Tunneled cipherspace / Burrow internet

[caption id="attachment_1341" align="aligncenter" width="229" caption="DIY camera tunnel. Roll a sheet of paper and hold it in front of the lens."]IMG_0721{.size-medium .wp-image-1341 width="229" height="172"}[/caption]

Today I made a few remarks about the yet-another-google-gate debate about China and censorship on the Swedish site Newsmill. My main argument was that we can not rely solely on the treatises between states, nor the corporate policies deployed in various places to make sure there is a flow of communication between internauts.

Rather, we also have to dig tunnels of connectivity to destabilize regimes of oppression, wherever they appear as aggregates of power. Thus, the time has come to reflect on the ontology of tunnels and their consequences for political activism.

(:\~\~

Tunnels come in various shapes. There are tunnels under nation-state borders, enabling flows of humans to transgress borders, tunnels in smooth space such as submarines and whales, tunnels-in-tunnels in the shape of darknets on the internets, and tunnels dug by burrowing rabbits, rats and worms.

Tunnels operate by way of hiddenness and surprise. However, as activities once are forced into tunnels for any reason, they become entrenched pathways of ordinary communication and logistics. Subways were deployed to avoid traffic jams, some tunnels are built to go under water, inside mountains, some tunnels are escape routes for mammals, drug dealers and prison convicts.

State armies built bunker-tunnels during the cold war, in Nevada, Gothenburg and Moscow. Jönköping based philosopher macdeleuzian comments this development at Copyriot:

Tunnelling is precisely increasing the surface of a body while decreasing its volume. Adding surface is obviously very useful to anyone: It adds space that can be utilized (and territorialized), for car- and subway-traffic, for storage, any kind of passage and communication etc; it kan also establish a highspeed-path through a slowspeed-medium. But access to the tunnel is also limited to certain points, easily defended, and it is protected from both insight and intrusion.

Hence, tunnels also make possible speed shifts, in the case of fibreoptics and lazors this is a drastic acceleration enabled by the tunnel, similar to the tubes we take to work in large cities. Speed is politics, but so is hiddenness. Compared to aviation, where visual optics long have been replaced by radars and GPS satellites, tunnels are detected by the surveillance of rumors, vibrations in the ground, penetration tests in the ground. The preferred attack on a tunnel is gas, not missiles.

[caption id="attachment_1342" align="aligncenter" width="300" caption="Removing the engine from a Viggen jet fighter creates a tunnel inside the cold war bunker-tunnel in Gothenburg."]IMG_0692{.size-medium .wp-image-1342 width="300" height="225"}[/caption]

(:\~\~

As Rasmus argues there has been a major shift in internet politics during the last few years. The dream of ultra-fast downloads came true in certain urban pockets of fiberoptical tunnels, then slowly diffused into smaller cities. Bandwidth is of course still an issue, but the laser of thought has lately burned holes in other issues concerning net neutrality and access, not so much in relation to bandwidth as such, but rather in relation to non-discrimination of data, free speech and democratic innovation. Let us further dig down in the existence of tunnels and the consequences for tunneling politics and pop culture.

Tunnels exist along certain lines of micro-tactical relaying interfaces. The first variable is system of navigation. Two extreme positions may shed some light on this continuum; the submarine, the mobile tunnel navigating in the smooth sea following vectors, bearings and sonar pings. The other side is TCP/IP-infrastructure, which is protocol-based and non-discriminatory of its medium of transportation, be it copper, glass or radio-waves.

[caption id="attachment_1343" align="aligncenter" width="225" caption="Cipherofficer Lincoln Burrows of the Telecomix Crew attending a FRA-seminar."]IMG_0728{.size-medium .wp-image-1343 width="225" height="300"}[/caption]

A middle space in between the submarine and the protocol are friend-to-friend (f2f) darknets. On the one side they use the protocols of a packet switched infrastructure, on the other hand they build trust in communication between underground networks of people, even with decentralized DNS, as in the i2p-darknet.

Cave-dwellers were sedentary, their tunnels were seldom networked, and became sites of religious worship and residential places. Burrow dwellers, on the other hand, use tunnels to occupy a space without having to move in the visible, audible or haptic spectrum except for when jumping in and out of entry and exit points.

Tunnels are however not merely primitive tool for occupying spaces, but can also be used for displacing and deterritorializing political processes. Any legislative process may be on shaky grounds if their foundation becomes a holey space.

(:\~\~\~

Undermining is the foremost power of tunnelling. A legal process may break down if tunnels render Law™ powerless. A regime such as China will be undermined the day every person communicates in tunnels without intrusive surveillance, be they in cipherspace or in a basement. Under-mining is the opposite of signification, such as in the legal overcodings of a State-apparatus. Under-mining is mining-under, switching flows of matter-energy on and off, relaying it into new channels.

However, we must also acknowledge that complete burrowing politics barely ever exists, no less than there are political strategies that are completely in the open. We all have our tunnels or bunkers (my flat is almost a bunker, i use it sometimes for hiding, sometimes for parties).

[caption id="attachment_1344" align="aligncenter" width="225" caption="A tunnel of light enables me to see the keys on my laptop. In the future we will have lazors for this. "]IMG_0419{.size-medium .wp-image-1344 width="225" height="300"}[/caption]

When tunnels cease to be merely ways of hiding or speeding up logistics, the remain in use or get filled up with concrete as with the cold-war bunkers. Some phenomena exist in tunnels out of mere convention or take on a different use. For example, the SSH tunnels that run in and out of my computers 24/7 are sometimes used for secure information when upgrading a server or generating a crypto-key. But they are also used for IRC chatting, an activity that barely benefits from encryption, at least not when used on public servers.

TCP/IP based communications may hitherto be the clearest example of tunneling-in-tunnels, but as a mode of existence, it shares features with tunnels in our everyday lives. The becoming-burrower, the proliferation of holey-spaces, the tunneling within ourselves - be it fractal synapses or intestines tunneling carbo-hydrates with delivery to the organs –; silent whispers between destinations. Surprise surfacing!