20

Mirror

Adam Fish

The mirror is one of the most copied metaphors in Western thought. In ancient Greek mythology, Narcissus dies transfixed on his reflection in a spring. According to early sociology, we are a “looking-glass self.” Our identities are formed when we mirror how we think others see us (Cooley 1902). In Philosophy and the Mirror of Nature, Richard Rorty (1979) shatters the Enlightenment ideal that through scientific inquiry the mind could mirror nature, harboring replicas in mental formulas. Thus, from antiquity onward, the mirror metaphor has been used to describe everything from vanity, to subject formation, to consensual reality. Today, information companies and information activists alike call data duplication mirroring but often fail to acknowledge how the symbolism of this term may impact its use. Mirrors are more complex and faulty entities than simple facsimiles. With duplications come decreasing fidelity and increasing glitch. As social processes, mirrors echo the intricacies and limitations of data practice. I endeavor to explain how information activists and information firms make mirrors in order to exploit computer networks and remain visible.

Mirrors—derived from the Latin mirare for “to look at”—are metaphors for what they reflect. In Through the Looking-Glass, Lewis Carroll (1871) has Alice journey through a mirror and into a parallel and parable-rich universe of reversals. In Oscar Wilde’s The Picture of Dorian Gray (1891), the mirroring portrait ages but the protagonist does not. Hillel Schwartz (1996) traces this history and our obsession with twins, replicas, duplicates, decoys, counterfeits, portraits, mannequins, clones, replays, photocopies, and forgeries. The mirror metaphor continues into the digital age. The United Kingdom’s Channel Four television series Black Mirror is a drama that comments on a dystopic future of increasing connectivity. Charlie Booker’s program sees our mobile and laptop screens as black mirrors into which we stare Narcissus-like and which reflect back our self-destructive ways. Peter Sunde, cofounder of file-sharing company The Pirate Bay, spent time in prison for his copying acts and believes that copying is genetically coded, saying: “People learn by copying others. All the knowledge we have today, and all success is based on this simple fact—we are copies” (Ernesto 2014). As a locus for the confluence of metaphysics and materiality, mirrors are a way to see how the practical and metaphoric are coconstituted in database worlds.

For Jacques Lacan the mirror stage is the moment between six and eighteen months when a child apperceives or objectifies her subjectivity. This turning inside out is an externalization of interiority, or the freezing of the modern subject. Referencing the technology of his time, Lacan invokes a jammed cinema projector that is suspended on a single frame that then becomes the ego (Žižek 1997). Identification begins and, for Lacan, alienation and narcissism soon follow: the mirror is no longer a stage but an imaginary and fraudulent state that permanently masks the absence of the symbolic and the unattainability of the real. Scholars following late Lacan, by contrast, extend the metaphor to describe the mirror as the site of the formation of the subject, where the virtual is an ideal made real that emerges from “games of mirroring” (Deleuze 1972, 172). Likewise data copies or mirrors are virtual ideals of perfect duplication made imperfectly real. They are frozen information externalizations, duplications that strive for unattainable states of exacting verisimilitude. Referencing the technology of our time, we can think of a database mirror as a replication of a frozen operating system—the Apple “spinning pinwheel” or, less formally, “spinning beach ball of death”—that locks a user’s screen into an imperfect frieze.

This essay seeks both to discuss data mirrors as a metaphor as well as to show how mirroring serves as a practice of data activism and cloud computing. Below I describe how computing mirroring keeps a copy of some or all of a particular content at another remote site, typically in order to protect and improve its accessibility. Mirroring multiplies data sources. For activists, mirroring is a method to preserve and protect visibility through duplicating and distributing their resources across communication networks. Mirror multiplicities also allow cloud companies to capture and sell personal information. Geographically dispersed and intensely complex, mirrors are no simple replication of origins: rather they are a form of praxis or a way of being and becoming in the networked world. Data mirroring reveals in our digital reflections a hall of mirrors between the practical and the metaphoric, the actual and the virtual, the hyperreal and the ideal.

Both the replication and visibility elements of mirroring are political. Reflecting, repeating, amplifying, translating, replicating, and copying are core modes for understanding the control of modern information. These practices are often but not necessarily visual. In computational culture, the seen and the unseen are interlinked in ways not easily perceived. Mirrored databases, XML spreadsheets, copied JPEGs, and torrented videos each have visual components allowing front-end users to graphically interface with back-end code. In this way, screened, front-end interfaces translate computer applications for human readability. The front end is what is visible, seen, public, and, as a semantic object, most easily subjected to political deliberation and economic capture. The back end, where a hidden battle for control and capture of information is waged, is invisible to all except expert engineers and hackers (see hacker).

Mirroring data sets from private and invisible sites to public and visible ones often renders such battles visible. Mirroring punctures with data leaks the veil hiding the back end, so that the links between the visible front end and invisible back end too are made visible. The machinery is exposed and the black box of hardware opened. In this way, replication of remote data sets becomes a question of visibility. One struggle is about control over the back end and privacy; another is focused on who has the capacity to make the invisible visible in public. While I emphasize the visual front end of mirrored data sets, it is the mirroring or duplication of the back-end data and metadata that drives understanding of what is possible with the digital. Mirroring is a unique and contemporary digital manifestation of that always politicized act of information replication.

Mirrors as Multiples

Mirrors are multiples. Mirroring serves several purposes. Cloud computing relies on mirroring or replication of databases for global access and security. Microsoft, which provides a number of cloud computing services, defines “database mirroring” as the maintenance of “two copies of a single database that must reside on different server instances.” The basic copy-and-paste function of networked digital computing makes possible, according to these same computing companies, the nonrivalrous multiplication of data. Not only Fortune 500 information companies marshal mirroring techniques to preserve and protect their data integrity. Data and transparency activists with WikiLeaks also actively “mirror” its content. They and their supporters mirror content in jurisdictions outside America in the face of the legal shutdown of private servers housing their incendiary leaks. Today, servers in at least eleven European nations offer the WikiLeaks mirror (http://wikileaks.info/). The largest peer-to-peer file-sharing service in the world, The Pirate Bay, mirrors its links on servers in national jurisdictions where its practices have yet to be deemed illegal (eighteen countries presently block root access to The Pirate Bay). Mirroring, thus, is a replication practice for both hegemonic and counterhegemonic actors. Despite this political symmetry, it would be misleading to claim that mirroring produces exact replicas.

To offer robust, secure, and nondelayed access to content, it is necessary to store multiples. Yet Microsoft offers a naive realist notion that mirrors are precise copies, merely displaced within or across databases. A slightly more complex social constructivist perspective sees mirrors as symbolic representations. In constructivism, mirrors would be conceived not as duplicates but rather as iconic yet accurate depictions. Physicist Karen Barad (2003) challenges both “naive realist” as well as constructivist interpretations of mirrors, offering a third construal. Echoing Rorty, she says, “The representationalist belief in the power of words to mirror preexisting phenomena is the metaphysical substrate that supports social constructivist, as well as traditional realist, beliefs” (Barad 2003, 802). Mirrors produce neither realist copies nor constructed depictions. Rather mirrors are data multiplications that make political contests visible.

In other words, data mirroring does not represent so much as it reveals the complexities of those who mirror their content. For example, in cloud computing, content is retrieved and recomposed from geographically remote databases connected by complex networks. Instead of representing these networks as single entities, we should visualize them as similar to other complex networks, such as disease, criminal, and biological processes in nature. Each multiple, whether a mirrored file or a wild virus, exists in its numerous coded transactions (Ruppert 2013; MacKenzie and McNally 2013). In each case, the multiple is no fragmented or contradictory singularity. It is a fluid “field of multiple conjoined actions that cumulatively enact new entities” (Ruppert 2013). The “performative excesses” of multiples “undo or unmake identities as much as they make them” (Mackenzie and McNally 2013). Structured by diverse databases and unmoored from single origins, mirrors are multiples that serve hegemonic and counterhegemonic actors alike.

Mirroring as Activist Visibility

Mirrors transform seeing and what is seen. The legitimacy of WikiLeaks, The Pirate Bay, and Anonymous, among other counterhegemonic forces, rests on their ability to remain seen through replication. This is of course nothing new. Through physical vanity mirrors, people of medieval Europe “came to reflect on, know and judge themselves and others through becoming aware of how they appeared” (Coleman 2013, 5; Melchior-Bonnet 2001). Using lenses and mirrors to transform his studio into a camera obscura, seventeenth-century Dutch painter Johannes Vermeer depicted not the depth of field and the textures seen by the unmediated human eye but the world as framed by a camera obscura (Steadman 2002). Herein lies another regime of technological-assisted seeing and copying. Historically, writing and printing systems prioritized and privileged the ocular (or what the eye could see), allocating power to those who could read, write, print, and evaluate based on text (Ong 1977; McLuhan 1964). “Scopic regimes,” such as Western science and law, control power by making certain things visible and legible, and others not (Jay 1992). Likewise, visual technologies organize and assemble the real, the natural, and the moral for Western technoscientific systems (Haraway 1997). By “seeing like a state,” nations objectify and thereby control colonial bodies (Scott 1999). This will to visibility is also profoundly gendered in cinema that has historically served the male gaze (Mulvey 1975). Visibility “lies at the intersection of the two domains of aesthetics (relations of perception) and politics (relations of power)” (Brighenti 2007, 324). So too are digital mirrors replications of files in order to manipulate both their legibility and their legitimacy. Even the term replicate means etymologically “to fold back”: and to fold back, or to ply (re-pli-cate) something, suggests such literal manipulation (see digital).

Leaking classified information is obviously a political and, in some countries, treasonous act. That copying could be as inherently political is less obvious, however. Lisa Gitelman, for example, emphasizes not the leaking but the photocopying of the Pentagon Papers by whistle-blower Daniel Ellsberg as the duplication strategy to make visible the invisible (Gitelman 2011). Contrasting the slow analog act of duplicating thousands of sheets of paper to the instantaneous work of WikiLeaks in which the “entire site was also ‘mirrored’ in several places around the world” (2011, 122) Gitelman sees a return to an older activism of making visible through duplication—a “glasnost redux” (Gitelman 2011, 122).

Or consider how Anonymous—made famous by hacks, leaks, and performative politics—secures visibility and subtle marketing for their political videos by mirroring them across YouTube. Gaines (1994) calls the process by which political videos hail viewers to copy revolutionary subjects “political mimesis.” Again, following Barad, while mirrors represent politicized bodies, they are more than mere representations. Here, mirrors do not reveal sources but rather reveal conflict and contestation. For example, in response to the Church of Scientology’s attempt to force YouTube to take down earlier Anonymous videos critical of Scientology, Anonymous decided to mirror its videos on YouTube. Instead of representing or responding to those who resist their criticism, Anonymous appeals to video mirroring as a way to make visible the conflict itself. The mirrors of Anonymous proliferate and preserve videos so that they might motivate others to mimic the radical personae represented in the videos (Fish 2015). The mirrored videos do not mark just the videos. Each activist video mirror reveals a once-hidden conflict by simulating the conflict it cites. Hacks, leaks, and video mirrors are forms of visual counterpower. The power to see and not be seen—from the eye training of literacy, to the male gaze in cinema, to cultures of self-presentation and reality television, to visibility-optimization industries of fashion and advertising, to video mirroring—constitutes regimes of power and counterpower in networked society.

When activist groups such as WikiLeaks, Anonymous, and The Pirate Bay mirror, their radical politics cannot help but “misuse” capitalist information infrastructure (Soderberg 2010). Despite their reliance on for-profit social media platforms (Dean 2010), grassroots mirroring still raises voices that resist censure in the circuits of technocapitalism (Couldry 2010). Mirroring is one among many promising but nonetheless uneven forms of technological resistance available to support and resist for-profit capture of information.

Capturing the Mirror

The short story of human history may be told as one based on the incremental accumulation of information (Gleick 2011). Human evolution is marked by a slow collective increase in the size and complexity of the neocortex, language, group dynamics, and information exploitation (Dunbar 1993). Likewise, the data-carrying capacity of media materiality—rock, wood, pulp fiber, electrical pulses, and now digital circuits—to store, transmit, and process symbolic systems has dovetailed with the increasing complexity of the brain, language, and society (Ong 1977; McLuhan 1964). Mirroring is just one among many manifestations of the prehistoric practice of data communication, control and manipulation—and, as ever before, current institutional risks and the political economy of corporately owned databases shape and structure the states of virtual data. The “double-movement of liberation and capture” (Deleuze 1989, 68) lets activists appear visible in public at the same time they as let data corporations capture social capital. Simultaneously, distributed mirroring allows activist data to escape capture on sites corporations do not own.

The business proposition of cloud companies is that mirroring is an affordable and socially responsible way of securing retrievable data. We congratulate ourselves when we back our data up, post autobiographical and personal artifacts, and work on the go by placing our documents in the cloud. The same proposition is compromised, however, by the fact that all this plays into surveillance with unseen consequences and costs for our body politic. Bound up in the back-and-forth of hegemonic and counterhegemonic power struggles, mirroring is no innocent activity: it captures for some and liberates for others the very data it displaces, diffracts, and makes autonomous. It serves activist visibility as well as a trap of the same.

Conclusion

Mirrors make and save copies in different places. But, as we all know, mirrors make no exact copies and identify not with their reflections. Mirrors are not products but rather idiosyncratic processes for creating complex multiples autonomous from their origins. Mirroring does not promise realistic representations. Rather, it offers a way of being, acting, and moving in the world. Mirrors map and reveal both activist and corporate forms of conflict and contestation. For activists, mirroring reveals a will to remain visible in a world of censorship, surveillance, and information infrastructural control. For cloud companies, mirroring marks conflicts over the capture and capitalization of data. Mirrors—understood as sites for making and liberating multiples—synthesize key elements of modern informational political economy and praxis. We have rarely been good at facing our doubles: Narcissus dies of starvation by the edge of a pool, Dorian Gray lacerates his mirror painting and stabs himself in the heart, and so too is modern integrity put in peril by the proliferation of the copies of our many selves. That said, what happens behind the mirror—in the invisible back end that manages metadata and structure—may be more contentious than what happens in front of it.

Duplicated files are often political (e.g., counterfeit Roman coins, Lutherian theses, East German facsimiles, Xeroxes of the Pentagon Papers), but data mirroring suggests a new contentious hidden infrastructure for duplicating and distributing data and their identifying metadata. The metadata intensifies the politics of mirroring, since every act can be seen by some and hidden from others. Legal struggles have accelerated over the battle to control and reform peer-to-peer networks and copyright regimes. Overzealous prosecution of open-culture activists drove the tragic suicide of Aaron Swartz, who copied academic journal articles to mirrored databases. Copying and propagating classified documents, Julian Assange and Edward Snowden both speak to the profound visibility of recent mirroring activism. The problems and potentials of mirroring are unlikely to disappear anytime soon. Mirroring belongs to an ancient tradition of replication. Once reserved for scribes and technicians, copying-and-pasting has become perhaps the most powerful practice in everyday computing. Mirroring magnifies the significance of transparency, openness, and visibility—glasnost redux, indeed.

See in this volume: analog, cloud, culture, digital, flow, hacker, internet, memory, surrogate

See in Williams: aesthetic, behavior, bureaucracy, capitalism, charity, collective, common, consumer, exploitation, idealism, labour, management, media, organic, popular, society, taste, technology, work

References

Barad, Karen. 2003. “Posthumanist Performativity: Toward an Understanding of How Matter Comes to Matter.” Signs: Journal of Women in Culture and Society 28(3): 801–31.

Brighenti, A. M. 2007. “Visibility: A Category for the Social Sciences.” Current Sociology 55(3): 323–42.

Coleman, Rebecca. 2013. “Sociology and the Virtual: Interactive Mirrors, Representational Thinking and Intensive Power.” Sociological Review 61(1): 1–20.

Cooley, Charles H. 1902. Human Nature and the Social Order. New York: Scribner’s.

Couldry, Nick. 2010. Why Voice Matters. London: Sage Press.

Dean, Jodi. 2010. Blog Theory. Cambridge: Polity Press.

Deleuze, Gilles. 1989. Cinema 2: The Time-Image. Translated by Hugh Tomlinson and Robert Galeta. Minneapolis: University of Minnesota Press.

Dunbar, R.I.M. 1993. “Coevolution of Neocortical Size, Group Size and Language in Humans.” Behavioral and Brain Sciences 16(4): 681–735.

Ernesto. 2014. “Pirate Bay Founder Gets Ready to Run for European Parliament.” Torrentfreak. https://torrentfreak.com/pirate-bay-founder-gets-ready-to-run-for-european-parliament-140321/.

Fish, Adam. 2015. “Mirroring the Videos of Anonymous: Cloud Activism, Living Networks, and Political Mimesis.” Fibreculture Journal 25.

Gaines, Jane M. 1994. “Political Mimesis.” In Collecting Visible Evidence, edited by Jane M. Gaines and Michael Renov. Minneapolis: University of Minnesota Press.

Gitelman, Lisa. 2011. “Daniel Ellsberg and the Lost Idea of the Photocopy.” In History of Participatory Media, Politics and Publics, 1750–2000, edited by Andrew Ekstrom, Solveig Julich, Frans Lundgren, and Per Wisselgram, 112–24. New York: Routledge.

Gleick, James. 2011. The Information: A History, a Theory, a Flood. New York: Pantheon Books.

Haraway, Donna. 1997. Modest_Witness@Second_Millennium.FemaleMan© Meets_OncoMouse™: Feminism and Technoscience. New York: Routledge.

Jay, Martin. 1992. “Scopic Regimes of Modernity.” In Vision and Visuality, ed. Hal Foster, 3–23. Seattle, WA: Bay Press.

Mackenzie, Adrian, and Ruth McNally. 2013. “Methods of the Multiple: How Large-Scale Scientific Data-Mining Pursues Identity and Differences.” Theory, Culture & Society 30(4): 72–91.

McLuhan, Marshall. 1964. Understanding Media. New York: McGraw-Hill.

Melchior-Bonnet, Sabine. 2001. The Mirror: A History. London: Routledge.

Mulvey , Laura. 1975. “Visual Pleasure and Narrative Cinema.” Screen 16(3): 6–18.

Ong, W. J. 1977. Interfaces of the Word: Studies in the Evolution of Consciousness and Culture. Ithaca, NY: Cornell University Press.

Rorty, Richard. 1979. Philosophy and the Mirror of Nature. Princeton, NJ: Princeton University Press.

Ruppert, Evelyn. 2013. “Not Just Another Database: The Transactions That Enact Young Offenders.” Computational Culture, November 16, 1–13.

Schwartz, Hillel. 1996. The Culture of the Copy: Striking Likenesses, Unreasonable Facsimiles. New York: Zone Books.

Scott, James. 1999. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven, CT: Yale University Press.

Soderberg, Johan. 2010. “Misuser Inventions and the Invention of the Misuser: Hackers, Crackers, Filesharers.” Science as Culture 19(2):51–79.

Steadman, Phillip. 2002. Vermeer’s Camera: Uncovering the Truth behind the Masterpieces. Oxford: Oxford University Press.

Žižek, Slavoj. 1997. The Plague of Fantasies. London: Verso.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset