In this Book

summary

Examines computer hackers, phone phreaks, urban explorers, calculator and computer collectors, “CrackBerry” users, whistle-blowers, Yippies, zinsters, roulette cheats, and chess geeks. The dangers and joys of struggles for autonomy are underlined in studies of RIM’s BlackBerry and Julian Assange’s WikiLeaks website.

When Technocultures Collide provides rich and diverse studies of collision courses between technologically inspired subcultures and the corporate and governmental entities they seek to undermine. Gary Genosko analyzes these practices for their remarkable diversity and their innovation and leaps of imagination. He assesses the results of a number of operations, including the Canadian stories of Mafiaboy, Jeff Chapman of Infiltration, and BlackBerry users.

The author provides critical accounts of highly specialized attributes, such as the prospects of deterritorialized computer mice and big toe computing, the role of electrical grid hacks in urban technopolitics, and whether info-addiction and depression contribute to tactical resistance. Beyond resistance, however, the goal of this work is to find examples of technocultural autonomy in the minor and marginal cultural productions of small cultures, ethico-poetic diversions, and sustainable withdrawals with genuine therapeutic potential to surpass accumulation, debt, and competition. The dangers and joys of these struggles for autonomy are underlined in studies of RIM’s BlackBerry and Julian Assange’s WikiLeaks website.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Series Info, Title Page, Copyright, Dedication
  2. restricted access
    • Download PDF Download
  1. Contents
  2. pp. vii-viii
  3. restricted access
    • Download PDF Download
  1. Acknowledgements
  2. pp. ix-x
  3. restricted access
    • Download PDF Download
  1. Introduction
  2. pp. 1-28
  3. restricted access
    • Download PDF Download
  1. 1 Beyond Hands Free: Big-Toe Computing
  2. pp. 29-40
  3. restricted access
    • Download PDF Download
  1. 2 Cultures of Calculation: William Gibson Collects
  2. pp. 41-56
  3. restricted access
    • Download PDF Download
  1. 3 Rebel with an IV Pole: Portrait of Ninjalicious as an Urban Explorer
  2. pp. 57-76
  3. restricted access
    • Download PDF Download
  1. 4 Home-Grown Hacker
  2. pp. 77-106
  3. restricted access
    • Download PDF Download
  1. 5 Hacking the Grid: Does Electricity Want to Be Free?
  2. pp. 107-120
  3. restricted access
    • Download PDF Download
  1. 6 Whistle Test: Blindness and Phone Phreaking
  2. pp. 121-132
  3. restricted access
    • Download PDF Download
  1. 7 In Praise of Weak Play: Against the Chess Computers
  2. pp. 133-144
  3. restricted access
    • Download PDF Download
  1. 8 CrackBerry: Addiction and Corporate Discipline
  2. pp. 145-152
  3. restricted access
    • Download PDF Download
  1. 9 WikiLeaks and the Vicissitudes of Transparency
  2. pp. 153-170
  3. restricted access
    • Download PDF Download
  1. Conclusion
  2. pp. 171-180
  3. restricted access
    • Download PDF Download
  1. References
  2. pp. 181-200
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 201-210
  3. restricted access
    • Download PDF Download
  1. Further Reading
  2. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.