Diego Vicentin is one of the eight 2014 Milton Wolf Emerging Scholar Fellows, an accomplished group of doctoral and advanced MA candidates selected to attend the 2014 Milton Wolf Seminar: “The Third Man Theme Revisited: Foreign Policies of the Internet in a time of Surveillance and Disclosure.” Their posts highlight the critical themes and on-going debates raised during the 2014 Seminar discussions.
Just as soon as I arrived from Brazil in the US, to join the Center for Information Technology Policy Princeton team as graduate fellow, the curious image of cellular antennas disguised as trees caught my attention. It is common to see these “tree” antennas right beside the road while travelling from Princeton to New York, Philly, or Boston. Aside from the purpose of avoiding visual pollution, this attempt at producing a friendlier landscape is representative of our relation with information and communication infrastructure. The technical and political apparatus that supports the mode of operation of digital technologies is predominantly invisible to the end user. Only the ones who really pay attention can see the antenna behind the fake tree branches. Normally that is not the case. The majority of users take infrastructure for granted, rendering it invisible. Whereas such invisibility might be seen as an unintended result of both the technical complexity of digital communication networks and its decentralized form of governance, in fact, it is commonly used as a power strategy to avoid accountability as well as broader political participation in technology governance.
Fortunately, Edward Snowden’s revelations have shed light on the issue of technology governance, bringing…
Till Wäscher, School of International and Intercultural Communication & TU Dortmund
For years, privacy advocates had been speculating about a possible “Privacy Chernobyl” – a major scandal that would put the issue of surveillance on the global agenda and create a mass social movement against privacy intrusions committed by governments and corporations. In the summer of 2013, this speculation became reality. Edward Snowden’s leaked documents detailing the mass surveillance activities conducted by the National Security Agency and its international partners caused – to stick to the nuclear disaster analogy – a temporary meltdown of public trust by citizens around the world.
The Snowden revelations revitalized in the public consciousness an almost forgotten genre of contentious politics – privacy activism. The main objective of this blog series is to identify, analyse, and critically assess the political communication of activists during anti-surveillance campaigns in the first year after the Snowden revelations to better understand the ways in which these issues have been framed by activists, understood by the public, portrayed by the media, and potentially acted upon in a variety of contexts.
The series is based on the author’s dissertation on political communication tactics of the global privacy community for which he conducted 21 semi-structured interviews with activists from 14 countries. This first post in the series focuses on the core collective action frames against surveillance, articulated by the privacy activist community over the course of four campaigns: “Restore the Fourth/1984 Day” (July-August, 2013), “Stop Watching Us” (October, 2013), “The Day We Fight Back” (February, 2014), and “Reset the Net” (July, 2o14). These were largely on U.S.-centric protests; subsequent pieces in the series will explore how resistance to surveillance has been framed in other parts of the world.
“Restore the Fourth” was the first attempt to organize and protest surveillance issues after the Snowden revelations. Mainly coordinated through message boards on the social news website Reddit, in more than 80 American cities (as well in Munich, Germany) people took to the streets to protest NSA surveillance. The three core demands of the “Restore the Fourth” network were to reform section 215 of the controversial Patriot Act; the creation of an oversight committee to keep checks on surveillance programs; and initiate accountability measures for public service figures involved in domestic spying activities.
Much of the communication efforts by… (click here to read the rest of this post).