Friday, April 13, 2012

Beyond Freudian Identification

In my last post I attempted to work through a concept of the rhetorical wrangle as the oscillation inherent in Burkean identification. For Burke, only when identification is seen as being both unification and division can it also be seen as the foundation of rhetoric. Complicating matters, Diane Davis’s work in Inessential Solidarity points to a cover-up in Burke’s definition. Placing Burke’s identification in comparison with Freud’s, Davis discovers that what is left out of Burke is any notion of a non-symbolic identification even though Burke calls for his subject to be divided (between self and other) before existing in any social relations.

On the other hand, for Freud, as Davis reads him through Borch-Jacobsen, there is a suggestiveness that cannot be accounted for when a subject is hypnotized. Suggestion, here, is best understood as an indirect persuasion. As Davis puts it, “Unlike political persuasion, suggestion is an improper rhetoric, a bastard form that induces action (or attitude) without properly persuading, a directly suasive ‘discourse’ that defies the presumed distance between self and other, evading cognitive discretion and so all possibility for deliberation” (33). For Freud, suggestion is dangerous, leading him to reject it as a form of analysis. Instead, as Davis informs us, Freud trades in the analyst’s suggestions in favor of the patients “free-associations.” However, Freud finds himself going back to hypnosuggestion to later explain group formation as a form of such suggestion—where members, before identifying as a group, identify with a leader, a father, a fuhrer (31). Suggestion exposes, then, a type of identification that is not produced by and from the self, but instead is issued by an other.

Following Davis just a little bit further, what we find in Freud is that in relation to alterity identification is at a loss. Identification fails to wholly signify the self in response to this other. And, as Davis remarks, “It is not in identification, but its failure, in the withdrawal of identity, that I am exposed to my predicament of exposedness and become capable of demonstrating concern for another finite existent” (35) The originary other that splits the subject from it’s self for Burke, is for Freud “a surplus of alterity that remains indigestible, inassimilable, unabsorbable” creating a negative, a lack that is also a surplus (34). But since, as Davis reminds us, there are no negatives in nature for Burke, what are we to make of this remainder that is not part of the symbolic?

Sadly, this is where we must break from Davis, not out of disagreement but out of necessity. For Davis’s work opens a door that we must now step through. By pointing out a non-symbolic form of identification that revolves around this non-signified other, Davis ends her discussion of Burkean identification by stating that:
[W]hat Burke censored in Freud—consciously or unconsciously—is the possibility that no flex of reason, no amount of proper critique, can secure the interpersonal distance on which Burke had pinned his hopes. According to Freud, an affectability or persuadability operates irrepressibly and below the radar of the critical faculties. (35-6)
It is the goal of the next post to explore the nature of this operation that is “below the radar” of symbolic action. In order to do this, I will have to move beyond Freud and into Lacan.

The Rhetorical Wrangle

The “rhetorical wrangle” is a phrase that only briefly appears in Kenneth Burke’s A Rhetoric of Motives, but as a concept (one that I wish to push to the fullest extent) it represents the ambiguity that Burke saw in what makes persuasion possible – i.e., identification.  On the one hand identification refers to unification, a wholeness or completeness. To be identified is to have definition as someone or something. However, on the other hand, as Burke makes extremely clear, this unification can only take place because “identification is compensatory to division” (21). In this way, identification is a consubstantial process, both joining while keeping separate. Including division as a major aspect of identification, though, allows Burke to create an oscillating binary (identification/division); but not without some ambiguity. For example, perhaps we have all had that friend who never seems to be satisfied with his job. And each time he accepts a new position, he seems to merge who he is with the job he is doing, at times self-identifying as a barista, a waiter, or a telecommunications consultant. However, there is always a point during each of these professions where division creeps in, and that friend starts to complain about feeling exploited as a worker. It is precisely at this point of uneasiness (or the hesitation between belonging and exploitation) that for Burke, “you have the characteristic invitation to rhetoric” (25). And, as if to head our questioning off at the pass, moments later Burke clarifies such an invitation, arguing that even if you believe to be working out of the purest of motives, the ambiguities of identification lead to argument. So that, no matter how “‘pure’ one’s motives may be actually, the impurities of identification lurking about the edges of such situations introduce a typical Rhetorical wrangle of the sort that can never be settled once and for all…” (26). In this way, rhetoric, for Burke, only becomes possible through the push and pull of the wrangle as an effect of identification.

Building on the ambiguities of identification and the rhetorical wrangle, Diane Davis in her book Inessential Solidarity, reminds us that for Burke, identification is settled symbolically:
According to Burke, there is no essential identity; what goes for your individual “substance” is not an essence but the incalculable totality of your complex and contradictory identifications, through which you variously (and vicariously) become able to say “I.” Like the “official” Freudian version on which it’s based, “rhetorical identification” depends on symbolic representation, on the production and intervention of meaningful figures, which Burke says are already persuasive: “whenever there is ‘meaning,’ there is ‘persuasion’” (21)
However, as Davis points out, if the self is constructed through multiple identifications, not only must we be foreign to ourselves – much in the same way our unemployable friend appears to always be playing a new role with a new identity. But, paradoxically, if identification is to only come about through shared meaning, we must also know ourselves “as and through [our] representations” in relation to an other (21). Yet it is the first split that troubles Davis. Before the rhetorical wrangle of identification ever takes place, Burke has set up a prior division (and possible identification) between self and other. For Burke, Davis argues, “the division between self and other is the ‘state of nature’ that is identification’s motivating force: identification’s job is to transcend this natural state of division, and rhetoric’s job is identification” (22). Here, identification (and by default rhetoric, as well) becomes mixed up with desire. As a separate organism, the human for Burke, is individuated. Yet, as a symbol using animal, the human becomes, in Burke’s words, “homo dialecticus.”

Homo dialecticus is a split subject, both self and other, desiring to belong. For Davis, “Essentially enclosed and alienated, [Burke’s] homo dialecticus already desires to transcend this state of nature—‘[b]iologically, it is of the essence of man to desire”—and is ontologically equipped to do so via the inborn powers of his or her imagination” (23). So while Burke maintains individuality among human persons, he immediately places these already desiring individuals into a complex network of identifications and rhetorical wrangle of shared meanings. What Burke implies but avoids ever saying, as Davis sees it, is that “identification can no longer be understood as an identification of one with another, at least not at first, since it would necessarily precede the very distinction between self and other” (26). And this prior identification lends itself to a rhetoricity or “affectability or persuadability that is at work prior to and in excess of any shared meaning” (26). Does this mean, then, that there is a possibility for a nonsybmolic action?

Wednesday, April 11, 2012

Where I am.

So I've officially let this blog live its own life for awhile. Not good. So in the next few weeks I will be developing my ideas over rhetorical identification and OOO. Stay tuned, and sorry for the absence.

Wednesday, December 7, 2011

More on Hacking

I only have a brief amount of time before I have to run off and teach, but it seems that my post on hacking and allusion has received a few responses. Harman responds here. Robert Jackson responds to both my and Harman’s posts here. And finally Tim Richardson responds to all three of us here.
A few concessions are in order before I get into what I want to say. First, Jackson and Richardson are justified in correcting my mis-authorization of hacking. As Jackson points out:
“…when you are dealing with the reality of things including computer protocols and software objects, the dichotomy of meaningful authorisation / non-authorisation breaks down considerably. Just because a certain proprietary program is encapsulated so that general public access is forbidden, it does not entail a universal relational structure that can be attributed to relationships where HIV ‘hacks’ RNA strands.”
Very true. In fact the problem with hacking is that it is often hard to place blame on the hack, the hacker, or the hacked. When I find a way around authorizing my iDevice, so that I can install third-party apps, who’s at fault? Me…well I just exploited a part of the system that was already there. Apple…well, they designed the original software that allowed me to do this. Or the hack itself…but it’s just a program or code. As David J. Gunkel points out in “Hacking Cyberspace,” “Hackers cannot be praised or blamed in the usual manner for what it is they do or do not do. In other words, hackers do not, in any strict sense of the term, cause the disruptions or general systems failures exhibited in and by the activities of hacking. Hacking only fixates on and manipulates an aporia, bug, or back door that is always and already present within and constitutive of the system as such” (803). Because of this lack of clear intentionality (and perhaps meaningful authorization), Richardson rightly points out that my formulation of hacking as “a faculty for observing all of the available means of perturbation” is at best inexact.

And Harman makes a good point when he argues that, “praxis falls short of the things themselves no less than theory does.” In other words, neither praxis nor theory successfully mines the depths of objects. No relation, for Harman, is ever direct. But, if allure, as Harman points out in Guerilla Metaphysics, is always something that “either occurs or does not occur,” then what of potential? Why assume, since the RO-SO (or real object – sensual object) relation is always the same (structure-wise) that it is untenable that we or another object could work by exploiting this knowledge? What I am talking about here is a sort of operation that works on potentiality and contingency. Such an operation isn’t interested in predicating unitary objects or reducing them to their parts or qualities, but is instead focused on uncovering (in an ontological sense, rather than an epistemological one) the unknown, subterranean object. In other words, an operation whose final cause is allusion. If such an operation could exist, then this is what I’m suggesting hacking (and maybe object-oriented rhetoric) might be considered. Wouldn't this also be in agreement with Jackson’s two points about code: 1) that code is already contingent and 2) the output of code can only be experienced and not known?

The only problem I see here, though, is that it does bring up questions about language. For like code, isn’t language just as contingent and unknowable in its outcome? And if so, is something like deconstruction already a type of language-hacking? This is where I think it's important, like Richardson points out, to move beyond thinking of hacking as directly related to code and see it as possible in other material relations: Ikea Hackers and body hackers are just two examples of such non-code hacking.

Thursday, December 1, 2011

Democracy of Objects on Amazon

Levi Bryant's much awaited tome is up for purchase in the US on Amazon. And just in time for a brilliant stocking stuffer.

Tuesday, November 22, 2011

3 Possible Kinds of OOR

Over at Tim Richardson’s blog objet(a)uthenticity, the question is raised as to whether an object can be designed to be authentic. For Tim, authenticity requires a certain amount of distance between the “mythical” real object and the object that is claiming to be authentic in regards to this real object. For example, Tim relays his experience with the word authentic when:
During one of the [last democratic presidential primary] debates, when the field was still large, one pundit commented that the choice of a nominee would come down to which candidate seemed most authentic to the voter. At that exact moment, I reached for a bag of tortilla chips that was emblazoned with the slogan “Authentic Mexican Taste” and, with that coincidence, realized the problem. “Authentic Mexican Taste” only makes sense outside of (a mythic) Mexico. (Of course, you can see that referenced in the proposal, but this distance may be very much like the distance insisted on by medieval courtly love narratives, too).
Authenticity, according to Tim, requires that there be an ideal object or place that exists apart from the “authentic” object. Authentic Mexican chips can only be authentic to a Mexico that exists outside of the chips themselves. In the end, though, Tim questions the relationship between the “mythical” object of origin and that object claiming to be authentic as being similar to the an object’s substance and its properties. He asks, “But I’m wondering if this idea of difference between the design of a device (even the body) and its potential properties isn’t something like the distance or gap I described far above as a hallmark of the authentic?” (emphasis added)

Now hopefully Tim will build on this question (and I look forward to reading his next post), but it got me thinking about my own project and a note I drew up some time ago about Aristotle’s three kinds of rhetoric.

For Aristotle, there existed three kinds or species of rhetoric: deliberative (argues that we should take a certain action or that a certain action should not be taken), forensic ( or judicial rhetoric, accuses or defends someone according to some event), and epideictic (offers praise of blame determining if someone is honorable or shameful). But, as Eugene Garver points out in his essay “Aristotle on the Kinds of Rhetoric,” these three kinds at times seem trivial since “[e]ven in Aristotle’s time, most rhetorical speeches did not fall under one of the three kinds of rhetoric. Today, the proportion of rhetoric that is deliberative, judicial, or epideictic is even smaller” (17). Now ultimately for Garver, Aristotle’s three kinds of rhetoric act as guides that “tell us what rhetoric should and can be” by “show[ing] us rhetoric’s possibilities” (18). And while I don’t disagree with Garver’s point one hundred percent, I would argue that in order to develop a true faculty to discover all available means of persuasion, we also need to take into account the temporal dimension of deliberative, forensic, and epideictic rhetoric.

For Aristotle these three kinds of rhetoric were also tied to respective times. As he states in Book I chapter 3 of his Rhetoric:
Further, to each of these a special time is appropriate: to the deliberative the future, for the speaker, whether he exhorts or dissuades, always advises about things to come; to the forensic the past, for it is always in reference to things done that one party accuses and the other defends; to the epideictic most appropriately the present, for it is the existing condition of things that all those who praise or blame have in view. It is not uncommon, however, for epideictic speakers to avail themselves of other times, of the past by way of recalling it, or of the future by way of anticipating it. (135b12-20)
So we can see that apart from purpose, there is also a temporal distance between each of these types of rhetoric. Therefore, any interaction, if it is dependent upon a certain amount of opportunity or kairos is subject to a temporal characteristic as much as a motivating one. In other words, it makes sense (especially if we agree with Garver that Aristotle’s three kinds of rhetoric are often irrelevant to the extent that rarely do rhetorical acts fall under one of these categories) that we can reduce rhetoric to a temporal structure. So that if we were to develop any new categories, they would not have to accommodate or acquiesce to the purpose of Aristotle’s kinds, but simply the temporal format of future, past, and present.

And it is with this temporal understanding of rhetoric that I wish to put forth my own three kinds of object-oriented rhetoric: architectural, practical, and aesthetic. With architectural rhetoric, the focus is on the object’s future design, for the object stands as something to be improved upon, developed, and planned for, whether that object exists or not. Architectural rhetoric relies on the future much like deliberative rhetoric does, by attempting to determine future models and manifestations. Practical rhetoric focuses solely on use, for objects in use are either in reference to objects that have worked before or to the withdrawn substance of the broken tool. Therefore, practical rhetoric relies on the past in order for objects to be put to use, constantly oscillating between tool and broken tool, real and sensual. Finally, aesthetic rhetoric focuses on objects as they appear or present themselves to us and to other objects, for it is in the object’s existence as something pleasing or perturbing that creates networks of relations. However, like epideictic rhetoric, it is not uncommon for aesthetic rhetoric “to avail themselves of other times,” of the past by way of recalling an object’s use, or of the future by way of anticipating the potential of new local manifestations.

Thursday, November 10, 2011

Hacking and Allusion

Over at Tim Richardson’s new blog Objet(a)uthenticity, he questions the idea of authenticity as it relates to both the prosthetic and the hack. He posits that like rhetoric, as dunamis, hacking seems to be a way of getting the object to reveal itself while a prosthetic is merely a replacement part:
What seems to differentiate the hack from the prosthetic (that talk I linked to last note) is that the latter is a replacement in kind, a surrogate that may or may not live up to the standards or utility of the original (and may or may not appear authentic). The hack, though, is all about new functionality. So it might be that all hacks are prosthetic (though maybe they address a lack, not a loss?) but not all prosthetics are hacks?
I’m going to get back to this in just a bit, but I want to bring up something that’s always bothered me about Harman’s OOO—allusion. In Prince of Networks, Harman states:
When the hammer surprises us with its breakdown, the exact character of this surprise can admittedly be described by various predicates. But note that ‘surprise’ is only the phenomenal result of the previously concealed hammer. The veiled, underground hammer cannot be identified with the surprises it generates, since these merely allude to its existence. (Allusion and allure are legitimate forms of knowledge, but irreducible to specific predicates.) (225)
Therefore, even when the object seems to offer us a glimpse into its withdrawn nature, these are just allusions to the real object that lies beneath. Now I used to think that this “allusion” (whether on our part or the object’s) was just a weasel word—a way to get around not having to talk about a seemingly important point. But what Tim’s post seems to get at is that perhaps a better way of understanding the relationship between the real object and the sensual one, or when the hammer breaks, is by way of hacking. Hacking allows users to get at parts of their objects that were meant to remain hidden, tucked away in code or purposefully disabled. What the hacker does, then, is never a physical modification but an action that allows the excess or withdrawn “reality” of the object to come forth. A recent example is when iOS hackers found that there was a panorama setting in iOS 5.0 that wasn’t turned on by Apple. Hacking, therefore, is a sort of non-linguistic way of alluding to a real object. And humans aren't the only objects that hack. For example, HIV works by hacking a host cell to replicate its RNA strand. HIV, in its hacking, makes the allusion to the host cell's hidden functionality extremely clear. Hacking in this sense is a faculty for observing all of the available means of perturbation. And as Tim reminds us, rhetoric (and maybe more specifically for us, OOR), too, is a faculty for discovering an object’s hidden functionality or local manifestations.