Welcome to a techno-disobedient etherpad sheet!
This pad is only reachable locally within the range of the shared portable server.
To prevent this pad to appear in the 'etherdump' list of pads, you can add the word __NOPUBLISH__ anywhere in the text.
This pad installation includes a system to mark pads to include specific keywords, 'snowpoles'. When ++SNOWPOLES++ are used, pads will be included to an aggregator for future re-editing or publishing:
https://circulations.constantvzw.org/aggregations
+++++
'Snowfields' can be used to mark sections of a pad so that they will appear as edited sections in future pubblications
The text inside the edited section can be written in Markdown syntax:
https://www.markdownguide.org/cheat-sheet/
+++++
[Morning
05/07/23
]
After a first round of sharing ideas, connections..
http://disobedient.local/images/.indexalist/f/20230605_142934.jpg/thumb.jpg
a group
radio obstruction / radio waves
bluetooth / wifi /fm
legal implications
technical limits
deliberateness
messiness
deliberation
english-language-implications
thought-experiment
how-to-teleport!
time-stamps
agency tools
blockchain
border
migration
displacement
hacking-the-weather
pirate-radio-performance
hacking-as-a-mode-of-though
untrustrable-iinformation
how-to-divert-police
counter-cartography
another group!
stone-thrown
hardware
new words
secret-gay-language
biometrics
para-communications
interactions
recognizing the pattern
bling!
hard-to-decode
electric-language
speculaive systems
stones from banks
resources!
decypher
cross-crossing
what humans are
observations
minerals
electric language
no communication
cross-dressing
human computer surveilance
and another group again
labour of uber drivers
daily experience
available/non-available
language-devices
recognition-patterns
freedom-autonomy
spatial data
how do we actually act in disobedience?
and who does want that?
technical destruction
false expertise to cover stuff
bullshitting!
and lastly
from memory
moss
lima bean
atelier paysans
guy van belle
how do we hack the earth
who is recruiting
how to become a farmer
rabbit sabotage
time stamp
clog
slow down tele-work
blocking flows
no form of life is illegal
poppies
stable
corrupt pdf
activation from shock
how to hack the aristocracy
--
-----
Afternoon 05/07/23
hans' presentation
++
civil disobedience
++
>coming from Thoreau, acting against slavery, proposing refusing to pay taxes
>disobedience in face of law.
From Liberal theory to collective action
++CONFLICT-OF-NORMS++
"conflict of norms"
-
-- Example: On a national level having non-racist laws but on state-level racist laws still in action
-
Example:
blocking factory and calling the law to act when laws are broken..
> Playing with the legal system
using citizens arrest to the extreme, but you have to identify oneself
-
Vredesactie (peace organisation) -
campaign against nuclear weapons
example of breaking into military base
prosecution was stopped because too big of a question ( are nuclear weapons allowed by international law?)
example: blocking trains that bring to the port where weapons are sent around the world.
that time they were condemned as the prosecution skipped the question of 'conflict of norms' (whether it was legal to move weapons to the port to export them to countries where it's not allowed by law)
action:prosecuting the government, when they dont act according to their own laws.
work: where are the belgian weapons going? located by images around the world
instead of violating laws, you hold them up, diffrent typy of disobedience
+++++
At this point it's not civil disobedience any more, but it is still a conflict of norms.
+++++
+++++
how to build a collective actor ?
+++++
a series of technologies have been employed but tools that were not disobedient in themselves
in the 90s that meant from websites and mailing lists, to making own server collectives to run those systems..
now to mobilize you use platforms that have less autonomy ( social media )
development from independ
an
t platforms to soc
ial
media ... communication of
a
ctivists is taken over by companies
literature:
Tweets and tje streets . paolo Gerbado
Twitter and tear gass - zeynep tufekci
that space has been taken over by comercial players, inspired by the activitst of 10 years before.. twitter
is
inspired by a networks of SMS used in protests some years before..
poppy: first to enter a space of reshuffled terrain but then bigger plants take over..
full surveillance is to be expected when doing certain actions, so some techniques/methods to support disobedience are necessary:
encryption, covert communication channels...
technique is also changing methods and coordinating to switch between strategies according to necessity.
Example : distributed swarm technique, organize separately.. "first time we all met together was in jail..."
investigative researches to locate weapon or trains, is searching for traces on the internet, monitoring online data fluxes
some of the intelligence work moved to home.
.. the technologies not really disobedient in them selves
making a parody website as a strategy, court said itwas to realistic to be parody
lot happening in /as struggles for control..
Resistant Protocols:
https://gwern.net/doc/technology/2018-07-25-johnbackus-howdecentralizationevolves.html
Tactic, leftovers and Cost-of-Living
Mayday Rooms -London
https://maydayrooms.org/
social movement groups in the building
pan african cinema
state watch
unions
history of campaigns
collective work on re-writing histories
movements out of vouge ^^
++
archiving as collective work
++
scanathon
bring archives to struggle
connecting...
trade unions picketing
housing struggles in london
brixton anti-gentrification struggle
material is part of political organising
leftovers catalog, built with pandora a
video archiving
system made for video now for texts
example: pad.ma
link
to leftovers
-->>
https://leftove.rs/
first made wtih
memory of the world, shadowlibrary dubious legal status
a way to call a pirate library something else
https://library.memoryoftheworld.org
mass of materials to makz sznce
not meant to be kept material
19000 documents!some scanned some scraped some got from other collectives..
all material in the archive is OCR'd
metadata is added in particular way,
some extracted from the text, starting from the text
then organized in various ways.. for example as "Tactics"
list of tactics as tags
autoreduction
occupation
rent strike
fare dodging
proletarian shopping\
when you would be organizing you might go and look up previous questions and approaches on same mode of action..
london tenant union - rent strike
resource rather then repository
glasgow housing struggle archives
tactics:
proletarian shopping
fare-dodging
autoreduction
faredodgers liberation front
making stickers as
'not ticket zone'
'cant pay! wont pay!'
(or 'can pay' ?)
'destroy this machine!!'
re-naming as language strategy ?
tactics coming back in rent strikes and energy strikes, DONT PAY
history of autoredction done with the dontpay collective..
tactics is not enough, strategy is needed (too)...
dos qttck search resulted in 2 queries, digital tactics can be added
no question of copyright, dissemination and recirculation is more the focus
--
anne laure buisson
data activist and obedient
++
complience is work
++
encoding working with data flows is crucial / longitude , lattide don't mix them up :-/
plenty of human bad choices,
gdpr, no one understand really the rules, everyone is paranoid of doing it wrong..
if you want to work with the data of a certain organization, you will look for a human that cares for that data..
+++++
what
is inside the data?
data should be described but .....
answer: standard
iz
e t
h
e dat
a
flow
+++++
easier
INAMI national health insurance
nomenclature is big, fields, tables, organisation of work described .. in datamodel that should be followdd by doctors, insurance, health practitioners
the protocol is 30 yrs old
+++++
++Standardization++
to make data obedient to the standard is to respect international norms
+++++
bim prpooses a set of standard to descrbied every building every object in the city
to then make possible 'digital twins' model of the city that can be run and teste f rchanges..
datamesh is the new hype
+++++
there is poetry in good nomenclature
describing every physical movement or object..
what is a house, is a one door room from a two doored? description is poetic and activist
tentation is to immobiliereality
you need to normalize the process of normalization.. looping
+++++
https://www.openmobilityfoundation.org/about-mds/
https://gtfs.org/resources/
+++++
Anne-Laure's presentation was interestingly showing the internal conflict of a data-scientist between wanting to have 'clean' data
+++++
Afternoon discussion / questions
How do you synchronize ?
Hans action prep
keep things hidden: no digital stuff, no email; no phone, but people weren't disciplined enough so it was really hard
With a small group you can use encryption. Signal seems secure.
security is all very relative.
taking batteries out and put them on the fridge, but half the people were actually police.
PHONE in fridge doesn't work. -> not a joke, also not in the microwave.
A ritual of collective security where u cannot trust who is sitting with you.
Creating a certaing awareness of your phone.
However you think of it, the ritual in itself could have relevance.
you work assuming there is infiltrators, too.. you just work in a way where it matters less
security is relative....
What is a good tactic though? how can we share these things?
It is easier when you are in the same physical space as the other individuals, but can we make it more shareable??
Trust
if you were living in a country which suddenly flipped from being democratic to a right wing country overnight, How would you react in terms of your digital presence?
if u see it coming u can prepare
people/institutions start leaking when there is something happening that they do not want.
ADMIN departments will start making things impossibile when the right wing flemish block wins politically.
Digital vlanderen -> now u can have a e-box with your personal data. When u try to rent a flat u can give landlords access to this e-box that contains: payslips, diploma's, official documents----> you won't be able to create a fake anymoree
you can't hide anymore / make a fake payslips
main reason for this measure is the defence of privacy
flemish community has introduced solid a web protocol..
https://overheid.vlaanderen.be/digitaal-vlaanderen/ontdek-onze-producten-en-diensten/solid-ecosysteem
+
https://solidlab.be/
https://www.vlaanderen.be/digitaal-vlaanderen/athumi-het-vlaams-datanutsbedrijf/europas-eerste-bedrijfsklare-solid-platform/privacy-by-design
How to highlight moments when digital/technological decisions are taken on behalf of governments
Creative nomenclature
criminal complicity- asbl asking for 1euro and then u become part if the whole thing --> sharing responsibility, collective action...
Rosemary: working class records of protest: either in court records or poetry :)
Metadata
People love scanning - more than
putting in
metadata
open data (Belgian site):
https://finance.belgium.be/en/experts-partners/open-data-patrimony/legislative-framework/psi
data analysts are critical on the quality of the data
but not a very political field, most people do work from IT, less political
public servants in the city offices are more aware and want things that align with citizen / public positions in the city
+++++
people will leak data if they feel som
e
thing is wrong
if they agree with
for example
tracking migrants they
will not leak information out
technical capacities
are not an imp
o
rtant factor with the leaking aspect,
it is the political aspect that has more priority
+++++
people working in the railways, the harbour for example are not people who signed up for the army, but they are directly involved in the core of the military/political agenda of the country SOOO they are the ones who leak when possible.
there are also leaks coming from inside the military, maybe conscripts, or anyway not in high positions
https://nimon.org/en