Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.
I'm a lecturer at the University of Edinburgh department of Sociology, studying illicit drug use, illicit markets and various shades of cyber crime. Email angus.bancroft@ed.ac.uk Tweet @angusbancroft
One theme of mine is territorialization of the digital world, and the tight relationship between cyber criminals and their governments. Sometimes this is practical, as in the fact that Russian cybercriminals can operate freely as long as they do not target Russian /CIS citizens. Sometimes it is felt nationalism as with the patriotism of Chinese hackers. National hacking cultures are a combination of ways of organizing, expectations on participants and the wider digital and state structure in which they are held. Because everything digital is local,, they emerged from the historical evolution of skillbase, opportunity and political economy. It marks the particular division of labour, types of criminal activity and organisational practice that we see in national hacking forums.
极 客精神 is geek spirit (deSombre and Byrnes 2018), the ethos and obligation of community among Chinese pro-government digital activists, hackers and crime entrepreneurs. For Chinese and Russian-speaking cybercriminals the 21st century viewed an evolving relationship between cybercrime, patriotism and nationalism. The authors of this highly informative report say there was a tight relationship between Chinese hackers and patriotic fervour early on. In contrast with the well-known links between the Kremlin and Russian-speaking cyber criminals, that relationship developed as Russian foreign policy evolved in a much more aggressive direction. Chinese hacker patriotism seems to be more organic in form and origin. Starting with first protests in the form of attacks and web defacements against the Indonesian and the U.S. governments. Later, Chinese hackers set up their own companies and contracted services to the Chinese government.
This review of hacker entrepreneurs shows each adheres to a different national culture. This is the case of both mode of practice and overall aims and targets. Something I and others noted with the different interactional ethics in Russian compared to English language hacking forums. English language ones were far more chatty. As the report also confirms, Russian forums emphasize business, not community. Professional in this setting means the cash nexus and the art of the deal, customer care and rewards for loyalty. Social punishments are meted out for weaker and less competent members. Chinese forums are more nurturing. Some hackers run paid apprenticeship programs. It seems there are both civilizational hacking cultures and national ones. Russian hacking sometimes includes the wider ruusky mir. This is not equal. Chinese, of course, participate in English and Russian forums.The reverse is not true. English and Russian speakers do not enter Chinese forums.
Russians and East Europeans saw a criminal market dominated by Americans. They wanted some of that. The report highlights how important Ukraine, especially its Russian-speaking areas pre-war was to the development of a Russian language cyber crime underground. CarderPlanet was formed from a meeting in Odesa in 2000. it was crazy and direct response to the English-speaking Carder group Counterfeit Library. the Russian language for was highly structured and deliberately professionalized in comparison to the anarchic English language one. The harm was significant, costing financial institutions hundreds of millions. As these organizations evolved so did the close links between Russian government and elite cyber criminals. The Russian-Georgian War showed close cooperation in military aims with cyber criminals. The Russian state has been adept at maintaining its cybercriminal capacity.It is hard to maintain the sociological concept of deviance as an explanation for criminal activity in situations where criminal activity is co-opted by the state, where criminals are highly skilled and well rewarded for crime is patriotic.
DeSombre, Winnona, and Dan Byrnes. 2018. Thieves and Geeks: Russian and Chinese Hacking Communities. Recorded Future.
I was reminded reading Nicholls et al (2022) report on drug consumption rooms of the critique of them as ‘not a silver bullet’. This term means a dependable solution to a otherwise tricky problem . It put me in mind of a meeting with MPs where I and others had explained that they were useful, but not in themselves a solution to Scotland’s drug problem. I said that harm reduction services like DCRs are never an end in themselves. The ‘service’ you want to offer is not providing a safe environment for drug consumption. It is having a contact point for users who have particularly disrupted lives where you can talk about other services that they need – welfare, housing, psychological, health etc. What matters is what happens when you provide that service. Later I heard, ‘they are not a silver bullet’. Does anybody think they are? As Nicholls et al outline, everyone involved thinks they have to defeat this strawman argument first of all.
We should make ourselves aware of why this argument exists in the first place. Nobody used it for Scotland’s needle exchange policy which was vital in fighting the HIV epidemic. Objections then were moral as it was seen as a moral and a technical project. It has come about because our harm reduction thinking has become increasingly technically focused in practice evidence and justification. This is just perfectly reasonable. We could work together with very different moral and political views to agree on the technical benefits of needle exchange. It was quite remarkable that conservative, and liberal, politicians could agree on this approach.
The problem of relying on the technologically justified approach is that it can ossify over time and displace the wider moral claim you’re making. Everyone starts to expect naloxone to act in this way. We know it is its most effective when it is part of a toolkit owned by users – meaning not a magic bullet.
So we can perhaps work with some different means of understanding:
What kinds of conversations and communities are created and supported through it?
What kind of knowledge came from it?
Does it connect different elements of a wicked problem?
and so on
Nothing is a silver bullet. Except when it is. There are plenty of technological solutions. HIV is now a disease to live with, not die of. Obesity may be preventable. Semaglutide might treat addiction. Yet many campaigns reject silver bullets on principle because the real aim is different – usually to end capitalism in some form. Imagine a party campaigning against child poverty. They are offered a solution – eg here’s a ton of cash. They reject it. ‘No to solutions that do not change society’. We would think them disgraceful, immoral. Certainly we would assume they were not really opposed to child poverty. But that is exactly what happens.
In the social sciences, we have been sometimes reluctant to accept that there can be magic bullets, technological solutions, because we are a bit in love with our wicked problems. If some of these problems have simple technical solutions like the weight loss pill, then it reduces our role to technical administrators. Similarly we refuse the great man idea of history because it gets in the way of our ability to theorise. It is a bit hard to argue now that individuals do not influence history.
Nicholls, James, Wulf Livingston, Andy Perkins, Beth Cairns, Rebecca Foster, Kirsten M. A. Trayner, Harry R. Sumnall, Tracey Price, Paul Cairney, Josh Dumbrell, and Tessa Parkes. 2022. ‘Drug Consumption Rooms and Public Health Policy: Perspectives of Scottish Strategic Decision-Makers’. International Journal of Environmental Research and Public Health 19(11):6575. doi: 10.3390/ijerph19116575.
Nobody talks much about capillary power these days. Probably because we have too many lessons in actual power. This was a predominant concept for many decades in social theory. Derived from Michel Foucault who held that power was not held by individuals or organizations, but spread through society. Every act of definition creates it. Every act of resistance renews it. It is hard to say as Foucault did, ‘Power is everywhere and nowhere’ when you can easily point to where power actually is. It is a pity as the persistent performance of power can bind us to its more subtle features. We can see is how much power is mythical, performative, rhetorical and psychological. Tone and texture matter. The main problem I have with the idea of disciplinary power is that often what he is describing is not power. It is more like bureaucratic busywork. What we are seeing is power becoming more personal and ‘hot’, losing its bloodlessness and focus on the normal in favour of the pathological. The world is re-enchanted.
As with his origin story in Manhattan real estate, Trump thinks in terms of turf, as in controllable territory. Turf is a common concept in organized crime. In Mexico it is called plaza. The dense network of relationships that matter. Controlling the political power in a territory is more important than having formal ownership. Turf is the thicket of political, familial, clannish and neighbourhood relationships that make power happen. Organized crime is a frequent mediator of this relationship. Turf also needs some measure of consent.Just as the British police often say they’re policing by consent, so organised crime also often does crime with consent. Or at least acquiescence.
One area where turf wars had become less consequential is face-to-face drug dealing. The popularity of the mobile phone seriously reduced turf conflicts (Edlund and Machado 2019). However, this belongs to an older era of digital life. Increasingly, we see digital space and resources foreclosed. The digital is a much more territorial space and has become like a limited territorial resource. The growing interest of organized crime in crypto is part of that. They do not have a lot of interest in resources that are widely networked and easily accessed. Their interest lies in resources where they can control and limit access and charge significant rents.
This also explains Trump’s approach to politics, finance, and the digital sphere shows that his most recent embrace of crypto is significant here. Crypto is by design a digital turf. By that I mean it is deliberately a restricted resource that cannot be scaled and instead must be controlled.
AI has become something of a bogeyman and it is not helpful to view the technology in this way. It is indeed often hyped up junk, as when Apple’s AI helpfully prioritizes spam email as ‘urgent’ for me. Yet as with any other technology it brings change and benefits and problems. I use AI-enabled tools every day. It concerns me that a negative narrative has emerged, which purely focuses on AI as a threat to individual human creativity and to the environment. This is a one-sided and rather hoary and dated critique that rests largely on an assumption that we cannot possibly integrate these technologies into our lives.Techno fear is as bad as techno hype and just because it feels good doesn’t mean you should do it.
My existence would be much diminished without AI tools. I am unable to use a keyboard or other input device. Most of my voice has gone. The only dictation support that works is an AI driven one called MacWhisper, which uses the Whisper LLM. This is the only transcription software that can make sense of my much diminished voice. It is far superior to the solutions offered by others. And to be clear, it is actually the commercial software that is best.You know that horrible integration that Apple does and that the EU wants to end and loads of tech critics complain about. The one where everything works together. Well, it’s the best thing I can have. Using macOS and an iPhone, I can take advantage of my existing contacts and software and integrate accessible workarounds and solutions into my existing workflow. I can use iPhone mirroring to access my phone directly from the desktop.This means I can continue to work and communicate with friends in a more seamless way.
This is far better than the clunky, awkward and disheartening solutions offered as part of specialist support for the disabled. On the one hand you need to have reliable solutions which necessarily are not going to be as pretty. On the other these all kind of assume that you’ve already given up on life. As an example, there is a system that will allow me to make calls using a head mouse tracker. But, you have to type in each phone number manually, like it was 1998 or something. I literally cannot remember the last time I manually entered a phone number. There is no possibility of integration with my existing, well, existence, my existing way of working, communicating with friends and loved ones. It’s just one example. The other solutions being offered are much the same. I can laboriously type out an email in a Windows pad. Or I can use my existing computer, which I can use a head tracking mouse with, and use voice control and dictation to send an email that way, in a way that I need to because I’m a professional still. This means I can continue to work and communicate in a seamless way. I can also control my phone directly from the desktop. Despite my situation, I am still writing books and papers. I am still making plans with friends and family.
As a researcher and a teacher, I have a complex workflow built up over many years that uses customised tools and complex data sets. I need these kind of data, this kind of information, this kind of multiple tools at my fingertips in a way I can use for my work and in fact for my pleasure. It is absolutely infuriating to be told that I can switch on my TV with the system as if that’s all I should have as a disabled person. My lot in life is just to sit in front of the telly all day. Well I can already put my Apple TV on with my Apple computer or my Apple iPad and using that I can watch all kinds of TV from around the world which is what I do. Everything about these tools is focused on the lowest common denominator passive consumer. That’s not who I am, or anyone is. We are still in our lives.
If we do not highlight these positive use cases for AI, then they will be regulated out of existence or their development will be limited and I will be a lot worse off and my life will be much reduced. Likewise, a new era of domestic robotics cannot come soon enough.
More generally, I find the way that AI is used as this kind of scare figure quite frustrating. It blocks analysis and evaluation. For example, the University proposes for its ethical investment strategy it will not invest in companies that produce AI-enabled weaponry, As if this is somehow more nefarious than just plain old artillery shells and such. No explanation is given as to why AI weaponry is so much worse than just lobbing a RPG at someone.. If an ally like Ukraine is using AI to target incoming missiles to support its air defence and for its own targeting, why is that a bad thing? It might actually save lives if it improves their air defence capability and makes their targeting more effective. It might shorten the war and in any case allies should have access to the means to defend themselves against one of the greatest threats to civilization of our time. If Ukraine is able to use autonomous weaponry to make up for its manpower deficiencies, then I do not see that as being a problem.
The distinction between AI and non-AI is dissolving anyway. For example, artillery shells can be networked to work cooperatively.
That does not mean that AI is always the right solution or even a working solution. It still needs to be treated with critical reasoning. There are plenty of sins to recount. It continues to occupy the place that ‘data’ did about ten years ago in the minds of venture capitalists, as some magic dust to sprinkle upon a business plan. It will never understand irony, which makes parsing British communications very difficult. A lot of these sins, however, lie in the credulity of the beholder. For me, the bigger problem lies in the human willingness to give up our autonomy, to the group or to a convenient technology or to the state, an NGO or trade union. AI is just one insidious way in which this can happen, and people can farm out significant choices to a system that allows them to pretend they have no choice at all. But there are many other systems that do that, that we need to be alert to.
It helps a scammer if the victim thinks they would never be the kind of person who falls for scams. Successful fraud depends on the fraudster generating compliance by imposing their definition of the situation on their target. Erving Goffman (1952) outlines the process of ‘cooling the mark out’ – ensuring the mark finds it harder to say ‘no’. He used the case of the fixed game. The mark is convinced that his new friends have developed a way of rigging betting odds in their favour. They might do this for example by saying they have advanced information of the winner of the horse race. Bets can be placed before others know.
The mark is convinced by placing a few low stakes beats and winning. He then has the opportunity to make a bigger investment. At which point the system no longer works. There might be a further attempt where the con artists convince him that he can win the money back with a further large investment. At this point the mark can be convinced of his need to recover his social status. He wants to recover not just his money but his sense that he is an individual who would not be victimised in this way. Goffman shows the ceremonial aspect of the final blow off: ‘An attempt is made to define the situation for the mark in a way that makes it easy for him to accept the inevitable and quietly go home. The mark is cooled out, given instruction in the philosophy of taking a loss.’ (Goffman, 1952). As Goffman portrays it, the fraud is aspirational. The mark is suckered in because he now has a chance to show his true inner self, to match his being to his self-concept.
The need to preserve one’s self-concept can be turned against the victim. A hybrid fraud is one that combines in person and remote elements. Charlotte Cowles (2024) recounts a victimisation that began one day with a call purporting to be from Amazon informing her of misuse of her account and ended with her throwing a shoebox containing $50,000 – most of her savings – into the back of an anonymous SUV. The scam used a compelling narrative to convince her she was the victim of identity theft and that as a result there were warrants out for her arrest. The only way for her to protect herself and her family was to comply. One of the scammers, claiming to be a CIA agent named ‘Michael Sarano’, told her ‘“If you talk to an attorney, I cannot help you anymore … You will be considered noncooperative. Your home will be raided, and your assets will be seized. You may be arrested. It’s your choice.” (Cowles, 2024). This was the only way to predict her money. Where Goffman’s scammers convinced the mark they were doing a lucrative wrong thing, these fraudsters convinced Cowles she was doing a protective right thing.
The hybrid fraud is hybrid in another sense. Goffman differentiated the con from white collar crime. A white collar criminal abuses position of trust. The conman is entirely invested in developing bonds with other people solely for misuse. The hybrid fraud combines elements of these two. It does not depend on the victim’s greed, put on their fear of status loss. This includes loss their freedom, as Cowles was threatened with.
If you are a victim of a complex fraud as Cowles was it might feel like it was a one off, custom designed for you. Typically though these are gangs running many attempts simultaneously. They use well-developed scripts which are designed to funnel potential marks into a fewer viable targets that can be worked on more intensely. Each contact point is a compliance moment. Accepting the initial call from ‘Amazon’, calling the person claiming to be from the FTC back. These are key moments where the person themselves is exercising their agency or feel themselves to be doing that. These are designed to ensure they think they are in charge.
The techniques Cowles were subject to are well familiar from studies of fraud scripts. In many ways they share a lot in common with abuse tactics. They make sure the target is isolated. In Cowles’ case she was alone at home, having dropped her young child at school. This also restricts their freedom. She can just walk away when she had someone to care for.
There is also gaslighting. The fraud creates a sense of unreality were the victim adopts the reality defined by the attacker. “It didn’t really feel like he was asking” as Cowles recounts. There is a process of boiling the frog slowly. Each step the victim takes move them into the world as defined by the fraud. Because of that they can end up doing something like hunting over a very large sum of money in cash all the oven in the world to complete stranger by the end of the day, something they would never do proposed without this intense psychological work being applied for in advance. A sense of crisis is created to lock the victim into handing their money over.
Goffman suggested part of the reason people comply is they are committed to repair work. We might not think of ourselves as they kind of people who are victimised in this way. We have a commitment to maintaining the situation, repairing our sense of self. Once the victim has outlived their usefulness, or has got wise to the scam, they are left to do this repair alone. The ceremonial element Goffman emphasised is gone. Sometimes the repair work sets them up for the next scam. Rather like how people respond to their interests being betrayed by a powerful figure they trust.
Cowles, Charlotte. 2024. ‘How I Fell for an Amazon Scam Call and Handed Over $50,000’. New York Magazine.
Goffman, Erving. 1952. ‘On Cooling the Mark out: Some Aspects of Adaptation to Failure’. Psychiatry 15(4):451–63.
Learn a totally new syntax to describe the problem again.
Okay, don’t follow those instructions, follow these.
No, you have to do this totally different thing first.
Yeah, it doesn’t work automatically. You have to change it from ‘not working mode’ to ‘working mode’.
Create a new user.
Uninstall it.
Uninstall it properly this time.
Uninstall the other thing stopping it working.
Did you Chown? Really Chown though.
Try downgrading.
Try ChatGPT.
Okay, ignore ChatGPT.
Did I do this before? I’m pretty sure I did this step already.
Am I in The Matrix?
Someone mentioned it in a forum! Change the config.
Where is the config? Found it.
No not that config, the other one.
These instructions work!
Sorry that stopped something else working.
Okay, you got it this time.
So far I have installed self hosting solutions for cloud file storage, photosharing, audio and other media – items I own or have created. Each step in selfhosting is a little step taking back part of my life. My thoughts, my music, my photos, now sitting in a little place of mine, which cannot be held in evidence, cancelled or correlated. A data self that is not owned.
But any attempt to show that or to have it guide us either destroys what we are, or turns us into technical servants or mouthpieces of other peoples’ ends.
If you want to see how that turns out, enjoy listening to Christian Rock. The culture of curiosity and the creativity needed to make it happen has to be independent of the utility, otherwise you create a dangerous feedback loop. It is similar to how AI works well because it is not based on AI. For now.
Or maybe what I have said is smug nonsense. Some great works were created with a purpose in mind such as Marx’s Capital or any artwork produced for the Borgias. In response I say these works all went beyond that limited praise function in some way which is why we remember them. Capitalists can get a lot from reading Capital. You do not have to be a fan of Rodrigo de Borja to like Pinturicchio. The fierce need to make sense of the world that drove Marx and Weber shines beyond the politics of their time and place.
Example: nudge theory is an implementation of behavioural economics that was fashionable in the 2010s and whose influence continues in the form of various behavioural politics that in the UK substitute for innovation. It is why in Scotland we cannot get 2 for 1 offers on alcohol. Nudge was tailor made for impact. Cheap, with an easy to grasp logic and easy to implement, nudge proposes that small changes to the choice architecture – the order choices are presented in, the wording of a question – can have socially beneficial outcomes. A common implementation is changing opt-in solutions to opt-out ones to increase involvement. It matches the design of everyday life to the limitations and naturalised inclinations of the brain revealed by neuroscience and behavioural economics.
Problem? It is either trivial, or it does not work in the terms it claims. For example a case usually quoted is shifting organ donation consent from opt-in to opt-out. The claims made for that skate over problems that we can expect. It is not a morally neutral choice, despite its claims. It only works with a lot of other work going on to support it, so it is not cost free. People adapt to the new environment. It is not a bad thing to remind everybody that solving problems takes work.
The approach also blunts our critical edge. Something sociologists have done is to highlight the irrationalities of apparently rational behaviour and especially of bureaucracies. Behavioural economics attributes irrationality and limited rationality to humans. Humans are construed as being the one kind of actor who is capable of acting against their own interests. However bureaucracies are quite capable of generating, and failing to recognise, massive irrationalities, counterproductive and damaging outcomes – and individuals’ apparently irrational behaviour might be grounded in perfectly comprehensible responses to bureaucratic irrationality.
The excitement of discover means you must prepare for disappointment. That wonderful hypothesis did not work out. But that is okay. Disappointment should be a creative moment, acting like a psychedelic does on the brain, forging new connections. The narrow sense of impact means distressing the data until the convenient answer is given.
Many grants have I reviewed, grasshopper. This blog post is meant to give some advice on how to frame a grant effectively so it appeals to reviewers.
The first point is to look for what data scientists call “Stop words”. Stop words in data science are terms that are not going to improve the quality of information filtering, and might just involve extra computing power being used to no purpose. Typically, short, common words, such as the or is are stop words. They are not going to tell you very much. We all do this when reading, filtering out the mind clogging fluff that writers insist on putting in there. All of queer theory, for example.
In any review process, stop words are those which cause our brains to malfunction and reject your proposal. ‘Exploratory’ is one. Do not use this word any grant proposal, because it just suggests that you have not really thought out what you are actually going to do. Exploratory is what you do before you begin your proposal. You will explore the context and the data and come up with some hypothesis which can be tested. Words like explore and its equivalents suggest you are asking the reviewer to skip over the fact that you have not really planned what you are going to be doing during the research. It says there is no structure to your investigation.
Other stop words are more specific to how they are used. There are a number of overused but under specified terms kicking around the social sciences. Intersectional is one. If you tell me you’re going to be doing intersectional research, I instantly look for what exactly you are going to be doing. Often people say they are doing intersectional research, but do not really say what that is going to involve beyond, say, looking at gender, race and social class in the same data space. ‘Intersectional’ implies more than that. It implies some kind of understanding of how these different dimensions work together in some way beyond the empirical. And this is the core issue. To be plausible that needs to be shown. If a grant is going to be intersectional then that has to be built into its purpose. Analogous problems arise with ‘data’ and ‘evidence’ and especially ‘evidence led’.
The next point is more of the same. What we are looking for is how each element of the proposal works together. Theory, method, data and the team. This is the “show not tell” part. People spend a lot of time justifying why this topic matters. They then skimp over what the activity will be. Sometimes a method is named and described. But saying you are going to apply a method is not enough. What we need to know is how that method is going to be applied and how that will lead to some really nice, relevant findings. That is the “stuff”.
Think of this as all the activity that is not just taking place in your head. That is what is worth paying you for. You are a clever person and a scholar. You can do lots of work in your head. The work that is worth paying more for or paying someone else to do on your behalf such as a research assistant is what we are going to be looking for. What specific activity is going to be done in the field or with the data that relates to your driving research, puzzle or hypothesis? What constructs are going to be developed and tested? How will you know that what you are looking at is what you are looking for? What conversations are taking place about this in different venues or to different audiences? How does that help develop and elaborate on your purpose?
There are lots of ways in which that can happen. It does not have to be specifically empirical. And in fact, another error is the opposite one to what I have described above. It is an over specified grant which is just going to show what it is going to show and nothing more. The intellectual buzz is missing. Theorising, conceptual work, definitional work, examining the terms of particular disputes, this is all part of the fun. It can be outlined in a well specified way that still needs lots of room for the intellectual creativity that you want. To help with that come back to what you add as a scholar with particular ways of thinking about the issues which bring insight.
The step from looking at to looking for is what takes us from. “I am going to sit around and cogitate” to “this work will have specific direction and purpose”. That direction and purpose is key to a really compelling proposal that I am going to love. It is really effective when that excitement is coming off the page. When you give the reviewer a sense that you cannot wait to start work on this topic.
As as an example here is a grant that I produced with my colleague Irene Rafanell. We started with the purpose:
Relevance: This project examines the structuring of cybercrime as a set of knowledgeable, interactional enterprises using data collected from darknet cryptomarkets, which are sites for the sale of illicit goods and services, largely illicit drugs. It combines the fields of big data analytics, social theory and digital sociology. This is a growing area for research as crime continues to shift to online environments. Developing expertise and applicable, high impact findings in this area will demonstrate Scotland’s academic leadership in the field and contribute to the development of further research in this area.
It was for Carnegie hence the strategic “Scotland” thrown into the mix.
Then we went into the background. That took one paragraph. We then showed aims and questions:
Aims: 1. Understand the structure of interaction and knowledge exchange in a set of illicit online marketplaces. 2. Develop a theoretical framework which can be applied to different online criminal marketplaces. 3. Produce several journal articles covering the theoretical, methodological and practical implications of the project. Questions: 1. How do individuals engaged in illegal activity develop their own practices, beliefs and behaviour in and through online information exchanges. 2. What co-operative dynamics are present and created via interactive online exchanges. 3. What etiquettes typify these exchanges such as ‘chatiquete’ and rules of online communication. 4. How are norms and sanctioning of norm-violation maintained and enforced
Then we went very quickly into what that would actually be done (mostly Irene here).
A framework for interaction analysis would be developed using the following coding themes: Structuring – investigating the claims that group members make on ‘outsiders’ and the extent to which group formation may be a response to ‘pressure’ from outsiders; Investigating the communication interaction – frequent or infrequent interactions, who becomes legitimised, praised, silenced, ostracised, etc.; investigating what aspects constitute the ‘shared’ culture that facilitate such interactions. Sanctioning – investigating how the individuals of the group sanction each other and what conditions favour such activity – that is, responses from others to individual posts; Investigating the existence of clear ‘evaluations’ to fellow members and the rejection of the ‘good’ opinions of outsiders as a signifiers of group membership. Norming – Investigating the formation of distinctive ‘life-styles’ (shared or distinctive language which confines communicative interaction to group members sharing such ‘life-styles’) investigating if there exist, and how it emerges, a sense of members granting of ‘special’ honour of being a member of the group (status group membership granted via ‘codes of status’ in relation to attitudes, practices and knowledge about drugs intake and harm reduction practices.
And so on. I think it was this sense of a confined but achievable project that won the day. Looking back on it what was fruitful was that the method was clearly in service of our thinking. The reason I chose this project is that it stems from a theoretical purpose, drawing on interactional sociology. And also because I happen to love it and so the project has led to many interesting further works, such as an article examining emotional regulation in cybercrime communities.
There has been a lot of recent conversation about radicalisation through different forms. Mumsnet has been blamed for radicalising its participants. There is an implied theory of change here. It is that radicalisation works something like environmental exposure. Radicalisation is like pollution in the info sphere. Exposure to small doses leads to exposure much bigger doses. I am cagey about this, because when you strip out the content, a lot of the concern aboutlooks like concerns about communist influence in the Cold War era. We would recognise that people involved in the communist parties in Europe were often motivated by socially desirable goals, even as they support a totalitarian movement set on destroying everything we hold dear.
There are some well rehearsed problems with that. For one, it tends to downplay agency. Another is that it is content free in theory, but not in practice. So, in theory, it does not consider what attracts people in, or why they might consider the particular goals of the radicalised movement to be ones that speak to them. In practice, however when we look at what topics are focused on as problems of radicalisation it is clear we are being very selective about them. I do not think that is entirely helpful because we really need to be explicit about the qualities that we are concerned about. We also need to understand a lot more about what motivates people and what they think they are doing when they participate in radicalised activity. Writing it off as “hate“ does not really grasp what is going on.
There are some background assumptions that people who supporting populist movements or disappear into conspiracies, are clearly wrong. So obviously wrong that we do not really need to talk about the content of what they believe. We should be doing that even from as simple idea sphere perspective. We would want to examine how these‘s ideas, evolve and are coherent in some sense. and we should examine if they are true, or reasonable. Now fair enough, I do not think that Donald Trump is really fighting a paedophile conspiracy. But I do think is a reasonable question to ask if Covid lockdowns were a proportionate response, and if they were successful in their own terms.
The point being, you’re not going to oppose these ideas very well if you do not recognise their nature. What I want to say, here is that radicalisation is an aspect of quite a natural process of self development. You see something wrong with an idea. No one in your tribe or team is talking about it. So you look elsewhere for people who are doing that. When you join them, what they are saying, makes more sense than others. I would call that self-discovery or evolution not radicalisation. A QAnon person is moving into a new state of being. The attraction is that you think they have the goods on everyone else. That justifies the frequent isolation that is involved, and which causes distress to their loved ones. What follows from that is radicalisation is about desire. As MacDougall (2018) shows, a burning need for justice and sensitivity to injustice and status can drive people forward. As we would recognise from long experience with various social movements, people can use it desire for social justice as a way of obtaining personal status.
Macdougall, Alex I., et al. “Different strokes for different folks: The role of psychological needs and other risk factors in early radicalisation.” International Journal of Developmental Science12.1-2 (2018): 37-50.
Tech doesn’t kill people, over capitalised techbros kill people.
We are in the tail end of the AI hype/panic cycle. We are all well beyond noting that LLMs can reproduce human failings. It is vital that if we are to use a tool like ChatGPT or any generative AI to note some assumptions or myths that go along with it. These are:
The assumption of neutrality (responses do not reflect an identifiable ideology)
The assumption of ethics (response are tailored to do no harm, for example, not affirming suicidal ideation)
The assumption of stability (answers are consistent)
The assumption of competence and understanding (responses draw on a curated store of human knowledge and it will not for example misadvise on an interlocutor’s rights and liabilities)
The conversational assumption (interactions are private and responsive).
Underlying that is an anthropomorphic bias. On both sides, techno panic and technical love, there is a tendency to impute anthropomorphised qualities or to get frustrated when those qualities are not there. When the machine reveals itself as it is, not as we were all like it. Personally I prefer it when the machine is clearly a machine, clearly a tool that I can use. What I mean by a tool is a system with clearly defined characteristics that are reasonably predictable. I found it much better to use AI as a device in that way. So even if I use it as my robot companion at least I know what it is being used for. If I use it to create a digest of reports on a topic and I know its limits and that is an effective use case. Any critical perspective on technology is going to have to interrogate these assumptions. But that also means interrogating the reverse. For example any assumption that particular technology is inherently harmful.