Infra­struc­turalInter­actions

Contents

Infrastructural Interactions

Methods (or not) for Infrastructural Interactions

Research refrains


Appendix

Infra­struc­tural Inter­actions

Infrastructural Interactions: Survival, Resistance and Radical Care

Cristina: Even if the infrastructure fails, there's all this imagery around it that connects to progress, ideas of progress, and ideas of modernity and that has a lot of rhetorical power. I think thinking about other ways politics or other ways of interacting with, of building an image around infrastructures is really valuable, actually. At least, for me, the most convincing that I've encountered, I don't know.
Clareese: Definitely, yes. I do agree too. Infrastructure or the idea that it's not going away, so how do you use it and make it useful to the people that it's supposed to act as a container or a boundary around?

In the last years, we've seen an intensification of computational infrastructures necessary to administrate daily life, from ordering basic supplies to managing visitor flows in about any public venue. As a result of recent pandemic conditions, their presence has shifted from optional to essential operations. These infrastructures are networks that both bring together and separate humans and nonhuman entities in present time and space. They administer, organise and make operations possible, rendering everything and everyone into a potential resource for generating data-flows. As presences, they are felt, yet often because of their geographical and technical vastness, their effects are not fully seen or comprehended. This workbook offers ways to make account and hold accountable the complexity of relations that make infrastructures, and ways to understand together how they are causing ruptures, fractures and changes in the conditions for human life, and how public life is held together. Discussing and practicing how making other infrastructures, means both making and destroying existing relations that are permeated by racial capitalism.

Computational infrastructures, made up of cloud and mobile computational infrastructures, are concentrated in the hands of a few companies. They purposefully promote data intensive services running on these infrastructures, rather than pre-packaged and locally run software instances. These data-infrastructures range from health databases, border informatics, data storage warehouses, to city-dashboards for monitoring citizen flows, educational platforms and the optimisation of logistics. Computational infrastructures generate harms and damage beyond ethical issues of privacy, ownership and confidentiality. They displace agencies, funds and knowledge into apps and services and thereby slowly but surely contribute to the depletion of resources for public life. While data-infrastructures capture public data-streams, they also capture imagination for what a public is, and what is in its interest. By interfacing between institutions and their constituents through Software-as-a-Service solutions, they reconfigure the mandate of institutions and narrow their modes of functioning to forms of logistics and optimization. We urgently need other imaginations for how we interface with infrastructures, beyond delivering a “solution” to a “need”. [emergent strategies]

As Big Tech extends into public fields, they tie together services across domains, creating extensive computational infrastructures that require a reshaping of what and how we develop ethical frameworks. These frameworks shift scale from the individual to the public, from data point to infrastructure. So the question is how can we attend to these shifts collectively in order to demand public data infrastructures that can act in the "public interest"? And how can we institute this?

This workbook is made by The Institute for Technology in the Public Interest (TITiPI), a trans-practice gathering of activists, artists, engineers and theorists and features contributions from the instituters and companions that emerged from our work together collectively during 2020 and 2021. An an outcome of a series of conversations, workshops and collective reflections on shifting infrastructural presences. It is not so much the end of a process, but the beginning of further work on together imagining alternatives to their extractive implications; as an embodied fight against the Big Tech takeover through writing, talking, making, tooling and reflecting. The workbook engages with these shifts by considering the importance of attending to radical care, survival and resistance under racial capitalism, non-extractive research, in our work on infrastructures.

On the following pages, you will encounter workshop reflections, prompts, imaginations and practices. This is a workbook that you can use in your collective organising to understand what forms of democratic governance and accountability are mobilised by computational infrastructures and how they could support instead of hollow out public life. There are examples of projects and practices that document what infrastructural interactions are being built by communities, and exercises and workshop plans to imagine together what will need to be built. There are examples of tools and conversations on how collectively we can understand ourselves as publics who can intervene in existing infrastructures, and demand technology in the public interest.

Radical Care

For the last two decades, basic care provisions have been turned into tools for surveillance, excluding and punishing those who needed it most. As public health care nearly collapsed under pandemic pressure, schools closed and movement through public life became increasingly monitored and managed by digital infrastructures, we have been thinking with many other collectives about radical alternatives to the need for care. What kind of solidarity and support can people extend and receive to one another that is outside the scope of the very limits that are being imposed on us, from the voluntary duty of care to not expose one another, to a state supported obligation to function as a subject to capitalism? The fact that the pandemic makes it impossible to organise by coming together physically to resist, triggered many discussions and reflections. When lockdowns have paralyzed a lot of the practical options that common people and ordinary working-class people have for resistance, which would be their bodies and the street, xxx [computational infra seems ‘the way forward’ but ...]

For the conversations and workshops, we brought together people involved in alternative healthcare or other alternative care-structures, for example in the context of anti-fascist activism, with ones rethinking alternative technical infrastructures in terms of capacity and care. Risking of course to turn everything into infrastructure, we felt it was helpful to open up perspectives that point out the worlding qualities of caretaking, maintenance and instituting.

From survival to resistance in racial capitalism

As people who are active on the ground, but also intellectually, what do we imagine in terms of resisting and building alternatives for or to computational infrastructures? What are our lived experiences with infrastructures that demand these alternatives? A question that came up often in our discussions was whether this is a time of survival, or is it time of resistance, and whether the creative imaginaries we are exchanging, are an example of resistance ... or are they actually about just surviving. We were interested in this, because we know that people are employing extractive services and apps, knowing sometimes very well that it's a risk, that by using them, they're actually being surveilled even more, but it is part of taking shelter from the historical time we're in now.

So, in the workshops, conversations and collective writing we have tried to think resistance under racial capitalism and issues around extractivism. What are the material sides of the computational infrastructures that are being almost imposed on us during COVID-19? It seemed these questions where erased from the debate even among critical scholars working on technology, while obviously racial capitalism and extractivism are part of the conversation. This workbook brings attention to the ways in which computational infrastructures extend extractivism, from the mining of rare minerals for smart phones to the extractivist models of cloud-based services and the extension of Big Tech into the markets of care. To do so, we build on a body of literature pointing out the continuing geopolitical make-up of imperial and colonial power in the development of infrastructural technologies. In particular, Ali (2016) argues for a decolonial approach when designing, building or theorizing about computing phenomena and an ethics that especially decentres Eurocentric universals. Chakravartty and Mills (2018) offer to think decolonial computing through the lens of racial capitalism. Robinson ([1983] 2000) argues that mainstream political economy studies of capitalism do not account for the racial character of capitalism or the evolution of capitalism to produce a modern world system dependent on slavery, violence, imperialism and genocide. Capitalism is ‘racial’ in the very fabric of its system (cf. Bhattacharyya (2018)).

This work is embedded in a view that requires continuous undoing – a necessary but unfinished formal dismantling of colonial structures by decolonial resistance. Building on theories of racial capitalism, we focus on the implications of computational infrastructures and their relation with extraction, whilst working on ways to develop a non-extractive research practice.

Non-extractive research practice

Computational infrastructures are typically hard to study (Ruppert 2017, Mukherjee 2020) and we need imaginative and collective methods to trace the long tail of their effects and make them legible (Aouragh et al 2020). In this project and workbook, creative practice and collective organsising is vital to restructure both the way we research and how we understand infrastructural implications. In these conversations and workshops we attended to our companions proposals for socially and technically remaking or resisting infrastructures. These conversations and workshops attended carefully to the shapes that we make for research to happen within and we resisted (where we could) using extractive cloud based infrastructure. Instead the conversations and workshops took place using a patchwork of self-hosted Free, Open Source softwares. The workbook was created using ++ wiki to print. Within the institute we are committed to shaping research differently, and have a sneaky feeling that the possibility of our imaginations of different institutes and infrastrucures are interdependent on the the infrastructures we use to communicate, write, make. So many tools and infrastrucutres for research are extractive, damaging and harmful, how come we so often ignore this part of the relationlity? As Femke once said these tools are so banal people can't even bear to think about how they are shaping their research. So we also try to practice radical care here, to attend to the infrastructures we use and their extractive forces.

For Infrastructural Interactions, we combined creative practice, queer theory, historical materialism, critical computing, together with approaches from infrastructure studies to disclose the harms and damages of data infrastructures. In a series of conversations, we documented stories and experiments of inventive ways to trace and disclose the effects of data infrastructures. Our hope is that through the workbook you will also get to be part of these different groups and networks. To get to know the imaginative ideas, suggestions and experiences, if you will, of the institute and our companions.

Drawing on trans*feminist, queer and anti-colonial perspectives, the research project was an attempt at developing tools for political and creative agency in situations that are perceived as in the public interest, but that are outside of public intervention. We worked with activists, artists and technologists to ask how they are mobilising creative forms of organising and inventive methods to ensure that data can support their practices instead of extracting from it. How are these practices not just responding but also proposing new modes of imagining technology in the public interest? What can creative practice bring to understanding data-infrastructures and their alternatives? And how effective are these creative responses or new infrastructures?

The transcultural and differently situated conversations that fuelled this research, inquired into and documented creative and grassroots approaches for infrastructural interactions that are being built, or will need to be built. They revealed the intricate ways in which power asymmetries by design necessitate us to shift our critical analysis from the received idea that the main problems with digital infrastructures are centered around personal data, privacy and surveillance, to a much more complex perspective that takes the political economy of cloud-based computing into account. The workshops, documentation and structures in this workbook are a small contribution to making this complex paradigm shift together. They can be mobilised by individuals and collectives to make legible harms and damages on public life that result from extractive data-infrastructures such as cloud-based services. To develop an understanding of existing inventive technical practices in which communities are deploying alternative digital infrastructures that support their work, and inquire into how effective these creative responses for alternative digital infrastructures are. The workbook can also be activated to (re-)imagine and prototype technical alternatives, to Software-as-a-Service and agile solutions, that can support public life digital infrastructures.

One of our motivations was very strongly to connect people through the research conversations and workshops. We wanted to start the conversations by asking questions, but also inviting our collaborator's, companions and future instituters to intervene in each other's answers or to frame the discussion with each other. This is also how this workbook it written. The workbook itself was composed together with artists, technologists and activists, specifically groups committed to non-extractivist research practices for and with refugees, anti-racist, trans* health and sex work.

How to use this workbook

[LATER: DESCRIBE EACH CONTRIBUTION]


Arun: The question is how do we keep fighting for the near future? Black Lives Matter is quite a broad open space as a physical concept. The physical concept is very broad. It can mean, the thing that Google puts out saying, we support Black Lives Matter, or it can mean Ruth Gilmore's idea of abolition and ending racial capitalism. It's a massive spectrum. The question is, how do we create organisational infrastructure to make sure it's the second of those and not the first? That seems to be the problem across the board in terms of radical politics.

Miriyam: Yes.
Seda: Now you know why we're called The Institute.
Arun: Yes.
Seda: Nothing more, nothing less.

Arun: Thank you. There you go. I set it out for you nicely, right?

On-line Nowcestor meditation session with Clareese Hill

Methods (or not) for Infra­struc­tural Inter­actions

A-centric workshops

A short description/methods for workshops here

Snippets from the conversations

Infrastructural imaginary

Anita: What is missing in school is a discourse on algorithms, and the politics of the technical; there is no grounding of this in the everyday. It is admitted that tech questions are important but there is no concrete way to engage with it, it is not part of life. The researches that are happening on technology are always treating it as a topic: The Bot, The AI ... it is not part of normal life with technology. The workshops we are organising are grounded in choices we are living in, technologies we are using every day ... this is where connections are made.

Joni: I've never really never prior to conversations with you, Helen, or even really come across the notion of an infrastructural analysis, but it does seem like a really fruitful way to think about it. I think when it comes to anti-fascist politics, it's not actually just the infrastructure of the street that you're working to remove from fascist organising.

Arun: The question is how do we keep fighting for the near future? Black Lives Matter is quite a broad open space as a physical concept. The physical concept is very broad. It can mean, the thing that Google puts out saying, we support Black Lives Matter, or it can mean Ruth Gilmore's idea of abolition and ending racial capitalism. It's a massive spectrum. The question is, how do we create organisational infrastructure to make sure it's the second of those and not the first? That seems to be the problem across the board in terms of radical politics.
Miriyam: Yes.
Seda: Now you know why we're called The Institute.
Arun: Yes.
Seda: Nothing more, nothing less.
Arun: Thank you. There you go. I set it out for you nicely, right?

From survival to resistance in racial capitalism

Arun: For certain communities, just defending your own sociability relationship is itself political. Just to keep either alive and survive is itself political because you have a community politics history that is already there. So in keeping the community alive, you keep that politics alive.

Miryam: Obviously, also a very important theme is resistance. What forms of resistance have people managed to design or come up with or discover? As they say, need is the mother of invention, the father of invention, the grandmother of invention.

Seda: The cousin.

Miryam: The cousin. Everything. It's through needs. Working-class people, it's through need that they come up with. It's not some blueprint thing that some very smart organisation told them to think about making and developing. It's resistance is one of the themes as well. I think these are roughly the themes that we had thought of.

Radical care

Nadia: Yes, radical care is a big question. In the group that I'm following of the families, I think for me the radical care is really in the WhatsApp group of the grandmothers who send each other. One of them sends the other mothers every morning a good morning and she says “bonjour les mamans” every morning and asks the mothers how they are doing. These are all people who haven't seen their children or grandchildren for more than eight years. Who don't know whether they will see them back, who have lost children and grandchildren also in many cases and the kind of daily hope basically of trying to keep hope alive.
Sometimes it comes up, sometimes it goes down, and then they started basic stuff like saying hi to each other every morning and then it's followed by hearts and emoticons and these kinds of things. Emoticons play a very important role in the WhatsApp group. I'm always impressed. It's very stupid but I'm always impressed by the tenacity of it.

Cassandra: The care work or the care activities that are not validated as work, that must go into the reproduction of the capacity to struggle. Which I think is on a theoretical level is really crucial to differentiate it from the reproduction of labor power as a commodity. In terms of the concept of social reproduction, I'm not sure how well it fits to that kind of work, that care work kind of thing. Certainly, there is essential activist practice which forms the field of possibility of this kind of street conflict. This is often the kind of thing which is much more accessible for people who are never going to be able to have the street accessible to them in this way. We aren't struggling on the terrain of our own choosing.

Peripheral politics

A workshop with Helen V. Pritchard and Femke Snelting

"As such, urban politics will largely be a peripheral politics, not only a politics at the periphery, but a politics whose practices must be divested of many of the assumptions that it derived from the primacy of 'the city'.”xxxxx

During this on-line session, we worked for the first time with the eight conversations on infrastructural shifts that TiTiPi had organised with companions in the months before. To attending to the stories that were told and the suprising details that came up through the rhythm of three refrains, was an attempt to listen for the experiences of living with infrastructure but also for other worlds of radical care and different temporalities not defined by Big Tech infrastructure nor by academic methods, worlds that are already here, that are already being practiced.

In this workshop, we tried not to fall for the suggestion of a coding or analysis that might make sense of transcripts from the outside, we listenened together to generate a poetic-theory of infrastructure. We generated an understanding that was feeling into the surges of life, or what AbdouMaliq Simone calls the rhythms of endurance with infrastructure.

We borrowed the idea of 'refrain' from Kara Keeling who suggests that we need to listen for ––another world that is possible because it is already here.Keeling Listening through different organizations of things, different systems of signification and value, so much so that it might give way to the another world. Sung in the refrains with other temporalities and coordinates, yet already here.The generative proposition another world is possible, the insistence that such a world already is here now and it listens, with others, for the poetry, the refrains, the rhythms, and the noise such a world is making. (Kara Keeling)

Perhaps this world gives way in the peripheries, AbdouMaliq Simone reminds us of the importance of what he calls a 'peripheral politics', of a-centric practices and rhythms: "[s]urges of rhythm emerges from attempts to reach beyond the confines of limited places and routines, and yet retains a microscopic view of the constantly surprising details about the places that could be left behind".Simone xxx

The workshop "Peripheral Politics" was a way to organise and categorise research material not based on the extraction of meaning but on the collective listening and responding-too through a set of interconnected prompts. The transcriptions opened up onto urgencies, repetitions of stories, giving ways to other worlds, partially told.

Peripheral listening

  • Hold a series of open conversations with companions and associates on a subject matter that is felt as urgent, but which is not yet fully seen or comprehended.
  • Transcribe the conversations or ask a companion to do so.
  • Invite everyone that participated in the conversation for a two hour workshop.
  • To keep a shared rhythm whilst reading, propose a set of three 'refrains' as things to hold while reading, listening and responding to the material. These 'refrains' can be quotes, phrases or aphorisms that intuitevely resonate with the transcriptions.
  • Publish each conversation on an on-line notepad such as etherpad, or print them out on paper in case you are all in the same room.
  • Split up in small groups (two or three people) and chose one conversation. In case of an on-line workshop, also a channel by which you can hear each other. Many on-line video-services have a breakout-room feature but this adds a layer of efficient management that might be blocking the exercise.
  • Choose together one of the refrains to hold on to.
  • One person reads the conversation out loud while the others use the chat function to simultaneously associate, rhyme and respond alongside the conversation. For IRL, use pen and paper.
  • Experiment with selecting parts of the interviews through a collective process that resisted more extractivist ways of coding, sorting and labelling.
  • Create a series of poetic openings and peripheral attention in the margins of the transcripts by listening to to the material in this indirect way.
  • After 20-30 mins, take a short break and change roles at least once.
  • If you've got time, regroup and refrain another conversation using the same method.
  • Come back together and discuss.

Transcript marginalia from our workshop

Refrain: "start with the small things, while keeping in mind the big ones"

  • F: among the group is in your world
  • F: everywhere ceasing the moment
  • F: many chats i am in
  • F: multiplicity access points
  • F: distributing power
  • F: (i am losing your voice...)
  • F: a secret account
  • F: not a time of purity
  • Y: you are assigned a character
  • Y: make the best of what was around
  • Y: repurpose tools
  • Y: continue gathering despite restrictions
  • Y: staying connected to the community
  • Y: think about who else may benefit from resources
  • Y: recurrence, word of mouth gives rise to solidarity
  • F: starting a month after
  • F: confused joining, solidarity based on that
  • F: a union with new people starting on chat
  • F: it starts with someone needing a hammer
  • F: it starts with someone needing a test
  • F: it started with people having trouble paying rent
  • F: it started with things that did not stop
  • F: it started on tuesday
  • F: a chat and doubt
  • F: releasing documents
  • F: organizing that starts with a stat
  • F: chat
  • F: it starts with breaking up
  • F: intensity of seeing the ascist (not) go
  • F: tech and having time


Refrain: "making the most of the hinge"

  • H: waves of the lunch break
  • H: closely connected
  • H: what technology does in a particular situation
  • H: not the generic one
  • H: ongoing work
  • H: being between many projects that are close too
  • H: processing ways
  • H: vernacular play
  • H: collective moments of togetherness
  • H: collective infra.. the act of doing
  • U: hinge: capacity/ongoingness/different frames
  • U: they get funds for doing ceretin kind of work
  • U: on the one hand
  • U: on the other hand
  • U: not really a coincidence
  • U: exchanging ways tactics for refusal
  • U: at the same time have been really amazed
  • U: they are just right at surface
  • U: even though we don t see them
  • U: are we funding these interactions
  • U: feeding back into funding
  • U: ////
  • H: --live experience of the hinge--
  • H: --reshaping one hinge into another---
  • H: not a conincidence
  • H: contradictions come with it
  • H: if you decided to be the displacement between different places. people, you maintain this there is always contradictions you are holding onto something
  • H: working as a hinge
  • H: bringing it up
  • H: rather than being an underground hinge
  • U: different infrastructures were the hinges
  • H: carries weight to make the movement possible
  • H: out of proportion movement possible
  • H: //////
  • H: our relationships
  • H: shock level
  • H: shock crisis
  • H: looking out for each other
  • H: confidence of fascism
  • H: ---
  • H: spending money and how it creates oppositional to your wellbeing
  • H: the school, the funding,
  • H: how close to supporting this movement
  • H: chicken sandwiches
  • H: chickfill a funding inserruction
  • H: where is my money being spent going
  • H: to the radical institutions that work against me
  • H: this moment has made everyone stop and consider where the money
  • H: --- through the chicken s/w story---
  • H: the hinge becomes visible
  • H: by making it into a story you are making the most out the uncovering the hinge
  • U: a lot of work lately, this mic
  • U: there is no real prescription
  • U: training in on sylvia winter
  • U: (AI)
  • U: these walls are problematic now with COVID
  • U: we also need
  • U: making people comfortable
  • U: have to do something either way
  • U: maybe classroom is the garden
  • U: sylvia wynter is the hinge
  • U: making the most of something
  • U: even though crushed in this hinge
  • U: we are gonna have to do something
  • H: Sylvia Wynter as the hinge


Refrain: "making the most of the hinge"

  • H: it seems important the awareness of the constraints
  • H: as that isn't always there
  • H: organsiing through fb there is a degree of accepting the problematic parts because the trade is neccessary
  • H: it comes with a frame that might twist against you
  • M: hinge that can empower to think beyond the frame/constraints?
  • H: being aware that whilst looking through the different angles
  • M: in this case fb is the frame, oraganizing is the hinge
  • M: taking care of eache other during the demonstrations
  • M: doing the right thing partially
  • M: close to each other
  • M: different ways of doing food distributions anyway
  • M: big lineups outside
  • M: everymorning a good morning
  • M: daily hope og trying to keep hope alive
  • M: started basic stuff
  • M: impressed by the tenacity
  • M: people were not allowed to gather
  • M: and they did it anyway in didferent ways
  • M: managed to do it in a way that was respectful
  • M: deliver food
  • M: families who couldn't make it or who had quite a lot
  • M: emojis are undervalues [laughs]
  • M: they have not given up on their families
  • M: outside the scope of the state because it was needed
  • H: not hiding for what is the basic keeping in touch
  • H: sending hearts as a daily refusal of the state
  • H: included laughter


Refrain: "beginnings that happen in the middle of things"

  • F: always with these things
  • C: angled points
  • F: already important
  • C: complicit kinship
  • F: waiting not waiting not to be repatriatiated
  • C: implicit level of technology
  • F: accelerated means able to organise
  • C: own lived experience with technology (as a shifting, trembling thing)
  • F: being exposed to
  • F: since it arrived it shifted it is different
  • C: shifted by the pandemic
  • C: crisis as a moment to atomise that does not lead to resistance
  • F: when it is like that there is no resistance
  • F: when it happened here
  • C: similar things happening in other parts of the world
  • F: when it happened in other places in the world
  • F: when it happened on the street

A typographical layout of the refrains in three columns


Refrain to hold on to: beginnings that happen in the middle of things

a little song, a nocturnal creation myth or ‘sketch’ in the middle [...]; it is not a genesis story of the logos and light, but a song of germination in darkness [...] I begin with it because doing so calls attention to the improvisational elements of any beginning, which always happens in the middle of other things.

Kara Keeling, Queer Times, Black Futures


Refrain to hold on to: making the most of the hinge

Here, the surge as rhythm emerges from attempts to reach beyond the confines of limited places and routines, and yet retains a microscopic view of the constantly surprising details about the places that could be left behind. This is a rhythm of endurance, of surging forward and withdrawing. It is not a rhythm of endless becoming nor of staying put; it is making the most of the “hinge,” of knowing how to move and think through various angles while being fully aware of the constraints, the durability of those things that are “bad for us” (Stoler 2016).

AbdouMaliq Simone, Improvised Lives


Refrain to hold on to: start with the small things, while keeping in mind the big ones

Any "archipelagic" thought is a trembling thinking, it is about not-presuming, but also about opening and sharing. We do not need to define a Federations of States first, or to install administrative and institutional orders. It already begins its work of entanglement everywhere, without being concerned with establishing preconditions. As far as our relations in the Archipelago are concerned, let us start with the small things, while keeping in mind the big ones.' (Toute pensée archipélique est pensée du tremblement, de la non-présomption, mais aussi de l'ouverture et du partage. Elle n'exige pas qu'on définisse d'abord des Fédérations d'États, des ordres administratifs et institutionnels, elle commence partout son travail d'emmêlement, sans se mêler de poser des préalables. S'agissant de nos rapports dans l'Archipel, commençons par les petites choses, tout en ayant en l'esprit les grandes.)

Edouard Glissant, Traité du tout monde


Refrains: http://titipi.org/projects/infrastructuralinteractions/refrains.pdf

The politics of listening

A workshop with Miriyam Aouragh and Seda Guerses

For our second round of approaching the conversations, we applied Critical Discourse Analysis (CDA), again only involving companions that had been part of the conversations to begin with. As a way to decolonize our listening practice, Miriyam proposed a set of questions to ask while listening. This reflective methodology or reflexive ethnography was based on questioning the self, its power relations, its expectations and biases.

The “politics of listening” workshop was an inductive process of bottom-up interpretation, through making a socio-semantic inventory. Taking que from Decolonial Methodology, we felt that doing the research entails to give back to the phenomena or communities we study, which means that we not only take into account who pays for this research but also what purposes the research serves.

Our engagement with Decolonial Methodology was manifested in the way we designed the workshops, which themselves are entrenched in an ethical relationship between the researchers and researched. Our approach assumed accountability and therefore the research project had to involve reflection and reflexive writing which takes into account our own positionalities and biases. In this workshop we particularly played with the intersection between language and power, proposing to experiment with relation our own communications to politics. A politics of representation and the influence of subtext can come together in many ways, but few are as comprehensive for methodological interpretation as CDA.

CDA as a methodology emerged as an anti-racist method to delineate the discursive practices and linguistic features that construct the representation of social actors. We used its basic tools to apply it as a form of critical listening because CDA goes beyond classifying words and calculating common features. Instead the C = critical explicitly refers to its non-neutral agenda, which is meant to contribute to the change of a social reality by uncovering (with the intention of undoing) gendered/racialised/economic power relations and mind-sets:

  • Gender/race/disability are predominantly assigned passive roles, but besides white/male/abled/middle class, also technology is ascribed with active disposition;
  • Analysis about technological progress mostly foregrounds structure over agency, and machines over humans
  • The moral framework or ethical scaffolding of a conversation can become clear when we unearth who are the most represented or the predominantly invisibilized actors in the discourse/writings/recordings.

It became clear that the speech pattern of circularity and friction was a way to hold together the conflicts and contradictions, and that this was part of understanding struggle. It made us wonder how to hold the concepts in relation to the experience that were being described, which feels necessary to then have an analysis of tactics and practice. We also discussed the implied linearity of the analysis, going from recording to transcript to memory, and how this might reinstate the figure of the expert interpreter after the fact.

An exercise in Critical Discourse Analysis

A collective exercise in critical reflexive decolonial orientations in listening. The exercise requires ca. two and a half hours, including a short break.

1. Split up in small groups (two or three people) and choose a conversation you would like to work with, and a channel to communicate.

2. Compile a list of terms that you think will appear in the conversation you are about to analyse. These can be common/expected/remembered terms. For example: infrastructure/technology, resistance/protest/activist, space/place, state, reactionary, capitalism/neoliberalism, racist/racism, funding/finance/money, ability/disability/ableism, feelings. (10m)

3. Search and listen: use transcriptions (e.g., search through the text) and recordings as a way to locate the moment that these concepts and themes occur, and select one or two moments where the concepts are discussed during the interview. (30m)

4. Ask how these concepts were communicated in the conversation (30m):

  • How is the concept valorised or qualified (.... is shit):
    • positive/negative
    • hopeful-optimistic/hopeless-pessimistic
    • accepted/rejected ...
  • What is their temporality (in past present or future tense?)
  • Can you detect a speaking pattern (hesitant, circular, trailing, in-out?)
  • How is it spoken about (your own criteria for listening):
    • silence/void
    • agitated/enthusiasm
    • ...

5. Compare notes between groups. (20m)

6. Look at other conversations for similar concepts and redo the analysis with both conversation in mind. (20m)

7. Social analysis: Frame what you found in discussion with other groups; consider the infrastructural, political, economic context of what is said/claimed/proposed. (30m)

Word2complex

A workshop with Varia (Cristina Cochior and Manetta Berends)

This workshop was a play on word2vec, a model commonly used to create ‘word embeddings’. Word embeddings is a technique used to prepare texts for machine learning. After splitting the writing up in individual words, word2vec assigns a list of number to each individual word based on what other words they find themselves in the company of. Once trained, such a model deducts synonymous words from comparing contexts, or will suggest probable words to complete partial sentences. With word2complex Varia proposed a thought experiment to resist the flattening of meaning that is inherent in such a method, trying to think about ways to keep complexity in machinic readings of situated text materials.

Word2complex.png

Step 1: Cutting embeddings of words

Choose a body of texts that you would like to analyse. Count how many times words appear in this text. You can use a custom script or an on-line service. Pick one word that appears at least twice from the list.

Step 2: Embedding words

Use CTRL+F to find your word in the text that you are analysing. For each moment in which the word is used: describe briefly the context in which the word is.

Examples

Word: street (wordcount: 2)
Embedding 1: street -> activism

  • "We've been talking to people more involved in both intellectual and academic work on, for example, like Nadia on solidarity and Islamophobia, on thinking about colonial structures in organizing and activism on the street."

Embedding 2: street -> survival

  • "From Brussels, the food collection was allowed so I think in the streets you had long lines queueing up of people. They managed to do it in a way that was respectful of the social distancing measures basically."

Word: companies (wordcount: 2)
Embedding 1: companies -> crisis

  • "I think a magnitude level failure with our tax money, obviously, that went to their friends, but the collaboration around formulating and writing about extractivism, colonialism, settler colonialism, capitalism and how that manifests itself in moments of crisis like COVID, and the Shock Doctrine approach of companies and governments to implement things like track and trace and now probably also, what's it called certificate, of vaccine certificate."

Embedding 2: companies -> refusal

  • "Then there was an ongoing boycott by left-wing people of the companies that closed their doors to protest this."

Step 3: Identify/generate/complexify relations

Pick two words that have been embedded (this can include words that someone else embedded). Expand the semantic map below and feel free to adjust the connectors (they are starting points, not prompts)!

Example

shitstorm -> war on terror - "In the meantime, I got sidetracked by the shitstorm that has been happening around us for the last 10 years."

violence is to policies as shitstorm is to war on terror
violence is to a fascist street as shitstorm is to war on terror
shitstorm is to war on terror not as the state is to context

Semantic map

______ is to ______ as ______ is to ______
______ is to ______ not as ______ is to ______
______ is not to ______ as ______ is to ______
______ is to ______ as ______ is not to ______
______ ..... ______ ..... ______ ..... ______

Bugreporting as a method

Bug reporting, the practice of submitting an account of errors, flaws, and failures in software, proposes ways to be involved with technological development that not only tolerates, but necessarily requires other modes of expertise than writing code. Bug reporting is a lively technocultural practice that has come to flourish within free software communities, where Linus’ law “with many eyeballs, all bugs are shallow” still rules.Eric Steven Raymond, “The Cathedral and the Bazaar,” accessed July 1, 2019, http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/index.html, The practice is based on the idea that by distributing the testing and reporting of errors over as many eyes (hands, screens, and machines) as possible, complex software problems can be fragmented into ever smaller ones. By asking users to communicate their experiences of software breakdowns effectively, bug reporting forces “the making of problems” through a process of questions and fragmentation.As Simondon notes, “living is itself the generation of and engagement with problems.” Gilbert Simondon, L’Individuation à la lumière des notions de forme et d’information(Grenoble, Publisher 2013). It exposes so-called bugs to a step-by-step temporality, to make even the hardest problems small enough to be squeezable,In the context of technical bug reporting, squeezing refers to fixing. as they eventually are reduced to nothing more than tiny bugs.

Scoping the issues with Immunity Certificates collectively

In order to streamline the process of such squeezing, many software platforms have been developed to optimize the cycle of bug reporting and bug fixing.Issue trackers are increasingly being integrated into software versioning tools such as git, following the increasingly agile understanding of software development. “Issue trackers” help developers to separate bug reports from feature requests. A “bug” is a fault or an error that responds to what is already there; a “feature request,” on the other hand, is a proposal that adds to the project-as-is; it extends an existing feature or ultimately necessitates the rethinking of a software’s orientation. It is obvious that in such a technosolutionist framework, reports will attract attention first, while requests have a lower priority. Once identified as such, a bug can then be tagged as “critical” (or not), assigned to a specific piece of code, a software release, a milestone, a timeline, or a developer who then will need to decide whether it is a syntax, run-time or semantic error. From then on, the bugs’ evolution from “reported” to “resolved” will be minutely tracked.

On-line discussion on immunity certificates

The issue with issue trackers and with bug reporting in general is that these are by definition coercive systems. Issues can only be reported in response to already existing structures and processes, when “something is not working as it was designed to be.”“Bug: Definition—What Does Bug Mean?”, accessed July 1, 2019, https://www.techopedia.com/definition/3758/bug. But what if something (for example, in this particular case, a geocomputation toolkit) is not designed as it should be? Or even more importantly, what if geocomputation should not be designed, or it should be actively undesigned and not exist at all? Or what if there were no way to decide or define, in advance, how something should be without making an authoritative gesture of prejudgment and imposition?

Bug reporting tightly ties users’ practices to the practice of development, making present the relations of software––it is a mode of practicing-with. Like Haraways’s situated practice of writing, figured by Maria Puig de la Bellacasa as a “thinking-with” and “dissenting-within”, bug reporting makes apparent that software does not come without its world.See Maria Puig de la Bellacasa, “Nothing Comes without Its World: Thinking with Care,” The Sociological Review 60, no. 2 (2012): 197–216; Donna J. Haraway Staying with the Trouble: Making Kin in the Chthulucene (Durham: Duke University Press, 2016); and Kathrin Thiele’s chapter in this publication. Dissenting-within figures as both an embedded mode of practice, or speaking from within open-source software, problematizing an idea of a critical distance; but also has an “openness to the effects we might produce with critiques to worlds we would rather not endorse.”Maria Puig de la Bellacasa, “Nothing Comes without Its World: Thinking with Care,” 205–206.

From: Rocha, Jara; Pritchard, Helen V., and Snelting, Femke “We Have always been Geohackers.” In Volumetric Regimes: Material cultures of quantified presence, edited by Possible Bodies. Open Humanities Press, forthcoming.

EU Digital COVID Certificates: When governments move fast and ...

EU Digital COVID Certificates: When governments move fast and break things

May 28, 2021 https://github.com/ehn-dcc-development/hcert-spec/issues/84


On 20 May 2021 the EU commission reached a provisional agreement on the issuance of the 'EU Digital COVID Certificate'––previously referred to as a 'Digital Green Certificate'. As The Institute for Technology In The Public Interest, we are deeply concerned about the short and long term implications of this Regulation.

The certificate is being introduced at great speed under the auspices of public health at a moment of urgency and vulnerability on all levels, be it the level of the state, political institutions such as the EU, collectives, businesses and individuals.

Whilst we recognize the vulnerabilities produced by the COVID-19 pandemic, in this bugreport we outline some of the serious issues that the implementation of the 'EU Digital COVID Certificate' raises. We think it is necessary that the EU commission undertake an 'impact assessment', a step which was dangerously omitted in the record time that the proposed EU Digital COVID Certificate Regulation was agreed upon by the different EU institutions. Our aim in this bugreport is to make a start with defining impact areas, with the hope that other concerned groups and individuals will further extend it.

What is the EU Digital COVID Certificate?

The EU Digital COVID Certificate depends on the establishment of a digital token that links to an individual, 'a holder'. It is proof of either vaccination status, testing status or whether someone has recovered from COVID-19. Setting up a digital token requires infrastructural support, which connects digital with administrative infrastructures. Such an infrastructure is needed to digitally issue certificates and ensure authenticity of each certificate. The certificate can be carried on a mobile device or as a paper document. It makes it possible for different 'verifiers', such as public authorities, travel operators, venue owners or organizers of gatherings, to establish whether the certificate is authentic; if it belongs to the 'holder'; and if it carries the value necessary for entering a space, participating in an activity, or crossing a border. For the verification to happen in a rapid manner, the certificate uses a QR-code signed by the authorities. This means the 'verifier' needs to use a digital device, such as a smart mobile phone or QR code reader, to confirm the veracity of the certificate.

We argue that the implementation of these different steps represents a shift towards administrative-infrastructural regimes. Regimes that are made possible by digital infrastructure and their operational logics––with significant short and long term consequences.

Re-purposing e-health infrastructure for managing freedom of movement digitally

Many public health systems in Europe are not fully digitized. However, the introduction of the digital certificate catapults them into the realm of digital administration on a scale never implemented before. This shift to administrative-infrastructural regimes implies the reorganization of public health, as it changes the trust and power relations between relevant actors and stakeholders. The proposed system goes far beyond digitizing health records and existing workflows, because it introduces a system through which "certificates" can be used to manage every day activities, specifically freedom of movement. Public health authorities are typically not responsible for setting policies and running digital operations which regulate people's movements. In addition, digital infrastructures can come to reconfigure or even break public institutions, as exemplified in the way journalism and publishing succumbed to the rise of social networks like Facebook. What impact does it have on the public health system, its objectives and responsibilities, to be repurposed in a digital environment for the issuance and verification of certificates? What mechanisms are in place to capture and respond to the potential risks of digital transformation of public health institutions at this scale and speed?

Growing public private interdependencies entrenched in an essential infrastructure

While any vaccine or test can be written into a certificate, not any test or vaccine will fulfill the requirements for freedom of movement. By virtue of regulating which test and which brand of vaccine can allow the holder of the certificate to enter a space, participating in an activity, or cross a border, the EU Digital COVID Certificate will act as a powerful gatekeeper between private partners, governments and the public. How is the growing interdependency between public and private agents being kept in check that is part and parcel of this essential infrastructure?

Policing will bleed further into daily life

Since the data in the QR code is available in the clear, this infrastructure has no built-in constraints for who can verify the certificate. Since certificate checks can be expected not only at the border but could be easily implemented for entering a workplace, a demonstration or a classroom, it introduces new forms of policing into every day life. This set up facilitates conditions of vigilantism through the everyday management of citizen movement, optimisation, population flow and control. It also potentially demands teachers, health-workers, shopkeepers and protest organisers act as if they were police. What mechanisms are in place to limit random checks? What legal and complaint procedures are foreseen to address grievances? How to ensure that rather than supporting freedom of movement, the digital token becomes a tool to restrict movement of people as they go about their daily life?

The expansion of borders

As argued above, the implementation of the certificate will further intensify technologies of the existing border regime into everyday life, also at places that are far from geographical borders. It extends the force of the state, which will no doubt add to histories of inevitable inequalities and asymmetries of such bordering regimes. The EU itself has a terrible track record when it comes to border regimes, human rights and global inequities. What is being done to prevent the certificate from further contributing to racist, classist systems, to a multi-tier society and increasing levels of violence at ever expanding borders? How does the regulation consider people from outside of EU and the way their human rights might be affected by the introduction of digital certificates?

A neverending infrastructure

The recent renaming of the certificate from a generic 'Green Digital Certificate' into 'EU Digital COVID Certificate', seemingly limits its scope to the COVID pandemic. But as we know from the USA PATRIOT Act that was introduced short after 9/11 and never fully retracted, or anti-terrorism measures in France that were extended five times, once in place––when dependencies are created, "crisis measures" risk becoming permanent. Although the Regulation has attempted to address this concern by including a clause that deals with rollback by stating that it "should be lifted as soon as the epidemiological situation allows", this does not guarantee it is just a temporary measure. With multiple industries and countries depending on the relaxation of the lock downs, and technology companies of all sizes entangled in this digital-administrative-infrastructure, what force will it take to remove it? Is the 12 month sunset clause still valid when the COVID-19 pandemic has not been overcome by that point? What prevents its application be resumed in case of another pandemic due to an outbreak of SARS-CoV-2, a variant thereof, or similar infectious diseases with epidemic potential?

Shifting grounds

The fact that this certificate is in essence digital, makes it possible to introduce regular updates. This will make the infrastructure responsive to changing understandings of the effectivity of vaccines, and new test methods to be integrated. The Regulation limits clearly what can be certified: vaccine, test result, and recovery, but it does not regulate what policies can be applied based on checking the information carried on the certificate. The policy determines whether a given vaccine or test is sufficient for movement, or whether there are exceptions or updates to policies that should be applied. The certificate is promising to not discriminate between recovery, vaccination or a negative test. How is the equivalence between the three, vaccination, testing and proof of recovery maintained? Who decides what prevails or what happens when scientific insight changes?

This bugreport ended up in the Github repository of the Digital COVID Certificate, because we have not found another platform to place it. The promise of a timely digital solution for re-establishing freedom of movement before the start of the summer holidays has erased the space for due diligence and public consultation. Given the concerns we raised above, and those raised by many other people and institutions, we are concerned that instead of a benign and 'safe' way out of a difficult situation, the EU Digital COVID Certificate will do immediate and long-lasting damage, especially since it is being rolled out as nationalism and fascism are on the rise in the EU and elsewhere.

We urge people in different communities, movements, professions, and institutions to consider extending the questions above, because absent of public consultation, and considering the potential impacts listed above, our main questions are: Can we afford this digital-administrative-infrastructure? Can we allow it? Is it really an option?

The Institute for Technology in The Public Interest,

Miriyam Aouragh
Nishat Awan
Gwendolin Barnard
Yasmine Boudiaf
Seda Gürses
Clareese Hill
Infrastructural Manoeuvres
Martha Poon
Helen Pritchard
Femke Snelting
Eric Snodgrass
Cassandra Troyan
Magdalena Tyżlik-Carver

Bugreport posted on GitHub (screenshot)

Infrables

A workshop with Varia and The Institute for Technology in the Public Interest

Infrables make negative use-cases and un-fixing bug reports as a solidary praxis. They are articulations of what extractive digital infrastructures are, and what they are doing. What infrables can we tell to take-down Big Tech narratives and undo their violences? Generated through narrative and extra-narrative accounts, infrables identify oppressive infrastructures or tools, but they also make space for other technological attitudes. Between January and July 2021, the Institute for Technology in the Public Institute conversed with people experiencing infrastructural shifts, and together we tried to grasp their implications. These infrables are here to be reworked and retold.

From anecdote to infrable

How can we follow and understand infrastructural shifts through shared experiences? To what extent do individual experiences stand for a larger whole? What happens when you share, retell, adapt, rewrite someone else's experiences? An exercise developed in collaboration with Varia (Manetta Berends, Cristina Cochior).

  1. Bring an instrument. Maybe you find yourself in a room with a piano. Or someone has a guitar, some pots and pans or other objects that can make variable noise.
  2. Each participant picks an anecdote from the list of infrastructural anecdotes and reads it out loud. One or more listeners accompany the readings with dramatic sound effects.
  3. Once the reading is done, take 10-20 minutes to each write down an infrastructural anecdote. These anecdotes will become part of the materials for others to work with in future sessions.
  4. Form groups of 3-5 people.
  5. Each group picks an anecdote, and if remote, gathers on an etherpad page, or around the table if IRL. If you want, you can also mix several anecdotes.
  6. Choose a format, and some elements.
  7. Re-write/change/re-tell the infrastructural anecdote into an infrable together.

Formats

  • Shared BigBlueButton whiteboard + motto
  • Pad writing
  • Spoken story
  • ...

Infrabling ✨ elements

  • Make the intention (instead of the "moral") of the story explicit: what is the intention for the "public interest"? (connected to the line below)
  • Introduce a maxim, "concise expression" or motto
  • Introduce fictional agents, such as talking plants, inanimate objects or other creatures (e.g.: the tortoise and the hare, grasshoper and the ant, etc.)
  • Make space for natural phenomena, machinic agencies, other animacies
  • Scale the timespace of the story
  • Infrastromorphise (instead of antropomorphise) agents: attribute infrastructural characteristics, motivation or behavior to inanimate objects, animals, or natural phenomena
  • Use rhyme and repetition to rewrite/retell the anecdote

Infrastructural anecdotes

The National Number

I needed to get a covid test for travel , so I could return across the border back to the UK. I had been called by the contact tracer earlier in the week and they said to me don't worry you can use your day eight prescription for your test because you need a neg test to enter the UK again, won't you? And so I visited the website to book a test but it clearly stated that if yo9u don't have a nn, you should just turn up at any of the testing centers with your prescription. It had also an option to book a paid test for travel, but this one you could not book without the NN either. So my friend who I was with looked up on the map the closest in Molenbeek, she said it will be quiet, no-one travels abroad from there. [canals] we walked there it was just across the canal, they pointed out that there were three new bridges across the canal while before the canal was used as a border between two parts of the city, when there were uprisings. My friends explained that they were worried about the gentrification with this extended infra in place. My friend is also also an adorable typist. We arrived at the test center in FR my friend explained to the guy for the door and he asked is it for staying or leaving and when we said for leaving he said you can't do it here, and he sent us to another test center and gave us the details printed on a paper slip that he had hand-cut himself. When we got outside, we realised that the address he had given us was a 45 m drive, which would cost 6o euros each way in a taxi.

So we spent half an hour between on our phones looking at the codivtestbelgium.be site and the lab, we even called two numbers on the website and one no-one picked up and the other was non-existent. and we even considered using one of their NN numbers to book the test but we realised it might connect the results to the wrong id. All the time we were sitting by the canal. Eventually after a few arguments and exasperation, we decided to take a chance and take a tram to the midi station because we thought this is where people come and go and we thought they might have more information about how to deal with it. Because all the website said was that it was OK to turn up at the testing station.

So we arrive at the midi station and there were no signs of where the test center would be but because we knew the place we thoughts it probably in the old post office building because there are many empty office there and indeed it was there. There was a sign on the door saying covid test centre and below three logos one for the European security agency with a fascist eagle, one with a curly font was BE event organisers and the third logo was the red cross so we we went inside the there of us and on the way we had decided to stay inline with the advice that the contact tracer had given my friend to use prescription for arrival to not say that she was actually leaving. So we turn up in this entrance space which was quite dark with a reception desk with a beefy guy sitting behind it and another guy standing around, and my friend started explaining in English while showing her phone to the guy at the reception the guy looked at me saying I don't speak English and he wanted me to explain what was going on but at that moment my partner cut in because he had not understood we were going to say she was arriving and that created a bit of a confusion because he felt we shouldn't lie. on the side of the room was a woman crying and they kept asking her are OK. Once I got attention of the guy again I explained to him without saying leaving or going that we needed a test for my friend and the first thing he said was we cannot guarantee the results will be here and the moment you need them, and then he kept repeating in french it doesn't make any sense to come here crying and looked over my shoulder at the girl crying and I asked does this happen a lot and he said it happens every day. But once he had established that I had gotten the message he said there is no problem we can get her a test and we asked how to pay for it as all over the entrance there were A4s saying no cash and then he said upstairs they will give her a national identity number and I didn't know what to say because I was pretty surprised the other guy who was standing next to the crying girl gave us a green piece of paper on which a homemade form was printed in french that asked for name address date of birth so we went outside to fill it in. We were all pretty surprised about the proposal to give a UK citizen a national identity number, because is a national reference number a unique number for paying taxes and accessing health care normally for residents or citizens, but all around us were people with the green slip pocking out of their pockets.

So with the green slip in her hands, my friend went inside and follows the taped arrows on the floor and they said to go upstairs. I went up the first flight of stairs and turned the corner and realised I had four more floors to climb on a spiral staircase. The lift was taped off and the arrows kept on pointing at the next level. When I got to the top, there was another security on the first door and a small queue. It seemed every person entering was having a heated discussion. And every where were laminated signs suggesting to download the tracing app from the google play app store with a QR code. The first guy sees my green slip and ushered me to the next person in the office space. There were no lights on and garbage bags everywhere and a security person, wearing all black, looking like bouncers were at every stage. It did not look like a medical facility. The women in front of me was having a huge argument with the bouncer in front of me to get to the next stage because he said she had to pay for the text but she said she did not have to because she had the prescription. She was not from Belgium. Tan he came to me and I said I need the NN and he seemed really angry, and it was the last straw of his bad day. In the mean time the woman in front came to me and she said are you traveling and she said his guy is off the street he does not know what is going on I was here earlier this week, he doesn't know what is going on. And she said it is definitely free but than she said are you from the UK. All this time he was letting other people through. Eventually she demanded to let us through. Finally we were entering the next room where someone was registering peoples details and she asked me if I had an appointment and I said I needed the NN and she was fr speaking but we could communicate. She called the angry guy to tell him he was wrong and that I had to go to the doctor. I came out of the room, and was channeled to another room with barricades, into the room with the doctor. Up to this moment, everyone I had spoken to had in the process had acted as if the issue of receiving the NN was a bit of a mystery, difficult or impossible, or if they did not know anything about it.

I then saw the doctor and hes poke English. He asked to see my passport, and why I was going to the UK, he was a bit confused because I did not have the earlier test so he assumed I was living in Belgium. This part was straightforward, he photographed my passport on his personal phone (it had a family picture on it), which I felt was strange but by this time I just wanted to get my identity number. I probably should have asked about it ... it was clearly for logging and I was not asked for a signature. It was super hot, I was getting tired and there were probably some ill people in the rooms and I had only 7mins of battery on my phone so I was ready to comply with anything to get my id number. He gave it to me and he said that's fine, you can book and pay for your test online. The security guy came and got me and lead me to what he called the holding area and it was just a few chairs. He said you can sit here and pay and book for your test, and then have it.

I went on the website and went through all the familiar stages and used my new NN and that went fine. This NN was handwritten on another green slip of paper. I thought I better at this point and say that I was traveling outside the country. I was than able to select the test centre and the test day and this took me to a payment page which was facilitated to google pay, you could pay with visa mastercard but not paypal or with your linked google account. I paid and put in my creditcard number and I got worried because I only had 4% left and knew I would need to show the r etcetera at the next stage. So I just used the autofill to put in the creditcard, my name and the email and hit pay. I used my banks authentication so it definitely went through but it came back to the covidtest.be website and it took me back to the vendors website. Nothing downloaded. no PDF, confirmation. I was getting worried and thought I am going to try use my prescription since I now had my nn. When I went through the process again and this time it was a bit different, it offered me timeslots and said the first one would be at 18.45. That would have been four hours from then. I clicked and booked and it gave me a qr code immediately. This meant that I now could get back to the angry guy and show him the qr code which was what he expected from me from the beginning. And then he was showing me into the back of the testing room to the person who would take my details. On the left hand side of the corridors and it looked like someone was testing or packing samples, again in a derelict office room.

Now there was a new person on the shift, a young student, speaking English to me and her English was very good. She first starts getting my details and is checking them against the information on the QR code. It turns out that the auto-fill has spelled both my email and my name wrong. So I realise this may be the reason I did not get any info about the one I paid for and I am thinking ... shit! She says no worries and corrects until the right info is there and she hands me a blue tube to give to the nurse. But then she asks: 'you are not going to travel with this, are you?' and just before this she has noted my nn. She explains that with the free test you only get a text message but the paid ones have your id number and passport number and a PDF. She says to me you will need this for getting into the UK. She says, you can get the free one, I'm OK with that. And I explain to her that I did buy the test -to travel one and if she could look it up and she is sympathetic to this because she just corrected the wrong email and she ask me to show the transfer on my bankaccount. Now I have 2% left. I go into my banking app, my banking is all on the phone. I put in my security details and there is a last payment of 56 pounds and assume that this is the last payment and should be for the test. It says Farm Meyser next to it and I show it to her through the window saying this is definitely it. She says that is fine, later I realise it was a payment for food two days earlier in a supermarket.

Trying to get vaccinated but failing

I patiently awaited my turn to get vaccinated, and after many months of being impatient, I was finally old enough. I visited the website through which to register, entered my year of birth and got the message that it was not possible to get vaccinated. Many of my birth year friends did manage to get an appointment. I tried calling and hurray, success. Later it was announced the website of the government had a bug that stayed uncrushed for weeks, leaving many willing people unable to make an online appointment. It has since been crushed.

Hanging there

When I arrived here at Rotterdam I remembered a friend of mine from long ago was living here somewhere. I have shut down my Facebook a few years ago but I had to reopen it cuz I had no other way to get in contact with her. When I did it, I found my profile intact, outdates and it creaped me out, but worst was to see and decide if I should read or not old messages from friend and colleges, job offers, favors and happy birthdays hanging there unanswered. I left as soon as I could.

What if I was not fit?

I remember that every time I wanted to register for a COVID test via the website I would always get options to get tested in random places, often far away from where I live. That was despite the fact that I marked the option that I cannot get there by car. Even though I did not always feel fit to get to the test location, I am a young and able-bodied person. I kept wondering what happens if you are not as fit? Why were there no more options presented? it was different when you registered for a test by phone.

Sentimental download

A best friend from high school passed away many years ago. We both used Xanga as a blog/journal during our high school years, and used the private messaging system essentially to joke at eachother back and forth - empty chats. Xanga messaged me when they were shutting down in probably 2014... or earlier? asking if I wanted to download the text code of my page. I did, and in the bundle was also included my and Stephanie's private correspondences, hidden comments, hidden posts. This is a moment of tension, perhaps grief (two years after her death), but also sentimental.

Check-in

The phone I use is quite old and so I could not download the national tracing app. I therefore could not access some locations as I could not "check in" digitally. This was during the first lockdown, but it seems that since then venues have been told they could not discriminate against people without the app and to offer alternative (paper) check-in processes.

Faceless

In the work that I do the organisation uses Microsoft Teams. In the first meetings we had I didn't want to install the app or program on my laptop, and so I joined straight from browser. It took me some meetings to realize that that was the reason why I couldn't see my colleague's faces, because the software allows you to see other people's faces only if you install the program.

A string of spam

This and last year I’ve visited both Luxembourg and Germany for projects which during covid brings along a string of tests. I noticed after my visit last summer that my spambox of the old email I filled in at a corporate test center filled up with German spam. (unsurprising, but still sucks). Freedom of movement seems more than ever directly related to how much information you give. Last month public spaces opened up again in both countries but under the conditions of an antigen test. Restaurants etc can be entered but only by providing some spit, sometimes in combination with name, address, phone number and a show of ID.

Domestic vulnerability

Out of curiosity and of enthusiasm, I am running a small chat network from the meter box in my home. It actually is connected to an electricity plug right under my bed, so sometimes when I hover the bedroom and I touch the plug, the whole network goes down. A small form of domestic vulnerability. But anyway, the network runs most of the time.

Lost letter

My flatmate received COVID support during the early months of COVID, since she was unable to work in either of the two jobs she had. She applied for it, unsure about the conditions, even though she was fulfilling the conditions. At some point we received a letter from the government that was unfortunately misplaced & buried under some newspapers we receive from our neighbours when they are done with them. Because she hadn't seen the letter within 2 weeks and because she hadn't responded she had to give back the entire sum. We assume the reason why the letter wasn't also sent digitally was to check if she was home during this time.

Overheated laptop

During the pandemic my laptop is suffering so much. It is getting a bit old (not even that old), but videoconferencing is so tough on it. I am not a professional participant in video conferences, not being able to use background images, sometimes accidentally logging off because my laptop got overheated.

Paying with Amazon Vouchers

When we were setting up a research project 'infrastructural interactions' - I think it matters what it was for - we thought it was really important to pay participants in the conversations we were organising but the project it was administrated between two different universities so we ran into many different problems with paying participants. Part of the issue was that it was felt as unethical to pay participants I guess becuause of fear that it would influence the research results, but another part was that we were not able to pay participants based in the UK because the university had decided this could only be done by giving them Amazon vouchers, we guess this was because it would not set up a financial relation with them, wouldn't be seen as payment and also would not be showing up as a financial dependency but as a gift. Of course this is also in the interests of the participants; they would not have any registered income which would interfere with their benefits or taxes, but we really did not want to spend any project money that is critical about cloud computing on Amazon vouchers, even if we were sympathetic to people not wanting to mess up their benefits. So what we realised is that because the university using these vouchers, they were siphoning public money into Amazon on the one hand but also using Amazon to in a way support tax evasion, to support creative bookkeeping in an attempt to optimize their financial operations in the sense it was easier for them to give out the vouchers than to actually take care of a proper payment of someone who had contributed to project. The other part we can put in here, is that they clearly assumed that the participants were on benefits. It also has to do with ... a big part of it is because of the Universal Credit system, which is how benefits are organised in the UK at the moment, are designed people from making claims. It is highly aggressive towards having any additional payment outside your benefits; you will lose your benefits completely if a payment shows up. UC aggressively discourages people from staying on benefits. It is a system that is micromanaged.

Vaccine bro's

So people doing sexwork were saying to me, "do you have the vax badge on your profile", and then others were asking "have you seen the taglines on grindr", people are labeling themselves as big bear Pfizer, as Moderna otters, some said they saw a profile that was labelled, let me check it was ... yes: "Grindr profile of a “vaccinated top” with the foreboding caption, “It has begun.” It’s inevitable: the antibody bro is about to become the vaccine bro".

Corona 'Help'

With the first Corona aid, you could get 5,000 euros and there were people who got that. There were also people who took money fraudulently. That's why people had to give it back. Most of the people I know have actually transferred the money back. Because it is not clear at all. And there is so much stress. It's so unclear. You are being criminalised very quickly. People then immediately make a case of fraud. At the beginning it sounded as if it was available to everyone and you had to apply for it very quickly. You only had a certain amount of time to do it. I think it was 10 minutes or so and then the page closed. But the problem is, only if you received a number, you can get to this page, you've been waiting for days until you can get to the webpage. And I also have to confess, I didn't read the small letters, I just saw "I can get money". So they asked "Do you need more money?" and I of course said "Yes!". I wasn't entitled to that much help, because it was only for operating costs. But I didn't read the instructions. I was just trying to get my turn before Berlin said they had no more money. Because after that there was a time when it was stopped, because there was no more money. And now it's like this, you need to pay it back in one go. But it's not clear who pays back or not. And every tax advisor says something different about it. It's the same with friends. But then you are criminalised. As if you did it consciously. I was in such a panic because it was clear that we wouldn't get any money for 4, 5, 6 months, that at first I just clicked, I need money, I need money, I need money. But it's already true, the billions that are paid out to the big companies and what is then made out of these small amounts. It's all pure neo-liberalism.

Self-managing a demonstration on Eventbrite

So normally I try to participate in the 8th of March activities either go to march, or join a demonstration but this year it was not allowed to go out onto the street in groups. So I was looking on-line if there were any activities planned and then on one of the websites that normally has calls for the demos, there was an announcement that the organisers had permission for gathering a hundred people and that you would have to sign up on Eventbrite so that the tickets could be distributed. Actually, it wasn't Eventbrite, but I think for the story it doesn't matter. So I clicked on the link and of course all tickets were 'sold out', like already they were 'sold out', of course. So in the end I joined another activity and ended up on the same square on which these 100 ticketed people were supposed to gather. I realised they had blocked off with tape ten areas for 10 people to gather, and had rented metal barricades - the cattle thing, they had a made a circle with these barricades so inside there were these sections for ten people each so it meant that the organisers of the feminist or women's march had self organised this idea of checking who had signed into the Eventbrite, maybe they would have a barcode scanner at the entrance to this zoned off area. But what had happened is ... I had joined a less official feminist bike ride, we were so many we flooded the square so the whole setup crashed - people were crashing through the gates, broke the tape, there was a mess of bikes and people, it was a mess, there was no way the organisers could have kept with their promise of managing their crowd. So the worry about the barcode scanner being put in place, the fact that everyone participating in the official march had given their name, address and email, is really scary and the fantasy of becoming its own police force that the organisers held was really scary -- from the setup you could see they thought they could manage it -- and then the white punk girls just crashed it.

Spitting with couriers

I was traveling - trying to travel to Brussels to see my comrades and I was very anxious. I had ordered the COVID test and downloaded the app. There was a technological hitch and so it arrived two days late. I was anxious about the test not being testable, that it would be a non-viable sample, so I rang the company and they said "It is good to keep the sample as fresh as possible", and so I could book in a courier between 08:00 and 18:00, that would come and take my sample to the lab. But they could not give an exact time. As fresh as possible! They told me to wait until the courier arrived, knocked at the door and to spit into the tube whilst he waited. He arrived at 13h and knocked on the door and he waited while I watched the video, and spit in the tube. Wait, I had to go through the app stages. Open the tube, scan the barcode, watch the video, whilst he was waiting. I then sealed the sample and had to put it in a transparent bag that I handed over to him and at that moment we had eye contact, as I passed him my tube of spit. At that moment I thought: is he my nurse?

Senior's web

We're invited to participate in a large funding project on "Democratic AI", which is managed by a group of people working at a university in The Netherlands. The first meeting I attend to, happens of course in MS-teams. I never used teams before, so I ask the secretary for a separate test, to find out whether it actually works without an institutional account. After meeting the other partners of the consortium, I am invited to contribute to the 45 page application. The secretary of the project sends me a link to a Google drive but I cannot access the drive without signing in. For a moment I doubt whether to propose the consortium another on-line storage solution, but I don't feel confident enough nor have energy to manage it. Instead I tell the secretary that I don't have a Google account and ask if she can give me access without it. She sends back an email with a link to "seniorenweb" which explains how to make an account without signing up for gmail. When I make a joke about her considering me part of the elderly constituency, she replies: "I am a practical person. Just pick the site with the best explanation." I give in and sign up for a Google account for the first time in my life.

Infrables

┻━┻︵ \(°□°)/ ︵ ┻━┻

In the work that I do the organisation uses Microsoft Teams and Zoom, no it was Teams I think, whats the difference? In the first meetings we had I didn't want to install the app or program on my laptop, and so in first meetings I joined straight from browser, the Teams, or Zoom, house party, Jitsi or was I on Tiktok? I dunno... In the first meetings I was just staring at the icons, wondering why everyone was refusing the camera. In the first meetings even the head of the organisation didn't have a camera. In the first meetings I was still working but I gradually just relied on no camera too, taking the meetings from bed, from the floor, from wherever i felt the fuck comfortable. It started to really change the work I was doing, and i started to dream of the abolition of work, I mean before when we all had to sit in those team meetings and see each others faces, all encouraging each other too work. I mean I started to build like a beavers den or a like a badgers burrrow near where my desk would be, at one point I just took the desk broke it down, and burnt it outside. I mean I started to do my spreadsheets as if I was a beaver and before long I pretty much realised beavers don't care about spreadhseets. It took me some meetings to realize that that was the reason why I couldn't see my colleague's faces, because the software, that I think it was Zoom, or Jitsi, or was it that time i got invited to queer haus on mastadon no sorry it was Team I guess , allows you to see other people's faces only if you install the program. I had only Facetimed with my mom once a week until that day and she could see my burnt desk. You know when your mum answers the videocall and you still cannot see her face because the phone is so close to her face. what if I hadn't seen their straight faces for the last 12 months? - I think I rather not have seen my colleagues faces all semester, sleepy or full on make up on and showing of pajamas and eye bags, but mostly my own nap face was there. During the months of not seeing my colleagues faces, their faces slowly changed. After the installing, trading space on my device for faces, their motion changed. What ever happen to phone calls?! No file to safe after, no records, tracks... Im so paranoid this days, it really freak me out. I never got the invite for fucking Clubhouse. ◕ᴥ◕

Melting your CPU, one meeting at a time!

++++++++++++++++++++++++++++++++++++++++++++++++
                                               
     Melting your CPU, one meeting at a time!  
                                               
      A stab in the dark at team building      
                               __..--\       
                       __..--         \      
               __..--          __..--      
       __..--          __..--       |      
       \ o        __..--____....----""       
        \__..--\                             
        |         \                            
       +----------------------------------+    
       +----------------------------------+    
       +++++ micro ++ soft ++ protest +++++    
       + against the unequal distribution +    
       +++++ of terms and conditions ++++++    
                                               
         Join us in the blackout room!         
                                               
++++++++++++++++++++++++++++++++++++++++++++++++

Proxy Power

Once upon a time, a device who was relied on heavily began to age. It took them longer to feel a tap, even longer (more forever) to use an app. And even worse, (access to THE SPACE denied)

Other phones that were also aging, had other issues but felt more and more annoyed and frustrated, so they met up one day for a big cup of coffee... With cracked screens and lint-filled ports, they decided together that they needed a new kind of power: PROXY POWER.

Characters:

  • The Old device
  • The Newer device
  • The hero (a caring relative)
  • The villain (state employee)
  • The user (may or may not have covid)
  • The space (the user is trying to access)
  • The digital infrastructure

Addressable targets

"Addressable targets do not always receive what they deserve"

Research refrains

Research Refrains

A short introduction to research refrains

Impossible Breathing Modular Meditation Praxis

Clareese Hill

Welcome to a modular meditation praxis. This meditation consists of three materials that can be configured for the meditation you need at the moment. The first element is the meditation room, which is an immersive web space where the other two materials can be experimented with. The second material is the content for the meditation interventions. The content includes audio from seven singing bowls as they correspond to the seven chakras and poetic text by Black woman writers. The third material is the core meditation text which has moments for interventions of sound and poetic text. There is no order or prescription for how the meditations should unfold this is a space of poiesis.

1. The meditation room is where you can hold your meditation by bring the other three materials into that space. The meditation room is web virtual reality experience that is editable by watching the tutorial video found below under Mozilla Hubs tutorial. The meditation room can be accessed by the QR code or the links below.

Clareese0.png

2. Content for the meditation interventions: http://titipi.org/projects/impossible_breathing

Clareese1.png

3. Core text to be treated as fluid as water:

Impossible Breathing

Let’s take a breath
Let’s be still expect for our breath
Let’s let everything wash away with every breath
Inhale
Hold the air as breath, feel its contribution your body
Exhale
Let’s be slow together
Let’s meet in-between the inhale and exhale
Let’s meet in the air we hold as breath
Let’s image what it would be like to sit next to each other
Feeling each other’s energy becoming still
While we breathe together
Let your body go in this moment and the contiguous we will share together
Its’ no longer needed to be legible
Let the performance that the body is automated to engage in slows to a stop
We are connecting through our breathing
Being together through breathing
Feeling each other’s touch through breathing
A together that defies the constructs of reality

Insert Intervention

Let’s make right here right now abstract through breathing
Let’s participate in a contra-reality together that we conjure through our breathing
Let’s be there for each other and support each other with care through our breathing
Let’s think about meeting in-between the inhales and exhales
A liminal space that is unprescribed.
A multifaceted dimension of everything we need
Let’s take a journey of errantry together from the cosmos to under the surface of the water
Let’s learn together to practice impossible breathing
Breathing that happens outside of the reality, the landscape, the body, the lungs
Outside of the linearity of the rising and collapsing of the chest

Insert Intervention

Let reclaim our relationship with the water
By learning from the waves, the currents, the aquatic terrain, and the wise inhabitants
They are griots of futurity
They ask us to sit with them so they can tell us stories of duration, resilience, and poiesis
Let’s learn from the water by being fully submerged
And still breathing without water entering the body
Breathing in errantry is a shift towards nonlinearity
Nonlinearity requires a skip around in the in process of breathing first as thought then as praxis.

Insert Intervention

When our attachment to reality has uncoupled
Through being submerged and still breathing
Impossible breathing
Our residence, where we are occupying is thrust into the slippery the in flux
A residence that is under the surface
Our residence is the arrival to a space, a moment, an intention that has always been with in grasp through being able to disrupt our breathing
All we had to do was let go of the landscape and reach for the water, through the praxis of impossible breathing


Cite as: Hill, Clareese. 2021. "Impossible Breathing Modular Meditation Praxis". In Infrastructural Interactions: Survival, Resistance and Radical Care, edited by Helen V Pritchard, and Femke Snelting. Brussels: The Institute for Technology In the Public Interest. http://titipi.org/pub/Infrastructural_Interactions.pdf

Infrastructural Manouevres

Infrastructural Manouevres test scarytransclusions are coming gotta tell Ted

Cite as: Infrastructural Manouevres. 2021. "TITLE". In Infrastructural Interactions: Survival, Resistance and Radical Care, edited by Helen V Pritchard, and Femke Snelting. Brussels: The Institute for Technology In the Public Interest. http://titipi.org/pub/Infrastructural_Interactions.pdf

Notes Towards an Antifascist Infrastructural Analysis

Gwen Barnard, Naomi Alizah Cohen

‘The infrastructure of fascism is staring us in the face’ - Arundhati Roy (Roy, 2020)

Introduction

If the infrastructure of fascism is staring us in the face, then our task is to learn to recognise it and critique it so that we can most effectively fight fascism. It is often argued that infrastructures in general, almost by definition, tend to fade into the background of material, social life. Since infrastructures are that which make other things possible, they remain unnoticed - all attention focused on the phenomenon they exist to support – only coming into sharp relief when they cease to function (Parks & Starosielski, 2015). But what of the cases where it is this very ceasing to function which acts as the infrastructure of something else? Where it is a lack which acts as the condition of possibility? We might take the example of a vacuum which by dint of its lack of pressure, exerts a negative pressure, a suction, on the matter surrounding it. Maybe it is by paying attention to the complex dynamics of infrastructural presence and absence that we might be able face down the stare of the infrastructure of fascism about which Roy warns.

In this article we seek to outline some of the methodological and theoretical principles of what might be termed an antifascist infrastructure analysis. The insights we bring are borne out of the collective discussion in our workshop on this topic and from the participants and our own experiences of fascism and antifascist organising. We will begin by introducing certain abstract, conceptual elements of critical infrastructure analysis as we see it. Specifically, we will focus on the key distinction between positive and negative infrastructures, and the analysis of infrastructures as both sites and media of social antagonism. We continue, then, to apply this conceptual framework to the issue of fascism in the present-day political landscape. We tease out the distinctions between state and non-state forms of fascist actors and the different forms of positive and negative infrastructure that compose their conditions of possibility. In the next section, we explore examples of antifascist antagonistic interaction with fascist organisations and the ways in which these antagonisms take place both in and through forms of infrastructure: for example, online social media and message boards, IRL platforms for meetings, the streets. We also bring into play the question of infrastructures of antagonism, i.e., the infrastructures that make possible any kind of mobilisation against fascist organising. This leads us to our concluding thoughts on feminist organising principles and the infrastructures of care and social reproduction which must be centred when we think about what makes antifascism possible and, crucially, sustainable over the long-term. We approach these analyses from the perspective of our shared experience of organising within the Feminist Antifascist Assembly in London, UK.

Critical Infrastructure Analysis

Expanded notions of infrastructure

The notion of infrastructure which we put forward to be used in critical studies of fascist infrastructures requires expansion from traditional conceptions of what constitutes infrastructure. Whereas it might be usually assumed that infrastructures are simply the various forms of technology, hi- or lo-tech, which are established and maintained to make production, distribution, consumption, and communication etc. possible, this can be seen as a limited and substantialist approach. An expanded notion of infrastructure includes not simply roads, sewers, electricity grids, and fibreoptic cables networks, or even apps, algorithms, or social media platforms, but should include relational, affective, and behavioural elements too. This is what Parks & Starosielski (2015) have called ‘soft infrastructures such as daily routines, marketing, and knowledge practices’. A climate of fear can become an infrastructure for many political phenomena, including fascist ones, and can be engineered as literally as any heavy machinery. We propose that that critical infrastructure analysis should approach its object with a speculative notion of infrastructure that includes any material-social system that is engineered and maintained for the purpose of making another activity, process, or phenomenon possible.

On Negative and Positive Infrastructure

However, in our times of drawn-out social, economic, and ecological crisis, it is often a lack of, or inadequacy in, infrastructure that acts as a condition of possibility for some of the most defining aspects of our society. Here it is the very absence of infrastructure, or the inadequacy of its maintenance, that can itself act as the condition of possibility for other, often unintended, social phenomena. For example, it is the gross inadequacy of transgender healthcare infrastructure in the UK which itself acts as a condition of possibility for a thriving culture of self-medication and hormonal experimentation. Another example could be the specific lack of and limited possibility of state transport infrastructure in the Zomia mountainous region of Southeast Asia that has acted as the condition of possibility and continuance of non-state social formations to resist encroachments of state and capital (Scott, 2009). We propose this be termed negative infrastructure. The infrastructure’s negativity is not to be understood in a moral sense, but rather in the sense that art theorists refer negative space in visual art, as referring to an absence or lack which is nonetheless productive of noticeable effects. This nomenclature therefore positions what is usually considered to be infrastructure, e.g., the presence of a rail network making train travel possible, as positive infrastructures.

Furthermore, infrastructures do not simply act as neutral conditions of possibilities but are themselves imbricated in the array of social antagonisms which define modern societies. Social antagonisms are fought on the basis of infrastructure, for the control of it, for the existence or non-existence of it, it shapes its form and content. Often, if we want to fully understand a form of social antagonism, we have to look at how it is fought on and through material and social infrastructures.

Fascist Infrastructures

So, if we want to understand how fascism is emerging, or re-emerging, in our societies, then it is instructive to look at the positive and negative infrastructures which make fascism possible, but also look at how fascist power is wielded and resisted through the materialities of infrastructure.

First, we must make two distinctions. The first is that between the fascist state and non-state fascist organisations and mobilisations. The second is between “ordinary”, so-to-speak, capitalist infrastructures and the fascistic use/abuse of them. With both of these, inevitable overlap and collusion between elements are likely to make drawing sharp distinctions impossible. These are nonetheless important questions to consider when analysing the infrastructures of fascism.

We can, for example, speak of the fascist or post-fascist (Tamás, 2001) operations of contemporary border enforcement regimes and the infrastructure that enables them: electronic passports, biometric residence permits, facial recognition systems, checkpoint architecture, immigration detention centres and transportation vans, private company planes chartered for mass deportation, a climate of distrust and hatred of migrants… to name quite a few. But we must also speak of how the income that border and immigration enforcement provides (along with many other roles in the vast array of carceral operations of contemporary nation states) can act as an infrastructure for individuals engaged in non-state fascist organisations to support themselves and their political work. These “workplaces” can also act as recruiting grounds for such non-state fascist organisations. In this way, the infrastructures of state and non-state fascisms can overlap and reinforce one another. Indeed, in contemporary neoliberal nation states, the distinction between state and private infrastructures are increasingly blurred due to outsourcing and subcontracting private companies to fulfil functions of state apparatus.

With regard to non-state fascist organising, we find that digital social media as well as the anonymous-by-default imageboard platforms such as 4 and 8Chan act as crucial infrastructure for recruitment, organising and the spread of fascist ideas and sentiments. Pubs and other meeting places also serve as infrastructure for fascist meeting and recruitment.

However, there are crucial infrastructures of fascism which must be understood in their negativity. For example, the lack of housing infrastructure in the UK has led to exceedingly high rates of homelessness; this acted as a condition of possibility of “hipster fascist” organisation Generation Identity’s strategy of feeding only white rough-sleepers with GI branded food packages in Glasgow (Stewart, 2019). This fascist strategy itself took the form of a positive provision of infrastructure to fill the lack of broader social infrastructure. Here we find a complex interplay of negative and positive infrastructures of fascism where fascist organising itself takes the form of infrastructure provision. Similarly, in Italy the fascist group Casa Pound has been following a strategy of social infrastructure provision, taking over empty buildings, and turning them into social centres for communities, to build a fascist cultural hegemony (Jones, 2018). These are examples of a broader trend which sees the crisis in social infrastructures in Western countries as a negative infrastructure providing the soil in which fascism can grow.

Antagonisms of Infrastructure

Heretofore we have seen examples of fascist positive infrastructure building in the zones of negative infrastructure space which are left by ongoing social crisis. Fascist infrastructural strategy does not only take a positive movement however, but rather is equally often engaged in strategies of negation of the infrastructures of communities and organisations which they consider anathema to their worldview. An example from sphere of digital infrastructure is the so-called “raids” carried out by online fascist groups on targeted forum pages or Facebook groups in which a concerted wave of illegal and banned content is posted in an effort to have this community digital infrastructure removed by platform moderators.

Similarly, the familiar phenomenon of fascist marches and demonstrations can be analysed through an infrastructural lens. Here we might understand the fascist strategy as of infrastructural takeover or negation; the street, often residential and commercial neighbourhoods of targeted ethnic minorities, is taken as an infrastructure to be removed from the targeted community. The space which acts as a infrastructure of ordinary social life is suddenly an unsafe space which no longer makes possible the lives which is did. Similarly, ethnic minority businesses, community centres and places of worship are targeted for vandalism, targeting infrastructure of community culture and social cohesion as well as income. This strategy has a long fascist history with its most famous example the mass destruction of Jewish businesses, schools, and synagogues during the 1938 Kristallnacht pogrom. In these occurrences, it is often only made possible via collusion or collaboration of state forces such as the police and army which would otherwise interfere.

Antifascist Antagonism

However, this strategy of infrastructural negation does not occur only in one direction. The most visible example of fascist-antifascist antagonism is that of the street confrontation. Here the street is not only the site of the antagonism, but it is the medium through which and also the object over which the antagonism is fought. The confrontation is a matter of mutual negation of access to the infrastructure of the street fought through the spatial politics of territory.

The tactic of doxing, the publishing of previously anonymous personal data online, is a key example of the negation of the infrastructure of online anonymity which is practised by both fascists and antifascists in a melding of online and offline antagonism. Doxing not only removes the affordance of online anonymity but can also result in the removal of other infrastructure which makes the lives of the individuals targeted possible; doxing of fascists can often result in loss of employment, housing, or even intimate familial relationships, or can lead to arrest and incarceration in certain cases.

We can see through these examples that there is a lot to be gained by analysing fascist-antifascist political antagonism through the lens of infrastructure – recontextualising phenomena of force and violence as infrastructural interactions – giving us a deeper view of the complexities involved in these processes.

Feminist Organising Principles and Infrastructures of Care

We have looked at the infrastructures of fascism and the infrastructural interactions that take place in the antagonisms between fascists and antifascists. We must also address the infrastructures that make antifascist struggle possible and sustainable over the long term. Here we turn to our own experience in organising in the Feminist Antifascist Assembly (FAF) in London, where we collectively attempted to put feminist organising principles into action in the organisation of resistance to several fascist marches.

We would argue that feminist organising principles centre the often-invisible relations and practices of care which act as an infrastructure for social and political struggle. A feminist infrastructural approach would understand that antifascist struggle required not just antagonism with fascists but also the construction and maintenance of infrastructures of care that would be able to make possible both the necessary antagonism with fascists and the undermining of the conditions for fascism to take hold. For example, the medical, mental, and physical, care that is required prior to, during and after any confrontation or interaction with fascists acts as an infrastructure making that confrontation possible.

But we can also see the building of infrastructures of care which alleviates the negative impacts of ongoing social crisis in communities as an essential aspect of antifascist organising as well. The building of infrastructures such as squatting networks, mutual aid funds, mutual care networks and social centres can be seen as the building of positive infrastructure which fills the negative infrastructures of fascism with positive non-fascist content. This both undermines the conditions of possibility of fascism and can meet the needs of those communities engaged in struggle against fascists.

Conclusion

We have seen that bringing an infrastructural lens to the matter of fascism and antifascism can be very fruitful, both in the understanding of how fascism works and in understanding how it can be fought and undermined. We have seen how a distinction between positive and negative infrastructures can elucidate the complex interactions of social infrastructural crisis and the strategies of infrastructure building embraced by fascists.

We have also seen how an infrastructural lens can be effectively utilised when bringing into play feminist conceptions of the importance of systems of care as the conditions of possibility of any community, and especially communities engaged in difficult and often traumatic struggles with fascist forces.

We might tentatively conclude that the question of fascism and its opposition is fundamentally a question of infrastructure. Indeed, fascism is best fought by paying attention to what infrastructures are making fascism possible and targeting these, as well as paying attention to what infrastructures of care and otherwise are required for powerful and sustained struggle against fascism.

Bibliography

Cite as: Barnard, Gwen and Naomi Alizah Cohen. 2021. "Notes Towards an Antifascist Infrastructural Analysis". In Infrastructural Interactions: Survival, Resistance and Radical Care, edited by Helen V Pritchard, and Femke Snelting. Brussels: The Institute for Technology In the Public Interest. http://titipi.org/pub/Infrastructural_Interactions.pdf

Listening Structures

Yasmine Boudiaf

a diamond shapes with floating thoughts inside
A suspension of thoughts just existing.
three connected boxes with thoughts in them
Taking consistent themes, grouping them, making links between them.
three ovals with thoughts inside
Taking real-world phenomena and imagining positive and negative versions.
circles with different epistemic sources
Displaying sources of knowledge and comparing their validity.
a line with thoughts traveling along it
The path ideas take in order to produce meaningful interventions.
grey angular area with thoughts floating into it
A space to acknowledge silences, omissions and redactions. For unvoiced thoughts and dismissed feelings.

Research in practice

I developed these listening sculptures as a way to provide a space for ideas to sit and develop during group discussions.

Part of my role as a research assistant in Infrastructural InteractionsInfrastructural Interactions: Survival, Resistance and Radical Care, edited by Helen V Pritchard, and Femke Snelting. Brussels: The Institute for Technology In the Public Interest, 2021. http://titipi.org/pub/Infrastructural_Interactions.pdf involved transcribing audio recordings. I was aware of what a typical audio transcription looked like, in terms of structure, punctuation and commonly used terms to describe audio phenomena. I wanted as much as possible to keep to good practice and to do my job well. And yet, on listening to the personal testimonies and conversations of the contributors, I became aware of my role as a form of censorship, that all transcribers participate in when making decisions on what should and should not be included in the final transcript. Whilst I included all the words that were said, I made editorial decisions to omit what are generally not considered relevant to the objective of the research task. The implication being that what is not included in the final transcript therefore has no value. I would contest that such omitted content has value beyond what is prescribed as relevant to a research task. I wanted to honour the omitted content and make visible the hidden emotional labour involved in such a task with a statement at the bottom of each transcript:

I apologise for omitting laughter, discourse markers and filler words. It’s not that they’re not valid, they are – they add colour and humanity to the conversation – they just don’t serve the purpose of this exercise.

Sincerely,

The Transcriptor

As a researcher within and outside academia, various restrictions are imposed on the way I practice. These explicit and implicit forms of control can originate form any one of a number of actors involved in the infrastructure of a research project, such as a funder, an academic institution, an agency, a principal investigator, a legal team, a finance administrator or a contributor. This can be quite frustrating, and I have found myself at times taking a positivist standpoint, of good academic practice, the implication being that genuine knowledge is there to be seized, if only rigorous systems were in place that captured as much content as possible, in as pure a form as possible. My 'hard sciences' background and English education are likely contributing factors to this way of thinking.

As I work to move away from a process of information control that assigns status to particular forms and sources of knowledge, and towards a decolonial, material-semiotic approach of knowledge co-creation that sees the actors involved in a research project as a web of relations where meaning is produced in that process, it becomes necessary to interrogate my own position in this system and how I behave as a researcher, in the projects that I participate in or design.

Being reflexive as part of my research practice means that I interrogate the way I do things and so am able to design new research processes. For example, my workshop series EntanglementsUAL Creative Computing Institute (2021) Entanglements | Yasmine Boudiaf. Available at: https://www.youtube.com/watch?v=-dJbPW6ycbo (Accessed: 28 November 2021). is a collective analysis of public-sector technology contracts, the output of which is a collage of writing, scribbles, images, memes and links that express the injustice (and absurdity) of the entanglement between a state powers and private tech companies in a way that a typical written report cannot. My ongoing collaborative authorship project AI Justice MatrixBoudiaf, Yasmine 2021, AI Justice Matrix, accessed Nov 2021,https://aijusticematrix.com/ invites the perspectives of practitioners concerned with the mechanics of knowledge formation that affect our relationship with technology. It treats all sources and expression of knowledge as valid and offers issues to consider when contemplating AI practice without necessarily offering an answer.

Reflexivity is particularly important when confronting the issue of power asymmetries inherent in researcher / participant dynamics. There may be group conversation, but the presence of the researcher means that the participants are under their gaze - it’s difficult to discern what effect this may have on the nature of the participant’s output.

Listening

Having a space that participants add thoughts to anonymously as they arise may help to reduce participants’ inhibitions.

What would listening look like when assigned roles were no longer visible, and participants were not confined by conversational dynamics (such as waiting for your turn to speak)? The listening becomes detached from any person yet at the same time, everyone becomes the listener, as each participant is presented with the output at the same time.  

This distributed listening becomes active distributed listening when participants have access to the platform where contributions are collected and are able to manipulate them. These contributions, or thoughts, take on a life of their own; they are picked up and moved around by anyone, built on, manipulated and challenged. Half-formed ideas can manifest, and be made whole by someone else.

This side-system of qualitative data gathering adds value to a research project through capturing contributions that would have otherwise remained as thoughts in participants’ minds. It can also continue to exist beyond the lifespan of a research project, in acknowledgement that not all meaningful contributions can be captured in a prescribed session.

Using the Listening Structures

These are diagrams made of geometric shapes to aid in collective idea development. As ideas travel through these structures the nature of these ideas changes, providing a geometric framework for them to develop.

FLOATING THOUGHTS: A suspension of thoughts just existing.

COMMON-ING: Taking consistent themes, grouping them, making links between them.

SPECULATION CHAMBER: Taking real-world phenomena and imagining positive and negative versions.

EPISTEMOLOGIES: Displaying sources of knowledge and comparing their validity.

JOURNEY TO INTERVENTION: The path ideas take in order to produce meaningful interventions.

DEEP FISSURES: A space to acknowledge silences, omissions and redactions. For unvoiced thoughts and dismissed feelings.

The Listening Structures are drawn on a non-extractive collective drawing pad, Excalidraw. The original pad should not be edited, but rather a copy should be made and populated so that the original stays empty and useful to others, however, new, empty structures can be added to the original pad that others may find useful.
  1. Visit https://excalidraw.com/#json=6497964574900224,Ps6Si-EVmnSHpavjSZKVPg
  2. Click “Export” 

  3. Click “Export to Link” (wait a while until there is a pop up window with a new link)

  4. Copy and paste the link into a browser window and edit your version of the structures as you like.

References


Cite as: Boudiaf. Yasmine. 2021. "Listening structures". In Infrastructural Interactions: Survival, Resistance and Radical Care, edited by Helen V Pritchard, and Femke Snelting. Brussels: The Institute for Technology In the Public Interest. http://titipi.org/pub/Infrastructural_Interactions.pdf

What have you given up to technology in the name of safety?

What have you given up to technology in the name of safety? How has this affected you?

We are asking these questions to our friends who sell sex as a gesture to provoke further inquiry into how life maneuvers within and around technological apparatuses.

Sex workers are on the forefront of harnessing technology as a popular tool to interrupt surveillance and evade the violence facilitated by technology. Of course, we want to be safe, but we do not look to any external designation of safety. Despite all our tricks, masks, and hacks, we are profoundly affected by the state’s deployment of data aggregation, regulation, and threats. It is hard to think about what we are building in resistance when there is so much being done to us.

How often are we asked to cooperate now so that later we can be free? Work is never safe. The money we gain offers a chance at stability, and the prospect of sharing what we might then build with others - this is why we have found ourselves here at all. But what have we given up for that money?

Are we so resigned to surveillance in our other crimes? Where is the call to be boundless? Where have we stagnated in an attempt to master the algorithm? There is no action but the action we will.

Other Weapons




After hooking for a decade or more, any semblance of romanticism I take in my work has faded away. I do not like work. And I certainly do not like sex work. But it is the best of worse options for me. I have a criminal record. I blur my face in all my online advertising. In the beginning, sex work allowed me to survive, and eventually thrive with essentially zero trace to my actual identity, and in spite of how employers would not hire me because of my record or lack of higher education.

But over the last decade, Slixa and Eros among other online advertising sites I use, all began requiring some kind of identity verification in order to advertise services. I sometimes catch myself short of breath knowing my driver’s license is just a hack or a court order away from being associated with everything I have ever linked with my hooker name on the internet.

I signed up for OnlyFans at the beginning of the pandemic. I am now back to working in person but continue to receive about $100/week from OF. So, when they started requiring a new verification process for all content creators in 2021, I was relieved. I thought I finally had an excuse to get off this wretched site; I hated the thought of exchanging a biometric scan of my face for the ability to sell content. But when OF refused to allow payouts to my bank account until I verified with the third-party service Ondato, I watched my unclaimed balance grow, then I caved.I find a little comfort in knowing I wouldn’t be alone in facing the fallout of, for example, a mass hack of Eros or OnlyFans. But it all pales in comparison to the potential nightmare of facing my neighbors, my landlord, and others if my identity were to be released. It feels like I am participating in my own doxxing. Whatever social legitimacy I initially exchanged for anonymity in sex work a decade ago is now ten-fold in its potential cost to my livelihood.

— Harla City (Southeast U.S.)


The most popular escort directory (Adultwork) here in the UK requires its users to submit selfies with their ID in order to maintain a profile. This was already the case but we all received an email recently reaffirming this policy in light of the same Mastercard policy change that wrecked havoc with OnlyFans. Being able to use this directory gives me the safety and benefits of working indoors and independently, where I can get in contact with and screen my own clients. The financial security that I’ve gained from sex work over the last few years has been one of the most transformative things in the last few years and this definitely makes me feel ‘safe.' At the same time, sharing my passport details with these platforms makes me feel incredibly vulnerable. They have readily available access to my identity and as good as proof as any that I’m a full-service sex worker. Selling sex indoors and independently (i.e. not in a brothel, managed premises or venue shared with others) is legal in the UK. However, I feel scared knowing that if the laws around sex work changed in the UK, Adultwork could be targeted and a situation like the raid of Eros and Backpage in the US could occur. Even if the law doesn’t change, there’s a ‘chilling effect’ of criminalisation internationally. I worry I may not be able to enter the US and visit family because of the extensive digital footprint that implicates me as a sex worker. The US Department of Homeland Security has been known to deny entry to and ban suspected to be sex workers on the basis of their internet presence and online advertising.

— Simone (London, UK)


Technology, or more specifically the internet and how media spreads on it, has at times ravaged a sense of my own safety. Various forms of my personal information have been circulated beyond my control, leaving me in a state of over-exposure, all while twisted constructions of who I am or what I do as a sex worker swarm from the minds and keyboards of online bigots. The internet can act as a tool to over-sensationalize, and the internet does not consider real life reactions outside of its machine. Backlash to this skewed information about me has at times been aggressive, obsessive, and violent, all affecting my mental well being, as this information carries on in the form of real-life labour to protect myself from the tired and regressive narratives that orbit sex workers at all times.

— Mistress Rebecca (London, UK)


The further social media progresses, the more it requires of sex workers. And the temptation to have a presence grows. I’ve sacrificed many social relationships and potential work relationships by being coerced into publicizing my work as a stripper, only to be reminded that it’s actually not safer or more lucrative.

I created social media and OnlyFans accounts under alternative aliases as a method to prevent sharing my cell phone number or personal information with clients. I’ve also used alternative phone applications to create fake phone numbers to route through my phone. Doing this provided the perfect opportunity for a client to stalk and threaten me both virtually and in person through basic internet sleuthing. Both my Instagram and OnlyFans, which I thought would give me the safety of anonymity, were hacked in their own time.

Additionally, the attempts to preserve this anonymity from my clients actually required me to upload explicit content that is now owned by Facebook, Instagram, and Google, which will be used for their own algorithms, sold for marketing, and can be sourced by the state. The programs will also be using my information to create even stronger surveillance techniques, which will, in the long run, kick me off of these applications, and fully prevent sex workers from using them in the first place, putting us at risk for being targeted by the state.

It’s like companies are using sex workers as guinea pigs for innovative applications functioning under the guise of safety, but eventually, they are sold to surveillance companies that turn around and throw us in jail.

— Zoe (Chicago)


The censorious algorithm, adversarial ‘machine learning,’ and privacy-and-identity surveillance, are three recent technological modes especially equipped, already devoted to, hurting whores. These are built on logical threads that continue to de-weave and re-tangle themselves, rendering and refining their own capacities through endless iterations. It makes sense why they would become a whore's obsession.

The screen seduces us, threatens our focus out in the world. The promise of safety: technology protecting us from preventable suffering. But Technology and Sacrifice are inextricable. To acquire one form of innovation or knowledge, we end up, inevitably, rescinding others. Sacrifice implies both forfeiture (what I give up) and resignation (what I give up on). Our work consists of real time speed trials - stakes driven by what we know and what we can’t.

I forfeit my energy to the time, and mind sink, of the internet. I expend many living hours researching technology, imagining I can know just enough to protect myself and my friends. Obsession here is as addictive as any chemical cascade; through the labor of trying not to panic, I’m developing a tolerance. I derive comfort in technology’s many failings, a horror-comedy of smart houses turning against their owners, grotesque-surrealist digitally rendered genitals, AI chat bots getting caught cheating, the fem-bot painting herself.  

We fear that doing this work will make us lose our lives. Like logic, fear aggregates and compounds, so much that we risk losing our minds, and the technology fulfills its intents. I resign myself. It’s a fact - if someone is determined enough to hurt me, they will. Presence is our only real protection. I return to my senses.

— Lyn (New Orleans)


I started working after I connected with a random little cluster of hustlers. I learned from them, and mirrored their practices from advertising to screening to cultivating a protective intuition. What this meant in practice was that we used the most basic and accessible advertising platforms, making bare-bones posts, sometimes with just a few sentences and a photo of someone who represented our race and general appearance. On some level I had already drawn a line that I didn't ever want to fully connect my image to this work. Those mediating data points, my IP - used to place ads, or phone records, or a 4th, and 5th email account that are connected to the 2nd and 3rd, also connect my identity to my activity, albeit a little more indirectly.

Is my identity linked to this work? Yes, but perhaps not through biometric proof. Does that make me safer? I don't know - safer from what? Sw’ers are stuck between mortal danger of bodily harm, legal danger of prosecution and its aftermath, long-term psychological harm from adverse or transgressive experiences, and the list goes on. The constant weighing of the scales is itself a burden to bear. The decision to separate the image of my body from my advertising is partially informed by the fact that I feel like my body itself is more easily identifiable than others. What that exchange has meant for me in practice is that I also have to bear the psychological burden that comes when, in preserving some meager, but ultimately false, sense of safety, I have to deal with an occasional client who interprets unoriginal photos as a manipulation against them instead of a protective measure that I claim, despite them. That's no fun - clients feeling entitled to be critical of your body, your dress, the competency of your presentation. The stoicism or nihilism or void I've gained from these kinds of singular experiences through sex work alone is interesting to me. Anyway, the other tradeoff is that using these basic advertising platforms that permit a degree of anonymity sometimes means encountering more unpredictability with clientele. The impression of an added layer of safety from the biometric memory of the state has at times left me square in the middle of differently unsafe circumstances, probably the worst case being huddled in silence with a handful of other women, separated from a duo of aggro robbers, or potentially violators, by nothing more than a shitty metal lock.

— nana (U.S.)


I have given up my face, my government issued ID, my name, and some sanity, all to work online and have my profile verified by the companies who require me to do so. This is accepted as a sex worker’s wager for safety — supposedly anything is better than working on the streets, or at least anything where you can be given the illusion of having autonomy.

Sometimes I still think of where all of the hundreds of hours of footage from camming are now, having been recirculated in 3rd party markets, and wonder if there will be a day when they will resurface in a context I won’t be able to ignore.

Or times when I used part of my face in ads because I knew it was another kind of necessary currency, and I needed it to sell an image I was trying to portray. Plus, I needed money fast. In the end, I knew it wasn’t worth it — intensive political repression was amping up in my city, coinciding with an increase in prostitution stings, and I didn’t want to find myself in the crosshairs.

Later, I exchanged my legal name with certain long-term clients to escape the techno-surveillance of ad platforms, camming or sugaring sites, etc. Then they could buy me plane tickets or put money straight into my bank account, all while crafting a plausible paper trail that could be used either for my benefit or against me. This is potentially the greatest threat to my safety, but also one of my greatest rewards -- to escape the hustle of marketing, visibility, social media, a website, and ads. These are the things I have always hated the most.

Even though this more intimate work of sugaring can feel like punching an emotionally-saturated clock, I recognize a difference in these spaces between work and not-working. When maintaining a crafted hooker persona, on the other hand, I never experience the feeling of being "off-the-clock", since I am basically my own small business. The measures I needed to take were for that wager between safety and sanity, knowing what both could hold, either for, or against me.

— Ana (U.S.)


​​​​​​​As a dancer who has worked primarily in strip clubs for the past decade in person, surveillance technology introduced in the name of safety has negatively affected my sense of autonomy and security. Despite popular narratives around working conditions and contracts in clubs giving workers more job security, the safest I’ve personally ever felt is working under a fake ID in a club with no cameras. This club didn’t take my fingerprints, SS #, inquire into my address, or track the money I was making in an internal system. At most clubs now, I am required to provide all these things in order to get a contract, which can then be terminated at random, while my biometric data and personal information remains in the club’s system. Typically, there are security cameras surveilling the dancers in the dressing room but not in the VIP booths, suggesting our coworkers are more of a threat to our safety than customers behind closed doors. Clubs that increasingly track my dances and stage time in centralized systems have a better ability to charge exorbitant shift fees. The increasing surveillance in the clubs in the name of worker safety has always felt like a sham, leaving me with less autonomy and more ability for the club to control and exploit me further. 

— Aiden (U.S.)


I cycle through about ten aliases. When I was doxxed for political activity seven years ago, I lost the use of my name after death threats and repression. My name is entombed on the internet, I leave it there. Anyone is a google search away from knowing it all, this has been proven to me many times. One thing leads to another.

I have uploaded my state ID, passport, full body photos, my face next to the daily newspaper, fingerprints, to various technologies in order to sell sex. Though whenever I go to see a client, I leave anything with my name at home. When I am home I try to keep my devices separate, try to understand all the invisible linkages, try to not hate myself when I inevitably fail. Or when I am recognized in the gym, the classroom, the street.

Criminal activity aimed at making money requires arbitration and enforcement of illicit agreements to advance. So, you trade the supposed danger of isolation and the uncertainty of free-styling for these platforms, which transform what you once dealt with into new forms of capture. You must make a deal with someone, pimps, the IRS, often both.

Living often requires criminal activity, with life being so crushed by power. Whoring came to me when I needed money but failed background checks. It’s something I know how to move through, make gains, shape to my own choices. But it also pervades all aspects of my life, often fills me with dread or the ugliness of all I do in the pursuit of money. So it is hard to know if it ever positions me to engage in more joyous and revolutionary clandestine activity, or puts these efforts at further risk. My life has lead me away from citizenship, away from identifying myself, away from sacrificing my body toward mediated desire. If I am oriented against the state, how do I reckon with the concessions I have made to accumulate money, other than putting that money to our use?

— Star (New York City)




Following these responses, we came up with some further questions for our readers, sex workers or otherwise, to consider —

1. What have you given up to technology in the name of safety? How has this affected you?

2. Where does sharing our (SWer) experience, in writing, in poetry, in collaboration or panels, leave us more free? Where does it lead us to a dead end? In whose company? Apply this to your own life if you are not a worker, or, ask a worker you know.

3. Imagine a world where people don't die for being whores, aren't tracked, aren't prosecuted. How do you fit in? What can you do to create or preserve this world?

4. As workers, we secure our marketability via the realm of the explicit. What we orbit around, though, are the subtle possibilties held within unnameable, sensual, living desire. What do you see the state making us desire? What desire, what pleasure, will never be regulated by the state?

5. What role does the state have in your fantasies?


Other Weapons is a site for amassing and proliferating knowledge, stories, and positions by sex workers. It has no set place, but circulates in the form of printed zines, online pdfs, emails, stickers and wheat-pasting, and occasional public appearances. Our aim is to experiment with sex workers and our accomplices toward material strategies for our autonomy and liberation. We are for finding life outside of any given parameters, for finding ways to live, interdependently, beyond survival. Through print material, discussions, letters, film, music, and visual work, we attempt to distribute intelligence often hidden or unpublished.


Cite as: Other Weapons. 2021. "What have you given up to technology in the name of safety? How has this affected you?". In Infrastructural Interactions: Survival, Resistance and Radical Care, edited by Helen V Pritchard, and Femke Snelting. Brussels: The Institute for Technology In the Public Interest. http://titipi.org/pub/Infrastructural_Interactions.pdf

Appendix

Colophon

Edited by: TITiPI (Helen V Pritchard, Femke Snelting)

Design and wiki-to-pdf research: Infrastructural Manouevres

Transcriptions: Yasmine Boudiaf

Copyleft with a difference, 2021: artists, authors and The Institute for Technology in The Public Interest

Unless otherwise noticed, texts and images are available under the Collective Conditions for Re-Use (cc4r) 1.0. You may copy, distribute and modify them according to the terms of the cc4r. https://gitlab.constantvzw.org/unbound/cc4r

ISBN: 9789464513202

Cite as: Infrastructural Interactions: Survival, Resistance and Radical Care, edited by Helen V Pritchard, and Femke Snelting. Brussels: The Institute for Technology In the Public Interest, 2021. http://titipi.org/pub/Infrastructural_Interactions.pdf

Biographies

loading...