Journal articles on the topic 'Animal rights activists – Political aspects – United States'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 journal articles for your research on the topic 'Animal rights activists – Political aspects – United States.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jamison, Wesley, James Parker, and Caspar Wenk. "Every Sparrow That Falls: Understanding Animal Rights Activism as Functional Religion." Society & Animals 8, no. 3 (2000): 305–30. http://dx.doi.org/10.1163/156853000511140.

Full text
Abstract:
AbstractThis article reports original research conducted among animal rights activists and elites in Switzerland and the United States, and the finding that activism functioned in activists' and elites' lives like religious belief. The study used reference sampling to select Swiss and American informants. Various articles and activists have identified both latent and manifest quasi-religious components in the contemporary movement. Hence, the research followed upon these data and anecdotes and tested the role of activism in adherents' lives. Using extensive interviews, the research discovered that activists and elites conform to the five necessary components of Yinger's definition of functional religion: intense and memorable conversion experiences, newfound communities of meaning, normative creeds, elaborate and well-defined codes of behavior, and cult formation. The article elaborates on that schema in the context of animal rights belief, elucidates the deeply meaningful role of activism within a filigree of meaning, and concludes that the movement is facing schismatic forces not dissimilar to redemptive and religious movements
APA, Harvard, Vancouver, ISO, and other styles
2

Jamison, Wesley V., Caspar Wenk, and James V. Parker. "Every Sparrow That Falls: Understanding Animal Rights Activism as Functional Religion." Society & Animals 8, no. 1 (2000): 305–30. http://dx.doi.org/10.1163/156853000x00192.

Full text
Abstract:
AbstractThis article reports original research conducted among animal rights activists and elites in Switzerland and the United States, and the finding that activism functioned in activists' and elites' lives like religious belief. The study used reference sampling to select Swiss and American informants.Various articles and activists have identified both latent and manifest quasi-religious components in the contemporary movement Hence, the research followed upon these data and anecdotes and tested the role of activism in adherents' lives. Using extensive interviews, the research discovered that activists and elites conform to the five necessary components of Yinger's definition of functional religion: intense and memorable conversion experiences, newfound communities of meaning, normative creeds, elaborate and well-defined codes of behavior, and cult formation. The article elaborates on that schema in the context of animal rights belief, elucidates the deeply meaningful role of activism within a filigree of meaning, and concludes that the movement is facing schismatic forces not dissimilar to redemptive and religious movements
APA, Harvard, Vancouver, ISO, and other styles
3

Gorski, Paul, Stacy Lopresti-Goodman, and Dallas Rising. "“Nobody’s paying me to cry”: the causes of activist burnout in United States animal rights activists." Social Movement Studies 18, no. 3 (December 25, 2018): 364–80. http://dx.doi.org/10.1080/14742837.2018.1561260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chabot, Sean. "Transnational Diffusion and The African American Reinvention of Gandhian Repertoire." Mobilization: An International Quarterly 5, no. 2 (September 1, 2000): 201–16. http://dx.doi.org/10.17813/maiq.5.2.c433532545p7864n.

Full text
Abstract:
Why did American civil rights activists fail to fully implement the Gandhian repertoire before the Montgomery bus boycott in 1955 and 1956? How did transnational diffusion of the Gandhian repertoire proceed over time? Classical diffusion theory provides a useful starting point for answering these questions, but it does not fully capture the twists and turns occurring in the transnational diffusion of a collective action repertoire. To account for the non-linear and contingent aspects of transnational diffusion between social movements, this article proposes an alternative theoretical framework and applies it to the case of diffusion between the independence movement in India and the civil rights movement in the United States. The historical case study emphasizes collective reinvention of the Gandhian repertoire by American civil rights networks, instead of critical mass or individual thresholds; and the intergenerational transfer of relevant knowledge and experience from these implementation pioneers to the new generation of civil rights movement activists. Finally, the article examines whether its alternative theoretical framework only applies to this particular instance of transnational diffusion or whether it has more general relevance for social movement theory.
APA, Harvard, Vancouver, ISO, and other styles
5

Corson, Catherine, Julia Worcester, Sabine Rogers, and Isabel Flores-Ganley. "From paper to practice? Assembling a rights-based conservation approach." Journal of Political Ecology 27, no. 1 (December 26, 2020): 1128–47. http://dx.doi.org/10.2458/v27i1.23621.

Full text
Abstract:
Drawing on a collaborative ethnographic study of the 2016 International Union for the Conservation of Nature World Conservation Congress (WCC), we analyze how Indigenous peoples and local community (IPLC) rights advocates have used a rights-based approach (RBA) to advance long-standing struggles to secure local communities' land and resource rights and advance governing authority in biodiversity conservation. The RBA has allowed IPLC advocates to draw legitimacy from the United Nations system—from its declarations to its special rapporteurs—and to build transnational strategic alliances in ways they could not with participatory discourses. Using it, they have brought attention to biodiversity as a basic human right and to the struggle to use, access, and own it as a human rights struggle. In this article, we show how the 2016 WCC provided a platform for building and reinforcing these alliances, advancing diverse procedural and substantive rights, redefining key principles and standards for a rights-based conservation approach, and leveraging international support for enforcement mechanisms on-the-ground. We argue that, as advocates staked out physical and discursive space at the venue, they secured the authority to shape conservation politics, shifting the terrain of struggle between strict conservationists and community activists and creating new conditions of possibility for advancing the human rights agenda in international conservation politics. Nonetheless, while RBAs have been politically successful at reconfiguring global discourse, numerous obstacles remain in translating that progress to secure human rights to resources "on the ground", and it is vital that the international conservation community finance the implementation of RBA in specific locales, demand that nation states create monitoring and grievance systems, and decolonize the ways in which they interact with IPLCs. Finally, we reflect on the value of the Collaborative Event Ethnography methodology, with its emphasis on capturing the mundane, meaningful and processual aspects of policymaking, in illuminating the on-going labor entailed in bringing together and aligning the disparate elements in dynamic assemblages.Keywords: Human rights, global conservation governance, collaborative event ethnography, Indigenous peoples
APA, Harvard, Vancouver, ISO, and other styles
6

Wong, Janelle. "TWO STEPS FORWARD." Du Bois Review: Social Science Research on Race 4, no. 2 (2007): 457–67. http://dx.doi.org/10.1017/s1742058x07070257.

Full text
Abstract:
In this essay, I contend that one can understand neither the development of mass action among contemporary immigrants, nor the sporadic nature of that action, without attending to the historic role of parties and community-based organizations in shaping immigrants' political mobilization. I draw connections between the mass immigrant-rights demonstrations that took place during the spring of 2006 and what we know about how immigrants' political participation in the United States is structured by (1) the declining influence of political parties, and (2) the critical function of community-based organizations. These organizations were the focus of my recent book, Democracy's Promise: Immigrants and American Civic Institutions (2006). Why haven't activists been able to sustain the momentum that brought hundreds of thousands of immigrants and their supporters out into the streets during the spring of 2006? Although they, along with the Spanish-language media, played a critical role in organizing mass demonstrations against punitive immigration legislation in early 2006, labor organizations, workers' centers, advocacy and social service organizations, ethnic voluntary associations, and religious institutions face severe constraints in terms of engaging in sustained, consistent political mobilization and, therefore, mainly achieve limited mobilization. However, voter registration data from the National Association of Latino Elected Officials suggest that the demonstrations may have spurred interest in more traditional types of political participation among immigrants and their supporters. Thus, while it is true that, for the most part, political participation does not take place overnight, there may be ways for U.S. civic institutions to speed up that process through direct mobilization and the provision of information that helps immigrants to feel more comfortable and confident taking part in the political system. Trusted community-based institutions represent a vital potential force in promoting political inclusion for immigrant newcomers who contribute to so many other aspects of American life.
APA, Harvard, Vancouver, ISO, and other styles
7

Hartman, Yvonne, and Sandy Darab. "The Power of the Wave: Activism Rainbow Region-Style." M/C Journal 17, no. 6 (September 18, 2014). http://dx.doi.org/10.5204/mcj.865.

Full text
Abstract:
Introduction The counterculture that arose during the 1960s and 1970s left lasting social and political reverberations in developed nations. This was a time of increasing affluence and liberalisation which opened up remarkable political opportunities for social change. Within this context, an array of new social movements were a vital ingredient of the ferment that saw existing norms challenged and the establishment of new rights for many oppressed groups. An expanding arena of concerns included the environmental damage caused by 200 years of industrial capitalism. This article examines one aspect of a current environment movement in Australia, the anti-Coal Seam Gas (CSG) movement, and the part played by participants. In particular, the focus is upon one action that emerged during the recent Bentley Blockade, which was a regional mobilisation against proposed unconventional gas mining (UGM) near Lismore, NSW. Over the course of the blockade, the conventional ritual of waving at passers-by was transformed into a mechanism for garnering broad community support. Arguably, this was a crucial factor in the eventual outcome. In this case, we contend that the wave, rather than a countercultural artefact being appropriated by the mainstream, represents an everyday behaviour that builds social solidarity, which is subverted to become an effective part of the repertoire of the movement. At a more general level, this article examines how counterculture and mainstream interact via the subversion of “ordinary” citizens and the role of certain cultural understandings for that purpose. We will begin by examining the nature of the counterculture and its relationship to social movements before discussing the character of the anti-CSG movement in general and the Bentley Blockade in particular, using the personal experience of one of the writers. We will then be able to explore our thesis in detail and make some concluding remarks. The Counterculture and Social Movements In this article, we follow Cox’s understanding of the counterculture as a kind of meta-movement within which specific social movements are situated. For Cox (105), the counterculture that flourished during the 1960s and 1970s was an overarching movement in which existing social relations—in particular the family—were rejected by a younger generation, who succeeded in effectively fusing previously separate political and cultural spheres of dissent into one. Cox (103-04) points out that the precondition for such a phenomenon is “free space”—conditions under which counter-hegemonic activity can occur—for example, being liberated from the constraints of working to subsist, something which the unprecedented prosperity of the post WWII years allowed. Hence, in the 1960s and 1970s, as the counterculture emerged, a wave of activism arose in the western world which later came to be referred to as new social movements. These included the civil rights movement, women’s liberation, pacifism and the anti-nuclear and environment movements. The new movements rejected established power and organisational structures and tended, some scholars argued, to cross class lines, basing their claims on non-material issues. Della Porta and Diani claim this wave of movements is characterised by: a critical ideology in relation to modernism and progress; decentralized and participatory organizational structures; defense of interpersonal solidarity against the great bureaucracies; and the reclamation of autonomous spaces, rather than material advantages. (9) This depiction clearly announces the countercultural nature of the new social movements. As Carter (91) avers, these movements attempted to bypass the state and instead mobilise civil society, employing a range of innovative tactics and strategies—the repertoire of action—which may involve breaking laws. It should be noted that over time, some of these movements did shift towards accommodation of existing power structures and became more reformist in nature, to the point of forming political parties in the case of the Greens. However, inasmuch as the counterculture represented a merging of distinctively non-mainstream ways of life with the practice of actively challenging social arrangements at a political level (Cox 18–19; Grossberg 15–18;), the tactic of mobilising civil society to join social movements demonstrates in fact a reverse direction: large numbers of people are transfigured in radical ways by their involvement in social movements. One important principle underlying much of the repertoire of action of these new movements was non-violence. Again, this signals countercultural norms of the period. As Sharp (583–86) wrote at the time, non-violence is crucial in that it denies the aggressor their rationale for violent repression. This principle is founded on the liberal notion, whose legacy goes back to Locke, that the legitimacy of the government rests upon the consent of the governed—that is, the people can withdraw their consent (Locke in Ball & Dagger 92). Ghandi also relied upon this idea when formulating his non-violent approach to conflict, satyagraha (Sharp 83–84). Thus an idea that upholds the modern state is adopted by the counterculture in order to undermine it (the state), again demonstrating an instance of counterflow from the mainstream. Non-violence does not mean non-resistance. In fact, it usually involves non-compliance with a government or other authority and when practised in large numbers, can be very effective, as Ghandi and those in the civil rights movement showed. The result will be either that the government enters into negotiation with the protestors, or they can engage in violence to suppress them, which generally alienates the wider population, leading to a loss of support (Finley & Soifer 104–105). Tarrow (88) makes the important point that the less threatening an action, the harder it is to repress. As a result, democratic states have generally modified their response towards the “strategic weapon of nonviolent protest and even moved towards accommodation and recognition of this tactic as legitimate” (Tarrow 172). Nevertheless, the potential for state violence remains, and the freedom to protest is proscribed by various laws. One of the key figures to emerge from the new social movements that formed an integral part of the counterculture was Bill Moyer, who, in conjunction with colleagues produced a seminal text for theorising and organising social movements (Moyer et al.). Many contemporary social movements have been significantly influenced by Moyer’s Movement Action Plan (MAP), which describes not only key theoretical concepts but is also a practical guide to movement building and achieving aims. Moyer’s model was utilised in training the Northern Rivers community in the anti-CSG movement in conjunction with the non-violent direct action (NVDA) model developed by the North-East Forest Alliance (NEFA) that resisted logging in the forests of north-eastern NSW during the late 1980s and 1990s (Ricketts 138–40). Indeed, the Northern Rivers region of NSW—dubbed the Rainbow Region—is celebrated, as a “‘meeting place’ of countercultures and for the articulation of social and environmental ideals that challenge mainstream practice” (Ward and van Vuuren 63). As Bible (6–7) outlines, the Northern Rivers’ place in countercultural history is cemented by the holding of the Aquarius Festival in Nimbin in 1973 and the consequent decision of many attendees to stay on and settle in the region. They formed new kinds of communities based on an alternative ethics that eschewed a consumerist, individualist agenda in favour of modes of existence that emphasised living in harmony with the environment. The Terania Creek campaign of the late 1970s made the region famous for its environmental activism, when the new settlers resisted the logging of Nightcap National Park using nonviolent methods (Bible 5). It was also instrumental in developing an array of ingenious actions that were used in subsequent campaigns such as the Franklin Dam blockade in Tasmania in the early 1980s (Kelly 116). Indeed, many of these earlier activists were key figures in the anti-CSG movement that has developed in the Rainbow Region over the last few years. The Anti-CSG Movement Despite opposition to other forms of UGM, such as tight sands and shale oil extraction techniques, the term anti-CSG is used here, as it still seems to attract wide recognition. Unconventional gas extraction usually involves a process called fracking, which is the injection at high pressure of water, sand and a number of highly toxic chemicals underground to release the gas that is trapped in rock formations. Among the risks attributed to fracking are contamination of aquifers, air pollution from fugitive emissions and exposure to radioactive particles with resultant threats to human and animal health, as well as an increased risk of earthquakes (Ellsworth; Hand 13; Sovacool 254–260). Additionally, the vast amount of water that is extracted in the fracking process is saline and may contain residues of the fracking chemicals, heavy metals and radioactive matter. This produced water must either be stored or treated (Howarth 273–73; Sovacool 255). Further, there is potential for accidents and incidents and there are many reports—particularly in the United States where the practice is well established—of adverse events such as compressors exploding, leaks and spills, and water from taps catching fire (Sovacool 255–257). Despite an abundance of anecdotal evidence, until recently authorities and academics believed there was not enough “rigorous evidence” to make a definitive judgment of harm to animal and human health as a result of fracking (Mitka 2135). For example, in Australia, the Queensland Government was unable to find a clear link between fracking and health complaints in the Tara gasfield (Thompson 56), even though it is known that there are fugitive emissions from these gasfields (Tait et al. 3099-103). It is within this context that grassroots opposition to UGM began in Australia. The largest and most sustained challenge has come from the Northern Rivers of New South Wales, where a company called Metgasco has been attempting to engage in UGM for a number of years. Stiff community opposition has developed over this time, with activists training, co-ordinating and organising using the principles of Moyer’s MAP and NEFA’s NVDA. Numerous community and affinity groups opposing UGM sprang up including the Lock the Gate Alliance (LTG), a grassroots organisation opposing coal and gas mining, which formed in 2010 (Lock the Gate Alliance online). The movement put up sustained resistance to Metgasco’s attempts to establish wells at Glenugie, near Grafton and Doubtful Creek, near Kyogle in 2012 and 2013, despite the use of a substantial police presence at both locations. In the event, neither site was used for production despite exploratory wells being sunk (ABC News; Dobney). Metgasco announced it would be withdrawing its operations following new Federal and State government regulations at the time of the Doubtful Creek blockade. However it returned to the fray with a formal announcement in February 2014 (Metgasco), that it would drill at Bentley, 12 kilometres west of Lismore. It was widely believed this would occur with a view to production on an industrial scale should initial exploration prove fruitful. The Bentley Blockade It was known well before the formal announcement that Metgasco planned to drill at Bentley and community actions such as flash mobs, media releases and planning meetings were part of the build-up to direct action at the site. One of the authors of this article was actively involved in the movement and participated in a variety of these actions. By the end of January 2014 it was decided to hold an ongoing vigil at the site, which was still entirely undeveloped. Participants, including one author, volunteered for four-hour shifts which began at 5 a.m. each day and before long, were lasting into the night. The purpose of a vigil is to bear witness, maintain a presence and express a point of view. It thus accords well with the principle of non-violence. Eventually the site mushroomed into a tent village with three gates being blockaded. The main gate, Gate A, sprouted a variety of poles, tripods and other installations together with colourful tents and shelters, peopled by protesters on a 24-hour basis. The vigils persisted on all three gates for the duration of the blockade. As the number of blockaders swelled, popular support grew, lending weight to the notion that countercultural ideas and practices were spreading throughout the community. In response, Metgasco called on the State Government to provide police to coincide with the arrival of equipment. It was rumoured that 200 police would be drafted to defend the site in late April. When alerts were sent out to the community warning of imminent police action, an estimated crowd of 2000 people attended in the early hours of the morning and the police called off their operation (Feliu). As the weeks wore on, training was stepped up, attendees were educated in non-violent resistance and protestors willing to act as police liaison persons were placed on a rotating roster. In May, the State Government was preparing to send up to 800 police and the Riot Squad to break the blockade (NSW Hansard in Buckingham). Local farmers (now a part of the movement) and activist leaders had gone to Sydney in an effort to find a political solution in order to avoid what threatened to be a clash that would involve police violence. A confluence of events, such as: the sudden resignation of the Premier; revelations via the Independent Commission against Corruption about nefarious dealings and undue influence of the coal industry upon the government; a radio interview with locals by a popular broadcaster in Sydney; and the reputed hesitation of the police themselves in engaging with a group of possibly 7,000 to 10,000 protestors, resulted in the Office for Coal Seam Gas suspending Metgasco’s drilling licence on 15 May (NSW Department of Resources & Energy). The grounds were that the company had not adequately fulfilled its obligations to consult with the community. At the date of writing, the suspension still holds. The Wave The repertoire of contention at the Bentley Blockade was expansive, comprising most of the standard actions and strategies developed in earlier environmental struggles. These included direct blocking tactics in addition to the use of more carnivalesque actions like music and theatre, as well as the use of various media to reach a broader public. Non-violence was at the core of all actions, but we would tentatively suggest that Bentley may have provided a novel addition to the repertoire, stemming originally from the vigil, which brought the first protestors to the site. At the beginning of the vigil, which was initially held near the entrance to the proposed drilling site atop a cutting, occupants of passing vehicles below would demonstrate their support by sounding their horns and/or waving to the vigil-keepers, who at first were few in number. There was a precedent for this behaviour in the campaign leading up to the blockade. Activist groups such as the Knitting Nannas against Gas had encouraged vehicles to show support by sounding their horns. So when the motorists tooted spontaneously at Bentley, we waved back. Occupants of other vehicles would show disapproval by means of rude gestures and/or yelling and we would wave to them as well. After some weeks, as a presence began to be established at the site, it became routine for vigil keepers to smile and wave at all passing vehicles. This often elicited a positive response. After the first mass call-out discussed above, a number of us migrated to another gate, where numbers were much sparser and there was a perceived need for a greater presence. At this point, the participating writer had begun to act as a police liaison person, but the practice of waving routinely was continued. Those protecting this gate usually included protestors ready to block access, the police liaison person, a legal observer, vigil-keepers and a passing parade of visitors. Because this location was directly on the road, it was possible to see the drivers of vehicles and make eye contact more easily. Certain vehicles became familiar, passing at regular times, on the way to work or school, for example. As time passed, most of those protecting the gate also joined the waving ritual to the point where it became like a game to try to prise a signal of acknowledgement from the passing motorists, or even to win over a disapprover. Police vehicles, some of which passed at set intervals, were included in this game. Mostly they waved cheerfully. There were some we never managed to win over, but waving and making direct eye contact with regular motorists over time created a sense of community and an acknowledgement of the work we were doing, as they increasingly responded in kind. Motorists could hardly feel threatened when they encountered smiling, waving protestors. By including the disapprovers, we acted inclusively and our determined good humour seemed to de-escalate demonstrated hostility. Locals who did not want drilling to go ahead but who were nevertheless unwilling to join a direct action were thus able to participate in the resistance in a way that may have felt safe for them. Some of them even stopped and visited the site, voicing their support. Standing on the side of the road and waving to passers-by may seem peripheral to the “real” action, even trivial. But we would argue it is a valuable adjunct to a blockade (which is situated near a road) when one of the strategies of the overall campaign is to win popular backing. Hence waving, whilst not a completely new part of the repertoire, constitutes what Tilly (41–45) would call innovation at the margins, something he asserts is necessary to maintain the effectiveness and vitality of contentious action. In this case, it is arguable that the sheer size of community support probably helped to concentrate the minds of the state government politicians in Sydney, particularly as they contemplated initiating a massive, taxpayer-funded police action against the people for the benefit of a commercial operation. Waving is a symbolic gesture indicating acknowledgement and goodwill. It fits well within a repertoire based on the principle of non-violence. Moreover, it is a conventional social norm and everyday behaviour that is so innocuous that it is difficult to see how it could be suppressed by police or other authorities. Therein lies its subversiveness. For in communicating our common humanity in a spirit of friendliness, we drew attention to the fact that we were without rancour and tacitly invited others to join us and to explore our concerns. In this way, the counterculture drew upon a mainstream custom to develop and extend upon a new form of dissent. This constitutes a reversal of the more usual phenomenon of countercultural artefacts—such as “hippie clothing”—being appropriated or co-opted by the prevailing culture (see Reading). But it also fits with the more general phenomenon that we have argued was occurring; that of enticing ordinary residents into joining together in countercultural activity, via the pathway of a social movement. Conclusion The anti-CSG movement in the Northern Rivers was developed and organised by countercultural participants of previous contentious challenges. It was highly effective in building popular support whilst at the same time forging a loose coalition of various activist groups. We have surveyed one practice—the wave—that evolved out of mainstream culture over the course of the Bentley Blockade and suggested it may come to be seen as part of the repertoire of actions that can be beneficially employed under suitable conditions. Waving to passers-by invites them to become part of the movement in a non-threatening and inclusive way. It thus envelops supporters and non-supporters alike, and its very innocuousness makes it difficult to suppress. We have argued that this instance can be referenced to a similar reverse movement at a broader level—that of co-opting liberal notions and involving the general populace in new practices and activities that undermine the status quo. The ability of the counterculture in general and environment movements in particular to innovate in the quest to challenge and change what it perceives as damaging or unethical practices demonstrates its ingenuity and spirit. This movement is testament to its dynamic nature. References ABC News. Metgasco Has No CSG Extraction Plans for Glenugie. 2013. 30 July 2014 ‹http://www.abc.net.au/news/2013-01-22/metgasco-says-no-csg-extraction-planned-for-glenugie/4477652›. Bible, Vanessa. Aquarius Rising: Terania Creek and the Australian Forest Protest Movement. Bachelor of Arts (Honours) Thesis, University of New England, 2010. 4 Nov. 2014 ‹http://www.rainforestinfo.org.au/terania/Vanessa%27s%20Terania%20Thesis2.pdf›. Buckingham, Jeremy. Hansard of Bentley Blockade Motion 15/05/2014. 16 May 2014. 30 July 2014 ‹http://jeremybuckingham.org/2014/05/16/hansard-of-bentley-blockade-motion-moved-by-david-shoebridge-15052014/›. Carter, Neil. The Politics of the Environment: Ideas, Activism, Policy. 2nd ed. New York: Cambridge UP, 2007. Cox, Laurence. Building Counter Culture: The Radical Praxis of Social Movement Milieu. Helsinki: Into-ebooks 2011. 23 July 2014 ‹http://www.into-ebooks.com/book/building_counter_culture/›. Della Porta, Donatella, and Mario Diani. Social Movements: An Introduction. 2nd ed. Oxford: Blackwell Publishing, 2006. Dobney, Chris. “Drill Rig Heads to Doubtful Creek.” Echo Netdaily Feb. 2013. 30 July 2014 ‹http://www.echo.net.au/2013/02/drill-rig-heads-to-doubtful-creek/›. Ellsworth, William. “Injection-Induced Earthquakes”. Science 341.6142 (2013). DOI: 10.1126/science.1225942. 10 July 2014 ‹http://www.sciencemag.org.ezproxy.scu.edu.au/content/341/6142/1225942.full?sid=b4679ca5-0992-4ad3-aa3e-1ac6356f10da›. Feliu, Luis. “Battle for Bentley: 2,000 Protectors on Site.” Echo Netdaily Mar. 2013. 4 Aug. 2014 ‹http://www.echo.net.au/2014/03/battle-bentley-2000-protectors-site/›. Finley, Mary Lou, and Steven Soifer. “Social Movement Theories and Map.” Doing Democracy: The MAP Model for Organizing Social Movements. Eds. Bill Moyer, Johann McAllister, Mary Lou Finley, and Steven Soifer. Gabriola Island, Canada: New Society Publishers, 2001. Grossberg, Lawrence. “Some Preliminary Conjunctural Thoughts on Countercultures”. Journal of Gender and Power 1.1 (2014). Hand, Eric. “Injection Wells Blamed in Oklahoma Earthquakes.” Science 345.6192 (2014): 13–14. Howarth, Terry. “Should Fracking Stop?” Nature 477 (2011): 271–73. Kelly, Russell. “The Mediated Forest: Who Speaks for the Trees?” Belonging in the Rainbow Region: Cultural Perspectives on the NSW North Coast. Ed. Helen Wilson. Lismore: Southern Cross UP, 2003. 101–20. Lock the Gate Alliance. 2014. 15 July 2014 ‹http://www.lockthegate.org.au/history›. Locke, John. “Toleration and Government.” Ideals and Ideologies: A Reader. Eds. Terence Ball & Richard Dagger. New York: Pearson Longman, 2004 (1823). 79–93. Metgasco. Rosella E01 Environment Approval Received 2104. 4 Aug. 2014 ‹http://www.metgasco.com.au/asx-announcements/rosella-e01-environment-approval-received›. Mitka, Mike. “Rigorous Evidence Slim for Determining Health Risks from Natural Gas Fracking.” The Journal of the American Medical Association 307.20 (2012): 2135–36. Moyer, Bill. “The Movement Action Plan.” Doing Democracy: The MAP Model for Organizing Social Movements. Eds. Bill Moyer, Johann McAllister, Mary Lou Finley, and Steven Soifer. Gabriola Island, Canada: New Society Publishers, 2001. NSW Department of Resources & Energy. “Metgasco Drilling Approval Suspended.” Media Release, 15 May 2014. 30 July 2014 ‹http://www.resourcesandenergy.nsw.gov.au/__data/assets/pdf_file/0005/516749/Metgasco-Drilling-Approval-Suspended.pdf›. Reading, Tracey. “Hip versus Square: 1960s Advertising and Clothing Industries and the Counterculture”. Research Papers 2013. 15 July 2014 ‹http://opensuic.lib.siu.edu/gs_rp/396›. Ricketts, Aiden. “The North East Forest Alliance’s Old-Growth Forest Campaign.” Belonging in the Rainbow Region: Cultural Perspectives on the NSW North Coast. Ed. Helen Wilson. Lismore: Southern Cross UP. 2003. 121–148. Sharp, Gene. The Politics of Nonviolent Action: Power and Struggle. Boston, Mass.: Porter Sargent, 1973. Sovacool, Benjamin K. “Cornucopia or Curse? Reviewing the Costs and Benefits of Shale Gas Hydraulic Fracturing (Fracking).” Renewable and Sustainable Energy Reviews (2014): 249–64. Tait, Douglas, Isaac Santos, Damien Maher, Tyler Cyronak, and Rachael Davis. “Enrichment of Radon and Carbon Dioxide in the Open Atmosphere of an Australian Coal Seam Gas Field.” Environmental Science & Technology 47 (2013): 3099–3104. Tarrow, Sidney. Power in Movement: Social Movements and Contentious Politics. 3rd ed. New York: Cambridge UP, 2011. Thompson, Chuck. “The Fracking Feud.” Medicus 53.8 (2013): 56–57. Tilly, Charles. Regimes and Repertoires. Chicago: UCP, 2006. Ward, Susan, and Kitty van Vuuren. “Belonging to the Rainbow Region: Place, Local Media, and the Construction of Civil and Moral Identities Strategic to Climate Change Adaptability.” Environmental Communication 7.1 (2013): 63–79.
APA, Harvard, Vancouver, ISO, and other styles
8

Hightower, Ben, and Scott East. "Protest in Progress/Progress in Protest." M/C Journal 21, no. 3 (August 15, 2018). http://dx.doi.org/10.5204/mcj.1454.

Full text
Abstract:
To sin by silence, when we should protest,Makes cowards out of men.— Ella Wheeler WilcoxProtest is culturally entwined in historical and juro-political realities and is a fundamental element of the exercise of individual and collective rights. As our title notes, while there are currently many ‘protests in progress’ around the world, there is also a great deal of ‘progress in protest’ in terms of what protests look like, their scale and number, how they are formed and conducted, their goals, how they can be studied, as well as the varying responses formed in relation to protest. The etymology of protest associates two important dynamics pertaining to the topic. Firstly, a protest is something that is put forward, forth, or toward the front (from the Latin pro); essentially, it is in one manner or another, made publically. Secondly, it suggests that a person or persons have beared witness (testis) and instead of remaining silent, have made a declaration or assertion (testari). In other words, someone has made public their disapproval or objection. The nine articles that comprise this issue of M/C Journal on ‘protest’ reminds us of these salient elements of protest. Each, in their own way, highlight the importance of not remaining silent when faced with an injustice or in order to promote social change. As Bill McKibben (7) outlines in his foreword to an excellent collection of protest documents, ‘voices of protest ... are often precisely what propels human civilisation forward and allows it to become unstuck’. However, not all forms of contemporary protest shares ideological or progressive aims. Here, we might consider the emergence of contentious formations such as the alt-right and antifa, what is considered ‘fake’ or ‘real’, and ongoing conflicts between notions of individual and collective rights and state sovereignty.This modest but insightful collection demonstrates the broad scope of this field of inquiry. This issue explores the intersections among social justice, identity and communications technology, as well as the convergences and divergences in the form, function and substance of protest. Through an analysis of protest’s relationship to media, the author’s highlight the possibilities of protest to effect social change. The issue begins with Lakota screenwriter and activist Floris White Bull’s (Floris Ptesáŋ Huŋká) discussion of the documentary AWAKE, a Dream from Standing Rock (2017) and the #NODAPL protest. The film, split into three parts, takes a poignant and quite personal look at the native-led peaceful resistance at the Standing Rock Sioux Reservation in North Dakota in 2016. This protest involved tens of thousands of activists from all over the world who opposed the construction of the Dakota Access Pipeline (DAPL) which was to transport fracked oil directly underneath the Missouri River and through sovereign Lakota land (see Image 1). However, the events at Standing Rock were not a single-issue protest and brought activists together over a range of interrelated issues including environmental protection, human rights, water security, community health and Native American sovereignty. The Water Protectors were also forced to contest racist and disparaging media representations. As such, Standing Rock remains a site of cultural exchange and learning. These protests are not historical, but instead, are an ongoing struggle. The film AWAKE is important as testimony to the injustices at Standing Rock. A short description of the film is first provided in order to provide some additional context to perspectives addressed in the film. From there, White Bull has been invited to respond to questions posed by the editors regarding the Standing Rock Protests and documentary films such as AWAKE. As an Indigenous person fighting for justice, White Bull reminds readers that ‘[t]he path forward is the same as it has always been – holding on to our goals, values and dignity with resilience’.Image 1: Dakota Access Pipeline Protesters, 2016. Photo credit: Indigenous Environmental Network.Cat Pausé and Sandra Grey use an example of fat shaming to investigate how media impacts body politics and determines who is enfranchised to voice public dissent. Media becomes a mechanism for policing and governing bodily norms and gendered identities. As well as outlining a brief history of feminist body activism, the authors draw on personal experience and interview material with activists to reflect on fat embodiment and politics. Also informed by intersectional approaches, their work alerts us to the diverse vectors by which injustice and oppression fall on some bodies differently as well as the diverse bodies assembled in any crowd.Greg Watson suggests that “[c]ontemporary societies are increasingly becoming sites in which it is more difficult for people to respectfully negotiate disagreements about human diversity”. Drawing on his experiences organising Human Libraries throughout Australia, Watson argues these spaces create opportunities for engaging with difference. In this sense Human Libraries can be considered sites which protest the micropublics’ “codes of civility” which produce everyday marginalisations of difference.Micropolitics and creative forms of protest are also central to Ella Cutler, Jacqueline Gothe, and Alexandra Crosby’s article. The author’s consider three design projects which seek to facilitate ethical communication with diverse communities. Drawing on Guy Julier’s tactics for activist design, each project demonstrates the value of slowing down in order to pay attention to experience. In this way, research through design offers a reflexive means for engaging social change.Research practices are also central to making visible community resistance. Anthony McCosker and Timothy Graham consider the role of social networking in urban protests through the campaign to save the iconic Melbourne music venue The Palace (see Image 2). Their article considers the value of social media data and analytics in relation to the court proceedings and trial processes. Given the centrality of social media to activist campaigns their reflections provide a timely evaluation of how data publics are constituted and their ongoing legacy.Image 2: Melbourne’s Palace Theatre before demolition. Photo Credit: Melbourne Heritage Action.For Marcelina Piotrowski pleasure is central to understanding data production and protest. She draws on a Deleuze and Guattarian framework in order to consider protests against oil pipelines in British Columbia. Importantly, through this theoretical framework of ‘data desires’, pleasure is not something owned by the individual subject but rather holds the potential to construct generative social collectivities. This is traced through three different practices: deliberation in online forums; citizen science and social media campaigns. This has important implications for understanding environmental issues and our own enfolding within them. Nadine Kozak takes a look at how Online Service Providers (OSPs) have historically used internet ‘blackouts’ in order to protest United States government regulations. Kozak points to protests against the Communications Decency Act (1996) which sought to regulate online pornographic material and the Stop Online Piracy Act (2011) which proposed increased federal government power to take action against online copyright infringement. Recently, the United States Congress recently passed the Fight Online Sex Trafficking Act (FOSTA) and the Stop Enabling Sex Traffickers Act (SESTA), which hold OSPs liable for third-party content including advertising for prostitution. However, despite condemnation from the Department of Justice and trafficking victims, OSPs did not utilise blackouts as a means to protest these new measures. Kozak concludes that the decision to whether or not to utilise blackout protests is dependent on the interests of technology companies and large OSPs. It is evident that most especially since Donald Trump popularised the term, ‘fake news’ has taken a centre stage in discussions concerning media. In fact, the lines between what is fake and what is official have become blurred. Most recently, QAnon proponents have been attending Trump rallies and speeches giving further visibility to various conspiracy narratives stemming from online message boards (see Image 3). Marc Tuters, Emilija Jokubauskaitė, and Daniel Bach establishe a clear timeline of events in order to trace the origins of ‘#Pizzagate’; a 2016 conspiracy theory that falsely claimed that several U.S. restaurants and high-ranking officials of the Democratic Party were connected with human trafficking and an alleged child-sex ring. The authors investigate the affordances of 4chan to unpack how the site’s anonymity, rapid temporality and user collectivisation were instrumental in creating ‘bullshit’; a usage which the authors suggest is a “technical term for persuasive speech unconcerned with veracity”. This provides an understanding of how alt-right communities are assembled and motivated in a post-truth society. Image 3: QAnon proponents at Trump rally in Tampa, 31 July 2018. Photo credit: Kirby Wilson, Tampa Bay Times.Finally, Colin Salter analyses protests for animal rights as a lens to critique notions of national identity and belonging. Protests on whaling in the Southern Ocean (see Image 4) and live export trade from Australia continue to be highly contested political issues. Salter reflects on the ABC’s 2011 exposé into Australian live animal exports to Indonesia and the 2014 hearings at the International Court of Justice into Japanese whaling. Salter then traces the common elements between animal rights campaigns in order to demonstrate the manner in which the physical bodies of animals, their treatment, and the debate surrounding that treatment become sites for mapping cultural identity, nationhood, and sovereignty. Here, Salter suggests that such inquiry is useful for promoting broader consideration of efficacious approaches to animal advocacy and social change.Image 4: The ship Bob Barker, rammed by the Japanese whaling vessel Nishin Maru. Photo credit: Sea Shepherd Facebook Page. As indicated in the opening paragraphs, it is crucial for people committed to social justice to publically raise their voices in protest. As such, we would like to thank each of the authors for their important contributions to this issue on ‘protest’. In its own way, each contribution serves doubly as a form of protest and a means to understand the topic more clearly. There is solidarity evidenced in this issue. Taken as a whole, these articles attest to the importance of understanding protest and social change.ReferencesMcKibben, B. "Foreword." Voices of Protest: Documents of Courage and Dissent. Eds. Frank Lowenstein, Sheryl Lechner, and Erik Bruun. New York: Black Dog & Leventhal Publishers, 2007. 7-8.Wilcox, E.W. "Protest." Poems of Problems. Chicago: W.B. Conkey Company, 1914.
APA, Harvard, Vancouver, ISO, and other styles
9

Sanders, Shari. "Because Neglect Isn't Cute: Tuxedo Stan's Campaign for a Humane World." M/C Journal 17, no. 2 (March 6, 2014). http://dx.doi.org/10.5204/mcj.791.

Full text
Abstract:
On 10 September 2012, a cat named Tuxedo Stan launched his campaign for mayor of the Halifax Regional Municipality in Nova Scotia, Canada (“Tuxedo Stan for Mayor”). Backed by his human supporters in the Tuxedo Party, he ran on a platform of animal welfare: “Tuxedo Stan for Mayor Because Neglect Isn’t Working.” Artwork Courtesy of Joe Popovitch As a feline activist, Tuxedo Stan joins an unexpected—if not entirely unprecedented—cohort of cats that advocate for animal welfare through their “cute” appeals for humane treatment. From Tuxedo Stan’s internet presence to his appearance on Anderson Cooper’s CNN segment “The RidicuList,” Tuxedo Stan’s cute campaign opens space for a cultural imaginary that differently envisions animals’ and humans’ political responsibilities. Who Can Be a Moral Agent? Iris Marion Young proposes “political responsibility” as a way to answer a question central to human and animal welfare: “How should moral agents—both individual and organizational—think about their responsibilities in relation to structural social injustice?” (7). In legal frameworks, responsibility is connected to liability: an individual acts, harm occurs, and the law decides how much liability the individual should assume. However, Young redefines responsibility in relation to structural injustices, which she conceptualizes as “harms” that result from “structural processes in which many people participate.” Young argues that “because it is therefore difficult for individuals to see a relationship between their own actions and structural outcomes, we have a tendency to distance ourselves from any responsibility for them” (7). Young presents political responsibility as a call to share the responsibility “to engage in actions directed at transforming the structures” and suggests that the less-advantaged might organize and propose “remedies for injustice, because their interests [are] the most acutely at stake” and because they are vulnerable to the actions of others “situated in more powerful and privileged positions” (15). Though Young does not address animals, her conception of responsible agency raises a question: who can be a moral agent? Arguably, the answer to this question changes as cultural imaginaries expand to accommodate difference, including gender- and species-difference. Corey Wrenn analyzes a selection of anti-suffragette postcards that equate granting votes to women as akin to granting votes to cats. Young shifts responsibility from a liability to a political frame, but Wrenn’s work suggests that a further shift is necessary where responsibility is gendered and tied to domestic, feminized roles: Cats and dogs are gendered in contemporary American culture…dogs are thought to be the proper pet for men and cats for women (especially lesbians). This, it turns out, is an old stereotype. In fact, cats were a common symbol in suffragette imagery. Cats represented the domestic sphere, and anti-suffrage postcards often used them to reference female activists. The intent was to portray suffragettes as silly, infantile, incompetent, and ill-suited to political engagement. (Wrenn) Dressing cats in women’s clothing and calling them suffragettes marks women as less-than-human and casts cats as the opposite of human. The frilly garments, worn by cats whose presence evoked the domestic sphere, suggest that women belong in the domestic sphere because they are too soft, or perhaps too cute, to contend with the demands of public life. In addition, the cards that feature domestic scenes suggest that women should account for their families’ welfare ahead of their own, and that women’s refusal to accept this arithmetic marks them as immoral—and irresponsible—subjects. Not Schrödinger's Cat In different ways, Jacques Derrida and Carey Wolfe explore the question Young’s work raises: who can be a moral agent? Derrida and Wolfe complicate the question by adding species difference: how should (human) moral agents think about their responsibilities (to animals)? Prompted by an encounter with his cat, Jacques Derrida follows the figure of the animal, through a variety of texts, in order to make sensible the trace of “the animal” as it has appeared in Western traditions. Derrida’s cat accompanies him as Derrida playfully, and attentively, deconstructs the rationalist, humanist discourses that structure Western philosophy. Discourses, whose tenets reflect the systems of beliefs embedded within a culture, are often both hegemonic and invisible; at least for those who enjoy privileged positions within the culture, discourses may simply appear as common sense or common knowledge. Derrida argues that Western, humanist thinking has created a discourse around “the human” and that this discourse deploys a reductive figure of “the animal” to justify human supremacy and facilitate human exceptionalism. Human exceptionalism is the doctrine that humans’ superiority to animals exempts humans from behaving humanely towards those deemed non-human, and it is the hegemony of the discourse of human exceptionalism that Derrida contravenes. Derrida interrupts by entering the discourse with “his” cat and creating a counter-narrative that troubles “the human” hegemony by redefining what it means to think. Derrida orients his intellectual work as surrender—he surrenders to the gaze of his cat and to his affectionate response to her presence: “the cat I am talking about is a real cat, truly, believe me, a little cat. The cat that looks at me naked and that is truly a little cat, this cat I am talking about…It comes to me as this irreplaceable living being that one day enters my space, into this place where it can encounter me, see me, even see me naked” (6-9, italics in original). The diminutive Derrida uses to describe his cat, she is little and truly a little cat, gestures toward affection, or affect, as the “thing…philosophy has, essentially, had to deprive itself of” (7). For Derrida, rationalist thinking hurries to “enclose and circumscribe the concept of the human as much as that of reason,” and it is through this movement toward enclosure that rationalist humanism fails to think (105). While Derrida questions the ethics of humanist philosophy, Carey Wolfe questions the ethics of humanism. Wolfe argues that “the operative theories and procedures we now have for articulating the social and legal relation between ethics and action are inadequate” because humanism imbues discourses about human and/or animal rights with utilitarian and contractarian logics that are inherently speciesist and therefore flawed (192). Utilitarian approaches attempt to determine the morality of a given action by weighing the act’s aggregate benefit against its aggregate harm. Contractarian approaches evaluate a given (human or animal) subject’s ability to understand and comply with a social contract that stipulates reciprocity; if a subject receives kindness, that subject must understand their implied, moral responsibility to return it. When opponents of animal rights designate animals as less capable of suffering than humans and decide that animals cannot enter moral contracts, animals are then seen as not only undeserving of rights but as incapable of bearing rights. As Wolfe argues, rights discourse—like rationalist humanism—reaches an impasse, and Wolfe proposes posthumanist theory as the way through: “because the discourse of speciesism…anchored in this material, institutional base, can be used to mark any social other, we need to understand that the ethical and philosophical urgency of confronting the institution of speciesism and crafting a posthumanist theory of the subject has nothing to do with whether you like animals” (7, italics in original). Wolfe’s strategic statement marks the necessity of attending to injustice at a structural level; however, as Tuxedo Stan’s campaign demonstrates, at a tactical level, how much you “like” an animal might matter very much. Seriously Cute: Tuxedo Stan as a Moral Agent Tuxedo Stan’s 2012-13 campaign pressed for improved protections for stray and feral cats in the Halifax Regional Municipality (HRM). While “cute” is a subjective, aesthetic judgment, numerous internet sites make claims like: “These 30 Animals With Their Adorable Miniature Versions Are The Cutest Thing Ever. Awwww” (“These 30 Animals”). From Tuxedo Stan’s kitten pictures to the plush versions of Tuxedo Stan, available for purchase on his website, Tuxedo Stan’s campaign positioned him within this cute culture (Chisolm “Official Tuxedo Stan Minion”). Photo Courtesy of Hugh Chisolm, Tuxedo Party The difference between Tuxedo Stan’s cute and the kind of cute invoked by pictures of animals with miniature animals—the difference that connects Tuxedo Stan’s cute to a moral or ethical position—is the narrative of political responsibility attached to his campaign. While existing animal protection laws in Halifax’s Animal Protection Act outlined some protections for animals, “there was a clear oversight in that issues related to cats are not included” (Chisolm TuxedoStan.com). Hugh Chisholm, co-founder of the Tuxedo Party, further notes: There are literally thousands of homeless cats — feral and abandoned— who live by their willpower in the back alleys and streets and bushes in HRM…But there is very little people can do if they want to help, because there is no pound. If there’s a lost or injured dog, you can call the pound and they will come and take the dog and give it a place to stay, and some food and care. But if you do the same thing with a cat, you get nothing, because there’s nothing in place. (Mombourquette) Tuxedo Stan’s campaign mobilizes cute images that reveal the connection between unnoticed and unrelieved suffering. Proceeds from Tuxedo Party merchandise go toward Spay Day HRM, a charity dedicated to “assisting students and low-income families” whose financial situations may prevent them from paying for spay and neuter surgeries (Chisholm TuxedoStan.com). According to his e-book ME: The Tuxedo Stan Story, Stan “wanted to make a difference in the lives of tens of thousands of homeless, unneutered cats in [Halifax Regional Municipality]. We needed a low-cost spay/neuter clinic. We needed a Trap-Neuter-Return and Care program. We needed a sanctuary for homeless, unwanted strays to live out their lives in comfort” (Tuxedo Stanley and Chisholm 14). As does “his” memoir, Tuxedo Stan’s Pledge of Compassion and Action follows Young’s logic of political responsibility. Although his participation is mediated by human organizers, Tuxedo Stan is a cat pressing legislators to “pledge to help the cats” by supporting “a comprehensive feline population control program to humanely control the feline population and prevent suffering” and by creating “an affordable and accessible spay/neuter program” (Chisholm TuxedoStan.com). While framing the feral cat population as a “problem” that must be “fixed” upholds discourses around controlling subjected populations’ reproduction, Tuxedo Stan’s campaign also opens space for a counternarrative that destabilizes the human exceptionalism that encompasses his campaign. A Different ‘Logic’, a Different Cultural Imaginary As Tuxedo Stan launched his campaign in 2012, fellow feline Hank ran for the United States senate seat in Virginia – he received approximately 7,000 votes and placed third (Wyatt) – and “Mayor” Stubbs celebrated his 15th year as the honorary mayor of Talkeetna, Alaska, also in the United States: Fifteen years ago, the citizens of Talkeetna (pop. 800) didn’t like the looks of their candidates for mayor. Around that same time resident Lauri Stec, manager of Nagley’s General Store, saw a box of kittens and decided to adopt one. She named him Stubbs because he didn’t have a tail and soon the whole town was in love with him. So smitten were they with this kitten, in fact, that they wrote him in for mayor instead of deciding on one of the two lesser candidates. (Friedman) Though only Stan and Hank connect their candidacy to animal welfare activism, all three cats’ stories contribute to building a cultural imaginary that has drawn responses across social and news media. Tuxedo Stan’s Facebook page has 19,000+ “likes,” and Stan supporters submit photographs of Tuxedo Stan “minions” spreading Tuxedo Stan’s message. The Tuxedo Party’s website maintains a photo gallery that documents “Tuxedo Stan’s World Tour”: “Tuxedo Stan’s Minions are currently on their world tour spreading his message of hope and compassion for felines around the globe" (Chisholm TuxedoStan.com). Each minion’s photo in the gallery represents humans’ ideological and financial support for Tuxedo Stan. News media supported Tuxedo Stan, Hank for Senate, and Mayor Stubbs’s candidacies in a more ambiguous fashion. While Craig Medred argues that “Silly 'Alaska cat mayor' saga spotlights how easily the media can be scammed” (Medred), a CBC News video announced that Tuxedo Stan was “interested in sinking his claws into the top seat at City Hall” and ready to “mark his territory around the mayor's seat” (“Tuxedo Stan the cat chases Halifax mayor chair”), and Lauren Strapagiel reported on Halifax’s “cuddliest would-be mayor.” In an unexpected echo of Derrida’s language, as Derrida repeats that he is truly talking about a cat, truly a little cat, CNN journalist Anderson Cooper endorses Tuxedo Stan for mayor and follows his endorsement with this statement: If he’s serious about a career in politics, maybe he should come to the United States. Just look at the mayor of Talkeetna, Alaska. That’s Stubbs the cat, and he’s been the mayor for 15 years. I’m not kidding…Not only that, but right now, as we speak, there is a cat running for Senate from Virginia. (Cooper) As he introduces a “Hank for Senate” campaign video, again Cooper mentions that he is “not kidding.” While Cooper’s “not kidding” echoes Derrida’s “truly,” the difference in meanings is différance. For Derrida, his encounter with his cat is “a matter of developing another ‘logic’ of decision, of the response and of the event…a matter of reinscribing the différance between reaction and response, and hence this historicity of ethical, juridical, or political responsibility, within another thinking of life, of the living, within another relation of the living, to their own…reactional automaticity” (126). Derrida proceeds through the impasse, the limit he identifies within philosophical engagements with animals, by tracing the ways his little cat’s presence affects him. Derrida finds another logic, which is not logic but surrender, to accommodate what he, like Young, terms “political responsibility.” Cooper, however, applies the hegemonic logic of human exceptionalism to his engagement with feline interlocutors, Tuxedo Stan, Hank for Senate, and Mayor Stubbs. Although Cooper’s segment, called “The RidicuList,” makes a pretense of political responsibility, it is different in kind from the pretense made in Tuxedo Stan’s campaign. As Derrida argues, a “pretense…even a simple pretense, consists in rendering a sensible trace illegible or imperceptible” (135). Tuxedo Stan’s campaign pretends that Tuxedo Stan fits within humanist, hegemonic notions of mayoral candidacy and then mobilizes this cute pretense in aid of political responsibility; the pretense—the pretense in which Tuxedo Stan’s human fans and supporters engage—renders the “sensible” trace of human exceptionalism illegible, if not imperceptible. Cooper’s pretense, however, works to make legible the trace of human exceptionalism and so to reinscribe its discursive hegemony. Discursively, the political potential of cute in Tuxedo Stan’s campaign is that Tuxedo Stan’s activism complicates humanist and posthumanist thinking about agency, about ethics, and about political responsibility. Thinking about animals may not change animals’ lives, but it may change (post)humans’ responses to these questions: Who can be a moral agent? How should moral agents—both individual and organizational, both human and animal—“think” about how they respond to structural social injustice? Epilogue: A Political Response Tuxedo Stan died of kidney cancer on 8 September 2013. Before he died, Tuxedo Stan’s campaign yielded improved cat protection legislation as well as a $40,000 endowment to create a spay-and-neuter facility accessible to low-income families. Tuxedo Stan’s litter mate, Earl Grey, carries on Tuxedo Stan’s work. Earl Grey’s campaign platform expands the Tuxedo Party’s appeals for animal welfare, and Earl Grey maintains the Tuxedo Party’s presence on Facebook, on Twitter (@TuxedoParty and @TuxedoEarlGrey), and at TuxedoStan.com (Chisholm TuxedoStan.com). On 27 February 2014, Agriculture Minister Keith Colwell of Nova Scotia released draft legislation whose standards of care aim to prevent distress and cruelty to pets and to strengthen their protection. They…include proposals on companion animal restraints, outdoor care, shelters, companion animal pens and enclosures, abandonment of companion animals, as well as the transportation and sale of companion animals…The standards also include cats, and the hope is to have legislation ready to introduce in the spring and enacted by the fall. (“Nova Scotia cracks down”) References Chisolm, Hugh. “Tuxedo Stan Kitten.” Tuxedo Party Facebook Page, 20 Oct. 2012. 2 Mar. 2014. Chisholm, Hugh. “Official Tuxedo Stan Minion.” TuxedoStan.com. Tuxedo Stanley and the Tuxedo Party. 2 Mar. 2014. Chisolm, Hugh. “You're Voting for Fred? Not at MY Polling Station!” Tuxedo Party Facebook Page, 20 Oct. 2012. 2 Mar. 2014. Chisholm, Hugh, and Kathy Chisholm. TuxedoStan.com. Tuxedo Stanley and the Tuxedo Party. 2 Mar. 2014. Cooper, Anderson. “The RidicuList.” CNN Anderson Cooper 360, 24 Sep. 2012. 2 Mar. 2014. Crenshaw, Kimberlé. “Demarginalizing the Intersection of Race and Sex: A Black Feminist Critique of Antidiscrimination Doctrine, Feminist Theory and Antiracist Politics.” University of Chicago Legal Forum 1989: 139–67. 2 Mar. 2014. Derrida, Jacques. The Animal That Therefore I Am. Trans. David Willis. New York: Fordham University Press, 2008. Friedman, Amy. “Cat Marks 15 Years as Mayor of Alaska Town.” Newsfeed.time.com, 17 July 2012. 2 March 2014. Medred, Craig. “Silly ‘Alaska Cat Mayor’ Saga Spotlights How Easily the Media Can Be Scammed.” Alaska Dispatch, 11 Sep. 2014. 2 Mar. 2014. Mombourquette, Angela. “Candidate’s Ethics Are as Finely Honed as His Claws.” The Chronicle Herald, 27 Aug. 2012. 2 Mar. 2014. “Nova Scotia Cracks Down on Tethering of Dogs.” The Chronicle Herald 27 Feb. 2014. 2 Mar. 2014. Pace, Natasha. “Halifax City Council Doles Out Cash to Help Control the Feral Cat Population.” Global News 14 May 2013. 2 Mar. 2014. Popovitch, Joe. “Tuxedo Stan for Mayor Because Neglect Isn’t Working.” RefuseToBeBoring.com. 2 Mar. 2014. Strapagiel, Lauren. “Tuxedo Stan, Beloved Halifax Cat Politician, Dead at 3.” OCanada.com, 9 Sep. 2013. 2 Mar. 2014. “These 30 Animals with Their Adorable Miniatures Are the Cutest Thing Ever. Awwww.” WorthyToShare.com, n.d. 2 Mar. 2014. “Tuxedo Stan for Mayor Dinner Highlights.” Vimeo.com, 2 Mar. 2014. Tuxedo Stanley, and Kathy Chisholm. ME: The Tuxedo Stan Story. Upper Tantallon, Nova Scotia: Ailurophile Publishing, 2014. 2 Mar. 2014. “Tuxedo Stan the Cat Chases Halifax Mayor Chair.” CBC News, 13 Aug. 2012. 2 Mar. 2014. Wolfe, Cary. Animal Rites: American Culture, the Discourse of Species, and Posthumanist Theory. Chicago: University of Chicago Press, 2003. Wrenn, Corey. “Suffragette Cats Are the Original Cat Ladies.” Jezebel.com, 6 Dec. 2013. 2 Mar. 2014. Wyatt, Susan. “Hank, the Cat Who Ran for Virginia Senate, Gets MMore than 7,000 Votes.” King5.com The Pet Dish, 7 Nov. 2012. 2 Mar. 2014. Young, Iris Marion. “Political Responsibility and Structural Injustice.” Lindley Lecture. Department of Philosophy, University of Kansas. 5 May 2003.
APA, Harvard, Vancouver, ISO, and other styles
10

Burns, Alex. "The Worldflash of a Coming Future." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2168.

Full text
Abstract:
History is not over and that includes media history. Jay Rosen (Zelizer & Allan 33) The media in their reporting on terrorism tend to be judgmental, inflammatory, and sensationalistic. — Susan D. Moeller (169) In short, we are directed in time, and our relation to the future is different than our relation to the past. All our questions are conditioned by this asymmetry, and all our answers to these questions are equally conditioned by it. Norbert Wiener (44) The Clash of Geopolitical Pundits America’s geo-strategic engagement with the world underwent a dramatic shift in the decade after the Cold War ended. United States military forces undertook a series of humanitarian interventions from northern Iraq (1991) and Somalia (1992) to NATO’s bombing campaign on Kosovo (1999). Wall Street financial speculators embraced market-oriented globalization and technology-based industries (Friedman 1999). Meanwhile the geo-strategic pundits debated several different scenarios at deeper layers of epistemology and macrohistory including the breakdown of nation-states (Kaplan), the ‘clash of civilizations’ along religiopolitical fault-lines (Huntington) and the fashionable ‘end of history’ thesis (Fukuyama). Media theorists expressed this geo-strategic shift in reference to the ‘CNN Effect’: the power of real-time media ‘to provoke major responses from domestic audiences and political elites to both global and national events’ (Robinson 2). This media ecology is often contrasted with ‘Gateholder’ and ‘Manufacturing Consent’ models. The ‘CNN Effect’ privileges humanitarian and non-government organisations whereas the latter models focus upon the conformist mind-sets and shared worldviews of government and policy decision-makers. The September 11 attacks generated an uncertain interdependency between the terrorists, government officials, and favourable media coverage. It provided a test case, as had the humanitarian interventions (Robinson 37) before it, to test the claim by proponents that the ‘CNN Effect’ had policy leverage during critical stress points. The attacks also revived a long-running debate in media circles about the risk factors of global media. McLuhan (1964) and Ballard (1990) had prophesied that the global media would pose a real-time challenge to decision-making processes and that its visual imagery would have unforeseen psychological effects on viewers. Wark (1994) noted that journalists who covered real-time events including the Wall Street crash (1987) and collapse of the Berlin Wall (1989) were traumatised by their ‘virtual’ geographies. The ‘War on Terror’ as 21st Century Myth Three recent books explore how the 1990s humanitarian interventions and the September 11 attacks have remapped this ‘virtual’ territory with all too real consequences. Piers Robinson’s The CNN Effect (2002) critiques the theory and proposes the policy-media interaction model. Barbie Zelizer and Stuart Allan’s anthology Journalism After September 11 (2002) examines how September 11 affected the journalists who covered it and the implications for news values. Sandra Silberstein’s War of Words (2002) uncovers how strategic language framed the U.S. response to September 11. Robinson provides the contextual background; Silberstein contributes the specifics; and Zelizer and Allan surface broader perspectives. These books offer insights into the social construction of the nebulous War on Terror and why certain images and trajectories were chosen at the expense of other possibilities. Silberstein locates this world-historical moment in the three-week transition between September 11’s aftermath and the U.S. bombings of Afghanistan’s Taliban regime. Descriptions like the ‘War on Terror’ and ‘Axis of Evil’ framed the U.S. military response, provided a conceptual justification for the bombings, and also brought into being the geo-strategic context for other nations. The crucial element in this process was when U.S. President George W. Bush adopted a pedagogical style for his public speeches, underpinned by the illusions of communal symbols and shared meanings (Silberstein 6-8). Bush’s initial address to the nation on September 11 invoked the ambiguous pronoun ‘we’ to recreate ‘a unified nation, under God’ (Silberstein 4). The 1990s humanitarian interventions had frequently been debated in Daniel Hallin’s sphere of ‘legitimate controversy’; however the grammar used by Bush and his political advisers located the debate in the sphere of ‘consensus’. This brief period of enforced consensus was reinforced by the structural limitations of North American media outlets. September 11 combined ‘tragedy, public danger and a grave threat to national security’, Michael Schudson observed, and in the aftermath North American journalism shifted ‘toward a prose of solidarity rather than a prose of information’ (Zelizer & Allan 41). Debate about why America was hated did not go much beyond Bush’s explanation that ‘they hated our freedoms’ (Silberstein 14). Robert W. McChesney noted that alternatives to the ‘war’ paradigm were rarely mentioned in the mainstream media (Zelizer & Allan 93). A new myth for the 21st century had been unleashed. The Cycle of Integration Propaganda Journalistic prose masked the propaganda of social integration that atomised the individual within a larger collective (Ellul). The War on Terror was constructed by geopolitical pundits as a Manichean battle between ‘an “evil” them and a national us’ (Silberstein 47). But the national crisis made ‘us’ suddenly problematic. Resurgent patriotism focused on the American flag instead of Constitutional rights. Debates about military tribunals and the USA Patriot Act resurrected the dystopian fears of a surveillance society. New York City mayor Rudy Guiliani suddenly became a leadership icon and Time magazine awarded him Person of the Year (Silberstein 92). Guiliani suggested at the Concert for New York on 20 October 2001 that ‘New Yorkers and Americans have been united as never before’ (Silberstein 104). Even the series of Public Service Announcements created by the Ad Council and U.S. advertising agencies succeeded in blurring the lines between cultural tolerance, social inclusion, and social integration (Silberstein 108-16). In this climate the in-depth discussion of alternate options and informed dissent became thought-crimes. The American Council of Trustees and Alumni’s report Defending Civilization: How Our Universities are Failing America (2002), which singled out “blame America first” academics, ignited a firestorm of debate about educational curriculums, interpreting history, and the limits of academic freedom. Silberstein’s perceptive analysis surfaces how ACTA assumed moral authority and collective misunderstandings as justification for its interrogation of internal enemies. The errors she notes included presumed conclusions, hasty generalisations, bifurcated worldviews, and false analogies (Silberstein 133, 135, 139, 141). Op-ed columnists soon exposed ACTA’s gambit as a pre-packaged witch-hunt. But newscasters then channel-skipped into military metaphors as the Afghanistan campaign began. The weeks after the attacks New York City sidewalk traders moved incense and tourist photos to make way for World Trade Center memorabilia and anti-Osama shirts. Chevy and Ford morphed September 11 catchphrases (notably Todd Beamer’s last words “Let’s Roll” on Flight 93) and imagery into car advertising campaigns (Silberstein 124-5). American self-identity was finally reasserted in the face of a domestic recession through this wave of vulgar commercialism. The ‘Simulated’ Fall of Elite Journalism For Columbia University professor James Carey the ‘failure of journalism on September 11’ signaled the ‘collapse of the elites of American journalism’ (Zelizer & Allan 77). Carey traces the rise-and-fall of adversarial and investigative journalism from the Pentagon Papers and Watergate through the intermediation of the press to the myopic self-interest of the 1988 and 1992 Presidential campaigns. Carey’s framing echoes the earlier criticisms of Carl Bernstein and Hunter S. Thompson. However this critique overlooks several complexities. Piers Robinson cites Alison Preston’s insight that diplomacy, geopolitics and elite reportage defines itself through the sense of distance from its subjects. Robinson distinguished between two reportage types: distance framing ‘creates emotional distance’ between the viewers and victims whilst support framing accepts the ‘official policy’ (28). The upsurge in patriotism, the vulgar commercialism, and the mini-cycle of memorabilia and publishing all combined to enhance the support framing of the U.S. federal government. Empathy generated for September 11’s victims was tied to support of military intervention. However this closeness rapidly became the distance framing of the Afghanistan campaign. News coverage recycled the familiar visuals of in-progress bombings and Taliban barbarians. The alternative press, peace movements, and social activists then retaliated against this coverage by reinstating the support framing that revealed structural violence and gave voice to silenced minorities and victims. What really unfolded after September 11 was not the demise of journalism’s elite but rather the renegotiation of reportage boundaries and shared meanings. Journalists scoured the Internet for eyewitness accounts and to interview survivors (Zelizer & Allan 129). The same medium was used by others to spread conspiracy theories and viral rumors that numerology predicted the date September 11 or that the “face of Satan” could be seen in photographs of the World Trade Center (Zelizer & Allan 133). Karim H. Karim notes that the Jihad frame of an “Islamic Peril” was socially constructed by media outlets but then challenged by individual journalists who had learnt ‘to question the essentialist bases of her own socialization and placing herself in the Other’s shoes’ (Zelizer & Allan 112). Other journalists forgot that Jihad and McWorld were not separate but two intertwined worldviews that fed upon each other. The September 11 attacks on the Pentagon and the World Trade Center also had deep symbolic resonances for American sociopolitical ideals that some journalists explored through analysis of myths and metaphors. The Rise of Strategic Geography However these renegotiated boundariesof new media, multiperspectival frames, and ‘layered’ depth approaches to issues analysiswere essentially minority reports. The rationalist mode of journalism was soon reasserted through normative appeals to strategic geography. The U.S. networks framed their documentaries on Islam and the Middle East in bluntly realpolitik terms. The documentary “Minefield: The United States and the Muslim World” (ABC, 11 October 2001) made explicit strategic assumptions of ‘the U.S. as “managing” the region’ and ‘a definite tinge of superiority’ (Silberstein 153). ABC and CNN stressed the similarities between the world’s major monotheistic religions and their scriptural doctrines. Both networks limited their coverage of critiques and dissent to internecine schisms within these traditions (Silberstein 158). CNN also created different coverage for its North American and international audiences. The BBC was more cautious in its September 11 coverage and more global in outlook. Three United Kingdom specials – Panorama (Clash of Cultures, BBC1, 21 October 2001), Question Time (Question Time Special, BBC1, 13 September 2001), and “War Without End” (War on Trial, Channel 4, 27 October 2001) – drew upon the British traditions of parliamentary assembly, expert panels, and legal trials as ways to explore the multiple dimensions of the ‘War on Terror’ (Zelizer & Allan 180). These latter debates weren’t value free: the programs sanctioned ‘a tightly controlled and hierarchical agora’ through different containment strategies (Zelizer & Allan 183). Program formats, selected experts and presenters, and editorial/on-screen graphics were factors that pre-empted the viewer’s experience and conclusions. The traditional emphasis of news values on the expert was renewed. These subtle forms of thought-control enabled policy-makers to inform the public whilst inoculating them against terrorist propaganda. However the ‘CNN Effect’ also had counter-offensive capabilities. Osama bin Laden’s videotaped sermons and the al-Jazeera network’s broadcasts undermined the psychological operations maxim that enemies must not gain access to the mindshare of domestic audiences. Ingrid Volkmer recounts how the Los Angeles based National Iranian Television Network used satellite broadcasts to criticize the Iranian leadership and spark public riots (Zelizer & Allan 242). These incidents hint at why the ‘War on Terror’ myth, now unleashed upon the world, may become far more destabilizing to the world system than previous conflicts. Risk Reportage and Mediated Trauma When media analysts were considering the ‘CNN Effect’ a group of social contract theorists including Anthony Giddens, Zygmunt Bauman, and Ulrich Beck were debating, simultaneously, the status of modernity and the ‘unbounded contours’ of globalization. Beck termed this new environment of escalating uncertainties and uninsurable dangers the ‘world risk society’ (Beck). Although they drew upon constructivist and realist traditions Beck and Giddens ‘did not place risk perception at the center of their analysis’ (Zelizer & Allan 203). Instead this was the role of journalist as ‘witness’ to Ballard-style ‘institutionalized disaster areas’. The terrorist attacks on September 11 materialized this risk and obliterated the journalistic norms of detachment and objectivity. The trauma ‘destabilizes a sense of self’ within individuals (Zelizer & Allan 205) and disrupts the image-generating capacity of collective societies. Barbie Zelizer found that the press selection of September 11 photos and witnesses re-enacted the ‘Holocaust aesthetic’ created when Allied Forces freed the Nazi internment camps in 1945 (Zelizer & Allan 55-7). The visceral nature of September 11 imagery inverted the trend, from the Gulf War to NATO’s Kosovo bombings, for news outlets to depict war in detached video-game imagery (Zelizer & Allan 253). Coverage of the September 11 attacks and the subsequent Bali bombings (on 12 October 2002) followed a four-part pattern news cycle of assassinations and terrorism (Moeller 164-7). Moeller found that coverage moved from the initial event to a hunt for the perpetrators, public mourning, and finally, a sense of closure ‘when the media reassert the supremacy of the established political and social order’ (167). In both events the shock of the initial devastation was rapidly followed by the arrest of al Qaeda and Jamaah Islamiyah members, the creation and copying of the New York Times ‘Portraits of Grief’ template, and the mediation of trauma by a re-established moral order. News pundits had clearly studied the literature on bereavement and grief cycles (Kubler-Ross). However the neo-noir work culture of some outlets also fueled bitter disputes about how post-traumatic stress affected journalists themselves (Zelizer & Allan 253). Reconfiguring the Future After September 11 the geopolitical pundits, a reactive cycle of integration propaganda, pecking order shifts within journalism elites, strategic language, and mediated trauma all combined to bring a specific future into being. This outcome reflected the ‘media-state relationship’ in which coverage ‘still reflected policy preferences of parts of the U.S. elite foreign-policy-making community’ (Robinson 129). Although Internet media and non-elite analysts embraced Hallin’s ‘sphere of deviance’ there is no clear evidence yet that they have altered the opinions of policy-makers. The geopolitical segue from September 11 into the U.S.-led campaign against Iraq also has disturbing implications for the ‘CNN Effect’. Robinson found that its mythic reputation was overstated and tied to issues of policy certainty that the theory’s proponents often failed to examine. Media coverage molded a ‘domestic constituency ... for policy-makers to take action in Somalia’ (Robinson 62). He found greater support in ‘anecdotal evidence’ that the United Nations Security Council’s ‘safe area’ for Iraqi Kurds was driven by Turkey’s geo-strategic fears of ‘unwanted Kurdish refugees’ (Robinson 71). Media coverage did impact upon policy-makers to create Bosnian ‘safe areas’, however, ‘the Kosovo, Rwanda, and Iraq case studies’ showed that the ‘CNN Effect’ was unlikely as a key factor ‘when policy certainty exists’ (Robinson 118). The clear implication from Robinson’s studies is that empathy framing, humanitarian values, and searing visual imagery won’t be enough to challenge policy-makers. What remains to be done? Fortunately there are some possibilities that straddle the pragmatic, realpolitik and emancipatory approaches. Today’s activists and analysts are also aware of the dangers of ‘unfreedom’ and un-reflective dissent (Fromm). Peter Gabriel’s organisation Witness, which documents human rights abuses, is one benchmark of how to use real-time media and the video camera in an effective way. The domains of anthropology, negotiation studies, neuro-linguistics, and social psychology offer valuable lessons on techniques of non-coercive influence. The emancipatory tradition of futures studies offers a rich tradition of self-awareness exercises, institution rebuilding, and social imaging, offsets the pragmatic lure of normative scenarios. The final lesson from these books is that activists and analysts must co-adapt as the ‘War on Terror’ mutates into new and terrifying forms. Works Cited Amis, Martin. “Fear and Loathing.” The Guardian (18 Sep. 2001). 1 March 2001 <http://www.guardian.co.uk/Archive/Article/0,4273,4259170,00.php>. Ballard, J.G. The Atrocity Exhibition (rev. ed.). Los Angeles: V/Search Publications, 1990. Beck, Ulrich. World Risk Society. Malden, MA: Polity Press, 1999. Ellul, Jacques. Propaganda: The Formation of Men’s Attitudes. New York: Vintage Books, 1973. Friedman, Thomas. The Lexus and the Olive Tree. New York: Farrar, Straus & Giroux, 1999. Fromm, Erich. Escape from Freedom. New York: Farrar & Rhinehart, 1941. Fukuyama, Francis. The End of History and the Last Man. New York: Free Press, 1992. Huntington, Samuel P. The Clash of Civilizations and the Remaking of World Order. New York: Simon & Schuster, 1996. Kaplan, Robert. The Coming Anarchy: Shattering the Dreams of the Post Cold War. New York: Random House, 2000. Kubler-Ross, Elizabeth. On Death and Dying. London: Tavistock, 1969. McLuhan, Marshall. Understanding Media: The Extensions of Man. London: Routledge & Kegan Paul, 1964. Moeller, Susan D. Compassion Fatigue: How the Media Sell Disease, Famine, War, and Death. New York: Routledge, 1999. Robinson, Piers. The CNN Effect: The Myth of News, Foreign Policy and Intervention. New York: Routledge, 2002. Silberstein, Sandra. War of Words: Language, Politics and 9/11. New York: Routledge, 2002. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wiener, Norbert. Cybernetics: Or Control and Communication in the Animal and the Machine. New York: John Wiley & Sons, 1948. Zelizer, Barbie, and Stuart Allan (eds.). Journalism after September 11. New York: Routledge, 2002. Links http://www.guardian.co.uk/Archive/Article/0 Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Burns, Alex. "The Worldflash of a Coming Future" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0304/08-worldflash.php>. APA Style Burns, A. (2003, Apr 23). The Worldflash of a Coming Future. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0304/08-worldflash.php>
APA, Harvard, Vancouver, ISO, and other styles
11

DeCook, Julia Rose. "Trust Me, I’m Trolling: Irony and the Alt-Right’s Political Aesthetic." M/C Journal 23, no. 3 (July 7, 2020). http://dx.doi.org/10.5204/mcj.1655.

Full text
Abstract:
In August 2017, a white supremacist rally marketed as “Unite the Right” was held in Charlottesville, Virginia. In participation were members of the alt-right, including neo-nazis, white nationalists, neo-confederates, and other hate groups (Atkinson). The rally swiftly erupted in violence between white supremacists and counter protestors, culminating in the death of a counter-protester named Heather Heyer, who was struck by a car driven by white supremacist James Alex Fields, and leaving dozens injured. Terry McQuliffe, the Governor of Virginia, declared a state of emergency on August 12, and the world watched while white supremacists boldly marched in clothing emblazoned with symbols ranging from swastikas to a cartoon frog (Pepe), with flags featuring the nation of “Kekistan”, and carrying tiki torches chanting, “You Will Not Replace Us... Jews Will Not Replace Us”.The purpose of this essay is not, however, to examine the Internet symbols that circulated during the Unite the Right rally but rather to hone in on a specific moment that illustrates a key part of Internet culture that was often overlooked during analysis of the events that occurred during the riots: a documentary filmmaker, C. J. Hunt, was at the rally to record footage for a project on the removal of Confederate monuments. While there, he saw a rally-goer dressed in the white polo t-shirt and khaki pants uniform of the white nationalist group Vanguard America. The rally-goer, a young white man, was being chased by a counter-protester. He began to scream and beg for mercy, and even went as far as stripping off his clothing and denying that he really believed in any of the group’s ideology. In the recording by Hunt, who asks why he was there and why he was undressing, the young white man responded that shouting white power is “fun”, and that he was participating in the event because he, quote, “likes to be offensive” (Hunt).As Hunt notes in a piece for GQ reflecting on his experience at the rally, as soon as the man was cut off from his group and confronted, the runaway racist’s demeanor immediately changed when he had to face the consequences of his actions. Trolls often rely on the safety and anonymity of online forums and digital spaces where they are often free from having to face the consequences of their actions, and for the runaway racist, things became real very quickly when he was forced to own up to his hateful actions. In a way, many members of these movements seem to want politics without consequence for themselves, but with significant repercussions for others. Milo Yiannopoulos, a self-professed “master troll”, built an entire empire worth millions of dollars off of what the far-right defends as ironic hate speech and a form of politics without consequences reserved only for the privileged white men that gleefully engage in it. The runaway racist and Yiannopoulos are borne out of an Internet culture that is built on being offensive, on trolling, and “troll” itself being an aspirational label and identity, but also more importantly, a political aesthetic.In this essay, I argue that trolling itself has become a kind of political aesthetic and identity, and provide evidence via examples like hoaxes, harassment campaigns, and the use of memes to signal to certain online populations and extremist groups in violent attacks. First coined by Walter Benjamin in order to explain a fundamental component of using art to foster consent and compliance in fascist regimes, the term since then has evolved to encompass far more than just works of art. Benjamin’s original conception of the term is in regard to a creation of a spectacle that prevents the masses from recognizing their rights – in short, the aestheticization of politics is not just about the strategies of the fascist regimes themselves but says more about the subjects within them. In the time of Benjamin’s writing, the specific medium was mass propaganda through the newly emerging film industry and other forms of art (W. Benjamin). To Benjamin, these aesthetics served as tools of distracting to make fascism more palatable to the masses. Aesthetic tools of distraction serve an affective purpose, revealing the unhappy consciousness of neoreactionaries (Hui), and provide an outlet for their resentment.Since political aesthetics are concerned with how cultural products like art, film, and even clothing reflect political ideologies and beliefs (Sartwell; McManus; Miller-Idriss), the objects of analysis in this essay are part of the larger visual culture of the alt-right (Bogerts and Fielitz; Stanovsky). Indeed, aesthetic aspects of political systems shift their meaning over time, or are changed and redeployed with transformed effect (Sartwell). In this essay, I am applying the concept of the aestheticization of politics by analyzing how alt-right visual cultures deploy distraction and dissimulation to advance their political agenda through things like trolling campaigns and hoaxes. By analyzing these events, their use of memes, trolling techniques, and their influence on mainstream culture, what is revealed is the influence of trolling on political culture for the alt-right and how the alt-right then distracts the rest of the public (McManus).Who’s Afraid of the Big Bad Troll?Large scale analyses of disinformation and extremist content online tends to examine how certain actors are connected, what topics emerge and how these are connected across platforms, and the ways that disinformation campaigns operate in digital environments (Marwick and Lewis; Starbird; Benkler et al.). Masculine and white-coded technology gave rise to male-dominated digital spaces (R. Benjamin), with trolling often being an issue faced by non-normative users of the Internet and their communities (Benjamin; Lumsden and Morgan; Nakamura; Phillips, Oxygen). Creating a kind of unreality where it is difficult to parse out truth from lies, fiction from non-fiction, the troll creates cultural products, and by hiding behind irony and humor confuses onlookers and is removed from any kind of reasonable blame for their actions. Irony has long been a rhetorical strategy used in politics, and the alt right has been no exception (Weatherby), but for our current sociopolitical landscape, trolling is a political strategy that infuses irony into politics and identity.In the digital era, political memes and internet culture are pervasive components of the spread of hate speech and extremist ideology on digital platforms. Trolling is not an issue that exists in a vacuum – rather, trolls are a product of greater mainstream culture that encourages and allows their behaviors (Phillips, This Is Why; Fichman and Sanfilippo; Marwick and Lewis). Trolls, and meme culture in general, have often been pointed to as being part of the reason for the rise of Trump and fascist politics across the world in recent years (Greene; Lamerichs et al.; Hodge and Hallgrimsdottir; Glitsos and Hall). Although criticism has been expressed about how impactful memes were in the election of Donald Trump, political memes have had an impact on the ways that trolling went from anonymous jerks on forums to figures like Yiannapoulos who built entire careers off of trolling, creating empires of hate (Lang). These memes that are often absurd and incomprehensible to those who are not a part of the community that they come from aim to cheapen, trivialize, and mock social justice movements like Black Lives Matter, feminism, LGBTQ+ rights, and others.But the history of trolling online goes as far back as the Internet itself. “Trolling” is just a catch all term to describe online behaviors meant to antagonize, to disrupt online conversations, and to silence other users (Cole; Fichman and Sanfilippo). As more and more people started moving online and engaging in participatory culture, trolling continued to evolve from seemingly harmless jokes like the “Rick Roll” to targeted campaigns meant to harass women off of social media platforms (Lumsden and Morgan; Graham). Trolling behaviors are more than just an ugly part of the online experience, but are also a way for users to maintain the borders of their online community - it’s meant to drive away those who are perceived to be outsiders not just from the specific forum, but the Internet itself (Graham). With the rise of modern social media platforms, trolling itself is also a part of the political landscape, creating a “toxic counterpublic” that combines irony with a kind of earnestness to spread and inject their beliefs into mainstream political discourse (Greene). As a mode of information warfare, these subversive rhetorical strategies meant to contradict or reverse existing political and value systems have been used throughout history as a political tactic (Blackstock).The goal of trolling is not just to disrupt conversations, but to lead to chaos via confusion about the sincerity and meaning of messages and visuals, and rather than functioning as a politics of outrage (on the part of the adherents), it is a politics of being as outrageous as possible. As a part of larger meme culture, the aesthetics of trolls and their outrageous content manage to operate under the radar by being able to excuse their behaviors and rhetoric as just “trolling” or “joking”. This ambiguity points to trolling on the far right as a political strategy and identity to absolve them of blame or accusations of what their real intentions are. Calling them “trolls” hides the level of sophistication and vast levels of influence that they had on public opinion and discourse in the United States (Geltzer; Starks et al.; Marwick and Lewis). We no longer live in a world apart from the troll’s influence and immune from their toxic discourse – rather, we have long been under the bridge with them.Co-Opted SymbolsOne of the most well-known examples of trolling as a political aesthetic and tactic may be the OK hand sign used by the Christchurch shooter. The idea that the OK hand sign was a secretly white supremacist symbol started as a hoax on 4chan. The initial 2017 hoax purported that the hand sign was meant to stand for “White Power”, with the three fingers representing the W and the circle made with the index finger and thumb as the P (Anti-Defamation League, “Okay Hand Gesture”). The purpose of perpetuating the hoax was to demonstrate that (a) they were being watched and (b) that the mainstream media is stupid and gullible enough to believe this hoax. Meant to incite confusion and to act as a subversive strategy, the OK hand sign was then actually adopted by the alt-right as a sort of meme to not just perpetuate the hoax, but to signal belonging to the larger group (Allyn). Even though the Anti-Defamation League initially listed it as not being a hate symbol and pointed out the origins of the hoax (Anti-Defamation League, “No, the ‘OK’ Gesture Is Not a Hate Symbol”), they then switched their opinion when the OK hand sign was being flashed by white supremacists, showing up in photographs at political events, and other social media content. In fact, the OK hand sign is also a common element in pictures of Pepe the Frog, who is a sort of “alt right mascot” (Tait; Glitsos and Hall), but like the OK hand sign, Pepe the Frog did not start as an alt-right mascot and was co-opted by the alt-right as a mode of representation.The confusion around the actual meaning behind the hand symbol points to how the alt-right uses these modes of representation in ways that are simultaneously an inside joke and a real expression of their beliefs. For instance, the Christchurch shooter referenced a number of memes and other rhetoric typical of 4chan and 8chan communities in his video and manifesto (Quek). In the shooter’s manifesto and video, the vast amounts of content that point to the trolling and visual culture of the alt-right are striking – demonstrating how alt-right memes not only make this violent ideology accessible, but are cultural products meant to be disseminated and ultimately, result in some kind of action (DeCook).The creation and co-optation of symbols by the alt-right like the OK hand sign are not just memes, but a form of language created by extremists for extremists (Greene; Hodge and Hallgrimsdottir). The shooter’s choice of including this type of content in his manifesto as well as certain phrases in his live-streamed video indicate his level of knowledge of what needed to be done for his attack to get as much attention as possible – the 4chan troll is the modern-day bogeyman, and parts of the manifesto have been identified as intentional traps for the mainstream media (Lorenz).Thus, the Christchurch shooter and trolling culture are linked, but referring to the symbols in the manifesto as being a part of “trolling” culture misses the deeper purpose – chaos, through the outrage spectacle, is the intended goal, particularly by creating arguments about the nature and utility of online trolling behavior. The shooter encouraged other 8chan users to disseminate his posted manifesto as well as to share the video of the attack – and users responded by immortalizing the event in meme format. The memes created celebrated the shooter as a hero, and although Facebook did remove the initial livestream video, it was reuploaded to the platform 1.2 million times in the first 24 hours, attempting to saturate the online platform with so many uploads that it would cause confusion and be difficult to remove (Gramenz). Some users even created gifs or set the video to music from the Doom video game soundtrack – a video game where the player is a demon slayer in an apocalyptic world, further adding another layer of symbolism to the attack.These political aesthetics – spread through memes, gifs, and “fan videos” – are the perfect vehicles for disseminating extremist ideology because of what they allow the alt-right to do with them: hide behind them, covering up their intentions, all the while adopting them as signifiers for their movement. With the number of memes, symbols, and phrases posted in his manifesto and spoken aloud in his mainstream, perhaps the Christchurch shooter wanted the onus of the blame to fall on these message board communities and the video games and celebrities referenced – in effect, it was “designed to troll” (Lorenz). But, there is a kernel of truth in every meme, post, image, and comment – their memes are a part of their political aesthetic, thus implicit and explicit allusions to the inner workings of their ideology are present. Hiding behind hoaxes, irony, edginess, and trolling, members of the alt-right and other extremist Internet cultures then engage in a kind of subversion that allows them to avoid taking any responsibility for real and violent attacks that occur as a result of their discourse. Antagonizing the left, being offensive, and participating in this outrage spectacle to garner a response from news outlets, activists, and outsiders are all a part of the same package.Trolls and the Outrage SpectacleThe confusion and the chaos left behind by these kinds of trolling campaigns and hoaxes leave many to ask: How disingenuous is it? Is it meant for mere shock value or is it really reflective of the person’s beliefs? In terms of the theme of dissimulation for this special issue, what is the real intent, and under what pretenses should these kinds of trolling behaviors be understood? Returning to the protestor who claimed “I just like to be offensive”, the skepticism from onlookers still exists: why go so far as to join an alt-right rally, wearing the uniform of Identity Evropa (now the American Identity Movement), as a “joke”?Extremists hide behind humor and irony to cloud judgments from others, begging the question of can we have practice without belief? But, ultimately, practice and belief are intertwined – the regret of the Runaway Racist is not because he suddenly realized he did not “believe”, but rather was forced to face the consequences of his belief, something that he as a white man perhaps never really had to confront. The cultural reach of dissimulation, in particular hiding true intent behind the claim of “irony”, is vast - YouTuber Pewdiepie claimed his use of racial and anti-Semitic slurs and putting on an entire Ku Klux Klan uniform in the middle of a video were “accidental” only after considerable backlash (Picheta). It has to be noted, however, that Pewdiepie is referenced in the manifesto of the Christchurch shooter – specifically, the shooter yelled during his livestream “subscribe to Pewdiepie”, (Lorenz). Pewdiepie and many other trolls, once called out for their behavior, and regardless of their actual intent, double down on their claims of irony to distract from the reality of their behaviors and actions.The normalization of this kind of content in mainstream platforms like Twitter, YouTube, Facebook, and even Instagram show how 4chan and alt-right Internet culture has seeped out of its borders and exists everywhere online. This “coded irony” is not only enabled rhetorically due to irony’s slippery definition, but also digitally via these online media (Weatherby). The aesthetics of the troll are present in every single platform and are disseminated everywhere – memes are small cultural units meant to be passed on (Shifman), and although one can argue it was not memes alone that resulted in the rise of the alt-right and the election of Donald Trump, memes are a part of the larger puzzle of the political radicalization process. The role of the Internet in radicalization is so powerful and insidious because of the presentation of content – it is funny, edgy, ironic, offensive, and outrageous. But these behaviors and attitudes are not just appealing to some kind of adolescent-like desire to push boundaries of what is and is not socially acceptable and/or politically incorrect (Marwick and Lewis), and calling it such clouds people’s perceptions of their level of sophistication in shaping political discourse.Memes and the alt-right are a noted phenomenon, and these visual cultures created by trolls on message boards have aided in the rise of the current political situation worldwide (Hodge and Hallgrimsdottir). We are well in the midst of a type of warfare based on not weapons and bodies, but information and data - in which memes and other elements of the far right’s political aesthetic play an important role (Molander et al.; Prier; Bogerts and Fielitz). The rise of the online troll as a political player and the alt-right are merely the logical outcomes of these systems.ConclusionThe alt-right’s spread was possible because of the trolling cultures and aesthetics of dissimulation created in message boards that predate 4chan (Kitada). The memes and inflammatory statements made by them serve multiple purposes, ranging from an intention to incite outrage among non-members of the group to signal group belonging and identity. In some odd way, if people do not understand the content, the content actually speaks louder and, in more volumes, that it would if its intent was more straightforward – in their confusion, people give these trolling techniques more attention and amplification in their attempt to make sense of them. Through creating confusion, distraction, and uncertainty around the legitimacy of messages, hand signs, and even memes, the alt-right has elevated the aestheticization of politics to a degree that Walter Benjamin could perhaps not have predicted in his initial lament about the distracted masses of fascist regimes (McManus). The political dimensions of trolling and the cognitive uncertainty that it creates is a part of its goal. Dismissing trolls is no longer an option, but also regarding them as sinister political operatives may be overblowing their significance. In the end, “ironic hate speech” is still hate speech, and by couching their extremist ideology in meme format they make their extremist beliefs more palatable -- and nobody is completely immune to their strategies.ReferencesAllyn, Bobby. “The ‘OK’ Hand Gesture Is Now Listed as a Symbol of Hate.” NPR 2019. <https://www.npr.org/2019/09/26/764728163/the-ok-hand-gesture-is-now-listed-as-a-symbol-of-hate>.Anti-Defamation League. “No, the ‘OK’ Gesture Is Not a Hate Symbol.” Anti-Defamation League. 10 Dec. 2017 <https://www.adl.org/blog/no-the-ok-gesture-is-not-a-hate-symbol>.———. “Okay Hand Gesture.” Anti-Defamation League. 28 Feb. 2020 <https://www.adl.org/education/references/hate-symbols/okay-hand-gesture>.Atkinson, David C. “Charlottesville and the Alt-Right: A Turning Point?” Politics, Groups, and Identities 6.2 (2018): 309-15.Benjamin, Ruha. Race after Technology: Abolitionist Tools for the New Jim Code. Polity, 2019.Benjamin, Walter. The Work of Art in the Age of Mechanical Reproduction. CreateSpace Independent Publishing Platform, 1936.Benkler, Yochai, et al. Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. Oxford: Oxford UP, 2018.Blackstock, Paul W. The Strategy of Subversion: Manipulating the Politics of Other Nations. Chicago: Quadrangle Books, 1964.Bogerts, Lisa, and Maik Fielitz. “Do You Want Meme War?”: Understanding the Visual Memes of the German Far Right. 2019.Cole, Kirsti K. “‘It’s Like She’s Eager to Be Verbally Abused’: Twitter, Trolls, and (En)Gendering Disciplinary Rhetoric.” Feminist Media Studies 15.2 (2015): 356-58.DeCook, Julia R. “Memes and Symbolic Violence: #Proudboys and the Use of Memes for Propaganda and the Construction of Collective Identity.” Learning, Media and Technology 43.4 (2018): 485-504.Douglas, Nick. “It’s Supposed to Look Like Shit: The Internet Ugly Aesthetic.” Journal of Visual Culture 13.3 (2014): 314-39.Fichman, Pnina, and Madelyn R. Sanfilippo. Online Trolling and Its Perpetrators: Under the Cyberbridge. Rowman & Littlefield, 2016.Funke, Daniel. “When and How to Use 4chan to Cover Conspiracy Theories.” Poynter, 24 Sep. 2018. <https://www.poynter.org/fact-checking/2018/when-and-how-to-use-4chan-to-cover-conspiracy-theories/>.Geltzer, Joshua A. “Stop Calling Them ‘Russian Troll Farms’ - CNN.” CNN, 2018. <https://www.cnn.com/2018/08/17/opinions/stop-calling-russian-operatives-troll-farms-geltzer/index.html>.Glitsos, Laura, and James Hall. “The Pepe the Frog Meme: An Examination of Social, Political, and Cultural Implications through the Tradition of the Darwinian Absurd.” Journal for Cultural Research 23.4 (2019): 381-95.Graham, Elyse. “Boundary Maintenance and the Origins of Trolling.” New Media & Society (2019). doi:10.1177/1461444819837561.Gramenz, Jack. “Christchurch Mosque Attack Livestream: Why Facebook Continues to Fail.” New Zealand Herald 17 Feb. 2020. <https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&objectid=12309116>.Greene, Viveca S. “‘Deplorable’ Satire: Alt-Right Memes, White Genocide Tweets, and Redpilling Normies.” Studies in American Humor 5.1 (2019): 31–69.Hodge, Edwin, and Helga Hallgrimsdottir. “Networks of Hate: The Alt-Right, ‘Troll Culture’, and the Cultural Geography of Social Movement Spaces Online.” Journal of Borderlands Studies (2019): 1–18.Hui, Yuk. “On the Unhappy Consciousness of Neoreactionaries.” E-Flux 81 (2017). <https://www.e-flux.com/journal/81/125815/on-the-unhappy-consciousness-of-neoreactionaries/>.Hunt, C. J. “A Charlottesville White Supremacist Stripped Down to Escape Protesters and We Got It on Video.” GQ 2017. <https://www.gq.com/story/charlottesville-white-supremacist-strips-to-escape-protestors>.Kitada, Akihiro. “Japan’s Cynical Nationalism.” Fandom Unbound: Otaku Culture in a Connected World. Eds. Mizuko Ito et al. Yale UP, 2012: 68–84.Lamerichs, Nicolle, et al. “Elite Male Bodies: The Circulation of Alt-Right Memes and the Framing of Politicians on Social Media.” Participations 15.1 (2018): 180–206.Lang, Nico. “Trolling in the Name of ‘Free Speech’: How Milo Yiannopoulos Built an Empire off Violent Harassment.” Salon, 2016. <http://www.salon.com/2016/12/19/trolling-in-the-name-of-free-speech-how-milo-yiannopoulos-built-an-empire-off-violent-harassment/>.Lorenz, Taylor. “The Shooter’s Manifesto Was Designed to Troll.” The Atlantic, 15 Mar. 2019. <https://www.theatlantic.com/technology/archive/2019/03/the-shooters-manifesto-was-designed-to-troll/585058/>.Lumsden, Karen, and Heather Morgan. “Media Framing of Trolling and Online Abuse: Silencing Strategies, Symbolic Violence, and Victim Blaming.” Feminist Media Studies 17.6 (2017): 926–40.Marwick, Alice E., and Rebecca Lewis. “Media Manipulation and Disinformation Online.” Data & Society, 2017. <http://centerformediajustice.org/wp-content/uploads/2017/07/DataAndSociety_MediaManipulationAndDisinformationOnline.pdf>.McManus, Matt. “Walter Benjamin and the Political Practices of the Alt-Right.” New Politics, 27 Dec. 2017. <https://newpol.org/walter-benjamin-and-political-practices-altright/>.Miller-Idriss, Cynthia. The Extreme Gone Mainstream: Commercialization and Far Right Youth Culture in Germany. Princeton UP, 2018.Molander, Roger C., et al. Strategic Information Warfare: A New Face of War. RAND Corporation, 1996. <https://www.rand.org/pubs/monograph_reports/MR661.html>.Nakamura, Lisa. Cybertypes: Race, Ethnicity, and Identity on the Internet. Routledge, 2002.Nissenbaum, Asaf, and Limor Shifman. “Internet Memes as Contested Cultural Capital: The Case of 4chan’s /b/ Board.” New Media & Society 19.4 (2017): 483–501.Phillips, Whitney. The Oxygen of Amplification. Data & Society, 2018. <https://datasociety.net/output/oxygen-of-amplification>.———. This Is Why We Can’t Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture. Cambridge, Mass.: MIT Press, 2015.Picheta, Rob. “PewDiePie Will Take a Break from YouTube, Saying He’s ‘Very Tired.’” CNN, 2019. <https://www.cnn.com/2019/12/16/tech/pewdiepie-taking-break-youtube-scli-intl/index.html>.Prier, Jarred. “Commanding the Trend: Social Media as Information Warfare.” Strategic Studies Quarterly 11.4 (2017): 50–85.Quek, Natasha. Bloodbath in Christchurch: The Rise of Far-Right Terrorism. 2019.Sartwell, Crispin. Political Aesthetics. Cornell UP, 2010.Shifman, Limor. Memes in Digital Culture. Cambridge, Mass.: MIT Press, 2014.Stanovsky, Derek. “Remix Racism: The Visual Politics of the ‘Alt-Right’.” Journal of Contemporary Rhetoric 7 (2017).Starbird, Kate. “Examining the Alternative Media Ecosystem through the Production of Alternative Narratives of Mass Shooting Events on Twitter.” International AAAI Conference on Web and Social Media (2017): 230–239. <https://www.aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15603>.Starks, Tim, Laurens Cerulus, and Mark Scott. “Russia’s Manipulation of Twitter Was Far Vaster than Believed.” Politico, 5 Jun. 2019. <https://politi.co/2HXDVQ2>.Tait, Amelia. “First They Came for Pepe: How ‘Ironic’ Nazism Is Taking Over the Internet.” New Statesman 16 Feb. 2017. <http://www.newstatesman.com/science-tech/internet/2017/02/first-they-came-pepe-how-ironic-nazism-taking-over-internet>.
APA, Harvard, Vancouver, ISO, and other styles
12

Farrell, Nathan. "From Activist to Entrepreneur: Peace One Day and the Changing Persona of the Social Campaigner." M/C Journal 17, no. 3 (June 10, 2014). http://dx.doi.org/10.5204/mcj.801.

Full text
Abstract:
This article analyses the public persona of Jeremy Gilley, a documentary filmmaker, peace campaigner, and the founder of the organisation Peace One Day (POD). It begins by outlining how Gilley’s persona is presented in a manner which resonates with established archetypes of social campaigners, and how this creates POD’s legitimacy among grassroots organisations. I then describe a distinct, but not inconsistent, facet of Gilley’s persona which speaks specifically to entrepreneurs. The article outlines how Gilley’s individuality works to simultaneously address these overlapping audiences and argues that his persona can be read as an articulation of social entrepreneurship. Gilley represents an example of a public personality working to “crystallise issues and to normativise debates” (Marshall “Personifying” 370) concerning corporate involvement with non-profit organisations and the marketisation of the non-profit sector. Peace One Day (POD) is a UK-based non-profit organisation established in 1999 by actor-turned-documentary-filmmaker Jeremy Gilley. In the 1990s, while filming a documentary about global conflict, Gilley realised there was no internationally recognised day of ceasefire and non-violence. He created POD to found such a day and began lobbying the United Nations. In 2001, the 111th plenary meeting of the General Assembly passed a resolution which marked 21 September as the annual International Day of Peace (United Nations). Since 2001, POD has worked to create global awareness of Peace Day. By 2006, other NGOs began using the day to negotiate 24-hour ceasefires in various conflict zones, allowing them to carry out work in areas normally too dangerous to enter. For example, in 2007, the inoculation of 1.3 million Afghan children against polio was possible due to an agreement from the Taliban to allow safe passage to agencies working in the country during the day. This was repeated in subsequent years and, by 2009, 4.5 million children had been immunised (POD Part Three). While neither POD nor Gilley played a direct part in the polio vaccination programmes or specific ceasefires, his organisation acted as a catalyst for such endeavours and these initiatives would not have occurred without POD’s efforts.Gilley is not only the founder of POD, he is also the majority shareholder, key decision-maker, and predominant public spokesperson in this private, non-charitable, non-profit organisation (Frances 73). While POD’s celebrity supporters participate in press conferences, it is Gilley who does most to raise awareness. His public persona is inextricably linked with POD and is created through a range of presentational media with which he is engaged. These include social media content, regular blogposts on POD’s website, as well as appearances at a series of speaking events. Most significantly, Gilley establishes his public persona through a number of documentary films (Peace One Day; Day After; POD Part Three), which are shot largely from his perspective and narrated by his voiceover, and which depict POD’s key struggles and successes.The Peace Campaigner as an Activist and Entrepreneur In common with other non-profit organisations, POD relies on celebrities from the entertainment industries. It works with them in two key ways: raising the public profile of the organisation, and shaping the public persona of its founder by inviting comparisons of their perceived exceptionalness with his ostensible ordinariness. For example, Gilley’s documentaries depict various press conferences held by POD over a number of years. Those organised prior to POD recruiting celebrity spokespeople were “completely ignored by the media” whereas those held after celebrity backing from Jude Law and Angelina Jolie had been secured attracted considerable interest (Day After). Gilley explains his early difficulties in publicising his message by suggesting that he “was a nobody” (POD Part Three). This representation as a “nobody” or, more diplomatically, as “ordinary,” is a central component of Gilley’s persona. “Ordinariness” here means situating Gilley outside the political and entertainment elites and aligning him with more everyday suburban settings. This is done through a combination of the aesthetic qualities of his public presentation and his publically narrated back-story.Aesthetically speaking, Gilley presents his ordinariness through his casual attire and long hair. His appearance is similar to the campaigners, youth groups and school children he addresses, suggesting he is a representative of that demographic but also distancing him from political elites. The diplomats Gilley meets, such as those at the UN, wear the appropriate attire for their elite political setting: suits. In one key scene in the documentary Peace One Day, Gilley makes his first trip to the UN to meet Kofi Annan, UN General Secretary at the time, and appears at their doors clean cut and suitably dressed. He declares that his new appearance was designed to aid his credibility with the UN. Yet, at the same time, he makes explicit that he borrowed the suit from a friend and the tie from his grandfather and, prior to the meeting, it was decided, “the pony tail had to go.” Thus Gilley seeks the approval of both political elites and the ordinary public, and constructs a persona that speaks to both, though he aligns himself with the latter.Gilley’s back-story permeates his films and works to present his ordinariness. For example, POD has humble beginnings as an almost grassroots, family-run organisation, and Gilley depicts a campaign run on a shoestring from his mother’s spare bedroom in an ordinary suburban home. Although British Airways provided free flights from the organisation’s outset, Gilley shows his friends volunteering their time by organising fundraising events. POD’s modest beginnings are reflected in its founder, who confides about both his lack of formal education and lack of success as an actor (Day After). This “ordinariness” is constructed in opposition to the exceptional qualities of POD’s A-list celebrity backers—such as Angelina Jolie, who does enjoy success as an actor. This contrast is emphasised by inviting Jolie into Gilley’s everyday domestic setting and highlighting the icons of success she brings with her. For example, at his first meeting with Jolie, Gilley waits patiently for her and remarks about the expensive car which eventually arrives outside his house, denoting Jolie’s arrival. He notes in the voiceover to his The Day after Peace documentary, “this was unbelievable, Angelina Jolie sat on my sofa asking me what she could do, I couldn’t stop talking. I was so nervous.”Gilley promotes his ordinariness by using aesthetics and personal narrative. Evidence of how he struggled to realise his goals and the financial burdens he carried (Peace One Day) suggest that there is something authentic about Gilley’s vision for Peace Day. This also helps Gilley to align his public persona with common understandings of the political activist as a prophetic social visionary. POD is able to tap into the idea of the power of the individual as a force for change with references to Martin Luther King and Gandhi. Although Gilley makes no direct comparison between himself and these figures, blog entries such as “ten years ago, I had an idea; I dared to dream that I could galvanise the countries of the world to recognise an official day of ceasefire and nonviolence. Mad? Ambitious? Idealistic? All of the above” (Gilley “Dream”), invite comparisons with King’s “I Have a Dream” speech. This is further augmented by references to Gilley as an outsider to political establishments, such as the UN, which he is sure have “become cynical about the opportunity” they have to unite the world (BBC Interview).Interestingly, Gilley’s presentation as a pragmatic “change-maker” whose “passion is contagious” (Ahmad Fawzi, in POD Concert) also aligns him with a second figure: the entrepreneur. Where Gilley’s performances at school and community groups present his persona as an activist, his entrepreneur persona is presented through his performances at a series of business seminars. These seminars, entitled “Unleash Your Power of Influence,” are targeted towards young entrepreneurs and business-people very much consistent with the “creative class” demographic (Florida). The speakers, including Gilley, have all been successful in business (POD is a private company) and they offer to their audiences motivational presentations, and business advice. Although a semi-regular occurrence, it is the first two events held in July 2010 (Unleash 1) and November 2010 (Unleash 2) that are discussed here. Held in a luxury five-star London hotel, the events demonstrate a starkly different aspect of POD than that presented to community groups and schools, and the amateur grassroots ethic presented in Gilley’s documentary films—for example, tickets for Unleash 2 started at £69 and offered ‘goody bags’ for £95 (author’s observation of the event)—yet consistencies remain.Aesthetically speaking, Gilley’s appearance signifies a connection with these innovative, stereotypically young, founders of start-up companies and where Gilley is an outsider to political organisations; they are outsiders to business establishments. Further, many of these companies typically started, like POD, in a spare bedroom. The speakers at the Unleash events provide insights into their background which frequently demonstrate a rise from humble beginnings to business success, in the face of adversity, and as a result of innovation and perseverance. Gilley is not out of place in this environment and the modest beginnings of POD are relayed to his audience in a manner which bears a striking similarity to his for-profit counterparts.An analysis of Gilley’s presentations at these events demonstrates clear links between the dual aspects of Gilley’s public persona, the political economy of POD, and the underlying philosophy of the organisation—social entrepreneurship. The next section sets out some of the principals of social entrepreneurship and how the aspects of Gilley’s persona, outlined above, reinforce these.Personifying Social EnterpriseGenerally speaking, the business literature greatly emphasises entrepreneurs as “resourceful, value-creating change agents” who are “never satisfied with the status quo [... and are] a forceful engine of growth in our economy” (Dees and Economy 3-4). More recently, the focus of discussion has included social entrepreneurs. These individuals work within “an organisation that attacks [social and environmental] problems through a business format, even if it is not legally structured as a profit-seeking entity” (Bornstein and Davis xv) and advocate commercially oriented non-profit organisations that establish “win-win” relationships between non-profits and business.This coming together of the for- and non-profit sectors has range of precedents, most notably in “philanthrocapitalism” (Bishop and Green) and the types of partnerships established between corporations and environmentalists, such as Greenpeace Australia (Beder). However, philanthrocapitalism often encompasses the application of business methods to social problems by those who have amassed fortunes in purely commercial ventures (such as Bill Gates), and Beder’s work describes established for- and non-profit institutions working together. While social entrepreneurship overlaps with these, social entrepreneurs seek to do well by doing good by making a profit while simultaneously realising social goals (Bornstein and Davis 25).Read as an articulation of the coming together of the activist and the entrepreneur, Gilley’s individuality encapsulates the social enterprise movement. His persona draws from the commonalities between the archetypes of the traditional grassroots activist and start-up entrepreneur, as pioneering visionary and outsider to the establishment. While his films establish his authenticity among politically attuned members of the public, his appearances at the Unleash events work to signify the legitimacy of his organisation to those who identify with social entrepreneurialism and take the position that business should play a positive role in social causes. As an activist, Gilley’s creates his persona through his aesthetic qualities and a performance that draws on historical precedents of social prophets. As an entrepreneur, Gilley draws on the same aesthetic qualities and, through his performance, mitigates the types of disjuncture evident in the 1980s between environmental activists, politicians and business leaders, when environmentalist’s narratives “were perceived as flaky and failed to transform” (Robèrt 7). To do this, Gilley reconstitutes social and environmental problems (such as conflict) within a market metric, and presents the market as a viable and efficient solution. Consequently, Gilley asserts that “we live in a culture of war because war makes money, we need to live in a culture of peace,” and this depends on “if we can make it economical, if we can make the numbers add up” (Unleash).Social enterprises often eschew formal charity and Gilley is consistent with this when he states that “for me, I think it has to be about business. [...] I think if it’s about charity it’s not going to work for me.” Gilley asserts that partnerships with corporations are essential as “our world is going to change, when the corporate sector becomes engaged.” He, therefore, “want[s] to work with large corporations” in order to “empower individuals to be involved in the process of [creating] a more peaceful and sustainable world” (Unleash). One example of POD’s success in this regard is a co-venture with Coca-Cola.To coincide with Peace Day in 2007, POD and Coca-Cola entered into a co-branding exercise which culminated in a sponsorship deal with the POD logo printed on Coca-Cola packaging. Prior to this, Gilley faced a desperate financial situation and conceded that the only alternative to a co-venture with Coca-Cola was shutting down POD (Day After). While Coca-Cola offered financial support and the potential to spread Gilley’s message through the medium of the Coke can, POD presumably offered good publicity to a corporation persistently the target of allegations of unethical practice (for example, Levenson-Estrada; Gill; Thomas). Gilley was aware of the potential image problems caused by a venture with Coke but accepted the partnership on pragmatic grounds, and with the proviso that Coke’s sponsorship not accompany any attempt to influence POD. Gilley, in effect, was using Coca-Cola, displaying the political independence of the social visionary and the pragmatism of the entrepreneur. By the same token, Coca-Cola was using POD to garner positive publicity, demonstrating the nature of this “win-win” relationship.In his film, Gilley consults Ray C. Anderson, social enterprise proponent, about his ethical concerns. Anderson explains the merits of working with Coke. In his Unleash addresses, such ethical considerations do not feature. Instead, it is relayed that Coca-Cola executives were looking to become involved with a social campaign, consistent with the famous 1970s hilltop advertisement of “teaching the world to sing in harmony.” From a meeting at Coca-Cola’s headquarters in Atlanta, Gilley reveals, a correlation emerged between Gilley’s emphasis on Peace Day as a moment of global unity—encapsulated by his belief that “the thing about corporations [...] the wonderful thing about everybody […] is that everybody’s just like us” (Unleash)—and the image of worldwide harmony that Coca-Cola wanted to portray. It is my contention that Gilley’s public persona underpinned the manner in which this co-branding campaign emerged. This is because his persona neatly tied the profit motive of the corporation to the socially spirited nature of the campaign, and spoke to Coca-Cola in a manner relatable to the market. At the same time, it promoted a social campaign premised on an inclusiveness that recast the corporation as a concerned global citizen, and the social campaigner as a free-market agent.Persona in the Competitive Non-Profit SectorThrough a series of works P. David Marshall charts the increasing centrality of individuality as “one of the ideological mainstays of consumer capitalism [...and] equally one of the ideological mainstays of how democracy is conceived” (Marshall “New Media-New Self” 635). Celebrity, accordingly, can be thought of as a powerful discourse that works “to make the cultural centrality of individuality concretely real” (Marshall “New Media-New Self” 635). Beyond celebrity, Marshall offers a wider framework that maps how “personalisation, individuality, and the move from the private to the public are now part of the wider populace rather than just at play in the representational field of celebrity” (Marshall, “Persona” 158). This framework includes fundamental changes to the global, specifically Western, labour market that, while not a fait accompli, point to a more competitive environment in which “greater portions of the culture are engaged in regular—probably frequent—selling of themselves” and where self-promotion becomes a key tool (Marshall, “Persona” 158). Therefore, while consumerism comprises a backdrop to the proliferation of celebrity culture, competition within market capitalism contributes to the wider expansion of personalisation and individualism.The non-profit sector is also a competitive environment. UK studies have found an increase in the number of International NGOs of 46.6% from 1995/6-2005/6 (Anheier, Kaldor, and Glasius. 310). At the same time, the number of large charities (with an income greater than £10 million) rose, between 1999-2013, from 307 to 1,005 and their annual income rose from approximately £10bn to £36bn (Charity Commission). These quantitative changes in the sector have occurred alongside qualitative changes in terms of the orientation of individual organisations. For example, Epstein and Gang describe a non-profit sector in which NGOs compete against each other for funds from aid donors (state and private). It is unclear whether “aid will be allocated properly, say to the poorest or to maximize the social welfare” or to the “efficient aid-seekers” (294)—that is, NGOs with the greatest competitive capabilities. A market for public awareness has also emerged and, in an increasingly crowded non-profit sector, it is clearly important for organisations to establish a public profile that can gain attention.It is in this competitive environment that the public personae of activists become assets for NGOs, and Gilley constitutes a successful example of this. His persona demonstrates an organisation’s response to the competitive nature of the non-profit sector, by appealing to both traditional activist circles and the business sector, and articulating the social enterprise movement. Gilley effectively embodies social entrepreneurship—in his appearance, his performance and his back-story—bridging a gap between the for- and non-profit sectors. His persona helps legitimate efforts to recast the activist as an entrepreneur (and conversely, entrepreneurs as activists) by incorporating activist ideals (in this instance, peace) within a market framework. This, to return to Marshall’s argument, crystallises the issue of peace within market metrics such and normativises debates about the role of corporate actors as global citizens, presenting it as pragmatism and therefore “common sense.” This is not to undermine Gilley’s achievements but, instead, to point out how reading his public persona enables an understanding of efforts to marketise the non-profit sector and align peace activism with corporate power.References Anheier, Helmut K., Mary Kaldor, and Marlies Glasius. Global Civil Society 2006/7. London: Sage, 2007.BBC Storyville. Director Interview: Jeremy Gilley. BBC. 2004. 7 Feb. 2010.Beder, Sharon. Global Spin: The Corporate Assault on Environmentalism. Totnes, UK: Green Books, 2002.Bishop, Matthew, and Michael Green. Philanthrocapitalism. London: A&C Black, 2008.Bornstein, David, and Susan Davis. Social Entrepreneurship: What Everyone Needs to Know. New York: Oxford University Press, 2010.Charity Commission for England and Wales. “Sector Facts and Figures.” N.d. 5 Apr 2014.Day after Peace, The. Dir. Jeremy Gilley. Peace One Day, 2008.Dees, J. Gregory, and Peter Economy. "Social Entrepreneurship." Enterprising Nonprofits: A Toolkit for Social Entrepreneurs. Eds. J. Gregory Dees, Jed Emerson, and Peter Economy. New York: Wiley, 2001. 1-18.Epstein, Gil S., and Ira N. Gang. “Contests, NGOs, and Decentralizing Aid.” Review of Development Economics 10. 2 (2006): 285-296.Florida, Richard. The Flight of the Creative Class: The New Global Competition for Talent. New York: Harper Business, 2006.Frances, Nic. The End of Charity: Time for Social Enterprise. New South Wales: Allen & Unwin, 2008.Fraser, Nick. “Can One Man Persuade the World, via the UN, to Sanction a Global Ceasefire Day?” BBC. 2005. 7 Feb. 2010.Gill, Leslie. “Labor and Human Rights: The ‘Real Thing’ in Colombia.” Transforming Anthropology 13.2 (2005): 110-115.Gilley, Jeremy. “Dream One Day.” Peace One Day. 2009. 23 Jun 2010.Levenson-Estrada, Deborah. Trade Unionists against Terror: Guatemala City, 1954-1985. Chapel Hill: U of North Carolina P, 1994.Marshall, P. David. Celebrity and Power. Minneapolis: University of Minnesota Press, 2001.Marshall, P. David. “Intimately Intertwined in the Most Public Way: Celebrity and Journalism.” The Celebrity Culture Reader. Ed. P. David Marshall. Oxon: Routledge, 2006. 316-323.Marshall, P. David. “New Media – New Self: The Changing Power of Celebrity.” The Celebrity Culture Reader. Ed. P. David. Marshall. Oxon: Routledge, 2006. 634-644.Marshall, P. David. “Personifying Agency: The Public–Persona–Place–Issue Continuum.” Celebrity Studies 4.3 (2013): 369-371.Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2014): 153-170.Newsnight. BBC 2. 20 Sep. 2010. 22.30-23.00.Peace One Day. Dir. Jeremy Gilley. Peace One Day, 2004.Peace One Day Concert: Live at the Royal Albert Hall Gilley. Dir. Jeremy Gilley. Peace One Day, 2008.Peace One Day Part Three. Dir. Jeremy Gilley. Peace One Day, 2010.Robèrt, Karl-Henrik. The Natural Step: Seeding a Quiet Revolution. Gabriola Island, British Columbia: New Society Publishers, 2002.Thomas, Mark. Belching Out the Devil: Global Adventure with Coca-Cola. London: Ebury Press, 2008.United Nations General Assembly. “International Day of Peace. A/RES/55/282" 111th Plenary Meeting. 2001. 10 June 2014 ‹http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/55/282&Lang=E›.Unleash Your Power of Influence. Triumphant Events and Peace One Day. 2010.
APA, Harvard, Vancouver, ISO, and other styles
13

Green, Lelia. "Being a Bad Vegan." M/C Journal 22, no. 2 (April 24, 2019). http://dx.doi.org/10.5204/mcj.1512.

Full text
Abstract:
According to The Betoota Advocate (Parker), a CSIRO (Commonwealth Scientific and Industrial Research Organisation) paper has recently established that “it takes roughly seven minutes on average for a vegan to tell you that they’re vegan” (qtd. in Harrington et al. 135). For such a statement to have currency as a joke means that it is grounded in a shared experience of being vegan on the one hand, and of encountering vegans on the other. Why should vegans feel such a need to justify themselves? I recognise the observation as being true of me, and this article is one way to explore this perspective: writing to find out what I currently only intuit. As Richardson notes (516), writing is “a way of ‘knowing’—a method of discovery and analysis. By writing in different ways, we discover new aspects of our topic and our relationship to it. Form and content are inseparable” (qtd. in Wall 151).Autoethnography, the qualitative research methodology used for this article, is etymologically derived from Greek to indicate a process for exploring the self (autos) and the cultural (“ethno” from ethnos—nation, tribe, people, class) using a shared, understood, approach (“graphy” from graphia, writing). It relies upon critical engagement with and synthesising of the personal. In Wall’s words, this methodological analysis of human experience “says that what I know matters” (148). The autoethnographic investigation (Riggins; Sparkes) reported here interrogates the experience of “being judged” as a vegan: firstly, by myself; secondly, by other vegans; and ultimately by the wider society. As Ellis notes, autoethnography is “research, writing, story and method that connect the autobiographical and personal to the cultural, social and political. Autoethnographic forms feature concrete action, emotion, embodiment, self-consciousness, and introspection” (xix).Introspection is important because researchers’ stories of their observations are interwoven with self-reflexive critique and analysis: “illustrative materials are meant to give a sense of what the observed world is really like, while the researcher’s interpretations are meant to represent a more detached conceptualization of that reality” (Strauss and Corbin 22). Leaving aside Gans’s view that this form of enquiry represents the “climax of the preoccupation with self […] an autobiography written by sociologists” (542), an autoethnography generally has the added advantage of protecting against Glendon and Stanton’s concern that interpretive studies “are often of too short a duration to be able to provide sufficiently large samples of behaviour” (209). In my case, I have twelve years of experience of identifying as a vegan to draw upon.My experience is that being vegan is a contested activity with a significant range of variation that partly reflects the different initial motivations for adopting this increasingly mainstream identity. Greenebaum notes that “ethical vegans differentiate between those who ‘eat’ vegan (health vegans) and those who ‘live’ vegan (ethical vegans)”, going on to suggest that these differences create “hierarchies and boundaries between vegans” (131). As Greenebaum acknowledges, there is sometimes a need to balance competing priorities: “an environmental vegan […] may purchase leather products over polyvinyl chloride (PVC), thinking that leather is a better choice for the environment” (130). Harrington et al. similarly critique vegan motivations as encompassing “a selfless pursuit for those who cared for other beings (animals)” to “a concern about impacts that affect all humans (environment), and an interest mostly in the self (individual health …)” (144). Wright identifies a fourth group of vegans: those searching for a means of dietary inclusivity (2). I have known Orthodox Jewish households that have adopted veganism because it is compatible with keeping Kosher, while many strict Hindus are vegan and some observant Muslims may also follow suit, to avoid meat that is not Halal certified.The Challenge of the EverydayAlthough my initial vegan promptings were firmly at the selfish end of an altruism spectrum, my experience is that motivation is not static. Being a vegan for any reason increasingly primes awareness of more altruistic motivations “at the intersection of a diversity of concerns [… promoting] a spread and expansion of meaning to view food choices holistically” (Harrington et al. 144). Even so, everyday life offers a range of temptations and challenges that require constant juggling and, sometimes, a string of justifications: to oneself, and to others. I identify as a bit of a bad vegan, and not simply because I embrace the possibility that “honey is a gray area” (Greenebaum, quoting her participant Jason, 139). I’m also flexible around wine, for example, and don’t ask too many questions about whether the wine I drink is refined using milk, or egg-shells or even (yuk!) fish bladders. The point is, there are an infinite number of acid tests as to what constitutes “a real vegan”, encouraging inter-vegan judgmentality. Some slight definitional slippage aligns with Singer and Mason’s argument, however, that vegans should avoid worrying about “trivial infractions of the ethical guidelines […] Personal purity isn’t really the issue. Not supporting animal abuse – and persuading others not to support it – is. Giving people the impression that it is virtually impossible to be vegan doesn’t help animals at all” (Singer and Mason 258–9).If I were to accept a definition of non-vegan, possibly because I have a leather handbag among other infractions, that would feel inauthentic. The term “vegan” helpfully labels my approach to food and drink. Others also find it useful as a shorthand for dietary preferences (except for the small but significant minority who muddle veganism with being gluten free). From the point of view of dietary prohibitions I’m a particularly strict vegan, apart from honey. I know people who make exceptions for line-caught fish, or the eggs from garden-roaming happy chooks, but I don’t. I increasingly understand the perspectives of those who have a more radical conception of veganism than I do, however: whose vision and understanding is that “behind every meal of meat is an absence: the death of the animal whose place the meat takes. The ‘absent referent’ is that which separates the meat eater from the animal and the animal from the end product [… keeping] something from being seen as having been someone” (Adams 14). The concept of the global suffering of animals inherent in the figures: “31.1 billion each year, 85.2 million each day, 3.5 million each hour, 59,170 each minute” (Adams dedication) is appalling; as well as being an under-representation of the current situation since the globe has had almost two further decades of population growth and rising “living standards”.Whatever the motivations, it’s easy to imagine that the different branches of veganism have more in common than divides them. Being a vegan of any kind helps someone identify with other variations upon the theme. For example, even though my views on animal rights did not motivate my choice to become vegan, once I stopped seeing other sentient creatures as a handy food source I began to construct them differently. I gradually realised that, as a species, we were committing the most extraordinary atrocities on a global scale in treating animals as disposable commodities without rights or feelings. The large-scale production of what we like to term “meat and poultry” is almost unadulterated animal suffering, whereas the by-catch (“waste products”) of commercial fishing represents an extraordinary disregard of the rights to life of other creatures and, as Cole and Morgan note, “The number of aquatic animals slaughtered is not recorded, their individual deaths being subsumed by aggregate weight statistics” (135). Even if we did accept that humans have the right to consume some animals some of the time, should the netting of a given weight of edible fish really entail the death of many, many time more weight of living creatures that will be “wasted”: the so-called by-catch? Such wanton destruction has increasingly visible impacts upon complex food chains, and the ecosystems that sustain us all.The Vegan Threat to the Status QuoExamining the evidence for the broader community being biased against vegetarians and vegans, MacInnis and Hodson identify that these groups are “clear targets of relatively more negative attitudes” (727) towards them than other minority groups. Indeed, “only drug addicts were evaluated more negatively than vegetarians and vegans” (726). While “vegans were evaluated more negatively than vegetarians” (732), there was a hierarchy in negative evaluations according to the underlying motivation for someone adopting veganism or vegetarianism. People motivated by personal health received the least negative evaluations from the general population followed by those who were motivated by the environment. The greatest opprobrium was reserved for vegans who were motivated by animal rights (732). MacInnis and Hodson reason that this antipathy is because “vegetarians and vegans represent strong threats to the status quo, given that prevailing cultural norms favour meat-eating” (722). Also implied here is that fact that eating meat is itself a cultural norm associated with masculinity (Rothgerber).Adams’s work links the unthinking, normative exploitation of animals to the unthinking, normative exploitation of women, a situation so aligned that it is often expressed through the use of a common metaphor: “‘meat’ becomes a term to express women’s oppression, used equally by patriarchy and feminists, who say that women are ‘pieces of meat’” (2002, 59). Rothberger further interrogates the relationship between masculinity and meat by exploring gender in relation to strategies for “meat eating justification”, reflecting a 1992 United States study that showed, of all people reporting that they were vegetarian, 68% were women and 32% men (Smart, 1995). Rothberger’s argument is that:Following a vegetarian diet or deliberately reducing meat intake violates the spirit of Western hegemonic masculinity, with its socially prescribed norms of stoicism, practicality, seeking dominance, and being powerful, strong, tough, robust and invulnerable […] Such individuals have basically cast aside a relatively hidden male privilege—the freedom and ability to eat without criticism and scrutiny, something that studies have shown women lack. (371)Noting that “to raise concerns about the injustices of factory farming and to feel compelled by them would seem emotional, weak and sensitive—feminine characteristics” (366), Rothberger sets the scene for me to note two items of popular culture which achieved cut-through in my personal life. The evidence for this is, in terms of all the pro-vegan materials I encounter, these were two of a small number that I shared on social media. In line with Rothberger’s observations, both are oppositional to hegemonic masculinity:one represents a feminised, mother and child exchange that captures the moment when a child realises the “absent referent” of the dead animal in the octopus on his plate—https://www.youtube.com/watch?v=SrU03da2arE;while the other is a sentimentalised and sympathetic recording of cattle luxuriating in their first taste of pastureland after a long period of confinement—https://www.youtube.com/watch?v=huT5__BqY_U.Seeing cows behaving like pets does call attention to the artificial distinction between “companion animals” and other animals. As Cole and Stewart note, “the naming of other animals is useful for human beings, while it is dangerous, and frequently lethal, for other animals. This is because the words we use to name other animals are saturated with common sense knowledge claims about those animals that legitimate their habitual use for humans” (13). Thus a cat, in Western culture, has a very different life trajectory to a cow. Adams notes the contrary case where the companion animal is used as a referent for a threatened human:Child sexual abusers often use threats and/or violence against companion animals to achieve compliance from their victims. Batterers harm or kill a companion animal as a warning to their partner that she could be next; as a way of further separating her from meaningful relationships; to demonstrate his power and her powerlessness. (Adams 57)For children who are still at a stage where animals are creatures of fascination and potential friends, who may be growing up with Charlotte’s Web (White) or Peter Rabbit (Potter), the mental gymnastics of suspending identification with these fellow creatures are harder because empathy and imagination are more active and the ingrained habit of eating without thinking has not had so long to develop. Indeed, children often understand domestic animals as “members of the family”, as illustrated by an interview with Kani, a 10-year old participant in one of my research projects. “In the absence of her extended family overseas, Kani adds her pets to [the list of] those with whom she shares her family life: ‘And my mum and my uncle and then our cat Dobby. I named it [for Harry Potter’s house elf] ...and the goldfish. The goldfish are Twinkle, Glitter, Glow and Bobby’” (Green and Stevenson). Such perceptions may well filter through to children having a different understanding of animals-as-food, even though Cole and Stewart note that “children enter into an adult culture habituated to [the] banal conceptualization of other animals according to their (dis)utilities” (21).Evidence-Based VeganismThose M/C Journal readers who know me personally will understand that one reason why I embrace the “bad vegan” label, is that I’m no more obviously a pin-up for healthy veganism than I am for ethical or environmental veganism. In particular, my BMI (Body Mass Index) is significantly outside the “healthy” range. Even so, I attribute a dramatic change in my capacity for stamina-based activity to my embrace of veganism. A high-speed recap of the evidence would include: in 2009 I embarked on a week-long 500km Great Vic bike ride; in 2012 I successfully completed a Machu Picchu trek at high altitude; by 2013 I was ready for my first half marathon (reprised in 2014, and 2017); in 2014 I cycled from Surfers’ Paradise to Noosa—somewhat less successfully than in my 2009 venture, but even so; in 2016 I completed the Oxfam 50km in 24 hours (plus a half hour, if I’m honest); and in 2017 I completed the 227km Portuguese Camino; in 2018 I jogged an average of over 3km per day, every day, up until 20 September... Apart from indicating that I live an extremely fortunate life, these activities seem to me to demonstrate that becoming vegan in 2007 has conferred a huge health benefit. In particular, I cannot identify similar metamorphoses in the lives of my 50-to-60-something year-old empty-nester friends. My most notable physical feat pre-veganism was the irregular completion of Perth’s annual 12km City-to-Surf fun run.Although I’m a vegan for health reasons, I didn’t suddenly wake up one day and decide that this was now my future: I had to be coaxed and cajoled into looking at my food preferences very differently. This process entailed my enrolling in a night school-type evening course, the Coronary Health Improvement Program: 16 x 3 hour sessions over eight weeks. Its sibling course is now available online as the Complete Health Improvement Program. The first lesson of the eight weeks convincingly demonstrated that what is good for coronary health is also good for health in general, which I found persuasive and reassuring given the propensity to cancer evident in my family tree. In the generation above me, my parents each had three siblings so I have a sample of eight immediate family to draw upon. Six of these either have cancer at the moment, or have died from cancer, with the cancers concerned including breast (1), prostate (2), lung (1), pancreas (1) and brain (1). A seventh close relative passed away before her health service could deliver a diagnosis for her extraordinarily elevated eosinophil levels (100x normal rates of that particular kind of white blood cell: potentially a blood cancer, I think). The eighth relative in that generation is my “bad vegan” uncle who has been mainly plant-based in his dietary choices since 2004. At 73, he is still working three days per week as a dentist and planning a 240 km trek in Italy as his main 2019 holiday. That’s the kind of future I’m hoping for too, when I grow up.And yet, one can read volumes of health literature without stumbling upon Professor T. Colin Campbell’s early research findings via his work on rodents and rodent cells that: “nutrition [was] far more important in controlling cancer promotion than the dose of the initiating carcinogen” and that “nutrients from animal-based foods increased tumor development while nutrients from plant-based foods decreased tumor development” (66, italics in original). Plant was already an eminent scientist at the point where she developed breast cancer, but she noted her amazement at learning “precisely how much has been discovered already [that] has not filtered through to the public” (18). The reason for the lack of visible research in this area is not so much its absence, but more likely its political sensitivity in an era of Big Food. As Harrington et al.’s respondent Samantha noted, “I think the meat lobby’s much bigger than the vegetable lobby” (147). These arguments are addressed in greater depth in Green et al.My initiating research question—Why do I feel the need to justify being vegan?—can clearly be answered in a wide variety of ways. Veganism disrupts the status quo: it questions both the appropriateness of humanity’s systematic torturing of other species for food, and the risks that those animal-based foods pose for the long-term health of human populations. It offends many vested interests from Big Food to accepted notions of animal welfare to the conventional teachings of the health industry. Identifying as a vegan represents an outcome of one or more of a wide range of motivations, some of which are more clearly self-serving (read “bad”); while others are more easily identified as altruistic (read “good”). After a decade or more of personal experimentation in this space, I’m proud to identify as a “bad vegan”. It’s been a great choice personally and, I hope, for some other creatures whose planet I share.ReferencesAdams, Carol. The Sexual Politics of Meat: A Feminist-Vegetarian Critical Theory. New York: Continuum, 1990.Campbell, T. Colin, and Thomas M. Cambell. The China Study: Startling Implications for Diet, Weight Loss and Long-Term Health. Dallas: BenBella Books, 2005.Cole, Matthew, and Karen Morgan. “Vegaphobia: Derogatory Discourses of Veganism and the Reproduction of Speciesism in UK National Newspaper.” British Journal of Sociology 62 (2011): 134–53.———, and Kate Stewart. Our Children and Other Animals: The Cultural Construction of Human-Animal Relations in Childhood. Farnham: Ashgate, 2014.Ellis, Carolyn. The Ethnographic I: A Methodological Novel about Autoethnography. Oxford: Altamira Press, 2004.Gans, Herbert J. “Participant Observation in the Era of ‘Ethnography’.” Journal of Contemporary Ethnography 28.5 (1999): 540–48.Glendon, A. Ian, and Neville Stanton. “Perspectives on Safety Culture.” Safety Science 34.1-3 (2000): 193–214.Green, Lelia, Leesa Costello, and Julie Dare. “Veganism, Health Expectancy, and the Communication of Sustainability.” Australian Journal of Communication 37.3 (2010): 87–102.———, and Kylie Stevenson. “A Ten-Year-Old’s Use of Creative Content to Construct an Alternative Future for Herself.” M/C Journal 20.1 (2017). 13 Apr. 2019 <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1211>.Greenebaum, Jessica. (2012). “Veganism, Identity and the Quest for Authenticity.” Food, Culture and Society 15.1 (2012): 129–44.Harrington, Stephen, Christie Collis, and OzgurDedehayir. “It’s Not (Just) about the F-ckin’ Animals: Why Veganism Is Changing, and Why That Matters.” Alternative Food Politics: From the Margins to the Mainstream. Eds. Michelle Phillipov and Katherine Kirkwood. New York: Routledge, 2019. 135–50.MacInnes, Cara. C., and Gordon Hodson. “It Ain’t Easy Eating Greens: Evidence of Bias Toward Vegetarians and Vegans from Both Source and Target.” Group Processes and Intergroup Relations 20.6 (2015): 721–44.Parker, Errol. “Study Finds the Easiest Way to Tell If Someone Is Vegan Is to Wait until They Inevitably Tell You.” The Betoota Advocate 2017. 10 Apr. 2019 <https://www.betootaadvocate.com/humans-of-betoota/study-finds-easiest-way-tell-someone-vegan-wait-inevitably-tell/>.Plant, Jane A. Your Life in Your Hands: Understand, Prevent and Overcome Breast Cancer and Ovarian Cancer. 4th ed. London: Virgin Books, 2007.Potter, Beatrix. The Tale of Peter Rabbit. London: Frederick Warne and Co, 1902.Richardson, Laurel. “Writing: A Method of Inquiry.” Handbook of Qualitative Research. Eds. Norman K. Denzon and Yvonne S. Lincoln. Thousand Oaks: Sage, 1994. 516–29.Riggins, Stephen Harold. “Fieldwork in the Living Room: An Autoethnographic Essay.” The Socialness of Things: Essays on the Socio-Semiotics of Objects. Ed. Stephen Harold Riggins. Berlin: Mouton de Gruyter, 1994. 101–50.Rothgerber, Hank. “Real Men Don’t Eat (Vegetable) Quiche: Masculinity and the Justification of Meat Consumption.” Psychology of Men and Masculinity 14 (1994): 363–75.Singer, Peter, and Jim Mason. The Ethics of What We Eat. Melbourne: Text Publishing Company.Smart, Joanne. “The Gender Gap.” Vegetarian Times 210 (1995): 74–81.Sparkes, Andrew C. “Autoethnography: ‘Self-Indulgence or Something More?’” Ethnographically Speaking: Auto-Ethnography, Literature and Aesthetics. Eds. Arthur P. Bochner and Carolyn C. Ellis. Oxford: Altamira Press, 2002. 209–32.Strauss, Anselm, and Juliet Corbin. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. London: Sage, 1990.Wall, Sarah. “An Autoethnography on Learning about Autoethnography.” International Journal of Qualitative Methods 5 (2006): 146–60.White, Elwyn B. Charlotte’s Web. New York: Harper and Brothers, 1952.Wright, Laura. The Vegan Studies Project: Food, Animals and Gender in the Age of Terror. Athens: U of Georgia Press, 2015.
APA, Harvard, Vancouver, ISO, and other styles
14

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles
15

Paull, John. "Beyond Equal: From Same But Different to the Doctrine of Substantial Equivalence." M/C Journal 11, no. 2 (June 1, 2008). http://dx.doi.org/10.5204/mcj.36.

Full text
Abstract:
A same-but-different dichotomy has recently been encapsulated within the US Food and Drug Administration’s ill-defined concept of “substantial equivalence” (USFDA, FDA). By invoking this concept the genetically modified organism (GMO) industry has escaped the rigors of safety testing that might otherwise apply. The curious concept of “substantial equivalence” grants a presumption of safety to GMO food. This presumption has yet to be earned, and has been used to constrain labelling of both GMO and non-GMO food. It is an idea that well serves corporatism. It enables the claim of difference to secure patent protection, while upholding the contrary claim of sameness to avoid labelling and safety scrutiny. It offers the best of both worlds for corporate food entrepreneurs, and delivers the worst of both worlds to consumers. The term “substantial equivalence” has established its currency within the GMO discourse. As the opportunities for patenting food technologies expand, the GMO recruitment of this concept will likely be a dress rehearsal for the developing debates on the labelling and testing of other techno-foods – including nano-foods and clone-foods. “Substantial Equivalence” “Are the Seven Commandments the same as they used to be, Benjamin?” asks Clover in George Orwell’s “Animal Farm”. By way of response, Benjamin “read out to her what was written on the wall. There was nothing there now except a single Commandment. It ran: ALL ANIMALS ARE EQUAL BUT SOME ANIMALS ARE MORE EQUAL THAN OTHERS”. After this reductionist revelation, further novel and curious events at Manor Farm, “did not seem strange” (Orwell, ch. X). Equality is a concept at the very core of mathematics, but beyond the domain of logic, equality becomes a hotly contested notion – and the domain of food is no exception. A novel food has a regulatory advantage if it can claim to be the same as an established food – a food that has proven its worth over centuries, perhaps even millennia – and thus does not trigger new, perhaps costly and onerous, testing, compliance, and even new and burdensome regulations. On the other hand, such a novel food has an intellectual property (IP) advantage only in terms of its difference. And thus there is an entrenched dissonance for newly technologised foods, between claiming sameness, and claiming difference. The same/different dilemma is erased, so some would have it, by appeal to the curious new dualist doctrine of “substantial equivalence” whereby sameness and difference are claimed simultaneously, thereby creating a win/win for corporatism, and a loss/loss for consumerism. This ground has been pioneered, and to some extent conquered, by the GMO industry. The conquest has ramifications for other cryptic food technologies, that is technologies that are invisible to the consumer and that are not evident to the consumer other than via labelling. Cryptic technologies pertaining to food include GMOs, pesticides, hormone treatments, irradiation and, most recently, manufactured nano-particles introduced into the food production and delivery stream. Genetic modification of plants was reported as early as 1984 by Horsch et al. The case of Diamond v. Chakrabarty resulted in a US Supreme Court decision that upheld the prior decision of the US Court of Customs and Patent Appeal that “the fact that micro-organisms are alive is without legal significance for purposes of the patent law”, and ruled that the “respondent’s micro-organism plainly qualifies as patentable subject matter”. This was a majority decision of nine judges, with four judges dissenting (Burger). It was this Chakrabarty judgement that has seriously opened the Pandora’s box of GMOs because patenting rights makes GMOs an attractive corporate proposition by offering potentially unique monopoly rights over food. The rear guard action against GMOs has most often focussed on health repercussions (Smith, Genetic), food security issues, and also the potential for corporate malfeasance to hide behind a cloak of secrecy citing commercial confidentiality (Smith, Seeds). Others have tilted at the foundational plank on which the economics of the GMO industry sits: “I suggest that the main concern is that we do not want a single molecule of anything we eat to contribute to, or be patented and owned by, a reckless, ruthless chemical organisation” (Grist 22). The GMO industry exhibits bipolar behaviour, invoking the concept of “substantial difference” to claim patent rights by way of “novelty”, and then claiming “substantial equivalence” when dealing with other regulatory authorities including food, drug and pesticide agencies; a case of “having their cake and eating it too” (Engdahl 8). This is a clever slight-of-rhetoric, laying claim to the best of both worlds for corporations, and the worst of both worlds for consumers. Corporations achieve patent protection and no concomitant specific regulatory oversight; while consumers pay the cost of patent monopolization, and are not necessarily apprised, by way of labelling or otherwise, that they are purchasing and eating GMOs, and thereby financing the GMO industry. The lemma of “substantial equivalence” does not bear close scrutiny. It is a fuzzy concept that lacks a tight testable definition. It is exactly this fuzziness that allows lots of wriggle room to keep GMOs out of rigorous testing regimes. Millstone et al. argue that “substantial equivalence is a pseudo-scientific concept because it is a commercial and political judgement masquerading as if it is scientific. It is moreover, inherently anti-scientific because it was created primarily to provide an excuse for not requiring biochemical or toxicological tests. It therefore serves to discourage and inhibit informative scientific research” (526). “Substantial equivalence” grants GMOs the benefit of the doubt regarding safety, and thereby leaves unexamined the ramifications for human consumer health, for farm labourer and food-processor health, for the welfare of farm animals fed a diet of GMO grain, and for the well-being of the ecosystem, both in general and in its particularities. “Substantial equivalence” was introduced into the food discourse by an Organisation for Economic Co-operation and Development (OECD) report: “safety evaluation of foods derived by modern biotechnology: concepts and principles”. It is from this document that the ongoing mantra of assumed safety of GMOs derives: “modern biotechnology … does not inherently lead to foods that are less safe … . Therefore evaluation of foods and food components obtained from organisms developed by the application of the newer techniques does not necessitate a fundamental change in established principles, nor does it require a different standard of safety” (OECD, “Safety” 10). This was at the time, and remains, an act of faith, a pro-corporatist and a post-cautionary approach. The OECD motto reveals where their priorities lean: “for a better world economy” (OECD, “Better”). The term “substantial equivalence” was preceded by the 1992 USFDA concept of “substantial similarity” (Levidow, Murphy and Carr) and was adopted from a prior usage by the US Food and Drug Agency (USFDA) where it was used pertaining to medical devices (Miller). Even GMO proponents accept that “Substantial equivalence is not intended to be a scientific formulation; it is a conceptual tool for food producers and government regulators” (Miller 1043). And there’s the rub – there is no scientific definition of “substantial equivalence”, no scientific test of proof of concept, and nor is there likely to be, since this is a ‘spinmeister’ term. And yet this is the cornerstone on which rests the presumption of safety of GMOs. Absence of evidence is taken to be evidence of absence. History suggests that this is a fraught presumption. By way of contrast, the patenting of GMOs depends on the antithesis of assumed ‘sameness’. Patenting rests on proven, scrutinised, challengeable and robust tests of difference and novelty. Lightfoot et al. report that transgenic plants exhibit “unexpected changes [that] challenge the usual assumptions of GMO equivalence and suggest genomic, proteomic and metanomic characterization of transgenics is advisable” (1). GMO Milk and Contested Labelling Pesticide company Monsanto markets the genetically engineered hormone rBST (recombinant Bovine Somatotropin; also known as: rbST; rBGH, recombinant Bovine Growth Hormone; and the brand name Prosilac) to dairy farmers who inject it into their cows to increase milk production. This product is not approved for use in many jurisdictions, including Europe, Australia, New Zealand, Canada and Japan. Even Monsanto accepts that rBST leads to mastitis (inflammation and pus in the udder) and other “cow health problems”, however, it maintains that “these problems did not occur at rates that would prohibit the use of Prosilac” (Monsanto). A European Union study identified an extensive list of health concerns of rBST use (European Commission). The US Dairy Export Council however entertain no doubt. In their background document they ask “is milk from cows treated with rBST safe?” and answer “Absolutely” (USDEC). Meanwhile, Monsanto’s website raises and answers the question: “Is the milk from cows treated with rbST any different from milk from untreated cows? No” (Monsanto). Injecting cows with genetically modified hormones to boost their milk production remains a contested practice, banned in many countries. It is the claimed equivalence that has kept consumers of US dairy products in the dark, shielded rBST dairy farmers from having to declare that their milk production is GMO-enhanced, and has inhibited non-GMO producers from declaring their milk as non-GMO, non rBST, or not hormone enhanced. This is a battle that has simmered, and sometimes raged, for a decade in the US. Finally there is a modest victory for consumers: the Pennsylvania Department of Agriculture (PDA) requires all labels used on milk products to be approved in advance by the department. The standard issued in October 2007 (PDA, “Standards”) signalled to producers that any milk labels claiming rBST-free status would be rejected. This advice was rescinded in January 2008 with new, specific, department-approved textual constructions allowed, and ensuring that any “no rBST” style claim was paired with a PDA-prescribed disclaimer (PDA, “Revised Standards”). However, parsimonious labelling is prohibited: No labeling may contain references such as ‘No Hormones’, ‘Hormone Free’, ‘Free of Hormones’, ‘No BST’, ‘Free of BST’, ‘BST Free’,’No added BST’, or any statement which indicates, implies or could be construed to mean that no natural bovine somatotropin (BST) or synthetic bovine somatotropin (rBST) are contained in or added to the product. (PDA, “Revised Standards” 3) Difference claims are prohibited: In no instance shall any label state or imply that milk from cows not treated with recombinant bovine somatotropin (rBST, rbST, RBST or rbst) differs in composition from milk or products made with milk from treated cows, or that rBST is not contained in or added to the product. If a product is represented as, or intended to be represented to consumers as, containing or produced from milk from cows not treated with rBST any labeling information must convey only a difference in farming practices or dairy herd management methods. (PDA, “Revised Standards” 3) The PDA-approved labelling text for non-GMO dairy farmers is specified as follows: ‘From cows not treated with rBST. No significant difference has been shown between milk derived from rBST-treated and non-rBST-treated cows’ or a substantial equivalent. Hereinafter, the first sentence shall be referred to as the ‘Claim’, and the second sentence shall be referred to as the ‘Disclaimer’. (PDA, “Revised Standards” 4) It is onto the non-GMO dairy farmer alone, that the costs of compliance fall. These costs include label preparation and approval, proving non-usage of GMOs, and of creating and maintaining an audit trail. In nearby Ohio a similar consumer versus corporatist pantomime is playing out. This time with the Ohio Department of Agriculture (ODA) calling the shots, and again serving the GMO industry. The ODA prescribed text allowed to non-GMO dairy farmers is “from cows not supplemented with rbST” and this is to be conjoined with the mandatory disclaimer “no significant difference has been shown between milk derived from rbST-supplemented and non-rbST supplemented cows” (Curet). These are “emergency rules”: they apply for 90 days, and are proposed as permanent. Once again, the onus is on the non-GMO dairy farmers to document and prove their claims. GMO dairy farmers face no such governmental requirements, including no disclosure requirement, and thus an asymmetric regulatory impost is placed on the non-GMO farmer which opens up new opportunities for administrative demands and technocratic harassment. Levidow et al. argue, somewhat Eurocentrically, that from its 1990s adoption “as the basis for a harmonized science-based approach to risk assessment” (26) the concept of “substantial equivalence” has “been recast in at least three ways” (58). It is true that the GMO debate has evolved differently in the US and Europe, and with other jurisdictions usually adopting intermediate positions, yet the concept persists. Levidow et al. nominate their three recastings as: firstly an “implicit redefinition” by the appending of “extra phrases in official documents”; secondly, “it has been reinterpreted, as risk assessment processes have … required more evidence of safety than before, especially in Europe”; and thirdly, “it has been demoted in the European Union regulatory procedures so that it can no longer be used to justify the claim that a risk assessment is unnecessary” (58). Romeis et al. have proposed a decision tree approach to GMO risks based on cascading tiers of risk assessment. However what remains is that the defects of the concept of “substantial equivalence” persist. Schauzu identified that: such decisions are a matter of “opinion”; that there is “no clear definition of the term ‘substantial’”; that because genetic modification “is aimed at introducing new traits into organisms, the result will always be a different combination of genes and proteins”; and that “there is no general checklist that could be followed by those who are responsible for allowing a product to be placed on the market” (2). Benchmark for Further Food Novelties? The discourse, contestation, and debate about “substantial equivalence” have largely focussed on the introduction of GMOs into food production processes. GM can best be regarded as the test case, and proof of concept, for establishing “substantial equivalence” as a benchmark for evaluating new and forthcoming food technologies. This is of concern, because the concept of “substantial equivalence” is scientific hokum, and yet its persistence, even entrenchment, within regulatory agencies may be a harbinger of forthcoming same-but-different debates for nanotechnology and other future bioengineering. The appeal of “substantial equivalence” has been a brake on the creation of GMO-specific regulations and on rigorous GMO testing. The food nanotechnology industry can be expected to look to the precedent of the GMO debate to head off specific nano-regulations and nano-testing. As cloning becomes economically viable, then this may be another wave of food innovation that muddies the regulatory waters with the confused – and ultimately self-contradictory – concept of “substantial equivalence”. Nanotechnology engineers particles in the size range 1 to 100 nanometres – a nanometre is one billionth of a metre. This is interesting for manufacturers because at this size chemicals behave differently, or as the Australian Office of Nanotechnology expresses it, “new functionalities are obtained” (AON). Globally, government expenditure on nanotechnology research reached US$4.6 billion in 2006 (Roco 3.12). While there are now many patents (ETC Group; Roco), regulation specific to nanoparticles is lacking (Bowman and Hodge; Miller and Senjen). The USFDA advises that nano-manufacturers “must show a reasonable assurance of safety … or substantial equivalence” (FDA). A recent inventory of nano-products already on the market identified 580 products. Of these 11.4% were categorised as “Food and Beverage” (WWICS). This is at a time when public confidence in regulatory bodies is declining (HRA). In an Australian consumer survey on nanotechnology, 65% of respondents indicated they were concerned about “unknown and long term side effects”, and 71% agreed that it is important “to know if products are made with nanotechnology” (MARS 22). Cloned animals are currently more expensive to produce than traditional animal progeny. In the course of 678 pages, the USFDA Animal Cloning: A Draft Risk Assessment has not a single mention of “substantial equivalence”. However the Federation of Animal Science Societies (FASS) in its single page “Statement in Support of USFDA’s Risk Assessment Conclusion That Food from Cloned Animals Is Safe for Human Consumption” states that “FASS endorses the use of this comparative evaluation process as the foundation of establishing substantial equivalence of any food being evaluated. It must be emphasized that it is the food product itself that should be the focus of the evaluation rather than the technology used to generate cloned animals” (FASS 1). Contrary to the FASS derogation of the importance of process in food production, for consumers both the process and provenance of production is an important and integral aspect of a food product’s value and identity. Some consumers will legitimately insist that their Kalamata olives are from Greece, or their balsamic vinegar is from Modena. It was the British public’s growing awareness that their sugar was being produced by slave labour that enabled the boycotting of the product, and ultimately the outlawing of slavery (Hochschild). When consumers boycott Nestle, because of past or present marketing practices, or boycott produce of USA because of, for example, US foreign policy or animal welfare concerns, they are distinguishing the food based on the narrative of the food, the production process and/or production context which are a part of the identity of the food. Consumers attribute value to food based on production process and provenance information (Paull). Products produced by slave labour, by child labour, by political prisoners, by means of torture, theft, immoral, unethical or unsustainable practices are different from their alternatives. The process of production is a part of the identity of a product and consumers are increasingly interested in food narrative. It requires vigilance to ensure that these narratives are delivered with the product to the consumer, and are neither lost nor suppressed. Throughout the GM debate, the organic sector has successfully skirted the “substantial equivalence” debate by excluding GMOs from the certified organic food production process. This GMO-exclusion from the organic food stream is the one reprieve available to consumers worldwide who are keen to avoid GMOs in their diet. The organic industry carries the expectation of providing food produced without artificial pesticides and fertilizers, and by extension, without GMOs. Most recently, the Soil Association, the leading organic certifier in the UK, claims to be the first organisation in the world to exclude manufactured nonoparticles from their products (Soil Association). There has been the call that engineered nanoparticles be excluded from organic standards worldwide, given that there is no mandatory safety testing and no compulsory labelling in place (Paull and Lyons). The twisted rhetoric of oxymorons does not make the ideal foundation for policy. Setting food policy on the shifting sands of “substantial equivalence” seems foolhardy when we consider the potentially profound ramifications of globally mass marketing a dysfunctional food. If there is a 2×2 matrix of terms – “substantial equivalence”, substantial difference, insubstantial equivalence, insubstantial difference – while only one corner of this matrix is engaged for food policy, and while the elements remain matters of opinion rather than being testable by science, or by some other regime, then the public is the dupe, and potentially the victim. “Substantial equivalence” has served the GMO corporates well and the public poorly, and this asymmetry is slated to escalate if nano-food and clone-food are also folded into the “substantial equivalence” paradigm. Only in Orwellian Newspeak is war peace, or is same different. It is time to jettison the pseudo-scientific doctrine of “substantial equivalence”, as a convenient oxymoron, and embrace full disclosure of provenance, process and difference, so that consumers are not collateral in a continuing asymmetric knowledge war. References Australian Office of Nanotechnology (AON). Department of Industry, Tourism and Resources (DITR) 6 Aug. 2007. 24 Apr. 2008 < http://www.innovation.gov.au/Section/Innovation/Pages/ AustralianOfficeofNanotechnology.aspx >.Bowman, Diana, and Graeme Hodge. “A Small Matter of Regulation: An International Review of Nanotechnology Regulation.” Columbia Science and Technology Law Review 8 (2007): 1-32.Burger, Warren. “Sidney A. Diamond, Commissioner of Patents and Trademarks v. Ananda M. Chakrabarty, et al.” Supreme Court of the United States, decided 16 June 1980. 24 Apr. 2008 < http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=US&vol=447&invol=303 >.Curet, Monique. “New Rules Allow Dairy-Product Labels to Include Hormone Info.” The Columbus Dispatch 7 Feb. 2008. 24 Apr. 2008 < http://www.dispatch.com/live/content/business/stories/2008/02/07/dairy.html >.Engdahl, F. William. Seeds of Destruction. Montréal: Global Research, 2007.ETC Group. Down on the Farm: The Impact of Nano-Scale Technologies on Food and Agriculture. Ottawa: Action Group on Erosion, Technology and Conservation, November, 2004. European Commission. Report on Public Health Aspects of the Use of Bovine Somatotropin. Brussels: European Commission, 15-16 March 1999.Federation of Animal Science Societies (FASS). Statement in Support of FDA’s Risk Assessment Conclusion That Cloned Animals Are Safe for Human Consumption. 2007. 24 Apr. 2008 < http://www.fass.org/page.asp?pageID=191 >.Grist, Stuart. “True Threats to Reason.” New Scientist 197.2643 (16 Feb. 2008): 22-23.Hochschild, Adam. Bury the Chains: The British Struggle to Abolish Slavery. London: Pan Books, 2006.Horsch, Robert, Robert Fraley, Stephen Rogers, Patricia Sanders, Alan Lloyd, and Nancy Hoffman. “Inheritance of Functional Foreign Genes in Plants.” Science 223 (1984): 496-498.HRA. Awareness of and Attitudes toward Nanotechnology and Federal Regulatory Agencies: A Report of Findings. Washington: Peter D. Hart Research Associates, 25 Sep. 2007.Levidow, Les, Joseph Murphy, and Susan Carr. “Recasting ‘Substantial Equivalence’: Transatlantic Governance of GM Food.” Science, Technology, and Human Values 32.1 (Jan. 2007): 26-64.Lightfoot, David, Rajsree Mungur, Rafiqa Ameziane, Anthony Glass, and Karen Berhard. “Transgenic Manipulation of C and N Metabolism: Stretching the GMO Equivalence.” American Society of Plant Biologists Conference: Plant Biology, 2000.MARS. “Final Report: Australian Community Attitudes Held about Nanotechnology – Trends 2005-2007.” Report prepared for Department of Industry, Tourism and Resources (DITR). Miranda, NSW: Market Attitude Research Services, 12 June 2007.Miller, Georgia, and Rye Senjen. “Out of the Laboratory and on to Our Plates: Nanotechnology in Food and Agriculture.” Friends of the Earth, 2008. 24 Apr. 2008 < http://nano.foe.org.au/node/220 >.Miller, Henry. “Substantial Equivalence: Its Uses and Abuses.” Nature Biotechnology 17 (7 Nov. 1999): 1042-1043.Millstone, Erik, Eric Brunner, and Sue Mayer. “Beyond ‘Substantial Equivalence’.” Nature 401 (7 Oct. 1999): 525-526.Monsanto. “Posilac, Bovine Somatotropin by Monsanto: Questions and Answers about bST from the United States Food and Drug Administration.” 2007. 24 Apr. 2008 < http://www.monsantodairy.com/faqs/fda_safety.html >.Organisation for Economic Co-operation and Development (OECD). “For a Better World Economy.” Paris: OECD, 2008. 24 Apr. 2008 < http://www.oecd.org/ >.———. “Safety Evaluation of Foods Derived by Modern Biotechnology: Concepts and Principles.” Paris: OECD, 1993.Orwell, George. Animal Farm. Adelaide: ebooks@Adelaide, 2004 (1945). 30 Apr. 2008 < http://ebooks.adelaide.edu.au/o/orwell/george >.Paull, John. “Provenance, Purity and Price Premiums: Consumer Valuations of Organic and Place-of-Origin Food Labelling.” Research Masters thesis, University of Tasmania, Hobart, 2006. 24 Apr. 2008 < http://eprints.utas.edu.au/690/ >.Paull, John, and Kristen Lyons. “Nanotechnology: The Next Challenge for Organics.” Journal of Organic Systems (in press).Pennsylvania Department of Agriculture (PDA). “Revised Standards and Procedure for Approval of Proposed Labeling of Fluid Milk.” Milk Labeling Standards (2.0.1.17.08). Bureau of Food Safety and Laboratory Services, Pennsylvania Department of Agriculture, 17 Jan. 2008. ———. “Standards and Procedure for Approval of Proposed Labeling of Fluid Milk, Milk Products and Manufactured Dairy Products.” Milk Labeling Standards (2.0.1.17.08). Bureau of Food Safety and Laboratory Services, Pennsylvania Department of Agriculture, 22 Oct. 2007.Roco, Mihail. “National Nanotechnology Initiative – Past, Present, Future.” In William Goddard, Donald Brenner, Sergy Lyshevski and Gerald Iafrate, eds. Handbook of Nanoscience, Engineering and Technology. 2nd ed. Boca Raton, FL: CRC Press, 2007.Romeis, Jorg, Detlef Bartsch, Franz Bigler, Marco Candolfi, Marco Gielkins, et al. “Assessment of Risk of Insect-Resistant Transgenic Crops to Nontarget Arthropods.” Nature Biotechnology 26.2 (Feb. 2008): 203-208.Schauzu, Marianna. “The Concept of Substantial Equivalence in Safety Assessment of Food Derived from Genetically Modified Organisms.” AgBiotechNet 2 (Apr. 2000): 1-4.Soil Association. “Soil Association First Organisation in the World to Ban Nanoparticles – Potentially Toxic Beauty Products That Get Right under Your Skin.” London: Soil Association, 17 Jan. 2008. 24 Apr. 2008 < http://www.soilassociation.org/web/sa/saweb.nsf/848d689047 cb466780256a6b00298980/42308d944a3088a6802573d100351790!OpenDocument >.Smith, Jeffrey. Genetic Roulette: The Documented Health Risks of Genetically Engineered Foods. Fairfield, Iowa: Yes! Books, 2007.———. Seeds of Deception. Melbourne: Scribe, 2004.U.S. Dairy Export Council (USDEC). Bovine Somatotropin (BST) Backgrounder. Arlington, VA: U.S. Dairy Export Council, 2006.U.S. Food and Drug Administration (USFDA). Animal Cloning: A Draft Risk Assessment. Rockville, MD: Center for Veterinary Medicine, U.S. Food and Drug Administration, 28 Dec. 2006.———. FDA and Nanotechnology Products. U.S. Department of Health and Human Services, U.S. Food and Drug Administration, 2008. 24 Apr. 2008 < http://www.fda.gov/nanotechnology/faqs.html >.Woodrow Wilson International Center for Scholars (WWICS). “A Nanotechnology Consumer Products Inventory.” Data set as at Sep. 2007. Woodrow Wilson International Center for Scholars, Project on Emerging Technologies, Sep. 2007. 24 Apr. 2008 < http://www.nanotechproject.org/inventories/consumer >.
APA, Harvard, Vancouver, ISO, and other styles
16

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
17

Ribas-Segura, Catalina. "Pigs and Desire in Lillian Ng´s "Swallowing Clouds"." M/C Journal 13, no. 5 (October 17, 2010). http://dx.doi.org/10.5204/mcj.292.

Full text
Abstract:
Introduction Lillian Ng was born in Singapore and lived in Hong Kong and the United Kingdom before migrating to Australia with her daughter and Ah Mah Yin Jie (“Ah Mahs are a special group of people who took a vow to remain unmarried … [so they] could stick together as a group and make a living together” (Yu 118)). Ng studied classical Chinese at home, then went to an English school and later on studied Medicine. Her first book, Silver Sister (1994), was short-listed for the inaugural Angus & Robertson/Bookworld Prize in 1993 and won the Human Rights Award in 1995. Ng defines herself as a “Chinese living in Australia” (Yu 115). Food, flesh and meat are recurrent topics in Lillian Ng´s second novel Swallowing Clouds, published in 1997. These topics are related to desire and can be used as a synecdoche (a metaphor that describes part/whole relations) of the human body: food is needed to survive and pleasure can be obtained from other people´s bodies. This paper focuses on one type of meat and animal, pork and the pig, and on the relation between the two main characters, Syn and Zhu Zhiyee. Syn, the main character in the novel, is a Shanghainese student studying English in Sydney who becomes stranded after the Tiananmen Square massacre of June 1989. As she stops receiving money from her mother and fears repression if she goes back to China, she begins to work in a Chinese butcher shop, owned by Zhu Zhiyee, which brings her English lessons to a standstill. Syn and Zhu Zhiyee soon begin a two-year love affair, despite the fact that Zhu Zhiyee is married to KarLeng and has three daughters. The novel is structured as a prologue and four days, each of which has a different setting and temporal location. The prologue introduces the story of an adulterous woman who was punished to be drowned in a pig´s basket in the HuanPu River in the summer of 1918. As learnt later on, Syn is the reincarnation of this woman, whose purpose in life is to take revenge on men by taking their money. The four days, from the 4th to the 7th of June 1994, mark the duration of a trip to Beijing and Shanghai that Syn takes as member of an Australian expedition in order to visit her mother with the security of an Australian passport. During these four days, the reader learns about different Chinese landmarks, such as the Forbidden City, the Great Wall, the Ming Tomb and the Summer Palace, as well as some cultural events, such as a Chinese opera and eating typical foods like Peking duck. However, the bulk of the plot of the book deals with the sexual relationship, erotic games and fantasies of Syn and Zhu Zhiyee in the period between 1989 and 1992, as well as Syn´s final revenge in January 1993. Pigs The fact that Zhu Zhiyee is a butcher allows Lillian Ng to include references to pigs and pork throughout the novel. Some of them refer to the everyday work of a butcher shop, as the following examples illustrate: “Come in and help me with the carcass,” he [Zhu Zhiyee] pointed to a small suckling pig hung on a peg. Syn hesitated, not knowing how to handle the situation. “Take the whole pig with the peg,” he commanded (11).Under dazzling fluorescent tubes and bright spotlights, trays of red meat, pork chops and lamb cutlets sparkled like jewels … The trays edged with red cellophane frills and green underlay breathed vitality and colour into the slabs of pork ribs and fillets (15).Buckets of pig´s blood with a skim of froth took their place on the floor; gelled ones, like sliced cubes of large agate, sat in tin trays labelled in Chinese. More discreetly hidden were the gonads and penises of goats, bulls and pigs. (16)These examples are representative of Syn and Zhu Zhiyee´s relationship. The first quotation deals with their interaction: most of the time Zhu Zhiyee orders Syn how to act, either in the shop or in bed. The second extract describes the meat’s “vitality” and this is the quality of Syn's skin that mesmerised Zhu when he met her: “he was excited, electrified by the sight of her unblemished, translucent skin, unlined, smooth as silk. The glow of the warmth of human skin” (13). Moreover, the lights seem to completely illuminate the pieces of meat and this is the way Zhu Zhiyee leers at Syn´s body, as it can be read in the following extract: “he turned again to fix his gaze on Syn, which pierced and penetrated her head, her brain, eyes, permeated her whole body, seeped into her secret places and crevices” (14). The third excerpt introduces the sexual organs of some of the animals, which are sold to some customers for a high price. Meat is also sexualised by Zhu Zhiyee´s actions, such as his pinching the bottoms of chickens and comparing them with “sacrificial virgins”: “chickens, shamelessly stripped and trussed, hung by their necks, naked in their pimply white skin, seemed like sacrificial virgins. Syn often caught Zhu pinching their fleshy bottoms, while wrapping and serving them to the housewives” (15-16). Zhu also makes comments relating food with sex while he is having lunch next to Syn, which could be considered sexual harassment. All these extracts exemplify the relationship between Syn and Zhu Zhiyee: the orders, the looks and the implicit sexuality in the quotidian activities in the butcher´s shop. There are also a range of other expressions that include similes with the word `pig´ in Ng´s novel. One of the most recurrent is comparing the left arm and hand of Zhu Zhiyee´s mother with a “pig´s trotter”. Zhu Zhiyee´s mother is known as ZhuMa and Syn is very fond of her, as ZhuMa accepts her and likes her more than her own daughter-in-law. The comparison of ZhuMa´s arm and hand with a trotter may be explained by the fact that ZhuMa´s arm is swollen but also by the loving representation of pigs in Chinese culture. As Seung-Og Kim explains in his article “Burials, Pigs, and Political Prestige in Neolithic China”: In both Melanesia and Asia, pigs are viewed as a symbolic representation of human beings (Allen 1976: 42; Healey 1985; Rappaport 1967: 58; Roscoe 1989: 223-26). Piglets are treated as pets and receive a great deal of loving attention, and they in turn express affection for their human “parents.” They also share some physiological features with human beings, being omnivorous and highly reproductive (though humans do not usually have multiple litters) and similar internal anatomy (Roscoe 1989: 225). In short, pigs not only have a symbiotic relationship with humans biologically but also are of great importance symbolically (121). Consequently, pigs are held in high esteem, taken care of and loved. Therefore, comparing a part of a human´s body, such as an arm or a hand, for example, to a part of a pig´s body such as a pig´s trotter is not negative, but has positive connotations. Some descriptions of ZhuMa´s arm and hand can be read in the following excerpts: “As ZhuMa handed her the plate of cookies Syn saw her left arm, swollen like a pig´s trotter” (97); “Syn was horrified, and yet somewhat intrigued by this woman without a breast, with a pig´s trotter arm and a tummy like a chessboard” (99), “mimicking the act of writing with her pig-trotter hand” (99), and ZhuMa was praising the excellence of the opera, the singing, acting, the costumes, and the elaborate props, waving excitedly with her pig trotter arm and pointing with her stubby fingers while she talked. (170) Moreover, the expression “pig´s trotters” is also used as an example of the erotic fetishism with bound feet, as it can be seen in the following passage, which will be discussed below: I [Zhu Zhiyee] adore feet which are slender… they seem so soft, like pig´s trotters, so cute and loving, they play tricks on your mind. Imagine feeling them in bed under your blankets—soft cottonwool lumps, plump and cuddly, makes you want to stroke them like your lover´s hands … this was how the bound feet appealed to men, the erotic sensation when balanced on shoulders, clutched in palms, strung to the seat of a garden swing … no matter how ugly a woman is, her tiny elegant feet would win her many admirers (224).Besides writing about pigs and pork as part of the daily work of the butcher shop and using the expression “pig´s trotter”, “pig” is also linked to money in two sentences in the book. On the one hand, it is used to calculate a price and draw attention to the large amount it represents: “The blouse was very expensive—three hundred dollars, the total takings from selling a pig. Two pigs if he purchased two blouses” (197). On the other, it works as an adjective in the expression “piggy-bank”, the money box in the form of a pig, an animal that represents abundance and happiness in the Chinese culture: “She borrowed money from her neighbours, who emptied pieces of silver from their piggy-banks, their life savings”(54). Finally, the most frequent porcine expression in Ng´s Swallowing Clouds makes reference to being drowned in a pig´s basket, which represents 19 of the 33 references to pigs or pork that appear in the novel. The first three references appear in the prologue (ix, x, xii), where the reader learns the story of the last woman who was killed by drowning in a pig´s basket as a punishment for her adultery. After this, two references recount a soothsayer´s explanation to Syn about her nightmares and the fact that she is the reincarnation of that lady (67, 155); three references are made by Syn when she explains this story to Zhu Zhiyee and to her companion on the trip to Beijing and Shanghai (28, 154, 248); one refers to a feeling Syn has during sexual intercourse with Zhu Zhiyee (94); and one when the pig basket is compared to a cricket box, a wicker or wooden box used to carry or keep crickets in a house and listen to them singing (73). Furthermore, Syn reflects on the fact of drowning (65, 114, 115, 171, 172, 173, 197, 296) and compares her previous death with that of Concubine Pearl, the favourite of Emperor Guanxu, who was killed by order of his aunt, the Empress Dowager Cixi (76-77). The punishment of drowning in a pig´s basket can thus be understood as retribution for a transgression: a woman having an extra-marital relationship, going against the establishment and the boundaries of the authorised. Both the woman who is drowned in a pig´s basket in 1918 and Syn have extra-marital affairs and break society’s rules. However, the consequences are different: the concubine dies and Syn, her reincarnation, takes revenge. Desire, Transgression and Eroticism Xavier Pons writes about desire, repression, freedom and transgression in his book Messengers of Eros: Representations of Sex in Australian Writing (2009). In this text, he explains that desire can be understood as a positive or as a negative feeling. On the one hand, by experiencing desire, a person feels alive and has joy de vivre, and if that person is desired in return, then, the feelings of being accepted and happiness are also involved (13). On the other hand, desire is often repressed, as it may be considered evil, anarchic, an enemy of reason and an alienation from consciousness (14). According to Pons: Sometimes repression, in the form of censorship, comes from the outside—from society at large, or from particular social groups—because of desire´s subversive nature, because it is a force which, given a free rein, would threaten the higher purpose which a given society assigns to other (and usually ideological) forces … Repression may also come from the inside, via the internalization of censorship … desire is sometimes feared by the individual as a force alien to his/her true self which would leave him/her vulnerable to rejection or domination, and would result in loss of freedom (14).Consequently, when talking about sexual desire, the two main concepts to be dealt with are freedom and transgression. As Pons makes clear, “the desiring subject can be taken advantage of, manipulated like a puppet [as h]is or her freedom is in this sense limited by the experience of desire” (15). While some practices may be considered abusive, such as bondage or sado-masochism, they may be deliberately and freely chosen by the partners involved. In this case, these practices represent “an encounter between equals: dominance is no more than make-believe, and a certain amount of freedom (as much as is compatible with giving oneself up to one´s fantasies) is maintained throughout” (24). Consequently, the perception of freedom changes with each person and situation. What is transgressive depends on the norms in every culture and, as these evolve, so do the forms of transgression (Pons 43). Examples of transgressions can be: firstly, the separation of sex from love, adultery or female and male homosexuality, which happen with the free will of the partners; or, secondly, paedophilia, incest or bestiality, which imply abuse. Going against society’s norms involves taking risks, such as being discovered and exiled from society or feeling isolated as a result of a feeling of difference. As the norms change according to culture, time and person, an individual may transgress the rules and feel liberated, but later on do the same thing and feel alienated. As Pons declares, “transgressing the rules does not always lead to liberation or happiness—transgression can turn into a trap and turn out to be simply another kind of alienation” (46). In Swallowing Clouds, Zhu Zhiyee transgresses the social norms of his time by having an affair with Syn: firstly, because it is extra-marital, he and his wife, KarLeng, are Catholic and fidelity is one of the promises made when getting married; and, secondly, because he is Syn´s boss and his comments and ways of flirting with her could be considered sexual harassment. For two years, the affair is an escape from Zhu Zhiyee´s daily worries and stress and a liberation and fulfillment of his sexual desires. However, he introduces Syn to his mother and his sisters, who accept her and like her more than his wife. He feels trapped, though, when KarLeng guesses and threatens him with divorce. He cannot accept this as it would mean loss of face in their neighbourhood and society, and so he decides to abandon Syn. Syn´s transgression becomes a trap for her as Zhu, his mother and his sisters have become her only connection with the outside world in Australia and this alienates her from both the country she lives in and the people she knows. However, Syn´s transgression also turns into a trap for Zhu Zhiyee because she will not sign the documents to give him the house back and every month she sends proof of their affair to KarLeng in order to cause disruption in their household. This exposure could be compared with the humiliation suffered by the concubine when she was paraded in a pig´s basket before she was drowned in the HuangPu River. Furthermore, the reader does not know whether KarLeng finally divorces Zhu Zhiyee, which would be his drowning and loss of face and dishonour in front of society, but can imagine the humiliation, shame and disgrace KarLeng makes him feel every month. Pons also depicts eroticism as a form of transgression. In fact, erotic relations are a power game, and seduction can be a very effective weapon. As such, women can use seduction to obtain power and threaten the patriarchal order, which imposes on them patterns of behaviour, language and codes to follow. However, men also use seduction to get their own benefits, especially in political and social contexts. “Power has often been described as the ultimate aphrodisiac” (Pons 32) and this can be seen in many of the sexual games between Syn and Zhu Zhiyee in Swallowing Clouds, where Zhu Zhiyee is the active partner and Syn becomes little more than an object that gives pleasure. A clear reference to erotic fetishism is embedded in the above-mentioned quote on bound feet, which are compared to pig´s trotters. In fact, bound feet were so important in China in the millennia between the Song Dynasty (960-1276) and the early 20th century that “it was impossible to find a husband” (Holman) without them: “As women’s bound feet and shoes became the essence of feminine beauty, a fanatical aesthetic and sexual mystique developed around them. The bound foot was understood to be the most intimate and erotic part of the female anatomy, and wives, consorts and prostitutes were chosen solely on the size and shape of their feet” (Holman). Bound feet are associated in Ng’s novel with pig´s trotters and are described as “cute and loving … soft cottonwool lumps, plump and cuddly, [that] makes you want to stroke them like your lover´s hands” (224). This approach towards bound feet and, by extension, towards pig´s trotters, can be related to the fond feelings Melanesian and Asian cultures have towards piglets, which “are treated as pets and receive a great deal of loving attention” (Kim 121). Consequently, the bound feet can be considered a synecdoche for the fond feelings piglets inspire. Food and Sex The fact that Zhu Zhiyee is a butcher and works with different types of meat, including pork, that he chops it, sells it and gives cooking advice, is not gratuitous in the novel. He is used to being in close proximity to meat and death and seeing Syn’s pale skin through which he can trace her veins excites him. Her flesh is alive and represents, therefore, the opposite of meat. He wants to seduce her, which is human hunting, and he wants to study her, to enjoy her body, which can be compared to animals looking at their prey and deciding where to start eating from. Zhu´s desire for Syn seems destructive and dangerous. In the novel, bodies have a price: dead animals are paid for and eaten and their role is the satiation of human hunger. But humans, who are also animals, have a price as well: flesh is paid for, in the form of prostitution or being a mistress, and its aim is satiation of human sex. Generally speaking, sex in the novel is compared to food either in a direct or an indirect way, and making love is constantly compared to cooking, the preparation of food and eating (as in Pons 303). Many passages in Swallowing Clouds have cannibalistic connotations, all of these being used as metaphors for Zhu Zhiyee’s desire for Syn. As mentioned before, desire can be positive (as it makes a person feel alive) or negative (as a form of internal or social censorship). For Zhu Zhiyee, desire is positive and similar to a drug he is addicted to. For example, when Zhu and Syn make delivery rounds in an old Mazda van, he plays the recordings he made the previous night when they were having sex and tries to guess when each moan happened. Sex and Literature Pons explains that “to write about sex … is to address a host of issues—social, psychological and literary—which together pretty much define a culture” (6). Lillian Ng´s Swallowing Clouds addresses a series of issues. The first of these could be termed ‘the social’: Syn´s situation after the Tiananmen Massacre; her adulterous relationship with her boss and being treated and considered his mistress; the rapes in Inner Mongolia; different reasons for having an abortion; various forms of abuse, even by a mother of her mentally handicapped daughter; the loss of face; betrayal; and revenge. The second issue is the ‘psychological’, with the power relations and strategies used between different characters, psychological abuse, physical abuse, humiliation, and dependency. The third is the ‘literary’, as when the constant use of metaphors with Chinese cultural references becomes farcical, as Tseen Khoo notes in her article “Selling Sexotica” (2000: 164). Khoo explains that, “in the push for Swallowing Clouds to be many types of novels at once: [that is, erotica, touristic narrative and popular], it fails to be any one particularly successfully” (171). Swallowing Clouds is disturbing, full of stereotypes, and with repeated metaphors, and does not have a clear readership and, as Khoo states: “The explicit and implicit strategies behind the novel embody the enduring perceptions of what exotic, multicultural writing involves—sensationalism, voyeuristic pleasures, and a seemingly deliberate lack of rooted-ness in the Australian socioscape (172). Furthermore, Swallowing Clouds has also been defined as “oriental grunge, mostly because of the progression throughout the narrative from one gritty, exoticised sexual encounter to another” (Khoo 169-70).Other novels which have been described as “grunge” are Edward Berridge´s Lives of the Saints (1995), Justine Ettler´s The River Ophelia (1995), Linda Jaivin´s Eat Me (1995), Andrew McGahan´s Praise (1992) and 1988 (1995), Claire Mendes´ Drift Street (1995) or Christos Tsiolkas´ Loaded (1995) (Michael C). The word “grunge” has clear connotations with “dirtiness”—a further use of pig, but one that is not common in the novel. The vocabulary used during the sexual intercourse and games between Syn and Zhu Zhiyee is, however, coarse, and “the association of sex with coarseness is extremely common” (Pons 344). Pons states that “writing about sex is an attempt to overcome [the barriers of being ashamed of some human bodily functions], regarded as unnecessarily constrictive, and this is what makes it by nature transgressive, controversial” (344-45). Ng´s use of vocabulary in this novel is definitely controversial, indeed, so much so that it has been defined as banal or even farcical (Khoo 169-70).ConclusionThis paper has analysed the use of the words and expressions: “pig”, “pork” and “drowning in a pig’s basket” in Lillian Ng´s Swallowing Clouds. Moreover, the punishment of drowning in a pig’s basket has served as a means to study the topics of desire, transgression and eroticism, in relation to an analysis of the characters of Syn and Zhu Zhiyee, and their relationship. This discussion of various terminology relating to “pig” has also led to the study of the relationship between food and sex, and sex and literature, in this novel. Consequently, this paper has analysed the use of the term “pig” and has used it as a springboard for the analysis of some aspects of the novel together with different theoretical definitions and concepts. Acknowledgements A version of this paper was given at the International Congress Food for Thought, hosted by the Australian Studies Centre at the University of Barcelona in February 2010. References Allen, Bryan J. Information Flow and Innovation Diffusion in the East Sepic District, Papua New Guinea. PhD diss. Australian National University, Australia. 1976. Berridge, Edward. Lives of the Saints. St Lucia: U of Queensland P, 1995. C., Michael. “Toward a sound theory of Australian Grunge fiction.” [Weblog entry] Eurhythmania. 5 Mar. 2008. 4 Oct. 2010 http://eurhythmania.blogspot.com/2008/03/toward-sound-theory-of-australian.html. Ettler, Justine. The River Ophelia. Sydney: Picador, 1995. Healey, Christopher J. “Pigs, Cassowaries, and the Gift of the Flesh: A Symbolic Triad in Maring Cosmology.” Ethnology 24 (1985): 153-65. Holman, Jeanine. “Bound Feet.” Bound Feet: The History of a Curious, Erotic Custom. Ed. Joseph Rupp 2010. 11 Aug. 2010. http://www.josephrupp.com/history.html. Jaivin, Linda. Eat Me. Melbourne: The Text Publishing Company, 1995. Khoo, Tseen. “Selling Sexotica: Oriental Grunge and Suburbia in Lillian Ngs’ Swallowing Clouds.” Diaspora: Negotiating Asian-Australian. Ed. Helen Gilbert, Tseen Khoo, and Jaqueline Lo. St Lucia: U of Queensland P, 2000. 164-72. Khoo, Tseen; Danau Tanu, and Tien. "Re: Of pigs and porks” 5-9 Aug. 1997. Asian- Australian Discussion List Digest numbers 1447-1450. Apr. 2010 . Kim, Seung-Og. “Burials, Pigs, and Political Prestige in Neolithic China.” Current Anthopology 35.2 (Apr. 1994): 119-141. McGahan, Andrew. Praise. Sydney: Allen & Unwin, 1992. McGahan, Andrew. 1988. Sydney: Allen & Unwin, 1995. Mendes, Clare. Drift Street. Pymble: HarperCollins, 1995. Ng, Lillian. Swallowing Clouds. Ringwood: Penguin Books Australia,1997. Pons, Xavier. Messengers of Eros. Representations of Sex in Australian Writing. Newcastle upon Tyne: Cambridge Scholars Publishing, 2009. Rappaport, Roy. Pigs for the Ancestors. New Have: Yale UP, 1967. Roscoe, Paul B. “The Pig and the Long Yam: The Expansion of the Sepik Cultural Complex”. Ethnology 28 (1989): 219-31. Tsiolkas, Christos. Loaded. Sydney: Vintage, 1995. Yu, Ouyang. “An Interview with Lillian Ng.” Otherland Literary Journal 7, Bastard Moon. Essays on Chinese-Australian Writing (July 2001): 111-24.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography