To see the other types of publications on this topic, follow the link: Write blocker.

Journal articles on the topic 'Write blocker'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 44 journal articles for your research on the topic 'Write blocker.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Meffert, Christopher S., Ibrahim Baggili, and Frank Breitinger. "Deleting collected digital evidence by exploiting a widely adopted hardware write blocker." Digital Investigation 18 (August 2016): S87—S96. http://dx.doi.org/10.1016/j.diin.2016.04.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raychaudhuri, Kumarshankar, and M. George Christopher. "An Empirical study to determine the role of file-system in modification of hash value." International Journal of Cybersecurity Intelligence and Cybercrime 3, no. 1 (February 28, 2020): 24–41. http://dx.doi.org/10.52306/03010320nptv7468.

Full text
Abstract:
In digital forensics, maintaining the integrity of digital exhibits is an essential aspect of the entire investigation and examination process, which is established using the technique of hashing. Lack of knowledge, while handling digital exhibits, might lead to unintentional alteration of computed hash, rendering the exhibit unacceptable in the court of Law. The hash value of a physical drive does not solely depend upon the data files present in it but also its file-system. Therefore, any change to the file-system might result in the change of the disk hash, even when the data files within it remain untouched. In this paper, our objective is to study the role of file-system in modification of the hash value. We examine and analyse the changes in the file-system of a NTFS formatted USB storage device, which leads to modification in its hash value when the device is plugged-in to the computer system without using write-blocker. The outcome of this research would justify the importance of write blockers while handling digital exhibits and also substantiate that the alteration in hash value of a storage device might not be an indication that data within the device has been tampered with.
APA, Harvard, Vancouver, ISO, and other styles
3

Kimbro, Devori, Michael Noschka, and Geoffrey Way. "Lend Us Your Earbuds: Shakespeare/Podcasting/Poesis." Humanities 8, no. 2 (March 28, 2019): 67. http://dx.doi.org/10.3390/h8020067.

Full text
Abstract:
Podcasts by nature break down traditional economic barriers to making and accessing content. With low costs to both distribute and access, does podcasting provide a new outlet for academics, practitioners, and audiences to explore typically “high-minded” art or scholarly discussions usually blocked by the price of a theater ticket or a subscription to a paywalled database? To answer these questions, we define a poetics of podcasting—one that encourages humanities thinking par excellence—and, more importantly, carries with it implications for humanities studies writ large. To think in terms of poetics of podcasting shifts attention to the study of how we can craft, form, wright, and write for and with different communities both inside and outside the academy. In examining the current field of Shakespeare studies and podcasting, we argue podcasting incorporates elements ranging from the “slow” professor movement, to composition studies, to the early modern print market, discussing different methods that are both inspired by and disrupt traditional forms of knowledge production in the process.
APA, Harvard, Vancouver, ISO, and other styles
4

Teyssedou, A., A. Tapucu, and R. Camarero. "Blocked Flow Subchannel Simulation Comparison With Single-Phase Flow Data." Journal of Fluids Engineering 114, no. 2 (June 1, 1992): 205–13. http://dx.doi.org/10.1115/1.2910017.

Full text
Abstract:
The time integral of the local instantaneous conservation laws has been used as the starting point to write a subchannel model. The assumption of an ergodic stationary process has made possible further spatial integration of the resulting equations. The SIMPLER algorithm is adapted for the numerical solution. An adequate blockage model assures an overall momentum balance over the discretized cell elements. Comparison of the predictions of the proposed model with the experimental data confirms that it is capable of handling blockages of up to 90 percent of the flow area. Presently, this model only accounts for the hydrodynamic aspect of vertical adiabatic flows.
APA, Harvard, Vancouver, ISO, and other styles
5

McGrath, Brian. "Impassivities: From Paradise Lost to Hellas." Comparative Literature 72, no. 2 (June 1, 2020): 114–27. http://dx.doi.org/10.1215/00104124-8127416.

Full text
Abstract:
Abstract Though the words impasse and impassive come to English from two different etymological sources—impasse from the French, meaning without a pass; impassive from the Latin, meaning without suffering or without feeling—English invites confusion. In part because one cannot write directly about an impasse without making it less of one, this essay takes up the question of the impasse through the available pun: that is, with attention to impassivity. It begins with the origin of impasse in Voltaire and then, following the Oxford English Dictionary, turns to uses of impassive in Milton’s Paradise Lost and Shelley’s Hellas to explore the interplay between feeling (the feeling of being blocked, for instance) and feeling’s absence.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Danli, Yang Zhang, and Shengyong Chen. "E-Block: A Tangible Programming Tool with Graphical Blocks." Mathematical Problems in Engineering 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/598547.

Full text
Abstract:
This paper designs a tangible programming tool, E-Block, for children aged 5 to 9 to experience the preliminary understanding of programming by building blocks. With embedded artificial intelligence, the tool defines the programming blocks with the sensors as the input and enables children to write programs to complete the tasks in the computer. The symbol on the programming block's surface is used to help children understanding the function of each block. The sequence information is transferred to computer by microcomputers and then translated into semantic information. The system applies wireless and infrared technologies and provides user with feedbacks on both screen and programming blocks. Preliminary user studies using observation and user interview methods are shown for E-Block's prototype. The test results prove that E-Block is attractive to children and easy to learn and use. The project also highlights potential advantages of using single chip microcomputer (SCM) technology to develop tangible programming tools for children.
APA, Harvard, Vancouver, ISO, and other styles
7

Handayani, Emi Puasa. "PERLINDUNGAN HUKUM TERHADAP JURNALIS WARGA YANG BERBASIS TEKNOLOGI INFORMASI." DIVERSI : Jurnal Hukum 1, no. 1 (April 30, 2018): 1. http://dx.doi.org/10.32503/diversi.v1i1.125.

Full text
Abstract:
Along with the development of technology with the invention of the internet, the speed information cannot be blocked. Black list that occurredin the print era no longer applied when the era of information technology. The problem is, when it appears journalists from citizens namely the ordinary citizens who write news or facts in blogs or personal website, then it is exposed to public whether there is any protection for the journalist. These are problems that were examined in the article titled Legal Protection Against Journalists Citizen-Based Information Technology. The results of this study can be concluded that now everyone can write and submit his writings to the audience with ease. Currently in Indonesia citizen journalism grown fairly well. This is evidenced by the number of blogs that exist in Indonesia and made by the people of Indonesia. The existence of the blog has signaled that citizen journalism is a phenomenon that is in demand and will continue to grow in the community. The nature of citizen journalism that allows all internet users can enter information that he had through the Internet, can cause a state of some kind of 'abuse of power' by the accessor. The absence of clear boundaries about what should and should not be put on the internet has made sites and blogs contain information that should not be. Therefore it needs to be a rule in the special form of legislation on the protection of citizen journalists. Keywords : Legal Protection, Citizen J
APA, Harvard, Vancouver, ISO, and other styles
8

Hossain, Md Amir. "Doris Lessing’s Fiction as Feminist Projections." International Journal of English and Cultural Studies 1, no. 1 (March 6, 2018): 23. http://dx.doi.org/10.11114/ijecs.v1i1.3081.

Full text
Abstract:
Doris Lessing, an unrivaled novelist in the literary genres around the globe, portrays the fundamental problems of women as well as social system of her times. Lessing searches for new models to communicate the experiences of a blocked woman writer, who spends her early life in Africa, becomes an active and a disappointed communist, who is a politically committed writer, a mother, a wife, or a mistress sometimes a woman. With her very keen and subtle attitude, Lessing wants to present women’s psychological conflicts between marriage and love; motherhood and profession, unfairness of the double standard; alienation of a single career woman; hollowness of marriage in the traditional order and society. Lessing portrays her women in various social problems and with various perspectives of male against female. She tries to awaken women community to protest against the patriarchy through her feminist writings. For this purpose, this research paper would like to examine the psychological conflicts and traumatic experiences of powerful heroines, including- Anna Wulf of The Golden Notebook, Mary Turner of The Grass Is Singing, and Clefts of The Cleft.
APA, Harvard, Vancouver, ISO, and other styles
9

Staley, David J. "Teaching the Future of Technology in the History Classroom: A Case Study." World Futures Review 10, no. 4 (August 1, 2018): 253–62. http://dx.doi.org/10.1177/1946756718791273.

Full text
Abstract:
This article will describe how historians can teach the future of technology. Historians need not alter their traditional methods of historical inquiry to teach the future, and indeed the history classroom is a natural site for foresight education. Historical inquiry begins with questions, and futuring similarly begins with asking the right questions. The historian seeks out evidence, and futurists as well identify drivers and blockers, considering how these drivers and blockers will interact with each other. In contrast to social scientists, historians work with imperfect or incomplete information, an apt description of the state of our evidence about the future. In a manner similar to historians, futurists interpret and draw inferences from evidence. After the research an analysis of the evidence is complete, the historian/futurist writes representations. This article will describe how I employed the historical method to teach the future of technology in a history research seminar, the results produced by the students, and ways that the study of the future can be situated in the history classroom.
APA, Harvard, Vancouver, ISO, and other styles
10

Giannini, Stefano. "Memory and the realization of the nothingness: On a letter from Vittorio Sereni to Giuseppe Ungaretti." Forum Italicum: A Journal of Italian Studies 52, no. 1 (December 17, 2017): 111–29. http://dx.doi.org/10.1177/0014585817747260.

Full text
Abstract:
Ungaretti’s problematic relationship with his city of birth sheds light on the interplay between memory and oblivion in his poetry and prose. The shuttling back and forth between these poles marks the nature of his unfulfilled desire to recreate a lost Alexandrian atmosphere. Language opacity in Ungaretti is coupled with his attempts to represent a city—as he writes—that is suffocated by the sun and whose hidden ancient port is submerged by the sea depths. Blinding light and the darkness of the deep waters make the understanding of Ungaretti’s Alexandria a delicate process. In a letter to his friend Ungaretti, Sereni writes that he is preparing a poem but he is blocked at the stage where Ungaretti’s poetry comes into play. Is Sereni referring to a specific poem? The block persisted and is never explicitly resolved by Sereni. I argue that Ungaretti’s presence in Sereni’s poems is to be understood as a long process of reflection that comes to fruition only in Sereni’s late poems of “Stella variabile.” Sereni reconsiders the themes of light and of the city in his own poetry, but he realizes that those images are drowned in the recognition of the unalterable human limitations.
APA, Harvard, Vancouver, ISO, and other styles
11

Prawira, Indra. "Konstruksi Realitas Media Hiburan: Analisis Framing Program Redaksiana Di Trans7." Humaniora 5, no. 2 (October 30, 2014): 1066. http://dx.doi.org/10.21512/humaniora.v5i2.3222.

Full text
Abstract:
News program is one of Indonesia's most popular programs although in practice the program is still unable to compete with entertainment programs. Redaksiana program has successfully captured the heart of Indonesian audiences with achieving a high rating. This program displays different information to the news program in general, so it is more interesting to watch. Similar to other media, television program Redaksiana on Trans7 presents the news as the result of selection, construction, and reconstruction. Research problem studied is how Redaksiana constructs the news and what frames it uses. This research was conducted using qualitative method through the Pan and Kosicky framing model analysis. The structure of news framing elements studied was schematic, script, thematic, and rhetorical. The results were seen from the schematic structure and news scripts “Lose in votes, Legislator Candidate Blocked the Village Road” according to the script writing television news. Redaksiana featured the elements of 5Ws + 1H as the main element of the news. However, the frame was clearly visible in thematic and rhetorical. The way Redaksiana wrote the fact (thematic) and how Redaksiana emphasized the fact (rhetorical) of news writing indulge sensational elements. It is then pointed out as a factor that makes the news “Lose in votes, Legislator Candidate Blocked the Village Road” interesting to watch.
APA, Harvard, Vancouver, ISO, and other styles
12

Prihozhy, A. A. "Simulation of direct mapped, k-way and fully associative cache on all pairs shortest paths algorithms." «System analysis and applied information science», no. 4 (December 30, 2019): 10–18. http://dx.doi.org/10.21122/2309-4923-2019-4-10-18.

Full text
Abstract:
Caches are intermediate level between fast CPU and slow main memory. It aims to store copies of frequently used data and to reduce the access time to the main memory. Caches are capable of exploiting temporal and spatial localities during program execution. When the processor accesses memory, the cache behavior depends on if the data is in cache: a cache hit occurs if it is, and, a cache miss occurs, otherwise. In the last case, the cache may have to evict other data. The misses produce processor stalls and slow down the computations. The replacement policy chooses a data to evict, trying to predict the future accesses to memory. The hit and miss rate depends on the cache type: direct mapped, set associative and fully associative cache. The least recently used replacement policy serves the sets. The miss rate strongly depends on the executed algorithm. The all pairs shortest paths algorithms solve many practical problems, and it is important to know what algorithm and what cache type match best. This paper presents a technique of simulating the direct mapped, k-way associative and fully associative cache during the algorithm execution, to measure the frequency of read data to cache and write data to memory operations. We have measured the frequencies versus the cache size, the data block size, the amount of processed data, the type of cache, and the type of algorithm. After comparing the basic and blocked Floyd-Warshall algorithms, we conclude that the blocked algorithm well localizes data accesses within one block, but it does not localize data dependencies among blocks. The direct mapped cache significantly loses the associative cache; we can improve its performance by appropriate mapping virtual addresses to physical locations.
APA, Harvard, Vancouver, ISO, and other styles
13

Davies, Simon. "Letters Pertinent and Impertinent: The Early Career of Bernardin de Saint-Pierre." Nottingham French Studies 54, no. 2 (July 2015): 140–53. http://dx.doi.org/10.3366/nfs.2015.0115.

Full text
Abstract:
Bernardin de Saint-Pierre did not set out to be a professional writer. With career prospects blocked in France, he tried his luck at marketing his military engineering skills in Eastern Europe before acquiring a highly unsatisfactory post offered by the French authorities in Mauritius. The experience of these vastly contrasting stays in foreign lands had major implications for Bernardin's thought and values. On the one hand he gained first-hand knowledge of international intrigue in Russia and Poland, while on the other he encountered the bleak consequences of colonial government in Mauritius. His reactions to these experiences are reflected in his correspondence from 1762 to 1775. At the same time his letters reveal a yearning to withdraw from the pressures of complicated social existence and to retreat to the tranquillity of the countryside. Both strands of his experience and desire will find expression in his literary works.
APA, Harvard, Vancouver, ISO, and other styles
14

Wasserstrom, Jeffrey. "THE RED GUARD GENERATION REVISITED." Journal of Chinese History 1, no. 2 (June 6, 2017): 365–68. http://dx.doi.org/10.1017/jch.2017.22.

Full text
Abstract:
People routinely refer to the Cultural Revolution and Mao Zedong as two subjects that are “sensitive” to write and even talk about in today's People's Republic of China (PRC). This is true, but not all “sensitive” events and individuals are created equal—or handled the same way by the Chinese Communist Party (CCP). When it comes to the June 4th Massacre, another “sensitive” event, and Liu Xiaobo, another “sensitive” figure, all public and even some relatively private forms of discussion are blocked. The goal is to make them both forgotten, as Louisa Lim argues in her important, aptly titled 2014 Oxford book, The People's Republic of Amnesia: Tiananmen Revisited. The CCP's aim with the Cultural Revolution and Mao, by contrast, is not to blot out but control memory, not stop but steer the direction and constrain the scope of research, discussion, and commemoration. Last year, when the fiftieth anniversary of the first Red Guard rallies passed, there was, tellingly, muted discussion in all parts of the PRC other than Hong Kong but, equally tellingly, not a complete June 4th anniversary style blackout. Mainland bookstores stock novels dealing with the Cultural Revolution but not June 4th, and texts by and biographies of Mao but not Liu. And so on.
APA, Harvard, Vancouver, ISO, and other styles
15

O’Mahony, Judy, and Siobhán Bereen. "The search for a container in a precarious environment." Group Analysis 52, no. 2 (November 24, 2018): 133–46. http://dx.doi.org/10.1177/0533316418813471.

Full text
Abstract:
This article explores the impact of the parallel process of a precarious environment on a multicultural therapy group for women survivors of torture and persecution who had sought asylum in Ireland. The environments for both therapists and group members were experienced as producing ‘unthinkable anxiety’ (Winnicott, 1962: 57). For the therapists, their context was of threatened dismissal due to organizational restructuring, and for the group members it was the threat of deportation. The impact shaped decisions pertaining to the dynamic administration of how the group should be conducted and for how long. It led to a clinical crisis when the anxiety in the group became enmeshed, provoking primitive defences which affected the capacity to think, and blocked understanding on the part of the therapists. Flexibility in the level of leadership activity allowed for a containing process to take place and the group to become the therapist (Sclapobersky, 2016: 210). This flexible approach enabled the naming of an anxiety for the group as a whole which bound together the fragmented, intense emotions, and opened up the reflective space to the contents the members wished to have contained (Hinshelwood, 1994: 102). All names have been changed and the group gave consent for the authors to write about this experience.
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Gang, Leying Chen, and Shimin Chen. "Zen." Proceedings of the VLDB Endowment 14, no. 5 (January 2021): 835–48. http://dx.doi.org/10.14778/3446095.3446105.

Full text
Abstract:
Emerging <u>N</u>on-<u>V</u>olatile <u>M</u>emory (NVM) technologies like 3DX-point promise significant performance potential for OLTP databases. However, transactional databases need to be redesigned because the key assumptions that non-volatile storage is orders of magnitude slower than DRAM and only supports blocked-oriented access have changed. NVMs are byte-addressable and almost as fast as DRAM. The capacity of NVM is much (4-16x) larger than DRAM. Such NVM characteristics make it possible to build OLTP database entirely in NVM main memory. This paper studies the structure of OLTP engines with hybrid NVM and DRAM memory. We observe three challenges to design an OLTP engine for NVM: tuple metadata modifications, NVM write redundancy, and NVM space management. We propose Zen, a high-throughput log-free OLTP engine for NVM. Zen addresses the three design challenges with three novel techniques: metadata enhanced tuple cache, log-free persistent transactions, and light-weight NVM space management. Experimental results on a real machine equipped with Intel Optane DC Persistent Memory show that Zen achieves up to 10.1x improvement compared with existing solutions to run an OLTP database as large as the size of NVM while achieving fast failure recovery.
APA, Harvard, Vancouver, ISO, and other styles
17

Bhatnagar, Subhash, Bridget Patek, Yasmeen Khan-Ansari, Naveen Bansal, Hugh Buckingham, and Lotfi Hacein-Bey. "MENTAL IMAGERY PRACTICE AS A THERAPY FOR NAMING IMPAIRMENTS: A PRELIMINARY STUDY." Acta Neuropsychologica 17, no. 3 (August 25, 2019): 311–27. http://dx.doi.org/10.5604/01.3001.0013.6197.

Full text
Abstract:
Anomia remains one of the most recalcitrant linguistic disruptions in aphasia to treat. Developing successful interventions to address the word-finding deficits are complicated by the post-stroke symptom variability and inconsistent recovery patterns associated with anomia. Most of the current treatment methods, with a focus on specific compensating techniques and the repetitive practice of a limited set of items, have had variable success in naming treatment. However, it has not been possible to predict the gains in generalizing the learning beyond the stimuli used in practice or the controlled clinical setting. In this preliminary case study, we explore the value of a novel treatment concept, grounded in centuries of cognitive-perceptual exercises in mindfulness training. It incorporates the practice of mental imagery and focused attention to remedy the broken phonological assembly patterns found in word finding deficits. The aim of this study was to evaluate the potential effectiveness of practicing the repeated activation of mental imagery of concrete objects as a therapeutic tool for repairing disorders of lexical retrieval in a subject with chronic moderate to severe word-finding deficits. This trial treatment was used to assist a right-handed, 68-year old educated male with a two-and-a-half years post-onset chronic severe aphasia (anomic type) secondary to a left hemispheric infarct. Two five-week long training protocols involving common (typical) and uncommon (less typical) categories of pictured objects were used for treating anomia. The first trial involved the blocked presentation of stimuli; the second trial, undertaken a year after, included a random presentation of stimuli. It was found that the impact was manifested in three ways: (1) an improved verbal naming of the treated objects; (2) retention of therapeutic gains by a successful generalization to untreated similar lexical items; and (3) importantly, serendipitous gains in the ability to concurrently write the names of the pictured objects. The post-treatment data on all blocked lexical trials, and some random lexical trials, were found to be significant on the Fisher’s exact test. The use of the visual mental imagery-based therapy had a positive impact on the partial restoration of the subject’s naming.
APA, Harvard, Vancouver, ISO, and other styles
18

Stiller, Kathy. "It's not the evidence, it's the way you use it: is clinical practice being tyrannised by evidence?" Australian Health Review 32, no. 2 (2008): 204. http://dx.doi.org/10.1071/ah080204.

Full text
Abstract:
?Good doctors use both individual clinical expertise and the best available external evidence, and neither alone is enough. Without clinical expertise, practice risks becoming tyrannised by evidence, for even excellent external evidence may be inapplicable to or inappropriate for an individual patient.?1 (p. 72) I am a senior physiotherapist and clinical researcher and in the comparatively early stages of a sero-negative spondyloarthropathy that may well develop into full blown ankylosing spondylitis (AS). The severity of my symptoms was such that in 2005 I had to relinquish the full-time position I had held for 21 years and reduce my working hours to 12 hours per week in a nonclinical role. To set the picture of my symptoms at their worst, I was unable to sit for more than a few minutes a day because of severe axial pain, forced to do all work in kneeling, standing or lying positions, with social activities likewise restricted. In order to sleep I often needed strong analgesia and icepacks, only to wake 2?3 hours later. Life was pretty tough. After little response to conventional medications, I started a tumour necrosis factor a (TNF-a) blocker (Infliximab) in March 2007 with a significant and dramatic response. As well as markedly decreasing my pain and fatigue, and improving range of movement, function and quality of life, Infliximab has enabled me to commence some additional part-time work as a medical writer.
APA, Harvard, Vancouver, ISO, and other styles
19

Lyubomudrov, Alexei. "“Everything simple and clear has been turned into incredibly complex by someone”. Correspondence between Leonid Zurov and Viktor Manuilov (1961 –1967)." Literary Fact, no. 16 (2020): 119–81. http://dx.doi.org/10.22455/2541-8297-2020-16-119-181.

Full text
Abstract:
For the first time а complete correspondence between Leonid Zurov (1902 –1971), the writer of the Russian Diaspora, and Viktor Manuilov (1903 –1987), a famous literary researcher, is introduced into a scientific usage. The main theme of their letters is the problem of transferring to Russia Ivan Bunin’s manuscript and memorial heritage, of which Zurov became the owner. The publication clarifies the reasons why the long and hard negotiations ended without any success. It allows to define more exactly the details and circumstances of this case. The correspondence affects the names of many key figures of cultural life both of the Russian abroad and Metropolitan area. It characterizes those persons who actively supported the return of Bunin's legacy as well as officials who blocked the process. The material reflects the struggle of Russian writers, scientists, museum curators against the Soviet bureaucratic machine for which Bunin was always ideologically alien. It paints a picture of the public sentiment and the Soviet cultural policy of the 1960s. Some letters concern Zurov’s articles devoted to M. Lermontov as well as his work on the novel “Winter Palace”. The publication allows to clarify Zurov’s psychological portrait and to identify a number of significant episodes in the V. Manuilov’s scientific biography
APA, Harvard, Vancouver, ISO, and other styles
20

KAYE, ANDREW M. "Colonel Roscoe Conkling Simmons and the Mechanics of Black Leadership." Journal of American Studies 37, no. 1 (April 2003): 79–98. http://dx.doi.org/10.1017/s0021875803007011.

Full text
Abstract:
I want you to have power because I will have power.Roscoe Conkling Simmons (1881–1951) was an African American journalist and lifelong Republican, frequently acclaimed as the greatest orator of his day. He wrote for the Chicago Defender, the nation's largest black paper, and was later a columnist for the Chicago Tribune. A sometime advisor on black affairs to Republican administrations during the 1920s, Simmons seconded the re-nomination of Herbert Hoover for president in 1932, where “His exit from the platform was blocked by senators, committeemen, governors and others high in the public life who sought to touch ‘the hem of his garment.’” Throughout his career, the Colonel, as Simmons was often called, forged close links with black organizations. On regular speaking tours, he participated in the affairs of fraternities, churches, and educational institutions nationwide. Simmons was a social chameleon, on familiar terms with black America's most powerful businessmen and editors, entertainers and mobsters, but equally comfortable among the working men and women with whom he gossiped in barber shops and at church picnics. Senators, mayors, and aldermen admired his talent on the speaking platform and valued his connections to the black community. When white Republicans needed help in rallying northern black voters, Simmons was the fixer they summoned. He gladly obliged, out of loyalty to the Grand Old Party and in anticipation of reciprocal dispensations.
APA, Harvard, Vancouver, ISO, and other styles
21

Evans, Levi, and Bradley Ferguson. "Food Bioactive HDAC Inhibitors in the Epigenetic Regulation of Heart Failure." Nutrients 10, no. 8 (August 18, 2018): 1120. http://dx.doi.org/10.3390/nu10081120.

Full text
Abstract:
Approximately 5.7 million U.S. adults have been diagnosed with heart failure (HF). More concerning is that one in nine U.S. deaths included HF as a contributing cause. Current HF drugs (e.g., β-blockers, ACEi) target intracellular signaling cascades downstream of cell surface receptors to prevent cardiac pump dysfunction. However, these drugs fail to target other redundant intracellular signaling pathways and, therefore, limit drug efficacy. As such, it has been postulated that compounds designed to target shared downstream mediators of these signaling pathways would be more efficacious for the treatment of HF. Histone deacetylation has been linked as a key pathogenetic element for the development of HF. Lysine residues undergo diverse and reversible post-translational modifications that include acetylation and have historically been studied as epigenetic modifiers of histone tails within chromatin that provide an important mechanism for regulating gene expression. Of recent, bioactive compounds within our diet have been linked to the regulation of gene expression, in part, through regulation of the epi-genome. It has been reported that food bioactives regulate histone acetylation via direct regulation of writer (histone acetyl transferases, HATs) and eraser (histone deacetylases, HDACs) proteins. Therefore, bioactive food compounds offer unique therapeutic strategies as epigenetic modifiers of heart failure. This review will highlight food bio-actives as modifiers of histone deacetylase activity in the heart.
APA, Harvard, Vancouver, ISO, and other styles
22

Chitrakar, Madan. "A Mural at the Southwest Corner of the Mohan Chowk: Piece of History – Rediscovered." SIRJANĀ – A Journal on Arts and Art Education 7, no. 1 (September 21, 2021): 44–49. http://dx.doi.org/10.3126/sirjana.v7i1.39343.

Full text
Abstract:
During the restoration process, the experts from JAICA, made a chance discovery of a mural. But unfortunately, its viewing was/is almost totally blocked by an extra wall, built right in-front of the actual wall, with the murals. To demystify the contents, it has had remained a professional challenge, as it could be barely viewed by one end only – from within a space between 8-9 inches gap. It posed challenge for many reasons. First was its difficult location. Secondly, the painted wall was also damaged beyond descriptions – plaster-surface peeled off spread all over – making the task to read the images even harder. Most importantly, to read the contents or to identify the imageries in such a location, it asked for a professional ability of an art writer or an art historian, to be able to read and analyze. However, after a very meticulous effort and a proper reading of the postures, emblems and other iconographical features, the narratives are being made – explaining on and about the murals found. The essay is prepared and is made, after a series of exercises – begun by field visits, and followed by closer examination of the images on the spot and as is available in digital images. The writing is made - after the long afterthoughts, and in consultation with the available references.
APA, Harvard, Vancouver, ISO, and other styles
23

Thabran, Yulhenli, Dony Efriza, and Reny Heryanti. "Making Sense of Collaborative Writing: A Student-Experience-Based Perspective." Scope : Journal of English Language Teaching 5, no. 2 (April 9, 2021): 113. http://dx.doi.org/10.30998/scope.v5i2.8549.

Full text
Abstract:
<p>The present study examines four pairs or eight students who wrote their creative writing assignments collaboratively. As opposed to the popular view, which stated that writing is one of the most difficult subjects to learn for EFL students, many studies have reported that collaborative writing (henceforth CW) is regarded as a technique that can improve students’ productive writing skills to a great extent. The researchers would like to see how effective CW was for the students who did their writing assignments with their pairs by employing a qualitative case study to examine the eight students’ experiences in writing their essays and fictional stories. The researchers wanted to know why some students could adapt to this learning model, and others faced some problems or failed to achieve the target of learning outcomes. Opened-ended questionnaire and in-depth interviews are used to elicit data from the students. The first pair was the most successful example of partnership in writing since they opened themselves for critiques and suggestions. In contrast, the second pair had some problems that disturbed their collaboration as they did not seem to open themselves for critiques and suggestions. The third pair failed to do an effective partnership because they could not solve problems that blocked their cooperation right from the beginning. The fourth pair found their way for an effective collaboration when they opened themselves for critiques and suggestions. The success or failure in the partnership heavily depends on each student collaborator's willingness to open themselves for criticism and suggestion.</p>
APA, Harvard, Vancouver, ISO, and other styles
24

Kanithabutra, Pittaya, Patthama Hengtragul, Thongchai Surinwarangkoon, and Vinh Truong Hoang. "SMARTPHONE APPLICATION DEVELOPMENT FOR FOOD BLOGGERS: A CASE STUDY IN BANGKOK." Journal of Information System and Technology Management 5, no. 19 (December 1, 2020): 77–92. http://dx.doi.org/10.35631/jistm.519007.

Full text
Abstract:
The objective of this research was to 1) study and develop a smartphone application for food bloggers, and 2) evaluate the result of using the application regarding the benefits of usage. This is mixed-method research and development. The application development processes composed of the study of user requirements, application design, application development, application testing, improvement, and evaluation. In the study of the user requirement process, data were collected from research samples by questionnaires. 400 research samples were selected from Thai people in the Bangkok area by a simple random sampling method. Data were analyzed in terms of frequency, percentage, mean, and standard deviation. Moreover, researchers also conducted interviews in order to collect qualitative data from 2 food bloggers in Bangkok about the requirements and relevant information about food blog application. After that, the smartphone application for food bloggers was designed, developed, tested, improved, and evaluated. Research results were as the followings. In terms of application users, the relevant activities composed of user registration, food contents uploading and presentations, comments, and evaluations. The application provided food details information, such as food menus, ingredients, cooking process, etc. in terms of texts, pictures, and videos. Food information was classified in terms of food types, nature of food culture by countries, and popular food ranking. Comment page show details about user comments with comments about posts. The application focused on colorful, beautiful, pleasant to use, which was appropriate for those who like to present food and let others know about restaurants and food in various stores. The developed smartphone application provided a social media channel. Users can register and log in through the application in order to submit their work by posting a message, pictures, and details about food information that they want to offer. Bloggers can edit posts made by themselves easily. Visitors can follow food bloggers which they are interested in. However, the researcher had suggestions as follows: 1) the food blog owner should provide more foreign languages, such as English, Chinese, Japanese for users in order to promote Thai food tourism, 2) some famous food bloggers should be invited to write some interesting content in order to promote application marketing, 3)interesting cooking lesson should be provided to visitors, 4) food contents must be active regularly, 5) the application sponsors must be arranged as well, and 6) food block owner have to set good rules and regulations for food blockers and visitors clearly.
APA, Harvard, Vancouver, ISO, and other styles
25

Kessler, Gary, and Gregory Carlton. "A Study of Forensic Imaging in the Absence of Write-Blockers." Journal of Digital Forensics, Security and Law, 2014. http://dx.doi.org/10.15394/jdfsl.2014.1187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Badley, Graham Francis. "Jottings From a Blockdown Journal." Qualitative Inquiry, July 22, 2020, 107780042094105. http://dx.doi.org/10.1177/1077800420941058.

Full text
Abstract:
These jottings are a series of journal entries for the six months from December 1, 2019, until June 1, 2020. They focus mainly on my attempts to write when blocked and suffering from pneumonia during that period which also coincided with the United Kingdom’s pandemic lockdown from March 23, 2020. My “block” and their “lock” became “blockdown.” I have survived both. So far.
APA, Harvard, Vancouver, ISO, and other styles
27

Flores Carmona, Judith, Manal Hamzeh, Dolores Delgado Bernal, and Ifham Hassan Zareer. "Theorizing Knowledge With Pláticas: Moving Toward Transformative Qualitative Inquiries." Qualitative Inquiry, June 12, 2021, 107780042110218. http://dx.doi.org/10.1177/10778004211021813.

Full text
Abstract:
In this article, we engaged in pláticas to write about the methodology of pláticas. We show the use of this method by theorizing the pláticas. Our pláticas helped us reveal how we have experienced epistemicide and apartheid of knowledge blocked by epistemological racism in academia. We emphasized how the marginalization and invalidation in academia of this method happens and continues to happen especially in the social sciences. We demonstrate how this method has not been absent, but rather it has not been legitimized in academia. We also show how our refusal to employ dominant epistemologies allows us to move toward transformative qualitative inquiries.
APA, Harvard, Vancouver, ISO, and other styles
28

Lesmana, Tjipta. "Journalist As Professional Versus Employee A Case Of Koran SINDO In Censuring News On Trump’s Travel-Ban Policy." Jurnal Komunikasi Ikatan Sarjana Komunikasi Indonesia 2, no. 2 (July 31, 2017). http://dx.doi.org/10.25008/jkiski.v2i2.106.

Full text
Abstract:
Freedom of the press worldwide faces serious threat from owners of the media. Theoretically, journalist is independent and able to write whatever he or she wants to print. News is anything that fits to print, the jargon outcried in early years of Libertarian Media Theory. It is the journalist who has the power to give criteria for “fitting” to print. Now the jargon has changed drastically: “He who pays the piper calls the tune’’. Newsroom is nowaday not beyond owner’s interventionOwners run news media for specific reason. If they decide that a commentary or a news report goes against their beliefs or their interests or if they consider them biased, they certainly will want to intervene.The case of daily Koran SINDO is interesting to be investigated. While most media in the world, including those in Indonesia, heavily exposed President Donald Trump’s controversial policy in banning people from 6 midle-east and African countries from entering the US, daily Koran SINDO totally blocked the news. Not any single news criticising Trump’s policy is printed at the paper owned by Hary Tanoesudibjo. How the daily “plays the game” the author makes a simple research using qualitative content analysis.
APA, Harvard, Vancouver, ISO, and other styles
29

"The (lost) art of war." Strategic Direction 31, no. 11 (October 12, 2015): 27–29. http://dx.doi.org/10.1108/sd-09-2015-0140.

Full text
Abstract:
Purpose – This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach – This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings – Is your organization opposed to improved strategic thinking? Does it think that only the top directors should involve themselves in strategy? Does the best strategic thinking only ever happen round the boardroom table? Preposterous questions. Or so you would think. However, any experienced executive will tell you that many organizations behave in such a way that it seems that their human resource (HR) function acts as a blocker when it comes to strategic development, rather than the enabler that all the textbooks encourage them to be. Practical implications – The paper provides strategic insights and practical thinking that have influenced some of the world’s leading organizations. Originality/value – The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.
APA, Harvard, Vancouver, ISO, and other styles
30

Mali, Suraj N., Bapu R. Thorat, and Atul R. Chopade. "A Viewpoint on Angiotensin-Converting Enzyme 2, Anti-Hypertensives and Coronavirus Disease 2019 (COVID-19)." Infectious Disorders - Drug Targets 20 (May 11, 2020). http://dx.doi.org/10.2174/1871526520666200511005546.

Full text
Abstract:
: TO THE EDITOR, The current life threatening pandemic outbreak of coronavirus disease 2019 (COVID‐19) is hitting the whole world in terms of mortality as well as economic losses [1,2]. It has thought to be originated from Wuhan, China, in December 2019. This outbreak has link to Wuhan’s seafood and exotic animal wholesale markets [3,4]. As SARS-CoV-2 is highly contagious, it has now spread to each and every corner of the world [1,2]. According to the World Health Organization (WHO) situation report (77th), updated on 6 April, 2020 there have been globally 1210956 confirmed cases and 67 594 deaths of COVID‐19 [2]. This viral outbreak has now posed a global threat to healthcare systems. So many, efforts are going on to find new drugs or to repurpose already existed drugs [1,5-7]. Majoritily, it has been found that most of the COVID-19 patients belong to cardiovascular comorbidities [8-10]. It is obvious that they qualify for antihypertensive therapy. Many of them are treating with angiotensin‐converting enzyme inhibitor (ACEI) or angiotensin II receptor blocker (ARB)[8]. There has been considerable debate in scientific community and health professionals about whether angiotensin converting enzyme (ACE) inhibitors and angiotensin receptor blockers (ARBs) may increase attractiveness towards the COVID-19 virus infection or not ?[9-16]. One of the important concern highlighted by these studies involving antihypertensive medications suggested that these drugs might cause increments in abundance of SARS-CoV-2 receptor henceforth causing COVID-19 by entering into cells [17,18]. This suggests plausible increase in ACE2 receptors on lung and heart cells and hence offering more entry points for SARS-CoV-2[17]. However, no strong evidence has been noted. There has been more number of commentaries published explaining both sides and still they are appearing on daily basis [12-16]. Herein, we tried to summaries, clinical aspects on ACEs and ARBs based on literature and commentaries to explain both the sides. A recent published article in Nature by Zhou et al. (2020)[19], reported that the angiotensin-converting enzyme II (ACE2) is acting as receptor for SARS Coronavirus 2.This receptors was also acted as receptors for SARS-CoV and HCoV-NL63. Zhou et al. (2020), clearly wrote that “We show that 2019-nCoV (COVID-19) is able to use ACE2 proteins as an entry receptor to enter ACE2-expressing cells, but not cells that did not express ACE2, indicating that ACE2 is probably the cell receptor through which 2019-nCoV enters cells”. ACE2 is aminopeptidase responsible for cleaving angiotensin I and angiotensin II into the angiotensin-(1–9) and angiotensin-(1–7) peptides[20]. Normally, ACE2 have been found to be overexpressed in clinical conditions including heart failure, arterial hypertension, etc. It has also been noted that ACE2 acts as a functional receptor for SARS-CoV-2 entry. There have been several literatures supporting the role of a cardiovascular-protective ACE2–angiotensin-(1–7)–Mas receptor axis. Recent viewpoint article published in JAMA journal by author Majd AlGhatrif exaplains[15] correlations among aging, cardiovascular diseases and COVID-19 patients. He clearly concluded important fact saying, “compared with young individuals, older persons with cardiovascular disorders (CVD); who already have reduced ACE2 levels will be expected to be more predisposed to exaggerated inflammation with further reduction in ACE2 expression in the context of COVID-19, manifesting with greater disease severity”. One of well-known Austrian scientist Prof. Josef Penninger[21], Josef Penninger noted important relationship between RAS (the renin-angiotensin system) and ACE2. He is particularly focusing on ACE2 as a potential treatment approach. In one of the article by Mourad et al., (2020), explained different effects on ACE2 levels in correlation with different administrations of RAAS inhibitors and believed that chronic treatment with ACE inhibitors has no reason to influence the course of SARS-CoV-2 infection[22]. A reply to this article has also been published by Zheng et al., (2020)[23] saying that “although ACE2 has been identified as the functional receptor for SARS-CoV-2, the role of ACE2 in the progression of COVID-19 after SARS-CoV-2 infection is still controversial, so the benefits of aliskiren use in patients with COVID-19 needs further investigation”. Today, many healthcare societies’ especially cardiovascular societies are urging the patients suffering from CVDs (cardiovascular diseases) not to discontinue their medications[24-26]. These healthcare societies give more stress upon statement saying that there is no sound evidence to correlate ACEs and ARBs leading risk of COVID-19 infection. It has also been noted that healthcare societies do not suggest immediate starting of ACEIs/ARBs in those patients having no settlements with clinical conditions like heart failure, diabetes, hypertension, etc. As these statements adheres to current state of evidences. The same conclusion has been derived from the recent article by Ankit Patel et al., (2020)[24]. This article suggested that there has been no definitive evidence to suggest ACE inhibitors and ARBs worsening of COVID-19. A study published by Vaduganathan et al., (2020) in New England Journal of Medicine discussed the uncertain effects of RAAS blockers on ACE2 levels[27]. They also derived to conclusion that ACE2 may be beneficial in COVID-19 patients with lung injury. This team also suggests that withdrawal of RAAS inhibitors may be harmful. A very recent review published by Dr. Sanchis-Gomar and his co-authors in Mayo Clinic Proceedings[14], by analysing more than 60 articles, concluded the fact that “no studies have reported an increase in circulating ACE2 levels or expression thus far, and increased expression would not necessarily imply an increased risk of infection or disease severity”. Dr. Sanchis-Gomar, studies both articles explaining that elevated levels of angiotensin II fostering acute respiratory distress syndrome (ARDS) as well as significance of RAAS inhibitors in therapy in treating patients with COVID-19. However, authors noted that more research in this regard is needed. CONCLUSION: In this regards, more laboratory and clinical evidences are required in order to decide COVID-19 treatment. In conclusion to this debate, suggesting roles of antihypertensive agents and severity leading changes in ACE2 levels, may shed more light on infectivity and outcome of COVID‐19.There is an urgent need to establish whether treatments with antihypertensive (ACEI’s/ ARBs) needs to be determined.
APA, Harvard, Vancouver, ISO, and other styles
31

Sivak, Allison. "Born Ugly by B. Goobie." Deakin Review of Children's Literature 1, no. 3 (January 9, 2012). http://dx.doi.org/10.20361/g2v30f.

Full text
Abstract:
Goobie, Beth. Born Ugly. Markham, ON: Red Deer Press, 2011. Print. Beth Goobie writes unflinching books. Even so, Born Ugly may be the toughest of hers I’ve read yet. Narrated by Shir Rutz, a 15-year-old girl without friends or caring family, this novel is both a realistic portrayal of high school bullying and a thriller that plays with perceptions of “goodness” in people. Goobie spends most of the novel focusing on the story of Shir’s problems, however, ultimately to the detriment of the thriller plot, which subsequently blocked me from a full immersion into the latter section of the book. Goobie is at her best when she is staring directly into the tough situations in which Shir finds herself, primarily through her status as the ugliest girl at her school. Shir is relentlessly targeted every day by a group of popular boys who offer her quarters in exchange for kisses, with the punch line that it is worth paying to kiss someone as ugly as her. She is known around the school as “dog face,” and is forced to eat a sandwich of dog feces. Her home life is little better. Her mother clearly prefers her younger sister, who is prettier and better-behaved. Shir’s father has long since vanished, and Mrs. Rutz only mentions him when she is putting her daughter down, saying that Shir is an ugly drunk, just like her dad. Shir’s sister often knows about the pranks planned for Shir, and stands and watches from the sidelines without offering any help or comfort. While Shir drinks heavily to erase the pain of her days from her mind, she has two small lights of hope: her part time job for Mr. Anderson delivering groceries, as well as an unexpected friendship with a boy she meets at her favourite hiding place under a town bridge. However, the job is not all it seems; Mr. Anderson has started to ask her to deliver packages to people and places that seem shady, and acts nervous if she asks too many questions. About the last third of the book follows the mystery to its revelation and climax. Goobie’s descriptions of the dull inevitability of a bullied teenager’s life are extremely well-written, and painfully realistic. Shir is highly believable in her voice and actions, which gave me a real sense of the slow, awful path it can be through high school. It is also a relief to read the scenes between Shir and one of her delivery clients, an elderly woman who meets her with great kindness, and provides moving descriptions of how someone can respond to even the smallest bit of warmth. The slow pace of Shir’s daily life is the strongest story here, as compared to the mystery, which makes sense but is told far too quickly, and is wrapped up too neatly to seem authentic. Nonetheless, this is a book in which I think many teenagers will find some echo of their lives. Recommended: 3 out of 4 stars Reviewer: Allison SivakAllison Sivak is the Assessment Librarian at the University of Alberta Libraries. She is currently pursuing her PhD in Library and Information Studies and Elementary Education, focusing on how the aesthetics of information design influence young people’s trust in the credibility of information content.
APA, Harvard, Vancouver, ISO, and other styles
32

Deck, Andy. "Treadmill Culture." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2157.

Full text
Abstract:
Since the first days of the World Wide Web, artists like myself have been exploring the new possibilities of network interactivity. Some good tools and languages have been developed and made available free for the public to use. This has empowered individuals to participate in the media in ways that are quite remarkable. Nonetheless, the future of independent media is clouded by legal, regulatory, and organisational challenges that need to be addressed. It is not clear to what extent independent content producers will be able to build upon the successes of the 90s – it is yet to be seen whether their efforts will be largely nullified by the anticyclones of a hostile media market. Not so long ago, American news magazines were covering the Browser War. Several real wars later, the terms of surrender are becoming clearer. Now both of the major Internet browsers are owned by huge media corporations, and most of the states (and Reagan-appointed judges) that were demanding the break-up of Microsoft have given up. A curious about-face occurred in U.S. Justice Department policy when John Ashcroft decided to drop the federal case. Maybe Microsoft's value as a partner in covert activity appealed to Ashcroft more than free competition. Regardless, Microsoft is now turning its wrath on new competitors, people who are doing something very, very bad: sharing the products of their own labour. This practice of sharing source code and building free software infrastructure is epitomised by the continuing development of Linux. Everything in the Linux kernel is free, publicly accessible information. As a rule, the people building this "open source" operating system software believe that maintaining transparency is important. But U.S. courts are not doing much to help. In a case brought by the Motion Picture Association of America against Eric Corley, a federal district court blocked the distribution of source code that enables these systems to play DVDs. In addition to censoring Corley's journal, the court ruled that any programmer who writes a program that plays a DVD must comply with a host of license restrictions. In short, an established and popular media format (the DVD) cannot be used under open source operating systems without sacrificing the principle that software source code should remain in the public domain. Should the contents of operating systems be tightly guarded secrets, or subject to public review? If there are capable programmers willing to create good, free operating systems, should the law stand in their way? The question concerning what type of software infrastructure will dominate personal computers in the future is being answered as much by disappointing legal decisions as it is by consumer choice. Rather than ensuring the necessary conditions for innovation and cooperation, the courts permit a monopoly to continue. Rather than endorsing transparency, secrecy prevails. Rather than aiming to preserve a balance between the commercial economy and the gift-economy, sharing is being undermined by the law. Part of the mystery of the Internet for a lot of newcomers must be that it seems to disprove the old adage that you can't get something for nothing. Free games, free music, free pornography, free art. Media corporations are doing their best to change this situation. The FBI and trade groups have blitzed the American news media with alarmist reports about how children don't understand that sharing digital information is a crime. Teacher Gail Chmura, the star of one such media campaign, says of her students, "It's always been interesting that they don't see a connection between the two. They just don't get it" (Hopper). Perhaps the confusion arises because the kids do understand that digital duplication lets two people have the same thing. Theft is at best a metaphor for the copying of data, because the original is not stolen in the same sense as a material object. In the effort to liken all copying to theft, legal provisions for the fair use of intellectual property are neglected. Teachers could just as easily emphasise the importance of sharing and the development of an electronic commons that is free for all to use. The values advanced by the trade groups are not beyond question and are not historical constants. According to Donald Krueckeberg, Rutgers University Professor of Urban Planning, native Americans tied the concept of property not to ownership but to use. "One used it, one moved on, and use was shared with others" (qtd. in Batt). Perhaps it is necessary for individuals to have dominion over some private data. But who owns the land, wind, sun, and sky of the Internet – the infrastructure? Given that publicly-funded research and free software have been as important to the development of the Internet as have business and commercial software, it is not surprising that some ambiguity remains about the property status of the dataverse. For many the Internet is as much a medium for expression and the interplay of languages as it is a framework for monetary transaction. In the case involving DVD software mentioned previously, there emerged a grass-roots campaign in opposition to censorship. Dozens of philosophical programmers and computer scientists asserted the expressive and linguistic bases of software by creating variations on the algorithm needed to play DVDs. The forbidden lines of symbols were printed on T-shirts, translated into different computer languages, translated into legal rhetoric, and even embedded into DNA and pictures of MPAA president Jack Valenti (see e.g. Touretzky). These efforts were inspired by a shared conviction that important liberties were at stake. Supporting the MPAA's position would do more than protect movies from piracy. The use of the algorithm was not clearly linked to an intent to pirate movies. Many felt that outlawing the DVD algorithm, which had been experimentally developed by a Norwegian teenager, represented a suppression of gumption and ingenuity. The court's decision rejected established principles of fair use, denied the established legality of reverse engineering software to achieve compatibility, and asserted that journalists and scientists had no right to publish a bit of code if it might be misused. In a similar case in April 2000, a U.S. court of appeals found that First Amendment protections did apply to software (Junger). Noting that source code has both an expressive feature and a functional feature, this court held that First Amendment protection is not reserved only for purely expressive communication. Yet in the DVD case, the court opposed this view and enforced the inflexible demands of the Digital Millennium Copyright Act. Notwithstanding Ted Nelson's characterisation of computers as literary machines, the decision meant that the linguistic and expressive aspects of software would be subordinated to other concerns. A simple series of symbols were thereby cast under a veil of legal secrecy. Although they were easy to discover, and capable of being committed to memory or translated to other languages, fair use and other intuitive freedoms were deemed expendable. These sorts of legal obstacles are serious challenges to the continued viability of free software like Linux. The central value proposition of Linux-based operating systems – free, open source code – is threatening to commercial competitors. Some corporations are intent on stifling further development of free alternatives. Patents offer another vulnerability. The writing of free software has become a minefield of potential patent lawsuits. Corporations have repeatedly chosen to pursue patent litigation years after the alleged infringements have been incorporated into widely used free software. For example, although it was designed to avoid patent problems by an array of international experts, the image file format known as JPEG (Joint Photographic Experts Group) has recently been dogged by patent infringement charges. Despite good intentions, low-budget initiatives and ad hoc organisations are ill equipped to fight profiteering patent lawsuits. One wonders whether software innovation is directed more by lawyers or computer scientists. The present copyright and patent regimes may serve the needs of the larger corporations, but it is doubtful that they are the best means of fostering software innovation and quality. Orwell wrote in his Homage to Catalonia, There was a new rule that censored portions of the newspaper must not be left blank but filled up with other matter; as a result it was often impossible to tell when something had been cut out. The development of the Internet has a similar character: new diversions spring up to replace what might have been so that the lost potential is hardly felt. The process of retrofitting Internet software to suit ideological and commercial agendas is already well underway. For example, Microsoft has announced recently that it will discontinue support for the Java language in 2004. The problem with Java, from Microsoft's perspective, is that it provides portable programming tools that work under all operating systems, not just Windows. With Java, programmers can develop software for the large number of Windows users, while simultaneously offering software to users of other operating systems. Java is an important piece of the software infrastructure for Internet content developers. Yet, in the interest of coercing people to use only their operating systems, Microsoft is willing to undermine thousands of existing Java-language projects. Their marketing hype calls this progress. The software industry relies on sales to survive, so if it means laying waste to good products and millions of hours of work in order to sell something new, well, that's business. The consequent infrastructure instability keeps software developers, and other creative people, on a treadmill. From Progressive Load by Andy Deck, artcontext.org/progload As an Internet content producer, one does not appeal directly to the hearts and minds of the public; one appeals through the medium of software and hardware. Since most people are understandably reluctant to modify the software running on their computers, the software installed initially is a critical determinant of what is possible. Unconventional, independent, and artistic uses of the Internet are diminished when the media infrastructure is effectively established by decree. Unaccountable corporate control over infrastructure software tilts the playing field against smaller content producers who have neither the advance warning of industrial machinations, nor the employees and resources necessary to keep up with a regime of strategic, cyclical obsolescence. It seems that independent content producers must conform to the distribution technologies and content formats favoured by the entertainment and marketing sectors, or else resign themselves to occupying the margins of media activity. It is no secret that highly diversified media corporations can leverage their assets to favour their own media offerings and confound their competitors. Yet when media giants AOL and Time-Warner announced their plans to merge in 2000, the claim of CEOs Steve Case and Gerald Levin that the merged companies would "operate in the public interest" was hardly challenged by American journalists. Time-Warner has since fought to end all ownership limits in the cable industry; and Case, who formerly championed third-party access to cable broadband markets, changed his tune abruptly after the merger. Now that Case has been ousted, it is unclear whether he still favours oligopoly. According to Levin, global media will be and is fast becoming the predominant business of the 21st century ... more important than government. It's more important than educational institutions and non-profits. We're going to need to have these corporations redefined as instruments of public service, and that may be a more efficient way to deal with society's problems than bureaucratic governments. Corporate dominance is going to be forced anyhow because when you have a system that is instantly available everywhere in the world immediately, then the old-fashioned regulatory system has to give way (Levin). It doesn't require a lot of insight to understand that this "redefinition," this slight of hand, does not protect the public from abuses of power: the dissolution of the "old-fashioned regulatory system" does not serve the public interest. From Lexicon by Andy Deck, artcontext.org/lexicon) As an artist who has adopted telecommunications networks and software as his medium, it disappoints me that a mercenary vision of electronic media's future seems to be the prevailing blueprint. The giantism of media corporations, and the ongoing deregulation of media consolidation (Ahrens), underscore the critical need for independent media sources. If it were just a matter of which cola to drink, it would not be of much concern, but media corporations control content. In this hyper-mediated age, content – whether produced by artists or journalists – crucially affects what people think about and how they understand the world. Content is not impervious to the software, protocols, and chicanery that surround its delivery. It is about time that people interested in independent voices stop believing that laissez faire capitalism is building a better media infrastructure. The German writer Hans Magnus Enzensberger reminds us that the media tyrannies that affect us are social products. The media industry relies on thousands of people to make the compromises necessary to maintain its course. The rapid development of the mind industry, its rise to a key position in modern society, has profoundly changed the role of the intellectual. He finds himself confronted with new threats and new opportunities. Whether he knows it or not, whether he likes it or not, he has become the accomplice of a huge industrial complex which depends for its survival on him, as he depends on it for his own. He must try, at any cost, to use it for his own purposes, which are incompatible with the purposes of the mind machine. What it upholds he must subvert. He may play it crooked or straight, he may win or lose the game; but he would do well to remember that there is more at stake than his own fortune (Enzensberger 18). Some cultural leaders have recognised the important role that free software already plays in the infrastructure of the Internet. Among intellectuals there is undoubtedly a genuine concern about the emerging contours of corporate, global media. But more effective solidarity is needed. Interest in open source has tended to remain superficial, leading to trendy, cosmetic, and symbolic uses of terms like "open source" rather than to a deeper commitment to an open, public information infrastructure. Too much attention is focussed on what's "cool" and not enough on the road ahead. Various media specialists – designers, programmers, artists, and technical directors – make important decisions that affect the continuing development of electronic media. Many developers have failed to recognise (or care) that their decisions regarding media formats can have long reaching consequences. Web sites that use media formats which are unworkable for open source operating systems should be actively discouraged. Comparable technologies are usually available to solve compatibility problems. Going with the market flow is not really giving people what they want: it often opposes the work of thousands of activists who are trying to develop open source alternatives (see e.g. Greene). Average Internet users can contribute to a more innovative, free, open, and independent media – and being conscientious is not always difficult or unpleasant. One project worthy of support is the Internet browser Mozilla. Currently, many content developers create their Websites so that they will look good only in Microsoft's Internet Explorer. While somewhat understandable given the market dominance of Internet Explorer, this disregard for interoperability undercuts attempts to popularise standards-compliant alternatives. Mozilla, written by a loose-knit group of activists and programmers (some of whom are paid by AOL/Time-Warner), can be used as an alternative to Microsoft's browser. If more people use Mozilla, it will be harder for content providers to ignore the way their Web pages appear in standards-compliant browsers. The Mozilla browser, which is an open source initiative, can be downloaded from http://www.mozilla.org/. While there are many people working to create real and lasting alternatives to the monopolistic and technocratic dynamics that are emerging, it takes a great deal of cooperation to resist the media titans, the FCC, and the courts. Oddly enough, corporate interests sometimes overlap with those of the public. Some industrial players, such as IBM, now support open source software. For them it is mostly a business decision. Frustrated by the coercive control of Microsoft, they support efforts to develop another operating system platform. For others, including this writer, the open source movement is interesting for the potential it holds to foster a more heterogeneous and less authoritarian communications infrastructure. Many people can find common cause in this resistance to globalised uniformity and consolidated media ownership. The biggest challenge may be to get people to believe that their choices really matter, that by endorsing certain products and operating systems and not others, they can actually make a difference. But it's unlikely that this idea will flourish if artists and intellectuals don't view their own actions as consequential. There is a troubling tendency for people to see themselves as powerless in the face of the market. This paralysing habit of mind must be abandoned before the media will be free. Works Cited Ahrens, Frank. "Policy Watch." Washington Post (23 June 2002): H03. 30 March 2003 <http://www.washingtonpost.com/ac2/wp-dyn/A27015-2002Jun22?la... ...nguage=printer>. Batt, William. "How Our Towns Got That Way." 7 Oct. 1996. 31 March 2003 <http://www.esb.utexas.edu/drnrm/WhatIs/LandValue.htm>. Chester, Jeff. "Gerald Levin's Negative Legacy." Alternet.org 6 Dec. 2001. 5 March 2003 <http://www.democraticmedia.org/resources/editorials/levin.php>. Enzensberger, Hans Magnus. "The Industrialisation of the Mind." Raids and Reconstructions. London: Pluto Press, 1975. 18. Greene, Thomas C. "MS to Eradicate GPL, Hence Linux." 25 June 2002. 5 March 2003 <http://www.theregus.com/content/4/25378.php>. Hopper, D. Ian. "FBI Pushes for Cyber Ethics Education." Associated Press 10 Oct. 2000. 29 March 2003 <http://www.billingsgazette.com/computing/20001010_cethics.php>. Junger v. Daley. U.S. Court of Appeals for 6th Circuit. 00a0117p.06. 2000. 31 March 2003 <http://pacer.ca6.uscourts.gov/cgi-bin/getopn.pl?OPINION=00a0... ...117p.06>. Levin, Gerald. "Millennium 2000 Special." CNN 2 Jan. 2000. Touretzky, D. S. "Gallery of CSS Descramblers." 2000. 29 March 2003 <http://www.cs.cmu.edu/~dst/DeCSS/Gallery>. Links http://artcontext.org/lexicon/ http://artcontext.org/progload http://pacer.ca6.uscourts.gov/cgi-bin/getopn.pl?OPINION=00a0117p.06 http://www.billingsgazette.com/computing/20001010_cethics.html http://www.cs.cmu.edu/~dst/DeCSS/Gallery http://www.democraticmedia.org/resources/editorials/levin.html http://www.esb.utexas.edu/drnrm/WhatIs/LandValue.htm http://www.mozilla.org/ http://www.theregus.com/content/4/25378.html http://www.washingtonpost.com/ac2/wp-dyn/A27015-2002Jun22?language=printer Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Deck, Andy. "Treadmill Culture " M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0304/04-treadmillculture.php>. APA Style Deck, A. (2003, Apr 23). Treadmill Culture . M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0304/04-treadmillculture.php>
APA, Harvard, Vancouver, ISO, and other styles
33

Conti, Olivia. "Disciplining the Vernacular: Fair Use, YouTube, and Remixer Agency." M/C Journal 16, no. 4 (August 11, 2013). http://dx.doi.org/10.5204/mcj.685.

Full text
Abstract:
Introduction The research from which this piece derives explores political remix video (PRV), a genre in which remixers critique dominant discourses and power structures through guerrilla remixing of copyrighted footage (“What Is Political Remix Video?”). Specifically, I examined the works of political video remixer Elisa Kreisinger, whose queer remixes of shows such as Sex and the City and Mad Men received considerable attention between 2010 and the present. As a rhetoric scholar, I am attracted not only to the ways that remix functions discursively but also the ways in which remixers are constrained in their ability to argue, and what recourse they have in these situations of legal and technological constraint. Ultimately, many of these struggles play out on YouTube. This is unsurprising: many studies of YouTube and other user-generated content (UGC) platforms focus on the fact that commercial sites cannot constitute utopian, democratic, or free environments (Hilderbrand; Hess; Van Dijck). However, I find that, contrary to popular belief, YouTube’s commercial interests are not the primary factor limiting remixer agency. Rather, United States copyright law as enacted on YouTube has the most potential to inhibit remixers. This has led to many remixers becoming advocates for fair use, the provision in the Copyright Act of 1976 that allows for limited use of copyrighted content. With this in mind, I decided to delve more deeply into the framing of fair use by remixers and other advocates such as the Electronic Frontier Foundation (EFF) and the Center for Social Media. In studying discourses of fair use as they play out in the remix community, I find that the framing of fair use bears a striking similarity to what rhetoric scholars have termed vernacular discourse—a discourse emanating from a small segment of the larger civic community (Ono and Sloop 23). The vernacular is often framed as that which integrates the institutional or mainstream while simultaneously asserting its difference through appropriation and subversion. A video qualifies as fair use if it juxtaposes source material in a new way for the purposes of critique. In turn, a vernacular text asserts its “vernacularity” by taking up parts of pre-existing dominant institutional discourses in a way that resonates with a smaller community. My argument is that this tension between institutional and vernacular gives political remix video a multivalent argument—one that presents itself both in the text of the video itself as well as in the video’s status as a fair use of copyrighted material. Just as fair use represents the assertion of creator agency against unfair copyright law, vernacular discourse represents the assertion of a localised community within a world dominated by institutional discourses. In this way, remixers engage rights holders and other institutions in a pleasurable game of cat and mouse, a struggle to expose the boundaries of draconian copyright law. YouTube’s Commercial InterestsYouTube’s commercial interests operate at a level potentially invisible to the casual user. While users provide YouTube with content, they also provide the site with data—both metadata culled from their navigations of the site (page views, IP addresses) as well as member-provided data (such as real name and e-mail address). YouTube mines this data for a number of purposes—anything from interface optimisation to targeted advertising via Google’s AdSense. Users also perform a certain degree of labour to keep the site running smoothly, such as reporting videos that violate the Terms of Service, giving videos the thumbs up or thumbs down, and reporting spam comments. As such, users involved in YouTube’s participatory culture are also necessarily involved in the site’s commercial interests. While there are legitimate concerns regarding the privacy of personal information, especially after Google introduced policies in 2012 to facilitate a greater flow of information across all of their subsidiaries, it does not seem that this has diminished YouTube’s popularity (“Google: Privacy Policy”).Despite this, some make the argument that users provide the true benefit of UGC platforms like YouTube, yet reap few rewards, creating an exploitative dynamic (Van Dijck, 46). Two assumptions seem to underpin this argument: the first is that users do not desire to help these platforms prosper, the second is that users expect to profit from their efforts on the website. In response to these arguments, it’s worth calling attention to scholars who have used alternative economic models to account for user-platform coexistence. This is something that Henry Jenkins addresses in his recent book Spreadable Media, largely by focusing on assigning alternate sorts of value to user and fan labour—either the cultural worth of the gift, or the satisfaction of a job well done common to pre-industrial craftsmanship (61). However, there are still questions of how to account for participatory spaces in which labours of love coexist with massively profitable products. In service of this point, Jenkins calls up Lessig, who posits that many online networks operate as hybrid economies, which combine commercial and sharing economies. In a commercial economy, profit is the primary consideration, while a sharing economy is composed of participants who are there because they enjoy doing the work without any expectation of compensation (176). The strict separation between the two economies is, in Lessig’s estimation, essential to the hybrid economy’s success. While it would be difficult to incorporate these two economies together once each had been established, platforms like YouTube have always operated under the hybrid principle. YouTube’s users provide the site with its true value (through their uploading of content, provision of metadata, and use of the site), yet users do not come to YouTube with these tasks in mind—they come to YouTube because it provides an easy-to-use platform by which to share amateur creativity, and a community with whom to interact. Additionally, YouTube serves as the primary venue where remixers can achieve visibility and viral status—something Elisa Kreisinger acknowledged in our interviews (2012). However, users who are not concerned with broad visibility as much as with speaking to particular viewers may leave YouTube if they feel that the venue does not suit their content. Some feminist fan vidders, for instance, have withdrawn from YouTube due to what they perceived as a community who didn’t understand their work (Kreisinger, 2012). Additionally, Kreisinger ended up garnering many more views of her Queer Men remix on Vimeo due simply to the fact that the remix’s initial upload was blocked via YouTube’s Content ID feature. By the time Kreisinger had argued her case with YouTube, the Vimeo link had become the first stop for those viewing and sharing the remix, which received 72,000 views to date (“Queer Men”). Fair Use, Copyright, and Content IDThis instance points to the challenge that remixers face when dealing with copyright on YouTube, a site whose processes are not designed to accommodate fair use. Specifically, Title II, Section 512 of the DMCA (the Digital Millennium Copyright Act, passed in 1998) states that certain websites may qualify as “safe harbours” for copyright infringement if users upload the majority of the content to the site, or if the site is an information location service. These sites are insulated from copyright liability as long as they cooperate to some extent with rights holders. A common objection to Section 512 is that it requires media rights holders to police safe harbours in search of infringing content, rather than placing the onus on the platform provider (Meyers 939). In order to cooperate with Section 512 and rights holders, YouTube initiated the Content ID system in 2007. This system offers rights holders the ability to find and manage their content on the site by creating archives of footage against which user uploads are checked, allowing rights holders to automatically block, track, or monetise uses of their content (it is also worth noting that rights holders can make these responses country-specific) (“How Content ID Works”). At the current time, YouTube has over 15 million reference files against which it checks uploads (“Statistics - YouTube”). Thus, it’s fairly common for uploaded work to get flagged as a violation, especially when that work is a remix of popular institutional footage. If an upload is flagged by the Content ID system, the user can dispute the match, at which point the rights holder has the opportunity to either allow the video through, or to issue a DMCA takedown notice. They can also sue at any point during this process (“A Guide to YouTube Removals”). Content ID matches are relatively easy to dispute and do not generally require legal intervention. However, disputing these automatic takedowns requires users to be aware of their rights to fair use, and requires rights holders to acknowledge a fair use (“YouTube Removals”). This is only compounded by the fact that fair use is not a clearly defined right, but rather a vague provision relying on a balance between four factors: the purpose of the use, character of the work, the amount used, and the effect on the market value of the original (“US Copyright Office–Fair Use”). As Aufderheide and Jaszi observed in 2008, the rejection of videos for Content ID matches combined with the vagaries of fair use has a chilling effect on user-generated content. Rights Holders versus RemixersRights holders’ objections to Section 512 illustrate the ruling power dynamic in current intellectual property disputes: power rests with institutional rights-holding bodies (the RIAA, the MPAA) who assert their dominance over DMCA safe harbours such as YouTube (who must cooperate to stay in business) who, in turn, exert power over remixers (the lowest on the food chain, so to speak). Beyond the observed chilling effect of Content ID, remix on YouTube is shot through with discursive struggle between these rights-holding bodies and remixers attempting to express themselves and reach new communities. However, this has led political video remixers to become especially vocal when arguing for their uses of content. For instance, in the spring of 2009, Elisa Kreisinger curated a show entitled “REMOVED: The Politics of Remix Culture” in which blocked remixes screened alongside the remixers’ correspondence with YouTube. Kreisinger writes that each of these exchanges illustrate the dynamic between rights holders and remixers: “Your video is no longer available because FOX [or another rights-holding body] has chosen to block it (“Remixed/Removed”). Additionally, as Jenkins notes, even Content ID on YouTube is only made available to the largest rights holders—smaller companies must still go through an official DMCA takedown process to report infringement (Spreadable 51). In sum, though recent technological developments may give the appearance of democratising access to content, when it comes to policing UGC, technology has made it easier for the largest rights holders to stifle the creation of content.Additionally, it has been established that rights holders do occasionally use takedowns abusively, and recent court cases—specifically Lenz v. Universal Music Corp.—have established the need for rights holders to assess fair use in order to make a “good faith” assertion that users intend to infringe copyright prior to issuing a takedown notice. However, as Joseph M. Miller notes, the ruling fails to rebalance the burdens and incentives between rights holders and users (1723). This means that while rights holders are supposed to take fair use into account prior to issuing takedowns, there is no process in place that either effectively punishes rights holders who abuse copyright, or allows users to defend themselves without the possibility of massive financial loss (1726). As such, the system currently in place does not disallow or discourage features like Content ID, though cases like Lenz v. Universal indicate a push towards rebalancing the burden of determining fair use. In an effort to turn the tables, many have begun arguing for users’ rights and attempting to parse fair use for the layperson. The Electronic Frontier Foundation (EFF), for instance, has espoused an “environmental rhetoric” of fair use, casting intellectual property as a resource for users (Postigo 1020). Additionally, they have created practical guidelines for UGC creators dealing with DMCA takedowns and Content ID matches on YouTube. The Center for Social Media has also produced a number of fair use guides tailored to different use cases, one of which targeted online video producers. All of these efforts have a common goal: to educate content creators about the fair use of copyrighted content, and then to assert their use as fair in opposition to large rights-holding institutions (though they caution users against unfair uses of content or making risky legal moves that could lead to lawsuits). In relation to remix specifically, this means that remixers must differentiate themselves from institutional, commercial content producers, standing up both for the argument contained in their remix as well as their fair use of copyrighted content.In their “Code of Best Practices for Fair Use in Online Video,” the Center for Social Media note that an online video qualifies as a fair use if (among other things) it critiques copyrighted material and if it “recombines elements to make a new work that depends for its meaning on (often unlikely) relationships between the elements” (8). These two qualities are also two of the defining qualities of political remix video. For instance, they write that work meets the second criteria if it creates “new meaning by juxtaposition,” noting that in these cases “the recombinant new work has a cultural identity of its own and addresses an audience different from those for which its components were intended” (9). Remixes that use elements of familiar sources in unlikely combinations, such as those made by Elisa Kreisinger, generally seek to reach an audience who are familiar with the source content, but also object to it. Sex and the City, for instance, while it initially seemed willing to take on previously “taboo” topics in its exploration of dating in Manhattan, ended with each of the heterosexual characters paired with an opposite sex partner, and forays from this heteronormative narrative were contained either within in one-off episodes or tokenised gay characters. For this reason, Kreisinger noted that the intended audience for Queer Carrie were the queer and feminist viewers of Sex and the City who felt that the show was overly normative and exclusionary (Kreisinger, Art:21). As a result, the target audience of these remixes is different from the target audience of the source material—though the full nuance of the argument is best understood by those familiar with the source. Thus, the remix affirms the segment of the viewing community who saw only tokenised representations of their identity in the source text, and in so doing offers a critique of the original’s heteronormative focus.Fair Use and the VernacularVernacular discourse, as broadly defined by Kent A. Ono and John M. Sloop, refers to discourses that “emerge from discussions between members of self-identified smaller communities within the larger civic community.” It operates partially through appropriating dominant discourses in ways better suited to the vernacular community, through practices of pastiche and cultural syncretism (23). In an effort to better describe the intricacies of this type of discourse, Robert Glenn Howard theorised a hybrid “dialectical vernacular” that oscillates between institutional and vernacular discourse. This hybridity arises from the fact that the institutional and the vernacular are fundamentally inseparable, the vernacular establishing its meaning by asserting itself against the institutional (Howard, Toward 331). When put into use online, this notion of a “dialectical vernacular” is particularly interesting as it refers not only to the content of vernacular messages but also to their means of production. Howard notes that discourse embodying the dialectical vernacular is by nature secondary to institutional discourse, that the institutional must be clearly “structurally prior” (Howard, Vernacular 499). With this in mind it is unsurprising that political remix video—which asserts its secondary nature by calling upon pre-existing copyrighted content while simultaneously reaching out to smaller segments of the civic community—would qualify as a vernacular discourse.The notion of an institutional source’s structural prevalence also echoes throughout work on remix, both in practical guides such as the Center for Social Media’s “Best Practices” as well as in more theoretical takes on remix, like Eduardo Navas’ essay “Turbulence: Remixes + Bonus Beats,” in which he writes that:In brief, the remix when extended as a cultural practice is a second mix of something pre-existent; the material that is mixed for a second time must be recognized, otherwise it could be misunderstood as something new, and it would become plagiarism […] Without a history, the remix cannot be Remix. An elegant theoretical concept, this becomes muddier when considered in light of copyright law. If the history of remix is what gives it its meaning—the source text from which it is derived—then it is this same history that makes a fair use remix vulnerable to DMCA takedowns and other forms of discipline on YouTube. However, as per the criteria outlined by the Center for Social Media, it is also from this ironic juxtaposition of institutional sources that the remix object establishes its meaning, and thus its vernacularity. In this sense, the force of a political remix video’s argument is in many ways dependent on its status as an object in peril: vulnerable to the force of a law that has not yet swung in its favor, yet subversive nonetheless.With this in mind, YouTube and other UGC platforms represent a fraught layer of mediation between institutional and vernacular. As a site for the sharing of amateur video, YouTube has the potential to affirm small communities as users share similar videos, follow one particular channel together, or comment on videos posted by people in their networks. However, YouTube’s interface (rife with advertisements, constantly reminding users of its affiliation with Google) and cooperation with rights holders establish it as an institutional space. As such, remixes on the site are already imbued with the characteristic hybridity of the dialectical vernacular. This is especially true when the remixers (as in the case of PRV) have made the conscious choice to advocate for fair use at the same time that they distribute remixes dealing with other themes and resonating with other communities. ConclusionPolitical remix video sits at a fruitful juncture with regard to copyright as well as vernacularity. Like almost all remix, it makes its meaning through juxtaposing sources in a unique way, calling upon viewers to think about familiar texts in a new light. This creation invokes a new audience—a quality that makes it both vernacular and also a fair use of content. Given that PRV is defined by the “guerrilla” use of copyrighted footage, it has the potential to stand as a political statement outside of the thematic content of the remix simply due to the nature of its composition. This gives PRV tremendous potential for multivalent argument, as a video can simultaneously represent a marginalised community while advocating for copyright reform. This is only reinforced by the fact that many political video remixers have become vocal in advocating for fair use, asserting the strength of their community and their common goal.In addition to this argumentative richness, PRV’s relation to fair use and vernacularity exposes the complexity of the remix form: it continually oscillates between institutional affiliations and smaller vernacular communities. However, the hybridity of these remixes produces tension, much of which manifests on YouTube, where videos are easily responded to and challenged by both institutuional and vernacular authorities. In addition, a tension exists in the remix text itself between the source and the new, remixed message. Further research should attend to these areas of tension, while also exploring the tenacity of the remix community and their ability to advocate for themselves while circumventing copyright law.References“About Political Remix Video.” Political Remix Video. 15 Feb. 2012. ‹http://www.politicalremixvideo.com/what-is-political-remix/›.Aufderheide, Patricia, and Peter Jaszi. Reclaiming Fair Use: How to Put Balance Back in Copyright. Chicago: U of Chicago P, 2008. Kindle.“Code of Best Practices for Fair Use in Online Video.” The Center For Social Media, 2008. Van Dijck, José. “Users like You? Theorizing Agency in User-Generated Content.” Media Culture Society 31 (2009): 41-58.“A Guide to YouTube Removals,” The Electronic Frontier Foundation, 15 June 2013 ‹https://www.eff.org/issues/intellectual-property/guide-to-YouTube-removals›.Hilderbrand, Lucas. “YouTube: Where Cultural Memory and Copyright Converge.” Film Quarterly 61.1 (2007): 48-57.Howard, Robert Glenn. “The Vernacular Web of Participatory Media.” Critical Studies in Media Communication 25.5 (2008): 490-513.Howard, Robert Glenn. “Toward a Theory of the World Wide Web Vernacular: The Case for Pet Cloning.” Journal of Folklore Research 42.3 (2005): 323-60.“How Content ID Works.” YouTube. 21 June 2013. ‹https://support.google.com/youtube/answer/2797370?hl=en›.Jenkins, Henry, Sam Ford, and Joshua Green. Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York U P, 2013. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York U P, 2006. Kreisinger, Elisa. Interview with Nick Briz. Art:21. Art:21, 30 June 2011. 21 June 2013.Kreisinger, Elisa. “Queer Video Remix and LGBTQ Online Communities,” Transformative Works and Cultures 9 (2012). 19 June 2013 ‹http://journal.transformativeworks.org/index.php/twc/article/view/395/264›.Kreisinger, Elisa. Pop Culture Pirate. < http://www.popculturepirate.com/ >.Lessig, Lawrence. Remix: Making Art and Commerce Thrive in the Hybrid Economy. New York: Penguin Books, 2008. PDF.Meyers, B.G. “Filtering Systems or Fair Use? A Comparative Analysis of Proposed Regulations for User-Generated Content.” Cardozo Arts & Entertainment Law Journal 26.3: 935-56.Miller, Joseph M. “Fair Use through the Lenz of § 512(c) of the DMCA: A Preemptive Defense to a Premature Remedy?” Iowa Law Review 95 (2009-2010): 1697-1729.Navas, Eduardo. “Turbulence: Remixes + Bonus Beats.” New Media Fix 1 Feb. 2007. 10 June 2013 ‹http://newmediafix.net/Turbulence07/Navas_EN.html›.Ono, Kent A., and John M. Sloop. Shifting Borders: Rhetoric, Immigration and California’s Proposition 187. Philadelphia: Temple U P, 2002.“Privacy Policy – Policies & Principles.” Google. 19 June 2013 ‹http://www.google.com/policies/privacy/›.Postigo, Hector. “Capturing Fair Use for The YouTube Generation: The Digital Rights Movement, the Electronic Frontier Foundation, and the User-Centered Framing of Fair Use.” Information, Communication & Society 11.7 (2008): 1008-27.“Statistics – YouTube.” YouTube. 21 June 2013 ‹http://www.youtube.com/yt/press/statistics.html›.“US Copyright Office: Fair Use,” U.S. Copyright Office. 19 June 2013 ‹http://www.copyright.gov/fls/fl102.html›.“YouTube Help.” YouTube FAQ. 19 June 2013 ‹http://support.google.com/youtube/?hl=en&topic=2676339&rd=2›.
APA, Harvard, Vancouver, ISO, and other styles
34

Ballard, Su. "Information, Noise and et al." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2704.

Full text
Abstract:
The two companions scurry off when they hear a noise at the door. It was only a noise, but it was also a message, a bit of information producing panic: an interruption, a corruption, a rupture of communication. Was the noise really a message? Wasn’t it, rather, static, a parasite? Michael Serres, 1982. Since, ordinarily, channels have a certain amount of noise, and therefore a finite capacity, exact transmission is impossible. Claude Shannon, 1948. Reading Information At their most simplistic, there are two means for shifting information around – analogue and digital. Analogue movement depends on analogy to perform computations; it is continuous and the relationships between numbers are keyed as a continuous ordinal set. The digital set is discrete; moving one finger at a time results in a one-to-one correspondence. Nevertheless, analogue and digital are like the two companions in Serres’ tale. Each suffers the relationship of noise to information as internal rupture and external interference. In their examination of historical constructions of information, Hobart and Schiffman locate the noise of the analogue within its physical materials; they write, “All analogue machines harbour a certain amount of vagueness, known technically as ‘noise’. Which describes the disturbing influences of the machine’s physical materials on its calculations” (208). These “certain amounts of vagueness” are essential to Claude Shannon’s articulation of a theory for information transfer that forms the basis for this paper. In transforming the structures and materials through which it travels, information has left its traces in digital art installation. These traces are located in installation’s systems, structures and materials. The usefulness of information theory as a tool to understand these relationships has until recently been overlooked by a tradition of media art history that has grouped artworks according to the properties of the artwork and/or tied them into the histories of representation and perception in art theory. Throughout this essay I use the productive dual positioning of noise and information to address the errors and impurity inherent within the viewing experiences of digital installation. Information and Noise It is not hard to see why the fractured spaces of digital installation are haunted by histories of information science. In his 1948 essay “The Mathematical Theory of Communication” Claude Shannon developed a new model for communications technologies that articulated informational feedback processes. Discussions of information transmission through phone lines were occurring alongside the development of technology capable of computing multiple discrete and variable packets of information: that is, the digital computer. And, like art, information science remains concerned with the material spaces of transmission – whether conceptual, social or critical. In the context of art something is made to be seen, understood, viewed, or presented as a series of relationships that might be established between individuals, groups, environments, and sensations. Understood this way art is an aesthetic relationship between differing material bodies, images, representations, and spaces. It is an event. Shannon was adamant that information must not be confused with meaning. To increase efficiency he insisted that the message be separated from its components; in particular, those aspects that were predictable were not to be considered information (Hansen 79). The problem that Shannon had to contend with was noise. Unwanted and disruptive, noise became symbolic of the struggle to control the growth of systems. The more complex the system, the more noise needed to be addressed. Noise is both the material from which information is constructed, as well as being the matter which information resists. Weaver (Shannon’s first commentator) writes: In the process of being transmitted, it is unfortunately characteristic that certain things are added to the signal which were not intended by the information source. These unwanted additions may be distortions of sound (in telephony, for example) or static (in radio), or distortions in shape or shading of picture (television), or errors in transmission (telegraphy or facsimile), etc. All of these changes in the transmitted signal are called noise. (4). To enable more efficient message transmission, Shannon designed systems that repressed as much noise as possible, while also acknowledging that without some noise information could not be transmitted. Shannon’s conception of information meant that information would not change if the context changed. This was crucial if a general theory of information transmission was to be plausible and meant that a methodology for noise management could be foregrounded (Pask 123). Without meaning, information became a quantity, a yes or no decision, that Shannon called a “bit” (1). Shannon’s emphasis on separating signal or message from both predicability and external noise appeared to give information an identity where it could float free of a material substance and be treated independently of context. However, for this to occur information would have to become fixed and understood as an entity. Shannon went to pains to demonstrate that the separation of meaning and information was actually to enable the reverse. A fluidity of information and the possibilities for encoding it would mean that information, although measurable, did not have a finite form. Tied into the paradox of this equation is the crucial role of noise or error. In Shannon’s communication model information is not only complicit with noise; it is totally dependant upon it for understanding. Without noise, either encoded within the original message or present from sources outside the channel, information cannot get through. The model of sender-encoder-channel-signal (message)-decoder-receiver that Shannon constructed has an arrow inserting noise. Visually and schematically this noise is a disruption pointing up and inserting itself in the nice clean lines of the message. This does not mean that noise was a last minute consideration; rather noise was the very thing Shannon was working with (and against). It is present in every image we have of information. A source, message, transmitter, receiver and their attendant noises are all material infrastructures that serve to contextualise the information they transmit, receive, and disrupt. Figure 1. Claude Shannon “The Mathematical Theory of Communication” 1948. In his analytical discussion of the diagram, Shannon actually locates noise in two crucial places. The first position accorded noise is external, marked by the arrow that demonstrates how noise is introduced to the message channel whilst in transit. External noise confuses the purity of the message whilst equivocally adding new information. External noise has a particular materiality and enters the equation as unexplained variation and random error. This is disruptive presence rather than entropic coded pattern. Shannon offers this equivocal definition of noise to be everything that is outside the linear model of sender-channel-receiver; hence, anything can be noise if it enters a channel where it is unwelcome. Secondly, noise was defined as unpredictability or entropy found and encoded within the message itself. This for Shannon was an essential and, in some ways, positive role. Entropic forces invited continual reorganisation and (when engaging the laws of redundancy) assisted with the removal of repetition enabling faster message transmission (Shannon 48). Weaver calls this shifting relationship between entropy and message “equivocation” (11). Weaver identified equivocation as central to the manner in which noise and information operated. A process of equivocation identified the receiver’s knowledge. For Shannon, a process of equivocation mediated between useful information and noise, as both were “measured in the same units” (Hayles, Chaos 55). To eliminate noise completely is to sacrifice information. Information understood in this way is also about relationships between differing material bodies, representations, and spaces, connected together for the purposes of transmission. It, like the artwork, is an event. This would appear to suggest a correlation between information transmission and viewing in galleries. Far from it. Although, the contemporary information channel is essentially a tube with fixed walls, (it is still constrained by physical properties, bandwidth and so on) and despite the implicit spatialisation of information models, I am not proposing a direct correlation between information channels and installation spaces. This is because I am not interested in ‘reading’ the information of either environment. What I am suggesting is that both environments share this material of noise. Noise is present in four places. Firstly noise is within the media errors of transmission, and secondly, it is within the media of the installation, (neither of which are one way flows). Thirdly, the viewer or listener introduces noise as interference, and lastly, it is present in the very materials thorough which it travels. Noise layered on noise. Redundancy and Modulation So far in this paper I have discussed the relationship of information to noise. For the remainder, I want to address some particular processes or manifestations of noise in New Zealand artists’ collective, et al.’s maintenance of social solidarity–instance 5 (2006, exhibited as part of the SCAPE Biennal of Art in Public Space, Christchurch Art Gallery). The installation occupies a small alcove that is partially blocked by a military-style portable table stacked with newspapers. Inside the space are three grey wooden chairs, some headphones, and a modified data projection of Google Earth. It is not immediately clear if the viewer is allowed within the spaces of the alcove to listen to the headphones as monotonous voices fill the whole space intoning political, social, and religious platitudes. The headphones might be a tool to block out the noise. In the installation it is as if multiple messages have been sent but their source, channel, and transmitter are unintelligible to the receiver. All that is left is information divorced from meaning. As other works by et al. have demonstrated, social solidarity is not a fundamentalism with directed positions and singular leaders. For example, in rapture (2004) noise disrupts all presence as a portable shed quivers in response to underground nuclear explosions 40,000km away. In the fundamental practice (2005) the viewer is left attempting to decode the un-encoded, as again sound and large steel barriers control and determine only certain movements (see http://www.etal.name/ for some documentation of these projects) . maintenance of social solidarity–instance 5 is a development of the fundamental practice. To enter its spaces viewers slip around the table and find themselves extremely close to the projection screen. Despite the provision of copious media the viewer cannot control any aspect of the environment. On screen, and apparently integral to the Google Earth imagery, are five animated and imposing dark grey monolith forms. Because of their connection to the monotonous voices in the headphones, the monoliths seem to map the imposition of narrative, power, and force in various disputed territories. Like their sudden arrival in Kubrick’s 2001: A Space Odyssey (1968) it is the contradiction of the visibility and improbability of the monoliths that renders them believable. On the video landscape the five monoliths apparently house the dispassionate voices of many different media and political authorities. Their presence is both redundant and essential as they modulate the layering of media forces – and in between, error slips in. In a broad discussion of information Gilles Deleuze and Felix Guattari highlight the necessary role of redundancy commenting that: redundancy has two forms, frequency and resonance; the first concerns the significance of information, the second (I=I) concerns the subjectivity of communication. It becomes apparent that information and communication, and even significance and subjectification, are subordinate to redundancy (79). In maintenance of social solidarity–instance 5 patterns of frequency highlight the necessary role of entropy where it is coded into gaps in the vocal transmission. Frequency is a structuring of information tied to meaningful communication. Resonance, like the stack of un-decodable newspapers on the portable table, is the carrier of redundancy. It is in the gaps between the recorded voices that connections between the monoliths and the texts are made, and these two forms of redundancy emerge. As Shannon says, redundancy is a problem of language. This is because redundancy and modulation do not equate with relationship of signal to noise. Signal to noise is a representational relationship; frequency and resonance are not representational but relational. This means that an image that might be “real-time” interrupts our understanding that the real comes first with representation always trailing second (Virilio 65). In maintenance of social solidarity–instance 5 the monoliths occupy a fixed spatial ground, imposed over the shifting navigation of Google Earth (this is not to mistake Google Earth with the ‘real’ earth). Together they form a visual counterpoint to the texts reciting in the viewer’s ears, which themselves might present as real but again, they aren’t. As Shannon contended, information cannot be tied to meaning. Instead, in the race for authority and thus authenticity we find interlopers, noisy digital images that suggest the presence of real-time perception. The spaces of maintenance of social solidarity–instance 5 meld representation and information together through the materiality of noise. And across all the different modalities employed, the appearance of noise is not through formation, but through error, accident, or surprise. This is the last step in a movement away from the mimetic obedience of information and its adherence to meaning-making or representational systems. In maintenance of social solidarity–instance 5 we are forced to align real time with virtual spaces and suspend our disbelief in the temporal truths that we see on the screen before us. This brief introduction to the work has returned us to the relationship between analogue and digital materials. Signal to noise is an analogue relationship of presence and absence. No signal equals a break in transmission. On the other hand, a digital system, due to its basis in discrete bits, transmits through probability (that is, the transmission occurs through pattern and randomness, rather than presence and absence (Hayles, How We Became 25). In his use of Shannon’s theory for the study of information transmission, Schwartz comments that the shift in information theory from analogue to digital is a shift from an analogue relationship of signal to noise to one of the probability of error (318). As I have argued in this paper, if it is measured as a quantity, noise is productive; it adds information. In both digital and analogue systems it is predictability and repetition that do not contribute information. Von Neumann makes the distinction clear saying that to some extent the “precision” of the digital machine “is absolute.” Even though, error as a matter of normal operation and not solely … as an accident attributable to some definite breakdown, nevertheless creeps in (294). Error creeps in. In maintenance of social solidarity–instance 5, et al. disrupts signal transmission by layering ambiguities into the installation. Gaps are left for viewers to introduce misreadings of scale, space, and apprehension. Rather than selecting meaning out of information within nontechnical contexts, a viewer finds herself in the same sphere as information. Noise imbricates both information and viewer within a larger open system. When asked about the relationship with the viewer in her work, et al. collaborator p.mule writes: To answer the 1st question, communication is important, clarity of concept. To answer the 2nd question, we are all receivers of information, how we process is individual. To answer the 3rd question, the work is accessible if you receive the information. But the question remains: how do we receive the information? In maintenance of social solidarity–instance 5 the system dominates. Despite the use of sound engineering and sophisticated Google Earth mapping technologies, the work appears to be constructed from discarded technologies both analogue and digital. The ominous hovering monoliths suggest answers: that somewhere within this work are methodologies to confront the materialising forces of digital error. To don the headphones is to invite a position that operates as a filtering of power. The parameters for this power are in a constant state of flux. This means that whilst mapping these forces the work does not locate them. Sound is encountered and constructed. Furthermore, the work does not oppose digital and analogue, for as von Neumann comments “the real importance of the digital procedure lies in its ability to reduce the computational noise level to an extent which is completely unobtainable by any other (analogy) procedure” (295). maintenance of social solidarity–instance 5 shows how digital and analogue come together through the productive errors of modulation and redundancy. et al.’s research constantly turns to representational and meaning making systems. As one instance, maintenance of social solidarity–instance 5 demonstrates how the digital has challenged the logics of the binary in the traditions of information theory. Digital logics are modulated by redundancies and accidents. In maintenance of social solidarity–instance 5 it is not possible to have information without noise. If, as I have argued here, digital installation operates between noise and information, then, in a constant disruption of the legacies of representation, immersion, and interaction, it is possible to open up material languages for the digital. Furthermore, an engagement with noise and error results in a blurring of the structures of information, generating a position from which we can discuss the viewer as immersed within the system – not as receiver or meaning making actant, but as an essential material within the open system of the artwork. References Barr, Jim, and Mary Barr. “L. Budd et al.” Toi Toi Toi: Three Generations of Artists from New Zealand. Ed. Rene Block. Kassel: Museum Fridericianum, 1999. 123. Burke, Gregory, and Natasha Conland, eds. et al. the fundamental practice. Wellington: Creative New Zealand, 2005. Burke, Gregory, and Natasha Conland, eds. Venice Document. et al. the fundamental practice. Wellington: Creative New Zealand, 2006. Daly-Peoples, John. Urban Myths and the et al. Legend. 21 Aug. 2004. The Big Idea (reprint) http://www.thebigidea.co.nz/print.php?sid=2234>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Trans. Brian Massumi. London: The Athlone Press, 1996. Hansen, Mark. New Philosophy for New Media. Cambridge, MA and London: MIT Press, 2004. Hayles, N. Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago and London: U of Chicago P, 1999. Hayles, N. Katherine. Chaos Bound: Orderly Disorder in Contemporary Literature and Science. Ithaca and London: Cornell University, 1990. Hobart, Michael, and Zachary Schiffman. Information Ages: Literacy, Numeracy, and the Computer Revolution. Baltimore: Johns Hopkins UP, 1998. p.mule, et al. 2007. 2 Jul. 2007 http://www.etal.name/index.htm>. Pask, Gordon. An Approach to Cybernetics. London: Hutchinson, 1961. Paulson, William. The Noise of Culture: Literary Texts in a World of Information. Ithaca and London: Cornell University, 1988. Schwartz, Mischa. Information Transmission, Modulation, and Noise: A Unified Approach to Communication Systems. 3rd ed. New York: McGraw-Hill, 1980. Serres, Michel. The Parasite. Trans. Lawrence R. Schehr. Baltimore: John Hopkins UP, 1982. Shannon, Claude. A Mathematical Theory of Communication. July, October 1948. Online PDF. 27: 379-423, 623-656 (reprinted with corrections). 13 Jul. 2004 http://cm.bell-labs.com/cm/ms/what/shannonday/paper.html>. Virilio, Paul. The Vision Machine. Trans. Julie Rose. Bloomington and Indianapolis: Indiana UP, British Film Institute, 1994. Von Neumann, John. “The General and Logical Theory of Automata.” Collected Works. Ed. A. H. Taub. Vol. 5. Oxford: Pergamon Press, 1963. Weaver, Warren. “Recent Contributions to the Mathematical Theory of Communication.” The Mathematical Theory of Commnunication. Eds. Claude Shannon and Warren Weaver. paperback, 1963 ed. Urbana and Chicago: U of Illinois P, 1949. 1-16. Work Discussed et al. maintenance of social solidarity–instance 5 2006. Installation, Google Earth feed, newspapers, sound. Exhibited in SCAPE 2006 Biennial of Art in Public Space Christchurch Art Gallery, Christchurch, September 30-November 12. Images reproduced with the permission of et al. Photographs by Lee Cunliffe. Acknowledgments Research for this paper was conducted with the support of an Otago Polytechnic Resaerch Grant. Photographs of et al. maintenance of social solidarity–instance 5 by Lee Cunliffe. Citation reference for this article MLA Style Ballard, Su. "Information, Noise and et al." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/02-ballard.php>. APA Style Ballard, S. (Oct. 2007) "Information, Noise and et al.," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/02-ballard.php>.
APA, Harvard, Vancouver, ISO, and other styles
35

Burns, Alex. "Doubting the Global War on Terror." M/C Journal 14, no. 1 (January 24, 2011). http://dx.doi.org/10.5204/mcj.338.

Full text
Abstract:
Photograph by Gonzalo Echeverria (2010)Declaring War Soon after Al Qaeda’s terrorist attacks on 11 September 2001, the Bush Administration described its new grand strategy: the “Global War on Terror”. This underpinned the subsequent counter-insurgency in Afghanistan and the United States invasion of Iraq in March 2003. Media pundits quickly applied the Global War on Terror label to the Madrid, Bali and London bombings, to convey how Al Qaeda’s terrorism had gone transnational. Meanwhile, international relations scholars debated the extent to which September 11 had changed the international system (Brenner; Mann 303). American intellectuals adopted several variations of the Global War on Terror in what initially felt like a transitional period of US foreign policy (Burns). Walter Laqueur suggested Al Qaeda was engaged in a “cosmological” and perpetual war. Paul Berman likened Al Qaeda and militant Islam to the past ideological battles against communism and fascism (Heilbrunn 248). In a widely cited article, neoconservative thinker Norman Podhoretz suggested the United States faced “World War IV”, which had three interlocking drivers: Al Qaeda and trans-national terrorism; political Islam as the West’s existential enemy; and nuclear proliferation to ‘rogue’ countries and non-state actors (Friedman 3). Podhoretz’s tone reflected a revival of his earlier Cold War politics and critique of the New Left (Friedman 148-149; Halper and Clarke 56; Heilbrunn 210). These stances attracted widespread support. For instance, the United States Marine Corp recalibrated its mission to fight a long war against “World War IV-like” enemies. Yet these stances left the United States unprepared as the combat situations in Afghanistan and Iraq worsened (Ricks; Ferguson; Filkins). Neoconservative ideals for Iraq “regime change” to transform the Middle East failed to deal with other security problems such as Pakistan’s Musharraf regime (Dorrien 110; Halper and Clarke 210-211; Friedman 121, 223; Heilbrunn 252). The Manichean and open-ended framing became a self-fulfilling prophecy for insurgents, jihadists, and militias. The Bush Administration quietly abandoned the Global War on Terror in July 2005. Widespread support had given way to policymaker doubt. Why did so many intellectuals and strategists embrace the Global War on Terror as the best possible “grand strategy” perspective of a post-September 11 world? Why was there so little doubt of this worldview? This is a debate with roots as old as the Sceptics versus the Sophists. Explanations usually focus on the Bush Administration’s “Vulcans” war cabinet: Vice President Dick Cheney, Secretary of Defense Donald Rumsfield, and National Security Advisor Condoleezza Rice, who later became Secretary of State (Mann xv-xvi). The “Vulcans” were named after the Roman god Vulcan because Rice’s hometown Birmingham, Alabama, had “a mammoth fifty-six foot statue . . . [in] homage to the city’s steel industry” (Mann x) and the name stuck. Alternatively, explanations focus on how neoconservative thinkers shaped the intellectual climate after September 11, in a receptive media climate. Biographers suggest that “neoconservatism had become an echo chamber” (Heilbrunn 242) with its own media outlets, pundits, and think-tanks such as the American Enterprise Institute and Project for a New America. Neoconservatism briefly flourished in Washington DC until Iraq’s sectarian violence discredited the “Vulcans” and neoconservative strategists like Paul Wolfowitz (Friedman; Ferguson). The neoconservatives' combination of September 11’s aftermath with strongly argued historical analogies was initially convincing. They conferred with scholars such as Bernard Lewis, Samuel P. Huntington and Victor Davis Hanson to construct classicist historical narratives and to explain cultural differences. However, the history of the decade after September 11 also contains mis-steps and mistakes which make it a series of contingent decisions (Ferguson; Bergen). One way to analyse these contingent decisions is to pose “what if?” counterfactuals, or feasible alternatives to historical events (Lebow). For instance, what if September 11 had been a chemical and biological weapons attack? (Mann 317). Appendix 1 includes a range of alternative possibilities and “minimal rewrites” or slight variations on the historical events which occurred. Collectively, these counterfactuals suggest the role of agency, chance, luck, and the juxtaposition of better and worse outcomes. They pose challenges to the classicist interpretation adopted soon after September 11 to justify “World War IV” (Podhoretz). A ‘Two-Track’ Process for ‘World War IV’ After the September 11 attacks, I think an overlapping two-track process occurred with the “Vulcans” cabinet, neoconservative advisers, and two “echo chambers”: neoconservative think-tanks and the post-September 11 media. Crucially, Bush’s “Vulcans” war cabinet succeeded in gaining civilian control of the United States war decision process. Although successful in initiating the 2003 Iraq War this civilian control created a deeper crisis in US civil-military relations (Stevenson; Morgan). The “Vulcans” relied on “politicised” intelligence such as a United Kingdom intelligence report on Iraq’s weapons development program. The report enabled “a climate of undifferentiated fear to arise” because its public version did not distinguish between chemical, biological, radiological or nuclear weapons (Halper and Clarke, 210). The cautious 2003 National Intelligence Estimates (NIE) report on Iraq was only released in a strongly edited form. For instance, the US Department of Energy had expressed doubts about claims that Iraq had approached Niger for uranium, and was using aluminium tubes for biological and chemical weapons development. Meanwhile, the post-September 11 media had become a second “echo chamber” (Halper and Clarke 194-196) which amplified neoconservative arguments. Berman, Laqueur, Podhoretz and others who framed the intellectual climate were “risk entrepreneurs” (Mueller 41-43) that supported the “World War IV” vision. The media also engaged in aggressive “flak” campaigns (Herman and Chomsky 26-28; Mueller 39-42) designed to limit debate and to stress foreign policy stances and themes which supported the Bush Administration. When former Central Intelligence Agency director James Woolsey’s claimed that Al Qaeda had close connections to Iraqi intelligence, this was promoted in several books, including Michael Ledeen’s War Against The Terror Masters, Stephen Hayes’ The Connection, and Laurie Mylroie’s Bush v. The Beltway; and in partisan media such as Fox News, NewsMax, and The Weekly Standard who each attacked the US State Department and the CIA (Dorrien 183; Hayes; Ledeen; Mylroie; Heilbrunn 237, 243-244; Mann 310). This was the media “echo chamber” at work. The group Accuracy in Media also campaigned successfully to ensure that US cable providers did not give Al Jazeera English access to US audiences (Barker). Cosmopolitan ideals seemed incompatible with what the “flak” groups desired. The two-track process converged on two now infamous speeches. US President Bush’s State of the Union Address on 29 January 2002, and US Secretary of State Colin Powell’s presentation to the United Nations on 5 February 2003. Bush’s speech included a line from neoconservative David Frumm about North Korea, Iraq and Iran as an “Axis of Evil” (Dorrien 158; Halper and Clarke 139-140; Mann 242, 317-321). Powell’s presentation to the United Nations included now-debunked threat assessments. In fact, Powell had altered the speech’s original draft by I. Lewis “Scooter” Libby, who was Cheney’s chief of staff (Dorrien 183-184). Powell claimed that Iraq had mobile biological weapons facilities, linked to Abu Musab al-Zarqawi. However, the International Atomic Energy Agency’s (IAEA) Mohamed El-Baradei, the Defense Intelligence Agency, the State Department, and the Institute for Science and International Security all strongly doubted this claim, as did international observers (Dorrien 184; Halper and Clarke 212-213; Mann 353-354). Yet this information was suppressed: attacked by “flak” or given little visible media coverage. Powell’s agenda included trying to rebuild an international coalition and to head off weather changes that would affect military operations in the Middle East (Mann 351). Both speeches used politicised variants of “weapons of mass destruction”, taken from the counterterrorism literature (Stern; Laqueur). Bush’s speech created an inflated geopolitical threat whilst Powell relied on flawed intelligence and scientific visuals to communicate a non-existent threat (Vogel). However, they had the intended effect on decision makers. US Under-Secretary of Defense, the neoconservative Paul Wolfowitz, later revealed to Vanity Fair that “weapons of mass destruction” was selected as an issue that all potential stakeholders could agree on (Wilkie 69). Perhaps the only remaining outlet was satire: Armando Iannucci’s 2009 film In The Loop parodied the diplomatic politics surrounding Powell’s speech and the civil-military tensions on the Iraq War’s eve. In the short term the two track process worked in heading off doubt. The “Vulcans” blocked important information on pre-war Iraq intelligence from reaching the media and the general public (Prados). Alternatively, they ignored area specialists and other experts, such as when Coalition Provisional Authority’s L. Paul Bremer ignored the US State Department’s fifteen volume ‘Future of Iraq’ project (Ferguson). Public “flak” and “risk entrepreneurs” mobilised a range of motivations from grief and revenge to historical memory and identity politics. This combination of private and public processes meant that although doubts were expressed, they could be contained through the dual echo chambers of neoconservative policymaking and the post-September 11 media. These factors enabled the “Vulcans” to proceed with their “regime change” plans despite strong public opposition from anti-war protestors. Expressing DoubtsMany experts and institutions expressed doubt about specific claims the Bush Administration made to support the 2003 Iraq War. This doubt came from three different and sometimes overlapping groups. Subject matter experts such as the IAEA’s Mohamed El-Baradei and weapons development scientists countered the UK intelligence report and Powell’s UN speech. However, they did not get the media coverage warranted due to “flak” and “echo chamber” dynamics. Others could challenge misleading historical analogies between insurgent Iraq and Nazi Germany, and yet not change the broader outcomes (Benjamin). Independent journalists one group who gained new information during the 1990-91 Gulf War: some entered Iraq from Kuwait and documented a more humanitarian side of the war to journalists embedded with US military units (Uyarra). Finally, there were dissenters from bureaucratic and institutional processes. In some cases, all three overlapped. In their separate analyses of the post-September 11 debate on intelligence “failure”, Zegart and Jervis point to a range of analytic misperceptions and institutional problems. However, the intelligence community is separated from policymakers such as the “Vulcans”. Compartmentalisation due to the “need to know” principle also means that doubting analysts can be blocked from releasing information. Andrew Wilkie discovered this when he resigned from Australia’s Office for National Assessments (ONA) as a transnational issues analyst. Wilkie questioned the pre-war assessments in Powell’s United Nations speech that were used to justify the 2003 Iraq War. Wilkie was then attacked publicly by Australian Prime Minister John Howard. This overshadowed a more important fact: both Howard and Wilkie knew that due to Australian legislation, Wilkie could not publicly comment on ONA intelligence, despite the invitation to do so. This barrier also prevented other intelligence analysts from responding to the “Vulcans”, and to “flak” and “echo chamber” dynamics in the media and neoconservative think-tanks. Many analysts knew that the excerpts released from the 2003 NIE on Iraq was highly edited (Prados). For example, Australian agencies such as the ONA, the Department of Foreign Affairs and Trade, and the Department of Defence knew this (Wilkie 98). However, analysts are trained not to interfere with policymakers, even when there are significant civil-military irregularities. Military officials who spoke out about pre-war planning against the “Vulcans” and their neoconservative supporters were silenced (Ricks; Ferguson). Greenlight Capital’s hedge fund manager David Einhorn illustrates in a different context what might happen if analysts did comment. Einhorn gave a speech to the Ira Sohn Conference on 15 May 2002 debunking the management of Allied Capital. Einhorn’s “short-selling” led to retaliation from Allied Capital, a Securities and Exchange Commission investigation, and growing evidence of potential fraud. If analysts adopted Einhorn’s tactics—combining rigorous analysis with targeted, public denunciation that is widely reported—then this may have short-circuited the “flak” and “echo chamber” effects prior to the 2003 Iraq War. The intelligence community usually tries to pre-empt such outcomes via contestation exercises and similar processes. This was the goal of the 2003 NIE on Iraq, despite the fact that the US Department of Energy which had the expertise was overruled by other agencies who expressed opinions not necessarily based on rigorous scientific and technical analysis (Prados; Vogel). In counterterrorism circles, similar disinformation arose about Aum Shinrikyo’s biological weapons research after its sarin gas attack on Tokyo’s subway system on 20 March 1995 (Leitenberg). Disinformation also arose regarding nuclear weapons proliferation to non-state actors in the 1990s (Stern). Interestingly, several of the “Vulcans” and neoconservatives had been involved in an earlier controversial contestation exercise: Team B in 1976. The Central Intelligence Agency (CIA) assembled three Team B groups in order to evaluate and forecast Soviet military capabilities. One group headed by historian Richard Pipes gave highly “alarmist” forecasts and then attacked a CIA NIE about the Soviets (Dorrien 50-56; Mueller 81). The neoconservatives adopted these same tactics to reframe the 2003 NIE from its position of caution, expressed by several intelligence agencies and experts, to belief that Iraq possessed a current, covert program to develop weapons of mass destruction (Prados). Alternatively, information may be leaked to the media to express doubt. “Non-attributable” background interviews to establishment journalists like Seymour Hersh and Bob Woodward achieved this. Wikileaks publisher Julian Assange has recently achieved notoriety due to US diplomatic cables from the SIPRNet network released from 28 November 2010 onwards. Supporters have favourably compared Assange to Daniel Ellsberg, the RAND researcher who leaked the Pentagon Papers (Ellsberg; Ehrlich and Goldsmith). Whilst Elsberg succeeded because a network of US national papers continued to print excerpts from the Pentagon Papers despite lawsuit threats, Assange relied in part on favourable coverage from the UK’s Guardian newspaper. However, suspected sources such as US Army soldier Bradley Manning are not protected whilst media outlets are relatively free to publish their scoops (Walt, ‘Woodward’). Assange’s publication of SIPRNet’s diplomatic cables will also likely mean greater restrictions on diplomatic and military intelligence (Walt, ‘Don’t Write’). Beyond ‘Doubt’ Iraq’s worsening security discredited many of the factors that had given the neoconservatives credibility. The post-September 11 media became increasingly more critical of the US military in Iraq (Ferguson) and cautious about the “echo chamber” of think-tanks and media outlets. Internet sites for Al Jazeera English, Al-Arabiya and other networks have enabled people to bypass “flak” and directly access these different viewpoints. Most damagingly, the non-discovery of Iraq’s weapons of mass destruction discredited both the 2003 NIE on Iraq and Colin Powell’s United Nations presentation (Wilkie 104). Likewise, “risk entrepreneurs” who foresaw “World War IV” in 2002 and 2003 have now distanced themselves from these apocalyptic forecasts due to a series of mis-steps and mistakes by the Bush Administration and Al Qaeda’s over-calculation (Bergen). The emergence of sites such as Wikileaks, and networks like Al Jazeera English and Al-Arabiya, are a response to the politics of the past decade. They attempt to short-circuit past “echo chambers” through providing access to different sources and leaked data. The Global War on Terror framed the Bush Administration’s response to September 11 as a war (Kirk; Mueller 59). Whilst this prematurely closed off other possibilities, it has also unleashed a series of dynamics which have undermined the neoconservative agenda. The “classicist” history and historical analogies constructed to justify the “World War IV” scenario are just one of several potential frameworks. “Flak” organisations and media “echo chambers” are now challenged by well-financed and strategic alternatives such as Al Jazeera English and Al-Arabiya. Doubt is one defence against “risk entrepreneurs” who seek to promote a particular idea: doubt guards against uncritical adoption. Perhaps the enduring lesson of the post-September 11 debates, though, is that doubt alone is not enough. What is needed are individuals and institutions that understand the strategies which the neoconservatives and others have used, and who also have the soft power skills during crises to influence critical decision-makers to choose alternatives. Appendix 1: Counterfactuals Richard Ned Lebow uses “what if?” counterfactuals to examine alternative possibilities and “minimal rewrites” or slight variations on the historical events that occurred. The following counterfactuals suggest that the Bush Administration’s Global War on Terror could have evolved very differently . . . or not occurred at all. Fact: The 2003 Iraq War and 2001 Afghanistan counterinsurgency shaped the Bush Administration’s post-September 11 grand strategy. Counterfactual #1: Al Gore decisively wins the 2000 U.S. election. Bush v. Gore never occurs. After the September 11 attacks, Gore focuses on international alliance-building and gains widespread diplomatic support rather than a neoconservative agenda. He authorises Special Operations Forces in Afghanistan and works closely with the Musharraf regime in Pakistan to target Al Qaeda’s muhajideen. He ‘contains’ Saddam Hussein’s Iraq through measurement and signature, technical intelligence, and more stringent monitoring by the International Atomic Energy Agency. Minimal Rewrite: United 93 crashes in Washington DC, killing senior members of the Gore Administration. Fact: U.S. Special Operations Forces failed to kill Osama bin Laden in late November and early December 2001 at Tora Bora. Counterfactual #2: U.S. Special Operations Forces kill Osama bin Laden in early December 2001 during skirmishes at Tora Bora. Ayman al-Zawahiri is critically wounded, captured, and imprisoned. The rest of Al Qaeda is scattered. Minimal Rewrite: Osama bin Laden’s death turns him into a self-mythologised hero for decades. Fact: The UK Blair Government supplied a 50-page intelligence dossier on Iraq’s weapons development program which the Bush Administration used to support its pre-war planning. Counterfactual #3: Rogue intelligence analysts debunk the UK Blair Government’s claims through a series of ‘targeted’ leaks to establishment news sources. Minimal Rewrite: The 50-page intelligence dossier is later discovered to be correct about Iraq’s weapons development program. Fact: The Bush Administration used the 2003 National Intelligence Estimate to “build its case” for “regime change” in Saddam Hussein’s Iraq. Counterfactual #4: A joint investigation by The New York Times and The Washington Post rebuts U.S. Secretary of State Colin Powell’s speech to the United National Security Council, delivered on 5 February 2003. Minimal Rewrite: The Central Intelligence Agency’s whitepaper “Iraq’s Weapons of Mass Destruction Programs” (October 2002) more accurately reflects the 2003 NIE’s cautious assessments. Fact: The Bush Administration relied on Ahmed Chalabi for its postwar estimates about Iraq’s reconstruction. Counterfactual #5: The Bush Administration ignores Chalabi’s advice and relies instead on the U.S. State Department’s 15 volume report “The Future of Iraq”. Minimal Rewrite: The Coalition Provisional Authority appoints Ahmed Chalabi to head an interim Iraqi government. Fact: L. Paul Bremer signed orders to disband Iraq’s Army and to De-Ba’athify Iraq’s new government. Counterfactual #6: Bremer keeps Iraq’s Army intact and uses it to impose security in Baghdad to prevent looting and to thwart insurgents. Rather than a De-Ba’athification policy, Bremer uses former Baath Party members to gather situational intelligence. Minimal Rewrite: Iraq’s Army refuses to disband and the De-Ba’athification policy uncovers several conspiracies to undermine the Coalition Provisional Authority. AcknowledgmentsThanks to Stephen McGrail for advice on science and technology analysis.References Barker, Greg. “War of Ideas”. PBS Frontline. Boston, MA: 2007. ‹http://www.pbs.org/frontlineworld/stories/newswar/video1.html› Benjamin, Daniel. “Condi’s Phony History.” Slate 29 Aug. 2003. ‹http://www.slate.com/id/2087768/pagenum/all/›. Bergen, Peter L. The Longest War: The Enduring Conflict between America and Al Qaeda. New York: The Free Press, 2011. Berman, Paul. Terror and Liberalism. W.W. Norton & Company: New York, 2003. Brenner, William J. “In Search of Monsters: Realism and Progress in International Relations Theory after September 11.” Security Studies 15.3 (2006): 496-528. Burns, Alex. “The Worldflash of a Coming Future.” M/C Journal 6.2 (April 2003). ‹http://journal.media-culture.org.au/0304/08-worldflash.php›. Dorrien, Gary. Imperial Designs: Neoconservatism and the New Pax Americana. New York: Routledge, 2004. Ehrlich, Judith, and Goldsmith, Rick. The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers. Berkley CA: Kovno Communications, 2009. Einhorn, David. Fooling Some of the People All of the Time: A Long Short (and Now Complete) Story. Hoboken NJ: John Wiley & Sons, 2010. Ellison, Sarah. “The Man Who Spilled The Secrets.” Vanity Fair (Feb. 2011). ‹http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102›. Ellsberg, Daniel. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking, 2002. Ferguson, Charles. No End in Sight, New York: Representational Pictures, 2007. Filkins, Dexter. The Forever War. New York: Vintage Books, 2008. Friedman, Murray. The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy. New York: Cambridge UP, 2005. Halper, Stefan, and Jonathan Clarke. America Alone: The Neo-Conservatives and the Global Order. New York: Cambridge UP, 2004. Hayes, Stephen F. The Connection: How Al Qaeda’s Collaboration with Saddam Hussein Has Endangered America. New York: HarperCollins, 2004. Heilbrunn, Jacob. They Knew They Were Right: The Rise of the Neocons. New York: Doubleday, 2008. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. Rev. ed. New York: Pantheon Books, 2002. Iannucci, Armando. In The Loop. London: BBC Films, 2009. Jervis, Robert. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca NY: Cornell UP, 2010. Kirk, Michael. “The War behind Closed Doors.” PBS Frontline. Boston, MA: 2003. ‹http://www.pbs.org/wgbh/pages/frontline/shows/iraq/›. Laqueur, Walter. No End to War: Terrorism in the Twenty-First Century. New York: Continuum, 2003. Lebow, Richard Ned. Forbidden Fruit: Counterfactuals and International Relations. Princeton NJ: Princeton UP, 2010. Ledeen, Michael. The War against The Terror Masters. New York: St. Martin’s Griffin, 2003. Leitenberg, Milton. “Aum Shinrikyo's Efforts to Produce Biological Weapons: A Case Study in the Serial Propagation of Misinformation.” Terrorism and Political Violence 11.4 (1999): 149-158. Mann, James. Rise of the Vulcans: The History of Bush’s War Cabinet. New York: Viking Penguin, 2004. Morgan, Matthew J. The American Military after 9/11: Society, State, and Empire. New York: Palgrave Macmillan, 2008. Mueller, John. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: The Free Press, 2009. Mylroie, Laurie. Bush v The Beltway: The Inside Battle over War in Iraq. New York: Regan Books, 2003. Nutt, Paul C. Why Decisions Fail. San Francisco: Berrett-Koelher, 2002. Podhoretz, Norman. “How to Win World War IV”. Commentary 113.2 (2002): 19-29. Prados, John. Hoodwinked: The Documents That Reveal How Bush Sold Us a War. New York: The New Press, 2004. Ricks, Thomas. Fiasco: The American Military Adventure in Iraq. New York: The Penguin Press, 2006. Stern, Jessica. The Ultimate Terrorists. Boston, MA: Harvard UP, 2001. Stevenson, Charles A. Warriors and Politicians: US Civil-Military Relations under Stress. New York: Routledge, 2006. Walt, Stephen M. “Should Bob Woodward Be Arrested?” Foreign Policy 10 Dec. 2010. ‹http://walt.foreignpolicy.com/posts/2010/12/10/more_wikileaks_double_standards›. Walt, Stephen M. “‘Don’t Write If You Can Talk...’: The Latest from WikiLeaks.” Foreign Policy 29 Nov. 2010. ‹http://walt.foreignpolicy.com/posts/2010/11/29/dont_write_if_you_can_talk_the_latest_from_wikileaks›. Wilkie, Andrew. Axis of Deceit. Melbourne: Black Ink Books, 2003. Uyarra, Esteban Manzanares. “War Feels like War”. London: BBC, 2003. Vogel, Kathleen M. “Iraqi Winnebagos™ of Death: Imagined and Realized Futures of US Bioweapons Threat Assessments.” Science and Public Policy 35.8 (2008): 561–573. Zegart, Amy. Spying Blind: The CIA, the FBI and the Origins of 9/11. Princeton NJ: Princeton UP, 2007.
APA, Harvard, Vancouver, ISO, and other styles
36

White Bull, Floris. "Floris White Bull Responds to the Editors on Protest and the Film AWAKE: A Dream from Standing Rock." M/C Journal 21, no. 3 (August 15, 2018). http://dx.doi.org/10.5204/mcj.1436.

Full text
Abstract:
Figure 1: Jacket Art, AWAKE: A Dream from Standing Rock (2017), featuring Floris White Bull and used with permission from Bullfrog Films.AWAKE follows the dramatic rise of the historic #NODAPL Native-led peaceful resistance at the Standing Rock Sioux Reservation, North Dakota, which captured the world’s attention.Thousands of activists converged from around the country to stand in solidarity with the Water Protectors (activists) protesting the construction of the $3.7 billion Dakota Access Pipeline (DAPL), which is intended to carry fracked oil from North Dakota’s Bakken oil fields through sovereign land and under the Missouri River, the water source for the Standing Rock reservation and 17 million people downstream. Pipeline leaks are commonplace. Since 2010, over 3,300 oil spills and leaks have been reported.The film is a collaboration between Indigenous filmmakers, Director Myron Dewey and Executive Producer Doog Good Feather, and Oscar-nominated environmental filmmakers Josh Fox and James Spione. Each of the three sections of the film tells the story of the Standing Rock protests in the unique perspective and style of the filmmaker who created it.The Water Protectors at Standing Rock have awakened the nation and forever the way we fight for clean water, the environment and the future of our planet.Synopsis of AWAKE: A Dream from Standing Rock, courtesy of Bullfrog FilmsFloris White Bull (Floris Ptesáŋ Huŋká) is a member of the Standing Rock Lakota Nation, an activist and a writer and advisor for the film, AWAKE: A Dream from Standing Rock. Despite being led as a peaceful protest, White Bull and many others at the 2017 protests at Standing Rock witnessed local police and private security forces accosting Water Protectors and journalists with militarized tactics, dogs, rubber bullets, mace, tear gas, and water cannons. People were illegally detained and forcibly removed from sovereign Native American land. In fact, during the protest White Bull was held in a cage with the number 151 marked on her forearm in permanent marker. While the protest was marred with acts of violence by police and security, it also was – and continues to be – a site of hope, where many lessons have been learned from the Standing Rock activist community.We were initially contacted by the distributors of AWAKE to provide a film review. However, we felt it was necessary for the voice of the filmmakers and the people involved in the protest – especially those Indigenous voices – to continue to be heard. As such, for this feature article in M/C Journal we invited Floris White Bull to answer a few questions on protest and the film. Due to the word constraints for M/C Journal, we limited ourselves to four questions. What follows is a very poignant and personal statement not only on the importance of events at Standing Rock, but also on protest in general. In light of this, the content of this exchange has not been edited from its original format. (Ben Hightower and Scott East)What is the role of the documentary in relation to protest? (BH & SE)The opposition to the Dakota Access Pipeline was and continues to be about human rights, water rights, and the rights of nature. It is about the right for our children to drink clean water. This film, as well as any other films or reporting that have come out of Standing Rock, serves as documentation. It acts as a way to preserve the moment in time, but also to uphold and promote the freedom of the press and the integrity of journalism. It allows us to tell our own story – to create our own narrative. So often, the role media has played throughout history has been to justify human rights violations through vilification of entire races/nations/peoples. This had taken place at Standing Rock by local media Bismarck Tribune and KFYR. They would publish stories perpetuating stereotypes and old fear mongering tactics accusing our people of killing livestock in the area, shooting arrows at the airplane that circled the camp continually at low altitudes. As a tribal member of the Standing Rock Lakota Nation, my people and I have somewhat coexisted with the residents of Bismarck/Mandan and the small towns outlying. There was always racial tension that existed but it came to a head when the Indigenous voices opposing the pipeline – a pipeline that was also opposed by the residents upstream from us – was quickly met with unabashed public oppressive colonial shaming.Take for example an article that ran in the Bismarck Tribune the day that access to the main road between Standing Rock and Mandan was blocked off.Kirchmeier said the protest has become unlawful as a result of criminal activity. He said his officers have been threatened and heard gunshots. The agency has gotten reports of pipe bombs, assaults on private security personnel, fireworks and vandalism.In the interest of public safety, North Dakota Department of Transportation and Highway Patrol has established a traffic control point on Highway 1806 south of the North Dakota Veterans Cemetery. Only emergency vehicles and local traffic will be allowed through. Other vehicles will be detoured to Highway 6. (Grueskin)There were no pipebombs, gunshots or threats to the lives of officers. If there were, wouldn’t you think there would have been more than enough cause to come in and clear the camps at that point? We were not a danger to the public. In fact, the gathering of support also brought a great deal of money into the economy locally.Everyone that came to our camps did so because they felt the need to come. They brought with them their gifts and talents. Some people came and were great cooks, some were strong and helped chop wood, some were builders. Journalists and photographers brought their cameras and documented the human rights violations and helped to share our story with the world.Our film is about honoring those people and the way we all came together. It’s about telling our truth. (FWB)What are some of the lessons learned from Standing Rock? (BH & SE)Standing Rock became a blueprint for the world to show what we are able to accomplish unified. It is a testament to the ingenuity and capability of the human race to collectively change the path that we are headed down … a path led by fossil fuels and corporations with only their bottom-line in mind.There were many lessons learned. We learned to avoid the game of “who is the leader” – instead, it is important to have clear objectives focused on the collective so that if one leader has to step away, the movement continues. We learned to have foresight … to look past the goals we’ve set and move forward in optimism. We learned what self-government and self-determination looks like. Historically our people governed themselves but we have not been able to practice this in over a hundred years. This aspect, like every other aspect of our way of life had been oppressed. We know that this way of life is possible, the wheels are just rusty. Our movement needs to be self-sustaining and to evolve so that we can model this return to traditional ways for the world. It is the evolution of our understanding for this to be about what we are trying to build and model for the world.We continue to learn from this fight. A great deal of people are hurting now, processing through PTSD and other traumas. The importance of self-care is a journey for us all. (FWB)What is the continued legacy of the Standing Rock protest? (BH & SE)A beautiful community of our hopes and dreams that we were always told wasn’t possible. A place where over 300 Indigenous nations came together, where traditional enemies stood side by side to begin fighting a common enemy. Unification of all races and faiths. Freedom.Those of us who lived there breathed freedom. Our time was not dictated by clocks or calendars. The power of the people is the continued legacy. This is the beauty of the human spirit and our ability to put our differences aside to build something better for future generations. Taking responsibility for the world we leave. The amazing diversity of Indigenous nations – our songs, languages, stories and dances that define us. Our love for the lands and stories and histories that tie us to the land we are indigenous to. Everything that Indigenous people have come through, doing it with dignity, continuing to hold on to the things that define us is what is going to heal the world. The Indigenous people of this land mass have endured attempted genocide and oppression for hundreds of years. The diversity of our languages and stories make us distinct, but the respect in which we view and treat the earth is our commonality. It is the respect we treat ourselves and one another with that welcomed weary souls back to the circle. Compassion and generosity are a few of the keystone values that ground our people yet, are lacking in the world. Our legacy is love. Love for our future generations, our Mother Earth, one another, and our willingness to sacrifice out of love. (FWB)Looking back on one year of Trump's office and the signing of Dakota Access (and Keystone XL) executive orders, what developments have arisen and what is the path forward in terms of resistance? (BH & SE)Racism and colonial governmental decisions are nothing new to the Indigenous nations. The path forward is the same as it has always been – holding on to our goals, values and dignity with resilience. Our people came through states putting bounties on our scalps, armies hunting us down, having our children kidnapped by law, abuses suffered at the hands of the schools those children were taken to in attempt to “Kill the Indian, Save the Man”, starvation periods, forced sterilization. We are not strangers to colonial government oppression. New laws passed in attempt to oppress unity are nothing compared to the love we have for the future generations. (FWB)ReferencesGrueskin, Caroline. “Construction Stops, Traffic Restricted Due to Dakota Access Pipeline Protest.” Bismarck Tribune, 17 Aug. 2016. <https://bismarcktribune.com/news/state-and-regional/construction-stops-traffic-restricted-due-to-dakota-access-pipeline-protest/article_80b8ef24-7bf3-507c-95f9-6292795a7ed4.html>.
APA, Harvard, Vancouver, ISO, and other styles
37

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles
38

Sampson, Tony. "Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission." M/C Journal 9, no. 1 (March 1, 2006). http://dx.doi.org/10.5204/mcj.2583.

Full text
Abstract:
In the half-century since Shannon invented information theory… engineers have come up with brilliant ways of boiling redundancy out of information… This lets it be transmitted twice as fast (Bill Gates: 33). Shannon’s Code Puts an End to Noise The digital machine is often presented as the perfect medium for the efficient transmission of coded messages: an ever-improving machine, in which coded information travels near to the-speed-of-light. Integrated into a global network of communication, transmission is assumed to be friction-free – everything and everybody are just a click away. Indeed, the old problem of signal interference is subdued by the magnum opus of communication engineering – Shannon’s noiseless channel – a cure for the undesirable uncertainties of message sending (Shannon and Weaver 19). For that reason alone, the digitally enhanced fidelity of Shannon’s digital code, not only heralds a new age of communication, but also marks the end of the problem of noise. In effect, his mathematical theory of communication, establishes a highly effective coding mechanism that travels from sender to receiver, overcoming geographic constraint and the deafening raw of the analogue milieu. This makes the theory itself the substratum of the digital communication utopia, since Shannon’s conquest of noise has solved the reliability problem of code, allowing us to focus on the rapidity and fecundity of our messages. However, despite the ingenuity of the noiseless channel, its subsequent rapid expansion into a vast network of machines means that both senders and receivers pay a price for Shannon’s brilliance. The speed and boundless reproducibility of digital code outperforms our physical capacity to observe it. In this way, transmission works behind the scenes, becoming increasingly independent of the human gaze. Even so, we are assured that we will not be overwhelmed by code; a new digital order has purportedly emerged. As follows, network innovators provide us with robotic codes that work benevolently on our behalf, exploring a seemingly random universe of connection. These intelligent codes search the tangled webs that constitute digital communication networks, autonomously in step with our fleeting transactions and data desires. We can sleep safely at night… this is The Road Ahead. But of course, as we now know, the ideal system for perpetual communication has also turned out to be the perfect medium for the codes designed to destroy it (Gordon). Instead of efficiently taking care of our transmission needs, the flow of code has been interrupted by the relational interactions of a machinic assemblage (Deleuze and Guattari). This is a vast assemblage populated by both human and non-human actors. Its evolution has not followed a predictable path determined by the innovations of the science of code, but instead responds to the complex interactions and interconnectedness of the network environment. In this way, the binary switches of the robotic code have occasionally flipped over from true to false – from the munificent to the malevolent function. The interruption seems to be relatively new, but the human-computer assemblage has a long history of the production of what I term liar codes. They follow on from Gödel and Turing’s realisation of the incompleteness and undecidability of self-referential systems of logic in the 1930s. In the following decades, von Neumann’s ideas on self-reproducing code provided early programmers with the means to play coded games of life. Thirty years later and researchers discovered how unstable a network would become when a similarly coded evolutive got out of control (Shoch and Hupp, Cohen). By 1990, the digital worm had turned. Morris’s code famously ‘crashed’ the Internet. The liar code had escaped the research lab and entered the wild world of the network. Nevertheless, despite what appears to be the uncontrollable evolution of code, it is the assemblage itself that makes a difference. Many liar codes have since followed on from the games, experiments and accidents of the early human-computer assemblage. Some are simply mischievous pranks designed to take up space by making copies of themselves, while others conceal a deeper, sinister pre-programmed function of data piracy (Bey 401-434) and viral hijack. The former spread out across a network, spewing out fairly innocuous alerts, whereas the latter steel passwords, gaining access to safe places, capturing navigation tools, and redirecting our attention to the dark side of the global village. In addition to the deluge of spam, viruses and worms, liar code arrives hidden in Trojan programs. Like Russian dolls, code slips into email inboxes. Simple viral sentences repeatedly trick us into opening these programs and spreading the infection. By saying “I love you” code becomes a recursive deceiver, concealing the true intentions of the virus writer, while ensuring that the victim plays a crucial role in the propagation of the liar. Noise Is Dead – Long Live the New Noise! More recently Liar codes have been cunningly understood as contemporary instances of cultural noise – the other of order (Parikka). However, this does not mean that a solution can be found in the universality of Shannon’s linear diagram – this is an altogether different engineering problem. In principle, Shannon’s noise was more readily apprehended. It existed primarily at a technical level (signal noise), a problem solved by the incorporation of noise into a technical code (redundancy). Contrariwise, liar codes go beyond the signal/noise ratio of the content of a message. They are environmental absurdities and anomalies that resonate outside the technical layer into the cultural milieu of the human-computer assemblage. The new noise is produced by the hissing background distortion of the network, which relentlessly drives communication to a far-from-equilibrial state. Along these lines, the production of what appears to be a surplus of code is subject to the behaviour and functioning of a vast and vulnerable topology of human and non-human machinic interaction. Is the Solution to Be Found in a Clash of Codes? In an attempt to banish the network pirates and their growing phylum of liar codes there has been a mobilisation of antivirus technologies. Netizens have been drafted in to operate the malware blockers, set up firewalls or dig the electronic trenches. But these desperate tactics appeal only to those who believe that they can reverse the drift towards instability, and return a sense of order to the network. In reality, evidence of the effectiveness of these counter measures is negligible. Despite efforts to lower the frequency of attacks, the liar code keeps seeping in. Indeed, the disorder from which the new noise emerges is quite unlike the high entropic problem encountered by Shannon. Like this, digital anomalies are not simply undesirable, random distortions, repaired by coded negentropy. On the contrary, the liar is a calculated act of violence, but this is an action that emerges from a collective, war-like assemblage. Therefore, significantly, it is not the code, but the relational interactions that evolve. For this reason, it is not simply the liar codes that threaten the stability of transmission, but the opening-up of a networked medium that captures messages, turning them into an expression of the unknown of order. Code no longer conveys a message through a channel. Not at all, it is the assemblage itself that anarchically converts the message into an altogether different form of expression. The liar is a rhizome, not a root!! (See figure 1.) A Network Diagram of Senders, Receivers and Deceivers Rhizomatic liar code introduces an anarchic scrambling of the communication model. Ad nauseam, antivirus researchers bemoan the problem of the liar code, but their code-determined defence system has seemingly failed to tell apart the senders, receivers and deceivers. Their tactics cannot sidestep the Gödelian paradox. Interestingly, current research into complex network topologies, particularly the Internet and the Web (Barabási), appears to not only support this gloomy conclusion, but confirms that the problem extends beyond code to the dynamic formation of the network itself. In this way, complex network theory may help us to understand how the human-computer assemblage comes together in the production of viral anomalies. Indeed, the digital network is not, as we may think, a random universe of free arbitrary association. It does not conform to the principles leading to inevitable equilibrium (an averaging out of connectivity). It is instead, an increasingly auto-organised and undemocratic tangle of nodes and links in which a few highly connected aristocratic clusters form alongside many isolated regions. In this far-from-random milieu, the flow of code is not determined by the linear transmission of messages between senders and receivers, or for that matter is it guided by an algorithmic evolutive. On the contrary, while aristocratic networks provide a robust means of holding an assemblage together, their topological behaviour also makes them highly susceptible to viral epidemics. Liar codes easily spread through clusters formed out of preferential linkage, and a desire for exclusive, network alliances between humans and non-humans. From a remote location, a single viral code can promiscuously infect a highly connected population of nodes (Pastor-Satorras & Vespignani). This is the perfect environment for the actions of deceivers and their liar codes. On reflection, a revised diagram of transmission, which tackles head on the viral anomalies of the human-computer assemblage, would perhaps be unworkable. This is consistent with the problem of liar codes, and the resulting collapse of trustworthy transmission. The diagram would ideally need to factor in the anarchic, scrambled lines of communication (see figure 1), as well as the complex topological relations between node and link. Such a diagram would also need to trace significant topological behaviours and functions alongside the malfunctions of codes, coders and the sharing of codes over a network. It is this significant topological intensity of the human-computer assemblage that shifts the contemporary debate on noise away from Shannon’s model towards a complex, non-linear and relational interaction. In this sense, the diagram moves closer to the rhizomatic notion of a network (Deleuze and Guattari 9-10). Not so much a model of transmission, rather a model of viral transduction. References Barabási, Albert-László. Linked: The New Science of Networks. Cambridge, Mass: Perseus, 2002. Bey, Hakim in Ludlow, Peter (ed). Crypto Anarchy, Cyberstates and Pirate Utopias. Cambridge, Mass: MIT, 2001. Cohen, F. “Computer Viruses: Theory and Experiments.” Computers & Security 6 (1987): 22-35. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Trans. by Brian Massumi. London: The Athlone Press, 1987. Deleuze, Gilles, and Felix Guattari. Anti-Oedipus. London: The Athlone Press, 1984. Gates, Bill. The Road Ahead. London: Penguin, 1995/1996. Gordon, Sarah. “Technologically Enabled Crime: Shifting Paradigms for the Year 2000.” Computers and Security 1995. (5 Dec. 2005) http://www.research.ibm.com/antivirus/SciPapers/Gordon/Crime.html>. Latour, Bruno. Science in Action: How to Follow Scientists and Engineers through Society. Harvard University Press, 1988. Parikka, Jussi. “Viral Noise and the (Dis)Order of the Digital Culture.” M/C Journal 7.6 (2005). 5 Dec. 2005 http://journal.media-culture.org.au/0501/05-parikka.php>. Shannon, Claude, and Warren Weaver. The Mathematical Theory of Communication. University of Illinois Press, 1949/1998. Shoch, John F, and Jon A Hupp. “The ‘Worm’ Programs – Early Experience with a Distributed Computation.” Communications of the ACM 25.3 (March 1982): 172–180. 5 Dec. 2005. Pastor-Satorras, Romualdo, and Alessandro Vespignani. “Epidemic Spreading in Scale-Free Networks.” Physical Review Letters 86 (2001). Von Neumann, John, and Arthur Burks. Theory of Self-Reproducing Automata. University of Illinois Press, 1966. Citation reference for this article MLA Style Sampson, Tony. "Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/03-sampson.php>. APA Style Sampson, T. (Mar. 2006) "Senders, Receivers and Deceivers: How Liar Codes Put Noise Back on the Diagram of Transmission," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/03-sampson.php>.
APA, Harvard, Vancouver, ISO, and other styles
39

Beckton, Denise, Donna Lee Brien, and Ulrike Sturm. "From Reluctant Online Contributor to Mentor: Facilitating Student Peer-to-Peer Mentoring Online." M/C Journal 19, no. 2 (May 4, 2016). http://dx.doi.org/10.5204/mcj.1082.

Full text
Abstract:
IntroductionAs the teaching staff working in a university postgraduate program—the Graduate Certificate of Creative Industries (Creative Practice) at Central Queensland University, Australia—an ongoing concern has been to ensure our students engage with the digital course content (delivered via the Moodle learning management system). This is an issue shared across the sector (La Pointe and Reisetter; Dargusch et al.) and, in our case, specifically in the area of students understanding how this online course content and tasks could benefit them in a program that is based around individual projects. As such, we are invested in enhancing student engagement both within the framework of this individual program and at an institution level. Like many institutions which now offer degrees which are either partially or fully online, the program in question offers a blended learning environment, with internal students also expected to engage with online materials (Rovai and Jordan; Colis and Moonen). The program was developed in 2011, first offered in 2012, and conducted two and sometimes three terms a year since then.Within the first year of delivery, low levels of student participation in online learning were identified as problematic. This issue was addressed using strategies that made use of characteristic strengths among our creative industries students, by developing and linking a peer-to-peer mentoring approach to our blended learning course design. Our challenge in this (as project facilitators and as teachers) has been to devise strategies to shift the students from reluctant to engaged online content users. A key strategy has evolved around introducing peer-mentoring as an intrinsic behaviour in the courses in the program. While not using a full case study approach, we do offer this singular instance for consideration as “much can be learned from a particular case” (Merriam 51). The below is based on our own observations, together with formal and informal student feedback gathered since 2012.Mentors and MentoringThe term mentor can have different meanings depending on the context in which the phrase is used. Ambrosetti and Dekkers note that “it is evident from the literature that there is no single definition for mentoring” (42). Drawing on an array of literature from a number of disciplines to qualify the definition of the term mentoring, Ambrosetti and Dekkers have identified a series of theorists whose definitions demonstrate the wide-ranging interpretation of what this act might be. Interestingly, they found that, even within the relatively narrow context of pre-service teacher research, words used to identify the term mentor varied from relatively collegial descriptors for the established teacher such as supporter, friend, collaborator, role model, and protector, to more formalised roles including trainer, teacher, assessor, and evaluator. The role to be played by a mentor—and how it is described—can also vary according to parameters around, and the purpose of, the mentoring relationship. That is, even though “mentoring, as described in literature, generally involves supporting and providing feedback to the mentee without judgment or criteria” (43), the dynamics of the mentor-mentee relationship may influence the perception and the nature of these roles. For example, the mentoring relationship between a teacher and pre-service teacher may be perceived as hierarchical whereby knowledge and feedback is “passed down” from mentor to mentee, that is, from a more authoritative, experienced figure to a less knowledgeable recipient. As such, this configuration implies a power imbalance between the roles.The relationships involved in peer-to-peer mentoring can be similarly defined. In fact, Colvin and Ashman describe the act of peer-mentoring as “a more experienced student helping a less experienced student improve overall academic performance”, and a relationship that “provides advice, support, and knowledge to the mentee” (122). Colvin and Ashman’s research also suggests that “if mentors and mentees do not have a clear sense of their roles and responsibilities, mentors will find it difficult to maintain any sort of self‐efficacy” (122)—a view that is held by others researchers in this field (see Hall et al.; Reid; Storrs, Putsche and Taylor). However, this collective view of peer-to-peer mentorship was not what we aimed to foster. Instead, we wanted our courses and program to both exhibit and inculcate practices and processes which we felt are more in line with our understanding of the creative industries, including a more organic, voluntary and non-hierarchical approach to peer-to-peer mentorship. This could use Ambrosetti and Dekker’s less hierarchical descriptors of supporter, friend, and collaborator listed above.Student CohortThe student cohort in this program regularly includes on-campus and distance education students in approximately equal ratios, with those studying by distance often geographically very widely dispersed across Australia, and sometimes internationally. The students in this program come from a diverse spectrum of creative industries’ art forms, including creative writing, digital media, film, music, and visual arts. Most enter the program with advanced skills, undergraduate or equivalent qualifications and/or considerable professional experience in their individual areas of creative practice and are seeking to add a postgraduate-level of understanding and scholarly extension to this practice (Kroll and Brien; Webb and Brien). Students also utilise a wide range of learning styles and approaches when developing and completing the creative works and research-informed reflective reports which comprise their assessment. All the students in the program’s courses utilise, and contribute to, a single online Moodle site each term. Some also wish to progress to research higher degree study in creative practice-led research projects (Barrett and Bolt) after completing the program.Applying Peer-to-Peer Mentoring in a Project-Based ProgramThe student cohort in this program is diverse, both geographically and in terms of the area of individual creative industries’ specialisation and the actual project that each student is working on. This diversity was a significant factor in the complexity of the challenge of how to make the course online site and its contents and tasks (required and optional) relevant and engaging for all students. We attempted to achieve this, in part, by always focusing on content and tasks directly related to the course learning outcomes and assessment tasks, so that their usefulness and authenticity in terms of the student learning journey was, we hoped, obvious to students. While this is a common practice in line with foundational conceptions of effective learning and teaching in higher education, we also proposed that we might be able to insure that course content was accessed and engaged with, and tasks completed, by linking the content and tasks in Moodle to the action of mentoring. In this, students were encouraged to discuss their projects in the online discussion forum throughout the term. This began with students offering brief descriptions of their projects as they worked through the project development stage, to reports on progress including challenges and problems as well as achievements. Staff input to these discussions offered guidance—both through example and (at times) gentle direction—on how students could also give collegial advice to other students on their projects. This was in terms of student knowledge and experience gained from previous work plus that learned during the program. In this, students reported on their own activities and how learning gained could potentially be used in other professional fields, as for example: “I specifically enjoyed the black out activity and found the online videos exceptional, inspiring and innovating. I really enjoyed this activity and it was something that I can take away and use within the classroom when educating” (‘Student 1’, week 8, Term 1 2015). Students also gave advice for others to follow: “I understand that this may not have been the original intended goal of Free Writing—but it is something I would highly recommend … students to try and see if it works for you” (‘Student 2’, week 5, Term 1 2015). As each term progressed, and trust built up—a key aspect of online collaboration (Holton) as well as a fruitful mentoring relationship (Allen and Poteet)—joint problem solving also began to take place in these discussions.As most of the students never interact face-to-face during the term, the relative impersonality of the online discussions in Moodle, although certainly not anonymous, seemed to provide a safe platform for peer-to-peer mentoring, even when this was offered by those who were also interacting in class as well. As facilitators of this process, we also sought to model best-practice interaction in this communication and ensure that any posts were responded to in an encouraging and timely manner (Aragon). As a result, the traffic within these forums generally increased each week so that, by the end of the term, every student (both external and internal) had contributed significantly to online discussions—even those who appeared to be more reluctant participants in the beginning weeks of the term. Strategies to Facilitate Peer-to-Peer MentoringSeeking to facilitate this process, we identified discrete points within the term’s course delivery at which we would encourage a greater level of engagement with the online resources and, through this, also encourage more discussion in the online discussion forum. One of the strategies we employed was to introduce specific interactions as compulsory components of the course but, at the same time, always ensuring that these mandated interactions related directly to assessment items. For example, a key assessment task requires students to write reflectively about their creative work and processes. We duly included information and examples of reflective writing as resources online. In order to further develop this skill for both internal and external students, we adopted an active and iterative learning approach to this task by asking students to write reflectively, each week, about the online resources provided to them. In asking students to do this, we reiterated that, at the end of term, a core part of the assessment item was that each student would be asked to describe, analyse and reflect on how they used these resources to facilitate their creative practice. At the end of the term, therefore, each student could collate his or her weekly responses, and use these as part of this assessment task. However, before this final reflection needed to be completed, these reflective musings were already being refined and extended as a result of the commentaries offered by other students responding to these weekly reflections. In this, these commenting students were, in fact, playing the role of peer-to-peer mentors, assisting each other to enhance their abilities in reflective thinking and writing.It should be stated that neither formal mentoring roles nor expectations of the process or its outcomes were pre-determined, defined or outlined to students by the teaching staff or communicated directly to them in any way (such as via the course materials). Instead, internal and distance students were encouraged to communicate with each other and offer guidance, help and support to each other (but which was never described as peer-to-peer mentorship) via their use of the Moodle learning managements system as both a group communication tool and a collaborative learning resource (Dixon, Dixon and Axmann). It is common for creative practitioners to collect data in the form of objects, resources, tools, and memories in order to progress their work and this habit has been termed that of the “bowerbird” (Brady). Knowing that it likely that many of our students are already proficient bowerbirds with many resources in their personal collections, we also facilitated a peer-to-peer mentoring activity in the form of an online competition. This competition asked students to post their favourite interactive resource onto the Moodle site, accompanied by a commentary explaining why and how it could be used. Many students engaged with these peer-posted resources and then, in turn, posted reflections on their usefulness, or not, for their own personal practice and learning. This, in turn, engendered more resources to be posted, shared, and discussed in terms of project problem-solving and, thus, became another ongoing activity that encouraged students to act as increasingly valued peer-mentors to each other.The Practical Application of Peer-to-Peer MentoringEach term, it is a course requirement that the student cohort, both internal and external, combine to create a group outcome—an exhibition of their creative work (Sturm, Beckton and Brien). For some students, the work exhibited is completed; for others, particularly part-time students, the work shown is frequently still in progress. Given that the work in the student exhibition regularly includes music and creative writing as well as visual art, this activity forces students to engage with their peers in ways that most of them have not previously encountered. This interaction includes communication across the internal and distance members of the cohort to determine what work will be included in the exhibition, and how work will be sent for display by external students, as well as liaising in relation to range of related considerations including: curatorial (what the exhibition will be named, and how work is to be displayed), cataloguing (how the works, and their contributors, are to be described), and the overall design of the catalogue and invitation (Sturm, Beckton and Brien). Students make these decisions, as a group, with guidance from staff mainly being offered in terms of practical information (such as what days and times the exhibition space can be accessed) and any limitations due to on-site health and safety considerations and other university-wide regulations.Student feedback has been very positive in relation to this aspect of the course (Sturm, Beckton and Brien), and its collective nature is often remarked on in both formal and informal feedback. We are also finding that some prospective students are applying to the program with a knowledge of this group exhibition and some information about how it is achieved. After graduation, students have reported that this experience of peer-to-peer working across the spectrum of creative industries’ art forms has given them a confidence that they were able to apply in real work situations and has, moreover been a factor that directly led to relevant employment. One student offered in unsolicited feedback: “It was a brilliant course that I gained a lot from. One year on, I have since released another single and work as an artist manager, independently running campaigns for other artists. The course also helped make me more employable as well, and I now work … as a casual admin and projects officer” (Student 3, 2015).Issues Arising from Peer-to-Peer MentoringAn intrinsic aspect of facilitating and encouraging this peer-to-peer mentoring was to allow a degree of latitude in relation to student online communication. The week-to-week reflection on the online resources was, for instance, the only mandated activity. Other participation was modeled and encouraged, but left to students as to how often and when they participated, as well as the length of their posts. In each term, we have found student involvement in discussions increased throughout the term, and tended to exceed our expectations in both quantity and quality of posts.We have also found that the level of intimate detail offered, and intimacy developed, in the communications was far greater than we had initially anticipated, and that there were occasions when students raised personal issues. Initially, we were apprehensive about this, particularly when one student discussed past mental health challenges. At the time, we discussed that the creative arts – whether in terms of its creation or appreciation – are highly personal practices (Sternberg), and that the tone taken by many of the creative individuals, theorists, and researchers whose materials we use as resources was often personally revealing (see, for example, Brien and Brady). By not interfering, other than ensuring that the tone students used with each other was always respectful and focused on the professional aspects of what was being discussed, we observed that this personal revelation translated into high levels of engagement in the discussions, and indeed, encouraged peer support and understanding. Thus, in terms of the student who revealed information about past health issues and who at one stage had considered withdrawing from the course, this student later related to staff—in an unsolicited communication—that these discussions led to him feeling well supported. This student has, moreover, continued to work on related creative practice projects after completing the program and, indeed, is now considering continuing onto Masters level studies.ConclusionIn relation to much of the literature of mentoring, this experience of student interaction with others through an online discussion board appears to offer a point of difference. While that literature reports on other examples of peer-to-peer mentoring, most of these follow the seemingly more usual vertical mentoring model (that is, one which is hierarchical), rather than what developed organically in our case as a more horizontal mode. This is, moreover, a mode which has many synergies with the community of practice and collaborative problem solving models which are central to the creative industries (Brien and Bruns).Collings, Swanson, and Watkins have reported on the positive impact of peer mentoring on student wellbeing, integration, and retention. In terms of effects and student outcomes, although we have not yet collected data on these aspects of this activity, our observations together with informal and University-solicited feedback suggests that this peer-to-peer mentoring was useful (in terms of their project work) and affirming and confidence-building (personally and professionally) for students who are both mentors and mentees. These peer-to-peer mentoring activities assisted in developing, and was encouraged by, an atmosphere in which students felt it was appropriate and safe to both offer support and critique of each others’ work and ideas, as well as encouragement when students felt discouraged or creatively blocked. Students, indeed, reported in class and online that this input assisted them in moving through their projects and, as program staff, we saw that that this online space created a place where collaborative problem-solving could be engaged in as the need arose—rather than in a more forced manner. As teachers, we also found these students became our post-graduate colleagues in the way more usually experienced in the doctoral supervisor-student relationship (Dibble and Loon).The above reports on a responsive learning and teaching strategy that grew out of our understanding of our students’ needs that was, moreover, in line with our institution’s imperatives. We feel this was a successful and authentic way of involving students in online discussions, although we did not originally foresee that they would become mentors in the process. The next step is to develop a project to formally evaluate this aspect of this program and our teaching, as well as whether (or how) they reflect the overarching discipline of the creative industries in terms of process and philosophy. ReferencesAllen, Tammy D., and Mark L. Poteet. “Developing Effective Mentoring Relationships: Strategies from the Mentor’s Viewpoint.” The Career Development Quarterly 48.1 (1999): 59–57.Ambosetti, Angelina, and John Dekkers. “The Interconnectedness of the Roles of Mentors and Mentees in Pre-Service Teacher Education Mentoring Relationships.” Australian Journal of Teaching Education 35.6 (2010): 42–55.Aragon, Steven R. “Creating Social Presence in Online Environments.” New Directions for Adult and Continuing Education 100 (2003): 57–68. Barrett, Estelle, and Barbara Bolt, eds. Practice as Research: Approaches to Creative Arts Enquiry. London: I.B. Tauris, 2007.Brady, Tess. “A Question of Genre: Demystifying the Exegesis.” TEXT: Journal of the Australian Association of Writing Programs 4.1 (2000). 1 Mar. 2016 <http://www.textjournal.com.au/april00/brady.htm>.Brien, Donna Lee, and Tess Brady. “Collaborative Practice: Categorising Forms of Collaboration for Practitioners.” TEXT: The Journal of the Australian Association of Writing Programs 7.2 (2003). 1 Mar. 2016 <http://www.textjournal.com.au/oct03/brienbrady.htm>.Brien, Donna Lee, and Axel Bruns. “Editorial.” M/C Journal 9.2 (2006) 1 Mar. 2016 <http://www.textjournal.com.au/oct03/brienbrady.htm>.Central Queensland University. CB82 Graduate Certificate in Creative Industries. 2016. 1 Mar. 2016 <http://handbook.cqu.edu.au/programs/index?programCode=CB82>.Colis, B., and J. Moonen. Flexible Learning in a Digital World: Experiences and Expectations. London: Kogan-Page, 2001.Collings, R., V. Swanson and R. Watkins. “The Impact of Peer Mentoring on Levels of Student Wellbeing, Integration and Retention: A Controlled Comparative Evaluation of Residential Students in U.K. Higher Education.” Higher Education 68 (2014): 927–42.Colvin, Janet W., and Miranda Ashman. “Roles, Risks and Benefits of Peer Mentoring Relationships in Higher Education.” Mentoring and Tutoring: Partnership in Learning 18.2 (2010): 121–34. Dargusch, Joanne, Lois R. Harris, Kerry Reid-Searl, and Benjamin Taylor. “Getting the Message Through: Communicating Assessment Expectations to First Year Students.” Australian Association of Research in Education Conference. Fremantle, WA: 2015.Dibble, Brian, and Julienne van Loon. “The Higher Degree Research Journey as a Three Legged Race.” TEXT: Journal of the Australian Association of Writing Programs 8.2 (2004). 20 Feb. 2016 <http://www.textjournal.com.au/oct04/dibble_vanloon.htm>.Dixon, Robert, Kathryn Dixon, and Mandi Axmann. “Online Student Centred Discussion: Creating a Collaborative Learning Environment.” Hello! Where Are You in the Landscape of Educational Technology: Proceedings ASCILITE. Melbourne: ASCILITE, 2008. 256–264.Hall, Kendra M., Rani Jo Draper, Leigh K. Smith, and Robert V. Bullough. “More than a Place to Teach: Exploring the Perceptions of the Roles and Responsibilities of Mentor Teachers.” Mentoring & Tutoring: Partnership in Learning 16.3 (2008): 328–45.Holton, Judith A. “Building Trust and Collaboration in a Virtual Team.” Team Performance Management: An International Journal 7.3/4 (2001): 36–47.Kroll, Jeri, and Donna Lee Brien. “Studying for the Future: Training Creative Writing Postgraduates for Life after Degrees.” Australian Online Journal of Arts Education 2.1 (2006): 1–13.La Pointe, Loralee, and Marcy Reisetter. “Belonging Online: Students’ Perceptions of the Value and Efficacy of an Online Learning Community.” International Journal on E-Learning 7.4 (2008): 641–65.Merriam, Sharan B. Qualitative Research: A Guide to Design and Implementation. San Francisco, CA: Jossey-Bass, 2009.Reid, E. Shelley. “Mentoring Peer Mentors: Mentor Education and Support in the Composition Program.” Composition Studies 36.2 (2008): 51–79.Rovai, A.P., and Hope M. Jordan. “Blended Learning and Sense of Community: A Comparative Analysis with Traditional and Fully Online Graduate Courses.” Virginia: Regent University, 2004. 20 Feb. 2016 <http://www.irrodl.org/index.php/irrodl/article/view/192/274>.Storrs, D., L. Putsche, and A. Taylor. “Mentoring Expectations and Realities: An Analysis of Metaphorical Thinking among Female Undergraduate Protégés and Their Mentors in a University Mentoring Programme.” Mentoring & Tutoring: Partnership in Learning 16.2 (2008): 175–88. Sternberg, Robert. The Nature of Creativity: Contemporary Psychological Perspectives. Cambridge: Cambridge UP, 1988.Sturm, Ulrike, Denise Beckton, and Donna Lee Brien. “Curation on Campus: An Exhibition Curatorial Experiment for Creative Industries Students.” M/C Journal 18.4 (2015). 12 Feb. 2016 <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1000>.Webb, Jen, and Donna Lee Brien. “Preparing Graduates for Creative Futures: Australian Creative Arts Programs in a Globalising Society.” Partnerships for World Graduates: AIC (Academia, Industry and Community) 2007 Conference. Melbourne: RMIT, 28–30 November 2007.
APA, Harvard, Vancouver, ISO, and other styles
40

Phillipov, Michelle. "“Just Emotional People”? Emo Culture and the Anxieties of Disclosure." M/C Journal 12, no. 5 (December 13, 2009). http://dx.doi.org/10.5204/mcj.181.

Full text
Abstract:
In an article in the Sunday Tasmanian shortly after the deaths of Melbourne teenagers Jodie Gater and Stephanie Gestier in 2007, Tasmanian Catholic Schools Parents and Friends Federation president Bill Button claimed: “Parents are concerned because all of a sudden their child, if they have access to a computer, can turn into an Emo” (qtd. in Vowles 1).For a few months in 2007, the dangers of emo and computer use were significant themes in Australian newspaper coverage. Emo, an abbreviation of the terms “emocore” or “emotional hardcore”, is a melodic subgenre of punk rock music, characterised by “emotional” or personal themes. Its followers, who adopt a look that includes black stovepipe jeans, dyed black hair and side-parted long fringes, might merely have been one of the many “tribes” (Bennett 605) that characterise contemporary youth culture. However, over an approximately five-month period in 2007, the deaths of three teenagers in two separate incidents—the murder Carly Ryan in February and the suicides of Jodie Gater and Stephanie Gestier in April—were linked to the emo subculture and to the social networking site MySpace, both of which were presented as dangerous and worrying developments in contemporary youth culture.This paper explores the media discourse surrounding emo and social networking technologies via a textual analysis of key reports and commentary pieces published in major metropolitan and national newspapers around the times of the three deaths. Although only a small selection of the 140-odd articles published Australia-wide is discussed here, those selected are indicative of broader trends in the newspaper coverage, and offer a means of examining how these incidents were constructed and understood within mainstream media discourse.Moral panics in relation to youth music and subculture are not uncommon in the news and other media (Cohen; Goode and Ben-Yehuda; Redhead; Rose 124-145; Weinstein 245-263; Wright). Moral panics related to social networking technologies have also been subject to academic study (Hinduja and Patchin 126; Livingstone 395; Marwick). In these cases, moral panic is typically understood as a force of normalisation and social control. The media discourses surrounding the deaths of the three young women possessed many of the features of moral panic described in this literature, including a build-up of concern disproportionate to “real” risk of harm (see Goode and Ben-Yehuda 33-41). But while emo youth were sometimes constructed as a straightforward “folk devil” (Cohen 11) or “enemy” (Goode and Ben-Yehuda 31) in need of clear sanctions—or, alternatively, as victims of a clear folk devil or enemy—the “problem” of emo was also framed as a product of much broader problems of youth culture.Connections between emo, MySpace, the deaths of the three young women were only ever tenuously established in the news reports and commentaries. That the stories appeared to be ultimately concerned with a broader group of (non-subculturally affiliated) young people suggests that this coverage can be seen as symptomatic of what John Hartley describes—in the context of reporting on young people more generally—as a “profound uncertainty in the textual system of journalism about where the line that defines the boundary of the social should be drawn” (17). The result is a “cultural thinking-out-loud” (Hartley 17) in which broader cultural anxieties are expressed and explored, although they are not always clearly articulated. While there were some attempts in these reports and commentaries on the three “emo deaths” to both mobilise and express specific fears (such as the concern that computer access can turn a child “into an Emo”), the newspaper coverage also expressed broader anxieties about contemporary youth culture. These can be described as anxieties about disclosure.In the cases of Carly Ryan, Jodie Gater and Stephanie Gestier, these were disclosures that were seen as simultaneously excessive and inadequate. Specifically, the newspaper coverage focused on both the dangers of young people’s disclosures of traditionally private material, and the ways in which the apparent secrecy of these disclosures made them inaccessible to adult authorities who could otherwise have “done something” to prevent the tragedies from occurring.Although some of these concerns were connected to the specificities of emo subcultural expression—the “excessive” emotionality on display and the impenetrability of subcultural imagery respectively—they were on the whole linked to a broader problem in contemporary youth culture that was seen to apply to all young people, whether or not they were emo-identified. Specifically, the deaths of Carly Ryan, Jodie Gater and Stephanie Gestier provided opportunities for the expression of anxieties that the private lives of young people were becoming increasingly “unknowable” to adult authorities, and, hence, that youth culture itself was increasingly “unknowable”.The Case of Carly RyanIn February 2007, the body of 15-year-old Carly Ryan was found in Horseshoe Bay at Port Elliot, just south of Adelaide. Several weeks later, a 48-year-old man and his 17-year-old son were arrested for her murder. The murder trial began January 2009, with the case still continuing at the time of writing. In the early reports of her death, particularly in Adelaide’s Advertiser, Ryan’s MySpace page was the focus of much discussion, since the teenager was understood to have presented an image of herself on the site that left her vulnerable to predators, including to one of her alleged killers with whom she had been regularly communicating in the weeks leading up to her murder (Littlely, Salter, and Wheatley 4; Hunt 2; Wheatley 4).The main report in The Advertiser, described Ryan’s MySpace page as “bizarre” and as “paint[ing] a disturbing picture of a world of drugs and sex” (Littlely, Salter and Wheatley 4). Ryan was reported as listing her interests as “drugs, smoking, music and sex”, to have described herself as “bisexual”, and to have uploaded images of a “girl injecting herself, a woman with a crucifix rammed down her throat and a woman with her lips stitched together” (Littlely, Salter, and Wheatley 4).Attempts were made to link such “graphic” imagery to the emo subculture (Littlely, Salter, and Wheatley 1; see also O’Donohue 5). The imagery was seen as subcultural insofar as it was seen to reflect a “bizarre teenage ‘goth’ and ‘emo’ world” (Littlely, Salter, and Wheatley 1), a world constructed both as dangerous (in the sense that her apparent involvement in subcultural activities was presented as “disturbing” and something that put her at risk of harm) and impenetrable (in the sense that subcultural imagery was understood not simply as harmful but also as “bizarre”). This linking of Ryan’s death to the emo and goth subcultures was done despite the fact that it was never clearly substantiated that the teenager did indeed classify herself as either “emo” or “goth”, and despite the fact that such links were contested by Ryan’s friends and family (see: “Gothic Images” 15; Riches 15).The repeated linking, then, of Ryan’s death to her (largely unconfirmed) subcultural involvement can be seen as one way of containing the anxieties surrounding her apparently “graphic” and “inappropriate” online disclosures. That is, if such disclosures can be seen as the expressions of a minority subcultural membership, rather than a tendency characteristic of young people more generally, then the risks they pose may be limited only to subcultural youth. Such a view is expressed in comments like Bill Button’s about computer use and emo culture, cited above. Research, however, suggests that with or without subcultural affiliation, some young users of MySpace use the site to demonstrate familiarity with adult-oriented behaviours by “posting sexually charged comments or pictures to corroborate their self-conception of maturity”—irrespective of whether these reflect actual behaviours offline (Hinduja and Patchin 136, 138). As such, this material is inevitably a construction rather than a straightforward reflection of identity (Liu).On the whole, Ryan’s death was presented as simultaneously the product of a dangerous subcultural affiliation, and an extreme case of the dangers posed by unsupervised Internet use to all young people, not just to those emo-identified. For example, the Sunday Mail article “Cyber Threat: The New Place Our Kids Love to Play” warned of the risks of disclosing too much personal information online, suggesting that all young people should restrict access to private information only to people that they know (Novak 12).Such reports reflect a more widespread concern, identified by Marwick, that social networking sites lower cultural expectations around privacy and encourage young people to expose more of their lives online, hence making them vulnerable to potential harm (see also De Souza and Dick; Hinduja and Patchin). In the case of Carly Ryan, the concern that too much (and inappropriate) online disclosure poses dangers for young people is also subtended by anxieties that the teenager and her friends also did not disclose enough information—or, at least, did not disclose in a way that could be made comprehensible and accessible to adult authorities.As a result, the so-called “graphic” material on Ryan’s MySpace page (and on the pages of her friends) was described as both inappropriately public and inappropriately hidden from public view. For example, a report in The Advertiser spoke of a “web of secret internet message boards” that “could potentially hold vital clues to investigating detectives” but which “have been blocked by their creators to everyone but [Ryan’s] tight-knit group of friends” (Littlely, Salter, and Wheatley 1). This “web of secret internet message boards” was, in fact, MySpace pages set to “private”: that is, pages accessible to approved friends only.The privacy settings on profiles are thus presented as an obfuscatory mechanism, a refusal on the part of young people to disclose information that might be of assistance to the murder case. Yet these young people were conforming to the very advice about online safety provided in many of the news reports (such as the article by Novak) and echoed in material released by the Australian Government (such as the Cybersmart Guide for Families): that is, in order to protect their privacy online, they should restrict access to their social networking profiles only to friends that they know.This contradictory message—that too much disclosure online poses safety risks, while conservative approaches to online privacy are evidence of secrecy and obfuscation—expresses a rather tangled set of anxieties about contemporary youth culture. This is part of the “cultural thinking-out-loud” that Hartley characterises as a feature of news reporting on youth more generally. The attempt to make sense of an (apparently motiveless) murder of a young woman with reference to a set of contemporary youth cultural practices that are described as both dangerous and incomprehensible not only constructs technology, subculture and young people as problems to be “fixed”, but also highlights the limited ways through which mainstream news coverage comes to “know” and understand youth culture.Jodie Gater and Stephanie Gestier: The “MySpace Suicide Girls” News reporting on Carly Ryan’s death presented youth culture as a disturbing and dangerous underworld hidden from adult view and essential “unknowable” by adult authorities. In contrast, the reports and commentaries on the deaths of Jodie Gater and Stephanie Gestier only a few months later sought to subsume events that may otherwise have been viewed as inexplicable into categories of the already-known. Gater and Gestier were presented not as victims of a disturbing and secret underground subculture, but a more fully knowable mainstream bullying culture. As a result, the dangers of disclosure were presented differently in this case.In April 2007, the bodies of 16-year-old friends Jodie Gater and Stephanie Gestier were found in bushland on the outskirts of Melbourne. The pair was understood to have hanged themselves as part of a suicide pact. Like the reporting on Carly Ryan’s death, anxieties were raised, particularly in the Melbourne papers, about “teenagers’ secret world” in which “introspective, lonely, misunderstood and depressed” young people sought solace in the communities of emo and MySpace (Dubecki 3).Also similar was that the dangers posed by emo formed part of the way this story was reported, particularly with respect to emo’s alleged connection to self-harming practices. The connections between the emo subculture and the girls’ suicides were often vague and non-specific: Gater and Gestier’s MySpace pages were described as “odes to subculture” (Dowsley 73) and their suicides “influenced by youth subcultures” (Dubecki and Oakes 1), but it was not clearly substantiated in the reports that either Gater or Gestier identified with the emo (or any) subculture (see: Dubecki 3).It was similarly the case that the stories connected the deaths of Gater and Gestier to personal disclosures on MySpace. In contrast to the reporting on Carly Ryan’s murder, however, there were fewer concerns about inappropriate and overly personal disclosures online, and more worries that the teenagers’ online disclosures had been missed by both the girls’ friends and by adult authorities. The apparent suicide warning messages left on the girls’ MySpace pages in the months leading up to the their deaths, including “it’s over for me, I can’t take it!” and “let Steph and me be free” (qtd. in Oakes 5), were seen as evidence of the inaccessibility of young people’s cries for help in an online environment. Headlines such as “Teen Cries for Help Lost in Cyberspace” (Nolan 4) suggest that the concern in this case was less about the “secrecy” of youth culture, and more about an inability of parents (and other adult authorities) to penetrate online youth culture in order to hear disclosures made.As a consequence, parents were encouraged to access these disclosures in other ways: Andrea Burns in an opinion column for the Sunday Herald Sun, for example, urged parents to open the lines of communication with their teenagers and not “leave the young to suffer in silence” (108). An article in the Sunday Age claimed developmental similarities between toddlers and teenagers necessitated increased parental involvement in the lives of teens (Susan Sawyer qtd. in Egan 12). Of course, as Livingstone notes, part of the pleasure of social networking sites for young people is the possibility of escape from the surveillance of parental authority (396). Young people’s status as a social category “to be watched” (Davis 251), then, becomes challenged by the obvious difficulties of regular parental access to teenagers’ online profiles. Perhaps acknowledging the inherent difficulties of fully “knowing” online youth culture, and in turn seeking to make the Gater/Gestier tragedy more explicable and comprehensible, many of the articles attempted to make sense of the apparently unknowable in terms of the familiar and already-known. In this case, the complexities of Gater and Gestier’s deaths were presented as a response to something far more comprehensible to adult authorities: school bullying.It is important to note that many of the articles did not follow government recommendations on the reporting of suicide as they often did not consider the teenagers’ deaths in the context of depression or other mental health risks (see: Blood et al. 9). Instead, some reports, such as the Neil McMahon’s story for The Sydney Morning Herald, claimed that the girls’ deaths could be linked to bullying—according to one friend Stephanie Gestier was “being bullied really badly” at school (1). Others simply assumed, but did not substantiate, a connection between the deaths of the two teenagers and the experience of bullying.For instance, in an opinion piece for The Australian, Gater and Gestier’s deaths are a segue for discussing teenage bullying more generally: “were Gater and Gestier bullied?” writer Jack Sargeant asks. “I do not know but I imagine they were” (10). Similarly, in an opinion piece for the Herald Sun entitled “Why Kids Today Feel so ‘Emo’”, Labor MP Lindsay Tanner begins by questioning the role of the emo subculture in the deaths of Gater and Gestier, but quickly shifts to a broader discussion of bullying. He writes: “Emos sound a lot like kids who typically get bullied and excluded by other kids [...] I’m not really in a position to know, but I can’t help wondering” (Tanner 21).Like Sargeant, Tanner does not make a conclusive link between emo, MySpace, suicide and bullying, and so instead shifts from a discussion of the specifics of the Gater/Gestier case to a discussion of the broader problems their suicides were seen to be symptomatic of. This was assisted by Tanner’s claims that emo is simply a characteristic of “kids today” rather than as a specific subcultural affiliation. Emo, he argued, “now seems to reflect quite a bit more than just particular music and fashion styles”: it is seen to represent a much wider problem in youth culture (Tanner 21).Emo thus functioned as a “way in” for critics who perhaps found it easier to (initially) talk about suicide as a risk for those on the cultural fringe, rather than the adolescent mainstream. As a result, the news coverage circled between the risks posed by subcultural involvement and the idea that any or all young people could be at risk of suicide. By conceiving explicit displays of emotionality online as the expression of bullied young people at risk of suicide, otherwise ambiguous disclosures and representations of emotion could be made knowable as young people’s cries for (parental and adult) help.ConclusionIn the newspaper reporting and commentary on the deaths of Carly Ryan, Jodie Gater and Stephanie Gestier, young people are thought to disclose both too much and not enough. The “cultural thinking-out-loud” (Hartley 17) that characterised this type of journalism presented young people’s disclosures as putting them at risk of harm by others, or as revealing that they are at risk of self harm or suicide. At the same time, however, these reports and commentaries also expressed anxieties that young people do not disclose in ways that can be rendered easily knowable, controllable or resolvable by adult authorities. Certainly, the newspaper coverage works to construct and legitimise ideals of parental surveillance of teenagers that speak to the broader discourses of Internet safety that have become prominent in recent years.What is perhaps more significant about this material, however, is that by constructing young people as a whole as “emotional people” (Vowles 1) in need of intervention, surveillance and supervision, and thereby subsuming the specific concerns about the emo subculture and social networking technologies into an expression of more generalised concerns about the “unknowability” of young people as a whole, the newspaper coverage is, in John Hartley’s words, “almost always about something else” (16). Emo and social networking, then, are not so much classic “folk devils”, but are “ways in” for expressing anxieties that are not always clearly and consistently articulated. In expressing anxieties about the “unknowability” of contemporary youth culture, then, the newspaper coverage ultimately also contributed to it. This highlights both the complexity in which moral panic discourse functions in media reporting, and the ways in which more complete understandings of emo, social networking technologies and youth culture became constrained by discourses that treated them as essentially interchangeable.ReferencesAdamson, Kate. “Emo Death Arrest.” Sunday Herald Sun 4 Mar. 2007: 12.Bennett, Andy. “Subcultures or Neo-Tribes? Rethinking the Relationship between Youth, Style and Musical Taste.” Sociology 33 (1999): 599–617.Blood, Warwick R., Andrew Dare, Kerry McCallum, Kate Holland, and Jane Pirkis. “Enduring and Competing News Frames: Australian Newspaper Coverage of the Deaths by Suicides of Two Melbourne Girls.” ANZCA08: Power and Place: Refereed Proceedings, 2008. 1 Sep. 2009 ‹http://anzca08.massey.ac.nz/›.Burns, Andrea. “Don’t Leave the Young to Suffer in Silence.” Sunday Herald Sun 17 Jun. 2007: 108.Cohen, Stanley. Folk Devils and Moral Panics: The Creation of the Mods and Rockers. St Albans: Paladin, 1973.Cubby, Ben, and Larissa Dubecki. “‘It’s Over for Me, I Can’t Take It!’ The Tragic Last Words of MySpace Suicide Girls.” Sydney Morning Herald 24 Apr. 2007: 1.Cybersmart Guide for Families: Safe Internet Use in the Library and at Home. Australian Communications and Media Authority, 2009. 24 Sep. 2009 ‹http://www.cybersmart.gov.au/Parents/Family safety resources/information for you to download.aspx›.Davis, Mark. Gangland: Cultural Elites and the New Generationalism. St Leonards: Allen and Unwin, 1997.De Souza, Zaineb, and Geoffrey N. Dick. “Disclosure of Information by Children in Social Networking: Not Just a Case of ‘You Show Me Yours and I’ll Show You Mine.’” International Journal of Information Management 29 (2009): 255–61.Dowsley, Anthony. “Websites Hold Key to Teens’ Suicides.” The Daily Telegraph 28 March 2007: 73.Dubecki, Larissa. “Teenagers’ Secret World.” The Age 28 April 2007: 3.Dubecki, Larissa, and Dan Oakes. “Lost in Cyberspace: Fears That New Networks Are Breeding Grounds for Real-Life Tragedies.” The Age 24 April: 1.Egan, Carmel. “Being 16.” Sunday Age 29 Mar. 2007: 12.Goode, Erich, and Nachman Ben-Yehuda. Moral Panics: The Social Construction of Deviance. Oxford: Blackwell, 2002.“Gothic Images Appealed to Artistic Soul.” The Advertiser 24 Feb. 2007: 15.Hartley, John. “‘When Your Child Grows Up Too Fast’: Juvenation and the Boundaries of the Social in the News Media.” Continuum: Journal of Media and Cultural Studies 12.1 (1998): 9–30.Hinduja, Sameer, and Justin W. Patchin. “Personal Information of Adolescents on the Internet: A Qualitative Content Analysis of MySpace.” Journal of Adolescence 31 (2008): 125-46. Hunt, Nigel. “Teen Murder Breakthrough.” Sunday Mail 4 Mar. 2007: 1-2.Littlely, Brian, Chris Salter, and Kim Wheatley. “Net Hunt for Murder Clues.” The Advertiser 23 Feb. 2007: 1, 4.Livingstone, Sonia. “Taking Risky Opportunities in Youthful Content Creation: Teenagers’ Use of Social Networking Sites for Intimacy, Privacy and Self-Expression.” New Media & Society 10.3 (2008): 393-411.Liu, Hugo. “Social Network Profiles as Taste Performances.” Journal of Computer-Mediated Communication 13 (2008): 252-275.Marwick, Alice. “To Catch a Predator? The MySpace Moral Panic.” First Monday 13.6 (2008). 31 Aug. 2009 ‹http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2152/1966›.McMahon, Neil. “School Bullies on Girls’ Sad Road to Oblivion.” Sydney Morning Herald 28 Mar. 2007: 1.Nolan, Kellee. “Teen Cries for Help Lost in Cyberspace.” The Courier Mail 24 Mar. 2007: 4.Novak, Lauren. “Cyber Threat: The New Place Our Kids Love to Play.” Sunday Mail 11 Mar. 2007: 12.Oakes, Dan. “Let Us Be Free: Web Clues to Teen Death Pact.” Sydney Morning Herald 23 Mar. 2007: 5.O’Donohue, Danielle. “Pain and Darkness in ‘Emo’ Dwellers’ World.” The Advertiser 23 Feb. 2007: 5.Redhead, Steve (ed). Rave Off: Politics and Deviance in Contemporary Youth Culture. Aldershot: Ashgate, 1999.Riches, Sam. “Farewell to My Love, My World, My Precious Baby Girl.” The Advertiser 10 March 2007: 15.Rose, Tricia. Black Noise: Rap Music and Black Culture in Contemporary America. Middletown: Wesleyan University Press, 1994.Sargeant, Jack. “It’s Hard to Be Emo and Be Respected.” The Australian 3 May 2007: 10.Tanner, Lindsay. “Why Kids Today Feel So ‘Emo’.” Herald Sun 12 June 2007: 21.Vowles, Gill. “Shock Figures on Emo Culture: Alarm at Teens’ Self-Harm.” Sunday Tasmanian 20 May 2007: 1.Weinstein, Deena. Heavy Metal: The Music and Its Culture. Boulder: Da Capo, 2000.Wheatley, Kim. “How Police Tracked Carly Suspects.” The Advertiser 5 Mar. 2007: 1, 4.Wright, Robert. “‘I’d Sell You Suicide’: Pop Music and Moral Panic in the Age of Marilyn Manson.” Popular Music 19.3 (2000): 365–385.
APA, Harvard, Vancouver, ISO, and other styles
41

Trofimova, Evija, and Sophie Nicholls. "On Walking and Thinking: Two Walks across the Page." M/C Journal 21, no. 4 (October 15, 2018). http://dx.doi.org/10.5204/mcj.1450.

Full text
Abstract:
IntroductionTwo writers, stuck in our university offices, decide to take our thoughts “for a walk” across the page. Writing from Middlesbrough, United Kingdom, and Auckland, New Zealand, we are separated by 18,000 kilometres and 11 hours, and yet here, on the page, our paths meet. How does walking, imaginary or real, affect our thinking? How do the environments through which we move, and the things we see along the way, influence our writing? What role do rhythm and pace play in the process? We invite you to join us on two short walks that reflect on our shared challenges as writers from two different strands of writing studies. Perhaps our paths will intersect, or even overlap, with yours somewhere? Ultimately, we aim to find out what happens when we leave our academic baggage behind, side-stepping dense theoretical arguments and comprehensive literature reviews for a creative-critical exploration. Evija: Let’s admit it, Sophie—I’m stuck. I’ve spent half a day in front of this computer but have hardly typed a line. It’s not just writing. It’s my thinking. I feel like my mind is weighed down by the clutter of thoughts that lead nowhere.Look at my surroundings. My office is crammed with stuff. So many thoughts buried under piles of paper, insisting on their place in the work in which they so obviously do not belong. I also can’t help but feel the magnetic pull of others’ ideas from all the books around me. Each thought, each reference, fights for its place in my work. What an unbearable intertextual mess...Sophie: I think that everyone who has ever tried to write knows exactly what these moments feel like. We can feel so lost, so stuck and blocked. Have you ever noticed that the words that we use about these feelings are intensely visceral? Perhaps that’s why, when the words won’t come, so many of us find it helpful to get up and move our bodies. Evija, shall we leave our desks behind for a while and go for a walk? Would you like to join me?E: Most certainly! Apparently, Friedrich Nietzsche loved to take his mind for a walk (Gros). Ideas, born among books, says Frédéric Gros, “exude the stuffy odour of libraries” (18). Gros describes such books as “grey”: “overloaded with quotations, references, footnotes, explicatory prudence, indefinite refutations” (19). They fail to say anything new and are “crammed”, “stuffed”, and “weighed down”; they are “born of a compilation of the other books” (Gros 19) so also bear their weight. Essentially, we are told, we should think of the books we are writing as “expression[s] of [our] physiology” (Gros 19). If we are shrivelled, stuck, stooped, tense, and tired, so also are our thoughts. Therefore, in order to make your thoughts breathe, walk, and even “dance”, says Nietzsche, you should go outdoors, go up in the mountains.S: As I read what you’ve written here, Evija, I feel as if I’m walking amongst your thoughts, both here on the screen and in my imagination. Sometimes, I’m in perfect step with you. At other times, I want to interrupt, tug on your sleeve and point, and say “Look! Have you seen this, just up ahead?”E: That’s the value of companionship on the road. A shared conversation on the move can lead to a transformation of thought, a conversion, as in the Biblical stories of the roads to Emmaus and Damascus. In fact, we tested the power of walking and talking in rural settings in a series of experimental events organised for academics in Auckland, New Zealand, throughout 2017 (see our blog post on Writing, Writing Everywhere website). It appeared to work very well for writers who had either been “stuck” or in the early stages of drafting. Those who were looking to structure existing thoughts were better off staying put. But walking and talking is an entire other topic (see Anderson) that we should discuss in more depth some other time.Anyway, you’ve brought us to what looks like a forest. Is this where you want us to go?A Walk “into the Woods,” or Getting in the Thick of Free-Writing S: Yes, just follow me. I often walk in the woods close to where I live. Of course, going “into the woods” is itself a metaphor, rich with fairy-tale connotations about creativity. The woods are full of darkness and danger, grandmother’s cottage, wild beasts, witches, poisonous fruits. The woods are where traps are laid, where children wander and get lost, where enchantments befall us. But humans have always been seduced by the woods and what lies in wait there (Maitland). In Jungian terms, losing oneself in darkness is a rite of initiation. By stepping into the woods, we surrender to not knowing, to walking off the path and into the depths of our imagination. I dare you to do that, right now! E: Letting go is not always easy. I keep wanting to respond to your claim by adding scholarly references to important work on the topic. I want to mention the father of the essay, Michel de Montaigne, for whom this form of writing was but “an attempt” (from Old French, “essai”) to place himself in this world, a philosophical and literary adventure that stood very far from the rigidly structured academic essay of the present day (Sturm). We’ve forgotten that writing is a risky undertaking, an exploration of uncharted terrains (Sturm). S: Yes, and in academic thinking, we’re always afraid to ramble. But perhaps rambling is exactly what we need to do. Perhaps we need to start walking without knowing where we’re going ... and see where it takes us. E: Indeed. Instead of going on writing retreats, academics should be sent “into the woods”, where their main task would be to get lost before they even start to think.S: Into the Woods, a reality TV show for academics? But seriously, maybe there is something about walking into the woods—or a landscape different from our habitual one—that symbolises a shift in feeling-state. When I walk into the woods, I purposely place myself in a different world. My senses are heightened. I become acutely aware of each tiny sound—the ticking of the leaves, the wind, the birdsong, the crunch of my feet, the pounding of the blood in my ears. I become less aware of all the difficult parts of myself, my troubles, my stuckness, what weighs on me so heavily. It seems to me that there is a parallel here with a state of consciousness or awareness famously described by the psychologist of optimal experience, Mihalyi Csikszentmihalyi, as “flow”. In flow, “the loss of a sense of self separate from the world around it is sometimes accompanied by a feeling of union with the environment” (Csikszentmihalyi 63), together with pleasure in movement and in the sensory experience of seeing the world. So flow might be one way of thinking about my lived experience of walking in the woods. But this shift has also been described by the psychotherapist Marion Milner as a shift from “narrow thinking” into a “wider” way of looking, listening, feeling, and moving—a feeling state that Milner called the “fat feeling”. She identified this “fat feeling” as characteristic of moments when she experienced intense delight (Milner 15) and she began to experiment with ways in which she could practice it more purposefully.In this sense, walking is a kind of “trick” that I can play upon myself. The shift from office to woods, from sitting at my desk to moving through the world, triggers a shift from preoccupation with the “head stuff” of academic work and into a more felt, bodily way of experiencing. Walking helps me to “get out of my head.”E: So wandering through this thicket becomes a kind of free writing?S: Yes, free writing is like “taking a line for a walk” on the page, words that the Swiss-German artist Paul Klee famously attributed to drawing (Klee 105; see also Raymond). It’s what we’re doing here, wouldn’t you say?Two Lines of Walking: A drawing by Evija. E: Yes—and we don’t know where this walk will lead us. I’m thinking of the many times I have propelled myself into meaningful writing by simply letting the hand do its work and produce written characters on the screen or page. Initially, it looks like nonsense. Then, meaning and order start to emerge.S: Yes, my suggestion is that walking—like writing—frees us up, connects us with the bodily, felt, and pleasurable aspects of the writing process. We need this opportunity to meander, go off at tangents...E: So what qualities do free writing and walking have in common? What is helpful about each of these activities?S: A first guess might be that free writing and walking make use of rhythm. Linguist and psychoanalyst Julia Kristeva calls the sound, rhythm, and texture of language the “semiotic”. For Kristeva, the “semiotic” (the realm of bodily drives and affects, rhythms, pre-verbal babble) and the “symbolic” (the realm of prescribed language, linguistic structure, grammar, and judgment) do not exist in rigid opposition to one another. Instead, they form a continuum which she calls “signifiance” or signification (Kristeva 22), a “dialectic” (24) of making meaning. According to Kristeva, even the smallest element of symbolic meaning, the phoneme, is involved in “rhythmic, intonational repetitions” (103) so that, as we order phonemes into words and words into sentences, our language pulses with the operations of our bodily, instinctual drives. Kristeva thinks in terms of an “explosion of the semiotic in the symbolic” (69). E: An explosion. I like that!S: Me too.My theory is that, by letting go into that rhythm a little, we’re enabling ourselves to access some of the pre-verbal force that Kristeva talks about. E: So the rhythm of walking helps us to connect with the rhythmic qualities of the semiotic?S: Exactly. We might say that a lot of academic writing tends to privilege the symbolic—both in terms of the style we choose and the way that we structure our arguments. E: And academic convention requires that we make more references here. For example, as we’re discussing “free writing”, we could cite Ken Macrorie or Peter Elbow, the two grandfathers of the method. Or we might scaffold our talks about collaborative writing as a means of scholarly inquiry, with the work of Laurel Richardson or another authority in the field.S: Yes, and all of this is an important part of academic practice, of course. But perhaps when we give ourselves permission to ramble and meander, to loosen up the relationships between what we feel and what we say, we move along the continuum of meaning-making towards the more felt and bodily, and away from the received and prescribed. …S: And I’ve put an ellipsis there to mark that we are moving into another kind of space now. We’re coming to a clearing in the woods. Because at some point in our rambling, we might want to pause and make a few suggestions. Perhaps we come to a clearing, like this one here. We sit down for a while and collect our thoughts.E: Yes. Let’s sit down. And, while you’re resting, let me tell you what this “collecting of thoughts” reminds me of.I’m thinking that we don’t necessarily need to go anywhere to get away from our particular state of mind. A shared cup of coffee or a conversation can have the same effect. Much has already been said about the effects of alcohol, tobacco, and drugs on writing; all rather harmful ways of going “on a trip” (Laing; Klein). In our case, it’s the blank pages of a shared Google Doc that has brought us together, collecting our thoughts on walking and moving us into a different realm, a new world of exciting and strange ideas to be explored. And the idea of mapping out this space by gradually filling its pages with words sets our minds on a journey.S: That’s interesting. The choreographer Twyla Tharp talks about the power of ritual in creating this shift for us into a creative or flow state. It could be lighting a candle or drinking a glass of water. There is a moment when something “clicks”, and we enter the world of creativity.E: Yes, a thing can act as a portal or gateway. And, as I want to show you, the things in the landscape that we walk through can help us to enter imaginary realms.So can I take you for a little walk now? See that winding country road leading through open fields and rolling hills? That’s where we’re going to start.A publicity image, drawn by Evija, for Walking Talking Writing events for academics, organised at the University of Auckland in 2017.A Walk “through the Countryside”, or Traversing the Landscape of ThoughtsE: Sophie, you spoke earlier about the way that experiencing yourself in relation to the environment is important for opening up your imagination. For example, just allowing yourself to be in the woods and noticing how the space pulsates around you is enough to awaken your bodily awareness.But let’s take a stroll along this road and let me explain to you what’s happening for me. You see, I find the woods too distracting and stimulating. When I’m stuck, I crave openness and space like this landscape that we’re walking through right now. S: Too much detail, too many things, overwhelm you?E: Exactly. Here, where the landscape is simple and spacious, my thoughts can breathe. Ideas quietly graze as I move through them. The country road is under my feet and I know exactly where I’m heading – beyond that horizon line in the distance… I need to be able to look far into that hazy distance to get my sense of seeing things “in depth.” All this makes me think of a study by Mia Keinänen in which she surveyed nine Norwegian academics who habitually walk to think (Keinänen). Based on their personal observations, the resulting article provides interesting material about the importance of walking—its rhythm, environment, and so on—on one’s thinking. For one of the academics, being able to see landmarks and thoughts in perspective was the key to being able to see ideas in new ways. There is a “landscape of thinking”, in which thinking becomes a place and environment is a process.For another participant in the study, thoughts become objects populating the landscape. The thinker walks through these object-thoughts, mapping out their connections, pulling some ideas closer, pushing others further away, as if moving through a 3D computer game.S: Hmm. I too think that we tend to project not only thoughts but also the emotions that we ourselves might be experiencing onto the objects around us. The literary critic Suzanne Nalbantian describes this as the creation of “aesthetic objects”, a “mythopoetic” process by which material objects in the external world “change their status from real to ‘aesthetic’ objects” and begin to function as “anchors or receptacles for subjectivity” (Nalbantien 54).Nalbantian uses examples such as Proust’s madeleine or Woolf’s lighthouse to illustrate the ways in which authors of autobiographical fiction invest the objects around them with a particular psychic value or feeling-tone.For me, this might be a tree, or a fallen leaf on the path. For you, Evija, it could be the horizon, or an open field or a vague object, half-perceived in the distance. E: So there’s a kind of equivalence between what we’re feeling and what we’re noticing? S: Yes. And it works the other way around too. What we’re noticing affects our feelings and thoughts. And perhaps it’s really about finding and knowing what works best for us—the landscape that is the best fit for how we want to feel… E: Or how we want to think. Or write. S: That’s it. Of course, metaphor is another way of describing this process. When we create a metaphor, we bring together a feeling or memory inside us with an object in the outside world. The feeling that we carry within us right now finds perfect form in the shape of this particular hillside. A thought is this pebble. A memory is that cloud…E: That’s the method of loci, which Mia Keinänen also refers to (600) in her article about the walking-thinking Norwegian academics. By projecting one’s learnt knowledge onto a physical landscape, one is able to better navigate ideas.S: Although I can’t help thinking that’s all a little cerebral. For me, the process is more immediate and felt. But I’m sure we’re talking about something very similar...E: Well, the anthropologist Tim Ingold, who has written a great deal on walking, in his article “Ways of Mind-Walking: Reading, Writing, Painting” urges us to rethink what imagination might be and the ways that it might relate to the physical environment, our movement through it, and our vision. He quotes James Elkins’s suggestion (in Ingold 15-16) that true “seeing” involves workings of both the eye and the mind in bringing forth images. But Ingold questions the very notion of imagination as a place inhabited by images. From derelict houses, barren fields and crossroads, to trees, stray dogs, and other people, the images we see around us do not represent “the forms of things in the world” (Ingold 16). Instead, they are gateways and “place-holders” for the truer essence of things they seem to represent (16). S: There’s that idea of the thing acting as a gateway or portal again… E: Yes, images—like the ruins of that windmill over there—do not “stand for things” but help us experientially “find” those things (Ingold16). This is one of the purposes of art, which, instead of giving us representations of things in the world, offers us something which is like the things in the world (16)—i.e., experiences.But as we walk, and notice the objects around us, are there specific qualities about the objects themselves that make this process—what you call “projection”—more or less difficult for us?A drawing by Latvian artist Māris Subačs (2016). The text on the image says: “Clouds slowly moving.” Publicity image for Subačs’s exhibition “Baltā Istaba” (The White Room), taken from Latvijas Sabiedriskie Mediji, https://www.lsm.lv/. S: Well, let’s circle back now—on the road and on the page. We’ve talked about the way that you need wide, open spaces, whereas I find myself responding to a range of different environments in different ways. How do you feel now, as we pause here and begin to retrace our steps? E: How do I feel? I’m not sure. Right now, I’m thinking about the way that I respond to art. For example, I would say that life-like images of physical objects in this world (e.g., a realistic painting of a vase with flowers) are harder to perceive with my mind's eye than, let’s say, of an abstract painting. I don’t want to be too tied to the surface details and physicality of the world. What I see in a picture is not the representation of the vase and flowers; what I see are forms that the “inner life force”, to use Ingold’s term, has taken to express itself through (vaseness, flowerness). The more abstract the image, the more of the symbolic or the imaginary it can contain. (Consider the traditional Aboriginal art, as Ingold invites, or the line drawings of Latvian artist Māris Subačs, as I suggest, depicted above.) Things we can observe in this world, says Ingold, are but “outward, sensible forms” that “give shape to the inner generative impulse that is life itself” (17). (This comes from the underlying belief that the phenomenal world itself is all “figmented” (Ingold 17, referring to literary scholar Mary Carruthers).)S: And, interestingly, I don’t recognise this at all! My experiencing of the objects around me feels very different. That tree, this pine cone in my hand, the solidity of this physical form is very helpful in crystallising something that I’m feeling. I enjoy looking at abstract paintings too. I can imagine myself into them. But the thing-ness of things is also deeply satisfying, especially if I can also touch, taste, smell, hold the thing itself. The poet Selima Hill goes for a walk in order to gather objects in a Tupperware box: “a dead butterfly, a yellow pebble, a scrap of blue paper, an empty condom packet.” Later she places an object from these “Tupperware treasures” on her writing desk and uses it “to focus on the kernel of the poem”, concentrating on it “to select the fragments and images she needs” (Taylor). This resonates with me.E: So, to summarise, walking seems to have something to do with seeing, for both of us. S: Yes, and not just seeing but also feeling and experiencing, with all of our senses. E: OK. And walking like appreciating art or writing or reading, has the capacity to take us beyond what shows at surface level, and so a step closer to the “truer” expression of life, to paraphrase Ingold. S: Yes, and the expression that Ingold calls more “true” is what Kristeva would say is the semiotic, the other-than-meaning, the felt and bodily, always bubbling beneath the surface. E: True, true. And although Ingold here doesn’t say how walking facilitates this kind of seeing and experiencing, perhaps we can make some suggestions here.You focused on the rhythm of walking and thinking/writing earlier. But I’m equally intrigued by the effects of speed. S: That resonates for me too. I need to be able to slow down and really experience the world around me. E: Well, did you know that there are scientific studies that suggest a correlation between the speed of walking and the speed of thinking (Jabr; Oppezzo and Schwartz)? The pace of walking, as the movement of our bodies through space, sets a particular temporal relationship with the objects we move past. In turn, this affects our “thinking time”, and our thinking about abstract ideas (Cuelenaere 127, referring to George Lakoff and Mark Johnson’s ideas).S: That makes sense to me. I noticed that when we were walking through the woods, we had slowed right down and then, as we reached the open road, you seemed to want to go much faster than me…E: Yes, at a steady pace. That’s perhaps not surprising. Because it seems that the speed of our walking is intimately connected with our vision. So if I’m moving through a landscape in which I’m fully immersed, I’m unable to take in everything around me. I choose to rest my eyes on a few select points of interest. S: Or on the horizon…E: Yes. The path that leads through an open field allows me to rest my eyes on the distant horizon. I register the patterns of fields and houses; and perhaps I catch sight of the trees in my peripheral vision. The detailed imagery, if any, gets reduced to geometrical figures and lines.The challenge is to find the right balance between the stimuli provided by the external world and the speed of movement through it.S: So the pace of walking can enable us to see things in a certain way. For you, this is moving quickly, seeing things vaguely, fragmentally and selectively. For me, it’s an opportunity to take my time, find my own rhythm, to slow down and weigh a thought or a thing. I think I’m probably the kind of walker who stops to pick up sticks and shells, and curious stones. I love the rhythm of moving but it isn’t necessarily fast movement. Perhaps you’re a speed walker and I’m a rambler? E: I think both the pace and the rhythm are of equal importance. The movement can be so monotonous that it becomes a meditative process, in which I lose myself. Then, what matters is no longer the destination but the journey itself. It’s like...S: Evija! Stop for a moment! Over here! Look at this! E: You know, that actually broke my train of thought. S: I’m sorry… I couldn’t resist. But Evija, we’ve arrived at the entrance to the woods again. E: And the light’s fading… I should get back to the office.S: Yes, but this time, we can choose which way to go: through the trees and into the half-dark of my creative subconscious or across the wide, open spaces of your imagination. E: And will we walk slowly—or at speed? There’s still so much to say. There are other landscapes and pathways—and pages—that we haven’t even explored yet.S: But I don’t want to stop. I want to keep walking with you.E: Indeed, Sophie, writing is a walk that never ends. ReferencesAnderson, Jon. “Talking whilst Walking: A Geographical Archaeology of Knowledge.” Area 36.3 (2004): 254-261. Csikszentmihalyi, Mihalyi. Flow and the Psychology of Discovery and Invention. NewYork: Harper Perennial, 1997.Cuelenaere, Laurence. “Aymara Forms of Walking: A Linguistic Anthropological Reflection on the Relation between Language and Motion.” Language Sciences 33.1 (2011):126-137. Elbow, Peter. Writing without Teachers. 2nd ed. Oxford: Oxford UP, 1998. Gros, Frédéric. The Philosophy of Walking. London: Verso, 2014.Ingold, Tim. Being Alive: Essays on Movement, Knowledge and Description. Abingdon: Routledge, 2011.———. “Culture on the Ground: The World Perceived through the Feet.” Journal of Material Culture 9.3 (2004): 315-340.———. Lines: A Brief History. Abingdon: Routledge, 2007.———. “Ways of Mind-Walking: Reading, Writing, Painting.” Visual Studies 25.1 (2010):15-23.Ingold, Tim, and J.L. Vergunst, eds. Ways of Walking: Ethnography and Practice on Foot. London: Ashgate, 2008.Jabr, Ferris. “Why Walking Helps Us Think.” The New Yorker, 3 Sep. 2014. 10 Aug. 2018 <https://www.newyorker.com/tech/elements/walking-helps-us-think>.Keinänen, Mia. “Taking Your Mind for a Walk: A Qualitative Investigation of Walking and Thinking among Nine Norwegian Academics.” Higher Education 71.4 (2016): 593-605. Klee, Paul. Notebooks, Volume 1: The Thinking Eye. Ed. J. Spiller. Trans. R. Manheim. London: Lund Humphries, 1961. Klein, Richard. Cigarettes Are Sublime. London: Picador, 1995. Kristeva, Julia. Revolution in Poetic Language. Trans. Leon S. Roudiez. New York: Columbia UP, 1984.Laing, Olivia. The Trip to Echo Spring: Why Writers Drink. Edinburgh: Canongate 2013.Macrorie, Ken. Telling Writing. Rochelle Park, N.J.: Hayden Book Company, 1976.Maitland, Sarah. Gossip from the Forest: The Tangled Roots of Our Forests and Fairy-Tales. Berkeley, CA: Counterpoint, 2012. Milner, Marion (as Joanna Field). A Life of One’s Own. 1934. London: Virago, 1986.Nalbantien, Suzanne. Aesthetic Autobiography. London: Macmillan, 1994.Oppezzo, Marily, and Daniel L. Schwartz. “Give Your Ideas Some Legs: The Positive Effect of Walking on Creative Thinking.” Journal of Experimental Psychology: Learning, Memory, and Cognition 40.4 (2014): 1142-1152.Richardson, Laurel. “Writing: A Method of Inquiry.” Handbook of Qualitative Research. 2nd ed. Ed. N.K. Denzin and Y.S. Lincoln. Thousand Oaks, CA: Sage Publications, 2007. 923-948. Sturm, Sean. “Terra (In)cognita: Mapping Academic Writing.” TEXT 16.2 (2012).Taylor, Debbie. “The Selima Hill Method.” Mslexia 6 (Summer/Autumn 2000). Tharp, Twyla. The Creative Habit: Learn It and Use It for Life. New York: Simon Schuster, 2003.Trofimova, Evija. “Academics Go Walking, Talking, Writing*.” Writing, Writing Everywhere, 8 Dec. 2017. 1 Oct. 2018 <http://www.writing.auckland.ac.nz/2017/12/08/academics-go-walking-talking-writing>.
APA, Harvard, Vancouver, ISO, and other styles
42

Deer, Patrick, and Toby Miller. "A Day That Will Live In … ?" M/C Journal 5, no. 1 (March 1, 2002). http://dx.doi.org/10.5204/mcj.1938.

Full text
Abstract:
By the time you read this, it will be wrong. Things seemed to be moving so fast in these first days after airplanes crashed into the World Trade Center, the Pentagon, and the Pennsylvania earth. Each certainty is as carelessly dropped as it was once carelessly assumed. The sounds of lower Manhattan that used to serve as white noise for residents—sirens, screeches, screams—are no longer signs without a referent. Instead, they make folks stare and stop, hurry and hustle, wondering whether the noises we know so well are in fact, this time, coefficients of a new reality. At the time of writing, the events themselves are also signs without referents—there has been no direct claim of responsibility, and little proof offered by accusers since the 11th. But it has been assumed that there is a link to US foreign policy, its military and economic presence in the Arab world, and opposition to it that seeks revenge. In the intervening weeks the US media and the war planners have supplied their own narrow frameworks, making New York’s “ground zero” into the starting point for a new escalation of global violence. We want to write here about the combination of sources and sensations that came that day, and the jumble of knowledges and emotions that filled our minds. Working late the night before, Toby was awoken in the morning by one of the planes right overhead. That happens sometimes. I have long expected a crash when I’ve heard the roar of jet engines so close—but I didn’t this time. Often when that sound hits me, I get up and go for a run down by the water, just near Wall Street. Something kept me back that day. Instead, I headed for my laptop. Because I cannot rely on local media to tell me very much about the role of the US in world affairs, I was reading the British newspaper The Guardian on-line when it flashed a two-line report about the planes. I looked up at the calendar above my desk to see whether it was April 1st. Truly. Then I got off-line and turned on the TV to watch CNN. That second, the phone rang. My quasi-ex-girlfriend I’m still in love with called from the mid-West. She was due to leave that day for the Bay Area. Was I alright? We spoke for a bit. She said my cell phone was out, and indeed it was for the remainder of the day. As I hung up from her, my friend Ana rang, tearful and concerned. Her husband, Patrick, had left an hour before for work in New Jersey, and it seemed like a dangerous separation. All separations were potentially fatal that day. You wanted to know where everyone was, every minute. She told me she had been trying to contact Palestinian friends who worked and attended school near the event—their ethnic, religious, and national backgrounds made for real poignancy, as we both thought of the prejudice they would (probably) face, regardless of the eventual who/what/when/where/how of these events. We agreed to meet at Bruno’s, a bakery on La Guardia Place. For some reason I really took my time, though, before getting to Ana. I shampooed and shaved under the shower. This was a horror, and I needed to look my best, even as men and women were losing and risking their lives. I can only interpret what I did as an attempt to impose normalcy and control on the situation, on my environment. When I finally made it down there, she’d located our friends. They were safe. We stood in the street and watched the Towers. Horrified by the sight of human beings tumbling to their deaths, we turned to buy a tea/coffee—again some ludicrous normalization—but were drawn back by chilling screams from the street. Racing outside, we saw the second Tower collapse, and clutched at each other. People were streaming towards us from further downtown. We decided to be with our Palestinian friends in their apartment. When we arrived, we learnt that Mark had been four minutes away from the WTC when the first plane hit. I tried to call my daughter in London and my father in Canberra, but to no avail. I rang the mid-West, and asked my maybe-former novia to call England and Australia to report in on me. Our friend Jenine got through to relatives on the West Bank. Israeli tanks had commenced a bombardment there, right after the planes had struck New York. Family members spoke to her from under the kitchen table, where they were taking refuge from the shelling of their house. Then we gave ourselves over to television, like so many others around the world, even though these events were happening only a mile away. We wanted to hear official word, but there was just a huge absence—Bush was busy learning to read in Florida, then leading from the front in Louisiana and Nebraska. As the day wore on, we split up and regrouped, meeting folks. One guy was in the subway when smoke filled the car. Noone could breathe properly, people were screaming, and his only thought was for his dog DeNiro back in Brooklyn. From the panic of the train, he managed to call his mom on a cell to ask her to feed “DeNiro” that night, because it looked like he wouldn’t get home. A pregnant woman feared for her unborn as she fled the blasts, pushing the stroller with her baby in it as she did so. Away from these heart-rending tales from strangers, there was the fear: good grief, what horrible price would the US Government extract for this, and who would be the overt and covert agents and targets of that suffering? What blood-lust would this generate? What would be the pattern of retaliation and counter-retaliation? What would become of civil rights and cultural inclusiveness? So a jumble of emotions came forward, I assume in all of us. Anger was not there for me, just intense sorrow, shock, and fear, and the desire for intimacy. Network television appeared to offer me that, but in an ultimately unsatisfactory way. For I think I saw the end-result of reality TV that day. I have since decided to call this ‘emotionalization’—network TV’s tendency to substitute analysis of US politics and economics with a stress on feelings. Of course, powerful emotions have been engaged by this horror, and there is value in addressing that fact and letting out the pain. I certainly needed to do so. But on that day and subsequent ones, I looked to the networks, traditional sources of current-affairs knowledge, for just that—informed, multi-perspectival journalism that would allow me to make sense of my feelings, and come to a just and reasoned decision about how the US should respond. I waited in vain. No such commentary came forward. Just a lot of asinine inquiries from reporters that were identical to those they pose to basketballers after a game: Question—‘How do you feel now?’ Answer—‘God was with me today.’ For the networks were insistent on asking everyone in sight how they felt about the end of las torres gemelas. In this case, we heard the feelings of survivors, firefighters, viewers, media mavens, Republican and Democrat hacks, and vacuous Beltway state-of-the-nation pundits. But learning of the military-political economy, global inequality, and ideologies and organizations that made for our grief and loss—for that, there was no space. TV had forgotten how to do it. My principal feeling soon became one of frustration. So I headed back to where I began the day—The Guardian web site, where I was given insightful analysis of the messy factors of history, religion, economics, and politics that had created this situation. As I dealt with the tragedy of folks whose lives had been so cruelly lost, I pondered what it would take for this to stop. Or whether this was just the beginning. I knew one thing—the answers wouldn’t come from mainstream US television, no matter how full of feelings it was. And that made Toby anxious. And afraid. He still is. And so the dreams come. In one, I am suddenly furloughed from my job with an orchestra, as audience numbers tumble. I make my evening-wear way to my locker along with the other players, emptying it of bubble gum and instrument. The next night, I see a gigantic, fifty-feet high wave heading for the city beach where I’ve come to swim. Somehow I am sheltered behind a huge wall, as all the people around me die. Dripping, I turn to find myself in a media-stereotype “crack house” of the early ’90s—desperate-looking black men, endless doorways, sudden police arrival, and my earnest search for a passport that will explain away my presence. I awake in horror, to the realization that the passport was already open and stamped—racialization at work for Toby, every day and in every way, as a white man in New York City. Ana’s husband, Patrick, was at work ten miles from Manhattan when “it” happened. In the hallway, I overheard some talk about two planes crashing, but went to teach anyway in my usual morning stupor. This was just the usual chatter of disaster junkies. I didn’t hear the words, “World Trade Center” until ten thirty, at the end of the class at the college I teach at in New Jersey, across the Hudson river. A friend and colleague walked in and told me the news of the attack, to which I replied “You must be fucking joking.” He was a little offended. Students were milling haphazardly on the campus in the late summer weather, some looking panicked like me. My first thought was of some general failure of the air-traffic control system. There must be planes falling out of the sky all over the country. Then the height of the towers: how far towards our apartment in Greenwich Village would the towers fall? Neither of us worked in the financial district a mile downtown, but was Ana safe? Where on the college campus could I see what was happening? I recognized the same physical sensation I had felt the morning after Hurricane Andrew in Miami seeing at a distance the wreckage of our shattered apartment across a suburban golf course strewn with debris and flattened power lines. Now I was trapped in the suburbs again at an unbridgeable distance from my wife and friends who were witnessing the attacks first hand. Were they safe? What on earth was going on? This feeling of being cut off, my path to the familiar places of home blocked, remained for weeks my dominant experience of the disaster. In my office, phone calls to the city didn’t work. There were six voice-mail messages from my teenaged brother Alex in small-town England giving a running commentary on the attack and its aftermath that he was witnessing live on television while I dutifully taught my writing class. “Hello, Patrick, where are you? Oh my god, another plane just hit the towers. Where are you?” The web was choked: no access to newspapers online. Email worked, but no one was wasting time writing. My office window looked out over a soccer field to the still woodlands of western New Jersey: behind me to the east the disaster must be unfolding. Finally I found a website with a live stream from ABC television, which I watched flickering and stilted on the tiny screen. It had all already happened: both towers already collapsed, the Pentagon attacked, another plane shot down over Pennsylvania, unconfirmed reports said, there were other hijacked aircraft still out there unaccounted for. Manhattan was sealed off. George Washington Bridge, Lincoln and Holland tunnels, all the bridges and tunnels from New Jersey I used to mock shut down. Police actions sealed off the highways into “the city.” The city I liked to think of as the capital of the world was cut off completely from the outside, suddenly vulnerable and under siege. There was no way to get home. The phone rang abruptly and Alex, three thousand miles away, told me he had spoken to Ana earlier and she was safe. After a dozen tries, I managed to get through and spoke to her, learning that she and Toby had seen people jumping and then the second tower fall. Other friends had been even closer. Everyone was safe, we thought. I sat for another couple of hours in my office uselessly. The news was incoherent, stories contradictory, loops of the planes hitting the towers only just ready for recycling. The attacks were already being transformed into “the World Trade Center Disaster,” not yet the ahistorical singularity of the emergency “nine one one.” Stranded, I had to spend the night in New Jersey at my boss’s house, reminded again of the boundless generosity of Americans to relative strangers. In an effort to protect his young son from the as yet unfiltered images saturating cable and Internet, my friend’s TV set was turned off and we did our best to reassure. We listened surreptitiously to news bulletins on AM radio, hoping that the roads would open. Walking the dog with my friend’s wife and son we crossed a park on the ridge on which Upper Montclair sits. Ten miles away a huge column of smoke was rising from lower Manhattan, where the stunning absence of the towers was clearly visible. The summer evening was unnervingly still. We kicked a soccer ball around on the front lawn and a woman walked distracted by, shocked and pale up the tree-lined suburban street, suffering her own wordless trauma. I remembered that though most of my students were ordinary working people, Montclair is a well-off dormitory for the financial sector and high rises of Wall Street and Midtown. For the time being, this was a white-collar disaster. I slept a short night in my friend’s house, waking to hope I had dreamed it all, and took the commuter train in with shell-shocked bankers and corporate types. All men, all looking nervously across the river toward glimpses of the Manhattan skyline as the train neared Hoboken. “I can’t believe they’re making us go in,” one guy had repeated on the station platform. He had watched the attacks from his office in Midtown, “The whole thing.” Inside the train we all sat in silence. Up from the PATH train station on 9th street I came onto a carless 6th Avenue. At 14th street barricades now sealed off downtown from the rest of the world. I walked down the middle of the avenue to a newspaper stand; the Indian proprietor shrugged “No deliveries below 14th.” I had not realized that the closer to the disaster you came, the less information would be available. Except, I assumed, for the evidence of my senses. But at 8 am the Village was eerily still, few people about, nothing in the sky, including the twin towers. I walked to Houston Street, which was full of trucks and police vehicles. Tractor trailers sat carrying concrete barriers. Below Houston, each street into Soho was barricaded and manned by huddles of cops. I had walked effortlessly up into the “lockdown,” but this was the “frozen zone.” There was no going further south towards the towers. I walked the few blocks home, found my wife sleeping, and climbed into bed, still in my clothes from the day before. “Your heart is racing,” she said. I realized that I hadn’t known if I would get back, and now I never wanted to leave again; it was still only eight thirty am. Lying there, I felt the terrible wonder of a distant bystander for the first-hand witness. Ana’s face couldn’t tell me what she had seen. I felt I needed to know more, to see and understand. Even though I knew the effort was useless: I could never bridge that gap that had trapped me ten miles away, my back turned to the unfolding disaster. The television was useless: we don’t have cable, and the mast on top of the North Tower, which Ana had watched fall, had relayed all the network channels. I knew I had to go down and see the wreckage. Later I would realize how lucky I had been not to suffer from “disaster envy.” Unbelievably, in retrospect, I commuted into work the second day after the attack, dogged by the same unnerving sensation that I would not get back—to the wounded, humbled former center of the world. My students were uneasy, all talked out. I was a novelty, a New Yorker living in the Village a mile from the towers, but I was forty-eight hours late. Out of place in both places. I felt torn up, but not angry. Back in the city at night, people were eating and drinking with a vengeance, the air filled with acrid sicklysweet smoke from the burning wreckage. Eyes stang and nose ran with a bitter acrid taste. Who knows what we’re breathing in, we joked nervously. A friend’s wife had fallen out with him for refusing to wear a protective mask in the house. He shrugged a wordlessly reassuring smile. What could any of us do? I walked with Ana down to the top of West Broadway from where the towers had commanded the skyline over SoHo; downtown dense smoke blocked the view to the disaster. A crowd of onlookers pushed up against the barricades all day, some weeping, others gawping. A tall guy was filming the grieving faces with a video camera, which was somehow the worst thing of all, the first sign of the disaster tourism that was already mushrooming downtown. Across the street an Asian artist sat painting the street scene in streaky black and white; he had scrubbed out two white columns where the towers would have been. “That’s the first thing I’ve seen that’s made me feel any better,” Ana said. We thanked him, but he shrugged blankly, still in shock I supposed. On the Friday, the clampdown. I watched the Mayor and Police Chief hold a press conference in which they angrily told the stream of volunteers to “ground zero” that they weren’t needed. “We can handle this ourselves. We thank you. But we don’t need your help,” Commissioner Kerik said. After the free-for-all of the first couple of days, with its amazing spontaneities and common gestures of goodwill, the clampdown was going into effect. I decided to go down to Canal Street and see if it was true that no one was welcome anymore. So many paths through the city were blocked now. “Lock down, frozen zone, war zone, the site, combat zone, ground zero, state troopers, secured perimeter, national guard, humvees, family center”: a disturbing new vocabulary that seemed to stamp the logic of Giuliani’s sanitized and over-policed Manhattan onto the wounded hulk of the city. The Mayor had been magnificent in the heat of the crisis; Churchillian, many were saying—and indeed, Giuliani quickly appeared on the cover of Cigar Afficionado, complete with wing collar and the misquotation from Kipling, “Captain Courageous.” Churchill had not believed in peacetime politics either, and he never got over losing his empire. Now the regime of command and control over New York’s citizens and its economy was being stabilized and reimposed. The sealed-off, disfigured, and newly militarized spaces of the New York through which I have always loved to wander at all hours seemed to have been put beyond reach for the duration. And, in the new post-“9/11” post-history, the duration could last forever. The violence of the attacks seemed to have elicited a heavy-handed official reaction that sought to contain and constrict the best qualities of New York. I felt more anger at the clampdown than I did at the demolition of the towers. I knew this was unreasonable, but I feared the reaction, the spread of the racial harassment and racial profiling that I had already heard of from my students in New Jersey. This militarizing of the urban landscape seemed to negate the sprawling, freewheeling, boundless largesse and tolerance on which New York had complacently claimed a monopoly. For many the towers stood for that as well, not just as the monumental outposts of global finance that had been attacked. Could the American flag mean something different? For a few days, perhaps—on the helmets of firemen and construction workers. But not for long. On the Saturday, I found an unmanned barricade way east along Canal Street and rode my bike past throngs of Chinatown residents, by the Federal jail block where prisoners from the first World Trade Center bombing were still being held. I headed south and west towards Tribeca; below the barricades in the frozen zone, you could roam freely, the cops and soldiers assuming you belonged there. I felt uneasy, doubting my own motives for being there, feeling the blood drain from my head in the same numbing shock I’d felt every time I headed downtown towards the site. I looped towards Greenwich Avenue, passing an abandoned bank full of emergency supplies and boxes of protective masks. Crushed cars still smeared with pulverized concrete and encrusted with paperwork strewn by the blast sat on the street near the disabled telephone exchange. On one side of the avenue stood a horde of onlookers, on the other television crews, all looking two blocks south towards a colossal pile of twisted and smoking steel, seven stories high. We were told to stay off the street by long-suffering national guardsmen and women with southern accents, kids. Nothing happening, just the aftermath. The TV crews were interviewing worn-out, dust-covered volunteers and firemen who sat quietly leaning against the railings of a park filled with scraps of paper. Out on the West Side highway, a high-tech truck was offering free cellular phone calls. The six lanes by the river were full of construction machinery and military vehicles. Ambulances rolled slowly uptown, bodies inside? I locked my bike redundantly to a lamppost and crossed under the hostile gaze of plainclothes police to another media encampment. On the path by the river, two camera crews were complaining bitterly in the heat. “After five days of this I’ve had enough.” They weren’t talking about the trauma, bodies, or the wreckage, but censorship. “Any blue light special gets to roll right down there, but they see your press pass and it’s get outta here. I’ve had enough.” I fronted out the surly cops and ducked under the tape onto the path, walking onto a Pier on which we’d spent many lazy afternoons watching the river at sunset. Dust everywhere, police boats docked and waiting, a crane ominously dredging mud into a barge. I walked back past the camera operators onto the highway and walked up to an interview in process. Perfectly composed, a fire chief and his crew from some small town in upstate New York were politely declining to give details about what they’d seen at “ground zero.” The men’s faces were dust streaked, their eyes slightly dazed with the shock of a horror previously unimaginable to most Americans. They were here to help the best they could, now they’d done as much as anyone could. “It’s time for us to go home.” The chief was eloquent, almost rehearsed in his precision. It was like a Magnum press photo. But he was refusing to cooperate with the media’s obsessive emotionalism. I walked down the highway, joining construction workers, volunteers, police, and firemen in their hundreds at Chambers Street. No one paid me any attention; it was absurd. I joined several other watchers on the stairs by Stuyvesant High School, which was now the headquarters for the recovery crews. Just two or three blocks away, the huge jagged teeth of the towers’ beautiful tracery lurched out onto the highway above huge mounds of debris. The TV images of the shattered scene made sense as I placed them into what was left of a familiar Sunday afternoon geography of bike rides and walks by the river, picnics in the park lying on the grass and gazing up at the infinite solidity of the towers. Demolished. It was breathtaking. If “they” could do that, they could do anything. Across the street at tables military policeman were checking credentials of the milling volunteers and issuing the pink and orange tags that gave access to ground zero. Without warning, there was a sudden stampede running full pelt up from the disaster site, men and women in fatigues, burly construction workers, firemen in bunker gear. I ran a few yards then stopped. Other people milled around idly, ignoring the panic, smoking and talking in low voices. It was a mainly white, blue-collar scene. All these men wearing flags and carrying crowbars and flashlights. In their company, the intolerance and rage I associated with flags and construction sites was nowhere to be seen. They were dealing with a torn and twisted otherness that dwarfed machismo or bigotry. I talked to a moustachioed, pony-tailed construction worker who’d hitched a ride from the mid-west to “come and help out.” He was staying at the Y, he said, it was kind of rough. “Have you been down there?” he asked, pointing towards the wreckage. “You’re British, you weren’t in World War Two were you?” I replied in the negative. “It’s worse ’n that. I went down last night and you can’t imagine it. You don’t want to see it if you don’t have to.” Did I know any welcoming ladies? he asked. The Y was kind of tough. When I saw TV images of President Bush speaking to the recovery crews and steelworkers at “ground zero” a couple of days later, shouting through a bullhorn to chants of “USA, USA” I knew nothing had changed. New York’s suffering was subject to a second hijacking by the brokers of national unity. New York had never been America, and now its terrible human loss and its great humanity were redesignated in the name of the nation, of the coming war. The signs without a referent were being forcibly appropriated, locked into an impoverished patriotic framework, interpreted for “us” by a compliant media and an opportunistic regime eager to reign in civil liberties, to unloose its war machine and tighten its grip on the Muslim world. That day, drawn to the river again, I had watched F18 fighter jets flying patterns over Manhattan as Bush’s helicopters came in across the river. Otherwise empty of air traffic, “our” skies were being torn up by the military jets: it was somehow the worst sight yet, worse than the wreckage or the bands of disaster tourists on Canal Street, a sign of further violence yet to come. There was a carrier out there beyond New York harbor, there to protect us: the bruising, blustering city once open to all comers. That felt worst of all. In the intervening weeks, we have seen other, more unstable ways of interpreting the signs of September 11 and its aftermath. Many have circulated on the Internet, past the blockages and blockades placed on urban spaces and intellectual life. Karl-Heinz Stockhausen’s work was banished (at least temporarily) from the canon of avant-garde electronic music when he described the attack on las torres gemelas as akin to a work of art. If Jacques Derrida had described it as an act of deconstruction (turning technological modernity literally in on itself), or Jean Baudrillard had announced that the event was so thick with mediation it had not truly taken place, something similar would have happened to them (and still may). This is because, as Don DeLillo so eloquently put it in implicit reaction to the plaintive cry “Why do they hate us?”: “it is the power of American culture to penetrate every wall, home, life and mind”—whether via military action or cultural iconography. All these positions are correct, however grisly and annoying they may be. What GK Chesterton called the “flints and tiles” of nineteenth-century European urban existence were rent asunder like so many victims of high-altitude US bombing raids. As a First-World disaster, it became knowable as the first-ever US “ground zero” such precisely through the high premium immediately set on the lives of Manhattan residents and the rarefied discussion of how to commemorate the high-altitude towers. When, a few weeks later, an American Airlines plane crashed on take-off from Queens, that borough was left open to all comers. Manhattan was locked down, flown over by “friendly” bombers. In stark contrast to the open if desperate faces on the street of 11 September, people went about their business with heads bowed even lower than is customary. Contradictory deconstructions and valuations of Manhattan lives mean that September 11 will live in infamy and hyper-knowability. The vengeful United States government and population continue on their way. Local residents must ponder insurance claims, real-estate values, children’s terrors, and their own roles in something beyond their ken. New York had been forced beyond being the center of the financial world. It had become a military target, a place that was receiving as well as dispatching the slings and arrows of global fortune. Citation reference for this article MLA Style Deer, Patrick and Miller, Toby. "A Day That Will Live In … ?" M/C: A Journal of Media and Culture 5.1 (2002). [your date of access] < http://www.media-culture.org.au/0203/adaythat.php>. Chicago Style Deer, Patrick and Miller, Toby, "A Day That Will Live In … ?" M/C: A Journal of Media and Culture 5, no. 1 (2002), < http://www.media-culture.org.au/0203/adaythat.php> ([your date of access]). APA Style Deer, Patrick and Miller, Toby. (2002) A Day That Will Live In … ?. M/C: A Journal of Media and Culture 5(1). < http://www.media-culture.org.au/0203/adaythat.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
43

Rayman, Jennifer. "The Politics and Practice of Voice: Representing American Sign Language on the Screen in Two Recent Television Crime Dramas." M/C Journal 13, no. 3 (June 30, 2010). http://dx.doi.org/10.5204/mcj.273.

Full text
Abstract:
Introduction In this paper, I examine the practices of representing Deaf ‘voices’’ to hearing audiences in two recent US television crime dramas. More literally I look at how American Sign Language is framed and made visible on the screen through various production decisions. Drawing examples from an episode of CSI: New York that aired in December 2006 and an episode of Law and Order: Criminal Intent that aired in April 2007, I examine how the practices of filming Deaf people and the use of American Sign Language intersect with the production of a Deaf ‘voice’ on the screen. The problem of representing a Deaf ‘voice’ on the screen is akin to the problem of representing other minority languages. Film and television producers in the United States have to make choices about whether the majority audience of English speakers will have access to the minority language or not. In the face of this dilemma media producers have taken several approaches: subtitling foreign speech, translating foreign speech through other characters, or leaving the language inaccessible except to those who use it. The additional difficulty with representing national sign languages is that both the language and the recording medium are visual. Sometimes, filmmakers make the choice of leaving some portions of the signed dialogue inaccessible to a non-signing hearing audience. On the one hand this choice could indicate a devaluing of the signed communication, as its specific content is considered irrelevant to the plot. On the other hand it could indicate that Deaf people have a right to be visible on television using their own language without accommodating hearing people. A number of choices made in the filming and editing can subtly undermine positive representations of Deaf ‘voices’ particularly to a Deaf audience. These choices often construct an image of sign languages as objectified, exoticised, disjointed, incomplete, or a code for spoken language. Simple choices such as using simultaneous speaking and signing by Deaf characters, cropping the scene, translating or not translating the dialogue have powerful implications for the ways that Deaf ‘voices’ are becoming more visible in the 21st century. Typical filming and editing conventions effectively silence the Deaf ‘voice.’ Over 20 years ago, in the comprehensive book, Hollywood Speaks: Deafness and the Film Entertainment Industry (1988), Schuchman’s complaint that the filming and editing techniques of the day often did not attend to preserving the visibility and comprehensibility of sign language eon the screen, still applies today. As editing techniques have evolved over the years, fr om reliance on wide and medium shots to frequent intercutting of close-ups, the tendency to cut sign language off the screen, and out of the comprehensible view of the audience, may have even increased. Recent Portrayals of Deaf People on Television During one television season in the United States between August 2006 and April 2007, 30 episodes of six different serial television programs portrayed signing Deaf characters. Three of these programs had on-going Deaf characters that appeared in a number of episodes throughout the season, while three other programs portrayed Deaf people in a one-off episode with a Deaf theme. Initial air date for the season Program and Season # of Episodes 1 14 Aug. 2006 Weeds, Season 2 5 2 20 Sep. 2006 Jericho, Season 1 13 3 28 Jan. 2007 The L Word, Season 4 9 Table 1. Dramas with Ongoing Deaf Characters during the 2006-2007 USA Television Season Initial air date Program, Season, Episode Episode Title 1 13 Dec. 2006 CSI: New York, Season 3, Episode 12 “Silent Night” 2 3 Apr. 2007 Law and Order: Criminal Intent, Season 6, Episode 18 "Silencer" 3 12 Apr. 2007 Scrubs, Season 6, Episode 16 “My Words of Wisdom” Table 2. One-off Episodes with Signing Deaf Characters during the 2006-2007 USA Television Seasons Ironically, although the shows with ongoing characters sometimes allow the Deafness of the character to be incidental to the character, it is only the one-off crime dramas that show Deaf people relating with one another as members of a vibrant community and culture based in sign language. Often, in the ongoing series, the characters remain isolated from the Deaf community and their interactions with other Deaf people are sparse or non-existent. For example, out of the 27 episodes with an ongoing Deaf character only two episodes of The L-Word have more than one Deaf character portrayed. In both Weeds and The L-Word the Deaf character is the love interest of one of the hearing characters, while in Jericho, the Deaf character is the sister of one of the main hearing characters. In these episodes though some of realities about Deaf people’s lives are touched on as they relate to the hearing characters, the reality of signing Deaf people’s social lives in the Deaf community is left absent and they are depicted primarily interacting with hearing people. The two episodes, from CSI: New York, and Law and Order: Criminal Intent, focus on the controversial theme of cochlear implants in the Deaf community. Though it is true that generally the signing Deaf community in the U.S.A. sees cochlear implants as a threat to their community, there is no record of this controversy ever motivating violent criminal acts or murder as portrayed in these episodes. In the episode of CSI: New York entitled “Silent Night” a conflict between a young Deaf man and Deaf woman who were formerly romantically involved is portrayed. The murdered young woman who comes from a Deaf family does not want her Deaf baby to have a cochlear implant while the killer ex-boyfriend who has a cochlear implant believes that it is the best option for his child. The woman’s Deaf parents are involved in the investigation. The episode of Law and Order: Criminal Intent, entitled “Silencer,” is also ultimately about a conflict between a Deaf man and a Deaf woman over cochlear implants. In the end, it is revealed that the Deaf woman is exploring the possibility of a cochlear implant. Her boyfriend projecting the past hurt of his hearing sister leaving him behind to go off and live her own life, doesn’t want his girlfriend to leave him once she gains more hearing. So he shoots the cochlear implant surgeon in the hand to prevent him from being able to perform the surgery. Then he accidentally kills him by crushing his voice box to prevent him from screaming. Analyzing Two Crime Dramas In both television dramas, the filmmakers use both sound and video editing techniques to mark the experiential difference between hearing and Deaf characters. In comparing the two dramas two techniques are evident : muting/distorting sounds and extreme close-ups on lips talking or hands signing. Though these techniques may heighten awareness of deaf experience to a non-signing audience they also point to a disabling stereotyping of the experience of being Deaf as lacking — framing their experience as hearing loss rather than Deaf gain (Bauman & Murray; Shakespeare 199). By objectifying sign language through extreme close ups American Sign Language is portrayed as something strange and unusual that separates Deaf signers from hearing speakers. The auditory silences can either jolt the hearing non-signer into awareness of the sensory aspect of sound that is missing or it can jolt them into awareness of the visual world that they often don’t really see. In the opening few scenes of the episodes both CSI: New York and Law and Order: Criminal Intent use sound editing alternately muting or distorting sounds as they cut between a ‘deaf’ auditory perspective and a ‘hearing’ perspective on the action as it unfolds. Even though the sound editing does play a part in the portrayal of Deaf people’s experience as lacking sound, the more important aspects of film production to attend to are the visual aspects where Deaf people are seen authentically signing in their own language. Scene Analysis Methodology In taking a closer look at a scene from each episode we can see exactly how the filming and editing techniques work to create an image of sign language. I have chosen comparable scenes where a Deaf individual is interviewed or interrogated by the police using a sign language interpreter. In each scene it can be assumed that all the communication is happening in both English and ASL through an interpreter, so at all times some signing should be occurring. In transcribing the scenes, I noted each point when the editor spliced different camera shots adjacent to each other. Because of the different visual aesthetics in each program where one relied heavily on continuous panning shots, I also noted where the camera shifted focus from one character to another marking the duration of screen time for each character. This allowed for a better comparison between the two programs. In my transcripts, I included both glosses of the ASL signs visible on the screen as well as the flow of the spoken English on the audio track. This enabled me to count how many separate shifts in character screen time segments contained signing and how much of these contained completely visible signing in medium shots. CSI:NY Witness Interview Scene In the first signing scene, Gina (played by Marlee Matlin) is brought in for an interview with Detective Taylor and a uniformed officer interpreter. The scene opens with a medium shot on Detective Taylor as he asks her, “What do you think woke you up?” The shot cuts to an extreme close up of her face and hands and pans to only the hands as she signs FOOTSTEPS. Then the scene shifts to an over the shoulder medium shot of the interpreter where we can still see her signing VIBRATIONS and it cuts to a close up of her face as she signs ALISON NOISE. Though these signs are cropped, they are still decipherable as they happen near the face. Throughout this sequence the interpreter voices “Footsteps, I felt vibrations. I thought maybe it was Alison.” Next we have a close-up on Detective Taylor’s face as he asks her why her family moved and whether she had family in the area. During his question the camera shifts to a close up reaction of Gina listening and then back to a close up on Taylor’s face, and then to a medium shot of the interpreter translating the last part of the question. Next, while Gina responds the camera quickly cuts from a medium shot to a close-up side view of the hands to a close-up bird’s eye view of the hands to a close up of Gina’s face with most of the signs outside of the frame. See the transcript below: [medium shot] NOT PLAN HAVE MORE CHILDREN,[close-up side view of hands] PREGNANT,[close-up from bird’s eye view] DECIDE RAISE ELIZABETH[close-up Gina’s face signs out of frame] SAFE While this sequence plays out the interpreter voices, “My husband and I weren’t planning on having any more children. When I got pregnant my husband and I decided to raise Elizabeth outside of the city where it’s safe.” The kind of quick cuts between close-ups, medium shots and reaction shots of other characters sets the visual aesthetic for this episode of CSI: NY. In this particular clip, the camera shifts shot angles no less than 50 times in the space of one minute and 34 seconds. Yet there are only 12 conversational turns back and forth between the two characters. This makes for a number of intercut reaction shots, interpreter shots as well as close-ups and other angles on the same character. If only counting shifts in screen time on a particular character, there are still 37 shifts in focus between different characters during the scene. Out of the 22 shots that contain some element of signing — we only see a medium shot with all of the signing space visible 4 times for approximately 2 seconds each. Even though signing is occurring during every communication via the interpreter or Gina, less than half of the shots contain signs and 18 of these are close ups from various angles. The close ups in this clip varied from close-ups on the face, which cut out part of the signs, to close ups on the hands caught in different perspectives from a front, side, top or even table top reflected upside-down view. Some of the other shots were over the back shoulder of Gina catching a rear view of the signs as the camera is aimed in a medium shot of the detective and interpreter. The overall result from a signing perspective is a disjointed jumble of signs leaving the impression of chaos and heightened emotion. In some ways this can be seen as an exoticisation of the signs making them look surreal, drawing attention to the body parts displaying the signs and objectifying them. Such objectification may seem harmless to a non-signing hearing audience or media producer as a mere materializing of the felt amazement at signed communication moving at such a pace. But if we were to propose a hypothetical parallel situation where a Korean character is speaking in her native tongue and we are shown extreme close ups and quick cuts jumping from an image of the lips moving to the tongue tapping the teeth to a side close up of the mouth to an overhead image from the top of the head – this type of portrayal would immediately be felt to be a de-humanization of Korean people and likely labeled racist. In the case of sign language, is it merely thought of as visual artistry? Law & Order: Suspect Interrogation Scene Law & Order: Criminal Intent has a different film aesthetic. The scene selected is an interview with a potential suspect in the murder of a cochlear implant surgeon. The Deaf man, Larry is an activist and playwright. He is sitting at a table with his lawyer across from the male detective, Goren, and the interpreter with the female detective, Eames, standing to the side. Unlike the CSI: NY scene there are no quick cuts between shots. Instead the camera takes longer shots panning around the table. Even when there are cuts to slightly different angles, the camera continues to pan in the same direction as the previous shot giving the illusion that almost the entire scene is one shot. In this 45-second scene, there are only five cuts to different camera angles. However, the act of panning the camera around the room even in a continuous shot serves to break up the scene further as the camera pulls focus zooming in on different characters while it pans. For the purposes of this analysis, in addition to dividing the scene at shifts in camera angles performed through editing, I also divide the scenes at shifts in camera angles focusing on different characters. As the camera moves to focus on a different interlocutor (serving the same purpose as a shift done through editing), this brings the total shifts in camera angles to ten. At several points throughout this Law & Order: CI episode, the cinematographer uses the technique of zooming into an extreme close-up on the hands and then pulling out to see the signer. But in this particular scene all of the visible signed sequences are filmed in medium shots. While this is positive because we can actually see the whole message including hand and face, the act of panning behind the backs of seated characters while Larry is signing blocks some of his message just as much as shifting the edit to a reaction shot would do. Of the ten shots, only one shot does not contain any signing: when Detective Eames reacts to Larry’s demands and incredulously says, “A Deaf cop?” While all of the other shots contain some signing, there are only two signed interchanges that are not interrupted by some sort of body block. Ironically, both of these shots are when the hearing detective is speaking. The first is the opening shot. The camera, in a wide shot on 5 characters, opens on their reflections in the mirrored window located in the interview room. As the camera pulls back into the room, it spins around and pans across Detective Eames’ face to settle on Detective Goran. While Goran begins talking the shot widens out to include the interpreter sitting next to him and catch the signed translation. Goran says, “Larry? There’s a lot of people pointing their finger at you.” With a bit of lag time the interpreter signs: A-LOT PEOPLE THINK YOU GUILTY. Overall Comparison of the Two Scenes For both scenes there were only four segments with unobstructed medium shots of signers in the act of signing. In the case of Law & Order: CI this might be considered a good showing as there were only nine segments in the entire scene and 8 contained signing. Thus potentially yielding 50% visibility of the signs during the entire stream of the conversation (however not all signs were actually fully visible). In the case of CSI: NY, with its higher ratio of segments split by different camera shots, 22 segments contained signing, yielding a ratio of 18% visibility of signs. Though this analysis is limited to only one scene for comparison it does reveal that both episodes prioritize the spoken language stream of information over the sign language stream of information. CSI: New York Law & Order: CI Time duration of the clip 1 min 34 sec 45 sec # shifts in character conversational turns 12 times 10 times # edited camera shots to different angle 50 5 #shifts in screen time of the characters (edited or panned) 37 9 Total # screen time segments with signing 22 8 # medium shot segments with signing fully visible 4 4 # segments containing close ups of signs, cropped off signs or blocked 18 4 Table 3. Count comparison between the two scenes Filmmakers come from a hearing framework of film production where language equals sound on an audio track. Within that framework sound editing is separate from video editing and can provide continuity between disjointed visual shots. But this kind of reliance on sound to provide the linguistic continuity fails when confronted with representing American Sign Language on the screen. The sound stream of translated English words may provide continuity for the hearing audience, but if left to rely on what is available in the visual modality Deaf viewers may have to rely on closed captioning to understand the dialog even when it is portrayed in their own language. Disjointed scenes showing quick cuts between different angles on a signed dialog and flashing between reacting interlocutors leaves the signing audience with a view on a silenced protagonist. Recommendations How can media producers give voice to sign language on the screen? First there needs to be an awareness and concern amongst these same media producers that there is actually value in taking the care required to make sign language visible and accessible to the signing Deaf audience and perhaps raise more awareness among the non-signing hearing audience. It may be entirely possible to maintain a similar visual aesthetic to the programs and still make sign language visible. Hearing producers could learn from Deaf cinema and the techniques being developed there by emerging Deaf film producers (Christie, Durr, and Wilkins). In both examples used above careful planning and choreography of the filming and editing of the scenes would make this possible. With the quick cutting style of frequent close up shots found in CSI: NY, it would be necessary to reduce the number of close ups or make sure they were wide enough to include enough of the signs to maintain intelligibility as with signs that are made near the face. In addition, medium shots of the interpreter or the interpreter and the hearing speaker would have to become the norm in order to make the interpreted spoken language accessible as well. Over the shoulder shots of signers are possible as well, as long as the back of the signer does not obscure understanding of the signs. In order to avoid objectification of sign language, extreme close-ups of the hands should be avoided as it de-humanizes sign languages and reduces language to animalistic hand gestures. In addition, with adopting the visual aesthetic of panning continuous shots such as those found in Law and Order: CI, care would need to be taken not to obstruct the signs while circling behind other participants. Other possibilities remain such as adapting the visual aesthetic of 24 (another United States crime drama) where multiple shots taking place simultaneously are projected onto the screen. In this manner reaction shots and full shots of the signing can both be visible simultaneously. Aside from careful choreography, as suggested in previous work by scholars of Deaf cinema, (Schuchman, Hollywood; Jane Norman qtd. in Hartzell), hearing media producers would need to rely on excellent ASL/Deaf culture informants during all stages of the production; typically, cinematographers, directors and editors likely will not know how to make sure that signs are not obscured. Simultaneous signing and talking by Deaf and hearing characters should be avoided as this method of communication only confirms in the minds of hearing signers that sign language is merely a code for spoken language and not a language in and of itself. Instead, hearing media producers can more creatively rely on interpreters in mixed settings or subtitling when conversations occur between Deaf characters. Subtitling is already a marker for foreign language and may alert non-signing hearing audiences to the fact that sign language is a full language not merely a code for English. Using these kinds of techniques as a matter of policy when filming signing Deaf people will enable the signing voice some of the visibility that the Deaf community desires. Acknowledgements This article is based on work originally presented at the conference “Deaf Studies Today!”, April 2008, at Utah Valley State University in Orem, Utah, USA. I am grateful for feedback that I received from participants at this presentation. An earlier version of this article is published as part of the conference proceedings Deaf Studies Today! Mosaic edited by Brian K. Eldredge, Flavia Fleischer, and Douglas Stringham. References Bauman, H-Dirksen, and Joseph Murray. "Reframing from Hearing Loss to Deaf Gain." Deaf Studies Digital Journal (Fall 2009). < http://dsdj.gallaudet.edu/ >. Chaiken, Ilene (writer). The L Word. Television series. Season 4. 2007. Chbosky, S., J. Schaer, and J.E. Steinbert (creators) Jericho. Television series. Season 1 & 2. 2006-2007. Christie, Karen, Patti Durr, and Dorothy M. Wilkins. “CLOSE-UP: Contemporary Deaf Filmmakers.” Deaf Studies Today 2 (2006): 91-104. Hartzell, Adam. “The Deaf Film Festival.” The Film Journal (May 2003) < http://www.thefilmjournal.com/issue5/deaf.html >. Kohan, J. (creator), M. Burley (producer). Weeds. Television series. Lawrence, B. (creator), V. Nelli Jr. (director). “My Words of Wisdom.” Scrubs. Television series episode. Season 6, Episode 16. 12 Apr. 2007. Lenkov, P. M., and S. Humphrey (writers), A.E. Zulker (story), and R. Bailey (director). “Silent Night.” CSI: New York. Television series episode. Season 3, episode 12. CBS, 13 Dec. 2006. O'Shea, M. (writer), D. White (director), M.R. Thewlis (producer). "Silencer." Law and Order Criminal Intent. Television series episode. Season 6, Episode 18. New York: Universal, 3 April 2007. Schuchman, John. S. Hollywood Speaks: Deafness and the Entertainment Industry. Urbana & Chicago, Ill.: University of Illinois Press. 1988. ———. “The Silent Film Era: Silent Films, NAD Films, and the Deaf Community's Response.” Sign Language Studies 4.3 (2004): 231-238.
APA, Harvard, Vancouver, ISO, and other styles
44

Brabazon, Tara. "Black and Grey." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2165.

Full text
Abstract:
Troubled visions of white ash and concrete-grey powder water-logged my mind. Just as I had ‘understood’ and ‘contextualised’ the events of September 11, I witnessed Jules and Gedeon Naudet’s 9/11, the documentary of the events, as they followed the firefighters into Tower One. Their cameras witness death, dense panic and ashen fear. I did not need to see this – it was too intimate and shocking. But it was the drained, grey visage – where the New York streets and people appeared like injured ghosts walking through the falling ruins of a paper mill – that will always stay with me. Not surprisingly I was drawn (safely?) back in time, away from the grey-stained New York streets, when another series of images seismically shifted by memory palate. Aberfan was the archetypal coal mining town, but what made it distinct was tragedy. On the hill above the village, coal waste from the mining process was dumped on water-filled slurry. Heavy rain on October 20, 1966 made way for a better day to follow. The dense rain dislodged the coal tip, and at 9:15, the slurry became a black tidal wave, overwhelming people and buildings in the past. There have been worse tragedies than Aberfan, if there are degrees of suffering. In the stark grey iconography of September 11, there was an odd photocopy of Aberfan, but in the negative. Coal replaced paper. My short piece explores the notion of shared tragedy and media-ted grief, utilising the Welsh mining disaster as a bloodied gauze through which to theorise collective memory and social change. Tragedy on the television A disaster, by definition, is a tragic, unexpected circumstance. Its etymology ties it to astrology and fate. Too often, free flowing emotions of sympathy dissipate with the initial fascination, without confronting the long-term consequences of misfortune. When coal slurry engulfed the school and houses in Aberfan, a small working class community gleaned attention from the London-based media. The Prime Minister and royalty all traveled to Aberfan. Through the medium of television, grief and confusion were conveyed to a viewing public. For the first time, cameras gathered live footage of the trauma as it overwhelmed the Taff Valley. The sludge propelled from the Valley and into the newspapers of the day. A rescue worker remembers, “I was helping to dig the children out when I heard a photographer tell a kiddie to cry for her dear friends, so that he could get a good picture – that taught me silence.” (“The last day before half-term.”) Similarly, a bereaved father remembers that, during that period the only thing I didn’t like was the press. If you told them something, when the paper came out your words were all the wrong way round. (“The last day before half-term.”) When analyzed as a whole, the concerns of the journalists – about intense emotion and (alternatively) censorship of emotion - blocked a discussion of the reasons and meaning of the tragedy, instead concentrating on the form of the news broadcasts. Debates about censorship and journalistic ethics prevented an interpretative, critical investigation of the disaster. The events in Aberfan were not created by a natural catastrophe or an unpredictable or blameless ‘act of God.’ Aberfan’s disaster was preventable, but it became explainable within a coal industry village accustomed to unemployment and work-related ‘accidents.’ Aberfan was not merely a disaster that cost life. It represented a two-fold decline of Britain: industrially and socially. Coal built the industrial matrix of Britain. Perhaps this cost has created what Dean MacCannell described as “the collective guilt of modernised people” (23). Aberfan was distinct from the other great national tragedies in the manner the public perceived the events unfolding in the village. It was the disaster where cameras recorded the unerring screams of grief, the desperate search for a lost – presumed dead – child, and the building anger of a community suffering through a completely preventable ‘accident.’ The cameras – in true A Current Affair style – intruded on grief and privacy. A bereaved father stated that “I’ve got to say this again, if the papers and the press and the television were to leave us alone in the very beginning I think we could have settled down a lot quicker than what we did” (“The last day before half-term.”). This breach of grieving space also allowed those outside the community to share a memory, create a unifying historical bond, and raised some sympathy-triggered money. To actually ‘share’ death and grief at Aberfan through the medium of television led to a reappraisal, however temporary, about the value and costs of industrialisation. The long-term consequences of these revelations are more difficult to monitor. A question I have always asked – and the events of September 11, Bali and the second Gulf War have not helped me – is if a community or nation personally untouched by tragic events experience grief. Sympathy and perhaps empathy are obvious, as is voyeurism and curiosity. But when the bodies are simply unidentified corpses and a saddened community as indistinguishable from any other town, then viewers needs to ponder the rationale and depth of personal feelings. Through the window of television, onlookers become Peeping Toms, perhaps saturated with sympathy and tears, but still Peeping Toms. How has this semiotic synergy continued through popular memory? Too often we sap the feelings of disasters at a distance, and then withdraw when it is no longer fashionable, relevant or in the news. Notions about Wales, the working class and coal mining communities existed in journalists’ minds before they arrived in the village, opened their notebook or spoke to camera. They mobilised ‘the facts’ that suited a pre-existing interpretation. Bereaved parents digging into the dirt for lost children, provide great photographs and footage. This material was ideologically shaped to infantilise the community of Aberfan and, indirectly, the working class. They were exoticised and othered. It is clear from testimony recorded since the event that the pain felt by parents was compounded by television and newspaper reportage. Television allowed “a collective witnessing” (McLean and Johnes, “Remembering Aberfan”) of the disaster. Whether these televisual bystanders actually contributed anything to the healing of the tragedy, or forged an understanding of the brutal work involved in extracting coal, is less clear. There is not a natural, intrinsic sense of community created through television. Actually, it can establish boundaries of difference. Television has provided a record of exploitation, dissent and struggle. Whether an event or programme is read as an expression of unequal power relations or justifiable treatment of the ‘unworthy poor’ is in the hands of the viewer. Class-based inequalities and consciousness are not blinked out with the operation of a remote control. Intervention When I first researched Aberfan in the 1980s, the story was patchy and incomplete. The initial events left journalistic traces of the horror and – later – boredom with the Aberfan tragedy. Because of the thirty year rule on the release of government documents, the cause, motivation and rationale of many decisions from the Aberfan disaster appeared illogical or without context. When searching for new material and interpretations on Aberfan between 1968 and 1996, little exists. The release of documents in January 1997 triggered a wave of changing interpretations. Two committed and outstanding scholars, upon the release of governmental materials, uncovered the excesses and inequalities, demonstrating how historical research can overcome past injustice, and the necessity for recompense in the present. Iain McLean and Martin Johnes claimed a media profile and role in influencing public opinion and changing the earlier interpretations of the tragedy. On BBC radio, Professor McLean stated I think people in the government, people in the Coal Board were extremely insensitive. They treated the people of Aberfan as trouble makers. They had no conception of the depth of trauma suffered (“Aberfan”). McLean and Johnes also created from 1997-2001 a remarkable, well structured and comprehensive website featuring interview material, a database of archival collections and interpretations of the newly-released governmental documents. The Website possessed an agenda of conservation, cataloguing the sources held at the Merthyr Tydfil and Dowlais libraries. These documents hold a crucial function: to ensure that the community of Aberfan is rarely bothered for interviews or morbid tourists returning to the site. The Aberfan disaster has been included in the UK School curriculum and to avoid the small libraries and the Community Centre being overstretched, the Website possesses a gatekeepping function. The cataloguing work by the project’s research officer Martin Johnes has produced something important. He has aligned scholarly, political and social goals with care and success. Iain McLean’s proactive political work also took another direction. While the new governmental papers were released in January 1997, he wrote an article based on the Press Preview of December 1996. This article appeared in The Observer on January 5, 1997. From this strong and timely intervention, The Times Higher Education Supplement commissioned another article on January 17, 1997. Through both the articles and the Web work, McLean and Johnes did not name the individual victims or their parents, and testimony appears anonymously in the Website and their publications. They – unlike the journalists of the time – respected the community of Aberfan, their privacy and their grief. These scholars intervened in the easy ‘sharing’ of the tragedy. They built the first academic study of the Aberfan Disaster, released on the anniversary of the landslide: Aberfan, Government and Disasters. Through this book and their wide-ranging research, it becomes clear that the Labour Government failed to protect the citizens of a safe Labour seat. A bereaved husband and parent stated that I was tormented by the fact that the people I was seeking justice from were my people – a Labour Government, a Labour council, a Labour-nationalised Coal Board (“The last day before half-term”). There is a rationale for this attitude towards the tragedy. The Harold Wilson Labour Governments of 1964-70 were faced with severe balance of payments difficulties. Also, they only held a majority in the house of five, which they were to build to 96 in the 1966 election. While the Welfare State was a construction ‘for’ the working class after the war, the ‘permissive society’ – and resultant social reforms – of the 1960s was ‘for’ middle class consumers. It appeared that the industrial working class was paying for the new white heat of technology. This paradox not only provides a context for the Aberfan disaster but a space for media and cultural studies commentary. Perhaps the most difficult task for those of us working in cultural and media studies is to understand the citizens of history, not only as consumers, spectators or an audience, but how they behave and what they may feel. We need to ask what values and ideas do we share with the ‘audiences,’ ‘citizens’ and ‘spectators’ in our theoretical matrix. At times we do hide behind our Foucaults and Kristevas, our epistemologies and etymology. Raw, jagged emotion is difficult to theorise, and even more complex to commit to the page. To summon any mode of resistive or progressivist politics, requires capturing tone, texture and feeling. This type of writing is hard to achieve from a survey of records. A public intellectual role is rare these days. The conservative media invariably summon pundits with whom they can either agree or pillory. The dissenting intellectual, the diffident voice, is far more difficult to find. Edward Said is one contemporary example. But for every Said, there is a Kissinger. McLean and Johnes, during a time of the Blair Government, reminded a liberal-leaning Labour of earlier mistakes in the handling of a working-class community. In finding origins, causes and effects, the politicisation of history is at its most overt. Path of the slag The coal slurry rolled onto the Welsh village nearly thirty-seven years ago. Aberfan represents more than a symbol of decline or of burgeoning televisual literacy. It demonstrates how we accept mediated death. A ‘disaster’ exposes a moment of insight, a transitory glimpse into other people’s lives. It composes a mobile, dynamic photograph: the viewer is aware that life has existed before the tragedy and will continue after it. The link between popular and collective memory is not as obvious as it appears. All memory is mediated – there is a limit to the sharing. Collective memory seems more organic, connected with an authentic experience of events. Popular memory is not necessarily contextually grounded in social, historical or economic formations but networks diverse times and spaces without an origin or ending. This is a post-authentic memory that is not tethered to the intentions, ideologies or origins of a sender, town or community. To argue that all who have seen photographs or televisual footage of Aberfan ‘share’ an equivalent collective memory to those directly touched by the event, place, family or industry is not only naïve, but initiates a troubling humanism which suggests that we all ‘share’ a common bank of experience. The literacy of tragedy and its reportage was different after October 1966. When reading the historical material from the disaster, it appears that grieving parents are simply devastated puppets lashing out at their puppeteers. Their arguments and interpretation were molded for other agendas. Big business, big government and big unions colluded to displace the voices of citizens (McLean and Johnes “Summary”). Harold Wilson came to office in 1964 with the slogan “13 wasted years.” He promised that – through economic growth – consensus could be established. Affluence through consumer goods was to signal the end of a polarisation between worker and management. These new world symbols, fed by skilled scientific workers and a new ‘technological revolution,’ were – like the industrial revolution – uneven in its application. The Aberfan disaster is situated on the fault line of this transformation. A Welsh working class community seemed out of time and space in 1960s Britain. The scarved women and stocky, strong men appeared to emerge from a different period. The television nation did not share a unified grief, but performed the gulf between England and Wales, centre and periphery, middle and working class, white collar and black collar. Politics saturates television, so that it is no longer possible to see the join. Aberfan’s television coverage is important, because the mend scar was still visible. Literacy in televisual grief was being formed through the event. But if Aberfan did change the ‘national consciousness’ of coal then why did so few southern English citizens support the miners trying to keep open the Welsh pits? The few industries currently operating in this region outside of Cardiff means that the economic clock has stopped. The Beveridge Report in 1943 declared that the great achievement of the Second World War was the sharing of experience, a unity that would achieve victory. The People’s War would create a People’s Peace. Aberfan, mining closures and economic decline destroyed this New Jerusalem. The green and pleasant land was built on black coal. Aberfan is an historical translator of these iconographies. Works Cited Bereaved father. “The last day before half-term.” 1999. 6 April 2003 <http://www.nuff.ox.ac.uk/politics/aberfan/chap1.htm>. Bereaved husband and parent. “The last day before half-term.” 1999. 6 April 2003 <http://www.nuff.ox.ac.uk/politics/aberfan/chap1.htm>. MacCannell, Dean. Empty Meeting Grounds. London: Routledge, 1992. McLean, Iain. “Aberfan.” 6 April 2003 <http://news.bbc.co.uk/olmedia/980000/audio/_983056_mclean_ab... ...erfan_21oct_0800.ram>. McLean, Iain, and Martin Johnes. Aberfan: Government and Disasters. Cardiff: Welsh Academic Press, 2000. McLean, Iain, and Martin Johnes. “Remembering Aberfan.” 1999. 6 April 2003 <http://www.nuff.ox.ac.uk/politics/aberfan/remem.htm>. McLean, Iain, and Martin Johnes. “Summary of Research Results.” 1999. 6 April 2003 <http://www.nuff.ox.ac.uk/politics/aberfan/eoafinal.htm>. Naudet, Jules, Gedeon Naudet, and James Hanlon. 9/11. New York: Goldfish Pictures and Silverstar Productions, 2001. Rescue worker. “The last day before half-term.” 1999. 6 April 2003 <http://www.nuff.ox.ac.uk/politics/aberfan/chap1.htm>. Links http://news.bbc.co.uk/olmedia/980000/audio/_983056_mclean_aberfan_21oct_0800.ram http://www.nuff.ox.ac.uk/politics/aberfan/chap1.htm http://www.nuff.ox.ac.uk/politics/aberfan/chap1.htm.(1999 http://www.nuff.ox.ac.uk/politics/aberfan/eoafinal.htm http://www.nuff.ox.ac.uk/politics/aberfan/home.htm http://www.nuff.ox.ac.uk/politics/aberfan/remem.htm Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Brabazon, Tara. "Black and Grey" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0304/07-blackandgrey.php>. APA Style Brabazon, T. (2003, Apr 23). Black and Grey. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0304/07-blackandgrey.php>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography