transparency

The Storming of the Bastille
The Storming of the Bastille

Why don’t we ever talk about taking over social media companies? We will boycott them, demand transparency measures, and even build entire alternative networks based on volunteer labor but no one ever seems to consider taking all the servers and data sets away from the Mark Zuckerbergs of the world and putting it all in the hands of the users. Even if a company was doing a bang-up job making their products easier to use, freer from harassment, and more productive in creating a better society, there’s still something fundamentally creepy about users having no democratic control over such an important aspect of their lives. Why is there no insistence that such important technologies have democratic accountability? Why are we so reticent to demand direct control over the digital aspects of our lives? more...

Image Credit Miguel Noriega
Image Credit Miguel Noriega

Two weeks ago Zel McCarthy published a story in Thump about a mysterious infographic that’s been making the rounds lately. The infographic purports to show which drugs are popular at various music festivals by scraping Instagram for references to different drugs and certified cbd. The consumers of the Maeng Da variant have reviewed it repeatedly that the consumption of this medicine has improved their ability to concentrate on their work and their tasks hence increasing their efficiency, redirected here if you want to read this post. Scientific research elaborates that it has a direct effect on the cerebral system of the body making it a brain drug or a mental enhancement medicine that can be used as a supplement in small amounts to improve the ability to work and to concentrate more on the work. Anyone that knows a thing or two about research design would already raise an eyebrow but it gets worse.If you need Telescoping flagpole for festival  you can visit here. According to McCarthy:
This intentionally-opaque study was conducted and assembled by a Florida-based content marketing agency Fractl, which works regularly with DrugAbuse.com. While at first glance the site appears to be a credible resource for those struggling with addiction and abuse issues, it’s actually a redirect for for-profit rehab and addiction centers, mainly ones that bankrolls the site. Here are 11 things to look in an addiction treatment program. To help dig deep into the issues of research design, online performativity, and substance use I sat down over Skype with Ingmar Gorman, a clinical psychologist at the New School for Social Research who was quoted in the Thump article saying that this “study” was not only poorly constructed, it was also indicative of an archaic, “moralistic approach” to substance abuse research. What follows is edited to make us both sound more articulate. You can listen to the whole interview (warts and all), using the SoundCloud embed at the end of the interview. The recording, along with the sound of a computer fan and me saying “uhh” a lot, also includes something I’ll call “bonus content” about a study that used the Watson supercomputer to tell if someone was on psychedelics. Enjoy. more...

10478531_709285209106941_4100531665819266605_n

The murder of Mike Brown by Ferguson police officer Darren Wilson has catalyzed an already fast-growing national conversation about outfitting police officers with cameras like the one shown above. These cameras, the logic goes, will keep officers on their best behavior because any abuses of power would be recorded and stored for later review. Officer’s behavior, much like an increasing amount of civilian behavior, will be subject to digital analysis and review by careful administrators and impartial juries. This kind of transparency is extremely enticing but we should always be critical of things that purport to show us unvarnished truths. As any any film director will tell you: the same set of events recorded on camera can look very different when viewed from different angles and in different contexts. more...

ZunZuneo was named for the slang term used to describe a Cuban Hummingbird’s tweet

The Internet seems both excited and generally confused by the U.S. government’s failed entre into Cuban Social media via its version of a bare-bones Twitter, called ZunZuneo. The confusion is not unwarranted, as the operation includes the United States government, two separate for-profit contractors, (and eventually, a management team who didn’t know they were part of an International government sponsored ruse), key players and various bases of operation which span the globe, from Spain to the UK to the Cayman Islands and Nicaragua, and, of course, tens of thousands of Cuban citizens who gratefully began using a new mysterious messaging service that made instantaneous text-based mobile communications financially accessible in 2010, and then inexplicably disappeared in September 2012.

This long form article from the Washington Post does a nice job disentangling the ins and outs of the story, based on documents leaked to the Associated Press. I highly suggest you take the time to read the piece, but in very short summation, the United States Agency for International Development (USAID) collaborated with Creative Associates and eventually, Mobile Accord, to distribute a Twitter-like service (ZunZeneo) to Cuban citizens, with the hope of eventually utilizing the service to incite political mobilization against communist regimes. Mostly, though, the operation never went beyond gaining users through shared news stories and sports commentary. They ran out of money in 2012, Cuban users lost the service, and no revolutions were incited. It’s all general buffoon-like and harmless (except, of course, for all of the money), begging for cynical commentary and smart jokes about a deeply ineffective U.S. government. Except, something very serious happened in the process, something that should make us all—both Cubans and Americans—pretty ticked off. more...

photo-3This is just an off-the-cuff post as I do some weekend reading, namely David Brin’s The Transparent Society (1998). I’m curious about the common grand narrative that society has become more transparent and thus will continue to be more so, ultimately creating the state of full transparency, full surveillance, where everything is seen, recorded, and known. I’ve critiqued this line of thought before, as the issue is common in writing about surveillance or privacy, from silly op-eds to pieces by serious scholars like Zygmunt Bauman.

Brin begins his book by asking the reader to look 10-20 years in the future, which from 1998 means today. Brin claims in the world of the future-for-him / now-for-us there will be no street crime because surveillance cameras peer down from “every lamppost, every rooftop and street sign” which are “observing everything in open view” (4). more...

YouTube Preview Image

 

 

The original video I posted was taken down. Alexander calls cricket a “gay game” 5 minutes in.

In an interview with Craig Ferguson last week, Jason Alexander called the game of Cricket “a gay game.” It was clear (and you can see for yourself in the video above, starting at the 9 minute mark) that Alexander was equating “gay” with “effeminate” and juxtaposing words like “gay” and “queer” with notions of masculinity and being “manly.” After the show aired, the tweets started pouring in. This tweet by @spaffrath was pretty trypical: more...

Is this an Oxymoron?

Most of our interactions with technology are rather mundane. We flip a light switch, buckle our seat belts, or place a phone call. We have a tacit knowledge of how these devices work. In other words, we have relatively standard, institutionalized, ways of interacting with familiar technologies. For example: if I were to drive someone else’s car, even if it is an unfamiliar model, I do not immediately consult the user manual. I look around for the familiar controls, maybe flick the blinkers on while the car is still in the drive way, and off I go. Removal of these technologies (or even significant alterations) can cause confusion. This is immediately evident if you are trying to meet a friend who does not own a cell phone. Typical conventions for finding the person in a crowded public space (“Yeah, I’m here. Near the stage? Yeah I see you waving.”) are not available to you. In years prior to widespread cell phone adoption, you might have made more detailed plans before heading out (“We’ll meet by the stage at 11PM.”) but now we work out the details on the fly. Operating cars and using cell phones are just a few mundane examples of how technologies shape social behavior beyond the actions needed to operate and maintain them. The widespread adoption of technologies, and the decisions by individual groups to utilize technologies can have a profound impact on the social order of communities. This second part of the Tactical Survey will help academics, activists, and activist academics assess the roll of information technology in a movement and make better decisions on when and how to use tools like social media, live video, and other forms of computer-mediated communication. more...

Academics usually do not talk about “tactics.” There are theories, methods, critiques, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the Science, Technology, and Human Values (The flagship journal for Society for Social Studies of Science) three authors threw caution to the wind and published the paper “Postcolonial Computing: A Tactical Survey” [over-priced subscription required]. While the content of the paper is excellent, what excited me the most was their decision to describe their new “bag of tools” as a set of tactics. Kavita Philip, Lilly Irani, and Paul Dourish take a moment in their conclusion to reflect on their decision:

We call our results tactics, rather than methodologies, strategies, or universal guarantors of truth. Tactics lead not to the true or final design solution but to the contingent and collaborative construction of other narratives. These other narratives remain partial and approximate, but they are irrevocably opened up to problematization.

I will employ the language and approach of the “tactical survey” to offer a new set of conceptual tools for understanding augmented protest and revolution. It is my aim that they prove useful for activists as well as academics and journalists following Occupy Wall Street and similar movements. This first part focuses on the intersections of transparency, social media, privilege, and public depictions of protest. Part 2 will cover the utilization of corporate technological systems (e.g. Apple productsTwitter) and building alternatives to those systems (e.g. Vibe, Diaspora). These tactics are forged from observations (first hand and otherwise) of the #OWS movement. They are intentionally abstract, because they are menat to apply to a wide range of instances and scenarios.  more...


Julian Assange, the notorious founder and director of WikiLeaks, is many things to many people: hero, terrorist, figurehead, megalomaniac. What is it about Assange that makes him both so resonant and so divisive in our culture? What, exactly, does Assange stand for? In this post, I explore two possible frameworks for understanding Assange and, more broadly, the WikiLeaks agenda. These frameworks are: cyber-libertarianism and cyber-anarchism.

First, of course, we have to define these two terms. Cyber-libertarianism is a well-established political ideology that has its roots equally in the Internet’s early hacker culture and in American libertarianism. From hacker culture, it inherited a general antagonism to any form of regulation, censorship, or other barrier that might stand in the way of “free” (i.e., unhindered) access of the World Wide Web. From American libertarianism it inherited a general belief that voluntary associations are more effective in promoting freedom than government (the US Libertarian Party‘s motto is “maximum freedom, minimum government”). American libertarianism is distinct from other incarnations of libertarianism in that tends to celebrate the market and private business over co-opts or other modes of collective organization. In this sense, American libertarianism is deeply pro-capitalist. Thus, when we hear the slogan “information wants to be” that is widely associated with cyber-libertarianism, we should not read it as meaning  gratis (i.e., zero price); rather, we should read it as meaning libre (without obstacles or restrictions). This is important because the latter interpretation is compatible with free market economics, unlike the former.

Cyber-anarchism is a far less widely used term. In practice, commentators often fail to distinguish between cyber-anarchism and cyber-libertarianism. However, there are subtle distinctions between the two. Anarchism aims at the abolition of hierarchy. Like libertarians, anarchists have a strong skepticism of government, particularly government’s exclusive claim to use force against other actors. Yet, while libertarians tend to focus on the market as a mechanism for rewarding individual achievement, anarchists tend to see it as means for perpetuating inequality. Thus, cyber-anarchists tend to be as much against private consolidation of Internet infrastructure as they are against government interference. While cyber-libertarians have, historically, viewed the Internet as an unregulated space where good ideas and the most clever entrepreneurs are free to rise to the top, cyber-anarchists see the Internet as a means of working around and, ultimately, tearing down old hierarchies. Thus, what differentiates cyber-anarchist from cyber-libertarians, then, is that cyber-libertarians embrace fluid, meritocratic hierarchies (which are believed to be best served by markets), while anarchists are distrustful of all hierarchies. This would explain while libertarians tend to organize into conventional political parties, while the notion of an anarchist party seems almost oxymoronic. Another way to understand this difference is in how each group defines freedom: Freedom for libertarians is freedom to individually prosper, while freedom for anarchists is freedom from systemic inequalities. more...

The Anonymous Twitter Feed Announcing the NATO Breach

 

On July 21st, 2011, Anonymous—the 4chan-associated hacker collective with a cyber-libertarian bent—announced that they had breached NATO’s secure database and retrieved roughly a gigabyte of restricted data.  To verify their claim, Anonymous posted a “NATO restricted” document to Twitter.  Interestingly, Anonymous has been very cautious in leaking the documents it has obtained, publicly declaring that it would be “irresponsible” to publish most of it.  Much of what has be published is “Redacted, for sanity.” more...