Following a 14-day visit to parts of the UK, the United Nations’ special rapporteur on adequate housing Raquel Rolnik, issued an end-of mission press statement. Her recommendation was to immediately suspend the UK’s social housing welfare reform (known to opponents as the ‘Bedroom Tax’). Researched and submitted according to UN protocol (Gentleman), the advice was however vehemently rejected by the UK government; the rapporteur’s personal and professional credibility were then attacked in the media and elsewhere.
Changing dynamics between the public and political spheres are especially visible online, where social media is having an impact in many areas. In one instance a court trial was abandoned after new evidence came to light. This evidence was obtained from a disused Twitter account. Though all charges in the case were dropped, details of the accused were subsequently reported in a national newspaper, in print and on the Web. Legal proceedings have also been derailed because of jurors’ activity on the Internet (Davis). In other circumstances, incautious tweets have resulted in prosecutions for libel (BBC News).
As quickly as attention has switched away from these episodes, they offer us a snapshot of a media landscape in which trash, in the form of dispensable news and information, is merging with public opinion and political rhetoric. The combination of booming mass culture and creativity is now producing a variety of images – including data images – which are not easily locatable within the apparatus’ of political, social and economic assemblages. Consequently, these images are open to conjecture. Their position on the continuum between media, platform and network transport renders them equivocal, ambiguous entities; where identity, trust and authenticity come under review.
In an artwork titled The Formamat (2010) Kripe, Schraffenberger and Terpstra investigate the value individuals place on data they have stored on their mobile devices. The work is a vending machine, “…which returns candy in exchange for the deletion of [an individual's] digital data”. The authors “…invite people to experience the joy of deletion in a public space and encourage them to think about the value and (in-)dispensability of their files while also researching the subject in a broader sense by storing and analysing their deletion-behavior. ” (Formamat)
With hindsight, The Formamat can also be seen to capture uncertainties in our relationship with data; already an unexpected revision can be seen, reformulating the question, not of which, but of whose files are going to be deleted. Taken together with the Internet’s long memory – from the Internet Archive’s Way Back Machine to playfully macabre, assisted Facebook-identity suicides – this observation underlines the attention now being given to choice and ownership of data. Here, Nissenbaum’s notion of contextual integrity is significant; This advocates for an individual’s right to control the flow of their personal information, rather than insisting on absolute control (Nissenbaum).
The perspective might be welcomed by the Sunlight Foundation, known for co-ordinating crowd sourced analysis of US government records. Transparency initiatives commonly use Wikis to manage document revisions made by multiple authors (Sifry). In the case of Wikipedia, software for ‘version control’ becomes the image of a community and its knowledge, a reflection of that community in code:
“People can and do trust works produced by people they don’t know. The real world is still trying to figure out how Wikipedia works…Open source is produced by people that you can’t track down, but you can trust it in very deep ways. People can trust works by people they don’t know in this low cost communication environment.” (Cunningham qtd in many2many)
Other types of version control system (VCS) are useful in co-ordinating software development groups. The Linux kernel project is one example. For this a very specific VCS was created: Git was created to manage all the code for the Linux kernel. It solves problems of ownership and responsibility with its own purpose built command: git-blame. The command finds the author of an edit or addition and reports when changes were made. Git is a broad framework, designed to address the techno-social problems of making and releasing new versions of the kernel image (more than nine million lines of code; the core of the GNU/Linux operating system).
Git was created with security, authentication and traceability as paramount concerns. Contributors to any Git-maintained project are encouraged to advance development by regularly committing smaller changes into a main line of development. Additions and revisions can be written and tested in isolation before being introduced to the main line or ‘branch’. Copies of this branch become distributed as changes are written back to the computers of other developers as they also introduce their work. Files ‘checked out’ from the main development tree can be introduced to newly created branches. Typically these are later merged into the project’s main branch or abandoned. In some instances, new branches diverge substantially from the main development effort. This is basically the concept of project forking. It might be apparent from this summary that talk about governance in Git is necessarily and intrinsically also a discussion about technical operation.
Benevolent dictator work flow (image: Git reference manual)
Issues of governance are also dealt with in creative projects which utilize and discuss version control. Simon Yuill’s Social Versioning System and Matthew Fuller and Usman Haque’s Urban Versioning System 1.0 concern the relevance of Free Software principles to consensus and co-operation in design practice:
“…one of the most interesting aspects of open source software is the continuous interleaving of production, implementation, usage and repurposing processes, all of which can and sometimes must be open—not just an “open design” that then gets implemented in a closed manner.” (Fuller and Haque 17)
Soon after Git, came GitHub. Using the apparatus (the ‘plumbing and porcelain’) which comprises the Git software, GitHub establishes a web-based repository for software projects whose source code is released in the public domain. GitHub has been adopted by a huge and rapidly expanding user community, as a platform for developing and publishing software, as well as a range of other creative works. GitHub provides a large-scale, distributed means to recognize and pin point different stages in the production of these works. GitHub has also become home to a mass of never changing, user-generated software configuration files. In GitHub these can be Git configuration files, stored in a Git repository, on a platform built using Git.
Ethics and etiquette
Besides the benificent feelings this sharing of data naturally inspires, proliferating codes also produce tensions. Where interest increases, the scale and relative value of contributions can in turn challenge a project’s direction. WikiLeaks’ Iraq War Logs are an example where the relevance and reliability of material have been key considerations (Domscheit-Berg). In other guises, this problem of managing contributions has been encountered in projects from Community Memory (an electronic bulletin board), through to contemporary hacker spaces and Open Source tech communities. In all these instances, it seems that mutual agreement – whether or not this has been explicitly defined – is a central issue. Arguments often focus on leadership, personal style and the possibility of ‘benevolent dictatorship’ (Lovink). Whilst positive feedback, generated by self-enhancing ‘recursive geek publics’ is not necessarily without drawbacks (Kelty), neither is it clear how this energy can work best – in the case of the Debian Software Project there is the Debian Social Contract, and an effective hierarchy to address the flow of contributions. Free Speech has been intrinsic to the development of Free-Libre Open Source Software (Turner). Its influence is evident, for example, in the protocols and conduct written into the Debian Linux Project and embedded in Wikipedia.
Moving away from hacker-styled communities to other kinds of governance, in a study of public sector adoption of open source software, Maha Shaikh describes situations “where information technology and users are not defined outside their relationship but in their relational networks”, where the focus moves away from actors, “…towards a more complex, and less defined phenomenon…the interaction”. This perspective, emphasizing mutability and becoming is advantageous to understanding materializing of public sector adoption of open source software: “performativity leaves open the possibility of events that might refute, or even happen independently of what humans believe or think”. We are presented with a different means to envision interaction, “…drawing on ideas of becoming, tracing versus mapping and multiplicity alongside the shared ontology of Actor Network Theory”. Shaikh concludes that,
“…the becoming of adoption can be both constrained and precipitated by various forms of materiality (of the assemblage of the open source ecosystem)…open source software – a much touted transparent and open phenomenon – is by its nuanced mutability able to make the process and practices surrounding it less visible.” (Shaikh 123-140)
Beneath the Street, the Network
Revelations following the release of NSA files by Edward Snowden at first underlined governments’ ability to track and target individuals (for example, by following calls and data from mobile phones). Subsequent leaks moved attention somewhat away from wireless networks and ‘eyes in the sky’ to the image of massive submerged and underground data pipes connecting (really big) data centres – routinely serving information to government secret services. Documents detailing these practices provoked strong objections from businesses who insisted on the ‘right to reveal’. This twist on the ‘right to know’ placed mutability and truth centre stage.
Besides this totalizing image of state control and vested corporate interests, is the changing interplay between humans, machines and geography. The activities of Anonymous, and organizations such as WikiLeaks and The Pirate Bay continue to demonstrate the actually fragmented, disorganized and dis-regulated condition of government and businesses, which are not always pulling in the same direction. Meanwhile, activist groups find identities outside of pre-existing ones (of public friend or foe) as their operations compose new and revised networks; in street action, engagement with news media, and in online provocations.
In the encounter between Anonymous and their targets, a firmament of politics and identity shows the interconnectedness of free speech and anonymity. Alternatively, the evidence in revelations about state surveillance precisely demonstrates that anonymity is not an essential or intrinsic aspect of digital networks, but rather is a set of standards which in many places are already compromised. Cloud computing, Software as a Service and skeuomorphic interfaces readily belie the real sense in which data is exposed. Alongside the changed connotations of ‘access’, Ted Nelson’s invocation, ‘you must understand computers now’ (Nelson) is renewed by under-reporting in the media (Jarvis).
Abundance and Modification
Anonymous is one contemporary expression of the will to understand computers, as well as differing network forms: In a moment of self-reflexive wonder, members turning up for street protests in February 2008 were themselves surprised – in numerous ways – by the people converging on that day, and by the network image this manifestation bodily performed. In one documentary, protesters describe their feelings of being a part of Anonymous and how, as it entered the world, it came to exist in a significantly new way, for them and others. Information activist Barret Brown explains:
“Anonymous is a series of relationships. Hundreds and hundreds of people who are very active in it – who have varying skillsets, and who have varying issues they want to advance – these people are collaborating in different ways each day.” (BBC)
New platforms allow recursive representations of existing creative forms, whilst re-versioned political slogans and insider nods – to Surrealist and Situationist imagery – issue from anonymous channels and deviant locations. These creations, designed for modification, are then absorbed into the melee engaging internet memes and personalities. One notable example of this recursion and modification concerns a prominent UK politician, Ed Balls. In April 2011 he inadvertently tweeted an empty message along with his name. This spawned a long chain of varyingly humorous and teasing responses, facebook likes, as well as many retweets. The action entered meatspace at the time of the original tweet’s two year anniversary, when Ed Balls acknowledged the joke by retweeting the following image:
Reduction and Overloading
In the context of continued economic scarcity, the impact of flourishing social media (and its reflective potential) receives additional validation through public acquisition of artworks such as The Cybraphon, through WikiMedia outreach projects and in metric analysis of the public mood via twitter and the blogosphere.
Networks of users can create, “fast, fluid and innovative projects that outperform those of the largest and best-financed enterprises” (Tapscott and Williams qtd in Heath Cull 78); As they went about establishing WikiLeaks, the value of such observations was not lost on the core team of Julian Assange and Daniel Domscheit-Berg. Starting with only minimal funds and relying on their own technical expertise the two activists would typically exaggerate the scale of WikiLeaks (for example by using fictional identities of people working in purely notional departments). During this time Domscheit-Berg used the pseudonym Daniel Schmitt. Assange used his own name, but was occasionally still identified by his old hacker handle (MENDAX) (Domscheit-Berg). Alongside this overloading, re-purposing and extension of identity within WikiLeaks, there has been the task of gathering, sifting and reproducing large quantities of data. This was achieved through various means, partnerships and collaborations. However, Domscheit-Berg’s subsequent criticism, is that WikiLeaks has essentially always been a network of one (Domscheit-Berg).
Self-loop (image: Stefan Birker)
Anonymous forms lend themselves to analysis rather less than WikiLeaks (their direction primarily being to circumvent and override, to circumvent and override). But what these forms (including memes, reddit and 4chan forums) do present us with, are collaboratively made creative network entities. In the changing dynamic by which these appear, new conventions are being worked out. In these, overloading standards of taste and acceptability are stimulating alternatives to the ordinary narratives of conflict and resolution.
In these forms of representation which we see entering mainstream narratives, a kind of collective and competitive vandalism is esteemed. The multiplicity of voices – for which the expanding net has become more lightning conductor than conduit – increasingly provides its own self-fulfilling cycle of news, serving 24-hour comment and analysis for comment and analysis. A re-writing is under way, in which messages combining text and visual images, produce networks within networks. They become the mutable containers of doubt and disinformation, of intent and ignorance:
“…since images are two-dimensional the representations in them form a circle, that is, one draws its meaning from the other, which in turn lends its meaning to the next. Such a relationship of exchangeable meanings is magical.” (Flusser 9)
From miniature artefacts to large network entities, whether as discrete objects or grand-scale public conceptions, the representations and mental images can seem diffuse, untraceable, and in contradictory states. Nodes, which constitute networks, are themselves potentially networks and networks are collapsible forms, in which processes, “…are recurrent [processes]…which typically involve entirely different mechanisms…larger scale assemblages of which some of the members of the original population become component parts.” (de Landa 19). Little wonder if the scale and definition of networks should induce feelings of disorientation, even anxiety.
Overload also gives rise to easeful interactions which go against any supposed disconnection between the Internet and Real Life. In TPB:AFK Pirate Bay founder Peter Sund explains assuredly to a Swedish courtroom, “We prefer not to use IRL. We believe the internet is for real”. Whilst the motivation and affiliations of the the Pirate Bay trio have remained opaque to state and private prosecutors, in this film the question which achieves over-arching significance is, “Who do you trust?”. This may be a point around which easeful interactions revolve; As trojan links to the Internet meme Goatse.cx showed, the merriment of a practical joke can be a hair’s breadth away from the abuse of trust.
As social media has refreshed the status of the Internet troll, the nuanced subterfuge of social engineering, of spreading Fear, Uncertainty and Doubt, appears diminished. Flames, defamation and libel have become the norm. The specialized rules of email etiquette have evaporated. In the merging of media, products and social interaction, trolling itself has gone viral; self-validating intercourse has been upstaged by social-media-sanctioning broadcast-media discourse. In legal proceedings (as with subterfuge against enemy combatants, and leaders of states), a game of cat and mouse is being played; in litigation, plaintiffs become complicit in a mystifying data hide-and-seek, where bytes are transferred, as if seamlessly across frontiers, until reaching new data housing facilities (fortresses of this age).
Other means of outwitting covetous censorial desires have been conceived. Perhaps none has scored higher than the self-mutilation of computers enacted by The Guardian newspaper in its office basement . Primarily, this was was a pragmatic decision, to pre-empt any government moves to obtain data copies held by The Guardian. The strategy was brought sharply into focus when the journalist Glen Greenwald’s partner was subsequently detained by UK border police (Peachy).
ShockBlast: Stockholm nuclear bunker data centre
In the drift away from trust towards greater protection, the question “Who is to blame?” is never far from view. The fixation on data and hardware objects; the advance of our litigious cultures; these elements may contribute to conditions in which bullying can be blended into human interactions. As much as hardware and new platforms may enable discourse, they also become the sites for abuse, where differences between trolling and harassment easily merge. In the UK, during 2013, a number of women in the public eye (among them MPs, campaigners and journalists) became the target of insults and threats intended to silence their contribution to public debates. Often these communications were sent through Twitter. In what is possibly the most high profile case to date, the abuse followed a successful campaign to have the Bank of England, for the first time, print a female historical figure on its banknotes. Online, the equivocal status of networks is further evident where ‘trash-talk’ in gaming turns to harassment and ‘the gamification of misogyny’ (Lewis). In the competition for kudos, questions about the liberating potential of the Internet abound.
Identity fetishism promises certainty in a moment of profound uncertainty and harks back to a time in which physical media trash appeared more present than today; it is a moment where in many ways, absence may be more desirable than presence. The contradiction in interfaces is that in the moment they renounce claims on materiality, they retain the ability to expose us to actual and perceived threat. Trolls revel in their ability to circumvent blocks, adopt new identities or label messages in ways that reach targets indirectly. The collision between anonymity and free speech makes clear why for some, disappearance is preferable to the advice, ‘do not feed the trolls’. In the UK, activist Caroline Criado-Perez was driven to delete her twitter account after she received a series of rape threats online (Topping); aged 11, Jessica Leonhardt was targeted in an online bullying campaign, which included distributing her personal details through social media (Jessi Slaughter); in 2012, as a consequence of bullying which began online and followed her during several years and different schools, the Canadian teenager Amanda Todd committed suicide (Amanda Todd’s Death).
Versioning as Method
In a broad sense, and in different domains, we are now seeing truth and responsibility increasingly under review: In the widening push to deliver up to the minute news, the sources and verifiability of content are an ever more present consideration (think of the Yes Men’s Bhopal anniversary action ). Concern for information ethics, in public and private domains, means questions of accountability and trust (the veracity of versions) gain significant attention: The extended reach of media is changing the act of reflection; propagating images, collectivizing values. In the networked era, reduction is going global.
Away from the context of news and entertainment media, images also circulate in obscure ways. In the apparatus’ of political, social and economic assemblages, images now appear as agents. They are the subjects of viral exchange on social networks and potentially convey malicious executable computer code – this is no longer speculation (Tung).
Self-representation is inextricably also re-representation; agency and the individual are reflected in the network. Networks facilitate the dissemination of copies, and copies are also the by-product of networks. These networks are assemblages, collections of objects producing data images on a greater and greater scale. Other assemblages (collections of hardware) are also networks: Digital cameras readily produce images in multiple versions. The ‘pipeline’ model of digital image processing and design studio work flow invokes the trope of ‘relation’. In economic and other organizational circuits, dependencies exist which bind assemblages and apparatus’ inseparably: images today constitute networks where value, exchange, and mutability are implicit; they are pixel-assemblages to be seen as networks in and of themselves.
Relating Michael Callon’s theoretical writing to the ‘performativity of networks’, Iain Hardie and Donald Mackenzie write,
“For Callon, an actor ‘is made up of human bodies but also of prostheses, tools, equipment, technical devices, algorithms etc’. – in other words is made up of an agencement. The notion…involves a deliberate word-play. Agencer is to arrange or to fit together: in one sense, un agencement is thus an assemblage…The other side of the word-play…is agence, agency” (Hardie and Mackenzie 58)
We can envisage networks as aggregated versions, sites of recursion and reflexivity, in which circular relations establish the inter-relation of medium and method.
Post-irony for a Post-digital age
The activities of comment trolls and websites such as ask.fm demonstrate other ways in which the Internet has become a machine for reflectivity: Interactions dominated by glib and clever epithets invariably promote self-image over self-knowledge (though with notable exceptions). Rhetoric turns the joke upon those who have missed the joke. These episodes thrive on lack of understanding and the connoisseur’s appreciation of the unspoken: The joke is ruined if you spell it out (Harman).
However, the targets of abuse are standing up against such misrepresentation. Their narratives are the alternative versions filling gaps in communication. In this way identities are re-presented; self-images are recomposed. Projects such as unslut have this same end of allowing individuals to positively re-enact negative stories. Intimate reflections like these are in contrast to celebrity relationships lived through media and social media, where the open-ended repetition of text and image insinuates another kind of performance. Indeed, self-representation can also have a normalizing effect:
“…my proliferation of selfies is a small way of fighting back. The more I look at myself (in a mirror or in pictures), the easier it becomes to accept that this is really me, and this is my skin…I feel that the more pictures I post of me, sure I’m putting myself out there to be judged, but I am also adding to images out there (in the minds of friends and strangers alike) of who I am.” (stuficionado)
As images and self-images re-instate a sense of place, absent themselves from rhetoric and generate their own associations, they obtain a peculiar sense of agency. They are re-entering the world as prosaic reminders of the real – hermetic emblems of an already present, post-ironic post-digital age:
 “…online abusers continued to find “new and imaginative ways” to contact her, through her blog”. See http://www.theguardian.com/uk-news/2013/sep/03/caroline-criado-perez-rape-threats-continue
 “I felt like the chat box could see me through the computer screen.” See:
 See remarks about Kayne West and Kim Kardashian’s relationship: http://www.theguardian.com/lifeandstyle/2013/oct/27/instagram-selfie-reveal-kim-kardashian-tweet
“Amanda Todd’s Death.” Know your Meme. Web. 5 Dec. 2013.
BBC News. “High Court: Sally Bercow’s Lord McAlpine Tweet Was Libel.” bbc.co.uk/news. British Broadcasting Corporation. 24 May 2013. Web. 29 Nov. 2013.
Brown, Barret in “How Hackers Changed the World – We Are Legion.” Storyville. BBC. 12 Mar. 2013. Television.
Cunningham, Ward quoted in many2many. “Ward Cunningham on the Crucible of Creativity.” corante.com. Corante. 17 Oct 2005. Web. 5 Dec. 2013.
Davis, David. “We Can’t Let 12 Good Men and True Be Undone by the Internet” theguardian.com. Guardian News and Media Limited. 19 Jun. 2011. Web. 5 Dec. 2013.
de Landa, Manuel. New Philosophy of Society: Assemblage Theory and Social Complexity. London: Continuum, 2006. Print.
Domscheit-Berg, Daniel with Klopp, Tina. Trans. Chase, Jefferson. Inside WikiLeaks. London: Jonathan Cape, 2012. Print.
Formamat.com. “About – Formamat.” Web. 29 Sep. 2013.
Flusser, Vilem. Into the Universe of Technical Images. Minneapolis: University of Minnesota Press, 2011. Print.
Gentleman, Amelia. “UN housing expert’s call to axe bedroom tax ‘a disgrace’– senior Tory 11.” theguardian.com. Guardian News and Media Limited. Sep 2013. Web. 29 Sep. 2013.
Hardie, Iain and Mackenzie, Donald. “Assembling an Economic Actor: The Agencement of a Hedge Fund .” The Sociological Review Volume 55:1 (2007): 57-80. Print.
Harman, Graham. Weird Realism - Lovecraft and Philosophy Alresford: Zero Books, 2012. Print
Heath Cull, Daniel. The Ethics of Emerging Media. Information, Social Norms, and New Media Technology. London: Bloomsbury Publishing, 2011. Print
Jarvis, Jeff. “I fear the chilling effect of NSA surveillance on the open internet.” theguardian.com. Guardian News and Media Limited. 17 Jun 2013. Web. 29 Sep 2013.
“Jessi Slaughter.” Know your Meme. Web. 5 Dec. 2013.
Kelty, Christopher. Two Bits. The Cultural Significance of Free Software. Duke University Press: Durham NC, 2008. Print, Web.
Lewis, Helen. “Yes, It’s Misogynistic and Violent, but I Still Admire Grand Theft Auto.” theguardian.com. Guardian News and Media Limited. 21 Sept. 2013. Web. 29 Sep. 2013.
Lovink, Geert. Zero Comments. Blogging and Critical Internet Culture. Routledge: Abingdon and New York, 2008. Print.
Nelson, Ted. Computer Lib/Dream Machine. Self-published. Print. 1974.
Nissenbaum, Helen. Privacy in context: technology, policy, and the integrity of social life. Stanford: Stanford Law Books, 2011. Print.
Peachy, Paul. “NSA Leaked Documents Row: Glenn Greenwald’s Partner David Miranda Held Notes on How to Crack Computers When Detained at Heathrow.” independent.co.uk. Independent Print Ltd. 30 Aug. 2013. Web. 5 Dec. 2013.
Shaikh, Maha. “Mutability and becoming : materializing of public sector adoption of open source software.” Shaping the Future of ICT Research. Methods and Approaches. Volume 389 (2013): 123-140. Print.
Sifry, Micah L. WikiLeaks and the age of Transparency. New Haven: Yale University Press, 2011. Print.
Stuficionado. “Just Shoot Me”. Web. 5 Dec. 2013.
Topping, Alexandra. “Caroline Criado-Perez Deletes Twitter Account after New Rape Threats”. theguardian.com. Guardian News and Media Limited. 6 Sep 2013. Web. 5 Dec. 2013.
Tung, Liam. “BlackBerry Enterprise Server Malicious TIFF Attack Discovered.” ZDNet. CBS Interactive. 19 Feb. 2013. Web. 5 Dec. 2013.
Turner, Fred. From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. University of Chicago Press: Chicago, 2005. Print.