Abstract
The Net interprets censorship as damage and routes around it. (Jon Gilmore, founder of the Electronic Frontier Foundation)
Con-text
Ten days before Turkish local elections, on 20 March 2014, PM Tayyip Erdogan blocked access to Twitter: allegations of Erdogan's corruption had circulated on the social media platform, receiving little notice outside Turkey. This dramatically changed when they eventually tried to stop people from tweeting altogether. Mr Erdogan firstly deployed a well-known discourse around social media as ‘bad', since they can corrupt people's morality.
1
This is a strategy of placing media outside the sacred sphere: social media in particular, with their inherently global audience, resemble a foreign invasion tearing apart the fabric of society.
2
The blockage on Twitter began [at] circa 11 pm. All of a sudden users started to talk about how some of their friends couldn't log in on Twitter. After a couple [of] hours I also couldn't log in, so I followed the news on my Facebook timeline. (Online interview)
The paper narrates this Internet censorship attempt and its circumvention, following two main leads. Drawing from diverse data points, I first suggest that the combination of denial of service, social media practices and hackers' intervention started a learning curve in people being affected by the ban. A certain degree of users' reflexivity and the resulting repository of technological expertise are crucial to the workings of a ‘hacking multitude'. In the first instance, ‘multitude' is intended as a mass of ordinary Internet users whose daily media practices,
The second reflection this paper wants to start is around the implications that a potential generalization of hacking practices might have for the political, cultural or economic processes more directly associated with Big Data. My initial findings show that new social and material assemblages started producing data over and
In order to grasp the complexity of this emerging media system, which has not a single entity responsible for it nor is it simply imposed from above, I draw on Fuller's reworking of the term ‘ecology': a ‘massive and dynamic interrelation of processes and objects, beings and things, patterns and matter' (Fuller, 2005: 2). To understand the multi-layered, non-linear, unfolding of media ecologies, Fuller suggests attending to the liveness of the event, to participate in the interactions of these systems ‘with no control sample'. Partly, the events narrated here are an attempt to bring this process alive. The story unfolds using tweets and photographs as they became available on Twitter during a massive stand against censorship, which I followed throughout. My narrative juxtaposes moments of mediatic synthesis, made of Big Data configurations, and some ‘basic practices of how people construct the social and cultural world' (Couldry, 2012: 137). These practices are generally hidden in aggregate statistics, but they become more intense under the magnifying lens of digital ethnography.
In the second part of the paper, I integrate online data with online interviews of Turkish Twitter users. I haven't been directly involved in the observation of the Turkish protests from the streets. 3 However, I managed to reach some protagonists of the events I narrate, thanks to intense snowballing, following and negotiations on the terms of our online interaction (e.g. encrypted conversations), through specific mailing lists, social media and forums. These interviews therefore contain for me a wealth of details and perspectives from the ‘field'. 4
In the end, I develop the concept of a ‘hacking multitude'. I argue that basic practices of hackerdom and their potential recurrence in the economies of digital information can become, at least temporarily, crucial elements in the architecture of the Internet. Ultimately, they can change the morphology of data itself. In so doing, a social process of collaboration, learning and reflexivity starts appearing, at least with regard to contestation of Internet access.
This article focuses on Turkey because, differently from many other countries that experienced the so-called ‘Web 2.0 Revolutions’, it has a potential critical mass of users where digital devices and social media platforms are part of many people's everyday life. Turkey ranks 4th in number of Facebook members and 11th in terms of Twitter users: the exponential increase in social media users is also due to traditional media being heavily centralised and censored (Furman, forthcoming). Twitter became popular in Turkey on the wave of #OccupyGeziPark uprising: TV and other media did not cover the events: mobile phones became the TV, photos were published on Twitter and other websites. Citizen journalism became the de facto news agency for all. (Online interview)
An evaluation of the effects of digital insurgency on the Turkish political landscape is beyond the scope of this paper. There are, however, some open questions, particularly during transformative moments, around how data is made manifest to us and the processes that make this data possible. How is the morphology of digital data being changed by the evolving political landscape? To what extent can a generalised form of digital disobedience effectively change the consistency and relevance of Big Data, such as Twitter traffic analysis or grouping by hashtag? Moreover, what configurations would users form in relation to their online privacy and their right to use the Internet in a scenario of state surveillance? What kind of social alliances are forged during circumvention of Internet censorship? According to De Landa, our ‘mathematical technology' was always incapable of modelling self-organising phenomena: ‘non-linearities were eliminated as much as possible from mathematical models, making non-linear effects like chaos “invisible”' (De Landa in Crary and Kwinter, 1992: 133). An analysis of multiple data points, such as tweets, photographs and interviews, rather allows the fine grain of a social process, which the very notion of ‘data flow' hides, to come alive.
Governments, such as Egypt, China or Pakistan, generally have had good or modest results in implementing Internet censorship (Deibert, 2009, 2012), but its impact on protests is ultimately uncertain. Censorship attempts are incomplete and evolving too: in Turkey, for instance, tougher measures are now being introduced, involving controversial spying software and more centralised administration of the Internet. 6 There are more dedicated studies on this matter (e.g. Deibert, 2009, 2012), but I want to flag up governments' adoption of paid ‘trolls' in order to shift public opinion on social media. 7 In my view, this is a sign that censorship and filtering alone, although on a massive scale, cannot address the full dynamism of media ecologies of digital communication. Governments too need media practices, they need to play on the same ground of, and in fact they hack, the ‘hacking multitude'.
Materialities
I will now start unfolding the ecology around the ‘digital coup'. This is made of institutional constraints, which I sketched in the introductory section, Big Data representations, discussed in the next section, and materialities. A focus on materialities – as both media practices and physical infrastructures – not only demonstrates that data does not simply flow at a push of a button but also shows how social space comes alive in the choke-points of such a ‘flow'.
Initially, the Twitter ban in Turkey was a simple block at domain level. Domain Name Service (DNS) is a distributed and hierarchical system which translates human readable hostnames (www.twitter.com) into the numeric IP address required to resolve that request (for instance, 204.71.177.71).
8
DNS is a sort of phone book of the Internet, which indexes IP addresses for website. Unlike a phone book, DNS can be quickly updated, allowing a service's location on the network to change without affecting end users, who continue to use the same host name. DNS is organised in a hierarchical fashion with 13 very powerful root name servers at the top level. ‘Copies' of these super-servers are distributed worldwide via a network addressing and routing methodology which sends requests to the topologically nearest node in a group of potential receivers. This has accelerated a decentralised service, with the deployment of
‘Self-healing' is a relevant concept here. If any regional server is affected by outage or block, the whole traffic can be re-routed to the nearest (physical) location. In this configuration, the Internet is typically represented as a complex ‘network of networks': The block was simply directing users to a web page which said ‘Twitter is banned via jurisdiction', which was not. Telecom companies adjusted their DNS servers in order to advertise that page as Twitter. Many people switched DNS servers. (Online interview)
Material practices and non-humans are constitutive parts of Internet ecologies. They produce digital data via their relentless labour. They are the network too, part of the everyday context in which networks operate. I will discuss practices in the second part of the paper, with lots of details and stories that came out from my online interviews with some Turkish tweeps. Materials make the main argument of this section: a physical architecture of the Net starts to appear. This has been unveiled by the very block that meant to make it unavailable to the wider public in the first place.
Observers' eyes were by now set on any statistical indicators that could capture what was going on in Turkey: How successful was the block? Did traffic reveal an adequate response from users?
Big numbers
I now discuss some metrics around the popularity of Twitter in Turkey and around Twitter hashtags that were trending during the ‘digital coup'.
9
I present below two groups of quantitative indicators, as they became available during the period of observation.
Hours after the attempt at blocking Twitter, news grew under the headline/hashtag: #TwitterisBlockedinTurkey, and similar. The infographic below was circulated over 4000 times (considering only direct re-tweets) on the same day Occupy Wall Street NYC produced it.
Part of the online world seemed to identify themselves with Twitter users being blocked in Turkey, while Turkish users became aware of being ‘trending' on the platform. Infographics' powerful message is to sample and aggregate large swathes of users and to make representations speak for an imagined community of people. They are not just aesthetically appealing forms of visualisation of often dry data. Digital communication fabricates data, but data enacts ‘people'. It creates instances of ontological consistency of a subject (Ruppert, 2011). In this sense, hashtags are powerful forms of aggregation, although they are rather weak for measuring belonging. The crucial thing is that Twitter transforms grouping by hashtags into ‘trends', by the way of publishing metrics on their popularity. Trend is per se a piece of information insomuch as it circulates on more traditional media, which monitor Twitter metrics as an approximation of the interest in a certain subject. Communication therefore becomes data, which is turned into information: a circular repetition of the same. Traffic analysis from diverse sources suggested that restrictions had failed to stop digital insurgency against censorship. Mikko Hypponen, Chief Researcher at F-Secure,
10
shared a graph which shows an increase of 138% on the volume of tweets from Turkey in the immediate hours after the ban: this is equivalent to ‘some 17,000 tweets every minute'.
11
Looking at some indirect indicators, there are reasons to believe that a vast part of the contribution to the trend on the social platform was coming from Turkey itself. Twitter’s popularity in Turkey is generally very high. Turkish is ranked as the eighth language spoken on the social media platform, accounting for the 2% of all tweets exchanged globally (Leetaru et al., 2013); the Turkish president, Abdullah Gul, who famously tweeted after the ban imposed by his government, is ranked third in the league of Twitter followers among world leaders (with a staggering 4.2 million followers) 12 ; with a percentage of Twitter users higher than the US (79% vs. 73%), Turkish tweeps are at the top of the world chart. 13
Despite providing a useful entry point in the discussion of online censorship, traffic analysis does not reveal the complexities of how data is generated in transformative moments. Big Data analysis gives the impression that measures to circumvent the block had spread fast, reflecting a more generalised political opposition in Turkey. My contention is that new social and material assemblages were conditioning – and were in turn conditioned by – this new data flow, in a dialectical and non-linear manner. While the paper does not specifically investigate what this meant for Turkish society and its changing political landscape, it attempts to foreground traces of this generative social space made invisible in aggregate analysis.
Small numbers
In order to capture this emerging process, we need to equip ourselves with other tools. I first build on my direct engagement as an active tweep during the events I narrate here. Drawing on the anthropological scholarship emerging in response to the Internet (Hine, 2000, 2013; Underberg, 2013), I use digital ethnography with discourse/content analysis of: tweets, photographs circulated on the platform, and links included in tweets (few thousands overall). I then circulated my research blurb on mailing lists and social networks, managing to interview some Turkish Twitter users who actively took part in the events. 14 These interviews are therefore direct accounts from the ‘field', the social space between the Turkish block of Twitter and users' attempts to circumvent such censorship.
‘Digital ethnography' is here intended as a method with multiple data points to allow for immersion in the experience of another culture (Underberg, 2013), a protest culture in this case. Digital ethnographers' toolkit to study the Internet evolves with every setting, kind of data, subject and site, as these become available or useful to her: ‘Unlike big data studies which often aggregate data across single platforms, ethnography can explore how events in one place are made meaningful, in surprising and contingent ways, in another’ (Hine, 2013). While digital ethnography helps the researcher to connect with the ‘field' under observation, sociological discourse analysis allows imagination and reciprocity between otherwise seemingly distinct realities, the virtual and the actual. Discourse analysis in digital ethnography explores the way in which accounts are made convincing while maintaining the critical distance of the ethnographer. At the same time, ‘the analyst presents herself as a competent cultural member', adding validity to the set of data collected (Hine, 2000: 143).
The relation between what appears to happen online – increasingly conveyed by Big Data metrics (number of followers, friends, likes, shares, etc.) – and how social life is constructed everyday – undeniable domain of ethnographic tradition – is a tricky balance in digital ethnography. It requires attending to both detailed online observation and to the awareness that most of this material is already present as digital data. In the next section, I try to foreground the social space around the Twitter ban. This ‘social' emerges in a contingent process of Internet surveillance from a nation state and spreads through streets and digital media, in the context of daily engagement with communication technology, production of digital data and political opposition.
Re-text
By now, the problem became how to communicate alternative DNS numbers and instructions to Turkish people who were unable to connect to Twitter in the first place. The info [about DNS] was My friends and colleagues asked me if I could access YouTube and/or Google, and also how to do it. I helped them to change settings. The advice rapidly spread far and wide Google DNS servers were written on walls and leaflets. (Online interview) Q: How wide spread was the attempt to reconnect to Twitter? A: It was very widespread, everyone wanted to do it, even my mum. People were putting DNS numbers on their windows. (Skype interview)
Photographs that circulated on Twitter help to render this climate of growing awareness around Internet freedom.
It is a contention of visual sociology scholars that photographs give texture to place and help to strengthen arguments (Knowles and Sweetman, 2004). Maybe because they carry and reproduce a reservoir of affective responses (Terranova, 2004). They are compressed, edited, aligned with text, they irremediably become ‘poor images’: ‘The poor image is a copy in motion. Its quality is bad, its resolution substandard. As it accelerates, it deteriorates’ (Steyerl, 2009). Large numbers of photographs started circulating on Twitter and other media, becoming a phenomenon in itself. Photographs are digital data too, a combination of pixels and bits. They, however, need to be emphasised, since they disappear from view when aggregated in trending hashtags. Photographs are important because they evoke context: specific people, places or events. They provide a sort of ‘existence proof', a reminder of people in ‘flesh and blood' (Becker, 2002). I would argue that this material dimension is somehow lost in Big Data analysis.
I selected some photographs from the usual deluge of Twitter data, while following live the ‘digital coup' in Turkey. They are presented here as episodic vignettes, exactly like ethnographers would use extracts of long interviews, or a network analyst would isolate particular tweets out of thousands. Triangulated with other data, they will hopefully give the reader a heuristic grasp on this composite scenario: a banknote, 10 Turkish Liras, with the Google alpha-numeric inscription; a restaurant menu outside an al-fresco patio, with iPhone and Google DNS instructions; a few citizens gathering around a poster which explains how to re-connect to Twitter.
I find this latest photo particularly helpful in revealing what a ‘hacking multitude' might be and how it might operate. This is for three reasons.
15
First, the photograph speaks of a localised protest, in Istanbul here and now: it immediately gives the
Finally, the photograph reminds us of the
After failing to adopt pressure directly on Twitter, which appeared to stand for the ‘freedom of speech',
17
the Turkish government managed to block requests negotiated via Google-owned or any other public DNS. Similar to what happens in China,
18
they heightened the level of censorship, moving the block to IP level. There are few ways of doing this, but such a discussion is beyond the scope of this article. The important thing is that public DNS was now not effective, because no Internet Service Provider in Turkey could reach Twitter by IP address any longer. When Turkey managed to block Twitter at IP level, more articulated responses became necessary in order to avoid the ban. Crucially, these had to be learned. VPN time! (tweet)
The hacking game
I will now briefly explain the functioning of VPN and TOR, emphasising first their popularity and then social aspects around their implementation.
Virtual Private Network means that a user can securely connect to a computer by using a technique called ‘tunnelling’. The VPN client communicates over the public Internet and sends the computer traffic through an encrypted connection to a VPN server. Using this connection, VPN customers can securely access the Internet from their remote device, bypassing any filtering included in their Internet Service Provider's policy. VPNs are usually offered as a pay-per service, so trust is regulated by the terms of provision of such a service. Therefore, there are a few drawbacks in this method: reliance on private traffic, difficulties in setting up secure client–server connections and security flaws (e.g. institutional controls on the provider).
TOR, The Onion Router, is both a free software and an open network that help users stay anonymous and defend themselves against traffic analysis.
19
TOR bounces signal
TOR shreds to pieces the idea that the Net is controllable in any single nation. It is not secure, but it is anonymous. VPN is not anonymous, but it is probably more secure (if you trust the service provider). To put it bluntly, while VPN is a solution favoured by business (it is a paid-for service, after all), TOR is the obvious choice of ‘hackers' (it is Free and Open Source, in fact). Most of my interviewees had embraced VPN as their favourite method for going online, and they generally reported a hassle-free experience. Importantly, none of them had ever used such tools before. I decided to download VPN Unlimited on my Android phone. It was easy to operate and didn't seem to cause too much speed or reliability issues. Actually it was pretty easy. Through my friends' advices I downloaded two VPN applications to my mobile phone. (online interviews) I currently use an open DNS number and have access to blocked sites,
23
but I'm considering to buy a yearly plan on TunnelBear [VPN] In case of any future blockage Q: Are you going to use VPN again? A: Q: Will you use TOR again? A: Still running and will do! Q: What's your experience? A: Experience?
TOR actually works. It is in fact easy to set up as a relay, in a way that users can share their bandwidth with the anonymous network. It is even easier if a user wants to just access the network without hosting any part of it, by installing a modified version of Firefox called TOR Browser Bundle, TBB. TBB is fool proof. It is easy to use. No need to install and configure software as TBB is ready to run. So many people began to switch to TOR or TBB. It was Twitter, forums and Bulletin Board Systems that made TOR famous. TBB was the key for its adoption. (Online interview) I worry about the population's huge percentage who does not know English. I kindly request a TOR browser pack in Turkish language for this. I hope The hack is no longer the exclusive act of the hacker. When we make a web mash-up, a music or video remix … we are also part of a blurring of the lines between hackers and everyone else … We are all hackers now. (Alleyne, 2011: 25)
At times this collaboration becomes more manifest in spaces of the everyday. My main participant from the TOR-talk mailing list, who defines themselves as a ‘help desk, system and network administrator', narrates this vivid account of his progressive involvement in the Turkish events: … The majority were Twitter users
Following the new hashtag #GoogleDNSisBlockedinTurkey, my narrative of a ‘hacking multitude' became clearer by the hour. It was supported by an increasing frequency of reflexive comments regarding the weird game being staged live on the Internet. Every Turkish citizen has become some kind of Internet expert/amateur hacker after the ban. (tweet, Istanbul) [The] whole Turkey will be computer geeks:) (tweet, Istanbul) I checked my personal and company Twitter accounts' newfeeds. Although it was like a ghost town after a couple of days, we decided to continue to tweet from the company's official account. (Online interview)
Towards a ‘hacking multitude'? Two propositions
My preliminary findings around Internet censorship in Turkey show that an There is a solid argument in cultural studies around the ubiquitous presence of software in everyday aspects of our lives (Kitchin, 2011). This presents a whole set of issues around power (Lash, in Beer, 2009), surveillance (Lyon, 2014) and production of value. Differently from traditional media audiences (TV, radio and papers), social media consumers are in fact also producers of data. We routinely share, tag, like and comment, so contributing to Big Data metrics. These actions are almost automatic, they have become part of daily routines, they maintain the flow, both as data and as practices of ‘evil media' (Fuller, 2012: 171). In other terms, most uses of the Internet now involve some kind of ‘prosumption', a form of free labour in the production of data (Fuchs, 2014; Hardt and Negri, 2000; Lazzarato, 2002; Terranova, 2000). But, what happens when there is a disruption to everyday production/consumption of data, such as a censorship attempt? To what extent is a ‘hacking multitude' able to disrupt, change, or maintain data flow? And how is the concept of ‘flow' in itself useful when set against non-linear and unpredictable processes of techno-tweaking? This opens to a second tenet. If digital labour implicates a social process of learning, a sort of ‘geological stratum' of technological knowledge (Hardt and Negri, 2000: 29), hacking can be imagined as a sort of Whenever they ban something, we learn something new. (tweet, Istanbul) Everyone has to learn now about VPN, DNS, and how [the] Internet works. (tweet, Istanbul) It feels like fighting against Agent Smiths in [the] Matrix movie. (tweet, Istanbul)
Concluding remarks
In trying to make sense of what happened in the Twitter-sphere when the Turkish government blocked access to the platform, I started looking at some Big Data metrics. These are in the form of infographics and statistics on Twitter traffic and trends. A solely quantitative analysis of Twitter data would give the impression that data flows seamlessly. But at a closer analysis, I would argue that the metaphor of ‘flow' does not capture the immaterial forms of digital communication,
Censorship in Turkey gave space to a diffuse response that moved beyond the technological, what I try to capture with the concept of a ‘hacking multitude'. The battle for presence on Twitter filtered down to inventive publics that probably had little to do with microblogging. Graffiti, banknotes, restaurant boards and so on were more than the circulation of a piece of information; they appear to be a legitimising stance towards Internet freedom. Although difficult to quantify in metrics of traffic, this social space cannot be neglected.
The composite scenario I engaged with suggests that there is a social, sensorial and affective dimension to the way in which we produce, defend ourselves from, or consume, the deluge of digital data. This dimension is emergent, plural and unstable, like data itself. Ruppert et al. argue that ‘digital data is itself a materiality that is “alive,” embodied and mobile', it actualises ‘relations and connections that are otherwise beyond perception and thus inherent to the very imagining of social relations' (2013: 28). This means that attaining to data meaningfulness is a trans-disciplinary effort, beyond the statistical analysis of its occurrence. In the second part of the paper, I focused on individual responses by way of analysing some tweets, photographs and the content of online interviews. Digital ethnography and sociological discourse analysis are the methods I use to try to capture this media ecology made of pixels, tweets, censorship, algorithms, bits and devices, but also of feelings, skills and frustrated attempts. This methodological approach attains to the particular and, therefore, to Small Data.
Working across – rather than simply mixing – quantitative and qualitative methods,
28
I started a reflection on an evolving scenario. The good thing about powerful visualisations, such as infographics, is the heuristic impression they give of a growing, and otherwise hardly accountable, exchange network (Ruppert et al., 2013: 36). However, it is the granularity of data itself, its particular composition and diversity, which makes visible ordinary users' reactions. A ‘multitude', in my focus. Within this varied ensemble of data, a privileged place belongs to photographs circulated by Turkish Twitter users. Photographs make explicit the interconnections between Big Data (in this case, tweets, trends and hashtags) and other communication systems (in this case, graffiti, banknotes, other social media and leaflets). These interconnections are performed in spaces of the everyday and possibly loaded with affect.
29
They are ‘the social'. However, they are invisible in aggregate metrics of flow.
In the final part of the paper, I sketched the contours of what I emphatically called a ‘hacking multitude'. This idea nests on a more general argument on Internet freedom. Deibert (2012: 17) calls the current stage of Internet relations ‘Access Contested', pointing to a ‘patchwork of competing interests and values' which will eventually define the Internet of the future. Similar to my argument, he talks of a ‘multitude of actors'. Differently, he privileges institutional actors with a stake in cyberspace policies and practices on either side of the coin. These include giant corporations, civil society groups and ‘public opinion'. It is in this novel reconfiguration of cyberspace that we need to set localised actions of ordinary people, such as forms of encryption or bandwidth sharing. These practices might look ingenuous. However, they form a sort of collective repository of a multitude that, creatively and opportunistically, reacts to censorship and surveillance of the Internet. They naively expose how this communication and data creation system is open to modification.
