing and shaming remain to be seen.<\/p>\n<h1>Means &#8211; Ends<\/h1>\n<p>For those on the outside looking in, tactics as severe as death fasts, when they have only the limited political goal of (for instance) improving prison conditions, are hard to understand. Bargu emphasizes that the \u201cends\u201d of \u201cthe weaponization of life\u201d are not always political or outside oneself, and that looking at means\/ends solely through the lens of something akin to economic rationality is inapposite: \u201c[the body\u2019s] deployment by way of its destruction defies the distinction between means and ends and obliterates instrumental rationality.<a name=\"_ftnref12\"><\/a>[12]\u201d This is a powerful point; Mantena emphasized in Praxis 12\/13 that contemporary movements have a \u201chorizon of despair.\u201d Those that undertake extreme forms of self-sacrifice understand fully that they may not change the fundamental dynamics of power in the short term, but (1) \u201cthe self-destructive act makes a commentary on the meaning of life by conveying the prioritization of the life of a political cause over the biological existence of its proponents<a name=\"_ftnref13\"><\/a>[13]\u201d and (2) it is hard to measure the success of an avant-garde in keeping alive ideas or goals that would otherwise fade away.<\/p>\n<p>Short-term measures of success are inappropriate when humans commit acts of self-destruction to demonstrate a commitment to a cause and\/or their own personal agency over their body. While mainstream notions of rationality would dismiss such actions as \u201cineffective\u201d or simply \u201cnot worth it\u201d from a means-ends perspective, mainstream political rationality almost always operates in a counterrevolutionary manner by encouraging actors to engage in individualistic cost-benefit analyses. The weaponization of life transcends such narrow modes of thinking towards something greater; this implies that the weaponization of life, like Ghandi\u2019s <em>Satyagraha,\u00a0<\/em>understands that in the long term overcoming political resistance requires emphasis on the <em>psychological\u00a0<\/em>and even the <em>transcendental\u00a0<\/em>over the strictly rational.<\/p>\n<p>The means-ends calculus for hackers and leakers is decidedly different. Most are able to operate anonymously and evade capture (but they are taking a definitive risk &#8212; the State desires to incarcerate and incapacitate those who leak). As El-Ariss explains, with hackers and leakers, the division between thought and action evaporates and the leaking acts also evade rationality in the sense that they occur automatically, as if by a machine. \u201cUsers and activists leak, write, respond, share, reveal and gossip through the machine as it leaks and reveals through them\u2026 the fingers of the Tweeter move on their own, collapsing the human\/machine distinction.<a name=\"_ftnref14\"><\/a>[14]\u201d<\/p>\n<h1>Conclusion<\/h1>\n<p>In synthesizing Bargu and El-Ariss\u2019 texts, it becomes interesting to think about how contemporary tactics of resistance range from our most fundamental tool as humans, the body (for protests, hunger strikes, self-immolation and even armed uprising), to newfound digital tools such as hacking, leaking and online exposure\/shaming. Our tools as resisters naturally correspond to how the states deploys its degenerate power. In the prison and on the streets, the body brings visibility to state repression of antagonistic voices. Online, hacking and leaking highlight practices that the state would prefer to conceal and \u201cexpose a corrupt and excessive political power.<a name=\"_ftnref15\"><\/a>[15]\u201d As Bargu emphasizes, \u201cin a political present dominated by values of self-interest, instrumental calculation, well-being, and security, a present in which absolute dedication, heroism, and self-sacrifice have little currency, [resisting] individuals appear curiously archaic or dangerously prefigurative of a different politics.<a name=\"_ftnref16\"><\/a>[16]\u201d While this statement applies most obviously to those who engage self-sacrifice of the body, hackers and leakers risk excessive state response including indefinite incapacitation. We must not engage with contemporary forms of resistance in purely rational terms &#8212; such calculus favors the state. Instead, we must endeavor to understand the \u201csubversive and emancipatory potentialities<a name=\"_ftnref17\"><\/a>[17]\u201d as well as the \u201cshortcomings, reversals, and failings<a name=\"_ftnref18\"><\/a>[18]\u201d entailed by radical forms of resistance.<\/p>\n<h1 style=\"text-align: center;\">Notes<\/h1>\n<p><a name=\"_ftn1\"><\/a>[1] Bargu, Banu. \u201c<em>Strave and Immolate: The Politics of Human Weapons.<\/em>\u201d<\/p>\n<p><a name=\"_ftn2\"><\/a>[2] Harcourt, Bernard. \u201c<em>Weaponizing Life: An Introduction.<\/em>\u201d<\/p>\n<p><a name=\"_ftn3\"><\/a>[3] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d<\/p>\n<p><a name=\"_ftn4\"><\/a>[4] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d<\/p>\n<p><a name=\"_ftn5\"><\/a>[5] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d (Quoting Zizek).<\/p>\n<p><a name=\"_ftn6\"><\/a>[6] Mantena, Karuna. <em>Comments During Praxis 12\/13<\/em><\/p>\n<p><a name=\"_ftn7\"><\/a>[7] Bargu, Banu. \u201c<em>Strave and Immolate: The Politics of Human Weapons.<\/em>\u201d<\/p>\n<p><a name=\"_ftn8\"><\/a>[8] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d<\/p>\n<p><a name=\"_ftn9\"><\/a>[9] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d (Quoting Assange).<\/p>\n<p><a name=\"_ftn10\"><\/a>[10] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d<\/p>\n<p><a name=\"_ftn11\"><\/a>[11] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d<\/p>\n<p><a name=\"_ftn12\"><\/a>[12] Bargu, Banu. \u201c<em>Strave and Immolate: The Politics of Human Weapons.<\/em>\u201d<\/p>\n<p><a name=\"_ftn13\"><\/a>[13] Bargu, Banu. \u201c<em>Strave and Immolate: The Politics of Human Weapons.<\/em>\u201d<\/p>\n<p><a name=\"_ftn14\"><\/a>[14] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d<\/p>\n<p><a name=\"_ftn15\"><\/a>[15] El-Ariss, Tarek. \u201c<em>Hacks and Scandals: Arab Culture in the Digital Age<\/em>.\u201d<\/p>\n<p><a name=\"_ftn16\"><\/a>[16] Bargu, Banu. \u201c<em>Strave and Immolate: The Politics of Human Weapons.<\/em>\u201d<\/p>\n<p><a name=\"_ftn17\"><\/a>[17] Bargu, Banu. \u201c<em>Strave and Immolate: The Politics of Human Weapons.<\/em>\u201d<\/p>\n<p><a name=\"_ftn18\"><\/a>[18] Bargu, Banu. \u201c<em>Strave and Immolate: The Politics of Human Weapons.<\/em>\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Sami Cleland Banu Bargu\u2019s Strave and Immolate: The Politics of Human Weapons\u00a0and Tarek El-Ariss\u2019 Leaks, Hacks and Scandals: Arab Culture in the Digital Age\u00a0were the extremely interesting companion pieces that spurred our Praxis 12\/13 discussion on the old and&hellip; <a href=\"https:\/\/blogs.law.columbia.edu\/praxis1313\/sami-cleland-epilogue-on-praxis-12-13\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1641,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[38977],"tags":[],"class_list":["post-4795","post","type-post","status-publish","format-standard","hentry","category-posts-12-13"],"_links":{"self":[{"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/posts\/4795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/users\/1641"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/comments?post=4795"}],"version-history":[{"count":0,"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/posts\/4795\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/media?parent=4795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/categories?post=4795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/praxis1313\/wp-json\/wp\/v2\/tags?post=4795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}