Berkman – … My heart’s in Accra http://www.ethanzuckerman.com/blog Ethan Zuckerman’s online home, since 2003 Thu, 16 Nov 2017 19:33:51 +0000 en-US hourly 1 https://wordpress.org/?v=4.8.3 Susan Benesch on dangerous speech and counterspeech http://www.ethanzuckerman.com/blog/2014/03/25/susan-benesch-on-dangerous-speech-and-counterspeech/ http://www.ethanzuckerman.com/blog/2014/03/25/susan-benesch-on-dangerous-speech-and-counterspeech/#comments Wed, 26 Mar 2014 00:57:30 +0000 http://www.ethanzuckerman.com/blog/?p=4830 Continue reading ]]> Susan Benesch is one of the leading thinkers on countering hate speech online. She’s a fellow at the Berkman Center this year, and I’m terribly sorry to be missing her talk at Berkman this afternoon. (Instead, I’m watching from home so I can be primary caretaker for my son for a couple of weeks while Rachel gets to travel.) She teaches international human rights at American University and is the founder of the Dangerous Speech Project, which tries to understand the spread of speech that incites people to violence.

Susan’s talk is available online and I’ve tried to blog it remotely while cursing my inability to teleport across the state. The talk is wonderfully titled “Troll Wrastling for Beginners: Data-Driven Methods to Decrease Hatred Online”. Unlike most conventional online wisdom, Benesch believes you should engage with the trolls, in part because it may be the most successful path to countering dangerous speech. The approaches states have taken to dangerous speech – punishment and censorship – don’t work very well, and some evidence suggests that they work even worse online than offline. She suggests the case of Anwar al-Awlaki, who was ultimately killed by a drone strike – despite being punished (via summary execution from a US drone), his online speeches continue to be influential and may have influenced the Boston Marathon bombers. Censoring that speech doesn’t work well in an online environment as it’s likely to move onto other platforms.

So what about “don’t feed the trolls”? Benesch points out that there are several implicit assumption in that advice. We assume that if we ignore a troll, they will stop (which, in turn, tends to assume behavior that’s only on a signal platform.) There’s an assumption that online hate is created by trolls; in the few experiments that look at racist and sexist speech, at least half is produced by non-trolls. We tend to assume that all trolls have the same motivations and that they will respond to the same controls. And finally, we assume that the trolls are the problem – we need to consider effects on the audience.

(Benesch doesn’t define trolls until pressed by the audience and points out that it’s a term she uses with tongue in cheek, most of the time – she acknowledges that different trolls have different motivations. Her goal is to move away from considering trolls as the problem and towards understanding dangerous speech as a broader phenomenon.)

One of the benefits of online speech environments, Benesch posits, is that we can examine the effect of speech on people. In offline environments, it’s very hard to measure what reactions dangerous speech leads to – in online environments, it may be possible to track both responses and effects.

Benesch’s suggestion is that we should approach dangerous speech through counterspeech, in effect, talking back to the trolls and to others. In explaining her logic, she notes that the internet doesn’t create hate speech – in some cases, it may disinhibit us from speaking. But more often, the internet creates an environment where we are aware of speech we otherwise wouldn’t hear. Most of us wouldn’t have been aware of what speech is shared at a KKK meeting, and many of us wouldn’t have heard the sexist jokes that were told in locker rooms. Now speech is crossing between formerly closed communities.

This is a new feature of human life, Benesch suggests, and while it causes a great deal of pain, it’s also an opportunity. We can “toss speech back across those boundaries to see what effect it has.” For the most part, we don’t know what will happen when we expose speech this way, and it’s possible the effects could be very positive. She asks us to consider norm formation in teenagers – most 16 year olds, she argues, have historically developed opinions from a small, homogenous community around them. That’s no longer the case, and it positive opportunity for teens to develop a broader and more nuanced worldview.

Believing in counterspeech means having faith that it’s possible to shift norms in speech communities. Benesch asks “What is the likelihood an American politician will use the N-word in public?” While there’s a constitutionally protected right to use such an offensive term, the probability of a speaker using the term is near zero. Yet, she argues, 60 years ago there were places in the US where you likely could not have been elected without using that word. “People’s behavior shifts dramatically in response to community norms,” she suggests, and as many of 80% of people are likely to follow the norms of speech consistent with a space and a situation, even trolls.

One of Benesch’s case studies for counterspeech comes from Kenya, where dangerous speech was a key component to violence in the wake of 2007’s disputed election. With over a thousand killed and hundreds of thousands displaced, the 2007-8 unrest was one of the ugliest chapters in the nation’s history, and as Kenya prepared for elections in 2013, many Kenyans were worried about inflammatory and dangerous speech online.

Benesch worked with Kenya data scientists at the iHub and the team at Ushahidi to build Umati (from the Swahili word for crowd), which collected reports of online hate speech. What they found was a wave of inflammatory speech from Facebook, and astonishingly little dangerous speech on Twitter. This disparity is not well explained by platform usage – Twitter is extremely popular in Kenya. Instead, it’s explained by counterspeech.

When inflammatory speech was posted on Twitter, prominent Kenyan twitter users (often members of the #KOT, Kenyans on Twitter, community) responded by criticizing the poster, often invoking the need to keep discourse in the country civil and productive. This counterspeech was surprisingly successful – Benesch tells the story of a Twitter user who posted that he would be okay with the disappearance of another ethnic group, and was immediately called out by other Twitter users. Within a few minutes, he had tweeted, “Sorry, guys, what I said wasn’t right and I take it back”.

This isn’t the behavior of a troll, Benesch argues. If the user in question were simply looking for attention, he wouldn’t have backed down when his inflammatory tweets met with spontaneous counterspeech. This online counterspeech is especially important when online speech is magnified by broadcast media, as it is in both Kenya and the US – it’s possible for television and newspapers to magnify not just the hateful speech but the attempts to counteract it.

By studying successful examples of counterspeech, Benesch is trying to develop a taxonomy of counterspeech and determine when and where different forms are most useful. She takes inspiration from examples like that of a young man in the US tweeting angrily about Nina Davuluri being named Miss America. The young man inaccurately and disparagingly referred to Davuluri as “an Arab”, and was immediately countered on Twitter by people who called out his racism. Within a few hours, he’d tweeted something resembling an apology to Davuluri herself.

Benesch wonders, “Can we put together the ideas of counterspeech and the idea of influencing 16 year olds?” It’s not realistic to believe we’re going to change the behavior of hardcore haters, she tells us, but we only need to influence a critical mass of people within a community, not the outliers.

Twitter and Facebook aren’t the only environments for inflammatory speech online – anyone who’s participated in online gaming knows that there’s toxic and hostile speech in online environments. Riot Games was concerned about the speech surrounding their popular game League of Legends and cooperated with academic researchers to understand speech in their game universe. The study found that fully half of the inflammatory messages were coming from users we wouldn’t normally consider to be trolls – they came from people who generally behaved like other game players, but were having a bad day and lashed out in ways that were inflammatory. They also discovered that very small changes in the platform – changes in language used to prompt players, apparently minor changes like font and text color – could improve behavior substantially.

Facebook’s “compassion research” project works on similar ideas, trying to get people to use Facebook in more pro-social ways. When you try to flag content on Facebook as offensive, Facebook first prompts you to engage with the person who offended you, suggesting language to communicate to the other user: “Could you take this down? It hurts my feelings.” As with Riot Games, they’ve found that small prompts can lead to dramatic behavior changes.

Benesch has been using these insights to consider problems of inflammatory speech in Myanmar (a topic I learned a little about in my visit to the country earlier this month.) In Myanmar, Facebook is the dominant internet platform, not just the dominant social media platform – if you search for information in Myanmar, you’re probably searching Facebook. In this environment, a rising tide of highly inflammatory speech inciting Buddhists against Muslims, particularly against the Rohingya people, is especially concerning. Not only does Facebook in Myanmar lead to echo chambers where no one may be willing to challenge inflammatory speech with counterspeech, but some of the mechanisms that work elsewhere may not work in Myanmar.

In a country that’s suffered under a military dictatorship for half a century, the idea of “reporting” people for their speech can be very frightening. Similarly, being encouraged to engage with someone who posted something offensive when you have reason to fear this person, or his friends, might threaten your life, isn’t a workable intervention. Any lessons from Facebook’s compassion research needs to be understood in specific human contexts. Benesch asks how you should respond to offensive speech as a Facebook user in Myanmar: you can like the post, but you can’t unlike it. If you respond in the comments thread, you’re participating in a space where the page owner can eliminate or bury your comment. This points to the challenge of using a private space as a quasi-public space.

We need more research on questions like this, Benesch offers. We need to understand different responses to dangerous speech, from “don’t feed the trolls” to counterspeech, to see what’s effective. We need to understand whether counterspeech that seeks to parody or use humor is more effective than direct confrontation. And we need to understand discourse norms in different communities as what works in one place is unlikely to work in another. Louis Brandeis advised that the remedy for bad speech is more speech. As researchers, we can go further and investigate which speech is a helpful counter to bad speech.


I’ll admit that the topic of Benesch’s research made me uneasy when we first met. I’m enough of a first amendment absolutist that I tend to regard talk of “dangerous speech” as an excuse for government control of speech. I had a great meeting with Benesch just before I went to Myanmar, and was much better prepared for the questions I fielded there than if I hadn’t benefitted from her wisdom. She’s done extensive work understanding what sorts of speech seems to drive people to harm one another, and she’s deeply dedicated to the idea that this speech can be countered more effectively than it could be censored or banned.

The conversation after her talk gave me a sense for just how challenging this work is – it’s tricky to define inflammatory speech, dangerous speech, trolling, etc. What might be a reasonable intervention to counter speech designed to incite people to violence might not be the right intervention to make a game community more inviting. On the other hand, counterspeech may be more important in ensuring that online spaces are open and inviting to women and to people of different races and faiths than they are right now, even if inflammatory speech never descends to the level of provoking violence.

For people interested in learning more about this topic, I’d recommend the links on the Berkman talk page as well as this essay from Cherian George, who was at the same meeting I attended in Myanmar and offered his thoughts on how the country might address its inflammatory speech online. I’m looking forward to learning more from Susan’s work and developing a more nuanced understanding of this complicated topic.

]]>
http://www.ethanzuckerman.com/blog/2014/03/25/susan-benesch-on-dangerous-speech-and-counterspeech/feed/ 20
140journos – When Citizen Media filled the reporting gap in Turkey http://www.ethanzuckerman.com/blog/2014/03/13/140journos-when-citizen-media-filled-the-reporting-gap-in-turkey/ Thu, 13 Mar 2014 19:04:00 +0000 http://www.ethanzuckerman.com/blog/?p=4818 Continue reading ]]> Engin Onder and Zeynep Tufekci visited the Berkman Center today to talk about the rise of citizen reporting in Turkey. Tufekci is a leading scholar of online media and protest, and Onder is one of the founders of 140journos, an exciting citizen media group that’s been central to documenting Turkey’s protests in Gezi Park and across the nation.

Zeynep Tufekci offers an overview of the press situation in Turkey to provide context for Engin’s work with 140journos. There’s no golden age of press freedom in Turkey to look back to, she warns. After the military coup in 1980, the 1980s were a decade marked by military censorship. In the 1990s, Turkish media suffered from censorship around Kurdish issues, but there were media outlets that took journalism seriously within existing constraints.

In the 2000s, the concentration of power by AKP after their second election led to large conglomerates moving into the media business and buying up the press. Energy companies ended up buying leading newspapers, firing columnists and steering the paper’s editorial direction towards the government… and, coincidently, would win the next major government energy contract. Zeynep describes the situation as “ridiculous”, noting that a multiday clash in the heart of the nation’s biggest city was broadcast by CNN International, while CNN Turk broadcast a document on penguins. Talking to a Turkish journalist about the situation, the journalist explained a layered system of censorship: “First, I censor myself. Then my editor censors me, taking my already soft story and make it softer. And if that’s not still soft enough, the government may call a newspaper or TV station and demand coverage change.” Should an outlet not comply, they face massive tax bills, which mysteriously disappear when the media becomes more compliant.

engin

While the press is heavily constrained, Zeynep tells us, the internet is largely open. Websites have been blocked, but it was very easy to get around censorship using proxies. The blocking of YouTube, she tells us, wasn’t a serious obstacle to viewing content, as even the prime minister admitted he used proxies to access it. Instead, it was a tax strategy, trying to get Google to come to Turkey and pay taxes. That’s changing, however, and the new censorship regime promised is significantly more serious, including deep packet inspection.

Zeynep tells us of the Roboski Massacre, a bombing in the village of Uludere, in Kurdish areas where informal smuggling is part of the local economy. The village was bombed by military jets, killing 34 people. It was unclear whether this was a mistake by the military, or a conscious attack on the Kurdish population.

Every newsroom in the country knew about the story and all waited to hear whether they could publish about it. A Turkish journalist, Serdar Akinan, decided to fly to the area and took a minibus to the village, encountering the massive funeral procession. He took an instagram photo and shared it on Twitter… which broke the media blackout and led everyone to start publishing news of the bombing. Akinan lost his job for this reporting and now works for an independent news organization.

The story of 140journos starts there, Zeynep tells us. Engin Onder introduces himself as a non-journalist from Istanbul, a former passive news consumer before media and news broke down. “We felt so sad about this issue, and thought we can do some stuff.” Onder runs a group of creative professionals called Institute of Public Minds, a group that operates creatively in physical and digital public spaces.

In early 2012, in the wake of the Roboski Massacre, Onder and his colleagues felt compelled to start building their own media systems to address the weaknesses of the professional media. Roboski wasn’t the only trigger – a set of pro-secularism protests in 2007 and a union protest in Ankara in 2009 also received no media coverage.

Akinan’s coverage of the Roboski massacre was the inspiration for Engin and his friends Cem and Safa. All three were heavy Twitter users, and they realized that Twitter and online services might be sufficient infrastructure to report the news, as it was all Akinan needed to break this critical story. They brainstormed names, and settled on 140journos, honoring Twitter’s character limit and using slang to poke fun at the professional status of journalist.

Cem had been kicked out of his house because his politics so sharply diverged from his father’s. His father read and watched only media from one conglomerate, while Cem began reading underground and alternative newspapers – for Cem, 140journos is about “hacking his father”, creating media that could sway his parents. Safa is a conservative and religious guy, who helps counterbalance the team. Engin tells us that he had only attended one rally before starting the project.

Before the Gezi protests, 140journos reported on key court cases using nothing more than a 3G mobile phone. At some point in a key trial, the judge demanded that journalists with press cards leave – the 140journos remained and continued tweeting from their phones. That led to discovery of the network by mainstream journalists (who probably resented 140journos for being able to remain in the courtroom.)

140journos made a point of visiting a wide range of public protests, including conservative protests against fornication. They believed it was important to ensure different groups understood each other and saw the diversity of protest movements.

Media coverage of 140journos had been pretty condescending, focusing on the youth of the participants, not on the quality of their reporting. Zeynep, on the other hand, took their work seriously, declaring “This is not ‘citizen journalism’ – this is ‘journalistic citizenship’.”

Once the Gezi Park protests broke out, 140journos found themselves at the heart of a massive movement in Istanbul. Part of the mantra of the Gezi movement was, “the media is dead – be the media”. This helps explain why, during a moment the police were spraying tear gas on Taksim Park, a protester was holding up an iPad and taking photos. Gezi brought a culture of documentation to Turkish protest movements.

The tools of the trade, Ergin tells us, include Facebook, Twitter, Soundcloud, Vine, Instagram, as well as tools that help mine social media platforms. Tineye, Topsy, Google Image Search helped they find traffic cameras, which were also helpful. Google Maps allowed the team to identify where documentations took place, as did Yandex Panorama (similar to Google Streetview, but with coverage of Turkey.) When they heard the sames of people involved with the protests, they sought them out via Facebook, then scheduled in person or phone interviews. Internally, the team coordinated using WhatsAp.

During the protests, 140journos were tweeting hundreds of times a day. They noted different media usage patterns in different parts of the world. Istanbulis use a wide range of media types. Ankarans favor livestreaming. In Izmir, there was less content produced, more a complaint about what the media wasn’t covering.

When the culture of protest documentation became common, the role for 140journos changed into a practice of curating and verifying, not frontline reporting. They decided they couldn’t participate in the protests, and never physically appeared in the park so they could cover the protests with a level of detachment and neutrality. They may have sympathized with the protesters, but their role was as journalists, not activists.

To explain the working method, Ergin gives us an example from Rize, a conservative town that’s the home of the Prime Minister. A crowd, allegedly armed with knives, gathered in front of the office of a secularist group. Seeking to verify what was going on, they searched online, found a blurry photo of the protesters outside the office and started reading signs on the street. They began calling shops on the street and interviewing witnesses of the standoff. Ironically, one of the businesses nearby was a TV station which, unsurprisingly, was not reporting on the situation. Eventually, they also found a nearby traffic camera, and used a combination of the interviews and the street camera to confirm the story and report on it.

After the Gezi Park protests, Engin argues that the content of citizen journalism has been legitimized, the quality of citizen journalism content has been refined and the value of credibility has been strengthened throughout their network. There’s now a network of citizen journalists aside from 140journos, and 140journos often uses these networks to vet their work. 140journos builds their reporting on lists of citizens they’ve verified live in different Turkish cities – when an event takes place, they lean on those local sources.

In a remarkable twist, Veli Encü, a survivor of the Roboski Massacre, has become a correspondent. When warplanes fly over Uludere, he immediately reports to the network so that people can watch and ensure another massacre doesn’t take place. Cem’s father, who used to isolate himself in conservative media, has now become an activist and a much broader reader. And 140journos is now producing a radio show driven by citizen media, broadcasting once a week, and projecting their work onto the sides of public buildings to attract attention and open dialog with a broad range of participants.

We move into a Q&A, which I opened by asking whether the rise of citizen journalism has shamed Turkish journalists into changing their behavior. Engin is uncertain. He notes that the CEO of CNN Turk underestimates citizen journalism, likely seeing it as providing misinformation and poisoning public discourse. But media workers are starting to work as pirates, with 10 or more professional journalists contributing anonymously with stories they otherwise couldn’t get published. Zeynep suggests that there has been a significant change post-Gezi, with more actual news carried live. 140journos was a catalyst, she argues, but so were marches where people stood outside TV stations, waved money and begged reporters to do their jobs. There’s another cultural shift, both note. Citizens are willing to put themselves at personal risk to capture images from the frontline of protests.

A Berkman fellow asks whether there are any Turkish tools being used to produce this media. For better or worse, Engin explains, the tools used are those of social media, and almost all are hosted in the US, but available for no cost online. Furthermore, the journalism the team is doing is wholly non-commercial – they support themselves through other jobs and engage in their reporting as part of their civic engagement.

In the next few weeks, 140journos is planning to release two new tools. One will use elements of gamification to help increase the practice of verifying and factchecking reporting. The other will provide background detail on locations throughout Turkey on a data-enhanced map, which can be used as a way to provide context and background information on stories the network releases.

Another question asks whether there are any plans to monetize content. Engin is insistent that the priority is building better content, not working on sustainability. Another questioner asks whether coming internet censorship will make it difficult for 140journos to share content. Engin explains that the group has so many friends in the Pirate Party that they won’t have trouble finding VPNs, or helping their readers find VPNs. At the same time, he notes that it’s unclear how these admittedly draconian laws will actually be implemented. Engin notes that his group is non Anonymous (or anonymous) – they strongly believe they are doing nothing illegal, merely reporting the news.

Another question asks whether the Turkish government will begin mining online data to identify protesters. Zeynep explains that this isn’t necessary – every phone in Turkey is registered to an individual’s national ID, and the government has the identity of everyone who has appeared at protests. While there have been occasional arrests of people who tweeted to incite violence, there have not been widespread roundups of people involved with these demonstrations. Engin notes that the government probably cannot shut down the internet in Turkey without collapsing the government entirely.

Zeynep closes the conversation by noting her amazement when she discovered that 140journos was four college students, working in their free time. She draws an analogy to the groups that coordinated logistics during the Tahrir protests, who used social media to build a logistics team, inspired by a local cupcake shop that used Twitter in that fashion. Zeynep suggests that we’re seeing a technological shift that makes certain kinds of mobilization significantly easier than it ever had been before.

]]>
danah boyd: “It’s Complicated” http://www.ethanzuckerman.com/blog/2014/02/25/danah-boyd-its-complicated/ http://www.ethanzuckerman.com/blog/2014/02/25/danah-boyd-its-complicated/#comments Tue, 25 Feb 2014 19:49:47 +0000 http://www.ethanzuckerman.com/blog/?p=4804 Continue reading ]]> danah boyd is a Principal Researcher at Microsoft Research, a Research Assistant Professor in Media, Culture, and Communication at New York University, a fellow at the Berkman Center, and director of the Data and Society Institute. danah has been working on the issues associated with “It’s Complicated” for many years. 10 years ago, Ethan and danah were two of the youngest people at a conference. danah told him, “I only have one secret to get through these events. I tell them what their children are doing.” Telling people what their children are doing online is incredibly valuable, either because we’re parents who care about our children, or because we care about the future of the Internet. danah has been relentless over the last decade in trying to make it clear that simple snap answers about the Internet (good, bad, dangerous, amazing) are utterly and totally inadequate. What we need to do is to take a long, careful look at the context that underlies people’s behaviours online. We’re in a moment where the easiest thing to do is to say “it’s simple.” danah has put forward a book that says “it’s complicated.”

Today is the official publication of the book and danah tells us that she wanted to spend the day with friends. (Her day began, mediawise, with a celebratory story on NPR, ”Online, Researcher Says, Teens Do What They’ve Always Done”) She’s been affiliated with the Berkman Center, in one context or another, for fifteen years. Rather than lecture about the book, she wants to provide some context on her thinking, then take questions.

Berkman surprises danah with a congratulatory cake

danah explains that she was part of the first generation to grow up online, and that the internet was her “saving grace”. Her brother tied up the phone lines with strange modem squeals, and he showed her that the internet was made of people. Once she’d made that discovery, the phone line wasn’t safe after her mother went to bed. The first $700 phone bill ended that, but introduced danah to the wider world of phone phreaking and misbehavior to ensure she had access to outline spaces.

She went to school in computer science to explore the space, but didn’t really find her direction until she came to grad school and was able to study social media. She began a blog in 1998, and has been participating in and working on social media since then. Working with Judith Donath in 2002, she was invited to join Friendster a year before the network became prominent and widely used (see this paper on Friendster).

The early adopters of Friendster were geeks, freaks and queers, danah tells us, and those groups are the early adopters of most new technology platforms. As someone who identifies with all those groups, danah tells us that she had a front-row seat for Friendster’s successes and missteps, and was often able to interrogate the platform’s founder about his decisions. She moved to studying MySpace, and benefitted from the shift of youth to that platform, allowing her to watch the rise and fall of two major social media platforms (see danah’s research on Friendster and MySpace and this paper on Why Youth (Heart) Social Network Sites)

danah tells us that MySpace was based on Cold Fusion, a now-antiquated database programming language, and that the vulnerabilities of the site led her to novel research methods. User IDs were assigned sequentially, and she was able to sample users by choosing a random subset of IDs. But as her research developed, it became less easy to randomly approach youth online, so danah shifted her research methods to working offline, traveling around the United States to meet the young users of these platforms. (The major problem with interviewing 166 teenagers was dietary – it involved a lot of cafeteria lunches and a lot of McDonalds.)

Her research on teens informed her doctoral dissertation, and once she’d completed it, she felt a need to discuss the same issues with a broader audience. The book is organized around myths associated with youth and online media: the idea that youth are digital natives, that online spaces are heavily sexualized, and that online spaces are dangerous to youth.

Her overall takeaway from this research: we have spent thirty years restricting the ability of youth to get together face to face in the physical world. These technologies give youth access to public life once again and to make meaning of the world around them. Youth want to gather and socialize with their friends and become part of public life. Many youth would rather get together in real life, but turn to online spaces because those are the only spaces where young people can interact with one another in public life.

“There’s so much learning, so much opportunity through being part of public life”, says danah. We need to accept the idea that these online spaces are the key public spaces for young people.

Dorothy Zinberg asks about cycles – the decline of Friendster and MySpace – is Facebook now declining? And how do we expect these youth to change over the next decade?

danah notes that ten years ago, email was something people were excited about – “You’ve got mail” was a popular ringtone. Now, we open email with apprehension and worry. And that’s how teens are now approaching Facebook. Teens are not running from it, but it’s no longer the “passion play” – instead, it’s a place to connect with adults in your life. Who wants to spend their time hanging out with adults? The idea of a single platform to rule them all will look like a historical anomaly. It’s more natural to see fragmentation, a wealth of platforms that people use for different reasons and in different contexts. There are messaging, photo and videosharing services, all of which have emerged as new spaces for youth. We’re also seeing the emergence of interest-driven spaces like Tumblr or Twitter, which make it possible to geek out on fashion or music. There are also media for different communities – people obsessed with media are fascinated with Secret, which looks more like ChatRoulette in terms of speed. Young people, depending on their interests and passions, are moving across different services with texting as the single common denominator. danah notes that texting behavior in the US is anomalous, as we are one of the few countries where you pay to send and receive texts – there’s nothing more socially awkward than sending someone a message and making them pay for it.

As far as where youth usage is going: it’s moving to mobile. Mobile is an intimacy device. In response to discussions over safety, computers are now used in shared spaces, like the living room. The mobile device is a way of maintaining privacy. But the world of aps is a very different world than the world of websites. It’s surprising that we don’t yet have powerful geographically-linked apps – it may be that since youth are restricted to a world of home and school, geolocation doesn’t yet have a youth audience, and people love to experiment on young users. She notes that the old is new again, pointing to the rise of the aniGIF.

David LaRochelle wonders whether issues of Facebook’s collapsed context is a technical problem – could something like Google Plus solve those technical problems? danah explains that the key feature of new platforms is that Mom doesn’t know about them yet – once Mom knows you have an account, she can watch over your shoulder or demand you friend her. She asks us to think back to high school: not everyone in your class are friends with one another. When you plan a party, you don’t want to invite everyone. That same drama plays out online – you can move to a different platform as a way of connecting with a subset of friends.

Judith Donath asks what we’ve learned longitudinally from studying social media over the course of years. What happens when a generation that grew up on one set of applications is now 23? danah explains that the book is really about high school. She’s tracked some of these teens through college or the military and into the real world. Something that becomes clear is that certain behaviors are tightly associated with a life stage. The constraints of high school dynamics seem to force people to work through status, peer relationships and early sexual relationships, all of which play into online media environments, and then, in turn, influence those school dynamics. Once people are no longer constrained by school dynamics, you see a more mature set of dynamics: more dating, more efforts to appear cool, and lots of discussion about employment. The use of social media changes sharply for 20-somethings who want to go into social media marketing, or government, where that behavior ends up changing their online behavior.

A visiting scholar from Valencia asks about gender differences in teen behavior online, especially around experimentation. danah notes that it’s challenging to differentiate between gendered behavior online and offline: online behavior mirrors the offline. Status dynamics come into focus for girls earlier than for boys, while boys have more gameplay relationships (pranking, punking) with their peers, both offline and online. One of her book chapters is on “drama”, a predominantly female behavior online and off. What’s more challenging in studying gender online is watching gendered pressures, especially around sexuality, playing online. Young girls see a Miley Cyrus video and feel pressure to dress and behave certain ways. Young boys feel social pressure to talk to girls in certain ways. Online environments make very clear how powerful these pressures are.

Tim asks about policy and practice responses to youth behavior online. danah explains that she never expected to engage in policy through this research. She takes us back to a lawsuit mounted by 49 states attorneys general against MySpace, accusing the platform of enabling sexual predation. One of the outcomes of the suit was appointing a Internet Safety Task Force, consisting of danah, John Palfrey, and Dena Sacco, to help MySpace regulate behavior. The attorneys general expected a tension between the three, but the three worked closely together to consider actual data around contact, conduct and content online. Their research found far less evidence for dangerous behavior online than the attorneys general had expected to find, and came to the counterintuitive finding that the laws designed to prevent bullying had often had negative effects. danah hopes that one thing this book can do is help prevent ridiculous, counterproductive laws from being written.

danah also explains that it’s been very hard to work with practitioners, like teachers. In the early days of social media, teachers often came into these spaces and explored how to interact with students. It’s now become an article of faith that teachers should not engage with students in these spaces, and that’s a shame, as it’s important to have non-custodial guides online. Don’t friend a student, but if a student reaches out to you, reciprocate. “Don’t flip out” when students misbehave, but make clear that you’re present in the space. She notes that Jane Jacobs explained the importance of eyes of the street in urban spaces – we might think of the same dynamic happening online.

Kate Darling notes that Sherry Turkle speculates that online communication in the place of face to face communication is dangerous and detrimental. danah explains that she loves Sherry as a person, but strongly disagrees with her as a researcher. Sherry starts conversations by noting how uncomfortable teens are interacting with adults – when, asks danah, have teens ever been comfortable interacting with adults?! Teens are comfortable socializing with each other face to face, but retreat to devices around adults. Teens want to spend more time face to face with friends and generally are prevented from doing so. “Every aspect of sociality is a learning process and you strengthen different muscles through different interactions.” Teens may be more sophisticated in interacting online than in interacting face to face simply through where they have the most practice. But it’s absurd to suggest that teens are somehow stunted by online interaction.

“The political activist in me got entertained by the idea that a generation learned to use proxies to escape restrictions put in place by adults.” When we talk about teenagers, we’re usually dealing with our own anxieties, danah says. Lawmakers became obsessed with teen sexting before Anthony Weiner came on the scene and reminded everyone that lawmakers can misbehave as well.

Deb Chachra refers to a Sumerian clay tablet in which a father complains about his slacker son. How do we overcome the “kids these days” narrative that shapes so much of discussion around kids and social media. danah notes that the downside of Deb’s example is that we appear to be predestined to repeat these behaviors. The key is to get adults to listen to young people. Young people are telling their stories – the positive and the negative – to an unprecedented degree. Instead of complaining, there’s an amazing opportunity to listen to youth writ large. danah hopes the book will spark conversations about how we listen, rather than answering specific questions. That said, she worries that protectionism of young people leads to young adults who are not well socialized to deal with the choices of college or adult life.

A questioner asks about kids moving to different platforms to escape their parents. She notes that there’s a spectrum of risk from paranoia to actual risk. If kids are escaping to these narrow, parent-free spaces, who are the people on the streets who can provide eyes on online behavior? The providers of these applications are not teenage kids and may not have the best interests of teens in mind. danah suggests that we think about what adults are in the lives of kids beyond their parents. We want kids to have multiple adults – the cool aunt, the teacher they like – in their lives, and they are likely to invite these adults into online spaces. This is why age segregation is a dangerous direction for online platforms – we want adults and youth interacting in the same spaces. But danah doesn’t believe this will necessarily happen automatically – we may need to consciously create eyes on the streets, as community activists do by putting college students on the streets to work with at-risk youth. We need people to be involved in online spaces in a way that they are available, but non-judgemental.

danah notes her involvement with Crisis Textline, an NGO she helped start, that uses texting to connect teens to crisis hotlines. The worst thing we can do, she suggests, is put these decisions in the hands of engineers. We need to look at the people who understand these social systems and build on their best practices.

Rob Faris notes that part of being a kid is surviving your own mistakes and being able to hit the reset button. How does that work in online spaces? Could platforms and online spaces improve on this score? danah notes that one of the challenges online is that things go on your permanent record – she notes that her teenage Usenet posts are still online. We don’t know the longitudinal answer, danah notes – she’s part of a cohort that really did grow online, but it’s not clear how that information may affect life going forward. People assumed that bullying would be worse online, but it’s actually turned out that having a record of bullying is helping people find support. Documenting self-harm seems to lead youth to interventions that happen more quickly, but perhaps that accelerated progress is a good thing. Perhaps we are able to acknowledge the past through some sort of online transparency, putting information online before someone else does. She notes that we’ve moved into a culture of forgiveness for US presidents – from I didn’t inhale, to I did drugs, but I was a kid from Clinton to Obama – that we may simply be making it easier to escape your past. The question is whether this will be true for underprivileged youth in the same way that it is for the most privileged.

A questioner asks about youth’s relationships with free services. danah notes that this generation has very little access to financial capital. Babysitting and newspaper routes no longer produce revenue for kids, and kids now compete with fifty-year olds for fast food jobs. Without capital, there’s enormous pressure for kids in poorer families to get a phone and a pay as you go data plan. As a result, she saw a lot of kids engaged in illegal activities to obtain devices. Once kids are online, it’s all about free. They don’t particularly like ads, but they don’t see an alternative. The response is a form of gameplaying: can you send content to your friends that make them get absurd ads? Young people understand the ecosystem, but their relationship is one of hacking and playing. Their goal is socializing with their friends, and they understand that free services make that possible.

Tim Mallay notes that he recently revisited danah’s discussions of gentrification in MySpace. In 2006-7, danah explains, she saw a split between youth moving to MySpace and Facebook. Facebook appeared safe and high-status, while MySpace seemed dangerous, poor and used by people of color. danah wrote an essay she now regrets discussing this dynamic, and woke up to a media storm that resulted from her observations. Teens often told danah that she was right, though insufficiently nuanced. These race and class dynamics are still critical to understanding social media, danah tells us, but there’s no longer as start a division between sites. Instead, it plays out in different behavior on the different platforms. Because social media plays out around the race and class networks of your social circle, it’s impossible to understand online behavior without considering these issues. danah guesses that we’ll see this again once we’re fragmenting between different services like messaging aps – adoption of the different platforms tends to be based on race and class. This matters, because in 2006-7 colleges were recruiting online – we need to make sure that we don’t reproduce privilege online by favoring some platforms over others.

A question from a Berkman staffer begins by noting that he coaches high school atheletes, and he’s observed that they are less broadly skilled than they were years ago. He believe this is because students only engage in physical behavior in structured ways. Is it possible that we may finally be reaching a point where we will be able to tell youth that it’s okay to go outside again? danah notes that, especially within privileged environments, it’s hard to get a network of parents to change behavior. It’s a collective action problem – if you allow your children to be “free range” kids, other parents will force their children to shun your child. Because it doesn’t work to go parent to parent, danah feels it’s important to bring these messages of the importance of giving youth space to roam online and offline to media and other public fora. Oddly, she’s more successful making this case for urban families than to suburban ones, if only because public transportation makes it possible for children to roam.


danah will be speaking tonight (February 25) at the Harvard Bookstore. Come and hear hear her talk about “It’s Complicated” and bring your own questions.


Ethan Zuckerman and Nathan Matias blogged this talk. Willow Brugh visualized it as well:

]]>
http://www.ethanzuckerman.com/blog/2014/02/25/danah-boyd-its-complicated/feed/ 1
Kate Darling on Robot Ethics http://www.ethanzuckerman.com/blog/2013/11/19/kate-darling-on-robot-ethics/ http://www.ethanzuckerman.com/blog/2013/11/19/kate-darling-on-robot-ethics/#comments Tue, 19 Nov 2013 18:33:34 +0000 http://www.ethanzuckerman.com/blog/?p=4763 Continue reading ]]> Kate Darling (@grok_) offers a talk to the Berkman Center that’s so popular, the talk needs to be moved from Berkman to Wasserstein Hall, where almost a hundred people come for lunch and her ideas on robot ethics. Kate is a legal scholar completing her PhD during a Berkman fellowship (and a residence in my lab at the Media Lab), but tells us that these ideas are pretty disconnected from the doctoral dissertation she’s about to defend on copyright. She’s often asked why she’s chosen to work on these issues – the simple answer is “Nobody else is”. There’s a small handful of “experts” working on robots and ethics, and she feels an obligation to step up to the plate and become genuinely knowledgeable about these issues.

Robots are moving into transportation, education, care for the elderly and medicine, beyond manufacturing where they have been for years. She is concerned that our law may not yet have a space for the issues raised by the spread of robots, and hopes that we can participate in the construction of a space of robotics law, following on the healthy and creative space of cyberlaw.

She begins with a general overview of robot ethics. One key area is safety and liability – who is responsible for dysfunction and damage in these complex systems where there’s a long chain from coder to the execution of the system. It sounds fanciful, but people are now trying to figure out how to program ethics into these systems, particularly around autonomous weapons like drones.

Privacy is an area that creates visceral responses in the robotics space – Kate suggests that talking about robots and privacy may be a way to open some of the discussions about the hard issues raised by NSA surveillance. But Kate’s current focus is on social robots, and specifically on the tendency to project human qualities on robots. She references Sherry Turkle‘s observation that people bond with objects in a surprisingly strong way. There are perhaps three reasons for this: physicality (we bond more strongly with the real world than with the screen), perceived autonomous action (we see the Roomba moving around on its own, and we tend to name it and feel bad when it gets stuck in the curtains), anthropomorphism (robots targeted to mimic expressions we associate with states of minds and feelings.)

Humans bond with robots in surprising ways – soldiers honor robots with medals, demand that robots be repaired instead of being replaced, and demand funerals when they are destroyed. She tells us about a mine-defusing robot that looked like a stick insect. It lost one of six legs each time it exploded a mine. The colonel in charge of the exercise called it off on the grounds that a robot reduced to two or three legs was “inhumane”.

Kate shows her Pleo dinosaur, named for Yochai Benkler. The robot was inspiration from an experiment she ran at a workshop with legal scholars where she encouraged participants to bond with these robots, then to destroy one. Participants were horrified, and it took threats to destroy all robots to get the group to destroy one of the six. She observes that we respond to social cues from lifelike machines, even if we know they are not real.


Kate encourages workshop participants to kill a robot. Murderer.

So why does this matter? People are going to keep creating these sorts of robots, if only because toy companies like to make money. And if we have a deep tendency to bond with these robots, we may need to discuss the idea of instituting protections for social robots. We protect animals, Kate explains. We argue that it’s because they feel pain and have rights. But it’s also because we bond with them and we see an attack on an animal as an attack on the people who are bonded with and value that animal.

Kate notes that we have complicated social rules for how we treat animals. We eat cows, but not horses, because they’re horses. But Europeans (though not the British) are happy to eat horses. Perhaps the uncertainty about rights for robots suggests a similar cultural challenge: are there cultures that care for robots and cultures that don’t. This may change, Kate argues, as we have more lifelike robots in our lives. Parts of society – children, the elderly, may have difficulty distinguishing between live and lifelike. In cases where people have bonded with lifelike robots, are we comfortable with people abusing these robots? Is abusing a robot someone cares about, and may not be able to distinguish from a living creature, a form of abuse if it hurts the human emotionally?

She notes that Kant offered a reason to be concerned about animal abuse: “We can judge the heart of a man by his treatment of animals for he who is cruel to animals becomes hard also in his dealings with men.” Some states look at reports of animal abuse and conduct investigations of child abuse when there’s been a report of animal abuse in a household because they worry that the issues are correlated. Is robot abuse something we should consider as evidence of more serious underlying social or psychological issues?

Kate closes by suggesting that we need more experimental work on how human/robot bonding takes place. She suggests that this work is almost necessarily interdisciplinary, bringing together legal scholars, ethicists and roboticists. And she hopes that Cambridge, a space that brings these fields together in physical space, could be a space where these conversations take place.

Jessa Lingel of MSR asks whether an argument for protecting robots might extend to labor protections for robots. “I’m not sure I buy your arguments, but if so, perhaps we should also unionize robots?” Kate argues that we should grant rights according to needs and that there’s no evidence that robots mind working long hours. Jessa suggests that the argument for labor rights might parallel the Kantian argument – if we want people to treat laborers well, maybe we need to treat our laboring robots well.

There’s a long thread on intellectual property and robots. One question asks whether we can demand open source robots to ask for local control rather than centralizing control. Another asks about the implications of self-driving cars and the ability to review algorithms for responsibility in the case of an accident. I ask a pointed question about whether, if the Pentagon begins advertising ethical drones that check to see whether there’s a child nearby before we bomb a suspected terrorist, will we be able to review the ethics code? Kate notes that a lot of her answers to these questions are, “Yes, that’s a good question – someone should be working on this!”

Andy Sellars of Digital Media Law Project asks Kate to confront her roboexceptionalism. He admits that he can’t make the leap from the Pleo to his dog, and can’t see any technology on the horizon that would really blur that line for him. Her Pleo experiment could be replicated with stuffed animals – would we worry as much about people torturing stuffed animals? Kate cites Sherry Turkle, who has found evidence that children do distinguish between robots and stuffed animals. More personally, she tells a story about a woman who told her, “I wouldn’t have any problem torturing a robot – does that make me a bad person?” Kate’s answer, for better or for worse, is yes.

Tim Davies of the Berkman Center offers the idea that Kate’s arguments for robot ethics is virtue ethics: ethics is the character we have as people. Law generally operates in the space of consequentialist ethics: it’s illegal because of the consequences of behavior, not its reflection on your calendar. He wonders whether we can move from language of anthropomorphism around robots and talk about simulation. There are legal cases where simulation of harm is something we consider to be problematic, for instance, simulated images of child abuse.

Boris Anthony of Nokia and Ivan Sigal of Global Voices (okay, let’s be honest – they’re both from Global Voices) both ask about cultural conceptions of robots through science fiction – Boris references Japanese anime and suggests that Japanese notions of privacy may be very different from American notions; Ivan references Philip K. Dick. Kate notes that, in scifi, lots of questions focus on the inherent qualities of robots. “Almost Human”, a near-future show that posits robots that have near-human emotions, is interesting, but not very practical – we’re not going to have those robots any time soon. Issues of projection are going to happen far sooner. In the story that becomes Blade Runner, the hero falls in love with a robot who can’t love him back, and he loves her despite that reality – that’s a narrative that had to be blurred out in the Hollywood version because it’s a very complex question for a mainstream movie.

Chris Peterson opens his remarks by noting that he spent most of his teenage years blowing up furbies in the woods. “Was I a sociopath, a teenager in New Hampshire, or are the two indistinguishable?” Kate, whose Center for Civic Media portrait, features her holding a flayed Furby shell absolves Chris: “Furbies are fucking annoying.” Chris’s actual question focuses on the historical example of European courts putting inanimate objects on trial, citing a case where a Brazilian colonial court put a termite colony on trial for destroying a church (and the judge awarded wood to the termites who had been wronged in the construction.) Should emergent, autonomous actors that have potentials not intended by designers have legal responsibilities. “Should the high frequency trading algorithm that causes harm be put to death? Do we distinguish between authors and their systems in the legal system?” Kate suggests that we may have a social contract that allows the vengeance of destroying a robot that we think has wronged people, but notes that we also try to protect very young people from legal consequences.

]]>
http://www.ethanzuckerman.com/blog/2013/11/19/kate-darling-on-robot-ethics/feed/ 10
Schneier and Zittrain on digital security and the power of metaphors http://www.ethanzuckerman.com/blog/2013/04/04/schneier-and-zittrain-on-digital-security-and-the-power-of-metaphors/ http://www.ethanzuckerman.com/blog/2013/04/04/schneier-and-zittrain-on-digital-security-and-the-power-of-metaphors/#comments Thu, 04 Apr 2013 23:26:41 +0000 http://www.ethanzuckerman.com/blog/?p=4522 Continue reading ]]> Bruce Schneier is one of the world’s leading cryptographers and theorists of security. Jonathan Zittrain is a celebrated law professor, theorist of digital technology and wonderfully performative lecturer. The two share a stage at Harvard Law School’s Langdell Hall. JZ introduces Bruce as the inventor of the phrase “security theatre”, author of a leading textbook on cryptography and subject of a wonderful internet meme.

The last time the two met on stage, they were arguing different sides of an issue – threats of cyberwar are grossly exaggerated – in an Oxford-style debate. Schneier was baffled that, after the debate, his side lost. He found it hard to believe that more people thought that cyberwar was a real threat than an exaggeration, and realized that there is a definitional problem that makes discussing cyberwar challenging.

Schneier continues, “It used to be, in the real world, you judged the weaponry. If you saw a tank driving at you, you know it was a real war because only a government could buy a tank.” In cyberwar, everyone uses the same tools and tactics – DDoS, exploits. It’s hard to tell if attackers are governments, criminals or individuals. You could call almost anyone to defend you – the police, the government, the lawyers. You never know who you’re fighting against, which makes it extremely hard to know what to defend. “And that’s why I lost”, Schneier explains – if you use a very narrow definition of cyberwar, as Schneier did, cyberwar threats are almost always exaggerated.

Zittrain explains that we’re not debating tonight, but notes that Schneier appears already to be conceding some ground in using the word “weapon” to explore digital security issues. Schneier’s new book is not yet named, but Zittrain suggests it might be called “Be afraid, be very afraid,” as it focuses on asymmetric threats, where reasonably technically savvy people may not be able to defend themselves.

Schneier explains that we, as humans, accept a certain amount of bad action in society. We accept some bad behavior, like crime, in exchange for some flexibility in terms of law enforcement. If we worked for a zero murder rate, we’d have too many false arrests, too much intrusive security – we accept some harm in exchange for some freedom. But Bruce explains that in the digital world, it’s possible for bad actors to do asymmetric amounts of harm – one person can cause a whole lot of damage. As the amount of damage a bad actor can create, our tolerance for bad actors decreases. This, Bruce explains, is the weapon of mass destruction debate – if a terrorist can access a truly deadly bioweapon, perhaps we change our laws to radically ratchet up enforcement.

JZ offers a summary: we can face doom from terrorism or doom from a police state. Bruce riffs on this: if we reach a point where a single bad actor can destroy society – and Bruce believes this may be possible – what are the chances society can get past that moment. “We tend to run a pretty wide-tail bell curve around our species.”

Schneier considers the idea that attackers often have a first-mover advantage. While the police do a study of the potentials of the motorcar, the bank robbers are using them as getaway vehicles. There may be a temporal gap when the bad actors can outpace the cops, and we might imagine that gap being profoundly destructive at some point in the near future.

JZ wonders whether we’re attributing too much power to bad actors, implicitly believing they are as powerful as governments. But governments have the ability to bring massive multiplier effects into play. Bruce concedes that his is true in policing – radios have been the most powerful tool for policing, bringing more police into situations where the bad guys have the upper hand.

Bruce explains that he’s usually an optimist, so it’s odd to have this deeply pessimistic essay out in the world. JZ notes that there are other topics to consider: digital feudalism, the topic of Bruce’s last book, in which corporate actors have profound power over our digital lives, a subject JZ is also deeply interested in.

Expanding on the idea of digital feudalism, Bruce explains that if you pledge you allegiance to an internet giant like Apple, your life is easy, and they pledge to protect you. Many of us pledge allegiance to Facebook, Amazon, Google. These platforms control our data and our devices – Amazon controls what can be in your Kindle, and if they don’t like your copy of 1984, they can remove it. When these feudal lords fight, we all suffer – Google Maps disappear from the iPad. Feudalism ended as nation-states rose and the former peasants began to demand rights.

JZ suggests some of the objections libertarians usually offer to this set of concerns. Isn’t there a Chicken Little quality to this? Not being able to get Google Maps on your iPad seems like a “glass half empty” view given how much technological process we’ve recently experienced. Bruce offers his fear that sites like Google will likely be able to identify gun owners soon, based on search term history. Are we entering an age where the government doesn’t need to watch you because corporations are already watching so closely? What happens if the IRS can decide who to audit based on checking what they think you should make in a year and what credit agencies know you’ve made? We need to think this through before this becomes a reality.

JZ leads the audience through a set of hand-raising exercises: who’s on Facebook, who’s queasy about Facebook’s data policies, and who would pay $5 a month for a Facebook that doesn’t store your behavioral data? Bruce explains that the question is the wrong one; it should be “Who would pay $5 a month for a secure Facebook where all your friends are over on the insecure one – if you’re not on Facebook, you don’t hear about parties, you don’t see your friends, you don’t get laid.”

Why would Schneier believe governments would regulate this space in a helpful way, JZ asks? Schneier quotes Martin Luther King, Jr. – the arc of history is long but bends towards justice. It will take a long time for governments to figure out how to act justly in this space, perhaps a generation or two, Schneier argues that we need some form of regulation to protect against these feudal barons. As JZ translates, you believe there needs to be a regulatory function that corrects market failures, like the failure to create a non-intrusive social network… but you don’t think our current screwed-up government can write these laws. So what do we do now?

Schneier has no easy answer, noting that it’s hard to trust a government that breaks its own laws, surveilling its own population without warrant or even clear reason. But he quotes a recent Glenn Greenwald piece on marriage equality, which notes that the struggle for marriage equality seemed impossible until about three months ago, and now seems almost inevitable. In other words, don’t lose hope.

JZ notes that Greenwald is one of the people who’s been identified as an ally/conspirator to Wikileaks, and one of the targets of a possible “dirty tricks” campaign by H.B. Gary, a “be afraid, be very afraid” security firm that got p0wned by Anonymous. Schneier is on record as being excited about leaking – JZ wonders how he feels about Anonymous.

Schneier notes how remarkable it is that a group of individuals started making threats against NATO. JZ finds it hard to believe that Schneier would take those threats seriously, noting that Anon has had civil wars where one group will apologize that their servers have been compromised and should be ignored as they’re being hacked by another faction – how can we take threats from a group like that seriously? Schneier notes that a non-state, decentralized actor is something we need to take very seriously.

The conversation shifts to civil disobedience in the internet age. JZ wonders whether Schneier believes that DDoS can be a form of protest, like a sit in or a picket line. Schneier explains that you used to be able to tell by the weaponry – if you were sitting in, it was a protest. But there’s DDoS extortion, there’s DDoS for damage, for protest, and because school’s out and we’re bored. Anonymous, he argues, was engaged in civil disobedience and intentions matter.

JZ notes that Anonymous, in their very name, wants civil disobedience without the threat of jail. But, to be fair, he notes that you don’t get sentenced to 40 years in jail for sitting at a lunch counter. Schneier notes that we tend to misclassify cyber protest cases so badly, he’d want to protest anonymously too. But he suggests that intentions are at the heart of understanding these actions. It makes little sense, he argues, that we prosecute murder and attempted murder with different penalties – if the intention was to kill, does it matter that you are a poor shot?

A questioner in the audience asks about user education: is the answer to security problems for users to learn a security skillset in full? Zittrain notes that some are starting to suggest internet driver’s licenses before letting users online. Schneier argues that user education is a cop-out. Security is interconnected – in a very real way, “my security is a function of my mother remembering to turn the firewall back on”. These security holes open because we design crap security. We can’t pop up incomprehensible warnings that people will click through. We need systems that are robust enough to deal with uneducated users.

Another questioner asks what metaphors we should use to understand internet security – War? Public health? Schneier argues against the war metaphor, because in wars we sacrifice anything in exchange to win. Police might be a better metaphor, as we put checks on their power and seek a balance between freedom and control of crime. Biological metaphors might be even stronger – we are starting to see thinking about computer viruses influencing what we know about biological viruses. Zittrain suggests that an appropriate metaphor is mutual aid: we need to look for ways we can help each other out under attack, which might mean building mobile phones that are two way radios which can route traffic independent of phone towers. Schneier notes that internet as infrastructure is another helpful metaphor – a vital service like power or water we try to keep accessible and always flowing.

A questioner wonders whether Schneier’s dissatisfaction with the “cyberwar” metaphor comes from the idea that groups like anonymous are roughly organized groups, not states. Schneier notes that individuals are capable of great damage – the assassination of a Texas prosecutor, possibly by the Aryan Brotherhood – but we treat these acts as crime. Wars, on the other hand, are nation versus nation. We responded to 9/11 by invading a country – it’s not what the FBI would have done if they were responding to it. Metaphors matter.


I had the pleasure of sitting with Willow Brugh, who did a lovely Prezi visualization of the talk – take a look!

]]>
http://www.ethanzuckerman.com/blog/2013/04/04/schneier-and-zittrain-on-digital-security-and-the-power-of-metaphors/feed/ 2
Who let all those Ghanaians on the Internet? Jenna Burrell on internet exclusion http://www.ethanzuckerman.com/blog/2013/02/12/who-let-all-those-ghanaians-on-the-internet-jenna-burrell-on-internet-exclusion/ http://www.ethanzuckerman.com/blog/2013/02/12/who-let-all-those-ghanaians-on-the-internet-jenna-burrell-on-internet-exclusion/#comments Tue, 12 Feb 2013 22:46:46 +0000 http://www.ethanzuckerman.com/blog/?p=4488 Continue reading ]]> Jenna Burrell, assistant professor at the School of Information at UC Berkeley, is speaking today at the Berkman Center on her research on internet usage in Ghana, the subject of her (excellent) book Invisible Users: Youth in the Internet Cafes of Urban Ghana. Burrell is an ethnographer and sociologist, and her examination of Ghanaian internet cafes is one of the best portraits of contemporary internet use in the developing world.


Jenna doing fieldwork in Ghana

Her talk today covers some of the work she began in 2004 and published last year, but expands in some new directions, including questions about network security and preserving access in the margins of the Global Internet. Burrell’s understanding of Ghana has been built up through six years of fieldwork, both on how non-elite Ghanaians use the internet, and on how Ghana’s internet has literally been built, from recycled and repurposed computer equipment. She notes that ethnographers are famous for their microfocus. When she published her book, a Facebook friend joked, “How odd, I just finished my book on youth in the internet cafes of suburban Ghana!” Burrell is now interested in some of the broader questions we might examine raised by specific cases like the dynamics of Ghana’s cybercafes.

Burrell notes that early conversations about the internet often featured the idea that in online spaces, we transcend our physical limits and are able to talk to people anywhere in the world. Our race and gender might become irrelevant or invisible. She suggests that just at the point where real cross-cultural connection was starting to unfold online, discourse about a borderless internet became unfashionable. We might benefit from returning to some of these ideas of borderlessness and encounter in places where these encounters are really taking place.

Ghana’s internet cafes are an excellent space to explore how this connect works in practice, as much of what takes place in these cafes is centered on international connect. Ghana’s “non-elite” net youth culture – i.e., the young people accessing the internet via cybercafes, not the digerati who are accessing the net through computers in their homes – centers around the idea of the “pen pal”, an analog concept adapted for a digital age. Many Ghanaian students have interacted with pen pals via paper letters, and their encounters in online space often focused on finding a digital pen pal. Most participating in this culture were English-literate, had at least a high school education and had probably stopped going to school when they ran out of funds. They sought out pen pals for a variety of reasons: as friends, as potential romantic partners, as patrons or sponsors, business partners, or as philanthropists who might fund their future education or emigration.

Much of Burrell’s work has focused on talking to cybercafe users about their stories and motivations. Understanding the gaps between their understandings of the people they are talking with on Yahoo chat or other tools helps illuminate the challenge of cultural encounter. One group of cybercafe youth were collectors. They had applied for British Airways Executive Club membership – the airline’s frequent flyer program – and called themselves “The Executive Club”, reveling in the membership cards the airline had sent. They collected religious CDs and bibles from the people they encountered online. Another Ghanaian participant in Christian chat rooms on Yahoo! complained that his conversation partners didn’t understand his needs and motivations – he was looking for contacts and potential business partners and figured that Christians would be trustworthy people to work with, but was frustrated that they only wanted to talk about the bible. A third person she observed explained, “I take pen pals just for the exchange of items and actually I don’t take my size. I take sugar mommies and sugar daddies…” In other words, he was looking specifically for conversations that led to people giving gifts.

This sounds like a path from conversation into internet scamming, but Burrell warns us not to jump to conclusions. Gift-giving is very common in Ghanaian culture, and while gifts are small, they are important and usually reciprocal. Some of her Ghanaian informants couldn’t understand why asking for a gift chased their conversation partners away. Fauzia, who had been chatting with a man on Yahoo! asked him to send her a mobile phone. Not only did he stop taking to her, he performed a complicated “dance of avoidance”, logging off when he saw her log on. Another informant, Kwaku, was talking with a Polish woman about seeking a travel visa and couldn’t understand why she wouldn’t let him stay in her home in Poland. Again, the cultural discontinuity is important – if you traveled to see a friend in their village, you would expect that they would share their home with you and provide a place for you to sleep.

Burrell suggests that there are basic misunderstandings between Ghanaian and North American/European culture around gender and communication norms, the moral economy of gifting and notions of obligation and hospitality. In addition, these cultural discontinuities are complicated by material asymmetries, simplistic perceptions of western wealth and African poverty, and the fact that Ghanaians are often paying for net connectivity by the minute, leading to rushed and high pressure encounters.

When cross-cultural encounters go badly, people seek to block further contact. Networks like Facebook make it very easy to block an individual from contacting you. But Burrell sees the internet moving from simple blocking and banning to “encoded exclusion”, the automatic exclusion of entire countries from being able to access certain servers and services. Dating websites, in particular, have taken to blocking and banning Ghanaians and Nigerians entirely, because they use the websites in ways that the site’s creators hadn’t expected or intended.

Working from Ghana for almost a decade, Burrell has found that it’s often difficult to engage in basic online tasks from that country because sites and services exclude based on geolocation. Based on her experiences and that of her informants, she posits two types of exclusion: failure to include, and purposeful exclusion.

Ecommerce is a space where failure to include is pretty common. Ecommerce is a credit-card based world. Many African economies, including Ghana’s, are largely cash based. Even for Ghanaians who have the money to buy online services, there’s often no easy way to make an online payment. This becomes a rationalization for credit card fraud. Ghanaians who want to participate on match.com, which has a modest member fee, rationalize using a stolen credit card as a way of gaining access to a space that’s otherwise closed. There’s also an unfair stigma attached to cash-based transactions, she posits. Some media coverage of Umar Farouk Abdulmutallab, the Nigerian underwear bomber, focused on the fact that he’d purchased his air ticket in Ghana, paying cash. US authorities suggested that paying cash was evidence of bad intent and some suggested waiting periods and extra scrutiny for cash payments – Burrell suggests that that’s simply how Ghana’s economy works at present, and that using cash payments as a signal for possible terrorist behavior is a form of failure to include.

Purposeful exclusion also comes into play in ecommerce. Burrell discovered that trying to purchase a product on Amazon from Ghana triggered a set of “forced detours” that made purchasing impossible. Once Amazon detected her login from Ghana, the site immediately reset her password and began sending her phishing warnings. Paypal uses similar techniques – when she tried to sign up for a sewing class in Oakland (to make something out of the beautiful batik she was buying in Ghana), PayPal told her that they didn’t serve customers in Ghana or Nigeria, and started a set of security checks that led to phone verification to her US phone, which didn’t work in Ghana. These extended loops of checks are a huge frustration to the Ghanaians who have the means and tools to participate in these economies. As Ghanaian-born blogger Koranteng noted in an excellent blog post, “If we take ecommerce as one component of modern global citizenship then we are illegal aliens of sorts, and our participation is marginal at best.”

Other blocks are more explicit. Plentyoffish.com, a popular, no-fee dating site, briefly ran a warning that stated that they block traffic from Africa, Romania, Turkey, India, Russia “like every other major site”. The warning was removed, but the site is still inaccessible from Ghana.

Search for “IP block Ghana” or “IP block Nigeria” and you’ll find posts on webmaster fora asking for advice on how to exclude whole nations from the internet. She offers three examples:

From Webmaster World: “I am so fed up with these darn African fraudsters, is it possible to block african traffic by IP”
From a Unix security discussion group: “Maybe we could just disconnect those countries from the Internet until they get their scam artists under control”
From a Linux admin tips site: “I admin an [ecommerce] website and a lot of bogus traffic comes from countries that do not offer much in commercial value.”

Legitimate frustration over fraud leads to overbroad attempts to crack down on this fraud. Burrell’s research involved working with a British woman who lost $100,000 to scams in Ghana – the woman came to Ghana to seek justice and Burrell attended court hearings with her. She suggests that while there’s likely corruption within the Ghana police service, the judges and lawyers she met were genuinely worried about scamming and looking for ways to crack down on the activity. But the perception remains that Ghana isn’t doing enough to protect the rest of the world from its least ethical internet users. This, in turn, has consequences for Ghana’s many legitimate users.

She leaves the group with a series of questions:
– How do we consider inclusiveness as one of the principals to strive for in network security best practices?
– How do we investigate and make visible the consequences of network security practices at the margins of the internet?
– When is country-level IP address blocking appropriate?

These questions lead to a lively discussion around the Berkman table. Oliver Goodenough wonders whether the practices Burrell is describing parallel redlining, the illegal practice of denying certain services or overcharging for them in neighborhoods with high concentrations of citizens of color. But another participant wonders whether we’re being unfair and suggests that using concepts like “censorship” to discuss online exclusion is unfairly characterizing what might simply be wise business practice. “Should a company be compelled to do business in a country where there’s no legal infrastructure to adequately protect it?” Jerome Hergueux argues that global trade follows trust, and that the desire to exclude these countries may be seen as a vote that there’s no trust in how they do business. Burrell notes that there are patterns of media coverage that contribute to why we don’t trust Ghanaians, and that those perceptions might not be accurate.


I’m deeply interested in the topics Burrell brings up in this talk. I’ve experienced the purposeful exclusion Burrell talks about, both in trying to do business from west Africa, and in my travels back and forth – I routinely bring goods to Ghana and Nigeria that friends in those countries have ordered and sent to my office, because they can’t get them delivered to their homes. It’s very strange when people you’ve met only over Twitter send you iPads so you can bring them to Nigeria… but it is, as Hergeuex points out, an interesting commentary on who we trust and who we don’t.

I worry about another form of exclusion that’s mostly theoretical at this point, but possible: what if spaces that are acting as digital public spheres become closed to developing world users? That’s an idea put forward in a New York Times article by Brad Stone and Miguel Helft. Examining Facebook’s efforts to build sites “optimized” for the developing world, they wonder whether companies, desperate to become profitable, will stop serving, or badly underserve, users in countries where there’s little online advertising, like Nigeria and Ghana.

Talking with Burrell after her talk, I wondered whether there’s a hierarchy of needs at work: should we worry more about Facebook banning Nigerian users (no evidence that they will, to be clear) more than Amazon or OkCupid? Are we willing to argue for a global right to online speech, but no global right to online dating? Burrell argued that accessing OkCupid might be more significant in terms of life transformation for a Ghanaian user than accessing Facebook and suggested that any sort of tiering of access was challenging to think through.

It’s interesting to consider: the Internet Freedom agenda advocated by the US State Department focuses on countries that would block access to the internet to prevent certain types of political speech. But what if the real threat to global internet freedom starts with US companies that don’t see a profit in letting Ghanaian or Nigerian users onto their sites? Anyone want to bet on whether a Kerry State Department will be willing to tell US companies to stop excluding African users?

]]>
http://www.ethanzuckerman.com/blog/2013/02/12/who-let-all-those-ghanaians-on-the-internet-jenna-burrell-on-internet-exclusion/feed/ 14
Doc Searls on “The Intention Economy” http://www.ethanzuckerman.com/blog/2012/06/11/doc-searls-on-the-intention-economy/ http://www.ethanzuckerman.com/blog/2012/06/11/doc-searls-on-the-intention-economy/#comments Tue, 12 Jun 2012 01:51:38 +0000 http://www.ethanzuckerman.com/blog/?p=4392 Continue reading ]]> Friend and fellow Berkmanite Doc Searls is presenting his new book, The Intention Economy, at Harvard this evening. That I’m hosting the event doesn’t stop me from blogging it. Doc’s new book is a manifesto designed to change how we think about vendors, customers, transactions and privacy. It’s also a trenchant critique of the advertising business and retail commerce as we know it. I’ve had great fun watching Doc write it and am excited to see it having an impact out in the world.

Here are my notes on Doc’s talk – I wasn’t able to blog the Q&A due to my lame attempts to moderate.


What is the most embarrasing thing about you? Something you’d only share with a really good friend or a licensed professional? Doc asks us to think about that question while we watch a clip from The Onion News Network, which reports on Facebook as an intelligence agency project, described by undercover agent Mark Zuckerberg as “the single most powerful tool for population control ever invented.”

Privacy is very simple in the material world. But it took us thousands of years to understand how privacy should work. We created technologies like clothing and houses to allow ourselves different degrees of privacy. The internet as we know it, Doc tells us, is 17 years old, with widespread adoption of the graphical web browser. There are no rules of privacy in this new world – it simply wasn’t designed into the protocols. The internet is early in its development. “The older I get, the earlier it seems.”

Facebook may know an immense about you, Doc tells us, but that’s not the internet – it’s an application. Facebook wasn’t even around 8 years ago – think of it as an experiment. There will be something else that follows on its heels. We should think about these technologies as a social and technical experiment we’re still working through.

Doc tells us we’ve been in a master-slave narrative since 1995. We go to websites for content – milk – and we get something in addition – a cookie. Cookies were invented to maintain state, to allow web servers to track us over time. We, as clients, are dependents, slaves to the servers, and we haven’t broken away from it yet. Thanks to cookies, we’re being followed… and not just by our friends.

He points us to a series called What They Know put together by the Wall Street Journal. Of the top sites on the web, the only not tracking users is Wikipedia. One site, dictionary.com, sets 234 tracking files on your browser so various companies can understand your online behavior. A site called Ghostery helps you see what’s been set on your system – there’s an amazing list of companies that are tracking you if you’re an average web user. How these companies use this data matters – he references Rebecca MacKinnon’s new book, Consent of the Networked, which points out that privacy setting changes on a site like Facebook have serious implications for dissidents in a country like Iran.

One of the companies Doc features is Rapleaf, an ad targeting company that collects a great deal of information about users. When Doc requested his Rapleaf file, he discovered that most of what the company thought they knew about him was wrong – he’s married, not single; he didn’t complete grad school; his residence is MA, not CA. These companies claim intimate knowledge of you, and what they have is inaccurate and incomplete.

Doc compares the current model of tracking to toddlers who can’t put on their own clothes. Even the Do Not Track compromise buys into the notion that the servers set cookies on you – you can refuse, but they’re still in charge of dressing you.

Companies like to tell us that you’re in charge – IBM’s website announces your visit as “the Chief Executive Customer”. This is window dressing. “I promise you that there’s not a single customer at their Smarter Commerce Global Summit.” These companies are following you around like a pack of dogs you can’t see. These dogs spend a lot of money – $1.5 trillion a year trying to sell you things. That isn’t going away… but the hundreds of millions being spent on analytics is a bubble. They claim that, through their big data, they know you thoroughly… but the truth is, they know very little.

He references Eli Pariser’s book “The Filter Bubble“, which suggests that internet marketing is based on “a bad theory of you.” Doc suggests that our experience with marketing is literally creepy – these theories are stuck in the uncanny valley. Facebook’s attempt to market to us are downright creepy in how they market to us. An ad, “Boyfriend Wanted – Seniors Meet”, seems based on the misperception that he’s single and the reality that he’s old. It’s not what he wants – it’s what the data thinks he wants.

Doc references corporate loyalty cards as a virus that spreads between species. The loyalty card came into play around 1995, and now it’s spreading into the online space. It’s accompanied by agreements we never made, the impossibly long contracts businesses force us to sign before using our iPhones or online services. Friedrich Kessler calls these “contracts of adhesion”, contracts where one party isn’t free to negotiate the terms. Freedom of contract, the ability to negotiate our terms and come to agreement with others, is a fundamental freedom in a democratic society. But in a broadcast age, we find the rise of mass marketing, and mass services. Individual contracts were no longer possible – instead, we had contracts that one side built and the other was required to accept. It’s a bad idea that came into the online world with little questioning.

So what can we do about this? These problems were evident in 1999, when Doc and colleagues wrote The Cluetrain Manifesto. He points to a Chris Locke quote: “We are not seats or eyeballs or end users or consumers. We are human beings – and our reach exceeds your grasp. Deal with it.” Tragically, this wasn’t true. While Cluetrain became very popular, this idea never caught on – our reach never exceeded our grasp in online spaces.

In the hopes of realizing some of these ambitions, Doc came to Berkman in 2006 and started working on Project VRM. VRM is a term he didn’t coin – it emerged from the community he brought together, as an alternative to “customer relationship management”, a massive industry. VRM is not yet at the scale of CRM, but it’s starting to have impact.

With VRM, Doc tells us, the customer drives. A car is a good example of a VRM tool – it gives us choice, independence and privacy. It’s a way of relating to the world and to commerce. An infrastructure has grown up around it – parking spaces, drive-thru restaurants. The car could never have been invented by a railroad. Anyone running a server alone – Google, Facebook – is in the railroad business.

VRM allows customers to define their own terms of service, define what loyalty is, control the use of your own data, manage your relationships with vendors, and do this all yourself, or through “fourth parties”, third parties who work for you, not the vendor. A fourth party is a buyer’s agent who works for you, a lawyer who represents your interests in the face of other institutions.

Fourth parties in the VRM community include TrustFabric, Singly, Azigo, The Customer’s Voice and several other start up firms. Doc focuses on a French company called Privony, a company that’s part of the VRM movement. Privony gives you a vault for your data, which you can share with companies… but they can’t see your data, as it’s encrypted. Privony provides a menu bar to help you manage your relationships with other sites, turning on or off tracking, and relating in new and better ways with the vendors of the world. With your permission and control, you can make yourself available as a qualified lead… but it’s your choice to do so.

What’s critical is the ability to set your own terms of service: “Don’t track me outside your site or service”, “Give me my data in the usable form I specify”, and so on. Your personal data is in the cloud, but you can control how various servers use it, rather than ceding that responsibility to those servers.

The global money transfer company, SWIFT, is encouraging people to think of your digital assets as a form of money. Thinking through this interesting thought, you end up with ideas like the possibility of escrowing your intention to make a certain purchase, and perhaps advertise your willingness to do so in order to find someone who wants to do business with you.

Project VRM is still starting, even six years into the project. It’s still the space of the innovators, not yet the space of early adopters. The end state – the late majority – is the “Intention Economy”, a space where your intentions are clear, and advertisers and vendors don’t have to guess at what you want.

]]>
http://www.ethanzuckerman.com/blog/2012/06/11/doc-searls-on-the-intention-economy/feed/ 2
David Weinberger: Too Big To Know http://www.ethanzuckerman.com/blog/2012/01/26/david-weinberger-too-big-to-know/ http://www.ethanzuckerman.com/blog/2012/01/26/david-weinberger-too-big-to-know/#comments Thu, 26 Jan 2012 04:02:13 +0000 http://www.ethanzuckerman.com/blog/?p=4325 Continue reading ]]> David Weinberger‘s new book “Too Big To Know” (#2B2K – be sure to pick book titles that make good hash tags…) launched last night at Harvard Law School with a talk entitled “Unsettling Knowledge”. If you know David’s work, it’s obvious that the title is a pun. And David’s new book is a wonderfully unsettling piece – it challenges our notion of what knowledge is, and introduces the uncomfortable question of how we navigate this new space.

Knowledge as we know it is coming apart, David tells us. The bastions of knowledge, the physical emblems of knowledge, like encyclopedias, newspapers and libraries are undergoing radical transformation. We know we’re heading into a future that’s deeply different, though we don’t know quite how. The manifestations of knowledge are at risk, and all it took was the touch of a hyperlink.

How did these institutions fall apart so quickly? It’s an impossible question to answer, but he offers one path through the thicket. He starts with a famous quote from Daniel Patrick Moynihan, who tells us “Everyone is entitled to his own opinion, not his own facts.” This is the promise of knowledge: that if we all got together and had an honest conversation, we can eventually come to an agreement. There is knowledge and it can bring us together.

We tend to assume that knowledge gives us an accurate picture of the world, built up bit by bit, fact by fact. In acquiring knowledge, we nail down each piece with certainty. And we see knowledge as a product of filtering and winnowing – we move from perception to true perception, from a mob of opinion to true belief. Knowledge is about finding gold within the flux.

We’ve always had to filter, based on the fact that the world is way bigger than what fits in our skills. There’s too much to know (quoting Anne Blair’s book “Too Much to Know“) and the world is too big to know.

Traditionally, we’ve handled this by breaking off a brain-sized chunk of the world and getting an expert to understand it. Once we’ve got that expert, we can stop asking questions: we simply ask the expert. Experts, and the credentials that create them, are stopping points. They’re points beyond which we don’t need to look any further.

But that’s how knowledge works on paper. Books, for all their magnificence, are a disconnected medium. They are contained within covers, they are shelved apart, they don’t naturally connect to one another. The author’s job is to put everything she knows on a topic between two covers. The arguments move in sequence, from the beginning to the conclusion. And because the book is an essentially limited medium, good writers ruthlessly cast things aside, deciding what it put in the book and what is excluded. Books are born of long-form arguments, moving us forward step by step, brick by brick.

Links are a new form of punctuation. They give you a means of continuing. In the print world, to follow a footnote in a book, you need to get on a bus and go to the library. That’s why we don’t generally follow footnotes. But now we can jump from one book to the next. It’s a magic map – touch a place on the map and you go there.

The internet is an environment that’s all about connection and our knowledge is picking up properties of the medium. Knowledge in this space is characterized by the fact that it’s “too much, messy, unsettled, and unstructured”.

Clay Shirky suggests that there’s no such thing as information overload, only filter failure. This is a very modern response to an older question. Futurist Alvin Toffler warned us about information overload, popularizing the phrase. It’s an extension of the idea of sensory overload, the idea that too much input could overwhelm and paralyze you. This is based on the faulty assumption that brains are information processing machines, and that we can overwhelm and crash them.

This line of thinking led marketers to conclude that choosing between 16 brands would be overwhelming to an American housewife and that fewer choices needed to be offered. But we’re now headed to a point where there’s an exabyte of genomic information available, and that number doesn’t lead us to paralysis, but to fascination. We’ve redefined the term “information overload” through how we use it.

We’re less overwhelmed because we’re learning different ways to filter. When we filtered in the print world, we did so in a way that prevented us from seeing the dregs. We saw only the books that our local library chose to buy, and only the books the publisher chose to print. The manuscripts filtered out of that process were invisible to retrieve through ordinary means.

Now, in a digital age, we filter forward, not filter out. All that information – some of it very low quality – is out there somewhere on the internet. We could curate and try to delete the stuff that’s wrong, hurtful, harmful or hateful. But it’s expensive to exclude information and cheaper to include everything. When you curate, you’re making decisions about what is interesting to your users, and no one can accurately predict what might be useful to a researcher in the future. Filter out all the gossip and crap from new media and you harm the scholar who wants to study celebrity behavior. You couldn’t have predicted the high level of interest in notes from a committee meeting in Wasilla, Alaska in 2008 until Sara Palin became a public figure.

The web has worked by developing tools that include all content and filter when we retrieve it. As recently as a decade ago, information retrieval experts told us that ordinary users would never use tools this complicated. But now we use them everyday, because we have to. And we’re seeing much better tools, like Shelflife, the tool Harvard’s Library Lab has created to allow users to browse the vast set of information in Harvard’s library systems.

We don’t just have a lot of information – the information is very messy. We like order – David shows a slide of zoological specimens, beetles mounted on pins – and we’re very good at establishing it. We understand where everything fits in a tree of species, based on similarities and differences. To know where a species fit into this tree was to know how the world works – to not know it was to be adrift.

In the physical world, there’s only one way to sort manifestations of information. You might want to sort your CDs by artist, while your partner might want them sorted by genre. There’s only one possible they can be stacked on the shelf, because no two things can be in the same place at the same time. In a digital age, we simply make playlists. We end up with a mess of information, but it’s a rich and fertile mess.

Figuring out where things fit in the natural order of things was an essential piece of being human. Human beings saw ourselves as “the knowers. But there’s multiple orders and multiple ways of categorizing, through tags, playlists and other ways to sort information. Messiness is an essential feature of how we scale meaning. But, David warns, we still tend to think of knowledge in the ways we did when books had to sit on a single place on the shelf, when knowledge had a single, possible, right form, rather than multiple forms.

Knowledge is too big, messy and wildly unsettled, just like the internet. “For every fact on the internet, there is an equal and opposite fact.” David warns that there is nothing we all agree on – you can find someone willing to argue that 2+2 is not 4 (and, indeed, a quick Google search shows this to be true.) We don’t agree about anything, and David warns, we never will. “This doesn’t mean there are no facts – but it does mean that people are going to insist on being wrong.”

What this persistence of disagreement means is that the promise of knowledge Moynihan offers – that we can agree on a set of facts and then argue our opinions – is not going to be fulfilled. As it turns out, we don’t even know whether Moynihan said “everyone is entitled to his own opinion, not his own facts” or whether that’s exactly what he said.

The good news is that we’re rapidly developing ways of dealing with difference and disagreement. YouTube has a crummy commenting system, as is well documented and well established. David shows us a threat of comments on a recent Batman movie trailer. Somewhere deep in this comment thread is an impassioned argument about circumcision. It would have been great if YouTube supported forking of conversations. Forking is a powerful way to deal with disagreement. It’s very hard to do in the real world without social consequences – if we decide to move away from the dinner party to our own table where we talk about circumcision, it makes people uncomfortable – but it’s very easy to do this on the web.

In the 19th century, it was very challenging to classify the platypus. There was one space in a taxonomy for warm-blooded animals, and another for animals that produce eggs. Scientists thought the platypus must be a hoax, because it didn’t fit within existing categories. Even when presented with a specimen from Tasmania with eggs intact, they fought the platypus “hoax” as something that didn’t work within existing categories.

Now we can solve problems of overly rigid taxonomies by using linked namespaces. We can create a database of names, and a database of taxonomies. We can deal with the platypus and the water mole, and map scientific and colloquial names onto different possible structures. “Pick your name, pick your taxonomy and get on with your life. So what if we disagree? Yay for difference!”

David is actually quite concerned about difference, and just how much difference we can tolerate and still interact and function. He acknowledges that there’s a human tendency towards homophily, flocking together in groups united by race, gender, belief, socioeconomic status, etc. This can lead to a serious challenge to public discourse – echo chambers that can solidify beliefs, making them more extreme and polarized. But David worries that posing issues this way relies on an unquestioned assumption: that conversations are between people who disagree deeply and looking for solutions and common ground by trying to get to the facts. This analysis misses the social role of conversation. We need so much context and so much agreement to even have a conversation. “To have a good conversation, you need to have 99% similarity and 1% difference.” He suggests that some of the work Yochai Benkler and I have been doing may help us find productive paths towards including difference, but reminds us that the high level of disagreement and the difficulty of finding common ground is likely a core feature of the internet and knowledge in an internet age.

Finally, knowledge in this new paradigm is unstructured. We’re used to the idea that knowledge has a basic structure. We have grown used to long form arguments that take us from A to Z, and we’re particularly fond of arguments that take us from A to Z in an orderly path, where Z is an unexpected place to end up. “This is a magnificent form of thought, but the long form argument is losing it’s preeminence.”

We might think of Darwin as a leading proponent of the long form argument. And his argument certainly led somewhere unfamiliar. But he wouldn’t have analyzed data for years and released a massive book if he were working today. He would publish online. And even if he didn’t, the conversation about his work would be based online. Whether or not we imagine Darwin tweeting from The Beagle, the web is where the thinking about and reacting to Darwin’s work would take place, and collectively, it will have more value that Darwin’s long form work taken alone. Moving forward, we will not just see these long form works, but the webs that precede and follow them.

Michael Nielsen has recently written about scholarly community reaction to results at CERN that offer evidence for faster than light neutrinos. As these results came in, they were posted to arXiv.org, a journal preprint site. They stirred up a firestorm of interest and reactions. Some of those reactions are brilliant, some are stupid and wrong. But that welter of discussion is where knowledge is – it’s taking place outside of printed peer review journals.

Darwin spent seven years studying and dissecting barnacles before working on The Origin of Species. His two volume work on barnacles includes countless facts, and his hard work to discover and pin them down was an act of nobility. But science doesn’t work quite like that anymore. We work with clouds of data about genetics, astronomy, and other topics. These data clouds are fundamentally different than facts. When data.gov released sets of government information, they didn’t clean or normalize it ahead of time – they released raw data. They concluded that it was better to put the data out there than to constrain themselves to information that was consistent and known, for the simple reason that this constraint would have slowed them down badly. Darwin would not have agreed – he spent seven years on one fact.

There’s value in getting the data out quickly, David argues. It may be the one approach that’s scaleable – releasing raw data and letting individuals and groups clean, analyze and share what they find. Peer review scientific journals don’t scale, but perhaps peer to peer peer review might. We’re seeing growth in the Open Access journal field, particularly in spaces of repository where data is released, not peer reviewed.

One way we can start making sense of these new data sets is through the magic of linked data, a format suggested by Tim Berners-Lee, father of the web. We organize information in triples:

the platypus | lives in | Tasmania
Watermoles | lay | eggs

When we link triples to a central reference, we can resolve our platipae to water moles and link our triples together. Facts, which used to look like bricks, now look like links.

David closes by returning to his original question: why were old knowledge systems so fragile? These systems assumed knowledge was bounded, settled, orderly and proceeded step by step. But that’s not what knowledge feels like in the age of the internet. It feels unbounded, overwhelming, unsettled, messy, linked and governed by our interests. And those properties are the properties of what it means to be human in the world.

“Networked knowledge may or may not be truer about the world, but is is truer about knowing… This crazy approach to knowledge feels familiar to us, because it’s how we tend to know.” He closes with an observation that’s both hopeful and unsettling: “What we have in common is a shared world about which we disagree, not a common knowledge we share and can collectively come to.”


I’ve followed David’s work for a long time, and had the pleasure of watching him work through the ideas behind this book – David and I are both part of a group at Berkman that helps colleagues explore book-length projects. While I’m familiar with this line of David’s though, it was exciting and unsettling to hear him work through these ideas covering the whole arc of the book. I think this may be the most unsettling and radical book David’s put forth. On the one hand, it’s not a surprise that people will disagree on any concievable fact. But David’s suggestion that we give up on achieving an impossible consensus and proceed with the hard work of getting on with our lives strikes me as challenging and liberating, a very different path than I hear from most activists and advocates. I’m enjoying wrestling with the ideas David puts forth both in this talk and in the paper and hope lots of readers will take up the challenge as well.

]]>
http://www.ethanzuckerman.com/blog/2012/01/26/david-weinberger-too-big-to-know/feed/ 12
Beth Kolko: “Hackademia – Leveraging the conflict between expertise and innovation to create disruptive technologies” http://www.ethanzuckerman.com/blog/2012/01/25/beth-kolko-hackademia-leveraging-the-conflict-between-expertise-and-innovation-to-create-disruptive-technologies/ http://www.ethanzuckerman.com/blog/2012/01/25/beth-kolko-hackademia-leveraging-the-conflict-between-expertise-and-innovation-to-create-disruptive-technologies/#comments Wed, 25 Jan 2012 15:42:53 +0000 http://www.ethanzuckerman.com/blog/?p=4322 Continue reading ]]> Beth Kolko is the sort of academic who follows her muse from one fascinating topic to another. Colin Maclay traces some of her past work from a doctorate in English through research on use of technology in the developing world, through her current research on human-centered design and engineering at the University of Washington. For the past couple of years, Beth has been focused on research for a book on hackers and makers. This is a project that comes from her daily life, where she’s spent the last six years participating in hacking and making events in the Seattle area – she’s now considering the implications of hacking for academia and larger questions of how the DIY movement could impact civic engagement and educational reform.

There are three major areas her talk – titled “Hackademia” – focuses on. She’s interested in how hackers, makers and students, especially undergrad students, can work as innovators. She’s starting to identify patterns within non-expert communities that allow hackers and makers to innovate. And she’s interested in how we “make more of this ‘stuff'” – as society and as educators, how to we scaffold and maximize these contributions?

The key to understanding hacking and making, she suggests, is imagination: looking at people as creative problem-solvers. While there’s lots of research on how corporate and university researchers solve problems, there’s less research on how people without credentials solve problems. She’s specifically interested in rulebreakers, people who either break the rules of the academy or laws to innovate. Rulebreaking, she argues, is a type of power play: it’s a way ot fighting against the cultural and economic power of “being technical”, finding ways to be technical outside of an existing ruleset.

The people Beth studies are functional, rather than accredited engineers. She confesses, “I don’t really care about formal STEM (science, tech, education and math) education – okay, I care a little. But there are lots of studies on getting people to work in those fields. Instead, I’m trying to get people to be STEM literate and facile.”

Beth tells us about an experiment in group learning she participated in. A group is given a task – from three feet away, collaboratively find a way for the group to touch each card in a set of cards in order. While it’s a simple task, the challenge is to execute it collaboratively, and she reports that her group took a long time to discuss what ways would be sufficiently participatory, while another group never completed the task. When we’re faced with new sets of rules, we are forced to think through tacit assumptions that define our behavior, bringing those internalized constraints to the surface.

She tells us about an independent inventor in Detroit, who created a novel flash heating process for steel. It saves energy, and makes steel that’s 7% stronger than through conventional processes. While his research was independent and uncredited, it’s now being analyzed within metallurgy schools to verify the success of the process. One of the people verifying observes that, “Steel is a mature science”. We tend to assume that all that could be done has been done, but that’s not true.

For an example that’s even further from the academic community, she points us to a YouTube video of a fun parlor trick – removing a cork from a wine bottle without harming cork or bottle. The key is to insert a plastic bag, snare the cork, partially inflate the bag and then pull the apparatus out. An auto mechanic – Jorge Odon – was watching YouTube videos in his native Argentina, and thought this was a cool trick. He wondered if it would work for babies. And it does – the Odon device is now in trials as part of birth kits for the developing world.

There’s innovating from hacking as well. She points to wardriving, a technique developed to compromise networks, which now is part of business processes to ensure corporate networks are locked down. And she suggests that password testing tools have emerged almost exclusively from the hacking community. Security techniques designed to compromise networks become part of standard business practices.

Some of Beth’s recent work has focused on non-expert innovation from students, specifically work on a low-cost portable ultrasound kit. A colleague at the University of Washington working in radiology reached out to Beth for help with user interfaces for ultrasound systems used by midwives in Kampala, Uganda. The goal of the project was to train midwives to identify the three conditions that most contribute to maternal mortality and send affected women to hospitals, rather than giving birth at home.

As Beth and her students worked on the project, they discovered that one major problem was that midwives were trained for 2-6 weeks, while ultrasound readers in the US train for two years before being certified. Even the technicians who train for two years don’t use all the functions of a commercial ultrasound machine – in US ultrasound practice, the complex machines are heavily marked with signs created by the technicians warning not to use certain buttons or to use only certain ranges of frequencies.

Can we make this technology simpler for technicians with less training? This makes sense, as the Ugandan technicians are only trying to diagnose three conditions. The solution Beth and her team found was to move back to an older, cheaper technology and to marry those wands with simple netbooks, then focus on making the user interface as easy as possible.

Through ethnography with midwives and mothers, they discovered that the use of ultrasound is utterly different in Uganda than in US clinical practice. In the US, the technician can pass any ambiguous results to a support structure of doctors. Midwives in Uganda are generally all on their own – they need to give answers to mothers directly. So she and her students built a help system for the ultrasound device that was a learning system about maternal health, not just a manual for the tool.

“Not understanding the boundaries of the problem space allows innovation – including a help and learning system into the product was something my students did not know was prohibited.”

Beth’s insights in this field come from studying creativity around technology in the developing world, as well as US hackerspaces, makerspaces, hacker cons, and makerfaires. Extrapolating from both types of sites, she observes three characteristics:

– The importance of actual space in bringing communities together
– Systems of apprenticeship or scaffolded learning, including workshops that show people what they need to know to join a community
– Contests and other systems for building reputations, like the “black badges” issued to winners of capture the flag contests at Defcon, or the badges people win on instructables.com

She’s interested in the possible overlaps between university research, industry labs and independent researchers. Her goal is not to map the actual Venn diagram of the space, but to understand how independent researchers work in this space. She believes that independent researchers are particularly important for building disruptive technology. Academics have a disincentive to build highly disruptive systems – they’re hard to get academic funding for, and hard for PhD students to pitch dissertations around. It’s hard to disrupt in the corporate community, especially when disruptive tech is cheaper, as those sorts of innovations tend not to fit within existing sales structures. Independent researchers may be immune to these restrictions and especially capable of pushing forward disruptive innovations.

The structural constraints suggest that independent researchers may not be able to do fundamental research – it’s hard to investigate the deep structure of matter without strong funding. What independent researchers excel at is technological remix. She shows photos of makers building a panoramic camera designed to take photos from near space. There’s not much novel tech development involved with the project, but lots of remix of existing photographic technology.

Beth’s “Hackademia” project has attempted to learn from these general observations. She invited six undergraduate students to meet regularly in a physical space, equipped with desks and chairs and salvaged gear to hack with, including Arduino controllers. She asks the students to learn and keep track of how they learn. She offers no formal instruction, but lots of pointers to places her students can find learning materials.

One of the projects the Hackademia team took on was assembling a makerbot, a 3D printer that comes as a kit. Very seasoned engineers have been able to assemble the product in seven hours – her team took it slowly and took weeks. But they got it together, and developed some intense technical skills in the process. One student, who had been worried about touching any pieces of the kit for fear of breaking them, found herself some weeks later slapping Beth’s had when she tried to assemble something for her. This student had thought of herself as “non-technical”, Beth tells us. “But that notion of technical and non-technical broke down for them.”

Why Hackademia? Because there are few mechanisms at the university to allow non-science students to gain technical skills. It’s very hard for someone not on an engineering track to learn how to solder. But Beth’s work isn’t designed to create more professional engineers – it’s to get people to functional technical literacy. “We’re creating functional engineers one blinky LED at a time.”

Interventions like Hacakdemia, Beth hopes, can address at least six issues:

– self-efficacy – considering yourself capable of engaging in technical acts
– material technical practice – gaining concrete technical skills
– identity formation – identifying personally and socially as a technically competent person
– conception – understanding the scope and practice of technical knowledge
– motivation – articulating possible future selves
– social capital and sustainable participation – understanding how to seek out expert knowledge when necessary

On this last point, Seattle is a particularly sustainable place to build this sort of interventions, as it’s filled with hacker spaces and expert communities who can support this form of experimentation.

Beth’s new effort is Shiftlabs, an engineering and manufacturing company that works only with hackers. The company focuses on the engineering of low cost devices in the global health space, using R&D from independent researchers. Why a company and not a book? Beth explains that she’d never intended for this space to be the main locus of her research – it’s the product of taking a close look at something she’s become fascinated with in her personal life that’s turned into an academic and professional focus.

]]>
http://www.ethanzuckerman.com/blog/2012/01/25/beth-kolko-hackademia-leveraging-the-conflict-between-expertise-and-innovation-to-create-disruptive-technologies/feed/ 4
SOPA and our 2010 Circumvention Study http://www.ethanzuckerman.com/blog/2011/12/23/sopa-and-our-2010-circumvention-study/ http://www.ethanzuckerman.com/blog/2011/12/23/sopa-and-our-2010-circumvention-study/#comments Fri, 23 Dec 2011 14:24:52 +0000 http://www.ethanzuckerman.com/blog/?p=4293 Continue reading ]]> Daniel Castro of The Information Technology & Innovation Fund recently published a paper supporting the Stop Online Privacy Act (SOPA) currently being debated in congress. In that report, he claims that research performed by us supports the domain name system (DNS) filtering mechanisms mandated by SOPA. This claim is a distortion of our work. We disagree with the use of our study to make the point that DNS-based Internet filtering works and that we should therefore use it as a means of stopping websites from distributing copyrighted content. The data we collected answer a completely different set of questions in a completely different context.

Among other provisions that seek to control the sharing of copyrighted material on the Internet, SOPA, if enacted, would call upon the U.S. government to require that Internet service providers remove from their DNS servers the names of any sites that either infringe copyright directly or merely “facilitate” copyright infringement. So, for example, the government could require that ISPs remove the name “twitter.com” from their DNS servers if twitter.com was not being sufficiently aggressive in preventing its users from tweeting information about places to download copyrighted materials. This practice is known as DNS filtering. DNS filtering is one of the most common modes of Internet-based censorship. As we and our collaborators in the OpenNet Initiative have shown over the past decade, practices of this sort are used extensively in autocratic countries, including China and Iran, to prevent access to a range of sites offensive to the governments of those countries.

Opponents of SOPA have argued that the DNS filtering, even though it will have a number of harmful effects on the technical and political structure of the Internet, will not be effective in preventing users from accessing the blocked sites. Mr. Castro cites our research as evidence that SOPA’s mandate to filter DNS will be effective. He quotes our finding that at most 3% of users in certain countries that substantially filter the Internet use circumvention tools and asserts that “presumably the desire for access to essential political, historical, and cultural information is at least equal to, if not significantly stronger than, the desire to watch a movie without paying for it. Yet only a small fraction of Internet users employ circumvention tools to access blocked information, in part because many users simply lack the skills or desire to find, learn and use these tools.”

In our report, we looked at three sets of censorship circumvention tools: complex, client-based tools like Tor; paid VPNs; and web proxies. We estimated usage of those three classes of tools. We used reports from the client tool developers, a survey to gather usage data from VPN operators and used data from Google Analytics to estimate usage of web proxy tools. Counting all three classes of tools, we estimated as many as 19 million users a month of circumvention tools. Given the large number of users in China, Iran, Saudi Arabia and other states where filtering is endemic, this represents a fairly small percentage of internet users in those countries; 19 million people represents about 3% of the users in countries where internet filtering is pervasive. We actually believe that 3% figure is high, as some of the tools we study are used by users in open societies to evade corporate or university firewalls, not just to evade government censorship.

We stand behind the findings in our study (with reservations that we detail in the paper), but we disagree with the way that Mr. Castro applies our findings to the SOPA debate. His presumption that people will work as hard or harder to access political content than they do to access entertainment content deeply misunderstands how and why most people use the internet. Far more users in open societies use the Internet for entertainment than for political purposes; it is unreasonable to assume different behaviors in closed societies. Our research offers the depressing conclusion that comparatively few users are seeking blocked political information and suggests that the governments most successful in blocking political content ensure that entertainment and social media content is widely available online precisely because users get much more upset about blocking the ability watch movies than they do about blocking specific pieces of political content.

Rather than comparing usage of circumvention tools in closed societies to predict the activities of a given userbase, Mr. Castro would do better to consider the massive userbase of tools like bit torrent clients, which would make for a far cleaner analogy to the problem at hand. Likewise, the long line of very popular peer-to-peer sharing tools that have been incrementally designed to circumvent the technical and political measures used to prevent sharing copyrighted materials are a stronger analogy than our study of users in authoritarian regimes seeking to access political content.

Second, our research has consistently shown that those who really wish to evade Internet filters can do so with relatively little effort. The problem is that these activities can be very dangerous in certain regimes. Even though our research shows that relatively few people in autocratic countries use circumvention tools, this does not mean that circumvention tools are not crucial to the dissident communities in those countries. 19 million people is not large in relation to the population of the Internet, but it is still a lot of people absolutely who have freer access to the Internet through the tools. We personally know many people in autocratic countries for whom these tools provide a crucial (though not perfect) layer of security for their activist work. Those people would be at much greater risk than they already are without access to the tools, but in addition to mandating DNS filtering, SOPA would make many circumvention tools illegal. The single biggest funder of circumvention tools has been and remains the U.S. government, precisely because of the role the tools play in online activism. It would be highly counter-productive for the U.S. government to both fund and outlaw the same set of tools.

Finally, our decade-long study of Internet filtering and circumvention has documented the many problems associated with Internet filtering, not its overall effectiveness. DNS filtering is by necessity either overbroad or underbroad; it either blocks too much or too little. Content on the Internet changes its place and nature rapidly, and DNS filtering is ineffective when it comes to keeping up with it. Worse, especially from a First Amendment perspective, DNS filtering ends up blocking access to enormous amounts of perfectly lawful information. We strongly resist the claim that our research, and that of our collaborators, makes the case in favor of DNS-based Internet filtering.

Links:

Mr. Castro’s report may be found here:

http://www.itif.org/publications/pipasopa-responding-critics-and-finding-path-forward

with the reference to our work on p. 8.

The study that is being misused by Mr. Castro is here:

http://cyber.law.harvard.edu/publications/2010/Circumvention_Tool_Usage.

The findings of our decade-long studies are documented in three books, published MIT Press and available freely online in their entirety at:

http://access.opennet.net/

– Rob Faris, John Palfrey, Hal Roberts, Jill York, and Ethan Zuckerman

]]>
http://www.ethanzuckerman.com/blog/2011/12/23/sopa-and-our-2010-circumvention-study/feed/ 4