Friday, 26 October 2012

Power, Virtual networks and Privacy



Danah Boyd’s paper was specifically engaging for me because she focuses on the all important distinction between privacy and publicity. This issue is complex and is starting to become an extremely important one, as surveillance and monitoring technologies are fast beginning to develop in line with the expansiveness of the internet (thanks in no little part to the industrial surveillance complex). 

However, I’ll begin with the more subtle notions of privacy she raises first. She cites Helen Nissenbaum, who coined the term ‘contextual integrity’ as a way in which people effectively manage privacy. The networks that a person maintains in one context, doesn’t mean they wish to maintain the same networks in a different context. Dismantling contextual integrity (or rather, establishing links between the contacts of a person who don’t know each other) without permission is experienced as a violation of privacy.

Boyd also contests the traditional notion of ‘public’ and ‘private’ as a binary. To do away with this notion, she introduces the concept of trust in relation to privacy. She argues that it isn’t just people we hold accountable with the information we impart to them, we also hold the architecture of our networks accountable (the idea that there may be others listening in). This is where the serious issue of online privacy comes into play, because unlike a cafe where someone may or may not be listening in to your conversation, the internet is characterised by the persistence, searchability, replicability and scalability of the information you disseminate. Her argument is essentially one of security through obscurity – a very powerful argument indeed. 

Boyd argues that privacy is fundamentally about having control over how information flows. It is however, a very problematic area. Civil and digital rights group will champion the privacy rights of citizens in the country, yet are always (rather paradoxically) simultaneously arguing for freedom of speech rights and transparency as well. Why is it that the abstract notion of ‘citizens’ have a right to privacy, but the famous, or institutions and governmental organisations do not? Furthermore, doesn’t controlling the flow of information constitute censorship? How do the two (privacy and censorship) differ?

These questions became particularly salient to me after Alan Jones’ remarks (made privately at a public liberal party convention) about Julia Gillard’s father ‘dying of shame’ was leaked to a national newspaper. Alan Jones consequently received a significant backlash, particularly from an online Facebook group which successfully campaigned to stop advertising on 2GB. In this context, is it not hypocritical to argue that ‘Alan Jones had it coming’ but at the same time champion the rights of abstract citizens (of whom Alan Jones [despite the fact that I don’t think he’d pass the citizenship tests migrants are forced to take] would be considered one)?

Boyd in this situation would seemingly have a problem with Alan Jones’ comments being publicised as it constitutes a clear breach of privacy. As she states: “Just because something is publicly accessible does not mean that people want it to be publicised”. I’d like to contest this by making my own statement: Just because people don’t want something to be publicized, doesn’t mean it shouldn’t be publicized.

Boyd seems to be assuming here that the main perpetrator of publicisation are technology companies, she seems to miss the fact, that publicisation is occurring because people want to know – and publicity on the internet occurs as a direct result of online public interaction. Is this not precisely what we mean by ‘the public interest’ (as opposed to the paparazzi (which Boyd refers to a lot in her article) who dictate public interest)?

The very fact that some people are more public than others endows them in a position of privilege and power – it seems to me that publicisation is a convenient and emergent balancing mechanism to counteract the hierarchical structure that publicity entails. I would go so far as to argue that it is a fundamental property of the internet as a communicative medium. To try and limit the publicisation of information in this sense, would amount to the precise definition of censorship (and all its associated negative connotations). It is either a matter of censoring the information of precisely those within the network who are gaining positions of power, or allowing everyone to adjust to increased publicity (which Boyd concedes is what happens when people are faced with such changes).

Protecting the privacy of figures like Alan Jones, or Miley Cyrus (whom Boyd uses as an example in the article) seems to me to be precisely what we shouldn’t be doing. Holding such central positions within a network where such figures can be incredibly influential (like inciting racial hatred for the Jones, or setting a bad role model for young female children for Cyrus ) entails the responsibility to be scrutinized publicly at such a high level. It’s interesting to note here that both these figures have used traditional media to establish their fame, and both have suffered as a result of new media technologies. Arguably, public figures of the future will be much better informed about how they carry themselves privately, and the internet will be a place (given the absence of strict privacy/censorship laws that protect the privileged) where there will be many more pseudo-famous people who haven’t forged their positions of power through autocratic and asymmetrical communication mediums as today’s superstars have done.

Boyd asks a very important question however. She asks whose voice counts in a world where information is increasingly publicised. I can’t help but feel Boyd takes a terrible approach here. She argues that marginalized people (she cites stories of immigrants and Domestic Abuse victims) shouldn’t be expected to fight for their right to speak. She argues that most marginalised people aren’t comfortable speaking up in public nor are they likely to be heard. Yet isn’t this precisely the problem? Boyd seems to insinuate that censoring the stories and discourses of marginalised people will help insulate them from the consequences of public scrutiny, yet isn’t this the same exclusionary approach that causes these people to be marginalised in the first place? The solution to making marginalised people feel more comfortable in the public sphere is to propel them into to the public where they have to engage in discourse, not the opposite. Remaining comfortably marginalised only serves to reinforce the privilege of those in power.

Essentially, I think Boyd’s concept of privacy through obscurity is an excellent one, because it ensures a system where those who are most marginalised in a network are also the ones who are least scrutinized. In fact, I would go so far as to argue for a Right to Obscurity. The more isolated a person is within a network, the greater their right to remain private should be. This is why the rise of surveillance technologies and their adoption by secret services around the world post an extremely serious threat to those who are most vulnerable in society. It allows powerful, opaque and closed networks to reverse this process of privacy through obscurity and create a mechanism of public self-censorship (Foucault’s Panotopicism). Relevantly, networks like ASIO are already proposing large scale surveillance powers be handed to them. Senator Ludlam raises an inquiry as to why ASIO require such powers:



Heretofore (with possibly the exception of Castells), the social networking literature I have come across predominately analyses how networks form and function effectively. Christakis and Fowler in particular see social networks in a very positive light, and focus on the importance of becoming ‘connected’.

What I’d like to do here is to visit the views of a thinker who analyses how networks actively exclude and come undone. He takes a very different approach to understanding networks. I’ll allow my favourite rapper Robert Foster to lead us in before I take a deeper look into the theories of our guest thinker:





Julian Assange’s views borrow from recent work on network theory, emergent systems and work on self-synchronizing systems. He, however, for the purposes of his role, characterises networks – specifically closed networks that hold a certain level of power, as conspiracies.

He argues that individuals within a network are acting in concert, whether by plan or not, and the secrecy ensures that the benefits of the network accrue to those inside the network and not outside it. Here, we can see individual actors who exercise trust in their contacts with information that is valuable when it is withheld from the public. Assange ascribes the concept of ‘weight’ to an information flow; the more valuable the information flow between a dyad, the more ‘weight’ it can be considered to have. Assange explains:

“The ‘importance’ of communication passing through a link is difficult to evaluate apriori, since its true value depends on the outcome of the conspiracy. ...The weight of a link is proportional to the amount of important communication flowing across it.”

Furthermore, Assange characterises these closed networks as being able to outthink the same group of individuals acting alone – he characterises conspiracies as an entity with emergent properties (an argument which is also made by Christakis and Fowler).

In a certain sense closed networks are ubiquitous. The problem occurs when they become extremely powerful, because whatever the intentions of the individuals within the network, the network itself is optimized for its own success, and not for the benefit of those outside of the network. Given a networks position of power and privilege, it functions to the detriment of much more marginalised closed networks by virtue of its exclusionary nature. I alluded to the idea that people in Castells ‘fourth world’ could be characterised as a part of small, individuated social networks in an earlier post. These small isolated networks are disconnected from powerful conspiracies which work to exclude and keep such individuated social networks at bay, only interacting with them in a way that reinforces the network’s power and privilege.
Actors that don’t benefit their network partners in the network will eventually be expelled from the system as their network partners will minimize contact. Those collaborating with conspirators will form stronger ties and will benefit from the information that participation in the network delivers. This holds even at the edges of the network. Reporters with sources or contacts within a conspiracy (thus conspirators themselves) that violate the trust of their network partners will be cut off from the network and will thus not receive vital scoops to report on.

Assange outlines several ways of dismantling a conspiracy. 

·         Separating Weighted Conspiracies - Assange makes the rather intriguing point, that targeting the most influential conspirators (the most central) is ineffective. Rather, targeting the bridges of such conspiracies (a topological feature of a network where a few connections connect larger more centralised sections of a network) is much more effective as such a division significantly undermines the emergent cognitive faculties of a conspiracy.

·         Throttling Weighted Conspiracies – Throttling involves constricting the information flow high weight links bridging centralises parts of a conspiracy together.

·         Attacking Conspiratorial Cognitive Ability – this approach involves deceiving or blinding a conspiracy through distortion or restricting the information fed to it.


Assange in fact uses the connected graph models of mathematicians hired by the U.S. to look at terrorist conspiracies to inform a lot of his theory about how existing conspiracies are used to maintain authoritarian power structures. Of course, unlike targeted suicide bombings, or CIA drone strikes, Assange uses leaks as a means to dismantle dominant conspiracies. Interestingly, Wikileak’s means to attaining information from its source is done though an anonymous electronic drop box system, no doubt an important technical mechanism specifically designed to keep Wikileaks apart from the conspiracies with whose information they deal with. This is specifically why in terms of Journalism, the arrival of Wikileaks has been so revolutionary – Wikileaks as an editorial organisation can publish materials according to their own criteria with complete impartiality – a liberty that other journalistic organisations (who often conspire with powerful conspiracies for their sources) do not have.

I thought Assange was a particularly noteworthy thinker for analysing privacy/secrecy and its relation to power, not only because of the appropriateness of his theories, but also because his work with Wikileaks really does attest to the role that social networks have in instigating changes that ripple throughout the world and cause societal change.
I’d like to finish off this post with an additional video that examines the role of the internet in analysing the political agency of youth and how autocratic regimes are making use of the internet to serve their own ends. It is critical of the optimism commonly portrayed by technocratic internet activists:

 



References

Boyd, D. 2010, 'Making Sense of Privacy and Publicity', paper presented to the SXSW, Austin, Texas, March 13, 2010. http://www.danah.org/papers/talks/2010/SXSW2010.html

Assange, J. 2006, ‘Conspiracy as Governance’, Cryptome, 3 December, viewed 18 October 2012, <http://cryptome.org/0002/ja-conspiracies.pdf>

No comments:

Post a Comment