Alt. vs. Ctrl.: Thinking About Alternative Internets

Editorial notes for the Journal of Peer Production #9 on Alternative Internets

By Félix Tréguer, Panayotis Antoniadis, Johan Söderberg

The hopes of past generations of hackers weigh like a delirium on the brains of the newbies. Back in the days when Bulletin Board Systems metamorphosed into the Internet, the world’s digital communications networks – hitherto confined to military, corporate and elite academic institutions – were at grasping reach of ordinary individuals. To declare the independence of the Internet from nation states and the corporate world seemed like no more than stating the bare facts. Even encrypted communication – the brainchild of military research – had leaked into the public’s hands and had become a tool wielded against state power. Collectives of all stripes could make use of the new possibilities offered by the Web to bypass traditional media, broadcast their own voice and assemble in new ways in this new public sphere. For some time, at least, the Internet as a whole embodied “alternativeness.”

Already by the mid-nineties, however, states began to reshape the communications infrastructure into something more manageable. Through a series of international treaties, legislations and market developments, ownership over this infrastructure was concentrated to a few multinational companies (McChesney, 2013). On top of this legal and technical basis, a new breed of informational capitalism sprang up, where value is siphoned from deterritorialized “open” flows (Fuchs, 2015). Meanwhile, the ecological footprint of communication technologies has come to represent a formidable challenge (Flipo et al., 2013).

It is in the light of these transformations that the emancipatory promises inherited from the 1980s and 1990s must be assessed. With every new wave of high-tech products, these promises have been renewed. For instance, when WiFi-antennas were rolled out in the 2000s, community WiFi-activists hoped to rebuild the communications infrastructure bottom-up (Dunbar-Hester, 2014). With the advent of crypto-currencies, some claimed to believe that bankers’ control over global currency flows would be demolished (Karlström, 2014). The technology at hand might be new, but the storyline bundled with it is made up of recycled materials. It basically says: “Technology x has leveled the playing field, now individuals can outsmart the combined, global forces of state and capital.”

Underlying this claim is a grander narrative about (information) technology as the harbinger of a brighter future. Although progressivism goes all the way back to the Scientific Revolution, it was given a particular, informational twist during the Cold War. In the 1950s and 1960s, disillusioned US Trotskyists – most notably among them Daniel Bell – rebranded historical materialism as the post-industrialism hypothesis. With this remake of hist-mat, history did no longer culminate in socialism, but in a global consumer village. Furthermore, the motor of transition was not class struggle anymore, but the inert development of technology (Barbrook, 2007). Though a spark of conflict has of course survived in the post-industrial hypothesis, this technological determinism flares up anew every time hackers and Internet activists rally behind, say, the inevitable demise of copyright or the awaiting triumph of decentralised communication networks (Söderberg, 2013). Determinism is performative, and never more so than when it is mobilized in political struggles.

This observation points to the instability of the meanings invested in computers and in the Internet itself. It suffices to recall the twin roots of these technologies, one in the military-industrial complex (Agar, 2003, Edwards, 1996), the other in the counter-culture and peace movement (Turner, 2006; 2013). The same undecidedness prevails today, as exemplified by the global controversies unleashed by NSA whistleblower Edward Snowden. The documents leaked by Snowden revealed the extent to which communications surveillance has been built into the pipes of a supposedly flat network, giving rise to unprecedented mobilisations aimed at resisting it. But paradoxically, this wave of resistance is now leading to the legalisation of mass surveillance (Tréguer, 2016). Because of these persistent ambiguities, it would be as wrong to denounce the inherent oppressiveness of the Internet as it would be to celebrate the alternative essence of this technology. Either position amounts to the same thing: A foreclosing of the struggle in which the future meaning of the technology is determined. Both Alt. and Ctrl. are possible and competing scenarios. They evolve in constant interaction.

How can we, as scholars and/or activists, sort out this complexity and make an assessment of the balance of forces, while reinvigorating hope for the future? Can we learn from the past to ward off the eternal return of a dystopian future?  Posing these questions – and perhaps contributing to answers – is the task that we have set for ourselves in this special issue of Journal of Peer Production on “alternative Internets.”

If the meaning of the “Internet” is instable, then the definition of “alternative” in “alternative Internets” is even more so. Alternativeness is never an absolute. It is relative to something else, the non-alternative, which must also be defined. In this respect, Paschal Preston notes that alternative Internets were found in online applications that “manage to challenge and resist domination by commercial and other sectional interests”, in particular those “operating as alternative and/or minority media for the exchanges of news and commentary on political and social developments which are marginalized in mainstream media and debates” (Preston, 2001). Likewise, Chris Atton writes that alternative Internets are “produced outside the forces of market economics and the state” (Atton, 2003). As seen from these rather conventional definitions, alternativeness is measured in distance from the centres of state and capital.

How can we move past the couple of “useful others” (the state, the market) to better grasp alternativeness? The tools, applications and media that form part of the Internet can be assessed as composites made up of different dimensions. Some important parameters include the underlying funding and economic models, the governance schemes for taking decisions and allocating tasks, or the modes of production. Nick Couldy puts emphasis on this later dimension when discussing alternative online media, stressing that the most important for them is to challenge big corporate mass media by overcoming ‘‘the entrenched division of labour (producers of stories vs. consumers of stories)” (Couldry, 2003:45).

Another crucial line of inquiry for evaluating an alternative Internet relates to the underlying content or ideology that it circulates. For Sandoval and Fuchs, this is the most important dimension, and anything claiming to be alternative must adopt a critical stance to “try to contribute to emancipatory societal transformation” and “question dominative social relations” (Sandoval & Fuchs, 2009). When we consider the Internet, ideology is found in the values that underly the design of a technology or application, structure its uses or populate the online social space that this application brings about.

Of course, ideology is also embedded in the discourses and practices of the many actors trying to influence its development at the technical, social or legal level. The Internet is indeed a social space made up of a myriad of contentious actors such as hackers, software developers and makers who hack, code and make, of advocacy groups with their value-ridden proclamations and legalese, of Internet users making claims to an enlarged citizenship, and of course of all the entrepreneurs, crooks, bureaucrats, agents provocateurs and politicians they fight against or – less often – coalise with. All of these actors produce, use or advocate for particular technologies, fight against or encourage dystopic trends, work towards or oppose emancipatory projects, and in doing so produce political discourses and imaginaries that weigh on the social construction of the Internet. As such, they are part of our field of inquiry when we talk about “alternative Internets.” Their own contradictions further complicate the analysis. A protagonist might go to bed as a subversive hacker but wake up the next day as a piece-rate worker in someone else’s pension plan, or worse.

This speaks to the more general fact that a socio-technical dispositif that is “alternative” on one level tends to be preconditioned by status quo on some other level. For instance, openness in terms of software licenses often comes hand in hand with a closure in terms of technical expertise. To put it in more general terms, the alternative, if it is to be effective, is necessarily compromised by the dominant. Here as elsewhere, a maximising strategy is paralysing: As the proverb goes,  “the perfect is the enemy of the good.” In this spirit, Marisol Sandoval and Christian Fuchs have argued for “politically effective alternative media that in order to advance transformative political can include certain elements of capitalist mass media” (Sandoval & Fuchs, 2009:147). According to the authors, subscription fees or even advertising might be required if a project is to break out of the niche to reach a broader audience. Assessing trade-offs is part of the alternative game.

In this issue of the JoPP, we present contributions that explore these questions and shed light on the blind spots of alternative Internets.

With “In Defense of the Digital Craftsperson,” James Losey and Sascha D. Meinrath offer a conceptual framework for analyzing control in Internet technical architectures along five dimensions: networks, devices, applications/services, content, and data. By updating prior analysis regarding threats to communicational autonomy and to the ability to tinker with digital technologies, they identify key challenges and help think systematically about strategies of resistance.

Stefano Crabu, Federica Giovanella, Leonardo Maccari, and Paolo Magaudda consider the bottom of the “network” layer of Losey and Meinrath’s framework by analyzing offering an interdisciplinary perspective on Ninux, a network of  wireless community networks in Italy. Their paper, “Hacktivism, Infrastructures and Legal Frameworks in Community Networks: the Italian Case of Ninux.org“, benefits from the active participation of one of the authors in Ninux, and presents interesting evidence about the limited levels of decentralization in a network built exactly around this vision. It is also one of the very few papers that brings insights on the legal aspects of community networks, focusing on the question of liability and different organizational forms that can protect these networks against legal actions.

Christina Haralanova and Evan Light offer an insider’s look at a much smaller community network in Montreal, called Réseau Libre. In their paper entitled “Enmeshed Lives? Examining the Potentials and the Limits in the Provision of Wireless Networks,” they try to understand two other important contradictions in community networks. First, they examine their possible role as both an “alternative Internet provider,” as well as an “alternative to the Internet all together,” that is to say a local infrastructure providing local services for the members of the network. They also identify the lack of adequate security against surveillance, despite the fact that many people cite enhanced privacy and security options as a reason for their participation in the community. As the paper shows, even though they might foster knowledge-sharing around issues such as computer security, these networks remain “as insecure as the Internet itself.”

The paper “Going Off-the-Cloud: The Role of Art in the Development of a User-Owned & Controlled Connected World” by Daphne Dragona and Dimitris Charitos also explores various alternatives of user-owned network infrastructures, this time focusing on an “alternative to the Internet all together”, imagined and experimented by artists and activists. The scale here is much smaller, with most networks comprised by a single wireless router acting as a hotspot allowing only local interactions between those in physical proximity. Such “off-the-cloud” networks, have been given numerous telling names like Netless, PirateBox, Occupy here, Hot probs, Datafield, Hive networks, Autonomous Cube. According to the authors, these and many more similar inspiring projects work towards “new modes of organization and responsibility (…) beyond the sovereignty of the cloud.”

In “Gesturing Towards ‘Anti-Colonial Hacking’ and its Infrastructure,” Sophie Toupin draws on a historical example to investigate the opportunities and limitations for appropriating cryptography today. Her interviews with some of the key actors in this glorious moment of hacker politics is particularly inspiring,  as is Toupin’s willingness to expand our understanding of “hacktivism” by looking beyond Europe and North America.

Primavera De Filippi’s piece focuses on “The Interplay between Decentralization and Privacy,” using blockchain technologies as a case-study. She shows that while decentralized architectures are often key to the design of alternative Internets, they come with important challenges with regards to privacy protection. Her critical assessment is particularly timely, as blockchain technologies are rapidly co-opted by the bureaucratic organizations there were originally meant to subvert.

InFinding an Alternate Route: Circumventing Conventional Models of Agricultural Commerce and Aid,” Stephen Quilley, Jason Hawreliak and Katie Kish present a case study on Open Source Ecology (OSE). OSE started in the United States but has sprouted similar initiatives in Europe and South America. It is now developing a series of open source industrial machines and publishes the designs online. One of the primary goals of OSE is to provide collaboratively produced blueprints for relatively inexpensive agricultural machinery, such as tractors, backhoes, and compressed earth brick presses for constructing buildings. The authors argue that the proliferation of open source networks can reshape domains that have traditionally relied on state and inter-state actors such as international aid.

Lastly, Melanie Dulong de Rosnay’s experimental text on “Alternative Policies for Alternative Internets” raises awareness on the importance of the terms of use of Internet platforms. By quoting numerous such policies – from both mainstream and alternative platforms – on topics like copyright or data protection, she manages to create a diverse mix of feelings, all the way from anger to laughter. Most importantly, this collection warns us about the legal issues that alternative platforms have to deal with, and provides inspiration and useful information on how to address them in practice.

Each of these papers addresses one or more of these “layers” described by Losey and Meinrath, analysing different facets of alternativeness. But there are other dimensions outside this framework that we have not touched upon. For instance, the staggering ecological impact of Internet technologies and their environmental unsustainability is not addressed, despite the growing attention of scholars and engineers to these crucial issues (Chen, 2016). Although two papers focus on urban community networks, other aspects of the urban dimension of alternative Internets are overlooked.  Together with the notion of locality, urbanity appears to be crucial in helping actualise the potential of alternative Internets to become autonomous infrastructures operating outside the commercial Internet. It is also an avenue to think about resistance strategies: As the urban space becomes increasingly hybrid and renders the digital and physical evermore intertwined, those movements fighting for the “right to the city” (Lefebvre, 1996) and those working towards the “right to the Internet” will have renewed opportunities to join forces (Antoniadis & Apostol, 2014).

For sure, advancing alternative Internets will require from a very diverse set of actors to go beyond traditional boundaries so as to engage in effective collaboration. In academia too, transdisciplinary collaboration – though still in its infancy – is extremely promising. We hope that this issue of the JoPP will be read as an invitation to work further in that direction.

As editors, we would like to thank Bryan Hugill for helping us copy-edit the papers, and express our gratitude to both authors and reviewers. We hope that readers will be as inspired as we are by these very diverse contributions, which each in their own ways point towards a more democratic and more inclusive Internet.

References

Agar, J. (2003). The Government Machine: A Revolutionary History of the Computer, MIT Press.

Antoniadis, P. & Apostol, I. (2014). The right to the hybrid city and the role of DIY networking, Journal of Community Informatics, special issue on Community Informatics and Urban Planning, vol. 10.

Atton, C. (2005). An Alternative Internet: Radical Media, Politics and Creativity, University Press.

Barbrook, R. (2007). Imaginary Futures: From Thinking Machines to the Global Village, Pluto Press.

Chen, J. (2016). “A Strategy for Limits-aware Computing”, LIMITS’16, Irvine, California, June 9th.

Dunbar-Hester, C. (2014). Low Power to the People: Pirates, Protest, and Politics in FM Radio Activism, MIT Press.

Flipo, F., Dobré, M, & Michot, M. (2013). La Face cachée du numérique. L’impact environnemental des nouvelles technologies, L’Échappée.

Fuchs, C. (2015). Culture and Economy in the Age of Social Media, New York: Routledge.

Edwards, P. (1996). The Closed World: Computers and the Politics of Discourse in Cold War America, MIT Press.

Karlström, H. (2014). “Do Libertarians Dream of Electric Coins? The Material Embeddedness of Bitcoin”, Scandinavian Journal of Social Theory, 15 (1) p.23-36.

Lefebvre, H. (1996 [1968]). “The right to the city”. In H. Lefebvre (auth), E. Kofman & E. Lebas (Eds.), Writings on Cities, Blackwell, pp. 63-184.

Preston, P. (2001). Reshaping Communications: Technology, Information and Social Change, SLE Pound.

Sandoval, M. & Fuchs, C. (2010). “Towards a Critical Theory of Alternative Media”, Telemat. Inf. 27(2), May 2010, pp. 141–150.

Söderberg, J. (2013). “Determining Social Change: The Role of Technological Determinism in the Collective Action Framing of Hackers”, New Media & Society. 15(8) pp. 1277–1293.

Tréguer, F. (2016). “From Deep State Illegality to Law of the Land: The Case of Internet Surveillance in France”, 7th Biennial Surveillance & Society Conference, Barcelona, April 20th.

Turner, F. (2006).  From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism, University of Chicago Press.

——— (2013). The Democratic Surround: Multimedia & American Liberalism From World War II to the Psychedelic Sixties, University of Chicago Press.

 

Rollback or Legalisation? Mass Surveillance in France and the Snowden Paradox

This piece was first published on ExplosivePolitics and MappingSecurity.

On June the 5th, it will be exactly three years since Pulitzer Prize-winning journalist Glenn Greenwald wrote the first article based on the trove of secret documents disclosed by the now famous NSA whistleblower Edward Snowden. Three years that saw the unfolding of an unprecedented controversy on the surveillance capabilities of the world’s most powerful intelligence agencies, thanks to the combined work of investigative journalists, computer experts, lawyers, activists and scholars. Since 2013, France is the first liberal European regime to undergo a vast reform of its legal framework regulating secret state surveillance. What follows is a reader’s digest of research presented at the 7th Biennial Surveillance & Society Conference.


Download the full paper (pdf)

For many observers, the first Snowden disclosures and the global scandal that followed held the promise of an upcoming rollback of the techno-legal apparatus developed by the American National Security Agency (NSA), the British Government Communications Headquarters (GCHQ) and their counterparts to intercept and analyse large portions of the world’s Internet traffic. State secrets and the “plausible deniability” doctrine often used by these secretive organisations could no longer stand in the face of such overwhelming documentation. Intelligence reform, one could then hope, would soon be put on the agenda to crack down on these undue surveillance powers and relocate surveillance within the boundaries of the rule of law. Three years later, however, what were then reasonable expectations have likely been crushed. Intelligence reform is being passed, but mainly to secure the legal basis for large-scale surveillance to a degree of detail that was hard to imagine just a few years ago. Despite an unprecedented resistance to surveillance practices developed in the shadows of the reason of state, the latter are progressively being legalised.

This is the Snowden paradox.

France: Mass-surveillance a la mode

France is a good case in point. Before the adoption of the Intelligence Act in the summer of 2015, the surveillance capabilities of French intelligence agencies were regulated by a 1991 law. In the early 1990s the prospect of Internet surveillance was still very distant, and the law was drafted with landline and wireless telephone communications in mind. So when tapping into Internet traffic became an operational necessity for intelligence agencies at the end of the 1990s, it developed based on secret and extensive interpretations of existing provisions (one notable exception are the provisions adopted in 2006 to authorize administrative access to metadata records for the sole purpose of anti-terrorism). From 2008 onward, the French foreign intelligence agency (DGSE) was even allowed to spend hundreds of millions of euros to tap extensively into international fibre optics cables landing on French shores.

France_submarine-cables

French officials looking back at these developments have often resorted to euphemisms, going on record talking about zone of “a-legality” to describe this secret creep in surveillance capabilities. Although “a-legality” may be used to characterize the legal grey areas in which citizens operate to exert and claim new rights that have yet to be sanctioned by either the parliament or the courts – for instance the disclosure of huge swathes of digital documents –  it cannot adequately characterize these instances of “deep state” legal tinkering aimed at escaping the safeguards associated with the rule of law. Indeed, when the state interferes with civil rights like privacy and freedom of communication, a detailed, public and proportionate legal basis authorizing them to do so is required. Otherwise, such interferences are, quite plainly, illegal. Secret legal interpretations are of course a common feature in the field of surveillance. In France, they could prosper all the more easily given the shortcomings of human rights advocacy against Internet surveillance. Indeed, prior to 2013, French activists had, by and large, remained outside of the transnational networks working on this issue.

French national security policymakers were very much aware that the existing framework failed to comply with the standards of the European Court of Human Rights (ECHR). And so intelligence reform was announced for the first time in 2008, under the presidency of Nicolas Sarkozy (2007-2012). But the reform then lingered, which in turn created the political space for the parliamentary opposition to carry the torch. By the time the Socialist Party got back to power, in 2012, its officials in charge of security affairs were the ones pushing for a sweeping new law that would secure the work of people in the intelligence community and, incidentally, put France in line with democratic standards.

Then came Edward Snowden. At first, the Snowden disclosures deeply destabilized these plans, creating a new dilemma for the proponents of legalization: On the one hand, the disclosures helped document the growing gap between the existing legal framework and actual surveillance practices, exposing them to litigation and thereby reinforcing the rationale for legalization. But on the other hand, they had put the issue of surveillance at the forefront of the public debate and therefore made such a legislative reform politically risky and unpredictable. In late 2013, a first attempt at partial legalization (widening access to metadata) gave rise to new coordination within civil society groups opposed to large-scale surveillance, which reinforced these fears. It was only with the spectacular rise of the threat posed by the Islamic State in 2014 and the Paris attacks of January 2015 that new securitization discourses created the adequate political conditions for the passage of the Intelligence Act – the most extensive piece of legislation ever adopted in France to regulate the work of intelligence agencies.

The 2015 French Intelligence Act in a nutshell

On January 21st 2015, Prime Minister Manuel Valls turned the long-awaited intelligence reform into an essential part of the government’s political response to the Paris attacks carried on earlier that month. Presenting a package of “exceptional measures” that formed part of the government’sproclaimed “general mobilization against terrorism,” Valls claimed that a new law was “necessary to strengthen the legal capacity of intelligence agencies to act” against that threat. During the expeditious parliamentary debate that ensued (April-June 2015), the Bill’s proponents never missed an opportunity to stress, as Valls did while presenting the text to the National Assembly, that the new law had “nothing to do with the practices revealed by Edward Snowden”. Political rhetoric notwithstanding, the Act’s provisions actually demonstrate how important the sort of practices revealed by Snowden have become for the geopolitical arms race in communications intelligence.

The Intelligence Act creates whole new sections in the Code of Internal Security. It starts off by widening the scope of public-interest motives for which surveillance can be authorized. Besides terrorism, economic intelligence, organized crime and counter-espionage, it now includes vague notions such as the promotion of “major interests in foreign policy” or the prevention of “collective violence likely to cause serious harm to public peace.” As for the number of agencies allowed to use this new legal basis for extra-judicial surveillance, it comprises the “second circle” of law enforcement agencies that are not part of the official “intelligence community” and whose combined staff is well over 45,000.

In terms of technical capabilities, the Act seeks to harmonize the range of tools that intelligence agencies can use according to the regime applicable to judicial investigations. These include targeted telephone and Internet wiretaps, access to metadata and geotagging records as well as computer intrusion and exploitation (e.g. “hacking”). But the Act also authorizes techniques that directly echo the large-scale surveillance practices at the heart of post-Snowden controversies. Such is the case of the so-called “black boxes,” those scanning devices that will use Big Data techniques to sort through Internet traffic in order to detect “weak signals” of terrorism (intelligence officials have given the example of encryption as the sort of things these black boxes would look for). Similarly, there is a whole chapter on “international surveillance,” which legalizes the massive programme deployed by the DGSE since 2008 to tap into submarine cables.

As for oversight, all national surveillance activities are authorized by the Prime Minister. An oversight commission (the CNCTR) composed of judges and members of Parliament has 24 hours to issue non-binding opinions on authorization requests. The main innovation here is the creation of a new redress mechanism before the Conseil d’Etat (France’s Supreme Court for administrative law), but the procedure is veiled in secrecy and fails to respect defence rights. As for the regime governing foreign communications – which is vague enough to be invoked to spy on domestic communications –it comes with important derogations, not least of which is the fact that it remains completely outside of this redress procedure. Among other notable provisions, one forbids the oversight body from reviewing communications data obtained from foreign agencies. Another gives a criminal immunity to agents hacking into computers located outside of French borders. The law also fails to provide any framework to regulate (and limit) access to the collected intelligence once it is stored by intelligence and law enforcement agencies.

Mobilisation against the controversial French Intelligence Bill

By the time the Intelligence Bill was debated in Parliament, civil society organizations had built the kind of networking and expertise that made them more suited to campaign against national security legislation. As I show in the paper and in the online narrative below, human rights advocates led the contention during the three-month long parliamentary debate on the Bill, while benefiting from the support of variety of other actors typical of post-Snowden contention, including engineers and hackers, digital entrepreneurs as well as leading national and international organizations.

Overall, contention played an important role in barring amendments that would have given intelligence agencies even more leeway than originally afforded by the Bill. Whereas the government hoped for an “union sacrée,” contention managed to fracture the initial display of unanimity. MPs from across the political spectrum (including many within both socialist and conservative ranks) fought against the Bill, pushing its proponents to amend the text in order to bring significant but relatively marginal corrections. In the end, some of the parameters were changed compared to the government’s proposal, but the general philosophy remained intact. In June 2015, the Bill was eventually adopted with 438 votes in favour, 86 against and 42 abstentions at the National Assembly and 252 for, 67 against and 26 abstentions at the Senate. A number of legal challenges are now pending both before French and European courts against the new law.

The limits of post-Snowden contention

France’s passage of the 2015 Intelligence Act makes it an “early-adopter”’ of post-Snowden intelligence reform among liberal regimes. But lawmakers in several other European countries are now following suit. The British Parliament is currently debating the much-criticized Investigatory Powers Bill. The Dutch government has recently adopted its own reform proposal, which has also raised strong concerns. The new conservative Polish government has announced plans to expand the access of law enforcement agencies to communications data, amid heated condemnations of the regime’s “orbanization” (in reference to Hungary’s controversial Prime Minister Viktor Orban). And in Germany, the Bundestag’s Interior Committee will soon start working on amendments to the so-called “G-10 law,’” which regulates the surveillance powers of the country’s intelligence agencies.

Each country knows its own specific context, and post-Snowden contention around intelligence reform will most likely have different outcomes according to these varying contexts. As Bigo and Tsoukala highlight,

the actors never know the final results of the move they are doing, as the result depends on the field effect of many actors engaged in competitions for defining whose security is important, and of different audiences liable to accept or not that definition” (2008:8).

These field effects are exactly what made post-Snowden intelligence reform hazardous for intelligence officials and their political backers. And it may be that, in these other countries, human right defenders will have greater success than their French counterparts in defeating the false “liberty versus security” dilemma, framing strong privacy safeguards and the rule of law as core components of individual and collective security. However, the ongoing British debate or the US’s tepid reform of the PATRIOT Act in June 2015, indicate that the case of France is likely more telling than its decrepit political institutions may suggest.

In the same way 9/11 brought an end to the controversy on the NSA’s ECHELON program and paved the way for the adoption of the PATRIOT Act, the threat of terrorism and associated processes of securitization now tend to hinder the global episode of contention opened by Edward Snowden in June 2013. Securitization is provoking a “chilling effect” on civil society contention, making legalization politically possible and leading to a “ratchet effect” in the development of previously illegal deep state practices and, more generally, of executive powers.

Fifteen years after 9/11, the French intelligence reform thus stands as a stark reminder of the fact that, once coupled with securitization, “a-legality” and national security become two convenient excuses for legalization and impunity, allowing states to navigate the legal and political constraints created by human rights organizations and institutional pluralism. This is yet another “resonance” of the French Intelligence Act with the PATRIOT Act.

The proponents of the French reform were probably right to claim that it is neither Schmitt’s nor Agamben’s states of exception. But because it is “legal” or includes some oversight and redress mechanisms does not mean that large-scale surveillance and secret procedures do not represent a formidable challenge to the rule of law. Rather than a state of exception, legalization carried on under the guise of the reason of state amounts to what Sidney Tarrow calls “rule by law.” In his comparative study of the relationships between states, wars and contention, he writes of the US “war on terror”:

Is the distinction between rule of law and rule by law a distinction without difference? I think not. First, rule by law convinces both decision makers and operatives that their illegal behavior is legally protected (…). Second, engaging in rule by law provides a defense against the charge they are breaking the law. Over time, and repeated often enough, this can create a “new normal,” or at least a new content for long-legitimates symbols of the American creed. Finally, “legalizing”’ illegality draws resources and energies away from other forms of contention (…) (2015:165-166).”

The same process is happening with regards to present-day state surveillance: Large-scale collection of communications and Big Data preventive policing are becoming the “new normal.” At this point in time, it seems difficult to argue that post-Snowden contention has hindered in any significant and lasting way the formidable growth of surveillance capabilities of the world’s most powerful intelligence agencies.

And yet, the jury is still out. Post-Snowden contention has documented state surveillance like never before, undermining the secrecy that surrounds deep state institutions, prevents their democratic accountability, and helps sustain taken for granted assumptions about them. It has provided fresh political and legal arguments to reclaim privacy as a “part of the common good” (Lyon 2015:9), leading courts –and in particular the ECHR– to admit several cases of historic importance which will be decided in the coming months. Judges now appear as the last institutional resort against large-scale surveillance. If litigation fails, the only possibility left for resisting it will lie in what would by then represent a most transgressive form of political action: upholding the right to encryption and anonymity, and more generally subverting the centralized and commodified technical architecture that made such surveillance possible in the first place.

 

Internet : un nouvel art de la révolte ?

Le philosophe Geoffroy de Lagasnerie vient de faire paraître un essai intitulé L’Art de la révolte qui constitue une contribution importante à l’étude des rapports entre Internet, la citoyenneté et l’espace public. J’en propose ici un petit résumé avant de faire quelques remarques critiques.

Résumé

L’auteur prend appui sur trois « figures exemplaires » du militantisme sur Internet : Julian Assange, Chelsea Manning et Edward Snowden. Tous sont devenus des symboles de la défense des libertés et de l’État de droit sur Internet. Pour Lagasnerie, le cybermilitantisme qu’ils développent conduit à mettre en crise la « scène politique » au travers d’une « radicalisation de l’exigence démocratique » :

«  (…) dans leur manière de se révolter, de se constituer comme sujets en lutte, ils ont mis en œuvre, pratiquement, un nouveau rapport au droit, à l’État, à la dissidence. Ils n’ont pas repris à leur compte des formes instituées de la révolte et se ne sont pas contentés de porter, sur la scène préétablie de la confrontation publique, de nouveaux objets. Leur attaque vise la scène politique elle-même. Ils interrogent les cadres de la politique, les formes prescrites de la mobilisation et de l’expression – et ils opèrent, de ce fait, une contestation du dispositif de la politique démocratique tel que nous le connaissons et tel qu’il s’impose à nous (…) Il incarnent un défi à la loi elle même. Il cherchent à interroger ce qui demeure de non démocratique dans les valeurs et les idéaux que nous reconnaissons traditionnellement comme des symboles de la démocratie » (p. 76-77).

Dans ce processus d’émancipation vis-à-vis des mécanismes d’assujettissement propre à l’État moderne, deux catégories de conduites caractéristiques du cybermilitantisme jouent pour lui un rôle fondamental : le recours à l’anonymat et la stratégie de la fuite. L’analyse qu’en propose l’auteur constitue le cœur du livre.

L’anonymat, un agir politique émancipateur

Geoffroy de Lagasnerie rappelle d’abord comment, dans la théorie politique classique, le fait d’apparaître au grand jour dans l’espace public est crucial pour assurer la légitimité de participation politique. Agir en tant que citoyen suppose de s’engager, de se montrer à visage découvert comme porteur d’une revendication, d’assumer publiquement ce que l’ont dit et ce que l’on fait. Un principe profondément ancré dans nos inconscients politiques :

« À la figure du citoyen qui s’exprime, qui revendique, qui manifeste, qui se bat, est ainsi opposée, implicitement, la figure de l’individu qui fuit, ou qui se tait, qui accepte silencieusement l’ordre des choses, qui transgresse clandestinement la loi, etc. » (p. 114).

L’auteur appelle à rompre avec ces vieilles conceptions, en cherchant à présenter l’anonymat dans toute sa positivité. Il rappelle ainsi que la capacité de communiquer anonymement sur Internet contribue à démocratiser l’accès à l’espace public : l’anonymat permet en effet à des personnes pour qui l’expression ou la protestation publique seraient trop risquées – parce qu’ils s’exposeraient à des réprobations ou même à des sanctions de la part de leur famille, de leur milieu professionnel, de l’État – de le faire malgré tout.

Lagasnerie montre ensuite de manière plus générale comment l’anonymat contribue à déstabiliser les logiques disciplinaires à l’œuvre dans l’espace public. En effet, l’intervention politique suppose traditionnellement d’accepter d’endosser une identité de militant et – même lorsque l’action militante est conduite à travers des corps intermédiaires que sont les partis, les syndicats, les ONG plutôt qu’en son nom propre – de se voir accoler une étiquette politique. À l’inverse, la communication anonyme ou pseudonyme « permet à des individus qui ne se définissent pas eux-mêmes comme opposants, radicaux ou militants, ou qui ne veulent pas se définir ainsi, d’entrer dans l’espace de la politique contestataire » (p. 128).

Ce faisant, l’anonymat libère aussi les individus de multiples allégeances, renforçant ainsi leur capacité critique. WikiLeaks, en particulier, se construit sur l’idée que le chiffrement peut protéger les sources journalistiques et encourager ainsi le « retournement » de personnes travaillant au cœur du pouvoir. De cette manière, il permet à des analystes militaires comme Manning ou à des techniciens de la NSA comme Snowden de s’affranchir de la « force assujettissante » des groupes et institutions auxquels ils prennent part. Il ouvre la possibilité subversive d’être à la fois en dehors et en dedans, « conforme et politisé, dans l’adhésion et dans la contestation » (p. 130). Ce faisant, il multiplie les foyers de la politique contestataire :

« Tout le monde peut, à un moment ou un autre, y prendre part. Il n’y a plus de lieux de la mobilisation ni, mieux, d’organisations clairement identifiées comme incarnant les instances à partir desquelles surgiront les contestations (tels les syndicats par exemple) ». Cela conduit à « un processus de redistribution et d’éparpillement des lieux de la contestation » (p. 129).

Enfin, l’anonymat permet un agir politique plus conflictuel. Dans l’espace public traditionnel, le fait d’apparaître au grand jour, sous son identité réelle, doit en principe conduire à la possibilité d’interaction, de dialogue. On sait qui parle, qui proteste, et on peut donc lui répondre. Ce principe d’une communication réciproque est absolument central dans les théories de la démocratie délibérative (notamment celle du philosophe Jürgen Habermas, fondateur de la notion d’espace public dont la thèse de doctorat de 1962 proposait une archéologie). À l’inverse, l’anonymat ouvre la possibilité d’une communication « agonistique » opérant sur le mode du conflit unilatéral plutôt que du dialogue :

« Dans cette nouvelle scène, la politique ne fonctionnerait ni sur le mode de la négociation ni sur celui de la communication. Il s’agirait d’une politique affirmative : énoncer ses revendications, agir, disparaître. Le masque, le cryptage permettent d’intervenir sans établir de relation, sans reconnaître ses ennemis ni leur laisser la possibilité de répondre » (p. 139).

La fuite et le libre choix de ses appartenances

La seconde conduite qui fonde le « nouvel art de la révolte » incarné par le trio Assange-Manning-Snowden réside dans la stratégie de la sédition et de la fuite. Pour Lagasnerie, lorsqu’en juin 2013 Snowden fuit à Hong Kong au moment où le Guardian et le Washington Post commencent à publier les documents qu’il leur a transmis, il n’est pas simplement en train d’échapper à la répression. Il est aussi et surtout en train de faire sécession avec la communauté politique qui est la sienne, et dont il tire pourtant la qualité de citoyen.

Pour l’auteur, une telle conduite attaque de front les théories politiques construites sur le contrat social, qui sont au fondement des régimes représentatifs. En effet, de Rousseau à John Rawls, les théoriciens du contrat social sont soit partis du principe que nous choisissions librement d’adhérer à l’État dans lequel nous sommes nés, soit ont raisonné à partir de communautés nationales fermées, desquelles il serait impossible de s’affranchir. Dans ce schéma, la seule option politique du citoyen insatisfait consiste donc à agir au sein du cadre institutionnel établi pour changer la loi, à travers les formes classiques de participation politique prescrites par le régime représentatif.

Or, celui qui fait sédition et choisit l’exil se situerait selon l’auteur dans une toute autre logique : il rompt son appartenance à l’État, qui peut dès lors être pensée sur le mode du choix plutôt que celui de la contrainte. La fuite permettrait donc de repolitiser la question de l’appartenance à l’État que les penseurs contractualistes avaient laissée de côté :

« [Celui qui fait sédition] met en concurrence les États et les systèmes législatifs. En d’autres termes, il formule une exigence, ou, mieux, il exerce une sorte de droit à choisir sa nationalité, son État, à se réapproprier un contrôle sur la forme et la nature du système de lois auquel il sera soumis » (p. 176).

Selon cette approche, la fuite permet de dépasser la désobéissance civile, qui consiste habituellement à défier la loi tout en restant attaché au système juridique dont elle découle. Comme l’écrit l’auteur, il ne s’agit plus simplement de changer sa communauté de naissance, mais de changer de communauté.

Critique

La réflexion proposée dans ce livre est riche et stimulante, mais certains partis pris méthodologiques conduisent à mon sens à des erreurs d’analyse.

L’ahistoricisation des pratiques

Geoffroy de Lagasnerie exagère d’abord la nouveauté et la spécificité de ces pratiques militantes. Oui, Snowden, Manning, Assange et les collectifs agissant derrière le label Anonymous (également cités dans le livre) mettent en crise la scène politique, mais ils ne le font pas « ex nihilo ». Leur militantisme et les outils techniques qu’ils mobilisent s’inscrivent dans une histoire plus ancienne.

Il est par exemple dommage de parler de la stratégie de la fuite sans évoquer l’influence sur les usages militants d’Internet d’un texte comme Zone Autonome Temporaire de Hakim Bey, publié en 1991. Ou de parler du potentiel subversif du chiffrement des communications sans revenir sur les Cypherpunks, une communauté au contact de laquelle Julian Assange a forgé certaines de ses conceptions politiques au cours des années 1990. On pourrait même remonter beaucoup plus loin dans l’histoire d’Internet, par exemple au projet des « outlaw areas » (« zones hors-la-loi ») brandi par Buckminster Fuller, parrain intellectuel de la contre-culture des années 1960 dont Fred Turner a montré l’influence déterminante sur la cyberculture (Aux Sources de l’utopie numérique). Ou rappeler que la puissance subversive de l’anonymat et l’exil ont depuis toujours servi à échapper à la répression au sein de l’espace public (voir par exemple les travaux de l’historien Robert Darnton sur l’édition française au XVIIIè siècle). Souligner, enfin, que l’on retrouve une part de la symbolique des Anonymous dans des mouvements sociaux contemporains non directement liés à Internet et à sa culture (comme les Tute Bianche en Italie).

S’il y a quelque chose de spécifique au militantisme sur Internet, c’est la manière dont il synthétise et radicalise des pratiques illégales ou alégales (à la légalité incertaine) qui depuis longtemps étaient mobilisées dans un but de contestation au sein l’espace public. Fuite de documents, pamphlets anonymes, contournement de la censure, copie illicite d’informations : l’anonymat ou la fuite et l’exil sont toujours venus en soutien des ces modes d’action aux frontières de la légalité. Simplement, ils sont désormais largement facilités par les spécificités techniques d’Internet, tandis que la cyberculture a encouragé le recours à ces stratégies dans le but de radicaliser l’exigence démocratique et la critique du pouvoir. Si spécificité il y a dans l’art de la révolte sur Internet, elle réside dans une différence de degré bien plus que de nature.

Une rupture assumée avec le discours des acteurs

Un autre problème méthodologique tient au fait que les descriptions que l’auteur sont en complet décalage avec la lecture qu’en font les acteurs. Lagasnerie assume clairement ce parti pris dès les premières lignes :

« Pour moi rendre hommage aux démarches de Snowden, d’Assange et de Manning a signifié ne pas me placer dans une position de porte-parole de leur conceptions. Formuler à nouveau les représentations qu’ils proposent eux-mêmes de leur histoire ou de leurs motivations m’aurait conduit à me soumettre à leurs discours, c’est-à-dire à renoncer à ce qui donne sens à la réflexion théorique : sa capacité à transformer nos manières de voir et de penser (…) C’est la raison pour laquelle ce que j’écris ne sera pas nécessairement compatible avec ce qu’ils pourraient écrire de leur côté ou avec ce qu’ils ont déjà écrit » (p. 18-19).

Le problème, c’est que cette volonté de rompre avec le discours des acteurs conduit à des positions théoriques décorrélées des pratiques politiques dont elles tirent leur fondement.

Par exemple, décrire la fuite de Edward Snowden à Hong Kong et son exil russe comme les manifestations d’un choix délibéré, d’une volonté de rompre l’appartenance à son État de naissance, ne correspond pas à la réalité : Snowden se définit lui-même comme patriote ! Il explique vouloir « rentrer à la maison », mais seulement s’il peut le faire en tant que citoyen libre. Lorsqu’il fuit, il ne fait donc que choisir sa sanction et se ménager un peu de liberté. Plutôt que de courir le risque d’un procès politique et d’une punition exemplaire aux États-Unis, il opte pour la peine de l’exil. Il doit vivre loin de sa famille, loin des siens, loin de son pays, mais demeure dans un situation plus enviable que celle que lui réserverait un tribunal américain, notamment parce qu’il conserve sa pleine liberté de parole. Il y a très peu de positivité là-dedans et pas grand chose de nouveau : il s’agit avant tout d’un comportement stratégique somme toute prévisible d’un militant qui entend se protéger d’une répression brutale, en se plaçant sous la protection d’une juridiction plus clémente à son égard.

Dépasser la désobéissance civile ou la redéfinir ?

Même si cela permet à l’auteur de libérer son imagination et de proposer des analyses originales, le fait de rompre avec le sens pratique des acteurs conduit donc à des exagérations. C’est également le cas lorsqu’il oppose l’action de Snowden ou de Chelsea Manning à la tradition de la désobéissance civile.

Lagasnerie s’appuie sur les définitions les plus orthodoxes de la désobéissance civile pour expliquer que cette dernière suppose toujours l’acceptation de l’ordre juridique que l’on défie, et donc de la sanction venant réprimer l’illégalisme. Or, dans ses discours, Snowden s’inscrit complètement dans le cadre juridique américain, notamment au travers de fréquentes références au Bill of Rights. S’il a désobéi aux règles du secret bureaucratique, c’est non pas pour nier toute légitimité au droit de son pays mais pour permettre un débat public sur la conformité des programmes de surveillance de la NSA à la constitution et aux valeurs politiques qu’elle incarne. Le rôle qu’il se donne est donc bien celui d’un citoyen qui transgresse la norme pour faire la lumière faite sur les modes d’exercice du pouvoir et ainsi intensifier une contestation de l’État qui opère de l’intérieur, au sein de l’espace politique et juridique américain (et ce même si ses révélations et leur impact sont indéniablement d’échelle mondiale). La fuite, on l’a vu, doit donc s’interpréter comme une tentative d’échapper à la répression.

Par ailleurs, en rejetant la catégorie de la désobéissance civile, Lagasnerie risque au niveau théorique de l’enfermer dans ses acceptions les plus conservatrices. Si la dimension sacrificielle du militant désobéissant est en effet citée par de nombreux auteurs comme facteur de légitimité politique (et en particulier par John Rawls), d’autres ont depuis longtemps proposé de s’affranchir de cette exigence pour élargir l’espace démocratique. Hannah Arendt, notamment, voit dans la volonté de se sacrifier soi-même une « forme de fanatisme » qui est « en général le fait d’excentriques » et qui, « de toute façon, a pour effet de rendre impossible une discussion rationnelle des données du problème » (Du mensonge à la violence, 1972, p. 69). Quant à l’historien américain Howard Zinn, il explique pour sa part que « s’il est légitime de désobéir aux lois injustes, il est également légitime de ne pas accepter la punition injuste que l’on encourt en les enfreignant » (Désobéissance civile et démocratie, 2010, p. 199).

La fuite de celui qui refuse de se soumettre à une sanction disproportionnée et verse pour cette raison dans la clandestinité peut donc très bien être réintégrée au concept de la désobéissance civile.

Repenser la citoyenneté en faisant place aux pratiques alégales

Au fond, le problème n’est pas que le court essai de théorie politique de Lagasnerie délaisserait l’histoire ou la sociologie, même si le fait d’écarter les discours des acteurs et occulter la sociogenèse de leur agir politique est surprenant pour un auteur qui revendique l’héritage de Michel Foucault. C’est surtout qu’à force de vouloir scier la branche sur laquelle est assise la pensée politique occidentale, à faire comme si l’évitement du droit lié à l’anonymat et à la fuite justifiait de rompre avec les catégories politiques traditionnelles, il exagère la radicalité de ces pratiques et risque d’encourager indirectement la répression et la disqualification que leur oppose le pouvoir.

Or, l’art de la révolte que déploient Assange, Manning ou Snowden n’impose pas de sortir du cadre de la citoyenneté, ni même, d’ailleurs, du libéralisme politique, dont l’auteur souligne d’ailleurs la centralité (dans le livre et plus récemment dans une tribune au sujet de la loi sur le renseignement). Ils invitent plutôt à le complexifier.

Il s’agirait en effet de comprendre comment ces trois personnages, et plus généralement le mouvement de défense des droits sur Internet, participent d’une forme particulière de citoyenneté opérant en marge du droit et que l’anthropologue James Holston, spécialiste des favelas au Brésil, a proposé d’appeler la « citoyenneté insurrectionnelle ». En cherchant à utiliser Internet pour radicaliser la contestation du pouvoir, en violant le secret d’État, en remettant en cause toutes ces règles juridiques qui gouvernent l’espace public, ce mouvement déploie des pratiques politiques illégales ou alégales qui rentrent nécessairement en tension avec les conceptions légalistes de la citoyenneté. Dans ces pratiques se joue en fait la possibilité que les libertés publiques – en particulier la liberté d’expression et la vie privée – débordent de leurs bornes juridiques dans le but d’acter un nouveau rapport de force entre l’État et la société civile qui soit plus favorable à cette dernière (un processus que le philosophe Claude Lefort appelait une « opposition de droit »). La citoyenneté insurrectionnelle de l’espace public numérique travaille ainsi en marge mais néanmoins à l’intérieur du système politique, parfois même au contact direct des institutions, mobilisant le régime de justification lié à cet objet juridique étrange que sont les droits de l’Homme afin d’étendre le domaine de la citoyenneté.

Et si ces insurgés de l’espace public doivent parfois se cacher et fuir, c’est parce que l’État abuse de la force du droit en décidant de les bannir, refusant toute négociation et décrétant l’état d’exception pour éradiquer leurs pratiques subversives qui le frappent au cœur. La fuite est une nécessité, du fait justement de la protection toute relative qu’apporte l’anonymat – les exemples de Manning et de Snowden rappellent en effet qu’un État déterminé a toujours les moyens de nous identifier et de nous réassigner à notre position de sujet juridiquement responsable. La fuite est une liberté de dernier recours qui intervient non pas pour « échapper à la citoyenneté » comme le suggère l’auteur, mais pour échapper à la répression.

Ainsi, plutôt que de s’appuyer sur l’évitement ou la sortie du droit pour rompre avec les catégories traditionnelles du politique, il faut au contraire travailler à les y réintégrer pour consacrer leur rôle dans la construction de la citoyenneté et la résistance à l’oppression. C’est là un serpent de mer de la pensée politique, mais la tâche devient plus urgente à mesure que grandit le fossé entre la politique institutionnelle et la citoyenneté vécue et que les pratiques illibérales des régimes représentatifs se banalisent. De la même manière qu’au XXè siècle, l’état d’exception a été absorbé par les constitutions libérales pour légaliser et encadrer tant bien que mal le non-droit pratiqué par l’État, il s’agirait de reconnaître aux citoyens la possibilité d’agir eux aussi en dehors du droit pour, comme disait Blanqui à propos de l’insurrection, se livrer à un « acte foudroyant de souveraineté ». Ce droit « à s’émanciper du droit » serait une manière de garantir une forme de symétrie entre la souveraineté de l’État et la souveraineté populaire qui, en régime démocratique, fonde sa légitimité.

Dans cette perspective, sans renoncer aux concepts structurants de la pensée politique moderne ni verser dans l’utopie libertaire et post-nationale (si désirable soit-elle), les analyses de Lagasnerie peuvent servir à penser les outils théoriques et pratiques par lesquels le régime représentatif pourra se démocratiser de l’intérieur.