The defence of the Network, hacktivism and other contributions to the source code of the new movements

Notes from the Digital culture, networks and distributed politics in the age of the Internet. From the Global Spring to the Net Democracy, organized by the Communication and Civil Society programme of the IN3 in Barcelona, Spain, in October 24-25, 2012. More notes on this event: comsc.

Round table: The defence of the Network, hacktivism and other contributions to the source code of the new movements
Chairs: Cristina Cullell (Universitat Jaume I)

Technological infrastrucures have changed the landscape of participation and activism. There also is a new hacker ethic or hacker culture that promotes sharing, decentralization, openness, etc. Hacking is not based on an expectation of profits, but on personal pleasure or realization, on prestige and recognition: hacking is better understood in a gift-economy rather than a traditional capitalist economy.

Hacking requires net neutrality and an open network to be able to realize its full potential. But is it the Network a common good or a private service? Depending of how the Internet is understood, different ethics apply and different ethics clash one with each other.

Can hacking provide a new framework that is able to design (alternative) solutions for the economic and political crisis?

Txarlie (Hacktivistas)

How is the Internet born? It’s not the outcome of some amateurs, but the outcome of scholars, scholars trying the get the best of their powerful but underused infrastructures (regardless of the fact that they were directly or indirectly financed with military funding). And, in a scholarly way, technology, research, designs and results are openly shared.

But little by little, and fostered by private investors, infrastructure and its open outcomes are increasingly privatised and released with different licenses that allow different uses and “ownerships”. One of these licenses is the GPL, that uses the hegemonic rules and practices to fight them back.

The GPL and the way of working around the GNU not only provided new outcomes (i.e. an operating system) but also new ways of working, of collaborating, of distributing tasks.

Most of the developments that run the Internet or that run over the Internet are built upon this new way of working, and based on two main pillars:

  • Low consensus: maximum consensus cannot be achieved; thus, practicality and the lowest common denominator is what applies.
  • Running code: things are built upon practice, what is to be applied is what is been worked on, what is being actually coded and run.

This way of working both fits the basic needs of a project and also that dissension can be redirected by means of forking a specific initiative or project. Forking (usually) does not mean splitting a project but actually multiplying it.

[Txarlie implicitly recalls in software what in social movements is called as ‘do-ocracy’: activism by doing, not by representation.] The parallelism between free software and (new) (hack)activism is that decisions are taken in a decentralized way, there is no-one (but many people) deciding what initiative or project is being developed and carried on. In this sense, the 15M works as a free software project and the 25S as a fork of the initial 15M project.

The big difference between the 15M movement (aka Indignados) and the Anti-globalization or Alter-globalization movement is having a strong link with the media corporations, so that the message can get out of the insiders, that outsiders to the movement can connect, be informed, understand or interpret the message, resend it, remix it, etc.

Carlos Sánchez Almeida (Bufet Almeida)

When communication media try to explain the phenomenon of “AcampadaSol” (camps in the Spanish squares), they usually forget the whole landscape and context that leads towards Sol: AcampadaSol is not an isolated event, but the outcome of many micro-events and initiatives that had taken place before. A good explanation of the movement is Ciberactivismo: Las nuevas revoluciones de las multitudes conectadas, by Mario Tascón and Yolanda Quintana.

We need to reflect on the new ways of activism and understand their new role and the role of the Net. And this is an urgent need if citizen movements want to fight back the attacks of governments and corporations to these new ways of activism.

Hacking, new activisms, hacktivisms, etc. came up with new ways to circumvent or to hack the law and were able to raise improved ways of participation and protest. In reaction, legislative bodies are changing the law to prevent such circumvention, most of the times attacking not only new practices but the very core of some human and political rights such a freedom of expression or the right of assembly.

Activists need to set up new tools to circumvent the anti-circumvention laws. Society needs no new elites, but distributed and decentralized power. Society needs more hackers, but not technology hackers, but “society” hackers.

Discussion

Francisco Jurado: Why hacktivism? Why going against the system and not contributing to it? Txarlie: The traditional creators of content, of information, of knowledge (e.g. the academia) are no more able to be the only engines that empower the society. So, it is not exactly a matter of going against something or someone, but contributing to the work of the institutions… despite they wanting it or not. Carlos Sánchez Almeida: sometimes, though, some things need to be fought as they directly attack some human rights or some tools that enable the practice of some humand rights (e.g. P2P technologies).

Marga Padilla: what is the difference between activism P2P and activism Free Culture / Creative Commons? P2P is more based on protocols, on sharing initiatives, and Free Culture / Creative Commons activism is more based on creating more content, more information, and sharing and diffusing it.

Q: What exactly is the Internet? Does the definition determines what is cyberactivism? Txarlie: Internet is a network of computers. The problem is that over this network there are sub-networks that often isolate themselves from the rest of networks. So, when we talk about the Internet we should talk at both levels: the physical network and the logical or social sub-networks that coexist within. Almeida: Internet is a constitution written by hackers, and the Internet is a neutral network: a neutral network lets all bytes flow equally.

Q: Why hacktivism is many times not proud of its own actions? Why anonymity? Why not “full” civil disobedience instead of a rough approximation to civil disobedience? Txarlie: this is not a decision that an individual can take, but that the whole collective have to agree upon. And, at the moment, it seems like collective action on the Net is easier to do this way. It is not a matter of shyness or hiding, but a matter of efficacy (or so perceived efficacy). Almeida: we should differentiate hiding and anonymity or “not full” civil disobedience, from unfair laws and how these turn some legal actions into illegal ones. But, of course, civil disobedience has its consequences and hacktivism has to acknowledge them.

Ismael Peña-López: are we fostering hacktivism or rather cracktivism? If a hacker is someone inside the system and a cracker someone trying to (violently) enter it, are we really trying to change the system from within or to crack it? Where are politicians and parties and NGOs and other institutions in this hacktivism or activism from within? Or is it rather cracktivism? Txarlie: most cracking is useful for hacking, so sometimes there is a need for a prior cracking that enables the hacking that follows. Some institutions need to be cracked first so that then the insiders can hack it from within. Almeida: the best insider is the one that hacks and builds bridges with the outsiders. But this hacker-insider has to assume that they will often fall into civil disobedience and acknowledge the consequences… which they usually don’t. We do not want a switch of elites, but a transformation of the system.

Q: is it fair to use private tools (e.g. Facebook) for hacktivism? Almeida: it is fair because it is the best way to contaminate the system without the system being able to disable it. On the other hand, there is not a single tool for hacktivism, but a toolbox, with several tools to be used at different times and scenarios.

Q: what are the technological and economic requisites of hacktivism? Almeida: activism has to fight against the monopolies of power: economic and political power. This means that (1) activism will never fight in equal conditions but (2) activism does need some economic and political resources (armies march on their stomachs, Napoleon). It is very important, though, that these resources are transparent and accountable.

Q: the new constitutions that have to be written, shouldn’t they focus more on the procedures and protocols rather than on “content”? Txarlie: opening procedures and protocols is crucial in activism. But content is also important: if there is nothing “constituted” before a “destitution” process, the outcome of such process can be a worst situation than the former. Almeida: more than protocols and content, decision-making has to be very agile, transparent and executive. This is the way to keep constitutions simple but effective. And this includes a good judicial power, efficient, independent, legitimated.

Digital culture, networks and distributed politics in the age of the Internet (2012)

7th Internet, Law and Politics Congress (IV). Net Neutrality: communications

Notes from the 7th Internet, Law and Politics Congress: Net Neutrality and other challenges for the future of the Internet, organized by the Open University of Catalonia, School of Law and Political Science, and held in Barcelona, Spain, on 11-12 July 2011. More notes on this event: idp2011.

Track on Net Neutrality
Chairs: Rodolfo Tesone Mendizabal, President of the SDTIC (Information and Communication Technology Law Section at the Barcelona Bar Association)

Helena Nadal Sánchez
Without Net Neutrality, where then the universal logic of innovation?

Postmodernism is based on neo-liberal ideologies that do not acknowledge the lockean concept of (necessary, public) control, or the habermassian concept of the agora, the place to meet and share insights and knowledge.

A sustainable development of the Internet should be agreed. Knowledge societies cannot be built if knowledge does not flow freely. The basis of innovation is not only talent, but the exchange of knowledge.

David Arjones Giráldez
Net Neutrality from the perspective of its layer-based architecture: from public carriers to content managers?

The layer-approach to define the Internet is based on splitting it in different layers, at least three: physical layer, logic layer, content and services layer. There are three principles:

  • Each layer must be fully regulated in its own.
  • An agent in a layer must not operate in any other layer.

  • Regulation must be layer-aimed. A specific rule can apply to many of them, but they should not be designed with this goal in mind.

Within this framework, the problem of Net Neutrality can be approached different than usual.

For instance, if operators are tampering on content or services, they are going against the rule where agents cannot operate in but one layer.

Thus, the saturation of the network can be solved with a layer-based new pricing model, but without altering the rest of the layers.

Cristina Cullell March
Net Neutrality and freedoms in the telecommunications reform in the European Union: are they present in whole Europe?

The La Rue report (PDF, 140Kb) for the United Nations (May, 2011) states that access to the Internet should be as a fundamental right. How is Europe treating this right?

Key aspects of Net Neutrality that the EU has already include in their directives:

  • Freedom of choice.
  • Transparency.
  • Quality of service.

European institutions before Net Neutrality:

  • The European Commission thinks an open Internet is a major concern. Indeed, it guarantees the “freedoms on the Internet” of the European citizens, and informs the Council and the Parliament.
  • European Parliament links Net Neutrality with Digital Rights.
  • ORECE: member states are responsible for guaranteeing the neutrality in their territories. Guarantees the normative coherence and harmonization in the European Union. It publicizes good practices.

Does the EU require a complementary regulation on Net Neutrality? Surely we have to work harder on defining transparency and in setting a minimum threshold for quality of service.

José Manuel Pérez Marzabal
Open Internet, Net Neutrality and defence of the competence

There is some overlapping, a symmetry between antitrust regulation and the telcos regulation. And even if maybe the debate around Net Neutrality is not be a debate on the telecommunications’ market competition, more market competition undoubtedly favours major degrees of neutrality.

Clara Marsan Raventós
The Net as a public space: Is Net-neutrality necessary to preserve on-line freedom of expression?

It’s increasingly difficult to think about things one cannot do on the Internet. As a space, people are used to meet in that “space” regardless on who is actually providing the technological platform, only aiming at not being banned or filtered on that public space.

So, as a public space, the Internet becomes more important and the management of the information that populates is becomes a crucial aspect for the society.

Of course there are limits operating on the Internet, as public morality… as anything that already operates in the physical world. The problem being that while the Internet is truly global, such a thing as public morality is exclusively local, cultural, social.

The, which are the actors that can control the Internet and who can say whether public morality should or should not be an issue in the Internet?

There already is a vast array of tools that can be used for censoring content on the Net. And worst of all, those are tools that are decentralized and can be applied at different levels of the chain of content transmission. As tools are widespread, so are the different actors that can apply them in their processes.

Negotiation must then be a multistakeholder one.

7th Internet, Law and Politics Conference (2011)