Teaching People to Fish

When people tell me that Cartesian systems are optimized, I want to laugh. Of course they are, but we’ve optimized for the bits we know about. We’ve focused on optimization of output, not on optimization of adaptability. And the Quest for the Upper Right Quadrant (aka Capitalism, aka the Singularity, aka any overly simplistic idea of infinite growth and eventual overall simplicity) is always about output. In systems in which the power distribution is also hierarchical (aka, the ones we’ve got), people are not empowered to deviate from set tasks to cover those unknown parts. This is why the idea of innovation and entrepreneurship is so fraught. To some, it’s about empowering for adaptability and connection, for gap filling. For others, it’s about hurry up faster to that upper right.

Which brings us to this article I referenced a bit ago as abhorrent.


The following comments are worth looking at, as well.

Please Do Not Teach This Woman to Fish

After all, which economy is more productive — one in which every single person is an entrepreneur, or one in which a minority of entrepreneurs employ the majority of people?

To understand why, consider a common-sense question: How big can a business be in a rural village? There aren’t many customers there, and incomes aren’t very high either. A business would have to serve several villages to start creating jobs in any significant numbers. Now, consider rural women with families. They may be reliable repayers of loans, but they’re much less mobile than single men. Single men can move to cities, or at least cover a lot of ground in the countryside, in an effort to win new customers.

Of course, these jobs won’t always go to the rural women helped by microfinance programs. Microfinance programs may be one of the best ways to help them, short of having their children take jobs in cities. Nor are these jobs necessarily the ones that fulfill the social goals in the mission statements of Western nonprofit organizations. But they are the kinds of jobs that brought hundreds of millions of Chinese out of poverty and could someday do the same for Indians, Haitians, and Congolese. In these countries, the quickest way to escape poverty is likely to be via bus to the nearest city for a manufacturing job. Hundreds of millions of economic migrants know this, but so-called antipoverty experts are just beginning to understand it.

Two things in this that bring out my “are you fucking kidding me” reaction.

  1. I find it distracting and ridiculous when untenable living situations are equated to financial poverty, and focus only on the funds, not on the conditions which the funds MIGHT alleviate. It’s possible to work and still be miserable. Wage labor rant. Being slowly crushed by capitalism (or communism!) rant. Capitalism is but one way to attempt to interact, not the only way. Sure, it’s good at propagating ideas quickly, at fast iteration, etc, but too often it leads to:
  2. The idea that we have a hierarchy as a necessity in any business. That there are employers, and there are those who do the shit jobs to keep things running. We are all humans, we are all equal, and it is just as possible to find joy and honor (or misery and bitterness) in driving a taxi or gutting fish as it is to find the same in leading a multinational business or making the internet work. To insist otherwise is to discredit the experience of millions (billions?) of people. To want to reinforce the idea that those jobs are actual shit is to actively demean everyone doing them.

No business, organization, relationship is dependent upon power structures being in place, where some work is “more important” than other work. A business, organization, and relationship where all parties are encouraged and expected to examine, innovate, and contribute is one which is adaptable and successful. It is one which is scalable in a complex and networked world. So yes, teach that woman to fish. Better yet, ask her to teach you. She’ll catch more than you ever will, with all your business and economics training.

Weaponized Social

I want to give special thanks to Meredith (@maradydd), Sam (@metasj), and the Berkman crew (@berkmancenter) for help in parsing all these complicated ideas. I’m forever grateful for our conversations.

The existing harms of social scripts we ran while in smaller, geographically-constrained groups are being amplified due to network effect. Tiny unchecked errors, scaled, become large harms as people find ways to exploit them, in life just as in software.

I propose we hold a 2-day event to understand “weaponized social” historically, tangentially, neurochemically, and technically — and to arrive at ongoing ways of addressing them. These challenges are not new, they are simply arising in space we consider new. Given the erosion of trust online, I see meeting in person as vital to rebuilding trust. You can suggest when and where the event takes place via http://goo.gl/forms/2iBJbHXD5E

Context

There was a time when the hacker and academic circles I run in had the default assumption of “it’s better to have your idea broken by your friends than by someone else.” The implicit assumption being that we’d build even better ideas, together. I *hate* that loving dissent is disappearing from my corners of the internet, when I used to dream it would spread. I hate that there’s a vanishing chance I can reasonably assume a trolling comment online is social commentary from an yet-to-be-known compatriot dealing with the same bizarre issues of a system that I am; but rather must now deal with such as a potential precursor to having to leave my home based on legitimate death and rape threats. I hate that some of my intelligent male-shaped or neuro-atypical friends are scared to join conversations online for fear of being severely and permanently ostracized for slight missteps. I hate that some of my intelligent female-shaped friends feel unwelcome online – yes, because of “trolls” who often happen to be self-male-identified, but ALSO  because of an incredibly strange practice of women belittling each other. I hate that I only know how to speak to these issues in a gender-focused way, despite knowing damn well race and class come strongly into play, and having the sinking suspicion that cohorts don’t feel safe calling me out. I hate that nearly all my lovely friends of all genders feel unwanted and unsafe because they and others happen to be organisms interested in sex, and respond to culturally indoctrinated shame (in response as well as in self-assessment) by pinning problems on the tangible other, building self-fulfilling prophesies of distrust and violence. And I hate that we’re driving each other off pro-social paths, making taking an anti-social one more likely. I’m sick of these social scripts we’re auto-running, and I’m set on returning to lovingly breaking my friends’ ideas, and us examining and strengthening those ideas together. Please join me in this act for this event, the surrounding ideas, and the rest of life.

Since online conversation is currently so focused on gender divides, let’s look at that for a moment. This proposed re-scripting is complicated by women being socialized to understand men, to reach out to them, to be accommodating. In a desire to NOT run dis-equalizing social scripts, we as female-types are instead falling into scripts of victimization and back stabbing/”you’re doing feminism wrong.” I’d consider the former set worth embracing as human, the latter to be consciously left to the wayside. Those socialized to be masculine have social scripts they’re bucking and/or selecting, too. Scripts about being protective, and reliable, and strong. Scripts about being stoic, and angry, and omnipotent. But such re-scripting is entirely doable, and we should hear from people about why these cycles happen, and how other disciplines have escaped cycles and built new scripts. Attendees will be trusting me that other attendees are here in good faith, a meatspace web of trust, and that means attendees will be vetted. We will talk about difficult things, and we will set an example of doing so with an interest in begin tough on ideas but kind to people. There will come a time that we can expect every human to stand open but unwavering; but personal, cutural, and institutional histories matter. Violence across these has left a wake of torn-down individuals, and in this space everyone will be expected to be kind.

The re-writing of scripts has proven powerful and useful in other spaces. There are communities in conflict zones which refuse to adopt the identities of victim nor aggressor, instead providing pockets of increased stablity in tumultuous geographies. They do this not out of pacifism, but because that particular conflict doesn’t work for them. We see things like Popehat emerge to offer a way out of victimhood and isolation in being targeted by unparsable legal threats. We see groups like Strike Debt question entire financial structures, providing paths to visible solidarity in otherwise isolating systems. Others have shown it is possible to forge new paths, many in more dangerous and complex situations than what we face. Let’s learn from them.

If you’d like to contribute suggestions to who should be invited to speak, examples to look at, or even helping with the event itself, please be in touch!

Continue reading

Open Source Cadavers

Written by @Willow Brugh, with feedback and general awesomeness from John Willbanks, Sam Klein, and Michael Stone. Additional props to Adrienne and Sands for edits, and to Fin and Matt for kicking my butt into delivery.

In loving memory of my crypto-loving, open-access enthusiast, and occasionally suicidal friends. We will build more open worlds with our corpses. I just wish you would have held off for more unavoidable causes.

Early this year, yet another friend of mine up and died. There was of course a mess of things that had to be figured out. It wasn’t just the traditional things of cleaning out her house (I wasn’t around for that part) or figuring out the funeral (Viking in variety). It was new and interesting technical and moral turmoil of getting into her hard drive, questions of “should we even?”- her prolific music and authoring contributions rivaled by her extreme privacy. It was seeking the edges of her far-flung pockets of internet community to notify them personally, racing the deluge of social media notifications, not wanting them to find out about her the same way I found out about my grandmother – before the familial phone tree had reached me, a peripheral friend calling me based on a facebook post from my sister. A morbid seismic wave.

While I don’t have any control over how others plan for (or don’t) their demise, I have a say over my own. I can show my care for people dear to me my own compulsive, facilitating way by being sure they find each other as they find out, and in making sure information and knowledge I have to offer continues to be released under open access, even if I’m not there to do it. From doing humanitarian and disaster response (and just a general “awareness of the abyss,” as my mother used to tell my vast and angry younger self), I have had to face the looming possibility of my own death head-on. The networked reality that brought those strange new questions and moral quandaries for my friends’ deaths can instead be used to carry forward care and knowledge. This is a sort of guide for the bits of postmortem planning the internet and most lawyers have missed. It’s not complete – I’ve run into some interesting blocks and quirks, around which I’m eager to collaborate with others.

This post is less about things like wills (what happens to material possessions, who doles it out, and the like) and living wills (if you want to be kept on life support etc) – although I’ve added the templates I used to the wiki associated with this post as it includes digital artifacts and more awareness of gendered pronouns than other bits of the internet. This write-up focuses on specific aspects for Open Access and encryption enthusiasts. Brace yourselves for a morbid entry. Know I’m peachy keen, and being an adult about things, not in danger of harming myself or others. If you are in danger of harming yourself, please say as such directly, and get help, rather than indirectly through things like estate planning. It should be possible to speak about death without fear – that’s what I’m doing here. I hope you can hear it (and act) from a similar place.

I’ve divided components up into documents, accounts, notifications, and people. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means I only have to worry about keeping something up to date in one place — a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people become close to me, or exhibit destructive behavior, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. Continue reading

Paths to Better Futures

We’ve started telling people how they are expected to act. That’s a phenomenal start. We’ve started making it clear that there are paths to justice, in the case that those expectations are not met. Also great. But I don’t feel like it’s enough. Often, issues are forced into a boolean framing, with only a boolean response. Either something is dismissible, or scorched earth. And so many things go unaddressed, and the few things that aren’t are either viewed as “how did we wait so long?!” or “that seems like overkill.” The former continues to vilify the perpetrator, and the later vilifies the person(s) on the receiving end.

If we simply kick out anyone who messes up, we end up with empty communities, and that’s not a new future.

If we don’t hold people accountable for being abusive, we end up with rooms filled only with those who love their pre-existing power, and that’s not a new future.

League of Legends is the best example I know of how to deal with this properly, or at least better than usual. If you are an asshole to someone, you go to Tribunal. They do this because there are rarely “problem players,” but most incidents are “players having a bad day.” And if you got rid of all those players, you wouldn’t have anyone left. If you put a bad mark on “problem players” or some other permanent thing, people simply recreate accounts, and are pissed off while they play in the beginner brackets, and then you have a toxic environment for the newcomers, only the toxic stick around, and then the whole place sucks.

Let’s bring this to issues of gender and sexual advances specific to our geek communities. It cannot be fun for most of the people who are causing these problems. Just think – you try to make a pass, it either isn’t well received or seems to be but then later it turns out wasn’t, and no one is telling you what is actually expected. Except sometimes that you’ve done something wrong. Of course yes to consent! Yes to enthusiastic consent! But women especially are also socialized to give what is seemed to be desired. For safety. For society. Etc. And so consent is the first essential step along a path, but is not the end-all-be-all.

What I’m proposing is this: if someone violates a safe space agreement, or continually makes people in the community feel squicked, or whatever else… we need to have a path laid for them to get better. And if they’re not willing to take that path, we know they’re doing it because they’re an asshole, and not because they’re socially awkward. Awkwardness can be because of a commitment to consent, and is no excuse for many of these issues. Just ask someone I’ve dated. I am not smooth.

So what are those paths? Restorative justice seems to be a useful alternative for urban communities with generations disappearing into the legal system, but which has been co-opted by the privileged to avoid accountability. I’ve asked around about programs for people who are abusive to “get better,” with little luck. Are there paths already out there? Do we need to create them? Please do comment here, let’s have a discussion.

Technology as a Means to Equality

Originally posted on Geeks Without Bounds

I had the honor recently of speaking at the Médecins Sans Frontières (MSF / Doctors Without Borders) Canada Annual General Assembly (AGA). While an international organization, each location has a very large group of people who work on decision and policy for their specific group for the year – usually in the AGA. These are three days of talks, debates, and dinners. The international group defines a focus for the discussions, but it’s up to each pod how they act around that focus. This year, it was how MSF is using (or not) technology. While most of the talks were internal, the bit of time I was there the topics ranged from telemedicine to social media in conflict zones. They asked I come speak about technology and disaster/humanitarian response.

The gist of the talk I gave (15-minute video follows) is that technology is a means to more equality in the world – a way to be inclusive. That there are many people in the world who want to use their technical skills to help groups like MSF out, but we absolutely need them at things like hackathons. That there are many people with voices and connections to the globe now, and that groups like MSF have a responsibility to listen to them directly. And that technology, when done in codesign, will be aligned with what their needs are, and is an ongoing relationship, not a one-off delivery.

Again, most all of the discussion happened behind closed doors, but I recorded my laptop and voice while I did my own presentation.

It seemed to go pretty well. We’re keeping the conversation going, and I’m excited for more points of connection. You can follow the prezi at your own pace here, and see the full #vizthink for the panel here.

Some other highlights:
The other exceptional panelists and myself advocated for F/OSS, especially in light of security, for inclusion. MSF is rightfully anxious about infiltration, ways to be transparent, and usability. Ivan and I re-emphasized open source communities, that people are committed to examining (and re-examining) code for backdoors and optimizations. That open source has been around for decades, that most technology is built upon it, and that it’s a way of performing mutual aid between countries and cultures.

Someone asked in Q+A about using things like Facebook and Twitter in the field, if use could cause problems. Problems of location or images suddenly not being as private as you thought, and kidnappings and killings resulting. Or, what if things just get hacked by governments or by insurgents? My response was that MSF, with all their weight and influence in the world, has a duty to insist upon things like Coercion-Resistant design. Insist that these companies treat their customer bases humanely.

Mutual Aid and The Crowd

Months ago, one of my friends at the Naval Defense University sent me an article from Scientific American on how social media is making crowds less predictable. It hit a nerve with me, my response being that “social media makes crowds more predictable to themselves.” The article talks about uprisings in various countries, popular choice, and collective action. It also cites this argument, shoehorning collective action into hierarchical framework, indicative of its missing the point.

Matthew Salganik, Peter Dodds, and Duncan Watts conducted large-scale experiments to investigate the effect of the strength of social influence on collective action. People were given a list of previously unknown songs from unknown bands. They listened to the songs and downloaded them if they wanted to. In the independent condition, people did not see other people’s choices. In the social influence condition, people saw how many times each song had been downloaded by others. The collective outcome in the social influence condition was more unequal. That is, popular choices were much more popular under social influence.

Crowds are only less predictable to the outside. They are becoming more predictable to themselves. Not talking about ranking, not talking about decision, simply speaking to awareness and therefore paths to action. This, to me, is related to the core disconnection in disaster response between official response’s view on social media/The Crowd as a resource to be tapped for situational awareness, and the mutual aid of The Crowd as self-organization. Formal organizations tend to think of The Crowd as an input function to their workflows. Their concerns therefore revolve around verifiability, bad actors, and predictability. A manifestation of this are the self-mapped roads in remote places via Open Street Map being grumbled over for not fitting into the data hierarchies of official responders. That is not the point of the maps being built.

These are identity politics on the scale of a community. These are people using a tool to their own ends, to support themselves, to gain better understanding of their world, not as a resource to be tapped. It is a group of people talking to itself. If institutions exist to serve collective purpose, their role here is to provide institutional knowledge (with awareness and self-reflection of bias), guiding frameworks (possibly), and response at scale (upon request). In this way, we can benefit from history and iterative learnings while escaping paternalistic ends.

Which brings us to responsible data practices. If data must be collected on a group of people, either ambiently  through things like the Firehose or directly provided, the output should be useful to those people. This is the difference that makes ethical digital response seeking the integration of multiple datasets to have better situational awareness, and what the NSA does. For instance, if you’re collecting information on homeless shelters and the movements of homeless individuals, the information should be able to be used by those folk to self-organize. Else we’re just recreating the systems we’ve been trying to get away from. We’re even making them more robust with new technologies, the biases hidden away in algorithms.

As a crowd comes to know itself better, the intelligence can becomes an embedded, rather than external, component. We start to see many eyes on the bugs of society.

Topic: Revolution and Technology

Livebloggers: Sasha, Nathan, Erhardt

Today, we’re joined by Stephan “tomate” Urbach from the activist group & think tank Telecomix, which works to circumvent surveillance, and to promote internet freedom and human rights. During the 2011 uprisings in North Africa, Telecomix activists helped to bypass technologies of censorship and communication-interruption. They currently work to shuttle videos and other information safely out of Syria. Urbach is a Telecomix member, and has acted as their de facto spokesperson. He was a member of the Pirate Party in Germany, and worked for the Berlin Pirate Parliamentary group from 2011 until February 2014.

http://prezi.com/embed/kzyc1pmrynri/?bgcolor=ffffff&lock_to_path=0&autoplay=0&autohide_ctrls=0&features=undefined&disabled_features=undefined

Vizthink by Willow Brugh

Tomate joined telecomix in 2010, during the uprisings in Egypt and Syria. He worked in parliament for 2 years. He begins with an overview of Telecomix:
Telecomix (read about them here) isn’t a formal organization, it’s a network of activists who convene and disperse as needed. They’ve done this several times over the last few years. In 2006 in Sweden, there was a telecommunications bill, people gathered and formed Telecomix. After the telecom package was stopped in Sweden, they fought the data retention directive across the EU. At this stage, many people joined to do research and activism work. When the Egyptian uprising kicked off, Telecomix was galvanized into action: specifically, when Mubarak shut off the internet. They decided to figure out how to get access to folks in Egypt even in that context. They set up phone lines that people could use for dial up access. They set up around 300 lines for people to connect to the Internet. Weeks after the net went back up, tomate got an email from a young man in Egypt thanking them for providing access to be able to share their thoughts. This is the kind of thing Telecomix loves.

They see censorship, and internet blocking, as a crime.

Some people have asked them whether the regime might have used their lines. That’s possible, but they don’t know that. Back at the time, Telecomix talked about technology as neutral, although today tomate doesn’t believe that anymore. Then Syria happened. They found that internet surveillance in Syria was planned since 1999. They also found that Blue Coat, Siemens, and other companies were involved in providing surveillance technology. When they released this information, Western countries were publicly enraged. Telecomix suggested export controls, but no one was willing to go that far. The US department of commerce did investigate Blue Coat and their affiliates for selling to Syria after the trade embargo. ComputerLink a middleman company was fined $2.8 million by the department of commerce.

Telecomix found that every message, on every network, was monitored, and every phone call was recorded, both mobile and land line. They also found that people went missing after writing posts on SNS. Telecomix was in touch with Syrian activists on the ground. At the time, they felt clear about who was ‘good’ and ‘bad,’ now it is much less clear. They provided secure networks, software, and servers for activists on the ground. They made comms “as secure as possible,” but never promised 100% security: “whoever says this is a jerk,” tomate tells us. Some Anonymous people apparently promised full security, and local activists believed them. That’s a problem. Phone lines were then blocked in Syria. Calls to tomate’s personal number were blocked (listed online), calls to other Telecomix numbers were also blocked. When Telecomix released the Blue Coat files, revealing how it worked, the blockade system became better: Iranian telcos joined the Syrian telcos.

Around this time, Tomate received a call from German intelligence warning him to watch out for Syrian activities in Berlin. They found that the surveillance toolbox was installed in Syria, Egypt, Beirut, and Kazakhstan. But it was not always correctly configured. Telecomix has evidence, although not enough to publish, that Western companies are selling to dictatorships. They think that’s wrong, and want to generate a public outcry.

Throughout this process, Telecomix has learned a lot. Access blocking, traffic monitoring, deep packet inspection, laws that forbid certain kinds of speech on the internet. These are things that dictatorships are known for doing, not “free” countries. They also learned that hacking the backbone in Syria was great and everyone loved it. But if someone from Africa hacks the EU backbone they’re a ‘terrorist.’ So it depends on your point of view.

Telecomix also learned that the surveillance methods used in the West are the same tools dictators use. Everything from everyone is monitored. In Germany, they started to scan mail at the post office: front and back side. Started to scan postcards, and not sure what they’re doing with the scans. In EU, there’s a fight against data retention, and we won, since a court said data retention can’t be performed like that. It’s not a full victory: the court said data retention is OK, just has to be bounded in certain ways. In Europe, public is not ‘public.’ For example, Tomate thinks if he posts on his FB wall, it’s public. But many think that publicity is platform bounded.

Germany has one of the hardest privacy and data laws, the EU is potentially adopting this. It may be good for users, but not so much for companies providing services. For example, when Google did Street View, many houses are blurred based on people saying ‘not mmy house!’ But the same houses are available on Bing, and on other services. So Google now isn’t updating street view Germany, and the images are several years old. So Europeans think about data as ‘mine,’ even when it’s been posted publicly. We have a database of people’s personal information including salary, and we deleted it because of privacy concerns.

Snowden documents revealed that the ‘conspiracy’ of surveillance was actually true. For example, in 1998 we knew that the Echelon program might exist. Hackers knew it existed, but were called conspiracy theorists. Now there’s a public outcry for EU action against the NSA. tomate doesn’t think it makes sense: what should we do? Embargo trade with the USA? There’s an initiative to ban intelligence services from. In Germany this was specificaly because of an national intelligence failure to capture (neo)Nazis.

German intelligence, The exterior intelligence, supports the NSA, then gets internal surveillance on Germany, which they are not allowed to collect domestically. These exchange programs exist all over the world in contravenience with privacy laws. The only proposal they can think of against surveillance is to make it more expensive. The more encryption people use, the more expensive it will be, for example. One idea is to create as much spoof data as possible, such that intelligence agencies will spend all their time processing the spoofs. Another idea is to rebuild networks with new hardware and new protocols that will be less amenable to surveillance.

But as in all places, no one wants to pay for something. If you get paid as an activist, no one will consider you a proper activist, which means that activists have to work for free. If you look at what the NSA, Brits, French, Germans, and everyone else are doing, it’s the same as what the dictatorships are doing. What makes a democracy? People can say they don’t want this surveillance, but the government does not listen. Tomate is focused on the European debate about surveillance, not so much the NSA debates in the US. But he hopes that some day we can ban intelligence surveillance in democracies.

Slides: http://files.herrurbach.de/doc/framing.pdf

Q&A

Ethan: Tell us about how Telecomix thinks of itself differently than other organizations in the space. During the blackout in Tahrir Square, lots of organizations got involved like Tactical Tech, also based in Berlin. Telecomix has always had a certain amount of secrecy around it. How did this come about and how does Telecomix see itself fitting amongst other organizations in the space?

tomate: Telecomix does not see itself fitting into anything. This is important. It is a space for exploring things. At the point, people can join Telecomix. The aura of secrecy is wrong; it’s one of the most open/transparent groups I’ve worked with. The problem is that many journalists struggle to understand Telecomix—they group us in with Anonymous, which is wrong. They builders and rebuilders, rather than attackers—they don’t take sites down using DDOS. One characterizing is the Yin to Anonymous’ Yang. We also do a lot of theoretical work in the space, differing us from other activist organizations. We are also not people that work in public wearing masks. We do try to secure our members who are not in a position to go into the public because of the work they do, and others take the role of the public face of the organization.

Sasha: How do you make decisions as an organization? Like who represents the organization to the public?

Tomate: We do not use formal consensus-building processes because they don’t work. We run an IRC do-ocracy. Admins do have too much power.

Willow: Can you tell us about Cameron?

Tomate: We have a bot named Cameron. We can ask her questions and get responses. We sometimes make her the public face for interviews, including a few that were published in Swedish newspapers. They asked for a photo and we sent a picture of the old mac that she was running on. She is crypto-sleep because we forgot the password to the harddisk. But now we have no one to ask what we should do. She was a symbol for us for a long time.

Cameron Kerry :http://en.m.wikipedia.org/wiki/Cameron_Kerry (former General Counsel, US Dept f Commerce) I was encouraged by the data of a “Data Schengen” but over a month ago, the EU parliament voted that the European Commission should come up with a protocol for keeping EU data within national borders? How do you change that strong sentiment?

Tomate: Currently, Deutsche Telecom markets itself as keeping your data in Germany, which is false, it doesn’t. The idea of keeping the data national is nice, but it doesn’t solve the problem anyway. The privacy activists in Germany and Europe believe that if a law says something like this then it works, but that’s not right. They always ask the state to handle it, but they can’t. We are working on new protocols and projects ourselves to handle privacy. We rely on infrastructure form the 70s and we can’t rely on it much longer. We hear in Europe that the US created the internet and they can control it.

Ethan: In response to surveillance people are looking for many paths. But HTTPS (Heartbleed) was broken for years, and it was open source code. Tell me why you are optimistic that we are going to solve this problem with better network design.

Tomate: People in Germany are being paid to do open source code audits. They are funded through donations right now to work on this issue. We need to do more audits and pay people to do them, multiple audits for software are needed.

Sasha:

Tomate: We need export controls on technology that can be used as a weapon. We also need to rebuild our networks with the state. But these are two different things, building the network and sending out products to dangerous people.

Ethan: Who would you want to enforce those export controls? I think the export sanctions push is a really messy one. We’ve seen a lot of cases for export controls are taking really useful tools out of people’s hands.

Tomate: I don’t have solution for that question. For instance, my country is selling tanks to dictators. So I wouldn’t trust them to sell any hardware to countries.

Eleanor: The only reason we have strong crypto is because we regulate code as speech and thus it can’t be sanctioned under export controls. The only way we got PGP out there was a loophole in ITAR rules using a free speech definition. I would rather use a limited liability laws rather than export controls.

Sands: Is there a lot of discussion at Telecomix about mesh networks for activists?

Tomate: As I said, Telecomix is not really active right now. I live in Berlin, which is the main city for mesh networks. There are discussions for how to activate local networks and then bring them online later.

Dalia: I think the public is missing in this discussion. What I’m not hearing is how we can have people change things. I’m hearing that it’s happening in IRC channels. But many people aren’t adopting the necessary technology or talking about it.

Tomate: In Europe, we have many crypto parties currently. It’s amazing how many people are coming. People get the tool as well as the explanation for why we need to do this right now. We show them how they affected by the surveillance. It helps that we now have the evidence of this, so people are listening.

Yu: After hearing about the decision-making process, how do you manage your brand?

Tomate: Don’t break anything. If you break down communications it is not a Telecomix thing. We don’t try to manage it, but we explain what we do to new people in the IRC channel, explain it is we try to do, the same we respond to the media. Anyone can use the logo, and people do, but it hasn’t failed yet.

Social Accountability

Most of the projects I work on involve me holding myself accountable. I don’t have a boss to fire me, just the possibility of losing gigs and support. I don’t have relationships with people that require certain actions from me. The side projects I tend to take on take place over a long period of time and involve many parties.

Checking in regularly with a number of people I trust, but am not accountable to or for, helps me stay on track with (and realistic about) my workload. Especially related to side projects.

Not Your Usual Checkin

These are people you are not directly accountable to. They are people to whom you strive towards being socially accountable. This mainly boils down to working with people you desire the respect of, but are friendly enough with to fail in front of. No part of your livelihood should depend upon your honesty (obviously, I hope this would be the case in any job, but the dream is not yet the reality).

Tom sez: The Table is Round : There is no project manager. Rather, participants ask one another about their projects. “So Tom, how is ‘Writing a cover letter’ going?”

Fin sez: I really like the informal and casual tone we keep.

Have a Regular Call Time

You might tweak this regular call time to later in the day or that week occasionally, and let people know if you won’t make it or need to reschedule. Some weeks everyone will miss together. Just keep going. Assume it will happen the next week at the regular time. If people consistently miss, ask them if they mean to make it. Remove them from the workflow if they can’t commit on at least a semi-regular basis, welcoming them back if they are able to prioritize it again.

Have a Place to Meet that Doesn’t Rely on Any One Person

Charlie set us up with a persistent Unhangout. No invites, no person flaking preventing an easy join, just. showing up at the regular time. The code to set up such a thing exists here. It can be a little intense for someone to install and run on their own, so if you’d like to use the hosted service for a permalink, do so here.

Update: we now use a permalink at meet.jit.si

Choose a Platform

We use Trello. Generalizable enough to make sense for various projects, public, low barrier to entry. Especially useful with its API so some of us plug into our more finely detailed project management software.

We use the following Columns:

  • “Backlog” for things that may or may not happen.
  • “ToDo” for things yet to be worked on, or that have stalled out.
  • “Doing” for things that are in progress & are being actively worked on.
  • Update: we now also have “Blocked” for things which are out of our hands in how to move forward.
  • “Done” is the high-five column, which gets emptied every check-in.

We also assign tasks to ourselves, so everyone can have an overview of what others are doing – and thus can take over “moderation” of the call.

You’ll slowly start to notice that some things you meant to do just… aren’t being done. Put them on a back burner. After awhile, either admit they’re not going to get done, or restructure them to be approachable and actionable.

Generalities, Not Atomized

All of our participants have personal task management on various platforms. This is about what we’re generally needing to get done, not the granular aspects. We each have our own systems for those more specific aspects (I use OmniFocus on my desktop, tho thinking of switching off, and TeamBox for GWOB).

This has been super useful for me in staying on task, delivering on long-term projects, and in feeling connected to a group of people even when my work isn’t. Hope you find it useful, too!

Creating (New) Collaborative Spaces

There’s this ongoing sense of frustration from the adaptive, iterative, inclusive informal side of disaster response with the formal side. While we often focus on how to get members of a population not accustomed to collaboration to feel empowered to speak and act, and that is a core component of any work I do, that’s not what this entry is about. In the same way that I think many people don’t engage in their environments when conflict is a possible component, I think the lack of collaborative and codesign approach in the formal sector is simply a lack of exposure and understanding.

Come with me / and we’ll be / in a land of pure collaboration – sung to the tune of Willy Wonka’s “Pure Imagination

The thing to understand is that after Kindergarten, most people have been discouraged from being collaborative. While it comes easily in our youth, when we haven’t built up the skills (social and technical) to operate from that source, it can be difficult. When creating codesign space with members of a formal or traditional organization, they come with the mentality that experts are the best (and perhaps only) people equipped to know how to assess and respond to a challenge. In this mentality, only academics have time to think, only corporations have access to resources, and only people who have been in the field for decades can see patterns. Often, because of the constructs around being an expert or specialist, people considered as such have had difficulty finding cohorts. In fact, you’re often actively discouraged away from it – anyone who shares your field is a competitor for limited resources. Any remotely collaborative activity is done asynchronously and piecemeal, cobbled together later by yet another specialist. This backdrop should indicate the importance of providing safe and guiding space for learning collaborative methods to those coming from traditional sectors. Here’s how I’ve done collaborative space-making in the past.

First, we must understand the codesign methods we aim to use by making it safe and inviting to work collaboratively, and ways to ask questions and with the expectation of listening. We call this “holding space,” through facilitation methods of encouraging inclusivity like paying attention to equal speaking time and accessbility of language. Within this space, we set a North Star, the purpose of the group. Frame all conversations and problem solving trajectories by that North Star.

With the Field Innovation Team (FIT) for FEMA’s Hurricane Sandy response, our North Star was “helping members of the affected population.” This might seem obvious, but formal organizations have been set up to help the official response organizations – Office of Emergency Management, or Red Cross, or the local police department. This has happened in the past because of scaling issues of knowledge and delivery abilities. Any situational knowledge was based upon limited aerial imagery (difficult and expensive), people who were in the area but are now able to report by being in an office (stale information), and past experience (misaligned patterns).

With things like crowd mapping, a higher resolution of situational awareness is possible. People on the ground can tell you where they are and what they see. With this ability comes a new responsibility, to deliver response at a similar resolution. This setup also includes an ability to directly interact with members of the affected population, so it’s important to refocus our efforts on our end users.

Any time any question came up, or any difficulties got in our way, we reminded ourselves about our main objective. From this, we immediately saw many paths to achieving the objective such as education, housing, heat, and connectivity. Through skill and connection discovery, we determined what the best focuses were, based on the team members present. We were already collaborating – by focusing on a main objective, and outlining various ways of achieving that objective, people start to consider how they can offer ways of getting there. Too often, we delineate our jobs and then figure out what we can do – which would have limited our creativity by leaps and bounds.

This is when it’s important to have a slew of collaborative tools in your back pocket. What will kick up this new track of collaboration with productivity? Just as importantly, what will be so easy to use that your newly-fledged collaborators won’t trip over install processes or learning curves, losing this precious momentum towards beautiful new worlds? I really like etherpad, hackpad, or google docs as a starting point for this: nearly everyone uses a word processor, and it’s immediately evident as to what is going on. Suddenly, there is a shared view! The common problem of resolving differences across multiple word documents has disappeared in this setting! Reports begin to write themselves out of meeting notes! Butterflies and bluejays are frolicking in the sky. Be wary that during this part of the process, it is important to both make sure people understand what is going on, while also not becoming their administrator. Help people put their own information into the platform, don’t do it for them when they stumble. Other great platforms are trello, basecamp, and loomio for near-immediate recognition of usefulness. People will sometimes stumble in the transition – simply take their recent update on the old method (email, anyone?) and continue the discussion on the new collaborative platform.

Once that objective is set, everything else is just problem solving. Things which would have kept us waiting to act instead became new opportunities to try things out.

Back in New York, the Joint Forces Office wouldn’t allow the FIT team in, because not all of us were federal employees, a few of us were foreign, and some of us were *cough* activists */cough*. Instead of twiddling our thumbs, we instead worked from the apartment of a friend-of-mine. They had better (and more open) internet, far superior coffee, and great serendipity liklihood. While working from there, we linked the OccupySandy volunteering map into the Google Crisis Map and (unofficially) chatted with UNICEF about what options we hadn’t yet looked at for resources. The neutral space allowed us to accomplish far more than we would have in the official offices. It also meant that as we tried out collaborative tools, firewalls didn’t get in our way. When we were later welcomed into the official offices for their first-ever design jam (with Frog Design!), the indignation about Basecamp and hackpad not loading was so great that the FEMA firewalls are now on different settings!

Remember that people are delicate. What most people in the formal sector have been missing for a long time is the ability to SPEAK and to ACT, just on a different vector than those in historically marginalized populations. We are asking all parties in the codesign process to be active and engaged. In distributed and collaborative spaces, this is something we excel in. It is therefore our responsibility to show all newcomers how awesome it can be. Stand with them to make more space. Sometimes as manifest in blanket forts.