Raising the Lobster: 养龙虾, Token Oblation, and the Domestication of the Agent
On the spring 2026 OpenClaw phenomenon and the 养 metaphor as a terministic screen for agentic AI.
On the spring 2026 OpenClaw phenomenon and the 养 metaphor as a terministic screen for agentic AI.
Overview Content Analysis: A research technique for the systematic classification and description of communication content based on predetermined categories. It can be quantitative, qualitative, or a combination of both. Quantitative content analysis involves counting occurrences (e.g., how often violence is depicted in media). Qualitative content analysis involves interpreting the meaning behind the content, overlapping with rhetorical and other qualitative methods discussed in previous weeks. Why Use Content Analysis? Researchers use content analysis to measure behavior within media, such as how characters in films or television programs act, or how frequently certain themes appear in advertisements or articles. It is commonly used to investigate themes like violence, bias, identity representation, or other significant patterns in media. Manifest vs. Latent Content Manifest Content: What is explicitly presented in the media (e.g., a character saying "I love you"). Latent Content: The underlying, hidden meanings behind what is explicitly shown, though content analysis typically focuses on manifest content. Coding Coding is a critical process in content analysis, where researchers classify and categorize the data they've collected based on predefined rules. Coding allows researchers to systematically organize and interpret large sets of data, making it easier to quantify and analyze the information. Types of Coding Open Coding: This is the initial phase of coding where researchers start by identifying key themes, concepts, or patterns in the data. This approach is flexible and exploratory, allowing researchers to see what categories naturally emerge. Axial Coding: Once the initial categories are identified, axial coding refines and links the categories by identifying relationships among them. This step helps in organizing the data around central themes. Selective Coding: In this phase, researchers focus on the core categories that have emerged and further explore connections. This step helps develop a coherent narrative around the data. Coding Process Create Categories: Researchers must establish a clear system of categories based on the research question. For example, if studying violence in TV shows, categories could include "physical violence," "verbal aggression," and "implied violence." Operational Definitions: Essential for clear, measurable research, operational definitions specify how a concept will be measured in the study. For example, define what counts as "violence" to ensure consistent coding. It is crucial to provide detailed operational definitions for each category. For example, if the category is "physical violence," the definition might include "any act where one character physically harms or attempts to harm another character, including hitting, kicking, shooting, etc." Coding for abstract concepts like "patriotism" or "beauty" can be difficult because these terms can be interpreted differently depending on context. Researchers must carefully operationalize these concepts to ensure clarity. Mutually Exclusive Categories: Categories must be distinct, meaning that a single piece of content should only fit into one category. If categories overlap, coding will be inconsistent and unreliable. For example, "verbal aggression" and "insult" should be clearly distinguished to avoid overlap. Intercoder Reliability: To maintain consistency, especially in larger studies involving multiple coders, researchers should test consistency between different coders, known as intercoder reliability. This process involves having several coders analyze the same content independently and comparing their results. A high level of agreement between coders (typically 90% or higher) indicates reliable coding. If discrepancies arise, the operational definitions or coding procedures may need to be revised. Sampling Sampling refers to the process of selecting a representative subset of content from a larger pool to study. In content analysis, sampling is crucial because it directly affects the generalizability and reliability of the findings. Sampling and coding are closely related because the way you select and code your sample affects the validity of your research project. A well-chosen, representative sample ensures that the data collected can be generalized to the broader population, while accurate coding ensures that the data collected is reliable and meaningful. ...
Table of Contents Introduction Act One: AI as Metaphor and Speculative Frame for Procedural Automation (1980s–1990s) From Laboratories to Everyday Life Cultural Imagination: Between Utopian and Dystopian Frames Act Two: The Machine Learning Turn (Mid 1990s–2000s) Agentic Shift From Static Programs to Adaptive Algorithms Illustrative Example: A Machine-Learning Wardrobe Recommender Paradoxes of Machine Learning Footnotes Scene from the 1983 sci-fi thriller WarGames, directed by John Badham. The film dramatizes a near-catastrophe triggered by a military decision to entrust U.S. nuclear deterrence to an autonomous AI system that treats thermonuclear war as a solvable optimization problem. Source: DVDXtras, “WarGames (1983) | Behind the Scenes,” Internet Archive, June 2, 2022. <LINK> *Continuing from: “What Is AI?” Part 1: A Survey of Imaginaries, Mythologies, and Rhetorical Structures of Thinking Machines In the previous segment of our genealogical survey, we have traced ancient imaginaries that seeded today’s visions of machine intelligence. From Yan Shi’s mechanical performers to Talos’ bronze vigilance and the ritual logic of golems and Homunculi, we explored how mythic prototypes shaped the rhetorical terrain on which “AI” would later emerge as a technological category. Whereas earlier societies used myth and ritual to make sense of uncanny forms of artificial agency and “thinking machines,” in this second part we turn from historical mythologies to present-day technological possibilities. The term “artificial intelligence” circulates in our cultural lifeworld with astonishing fluidity. It appears in commercials, policy reports, sci-fi movies, legal disputes, and everyday conversations. It is used to describe everything from basic computer programs to sophisticated generative models capable of complex knowledge-performance. ...
*Online lesson module and WIP chapter draft. Table of Contents Introduction Yan Shi's Automata Talos Golem Faust’s Homunculus The Long Arc of Artificial Imaginaries Footnotes When our own era proclaims artificial intelligence (AI) as the centerpiece of contemporary technological fetishism, it often points to its sweeping impact on medicine, autonomous mobility, creative production, and the evolving rituals of law and civic life. Yet even amid these transformations, we should resist the impulse to treat AI as a clean break with the past, for the imaginaries that animate it are far older than the machines themselves.1 Long before the first integrated circuit pulsed with electricity, societies from the past contemplated thinking machines in forms that now read like allegories of our contemporary anxieties. ...
Online lesson module - A practical walk through First Amendment foundations, controversial but protected expressions, categories of unprotected speech, and contemporary questions of platform power, VPNs, and the Tor network. This lesson follows our in‑class slide deck and uses the same conceptual scaffolding for continuity. Table of Contents Free Expression: Constitutional and Global Frames Free Expression in American History Prior Restraint and its Discontents One Man's Vulgarity is Another's Lyric Unprotected Speech Defamation Fighting Words Obscenity Intellectual Property Violations Speech Integral to Criminal Conduct Internet Censorship & Communication Rights VPNs: Benefits and Constraints The Tor Network and the “Dark Web” References 1) Free Expression: Constitutional and Global Frames The framers of the US Constitution felt a strong need to safeguard the freedom of speech and the press (as well as religion and the right to assemble). The First Amendment of the Constitution articulates a bright‑line commitment: “Congress shall make no law … abridging the freedom of speech, or of the press.” [1] Interpretive anchor: Political and religious speech receive the highest protection under the US constitutional framework. Restrictions must satisfy content‑neutral “time, place, and manner” standards and leave open alternative channels of communication. [2] The term “press” in the First Amendment is NOT meant to be narrowly understood as newspapers or printed matter. The Supreme Court of the US (SCOTUS) has consistency interpreted the "press" as an umbrella encompassing any medium used to disseminate information and opinions to the public. The "press" includes, but not limited to: print publications, broadcast media, digital platforms, blogs, podcasts, streaming contents, social media, and software source codes. [3] Universal Declaration of Human Rights, Art. 19 Everyone has the right to seek, receive, and impart information and ideas through any media and regardless of frontiers. This is the global lingua franca of communication rights.[4] While the U.S. Constitution enshrines free expression through the First Amendment, its spirit resonates in international human rights law. Article 19 of the Universal Declaration of Human Rights (1948) extends the same principle beyond national boundaries, affirming that “everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.” [5] In this sense, the American jurisprudence on press freedom contributes to a broader global discourse on communication rights—the notion that access to information and the ability to share ideas are not privileges granted by the state, but intrinsic conditions of human dignity and democratic participation. [6] 2) Free Expression in American History The First Amendment’s promise of free expression has never fully insulated the United States from attempts to silence dissenting voices or control the press. A vivid early example came in 1798, when the Federalist-controlled Congress enacted the Alien and Sedition Acts, a series of laws designed to suppress opposition during a time of political and international tension. The Sedition Act, in particular, made it a crime to “write, publish, or print any false, scandalous, and malicious writing” against the president, Congress, or the federal government.[7] In practice, these laws targeted journalists, editors, and immigrant supporters of the Democratic-Republican Party, whose criticism of Federalist policies was reframed as a threat to national security. The Acts proved deeply unpopular, provoking a national backlash over what many viewed as an assault on constitutional liberties. When the Federalists were voted out of power in 1800, the new administration swiftly allowed the legislation to expire, marking an early and decisive reaffirmation that political dissent and criticism of public officials lie at the core of the American free speech tradition. [8] 2.1 Prior Restraint and its Discontents Prior restraint refers to government actions that prevent speech or publication before it occurs, typically through injunctions, licensing, or other forms of preemptive censorship. Prior restraint has deep roots in English common law, where monarchs required the press to obtain royal licenses, in effect silencing political or religious dissent. [9] The struggle over prior restraint became especially visible in twentieth-century American jurisprudence, as courts were forced to define the limits of government control over publication. In 1931, the Supreme Court’s decision in Near v. Minnesota marked the first major ruling to strike down a state’s attempt to suppress a newspaper before distribution. The case arose when Minnesota officials tried to shut down The Saturday Press for accusing local politicians of corruption. The Court ruled that such pre-publication censorship violated the First Amendment, establishing that punishment for libel or incitement must come after publication through due process, not before. [10] A declassified Central Intelligence Agency map from November 1950 depicting dissident activity in Indochina, later published by The New York Times as part of the Pentagon Papers series. Source: Central Intelligence Agency, Public domain, via Wikimedia Commons <https://commons.wikimedia.org/wiki/File:Dissident_Activities_in_Indochina.svg> Four decades later, in 1971, New York Times Co. v. United States—the “Pentagon Papers” case—reaffirmed that even claims of national security rarely justify silencing the press in advance. The Nixon administration’s effort to block the Times and Washington Post from publishing leaked documents on the Vietnam War was rejected, with Justice Black famously writing that “the press was to serve the governed, not the governors.” [11] The issue of prior restraint resurfaced in 1979 with United States v. The Progressive, when the Department of Energy (DOE) sought to prevent The Progressive magazine from publishing an article titled “The H-Bomb Secret: How We Got It, Why We’re Telling It.” Written by freelance journalist Howard Morland, the piece compiled publicly available scientific information to explain the general principles of hydrogen bomb design. The US government argued that even though the H-bomb data was unclassified, the article could help hostile nations develop nuclear weapons and therefore threatened US national security. A federal judge initially granted an injunction, marking one of the rare instances in U.S. history where prior restraint was temporarily upheld. However, the case was dropped before reaching the Supreme Court after similar information appeared in other publications, rendering the injunction moot. [12] 3) One Man’s Vulgarity is Another’s Lyric The First Amendment protects not only agreeable or accurate speech but also expression that is false, unsettling, or offensive, so long as it does not cross into one of the legally defined unprotected categories. For instance, most false statements (or the “right to lie”) are protected as long as they do not amount to defamation, perjury, or professional malpractice. The Supreme Court made this point explicit in United States v. Alvarez (2012), when it struck down the Stolen Valor Act, which had criminalized falsely claiming military honors. The Court reasoned that the government cannot impose blanket bans on lies without threatening the broader freedom to engage in activities intrinsic to public discourse and self-expression. [13] Cover of the November 1979 issue of The Progressive, displaying a simplified diagram of the Teller–Ulam hydrogen bomb design— an issue the U.S. Department of Energy sought to censor on national security grounds.Source: By The Progressive magazine, Fair use, https://en.wikipedia.org/w/index.php?curid=20156806 Another recurring controversy involves the publication of classified or sensitive government information by journalists or private citizens. In most circumstances, the First Amendment prohibits the government from punishing the press for publishing lawfully obtained materials, even if those materials expose state secrets or political wrongdoing. The Pentagon Papers case (1971) and the United States v. Progressive “H-bomb” case (1979) we’ve discussed earlier reaffirmed this principle, holding that the risk of embarrassment or diplomatic tension generally does not outweigh the public’s right to know. Finally, unpopular or offensive expressions, for the most part, remains constitutionally protected unless it directly incites violence or falls within another unprotected category such as fighting words (more on this later). This includes speech that most find morally objectionable or politically extreme. The protection of offensive speech ensures that public authorities cannot easily redefine the boundaries of "acceptable opinion." As Justice Harlan observed in Cohen v. California (1971), when a man wore a jacket emblazoned with “F*** the Draft” in a courthouse: “One man’s vulgarity is another’s lyric.” [14] 4) Unprotected Speech While the First Amendment offers broad protection for expression, it is not absolute. Over time, the US Supreme Court has defined a narrow set of unprotected categories of speech—forms of expression that are considered so harmful, fraudulent, or devoid of public value that they do not merit constitutional protection. Each category has been shaped by specific historical cases, reflecting the tension between liberty and harm prevention in a democratic society. 4.1 Defamation (libel & slander) Defamation refers to false statements of fact that unjustly harm another person’s reputation. For speech to qualify as defamation, it must meet ALL four criteria: it must be: (1) Untrue - verified to be factually false or misleading. (2) Public - cannot be an one-on-one private conversation, must be at minimum communicated to a third party individual. (3). Actual Malice - made with reckless disregard for truth AND the intent to cause harm. (4)Actual Injury - must result in verifiable monetary or reputational damages [15] The Onion. “IRS Allows Taxpayers to Deposit Payments Directly into Elon Musk’s Bank Account.” The Onion, June 6, 2025. https://www.theonion.com/irs-allows-taxpayers-to-deposit-payments-directly-into-elon-musks-bank-account Although The Onion’s June 6, 2025 article, “IRS Allows Taxpayers To Deposit Payments Directly Into Elon Musk’s Bank Account,” makes numerous false claims about the U.S. government and Elon Musk, it is a work of satire and does not meet the legal criteria for defamation. Satirical and parodic works like The Onion’s are protected precisely because they cannot reasonably be understood as stating actual facts. The publication made clear signals to its readers that the piece is humorous commentary on systemic wealth inequality, not actual news report. [16] Untrue: The claim is factually false. Communicated to at least one third party: It was shared to a large online audience. Actual malice: The celebrity chef acted with reckless disregard for the truth by publishing without verification. Actual injury: The restaurant suffered measurable financial and reputational harm. 4.2 Fighting Words (rarely applicable today) The category of fighting words refers to a very narrow class of speech acts so personally abusive and confrontational that they are likely to provoke an immediate violent response from the person addressed. The doctrine was first articulated in the controversial case Chaplinsky v. New Hampshire (1942). Since then, courts have dramatically narrowed the fighting words doctrine, and it is almost never applied today—surviving more as a historical artifact. [17] To qualify as fighting words, speech must satisfy ALL of the following elements: (1) Personally Abusive — must be directed at a specific individual in a way that is extremely insulting or demeaning; (2) Face-to-Face — must occur in a close, personal encounter where physical confrontation between involved parties is possible; (3) Incite Immediate Physical Violence — the speech must be so severe where an reasonable be provoked into immediate physical retaliation (not merely offend, disturb, or anger). (4) Lack of Broader Value — must exist purely as a personal insult and cannot be reasonably interpreted as having serious literary, artistic, political, or scientific value (“SLAPS” value) Once again, fighting words are an exceedingly narrow exception to free expression, representing the constitutional system’s effort to balance the right to speak with the need to prevent immediate, face-to-face violence. Because these conditions are so strict, very few cases meet all four elements—even when the speech in question is highly offensive or hateful. 4.3 Obscenity (Miller's test) The Supreme Court’s decision in Miller v. California(1973) established the three-part test for determining obscenity. [18] A work is considered obscene only if it satisfies ALL of the following elements (also known as the Miller’s test): (1) Appeals to the Prurient Interest - That “the average person, applying contemporary community standards,” would find that the work, taken as a whole, appeals to an excessive or unhealthy interest in sexual matters. [19] (2) Patently Offensive - Whether the work depicts or describes patently offensive "'hard core' sexual conduct specifically defined by the regulating state law, as written or construed." [20] (3) No "SLAPS" Value - the work, taken as a whole, does not have serious literary, artistic, political, or scientific value (“SLAPS” value). [21] Screenshot of adult video-sharing website Pornhub’s “Notice to User” page, captured on November 1, 2025. The page automatically appears when users attempt to access the site from regions subject to state-level age-verification laws. At the top of the notice, a video message features Dr. Cherie DeVille, an American licensed physician, adult film performer, and free speech advocate. In the clip, Dr. DeVille explains that recently enacted state statutes require age and identity verification before granting access to adult content. Her statement frames the measure as both a legal compliance notice and a policy commentary on the right to free expression in digital environments. Age Verification Laws and Digital Rights Under the Miller's test, most mainstream online pornography platforms are not likely to meet the legal definition of obscenity. The Miller framework narrowly defines obscenity as expression that appeals to prurient interests, depicts sexual conduct in a patently offensive way, and lacks serious literary, artistic, political, or scientific value. By contrast, U.S. courts have repeatedly held that consensual adult pornography constitutes protected speech (so long as it does not involve minors or non-consensual acts), as they may reasonably be understood as having some expressive or artistic value. [22] However, beginning around 2021, a global wave of adult-content removals and site-access restrictions emerged—not through direct governmental censorship, but via indirect enforcement mechanisms. Rather than invoking obscenity law, public authorities and private intermediaries have increasingly relied on trafficking and age-verification statutes to limit access to online adult material. These include 18 U.S.C. §§ 2257 and 2257A, which mandate age and identity verification for all performers in sexually explicit content, and the FOSTA–SESTA package (2018), which expanded platform liability for facilitating sex trafficking or prostitution. [23] Under the threat of severe financial and legal penalties, credit card companies and payment processors suspended services to adult-content platforms such as Pornhub until they implemented stricter user identity and age verification systems that satisfied government and corporate compliance standards. This strategy effectively bypasses traditional obscenity law, achieving de facto regulation through economic pressure and private enforcement rather than court rulings. Many digital rights and free expression advocates have voiced concern that such measures, while intended to prevent exploitation, expand the infrastructure for online censorship and erode user privacy. Mandatory age-verification systems require users to upload sensitive identification documents, increasing the risk of data breaches, identity theft, and potential state surveillance. In this way, the contemporary regulation of adult content reflects a shift from moral censorship under obscenity doctrine to a new regime of bureaucratic and corporate gatekeeping, where privacy and free expression are increasingly contingent on compliance with opaque verification systems. [24] 4.4 Intellectual Property Violations While the First Amendment protects expression, it does not protect the unauthorized use of another person’s creative work. Copyright infringement is one of the most common forms of restricted speech in the digital age. In fact, the vast majority of online takedown and censorship cases involve intellectual property violations, not hate speech or political dissent. Under U.S. law, copyright protection extends for the lifetime of the author plus 70 years after their death, a duration considerably longer than in most other countries. Once that period expires, the work enters the public domain, where it may be freely used, adapted, or redistributed. However, a significant loophole allows corporations to preserve their intellectual monopolies: by continually producing “new” versions or derivative works based on existing characters and franchises. Each new iteration—whether a sequel, prequel, or cinematic remake—resets the clock on copyright protection for that specific creative expression. This system contributes to the recent wave of live-action remakes, reboots, and remasters of older works in film and television. [25] 4.5 Speech Integral to Criminal Conduct The final major category of unprotected speech encompasses expressions that are themselves integral to criminal activity. Unlike controversial or offensive ideas—which remain protected under the First Amendment—these forms of communication are inseparable from the commission of a crime. The law draws a firm line between speech that expresses an idea and speech that acts as a mechanism of harm. Examples include fraud and scams, where deceptive speech is used to obtain money or property through misrepresentation; the possession and distribution of child abuse material, which is categorically excluded from protection because it involves the documentation of real criminal abuse; criminal solicitation or conspiracy, in which language functions as the coordination or encouragement of illegal acts; and targeted harassment or threats of specific, imminent harm, where speech directly endangers the safety of an identifiable person. In the digital age, many of these offenses increasingly manifest as forms of cybercrime—where speech itself becomes both the medium and mechanism of violence. [26] Screenshot of the splash screen of the payload of the original version of Petya – a family of ransomware that encrypts its victims' hard drive and prevents their PC computers from booting. It subsequently demands that its victims to make a payment in cryptocurrency (typically Bitcoin) in order to regain access to their PCs. An example illustrating this boundary is the case of Petya, a family of ransomware first identified in 2016. Petya malware encrypts the victim’s hard drive and prevents their computer from booting, displaying a ransom note demanding payment in cryptocurrency (such as Bitcoin) to restore access. [27] 5) Internet Censorship & Communication Rights As discussed in our previous lesson, the internet remains an enduring paradox: it is both an infrastructure of free expression and a technology of control. On one level, it has democratized access to speech and empowered individuals to publish, organize, and collaborate across geographic and political boundaries. Yet the same architecture that enables open exchange also provides governments and corporations with unparalleled capacities for surveillance, behavioral manipulation, and information restriction. In this way, the internet operates simultaneously as a public sphere and a system of governance—a space where freedom and regulation constantly collide. Forms of Internet Censorship: Content Blocking: when Internet Service Providers (ISPs) or regulatory agencies restrict access to certain websites, social media platforms, or news outlets—often justified in the name of national security or “public morality.” [28] Surveillance & Data Harvesting: allow both states and private firms to monitor user activity, constructing detailed behavioral profiles that can be used to shape, predict, remove, or "shadow ban" speech.[29] Algorithmic Filtering: Platforms algorithmically curate or suppress visibility of particular content, can be driven by the economic logic of engagement or government pressure.[30] Legal/Administrative Pressure: Arrests, fines, or online takedown orders targeting journalists, activists, users, ISPs, sites and payment processors. 5.1 Communication Rights In response to these pressures, scholars and civil society groups have advanced the framework of communication rights, extending the logic of free speech into the digital age. These rights include: The right to information - freedom to seek, receive, and impart information through any media (UN Declaration of Human Rights, Art. 19). The right to equitable digital access - free from discriminatory throttling or commercial gatekeeping. Freedom from surveillance - protection from arbitrary surveillance and content restriction. Data privacy - protection of personal data from being collected and used without user’s authorization. Together, these principles reflect the spirit of Article 19 of the Universal Declaration of Human Rights (1948), which recognizes that the ability to communicate “through any media and regardless of frontiers” is essential to both human dignity and democratic governance. Together, these principles reflect the spirit of Article 19 of the Universal Declaration of Human Rights (1948), which recognizes that the ability to communicate “through any media and regardless of frontiers” is essential to both human dignity and democratic governance. [31] The persistent balancing problem for communication rights lies in reconciling legitimate security concerns with the preservation of user rights protections. Measures enacted under the guise of protecting citizens (e.g. to combat terrorism, misinformation, or cybercrime) can easily evolve into permanent instruments of control. Once extraordinary powers are normalized, they seldom retreat. Thus, maintaining an open and pluralistic internet requires institutional transparency, public oversight, and digital literacy to ensure that digital protections do not quietly become digital censorship. [32] 5.1 VPNs: Benefits and Constraints A Virtual Private Network (VPN) is a tool that encrypts a user’s internet traffic and routes it through a remote server, effectively masking the user’s IP address and geographic location. In doing so, VPNs provide a degree of privacy and autonomy in digital communication, which can be vital for journalists, activists, or citizens in countries with heavy online surveillance. From a free speech perspective, VPNs extend the practical reach of expression by allowing individuals to bypass censorship, access restricted information, and protect their anonymity while engaging in political or social discourse. However, while VPNs are often marketed as instruments of digital freedom, they also introduce new ethical, legal, and trust-based dilemmas. Why users adopt VPNs Mask IP location to reduce tracking and profiling by advertisers, governments, or hostile actors. Limit ISP and search engine data collection, preventing providers from logging browsing histories. Bypass censorship and geo-restricted content, such as blocked news sites or streaming services. Mitigate dynamic pricing based on a user’s location, device, or browsing history. Secure, nonprofit options Most commercial VPNs operate under opaque ownership structures, and many “free” VPNs monetize user data through surveillance advertising or analytics resale. By contrast, a small number of nonprofit projects are designed explicitly to serve privacy and anti-censorship goals: Riseup VPN — One of the few legitimate free and open VPN services, supported entirely by charitable donations from privacy and anti-censorship advocates. https://riseup.net/en/vpn ProtonVPN — Founded by scientists at CERN and initially financed through a community crowdfunding campaign; now operated by the Swiss-based nonprofit Proton Foundation. https://github.com/ProtonVPN Constraints and Ethical Implications A VPN doesn’t make you completely immune to all tracking: Websites can still identify users via cookies, browser fingerprinting, or account logins. A VPN hides user data from the ISP, but the VPN provider can see user traffic. Cybercriminals, (e.g., ransomware authors) also use VPNs to conceal their identities In some countries (e.g., Belarus, Egypt, Iran, Pakistan, PRC, Russia, Turkey, Turkmenistan, UAE), using a VPN is restricted or banned. 5.2 The Tor Network and the “Dark Web” Tor Browser is available in two versions for Android—standard and alpha. Non-technical users are advised to install the standard release, which is more stable and less prone to errors. The official Tor Browser for Android can be safely downloaded from the Google Play Store, F-Droid, or the Tor Project’s official website; obtaining it from any other source poses significant security risks.Source: Tor Project. Mobile Tor Manual. Last modified 2024. https://iacobus.pages.torproject.net/manual/ca/mobile-tor/ Whereas a VPN relies on a single provider to encrypt and reroute traffic, Tor (also known as the Onion Router) -- an open source, open access project -- distributes this process across a decentralized network of volunteer-run servers, or “relays.” As data travels through multiple nodes, each layer of encryption is peeled away like an onion, ensuring that no single relay knows both who the user is and what content they are accessing. This structure minimizes centralized control and makes it exceptionally difficult for surveillance systems to trace communication back to its origin. [33] Tor serves as both a technical safeguard for privacy and a philosophical statement about informational freedom. For users in heavily censored environments, Tor can mean the difference between silence and participation. Yet Tor’s very strength—its multilayered anonymity—also fuels public suspicion. The same system that protects dissidents and reporters can be used by criminals to conduct illicit trade, distribute malware, or traffic in stolen data. Advantages of using Tor Circumvent Censorship: Enables users in restrictive regimes to access blocked sites and communication tools. Protect Privacy: conceals both user identity & browsing activity from ISPs, governments, and advertisers. Digital Democracy: Tor Project is open-source and community-run. Journalists, activists, and whistleblowers use it to safely share information without fear of retaliation. Constraints & Ethical Concerns Tor can be slow due to multiple encryption layers and limited volunteer bandwidth. While Tor safeguards legitimate users, it is also exploited for cybercrimes such as illegal marketplaces Just like the VPNs, access to Tor is also heavily restricted in many countries. References Cohen-Almagor, Raphael. The scope of tolerance: Studies on the costs of free expression and freedom of the press. Routledge, 2005. Brownstein, Alan E. "Harmonizing the Heavenly and Earthly Spheres: The Fragmentation and Synthesis of Religion, Equality, and Speech in the Constitution." Ohio St. LJ 51 (1990): 89. Balkin, Jack M. "Digital speech and democratic culture: A theory of freedom of expression for the information society." In Law and Society approaches to cyberspace, pp. 325-382. Routledge, 2017. United Nations. General Assembly. Universal declaration of human rights. Vol. 3381. Department of State, United States of America, 1949. McLeod, Sharynne. "Communication rights: Fundamental human rights for all." International journal of speech-language pathology 20, no. 1 (2018): 3-11. Mallén, Ignacio Bel. "Freedom as the Essential Basis for Communication Rights." The Handbook of Communication Rights, Law, and Ethics: Seeking Universality, Equality, Freedom and Dignity (2021): 7-19. Bradburn, Douglas. "A clamor in the public mind: Opposition to the Alien and Sedition Acts." The William and Mary Quarterly 65, no. 3 (2008): 565-600. Levy, Leonard W. "Liberty and the First Amendment: 1790-1800." The American Historical Review 68, no. 1 (1962): 22-37. Jeffries Jr, John Calvin. "Rethinking Prior Restraint." Yale LJ 92 (1982): 409. Meyerson, Michael I. "Rewriting Near v. Minnesota: Creating a Complete Definition of Prior Restraint." Mercer L. Rev. 52 (2000): 1087. Godofsky, Stanley, and Howard M. Rogatnick. "Prior Restraints: The Pentagon Papers Case Revisited." Cumb. L. Rev. 18 (1987): 527. Dumain, Ian M. "No secret, no defense: United States v. progressive." Cardozo L. Rev. 26 (2004): 1323. Lieffring, Staci. "First Amendment and the right to lie: Regulating knowingly false campaign speech after United States v. Alvarez." Minn. L. Rev. 97 (2012): 1047. Farber, Daniel A. "Civilizing public discourse: An essay on Professor Bickel, Justice Harlan, and the enduring significance of Cohen v. California." Duke LJ (1980): 283. Dienes, C. Thomas, and Lee Levine. "Implied Libel, Defamatory Meaning, and State of Mind: The Promise of New York Times Co. v. Sullivan." Iowa L. Rev. 78 (1992): 237. This protection was firmly established in Hustler Magazine v. Falwell (1988), where the Supreme Court held that even offensive parodies of public figures are constitutionally protected so long as they cannot reasonably be interpreted as factual claims. Wright, R. George. "Fighting Words Today." Pepp. L. Rev. 49 (2022): 805. Miller v. California, 413 U.S. 15 (1973). Miller v. California, 413 U.S. 15, 15 (1973). Ibid., at 27. Ibid., at 15, 23. Karniel, Yuval, and Haim Wismonsky. "Pornography, Community and the Internet-Freedom of Speech and Obscenity on the Internet." Rutgers Computer & Tech. LJ 30 (2004): 105. Marsden, Christine. "Age-verification laws in the era of digital privacy." Nat'l Sec. LJ 10 (2023): 210. Murray, Alana, Huma Chhipa, and Johnathan Yerby. "Cyber risk, privacy, and the legal complexities of age verification for adult content platforms." Issues in Information Systems 26, no. 4 (2025): 332-347. Bowrey, Kathy, and Michael Handler, eds. Law and Creativity in the Age of the Entertainment Franchise. No. 27. Cambridge University Press, 2014. Holt, Thomas, and Adam Bossler. Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge, 2015. Fayi, Sharifah Yaqoub A. "What Petya/NotPetya ransomware is and what its remidiations are." In Information technology-new generations: 15th international conference on information technology, pp. 93-100. Cham: Springer International Publishing, 2018. Ververis, Vasilis, Sophia Marguel, and Benjamin Fabian. "Cross‐Country comparison of Internet censorship: A literature review." Policy & Internet 12, no. 4 (2020): 450-473. Wang, Keren. "Legal and Ritological Dynamics of Personalized “Pillars of Shame” in Chinese Social Credit System Construction." China review 24, no. 3 (2024): 179-206. https://www.jstor.org/stable/48788933 Cobbe, Jennifer. "Algorithmic censorship by social platforms: Power and resistance." Philosophy & Technology 34, no. 4 (2021): 739-766. McLeod, Sharynne. "Communication rights: Fundamental human rights for all." International journal of speech-language pathology 20, no. 1 (2018): 3-11. Bennett, W. Lance, and Barbara Pfetsch. "Rethinking political communication in a time of disrupted public spheres." Journal of communication 68, no. 2 (2018): 243-253. AlSabah, Mashael, and Ian Goldberg. "Performance and security improvements for tor: A survey." ACM Computing Surveys (CSUR) 49, no. 2 (2016): 1-36.
On December 4, 2024, news broke that a lone gunman had assassinated UnitedHealthcare’s chief executive officer, Brian Thompson, outside the company’s headquarters.1 The killing itself was shocking, but what unsettled many observers was the wave of sympathy that quickly coalesced around the perpetrator—donations, online tributes, and statements of support that revealed a raw seam in America’s collective experience of health care.2 This dramatic act of killing is entangled with the dark trajectory in the devolution of the marketized healthcare industry in the United States: normalizing traumatic acts of takings, with increasingly unsustainable industry practices justifying the suspension of pre-existing taboos concerning the sanctity of life and the boundaries of wealth transfer.3 ...
Lesson Module by Keren Wang, updated 4 Nov 2025. This lesson module examines the contested and ambivalent relationship between media and violence from historical and transnational perspectives. 1. Violence as Ritual & Power: Historical and Global Perspectives Let's open this session with a reference from Greek mythology: consider the telltale of Prometheus, whose theft of fire from the Olympian gods for humanity’s benefit inadvertently brought both civilization and destruction. Like Prometheus’s fire, the development of media technology simultaneously brings enlightenment and cataclysm. 1.1 Rhetorical Artifacts and Human Sacrifice The history of the development of writing technology overlaps with the history of war propaganda and human sacrifice.[1] As early as the Narmer Palette, one of the earliest hieroglyphic artifacts ever found from circa 3200 BCE depicting scenes of conquest and violence: Similarly, during the height of the Chinese Bronze Age, also known as the Shang dynasty (c. 1250–1046 BC) produced ritual bronze artifacts at monumental proportions -- such as the 833 kg (1,836 lbs) Houmuwu Ding -- one of the heaviest bronze vessel from the ancient world -- and the 13-foot (3.96 m) tall Sanxingdui bronze tree (c. 1200 BC): ...
I’m excited to share that I was recently featured on Free City Radio in an in-depth conversation about my research on the concept of human sacrifice in capitalism. The interview, now available on SoundCloud, is part of an interview series that examines the foundational realities of modern-day capitalism, specifically shaped by the notion of human sacrifice as a necessary element of economic systems. Here’s a link to the interview: Author Keren Wang on Human Sacrifice as Inherent to Capitalism Today. During this conversation, I explore how this framework, traditionally viewed through ancient rituals, continues in modern contexts through the exploitation of labor, environmental destruction, and systemic injustices. ...
I am delighted to announce the publication of my latest article, “Legal and Ritualological Dynamics of Personalized ‘Pillars of Shame’ in Chinese Social Credit System Construction," featured in the latest issue of The China Review (Vol. 24, No. 3). This work explores the intersection of the Chinese Social Credit System (SCS) with the Confucian ritual legal tradition and the rhetoric of public shaming. It integrates insights from rhetorical studies and philosophy of law to examine how the SCS operates as both a governance-by-data experiment and a framework that aligns with—and diverges from—domestic and transnational constitutional norms. ...
I would like to start by extending my heartfelt gratitude to Angelica Paquette, Editor-in-Chief of the Emory International Law Review, and Grayson Walker for their outstanding organization of this special symposium on Disputed Territories across the Globe: A Future of Peace or Change, and particularly this panel on China-Taiwan relations. A special thank you to Hallie Ludsin from Emory’s Center for International and Comparative Law for her valuable insights as our panel respondent today. I’m also grateful to see Professor Larry Catá Backer among us and would like to acknowledge Professor Martha Albertson Fineman for her invaluable guidance on my comparative and critical-legal research. My work is further supported by the American Council of Learned Societies Emerging Voices Fellowship, for which I am profoundly thankful. ...
Dasein, ChatGPT, and the Ritology of AI: Special lecture at East China University of Political Science and Law, June 18, 2023 What philosophical mischief might we unleash if Plato’s Cave or Zhuangzi's Well suddenly became inundated by algorithms, with the sound and fury of GeForce RTX™ GPU fans, insisting they’ve seen the light? Extended Abstract: This WIP paper builds off a guest lecture I have presented at the East China University of Political Science and Law (ECUPSL) in Shanghai, June 18, 2023. In this lecture, I had the privilege of sharing some of the preliminary research questions for my ongoing transdisciplinary survey, focusing on the intricate interplay between artificial intelligence and phenomenology. I will be highlighting the potentially profound implications of AI and its existential entanglements, particularly revolving around the context of Heidegger’s concept of Dasein, and problematize some common ethical and ontological issues connected to being-AI-in-our-world. The relentless acceleration of innovation in large language models (LLMs) and artificial neural networks (ANNs), embodied by transformative technologies like ChatGPT, deepfakes, and AI-generated art, has ignited a dual fire of awe and trepidation among technologists, ethicists, policymakers, and the broader public. As a vast body of literature explores the societal, ethical, and epistemological ripples of this ongoing technological upheaval—particularly within the fields of Information, Science, and Technology (IST)—this project seeks to offer a novel contribution by bringing into focus the lens of phenomenology: an intricate branch of philosophical inquiry renowned for its profound and methodical examination of the fundamental structures of human consciousness. By advocating for a phenomenological perspective, the project aims to illuminate how AI’s disruptions reshape not only our daily lives but also our understanding of what it means to be. In doing so, it offers critical insights into the interplay between human and supra-human consciousness, reframing our relationship with emerging technologies and their implications for the future of sentient existence. ...
Demystifying The Chinese Social Credit System - Presentation for the Symposium on China’s Data Governance and its Impact on US-China Relations, hosted by the Carter Center China Focus Introduction: There is nothing new about public authorities using collected numerical info as a governing technology. Census has been a central governance tool throughout Ancient Rome and Imperial China. In fact, the need for keeping taxation records was a key historical exigence driving the invention of many earliest writing systems. Throughout human history, public authorities have relied on collected numerical data as a tool for governance. This was evident with the census in Ancient Rome and Imperial China, where early writing systems were developed primarily for taxation records. The digitization of data and advancements in data science have revolutionized governance-by-data, making it continuously updated and more encompassing. The Chinese Social Credit System (SCS) is a testament to this evolution. Despite its significance, the SCS remains misunderstood, especially outside the Global North. Today, I aim to provide clarity on this topic, considering its implications on human rights and rule of law both within and beyond China, and shedding light on US-China relations. This talk will bring together relevant historical, rhetorical, socio-cultural and legal contexts to unpack the emergent structures of the Chinese social credit system and data governance experiments. By catalyzing greater open dialogue and critical inquiry on this thorny topic, this lecture seeks to advance the vision of The Carter Center and contribute to a deeper understanding of the past, present, and future of US-China relations. ...
We are pleased to announce an upcoming hybrid symposium titled “China’s Data Governance and Its Impact on U.S.-China Relations” organized by The Carter Center, Emory University, China Research Center, Georgia State University, and Spellman College. Event Details: Date: September 26, 2023 Time: 1:30 pm to 4:00 pm Location (in-person): Cyprus Room, The Carter Center , 453 John Lewis Freedom Parkway NE | Atlanta, GA 30307 Virtual Attendance Registration: Register Here Event Description: The relationship between the United States and China is currently facing significant challenges, particularly in the areas of technology and national security. Unfortunately, many misconceptions surround the development of the Chinese data governance system, often exacerbated by sensationalized discussions in the public discourse on US-China relations. This symposium aims to dispel these myths and provide a nuanced understanding of Chinese data governance and its implications for US-China relations. It seeks to foster open and critical dialogue among scholars, policymakers, and practitioners, offering an in-depth update on the topic. Speakers: Obse Ababiya, Associate Director, Office of Global Strategy and Initiatives at Emory University Larry Catá Backer, Professor of Law and International Affairs, Penn State Law School Jamie Horsley, Senior Fellow, Paul Tsai China Center at Yale Law School | John L. Thornton China Center at Brookings Institution Aynne Kokas, C.K. Yen Professor at the Miller Center and Associate Professor of Media Studies, University of Virginia Maria Repnikova, Associate Professor in Global Communication, Georgia State University Keren Wang, ACLS Emerging Voices Fellow, Emory University Department of Russian and East Asian Languages and Cultures The symposium is being convened by Dr. Yawei Liu, Senior Advisor on China at The Carter Center and Dr. Keren Wang of Emory University Department of Russian and East Asian Languages and Cultures Agenda: 1:30 pm: Ms. Obse Ababiya opens the meeting, introducing the organizers and sponsors 1:35 pm: Opening remarks by Dr. Maria Repnikova ...
I am excited to share an upcoming event on September 7, 2023: The Carter Center China Focus will be hosting Dr. Brantly Womack for its Chinese Politics & Society Book Talk Series: of the Chinese Politics & Society book talk series, in collaboration with the China Research Center, East Asia Collective, and the Department of Russia and East Asian Languages and Cultures at Emory University. This session will feature a talk by Dr. Brantly Womack, Professor Emeritus of Foreign Affairs at the University of Virginia, on his new book “Recentering Pacific Asia: Regional China and World Order” (Cambridge University Press, 2023). ...
I am excited to share with you a recap of my recent presentation titled “Vulnerability Theory and Digital Intimacy: ‘Pillars of Shame’ in the Age of Big Data.” This thought-provoking session took place at the Vulnerability Theory and Digital Intimacy Workshop, hosted by convened by Professor Martha Albertson Fineman and The Vulnerability and the Human Condition Initiative at Emory University School of Law on March 24, 2023. During the presentation, I delved into the fascinating field of digital governance technologies and their role as modern public shaming rituals. I explored the impact of these technologies on individuals’ vulnerability in the digital age and drew connections to Martha Fineman’s vulnerability theory of law. ...