Engineering Collectives: Technology From the Coop
Engineers make the world, but not just as they please. Chris Csikszentmihályi recounts how engineers come to be part of one collective or another.
Alan Lomax and the Temple of Movement
Alan Lomax wanted to catalogue all human movement. Whitney Laemmli explores the high modern utopianism of the Choreometrics project.
I am Not a Hacker
The term "hacker" is notoriously slippery. Paula Bialski dives into the practices and micropolitics of self-proclaimed non-hackers.
Elements of Food Infrastructure
As food has industrialized, it has changed, along with our bodies and our economies. Matthew Hockenberry charts conceptual connections in this issue with a timeline.
Public Laboratories: Designing and Developing tools for Do-It-Yourself Detection of Hazards
Signals of environmental hazard cannot be heard unless there is a device to detect them. Sara Wylie, Megan McLaughlin and Josh McIlvain show you how to make one yourself.
Megan McLaughlin
Josh McIlvain
Sara Wylie
The Morris Worm
The Morris worm was released in November of 1988. It was launched surreptitiously from an MIT computer by graduate student Robert Tappan Morris at Cornell University, and spread to internet-connected computers running the BSD variant of UNIX. The worm was designed to be undetectable, but a design flaw led it to create far more copies ...
Customer Care
Robert Foster explores how mobile phones in Papua New Guinea offer new ways for both companies and consumers to give and receive care.
Interview: Mustafa Al-Bassam
Limn talks with security expert Mustafa Al-Bassam (a.k.a “tflow”) about the responsibility for information security, the incentive problems it creates and the available solutions.
Mustafa Al-Bassam
E. Gabriella Coleman
Christopher M. Kelty
Car Wars
A self-driving car is a computer you put your body in. Fiction by Cory Doctorow.
Shipping corridors through the Inuit homeland
Claudio Aporta, Stephanie C. Kane, and Aldo Chircop explore the conceptual and lived tensions around ice in Arctic straits. They show how one group’s obstacle can be another group’s means of connection.
Claudio Aporta
Stephanie C. Kane
Aldo Chircop
Utopian Hacks
Not all engineers create equally. Götz Bachmann takes us inside the labs of "radical engineers" and the starkly different futures they imagine for us.
On Reusable Pasts and Worn-out Futures
Sara Tocchetti explores the reusable pasts of hacking and the worn-out productions of biohackers.
The Extortion Stack
Finn Brunton explores the dream of the perfect leak, and what a science fiction story can tell us about the state of truth today.
The Bombing Encyclopedia of the World
How do you plan for the sudden onset of total war? Stephen J. Collier and Andrew Lakoff describe the construction of a vast collection of data about the vital, vulnerable systems of every nation in the world in the aftermath of World War II.
Stephen J. Collier
Andrew Lakoff
The Genomic Open
Leaders of the Human Genome Project promised a genomic total archive. Jenny Reardon argues that their quest inspired visions of freedom and imprisonment vital to understanding today’s ambivalences around open genomic data.
“World-World” Logistics in Tangier, Morocco
Janell Rothenberg explores a transshipment port complex along the Strait of Gibraltar. While transshipped cargo is never supposed to enter Morocco beyond the port, its movement ultimately depends on local mediation.
The Humble Cookstove
Meena Khandelwal and Kayley Lain reflect on half a century of failed efforts to change how people cook in rural India, before adding a little device of their own to the fire.
Meena Khandelwal
Kayley Lain
Preface: Hacks, Leaks, and Breaches
Gabriella Coleman and Christopher Kelty guide readers through Limn Number 8 on Hacks, Leaks, and Breaches.
Christopher M. Kelty
E. Gabriella Coleman
What Is to Be Hacked?
Security is no longer a privilege of the few, or a commodity in the hands of those few who can afford it. Claudio (“nex”) Guarnieri explains why civil society isn’t going to secure itself, and why it needs help from hackers.
Claudio (“nex”) Guarnieri
Interview: Lorenzo Franceschi-Bicchierai
Journalist Lorenzo Franceschi-Bicchierai talks with Limn about the details of the DNC hacks, making sense of leaks, and being a journalist working on hackers today.
E. Gabriella Coleman
Lorenzo Franceschi-Bicchierai
Interview: Kim Zetter
Cybersecurity journalist Kim Zetter talks with Limn about infrastructure hacking, the DNC hacks, the work of reporting on hackers and much more.
Christopher M. Kelty
Kim Zetter
The Public Interest Hack
How are hacking and leaking related? Gabriella Coleman introduces us to the “public interest hack” and explains how it emerged.
The Illicit Aura of Information
Does the unfiltered, illicit status of a leak change the nature of information? Molly Sauter offers a consideration of the half-life of stolen data.
When GhostSec Goes Hunting
GhostSec engaged in vigilante counter-terrorism against ISIS. Robert Tynes explores whether this makes them part of the state, part of civil society, or part of empire.
The Paradoxical Authority of the Certified Ethical Hacker
Can hackers be certified? Rebecca Slayton looks at efforts to blend, certify and market the subversive skills of hacking with the ethos of professionalism.
Expertise in the Grid
Do you know how to read your electricity bill? Canay Özden-Schilling examines how new electricity experts—and new publics—are creating and contesting the price of U.S. household energy today.
Duplicate, Leak, Deity
Lawrence Cohen de-duplicates the complex story of India’s Biometric Archive(s).
The Weakness of Crowds
Why can’t crowds defend themselves? Alek Felstiner explores how the power of crowds to decide is also a weakness when it comes to organizing.
Romans or Barbarians? Political Campaigns and Social Media in Colombia
Elections are still about shaking hands and kissing babies, for the time being. Maria Vidart explores the first experience with social media campaigning in Colombia.
If You Give a Gorilla a Wallet…
Does nature need its own gig economy?
Courtney Handman
Sarah Muir
Cross-Cultural Partnership: TEMPLATE and HOWTO
[From The Cross Cultural Partnership website. Discussed by James Leach in his presentation.–ed] DRAFT version 0.3, September 2007 Preamble The cross-cultural partnership template is designed to help potential collaborators to reach understanding and agreement on the terms of their collaboration. In many contexts people look to the law to establish or enforce a ‘safe space’ ...
Deprecating Death
Can the war on life be rendered obsolete?
Right To Repair
An interview with R2R advocate Kyle Wiens
Townsend Middleton
Gökçe Günel
Ashley Carse
The Art of In/Detectability
Traffic impedes. But does it also enable? Townsend Middleton traces the cat-and-mouse interplays of trafficking and regulation in one of South Asia’s most notorious chokepoints: India’s Chicken Neck.
Solar Basics
Jamie Cross explores how a solar-powered lamp became the go-to solution to Puerto Rico’s energy crisis.
Demo for Democracy
Suppose you wanted to test the reality of democracy. Tired of claims and counter-claims, of endless debates about ideals and aspirations, and deeply unconvinced by the arguments of political philosophers, you would like to produce some real, hard facts; to verify, once and for all, that democracy really exists – that it can be successfully ...
The Participatory Development Toolkit
Christopher Kelty opens up a toolkit from the 1990s to explore the prehistory of apps, platforms, and algorithms.
Iterate, Experiment, Prototype
Anke Schwittay and Paul Braund explore the curious intersection between international aid and design.
Anke Schwittay
Paul Braund
Who’s hacking whom?
What can you do with a Tor exploit? Renée Ridgway discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.
The Political Meaning of Hacktivism
Philosopher-kings or Fawkes masks? Ashley Gorham explores the truth-telling zeal of WikiLeaks and the lulzy opinions of Anonymous.
Can You Secure an Iron Cage?
Are bureaucracies defensible? Nils Gilman, Jesse Goldhammer, and Steven Weber explore the Office of Personnel Management hack, and what it tells us about the inherent vulnerabilities of bureaucratic organizations in a digital age.
Nils Gilman
Jesse Goldhammer
Steven Weber
Crafting a Digital Public
What makes a city smart? Alan Wiig examines a project to promote urban development through information infrastructure in Philadelphia.
Drought as Infrastructural Event
Ashley Carse explores water distribution and its publics on the Isthmus of Panama
Nuclear States, Renewable Democracies?
Andreas Folkers recalls how nuclear energy created a powerful counter-public in Germany beginning in the 1970s, and assesses the contemporary politics of energy alternatives.
In the Name of Humanity
The total archive is already here, Balázs Bodó finds it hidden in the shadows and run by pirates.
The Origins of Happiness
Boris Jardine tells the story of a little ladder intended to tell us what everyone wants. Where on the ladder are you?
Microworking the Crowd
How do you turn millions of people into a CPU? Lilly Irani unravels the mysteries of human-as-computation in Amazon Mechanical Turk.
Preface: Ghostwriters
There are machines and there are their ghosts
Stacy E. Wood
Jerry C. Zee
Ghosts of Digital Extraction
Anti-blackness and the plantation in American tech
Identification Error
Digital misrecognition and the making of the "Asian face"
Dangerous Voices, Ghostly Alliances
The dead in Okinawa help us imagine a politics of the weird.
Orit’s Two Bodies
Limn’s AI gets ahead (and torso) of itself
There Might Be Giants
Very tall gateways into
alternate realities
The Art of Enclosure
What does it take to air-condition an open-air event?
Jiat-Hwee Chang
Sharad Pandian
Is Limn Obsolete?
The founding editors reflect on the journal’s
origins
Christopher M. Kelty
Andrew Lakoff
Stephen J. Collier
A Mix for the Ages
As media forms come and go, why do cassette tapes live on?
When Crisis Calls
How the COVID-19 pandemic resuscitated old satellite technology in Thailand
Art Beyond Waste
An artist reimagines objects discarded in Accra’s vulcanizer shops
Beam Ends
How whaling history lives on in Nantucket’s energy politics
Chokepoint Sovereignty
Jatin Dua reveals why Djibouti’s history, geography, and precarious present make it a site where national sovereignty and chokepoint dynamics are intimately tied.
Golden Futures
Orit Halpern visits the blasted grounds of a Canadian gold-mine to understand how mines work as convergence points of speculation, engineering, information, and futures and derivatives trading.
Remittance Channels & Regulatory Chokepoints
Since 2008, new financial regulations have reformatted the channels of global remittances. Ivan Small examines how the Vietnamese diaspora is navigating this landscape of regulatory chokepoints.
Blockade: The Power of Interruption
Carwil Bjork-James explores the politics of blockades in Bolivia, a country where terrain, a scarcity of connecting roads, and a tradition of mass protest make it a land of chokepoints.
Prototypes in Design: Materializing Futures
Alex Wilkie The two excerpts that follow are drawn from my Ph.D. research User Assemblages in Design: An Ethnographic Study. The thesis is an examination of the role of multiple users in user-centered design (UCD) processes and is based on a six-month ethnographic field study of designers employed to apply the principles and practices of ...
The Long History of Prototypes
Michael Guggenheim The conference organisers Alberto Corsín Jiménez and Adolfo Estalella state at the beginning of their invitation: “prototypes have acquired certain prominence and visibility in recent times”. What I want to focus on is what the words “visibility” and “recent times” may mean in the above sentence. The problem here is that the conference ...
On Band-Aids and Magic Bullets
Peter Redfield probes the merits of small solutions to big problems.
“Water is life, but sanitation is dignity”
Tatiana Thieme explores how doing your business has become an opportunity for business in Nairobi.
A Slightly Better Shelter?
Tom Scott-Smith gets inside an award-winning shelter designed for refugees and asks: what makes it any better than a tent?
Of Promises and Prototypes: the archaeology of the future
“It’s just we wanted, we needed something for the deployment which would kind of work in a general way. […] So there were problems with it, it’s not a kind of definitive answer, but it certainly found its uses.” Drawing on the analogy of a box filled with mementos, stored under the bed, or in ...
Hacker Madness
Defense lawyer Tor Ekeland gives us an up-close, first-person view of a widespread pathology: how misplaced fear and hysteria is driving an over-reaction to the positive work that hackers can do.
Hacking/Journalism
Philip Di Salvo explores the trading zone between journalism and hacking.
Europe’s Materialism: Infrastructures and Political Space
Sven Opitz and Ute Tellmann explore energy infrastructure and the construction of a European commons.
Between the Nation and the State
Is your mobile phone company seeing like a state? Emma Park and Kevin P. Donovan explore telecommunications and contemporary nationalism in Kenya.
Emma Park
Kevin P. Donovan
An “Expensive Toy”
What does Abu Dhabi's green future look like? Gökçe Günel explores Masdar City in a once-promising Personal Rapid Transit Pod.
Hydraulic Publics
Nikhil Anand explores why reforms to the Mumbai water system failed.
The Zone of Entrainment
We know that environmental concerns have been used to block infrastructure projects. But can infrastructure be used to side-step environmental concerns? Andrew Lakoff on water provision and species protection in California.
Aeolian Infrastructures, Aeolian Publics
Cymene Howe and Dominic Boyer examine the politics of wind and power – in all their turbulence – in Oaxaca, Mexico
Blood, Paper, and Total Human Genetic Diversity
Jenny Bangham explains how the attempt to create a supply of all possible types of human blood gave rise to genetic diversity research in the 20th century.
Exhibit: The Entropy Archives
What does a perfectly random archive look like? Finn Brunton explains.
Ebola, Running Ahead
What does experimentation look like in the time of emergency? Ann H. Kelly explores the design of clinical trials amidst the ebola crisis.
Outbreak of Unknown Origin in the Tripoint Zone
Guillaume Lachenal traces the urgent past of the current ebola outbreak, offering some surprising lessons about borders.
The Disease that Emerged
Lyle Fearnley explores how global preparedness for emerging diseases left some places unprepared.
Labels for Life
The labels on our food exist in a complex political struggle over consumers’ attention. Xaq Frohlich walks us through the information infrastructure of the label and its impact on our “choices.”
Iconoclasm in the Supermarket
What happens when activists re-label your food? Javier Lezaun explores the "Label It Yourself" movement and its ambivalent power.
Refrigerator Units, Normal Goods
Emily Yates-Doerr tells two stories that reveal the challenge of grasping global inequality.
The Secret Lives of Corporate Food
Big companies are not just tracing their products’ life stories, but telling them too. Susanne Freidberg explores why.
The Silence of the Labs
Is sugar a choice? Kim Hendrickx explores how a Sugar Museum in Belgium puts life and health into perspective.
The Oil Palm Kernel and the Tinned Can
Do you see the peculiar industrial legacy of West Africa's oil palm tree in a humble tin can? Makalé Faber-Cullen does.
Scaling Up/Scaling Down
Sophie Dubuisson-Quellier shows how French markets and social movements interact in food provisioning
Sophie Dubuisson-Quellier
Trojan Cans
How did the self-service economy emerge? Franck Cochoy displays the ‘pico-infrastructure’ behind modern consumption.
Fingerprint, Bellwether, Model Event: Anticipating Climate Change Futures
Climate change is now happening faster than our models and stories can comprehend. Jerome Whitington explores three figures of warning that help make sense of it.
From Sensors to Sentinel: Pressure and depression in crime statistics
While policemen watch out for public security, psychologists watch out for the mental health of policemen. Emmanuel Didier looks at these two different uses of statistical data.
Recording and Monitoring: Between Two Forms of Surveillance
Vanessa Manceron argues that when naturalists take part in monitoring programs on their “local patch,” they are caught between two forms surveillance: care and control.
Snaring Vectors
Volunteers sit all night in a Human Landing Catch in Dar es Salaam, providing blood meals to needy local mosquitoes. Ann H. Kelly explores the role of volunteers' bodies in measuring the size and nature of insect-borne public health threats.
Figures of Warning
What are sentinels? Frédéric Keck and Andrew Lakoff explore various figures of prophecy, herald and prognostication through the ages.
Frédéric Keck
Andrew Lakoff
Preface
Illuminating Obsolescence
Townsend Middleton
Gökçe Günel
Ashley Carse
Mapping the Social World: From Aggregates to Individuals
Can data be liberal or conservative? Alain Desrosières excavates the curious story of ‘correspondence analysis’ and its rise to fame.
Preface: Crowds and Clouds
This issue of Limn focuses on new social media, data mining and surveillance, crowdsourcing, cloud computing, big data, and Internet revolutions.
Am I Anonymous?
Learning how Anonymous works means learning to be one. Gabriella Coleman narrates her experience of being in between worlds.
Algorithmic Recommendations and Synaptic Functions
Personalized recommendation is the new marketing. Nick Seaver explains how ‘collaborative filtering’ de- fines people through their purchases.
The Touch-point Collective: Crowd Contouring on the Casino Floor
Women under thirty and retired men might have surprisingly similar tastes for gambling. Natasha Dow Schüll explains how casinos have created a new kind of crowd.
Everywhere and Nowhere: Focus Groups as All-Purpose Devices
Can a focus group be all of us? Rebecca Lemov explores how the box of donuts and the one-way mirror have become essential features of our self-understanding.
The Emergence of Systemic Financial Risk: From Structural Adjustment (Back) To Vulnerability Reduction
How did "systemic risk" emerge from the Latin American Debt Crisis? Onur Ozgöde explains