{"id":124,"date":"2018-05-01T04:03:33","date_gmt":"2018-05-01T04:03:33","guid":{"rendered":"http:\/\/store.c4ss.org\/?post_type=product&#038;p=124"},"modified":"2020-08-27T02:57:05","modified_gmt":"2020-08-27T02:57:05","slug":"the-desktop-regulatory-state","status":"publish","type":"product","link":"https:\/\/store.c4ss.org\/index.php\/product\/the-desktop-regulatory-state\/","title":{"rendered":"The Desktop Regulatory State"},"content":{"rendered":"<blockquote><p><span class=\"drop-caps\">D<\/span>efenders of the modern state often claim that it\u2019s needed to protect us \u2014 from terrorists, invaders, bullies, and rapacious corporations. Economist John Kenneth Galbraith, for instance, famously argued that the state was a source of \u201ccountervailing power\u201d that kept other social institutions in check. But what if those \u201ccountervailing\u201d institution \u2014 corporations, government agencies and domesticated labor unions \u2014 in practice collude more than they \u201ccountervail\u201d each other? And what if network communications technology and digital platforms now enable us to take on all those dinosaur hierarchies as equals \u2014 and more than equals. In The Desktop Regulatory State, Kevin Carson shows how the power of self-regulation, which people engaged in social cooperation have always possessed, has been amplified and intensifed by changes in consciousness \u2014 as people have become aware of their own power and of their ability to care for themselves without the state \u2014 and in technology \u2014 especially information technology. Drawing as usual on a wide array of insights from diverse disciplines, Carson paints an inspiring, challenging, and optimistic portrait of a humane future without the state, and points provocatively toward the steps we need to take in order to achieve it.<\/p><\/blockquote>\n<h3>Table of Contents<\/h3>\n<h4>CHAPTER ONE\u2013THE STIGMERGIC REVOLUTION<\/h4>\n<ul>\n<li>Reduced Capital Outlays<\/li>\n<li>Distributed Infrastructure<\/li>\n<li>Network Culture<\/li>\n<li>Stigmergy<\/li>\n<\/ul>\n<h4>CHAPTER TWO\u2013NETWORKS VS. HIERARCHIES<\/h4>\n<ul>\n<li>The Systematic Stupidity of Hierarchies<\/li>\n<li>Hierarchies vs. Networks<\/li>\n<li>Networks vs. Hierarchies<\/li>\n<li>Systems Disruption<\/li>\n<\/ul>\n<h4>CHAPTER THREE\u2013NETWORKS VS. HIERARCHIES: END GAME<\/h4>\n<ul>\n<li>Transition from Hierarchies to Networks<\/li>\n<li>The Question of Repression<\/li>\n<li>The Question of Collapse<\/li>\n<li>Conclusion<\/li>\n<\/ul>\n<h4>CHAPTER FOUR\u2013THE DESKTOP REVOLUTION IN REGULATION<\/h4>\n<ul>\n<li>The Regulatory State: Myth and Reality<\/li>\n<li>Individual Super-empowerment<\/li>\n<li>The \u201cLong Tail\u201d in Regulation<\/li>\n<li>Networked Resistance as an Example of Distributed Infrastructure<\/li>\n<li>Informational Warfare (or Open-Mouth Sabotage)<\/li>\n<li>A Narrowcast Model of Open Mouth Sabotage<\/li>\n<li>Attempts to Suppress or Counter Open Mouth Sabotage<\/li>\n<li>Who Regulates the Regulators?<\/li>\n<li>Networked, Distributed Successors to the State: Saint-Simon, Proudhon and \u201cthe Administration of Things\u201d<\/li>\n<li>Monitory Democracy<\/li>\n<li>\u201cOpen Everything\u201d<\/li>\n<li>Panarchy<\/li>\n<li>Collective Contracts<\/li>\n<li>Heather Marsh\u2019s \u201cProposal for Governance<\/li>\n<li>Michel Bauwens\u2019 Partner State<\/li>\n<\/ul>\n<h4>CHAPTER FIVE\u2013FUNDAMENTAL INFRASTRUCTURES: NETWORKED SUPPORT PLATFORMS<\/h4>\n<ul>\n<li>Bruce Sterling: Islands in the Net<\/li>\n<li>Phyles: Neal Stephenson<\/li>\n<li>Phyles: Las Indias and David de Ugarte<\/li>\n<li>Bruce Sterling: The Caryatids<\/li>\n<li>Daniel Suarez<\/li>\n<li>John Robb: Economies as a Social Software Service<\/li>\n<li>File Aesir<\/li>\n<li>Venture Communism<\/li>\n<li>Medieval Guilds as Predecessors of the Phyle<\/li>\n<li>Transition Towns and Global Villages<\/li>\n<li>Modern Networked Labor Unions and Guilds as Examples of Phyles<\/li>\n<li>Virtual States as Phyles: Hamas, Etc.<\/li>\n<li>Eugene Holland: Nomad Citizenship<\/li>\n<li>Producism\/Producia<\/li>\n<li>Emergent Cities<\/li>\n<li>The Incubator Function<\/li>\n<li>Mix &amp; Match<\/li>\n<\/ul>\n<h4>CHAPTER SIX\u2013FUNDAMENTAL INFRASTRUCTURES: MONEY<\/h4>\n<ul>\n<li>What Money\u2019s For and What it Isn\u2019t<\/li>\n<li>The Adoption of Networked Money Systems<\/li>\n<li>Examples of Networked Money Systems<\/li>\n<\/ul>\n<h4>CHAPTER SEVEN\u2013FUNDAMENTAL INFRASTRUCTURES: EDUCATION AND CREDENTIALING<\/h4>\n<ul>\n<li>Introduction: Whom Do Present-Day Schools Really Serve<\/li>\n<li>Alternative Models<\/li>\n<li>Potential Building Blocks for an Open Alternative<\/li>\n<li>Open Course Materials<\/li>\n<li>Open Textbooks<\/li>\n<li>Open Learning Platforms<\/li>\n<li>Credentialing<\/li>\n<\/ul>\n<h4>CHAPTER EIGHT\u2013THE ASSURANCE COMMONS<\/h4>\n<ul>\n<li>Introduction<\/li>\n<li>Legibility: Vertical and Horizontal. Graeber, Scott, etc.<\/li>\n<li>Networked Certification, Reputational and Verification Mechanisms<\/li>\n<li>Ostrom, Commons Governance and Vernacular Law<\/li>\n<\/ul>\n<h4>CHAPTER NINE\u2013THE OPEN SOURCE LABOR BOARD<\/h4>\n<ul>\n<li>Historic Models<\/li>\n<li>Networked Labor Struggle<\/li>\n<li>Open-Mouth Sabotage<\/li>\n<\/ul>\n<h4>CHAPTER TEN\u2013OPEN SOURCE CIVIL LIBERTIES ENFORCEMENT<\/h4>\n<ul>\n<li>Protection Against Non-State Civil Rights Violations<\/li>\n<li>When the State is the Civil Liberties Violator<\/li>\n<li>Circumventing the Law<\/li>\n<li>Circumvention: Privacy vs. Surveillance<\/li>\n<li>Seeing Like a State, and the Art of Not Being Governed<\/li>\n<li>Exposure and Embarrassment<\/li>\n<li>Networked Activism and the Growth of Civil Society<\/li>\n<\/ul>\n<h4>CHAPTER ELEVEN\u2013THE OPEN SOURCE FOURTH ESTATE<\/h4>\n<ul>\n<li>The Industrial Model<\/li>\n<li>Open Source Journalism<\/li>\n<\/ul>\n<h4>CHAPTER TWELVE\u2013OPEN SOURCE NATIONAL SECURITY<\/h4>\n<ul>\n<li>The State as Cause of the Problem: Blowback<\/li>\n<li>Meta-Organization<\/li>\n<li>Active Defense, Counter-Terrorism, and Other Security Measures<\/li>\n<li>Passive Defense<\/li>\n<li>The Stateless Society as the Ultimate in Passive Defense<\/li>\n<li>Disaster Relief<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Desktop Regulatory State<br \/>\n<em>The Countervailing Power of Individuals and Networks<\/em><\/p>\n<p>Purchase: 1 Book<\/p>\n","protected":false},"featured_media":125,"template":"","meta":{"_regular_price":["14"],"currency_symbol":[]},"product_brand":[],"product_cat":[25],"product_tag":[],"class_list":{"0":"post-124","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-books","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-simple"},"post_slider_layout_featured_media_urls":{"thumbnail":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",105,150,false],"post_slider_layout_landscape_large":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",220,314,false],"post_slider_layout_portrait_large":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",220,314,false],"post_slider_layout_square_large":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",220,314,false],"post_slider_layout_landscape":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",220,314,false],"post_slider_layout_portrait":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",220,314,false],"post_slider_layout_square":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",220,314,false],"full":["https:\/\/store.c4ss.org\/wp-content\/uploads\/2018\/05\/Desktop_Regulatory_State.jpg",220,314,false]},"_links":{"self":[{"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/product\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/media\/125"}],"wp:attachment":[{"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/media?parent=124"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/product_brand?post=124"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/product_cat?post=124"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/store.c4ss.org\/index.php\/wp-json\/wp\/v2\/product_tag?post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}