Archives
Replica moon rocks under a glass dome on a stand labelled "Simulated Lunar Samples."

The Strange Journeys of Otherworldly Artifacts

The list of objects on offer is intriguing: flags that were carried, but never raised on a flagpole; stamps that traveled thousands of miles without being posted; a meal tightly sealed in a plastic pouch, returned uneaten from the journey. These artifacts, and many others like them, are listed for sale on Bonhams’ auction site—under the “Space History” category. Popular items include commemorative medallions, pins, flags, mission patches, and postal issues, authorized by the National Aeronautics and Space Administration (NASA). The auctioneers’ specialized language includes terms of location, movement and possession: objects are listed as “carried,” “flown,”  “signed,” and “rare.” Collectors prepare their bids based on the details of object histories—where they have traveled and with whom—as recounted in accompanying letters of authenticity or fixed in time and place by a photograph. Bonhams’ vivid descriptions and NASA’s authenticating control create a fascination and demand among collectors and the public for objects circulating on Earth that have been to space—and an invitation to support future journeys. (read more...)

Our Digital Selves: What we learn about ability from avatars

Editor’s Note: This post was written by Donna Davis, PhD – University of Oregon and is the sixth post in the series on Disabling Technologies Imagine sitting on the beach on a beautiful day. The sun is rising and the birds singing. Wisps of clouds gently float by as the surf rhythmically rolls in and out at your feet and the children frolic in the sand. You can almost feel the heat of the sun, only you can’t — because you’re sitting in a virtual world. Such is the experience of the childless agoraphobe who may never see the ocean again. Virtual worlds have always been places of both escape and entertainment. For people with disabilities, this notion of escape comes with far greater opportunity but also risk. The risk is that this escape is tied to a simplistic understanding of both virtual reality and disability – especially where people who have never experienced either assume an individual with disabilities may want to abandon their physical experience for the comfort of a virtual one. (read more...)

Killer Robots: Algorithmic Warfare and Techno-Ethics

Editor’s Note: This is the fourth post in our Law in Computation series. War is an experiment in catastrophe; yet, policymakers today believe chance can be tamed and ‘ethical war’ waged by simply increasing battlefield technology, systematically removing human error/bias. How does an increasingly artificially intelligent battlefield reshape our capacity to think ethically in warfare (Schwartz, 2016)? Traditional ethics of war bases the justness of how one fights in war on the two principles of jus in bello (justice in fighting war) ethics: discrimination and proportionality, weighted against military necessity. Although how these categories apply in various wars has always been contested, the core assumption is that these categories are designed to be an ethics of practical judgment (see Brown, 2010) for decision-makers to weigh potentially grave consequences of civilian casualties against overall war aims. However, the algorithmic construction of terrorists has radically shifted the idea of who qualifies as a combatant in warfare. What then are the ethical implications for researchers and practitioners for a computational ethics of war? (read more...)

Book cover for Race, Monogamy, and Other Lies They Told You

Busting Myths of Human Nature: An Interview with Dr. Agustín Fuentes

Many of our most enduring social problems are propped up by equally enduring beliefs in the inherent, biological nature of human beings – our perceptions, behaviors, and potentials are ‘hard-wired’ through genetics and evolution. This is particularly true in matters of racial and gender inequality, as well as beliefs in humans’ supposedly innate aggressiveness. In the past, professionals in the human sciences helped to perpetuate these myths, lending their voices and authority to assertions that lacked evidence and allowing stereotypes and biases to stand in for genuine research. Dr. Agustín Fuentes, biological anthropologist and primatologist at Norte Dame University, takes on these assertions in his book Race, Monogamy, and Other Lies They Told You: Busting Myths About Human Nature. (read more...)

A dirt road running through buildings made from wooden palettes and corrugated steel.

Together in Crisis: the Politics of Day Zero in Cape Town

Every morning before heading in to work, Lusanda weaves his way through shacks and sandy puddles, bucket in hand. The communal tap he uses is some fifty meters away. It’s relatively close, compared to some other settlements. “The problem is that tap there,” he explains pointing off in the distance, “If the tap is open there, this one will shut down, so I’ll have to wait for those ones to finish and fill up. That’s why all the time I keep my bucket full.” It is especially bad on Saturdays, when everyone is doing their laundry, so he strategically times the trip. Lusanda makes this journey twice every day, filling up a twenty-liter bucket, which he shares with his girlfriend. A couple of liters here for washing, a couple there for cooking and cleaning, all judiciously scooped from the bucket. (read more...)

A photograph of a man working at a terminal in the middle of a row of server racks in a data center.

The Nubecene: Toward an Ecology of the Cloud

Imprints of computing are etched into the surface of the earth. Fugitive traces remain captive in its lithic tissues, its waters, and the very air we breathe. Roiling in the most abyssal depths of the seas, coursing through fiber optic cables thinner than human hairs, the amorphous Cloud and its digital ganglia enshroud our planet. By way of its sheer magnitude and complexity, the Cloud eludes human imagination. It is what Bruno Latour might call a “black box” (1987) – a market fantasy of infinite storage capacity, immateriality, and feel-good “green” slogans like “go paperless.” While envisioned by many to be ether, suspended above matter, the Cloud remains a material ensemble of cables and microchips, computer servers and data centers, electrons and water molecules, cell towers and cell phones, spindly fiber coils undersea and underground that firmly tether communities and consumers to the ground, not the sky. (read more...)

Privacy and Piracy: Investigating Unauthorized Online Gaming

Editor’s Note: This is the third post in our Law in Computation series. When we play an online game like World of Warcraft, where are we? This is not just a metaphysical question—are we in the fantasy world of Azeroth or in front of our computers—but a legal one as well. And there are multiple answers to that legal question. We might take a look at the space of intellectual property at the level of code and creation, whether corporate or by the players. There is also the space of law within the game, of the rules and norms guiding play (De Zwart and Humphreys 2014). What I’m concerned with here, though, are the servers, located in physical places, that connect players through infrastructures of connection whose worlds are sometimes disconnected by proprietary and computational decisions of game world owners. Servers keep online games alive. When online gamers talk about a game world being disconnected, they often point to the server as being “unplugged” or “turned off.” While official game servers are typically owned by game developers and corporations, players are now harnessing this power themselves, using privately-owned servers (“private servers”) as a viable solution for restoring and sustaining older versions of online games previously consigned to oblivion. But why? (read more...)

Photograph of three photographs hung perpendicular to a white gallery wall. The photos are of a Sprite can, a pair of jeans, and a "Hungarian High Quality Pass".

From Law in Action to Law in Computation: Preparing PhD Students for Technology, Law and Society

Editor’s Note: This is the inaugural post for the Law in Computation series, a collection of blog posts from faculty and graduate student fellows at UC Irvine’s Technology, Law and Society Institute. Leading up to a summer institute in 2018, the series provides examples of research and thinking from this interdisciplinary group and elaborates how sociolegal scholars might address new computing technologies, like artificial intelligence, blockchain, machine learning, autonomous vehicles, and more.  In 2015, a robot buying illicit items off the “dark web” was confiscated by the Swiss authorities along with its haul of Ecstasy pills, a Hungarian passport, counterfeit designer clothing, and other items. Dubbed Random Darknet Shopper it was a bot programmed to shop on the dark web using Bitcoin, the pseudo-anonymous cryptocurrency that, at the time of my writing, is experiencing an enormous bubble. Previously assumed to be the domain of criminals or drug dealers, the Bitcoin bubble has made it more mainstream, even on popular television shows like The Daily Show and is being discussed at policy forums worldwide. It increased in value from just over $1000 to over $8000 between February 2017 and February 2018, with a peak at over $19,000 in mid-December 2017. While it was pretty obscure just a few months ago, you probably have a cousin or uncle currently “mining” Bitcoin or trading in similar digital tokens whether you know it or not. (read more...)