[Version CAST abajo]
Zero Trollerance Treatment for Twitter Trolls
Today we (the Peng! Collective) in collaboration with loads of awesome allies like you are launching a humorous feminist toned re-education program for sexist trolls on Twitter. Named Zero Trollerance, the campaign consists of a video-based mock self-help program designed to help Twitter trolls reflect on their behavior, tackle their fears and reintegrate into social media spaces again.
We’ve worked with the hacker named Jenny Mainframe to create a task force of 160 bots who will troll the trolls with advice.
Every day for 6 days, the trolls will get tweets from a rotating team of bots who provide them with links to the day’s videoas well as motivational and inspirational tweets. If you want to know more about us, that’s at the bottom of the mail!
At 15:00 CEST you can find the campaign on zerotrollerance.guru, #zerotroll and @ztrollerance
We are just a small group of people running this and WE NEED HELP to make it big!!!
There are a number of ways that you can get involved:
1. JUST TWEET
1.1.Retweet our main tweet which will come from the account @ztrollerance at the time of launch
1.2. Enroll your trolls with a tweet (not all of them will get found by our bots obviously)
1.3 Air your thoughts and resources related to the topic on #zerotroll
2. MAKE A BOT
2. 1. Twitter is going to block our bots because they think they are spam! We need a constant stream of replacements! All you need to do is create a fake Twitter profile and send us the login details (twitter handle and password)
3. GIVE YOUR BOT SUPERPOWERS
3.1. Give your bot extra abilities by adding developer access to the Twitter profile you created (not hard but we have a guide for this if you want!)
Email us on firstname.lastname@example.org for this or any further info!
About Peng! Collective
Peng! Collective is known for its media hacks, digital interventions and hoaxes produced to stimulate debate on social justice issues. For example,
in 2014 the group impersonated Google employees at Europe’s largest social media conference, where they presented Google Nest, a suite creepy of privacy-infringing products. More information can be found on pen.gg or on Wikipedia.
Thanks so much!
Campaña Trollerancia Zero con los Trolls de Twitter
El Colectivo Peng! lanza, en colaboración con muchas personas aliadas como tu, una campaña feminista humorística con un programa de reeducación para los trolls sexistas en Twitter. La campaña Trollerancia Zero consiste en difundir un simulacro de auto-ayuda basado en un conjunto de vídeos diseñados para ayudar los trolls de Twitter en reflexionar sobre su comportamiento, hacer frente a sus miedos y reintegrarse de nuevo en los medios sociales.
Hemos trabajado con la hacker Jenny Mainframe para crear una fuerza de 160 bots que trollearán los trolls con consejos. Durante 6 días, los trolls recibirán tweets enviados por nuestro equipo de bots quienes les proporcionaran enlaces hacia los varios vídeos. Si quieres saber más acerca de Peng! encontraras una explicación al final de este correo!
A las 15:00 CEST lanzamos la campaña en zerotrollerance.guru, #zerotroll y @ztrollerance
Por ahora solo somos un grupo pequeño de gente organizando esta acción y necesitamos tu ayuda para hacerlo grande !!!
Puedes involucrarte y dar apoyo de las siguientes maneras:
1.1. Retwittea nuestro tuit que la cuenta @ztrollerance lanzara a las 15H00 CEST
1.2. Manda a tus trolls ese tweet (ya que nuetsros bots no encontraran a todos los trolls de twitter)
1.3 Airea tus reflexiones y recursos relacionados con el tema en #zerotroll
2. HAZ UN BOT
2. 1. Twitter bloqueara nuestros bots porque piensan que son correo indeseado! Necesitamos un flujo constante de nuevos bots! Todo lo que necesitas hacer es crear un perfil falso en Twitter y
enviarnos los datos de acceso (nombre Twitter, usuario y contraseña)
3. DALE a tu BOT SUPERPODERES
3.1. Dale a tu bot habilidades extras añadiendo un acceso de desarrollo al perfil que has creado en Twitter (no es difícil, y contamos con una guía en ingles para ese tema si quieres!)
Para recibirla envíanos un correo electrónico a email@example.com para la guía o cualquier información adicional!
Acerca del Colectivo Peng!
El colectivo Peng! Se ha dado a conocer por sus hackeos al los medios de comunicación, sus intervenciones digitales y los engaños aka fakes que ha desarrollado para estimular debates acerca de temas relacionados con la justicia social. Por ejemplo, en 2014 el grupo se hizo pasar por empleados de Google en la mayor conferencia Europa acerca de medios sociales y presentaron Google Nest, un conjunto de aplicaciones espeluznantes que infringían los derechos a la privacidad de sus usuarios. Puedes encontrar mas información acerca de este colectivo en pen.gg o en la Wikipedia.
The TransHackFeminist convergence was first organized in Calafou, an eco-industrial post-capitalist colony, located 60 km from Barcelona, Catalonia. For seven days, from the 4th to the 11th of August 2014, intersectional feminists, queer and trans people of all genders met to better understand, use and ultimately develop free and liberating technologies for social dissent. The participants of the THF! understand technologies and hacking practices in the broadest sense; this includes hacking the body, gynecology and gender hacking, as well as academia, parenthood, and also computer systems, (distributed) networks, autonomous servers, “pirate”, community based and/or independent radio/tv, hardware and electronics. Around 90 people came to the convergence, where discussions, panels, hands-on workshops and performances on a variety of subjects unfolded.
The following report is based on the main debates and discussions that took place during the THF!. More specifically, it is based on the notes taken collectively on local e-pads set up during the convergence. The report aims at sharing a summary of the collective thought processes that occurred and it is published with the idea that memory and archiving is empowering and essential for the transformation of social movements. It also recognizes that at a time of increasing instability (financial, social, theoretical, etc.) it is important to destabilize so-called accepted meanings. What feminism meant 30 years ago has changed and evolved into a plurality of meanings today. Context within a time-span becomes crucial to the understanding of a concept such as transfeminism, which carries different values depending on the location, space and/or political context, among others. What hacking meant 10 years ago (and what it still means in certain circles) might also be challenged to open new perspectives and praxis.
Motivations – Why was a THF! organized?
We started with the assumption that the lack of diversity, including the participation of women, queer, trans people in technological fields in general, and hacking more specifically, is acute. We considered as a starting point that the representations of such groups and of their “genre” are too often defined by those who are privileged to do so, while at times being remotely distant from a practice or wanting a certain representation to dominate the discourse. Moreover, we believe that these representations might not necessarily have accurate conceptions of what transfeminism and hacking means. As we are many at the forefront of these practices we decided that we needed to create space to meet others with whom we have affinities, but might not have known about because of a variety of factors such as geographical location, language barriers, silos, etc.
Another of our hypotheses was that to make our practice relevant and visible to ourselves and those interested by/in it, we needed to meet to discuss critical approaches towards technologies, hacking cultures and feminism. There was a clear desire to look at cyber and tech feminist issues from a politicized and holistic perspective as the video announcing the THF tried to expressThe intersectional analysis framework used during our convergence also fits our political project which aims at being truly cognizant of existing systems of oppressions. From the start, this approach required all of us to engage with the diversity of cultures, social status, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality (in access, design, usability, hacking potential, etc.) for different individuals.
Before embarking on the THF! we believed that to have more feminist and intersectional activists and practitioners at the forefront of the use and development of liberation and (free)dom technologies, safe spaces to ignite desires were a must. Moreover, the THF! aimed at triggering this desire towards transfeminist approaches to technology and hacking that fostered differences, autonomy, liberation and social resistance. To reach out to a wide audience that might not have identified their practice as hacking, we made explicit the two following premises: 1) everybody is an expert in relation to the technologies they use in their everyday life, and 2) as we consider gender to be one of the most pervasive social technologies ever created, we were convinced that everybody had a lot to share on this topic too. Additionally, we wanted to convey the idea that we feel we are at a new dawn where feminist and intersectional technological resistance is arising. We wanted to join our collective forces in challenging systems of oppression that we encounter on a day-to-day basis. We wanted to collectively decry the so-called austerity measures, the financial system bankruptcy, mass surveillance, the infringement on privacy rights, governmental and business appetite for our (meta) data, the witch-hunts to rule our bodies, the criminalization of our reproductive rights, etc. Together we did not only want to reclaim, but take the opportunity to use and develop liberation technologies in fostering, caring and nurturing environments as far as possible from patriarchal and capitalist behaviors, thoughts and actions. Finally, the message we wanted to convey was: “We are building this from the ground up! Join us in imagining, crafting and developing the ‘opt out’ button(s) for a transfeminist insurrection.”
Experimentation fields: Feminist servers and Gynepunk
In order to investigate those potential opt-out buttons, we proposed in the call for participation two wide areas of experimentation namely: the development of Gynepunk practices; and Feminist servers.
Gynepunk is about engaging in a radical change of perspective about medical technologies, and the so-called “professional” and medical institutions. Gynepunk is an extreme and accurate gesture to detach our bodies from the compulsive dependency of the fossil structures of the hegemonic health system machine. Gynepunk’s objective is to enable the emergence of DIY-DIT accessible diagnosis labs and techniques in extreme experimentation spaces, down on the rocks or in elevators if it is necessary. It is about having these possibilities in a situated stable place or/and in nomadic mobile labs to be able to perform as much as WE WANT, in an intensive way: smears, fluid analysis, biopsy, PAPs, synthesize hormones at will, blood tests, urinalysis, HIV tests, pain relief, or whatever WE NEED. It is about hacking and building our own ultrasound, endoscope or ecography devices in a low-cost way. All this experimentation is made in complementarity with herbs and natural knowledges, oral traditions, underground recipes, seeking with hunger to generate a plethoraof DIY lubricants, anti-contraceptives, open doula domains, savage caring of any visceral hands-on technologies, such as menstrual extraction, all elevated to the maximum potential of common learning and radical self-body-power …!
Gynepunk is based on scientific methodologies and disciplines and relies on the knowledge that comes through the experience of each body and from ancestral body wisdom; that is also why documentation and memory under any form is essential! ANY format: visual treasures, sound mines, microscopic riddles, biologic cabinets, microbiologic growing centers, online seedbanks, fluids archives, fanzine (paper sms), oral decoding chorus, self voodoo healing rituals. Like those, gynepunks will ferment and mutate going fast forward to an explosive and expansive movement towards radical experiments, collective strong confidence, to build our-body politics; something that is vital to share and spread in infinite pandemoniums. Nobody can burn US! NO ONE! The witches NOW have the flames//
Feminist servers have been a topic of discussion, a partially-achieved aim and a set of slow-political practices among an informal group of transfeminists interested in creating a more autonomous infrastructure to ensure that data, projects and memory of feminist groups are properly accessible, preserved and managed. The need for feminist servers is a response to: the unethical practices of multinational ICT companies acting as moral and hypocrite censors; gender based online violence in the form of trolling and hateful machoists harassing feminist or women activists online and offline; the centralization of the internet and its transformation into a consumption sanctuary and a space of surveillance, control and tracking of dissent voices by government agencies among others. All these factors have led to a situation where the internet is not a safe space and where it is common to see feminist and activist work being deleted, censored, and/or prevented from being seen, heard or read. Freedom of expression is part of the feminist struggle and TransFeminists can contribute by providing collectively the knowledge and means to ensure their right to speak up remains accessible online, offline and wherever and under any format expression emerges. There will be no feminist internet without properly managed autonomous feminist servers. This is about regaining control and gaining autonomy in the access and management of our data and collective memories. It is also about being able to have feminist mailing lists, pads, wikis, content management systems, social networks and any other online services managed by feminist tech collectives. It is also of course about continuing to argue that social justice in technologically driven environments needs a more gender and culturally diverse presence in general. To achieve those objectives, many sessions during the THF discussed questions such as: what are the purposes of a Feminist Server? What makes a server autonomous and feminist? Where are possible (socially sustainable) models for those servers? How do we create trust among us to develop cooperative approaches to the management of those spaces of resistance and transformation?
Two feminist servers projects were rebooted during the THF!: the Systerserver6 project which was originally launched by Genderchangers and the Eclectic Tech Carnival (/etc) and which will focus on hosting online services; and the Anarchaserver7 which was launched by Calafou inhabitants and people involved in the organisation of the THF! and which will focus on hosting data. The latter currently hosts a mediawiki for the documentation of the THF! and a WordPress farm. Both projects are open, even though moderated, and they are using mailing lists and IRC channels to coordinate the several tasks that need to be achieved.
Finally, to create a “safe space” rooted in a clear political project we set up boundaries from the get go. The agreement that we asked everyone to respect was the following:
Attendees are expected to treat all people and facilities with respect and help create a welcoming environment. If you notice behavior that fails to meet this standard, please speak up and help keep THF! as respectful as we expect it to be.
This is a transfeminist event and some behaviors are not welcome. Any kind of general hatefulness and disrespect will be deeply disapproved. We will not invite you to leave, we will directly kick you out. Long story short, if you behave like an ass-hole, THF! is just not the right convergence for you.
The THF! is a self-managed event. This means that all participants contribute to its contents, dynamics and logistics. During the event, and before, we will decide together which tasks should be achieved and everyone will contribute to their realization. We are not service providers; we all cook, recycle, clean, document, inform, take care of the temporal autonomous community we have created, and we have fun together!
The THF! and Calafou are totally committed to free culture protection and advancement. Therefore, if you want to produce an article, piece of audiovisual or any other type of multimedia coverage of the THF! and/or Calafou you should release the material under a free license. Read our media protocol8 if you want to produce something about Calafou in order to contribute to the documentation and coverage of the THF! 2014 event.
This political project is located in a space with various particularities. Calafou has developed from an abandoned space into a place of life. It is composed of shelters to accommodate visitors innew homes, there are spaces and workshops for productive projects. It has numerous infrastructures for the commons; such as a kitchen, dining room, hacklab, chicken hutch, compost space, cleaning point, social center and free store. Now, it should be noted that it is an eco-industrial project; it is not an agricultural or health project, nor an eco-village or a retreat space to work on spirituality or existential doubts. It is not yet an idyllic place to enjoy nature and the environment, though we will all work for that to happen one day.
The meaning of THF!
During the THF! a discussion was started about the meaning of TransHackFeminism. What do those three concepts mean as a whole? How could we connect the dots between them? As we were coming from different perspectives, trying to figure out what THF! meant for us as a group was an important part of this gathering. Reflecting on its meaning(s) meant pushing the boundaries of what was possible for us to imagine together and opening up possibilities. It was also to try to not fear certain practices that we might not have understood because of a lack of interaction, exposition or dialogue.
This collective reflection is an on-going process in which we want more people to participate. This is not a fixed process or concept. It’s understanding will be fluid and open. The following is a summary of the main discussions and debate that took place during the Meaning of THF! sessions.
First, separating the THF! concepts helped us identify the roots behind each one and therefore made it more intelligible. The discussion started with the importance of understanding TransFeminism (TF) as a standalone concept that already existed in theory and practice. Only two main trajectories were presented about TF and hence it is important to mention that other trajectories exist, but were not the focus of the discussions and thus will not appear in this report.
In the US context, TF was a critique addressed by the so-called second wave of feminism in that ithad not been able to keep pace with non-normative genders as they are thought, embodied and lived. At the same time, there was also the recognition that transgender studies cannot exist without feminism, otherwise it risks focusing too much on the subjectivity of individuals (where it is mostly the identity of the person that matters) and thus risk entering into a very liberal discourse about identity where collective dimensions are made invisible and social resistance becomes even more difficult.
The other trajectory presented was the one from Spain. It started by highlighting that on January 1, 2010 a manifesto for a Trans-Feminist insurrection was launched. This text was a reaction to a political context in which the LGBTQI community felt they were discriminated against and/or not enough taken into account by more traditional feminist movements. The date of publication of the manifesto aligns itself with the Zapatista struggle launched on January 1, 1994, when rebellious communities descended from the hills and triggered one of the most significant revolutions of the late twentieth century. Moore recently, in 2013, an anthology about Transfeminismos was published which focused on different themes such as the economy, relationships and technology. It had no central position, other than having the intention to re-think feminism.
For many of the participants, TF is far from being only about questions of identity, it is also and especially about the re-politicization of feminism. For Spanish participants particularly, TF is about making explicit the link with anti-capitalist perspectives in contrast with the US tradition where this direct connection is either not present, or not made so explicit. In this way, TF opens the possibility to experiment with new spaces and practices, to go beyond binaries and cross borders; there is the will to experiment with the body, with technology and to interconnect those through theory and practice. From there the conversation focused on possible principles that could represent THF!.
First of all, the word “trans” needs to be understood in its plurality of ways. Trans as a noun, a verb, and a prefix. Being in transition, in transformation, being transgendered, being transversal, transdiciplinary, etc. Trans as a verb meaning interrogating, crossing, fusing. From that starting point, THF! allows for expansion, interconnection, the crossing of physical and metaphorical borders. It also points to the fact that the concept is constantly evolving, acknowledging that when notions become fixed or closed they also begin to die.
The term “hack” refers to the more traditional act of doing, of taking things apart, of understanding things in a deeper way. But it is also seen as an action and as a performance in order to hack patriarchy, capitalism and other systems of oppression, and by making those systems explicit. THF! is also about being aware and acknowledging one’s privileges. It is about understanding the relations between privilege and oppression. A THF! practice is about being anti-racist, anti-capitalist, anti-sexist, anti-abelist, anti-homophobic, anti-transphobic, and using hacking as a mean of resistance, sabotage and transformation.
Finally, the word “hack” also introduces the dimensions of contagion and contamination – understood in a positive light. Those “viruses” that hackfeminism and transfeminism introduce new modalities of seeing and viewing the world that help to break the binaries (male vs. female, theory vs. practice, who produces vs. who consumes knowledge, tech activists vs. activists, etc.). The concept of virality is also linked to authorship and the public domain – in the sense that it is there to be re-distributed, remixed, re-purposed and logically also hacked.
The content presented and produced during the THF! broadly fits into three main themes: Embodied Theory, Performative Tactics and Liberating Technologies.
Embodied Theory: This stream of the program refers to the activities where content and theories were embodied by the participants. Embodied theories are theories that are lived and experienced. They emerge from the ground up; from activists’ particular experiences and/or positionality. Embodied standpoint theories aim at reconfiguring theories by limiting and reducing the existence of binaries, particularly the distinction between researchers and activists, and theory and practice. For the THF! embodied theories was about the extent to which activists can be living embodiments of a chosen theoretical or hermeneutical path. It was about trying to find answers to the following questions: How does embodied knowledge shape us in terms of social interaction, perception, subjectivities, etc? What doembodied theories do to us? Does embodied theory come to be through practices and/or the belief in a theoretical framework?The following presentations and discussions explored those questions:
Hacking Gender Construction: Theraison d’être of this session emerged out of a need and desire to look at how gender is constructed in society. It started from the assumption that once we understand how gender is constructed, we can hack the concept. The session outlined in 10 steps how to set up biased gender constructions and served as a reminder of the domination of certain scientific, social and cultural assumptions in society.
AnarchaGland: This presentation aimed to highlight the racist and sexist history behind gynecology. Marion Sims, a slave doctor in 1840s in Alabama, is recognised as the father of modern gynecology. What is rarely told is the ways in which he used women slaves with fistulas, often without anesthesia, to “unearth” the female body. The AnarchaGland project aims at rendering visible the women slaves involved in this practice and how racist and sexist the practices were.
What is Genitalism? The presentation aimed at demystifying what genitalism is specifically and more broadly to demystify the use of language in emancipative contexts.
Hacking the Academia: The starting point with this session was how do you position yourself as a queer, feminist or transfeminist in academia? This session was rooted in personal experiences of how to hack academia in concrete terms to be able/or try to attempt to position oneself asgenderqueer or transfeminist within a university setting.
Crips are Hot and They Fuck: The session highlighted the intersection between hacking, sexuality, queer and disability studies. It highlighted the untold history of activism and disability in Europe and North America and argued that for a vibrant queer politics to exist, it must incorporate a vibrant crip politics.
Cyborg Romanticism: This session aimed at investigating cyborg ideologies. It explored the assumption that cyborgian romanticism and futurist fetishization might be leading to further exploitation and degradation of our natural environments, and to a potentially techno-fascist climate.
Hacking the Baby: This workshop aimed at talking and sharing about alternative ways of parenting. Some of the questions discussed were: How to educate your children to be people outside of the dualism man/woman? How to overcome traditional family structures and build informal support networks that work and do not reproduce the paranoia of the traditional family?
Performative Tactics. This stream of the program refers to the tactics that are being used by the participants to circumvent political, economic, social and/or cultural barriers through performances. Performative tactics are actions, practices and/or projects that activists undertake to raise consciousness, bring political issues to the fore, prefigure the world they want to live in, and reframe or disrupt dominant narratives in creative ways. These tactics are performative in the sense of committing an action and possessing agency. The performative tactics undertaken at THF! took shape through the following presentations, lived projects and/or discussions:
The Fellatio Modification project: The presentation highlighted that the project was conceived as a series of oral modifications with dental technology and tissue engineering. The purpose of this project is to enhance the physical pleasure of having oral sex for gay people.
Satellite Fishing: This session first aimed at showing the extent to which satellites are ubiquitous in the sky and how easy it is to identify them. Secondly, it aimed at defining the space above us as « Public Space » and therefore reclaim it as a sphere for collective debate and decision about the usage of it and the questions and concepts asked and developed around it.
Public Key Signing Ceremony: During the THF! convergence a public key signing party was organized to enable participants to verify the authenticity of keys owners and contribute to the expansion of the web of trust. The face-to-face meeting was the perfect opportunity for a group to have a live exchange of keys through a hacker ceremony.
Feminist Tactics on the Net: This session aimed at sharing collective tactics that have been developed on the internet by feminists, and the ways in which to improve the connection between feminist groups when developing campaigns and/or actions in cyberspace.
Zine Repositories: This session discussed the importance of zines andine-making as a form of hacking the press and as a DIT practice, and of having a collection of zines online and on a mesh network. Out of this session a list of web platforms where you can enjoy a variety of feminist zines was generated.
Public Digital Libraries: This workshop was aimed at rethinking the infrastructures of knowledge production. First a discussion was organized on theways in which we can preserve and disseminate the collective memory of social movements and critical thinking in general through the making of digital public libraries (e.g. memory of the world, aaaaarg, monoskop, library genesis) Second, it allowed participants to learn how to use a book scanner, to install and configure free programs and applications for building catalogs efficiently on the internet among other things.
Emancipatory Theatre: This workshop was based on various experiences of participatory theater in rural and urban areas in different parts of Latin America. The main goal was to build a collective dramaturgy and scenic elements that emancipatory praxis allows.
Death Cafes: A “Death Cafe” was organized where people could talk about all things related to death and dying. The objective was to increase awareness of death tabus with a view to enabling people to make the most of their (finite) lives.
FollonNoiseX: This workshop aimed at playing around with and learning by doing via the making of audiovisual installations that involved electronics, bending circuits and home made instruments.
The Cyberperformance UpStage software: The THF! participants got familiar with UpStage, an open-source web-based platform for cyberformance. Workshop participants in Calafou learned how to create media for and use UpStage and developing ideas for their performance. Remote participants joined on the night on the Cabaret for an improvised performance.
The Cabaret: Trans Futuristic Cyborgs: On the last day of the THF! a Trans Futuristic Cyborgs Cabaret was organized. The following groups and collectives performed at the Cabaret: Pornotrash, Darkbaider Y Mari Pili, Upstage Jam, Boca de Baba, VaginoPlastia, Perkances por un Tubo and Miss Sasa.
Liberating Technologies. This stream of the programexplored a variety of technologies that can be considered to be liberating. Liberating technologies are rooted in libre/free culture and its participants aim to embrace, protect and advance it. We consider corporate social media corporations (a.k.a. data empires) such as Google (we do believe Google particularly to be evil, despite it’s moto: « don’t be evil! ») as having dire consequences on our private and collective lives. The profiles that are created about us when we use corporate social media platforms and search engines, record every bit of data we produce for economic, political, social and/or mass surveillance purposes. Corporations now act as mediators of our communications and in turn manipulate how we understand the world around us. Liberation technologies for us mean taking back the control of the internet, infrastructure, algorithms, inscribing new values in code, among others. Many of the activities organized under this category aimed at enhancing skills through hands-on workshops and presentations. They included:
The Gynepunk BioLab: Thisvisual presentation aimed at presenting what a Gynepunk Lab consists of. It showed the most common test in obstetrician/genecology, the techniques (extraction, treatment, diagnosis) used, the basic hardware needed, the sanitary conditions needed and the patterns commonly used in various diagnostic tests (such as for Candida vaginitis, Gardenella, tricomonas, PAP, etc.)
Del EM Menstrual extraction system: Based on a text by Rebecca Chalker entitled: “The Whats, Hows and Whys of Menstrual Extraction” this workshops aimed at discussing the history behind the desire to have control over our reproductive system.
Feminist Recreation on the Internet: This practical workshop aimed at developing personal or collective videographic discursive interventions. Participants worked primarily through dubbing and subtitling as a form of critical intervention using feminist discourse. This feminist recreation workshop was based on the appropriation of previously existing materials, focusing on the (re)production and hacking of mainstream videos.
R_R/R – Radio Ramona and Ruelles: This hands-on workshop introduced Radio Ramona and Ruelles, a mobile online streaming unit that uses a Raspberry Pi, battery, a wifi Dongle, a USB soundcard and a powered USB hub. This performative session aimed at explaining how to build it yourself, contextualize the projects and articulate a critical approach towards technological tools for a common voice.
“Weapons” of Mass Destruction: This theoretical and practical workshop aims at learning how to use certain tools for online documentation such as hotglue and GIMP.
How to play with your computer without knocking off the system or the virtual machine(s): Thisvirtual node aimed at learning how to play with your computer through a variety of techniques and tricks.
Digital security and circumvention: During this session participantsdiscussed and made a list of digital security manuals that exist in many languages and which have a feminist, queer/trans angle or which are activist-oriented.
Open Street Map Mapping Party: A mapping party which comprised a talk, a walking tour, and a hands-on tutorial. The goal of two-part session was a feminist strategy of what to map and what not to map in the surroundings of Calafou. It is in this context that participants took a walk to explore and map the local area through walking, observing, watching, listening and sensing collectivelly and individually.
Screening of Documentaries: During the THF! a few documentaries were shown including: Ruins VIH witch Hunt, Mi sexualidad es una creacion artistica (My sexuality is an artistic creation), Dreceres, a film about the Integral Catalan Cooperative that presents Calafou.
Conclusion – Join us for the organisation of the next THF! 2015 in Puebla (Mexico)
To wrap up, THF! is about:
Enhancing our personal and collective lives, as it allows us to push the boundaries to further (re)think certain (basic) assumptions.
Opening up possibilities to experiment and understand life as a performance and a permanent process of performativity.
Collectively producing knowledge: without making a differentiation between theory and practice.
Embracing, protecting and advancing libre/free culture.
Creating communities where people meet, exchange, experiment and share knowledge.
Setting up boundaries by positioning one’s self vis-a-vis other feminist discourses and narratives. It is a re-politicisation of feminism.
Anti-capitalism through alliances and solidarity thanks to Do-it-yourself (DYI)/Do-it-with-others (DIWO)/Do-it-together (DIT), self-management and autonomy practices.
You can also view short videos of the first THF! Here and There. If you like this report and want to contribute to the development of the next THF! you can subscribe to our moderated mailing list at firstname.lastname@example.org. Please introduce yourself briefly to the administrators in order to be subscribed to the list and let’s move ahead with the organization of this self-managed and radical TransHackFeminist event.
Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network. He put it in a script, and ran it to see what would happen, then went to bed for about four hours. Next morning on the way to work he checked on it, and discovered he was now lord and master of about 50,000 computers. After nearly vomiting in fear he killed the whole thing and deleted all the files associated with it. In the end he said he threw the hard drive into a bonfire. I can’t tell you who he is because he doesn’t want to go to Federal prison, which is what could have happened if he’d told anyone that could do anything about the bug he’d found. Did that bug get fixed? Probably eventually, but not by my friend. This story isn’t extraordinary at all. Spend much time in the hacker and security scene, you’ll hear stories like this and worse.
It’s hard to explain to regular people how much technology barely works, how much the infrastructure of our lives is held together by the IT equivalent of baling wire.
Computers, and computing, are broken.Build it badly, and they will come.
For a bunch of us, especially those who had followed security and the warrantless wiretapping cases, the revelations weren’t big surprises. We didn’t know the specifics, but people who keep an eye on software knew computer technology was sick and broken. We’ve known for years that those who want to take advantage of that fact tend to circle like buzzards. The NSA wasn’t, and isn’t, the great predator of the internet, it’s just the biggest scavenger around. It isn’t doing so well because they are all powerful math wizards of doom.The NSA is doing so well because software is bullshit.
Eight months before Snowden’s first revelation I tweeted this:
It was my exasperated acknowledgement that looking for good software to count on has been a losing battle. Written by people with either no time or no money, most software gets shipped the moment it works well enough to let someone go home and see their family. What we get is mostly terrible.
Software is so bad because it’s so complex, and because it’s trying to talk to other programs on the same computer, or over connections to other computers. Even your computer is kind of more than one computer, boxes within boxes, and each one of those computers is full of little programs trying to coordinate their actions and talk to each other. Computers have gotten incredibly complex, while people have remained the same gray mud with pretensions of godhood.
Your average piece-of-shit Windows desktop is so complex that no one person on Earth really knows what all of it is doing, or how.
Now imagine billions of little unknowable boxes within boxes constantly trying to talk and coordinate tasks at around the same time, sharing bits of data and passing commands around from the smallest little program to something huge, like a browser — that’s the internet. All of that has to happen nearly simultaneously and smoothly, or you throw a hissy fit because the shopping cart forgot about your movie tickets.
We often point out that the phone you mostly play casual games on and keep dropping in the toilet at bars is more powerful than all the computing we used to go to space for decades.NASA had a huge staff of geniuses to understand and care for their software. Your phone has you.
Plus a system of automatic updates you keep putting off because you’re in the middle of Candy Crush Saga every time it asks.
Because of all this, security is terrible. Besides being riddled with annoying bugs and impossible dialogs, programs often have a special kind of hackable flaw called 0days by the security scene. No one can protect themselves from 0days. It’s their defining feature — 0 is the number of days you’ve had to deal with this form of attack. There are meh, not-so-terrible 0days, there are very bad 0days, and there are catastrophic 0days that hand the keys to the house to whomever strolls by. I promise that right now you are reading this on a device with all three types of 0days. “But, Quinn,” I can hear you say, “If no one knows about them how do you know I have them?” Because even okay software has to work with terrible software. The number of people whose job it is to make software secure can practically fit in a large bar, and I’ve watched them drink. It’s not comforting. It isn’t a matter of if you get owned, only a matter of when.
This is a thing that actually happened several years ago. To get rid of a complaining message from another piece of software, a Debian developer just commented out a line of code without realizing that it left their encryption open to easy attack (https://www.xkcd.com/424/)
Look at it this way — every time you get a security update (seems almost daily on my Linux box), whatever is getting updated has been broken, lying there vulnerable, for who-knows-how-long. Sometimes days, sometimes years. Nobody really advertises that part of updates. People say “You should apply this, it’s a critical patch!” and leave off the “…because the developers fucked up so badly your children’s identities are probably being sold to the Estonian Mafia by smack addicted script kiddies right now.”
The really bad bugs (and who knows which ones those are when they click the “Restart Later” button?) can get swept up by hackers, governments, and other horrors of the net that are scanning for versions of software they know they can exploit. Any computer that shows up in a scan saying “Hey! Me! I’m vulnerable!” can become part of a botnet, along with thousands, or hundreds of thousands of other computers. Often zombied computers get owned again and become part of yet another botnet. Some botnets patch computers to throw out the other botnets so they don’t have to share you with other hackers. How can you tell if this is happening? You can’t! Have fun wondering if you’re getting your online life rented out by the hour!Next time you think your grandma is uncool, give her credit for her time helping dangerous Russian criminals extort money from offshore casinos with DDoS attacks.
A map of things which were hacked for the Internet Census.
Recently an anonymous hacker wrote a script that took over embedded Linux devices. These owned computers scanned the whole rest of the internet and created a survey that told us more than we’d ever known about the shape of the internet. The little hacked boxes reported their data back (a full 10 TBs) and quietly deactivated the hack. It was a sweet and useful example of someone who hacked the planet to shit. If that malware had actually been malicious, we would have been so fucked.
This is because all computers are reliably this bad: the ones in
hospitals and governments and banks, the ones in your phone, the ones that control light switches and smart meters and air traffic control systems. Industrial computers that maintain infrastructure and manufacturing are even worse. I don’t know all the details, but those who do are the most alcoholic and nihilistic people in computer security. Another friend of mine accidentally shut down a factory with a malformed ping at the beginning of a pen test. For those of you who don’t know, a ping is just about the smallest request you can send to another computer on the network. It took them a day to turn everything back on.
Computer experts like to pretend they use a whole different, more awesome class of software that they understand, that is made of shiny mathematical perfection and whose interfaces happen to have been shat out of the business end of a choleric donkey. This is a lie. The main form of security this offers is through obscurity — so few people can use this software that there’s no point in building tools to attack it. Unless, like the NSA, you want to take over sysadmins.A well written encrypted chat, what could go wrong?
Let’s take an example computer experts like to stare down their noses at normal people for not using: OTR. OTR, or Off The Record messaging, sneaks a layer of encryption inside normal plain text instant messaging. It’s like you got on AIM or Jabber or whatever and talked in code, except the computer is making the code for you. OTR is clever and solid, it’s been examined carefully, and we’re fairly sure it hasn’t got any of those nasty 0days.Except, OTR isn’t a program you use, as such.
There is a standard for OTR software, and a library, but it doesn’t do anything on its own. It gets implemented in software for normal human shlubs to use by other normal human shlubs. By now, you know this ends in tears.
The main thing that uses OTR is another piece of software that uses a library called libpurple. If you want to see infosec snobs look as distressed as the donkeys that shit out their interfaces, bring up libpurple. Libpurple was written in a programming language called C.C is good for two things: being beautiful and creating catastrophic 0days in memory management.
Heartbleed, the bug that affected the world over, leaking password and encryption keys and who knows what? Classic gorgeous C.
Libpurple was written by people who wanted their open source chat client to talk to every kind of instant messaging system in the world, and didn’t give a shit about security or encryption. Security people who have examined the code have said there are so many possible ways to exploit libpurple there is probably no point in patching it. It needs to be thrown out and rewritten from scratch. These aren’t bugs that let someone read your encrypted messages, they are bugs that let someone take over your whole computer, see everything you type or read and probably watch you pick your nose on your webcam.
This lovely tool, OTR, sits on top of libpurple on most systems that use it. Let me make something clear, because even some geeks don’t get this: it doesn’t matter how good your encryption is if your attacker can just read your data off the screen with you, and I promise they can. They may or may not know how to yet, but they can. There are a hundred libpurples on your computer: little pieces of software written on a budget with unrealistic deadlines by people who didn’t know or didn’t care about keeping the rest of your system secure.
Any one of these little bugs will do when it comes to taking over everything else on your computer. So we update and update, and maybe that throws any intruders out, and maybe it doesn’t. No one knows!When we tell you to apply updates we are not telling you to mend your ship. We are telling you to keep bailing before the water gets to your neck.
To step back a bit from this scene of horror and mayhem, let me say that things are better than they used to be. We have tools that we didn’t in the 1990s, like sandboxing, that keep the idiotically written programs where they can’t do as much harm. (Sandboxing keeps a program in an artificially small part of the computer, cutting it off from all the other little programs, or cleaning up anything it tries to do before anything else sees it.)
Certain whole classes of terrible bugs have been sent the way of smallpox. Security is taken more seriously than ever before, and there’s a network of people responding to malware around the clock. But they can’t really keep up. The ecosystem of these problems is so much bigger than it was even ten years ago that it’s hard to feel like we’re making progress.People, as well, are broken.
“I trust you…” was my least favorite thing to hear from my sources in Anonymous. Inevitably it was followed by some piece of information they shouldn’t have been telling me. It is the most natural and human thing to share something personal with someone you are learning to trust. But in exasperation I kept trying to remind Anons they were connecting to a computer, relaying though countless servers, switches, routers, cables, wireless links, and finally to my highly targeted computer, before they were connecting to another human being. All of this was happening in the time it takes one person to draw in a deep, committal breath. It’s obvious to say, but bears repeating: humans were not built to think this way.
Everyone fails to use software correctly. Absolutely everyone fucks up. OTR doesn’t encrypt until after the first message, a fact that leading security professionals and hackers subject to 20-country manhunts consistently forget. Managing all the encryption and decryption keys you need to keep your data safe across multiple devices, sites, and accounts is theoretically possible, in the same way performing an appendectomy on yourself is theoretically possible. This one guy did it once in Antarctica, why can’t you?
Every malware expert I know has lost track of what some file is, clicked on it to see, and then realized they’d executed some malware they were supposed to be examining. I know this because I did it once with a PDF I knew had something bad in it. My friends laughed at me, then all quietly confessed they’d done the same thing. If some of the best malware reversers around can’t keep track of their malicious files, what hope do your parents have against that e-card that is allegedly from you?
Executable mail attachments (which includes things like Word, Excel, and PDFs) you get just about everyday could be from anyone — people can write anything they want in that From: field of emails, and any of those attachments could take over your computer as handily as an 0day. This is probably how your grandmother ended up working for Russian criminals, and why your competitors anticipate all your product plans. But if you refuse to open attachments you aren’t going to be able to keep an office job in the modern world. There’s your choice: constantly risk clicking on dangerous malware, or live under an overpass, leaving notes on the lawn of your former house telling your children you love them and miss them.
Security and privacy experts harangue the public about metadata and networked sharing, but keeping track of these things is about as natural as doing blood panels on yourself every morning, and about as easy. The risks on a societal level from giving up our privacy are terrible. Yet the consequences of not doing so on an individual basis are immediately crippling. The whole thing is a shitty battle of attrition between what we all want for ourselves and our families and the ways we need community to survive as humans — a Mexican stand off monetized by corporations and monitored by governments.
I live in this stuff, and I’m no better. Once I had to step through a process to verify myself to a secretive source. I had to take a series of pictures showing my location and the date. I uploaded them, and was allowed to proceed with my interview. It turns out none of my verification had come through, because I’d failed to let the upload complete before nervously shutting down my computer. “Why did you let me through?” I asked the source. “Because only you would have been that stupid,” my source told me.
But if I can’t do this, as a relatively well trained adult who pays attention to these issues all the damn time, what chance do people with real jobs and real lives have?In the end, it’s culture that’s broken.
A few years ago, I went to several well respected people who work in privacy and security software and asked them a question.
First, I had to explain something:“Most of the world does not have install privileges on the computer they are using.”
That is, most people using a computer in the world don’t own the computer they are using. Whether it’s in a cafe, or school, or work, for a huge portion of the world, installing a desktop application isn’t a straightforward option. Every week or two, I was being contacted by people desperate for better security and privacy options, and I would try to help them. I’d start, “Download th…” and then we’d stop. The next thing people would tell me was that they couldn’t install software on their computers. Usually this was because an IT department somewhere was limiting their rights as a part of managing a network. These people needed tools that worked with what they had access to, mostly a browser.
So the question I put to hackers, cryptographers, security experts, programmers, and so on was this: What’s the best option for people who can’t download new software to their machines? The answer was unanimous: nothing. They have no options. They are better off talking in plaintext I was told, “so they don’t have a false sense of security.” Since they don’t have access to better software, I was told, they shouldn’t do anything that might upset the people watching them. But, I explained, these are the activists, organizers, and journalists around the world dealing with governments and corporations and criminals that do real harm, the people in real danger. Then they should buy themselves computers, I was told.
That was it, that was the answer: be rich enough to buy your own computer, or literally drop dead. I told people that wasn’t good enough, got vilified in a few inconsequential Twitter fights, and moved on.
Not long after, I realized where the disconnect was. I went back to the same experts and explained: in the wild, in really dangerous situations — even when people are being hunted by men with guns — when encryption and security fails, no one stops talking. They just hope they don’t get caught.The same human impulse that has kept lotteries alive for thousands of years keeps people fighting the man against the long odds. “Maybe I’ll get away with it, might as well try!”
As for self-censoring their conversations in the face of hostile infrastructure, non-technical activists are just as good at it as Anons are, or people told to worry about metadata, or social media sharing, or that first message before OTR encryption kicks in. They blow.
This conversation was a wake-up call for some security people who hadn’t realized that people who become activists and journalists routinely do risky things. Some of them joined my side of the time-wasting inconsequential Twitter fights, realizing that something, even something imperfect, might be better than nothing. But many in the security scene are still waiting for a perfect world into which to deploy their perfect code.
Then there’s the Intelligence Community, who call themselves the IC. We might like it if they stopped spying on everyone all the time, while they would like us to stop whining about it.
After spending some time with them, I am pretty sure I understand why they don’t care about the complaining. The IC are some of the most surveilled humans in history. They know everything they do is gone over with a fine-toothed comb — by their peers, their bosses, their lawyers, other agencies, the president, and sometimes Congress. They live watched, and they don’t complain about it.
In all the calls for increased oversight, the basics of human nature gets neglected. You’re not going to teach the spooks this is wrong by doing it to them more.
There will always be loopholes and as long as loopholes exist or can be constructed or construed, surveillance will be as prevalent as it possibly can be. Humans are mostly egocentric creatures. Spooks, being humans, are never going to know why living without privacy is bad as long as they are doing it.
Yet that’s the lesser problem. The cultural catastrophe is what they’re doing to make their job of spying on everyone easier. The most disturbing parts of the revelations are the 0day market, exploit hoarding, and weakening of standards. The question is who gets to be part of the “we” that are being kept allegedly safe by all this exploiting and listening and decrypting and profiling. When they attacked Natanz with Stuxnet and left all the other nuclear facilities vulnerable, we were quietly put on notice that the “we” in question began and ended with the IC itself. That’s the greatest danger.When the IC or the DOD or the Executive branch are the only true Americans, and the rest of us are subordinate Americans, or worse the non-people that aren’t associated with America, then we can only become lesser people as time goes on.
As our desires conflict with the IC, we become less and less worthy of rights and considerations in the eyes of the IC. When the NSA hoards exploits and interferes with cryptographic protection for our infrastructure, it means using exploits against people who aren’t part of the NSA just doesn’t count as much. Securing us comes after securing themselves.
In theory, the reason we’re so nice to soldiers, that we have customs around honoring and thanking them, is that they’re supposed to be sacrificing themselves for the good of the people. In the case of the NSA, this has been reversed. Our wellbeing is sacrificed to make their job of monitoring the world easier. When this is part of the culture of power, it is well on its way to being capable of any abuse.
But the biggest of all the cultural problems still lies with the one group I haven’t taken to task yet — the normal people living their lives under all this insanity.
The problem with the normals and tech is the same as the problem with the normals and politics, or society in general. People believe they are powerless and alone, but the only thing that keeps people powerless and alone is that same belief. People, working together, are immensely and terrifyingly powerful.There is certainly a limit to what an organized movement of people who share a mutual dream can do, but we haven’t found it yet.
Facebook and Google seem very powerful, but they live about a week from total ruin all the time. They know the cost of leaving social networks individually is high, but en masse, becomes next to nothing. Windows could be replaced with something better written. The US government would fall to a general revolt in a matter of days. It wouldn’t take a total defection or a general revolt to change everything, because corporations and governments would rather bend to demands than die. These entities do everything they can get away with — but we’ve forgotten that we’re the ones that are letting them get away with things.
Computers don’t serve the needs of both privacy and coordination not because it’s somehow mathematically impossible. There are plenty of schemes that could federate or safely encrypt our data, plenty of ways we could regain privacy and make our computers work better by default. It isn’t happening now because we haven’t demanded that it should, not because no one is clever enough to make that happen.
So yes, the geeks and the executives and the agents and the military have fucked the world. But in the end, it’s the job of the people, working together, to unfuck it.
Jan 24 2015 / How our Tropes vs Women project has expanded and transformed
As I look forward to plans and goals for Feminist Frequency in 2015, I’m reflecting on our Tropes vs Women in Video Games project and how far we’ve come. Two years into this project, I’d like to share some thoughts with you about what we set out to do, and what we’ve accomplished so far.
The Original Plan
Back in 2011, I created a series of six relatively short videos called Tropes vs Women that examined a handful of harmful gender tropes primarily found in television and movies. After their release, I received many positive messages from viewers who had felt uncomfortable when they saw these themes in their favorite media, and after watching my video series, they could finally articulate why. Because of the positive feedback I decided to do a follow-up series. I had been wanting to do some extended episodes on video games and since many of the tropes on my list were highly prevalent in gaming, the Tropes vs Women in Video Games kickstarter was born.
Initially, I imagined that each of the five videos would be about 10-12 minutes, give or take, with episode structures similar to the original series: description of the trope, relatively quick overview, a handful of game examples from major titles, and a brief 101-style ‘why does this matter’ analysis. I envisioned my audience primarily as young women, largely feminists or those already dissatisfied or uncomfortable with the status quo. I budgeted the initial project at $10,000. I set the Kickstarter goal to $6,000 and was anticipating an additional $4,000 in grants. This would cover the costs of production, equipment, games etc. and I would continue to volunteer time to produce the episodes.
So What Happened?
Much to my surprise and delight, I raised the initial $6,000 within 24 hours. As support for the project continued to pour in, I quickly expanded the number of videos I was going to produce and set up more stretch goals including an increase in production quality and a classroom curriculum. It wasn’t until halfway through the fundraiser that the harassment campaign began, and it’s never stopped. Not only did this harassment change my life, but it also forced me to fundamentally change the way I approached this project.
Due to the attention, both negative and positive, I had a much bigger spotlight on my work than ever before. I had new supporters: passionate geeks, curious onlookers, those horrified by the harassment, and of course, detractors and dedicated harassers. Perhaps most interestingly, game developers started paying attention as well. While Feminist Frequency started as a literacy tool to help folks be more critical of the media they are engaging with, I was now talking to the people that actually make that media, giving me a chance to send my message directly to those who can make real and substantial change in the industry.
This felt daunting, but exciting! Attracting a broader audience outside of the feminist sphere meant that I could reach more people, but also that I could no longer assume that my viewers had prior experience with sociological or feminist theory. My new videos would need to break down basic concepts so that viewers could follow along without any pre-existing knowledge while simultaneously challenging the status quo in gaming culture (a culture where many enthusiasts react defensively or even aggressively to the idea that sexism is a problem at all).
Back in June of 2012, I never imagined that the initial surge of harassment would not only increase in volume, but continue for years to come. One thing was immediately apparent, however: the harassers had made it their mission to pick apart and distort every minuscule detail of my work and even my personal life in order to try to discredit, defame, and ultimately silence me. My arguments and examples had to be airtight; I felt I could not afford to make a single mistake or error. That was, and is, a lot of pressure.
Making these videos is a balancing act of trying to offer comprehensive theoretical frameworks stated in widely accessible language while also trying to be bulletproof. We aim to reach as many people as possible while making our arguments solid enough so that folks who are on the fence won’t be easily lured in by the harassers’ torrent of misrepresentations and fabrications.
It’s hard to quantify the emotional costs that accompany daily harassment both for me and those bystanders who support me online. Every time I post anything online there is a predictable wave of harassing messages in response. However, when I publish an episode of Tropes vs Women in Video Games the vicious wave of harassment can carry on for weeks or even months. Instead of the satisfaction that typically comes with completing and publishing a big project, I am often forced to turn off my computer and avoid Facebook, Twitter and email, sometimes for days at a time. In addition to the sexist harassment, the death and rape threats have been persistent and have ranged from annoying to criminal. Local and national law enforcement agencies are involved in investigating the worst of these crimes. While the harassment existed long before the mob began self identifying as “GamerGate”, the emergence of this organized backlash in August 2014 caused the hate and vitriol targeting women in gaming to intensify exponentially with widespread ramifications across the gaming industry.
While Tropes vs Women in Video Games was originally a project examining women’s representations, the extreme harassment that I experience has become an intrinsic and inseparable part of this project, fundamentally changing my life and the landscape in which I release my videos. Gendered online harassment is not a new phenomenon, but the intensity of cyber mobs, especially in gaming, is increasing in frequency and severity. It became apparent to me that I should speak up and use my experience to help expose the epidemic of online abuse. Nearly half of my time is spent raising awareness on the epidemic of online harassment and working to help change policies on the institutional level. Some of these efforts are done publicly through Feminist Frequency’s website and social media presence, as well as countless media interviews and at public speaking events. But there is also work being done behind the scenes in private meetings and consultations with major social media and gaming platforms, and by partnering with other organizations to form a task force with the goal of ending online harassment.
The Current Scope of the Project
The goals of Feminist Frequency have changed due to all these factors. Here’s an overview of the ways we have evolved and expanded the Tropes vs Women in Video Game project:
- Instead of examining a handful of examples for each trope, we sift through hundreds of games across a variety of genres and platforms. For example, we referenced 182 games in our coverage of the Damsel in Distress trope alone. We have also catalogued and documented over 548 examples of the Damsel in Distress throughout the history of video games.
- Originally, I anticipated creating 10-12 minute videos for each trope. However, as the depth and breadth of our analysis grew, so did the videos.
~ The Damsel in Distress became a three-part miniseries clocking in at just over one hour
~ Ms. Male Character was 25 minutes long
~ Women as Background Decoration became a two-part miniseries clocking in at one hour
- Our desire to be more specific in the analysis meant that we made connections to other related tropes, including some that we identified and named ourselves. For example, in the Damsel in Distress videos we also discussed new tropes such as the Helpful Damsel, the Damsel in the Refrigerator, the Disposable Damsel and the Euthanized Damsel. With all that and more, it’s easy to see how we ended up with an hour long multi-part mini series just on this one topic alone.
- Many of my previous videos were off the cuff and only half scripted. In this series I have become much more intentional. Every sentence and every word is carefully considered and evaluated. There is nothing flippantly or casually stated. This can lead to hours of discussion about the accuracy of a particular term or rephrasing a single sentence until it is just right. Rather than small, casual analyses, each trope video has ended up feeling like we are trying to put together a master’s thesis in just a few months.
What We’ve Accomplished
I’m very proud of what we’ve accomplished with Feminist Frequency over the last two years. We’ve released six long-form episodes in the Tropes vs Women in Video Games series plus an accompanying animated video narrated by Jennifer Hale. Our YouTube channel has garnered over 17 million views and our Twitter account now has over 230,000 followers. Feminist Frequency writer and producer Jonathan McIntosh turned an article he wrote on male privilege into a highly popular video with the help of 25 male gamers including veteran games journalist Adam Sessler and beloved game developer Tim Schafer. I’ve done countless radio, television, and print interviews discussing online harassment and the representations of women in games, as well as speaking on these topics at dozens of schools and conferences globally.
We are one of several prominent voices that has helped bring about a paradigm shift and stronger awareness to the inequities in gaming culture. Just in the last couple of years there has been a significant transformation in the way gaming press outlets are reporting on issues of gender representation. Game reviews are beginning to include commentary on how women are depicted, and reporters are questioning developers and publishers more frequently on the lack of female protagonists in their games. After we released our episodes on the Damsel in Distress, several reporters at E3 asked Shigeru Miyamoto why he continued to use the Damsel trope in many of his popular Nintendo games and he said he hadn’t really thought about it before.
One of the most hopeful signs for me is how often developers have expressed their appreciation for my work. I have been invited to speak at game studios like EA DICE, Bungie, and ArenaNet. Developers at both indie and major game studios continue to reach out to me personally to tell me how our video series, and our larger work at Feminist Frequency has played a significant role in shaping internal conversations at all levels of production. Developers who were responsible for some of the games that I have critiqued in my series have graciously accepted the criticism and have promised to do better in the future.
Players, creators, and educators are taking our videos as a starting point and expanding the conversation about representations in games within their own communities.
When our kickstarter campaign ended on June 16, 2012 we raised a total of $158,922. Here is a breakdown of how the funds have been used:
Over the past two years Feminist Frequency has shifted from a side project I did in my spare time to a full blown organization. In May 2014, Feminist Frequency officially became a 501(c)3 nonprofit. This is exciting for a number of reasons, and will allow us to expand the organization and bring on additional support to help us do even more. It means more critical media analysis, more videos, and more efforts to raise awareness and develop solutions around the epidemic of online harassment. My long-term vision of Feminist Frequency includes a network with a variety of different programs and hosts analyzing media from a systemic/intersectional/anti-oppression lens. My team and I are growing the organization carefully and deliberately by bringing in new writing and support staff and by working to create compelling new educational programing. As a very young nonprofit and as we grow into a fully staffed organization, fundraising efforts will become increasingly important in sustaining our growth. If you are interested in learning more about Feminist Frequency as a nonprofit and our work, please take a look at our 2014 Annual Report [PDF].
I hope this update has provided you some insight into this ongoing project and our process in putting together each episode. I know many of you wish we would produce episodes faster, but each video is a massive undertaking and I do not want to compromise the comprehensive, in-depth analysis and high production quality that you have come to expect from Feminist Frequency. Tropes vs Women in Video Games is still my top priority and our next episode Women as Reward is currently in production. I am very proud of the work we are doing and the impact it is having on the industry at large.
I thank each of you for supporting this Kickstarter before you had any idea what these videos were really going to be about and I thank you for your patience as we continue on this rollercoaster of a journey.
Gender and Tech Pop-up Institute
Including Gender: New Approaches to Privacy and Security
Organised by Tactical Technology Collective and the Association for Progressive Communications (APC), December 2014, Germany.
At the beginning of December last year, 76 women and a small group of men - human rights advocates, feminists, techies, activists - descended on an ageing East German 'Schloss' (manor house) near the border of Poland for seven days of training, collaboration, discussion, and knowledge exchange. (And potatoes! Lots of potatoes.)
As could probably be expected from that description alone, the Gender and Tech Pop-up Institute promised to be an intense, interesting, inspiring week.
But first: Why a gender and tech event?
The problem of online harassment and threats against women and their collaborators, coming from both governments and non-state individuals and groups, has become more visible in the last few years. Vocal women are too often trapped in a situation where the internet is crucial to their work - for coordinating actions, gaining wider reach, etc - but is also the place where they are surveilled, harassed and punished for speaking out.
For women, the internet is not a safe space, and it is all too common to see the work of feminists and activists being deleted, (self)censored, and actively prevented from being seen, heard or read. Logically, these trends diminish both the freedom of expression and privacy rights of the people targeted. Our aim with this event was to try to find new approaches to privacy and digital security that would include a gender and cultural diversity approach.
Through a process of rigorous review, 350 applications were pared down to 51 participants coming from a wide range of countries, including Cambodia, India, Indonesia, Myanmar, Pakistan, Philippines, Argentina, Brazil, Guatemala, Honduras, Mexico, Nicaragua, Venezuela, Democratic Republic of Congo, Kenya, Nigeria, Uganda, Egypt, Turkey, Bosnia Herzegovina and Macedonia, with six self-funded participants from Serbia, Canada, Germany, Sweden and the US.
We also had a great group of 18 facilitators, who came from organisations such as SAFE, Protection International and Donestech (as well as APC and Tactical Tech); add the logistics team and some visitors, and we were about 80 in total.
Tracks, skillshares, hands-on sessions, and a hackerspace
The mornings were mostly organised along two tracks: a Digital Security Training Skills track (for those who already had some tech background but who wanted to hone their training skills), and a Privacy Advocacy track, which looked at issues like mass and targeted surveillance, managing digital shadows and online identities and tackling tech-related violence.
Afternoons were reserved for hands-on sessions (ie, learning specific tools) and skillshares run by participants, including sessions on wikis and digital libraries, self-doxing, interviewing survivors of violence, feminist servers, self care, self-defence, VPNs, regional discussion groups, and others.
Movies, conversation, tech sharing, and making houses out of biscuits
After dinner the evening programme kicked in, including lots of self-organised, participant-driven sessions: movies, discussion groups, stenciling, board games, card games, creating a 'herstory' exhibition, gingerbread-house-making... as well as bar shifts at our makeshift bar 'Gabi's' for the night owls, complete with impromptu dancing and the occasional outbreak of balloon-volleyball.
Evenings were also when the self-organised and popular hackerspace got going, which became the go-to place to gain knowledge and share skills around practical tech stuff in a chilled-out atmosphere.
And because a week is never complete without some loud group singing, on Sunday night we put some fairy-lights around the piano, set up the guitars and speakers and projectors and enjoyed some exclusive one-night-only performances. Top acts included a piano song, a poetry reading, music-less karaoke, various guitar jams (with or without improvised rap), and of course the unforgettable 'Left-Handed-Declaration of Human Lefts'.
And suddenly it was Monday
While everyone was no doubt ready for some rest and quiet by the end of the week, those feelings were mixed with sad goodbyes. From our side, we learned a lot and hope that those of you who were there did too. Big thanks to our collaborators APC and to all our facilitators and to everyone who traveled halfway across the world to join the event; we're excited to see new partnerships emerge.
Thanks also to everyone who applied - the selection process involved some tough decisions. We are, however, currently working on supporting and developing similar, more regional events in other countries, so there will hopefully be more opportunities in future.
We're working toward releasing an edited version of the event documentation later in the year.
And if you have particular questions or suggestions around this new area of exploration at Tactical Tech, please contact alexandra[at]tacticaltech.org.
“There is something about the internet that isn’t working anymore,” is the line that opens filmmaker Jonathan Minard’s short documentary on Deep Lab—a group of women hackers, artists, and theorists who gathered at Carnegie Mellon University in December to answer the question of what, exactly, that disquieting “something” is. The film premieres on Motherboard today.
What Deep Lab represents is just as hard to pin down as the “something” invoked in the opening minutes of Minard’s short film. Is it a book, a lecture series, or Minard’s documentary—all of which were put together in under a month? Is it an ethos? Is it feminist? Is Deep Lab a charrette, a dugnad, or a “congress,” as its participants called it?
It’s hard to say what Deep Lab is in part because of its scattershot nature, both in terms of its products and its focus. The Deep Lab book—available for free online—is a 242-page collection of essays, fragments, and reflections on everything from encryption to cyberfeminism penned by a dozen different authors with divergent interests.
Deep Lab’s interdisciplinary approach is perhaps necessary to parse the complicated realities of the post-Snowden age. Since Snowden’s revelations regarding the scope of the US government’s online surveillance program broke in 2013, it seems as though the internet has taken on a new, dark, and confusing identity.
Larger-than-life interests in the form of corporate and governmental surveillance are now at play in our daily interactions on the internet, and interpreting those outsized realities so we can understand them is no small challenge.
“As an artist, I want to reinterpret culture in a way that society can parse.” said Addie Wagenknecht, the multimedia artist who organized Deep Lab during her ongoing fellowship at the STUDIO for Creative Inquiry at Carnegie Mellon. “You take these big events and try to encapsulate them in a way that you can present them concisely and quickly so that it’s defined for people who experience that piece or exhibition.”
A chapter in the book compiled by data artist Ingrid Burrington is comprised of 20 pages listing objects pulled from the Pentagon’s 1033 program—which has supplied military hardware to local police for decades—in plain black text. After four solid pages of “5.56 MILLIMETRE RIFLE,” it becomes clear that Deep Lab is not only artistically compelling and tantalizingly oblique in how it approaches issues of life and death, but deadly serious.
According to Wagenknecht, Deep Lab is also a medium for women to do more than just participate in digital culture—the tech world has been notoriously resistant to opening its ranks to women—but to interpret and define it, and to share and create tools and techniques for survival within it.
“Maybe for women, we’re more aware of protecting ourselves online because it’s always been a social problem,” Wagenknecht told me. “Think of contacting friends before you leave a party late at night so people can make sure you got home safe—men maybe don’t think about that and women always do. And it’s those same roles on the web. How do you protect yourself from a hack or doxing? The power shifts to the person with more knowledge.”
Deep Lab member Ingrid Burrington. Screengrab: Deep Lab.
Deep Lab member Harlo Holmes, who works as the head of metadata for the Guardian Project, designed a system for victims of cyber bullying on Twitter to easily and painlessly map the digital connections between harassers called Foxy Doxxing.
There were also men present at Deep Lab, including Minard, though they weren’t collaborators per se. Multimedia artist Golan Levin is the director of STUDIO, where Deep Lab congregated. Playing host to Deep Lab, Levin—along with Wagenknecht, who was the group’s chief mastermind and organizer—was part of Deep Lab’s development from the very beginning.
“I’m enormously proud,” Levin said. “You’re looking at a book, a documentary, and a lecture series that was put together by a dozen people in a month. I think they’re side-effects of what Deep Lab actually was.”
So, to return to the question that started this article—what is Deep Lab?—Levin provided his own answer: “It’s punk.”
But even more than punk—more than a book, a documentary, a gathering, or a lecture series—Deep Lab is a beginning, according to Allison Burtch, a resident at the Brooklyn-based Eyebeam Art and Technology Center and Deep Lab member.
Addie Wagenknecht, Harlo Holmes, and two other Deep Lab members at work. Screengrab: Deep Lab.
“I don’t think Deep Lab has ended; it was the beginning of a camaraderie,” Burtch said. “Yeah, we did this thing and did some talks, but it’s not ending. This is the beginning of different affiliations with people. It was awesome. “
According to Wagenknecht, a Deep Lab lecture series is planned for later in 2015, and will take place at venues in New York City. Until then, we have a book, several lectures, and a documentary to contemplate what Deep Lab is, and what it all means.