Documentary film maker Laura Poitra’s exhibit in the Whitney Museum presented an immersive installation covering issues of mass surveillance, the war on terror, Guantánamo Bay, occupation, the US drone program and torture. Some of these issues have been investigated in her films, including Citizenfour, which won the 2015 Academy Award for Best Documentary, and in her reporting, which was awarded a 2014 Pulitzer Prize.
With that came Astro Noise: A Survival Guide For Living Under Total Surveillance, where Poitras invited authors ranging from artists and novelists to technologists and academics to respond to the modern-day state of mass surveillance. Among them are author Dave Eggers, artist Ai Weiwei, the former Guantanamo Bay detainee Lakhdar Boumediene, MSR SMC researcher Kate Crawford, and Edward Snowden. Some contributors worked directly with Poitras and the archive of documents leaked by Snowden; others contributed fictional reinterpretations of spycraft. The result is a “how-to” guide for living in a society that collects extraordinary amounts of information on individuals. A few excerpts by the different collaborators:
Laura Poitras –> Her chapter is called “Berlin Journal,” which she wrote between 2012 and 2013, when she had relocated to Europe so she could work easily without fear of having her material taken when she went into the US.
Feb 11. 2013
I read the news for fear of an arrest. It still could be a shakedown targeting Julian or Jake. Watching what i’ll do with the material. It really is a drama to understand the possible motivations/goals. I take it at face value, but why? He could have approached the NYT or the Washington Post for maximun exposure. Why reach out to a filmmaker? Because I’ve been targeted? Because he has already gone down other paths? Because he doesn’t have what he claims? (p. 86)
Kate Crawford—> Asking the Oracle
Kate compares the ancient Greek Delphic Oracle, which had restrictions for acquiring knowledge, to the unrestricted vastness of information provided by total surveillance.
So the Oracle, as a technology, set up particular restrictions and limitations. The information flow was restricted by the number of people who could visit the Oracle, by how many questions they could ask, and by the cryptic nature of the responses they received. In this sense there is strange similarity with the Snowden archive. The person seated before the search box must decide what to ask next and try to exercise restraint so as not to be drawn into thousands of documents and stories and systems. But in another sense, when analysts consult the database inside the fortresses of the NSA and the GCHQ, there seems to be little respect for limits beyond the stictures of policy. Everything that can be captured will be. The archive is an epic testament to information acquisition, overreach, and confidence. It’s as though the guiding principles of Delphi were reversed. Know Everyone. Everything in Excess. Just keep pledgdin that all the necessary protections ar ein place. (p 143)
Edward Snowden –> Astro Noise
With the right antenna, we can hear the universe’s radio noises. The stars themselves (or so it’s been theorized) can provide us an unpredictable source of information that will never be heard again in the same way. As the world turns, our antenna sweeps the vastness of the universe at a given point in time. The signals that we receive constitute an ever-changing key forged from the sky itself. Such a key could only be imitated by an agent listening from that exact same place, in that same direction, at the same time, to those exact same stars. (p. 121)
Cory Doctorow –> The Adventure of the Extraordinary Rendition
In his chapter, Cory Doctorow explores a story of Sherlock Holmes in the times of the NSA.
It’s life in prison if I go public, Mr. Holmes. These kids, their parents are in the long-term XKeyscore retention, all their communications, and they’re frantic. I read their emails to their relatives and each other, and I can only think of how I’d feel if my son had gone missing without a trace. These parents, they’re thinking that their kids have been snatched by pedos and are getting the Daily Mail front-page treatment. The truth, if they knew it, might terrify them even more. Far as I can work out, the NSA sent them to a cIA black site, the kind of place you wouldn’t wish on your worst enemy. The kind of place you build for revenge, not for intelligence.
This is a video and the transcript of my Ted talk at Ted x TTU in April 2016. It’s about body image, consumer economy and selfies.
I have some sayings here; let’s do a show of hands if you’ve heard these: “don’t judge a book by its cover” or “beauty is only skin deep.” The point seems to be that we shouldn’t be judged based on how we look, is that true? That we are more than our appearances, more than our bodies, do you agree?
Let’s do anther show of hands. During the past week, how many of you looked in the mirror and wished for something to be different? To be a little taller, or a little thinner – just, you know, the belly; or the thighs. Maybe you looked and wished to be more muscular or younger? To have smoother skin?
It seems, we are at an impasse. We don’t think we should be judged by our looks, but we quite harshly judge ourselves based on them. We think beauty is only skin deep, but we spend a lot of time, effort and money on trying to make ourselves look better, thus constantly engaging in something that is supposedly trivial. And it’s not just me and you either – according to the American Society of Plastic Surgeons, butt implants were the fastest growing type of cosmetic surgery in 2015. On average, there was a butt implant procedure every 30 minutes of every day. When I search for “love your body” in just Amazon Books, I find 14 399 results. 14 000 titles just to help us get comfortable in our own skin. Clearly we need a lot of help.
So the relationship we have with our bodies seems best described as tense. Why is that?Some say it is because we’re self-centered, narcissistic and superficial. I don’t think so. I also have some ideas on how to soothe this tension. To explain those ideas, I will use an example of something many people think is self-centered, narcissistic and superficial – selfies.
The Social Media Collective is looking for a Research Assistant to work with us at Microsoft Research New England in Cambridge, Massachusetts.
Starting in July 2016 the MSR Social Media Collective will consist of Nancy Baym, Tarleton Gillespie, Mary L. Gray, Dan Greene, and Dylan Mulvin in Cambridge, Kate Crawford and danah boyd in New York City, as well as faculty visitors and Ph.D. interns affiliated with the MSR New England. The RA will work directly with Nancy Baym, Kate Crawford, Tarleton Gillespie, and Mary L. Gray.
An appropriate candidate will be a self-starter who is passionate and knowledgeable about the social and cultural implications of technology. Strong skills in writing, organization and academic research are essential, as are time-management and multi-tasking. Minimal qualifications are a BA or equivalent degree in a humanities or social science discipline and some qualitative research training. A Masters degree is preferred.
Job responsibilities will include:
– Sourcing and curating relevant literature and research materials
– Developing literature reviews and/or annotated bibliographies
– Coding ethnographic and interview data
– Copyediting manuscripts
– Working with academic journals on themed sections
– Assisting with research project data management and event organization
The RA will also have opportunities to collaborate on ongoing projects. While publication is not a guarantee, the RA will be encouraged to co-author papers while at MSR. The RAship will require 40 hours per week on site in Cambridge, MA, and remote coordination with New York. It is a 12 month contractor position, with the opportunity to extend the contract an additional 6 months. The position pays hourly with flexible daytime hours. The start date will ideally be July 25, although flexibility is possible for the right candidate.
This position is perfect for emerging scholars planning to apply to PhD programs in Communication, Media Studies, Sociology, Anthropology, Information Studies, History, Philosophy, STS and Critical Data Studies, and related fields who want to develop their research skills and area expertise before entering a graduate program. Current New England-based MA/PhD students are welcome to apply provided they can commit to 40 hours of on-site work per week.
To apply, please send an email to Nancy Baym (firstname.lastname@example.org) with the subject “RA Application” and include the following attachments:
– One-page (single-spaced) personal statement, including a description of research experience and training, interests, and professional goals
– CV or resume
– Writing sample (preferably a literature review or a scholarly-styled article)
– Links to online presence (e.g., blog, homepage, Twitter, journalistic endeavors, etc.)
– The names and email addresses of two recommenders
We will begin reviewing applications on May 15 and will continue to do so until we find an appropriate candidate. We will post to the blog when the position is filled.
We regret that because this is a time-limited contract position, we can only consider candidates who are already legally authorized to work in the United States.
Please feel free to ask questions about the position in the blog comments!
With generous contributions from the Social Media Collective extended family, I have put together a list that brings together academic and popular writing on metaphors of data, along with pieces that approach questions of data and commercial/political power. The goal in assembling this list was to catalog resources that are helpful in unpacking and critiquing different metaphors, ranging from the hype around big data as the new oil to less common (and perhaps more curious) formulations, such as data as sweat or toxic waste.
These resources were originally compiled to support a workshop on data and power (organized at the Mobile Life Centre in Stockholm, Sweden). Sara Watson’s insightful DIS piece on the Industrial Metaphors of Big Data and Maciej Cegłowski’s brilliant talk Haunted By Data turned out to be particularly helpful for provoking conversation among scholars and practitioners. The hope is that the list could be useful also for others in having critical conversations about data.
The list is best seen as an unfinished, non-exhaustive document. We welcome comments and, in particular, recommendations of further work to include. Please use the comment space at the bottom of the page to offer suggestions, and we will try to update the list in light of them.
(This post is a slightly-tweaked version of a talk I gave as a respondant to Gabriella Coleman’s recent talk at the University of Pennsylvania. I’m grateful to DCC for inviting me, and to Biella Coleman for provoking these ideas.)
There is something both over and under-determined about the word “hacker.” On the one hand, “hacker” has come to encompass a broad sweep of practices far beyond those most narrowly associated with an entity like Anonymous, a collective that leverages computing technology to engage in pranks and protests, memes and civil disobedience. Hacking also encompasses (with varying degrees of earnestness) DIY home repair, highly-commercialized software maintenance and non-code-based trickery and mischief on any number of platforms, from newspaper comment forums to Amazon reviews. Even in this brief cataloging, hacking bears the weight of a diverse range of references. On the other hand, and perhaps a key cause of the aforementioned definitional blurriness, hacking defies concrete conceptual confinement, a vague, residual category of practices, mostly those practices that actively resist the very stability required for classification.
A number of internet and media studies scholars have made important contributions that both draw from and clarify this ambiguity, recuperating the political capacity of hacker praxis (not unlike Heller-Roazen’s work on pirates), reorienting previously dominant stereotypes of hackers as loaner, criminals and/or perverts. Starting from the premise that hacker communities can do important political work, I’m interested in using community as a lens for imagining what hackers have done and might do in terms of activist projects. In particular, I want to set up a comparison between the political actions of hackers and that of in-person direct action. Hacking is (or can be) deeply political. But in what ways is it activist?