The Social Disaster Cycle

Originally posted on the Aspiration blog

This blog entry written with substantial input and support from Meredith L. Patterson.

Aspiration has taken on Weaponized Social as an extension of our commitment to solidarity with our community and to equality in our interactions with and through technology.

Better Tools for a Better World

Our work to support more people in their existing efforts by making use of technology has a peripheral effect of bringing historically marginalized populations into online space. And as the ever-larger online community welcomes new people, we have not only an opportunity, but also an obligation, to do so with more intent and understanding than society has tended towards in the past. When we speak of online intimidation or harassment, regardless of the perpetrator or recipient, culturally we struggle with issues of accountability, enforcement, and identity.

It’s a Disaster

We’ve had a few events (NYCNairobi, and San Francisco). From these, and ongoing conversations on the mailing listthe wiki has been expanded and cleaned up. It now includes clearer indicators of how to make use of it, as well as a restructuring into the same framework as the disaster cycle. The disaster cycle falls into preparedness, response, recovery, and mitigation. More details on these, along with the added aspect of being an extreme event, can be found on the wiki, with projects and resources listed below each aspect of the cycle. Event notes and project specs continue to also be hosted on the wiki. What are not found on the wiki are academic resources (which can be found in this literature review compiled by friends), nor organizations and initiatives (which Tactical Tech recently curated here).

This approach was taken because many conversations in this space are derailed when discussion of intentions and tactics are conflated. For instance, #hoodsoff revealed the identity of those both in positions of political power AND who were members of the KKK using the same tactics which those same activists might find untenable in regards to doxxing of visible feminine gamers. Or that the tactics used against Brianna Wu and Chris von Csefalvay match at a pattern level that goes beyond that specific instance of escalation. This is where Weaponized Social seeks to explore and intervene, because human rights apply to everyone, including ourselves and whoever we might perceive to be our enemies. “Lead by obeying,” as the Zapatistas say.

Who Watches those Watching the Watchmen?

On the same note of rules applying to everyone equally, including the rulers, and of making the conversation clearer, the Weaponized Social crew has also been ruminating a fair amount recently on how accountability and enforcement factors into all this. When people treat each other in unethical ways, our current social systems indicate bringing the law (and associated enforcement) to bear on those breaking the rules. But we are currently facing a long-overdue distrust in enforcement, especially in police. So just as we’re running into the network effects of negative human interaction, we also have no successful foundation to build upon to mitigate through enforcement. The conversation is therefore further confused by asking who should be holding whom accountable, how do we know that’s being done fairly, and how does enforcement happen? Some are turning to community, some to law, some to software platforms, some to police, etc. Each of these may become a viable option. It’s more likely to be a combination therein, and it’s important to think about the historical patterns of enforcement as well as the repercussions of unchecked social errors.

What’s Missing?

The glaring hole which was surfaced by restructuring projects and pieces into this framework is a complete lack of recovery (it’s also totally possible that I’m just not aware of it. If you know of any, please send them our way!). Preparedness and response are necessary and worthwhile aspects to cover, but we offer no long term support or recompense to those who have been affected by the weaponization of social so as to make them whole again. Even legal and policy interventions seem to linger in only half of the cycle, when arguably institutions are responsible for longer term stability (leaving the network to adaptation). This is heartbreakingly familiar, as it’s the same in response to offline disasters.

Additionally, as the conversation expands and deepens, more individuals and organizations are beginning to see their responsibility in encouraging healthy interactions. A few requests have now come in for guidelines in making tools and platforms which take into account these issues. We’ve started to describe the various vectors of online communication which might be fiddled with, and we welcome your feedback!

What I’m excited about is how much of the Weaponized Social crew (most notably, Meredith and TQ) has focused on the mitigation aspect of the disaster cycle. How can we change the very way we do things, to become more pro-social for everyone? We welcome your perusal and contributions to any of the projects on the WeapSoc wiki, but these are the ones I’m most excited about.

What’s Next?

What’s up next is a discussion with Meredith et al to historically, theoretically, epicyclically, technically explore the weaponization of social interaction, such that we can arrive at better interventions. To start, we might discuss the history of liberal social justice and identity politics social justice, cognitive biases, and network effects. You can tune in December 18th at 11a PT / 2p ET by registering here.

We’re also starting to explore a code sprint on some of these tools. If you’d like to get involved, please let us know!

Trustworthiness in response

Originally posted on the Aspiration blog

When I came on with Aspiration in January, it was clear in my soul why the joining up made sense. But not many folk in the disaster and humanitarian response circles I run in pay much attention to the overlap of activism and response. It took some time to make it clear and explicit. Back in May Anne from Hirondelle asked for a vizthink for a talk she was going to give, and for the staff working on the project to have a common view of all the moving parts of the program. Anne works in the overlap of response and journalistic integrity1, and has far more experience in both DOING and in EXPLAINING this overlap. I hope that by showing you our drawing and by talking about her case study this overlap can become more clear to even more people.

Getting the Word Out

Hirondelle works in radio programming in austere areas. Radio programming can be for music. It can also be to get information out – information about health, politics, and community action. Radio can be used to propagate messages inspiring violence through rumors or outright instigation. Messages can also be used to disseminate messages of truth, care, and empowerment. Radio broadcasts were used to coordinate after the Haitian earthquake. It’s a consistent medium used in a lot of places to a lot of different purposes.

Communication gets more expensive the further away from a radio tower you are, as outreach has to happen about the radio programs even existing and/or install additional towers. Anne also pointed out that “it’s not just a question of expense. If you’re out of range, you’re out of range. Radio silence.”

Enter Bluetooth. The consistently increasing number of people with phones, including the Nokia 1100 and other ‘dumb’ phones have started exchanging media files via Bluetooth. Even when there isn’t any internet, it’s still possible to transfer files directly from one device to another2. But people can only transfer what they’ve already got. And so Hirondelle works with a local women-run NGO Media Matters for Women to set up places called Listening Centers, where media programming is delivered by bicycle. People socialize, listen to a program together, and take the audio files with them to share with others3

Messaging and Trust

Mostly, these Bluetooth ‘podcasts’ are about maternal health, domestic violence, and education4. Hirondelle’s ongoing dedication to development and humanitarian response (“slow” disasters) means they’re trusted in most of the communities they’re in. Which means when conflict hits, they often continue to be trusted. Trust is more complicated for other groups, as organizations like the UN might also set up a radio tower and offer programming during extreme times, but their transient nature, close alignment with ‘official’ voices, and not being in the local language inhibit the deep bonds associated with trust from forming. Local radio stations which are in the local language often end up aligned with (or coerced by) those instigating violence. Hirondelle being independent while still close to the communities they serve, with newsrooms that reflect the diversity on the other side of the microphone, means the trust in groups like Hirondelle is deeper. That’s vital for effective response5.

This long term investment in community also means that when something as terrifying as Ebola breaks out, there are infrastructural ways6 to distribute trusted messages. The female journalists in their network used the same capacities built up for their physical and digital safety when speaking truth to power for making informed choices during the Ebola outbreak. The skills to think critically about messaging, how to check in with community members, and how to disseminate trusted knowledge outward to others also applied in both contexts. Even the messaging and response to Ebola is politicized, with who people go to for help depending on networks of trust. And in places like Guinea, Liberia and Sierra Leone with long histories of civil war and authoritarian governments, official messages about how to deal with the spread of the disease weren’t trusted – even if the information they contained was right. Our means must match our purposes, and vice versa, and the capacities we build in calmer times bolster our resilience when the world gets complex and dangerous. By taking care of our present selves, our future selves are better off.

Footnotes

  1. Which has become activist, strangely/sadly, as truth-telling becomes a radical act.
  2. The ability to transfer files to each other directly – something inhibited on many devices through firmware.
  3. Copyright (or Copyleft) activism is vital to our ability to create media which is our own / held in common, so we might share it outwards. Can you imagine “oh, this program might help you teach your abusive partner that what they’re doing isn’t ok, but you can’t share it to your sister who might be experiencing the same thing because DRM.” Yuck.
  4. They also work with locals to create the programming, and have all sorts of amazing stories about how their programming has changed relationships and cultures, but sadly that isn’t the point of this blog post.6
  5. Being trusted by those wishing to disentangle or opt out of conflict has to do with also having a history of truth telling, especially to power. Activists do this. So do efforts like Hirondelle. Ergo, Hirondelle is activist in a very subtle way.
  6. Mesh networks can’t be disaster-only, because people won’t trust them and won’t know how to use them.
  7. Means of production. People are not just consumers of media or of technology… to co-create is an act of empowerment which more closely strikes at the root of societal issues.

What’s the Catch at Chaos Communications Camp

Originally posted on the Aspiration blog

Chaos Communications Camp, like the World Cup, is something so special that it only happens once every four years. It’s a few thousand hackers, artists, and activists camping together in Germany. We come together to share skills, stories, and ambitions, including how to get into space and provide secure internet in austere places. There’s brightly colored hair everywhere, and a slowly improving gender ratio, and stickers on laptops, and a gig of data to your tent. There are disco balls in trees, and competing soundscapes of German techno and old rock and roll or hiphop, and a giant sparkly rocket ship called Fairy Dust. I camped with Norton’s Obscure Phoggy Embassy (the manifestation of a few Bay Area hackerspaces).  Aspiration was invited to join a conversation called “What’s the Catch?” put together by Nat from Open Technology Institute with Josh (also from OTI), Kate (from Tor), and me. Our topic was an ongoing debate in information security (and other) circles: is it possible to take money from governments and corporations while maintaining a project’s integrity? Aspiration asserts that decision making power explicitly remain with the project team, that larger ideals and the ability to implement towards those ideals is a tension worth continually checking, and that it’s vital to interact with funders like the human beings they are (with whom one can have honest conversations). We also think that, while some funding has taken meaningful steps to remedy this, most organizations set up a competitive environment in which it’s difficult for fundees to collaborate and build together.

You can watch the video here, but what follows is a bit more fleshed out overview of how we think about funding, especially from governments and large corporations. A slightly more personal (and ranty!) version of this entry can be found over on my blog

A guiding principle on this convoluted issue is best expressed by a quote from the Zapatistas, one of the few groups to maintain a governance structure after their revolution: “caminando preguntamos,” which roughly translates to “we walk while asking questions.” It can mean that we should move, but analyze as we do. That we should be in both critique and solidarity with each other.

Here are some of the questions to ask when considering funding sources…

…when considering projects in general, but also the funding sources potentially associated with them:

  • Does this project have a finite objective (such as legalizing gay marriage) or is it a municipality requiring ongoing upkeep (like the internet should be)? If it’s a municipality project, the harder it should be pushed for detachment from systems which inflict continual low-grade violence through things like debt or brain drain, as issues are more thoroughly embedded into long-term systems. When the goal is finite, it’s likely more comfortable to request money from organizations with overall objectionable objectives. Where things get interesting is where it’s possible to take finite steps within a municipal project.
  • How can this project be co-opted? Just because the people you’re directly working with are acting in good faith and are skilled, does not mean that the larger organization of which they are a part will be trustworthy. Check your paperwork – be sure you maintain (open) intellectual property, that messaging is clear, etc. Also think about how self-actualized people might co-opt a fairly standard tool for their own purposes. We advocate strongly for trusting the frontline community, rather than seeing them as placid lambs, for instance.
  • How can the adversary be engaged? In peace building, just like in hacking, the adversary shouldn’t be ignored, but should be in mind while designing the project – up to and including having them as a part of the project. If we don’t go to such drastic measures (when wise to do so), change doesn’t stick, and/or we create oscillations in the opposite direction. The Do No Harm framework is useful for this, showing how to take the Hippocratic Oath from medicine and bring it into resource deployment and project design when you have to worry about the social ramifications.

Assumptions to make:

  • Technology should always be in service to nonprofits (and by proxy, their end users). Change does not happen overnight, and nonprofits are organizations which help us transition away from the political and economic models which we must nonconsensually deal with on a regular basis currently.
  • No one is perfect. That doesn’t mean we’re worth giving upon. One might feel same way about many organizations, locations (including home – it’s easy to think of disaster and humanitarian issues as ones which happen far away), and even governments.
  • We need a pluralistic approach. We don’t expect what we do to work for everyone, nor vica versa, but it is possible for us to learn from each other. The challenges we face are massive, and there isn’t such a thing as a silver bullet. Many things in combination are what comprise, and shift, systems.
  • We need to trust people to be able to make their own decisions, rather than being paternalistic. People are not naive like we sometimes want to think they are, blind to trust in an organization because a logo appears somewhere. We are not their protectors. We are in the same mess as everyone else, doing the best we can. That is still glorious and worthwhile.

We want to challenge you to consider your projects and assumptions, and what it would take to “win.” And how do we transition to that world? We walk while asking questions.

How can humanitarian response be decentralized?

Originally posted on the Aspiration blog

For a long time, it wasn’t possible to include everyone’s voice in planning or decision-making without impossibly large amounts of time. There was no way to listen, at scale. So aggregation and centralization became common, especially in times of urgency, even with the troubles these tend to cause.

But now, with the technologies we have, we can *listen*, in high resolution and in high fidelity. But technology isn’t a silver bullet. We also need the political will and the personal values to make that happen. With Aspiration’s new Digital Humanitarian Response program, we get to support some of the rad people willing and able to make these movements happen. In May, we hosted the Humanitarian Technology Festival at MIT. The Digital Response Wiki provides resources and notes, and here are some top-level highlights from the event:

Disaster and humanitarian issues don’t happen in a vacuum

Notes from the Humanitarian Technology Festival

Groups like Public Lab help lay the groundwork (both socially and technically) for fast-cycle disasters, via their ongoing interaction with communities around environmental justice. This also provides scaffolding for handing off responsibilities after an extreme event. Kathmandu Living Labs, a group committed to mapping the infrastructure of their geography, is an excellent case study in this. When the Nepal earthquake hit, they were able to jump into action quickly due to pre-existing Open Street Map communities, workflows, data infrastructure, and (most importantly) social ties. Kathmandu was then capable of making use of (and maintaining) the updated data after the fact. Simply by being (and being allowed to be) active in affected communities on a day-to-day basis, organizations can support communities in becoming more resilient to disasters.

That said, preparing for extreme events before they happen can help mitigate the severity of impact on people lives. We explored the idea of games to make what might be considered dull more fun. No need to start from scratch (though that can be stimulating as well!). Climate Centre makes such games, and publishes them openly over on their website.

We already have much of what we need

One of our spectrogram statements was, “We already have all of the technology we need.” While we were divided in our responses, we acknowledged that the ability of groups of people to make do with what they have in disaster is astounding. And our preferences apply here technically as well as ethically. Distributed, federated systems both for technology and for communities/governance are more resilient than centralized systems (as well as addressing human rights in general). There are a few of these rad systems being built, NYC Prepared being one of my favorites.

Data and consent are deeply linked

Data use with populations that are vulnerable (based on their history, their current circumstances, or both) is still a big question, but not one we need to face on our own. OpenGov, Missing Persons, and other transparency-related initiatives have figured an awful lot of that out, and we should take note. Additionally, while consent is different in high-stress situations than in long-term advocacy campaigns, it should still be a strong consideration in any plan or intervention.

We looked at the Framework for Consent Policies which came out of a Responsible Data Forum in Budapest, and suggested advocating for a “notify this set of people in case of emergency” embedded into social platforms, similar to Networked Mortality or ICE contacts in some phones. This way, people would be consenting and determining who would be their contacting associates in case of disaster (unlike what Facebook recently did). Consent is a component of accountability, both of which highlight how frontline communities might be the architects of their own rescue.

Accountability is just as important in precarious situations as it is in everyday life, if not more so

Accountability is sorely lacking in humanitarian aid and disaster response. Fantastic organizations exist to track where spending is going, but money is often considered misspent. Frameworks exist for deploying aid in ways which alleviate, rather than exacerbate, conflict and tensions. However, these frameworks and mechanisms are still sometimes insufficient, as even well intended groups remain in regions for decades while populations become reliant on them, rather than becoming self sufficient.

Rather than come up with an external group to hold response groups accountable, we figured the frontline community could state whether or not initiatives are working, and those reports could be sent directly to the response organizations, their donors, and relevant constituents. This factors in strongly to the Dialling Up Resilience initiative grant of which Aspiration is a part (Yes, it’s spelled with 2 L’s. They’re Brits). More on that soon.

You can find more thorough notes from Humanitarian Technology Festival on (you guessed it) our wiki. Reach out to us if you have any questions about this ongoing work. Contact us here: humtechfest@aspirationtech.org / @willlowbl00

Forays in creating a healthier online ecosystem

Originally posted on the Aspiration blog

Weaponized Social is an emerging program that seeks to support a healthier online ecosystem. Since our last gathering in New York, we’ve been to Nairobi on May 2nd, hosted WeapSoc SF in our office home in San Francisco, and facilitated a highly relevant event, the International Workshop on Misogyny and the Internet in MY home base of Cambridge, MA. We’ve continued to build out the Weaponized Social Wiki with notes from conversations, projects, and possibilities.

Weaponized Social in Nairobi

In Nairobi at AkiraChix, we further refined the checklist for making safe space and started two projects: FaceOff and Trolling the Trolls. FaceOff provides space for highly visible people to interact in a nuanced way, posting back to short-form spaces, so as to ask their constituents to be better balanced. This is a response to the very real occurrences of politicians calling their online followers to take action (sometimes violent) in offline space. Trolling the Trolls seeks to use language patterns from sock puppet accounts to find those accounts sooner, and respond to them before they have a negative impact on the speech of marginalized individuals online. Yvonne, who suggested this, also introduced me to ZeroTrollerance which was then represented by Peng! Collective.

San Francisco’s attendees on May 16th and 17th at the SF Nonprofit Tech Center were highly influenced by the book Thinking, Fast and Slow, which explores the two systems we have for thinking: one which is based on intuition (and assumption) and on which we most often depend, and one which is based in logic and analysis which comes with a cost to use.

Often, when in difficult exchanges online, we default into the intuitive to protect ourselves. This prevents us from reaching any different understanding of an encounter than what we came to it with. To cope with this, we devised the Introspection Bot, to help you break from whatever mental rut you’re in and consider the wider picture. We also developed the idea of redirecting dog piles of outrage into actual long-term efforts to address systemic problems. We performed some heavy lifting around dissecting what aspects of sociality go into platforms, including privacy control and friend count, which we offered to the Center for Civic Media’s Uncomfortable Networks.

One major difference in perspective between these two events was that freedom of expression is so enthusiastically valued in both the American and internet freedom circles I run in, but in Kenya, just as in other places, concern over hate speech inciting violence is very real. This tension is difficult to navigate both in everyday life and in the microcosm of a session. This is one reason why I was so thrilled when Aspiration was asked to facilitate the Berkman Center’s International Workshop on Internet and Society (IWoMI). Here, there was an international crowd committed to understanding and preventing misogyny (a bit more specific than Weaponized Social events, but focus can be a good thing!) online and off.

We made explicit space for, though still struggled to ingrain, non-Western perspectives in our conversations, including with one conversation about reporting abuse on platforms. A number of memorable things took place:

I continue to be honored and thrilled at the vast amount of brain power and heart the powerhouses of human beings involved in this movement are extending to solve these problems. To have such an international, intergenerational, and human-rights-supportive group set on making the internet a healthy place gives me hope we might even make it happen.

Digital humanitarian response: Meanwhile, in Nairobi…

Originally posted on the Aspiration blog

I was in Nairobi, Kenya, at the end of April participating in various happenings across humanitarian response spaces. From interactive gameplay to resiliency indicators, here’s how we focused attention on frontline communities through digital means.

Facilitating gameplay to model for resource allocation

Game materials to indicate water points

I attended the 9th International Conference on Community-Based Adaptation (CBA9) with the Red Cross/Red Crescent Climate Centre in Nairobi on April 24-30. I was there to facilitate a game which simulated the citizen reporting of water resource status and distribution in an area to better inform allocation.

The game stems from Taarifa, a free software project that has been widely deployed to collect, visualize, and map infrastructure information. The Climate Centre is well known (and appreciated) for their distillations of complex climate, environmental, and social systems into fun-to-play games, which are available on their website.

Often, these games start simply, and then complexity is layered on as each set of rules is understood by the participants. There are additional challenges when designing a “pervasive game” like this one, which is a game that extends play out into the wider physical world. All the details needed to be written on one piece of paper and accessible across languages, and players need to be able to join at any point, and without a facilitation start-session. Phew. We did our best, and you can view our materials here.

Day one was focused on re-creating the system as it is now – everyone had to find the rest of their community, their malfunctioning water points, and engineers. Some would know the problems in space and time, but others had the tools to solve them when and where needed. How to link problem and solution? Communication was intermittent, if it happened at all. Information sharing was consistently one step behind of the facts.

On day two, we introduced the ability to SMS update and query, thus enabling a faster and more efficient match between broken pumps and the engineers who could bring tools and parts to help communities have safe water. People now only needed to find each other to make exchanges, and they were able to document and share in real time where water points were and what the status was.

How’d it go? It was confusing… just like life. There was slow uptake… just like life. Only one group used the technical assist (i.e., SMS)… just like life.

This game showed what we think we already know— that having a solid technical tool doesn’t mean anyone is going to use it. But as community-based adaptation practitioners, we often need to (re)learn what we kind-of know, and ask some tough questions, such as ‘why are available solutions not being fully embraced by those who can allegedly benefit from them?’

In Tanzania, the Taarifa team had a chance to both chat with end users about what their hopes and concerns were, as well as work with local software developers to localize the interface. That activity alone increases buy-in, as well as increasing appropriateness.

This game created a space for conference participants to see the same lack of uptake in their own behavior that pervades climate and development work, rather than it being an externalized problem space to grapple with during program design and implementation. It highlighted our collective need to better tap into the social systems around digital solutions, and rethink how to enable genuine embracing by those who can benefit from them. The Climate Centre will be taking the game forward into Zambia, where climate change and infrastructure are already under intense scrutiny.

Supporting community-driven indicators of resiliency

We are taking part in an initiative to build locally-driven strategies for resilience to extreme events such as drought. Our focus within the “Global Resilience Challenge” is on local indicators, or measurements, of resilience.

“You get what you measure,” as systems thinker Donella Meadows once said. When we talk about indicators of resilience, things like gross domestic products, income, and education come to mind. But that doesn’t work for everyone in all places. Actually, we often find that “more” (higher GDP, more trade, etc) is a dangerous synonym to describe “better” when we are trying to evaluate resiliencey.

In response, a few groups have worked on measuring other things, such as the happiness index. Similarly, what matters in resilience is that frontline communities are the ones describing what their own environments look like, what is important to pay attention to, and laying boundaries in how to interact. If communities have the ability to determine their own indicators and carry out subjective measurements within open data frameworks, large-scale understanding can also happen across communities.

What do we even mean by subjective? My favorite “subjectivity” delineation occurs around “framed” and “open-ended.” For example, we could set out a frame of the top five things we think are related to resilience, and then ask community members en masse how they rate their own standing on those things. Or we can ask people what they think is important to their own resilience. Both are subjective indicators.

To make this project happen, we are collaborating with the Overseas Development InstituteNational Drought Management Agency (Kenya)GeoPollDataPop (Harvard Humanitarian Initiative and MIT Media Lab), CGIAR Research Program on Climate Change, Agriculture and Food Security, and the Center for Civic Media. We’re reading a lot, talking to community partners, and beginning to ramp up various ways of both examining what questions we should be asking as well as how we’ll ask (SMS surveys, household surveys, call centers, other). We’ll try some of these things out and meet again in June or July.

Reporting Back from Weaponized Social in NYC

Originally posted on the Aspiration blog

A group of fifteen participants gathered in New York City on February 13 and 14 to discuss the idea of Weaponized Social: the notion that social harms resulting from digital interactions can become dangerously amplified online by the network effect. We discussed what might be done to rethink the ‘social scripts’ that trigger conflict, and how to mediate conflicts as they arise in digital spaces (visit this post to learn more about “social scripts”).

At the event, we recognized that while online interactions can enact harmful consequences, this is a tractable problem; we are in a position to make changes to social scripts in our parts of the world and corners of the web. We understood that many of the things we love most about the internet (e.g., the ability to ambiently connect with long-time friends, to interact (and fall in love with!) strangers, and to vocalize your causes) are also what can make it seem like a dangerous place, where we may be susceptible to harassment or having private information leaked by known or unknown entities.

Weaponized Social NYC

We took the first half of day one to co-create an agenda and to participate in an idea spectrogram in order to challenge assumptions of agreement and convey the diversity of world views in the room. We then dedicated the second half of the day to the common threads across the various issues we were working in. One such shared belief was that rather than creating one-size-fits-all content (e.g., a single deescalation guidebook), we should instead embrace many versions of the same idea being present, for various levels of knowledge, language, and learning styles (think of things like “Drawing for Scientists“).

We also considered how the ways people connect to one another influences their interactions. Calling this session “structures,” it included graph and network visualizations coming into beautifully-illustrated play. We then explored ways of forming and maintaining healthy communities, creating general guidelines to create safe space within defined communities, and to recover if a community has become unsafe.

On the second day, we discussed the more tangible aspects of online scripts, such as:

  • nonviolent communication
  • historical trolling (i.e., trolling pre-online harassment)
  • recovering from unintentional mistakes (yours or someone else’s)
  • nonverbal communication online
  • constructing bridges between disagreeing people
  • solidarity in nebulous groups (what is it to have someone’s back when you’re not technically in a community together? What about if it is an open chat room anyone can join?)

Throughout these discussions, we recognized that echo chambers are to be avoided, but that safe space is also needed for reconciliation, adaptation, and learning. Assuming that a perfectly safe space is also one in which freedom to act is incredibly constrained, we now advocate creating “safe foyers” rather than blanket “safe spaces” (i.e., “Please step over here with me so we can figure out where things went wrong”).

In this model, the safe foyer being unsuccessful would mean bringing in more community members to escalate conflict resolution. We are painfully aware that many abusive people will use back room conversations to quietly continue antisocial behavior, while still seeing that back room conversations are a valuable channel of support for conflict resolution, and we look forward to further examining this tension.

There were many common threads and themes here as well. Such as:

  • Intended audience matters (see also: “Context Collapse“.)
  • Translators between world views are a valuable and necessary (and should be celebrated and rotated in order to prevent fatigue and burn-out)
  • Both historical trolling and non violent communication strive for exploration and emotional maturity for all parties involved (albeit by incredibly different methods)

In each of these, we aimed to include and support neurodiversity, such as those with autism spectrum disorders or with scrupulosity.

The question we will continue to carry forward is: How do we inspire change and self-reflection in our selves and the communities we engage with? To this end, we have a few projects started:

  • Guide for supporting activists
  • Guide in how to ask for critique in a way you can best hear it
  • Self-awareness checklist
  • Guide to wielding the privilege sword
  • Checklist for making safe space (and path-correction when things are going poorly)
  • Guide to expressing nonverbal cues in text-based space
  • Guide to using nonviolent communication among people who use differing empathic styles

These conversations required trust and comfortable space, and we were honored to be housed by the newly opened Civic Hall in NYC’s Flat Iron District. We thank Micah Sifry, a long-time Aspiration friend, who offered this newly established community space around civic tech for the Weaponized Social event. We couldn’t dream of a more appropriate space. Please do welcome them to the geographic and interest neighborhoods when you have a chance.

As we continue moving forward on these projects, we hope you’ll contact us and let us know if you’d be interested in participating in (or hosting!) a future event by contacting weaponizedsocial@aspirationtech.org

Weaponized Social: Rethinking Online Scripts

Originally posted on the Aspiration blog

In the Aspiration ethos, using tools comes second to cultivating and understanding the ecosystem where the tool would live and grow. In practice, this means creating organizational processes, positive feedback loops, conventions, etc., so that when technology is implemented, it is overlayed on existing modes of healthy and sustainable interaction. This year, we began exploring one of the broader and more nebulous ecosystems as it relates to the technology of the internet: the ‘social scripts’ that mediate online interactions.

In February in New York City, participants at the first Weaponized Social collaborated to rethink the scripts that mediate behavior and interactions online. A social script is a way of interacting which is learned and internalized. It is similar to a software script (e.g., “if X, then Y”), but it takes place in the brain and is externalized in social situations. For example, when you walk into a restaurant, a social script is enacted:

  1. A host leads you to your seat and asks what you’d like to drink.
  2. The server brings your drink order, and asks if you’re ready to order food.
  3. You say, “No, not yet.”
  4. You are given more time to explore the menu.

…and so on and so on. If the server firsts asks for a dessert order or if you want to refinance your home, confusion follows as a result of going off-script. One is not born with innate knowledge of ‘how to go to a restaruant’. The script is learned. Although persistent, social scripts are transient and always evolving.

However, social scripts for online courtesy and critique have not kept apace with the rapid evolution of online technology over the past twenty years. The harms of scripts that played out in small groups offline have become dangerously amplified via the network effect. The potential to cascade and amplify makes the harms of scripts more potent. In extreme cases, a social interaction can become weaponized, triggering a negative script that brings life-threatening consequences (think social media comments escalating to harassing death threats and forcing someone to leave their home).

Weaponized Social seeks to explore ways to diminish harmful social scripts through workshops, dialogue, and the creation of actionable and shareable content. On the other side of the coin, we have the opportunity to enforce positive social scripts. It is possible to amplify the healthy, joyful, and serendipitous aspects of online connections.

How to get involved:


Special thanks to Meredith (@maradydd) Sam (@metasj), and the Berkman Center (@berkmancenter) for help in parsing all these ideas.