Wednesday, September 30, 2009

D I Y

One the questions about the availability of information and the rise of D.I.Y. revolves around security/weaponry. I tried to gather examples of D.I.Y. techniques that might, under some circumstances, be considered worthy of regulation, or at very least suspicion from a state agency hoping to maintain the monopoly on violence. I didn't look up anything I imagined would get me on any sort of FBI/DHS watch list, but one can imagine the possibilities.

Bump Key - This nifty little video instructs one on how to devise a key that will open almost any standard lock, a super fine device should you take up a career in burglary so as to augment your stipend. The chap in the video says that he's spreading the info because the 'bad guys' already know about it, and he's just equalizing things.

DHS Nausea Weapon - It's wonderful, finding new ways of putting down disorder and disobedience without resorting to blood or death. For those who want to set phasers to stun, we have a video about how to make the Department of Homeland Security's very own sickness-inducing light gun. Build one of these suckers and be ready to shoot back!

Homemade Explosives - These aren't exactly the pipe bombs of 'Steal This Book' or 'The Anarchist's Cookbook', but they demonstrate the potential increase in the availability of 'dangerous' knowledge. A link near the bottom of this page tells you how to make your own thermite, what fun!

Zombie Survival - Just to point to the fascination with preparing for fictional eventualities with real-life contingencies. I wonder if discussions of weapon construction seem less or more disturbing when placed under the heading 'preparing for z-day'.

2 comments:

  1. This brings about the whole notion of talking about something without disclosing the entirety of that something. The business of constructing a kind of horror that perhaps weren't there in the first place, by probing it. It reminds me of Amy Adler's work on child pornography. She argues that the law itself constructs childhood vulnerability. As it unwittingly perpetuates the "pedo gaze" as it probes images of children with the eyes of the pedophile in order to recognize pedophilia.

    ReplyDelete
  2. open/closed and public/secret (gonzalez and dean) seem worth exploraiton, especially in their imbrications

    ReplyDelete