Anonymity


Jessie Sage is not my legal name. Shocking, right? It is, however, my public identity. At this point, so many of my interactions happen through this name that it often feels more natural to me than my legal one. As someone who works in and covers the adult industry, it is the name under which everything I do related to sex work and sex work advocacy falls: my writing, my podcast, my profiles, my activist work, etc.

There are very obvious reasons for this. Sex work is highly stigmatized. And even for those who have only done legal sex work, like myself, there can still be dire consequences to being connected to the sex industry: from social ostracization, to loss of vanilla jobs, to custody battles, to threats of (or actual) violence.

It is no wonder then that nearly everyone who works in my community works under a pseudonym. In a world in which a Google search that links your name to porn can shut down your bank account or prevent you from crossing international borders, it only makes sense to not link your legal identity to your sex work.

more...

This is the full Augmented Activism essay. The two parts provide prescriptive tactics for how to incorporate technology in activist work. Part 1 was originally posted here and part 2 was here.

Part 1

Academics usually do not talk about “tactics.” There are theories, methods, critiques, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the Science, Technology, and Human Values (The flagship journal for Society for Social Studies of Science) three authors threw caution to the wind and published the paper “Postcolonial Computing: A Tactical Survey” [over-priced subscription required]. While the content of the paper is excellent, what excited me the most was their decision to describe their new “bag of tools” as a set of tactics. Kavita Philip, Lilly Irani, and Paul Dourish take a moment in their conclusion to reflect on their decision:

We call our results tactics, rather than methodologies, strategies, or universal guarantors of truth. Tactics lead not to the true or final design solution but to the contingent and collaborative construction of other narratives. These other narratives remain partial and approximate, but they are irrevocably opened up to problematization. more...

Academics usually do not talk about “tactics.” There are theories, methods, critiques, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the Science, Technology, and Human Values (The flagship journal for Society for Social Studies of Science) three authors threw caution to the wind and published the paper “Postcolonial Computing: A Tactical Survey” [over-priced subscription required]. While the content of the paper is excellent, what excited me the most was their decision to describe their new “bag of tools” as a set of tactics. Kavita Philip, Lilly Irani, and Paul Dourish take a moment in their conclusion to reflect on their decision:

We call our results tactics, rather than methodologies, strategies, or universal guarantors of truth. Tactics lead not to the true or final design solution but to the contingent and collaborative construction of other narratives. These other narratives remain partial and approximate, but they are irrevocably opened up to problematization.

I will employ the language and approach of the “tactical survey” to offer a new set of conceptual tools for understanding augmented protest and revolution. It is my aim that they prove useful for activists as well as academics and journalists following Occupy Wall Street and similar movements. This first part focuses on the intersections of transparency, social media, privilege, and public depictions of protest. Part 2 will cover the utilization of corporate technological systems (e.g. Apple productsTwitter) and building alternatives to those systems (e.g. Vibe, Diaspora). These tactics are forged from observations (first hand and otherwise) of the #OWS movement. They are intentionally abstract, because they are menat to apply to a wide range of instances and scenarios.  more...

This essay, like the one I posted last month on faux-vintage photography, is me hashing out ideas as part of my larger dissertation project on self-documentation and social media. Part I is found here.A barrage of media stories are professing the “Death of Anonymity,” the “End of Forgetting” and an “Era of Omniscience.” They are screaming a sensationalism that is part of the larger project to drum up fear about how “public” we are when using social media. While there are indeed risks involved with using social media, these articles engage in a risky hyperbole that I will try to counter-balance here.

Part I of this essay rethought claims of hyper-publicity by theoretically reorienting the concept of publicity itself. Using theorists like Bataille and Baudrillard, I argue that being public is not the end of privacy but instead has everything to do with it. Social media is more like a fan dance: a game of reveal and conceal. Today, I will further take to task our collective tendency to overstate publicity in the age of social media. Sensationalizing the risks of “living in public” perpetuates the stigma around an imperfect social media presence, intensifying the very risk we hope to avoid. But first, let’s look at examples of this sensationalism.

I. Media Sensationalism
Pointing out the dangers of living public online is an important task, but sensationalizing this risk is all too common. Indeed, the media has a long history of sensationalizing all sorts of risks, creating fear to drum up ratings, sales, clicks and page-views. From sexting to cyberbullying to the loss of “deep” learning, political activism, and “real” social connections, I’ve written many times about how the media has found social media to be a particularly fertile space to exploit fear for profit. more...