“Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.”
Related posts:
Paul Craig Roberts: The Missing Recovery
Be Prepared When the ATMs Go Dark…
Wendy McElroy: America's Surveillance State
FATCA: a Tool of the Electronic Surveillance State
Interview with Peter Thiel, the Popular Contrarian
Election won't prevent pension crash
"Free Trade Has Destroyed American Manufacturing": False.
Detlev Schlichter: Of interest and the dangerous habit of suppressing it
Will Grigg: Put Not Your Trust In Federalized Sheriffs
The Fed's Asset-Inflation Machine
Syria and Second Passports
Jeffrey Tucker: How Can We Protect Ourselves from the Police State?
America's best educated kids don't go to school
Does “Homeland Security” really protect you?
Michael Scheuer: Obama, Rice, Kerry, McCain, and Graham intervening for more war
