This is the full Augmented Activism essay. The two parts provide prescriptive tactics for how to incorporate technology in activist work. Part 1 was originally posted here and part 2 was here.

Part 1

Academics usually do not talk about “tactics.” There are theories, methods, critiques, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the Science, Technology, and Human Values (The flagship journal for Society for Social Studies of Science) three authors threw caution to the wind and published the paper “Postcolonial Computing: A Tactical Survey” [over-priced subscription required]. While the content of the paper is excellent, what excited me the most was their decision to describe their new “bag of tools” as a set of tactics. Kavita Philip, Lilly Irani, and Paul Dourish take a moment in their conclusion to reflect on their decision:

We call our results tactics, rather than methodologies, strategies, or universal guarantors of truth. Tactics lead not to the true or final design solution but to the contingent and collaborative construction of other narratives. These other narratives remain partial and approximate, but they are irrevocably opened up to problematization.

I will employ the language and approach of the “tactical survey” to offer a new set of conceptual tools for understanding augmented protest and revolution. It is my aim that they prove useful for activists as well as academics and journalists following Occupy Wall Street and similar movements. This first part focuses on the intersections of transparency, social media, privilege, and public depictions of protest. Part 2 will cover the utilization of corporate technological systems (e.g. Apple productsTwitter) and building alternatives to those systems (e.g. Vibe, Diaspora). These tactics are forged from observations (first hand and otherwise) of the #OWS movement. They are intentionally abstract, because they are menat to apply to a wide range of instances and scenarios. 

Diversity of Tactics and the limitations of sousveillance

Last Monday, Chris Hedges posted a scathing critique of the black bloc tactics exercised in Oakland and New York. He describes black bloc tactics as “The Cancer in Occupy” (that is also the title of the piece) and calls on the occupy movement as a whole to oppose and denounce “black bloc anarchists.” Hedges characterizes black blocs as “…an inchoate rage to be unleashed on any target. Pity, compassion and tenderness are banished for the intoxication of power. It is the same sickness that fuels the swarms of police who pepper-spray and beat peaceful demonstrators. It is the sickness of soldiers in war. It turns human beings into beasts.”

The anarchist community has replied to Hedges’ piece with equal parts anger and resolve. Anthropologist, black bloc veteran, and anarchist scholar Dr. David Graeber wrote a reply in n+1 magazine  where he expressed concern that Hedge’s article had the capacity to do much more harm than any “black-clad teenager throwing rocks.” The message is dangerous, according to Graeber, because it destroys important lines of communication among activists. Graeber explains,

… “diversity of tactics” means leaving such matters up to individual conscience, rather than imposing a code on anyone. Partly,this is because imposing such a code invariably backfires. In practice, it means some groups break off in indignation and do even more militant things than they would have otherwise, without coordinating with anyone else—as happened, for instance, in Seattle.

Hedges and many others seem to think that recording and disseminating unjustified acts of police violence can win the war of words. That black bloc tactics muddy the message and give the media an excuse to call a protest a mob. This is simply not the case:

 Sometimes, with the help of social media, we can demonstrate that particular police attacks were absolutely unjustified, as with the famous Tony Bologna pepper-spray incident. But we cannot by definition prove all police attacks were unjustified, even all attacks at one particular march; it’s simply physically impossible to film every thing that happens from every possible angle all the time. Therefore we can expect that whatever we do, the media will dutifully report “protesters engaged in clashes with police” rather than “police attacked non-violent protesters.”

Tim Pool and I at the eviction of Occupy Albany. Photo c/o the Daily Gazette.

I have written on the power of sousveillance in the past, but must agree that there are limitations to its efficacy in the national context. Graeber is quick to note that the images of civil rights protestors getting blasted with fire hoses were recognized as police violence mainly because “Americans at the time didn’t view the Deep South as part of the same country.” Nathan Jurgenson has written in the Atlantic on the delicate balance between transparency and anonymity in the Occupy movements. Dissemination of information by the likes of Tim Pool and others have forced tough truths into the spotlight, but his reporting must still compete in a national conversation with the likes of Fox News and other forms of corporate media. When raw footage is broadly available, it is interpreted through previously held beliefs and ideologies. For example, when I blogged for Occupy Albany, many conservative commenters pointed to arrest records as evidence of violent protest tactics, not police brutality or selective enforcement. Cognitive scientists have a term for this- confirmation bias.

Tactic 1: Social media is an extremely  powerful tool, but should not be treated as a panacea for corporate, ideologically-driven media coverage. Images and data conveyed via social media can challenge previously held beliefs, but are also subject to the effects of confirmation bias. This means the principles of transparency, privacy, and nonviolence, are a double-edged sword for activists and their causes. Consider these principles in relation to one another, in various dimensions. 

 The Privilege of Inviting Transparency

This blog frequently revisits the topic of privacy on the internet. Most mainstream coverage of privacy fails to describe what privacy actually looks like, and what it is supposed to accomplish. If a particularly gregarious Facebook user shares everything about themselves, but deletes the content after a few hours, is that an example of privacy or transparency? In the aforementioned Atlantic article, it is obvious that there is no universal boundaries for privacy and transparency. Transparency, as an ideal, is a function of several extrinsic factors that include but are not limited to: the privileged status of those being recorded; the likelihood that the means of a certain tactic will play into existing narratives or stereotypes; and/or the desire for a “safe space” where sensitive issues are discussed.

Within occupations, issues of transparency and privacy are often embedded within larger discussions of what it takes to create safe spaces for specific conversations and actions. Occupations frequently establish caucuses for people of color, women, LGBT communities, the homeless, and even self-described political radicals. These are places where those who share a common affinity can organize and call out occupations for their own acts of privilege or unintended racism classism, or sexism. These are platforms for internally dealing with the kinds of structural prejudice that all mass movements must deal with. In order for caucuses to function, they cannot put all of their meetings on ustream or even necessarily announce where and when they are meeting. Caucuses frequently deal with allegations of separatism and reverse racism. Such accusations often do more to derail important conversations all-together, rather than confronting intricate problems with well thought-out arguments made in the confidence of like-minded others.

Tactic 2: Notions of transparency and privacy are not only constantly evolving, they are also a function of privilege, tactics, and expected reception by an imagined audience. Universal concepts or policies of transparency and privacy are often detrimental to or discount the experiences of historically disadvantaged groups. Always consider the subject and imagined audiences of recorded and widely disseminated images and text.

Conclusion 

Whenever a Ustream  goes live from a news-studio-in-a-backpack, or a critique of tactics and ideology goes out on the web, the researcher or reflexive activist should begin looking for or considering the effects of-

  • confirmation biases of imagined or intended audiences;
  • concepts of transparency held by the subject;
  • privacy as a function of withholding information from certain people or for a certain time
  • subjects’ histories of privilege and structural discrimination;

Next week I will be discussing the roll of large technical systems (LTSs) in communication and organization. More specifically, I will consider the embedded hierarchy and labor organization within LTSs and in what ways they impede horizontal organization. From there, I will consider methods of appropriation and alternative pathways.

Part 2

Is this an Oxymoron?

Most of our interactions with technology are rather mundane. We flip a light switch, buckle our seat belts, or place a phone call. We have a tacit knowledge of how these devices work. In other words, we have relatively standard, institutionalized, ways of interacting with familiar technologies. For example: if I were to drive someone else’s car, even if it is an unfamiliar model, I do not immediately consult the user manual. I look around for the familiar controls, maybe flick the blinkers on while the car is still in the drive way, and off I go. Removal of these technologies (or even significant alterations) can cause confusion. This is immediately evident if you are trying to meet a friend who does not own a cell phone. Typical conventions for finding the person in a crowded public space (“Yeah, I’m here. Near the stage? Yeah I see you waving.”) are not available to you. In years prior to widespread cell phone adoption, you might have made more detailed plans before heading out (“We’ll meet by the stage at 11PM.”) but now we work out the details on the fly. Operating cars and using cell phones are just a few mundane examples of how technologies shape social behavior beyond the actions needed to operate and maintain them. The widespread adoption of technologies, and the decisions by individual groups to utilize technologies can have a profound impact on the social order of communities. This second part of the Tactical Survey will help academics, activists, and activist academics assess the roll of information technology in a movement and make better decisions on when and how to use tools like social media, live video, and other forms of computer-mediated communication.

“The Master’s Tools” or, The Apparent Hypocrisy of Apple Computers in Zuccotti Park

Skeptical journalists and talking heads were quick to point out an apparent hypocrisy within the Occupy Wall Street movement. How can these hippies protest corporations when they are using Apple computers? The earliest of these pronouncements came from a New York Times piece that ended with:

One day, a trader on the floor of the New York Stock Exchange, Adam Sarzen, a decade or so older than many of the protesters, came to Zuccotti Park seemingly just to shake his head. “Look at these kids, sitting here with their Apple computers,” he said. “Apple, one of the biggest monopolies in the world. It trades at $400 a share. Do they even know that?”

These sorts of observations are usually left unchallenged. Eric Randall, writing in The Atlantic, noticed this trend and wrote:

Depicting protestors sitting on their MacBooks fits in with the broader narrative the media has settled on, one that depicts a disorganized group of well-educated college grads who can’t figure out how to stay on message. The MacBook seems always to be used as a sort of tongue-in-cheek “stuff white people like” condemnation of the jobless, disenfranchised protestors who can somehow swing a $1,300 computer.

This is nothing new. Ever since the “Battle for Seattle” Western news outlets have used this particular narrative to discredit activists and reasserts the legitimacy of status quo consumerism. Sociologist Richard J.F. Day comments on this rhetorical device in his book Gramsci is Dead: “This is an extremely common trope of exclusion by inclusion, which works by trying to show that They (anarchist activists) are no less tainted with the stain of capitalist individualism than We (good capitalist citizens) are, and therefore have no right to criticize the status quo.”

Members of OWS have responded to these sorts of accusations, but (predictably) little has changed. Randall quotes the occupywallst.org blog‘s response:

This is a specious argument, that if taken to its conclusion would preclude the use of any product to those angered by the injustice of its producer. If you disagree with the policy of GE’s board, you cannot own a refrigerator, if a major paper conglomerate cooks its books you may not use toilet paper. This protest is against injustice committed by the greedy, not commerce itself or the products of corporations.

This appears to be an intractable problem. The powerful get to where they are by making lots of people need (and therefore buy) their stuff. They become an obligatory point of passage.  An alternative is to engage in “lifestyle politics” and avoid the use of technologies that are incompatible with your politics. This, however, usually means you are spending considerable time and effort building new capacities from the ground up, and not using your energy and resources to actually fight what you see as wrong in the world. To the extent that fighting for change and building alternative capacities are mutually exclusive tactics, a collective must make a decision on time horizons and overall goals. In a pluralist social movement like #OWS, there is enough capacity to do both. Some can fight with the problematic tools that are currently available (e.g. Apple computers and Twitter) while others work on new technologies that are less connected to the corporations.

Tactic 3: Pluralist movements must recognize the failures of the existing sociotechnical social order, while also developing alternative capacities. Using computers made in sweatshops and for-profit social networking sites that have dangerous privacy policies are a necessity for effective augmented activism in the short term. Sustained, long term actions should also be working towards alternatives to these technologies. 
 

Building Alternative Capacity

The Global Square is a new social networking site built for and by activists.

Since the eviction of almost every physical occupation in the United States, occupiers (especially the geeky ones) have been hard at work finding new and inventive ways of coordinating and connecting. One of these efforts is TheGlobalSquare.org– a multilingual, open-source social networking platform that would offer a “platform for the movement.” The media has already billed the project as “Occupy Wall Street Builds Facebook Alternative” but that only tells half the story. Building an alternative to Facebook also means building an alternative set of behaviors. Services like Twitter and Facebook are built with a certain kind of user in mind. They can be used for activism, but they are built for monetizing social activity. This means identity-protecting pseudonyms are forbidden, and censorship is negotiable.

Social media technologies are built with equal parts computer code and social norms. The assumed relationship of the individual to the collective is built into the system. For Facebook that means being open to everyone. Its institutionalized through and by the default settings of your account and the corporate business model. For Twitter, it means talk and connect as much as possible, but within the bounds and abilities of state authorities to suppress free speech on the web. Global Square’s stated philosophy is (in part):

The Global Square recognizes the principles of personal privacy as a basic right of individuals and transparency to all users as an obligation for public systems. While User Profiles will allow for as much privacy as the individual desires (technology permitting), Squares, Events, and Task Groups must be, at minimum, completely transparent to their user groups, and Systems must be completely transparent for full auditing capability by all Users.

Here, again, we see the delicate interplay of transparency and privacy that characterizes Occupy Wall Street. For Global Square, privacy of the individual is paramount, but that privacy is nested within two levels of transparency- transparency of collectives to its constituent individuals, and global transparency of governing sociotechnical systems to all users. Chris Kelty used the term recursive publics in his book Two Bits to describe communities of open-source coders that develop platforms that allow for and sustain the community. Global Square represents a similar social recursion: it is a platform to build capacity for new platforms of capacity building.

Tactic 4: Corporate-owned social media tools are not politically ambivalent. Technologies have embedded within them, assumed relationships and social organizations. Activists taking advantage of social media must recognize the subtle influences these technologies have on social action. If possible, new capacities for augmented activism must be built and maintained.

Coda

Arduino is an open-source hardware platform popular with hobbyists and DIY programmers but has been used in commercial products and academic settings.

Granted, the recursion can only go so deep. The code for Facebook or Global Square still run on the problematic hardware part 2 opened up with. The construction of open source hardware is much more complicated and resource intensive. This begs the question: Is it possible to have widely available digital technology in a world without exploited labor? Are the rare earth metals in our smart phones counter-revolutionary? What would a socially just version of Moore’s Law look like? These are questions left to future posts and other authors. What activists can and must do now, is enroll the expertise of engineers and scientist to explore these questions. This might mean activists learning the skills of engineering and science, but it might also mean creating a revolutionary computer science. Creating a computer for the people will be no easy task, and might mean creating a totally new technical artifact. It may also mean redefining technological progress to include lateral shifts that produce similar computational power but in more socially just ways. It is not enough to use these tools for good, we have to make new tools that are good.