Who put the literacy in digital literacy: Why is voice messaging absent in digital sociology, why are we obsessed with text, and why is this title longer than the post below?

Voice messaging sends prerecorded audio messages via messaging apps. Users can mix and match audio messages with other media such as text or visual.  Voice messaging allows people to get around the flatness of textual communication, adding tone and nuance. It requires greater intensity of engagement at the other end. The receiver has to listen, not just glance. Zoomers have a reputation for fearing the phone call and voice message allows a less demanding but still personal way of interacting.

In every way voice messaging is its own communication media. It has specific interactional characteristics that set it apart qualitatively from text messaging, one to one calls, and other modes of communication. Yet almost every article I read on digital society namechecks textual, audio call and video communication. None mentions voice messaging, one of the most significant changes in communication media in recent years. It is completely under the radar of digital sociology even as part of our standard list everyone uses of ‘this is how folks interact now’.

Voice messaging has some fascinating characteristics. Zhang (2028) reports that in Chinese professionals consider it ‘obnoxious’ and only tolerate its use when it is sent from a senior to a junior person. The reasons are probably the same for both parties: it has limited information density and resists rapid, easy consumption. A voice message conversation appears just as a list of audio links. There is no simple way to parse or prioritise content without having to listen to the whole thing. It is a demanding medium for the receiver, but not the sender. In business/professional worlds it is a statement of who is time rich, who is time poor, and who matters more. Effectively, ‘I couldn’t be bothered to type this out’.

As well as shifting or exposing power relations in one set of communications, it may shift them in another direction in a different set of interactions. It opens up some possibilities for people who are unable to use text, or find it difficult. Its use can signal the presence of intimacy and care. It allows users to signal the content and intent of their communication. Here is a longer message I would like you to be more involved in listening to. It moves us away from a literal understanding of literacy as textual aptitude. As a mode it also highlights the attentional context of consumption. A voice message makes it harder to prioritise one’s attention in consuming communication, but on the other hand displays a greater commitment to the interaction.

On the next point, does our not bothering with voice messaging indicate we are too text focused in both method and critique? Textual sources and modes of analysis are simpler in many ways. There is a lot of textual data, and using text allows us to avoid or obfuscate some ethical questions around data reuse and anonymity. Voice messages tend to just be private so are not immediately accessible. There are practical reasons but also our theoretical tools are designed around the bloodless written word and we suffer for it.

Zhang, Zara. 2018. ‘Sending WeChat Voice Messages Is a Status Symbol in China’. Quartz.

Disinformation – you have no idea what it is so it beats me how you plan to fix it

Just adding to the rash of ‘stop thinking disinformation is the problem’ takes out there. The high cultural capital crew like to imagine there to be a bright line between illegal and illegal, organised and opportunistic, rational and emotional. And also that they know which side of the line they would be on. Likewise, information manipulation. Disinformation is the cosy mug of horlicks that the information saturation set reach for to explain democratic events they do not like. Why, if only those damned twitter bots did not spin constant lies and rile up the little people then we wouldn’t have to deal with events, which are inherently tiresome. On the other hand, maybe lots of people just do not want to lie in the bed you have created for them. 

Challenge: what’s the difference between propaganda, political campaigning, advertising, and information operations, if there is one? Why is it okay when our side does it? There is a long history of fake news and election manipulation. In an early example of cancel culture. the ostrakon was used to expel citizens from Athens and was highly open to manipulation. The Soviet Union placed a fake news story in an Indian newspaper about AIDS being a US developed bioweapon. Many governments engage in shaping public opinion, from the health (cigarettes be bad) to the attitudinal. Plenty of institutions engage in astroturfing, other manipulation of civil society. What is new in the current climate is the global reach of nationally motivated hacker groups, not all of which are or need to be centrally coordinated.

It is a powerful propaganda tool used by nationalist regimes to suppress civil liberties, undermine opposition and simply swamp out opposition or independent information and as a tool of international relations. But also itself become a go-to tool for strategic de-legitimation (you used the fakes!). There’s a fear of institutional fragility which speaks of a moral uncertainty in liberal elites. More neutrally, an information economy and polity is exposed to attempts to manipulate information for strategic ends as opposed to everyday annoyances.

The narrative around disinformation feeds into the narrative that certain choices can be objectively deemed false. Discussions of Brexit always implies there is something false to it: Cameron called the vote for cynical party management reasons and Johnson falsely posed as an anti-EU populist. Falsity lets us off the hook of doing proper material, historical analysis.

Disinformation strikes at a number of question at the intersection of information science, sociology of markets, sociology of technology and the philosophy of knowledge: how can disinformation be defined, recognised and how can systems be made resilient against it. There are several thorny ontological and epistemological questions between the politics of knowledge, preference falsification, technical and social verification and conceptual space theory. We don’t easily know what disinformation is when we see it so we need agreement that we are in fact talking about the same thing.

There are a number of developments in the organisation of information markets that are live right now and which mean the problem isn’t just open to immediate technical or oversight solutions: financialisation of disinformation, the vertical integration of political campaigns with new media, and the development of a distributed labour infrastructure which is agile and available. There is also a collective effervescence to disinformation action. When Russian hackers take out Estonia’s infrastructure or Chinese internet activists DDOS US government websites, this is partly for the joy. Therefore we should consider this as a type of national political action and participation, not just a wily propaganda ploy.

DeSombre, Winnona, and Dan Byrnes. 2018. Thieves and Geeks: Russian and Chinese Hacking Communities. Recorded Future.

You never had and will never have the right to repair, or any other rights for that matter

If you see the ‘No user serviceable parts inside’ notice as a challenge, I am with you. I am in the class of people most open to the right to repair movement so I want to introduce some reflection on what it means and whether it is the right way to frame what we want. And what we want is knowledge and control over the material technologies of our lives, and to resist the constant ramp towards platform lock in that now pervades the physical as well as the virtual realm.

A right is just a desire, along with the capacity and willingness to exercise it. You do not have the right to vote. You can vote if some conditions prevail (you are an adult citizen, mentally capable, not in prison, able to get to the polling station, give a toss etc). Likewise, the right to free speech, property, right to life etc. Any right you mention can be terminated. Please do tell the nurse switching off your ventilator about the European Convention on Human Rights Article 2. Trust me, she’ll do it just to save on the electricity. The whole thing is a massive scam, like dishwasher tablets. I’ve never bought them. It cleans just as well without them.

When we campaign for rights we really just mean: we want this not to be just the province of affluent, high cultural capital, centrally approved sort of folk.It just means nobody else will. Alcohol might be banned in Saudi Arabia but wealthy, male Saudis exercise their right to get merry very easily. A right to intoxication would mean allowing people the legal and actual capacity to buy and use alcohol or other drugs. Maybe the Saudis would have had more luck banning alcohol if they just let Apple sell the stuff but lock it to people who had phones running iOS 16.

Okay, I put that a bit strongly, naming rights helps organise and codify them. Right to repair is a set of requirements that are primarily about returning control of technology to users and the communities they belong to. This is a laudable goal, which will only be met in a very limited way with an actual right to repair. We should understand why this shift happened and why some technologies appear to be repairable in the first place. The reason I say this is that otherwise it is very easy for a company to throttle a right to repair just by ceasing to make the relevant parts. As someone who finally got the part they need for my 10 year old Canon EOS 5D (see picture) I know that it is easier to observe in theory than practice. And the Canon is super-repairable. I could get right into the guts of it but still need to replace the expensive shutter unit, rather than the cheap shutter itself. And I can afford the time to do all this.

The ability to repair old bangers exists only because: for many of us, we couldn’t afford new ones; and some are worth it to keep roadworthy but are essentially useless. Software locked tractors massively impinge on the ability to maintain a significant fixed capital investment but that is quite a specific type of use case. Can we analogise from that to Apple’s penchant for soldering everything onto the motherboard, and gluing everything that can be glued?  Likewise, PCs are not more popular than Macs because they are sometimes repairable and upgradable. They are more popular because they are more popular, they fit more use cases, and can do more stuff – especially but not only games. What the r2r movement is objecting to is the centralisation and concentration of the supply chain and the damage that does to communities’ ability to adapt technology to their needs. I believe that we need to expand this attitude to every technology where it has happened, which is most of them, from pharmaceuticals to bicycles. I also think this logic is tending towards each of these technologies acting as part of an integrated system – e-bikes, smart drugs, they all function as parts of an integrated whole. R2R is one way of pushing back against some of the more damaging elements of that. So my main angle is really that it is the starting point to go beyond the valuable use cases that it invokes to a broader take on the infiltration of technology into social life.

 

What’s the difference between description and analysis? The myth of the unfakeable banknote

I often say to students ‘describe, then analyse’. Well, how do you know which one you are doing and what the difference between them is? And while we’re about it, what’s the difference between method and methodology, hmmm? There is really no fundamental difference. Description always involves a choice of terms in which to describe, and these are analytical choices. Analysis is just being aware of those choices, understanding that some choices have been made for you before you even start, then deciding what elements to focus on, and drawing connections between cases in order to make inferences. Analysis is therefore that ability to connect the description to a category or process that tells you about it, and being aware of the context in which it is produced.

For example, I research banknote counterfeiting. One aspect of that is looking at how banks and tellers detect counterfeits. A start to that is by describing the equipment used (e.g. ultraviolet lamps) and then the process (the different kinds of examination notes undergo). Analysis is looking at what informs the design of those technologies and processes. One ground level assumption everyone works with is that there is an objective way to tell the difference once and for all. Analysis looks at what effect these assumptions have in the world. For example, if tellers are held responsible for accepting counterfeits then that shifts the responsibility from the designer to the lowest level human in the process. That tells us about who has power over money. We can then say a lot more about how cash notes fit into the economy as part of a whole process based on distributing trust and responsibility. We might also look at the changing design of notes as partly symbolic, incorporating banal nationalism at some stages, and also about shifting understandings of the role of cash and money in the economy.

The design of the Euro notes gives new meaning to both. The semiotics are significant. They are intentionally banal. Each country is only represented in the serial numbers of the notes, and the images uses are intended not to refer to anything real that might get people hot under the collar. You can compare those notes to others that intend to communicate stability and reliability, or seek to say something about the nation they represent. Finland’s markka notes designed by Eliel Saarinen are a lovely example of aspirational nationalist modernism at a time when Finnish national consciousness was starting to cohere around national independence. Scammers faked the Finnish markka and in one genius instance made a 20 markka note into a non existent 2000 mark note by the simple means of adding two zeros to the face number. While that wouldn’t have fooled a lot of Finns it might have worked when exchanging the notes abroad.

The security features also are semiotic: the signal trust, but also have to perform practically. They need to be readable to the human eye and sensitive to touch, to make them quickly recognisable. We can then ask what this tells us about the notes as circulating media or as stores of value, the intended rapidity of their circulation and how the designers understand where they will be exchanged.

Analysis then leads us to further questions. Do central banks plan there to be a perfectly unfakeable note? How do fake notes affect people’s faith in money? Do times of hyperinflation or deflation change this relationship? How does computer fraud change the faith people put in digital versus physical currency? How does the creation of automatic transaction terminals such as supermarket customer checkout systems shift the equation? Increasingly we look at currency and payment as a closed system, which alters what we understand cash to be. Cash can operate as something valued independently of its ‘face value’. For example, in Russia during 1992 there was a shortage of small value 15-kopek pieces used for payphones, so they began changing hands for much more (Lemon, 1998). Likewise, drug dealers in parts of the USA refused to accept one dollar bills, so local shops made a lively trade selling 10 dollar bills to drug users for 11 one dollar bills.

Analysis also helps us tell the difference between banally obvious statements that still need to be made (e.g. that every banknote is an act of faith) and propositions that can be tested (e.g. people automatically have more trust in higher value notes). Just in case anyone things I am ragging on cash, cryptocurrency is worse (Bratspies, 2018).

We often think of description as mundane and concrete and analysis as showy and abstract. The reverse is true. Every act of description is an act of creation, and every act of analysis brings that creation back to earth.

Bratspies, Rebecca M. 2018. Cryptocurrency and the Myth of the Trustless Transaction. SSRN Scholarly Paper. ID 3141605. Rochester, NY: Social Science Research Network.
Lemon, Alaina. ‘“Your Eyes Are Green like Dollars”: Counterfeit Cash, National Substance, and Currency Apartheid in 1990s Russia’. Cultural Anthropology 13, no. 1 (1998): 22–55. https://doi.org/10.1525/can.1998.13.1.22.

Malware: proposal for a social history

Computer security is the culmination of a series of subversions. Just as policing evolves in response to crime, so computer systems evolve in response to threats. When it comes to malware, while the code is clever, the social engineering is more persistent, and more depressing. Malware designers evolve their products through testing and tooling to find out what works best. What wording will mean that more victims click on that ransomware link? Do people trust social media messages more than emails? More and more, malware evolves in response to human social and economic systems, and organisational/geo-political priorities, rather than to technical vulnerabilities.

Technological histories exist, recording major developments – the first Worm, the first RootKit, the first ransomware and so on. The social history is more dispersed and is yet to be written. Elements of a theory of malware could focus on: Where was it developed, for what purpose, who by, and how? How have victim and perpetrator characteristics evolved with the systems they use? What ethical and political questions are raised by it? For example, do we have the right to destroy self replicating computer programs, and how should malware be preserved for future study? My sense is malware history is somewhat separated from other kinds of crime historiography.

We would need to begin with a basic taxonomy. Here is my first sketch of the social history of malware: First stage: technically focused malware. Often created to prove a point, or by accident, like the first computer worm. Second stage: payload. Malware delivers a technical form that does something else, like modifies a computer system, or locks you out of it. Third stage: organisational. Malware becomes an object of economic and political activity. There is a high division of labour. Stuxnet and NotPetya encode geo-political priorities. Markets like Dark0de trade and systematise it.

Methods should set out the relevant fields. Studying evolving malware means studying the evolving computer security industry, its capacity for threat detection and horizon analysis, and the back and forth between malware operators and industry personnel. Constructs to be examined include changes in how costs are calculated and understood – from direct economic losses to reputation damage, lay perceptions of malware, and popular discourse and cultural representations of the topic. There is an opportunity for theoretical innovation here, for example considering QAnon as a mimetic virus.

Lessons to learn: total security is not possible (Aycock, 2006). We might end up with an understanding of malware as a varied sphere of illegitimacy, which is occupied in different ways by systems and people. The debate over disinformation could fit into this.  It is a powerful propaganda tool used by authoritarian regimes to suppress civil liberties, undermine opposition and simply swamp out opposition or independent information and as a tool of international relations. But also itself become a go-to tool for strategic de-legitimation of uncomfortable political positions (you used the fakes!). Likewise, malware is a purposeful set of technical instruments which share characteristics. There may be a myth of precision influencing discussion, that if only we get the right focus we can pre-cog malware and harden vulnerable targets – code for you dumb users. It is a dance that won’t stop.
To carry out this study we would have to be mindful of Inglis (2014) critique of presentism and simplistic periodisation in sociology and elsewhere, and develop an understanding of the sociological dynamics underpinning cybercrime that avoids simple periodisation and to which I would add social science’s tendency towards deletion of its recent past.
Aycock, John. 2006. Computer Viruses and Malware. Springer.
Inglis, David. 2014. ‘What Is Worth Defending in Sociology Today? Presentism, Historical Vision and the Uses of Sociology’. Cultural Sociology 8(1):99–118. doi: 10.1177/1749975512473288.

Aspirational illicit markets

Early in my career I researched smoking in areas of multiple deprivation in Scotland. At the time these were places where the social, economic and physical fabric had been severely weakened due to overlapping stressors. High crime, low income, low economic activity and widespread health problems were multiple challenges for people who lived there. That is what I think of as intersectionality. Smoking was often quoted by people I interviewed as being their one reliable pleasure. The rising cost of cigarettes and tobacco was an irritant but not often an incentive to quit. Though under strain at the time, there was a strong neighbourhood environment in many places.

One set of relationships that was sustained throughout was the illicit cigarette market. Taxes were spiking and there was a wide opportunity for people who wanted to import tobacco products cheaply. As with many illicit importing operations a tricky bit is the last retail step. Shipments need to be broken into units that will be affordable and available and this needs a staged operation with sometimes multiple ‘final miles’ involved. Several competing approaches were applied. Tobacco could be sold in pubs, under the counter of existing shops, or delivered directly. In the last case pizza companies were set up as fronts for tobacco delivery.

The level of entrepreneurial innovation going on here alerted me to the aspirational nature of illicit markets. Some illicit operations are attractive because they are the only game in town, sometimes participating in them offers purpose, income and aspiration and something resembling a career. While that was going on many others in the community rejected this as a route. They viewed illicit work as harmful to the community, attracting dangerous criminals and damaging its reputation. These markets were contested, and meaningful. Therefore when they are interdicted we should be aware of the fallout, positive and negative, and the absences left behind by them.