Networked Mortality


Death is different now. In a time of networks and social media, it’s not just having a song remind you of your deceased loved one anymore, it’s Spotify suggesting you listen to their playlists. It’s scrolling just a bit too far too soon and seeing their last shares on Twitter or Facebook. It’s not just figuring out funerals and atom-based belongings granted through wills (or figuring things out there wasn’t any pre-planning), it’s a faceless mass of internet informing you that your friend has died. It’s not just compiling half-finished scrawled songs and old love notes, it’s debating cracking the password for a laptop full of memories. Because the internet and technology haven’t just changed how we live – it’s changed what happens in death. And we can simply be awash in tragedy in these new ways, or we can use those new connections to show our care and values, even through death.

Today the spontaneity of planning, which makes it possible to search for a place to eat with your incoming friend while already out the door, forms habits making the avoidance of planning for death even easier. But after working through the unexpected deaths of a number of networked friends, I have started explicitly planning for the eventuality of my own death, to ease the burden on others. I’ve set up a living will (detailing things like whether I want to be kept on life support — I don’t), a will (what to do with my corpus and my corpse — open them up and share the contents), and mechanisms for notifying the many communities I inhabit, helping them find each other for support. The compartmentalization of online selves otherwise makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast.

Because I’m also from the parts of the internet that care about open access and free software, friends and I have taken my death preparations and formed a guide for the bits of postmortem planning other guides may have missed. Based on ideas from open access and information security, it includes topics like how to deal with passwords, contact lists, plans for account deletion while archiving information, and donating one’s body to science in ways that support open research.

This living documentation is called NetworkedMortality, and I hope it helps others to start thinking about and planning for the inevitable, either privately or in this wiki-based and public place. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. The sorrow of death need not also be accompanied by confusion over what intentions would have been or who should know what. Funeral home directors and lawyers have helped guide us through the protocols of death in the better-known world. In this new space those steps are considered by Twitter, Facebook, and Google, but I at least would prefer to trust people I know to deal with my wishes more accurately and with more love. We’ll be hosting a “death drill” to test out these new protocols on December 13th from 2p-5p at the Berkman Center.

Too often, we think only about the short term – this quarter, this school year, this laughably short short life span – when considering how we plan as well as what we build. We must instead intentionally look to the public future, and our responsibility as members of that shared story. We must contribute to freely available knowledge which lasts beyond our brief moments. An unavoidable part of life is death. Let’s care for each other, and hold true to our values, through the entirety. Let’s network our mortality, together.

P.S.
It is possible to speak about death without fear – I hope you can act from this place.  If you are in danger of harming yourself, please get help, rather than indirectly indicating through things like estate planning.

AkiraChix and Weaponized Social

I went to AkiraChix: Women in Technology Conference in Nairobi, Kenya this past Saturday. It was pretty outstanding. A couple hundred people in attendance, including a few men, and an incredible variety of relationships to tech (women who run the business side of tech orgs, sysadmins, bloggers, PHP devs, those in technical classes, etc).
Here are some things that stood out to me, in no particular order:
  • Cross-generational mentoring: There were students from 2 (3? 4?) high schools in attendance. AkiraChix has ongoing talks and workshops at these high schools, and the young women were definitely a highlight of the conference. Some jumped to interact/speak up, some needed/wanted encouragement to speak up, but each had astute and empathetic contributions to the conversations and workshops. Those who have been in tech for 20+ years in Kenya and the rest of the world had a reigniting of passion, and the interactions seemed great all around. I’ve been inspired to make more of an effort in integrating youth in future events I participate with.
  • Celebration of achievements / ritualized phases: AkiraChix has a bunch of photos of graduations from classes/bootcamps the group has held, and were hosting a competition for tech for women’s empowerment, etc. I often get so lost in process I forget to celebrate the milestones that have been accomplished — this was a good reminder that these moments of pausing and celebration are important.
  • Integration with educational systems: The students in attendance felt comfortable in their skills as well as with the other attendees in no small part because of the consistent interaction between high schools and AC. AC has created curriculum for (I think) both their own workshops as well as for general use in schools.
  • Self-care: Every. Single. Volunteer and Speaker consistently asked each other “how are you doing? Have you eaten? Do you need some tea or water?” It was difficult to not take care of one’s self, and it was infectious to offer care to others around you after this had been instilled. A++, 1 million points.
  • Focus on interactivity: The day was led by a keynote from Juliana Rotich, about the new AC tagline, “she builds, she serves, she leads” which was powerful and inspiring. This was followed by a panel with lots of time for Q+A, 3 rounds of breakout sessions, and a wrap-up panel (again, with lots of Q+A). The interactivity made sure everyone had a chance to speak, as well as breaking down more traditional (and hierarchical) “I speak, you listen” modes. I find this important to systemic change.
My experience, and a few sticking points:

Despite traveling globally pretty consistently for the past 4 years, I’m still very much aware of having been raised in the whitebread American Midwest, and feel that my experience of being aware of, but not the target of, power inequalities in race might be similar to those of feminist men. Intersectionality is something I studied… 10? years ago (oh man), but not something I’ve been deeply committed to understanding until these moments of enforced empathy. Sorry for being so late to the game, everyone.
I am not scared of being shouted at for saying something wrong. I’m terrified of no one talking to me about it if I do. That makes my bringing up sticking point in this context difficult – being still somewhat fresh to post-colonialism, there is definite deference to the light-skinned in Tanzania (and I think a lesser but still present tendency in Kenya), i.e. my Tanzanian friends get frisked before entering buildings, whereas I don’t. Differing with people in at the conference was delicate business I tended to avoid in deference to this. Was this power dynamic not present because I was in a space AkiraChix had created, and invited me into? Was it something to pay even more attention to, as one of three mzungus there? Is my assumption of this power dynamic reinforcing that power dynamic? Have I used the term “they” somewhere in this entry because it would be ok in other contexts and I missed the othering it causes in this one? HOLY SHIT THE ANXIETY. Regardless, here are the things I still found sticky, and I hope everyone feels comfortable telling me if I’m wrong, or even simply presenting it in a terrible way:
  • Rhetoric of Lean In: The idea of “just try harder, stand up, etc” is incredibly disconcerting to me. This is a tension between activism (things are going to suck, you’re going to get hurt, but it’s worth it for societal gain) and basic human dignity (you shouldn’t have to “lean in” at the office, as a woman. You shouldn’t have to, anywhere). This happens in the weird time between legal equality and normalized equality. But is Lean In different, in this cultural context? I heard many women speaking of men whose verbal representation had changed after street harassment exposure, and of fighting to have their voices heard, and it now being understood as culturally normative in some spaces. In short, because this idea doesn’t work for my circles, does it mean I need to bring it up here, and what does my bringing it up mean in larger contexts?
  • Tension of timeliness and inclusion: The “successful/productive” technologist is also perceived as a timely one, a value instilled by the Global North, which is in tension with those with less time or access to transportation, who spend longer in traffic and are subsequently 30 minutes or two hours late to any endeavor. This was hard for me because of my own temporal anxieties. There has been a shift in Kenya in the year I’ve been gone, across the groups I’ve spent time with, with more value now placed on timeliness. I don’t know what this means, and I don’t have the language to speak about it.
Finally (have you made it this far? holy wow), I had the honor of being invited to sit on the closing panel of “Securing Women’s Spaces Online.” The video will be up eventually, but the prezi follows. I encouraged the re-writing of social scripts/memes to not include attack nor rockstar martyrdom (common in hacker circles, and a script I’m concerned about being transmitted), and to remember that homophiliy is easy but serendipity is why the internet seemed/seems so wonderful.

Teaching People to Fish

When people tell me that Cartesian systems are optimized, I want to laugh. Of course they are, but we’ve optimized for the bits we know about. We’ve focused on optimization of output, not on optimization of adaptability. And the Quest for the Upper Right Quadrant (aka Capitalism, aka the Singularity, aka any overly simplistic idea of infinite growth and eventual overall simplicity) is always about output. In systems in which the power distribution is also hierarchical (aka, the ones we’ve got), people are not empowered to deviate from set tasks to cover those unknown parts. This is why the idea of innovation and entrepreneurship is so fraught. To some, it’s about empowering for adaptability and connection, for gap filling. For others, it’s about hurry up faster to that upper right.

Which brings us to this article I referenced a bit ago as abhorrent.


The following comments are worth looking at, as well.

Please Do Not Teach This Woman to Fish

After all, which economy is more productive — one in which every single person is an entrepreneur, or one in which a minority of entrepreneurs employ the majority of people?

To understand why, consider a common-sense question: How big can a business be in a rural village? There aren’t many customers there, and incomes aren’t very high either. A business would have to serve several villages to start creating jobs in any significant numbers. Now, consider rural women with families. They may be reliable repayers of loans, but they’re much less mobile than single men. Single men can move to cities, or at least cover a lot of ground in the countryside, in an effort to win new customers.

Of course, these jobs won’t always go to the rural women helped by microfinance programs. Microfinance programs may be one of the best ways to help them, short of having their children take jobs in cities. Nor are these jobs necessarily the ones that fulfill the social goals in the mission statements of Western nonprofit organizations. But they are the kinds of jobs that brought hundreds of millions of Chinese out of poverty and could someday do the same for Indians, Haitians, and Congolese. In these countries, the quickest way to escape poverty is likely to be via bus to the nearest city for a manufacturing job. Hundreds of millions of economic migrants know this, but so-called antipoverty experts are just beginning to understand it.

Two things in this that bring out my “are you fucking kidding me” reaction.

  1. I find it distracting and ridiculous when untenable living situations are equated to financial poverty, and focus only on the funds, not on the conditions which the funds MIGHT alleviate. It’s possible to work and still be miserable. Wage labor rant. Being slowly crushed by capitalism (or communism!) rant. Capitalism is but one way to attempt to interact, not the only way. Sure, it’s good at propagating ideas quickly, at fast iteration, etc, but too often it leads to:
  2. The idea that we have a hierarchy as a necessity in any business. That there are employers, and there are those who do the shit jobs to keep things running. We are all humans, we are all equal, and it is just as possible to find joy and honor (or misery and bitterness) in driving a taxi or gutting fish as it is to find the same in leading a multinational business or making the internet work. To insist otherwise is to discredit the experience of millions (billions?) of people. To want to reinforce the idea that those jobs are actual shit is to actively demean everyone doing them.

No business, organization, relationship is dependent upon power structures being in place, where some work is “more important” than other work. A business, organization, and relationship where all parties are encouraged and expected to examine, innovate, and contribute is one which is adaptable and successful. It is one which is scalable in a complex and networked world. So yes, teach that woman to fish. Better yet, ask her to teach you. She’ll catch more than you ever will, with all your business and economics training.

Weaponized Social

I want to give special thanks to Meredith (@maradydd), Sam (@metasj), and the Berkman crew (@berkmancenter) for help in parsing all these complicated ideas. I’m forever grateful for our conversations.

The existing harms of social scripts we ran while in smaller, geographically-constrained groups are being amplified due to network effect. Tiny unchecked errors, scaled, become large harms as people find ways to exploit them, in life just as in software.

I propose we hold a 2-day event to understand “weaponized social” historically, tangentially, neurochemically, and technically — and to arrive at ongoing ways of addressing them. These challenges are not new, they are simply arising in space we consider new. Given the erosion of trust online, I see meeting in person as vital to rebuilding trust. You can suggest when and where the event takes place via http://goo.gl/forms/2iBJbHXD5E

Context

There was a time when the hacker and academic circles I run in had the default assumption of “it’s better to have your idea broken by your friends than by someone else.” The implicit assumption being that we’d build even better ideas, together. I *hate* that loving dissent is disappearing from my corners of the internet, when I used to dream it would spread. I hate that there’s a vanishing chance I can reasonably assume a trolling comment online is social commentary from an yet-to-be-known compatriot dealing with the same bizarre issues of a system that I am; but rather must now deal with such as a potential precursor to having to leave my home based on legitimate death and rape threats. I hate that some of my intelligent male-shaped or neuro-atypical friends are scared to join conversations online for fear of being severely and permanently ostracized for slight missteps. I hate that some of my intelligent female-shaped friends feel unwelcome online – yes, because of “trolls” who often happen to be self-male-identified, but ALSO  because of an incredibly strange practice of women belittling each other. I hate that I only know how to speak to these issues in a gender-focused way, despite knowing damn well race and class come strongly into play, and having the sinking suspicion that cohorts don’t feel safe calling me out. I hate that nearly all my lovely friends of all genders feel unwanted and unsafe because they and others happen to be organisms interested in sex, and respond to culturally indoctrinated shame (in response as well as in self-assessment) by pinning problems on the tangible other, building self-fulfilling prophesies of distrust and violence. And I hate that we’re driving each other off pro-social paths, making taking an anti-social one more likely. I’m sick of these social scripts we’re auto-running, and I’m set on returning to lovingly breaking my friends’ ideas, and us examining and strengthening those ideas together. Please join me in this act for this event, the surrounding ideas, and the rest of life.

Since online conversation is currently so focused on gender divides, let’s look at that for a moment. This proposed re-scripting is complicated by women being socialized to understand men, to reach out to them, to be accommodating. In a desire to NOT run dis-equalizing social scripts, we as female-types are instead falling into scripts of victimization and back stabbing/”you’re doing feminism wrong.” I’d consider the former set worth embracing as human, the latter to be consciously left to the wayside. Those socialized to be masculine have social scripts they’re bucking and/or selecting, too. Scripts about being protective, and reliable, and strong. Scripts about being stoic, and angry, and omnipotent. But such re-scripting is entirely doable, and we should hear from people about why these cycles happen, and how other disciplines have escaped cycles and built new scripts. Attendees will be trusting me that other attendees are here in good faith, a meatspace web of trust, and that means attendees will be vetted. We will talk about difficult things, and we will set an example of doing so with an interest in begin tough on ideas but kind to people. There will come a time that we can expect every human to stand open but unwavering; but personal, cutural, and institutional histories matter. Violence across these has left a wake of torn-down individuals, and in this space everyone will be expected to be kind.

The re-writing of scripts has proven powerful and useful in other spaces. There are communities in conflict zones which refuse to adopt the identities of victim nor aggressor, instead providing pockets of increased stablity in tumultuous geographies. They do this not out of pacifism, but because that particular conflict doesn’t work for them. We see things like Popehat emerge to offer a way out of victimhood and isolation in being targeted by unparsable legal threats. We see groups like Strike Debt question entire financial structures, providing paths to visible solidarity in otherwise isolating systems. Others have shown it is possible to forge new paths, many in more dangerous and complex situations than what we face. Let’s learn from them.

If you’d like to contribute suggestions to who should be invited to speak, examples to look at, or even helping with the event itself, please be in touch!

Continue reading

Open Source Cadavers

Written by @Willow Brugh, with feedback and general awesomeness from John Willbanks, Sam Klein, and Michael Stone. Additional props to Adrienne and Sands for edits, and to Fin and Matt for kicking my butt into delivery.

In loving memory of my crypto-loving, open-access enthusiast, and occasionally suicidal friends. We will build more open worlds with our corpses. I just wish you would have held off for more unavoidable causes.

Early this year, yet another friend of mine up and died. There was of course a mess of things that had to be figured out. It wasn’t just the traditional things of cleaning out her house (I wasn’t around for that part) or figuring out the funeral (Viking in variety). It was new and interesting technical and moral turmoil of getting into her hard drive, questions of “should we even?”- her prolific music and authoring contributions rivaled by her extreme privacy. It was seeking the edges of her far-flung pockets of internet community to notify them personally, racing the deluge of social media notifications, not wanting them to find out about her the same way I found out about my grandmother – before the familial phone tree had reached me, a peripheral friend calling me based on a facebook post from my sister. A morbid seismic wave.

While I don’t have any control over how others plan for (or don’t) their demise, I have a say over my own. I can show my care for people dear to me my own compulsive, facilitating way by being sure they find each other as they find out, and in making sure information and knowledge I have to offer continues to be released under open access, even if I’m not there to do it. From doing humanitarian and disaster response (and just a general “awareness of the abyss,” as my mother used to tell my vast and angry younger self), I have had to face the looming possibility of my own death head-on. The networked reality that brought those strange new questions and moral quandaries for my friends’ deaths can instead be used to carry forward care and knowledge. This is a sort of guide for the bits of postmortem planning the internet and most lawyers have missed. It’s not complete – I’ve run into some interesting blocks and quirks, around which I’m eager to collaborate with others.

This post is less about things like wills (what happens to material possessions, who doles it out, and the like) and living wills (if you want to be kept on life support etc) – although I’ve added the templates I used to the wiki associated with this post as it includes digital artifacts and more awareness of gendered pronouns than other bits of the internet. This write-up focuses on specific aspects for Open Access and encryption enthusiasts. Brace yourselves for a morbid entry. Know I’m peachy keen, and being an adult about things, not in danger of harming myself or others. If you are in danger of harming yourself, please say as such directly, and get help, rather than indirectly through things like estate planning. It should be possible to speak about death without fear – that’s what I’m doing here. I hope you can hear it (and act) from a similar place.

I’ve divided components up into documents, accounts, notifications, and people. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means I only have to worry about keeping something up to date in one place — a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people become close to me, or exhibit destructive behavior, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. Continue reading

Paths to Better Futures

We’ve started telling people how they are expected to act. That’s a phenomenal start. We’ve started making it clear that there are paths to justice, in the case that those expectations are not met. Also great. But I don’t feel like it’s enough. Often, issues are forced into a boolean framing, with only a boolean response. Either something is dismissible, or scorched earth. And so many things go unaddressed, and the few things that aren’t are either viewed as “how did we wait so long?!” or “that seems like overkill.” The former continues to vilify the perpetrator, and the later vilifies the person(s) on the receiving end.

If we simply kick out anyone who messes up, we end up with empty communities, and that’s not a new future.

If we don’t hold people accountable for being abusive, we end up with rooms filled only with those who love their pre-existing power, and that’s not a new future.

League of Legends is the best example I know of how to deal with this properly, or at least better than usual. If you are an asshole to someone, you go to Tribunal. They do this because there are rarely “problem players,” but most incidents are “players having a bad day.” And if you got rid of all those players, you wouldn’t have anyone left. If you put a bad mark on “problem players” or some other permanent thing, people simply recreate accounts, and are pissed off while they play in the beginner brackets, and then you have a toxic environment for the newcomers, only the toxic stick around, and then the whole place sucks.

Let’s bring this to issues of gender and sexual advances specific to our geek communities. It cannot be fun for most of the people who are causing these problems. Just think – you try to make a pass, it either isn’t well received or seems to be but then later it turns out wasn’t, and no one is telling you what is actually expected. Except sometimes that you’ve done something wrong. Of course yes to consent! Yes to enthusiastic consent! But women especially are also socialized to give what is seemed to be desired. For safety. For society. Etc. And so consent is the first essential step along a path, but is not the end-all-be-all.

What I’m proposing is this: if someone violates a safe space agreement, or continually makes people in the community feel squicked, or whatever else… we need to have a path laid for them to get better. And if they’re not willing to take that path, we know they’re doing it because they’re an asshole, and not because they’re socially awkward. Awkwardness can be because of a commitment to consent, and is no excuse for many of these issues. Just ask someone I’ve dated. I am not smooth.

So what are those paths? Restorative justice seems to be a useful alternative for urban communities with generations disappearing into the legal system, but which has been co-opted by the privileged to avoid accountability. I’ve asked around about programs for people who are abusive to “get better,” with little luck. Are there paths already out there? Do we need to create them? Please do comment here, let’s have a discussion.

Technology as a Means to Equality

Originally posted on Geeks Without Bounds

I had the honor recently of speaking at the Médecins Sans Frontières (MSF / Doctors Without Borders) Canada Annual General Assembly (AGA). While an international organization, each location has a very large group of people who work on decision and policy for their specific group for the year – usually in the AGA. These are three days of talks, debates, and dinners. The international group defines a focus for the discussions, but it’s up to each pod how they act around that focus. This year, it was how MSF is using (or not) technology. While most of the talks were internal, the bit of time I was there the topics ranged from telemedicine to social media in conflict zones. They asked I come speak about technology and disaster/humanitarian response.

The gist of the talk I gave (15-minute video follows) is that technology is a means to more equality in the world – a way to be inclusive. That there are many people in the world who want to use their technical skills to help groups like MSF out, but we absolutely need them at things like hackathons. That there are many people with voices and connections to the globe now, and that groups like MSF have a responsibility to listen to them directly. And that technology, when done in codesign, will be aligned with what their needs are, and is an ongoing relationship, not a one-off delivery.

Again, most all of the discussion happened behind closed doors, but I recorded my laptop and voice while I did my own presentation.

It seemed to go pretty well. We’re keeping the conversation going, and I’m excited for more points of connection. You can follow the prezi at your own pace here, and see the full #vizthink for the panel here.

Some other highlights:
The other exceptional panelists and myself advocated for F/OSS, especially in light of security, for inclusion. MSF is rightfully anxious about infiltration, ways to be transparent, and usability. Ivan and I re-emphasized open source communities, that people are committed to examining (and re-examining) code for backdoors and optimizations. That open source has been around for decades, that most technology is built upon it, and that it’s a way of performing mutual aid between countries and cultures.

Someone asked in Q+A about using things like Facebook and Twitter in the field, if use could cause problems. Problems of location or images suddenly not being as private as you thought, and kidnappings and killings resulting. Or, what if things just get hacked by governments or by insurgents? My response was that MSF, with all their weight and influence in the world, has a duty to insist upon things like Coercion-Resistant design. Insist that these companies treat their customer bases humanely.

Mutual Aid and The Crowd

Months ago, one of my friends at the Naval Defense University sent me an article from Scientific American on how social media is making crowds less predictable. It hit a nerve with me, my response being that “social media makes crowds more predictable to themselves.” The article talks about uprisings in various countries, popular choice, and collective action. It also cites this argument, shoehorning collective action into hierarchical framework, indicative of its missing the point.

Matthew Salganik, Peter Dodds, and Duncan Watts conducted large-scale experiments to investigate the effect of the strength of social influence on collective action. People were given a list of previously unknown songs from unknown bands. They listened to the songs and downloaded them if they wanted to. In the independent condition, people did not see other people’s choices. In the social influence condition, people saw how many times each song had been downloaded by others. The collective outcome in the social influence condition was more unequal. That is, popular choices were much more popular under social influence.

Crowds are only less predictable to the outside. They are becoming more predictable to themselves. Not talking about ranking, not talking about decision, simply speaking to awareness and therefore paths to action. This, to me, is related to the core disconnection in disaster response between official response’s view on social media/The Crowd as a resource to be tapped for situational awareness, and the mutual aid of The Crowd as self-organization. Formal organizations tend to think of The Crowd as an input function to their workflows. Their concerns therefore revolve around verifiability, bad actors, and predictability. A manifestation of this are the self-mapped roads in remote places via Open Street Map being grumbled over for not fitting into the data hierarchies of official responders. That is not the point of the maps being built.

These are identity politics on the scale of a community. These are people using a tool to their own ends, to support themselves, to gain better understanding of their world, not as a resource to be tapped. It is a group of people talking to itself. If institutions exist to serve collective purpose, their role here is to provide institutional knowledge (with awareness and self-reflection of bias), guiding frameworks (possibly), and response at scale (upon request). In this way, we can benefit from history and iterative learnings while escaping paternalistic ends.

Which brings us to responsible data practices. If data must be collected on a group of people, either ambiently  through things like the Firehose or directly provided, the output should be useful to those people. This is the difference that makes ethical digital response seeking the integration of multiple datasets to have better situational awareness, and what the NSA does. For instance, if you’re collecting information on homeless shelters and the movements of homeless individuals, the information should be able to be used by those folk to self-organize. Else we’re just recreating the systems we’ve been trying to get away from. We’re even making them more robust with new technologies, the biases hidden away in algorithms.

As a crowd comes to know itself better, the intelligence can becomes an embedded, rather than external, component. We start to see many eyes on the bugs of society.

Topic: Revolution and Technology

Livebloggers: Sasha, Nathan, Erhardt

Today, we’re joined by Stephan “tomate” Urbach from the activist group & think tank Telecomix, which works to circumvent surveillance, and to promote internet freedom and human rights. During the 2011 uprisings in North Africa, Telecomix activists helped to bypass technologies of censorship and communication-interruption. They currently work to shuttle videos and other information safely out of Syria. Urbach is a Telecomix member, and has acted as their de facto spokesperson. He was a member of the Pirate Party in Germany, and worked for the Berlin Pirate Parliamentary group from 2011 until February 2014.

http://prezi.com/embed/kzyc1pmrynri/?bgcolor=ffffff&lock_to_path=0&autoplay=0&autohide_ctrls=0&features=undefined&disabled_features=undefined

Vizthink by Willow Brugh

Tomate joined telecomix in 2010, during the uprisings in Egypt and Syria. He worked in parliament for 2 years. He begins with an overview of Telecomix:
Telecomix (read about them here) isn’t a formal organization, it’s a network of activists who convene and disperse as needed. They’ve done this several times over the last few years. In 2006 in Sweden, there was a telecommunications bill, people gathered and formed Telecomix. After the telecom package was stopped in Sweden, they fought the data retention directive across the EU. At this stage, many people joined to do research and activism work. When the Egyptian uprising kicked off, Telecomix was galvanized into action: specifically, when Mubarak shut off the internet. They decided to figure out how to get access to folks in Egypt even in that context. They set up phone lines that people could use for dial up access. They set up around 300 lines for people to connect to the Internet. Weeks after the net went back up, tomate got an email from a young man in Egypt thanking them for providing access to be able to share their thoughts. This is the kind of thing Telecomix loves.

They see censorship, and internet blocking, as a crime.

Some people have asked them whether the regime might have used their lines. That’s possible, but they don’t know that. Back at the time, Telecomix talked about technology as neutral, although today tomate doesn’t believe that anymore. Then Syria happened. They found that internet surveillance in Syria was planned since 1999. They also found that Blue Coat, Siemens, and other companies were involved in providing surveillance technology. When they released this information, Western countries were publicly enraged. Telecomix suggested export controls, but no one was willing to go that far. The US department of commerce did investigate Blue Coat and their affiliates for selling to Syria after the trade embargo. ComputerLink a middleman company was fined $2.8 million by the department of commerce.

Telecomix found that every message, on every network, was monitored, and every phone call was recorded, both mobile and land line. They also found that people went missing after writing posts on SNS. Telecomix was in touch with Syrian activists on the ground. At the time, they felt clear about who was ‘good’ and ‘bad,’ now it is much less clear. They provided secure networks, software, and servers for activists on the ground. They made comms “as secure as possible,” but never promised 100% security: “whoever says this is a jerk,” tomate tells us. Some Anonymous people apparently promised full security, and local activists believed them. That’s a problem. Phone lines were then blocked in Syria. Calls to tomate’s personal number were blocked (listed online), calls to other Telecomix numbers were also blocked. When Telecomix released the Blue Coat files, revealing how it worked, the blockade system became better: Iranian telcos joined the Syrian telcos.

Around this time, Tomate received a call from German intelligence warning him to watch out for Syrian activities in Berlin. They found that the surveillance toolbox was installed in Syria, Egypt, Beirut, and Kazakhstan. But it was not always correctly configured. Telecomix has evidence, although not enough to publish, that Western companies are selling to dictatorships. They think that’s wrong, and want to generate a public outcry.

Throughout this process, Telecomix has learned a lot. Access blocking, traffic monitoring, deep packet inspection, laws that forbid certain kinds of speech on the internet. These are things that dictatorships are known for doing, not “free” countries. They also learned that hacking the backbone in Syria was great and everyone loved it. But if someone from Africa hacks the EU backbone they’re a ‘terrorist.’ So it depends on your point of view.

Telecomix also learned that the surveillance methods used in the West are the same tools dictators use. Everything from everyone is monitored. In Germany, they started to scan mail at the post office: front and back side. Started to scan postcards, and not sure what they’re doing with the scans. In EU, there’s a fight against data retention, and we won, since a court said data retention can’t be performed like that. It’s not a full victory: the court said data retention is OK, just has to be bounded in certain ways. In Europe, public is not ‘public.’ For example, Tomate thinks if he posts on his FB wall, it’s public. But many think that publicity is platform bounded.

Germany has one of the hardest privacy and data laws, the EU is potentially adopting this. It may be good for users, but not so much for companies providing services. For example, when Google did Street View, many houses are blurred based on people saying ‘not mmy house!’ But the same houses are available on Bing, and on other services. So Google now isn’t updating street view Germany, and the images are several years old. So Europeans think about data as ‘mine,’ even when it’s been posted publicly. We have a database of people’s personal information including salary, and we deleted it because of privacy concerns.

Snowden documents revealed that the ‘conspiracy’ of surveillance was actually true. For example, in 1998 we knew that the Echelon program might exist. Hackers knew it existed, but were called conspiracy theorists. Now there’s a public outcry for EU action against the NSA. tomate doesn’t think it makes sense: what should we do? Embargo trade with the USA? There’s an initiative to ban intelligence services from. In Germany this was specificaly because of an national intelligence failure to capture (neo)Nazis.

German intelligence, The exterior intelligence, supports the NSA, then gets internal surveillance on Germany, which they are not allowed to collect domestically. These exchange programs exist all over the world in contravenience with privacy laws. The only proposal they can think of against surveillance is to make it more expensive. The more encryption people use, the more expensive it will be, for example. One idea is to create as much spoof data as possible, such that intelligence agencies will spend all their time processing the spoofs. Another idea is to rebuild networks with new hardware and new protocols that will be less amenable to surveillance.

But as in all places, no one wants to pay for something. If you get paid as an activist, no one will consider you a proper activist, which means that activists have to work for free. If you look at what the NSA, Brits, French, Germans, and everyone else are doing, it’s the same as what the dictatorships are doing. What makes a democracy? People can say they don’t want this surveillance, but the government does not listen. Tomate is focused on the European debate about surveillance, not so much the NSA debates in the US. But he hopes that some day we can ban intelligence surveillance in democracies.

Slides: http://files.herrurbach.de/doc/framing.pdf

Q&A

Ethan: Tell us about how Telecomix thinks of itself differently than other organizations in the space. During the blackout in Tahrir Square, lots of organizations got involved like Tactical Tech, also based in Berlin. Telecomix has always had a certain amount of secrecy around it. How did this come about and how does Telecomix see itself fitting amongst other organizations in the space?

tomate: Telecomix does not see itself fitting into anything. This is important. It is a space for exploring things. At the point, people can join Telecomix. The aura of secrecy is wrong; it’s one of the most open/transparent groups I’ve worked with. The problem is that many journalists struggle to understand Telecomix—they group us in with Anonymous, which is wrong. They builders and rebuilders, rather than attackers—they don’t take sites down using DDOS. One characterizing is the Yin to Anonymous’ Yang. We also do a lot of theoretical work in the space, differing us from other activist organizations. We are also not people that work in public wearing masks. We do try to secure our members who are not in a position to go into the public because of the work they do, and others take the role of the public face of the organization.

Sasha: How do you make decisions as an organization? Like who represents the organization to the public?

Tomate: We do not use formal consensus-building processes because they don’t work. We run an IRC do-ocracy. Admins do have too much power.

Willow: Can you tell us about Cameron?

Tomate: We have a bot named Cameron. We can ask her questions and get responses. We sometimes make her the public face for interviews, including a few that were published in Swedish newspapers. They asked for a photo and we sent a picture of the old mac that she was running on. She is crypto-sleep because we forgot the password to the harddisk. But now we have no one to ask what we should do. She was a symbol for us for a long time.

Cameron Kerry :http://en.m.wikipedia.org/wiki/Cameron_Kerry (former General Counsel, US Dept f Commerce) I was encouraged by the data of a “Data Schengen” but over a month ago, the EU parliament voted that the European Commission should come up with a protocol for keeping EU data within national borders? How do you change that strong sentiment?

Tomate: Currently, Deutsche Telecom markets itself as keeping your data in Germany, which is false, it doesn’t. The idea of keeping the data national is nice, but it doesn’t solve the problem anyway. The privacy activists in Germany and Europe believe that if a law says something like this then it works, but that’s not right. They always ask the state to handle it, but they can’t. We are working on new protocols and projects ourselves to handle privacy. We rely on infrastructure form the 70s and we can’t rely on it much longer. We hear in Europe that the US created the internet and they can control it.

Ethan: In response to surveillance people are looking for many paths. But HTTPS (Heartbleed) was broken for years, and it was open source code. Tell me why you are optimistic that we are going to solve this problem with better network design.

Tomate: People in Germany are being paid to do open source code audits. They are funded through donations right now to work on this issue. We need to do more audits and pay people to do them, multiple audits for software are needed.

Sasha:

Tomate: We need export controls on technology that can be used as a weapon. We also need to rebuild our networks with the state. But these are two different things, building the network and sending out products to dangerous people.

Ethan: Who would you want to enforce those export controls? I think the export sanctions push is a really messy one. We’ve seen a lot of cases for export controls are taking really useful tools out of people’s hands.

Tomate: I don’t have solution for that question. For instance, my country is selling tanks to dictators. So I wouldn’t trust them to sell any hardware to countries.

Eleanor: The only reason we have strong crypto is because we regulate code as speech and thus it can’t be sanctioned under export controls. The only way we got PGP out there was a loophole in ITAR rules using a free speech definition. I would rather use a limited liability laws rather than export controls.

Sands: Is there a lot of discussion at Telecomix about mesh networks for activists?

Tomate: As I said, Telecomix is not really active right now. I live in Berlin, which is the main city for mesh networks. There are discussions for how to activate local networks and then bring them online later.

Dalia: I think the public is missing in this discussion. What I’m not hearing is how we can have people change things. I’m hearing that it’s happening in IRC channels. But many people aren’t adopting the necessary technology or talking about it.

Tomate: In Europe, we have many crypto parties currently. It’s amazing how many people are coming. People get the tool as well as the explanation for why we need to do this right now. We show them how they affected by the surveillance. It helps that we now have the evidence of this, so people are listening.

Yu: After hearing about the decision-making process, how do you manage your brand?

Tomate: Don’t break anything. If you break down communications it is not a Telecomix thing. We don’t try to manage it, but we explain what we do to new people in the IRC channel, explain it is we try to do, the same we respond to the media. Anyone can use the logo, and people do, but it hasn’t failed yet.