Welcome to a techno-disobedient etherpad sheet!
This pad is only reachable locally within the range of the shared portable server. 

To prevent this pad to appear in the 'etherdump' list of pads, you can add the word __NOPUBLISH__ anywhere in the text.

This pad installation includes a system to mark pads to include specific keywords, 'snowpoles'. When ++SNOWPOLES++ are used, pads will be included to an aggregator for future re-editing or publishing: https://circulations.constantvzw.org/aggregations  

 +++++
'Snowfields' can be used to mark sections of a pad so that they will appear as edited sections in future pubblications
The text inside the edited section can be written in Markdown syntax:
https://www.markdownguide.org/cheat-sheet/
+++++
[Morning 05/07/23 ]
After a first round of sharing ideas, connections..
http://disobedient.local/images/.indexalist/f/20230605_142934.jpg/thumb.jpg

a group
radio obstruction / radio waves

bluetooth / wifi /fm

legal implications
technical limits
deliberateness
messiness

deliberation
english-language-implications

thought-experiment

how-to-teleport!

time-stamps

agency tools
blockchain

border 
migration
displacement

hacking-the-weather
pirate-radio-performance
hacking-as-a-mode-of-though

untrustrable-iinformation
how-to-divert-police
counter-cartography



another group!

stone-thrown
hardware

new words

secret-gay-language

biometrics

para-communications
interactions

recognizing the pattern
bling!

hard-to-decode
electric-language
speculaive systems

stones from banks
resources!

decypher
cross-crossing

what humans are
observations

minerals
electric language

no communication
cross-dressing

human computer surveilance

and another group again

labour of uber drivers
daily experience

available/non-available
language-devices

recognition-patterns
freedom-autonomy

spatial data
how do we actually act in disobedience?
and who does want that?

technical destruction
false expertise to cover stuff
bullshitting!

and lastly

from memory
moss
lima bean
atelier paysans
guy van belle 
how do we hack the earth
who is recruiting
how to become a farmer
rabbit sabotage
time stamp
clog
slow down tele-work
blocking flows
no form of life is illegal
poppies
stable 
corrupt pdf
activation from shock
how to hack the aristocracy

-- -----

Afternoon 05/07/23
hans' presentation

++ civil disobedience ++
>coming from Thoreau, acting against slavery, proposing refusing to pay taxes
>disobedience in face of law. 
From Liberal theory to collective action

++CONFLICT-OF-NORMS++
"conflict of norms"
> Playing with the legal system
using citizens arrest to the extreme, but you have to identify oneself

example of breaking into military base
prosecution was stopped because too big of a question ( are nuclear weapons allowed by international law?) 

example: blocking trains that bring to the port where weapons are sent around the world.
that time they were condemned as the prosecution skipped the question of 'conflict of norms' (whether it was legal to move weapons to the port to export them to countries where it's not allowed by law)

action:prosecuting the government, when they dont act according to their own laws.

work: where are the belgian weapons going? located by images around the world

instead of violating laws, you hold them up, diffrent typy of disobedience

+++++
At this point it's not civil disobedience any more, but it is still a conflict of norms. 
+++++

+++++
how to build a collective actor ?
+++++

a series of technologies have been employed but tools that were not disobedient in themselves
in the 90s that meant from websites and mailing lists, to making own server collectives to run those systems..

now to mobilize you use platforms that have less autonomy ( social media )

development from independ an t platforms to soc ial media ... communication of a ctivists is taken over by companies 

literature:
 Tweets and tje streets . paolo Gerbado
 Twitter and tear gass - zeynep tufekci
 
that space has been taken over by comercial players, inspired by the activitst of 10 years before.. twitter is inspired by a networks of SMS used in protests some years before..

poppy: first to enter a space of reshuffled terrain but then bigger plants take over..

full surveillance is to be expected when doing certain actions, so some techniques/methods to support disobedience are necessary:
    encryption, covert communication channels...

technique is also changing methods and  coordinating to switch between strategies according to necessity.
Example : distributed swarm technique, organize separately.. "first time we all met together was in jail..."

investigative researches to locate weapon or trains, is searching for traces on the internet, monitoring online data fluxes
some of the intelligence work moved to home.

.. the technologies not really disobedient in them selves

making a parody website as a strategy, court said itwas to realistic to be parody

lot happening in /as struggles for control..

Resistant Protocols: https://gwern.net/doc/technology/2018-07-25-johnbackus-howdecentralizationevolves.html

Tactic, leftovers and Cost-of-Living
Mayday Rooms -London
https://maydayrooms.org/

social movement groups in the building
pan african cinema
state watch
unions
history of campaigns
collective work on re-writing histories

movements out of vouge ^^

++ archiving as collective work ++
scanathon
bring archives to struggle

connecting...
trade unions picketing
housing struggles in london
brixton anti-gentrification struggle
material is part of political organising

leftovers catalog, built with pandora a video archiving system made for video now for texts
example: pad.ma
link to leftovers -->> https://leftove.rs/  

first made wtih memory of the world, shadowlibrary dubious legal status
a way to call a pirate library something else
https://library.memoryoftheworld.org

mass of materials to makz sznce

not meant to be kept material
19000 documents!some scanned some scraped some got from other collectives..

all material in the archive is OCR'd 
metadata is added in particular way,
some extracted from the text, starting from the text

then organized in various ways.. for example as "Tactics"

list of tactics as tags
autoreduction
occupation
rent strike
fare dodging
proletarian shopping\

when you would be organizing you might go and look up previous questions and approaches on same mode of action..
london tenant union - rent strike

resource rather then repository
glasgow housing struggle archives
tactics:
proletarian shopping
fare-dodging
autoreduction

faredodgers liberation front
making stickers as
'not ticket zone' 
'cant pay! wont pay!' (or 'can pay' ?)
'destroy this machine!!'

re-naming as language strategy ?

tactics coming back in rent strikes and energy strikes, DONT PAY 

history of autoredction done with the dontpay collective..

tactics is not enough, strategy is needed (too)...
dos qttck search resulted in 2 queries, digital tactics can be added
no question of copyright, dissemination and recirculation is more the focus

--
anne laure buisson

data activist and obedient

++ complience is work ++
encoding working with data flows is crucial / longitude , lattide don't mix them up :-/
plenty of human bad choices,

gdpr, no one understand really the rules, everyone is paranoid of doing it wrong..
if you want to work with the data of a certain organization, you will look for a human that cares for that data..

+++++
what is inside the data?
data should be described but .....
answer: standard iz e t h e dat a flow
+++++

easier

INAMI national health insurance
nomenclature is big, fields, tables, organisation of work described .. in datamodel that should be followdd by doctors, insurance, health practitioners
the protocol is 30 yrs old

+++++
++Standardization++
to make data obedient to the standard is to respect international norms
+++++

bim prpooses a set of standard to descrbied every building every object in the city
to then make possible 'digital twins' model of the city that can be run and teste f rchanges..

datamesh is the new hype

+++++
there is poetry in good nomenclature 
describing every physical movement or object..
what is a house, is a one door room from a two doored? description is poetic and activist
tentation is to immobiliereality
you need to normalize the process of normalization.. looping
+++++

https://www.openmobilityfoundation.org/about-mds/
https://gtfs.org/resources/

+++++

Anne-Laure's presentation was interestingly showing the internal conflict of a data-scientist between wanting to have 'clean' data 
+++++

Afternoon discussion / questions 

How do you synchronize ?
Hans action prep
keep things hidden: no digital stuff, no email; no phone, but people weren't disciplined enough so it was really hard
With a small group you can use encryption. Signal seems secure.
security is all very relative.

taking batteries out and put them on the fridge, but half the people were actually police. 
PHONE  in fridge doesn't work. -> not a joke, also not in the microwave.

A ritual of collective security where u cannot trust who is sitting with you.
Creating a certaing awareness of your phone.
However you think of it, the ritual in itself could have relevance. 

you work assuming there is infiltrators, too.. you just work in a way where it matters less

security is relative....

What is a good tactic though? how can we share these things? 
It is easier when you are in the same physical space as the other individuals, but can we make it more shareable??
Trust

if you were living in a country which suddenly flipped from being democratic to a right wing country overnight, How would you react in terms of your digital presence?

if u see it coming u can prepare
people/institutions start leaking when there is something happening that they do not want.
ADMIN departments will start making things impossibile  when the right wing flemish block wins politically.

Digital vlanderen -> now u can have a e-box with your personal data. When u try to rent a flat u can give landlords access to this e-box that contains: payslips, diploma's, official documents----> you won't be able to create a fake anymoree
you can't hide anymore / make a fake payslips
main reason for this measure is the defence of privacy

flemish community has introduced solid a web protocol.. https://overheid.vlaanderen.be/digitaal-vlaanderen/ontdek-onze-producten-en-diensten/solid-ecosysteem    + https://solidlab.be/
https://www.vlaanderen.be/digitaal-vlaanderen/athumi-het-vlaams-datanutsbedrijf/europas-eerste-bedrijfsklare-solid-platform/privacy-by-design

How to highlight moments when digital/technological decisions are taken on behalf of governments

Creative nomenclature
criminal complicity- asbl asking for 1euro and then u become part if the whole thing --> sharing responsibility, collective action...

Rosemary: working class records of protest: either in court records or poetry :)

Metadata
People love scanning - more than putting in metadata 

open data (Belgian site): https://finance.belgium.be/en/experts-partners/open-data-patrimony/legislative-framework/psi

data analysts are critical on the quality of the data

but not a very political field, most people do work from IT, less political

public servants in the city offices are more aware and want things that align with citizen / public positions in the city

+++++
people will leak data if they feel som e thing is wrong 
if they agree with for example tracking migrants they will not leak information out
technical capacities are not an imp o rtant factor with the leaking aspect, it is the political aspect that has more priority
+++++

people working in the railways, the harbour for example are not people who signed up for the army, but they are directly involved in the core of the military/political agenda of the country SOOO they are the ones who leak when possible.

there are also leaks coming from inside the military, maybe conscripts, or anyway not in high positions

https://nimon.org/en