{"id":8207,"date":"2012-02-12T23:58:51","date_gmt":"2012-02-13T03:58:51","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=8207"},"modified":"2012-02-12T23:58:53","modified_gmt":"2012-02-13T03:58:53","slug":"augmented-activism-a-tactical-survey-part-1","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2012\/02\/12\/augmented-activism-a-tactical-survey-part-1\/","title":{"rendered":"Augmented Activism: A Tactical Survey (Part 1)"},"content":{"rendered":"<p style=\"text-align: center\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/02\/12\/augmented-activism-a-tactical-survey-part-1\/occupycongress\/\" rel=\"attachment wp-att-8251\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-8251\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/02\/occupycongress-500x331.jpg\" alt=\"\" width=\"500\" height=\"331\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/02\/occupycongress-500x331.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/02\/occupycongress-300x199.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/02\/occupycongress.jpg 720w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Academics usually do not talk about &#8220;tactics.&#8221; There are theories, methods, <a title=\"Critical Theory: Useful Distinction or Unconscious Smugness?\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/09\/20\/critical-theory-useful-distinction-or-unconscious-smugness\/\">critiques<\/a>, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the <a href=\"http:\/\/www.4sonline.org\/publications\">Science, Technology, and Human Values<\/a> (The flagship journal for <a href=\"http:\/\/www.4sonline.org\/\">Society for Social Studies of Science<\/a>) three authors threw caution to the wind and published the paper &#8220;<a href=\"http:\/\/sth.sagepub.com\/content\/37\/1\/3\">Postcolonial Computing: A Tactical Survey<\/a>&#8221;\u00a0[over-priced subscription required]. While the content of the paper is excellent, what excited me the most was their decision to describe their new &#8220;bag of tools&#8221; as a set of tactics.\u00a0Kavita Philip, Lilly Irani, and Paul Dourish take a moment in their conclusion to reflect on their decision:<\/p>\n<blockquote><p>We call our results tactics, rather than methodologies, strategies, or universal guarantors of truth. Tactics lead not to the true or final design solution but to the contingent and collaborative construction of other narratives. These other narratives remain partial and approximate, but they are irrevocably opened up to problematization.<\/p><\/blockquote>\n<p>I will employ the language and approach of the &#8220;tactical survey&#8221; to offer a new set of conceptual tools for understanding augmented protest and revolution. It is my aim that they prove useful for activists as well as academics and journalists following Occupy Wall Street and similar movements. This first part focuses on the intersections of transparency, social media,\u00a0privilege, and public depictions of protest. Part 2 will cover the utilization of corporate technological systems (e.g.\u00a0<a title=\"How Cyberpunk Warned against Apple\u2019s Consumer Revolution\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/12\/01\/how-cyberpunk-warned-against-apples-consumer-revolution\/\">Apple products<\/a>,\u00a0<a title=\"On The Flow of Tweets: Private Interests and Public Speech\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/02\/03\/on-the-flow-of-tweets-private-interests-and-public-speech\/\">Twitter<\/a>) and building alternatives to those systems (e.g.\u00a0<a href=\"http:\/\/www.wired.com\/threatlevel\/2011\/12\/occupy-facebook\/all\/1\">Vibe, Diaspora<\/a>).\u00a0These tactics are forged from observations (first hand and otherwise) of the #OWS movement. They are intentionally abstract, because they are menat to apply to a wide range of instances and scenarios.\u00a0<!--more--><\/p>\n<h4><strong>Diversity of Tactics and the limitations of sousveillance<\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/lh6.googleusercontent.com\/-1W5nhfwnbNM\/TxdrSdtJHvI\/AAAAAAAAOaA\/IOzE2x73jWE\/s576\/occupycongress17jan2012%252520%25252815%252520of%25252076%252529.jpg\" alt=\"\" width=\"268\" height=\"403\" \/><\/p>\n<p>Last Monday, Chris Hedges <a href=\"http:\/\/www.truthdig.com\/report\/item\/the_cancer_of_occupy_20120206\/\">posted a scathing critique of the black bloc tactics<\/a> exercised in Oakland and New York. He describes black bloc tactics as &#8220;The Cancer in Occupy&#8221; (that is also the title of the piece) and calls on the occupy movement as a whole to oppose and denounce &#8220;black bloc anarchists.&#8221; Hedges characterizes black blocs as &#8220;&#8230;an inchoate rage to be unleashed on any target. Pity, compassion and tenderness are banished for the intoxication of power. It is the same sickness that fuels the swarms of police who pepper-spray and beat peaceful demonstrators. It is the sickness of soldiers in war. It turns human beings into beasts.&#8221;<\/p>\n<p>The anarchist community has replied to Hedges&#8217; piece with equal parts anger and resolve. Anthropologist, black bloc veteran, and anarchist scholar\u00a0<a href=\"https:\/\/twitter.com\/#!\/davidgraeber\">Dr. David Graeber<\/a>\u00a0wrote a <a href=\"http:\/\/nplusonemag.com\/concerning-the-violent-peace-police\">reply in n+1 magazine\u00a0<\/a>\u00a0where he expressed concern that Hedge&#8217;s article had the capacity to do much more harm than any &#8220;black-clad teenager throwing rocks.&#8221; The message is dangerous, according to Graeber, because it destroys important lines of\u00a0communication\u00a0among activists. Graeber explains,<\/p>\n<blockquote><p>&#8230; \u201cdiversity of tactics\u201d means leaving such matters up to individual conscience, rather than imposing a code on anyone. Partly,this is because imposing such a code invariably backfires. In practice, it means some groups break off in indignation and do even more militant things than they would have otherwise, without coordinating with anyone else\u2014as happened, for instance, in Seattle.<\/p><\/blockquote>\n<p>Hedges and many others seem to think that recording and disseminating unjustified acts of police violence can win the war of words. That black bloc tactics muddy the message and give the media an excuse to call a protest a mob. This is simply not the case:<\/p>\n<blockquote>\n<p style=\"text-align: left\">\u00a0Sometimes, with the help of social media, we can demonstrate that particular police attacks were absolutely unjustified, as with the famous Tony Bologna pepper-spray incident. But we cannot by definition prove all police attacks were unjustified, even all attacks at one particular march; it\u2019s simply physically impossible to film every thing that happens from every possible angle all the time. Therefore we can expect that whatever we do, the media will dutifully report \u201cprotesters engaged in clashes with police\u201d rather than \u201cpolice attacked non-violent protesters.\u201d<\/p>\n<\/blockquote>\n<figure id=\"attachment_8210\" aria-describedby=\"caption-attachment-8210\" style=\"width: 360px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/02\/12\/augmented-activism-a-tactical-survey-part-1\/me-and-tim-pool\/\" rel=\"attachment wp-att-8210\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-8210 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/02\/me-and-tim-pool.jpeg\" alt=\"\" width=\"360\" height=\"240\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/02\/me-and-tim-pool.jpeg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/02\/me-and-tim-pool-300x199.jpg 300w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/a><figcaption id=\"caption-attachment-8210\" class=\"wp-caption-text\">Tim Pool and I at the eviction of Occupy Albany. Photo c\/o the Daily Gazette.<\/figcaption><\/figure>\n<p>I have written on the <a title=\"Sousveillance and Justice: A Panopticon in the Crowds\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/11\/09\/sousveillance-and-justice-a-panopticon-in-the-crowds\/\">power of sousveillance<\/a>\u00a0in the past, but must agree that there are limitations to its efficacy in the national context. Graeber is quick to note that the images of civil rights protestors getting blasted with fire hoses were recognized as police violence mainly because &#8220;Americans at the time didn\u2019t view the Deep South as part of the same country.&#8221; Nathan Jurgenson has written in <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2011\/12\/occupy-anonymity-or-transparency\/250053\/\">the Atlantic<\/a> on the delicate balance between transparency and anonymity in the Occupy movements. Dissemination of information by the likes of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Tim_Pool\">Tim Pool<\/a> and others have forced tough truths into the spotlight, but his reporting must still compete in a national conversation with the likes of Fox News and other forms of corporate media. When raw footage is broadly available, it is interpreted through previously held beliefs and ideologies. For example, <a href=\"http:\/\/blog.timesunion.com\/occupyalbany\/\">when I blogged for Occupy Albany<\/a>, many conservative commenters pointed to <a href=\"http:\/\/occupyarrests.moonfruit.com\/\">arrest records<\/a>\u00a0as evidence of violent protest tactics, not police brutality or selective enforcement. Cognitive scientists have a term for this- <a href=\"http:\/\/en.wikipedia.org\/wiki\/Confirmation_bias\">confirmation bias<\/a>.<\/p>\n<address>Tactic 1: Social media is an extremely \u00a0powerful tool, but should not be treated as a\u00a0panacea for corporate, ideologically-driven media coverage. Images and data conveyed via social media can challenge previously held beliefs, but are also subject to the effects of confirmation bias. This means the principles of\u00a0transparency, privacy, and nonviolence,\u00a0are a double-edged sword for activists and their causes. Consider these principles in relation to one another, in various dimensions.\u00a0<\/address>\n<h4><strong>\u00a0The\u00a0Privilege\u00a0of Inviting Transparency<\/strong><\/h4>\n<p>This blog frequently <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/07\/06\/rethinking-privacy-and-publicty-on-social-media-part-ii\/\">revisits the topic of privacy on the internet<\/a>. Most mainstream coverage of privacy fails to describe what privacy actually looks like, and what it is supposed to accomplish. If a\u00a0particularly\u00a0gregarious Facebook user shares everything about themselves, <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2010\/11\/08\/risk-reduction-strategies-on-facebook.html\">but deletes the content after a few hours, <\/a>is that an example of privacy or transparency? In the aforementioned Atlantic article, it is obvious that there is no universal boundaries for privacy and transparency. Transparency, as an ideal, is a function of several extrinsic factors that include but are not limited to: the\u00a0privileged status of those being recorded; the\u00a0likelihood\u00a0that the means of a certain tactic will play into existing narratives or stereotypes; and\/or the desire for a &#8220;safe space&#8221; where sensitive issues are discussed.<\/p>\n<p>Within occupations, issues of transparency and privacy are often embedded within larger discussions of what it takes to create safe spaces for specific conversations and actions. Occupations frequently establish caucuses for people of color, women, LGBT\u00a0communities, the homeless, and even self-described political radicals. These are places where those who share a common affinity can organize and <a href=\"http:\/\/www.thenation.com\/article\/164405\/how-people-color-occupy-wall-street\">call out occupations for their own acts of\u00a0privilege\u00a0or unintended racism classism, or sexism<\/a>. These are platforms for internally dealing with the kinds of structural prejudice that all mass movements must deal with. In order for caucuses to function, they cannot put all of their meetings on ustream or even necessarily announce where and when they are meeting. Caucuses frequently deal with allegations of\u00a0separatism\u00a0and reverse racism. Such accusations often do more to derail important conversations all-together, rather than confronting intricate problems with well thought-out arguments made in the confidence of like-minded others.<\/p>\n<p><em>Tactic 2: Notions of transparency and privacy are not only constantly evolving, they are also a function of\u00a0privilege, tactics, and expected reception by an imagined audience. Universal concepts or policies of transparency and privacy are often detrimental to or discount the experiences of historically disadvantaged groups. Always consider the subject and imagined audiences of recorded and widely\u00a0disseminated images and text.<\/em><\/p>\n<h4><strong>Conclusion\u00a0<\/strong><\/h4>\n<p>Whenever a Ustream \u00a0goes live from a news-studio-in-a-backpack, or a critique of tactics and ideology goes out on the web, the researcher or reflexive activist should begin looking for or considering the effects of-<\/p>\n<ul>\n<li>confirmation biases of imagined or intended audiences;<\/li>\n<li>concepts of transparency held by the subject;<\/li>\n<li>privacy as a function of withholding information from certain people or for a certain time<\/li>\n<li>subjects&#8217; histories of\u00a0privilege\u00a0and structural discrimination;<\/li>\n<\/ul>\n<p>Next week I will be discussing the roll of large technical systems (LTSs) in\u00a0communication\u00a0and\u00a0organization. More specifically, I will consider the embedded\u00a0hierarchy\u00a0and labor organization within LTSs and in what ways they impede horizontal organization. From there, I will consider methods of appropriation and alternative pathways.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Academics usually do not talk about &#8220;tactics.&#8221; There are theories, methods, critiques, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the Science, Technology, and Human Values (The flagship journal for Society for Social Studies of Science) three authors threw caution [&hellip;]<\/p>\n","protected":false},"author":1512,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[12053,14075,2539,9954,14076,12609,12324,2018,12703,3519,14073,13922,14074,800],"class_list":["post-8207","post","type-post","status-publish","format-standard","hentry","category-commentary","tag-anonymity","tag-chris-hedges","tag-critical-theory","tag-cyberpunk","tag-human-values","tag-occupy-wall-street","tag-ows","tag-police-brutality","tag-social-studies-of-science","tag-sousveillance","tag-tactics","tag-technological-systems","tag-tim-pool","tag-transparency"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/8207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1512"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=8207"}],"version-history":[{"count":43,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/8207\/revisions"}],"predecessor-version":[{"id":8257,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/8207\/revisions\/8257"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=8207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=8207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=8207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}