What is a Digital Asset?

This blog post is a part of an ongoing series for Networked Mortality. If you’re new to the series but not to the blog, here is a primer post about the approach I’m taking. We’ve already covered using password managers for estate planning. Here, we get into what a “digital asset” even is.1

Do you own your Flickr photos? What about the ones you have on Instagram? Can you pass them on to someone when you die? Should you be able to pass on the license of Photoshop you purchased? Access to your Instagram account? I think you should be able to, but right now companies and the law disagree (in very unclear ways).

How do we define a digital asset?

We define digital assets as: content, files, resources, or accounts that you have created, purchased, or primarily store in a digital format.

Some digital assets you OWN, some you LICENSE (access/accounts/software). Digital assets you own you can bequeath or pass on to others. Those you license may not be transferrable.2

But how did we get here? Does it match with what other frameworks (legal and otherwise) define digital assets as?

What is an “asset”?

Continue reading

Looking for Help

Want to help me survive while I help with crisis response? Now there’s a way! I launched my Patreon recently. I’m excited to do community response as backed by the community.
Screen shot of my Patreon page

I still feel a bit strange, asking the community to support my work in this as I’m also looking for more regular work gigs. If you see any program, project, or product management positions that I might be a good fit for, please do let me know. My work portfolio website, designed by the amazing Jen Thomas, has been live for a bit.
Screen capture of my work website. Includes types of work such as facilitation and teaching, as well as logos of organizations for which I have worked, including the Digital Humanitarian Network, Aspiration, NetHope, and Aspiration.You can also contract me for facilitation gigs specific to employee retention through Vulpine Blue.

An Open Letter From Civic Hackers to Puerto Rico & USVI in the Wake of Hurricane Maria

We are a group of civic developers committed to supporting Hurricane victims for relief & recovery who have helped with the software development and data analysis of Hurricane Harvey and Hurricane Irma primarily in Texas and Florida. In the wake of Hurricane Maria, we want to help Puerto Rico and the U.S. Virgin Islands in the same way. Devastation has already occurred in Puerto Rico and the USVI, and we’re here to help in the response and recovery pending from Maria.

But, we won’t jump in without your permission. These places have a long history of imperialism, and we refuse to add tech colonialism on top of that.

Here’s how we might be able to help:

Rescue

Sometimes emergency services are overloaded fielding calls and deploying assistance. Remote grassroots groups help take in additional requests through social media and apps like Zello and then help to dispatch local people who are offering to perform rescue services (like the Cajun Navy in Houston after Hurricane Harvey).

Shelter updates

As people seek shelter while communication infrastructure remains spotty, having a way to text or call to findt the nearest shelter accepting people becomes useful. We can remotely keep track of what shelters are open and accepting people by calling them and scraping websites, along with extra information such as if they accept pets and if they check identification.

Needs matching

As people settle into shelters or return to their homes, they start needing things like first aid supplies and building materials. Shelter managers or community leaders seek ways to pair those offering material support with those in need of the support. We help with the technology and data related to taking and fulfilling these requests, although we don’t fulfill the requests directly ourselves.

If you are interested in this, please let us know by emailing me (willow dot bl00 at gmail) or finding us on Twitter at @irmaresponse and @sketchcityhou.

Here are other groups lending aid already (maintained by someone else).
If you’re looking to jump in an an existing task, Humanitarian OpenStreetMap Team already has a tasker active for helping to map the area for responders and coordination.

An Open Letter From Civic Hackers to Puerto Rico & USVI in the Wake of Hurricane Maria

I am working with a group of civic developers committed to supporting Hurricane victims for relief & recovery who have helped with the software development and data analysis of Hurricane Harvey and Hurricane Irma primarily in Texas and Florida. In the wake of Hurricane Maria, we want to help Puerto Rico and the U.S. Virgin Islands in the same way. Devastation has already occurred in Puerto Rico and the USVI, and we’re here to help in the response and recovery pending from Maria.

But, we won’t jump in without your permission. These places have a long history of imperialism, and we refuse to add tech colonialism on top of that.

Here’s how we might be able to help:

Rescue

Sometimes emergency services are overloaded fielding calls and deploying assistance. Remote grassroots groups help take in additional requests through social media and apps like Zello and then help to dispatch local people who are offering to perform rescue services (like the Cajun Navy in Houston after Hurricane Harvey).

Shelter updates

As people seek shelter while communication infrastructure remains spotty, having a way to text or call to findt the nearest shelter accepting people becomes useful. We can remotely keep track of what shelters are open and accepting people by calling them and scraping websites, along with extra information such as if they accept pets and if they check identification.

Needs matching

As people settle into shelters or return to their homes, they start needing things like first aid supplies and building materials. Shelter managers or community leaders seek ways to pair those offering material support with those in need of the support. We help with the technology and data related to taking and fulfilling these requests, although we don’t fulfill the requests directly ourselves.

If you are interested in this, please let us know by emailing me (bl00 at mit) or finding us on Twitter at @irmaresponse or @sketchcityhou.

Here are other groups lending aid already (maintained by someone else).
If you’re looking to jump in an an existing task, Humanitarian OpenStreetMap Team already has a tasker active for helping to map the area for responders and coordination.

Parameters of Social Interaction

What does equality look like? How do we know if we are getting there?

This is the question I asked to open my talk at SHA 2017. It is also the question carried with me as I walked into CtK.Campfire. Both aimed to look at how to mitigate the polarization of human interaction in a digital age. The talk looked at the infrastructure of human interaction, and the retreat embodied some of the best ideals towards action. I’ve written two blog posts – one about each event – but they occurred temporally and intellectually adjacent. You can find the post about CtK.Campfire here.

The talk at SHA2017 (the Dutch hacker camp) was called “Weaponized Social.” WeapSoc is a project in which Meredith and I invested heavily through 2014 and 2015. She has gone on to write for Status451 on an extension of the topic area. I’ve continued to frame bits of my work in this context but have generally not kept up. It’s some of the most intellectually stimulating and emotionally draining work I’ve ever done, and that includes disaster response in the field.

A background assumption for this talk is that the effects of violence become less and less apparent to an observer of a single instance as we push the edges of “acceptable behavior” into being more aligned with human rights.

Violence is defined by the World Health Organization as “the intentional use of physical force or power, threatened or actual, against oneself, another person, or against a group or community, which either results in or has a high likelihood of resulting in injury, death, psychological harm, maldevelopment, or deprivation”, although the group acknowledges that the inclusion of “the use of power” in its definition expands on the conventional understanding of the word.

Example: seeing one person hit a non-consenting person is (pretty) easily defined as violence. Seeing one person say “your a dumb bitch” online to another non-consenting person isn’t as easily defined as violence (it’s often instead categorized as “conflict“). We have to zoom out to see that the receiver isn’t able to be online any longer due to thousands of similar messages in order to see it as the violence (in the form of depravation to opportunity or psychological harm) it is. Here’s just one example:


I don’t want to limit what this person says, but I also have a right not to experience him saying it, if it detracts from my ability to be online. As the quote says, “your right to swing your fist ends where my nose begins.” How can we bridge this sort of contention at scale?

To zoom out like this, and to take action at a systemic level, we luckily have Lessig’s four forces for social change. As the infosec crew which was the audience at SHA is largely skeptical of law (excepting the EFF), of social norms (“don’t tell me how to act”), and that I’m skeptical of markets being able to solve problems of inequality, we are left with architecture/code.

In the talk, I asked this question:

“Do we want to take a scientific approach to equality, where we tweak our infrastructure in explicit ways to see if it changes how people are interacting?”

We, as the creators and maintainers of online spaces have a responsibility to strive towards equality in the ways available to us. How can we do this without surveillance and control of speech? We change the architecture of the spaces. The crew of Weaponized Social (namely, TQ at the SF event in May 2015) started to lay out what the different parameters of social interaction are. Such as, how many people can one account be connected to, how far a message can travel (through timeouts or limits to re-broadcasts), of if an element of serendipity is introduced. These are toggles which can be changed, sliders which can be moved.

If we change these things, we can see how/if architecture changes the way we interact. The social sciences point to us being deeply (tho not solely) affected by our environments. By changing the architecture of online spaces, we could see how it changes how we interact. Who feels safe to speak by taking part in the act of speaking. We can then make better choices about our individual instances and realities based on those results. We now have one more set of tools by which to examine if we are progressing towards equality, without impinging on the individual right to speak. I hope you make use of these tools.

Cultivate the Karass

I came away from CtK.Campfire thinking about how anarchists might be aligned with Republicans in more ways than expected… and possibly more so than to Democrats.1

I was invited to Cultivate the Karass: Campfire based on two previous friendships and a workshop at Personal Democracy Forum. After seeing Lori talk at PDF about her son, Jake, and about carrying his work forward in cultivating relationships between “loyal antagonists,” I had to go to their workshop session later in the conference. One of the few truly interactive sessions (and that includes the one I was a part of called “Apocalyptic Civics”), I loved the use of spectrograms and deeper political discourse. Also, Seamus and Clarence were there! My friendship with both of them has been forged out of somewhat oppositional circumstances (one documented here). So when they suggested I attend the CtK.Campfire event, I listened.
5 people prioritize breakout session topics by applying stickers to post-it notes with topics listed.22 people – Republicans, Libertarians, Democrats, and one Anarchist (hey that’s me!) – gathered over three days to bond, to engage in facilitated civil discourse, and to learn to see each other as humans.

It worked.

After we had built trust over our life stories, and Not Talking About Politics, and some amount of beverages, we were able to move into more in-depth conversations. “Is our Democracy broken?” “Race relations and white people” “Equipping institutions for a VUCA world.” We did a spectrogram around whether or not statues of Confederate leaders should be removed. After much discussion, we came to a shared view – we should have to face our terrible history2, and that ideally some sort of process would be available to remove or relocate to museums the current glorification of those who wished to continue dehumanizing others. There was acknowledgement that democratic processes exist for this but has been ignored.

I want to tell you about one conversation in particular. Of all these conversations, the one that I both gave and received the most from was “What if it all goes wrong?” As in, what if we do put removal of statues to a vote, and the vote is to leave them where they are? What if Trump gets a second term? What if…

The conversation was posited by Cameron (Republican) and attended by Kyla (Democrat), Sarah (Republican), and me (Anarchist). We agreed that we shared a concern about a consolidation of power, and that respecting the systems we’ve built when power is imbalanced would lead to greater and greater oscillations of “now it’s my turn” from one party to the next. We agreed that a polarization in civil society could lead to increasing violences, and with diminishing ability to recover from imbalance. We had an interesting conversation around the vacuum of power currently occurring in leadership positions meaning a loss of infrastructure maintenance (let alone creation). We agreed government had been bulky, but that the current rate of displacement was dangerous.
7 people sit around a campfire in the sun. The image is taken through some trees from above.We even agreed about what “what if it all goes wrong?” might look like – our leaders becoming more radical, a continued shift in the Overton Window towards less and less civil/human-rights behavior, a validation of lack of leadership also leading to a lack of social cohesion, an increasing lack of faith in our electoral process and the census. I brought up that the world had already gone wrong for many people. I talked about cops not intervening in fights at protests in Berkeley. This was considered too specific by some folk in the group, but it did lead into a conversation about what “antifa” was.

“‘Antifa’ means ‘anti-fascist,’” I said. “I’m anti-fascist, but I don’t agree with destroying things.” “Ah. That is the ‘black bloc.’ They also identify as anti-fascist, but view meeting violence with violence and occasional destruction of property as a necessary component of fighting fascism. There was ‘civil discourse’ in pre-Nazi Germany, but the movement was still successful. As much as we’ve talked about how well Germany has done about monuments honoring the dead rather than the killers, there are still many Neo-Nazi groups there, which are often kept at bay by antifa/black bloc folk who are willing to literally fight them back. Some folk in the US think this is also necessary.” “So I’m antifa but not black bloc.”3

Then we got into problem solving. “Oh no,” I thought to myself, “this is where it will all go wrong.” But I was wrong. We agreed that America’s strength is in its plurality4. We agreed that Obama had normalized the use of executive orders which Trump is now running with even more. “Obama built the weapon that Trump is using,” as Cameron said. Since Republicans are invested in diminishing the size of big government, did they have a plan to reduce the run-away power of the executive branch that Democrats might be able to sign onto? Why yes, yes they do. It’s called the REINS Act and it limits what an executive order can do. It would be a huge step if Democrats were to pick this up (it’s already passed the House, but needs the Senate) as an act of good faith and self-awareness that it’s the amount of power someone has, not just how they use it which is at the core of the problem. Of course I need to read more – here’s a writeup from a “liberal” source, and one from a “conservative” source5.
We also talked about having open primaries, if the American people are smart enough to handle ranked voting (I think we are), and the problems of gerrymandering.
The Cultivate the Karass cohort stands and sits around a fire at night.But here’s what I walked away with: a new knowledge that my new conservative friends have been fighting for the same thing I’ve been fighting for as an anarchist in crisis response – getting more decision-making power into the hands of local populations. That although I align more with the rhetoric of liberals and radicals… the people doing the work within government to actually devolve power are those I never considered myself to be aligned with. I still think there are more responsible ways to care take the newest and most vulnerable in that process, but now I know I have some loyal antagonists with whom to debate the best path forward.

Footnotes

  1. *cough* Horseshoe Theory */cough*
  2. Facing History And Ourselves, anyone?
  3. I recognize I didn’t get into the more blurry lines of how Antifa is a movement which is often more comfortable with violence as a tool than explicitly nonviolent groups. But that was not the topic of the session, so I didn’t want to detract too much. For more information, start here.
  4. I’d of course argue that the human race’s strength is in its plurality, but America is currently considered a subset of that, so sure.
  5. Which has me thinking about anarchist reviews of policy as a useful project, as if I didn’t have enough projects on my plate…Anyone want to adopt this one?

Algorithms for Enforcement or for Data-Driven Introspection?

Many organizations (official or grassroots) have objectives which exceed their capacity, i.e., they have fewer resources than they think they need. In order to either better place limited resources, or to improve processes generally, some of these organizations have taken to collecting data about their objectives and use of resources. For a drought management agency in the Horn of Africa, this might have to do with the location of agripastoral communities and their access to water. For a school district in Michigan, this might be test scores or (better yet) teacher attendance. By documenting historical data and changes linked to actions taken, an understanding of whether or not a goal (equal representation, access to resources, etc) is being reached is more grounded in reality. Data, like all things, is political. What data is collected, how it is collected, where it is stored, to whom it is visible, and who gets to act on it can re-centralize power or become mechanisms of accountability and community empowerment.

This post explores how police departments have been collecting data about the location and types of arrests made as a way to track how much crime is happening in a certain place, as a way of placing their limited resources (cops and their weapons) more accurately (to their eyes). But of course their data has to do with arrests, not crime, and their definition of crime is still based on enforcement of law. This use of force, already untenable, can be seen by some as “unbiased” when based on data. Here we explore why this is not only inaccurate but will further embed systemic racial bias, while maintaining that data collection and subsequent action can be a useful thing when led by the communities themselves. Here, we specifically address questions of large sets of data against which algorithms can be run, and how we can make choices to maximize benefit and mitigate damage of these operations while transitioning from the world we’re in to the world we want.

I anticipate the audience for this blog is more acutely aware of things like state-sponsored surveillance, malware used by abusers to further control others, or circumvention tools than the usual crowd. But there is more to the technology and abilities of networks than just these components. Let’s talk about the data that networks generate, the algorithms by which that data is navigated, and how data is acted upon. One end of the arbitrary spectrum of action is enforcement – an external party exerting force in order to maintain the rule of law. The other end is data-driven introspection – an individual or group of people generating data for tracking changes within their own control. This article explores how to understand and increase the likelihood of just actions taken based on data and algorithms. Continue reading

Interfaces between formal and informal crisis response

I’ve long been interested in the question of how formal and informal groups interact in crisis. It is my proverbial jam, as no one ever says.

Basically, it boils down to this: official agencies are resourced and have predictable structures, but are slow and lack visibility to an affected population’s needs. Emergent groups in an affected region are by definition beyond their capacity to respond and are not trained in response, yet they have acute knowledge of their neighbors’ needs and can adapt to dynamic environments. While I’m still working on the long-form expression of these ideas, an opportunity to prototype an interface came up recently through the Naval Postgraduate School, Georgia Tech Research Institute, and a place called Camp Roberts.

Camp Roberts

There’s this decommissioned Air Force base near Paso Robles called Camp Roberts, where interoperability experiments are conducted quarterly. Only the engineers/implementers are invited to attend – no C-level folk, no sales. Each year, one of those four is focused on what the military calls “Humanitarian Assistance & Disaster Response” (HA/DR). I have some deeply mixed Feelings about the military being involved in this space. I respect my friends and cohorts who refuse outright to work with them. I see the military as an inevitable force to be reckoned with, and I’d rather take them into account and understand what they’re likely to be up to. Finding this place to plug different pieces of a response together without the sales folk or directors present, to actually test and play and fail is a glorious opportunity.

A Game

I’ve been working on the opportunity to build a game around a formal/informal interface for years as a way to explore how collaboration would fill gaps for these different actors. This project is called “Emergent Needs, Collaborative Assessment, & Plan Enactment,” or ENCAPE. The idea is this: both sides to that equation lack understanding of, and trust in, the other. A game could externalize some of the machinations and assumptions of each side, meaning a demystification; and creating things together often leads to trust building (that’s a reason why I’ve invested so much in makerspaces and hackathons over the years).

My informal friends were into it. So were my formal friends. But in order to know we could have any impact at all on organizational change, support had to be official from the formal sector. This took years (the formal sector is resourced but slow, yeah), but the pieces fell into place a couple months ago and the chance to build a game was born.

The People

It was of course vital that a wide range of viewpoints be represented, so the call was broad, but still to folk I knew would bring their whole Selves, be able to trust each other, and would be interested in the results of the game research. Folk from informal response, official agencies, nonprofits, and private sector were all invited. In the end, were were joined by Joe, Galit, Drew, Katie, Wafaa, John, Seamus, and Conor. Thank you all for taking time for this.

What We Did

We actually ended up meeting in San Francisco for our 3-day workshop for hilarious reasons I’ll disclose in private sometime.
On Sunday night, some of us got together to get to know each other over beverages and stories.
On Monday, we went through a Universe of Topics and visualized the workflows for our various user types. I did one for the Digital Humanitarian Network, Wafaa did one for Meedan’s translation and verification services, Katie covered a concerned citizen, etc. What were our pain points? Could we solve them for each other? We overlapped those workflows and talked about common factors across them. Different personas have access to different levels of trust, finances, and attention. They use those to build capacity, connections, and decision-making power. How could we use these common factors to build a game? How could we explore the value of collaboration between different personas?

Participants broke down workflows into one component per sticky note, laid out in linear fashion. Wafaa and Willow stand at the board while others talk through potential overlaps.

Drew took this

On Tuesday, we reconvened and started the day off with a game: Pandemic. This got us thinking about game mechanics, emergent complexity based on simple rules, and how to streamline our game. Individuals presented on what their game might look like, if left to their own devices. We explored combining the most compelling parts of those games, and started a prototype to playtest. It ended up being a counting game. Hm. That can’t be right.
A very few sticky notes indicate various steps in the game. These have all since become wrong, although we wouldn't have been able to arrive where we are now without first having gone through this.
On Wednesday, we drew through what the game play might look like and troubleshot around this shared understanding. It was closer to modeling reality, but still took some counting. We drafted it out to playtest, narrated through parts which didn’t yet make sense, and took notes on where we could improve. The last bit of the day was getting a start on documentation of the game process, on the workshop process, and on starting some language to describe the game.
Cards and arrows are hand-drawn onto a whiteboard in order to visualize the logical steps or game mechanics necessary to move through one round of the game. Cards scatter the tabletop in a variety of colors, and with drawings on them. We’ve since continued cleaning up the documentation and refining the game process. And so dear readers, I’m excited to tell you about how this game works, how you can play, and how you can (please) help improve it even more. Continue reading

Secondary effects of mood stability

Content warning: diet, food

I’ve spent most of my life mitigating what many people call being “hangry.” That is to say, whenever my blood sugar got too low, I would become incapacitated. I couldn’t solve challenges, I got mean in ways I simply am not the rest of the time, and I couldn’t track more than one thing (at most) at a time. I dealt with this by carrying snacks with me everywhere to prevent the onset, and I would get really quiet if I felt the symptoms setting in so I wouldn’t harm people around me. The more active I was being, the more often I would need to eat. To be someone who gets hangry (AKA “hypoglycemic”) is expensive, time consuming, injurious, and distracting. But it has been reality for all my life that I can remember.

There’s this human I’ve been dating for awhile named Reed. We like having conversations about difficult topics and going for long bicycle rides together, among other things. And I started to notice that he could know that he needed to eat, but still be a totally pleasant person and/or get the rest of a ride in before eating food. We talked about if that had always been the case for him – it hadn’t – and what had changed – his diet (keto).

“Seems worth a shot,” I thought to myself.

I’ve never been on a diet before. I’ve always been pretty physically active (although even more so in recent years) but haven’t paid attention to my food intake. I know I am rare in this, and give many thanks to my parents for a healthy home (no scale, no beauty magazines, healthy food only around, structure around sweets) in this regard. So I was worried about making it stick. I’m now 2 months in, and my mood has indeed stabilized.

This has been great. But there are also some second-order effects of this shift worth talking about. Continue reading

Password Managers for Estate Planning : a checklist

Now that we’ve covered what a password manager is, why they are useful for estate planning, and what specifics to consider while setting up a password manager for estate planning, the final step is to execute on the plan. What follows is the last part in this blog series: a checklist for implementation.

1. Select a password manager.

The available password managers and their features are changing over the years, and people more technically and security-savvy than I am are continually doing high-quality analysis of the ones available. Rather than give an overview, here are some aspects you should consider when selecting from those currently available:

  • Does it run on your operating system? You are likely viewing this blog entry on a Windows PC, an Apple computer or phone, or an Android device. While most password managers will run on all of these, it is important to verify.
  • What is the cost? Some have a one-time cost, others have a monthly fee.
  • Does the password manager have sharing built in? Some even have sharing specifically for estate planning built in now!
  • Can you use it? Is the interface clear and easy to navigate? If you’re not going to use it, there’s no point in getting it.

2. Set up your password manager

  • Install your selected password manager.
  • Go through the set-up process.
  • Make sure your password for the password manager is memorable or that you have saved it physically somewhere.
  • Try it out with a few sites you commonly use, without changing your passwords for those sites yet.
  • If it sticks for a few days, start migrating more passwords into the manager’s vault.
  • If it sticks for a of couple weeks, start changing your passwords to more complicated ones, which will be stored in the password vault.

3. Notify folks of your setup.

  • Select the people involved with your digital estate planning based on the previous posts in this series as well as your own guidelines.
  • What do you want these folk to do with your digital assets? Make a list of actions and who should take those actions.
  • Define when you want what actions to be taken, and how they’ll know.
  • Describe how to find and unlock the encrypted password file to those folk.

4. Do a test run

All this overhead only matters if it works. Set up a time with the person you’re trusting with your password, plus possibly another trusted person or two, with whom to walk through the process. Make sure it works, and that everyone knows what’s going on. Then drink tea and have cookies!

Not ready to do this? That’s ok! Instead you can…

Inventory the most important accounts you use in another way, such as a spreadsheet. Ideally you will store this printed out and left in a lockbox or with your attorney, rather than on your computer.

Extra credit

If your life is compartmentalized (maybe the folks in your book club hate the folks in your cribbage club, or your work life and personal life have different levels of security concern and different people need to have access upon death or incapacity), it might be worthwhile to “tag” the accounts in your vault for those different compartments. Various people might be assigned to take actions in specific groups, rather than one person issuing a blanket statement to all social networks and account providers. This takes regular upkeep and additional planning which might seem overwhelming, so don’t embark upon this until/unless you’re completely comfortable in the rest of the setup!