Our time to sunset.

For over six years, Hacking//Hustling has worked to build the capacity of sex workers and survivors to create new technologies and interventions that increase safety. Through programming, research, and convenings, we worked to explode the definition of technology to include harm reduction strategies, mutual aid, organizing, art, and any/all tools sex workers and survivors develop to mitigate state, workplace, and interpersonal violence. Through our interventions in the academy, hustling institutions, moving resources, and creating space to lean deeply into community care, Hacking//Hustling has leveraged its connection to tech spaces to support the safety and survival of people who trade sex. 

Hacking//Hustling formed in 2018 as a community response to FOSTA-SESTA and the shuttering of Backpage. We grew into a network of sex workers, survivors, and accomplices working to redefine technologies toward uplifting survival strategies that build safety without prisons or policing. Born out of crisis organizing, we have spent the past few years learning to value slowing down and prioritizing care. We have prioritized rest, and recovery โ€“and finding out, continuously, what these words look like in practice. With this space, we have continued to show up as our full selves, focus on healing and made the intentional and thoughtful decision that the time has come to sunset Hacking//Hustling.

This is a difficult letter to compose, not only because when chapters come to a close thereโ€™s a grieving and sadness that can come with that, but because thereโ€™s been so much work and struggle by us and our extended communities over these years that it is overwhelming to try and hold. So we wonโ€™t try that here. Instead, we want to express our gratitude, collective love and rage.

We have, like so many sex worker-led and radical organizations, struggled amidst criminalization and crisis. We already know about mutual aid and care, but we had to significantly pivot when the COVID-19 pandemic hit. Six years after forming, our core collective members are graduating from PhD programs, pursuing new careers, fellowships, and acclimating to increased disability. Life moves, and capacity changes. Our goal with Hacking//Hustling was always to disrupt institutions, and part of that is knowing when to sunset, allow the work to take other forms, and support each other in new life pursuits. 

It would not be possible to fully reflect here on all of the labor, the principles we moved with, the strategy and tactics weโ€™ve experimented with, and the ways weโ€™ve held each other. Instead, we hope our many communities will help us do this, in comments, in messages, in conversation with each other, in the ways you all may continue to call upon zines, toolkits, recorded workshops, art weโ€™ve shared, and all the ways we will continue to carry lessons learned forward.  

We have seen and felt major changes. From shifts in popular media such as sex work and photos of sex workers protesting accompanying news articles more often than the word โ€œprostituteโ€ and diembodied leg photos, more sex worker research getting funded, fellowships, community-made media, new survivor-led mental health efforts, platforms reaching out for sex worker compentent consultancy, sex worker art and theoretical writing, new tech workaroundsโ€“ a chorus of hopes and vision โ€“ and so much was learned together. so much work we admire at the intersection of sex work and tech is being held and brought into being by these (and of course more) comrades! 

As we reflect on our years of work, we produced some of the first research on the impact of FOSTA-SESTA, hosted a sex worker led convening at Harvard, a seven day conference, Sex Workers Organizing Against Barriers at Cornell, piloted a Formerly Incarcerated Sex Worker Tech Support program, hosted community calls and digital and legal literacy workshops to break down shitty tech policy, produced programming on the history of sex work and technology, and most importantly, do our best to get sex workers paidโ€ฆin cash. But what we are most proud of is how we consistently have shown up for each other, prioritized community care, and moved at the speed of trust and capacity.

A community organization should not be a capitalist formation that is always seeking expansion in the name of expansion, and at the expense and exploitation of its members. Hacking//Hustling has created community, a body of work, and a space for disparate projects to be housed. We can create these spaces while remembering that ultimately those spaces exist for and are made up of people, and that there will come a time for that work to transform and iterate. The act of sunsetting prioritizes people over institutions and organizations. Sunsetting is a reminder of the values of our non-productive labor time, and ultimately our health, our joy, our value without titles. Sunsetting is a reminder that we cannot work without rest.

But we know that work never ends when an organization sunsets. It ripples outward, with people taking lessons learned into other formations and projects. We encourage everyone to follow Data 4 Black Lives, Digital Defense Fund, T4Tech, Decoding Stigma, Kink Out, Safer Movements Collective, the Support Ho(s)e Collective, and Veil Machine and continue making space for cross-movement conversations, and skill sharing across causes for bodily autonomy. Our Struggles are interconnected and our freedom is bound up in one anotherโ€™s. 

Our website (as well as our Instagram and Twitter) will remain a living archive of resources, research and creative projects. We hope it will continue to be useful, and support ongoing sex worker-led liberatory work. You may even see a few in-progress efforts shared out over the next year or so.ย 

We wish to extend immense gratitude to our many communitiesโ€“our fierce abortionists, our trans tech hacker family, sex working/trading/hustling co-conspirators, our incarcerated comrade-teachers, and so so many more.

This work would not have been possible without, and in spite of, the sex trades. Our labor, community labor, whore labor, moves mountains. And while a major accomplishment for us was securing modest funding from two endowments that have never before funded US sex worker organizing, the majority of our funding has come from our own labor in the sex trades.

Donna|Dante, an organizer with the Support Ho(s)e Collective, shared these words during a reflection and visioning session we held last year, about a pilot program we co-created: โ€œI collaborated in SxHx with the Formerly Incarcerated Worker Support Program, doing that work around several other jobs, alongside others who believed in supporting people transition from prison. An entire group of people saw to compensation for my skill sets, saw my skills as valuable, my dream of being valued for my carework wasnโ€™t just a dream, it really helped with my mental health at that time. It was really special to me, given my experiences with incarceration, this was pivotal and helpful for me. I was part of something bigger than myself.โ€

Our longtime collaborator, Lorelei Lee shared, โ€œA place where my work is taken seriously, and that Iโ€™m taken seriously. Itโ€™s like, I always got angry at being called stupid & having that be assumed – that stigma that all sex workers are stupid. And the affirmation of being seen as smart, capable, serious – my whole life I was waiting to get that affirmation from civilians, but of course that never felt like a real part of my identity until whores reflected that back to me. We are essentially a school. If you ever take an art class, they talk about the new york school— itโ€™s just group of people who get together and do work they feel is important, citation to each other, sex worker writing, data, created research, organizations, it is intentional. We have done that intentionally, built this collective way of imagining, creating out of imagining, elevating each other all together.โ€ 

One of our founders, Blunt, has said, โ€œCommunity is the technology we need to invest in.โ€ As our work evolves into other forms, we remain consistent in our call for abolition, in the here, in the now of us. 

HACKING//HUSTLING & COMRADES FROM Rร‰EWUM SENEGAAL (SENEGAL): Talking Policing, Safety & The Internet (Full Transcript in English, Wolof & French)

โ€œGrande Causerieโ€: Part One 

July 13, 2022 *Translation updated 8/2/22*

Where the name “Khady” appears, that is Juliana Friend, whose participation was supported by the Alternative Digital Futures Project at the Center for Long-Term Cybersecurity (CLTC) at UC Berkeley. Juliana Friend is an anthropologist and public health researcher focusing on technology and health. She first met San and Maya in Senegal in 2017.

Full English translations, followed by the original conversational dialogues of Wolof and French. 

Tekki yu mat sรซkk ci ร€ngle, topp ci waxtaani waxtaan yu njรซkk ya ci Wolof ak Franรงais.

Traductions complรจtes en anglais, suivies des dialogues conversationnels originaux en wolof et en franรงais.

Interpreter/translatorโ€™s note:

2) I hesitated about whether or not to include and translate what I said as an interpreter: either for clarity, transparency, or both. 

———-

Kira (K): Khady do you want to do the honors of posing the first question in English, but also in Francais or Wolof for us?

Khady (KD): I wouldโ€ฆI wonder, Kira, you said it so well. Would you want to do the English version and then Iโ€™ll translate?

Kira (K): Sure, yeah!

Fleur (F): I started a google doc.

KD: Thatโ€™s so helpful, Fleur.

K: So the initial question, the first part of it ; what are our most pressing concerns? That could also mean, the most pressing threats that our communities are facing, both on and offline? We can take turns responding to that and then we can shift.

KD: Perfect.

Sana (S): OK, I will answer. Because whatโ€™s hardest about the internet and face to face, on the internet side. We arenโ€™t completely integrated with the internet. For example, when COVID-19 came, many had problems finding work. Because at that moment, we didnโ€™t know how Corona worked. To have contact with people, many people just stopped working. If you take someone like me, I stopped completely, like some other people did. You understand? But the internet, on the one hand, if it had security, it would suit us much better than contact. If it had security, I want to be clear, it would suit us much better. Because on the internet, you donโ€™t risk anything. Thatโ€™s my brief introduction. We can discuss.

Maya (M): Security, internet, it has security. It has more security compaKira with face to face. [S: thatโ€™s what I was saying] in relation to COVID. Because COVID cannot infect you. [S: Exactly!] Even STIs, HIV, they cannot infect you. But the insecurity that the internet has, is what we were talking about. Your image can be recorded, and people can commit blackmail.

S: For example, video.

M: If itโ€™s your voice, too, they can blackmail you

S: So in Senegal. Me, my voice was put on the internet. I showed it to you Khady, do you remember?

KD: Yes.

M: But still, we worked on the internet. But there is no security. If there was security, everyone would be working on the Internet. Because contact is not safe. You can contract STIs, HIV/AIDS, COVID..you know COVID even now is getting people. Currently, today we are at over 100 [cases] in Senegal.

KD: 100 cases today ?

M: 100 cases in Senegal today. So that means that COVID is coming back. So if we can do video calls, that is better.

S: Thereโ€™s less risk.

M: Thereโ€™s less risk. But itโ€™s not securitized.

S: Itโ€™s not securitized

M: There are some people who, who have means, they prefer to wait for a while, until COVID goes down again. But if there were security, if there were security, everyone would be working on the internet.

S: That is for sure.

M: That is for sure. Even me, who is talking with you right now, will work online.

S: Because there is less disease.

M: You have less disease, you donโ€™t have anything. You stay at home. Your clients will have their pleasure too.

S: Thatโ€™s right.

4:45 KD interprets.

รˆmoussรฉe (E): Thank you for that. Thatโ€™s so interesting. I have a follow up question if thatโ€™s OK. Iโ€™m curious, part of what I was hearing was that itโ€™s both the visibility of online sex work that causes a security problem. Iโ€™m curious to hear a little bit more about what they conceptualize as security or privacy that would make online sex work a more tenable option.

KD: So, what measures of security would make online sex work more viable? Got it. Yeah, thatโ€™s a great question.

E: And I think, what do they mean by security? Is it from the client? Is it just the visibility that makes it feel insecure? I guess Iโ€™m curious about elaborating a little bit.

8:15 KD interprets.

NOTE: [ I didnโ€™t adequately convey the ยซ visibility ยป part of Eโ€™s question. My apologies. Something we could return to next time, if you like]

M: Insecurity, itโ€™s in relation to the clients. They can capture video, your image. How they do it, they capture/record and commit blackmail, threaten to post it on the internet. Or they capture your voice, audio. Even on the telephone they can capture your voice. Itโ€™s about blackmail. The security that we need, for example, the person who owns Facebook also owns Messenger and Whatsapp. He could arrange it so that whoever uses them canโ€™t capture an image.

S: To protect you.

M: You couldnโ€™t capture an image. You couldnโ€™t capture audio. Therefore you couldn’t do blackmail. Thatโ€™s what I want to emphasize about security. Thatโ€™s what I think.

S: Thatโ€™s what both of us think.

9:50 KD interprets.

F: And we know that technology exists right?

K: Yes it does.

F: Like, Netflix and all the streaming companies made it so that you can no longer even share a video on Zoom. So that, it seems totally possible.

K: It seems almost as if, by design, they donโ€™t care about individualsโ€™ personal safety and security online, and only protecting their property rights, right? And thatโ€™s what these major corporations care about. They care about property; they donโ€™t care about people. We know that they can freeze or capture images and use screen recording. We know that they can disable downloading whenever they see fit. We see this all the time internationally, in the United States โ€“ like, we know these corporations have the capability to offer us, just people, the same level of protection and privacy considerations that they themselves enjoy as corporate entities. And yet, those things are not extended to us, which means that, rightfully as Maya  and Sana have pointed out, and as Fleur has mentioned, this is the thing that weโ€™re dealing with, is this discrepancy of power and access, right, when it comes to digital and online security.

And I also think about access.  And maybe Iโ€™ll end with this as the other thing that Iโ€™m thinking about is actual material technology to facilitate transitioning to online work. And I think about the barriers to doing some of that online work, that would make several of us on this call feel safer in transitioning, right, is actually having the means to do that, which means having a computer that can connect to high-speed internet, having high speed internet in the first place, having a stable phone line, having a light, having a phone or a camera device. These are things that can become so exorbitantly priced and out of our reach. And sex workers, everyone needs these things to communicate in our modern society, but sex workers rely on these technologies, and theyโ€™re kept so far out of our reach so often. So Iโ€™m thinking about access here too as part of this security conversation and personal safety conversation that weโ€™re having.

F: And I would add to that: home. Having a home to work out of. And Khady I know you have a lot to translate so I wonโ€™t say more on that, but I will get back to it. [laughter]

KD: No thank you for, you know, marking that.

14:12-17:36  KD interprets.

S: In parenthesis I can share that me, I have two apartments. Iโ€™m forced to move between my apartment and where I work. That is to say that it comes back to resources, which is why Iโ€™m mentioning this. You know, in my apartment, I canโ€™t talk about everything. Iโ€™m forced to travel to [neighborhood X : maybe we should omit the neighborhood name to protect anonymity.] You know? And all of that is part of security. Because here I am free to talk about whatever I want, but at my home, I canโ€™t talk about these things. So as Kira was saying, you have to have somewhere, have your apartment, have this, and that, and that and that. You have to have so many things. And it requires money to obtain them. If you have the means, and a little bit of protection, it will be alright. You can work online, chill, without problems. You wonโ€™t have any problems, any worries. Like me, what I was saying. Like now, itโ€™s recording me. For example, you know, zoom, if you record something it says, your call is being recorded. You have to โ€˜acceptโ€™ that. If they had this on the internet in general that would suit us. For example, Khady, if you record me, if there is a message that is sent to me, like, โ€œKhady is recording you.โ€ That way, in an instant, I could stop the call. Or โ€œKhady is doing a screen captureโ€ like Snap. Snapchat. If they do a capture, automatically I will know that Khady is doing a capture. Zoom, just a moment ago, when it started recording, it said, we are recording. Then Iโ€™m the one with the right to accept or not. But I accept. If there were security like that, that would suit us. When you record, when you capture, I would know all of that. After that, we can figure out our apartment, our devices, etc etc. Everything. Thatโ€™s what itโ€™s about.

M: Regarding security, there was one day when I told you [Khady], itโ€™s a computer that I need. Because sometimes when youโ€™re using a small phone, you canโ€™t do what you want to do. But if it was a computer, I could set it here, and while I talk to someone, there it sits. Work would be easier and faster. If itโ€™s a small cell phone, if itโ€™s just this, you canโ€™t do what you want to do. To hold it and do your work at the same time, itโ€™s difficult. If I had a computer, I would have a way to set the screen aside, position it, and turn on the camera. Insecurity, there is something else that is part of the issue in Senegal, and that is the police. Because sometimes you are talking to someone you think is a client, but itโ€™s actually the police.

S: They take our money. Like the day before yesterday, the day before yesterday the police came and stood in the stairway to take my clients, take their money. Anyway, Senegal, Africa, itโ€™s really something.

M: Yes, that happens these days.

S: The police should make us more secure, however they do not make us secure.

M: Exactly

S: If you are a sex worker, they can humiliate you.

M: They can rip you off.

KD: So the police were standing in your house taking your clients, or? I didnโ€™t get that.

S: The police were standing in the stairwell. A police officer came and stood in the stairwell. Waited for a client to enter to receive services, and when he came out again, argued with [the client]. I said, โ€œCommissioner!โ€ I tell him, โ€œget out of the house.โ€ I go up to the commissioner and tell him, you donโ€™t have the right to enter a peaceful house at midnight without an arrest warrant. I talked with him, and he left.

KD: He left, eh?

S: Because I know what Iโ€™m talking about. I know my rights. Iโ€™ve been at this for a little while now. They have to have an arrest warrant. They should leave the house, they should not enter the house.

M: Good.

S: Just recently I was having an issue with a police officer, and thatโ€™s not normal. All of that is part of security. The police should give us security.

M: And you can be talking with a client, but it turns out it is not a client. Youโ€™re talking to a police officer.

21:25: KD interprets

E: I just wanted to respond to what I hear Sana talking about, is this culture of consent, and how itโ€™s not built into tech. And I think it goes back into the previous conversation that we were having of how the platforms already have all of these tools. Itโ€™s just used to create further violence against marginalized communities. And I think of how when I was deplatformed or kicked off of Instagram for being a sex worker, my IP address was banned, so I wasnโ€™t allowed to make a new account on [the/a ?] device. But for many years when someone was harassing me online or stalking me, I couldnโ€™t block all of them. And I think Instagram just gives this option now, in the last year or two, when the technology has been around for many years. And so thereโ€™s this power dynamic where these technologies exist, but itโ€™s who has access to them. And this idea that this culture of consent isnโ€™t built into technology when so much of what tech does is just extract data. Theyโ€™re almost dependent on our lack of consent to have this type of relationship. And I love what Sana was saying about the Zoom notification, which is really quite new. I think it came out, like, two years into the pandemic, asking people for consent to record, which is such a small thing, but it provides this space where youโ€™re able to consent with how youโ€™re interacting with a technology that youโ€™re working with. I think thereโ€™s so much more that we could see built into technology to give users more choice of how they interact with technology. I guess I can stop there for translation, or if anyone had something they wanted to add.

KD: Maybe if you wouldnโ€™t mind, Iโ€™ll just translate that. I think maybe in smaller chunks, I might be able to do a slightly better job. So thank you for that.

26:49  KD interprets

M: What you were talking about makes sense. Because already, those who own the technology seek money, as you were saying. Theyโ€™re after money. If they know that if they did something, they wouldnโ€™t get money, then that wouldnโ€™t work for them. They wouldnโ€™t take it down. Theyโ€™d refuse. What brings money, thatโ€™s what they want out of that.So theyโ€™re looking out for their own interests. Their interests. Not our interests, but their own interests. Theyโ€™re looking at what they can gain, rather than what we can lose. Thatโ€™s the problem. Thatโ€™s the disadvantage.

30:25 KD interprets

NOTE : In this one I made an interpretation of what Maya was saying when I added โ€œ…is consent in their financial interests?โ€ Kira responds to this question.

K: Yeah, thatโ€™s the question. And I think as we can see, unless people collectively demand and organize, put pressure on and use literally every effort in our means to try and curtail the kind of, extremely violent profit-motivated, right, anti-people policies and practices and terms of service, etc., that these tech companies have, weโ€™re not going to see change. And even still, I try to remain hopeful, that we can really create and imagine ways of utilizing technology. But it is very apparent that these companies, left to their own devices, we wouldnโ€™t even have what we have currently, which is not enough. And so, I think that might transition us into talking about what we do in the meantime.

Hacking//Hustling + Sรฉnรฉgal Comrades Conversation โ€œGrande Causerieโ€: Part Two

August 8th, 2022

Interpreter/translatorโ€™s note:

  1. Maya and Sana indicated a few identifiable people and institutions, so these have been removed. 

——————————————————————————————————————— 

Sana (S): Kii mooy Fleur. Fleur.

Sana: This is Fleur. Fleur.

Fleur (F): Yes?

FleuK: Oui?

S: Very nice. Maangi commencer men de. Khady, maangi commencer wax Anglais.

S: Very nice. Iโ€™m starting to be able to. Khady, Iโ€™m starting to speak English.

F: Ah yah, I gotta learn some French. I was trying to learn Spanish over the summer butโ€”

F: Ah oui, je dois apprendre le Francais. Jโ€™essayais dโ€™apprendre lโ€™espanol cet รฉtรฉ mais โ€“

Khady (KD): Thereโ€™s some crossover

KD: Il y a quelques similaritรฉs.  

F: Yah

F: Oui.

KD: Just French pronunciation is crazy but.

KD: La pronunciation en Francais est un peu fou mais.

S: Wolof moo gen a yomb

S: Wolof is easier.

Maya (M): Mu jang Wolof. Wolof moo gen a yomb.

Maya (M): She should learn Wolof. Wolof is easier.

F: Ah alright, good tip.

F: Oui ok. Bon conseil.

S: Langue Nationale u Sรฉnรฉgal. 

S: The national language of Sรฉnรฉgal.

F: Mm Hmm

F: Oui oui.

KD: Anyway, would someone want to kick us off, maybe read the agenda?

KD: En tout cas, est-ce quโ€™il y a quelquโ€™un qui voudrait dรฉmarrer, peut-etre lisant lโ€™agenda?

S: OK

S: OK

F: Do you want me to read it in English and then you read it in French and Wolof?

F: Voudrais-tu que je le lise en Anglais et puis tu peux le lire en Francais et en Wolof?

KD: Sure, yeah.

KD: Oui cโ€™est bon.

F: Ok cool, so the three things that we said we were going to come back to: first, legal models. Second, talking through how we navigate our safety concerns, and especially collective demands. And we wanted to learn more about sutura. And then last, just talking about how sex workers use the internet.

F: OK cool, alors les trois points dont on voulait continuer de discuter sont dโ€™abbord, les systems de loi. Deuxiรจmenet, discuter comment gรฉrer la sรฉcuritรฉ, et surtout le plaidoyer collectif. Et nous voulions apprendre plus ร  propos de sutura. Et finalement, discuter comment les professionels du sexe utilisent lโ€™internet.

M: Premiรจre question, ci loi bi. Loi u PS yi, benn la. Parce-ce que su fekkee ne par exemple, ร  chaque fois da nu ne, avec la police, bu gniowee seen ker, amul droit dugg seen biir ker. Yaw en tant que PS, da nga wara am sa carnet sanitaire. Nga nekk en rรจgles, nga respecter say rendez-vous, nekk en rรจgles. Sinon police bu gniowee, parce-ce que loolu ci loi bi la bokk. Carnet sanitaire, ci loi bi la bokk. Respecter say rendez-vous. Dem say rendez-vous reguliรจrement. Su fekkee ne nga begg a baay, nga bind lettre ne da nga rajje. Nga ne pour quelle raison nak. Boo rajjee tamit, nga rajje un mois, walla quelques jours, walla deux mois, marier, walla voyager, dem nu [inaudible]. Boo gniowatee encore โ€“

M: The first question, about the law. Law about sex workers is one thing. Because if there is for example, every time we say, with the police, when they enter your home, they donโ€™t have the right to come inside your home. As a sex worker, you have to have your health notebook. You are following the rules. If not, when the police come, because thatโ€™s part of the law. The health notebook is part of the law. Attend your medical visits. Go to your medical visits regularly. If you want to leave sex work, you write a letter saying that you are leaving sex work. You give the reason. When you leave sex work also, you leave sex work for one month, or some days, or two months, you get married, travel, go where [inaudible]. When you come back again โ€“  

S: Def sa bilan en mรชme temps

S: You do your checkup again.

S: Quatre photos.

S: Four photos.

M: Ak sa carte domicile bi wone fi nga dekk.

M: With your residence card that shows where you live.

S: Pour nga men a legale.

S: So that you can be legal.

M: Pour nga men a lรฉgale am carnet. Soo amee carnet leggi nak, chaque mois dangay gniow rendez-vous. Boo gniowee di nanu la xol, def ay bilan. Chaque six mois def le bilan. Bilan surtout VIH bi. Tous les six mois. Soo amee carnet. Leggi nak, ci lois u Sรฉnรฉgal. Loi bi ba tey, avec le carnet, du la permettre taxaw dans la rue pour le racolage.

M: So that you can be legal and have your health notebook. Once you have your health notebook now, every month you come for your visit. When you come they will look at you, do the checkups. Every six months you do the checkup. Checkup especially for HIV. Every six months. If you have the notebook. Now then, in Sรฉnรฉgalese law. The law even now, with the notebook, doesnโ€™t permit you to stand in the street and do solicitation.

S: Et dans la maison.

S: And in the house.

S: Ok.

S: OK.

M: Da nu ne carrรฉment, la loi nโ€™interdit pas. Parce-ce que kenn amul sa droit dugg ca biir ker. Benn. Parce-ce que tu nโ€™as pas agressรฉ. Tu nโ€™as rien fait dโ€™illรฉgal. Tu es dans ta maison. Tu exerces ton travail lร -bas. Donc amul droit dugg ci sa biir ker. Mais problรจme u sรฉcuritรฉ. Parce-ce que parfois ton client, nga fekk bandit la.

M: They say plainly, the law does not prohibit that. Because nobody has the right to enter your house. First, Because you havenโ€™t committed violence. You have done nothing illegal. Youโ€™re in your house. Youโ€™re going about your work there. So they have no right to enter your home. But itโ€™s a problem of security. Because sometimes your client, it turns out theyโ€™re a bandit.

S: Bandit la, waaw.

S: Theyโ€™re a bandit, yes.

S: Waaw!

S: Yes!

M: Fekk xale bi tatam, yaram u nen. Seeni dekkando danu xey gis ko noonu rek, fegg fegg fegg fegg. Parce-ce que danu baay ba tejju. Aprรจs nu fekk mu de.

M: The young woman was completely naked. Her neighbors woke up and found her like that. Knock, knock, knock, knock. Because theyโ€™d left her and shut her in her room. After they found her dead.

S: Loolu fan la?

S: Where was this?

S: Waaw noonu lay deme.

S: Yes thatโ€™s how it goes.

M: Mais sinon, problรจme bi mooy, sunu loi bi, obsolรจte la. Parce-ce que loi boo xam neโ€“

M: But apart from that, the problem is our law. Itโ€™s obsolete. Because itโ€™s a law that โ€“

S: Nyoom nyoo nu wara protรฉger, mais lunuy defโ€”

S: Them, they should protect, but what they do โ€“

M: Kenn du ko appliquer. Te bu nu ko appliquee aussi tamit, nyoom nax lanuy def. Parce-ce que doo xam ne amoo droit racoler. Parce-ce que cโ€™est depuis โ€˜68 ba leggi. Xam nga loolu yag na. Doo taxaw ci mbed mi racoler. Police bu la fekkee, mu yobbu la. Benn. Walla nga fekk ci biir ker, ou bien dans les bars et tu nโ€™es pas en rรจgles,  mu yobbu la. Hotel dangay dugg hotel, gen, fekk police taxaw ci buntu hotel bi di la xar.

M: No one applies it. And when they apply it, they trick you. Because you may not know that you donโ€™t have the right to solicit. Because itโ€™s since โ€™68 up until now. You know, thatโ€™s old. You canโ€™t stand in the street soliciting. Police if they find you there, theyโ€™ll take you away. First. Or if youโ€™re inside a house, or youโ€™re at bars and you are not following the rules, theyโ€™ll take you away. A hotel, youโ€™ll enter a hotel, work, and find police waiting for you in the hotel doorway.

S: Jel li nga yoor.

S: Take the money you have.

M: Jel li nga yoor. Cโ€™est pas normale. Parce-ce que finalement di nga naan yaw, carnet bi, pour lan la? Dangay naan, looy def ak carnet bi?

M: Take the money you have. Itโ€™s not normal. Because in the end, youโ€™ll ask, the notebook, what is it for? Youโ€™ll ask, what do you do with the notebook?

S: Meme boo ligueyoo, dinanu yakar ne xalis biโ€”

S: Even if youโ€™re not working, they will believe that the money โ€“

M: Bu dee policer bi xamee, di nga xey parfois pour dem au marchรฉ, pour dem duggu. Nu ndaje ak yaw ci marchรฉ bi, lajj sa carnet. Alors que tu nโ€™es pas au lieu de travail. Tu es venue au marchรฉ pour faire des achats, aller cuisiner pour manger. Mais danu xame la, jel sa carnet. Nga ne leen yoor uma carnet, marchรฉ laay dem. Nu ne [inaudible].

M: If a police officer knows, youโ€™ll wake up in the morning sometimes to go to the market, to go in. They meet you in the market, ask for your notebook. But youโ€™re not even in a place of work. You came to the market to buy things, to go cook and eat. But they make you, take your notebook. You tell them, I didnโ€™t bring my notebook, Iโ€™m going to the market. They say [inaudible].

S: Alors que cโ€™est pas normale.

S: But thatโ€™s not right.

M: Kon finalement loi bi da fa nekk obsolรจte dal.

M: So ultimately the law is obsolete then.

S: Amatoo vie privรฉe. Loolu, amoo vie priveรฉ parce-ce que bunu fekkeeโ€”

S: You donโ€™t have a private life anymore. That, you donโ€™t have a private life because if โ€“

S: Cโ€™est รงa.

S: Thatโ€™s it.

M: On a actuellement pour la loi, on a aucune loi actuellement. Parce-ce que le policier fait ce quโ€™il veut.

M: Currently as for the law, we donโ€™t have any law currently. Because the police officer does what he wants.

S: En fait kenn nemeul dรฉfendre parce-ce que da nu ruus dรฉfendre. Par rapport aux ร‰tats-Unis.

S: In fact no one dares defend because they are afraid of defending. In contrast to the United States.

M: Yaw yaay def rek. Ak policier, boo nekkee, dangay naxante ak moom, danga wara ko baay nga dem. Mais am na nu [inaudible 10:25-10:29 ]

M: You youโ€™re doing this. And the police officer, if youโ€™re there, youโ€™re going back and forth with him. You should leave me be. But there are [inaudible]

S: Comme nyoom danuy plaidoyer, am unu loolu.

S: Like them, they do advocacy. We donโ€™t have that.

M: Amul comme aux etats-unis. Mais fii, on a fait le plaidoyer dans tous les commissariats de Dakar, ici ici. A Dakar avec une ONG On a fait le plaidoyer. Mais rien. On ne peut rien. Meme le gouvernement ne peut rien. Finalement, ils ont maintenant fait le cadre de kii [inaudible 10:54-10:55].

M: Not like in the United States. But here, weโ€™ve done advocacy in every police station in Dakar. Here, here. In Dakar with an NGO. Weโ€™ve done advocacy. But nothing. We canโ€™t make anything happen. Even the government canโ€™t do anything. In the end, theyโ€™ve made a kind of [inaudible].

S: Am de lโ€™argent cโ€™est tout. Ku soxla xalis dal, day dem ci PS. Ku sooxla, homme de tenu, ku sooxla, sรฉcuritรฉ, ci PS lanuy dem. Mooy evenements, mooy Tabaski, mooy fete, sunu sooxla xalis ci PS lanuy dem.

S: Having money is everything. Whoever needs money like, they go to the sex worker. Whoever needs it, men in uniform, whoever needs it, security forces, they go to sex workers. On event days, on Tabaski, on holidays, if they need money they go to sex workers.

M: Ci PS lanuy gniow. Finalement cโ€™est pas la peine nu amati carnet. Ku amul carnet โ€“

M: Itโ€™s sex workers they go to. In the end itโ€™s not worth having a notebook anymore. People with the notebook โ€“

S: Est-ce que carnet di nanu eliminer?

S: Is the notebook going to be eliminated?

M: Dรฉjร  ku amul carnet, clandestine bi, normalement bu koy jappee, moom war na tudd 6 mois ร  un an de prison.

M: Already the person without a notebook, the clandestine person, normally when they catch them, they have to stay six months to a year in prison.

S: Ak amendes.

S: With fines.

M: Plus amendes. Mais actuellement cโ€™est pas le cas. Clandestines elles sont plus libres que nous qui sont en rรจgles.

M: With fines. But currently thatโ€™s not the case. The clandestines are freer than those of us who follow the rules.

KD:Ca cโ€™est intรฉressant.

KD:That, thatโ€™s interesting.

M: Danuy graisser. Elles sont prรจtes ร  donner 50 mille ba ci kaw. Kon kenn du la japp. Alors que sunu cotรฉ nous, 5 milles lanu koy jox. Kon nyoom nyoo gen a nekk en rรจgles que nous.[11:50] Loolu cโ€™est la premiรจre question.

M: They pay them. They are ready to give 50 thousand and above. So no one will arrest them. Whereas for us, 5 thousand is what we give. So them, they are more in line with the rules than us. Thatโ€™s the first question.

KD:Xanaa ma traduire loolu parce-ce que cโ€™est trรจs intรฉressant.

KD:Maybe Iโ€™ll translate that because itโ€™s very interesting.

M: Danuy bokk gis gis rek.

M: We just share the same point of view.

Y : [23 :36] Da ma tit. Gisoo bi ma waxoon loolu da ma tit. Da ma tit sax. Parce-ce que mooy loolu, da fa triste.

Y : I was scared. Didnโ€™t you see, when I said that I was scared. Even me, I was scared. Because thatโ€™s how it is. Itโ€™s sad.

N : Loolu bere na de. Da ma leen xam. Danuy dem hopital. Da ma leenโ€ฆ

N : It happens often. I know some of them. We go to the hospital. For them Iโ€ฆ

K: Khady, merci de nous avoir aidรฉ avec la traduction. Je me demande si tu peux tout dโ€™abord remercier nos deux camarades dโ€™avoir partagรฉ avec nous. Vraiment cela me donne une image beaucoup plus claire de la situation. Mais de plus si tu pourrais donner des condolรฉances et communiquer la colรจre ร  propos de la mort, le meurtre, de leur camarade et collรจgue et collรจgue de travail. Je lโ€™apprรฉcierais beaucoup. Je suis triste dโ€™avoir cette nouvelle, profondรฉment. Et en plus, il y a quelque chose ร  dire avant que je lโ€™oublie, cโ€™est quโ€™encore une fois, sur le plan international, il est รฉvident que la rรฉglementation รฉtatique et la modรจle de lรฉgalisation font une violence incommensurable aux communautรฉs de professionnels du sexe. Et tu sais, la dรฉcriminalisation de tout effort de survivre, y compris le travail de tous les PS, est mis en relief par chaque histoire que Maya et Sana racontent, tu sais ? Et en plus, lโ€™extrรชme, cโ€™est-ร -dire, ah, je perds le fil de mes pensรฉes parce ce que cette traduction a activรฉ beaucoup de sentiments en moi. Mais en tout cas, la maniรจre dans laquelle il est tellement รฉvident que mรชme si la loi รฉtait mise ร  jour, la police ferait ce que la police ferait, nโ€™est-ce pas ? Ils vont au-delร . Ils vont exercer leur pouvoir et leur force. Et on peut voir cela, par exemple, la police ne doit plus dรฉtruire ou saisir les prรฉservatifs, sโ€™ils trouvent que les gens ont des prรฉservatifs, mais malgrรฉ tout, toujours รงa se passe, et pire. Et on voit des choses pires que รงa donc il ne suffit pas de mettre ร  jour les lois, sinon de demander, en premiรจre place, ces lois servent ร  qui.  Et la clandestine โ€“ jโ€™ai entendu ce mot ร  plusieurs reprises et jโ€™รฉtais trรจs curieuse de voir le rรดle quโ€™elle joue. Et oui, travailler dโ€™une maniรจre non-enregistrรฉe, รงa fait du sens. ร‡a fait du sens parce ce que les bilans de santรฉ ne semblent pas dโ€™avancer le bien-รชtre des gens. Il sโ€™agit des mรฉcanismes de contrรดle arbitraires de lโ€™รฉtat, nโ€™est-ce pas? Et je voulais poser une question de clarification. Parce-ce que peut-รชtre je sais dรฉjร  la rรฉponse, mais il est possible que รงa serait encore plus accablant si elles le disent maintenant. Les travailleurs, est-ce que cโ€™est ร  eux de payer les frais des bilans et des carnets aussi ? Parce-ce que jโ€™imagine que cโ€™est le cas, et la violence financiรจre et cette extorsion รฉtatique dans ce contexte. Et je vais arrรชter lร  parce-ce que je sais que cโ€™est beaucoup. Je lโ€™apprรฉcierais beaucoup Khady si tu pourrais transmettre ce message.

F: I just echo Kiraโ€™s condolences too, and also just rage. But just echo everything Kira said, that this is clearly not about protecting or keeping sex workers safe. So I have a question but Iโ€™ll wait until after you translate.

F: Je voudrais amplifier les condolรฉances de Kira, et aussi, ma colรจre. Mais pour amplifier tout ce que Kira avait dit, il est รฉvident quโ€™il ne sโ€™agit pas de protรฉger les PS ou de protรฉger leur sรฉcuritรฉ. Donc jโ€™ai une question mais je vais attendre jusquโ€™ร  ce que la traduction soit complรจte.

KD: Et ne na, mรชme su fekkee ne, elle a posรฉ la question, mรชme su fekkee ne loi bi da fa changer, est-ce que police di na soppi jikkoam? Meme su fekkee ne loi bi da fa changer, est-ce que police di na continuer def li muy def?

KD: And they said, even if, they posed the question, even if the law changes, will the police change their behavior? Even if the law changes, will the police continue to do what they do?

M: Ba wedduwoon.  [25:42]

M: And deny what happened.

S: Wedd bu sorree. En tout cas, ci mois bi di ngeen gis trois ou quatre fois. Di ngeen gis yu bere bere bere. Mais xolal, Khady. Liguey u Sรฉnรฉgal da fa meti. Surtout Afrique. Cโ€™est pas Sรฉnรฉgal seulement de. Cโ€™est partout en Afrique. Liguey bu metti, metti, metti. Da fa metti. Yaangi liguey, toonoo kenn. Cโ€™est ton corps. Mais policiers yi, da nu mel ne, nyoom nyoo moom sa corps. Yoo moomoo sa koor. Nyoom nyoo [26] moom sa corps.

S: Deny everything. In any case, within the month youโ€™ll see it three or four times. You will see it a lot, a lot, a lot. But look Khady. Work in Sรฉnรฉgal is difficult. Especially in Africa. Itโ€™s not just Sรฉnรฉgal eh. Itโ€™s everywhere in Africa. Hard, hard, hard work. Itโ€™s hard. You do your work, hassling nobody. Itโ€™s your body. But police officers, they make it seem like itโ€™s them who own your body. You donโ€™t own your body. They have ownership over your body.

M: Dangay liguey di leen jox.

M: You work and then give them money.

S: Di leen jox. Pour quelle raison?

S: Give them money. For what reason?

M: Danuy liguey di faay ko fin du mois.

M: We work and then pay them at the end of the month.

S: Danuy liguey di faay ko fin du mois di ko yobbu seen famille. Bunu ligueyee da nu leen jox nyoom. Pour quelle raison? Xolal, gis nga femme bi di dee noonu noonu. Bu nu woowoon policiers yi leggi leggi, nu ne da nuy xol. Policiers yi nyo jekk a yaq. Au lieu nu sutural ko, da nu yaq. โ€œFemme bi, Caaga la!โ€

S: We work and then pay them at the end of the month so they can bring it to their family. When we work we give money to them. For what reason? Look, you know the woman who died like that. When they call the police now, now, they say theyโ€™ll look into it. Police officers are the first ones to mess it up. Instead of giving her sutura, they ruin her. โ€œThis woman is a prostitute!โ€

M: Amul enquรชte.

M: Thereโ€™s no investigation.

S: โ€œFemme bi, Caaga la!โ€

S: โ€œThis woman is a prostitute!โ€

M: Cas bi du am benn suivie. Cas bi amul benn enquรชte.

M: This case there wonโ€™t be any follow up. This case there is no investigation.

M: Du am suivie. Du am dara. [inaudible].

M: There wonโ€™t be follow up. There wonโ€™t be anything. [inaudible].

S: Loolu baaxul. Nit bu deewee, mรชme bu fekkee ne PS la, da fa wara am suivie. Nu topp ko, dem tejj ku ko rey. Mais du enquรชte du suivie. Pour quelle raison ? Danuy fatte ku ko rey, mais lu bonn rek lanuy wax.  Da nu ne, xolal, kii da fa de ci neggam. Capotes yi. Li ak li. Danuy yaq nderam. Mais kan mooy genee la?

S: That is bad. When.a person dies, even if they are a sex worker, there should be follow up. They should follow up, continue on until they lock up the person who killed her. They say, look, her, she died in her room. Condoms, this and that. They sully her name. Now who is going to help you?

M: Dans les journaux da nu ne, on a tuรฉ une prostituรฉe dans sa chambre.

[27:28]

M: In the newspapers they say, a prostitute was killed in her room.

S: Leggi kan mooy genee la? Du police, walla sapeurs du gniow pour sauver. Kan mooy genee loolu? Su fekkee ne sapeurs yi, na lanu xamee? Da nu wax ne, nit ka da nu ko rey.

S: Now who is going to help you? Itโ€™s not the police, or soldiers, they wonโ€™t come to save you. Who is going to help you? If itโ€™s soldiers, what are they going to tell people? They just say, this person was killed.

KD: Loolu lanu tek ci journal bi walla?

KD: Thatโ€™s what they put in the newspaper or?

M: Waaw, waaw.

M: Yes, yes.

S: Bien sรปr! Loolu lanuy tek. Loolu lanuy wax.

S: Of course! Thatโ€™s what they put. Thatโ€™s what they say.

M: Prostituรฉe.

M: Prostitute.

S: Mais normalement, nit bu dee, nga gniow fekk ko ba ci biir neeg, yaw en tant que homme de tenue, ma nam sapeur , mooy policier walla gendarme, sutural ko. Sunu la lajjee, nga ne, jigeen lanu rey ci neegam. Mais danuy wax PS bu dee ci biir neegam. Client moo ko rey. Loolu lanu koy waxee.

M: Noonu lanu koy waxee.

M: Thatโ€™s how they talk about it.

S: Ci journal yi. Alors que ce nโ€™est pas normale. Entre parenthรจse, entre parenthรจse. Nun ni policiers yi bu nu gniowee ci nun, da nu yaqampti pour dem denc sunuy prรฉservatifs. Sinon bu nu gniowee lu nu jekk a def mooy sacc sunuy prรฉservatifs. Am na benn jour boo xam ne da nu sacc sunuy prรฉservatifs, sacc sunuy 70 mille francs.

S: In the newspaper. But thatโ€™s not normal. In parenthesis, in parenthesis. Us, when police officers come to us, they are quick to go and keep our condoms. Otherwise, when they come the first thing they do is steal our condoms. One day they stole our condoms, stole 70 thousand francs.[2]

KD:70 mille francs?

KD:70 thousand francs?

S: 70 mille francs. Temps boobu nuungi [nom du quartier anonymisรฉ]. Cette jour prรฉservatifs yepp lanuy sacc. Loolu dal nanu [nom du quartier anonymisรฉ]. Loolu mootax bunu gniowee automatiquement danuy denc sunuy baggages. Sinon buno ko gisee di nanu ko sacc, te doo ci men dara. Danuy gawante quoi. Danuy def teff teff, gaw. Boo xamee ne nyoom la rek, danuy nebb prรฉservatifs yepp ak sunu xalis. Sinon men nanu ko sacc. Danu koy sacc. Am na bu mujj bi, sunu telephone lanu sacc. Telephone bu ndaw bi.

S: 70 thousand francs. At that time we were in [name of neighborhood removed]. That day they stole all of our condoms. At that time we were in [name of neighborhood removed]. Thatโ€™s why when they come, we automatically hide our belongings. If not when they see it they will steal it, and you wonโ€™t be able to do anything about it. Theyโ€™re fast eh. Theyโ€™re quick quick, fast. When you just know itโ€™s them, weโ€™ll hide all the condoms and our money. If not they can steal it. They steal it. Recently, they stole our phone. That small phone.

M: Waaw

M: Yes

S: [Inaudible] Thankfully they only took one. That also happens sometimes.

F : Iโ€™m sorry, fines for what exactly ? Fines for having condoms ?

S: Da nu ci deffoon ci lekket. Lekket. Lunuy liguey. Au nombre de 8 personnes, nu jel xalis bi.

S: What they did was eat money. Eating money, what we make. Eight people, they took our money.

KD:  Ah OK. Thank you for clarifying that. I misunderstood. It wasnโ€™t a fine but they took 140 dollars from them. Sorry, that was my misunderstanding.

KD:  Ah OK. Merci dโ€™avoir demandรฉ, dโ€™avoir รฉclairci ca. Je nโ€™avais pas compris. Ce nโ€™รฉtait pas une amende mais ils avaient pris 70 mille.

F: So itโ€™s just theft. Itโ€™s just police, yah, OK.

F: Donc il sโ€™agit du vol. Cโ€™est juste la police, oui, OK.

KD:  So thank you for asking that Fleur.

KD:  Merci dโ€™avoir demandรฉ, Fleur.

M: Leggi carnet bi โ€“

N : Now, the notebook

Y : Dangay faay

Y : You pay..

N : Carnet bi danu koy jend 1000 francs. Leggi ticket consultation 1000 francs

M: We buy the notebook for 1000 francs[3]. Now the ticket for an appointment is 1000 francs.

S: Chaque mois.

S: Every month.

M: Chaque mois. Loolu cโ€™est chaque mois. Mais carnet bi su fesee walla bu reree dangay jend.

M: Every month. Thatโ€™s every month. But when the notebook is full or it gets lost you buy another.

S: Ak lunuy xol sa tat. [35:12]

S: And for them to examine your genitals.

M: Non non loolu am na. loolu kenn du ko jend.

M: No no thatโ€™s provided, no one buys that.

S: Man bis ba leggi da ma koy jend 600.

S: Me the whole time Iโ€™ve bought it for 600.

M: Xanaa foof, fekk mu manquer.

M: Maybe in that case, thereโ€™s not enough.

S: Ah ok.

S: Ah ok.

M: Mais normalement di nanu la jox. Leggi nyoom, carnet bi da ma koy jend. [35:31]Pour [nom de lโ€™institution omis] mille francs. Leggi nak boo amee carnet, chaque mois, dangay fay mille francs pour ticket. Carnet bi su reree dangay jendat beneen temps, pour jendat beneen carnet. Su fesee dangay jendat beneen carnet mille francs. Mais bilan moom doo ko fay.

M: But normally they will give it to you. Now them, I buy the health notebook. For [institution name removed] 1000 francs. Now then when you have your notebook, every month, youโ€™ll pay 1000 francs for the ticket. If you lose the notebook youโ€™ll buy another, to buy another notebook. If it gets full youโ€™ll buy another notebook for 1000 francs. But you donโ€™t pay for the exam.

S: Cโ€™est gratuit.

S: Itโ€™s free.

M: Loolu moom doo fay cโ€™est gratuit. Mais carnet bi, sama xalat man, njerin bi actuellement, di nga men a xol sa biir u yaram. Mais bu fekkee ne police, agents, walla homme de loi, [36] ammul benn lien ci loi bi. Xanaa consultations bi ngay def pour xol sa yaram rek, soo amee IST walla VIH walla noonu, pour loolu rek la.

M: That, well, you donโ€™t pay, itโ€™s free. But the notebook, my own perspective is, currently its importance is that they can examine your health. But if itโ€™s a matter of police, agents, or men of the law, there is not one connection to the law. Maybe the consultations you do to examine your health, to see if you have STIs or HIV or something. That is all that itโ€™s for.

S: Les ARVs sont gratuit.

S: ARVs are free.

M: Les ARVs sont gratuit. Les ARVs sont gratuit.

M: ARVs are free. ARVs are free.

KD:Les ARVs sont gratuit

KD:ARVs are free.

M: Les ARVs sont gratuit. Le dรฉpistage est gratuit.

M: ARVs are free. HIV testing is free.

S: Ticket bi cโ€™est pas gratuit de.

S: The ticket is not free, eh.

M: Non ticket bi cโ€™est mille francs, chaque mois mille francs.

M: No the ticket is 1000 francs, every month 1000 francs.

KD:Le ticket mooy lan?

KD:What does ticket mean?

M: Ticket consultation.

M: Ticket for the visit.

KD:Kon, consultation dangay faay mille francs, mais pour bilan, dรฉpistage, ak ARVs, doo fay.

KD:So, you pay 1000 francs for the consultation. But for the exam, HIV testing, and ARVs, you donโ€™t pay.

Y et M: Non non.

Y and M: No  no.

S: Fooy loolu?

S: Where is that?

KD:  OK Loolu leer na merci beaucoup.

KD:  OK thatโ€™s very clear, thank you very much.

K: Fleur did you want to ask your question?

K: Fleur ndax danga beggoon lajj sa question?

F:Thank you. And I appreciate that question too. Just knowing that like yah the costs of the notebook are, itโ€™s not just dissimilar from like, house arrest in the US. How like people have to pay for their own, to be monitored and surveilled. But the question I was going to ask was sort of connected to what we were discussing, just knowing that the police are not going to be engaged in like keeping people safe, and knowing that there are so many incidents of violence and even like exploitation. What are the ways that sex workers in Sรฉnรฉgal keep each other safe? What are the strategies being used?

F:Merci. Jโ€™apprรฉcie cette question aussi. Juste le fait de savoir que les frais du carnet sont, รงa ressemble ร  lโ€™assignation ร  domicile aux Etats-Unis. Cโ€™est ร  dire, le fait que les gens doivent payer pour leurs propres, pour รชtre suivis et surveillรฉs. Mais la question que je voulais poser est liรฉe ร  ce quโ€™on vient de discuter, sachant que la police ne sโ€™engage pas ร  protรฉger la sรฉcuritรฉ du people, et sachant quโ€™il y a tant dโ€™exemples de violence et mรชme dโ€™exploitation. Quelles sont les stratรฉgies ร  travers lesquelles les PS au Sรฉnรฉgal protรจgent ses pairs ? Quelles stratรฉgies sont utilisรฉes ?

S: Nu proteger leen

S: They protect them.

M: Fekk nyoom, cโ€™est ร  dire, montant bi nuy lajj, men nanu ko cotiser โ€“

M: Because them, that is to say, the sum thatโ€™s demanded, they can pool their money together โ€“

S: Jox leen nu laisse.

S: Give it to them so they leave them alone.

M: Jox leen ko, pour nu men a leen baay. Loolu lanu men a def. Mais bu fekkee ne dangay gniow, te nekkoo en rรจgles, ou bien da nga defoon benn dรฉlit, boobu moom, di nanu cotiser pour lโ€™avocat. Benn.  Naari, le temps que da nu juger, di nanu togg, bokk, indi loxo. (40:45)

M: Give it to them, so they can be left alone. Thatโ€™s what we can do. But if they come and are not following the rules, or else they commit some crime, in that case, we can pool money for the lawyer. First. Second, in the time it takes to make a judgement, we can cook, share, and extend a hand.

S: Non danu manquer cotรฉ boobu.

S: No weโ€™re kind of lacking on that front.

M: Cotรฉ boobu moom โ€“

M: On that front, well โ€“

S: Mais man โ€“

S: But I โ€“

M: Ku yeggee, parce-ce que nit ki men na am problรจme, te kenn du fa yeg.  Mais par exemple, am na nyoo xam ne, ku am problรจme rek, automatiquement di na woote. Am na nu may woo, am na nuy woo Sana, am na nuy woo personne de resource [titre omis]. Solidaritรฉ. Danu wootante.  Xol lu nuy def. Solidaritรฉ boobu am na.

M: Whoever can help, because if a person has a problem and no one helps them. But for example, there are people who you know, who just have a problem, and automatically theyโ€™ll call. There are some who call me, some who call Sana, some who call the resource aid [title omitted]. Solidarity. We call each other. Pay attention to what weโ€™re doing. We have that solidarity.

S: Comme man sama cotรฉ ni. Police bu gniowoon fi, xam nga annonce laa def. Nyepp nu xam sama numรฉro. Ma ne leen, li la sol, li la sol, li la sol. Da ma leen di proteger. Leggi nak, du coup, client buy gniow, da nu taxaw ci balcon bi nu xol client bi. Di nanu xam ne kii policier bi la. Parce-ce que moo joogรฉ ci Sana leggi. Kon da nu communiquer sunu biir. Parce-ce que lekk na ci mann benn cinq mille walla cinquinte mille, exemple, ma beggul mu lekk ci sama bennen morom. Mais damay woote, ma ne, Khady, policier bi, muungi ci terrain bi. Leggi lii la sol, lii la sol. Fais attention. Khady day baay xelam ci loolu. Khady woo keneen, keneen woo keneen. Kon dunu yaq jour boobu noonu. Noonu lanuy defe.

S: Like me on my end. When the police came here, you know I had made an advertisement. Everyone knows my phone number. I told people, theyโ€™re wearing this, this and this. I protect them. Now then, the minute the client approaches, we stand out on the balcony and look at the client. Others will be able to know that this is a police officer. Because the person will have come from Sanaโ€™s place. We communicate among ourselves. So as an example, say they ate 5 thousand or 50 thousand of my money, and I donโ€™t want them to eat my colleagueโ€™s money. So I call and say, โ€œKhady, thereโ€™s a police officer on the soccer field. Now, heโ€™s wearing this and this. Pay attention.โ€ Khady will give thought to that. Khady calls this person, this person calls someone else. So they wonโ€™t ruin that day. Thatโ€™s how we do it.

M: Noonu lanu defe. [42]

M: Thatโ€™s how we do it.

S: Noonu lanu defe. Bunu gniowee ci man, noonu laay partager. Noonu lanuy defe.

S: Thatโ€™s how we do it. When they come to me, thatโ€™s how I share information. Thatโ€™s how we do it.

KD:Dangay woote yeneen PS.

KD:You call other sex workers.

S: Partage, waaw. Ma ne leen, li ak li, muungi ci terrain. Ki, Khady, yeere bu gris la sol. Sol na dal yu gris. Automatiquement su gniowee day xol ci balcon bi, boo gisee ku sol gris, daal yu gris, mu ne Policer baangi ni. Kon du ko recevoir. Parce-ce que day xam ne gniowul pour liguey. Da fa gniow pour jel xalis. Noonu lay deme.

S: Sharing, yes. I tell them, this and this, heโ€™s on the soccer field. This person, Khady, is wearing gray clothes. Is wearing grey shows. Automatically if they come, youโ€™ll look out the balcony, and when you see someone wearing gray, youโ€™ll say to yourself, thereโ€™s the police officer. So you wonโ€™t let them in. Because you know that they didnโ€™t come for work. They came to take money. Thatโ€™s how it goes.

M: Sa, dangay faay sa portable. Bu la woowee doo ko jel.

M: Your, youโ€™ll turn off your cell phone. When they call you, you wonโ€™t answer them.

S: Walla nga faay sa portable. Doo ko jel. Dangay xol, men nga xar. Day dem aprรจs.

S: Or you turn off your cell phone. You donโ€™t pick up. Youโ€™ll look around, you can wait. After, theyโ€™ll leave.

K: Je sais que notre temps est presque รฉcolรฉ. Et je sais que cโ€™est une journรฉe de fรชte et quโ€™elles doivent prรฉparer les cรฉlรฉbrations Elles ont indiquรฉ quโ€™elles ont besoin de temps pour prรฉparer le repas et prรฉparer la fรชte, donc je voudrais bien respecter cela. Mais je voudrais que Khady, encore une fois, tu puisses leur dire que je les apprรฉcie et leur remercie, et que pour nous, cette conversation est un point dโ€™entrรฉe ร  plus de discussion la prochaine fois. Et en plus, ce qui me frappe est que, il y a tant de similaritรฉs internationales et tant de diffรฉrences. Et cโ€™est tellement, je me sens trรจs, trรจs reconnaissant de pouvoir apprendre et partager ร  travers cette discussion. Sโ€™il ne te dรฉrange pas de communiquer cela et aussi les souhaiter une bonne fรชte de ma part.

KD:  Kira ne na ne xam na ne leggi 18 hr moo jot et xam na ne yeen da ngeen wara preparer repas bi pour Tamxarit, kon moom da fa begg โ€“

KD:  Kira said that itโ€™s almost 6 pm and they know that you need to prepare the meal for Tamxarit, so they want to โ€“

M: Waaw, cere.

M: Yes, millet couscous.

S: Sunu nouvelle an la. Nouvelle an.

S: Itโ€™s our new year. New years.

KD: Waaw nouvelle an bi, voilร .

KD:Yes the new year, right.

M: Xam nga 31 Dรฉcembre cโ€™est pour les Chrรฉtiens. Mais Tamxarit, moom mooy fin dโ€™annรฉe Musulmans yi. Mooy fin dโ€™annรฉe.

M: You know December 31st is for the Christians. But Tamxarit, that is the end of the year for Muslims. Itโ€™s the end of the year.

M: Waaw parce-ce que benn question rek lanu rรฉpondre.

M: Yes because we only responded to one question

KD:Waaw degg la.

KD:Yes itโ€™s true.

M: Benn question.

M: One question.

KD: Waaw, waaw. Et xanaa begg ngeen xam seen situation tamit xanaa walla?

KD: Yes, yes. And maybe would you want to know about their situation too, or?

M: Waaw waaw. Nyoom sax, begg naa ko xam. Ba tey ci question u carnet. Seen loi bi ba tey. Foofu, par rapport ร  la loi.

M: Yes yes. I would like to know about them. Even now we have the question of notebooks. And for them, their laws now. Over there, regarding the law.

KD: So Maya  said yah like we only got through one question [laughter].

KD: Alors Maya  a dit, on nโ€™a rรฉpondu quโ€™ร  une question [rires].

F: And the follow up question

F: Et la question complรฉmentaire.

KD: And follow up questions yes.

Et des questions complรฉmentaires, oui.

[laughter]

[rires]

M: Non par rapport ร  la loi rek. Ci premiรจre question bi lanu nekk ba leggi. Ci problรจmes u loi bi lanu nekk ba leggi. Leggi nak, seen loi yi par rapport ร  sunuy bos. Ndax benn la walla du benn? Loolu laa begg a xam.

M: No, regarding the law though. Weโ€™re still on the first question. Weโ€™re still on problems with the law. Now then, your laws in relation to ours. Are they the same or are they not the same? Thatโ€™s what I would like to know.

S: Foofu am na nu jel carnet u pas? Ak visites yi.

S: Over there, are there people who do use a health notebook and those who donโ€™t ? And the visits.

M: Ak visites yi ak yooyu.

M: And the visits and such.

S: Nu xam, nu xol, รฉchange bi nu muy mel.

S: Letโ€™s know, letโ€™s see, what this exchange brings up.

KD: Oh sorry, I didnโ€™t hear that last bit. You were saying, I heard you say, not meeting material needs. What did you say after that?

KD: Je mโ€™excuse, je nโ€™ai pas entendu la derniรจre partie. Tu disais, jโ€™ai entendu que tu disais, ne satisfaire pas les besoins matรฉriaux. Et quโ€™est-ce que tu as dit aprรจs ?

F:Oh I donโ€™t remember exactly but โ€“

F: Ah, je ne me souviens pas exactement mais โ€“

KD: Sorry.

KD: Dรฉsolรฉe.

F: This particular legislation did propose a 2000 dollar a month stipend and the catch was essentially very similarly registering with the government and having to share a name, essentially being on the list, which is very dangerous, especially knowing that laws do change, and that the police and the state donโ€™t have our interest, or arenโ€™t looking to protect people. Itโ€™s again similar as what Sana and Maya  described. Like, itโ€™s about control. How do we get you to do what we want you to do, rather than about keeping people safe. There are harm reduction organizations. So there are some organizations that work with folks who are engaged in criminalized work, whether thatโ€™s like drug using, or selling sex. But for the most part, yeah itโ€™s just criminalized here.

F:Cette lรฉgislations a proposรฉ une bourse de 2000 dollars par mois et le piรจge รฉtait, en principe, pareil ร  lโ€™enregistrement auprรจs du gouvernement dans la mesure oรน tu donnes ton nom, cโ€™est-ร -dire, tu es inscrit sur la liste, ce qui est trรจs dangereux, surtout รฉtant donnรฉ que les lois changent, et que la police et lโ€™รฉtat ne fonctionnent pas dans notre intรฉrรชt, ou ne visent pas ร  protรฉger les gens. Encore une fois รงa rappelle ร  ce que Sana et Maya  discutaient. Cโ€™est ร  dire, il sโ€™agit du contrรดle. Comment te forcer ร  faire ce que nous voulons que tu fasses. Il ne sโ€™agit pas de la protection ou de la sรฉcuritรฉ. Il y a quelques organisations dans le domaine de la rรฉduction des risques. Alors il y a des organisations qui travaillent avec des gens qui sont engagรฉs dans le travail criminalisรฉ, que ce soit lโ€™usage des drogues ou la vente du sexe. Mais pour la plupart, oui, cโ€™est criminalisรฉ ici.

K: Khady I would also add with regard to registries, there are several states in the United States that participate in including sex workers who are typically, I donโ€™t want to misquote this, but typically itโ€™s similar to like, three strikes arrests for prostitution-related charges or trafficking-related charges, and I think itโ€™s seven states now, but I can look that up for you, that participate in including offending prostitutes right, so sex workers who have been entrapped by or criminalized by, or caught up in the carceral system, that are then put on sex offender registries. And that, Fleur maybe you can remember if itโ€™s, I think itโ€™s still seven states, have those registries. But that comes with all sorts of other kind of impactful, harmful, dangerous โ€“ not just having your name, right, and your address, but you canโ€™t move certain places. If you have children, this is like, you can imagine the impact of this. So I can look that up if they are interested in knowing that aspect of criminalizing law. Thatโ€™s something to make note of as well, that even if we donโ€™t have, kind of codified in law these health notebook type things, there are other mechanisms that states will put on their books to kind of regulate the movement and bodies of sex working people. And that our government usually equates sex working people either as helpless victims in the law or perpetrating, like, mastermind criminals. Like we have this dichotomy in our law, and so it plays out like that, like either youโ€™re a sex offender who is like a predator, or you are only ever a woman or a girl in need of saving, because, you know, you donโ€™t have agency or autonomy, right, to be making these decisions. So I would add, just to color in some of everything that Fleur said, like that too manifests in practice in our legal system.

K: Khady jโ€™ajouterais aussi ร  propos des registres, il y a beaucoup dโ€™รฉtats aux ร‰tats-Unis qui participent ร  lโ€™inclusion des PS qui sont, je ne veux pas mal citer, mais รงa ressemble aux arrestations des trois fautes pour des accusations liรฉes ร  la prostitution ou ร  la traite dโ€™รชtre humain, et je pense quโ€™il y a sept รฉtats maintenant, mais je peux chercher cela pour vous, qui participent ร  l’inclusion des prostituรฉes dรฉlictueuses, donc les travailleuses du sexe qui ont รฉtรฉ piรฉgรฉes ou criminalisรฉes par, ou entrรฉes dans le systรจme carcรฉral, qui ont รฉtรฉ ensuite inscrits sur les registres des dรฉlinquants sexuels. Et รงa, Fleur peut-รชtre tu peux te souvenir sโ€™il sโ€™agit de, je pense ce quโ€™il y a toujours sept รฉtats qui ont ces registres. Mais il y a tant dโ€™effets percutants, nรฉfastes, dangereux, pas seulement le fait dโ€™inscrire ton nom et adresse, mais tu ne peux pas dรฉmรฉnager ร  certains endroits. Si tu as des enfants, cโ€™est comme, tu peux imaginer lโ€™impact. Alors je peux le chercher si elles sโ€™intรฉressent ร  connaitre cet aspect de la criminalisation. Cโ€™est quelque chose ร  noter aussi, que mรชme si nous nโ€™avons pas cette loi codifiรฉe, ces genres de carnets sanitaires, il y a dโ€™autres mรฉcanismes que les รฉtats vont employer pour contrรดler le mouvement et les corps des gens qui travaillent dans lโ€™industrie du sexe. Et que notre gouvernement dit que les PS sont soit ay victimes qui nโ€™ont pas dโ€™autonomie, ou bien des criminelles tout puissantes. Cโ€™est ร  dire, nous avons cette dichotomie dans notre loi, comme si soit tu es un dรฉlinquant sexuel qui ressemble ร  un predateur, ou bien tu es une femme ou une jeune fille qui doit รชtre sauvรฉe, tu sais, parce-ce que tu nโ€™as pas de pouvoir ou dโ€™autonomie pour faire ces dรฉcisions. Alors jโ€™ajouterais, pour ajouter ร  ce que Fleur vient de dire, que รงa aussi se voit dans notre systรจme juridique.

59:23

S: Trois dรฉlits, mรชme [inaudible] bi, boo nekkee PS, trois dรฉlits quoi.

S: Three strikes, even [inaudible], if youโ€™re a sex worker, itโ€™s three strikes.

M: Trois dรฉlits boo xam ne, tej nanu.

M: Three strikes and you know, they lock you up.

S: Trois dรฉlits bu fekkee ne en tant que PS walla drogue bi ak yepp? Jโ€™ai pas compris trois dรฉlits.

S: Three strikes as in sex workers or drugs and everything? I didnโ€™t understand three strikes.

K: Three strikes laws, I think my partner is right here and knows this for a fact. One second โ€“ three strikes laws come out of the 1990s, like, and thatโ€™s even though theyโ€™re not codified necessarily everywhere, itโ€™s become like an elective policing, court-based โ€“ the like three strikes laws.

Where itโ€™s like, they give you cold fried chicken, and they make you watch a video, and they tell you to like turn your life around. And they usually have some kind of like Christian-based ministry group come and give you pamphlets, and they give you like, they make you stay in jail until you can like get out, or they give you the slap on the wrist and then kind of, we call it Catch and Release. And that will happen like your first two times. But your third time, youโ€™re probably going to do an extended amount of time. Youโ€™re probably going to pay a larger fine and/or that option, the like quote unquote, what is it called, the charitable option, right, that the county sees itself giving you, of like, the exit school or exit program, thatโ€™s not available to you anymore. And now youโ€™re deemed like, a real criminal. And so thatโ€™s an example of like, itโ€™s not technically a three strikes policy, but it plays out in this really strange way, all across the United States. And itโ€™s just a way of escalating sentencing. Does that make more sense?

K: Les lois des trois fautes, je crois que mon partenaire est juste ร  cรดtรฉ et le sait sans aucun doute. Un moment – les lois de trois fautes viennent des annรฉes 1990s, te, mรชme si elles ne sont pas nรฉcessairement codifiรฉes partout, elle est devenue une faรงon de maintien de lโ€™ordre รฉlectif, basรฉ sur les tribunaux – comme les lois des trois fautes.

Oรน cโ€™est comme, ils te donnent du poulet frit froid, et ils te font regarder un vidรฉo, et ils vous disent quโ€™il faut changer ta mode de vivre. Et ils ont une sorte de groupe de ministรจre Chrรฉtien qui vient te donner des brochures, et ils vous donnent comme, ils te font rester en prison jusqu’ร  ce que tu voulusses sortir, ou ils te donnent une tape sur les doigts et puis, nous l’appelons โ€œCatch and Release.โ€ Et cela sโ€™applique aux deux premiรจres fois. Mais la troisiรจme fois, vous allez probablement passer plus de temps en prison. Vous allez probablement payer une amende plus lourde et/ou cette possibilitรฉ, entre guillemets, comment s’appelle-t-elle, l’option caritative, tu vois, que le district pense quโ€™il te donne, lโ€™รฉcole de sortie, ou bien le programme de sortie, tu nโ€™auras plus accรจs. Et maintenant, on te considรจre un vrai criminel. Et donc c’est un exemple, ce n’est pas exactement une politique des trois fautes, mais รงa se passe de cette maniรจre tellement bizarre, partout aux ร‰tats-Unis. Et ce n’est qu’un moyen d’augmenter les peines. Est-ce que รงa fait plus de sens ?

M: Da nu ne bandit nga.

M: They say that youโ€™re a criminal.

S: Ci booba, danu utiliser รฉglise bi.

S: They use the church for that.

KD:Waaw voilร .

KD:Yes thatโ€™s it.

S: Danuy utiliser รฉglise bi.

S: They use the church.

KD:Waaw voilร .

KD:Yes thatโ€™s right.

S: Danuy utiliser รฉglise bi. Danuy xam ne kii PS la.

S: They use the church. They know that she, sheโ€™s a sex worker.

KD:Voilร , cโ€™est comme รฉglise day gniow, day jox ay fiches ak information, โ€œli nga def baaxul, da nga war a โ€“ 

KD:Right, itโ€™s like, the church comes and gives flyers with messages, โ€œwhat youโ€™re doing is bad, you have to โ€“

S: Mรชme Musulmans day def noonu parfois de. Bunu xamee li danga mel ni ku lay moytu.

S: Even Muslims do that sometimes. When they know this about you, you become someone they avoid.

KD: Waaw, waaw.

KD: yes, yes.

M: Nyoom, trois dรฉlits la. Dโ€™abord danu lay conseiller. Mais aprรจs, comme si bandit nga. [inaudible]

M: Then, itโ€™s three strikes. First they give you advice. But later, itโ€™s as if youโ€™re a bandit. [inaudible]

M: Bu de nun la, bu dee Sรฉnรฉgal, soo defee benn dรฉlit,  men nanu la tejj. Parce-ce que loi PS ak loi population gรฉnรฉrale benn la. La loi, benn la, par rapport ร  la loi population gรฉnรฉrale. Par rapport ร  la population gรฉnรฉrale, mooy PS, UD yi, ak neenen yi, seen loi bi benn la.

M: If it was us, if it was Sรฉnรฉgal, if you commit one offense, they can lock you up. Because the law for sex workers and the law for the general population is the same. The law is the same, in relation to the law for the general population. In relation to the general population, for sex workers and drug users and others, the law is the same.

KD:Kon boo defee benn dรฉlit, men nanu la tejj.

KD:So if you commit one offense they can lock you up.

M: Waaw รงa dรฉpend. Soo amee avocat bu baax, mais men na bun a lourd peine. Men nga am benn mois, ak ceci

M: Yes it depends. If you have a good lawyer, you can avoid a harsh sentence. You could have one month or something.

S: Walla 15 jours

S: Or 15 days.

M: Walla 15 jours fermรฉ. Walla un mois, six mois.

M: Or 15 days in custody. Or one month, six months.

S: Mais peine bi du lourd.

S: But the sentence wonโ€™t be severe.

M: Du nekk peine bu lourd. Avertissmenet lay donne. Du nekk peine bu lourd. Mais boo amatee, peine bi day gen a โ€“

M: It wonโ€™t be a severe sentence. Itโ€™s like a warning. It wonโ€™t be a severe sentence. But if you have another, the sentence will be more โ€“

S: Ok Khady, boo leen waxee loolu, ne ko nun tamit, nuungi content chaque fois ci seen waxtaan di nanu ci jang. Xamuma ba xam sunu waxtaan, nyoom tamit nyuungi ci jang. Da nu am partage bu baax. Surtout Kira. Kira day partager bu baax. Cโ€™est trรจs important. Par rapport ak moom, xam na lu bere ci ร‰tats-unis lu nekk foofu, pourtant dem unu foofu. Du degg? Chaque waxtaan danu ci jang lu bere. Personellement danuy jang lu bere. Contaan nanu torop. Fleur aussi baaxne. Mais Kira moom cโ€™est le meilleur.

S: Ok Khady, when you tell them that, tell them also that we too, weโ€™re happy with the conversation. Every time, we always learn something. I donโ€™t know whether with our conversation, they also learn something. We have a great exchange. Especially Kira. Kira shares really well. Thatโ€™s very important. Regarding them, they know a lot about the United States and what itโ€™s like, whereas we havenโ€™t been there. Right? Every conversation we learn a lot. Personally we learn a lot. Weโ€™re very pleased. Fleur is also great. But Kira is the best.

KD : Begg nga ma wax loolu de ?

KD : Do you want me to say that ?

S: Non jow uma de. Point de vue lanuy wax rek. Ay points de vue.

S: No Iโ€™m not gossiping. Weโ€™re just sharing points of view. Just points of view.

M: Da nu xame, Fleur moo gen a ki,

M: Weโ€™re saying that Fleur is more, what is it,

S: Non da ma remarquer naari causรฉries. Kira moo gen a participer. Parce-ce que ci moom lanu gen a jang. Kee, Fleur, danuy jang, mais cโ€™est un peu lent. Mais kii da fay dugg, day xot dal. Day xotal ba ci biir. Kon du coup di nanu xam realitรฉs u Amerik. Voilร . Peut-etre kii moo gen a agรฉ. Moo gen a xam milieu bi. Peut-etre loolu la tamit. Parce-ce que am na questions yoo xamantane duma ko xam. Kii da fa ko xam. Comprends nga? No diffรฉrence bi loolu la moom. Loolu mootax ma expliquer.

S: No I noticed in the two conversations. Kira participates more. Because we learn more from them. The other one, Fleur, teaches us things too, but itโ€™s a little slow. But the other really dives in, goes deep. They go all the way to the core of it. So all of a sudden we know Americaโ€™s realities. There it is. Maybe theyโ€™re older, they know the environment more. Maybe itโ€™s that as well. Because there are questions that I donโ€™t know. But she [Maya ] knows. You understand? No thatโ€™s the difference. Thatโ€™s what I wanted to explain.

M: Mais cโ€™est bon.

M: But itโ€™s good.

S: Cโ€™est bon.

S: Itโ€™s good.

M: Content nanu. Parce-ce que normalement am na trois questions. Mais benn question lanu rรฉpondre.

M: Weโ€™re pleased. Because normally there are three questions. But we only answered one.

S: Benn question rek lanu wax.

S: We only talked about one question.

M: Xanaa beneen date bi inshallah. Comme รงa nu kii, bu dee am satisfaction, rรฉpondre nanu bu baax. Te nyoom tamit repondre nanu ci, ba nu gis ko.

M: Maybe on the next date, if Allah wills it. This way we, if theyโ€™re satisfied that we responded well. And they also responded well so we see things more clearly.

S: Waaw. Content nanu ci rรฉponses yi torop.

S: Yes. Weโ€™re so happy with the answers.

M: Waaxleen lepp te remercier leen bu baax. Parce-ce que trois questions la. Waaye benn question lanu rรฉpondre. Des na deux questions aprรจs. Les derniรจres deux questions rek, men nanu japp beneen jour, nu wax nu, aprรจs nu dajewat inshallah.

M:Tell them everything and thank them so much.. Because there are three questions. But we only answered one. Two questions are left now. The last two questions, we can pick another day. They can let us know. After we will meet again if Allah wills it.

S: Sincรจrement waxtaan โ€“

S: Sincerely, the conversation โ€“

M: Vraiment content nanu dal. Jโ€™espรจre bien quโ€™on a bien rรฉpondu aux questions aussi.

M: Weโ€™re truly pleased. I hope also that we too answered the questions well.

KD:Waaw waaw dรฉgg la.

KD:Yes, yes itโ€™s true.

M: Questions yi nu posรฉes rรฉpondre nanu bu baax.

M: They responded really well to the questions we asked.

S: Content nanu waaw.

Yes, weโ€™re pleased.

M: Nu def close.

M: So we can conclude.

S: Thank you very much. Sincรจrement. Ne ko content nanu torop. Ne ko nu jang Wolof nu gniow Sรฉnรฉgal. Kira mu jang Wolof gniow Sรฉnรฉgal vacances.

S: Thank you very much. Sincerely. Tell them that weโ€™re so pleased. Tell them they should learn Wolof and come to Sรฉnรฉgal. Kira should learn Wolof and come to Sรฉnรฉgal for vacation.

M: Ak Fleur yepp.

M: And Fleur and everybody.

S: Ne ko nu jang Wolof nu gniow Sรฉnรฉgal. OK?

S: Tell them to learn Wolof and come to Sรฉnรฉgal. OK?

F:Yes, retreat in Sรฉnรฉgal!

F:Oui, vacances au Sรฉnรฉgal!

[laughter]

[rires]

S: Inshallah

S: If Allah wills it.

[overlapping voices]

[les voix se superposent]

S: Merci beaucoup.

S: Thank you very much.

M: Merci.

M: Thank you.

F:Happy new year.

F:Bonne annรฉe.

[overlapping voices]

[les voix se superposent]

S: Ah Khady, da fa begg nu def invitation? OK amul probleme. Dinanu waxtaan. Nu jang Wolof aprรจs nu gniow. Sinon nu jang Francais aprรจs nu gniow. Su fekkee ne Anglais la day difficil torop.

S: Ah Khady, they want an invitation? Ok no problem. After weโ€™ll discuss. Theyโ€™ll learn Wolof and come, or learn French and then come. If they speak only English that would be too difficult.

F: Got it.

F:Bien compris.

KD: Sana doo ma inviter? [rires] OK, anyway.

KD: Sana youโ€™re not inviting me too? [laughs]OK, anyway

S: Ma inviter la yaw, ma inviter la?

S: Shall I invite you, shall I invite you?

KD:Waaw waaw

KD:Yes yes.

M: Gniowal nu lekk cere.

M: Come and weโ€™ll eat millet couscous.

S: Waaw gniowal.

S: Yes come.

M: Gniowal nu lekk cere.

M: Come and weโ€™ll eat millet couscous.

S: Men nga tokk ba annee prochaine, nuungiy gniow nu degg Wolof moo gen. Walla nu and ak yaw gniow vaccances.

S: You can wait a year so that they come when they understand Wolof, that would be better. Or you come with them and come for vacation.

F:How do I say happy new year in Wolof?

F:Comment dit-on Bonne Annรฉe en Wolof?

M: Gniowal nu lekk cere. Gniowal nu lekk cere.

M: Come over and eat millet. Come over and eat millet.

KD:Danu ne deweneti.

KD:They say happy new year.

[overlapping voices, goodbyes]

[Les vois se superposent et disent au revoir]

M: Bonne annรฉe. Merci.

M: Happy new year. Thank you.

S: Naka lanuy waxe bonne annรฉe en Anglais?

S: How do we say happy new year in English?

KD:Nu ne, Happy New Year.

KD:They say, Happy New Year.

S: Happy New Year.

M: Happy New Year.

Voices overlap, saying goodbye and sending good wishes.

Les vois se superposent, disant au revoir et envoyant des bons voeux.


Back to basics: Street Art as CounterTech by Zara Raven

When Ashanti Carmon, a 27-year-old Black trans woman was killed in DC, a local news report included a quote from a neighbor complaining about sex work and condoms on the street rather than highlighting the needs of Black trans communities at increased risk of violence due to employment discrimination, housing discrimination, racism, transphobia, and cissexism.

Despite widespread moral panic about sex trafficking, most ordinary people donโ€™t understand how their responses to street-based sex work might be contributing to violence, exploitation, and trafficking in the sex trade. The reality is that many communities, and especially Black and brown trans women, are pushed out of traditional forms of work, turn to underground economies like the sex trade to meet their needs, and then face criminalization and homelessness (and worse: the criminalization of homelessness) that makes them vulnerable. 90% of street-based sex workers have experienced violence in the course of their work, and often, that violence comes directly at the hands of law enforcement.

At the same time, with the rise of gentrification and the influx of more affluent, often white new residents, neighbors are increasingly turning to the police to make complaints about their Black, brown, and poor neighbors occupying public spaces. 2019 data from the Community Service Society of New York shows that quality of life complaints increased by 166% in long-standing communities of color that had had large influxes of more affluent, especially white new residents. Consistently, wealthier (mostly white) residents move in to neighborhoods and use their complaints to police the behavior of longtime residents of color as a way to establish new neighborhood norms that make communities of color feel less welcome and safe. Instead of advocating for increased resources to address the root causes, neighbors use their complaint calls to police to displace marginalized communities.

Street-based sex workers and their more stably housed neighbors have a shared goal: community safety. For Black, brown, and poor communities, policing is a primary source of the violence. And for new neighbors, calling the police is often all they know. So, how can equip communities with new strategies for building safety without calling the police?

While some gentrifiers might truly intend to push out neighbors of color that they deem โ€œundesirableโ€ by calling the cops, we can still reduce harm by providing neighbors with alternatives, understanding, and education. As organizers, we need to educate communities about the reasons that people trade sex on the street and the risk factors that make them vulnerable to the violence, trafficking, and exploitation that we have a shared interest in disrupting. As weโ€™re innovating new ways to use technology to better support people in the sex trades in the wake of FOSTA and SESTA, we also need to get creative about fighting the traditional ways that technology has been weaponized against those who are most marginalized in the sex industry. 

Ending the criminalization of sex work is an essential part of the strategy to curb violence against people trading sex and people profiled as sex workers, and in places like Washington, DC and New York, sex workers, advocates and lawmakers are working to pass comprehensive legislation that seeks to decriminalize the buying and selling of sex among adults, whlie also targeting the many other laws that criminalize sex workers for surviving, like the #WalkingWhileTrans ban that acts as โ€œStop and Friskโ€ for Black and Latinx trans and cis women, and the criminalization of housing sex workers that puts people at increased risk of trafficking.

But this policy change wonโ€™t happen overnight, and itโ€™s not enough on its own. Apart from decriminalization and decarceration, we have to change the social norms that stigmatize and harm sex workers, which disproportionately impact those working on the street. And we have to fight stigma with education.ย 

Research shows that art, when paired with education, can change behavior. With support from Hacking + Hustling, and Decrim NY worked with the NYC-based artist M on new art to tell our stories: the stories of street-based sex workers and sex workers who have experienced police violence, and to urge neighbors to stop calling the police on their neighborss. Weโ€™ve plastered the art throughout neighborhoods like Jackson Heights, Prospect Park, and Hunts Point and our canvassers have engaged in dialogue with neighbors about the real problems of trafficking, violence, and exploitation in the sex trades and in public spaces, and helped them understand that our communities need more resources, not more policing.

The Coding of Risk: From Sex Work to Sanctions

Danielle Blunt: Welcome everyone. Today we are here for a panel on The Coding of Risk: From Sex Work to Sanctions. 

Before we get started, we wanted to let you know that it’s totally okay to take screenshots or tag us on Twitter. If you wanna tag @hackinghustling or @article19org

So hello, I am Danielle Blunt. I am a sex worker and co-founder of Hacking//Hustling, a collective of sex workers and accomplices working at the intersection of tech and social justice to interrupt state surveillance and violence facilitated by technology. I’m also a public health researcher, currently researching the financial discrimination of sex workers. 

Today’s panel explores the overlap in financial discrimination and censorship of citizens of sanctioned countries and sex workers. The goal of the session is to explore how algorithms expansively code and therefore produce categories of marginalization and the processes that control the flow of information and capital. How are communities coded as high risk by financial institutions? How does a high risk assessment impact people’s lived experiences, increase vulnerability and disrupt mutual aid? 

Joining us for this conversation today, we have with us Mahsa Alimardani, an internet researcher focusing on political communication and freedom of expression online at Article 19, and is a doctoral candidate at the University of Oxford. 

We also have Afsaneh Rigot, a researcher focusing on law technology, LGBTQ, refugee, and human rights issues. She’s a senior researcher at Article 19 on the Middle East and North Africa team focusing on LGBTQ rights, police tactics, and corporate responsibility. Afsaneh is a fellow at Harvard Kennedy School’s technology and public purpose program, furthering her work on corporate responsibility and her design from the margins framework. She is an affiliate at the Berkman Klein Center where she continues work and research on the use of digital evidence in prosecutions against MENA LGBTQ communities. 

And we also have Lorelei Lee, a writer, sex worker, activist, organizer, juris doctor, justice catalyst fellow, a co-founder of the Disabled Sex Workers’ Coalition and the Upstate New York Sex Workers’ Coalition, a founding member of Decrim Massachusetts, and a researcher with Hacking//Hustling. Their writing appears in n+1, The Establishment, Spread, Denver Quarterly, The Feminist Porn Book, Coming Out Like a Porn Star, We Too, Hustling Verse, and elsewhere. Their book, Anything of Value: Looking at sex work through legal history, memoir and cultural criticism, is anticipated in 2023. So to start off, I’d love for all of you to introduce yourself a little bit further and what perspectives and insights you’re bringing to this conversation. Lorelei, I’ll go ahead and start with you.

Lorelei Lee: Yeah. Hi everyone. I’m so happy to be having this conversation. Just the few meetings that we’ve had have been so generative. So I’m really thrilled to be talking about this here. 

I started to think about some of the comparisons between treatment of people profiled as being in the sex trades and treatment of people profiled as being Arab or Muslim in the United States when I was working at the Center for Constitutional Rights and noticed that a bunch of their work on where they were seeing folks being de-platformed for doing Palestine solidarity work, for example, folks being, by de-platformed mean kicked off of tech platforms and kicked off of financial tech platforms. They’re, you know, not being allowed to accept donations, et cetera. And I just noticed that that is the same thing that happens within the sex worker community. 

We all know, you know, that it happens to all of our friends. So I started to just think about this similarity in what I think a lot of people think of as two very different groups of people. Now, of course, that’s not true. We are overlapping groups of people, but I think the more, maybe something else that is an important point to come out of this is how, to the government, we are very similar types of people. So in the United States, we have legal regimes that target trafficking, we have legal regimes that target terrorism and we have sanctions regimes. And each of those regimes, they’re made up of a group of laws. Each of them are made up of a group of laws. They claim to target a very specific and horrifying type of violence, but they do so through vaguely worded statutes that are very broad. And they’re intentionally broad in order to allow for discretion in their enforcement. It’s good for government officials, it’s good for prosecutors and it’s good for Congress if these laws are thought of as targeting this bad thing and the bad thing could be everywhere. And, so we โ€“ we’re going, there’s like- they’re pretending that there are clear lines in the language they use to discuss it while simultaneously making the laws very ambivalent so that they can define it as they go. And so that has caused all kinds of problems in relationship to tech companies specifically, but also any companies really. And we’ve seen this kind of profiling- actually what’s happening is an over compliance with these laws. So because these laws are vague, companies don’t want to take legal risk, of course. And so they will make their rules be the furthest they can be, out on the edge of where the rule could be. So, you know, like the behavior that the law is targeting is way over here, and then things that are thought of as adjacent to that behavior, but really it’s people who are thought of as adjacent to that behavior, are like all the way over here. 

And this is where they’ll draw the line. And so they’ll develop policies that are actually meant to profile and exclude. So I think that this is an intentional scheme on the part of the U.S. government, as well as on the part of corporations in which the government can claim that these problems, these types of violence are external to the United States or external to the social body that is thought of as the good American citizen. And so with trafficking, I mean, it’s very explicitly framed as being about people who are socially deviant in a way. And then the folks who get profiled under that regime are sex workers, regardless of whether trafficking has happened in their place of work or not. And then of course under the anti-terrorism regime, Muslim and Arab people are targeted. And then under the sanctions regime specifically, Iranians are targeted. And so all of these are folks who the government feels don’t need to be part of the social body. And in fact, it’s better for them if we are not. And corporations, similarly, if you externalize these harms, then you can claim that your actions are always good, that this doesn’t happen inside of my organization. It only happens outside of it. And so I only have to focus outside of, and so specifically for anti-trafficking protocols, there have been a lot of instances where companies are, have horrifying worker treatment and like no labor rights within their company, but that’s not important. That’s pushed to the side in order to focus on what is thought of as the most extreme form of labor violation, which is trafficking. And, you know, so this kind of division is happening through this scheme. And I think I had one more point that I wanted to make, which is really just to note again that this, these are schemes that criminalize people while they pretend to criminalize behaviors.

Danielle Blunt: Thank you, Lorelei. Mahsa, would you share a little bit about your perspectives and insights that you’re bringing to this conversation?

Mahsa Alimardani: Definitely. So, I mean, I want to start from a point that Lorelei just made, which was the intentionality of these laws, which I think is very interesting because my work centers on access to the internet and freedom of expression online in Iran, and this is very much of value that the U.S. government (inaudible) to be behind. And, you know, they have a lot of, I mean the state department constantly talks about their belief in freedom, freedom of the internet, even under the Trump administration we’ve seen these values reiterated. And when we’re looking at Iran, it is naturally a country, you know, that has a repressive government, a repressive system in play that is causing a lot of hurdles to access to information and freedom of information online. 

But on the other hand, there are restrictions put into place by the U.S. government and many will argue, well, you know, if the U.S. government didn’t have these restrictions, it would still be repressive in Iran for, you know, internet users in Iran, which is true. It would be. But if we’re, you know, concentrating on policies in the U.S. this is, you know, the low hanging fruit we can change, which is to ease access through these policies. And so as Lorelei mentioned, there is a series of restrictions placed on how Iranian users inside Iran, even sometimes outside of Iran, have access to certain services. How this manifests itself for freedom online is very interesting. 

So we have sanctions, and sanctions in place typically means that U.S. entities cannot provide services or do business with Iran, but there have been provisions, again, because of, you know, the value of freedom online, because of the value of freedom online, where there is actually a license given by OFAC, the Office of Foreign Asset Controls at the U.S. Treasury that has, it’s called General License D, which is supposed to allow for services that enable personal communications. How this gets misinterpreted and how we see platforms like Slack being blocked for Iranians has a strong component to do with the topic at hand today, which is financial discrimination. So the laws get interpreted in a way to argue that certain services being provided to Iran or Iranian entities are breaking sanction because they are being, they are involved in financial transactions. Oftentimes they are not. And so I guess that’s where this comes into play. 

This intersection between what U.S. values are, how it’s being put into play, how companies, a word that we’ll probably use a lot today, are over-complying with these laws and how the U.S. government is not necessarily making it easier. Part of the work that I’m doing at Article 19 is I’m working on different ways to persuade the companies to A. Stop over-complying. And, B. For the government, the U.S. government, to make more rigid, a more rigid general license D, which is, it won’t be subject to, you know, the interpretations that companies like Apple, Google, Slack have been doing, which has been misidentifying certain services that are vital for access to the internet or freedom, freedoms online, and misinterpreting them as financial transactions. I mean, there is a wider discussion about why Iranian users have to be subjected to these financial hurdles, and that is a very valid conversation. And I think we’ll get into it as well, but I just wanted to put into context how this is a major issue for freedom online. 

And I think I’m getting a message that I, there’s some issues with my microphone sound, and I will try to fix that. And I apologize if that was getting in the way.

Danielle Blunt: Thank you so much. And Affi, I’d love to hear from you about what you’re bringing to this conversation.

Afsaneh Rigot: Yeah. Hi. Just quickly, apologies โ€“ narrow video here so it might be a very dark screen, but it’s RightsCon, we’ll deal with it. 

So it’s a fascinating conversation, and I’m really glad to be part of it in this sort of bridging of the different work and activism and advocacy that different communities have been doing around this concept of financial discrimination. I think having conversations with yourself and having conversations with Mahsa and Lorelei and folks like Kendra, our mutual friend at the (inaudible) clinic, and so on has highlighted this concept of the same sort of patterns and systems and methodologies used to target individuals who are deemed high risk. And, you know, we’ll get into this conversation about how high risk is presented and who gets to choose what high risk means and how the sort of methodologies employed throughout these different procedures, whether it’s trafficking, whether it’s money laundering, whether it’s terrorism, whether it’s sanctions, they tend to use the same sort of methodology for all of them and, you know, as we’ll get into, apparently the same databases. 

So when we’re discussing these sort of topics and bringing it into consideration of the impact of tech on marginalized communities, which is something I deeply focus on in my work, focusing on like the impact on communities, specifically queer communities in the MENA region, I see some of the things often. I see some of the things often when it comes to the use of morality framing to target those most marginalized through law enforcement, the justification of targeting those most marginalized, those seen as low risk in terms of prosecutions because the prosecutions can happen so quickly. It, it kind of hits a nerve similarly when it comes to these concepts around who gets blocked off from access to financial institutions and who gets blocked off from access to platforms and so on. And the use of this sort of morality framing that Lorelei was really beautifully outlining that who, you know, how they try and frame who is high risk in these situations. 

It, I think whoever has done any sort of studies in to like enforcement and police enforcement sees the overwhelming similarities of how they use these sort of frames and who becomes a target to it. So I come from it from a perspective of, one, being an Iranian, who has been subject to these issues from family to friends, but also as someone who’s been working as part of Article 19, supporting work with Mahsa’s work on sanctions, and also looking at the way these sort of blockages affect the queer communities that I look at, not in the way of getting thrown off, but in the way of just not having any access, knowing that you’re not welcome. And that’s something we’ll talk about later. 

But yeah, I’ll leave it as that I come to this conversation with just a lot of solidarity and joy that these advocacy projects and movements and works is happening, including from Hacking//Hustling, the work that has been happening on Iran sanctions. We should be bringing that all together because it’s one common methodology used around the most marginalized within these contexts. And it makes a lot of sense for us to be clamoring together, to highlight how it’s affecting those folks that fall under their risk appetite. So I’ll leave it there.

Danielle Blunt: Thank you, Affi, and thank you for bringing up the importance of cross movement work and building solidarity across movements so we can work together and build knowledge together and build power together. 

So in our conversations, we’ve been talking about some of the parallels in anti-trafficking and antiterrorism laws and sanctions and Lorelei, in your intro you were talking a little bit about how these laws are really about policing people, not behavior. And I was wondering if you could talk a little bit about some of the parallels in anti-trafficking laws and antiterrorism laws and how these can lead to the production of high-risk communities and the subsequent financial discrimination of marginalized communities.

Lorelei Lee: Yeah. So I think the parallels, and I’m going to apologize, I may repeat something that I have already said, but I think the parallels are really in the enforcement. So there’s parallels in the, in the language in that both- So, okay. So if we’re talking about trafficking in the United States, we’re talking about a couple of different major laws, the Trafficking Victims Protection Act, and that has been modified by FOSTA, which a lot of people have heard of recently, it passed in 2018. That’s the Freedom from Online Sex Trafficking Act. And then FOSTA also modified something called the Mann Act, which was passed in 1910, which was originally called The White Slave Traffic Act. And each of these is a, are laws that claim to target trafficking. However, for example, the Mann Act in the decades after it was passed, started to be used to prosecute things like adultery, you know, having a mistress and crossing state lines with her. It was always a “her” in, in that time because the Mann Act was specifically about crossing state lines with women for immoral purpose. And that was the language of the law at that time. And in fact, a Mann Act case was also brought against a woman who traveled by herself on a train across state lines. And they said that even though the language of the law made it sound as though you would have to be transporting someone else and not yourself, they needed to prosecute her in order to be sure of getting at the entirety of the evil the law was trying to target. (laughs) So, similarly, we have, we have FOSTA, which we don’t know how it’s going to look, but we do know that FOSTA expands the federal trafficking statutes to also put prostitution for the first time into federal law, a criminal statute against prostitution. What FOSTA actually says is that you can’t use a computer service, there’s a bunch of legal language around what a computer service is, but internet technology to promote or facilitate the prostitution of another person. And so that’s the first time that we have prostitution really becoming a federal crime. And then the TVPA is the law that was passed in 20- in 2000 around the same time that we have the Palermo Protocols internationally, and it is a very specifically describing, you know, creating a definition for what trafficking is and what sex trafficking is. However, it also defines trafficking, it defines trafficking, sex trafficking, as the exchange of sexual behavior for anything of value. And so it encompasses any kind of trading sex, not just coerced or forced sex trading. However, it only criminalizes severe forms of sex trafficking, and so they have a different definition there that does include force, fraud and coercion. And then in the anti-terrorism statutes, they’re called the material support statutes, and they prohibit the provision of material support to foreign designated terrorist organizations. The United States keeps a list on which they assign organizations as FTOs, and the definition of what it means to provide material support has become very broad. It’s similar to these other laws where a case out of the Ninth Circuit said that HLP, which was an American organization who, Humanitarian Law Project, and they wanted to do some work with some organizations in other countries who had been designated on the foreign terrorist organization list. But the work that they wanted to do was human rights work. They wanted to specifically provide training for nonviolent dispute resolution methods, such as filing complaints with the U.N., et cetera. And the court decided that providing nonviolence training was providing material support because the organization that had been designated could- it was, it was going to be fungible with resources that they could then put toward buying weapons, for example. So if they don’t have to pay for peaceful mediation services, they can use money to buy weapons. So the idea here is that this thing that is pure speech is now fungible with money. And it made me think of when you were talking, made me think of that when you were talking, Mahsa, because I do think what, what’s happening with these tech platforms also. We have a lot of blurring. Where, is this about money? Is this about speech? And is it really just about excluding folks from everything, from, you know, having access to financial technologies, having access to platforms at all? And I, you know, I also, you know, I mentioned that one of these laws is the, or was originally called the White Slave Traffic Act, and I think that’s really also important to bring up because I do think that these laws are also all of them are rooted in racial capitalism, in systems of racial capitalism in the United States, in the criminalizing of some behaviors, but specifically behaviors by some people. And when you have something like the White Slave Traffic Act, where what you’re doing is trying to remove women, white women who, you know, women who are assigned to this thing called whiteness, you’re trying to preserve that thing called whiteness by removing them from situations where they might be having interracial sex and simultaneously continuing to criminalize, for example, black women in the sex trades, which is what happened after the passage of that law. Really sort of a building of a rescue industry and simultaneously a criminalization industry. And so I know these are, I’m sort of going on these tangents that aren’t direct to the topic today, but I think you can probably see how all of this leads to a kind of exclusion online that is just a progression from an exclusion that’s been going on for hundreds of years.

Danielle Blunt: Thank you, Lorelei. Yeah. And so I, I hear what you’re talking about and how broad these laws are, which can lead to like a gross over enforcement of them. 

So Affi, this question is for you, how does the coding of risk happen at financial institutions? And could you talk a bit about the process by which individuals and communities are deemed to be high risk?

Afsaneh Rigot: Sure. Also, thank you Lorelei and Mahsa on these outlines. And I mean, just like following up on this notion of the sort of vague and broad scope that these institutions are being provided with in terms of implementation, we’ll see, we’re gonna be seeing it in terms of risk profiling, and you don’t see my fingers here, but I’m going “risk”, you know, air quotes. (laughing) Risk profiling.

So I think it’s interesting to do it with a case study of a particular bank that I managed to get some sort of insight from in terms of how their doing some of their risk profiling.

This is a bank based in the UK, but the sort of work and methodology they use is, is replicated throughout. Different banking systems have different risk appetites. So some of these percentages might differ and some of the softwares might differ, but the notion remains the same. And one thing that to keep in mind is that in risk profiling, and this is something that Blunt, you and I in other conversations were talking about is like this deputization of people to take on the profiling and methodology. So let’s say financial profiling they’re doing that sort of online profiling of accounts. So there’s this methodology of using third party due diligence softwares. If you’re a banking system, you will be often using your own databases and checking your accounts against more broader, larger international databases, such as I’ll give you a few names here, LexisNexis, WellCheck, and NetReveal. So depending on what software the bank itself has, it’ll usually check its data components against something like LexisNexis and WellCheck.

A little bit of a background because I went down the black hole, I’m looking at the rubbish these companies get into. LexisNexis and WellCheck are both owned by Thomson Reuters and RELX, who are doing data brokering on the side of their journalism, which is always nice to hear. So in terms of this data, brokering and selling of data, what happens is that millions of profiles from, the last I checked with WellCheck is 2.5 million profiles with 25,000 new profiles added monthly. These are profiles seen as high risk, whether it’s on terrorism as well as on trafficking and so on. So checking this the bank will look at whether or not a profile is matching it, depending on their risk appetite, on a 25, 30, 50, 75 or 100 percent scale. And then you bring in the sort of human element that is the employees who will go through these profiles and check it.

What triggers off these sort of risk alarms in different situations with sanctions and countries, as Mahsa has explained and will continue to explain, it’s really not that complicated. Literally the name of the country coming up will trigger it, the name coming up in any sort of format, whether it’s the name of a human rights organization, whether it’s the name of a restaurant coming up, it will trigger this sanctions company and ban on there. And often like the sort of framework the banks will have is that you can open up accounts for Iranians, but you can’t open up accounts for anyone who has any sort of direct or indirect dealings with Iran. What does indirect mean? Who knows? It’s up for them to decide. Indirect, does it mean having the name in your organization’s title? Yes, apparently it does. So that sort of sanctioning and risk assessment is quite automatic. You have also countries like Cuba that fall into this. The U.S. is the only country that has sanctions regimes against Cuba. However, international regimes around the world and banking regimes abide by the U.S. regimes on this. When it comes to Syria and Iran, it’s more international, but it kind of shows you where the priority is set when it comes to risk assessments. So places like North Korea, Iran, Syria, immediate ban. And then they check later. Terrorist sort of designations. So this insider of mine who has given me some really nice quotes and tidbits to understand. It’s like, literally a name, Mohammad will be flagged every time because that’s the sort of risk assessment they’ve put out there. And then it’ll have to be the human element that go goes in and looks at that profile. Al, they were mentioning the name Alto like Al Hammadi, Al and so on, a very popular name in the Arabic speaking regions, will pop up as a risk for terrorism. And, you know, it depends on the bank and the sort of threshold they put on, but well you can see the pure racism and the discriminatory nature of this quite clearly as it comes.

When it comes to sex workers, very frankly I was told that any Vietnamese names get flagged as potential victims of exploitation because they have sort of associated Vietnamese names with trafficking in these contexts. But the interesting part of this also, that sort of vague method that they use around this, for example, when it comes to sex workers, there’s absolutely zero to no distinction between actual sex work, trafficking or exploitation. It’s all under the same umbrella. And the sort of slides that I was seeing it was all about how to identify victims of exploitation. No differentiation there and no training there that there’s anything outside these realms. And it’s that sort of frameworking within the algorithms and the deputization that creates this risk assessment for sex workers, any sort of words will pop up, sugar, darling, emojis you’ve mentioned to me before although it didn’t come up in that conversation, but very little things come up as seen as a trigger for potential trafficking and closing of these accounts. So, you know, these sort of vague concepts around what is risk not only revolve around very racist, discriminatory frameworks and geopolitics, but they’re also being passed on to these (inaudible) that we’re talking about, who are being trained in the same way.

One of the other things that was really fascinating to see in this is that there’s this moralization in the training that’s happening for folks who are enforcing sanctions, terrorism, or trafficking regulations within the bank where, you know, this one in fact it was telling me it felt like pure brainwashing because you’re being told you’re doing, you’re enforcing sanctions regimes on X, Y, and Z countries because you’re helping them abide by human rights provisions. You’re enforcing anti-terror legislations this firmly because if you don’t, you’re going to be responsible for terror acts in specific situations. You’re doing this profiling of sex workers because you’re trying to stop exploitation. So this moralization is really problematic in the context. And you know, one of the questions was, do you ever get asked or told about the folks that would get stuck in the middle, who have been marginalized and thrown out of these services that don’t fall under any of these? And the answer was clearly no.

So obviously when it comes to risk assessments, for me I would, I can very, very deeply see that this over-compliance rather than compliance as incentive is a huge deal because it becomes this notion of ensuring that there are no fines against a company. These fines and revenues, even though they have these moralization presentations and they talk about, if you don’t do it, we’re gonna get fined big time. And then they show them these huge cases. The final point I’m going to say is also really depends on the institution. If the customers of an institution are from a particular country or particular demographic, they’ll have more robust systems in place. Because again, it becomes a revenue-based incentive for them to maybe not enforce further. I’ll stop there. It’s all kind of trash, but there we are. This is the systems we work with.

Danielle Blunt: Thank you so much Affi. And I think it’s, it’s such an important point of the human role in these automated flagging systems and the process in which companies are deputizing employees as an extension of policing and how policing is deputizing companies as an extension of policing as well. So that the biases of the employees, which are impacted by the like propaganda-like trainings are impacting what’s happening here. 

And so Mahsa, my question for you is, how do these processes impact people living in sanctioned countries? And how do these processes parallel issues of internet access in sanctioned countries?

Mahsa Alimardani: So there’s two ways to answer this. And, and one I’ve already touched upon, which is a very tangible access to platforms and services that are hindered by sanctions and these systems. And then the second is kind of a question of content moderation, which I know has been very popular and much talked about throughout this rights, this year’s RightsCon, but how Iranians are able to freely express themselves is somewhat subject to the systems as well. And I’ll, and I’ll start with this because Affi did this really great job of framing, the kind of, I guess, systems in place to do this. And similarly, there are systems in place within platforms like Facebook or Instagram that are doing this.

I mean today, a coalition that I’ve been part of just launched a big campaign asking Facebook to do a public audit on the content it has on Palestine. And this is a big step forward just because the, you know, the faults that Facebook has been implementing in content moderation recently has been so egregious for Palestine, but hopefully this will be a first step for the wider region.

There’s some really great research that Dia Kayyali has been doing with Mnemonic And I think previously with Witness where they were actually examining the algorithms in place and how these algorithms were flagging content based on just the IP of the users within the Middle East region, you know, the use of Arabic texts within the region, which is, you know, used for Persian, Urdu and Arabic and these things automatically flag the content for their systems to, you know, do extra moderation and extra removals within, you know, their policies of terrorist content, terrorist organizations, and individuals, which is an actual Facebook policy. And so what had happened, and we saw this kind of mass eradication of terrorist individuals and organizations back in April of 2019 in particular in Iran because the Trump administration decided to designate the Revolutionary Guards as part of the FTO list. And so naturally, I’m not here to argue that the Revolutionary Guards are by any means a good actor, but they are such a pervasive presence within Iran.

I mean, men have to do mandatory military service in Iran. And one in four chances are mandatory military service will land you in the IRGC. And so, you know, I’ve known of human rights activists who had to serve within, you know, a division of the Revolutionary Guards who have been subject to certain sanctions or checks or denials of boarding flights because of this past they had no control over. And the Revolutionary Guards have a pervasive influence over the banking sector, a lot of the private sector in Iran. So it’s kind of hard to avoid them if you’re Iranian and, you know, everyday politics, politicians, news in Iran very much revolves around the Revolutionary Guards. And so if journalists and human rights activists want to just freely talk about and express, you know, day-to-day activities, they found, they find massive hurdles because, I mean, for example, in January of 2020, a major figure from the Revolutionary Guards was assassinated by the United States. And we saw, you know, activists and journalists having their content removed for just mentioning his name, Qasem Soleimani, because he was part of this terrorist designation and they were talking about benign things and even criticizing them. So this has been a hindrance in the ways that these platforms, you know, initiate or make use of these sanctions designations and FTO lists.

On the other hand, users, you know, naturally do not have access to the same platforms because of certain things like if a VPN or a service is hosted on the Google cloud platform it won’t work in Iran. And what this often means is that Iranians will end up using less secure platforms, platforms that are being hosted by the Iranian government, which is something that this U.S. policy is playing into very nicely. You know, the Iranian censorship regime wants users to be reliant on national infrastructure. And the sanctions policy is encouraging that kind of migration and has been encouraging it for the past 10 years. And so essentially the implementation of these regulations, be it from the side of the companies, whether they’re, you know, hosting the content of Iranians or allowing access to services, online services, is a very simple thing that could potentially make freedom of expression online and access to the internet much easier. I mean, it’s not the end all cure to freedom of expression or access, but it is kind of a low hanging fruit that, you know, the United States could potentially help with.

Danielle Blunt: Thank you so much. And yeah, I think that point that when people don’t have access to these tools, don’t have access to online spaces or access to financial technologies or banking institutions, the impact of that isn’t necessarily an unintentional consequence, but it’s often by design and an intended result of those rules. So we’ve talked a bit about how financial discrimination happens, but I’d really like to shift the conversation for these last 15 or so minutes into what are the real world impacts of financial discrimination and denying groups of people access to capital. 

And so Affi, I’ll start with you. Could you talk a little bit about how the broadness and the vagueness of these rules leads to over-complying and over-enforcing of rules, and sort of a little bit about the ripple effect of how this could impact people’s larger social networks?

Afsaneh Rigot: Yeah. I mean, I think part of, like, let’s say an example of this from the work I do is if I am going to talk to sex workers within the MENA region to talk about how they would use financial platforms or any sort of platform for their work, it’s just non-existent.

There is quite a clear line that one, we’re not welcome on these platforms. Two, we can’t use these platforms. Which is a big issue because in the sort of study of prosecutions I do of queer and trans folks and sex workers in the MENA region, one of the main things police look for is monetary transactions, like physical monetary transactions. And for example, in somewhere like Egypt, without that sort of monetary transactions the case prosecutors have against individuals is a lot weaker. So, you know, in my mind, in my sort of utopian mind, if there was a method in which folks could use a platform safely to do these transactions without having different currencies and so on on them on the streets when they are arrested or entrapped, this situation of higher charges and these laws who are, that are, for example, in Egypt is called the Laws Against Prostitution, will be much harder to enforce. Not foolproof, but the reality is people don’t have this access.

Again, the sanctions regimes that we’re looking at are so wide and broad in terms of reach. And the fact is that the folks we’re talking about are so easy to become, to be thrown under the bus in these situations for these companies and these, and financial institutions, that platforms and sort of tools that folks need to be used can be cut off from them quite immediately. We’re seeing this right now with regards to queer dating apps in Iran, where there are major number of queer dating apps that have basically over-complied with sanctions regimes and cut off access to queer users in Iran from using dating apps. They were not legally required to do this. There’s provisions that Mahsa can go into it much better than all of us in terms of the framework that does not require this over-compliance. However, as we talked about, the incentive is to over-comply rather than comply because losing Iranian users isn’t that much of a big deal. They’re not going to be able to use financial banking systems to get premium features anyway. There’s also the, you know, moralization and fear-mongering that comes with all of these situations in terms of, in terms of sort of advocating for these changes. And obviously we are having these conversations and ensuring to me, ensuring there’s a method of kind of reversing this over-compliance, but it spills over in this context. In Iran, there are so many legal and policy frameworks that criminalize the community.

These platforms become fundamental for connecting. These platforms become fundamental for user community. They have their problems. They have their many problems, but they’re fundamental. Cutting that access off is just like quadruple discrimination against a community that’s already discriminated against. And why?

Because you thought it’s probably better to over-comply than just comply. So the ripple effect is huge.

I’ll pass it on to Mahsa to continue about the sanctions issues when it comes to different platforms and effects on individual groups. But one thing I want to add, if there’s any global enforcement listening, I don’t know, maybe, if your criteria or framework of protecting vulnerable groups against prostitution or trafficking means throwing whole groups of vulnerable groups under the bus, it’s not working. And it’s not about vulnerable groups. We all notice. So. (laughing) Let’s stop it there and I’ll pass on to Mahsa from there.

Mahsa Alimardani: Yeah. So I think Affi mentioned something really important, which is what, I guess, qualifications or standards are applied when sanctions are applied to certain technologies or services. And I mean, tomorrow there’s going to be a session hosted by GitHub that I’m part of, and the really interesting thing about GitHub as a platform is, is that it’s a platform that offers both paid and unpaid services. Yet both the paid and unpaid, essentially the free services, stopped being served inside of Iran.

So you had Iranian users with, you know, free repositories have the repositories removed off of GitHub. And this was a very strange thing. And I know Affi and I have had many conversations with different platforms like this where we’re like, but you know, this is a personal communication. There’s no financial aspect to an open source code. You know, GitHub repository. How is this being applied? I mean, this is happening to a lot of platforms where this, this judgment is being made. GitHub is one of the few that actually took the extra, went the extra mile and got a general license for their product to be available in Iran. And this was something that took a lot of time. And if you come to the event tomorrow, they’ll explain to you exactly the kind of grueling process that only like a big corporation, Microsoft is behind GitHub, that could really, I guess, support such an endeavor. And they did do this, and this has become kind of a model for the rest of the tech industry.

And Affi has been working with other, you know, companies through her work in the MENA region, and we’ve been trying to kind of apply the GitHub model. But the thing is, is that, you know, the general license D for personal communications should be strong enough to stop these companies from having to fear those kinds of repercussions from the government. But unfortunately, those assurances aren’t there from the government, even though the government will come out and say they believe in freedom of the internet and access. And so you have this kind of, I guess, you’re, you’re, they’re passing on the responsibility between each other. So at this point, the solution seems to be the goodwill of the few companies that are willing to take those extra steps.

Danielle Blunt: Thank you. Thank you Affi and Mahsa. I feel like both of you touched on how lack of access to tech can actually increase vulnerability and violence. And when Affi was talking about dating apps shutting down because of sanction, I wanted to note that it also impacts sex workers who hustle on those apps, which is a good reminder that the communities that we’re talking about often hold intersecting identities, and it’s not that we’re necessarily talking about two discreet communities. So I’ll end with this question to Lorelei about, how does the financial discrimination of sex workers impact community? And I’m thinking specifically around destruction of mutual aid and organizing.

Lorelei Lee: Yeah. So I mean, there’s, as Mahsa and Affi have already talked about, there are such broad effects and multiple effects of this kind of discrimination. And, you know, we’re talking about everything from being excluded from public places, like the Marriott not allowing people they profile as sex workers to be in their bars, or Uber driving sex workers, suspected sex workers, to police stations, to the direct impact of not being able to use either an app on which you would screen clients such like as a dating app, which would be a harm reduction tactic for people in the sex trades, not being able to do that so your work becomes more dangerous, or not being able to take money from clients.

And so your economic precarity becomes more precarious. And then there are the community effects that Blunt has mentioned, which is that, you know, for sex workers, like we are just a group of people who is facing trauma and precarity all the time. And also who really, there aren’t good resources for us, provided to us socially, either from family networks or the government or civil society at large, there’s just not anything. So what we’ve done is create these networks, and created them across the country. Oftentimes using apps like Twitter, that continue to try to shut down our accounts. And, and yet somehow we have at least some of this in place where we then are able to say, okay, who needs money this week? Who’s, who’s struggling this week? And we can try to redistribute some of our funds and do this mutual aid work.

However, in order to do that, we have to be like, well, my Cash App is shut down this week, but maybe I can find someone who has a PayPal that they can, you know, then switch it to their Venmo, then switch it to Cash App so that they can get it to you. And something I said, I was talking to Rachel about this yesterday, how it just feels like we’re passing the same $50 around the country all the time, you know, and just like struggling through this like maze to try to do that. So that is very frustrating. And I think it points to something that I would describe as a systemic effect. So we have the individual impact, we have the community impact, and then we have the systemic impact. And the systemic impact is where our community networks can never get more resourced, can never become stronger because we’re constantly being shut out of financial systems as well as public dialogue. And so we can’t be visible online, which means we can’t tell our true stories online, which means the narratives that folks get about sex work are very specific and very narrow and often build a myth around all of us, which means that we are then viewed through that narrow lens so that we are constantly seen through a stigmatizing, dehumanizing profiling kind of aspect. And, and because of that, our voices, when we actually get a chance to use them, people don’t take us seriously.

And Facebook specifically, just to go back to Facebook and I will wrap up, I know we’re nearing the end. Facebook has a policy that you can’t talk about sex work unless you are talking about experiences of violence. And this is exactly what I’m talking about. When you only allow one narrative to be the narrative that people hear, then you stop seeing us as complex and complete people. And I am not saying, I mean, I think I actually have to say this, which I, is absurd that I have to, but I know when I’ve had these conversations before people think that I’m trying to downplay experiences of violence. I am a trafficking survivor myself. I don’t believe that our experiences of violence are not important, but I think that if you hear them only in a two-dimensional way, without hearing anything else about our lives, you stop seeing us as human beings again. So that’s like- (laughing) Like I just think these impacts are so broad and, and the oppression that comes at that systemic level prevents us from doing the kind of organizing that we are trying to do in order to push back against that very oppression.

Danielle Blunt: Thank you so much, Lorelei. And I think what you’re talking about when we’re not able to share our own stories another narrative is created in that space is also a really good point of intersection of what’s happening with these two communities with internet shut downs as well. So I want to give a minute for everyone to share a last thought, and I’ll start with Mahsa as we close out.

Mahsa Alimardani: I mean, I’m just kind of constantly listening and, listening to Lorelei and learning because they frame things so well, the bigger picture of what we’re doing, and I completely agree. And there is, you know, there is this inherent discrimination.

It’s a discrimination within the Middle East regions. It’s discrimination within sex workers. And I think, you know, the stronger the voices of these communities, I mean, there’s, there’s some momentum right now, you know, with focus on content on the Middle East, if there’s any way to, you know, intersect and do the movement building within these communities, I feel like these changes might be stronger and more profound.

Danielle Blunt: Thank you. Affi, did you have any last thoughts?

Afsaneh Rigot: Yeah, I think I echo Mahsa in saying that, you know, Lorelei frames everything so beautifully and perfectly that I think most people listening should just remember those last words, but I just wanted to add the importance of like connecting the work that’s being done on these issues around discrimination and sort of censorship of communities and from sex workers to communities in the Middle East to folks being affected by terrorism.

And as Blunt mentioned, these aren’t distinct groups, we’re all overlapping and intersectional and amongst, and within each community. One thing I wanted to mention is the little note about how also banking systems use this notion of reputational risk, predominantly around sex practice and anti-terror and high risk profiles. And reputational risk is such a broad and flimsy concept. So when asked about how Only Fans comes in, they block folks that have connection to Only Fans around this notion of reputational risk. And finally that if you’re looking at the issue around Thomson Reuters and their huge data brokering, look up the different situations that have come up in terms of blocking of the Palestine Solidarity Campaign to Finsbury Park Mosque under terrorism associations. So one of the things I hope we can do is hold these sort of seemingly neutral data brokers that are festering amongst us accountable for the work they’re doing and the data (inaudible) Thomson Reuters and LexisNexis also obviously notoriously sold a whole bunch of information to ICE for immigrants and undocumented folks and refugees in the U.S. So that’s another thing in our campaign. (laughing) To add to it anyway.

Danielle Blunt: Thank you Affi. And if you want to follow any of our work, you can follow at Hacking//Hustling, hackinghustling.org, and at article19.org. And Lorelei, I would love to offer you the one minute we have remaining for any final thought.

Lorelei Lee: Oh, I just wanted to say thank you all so much. I mean, I also learned so much from listening to you Mahsa and Affi, and I’m just like really thrilled that we have had the opportunity to bring our knowledges together and keep doing it. Yeah.

Danielle Blunt: Thank you so much. And I look forward to continuing the conversation with you all, and thank you so much to everyone who tuned in to join for this session. 

Statement on Stanford Internet Observatory’s event on Apple’s Child-Safety Photo Scanning

Tuesday, September 14th, 2021

Looking at the speakers of Stanford Internet Observatoryโ€™s โ€œpanel of speakers presenting views on new products and services intended to protect children in encrypted spacesโ€, we see that the same actors and the same conversation have once again come up with the same answers. The structure of this conversation remains the same: the prioritization of corporate liability, the assumptions that pushing CSAM into less visible places is the same as reducing child abuse, the assumptions that pushing people off the most visible platforms means addressing the issue, and the assumptions that home is a safe place for children when we know that the majority of trafficking into sexual exploitation for the youngest children is overwhelmingly familial. We have reached the place where public comments on pre-drafted policies from marginalized people long after decisions are made is treated as accountability and engagement. 

We appreciate that the ACLU and CDT have been brought into this conversation. Questions of democracy and civil liberties are central to moving forward. But the expectations that these groups either represent or cede time to the many diverse groups who will be impacted by these policies is unfair and disrespectful to everyone involved. We should not be reliant on the generosity of these groups to cede time, and we should not pretend that this is the same as actually engaging marginalized communities.

ACLU and CDT have important, valid missions. But speaking about democracy is not the same thing as speaking to people who are criminalized and/or vulnerable. Civil liberties shouldn’t have to cede space to offer diversity to these conversations for the full ramifications of these policies, and creating adversarial relationships at the table among groups fighting for space is a foundational tactic of oppression. Further, organizations are not people. Organizations do not have to adapt the same way to these policies to organize and share information safely when a policy forces a community off platforms and makes them scramble to re-connect. Organizations without personal vulnerability do not have to figure out how to protect their identities when being vocal. Organizations can consider filing impact litigation, not being the central, personal face of it. Having organizations that focus on democracy, civil rights, and first amendment issues is not the same as having the communities present who are impacted by these policies.

These policies will predominantly harm the people who need access to more spaces, not fewer. Yes, that means sex workers. That also means queer and trans youth seeking information on their bodies, lives and community, or young people, and anyone in Texas, who are scrambling to find safe and accurate information on accessing abortion care. That also means young people trying to disclose information to a safe person about potential abuse going on in the home. 

Like similar policies that have been passed without community feedback, these policies will actually increase harm to the communities they purport to protect. To have these conversations without platforming impacted communities is merely a facade of accountability.

Sincerely,

Hacking//Hustling and Reframe Health and Justice

Fighting Surveillance Tech with Trademark Transparency: Workshop with Decoding Stigma

Decoding Stigma and Hacking//Hustling present a workshop with Gabriella Garcia, Kendra Albert, and Amanda Levendowski.

Sex work stigma has been used to justify research funding for surveillance technology that profiles and further harms at-risk communities. From non-consensual image and data scraping to algorithmically-informed deplatforming, the sex worker is both indispensable yet disposable for those behind the development of these technologies.

Amanda will teach you how to access the Trademark Electronic Search System (TESS) and use trademark disclosures to take action against surveillance technology in development.

Let’s get started.

Gabriella Garcia: So I am Gabriella. I am here on behalf of Decoding Stigma along with a couple of other comrades. I am on the unceded land of Haudenosaunee peoples. I urge you to research the communities that you’re located on. And this acknowledgement demonstrates a commitment to the beginning process of working to dismantle the ongoing legacies of settler colonialism.

But beyond just acknowledging this is extraordinarily relevant to our conversation today. The ongoing genocide of indigenous bodies is a product of state surveillance that protects extractive capitalism and incarcerates and disappears some of our most marginalized comrades.

I must also pause for a moment to highlight that today is trans day of remembrance. In the past 12 months, 350 trans and gender diverse people were reported killed globally and sex workers do make up the majority, about 62% of victims. Enforcement of gender conformity is a surveillance practice.

Bathroom bills are a carceral technology that endangered trans bodies. Walking while trans laws that disproportionately target trans women, and particularly trans women of color, for purportedly loitering for the purpose of prostitution. The horror of being trans while incarcerated, even Chelsea Manning’s gender identity was held as a point of threat, attempting to intimidate her into complying with the state. If you haven’t read it, I highly recommend Going Stealth by Toby Beauchamp.

So in terms of this workshop, sex work stigma has been used to justify research for, and the deployment of surveillance technology that ultimately profiles and further harms at risk communities. Non-consensual image and data scraping of online sex work platforms in order to train AI victim tracing technology, for instance, Stanford bragged about scraping more than 30 million advertisements of sex workers.

There’s zero accountability measures for how these images are classified, are they classified as criminal or victim. There’s no accountability about how they’re actually used, though we get reports of sex workers being stopped at borders or being identified in other manners despite any sort of attempts to actually create and protect their identities.

Algorithmically informed account shutdowns that strip laborers of their sources of income. We don’t know how algorithms codify sex workers. Literally, what does a sex worker look like to a machine or who has defined what high-risk behavior is and how that high-risk behavior can stop that person from being able to access income. The sex worker is both indispensable yet disposable for those behind the development of these technologies

So with all of that heavy information in mind, let me introduce our two panelists.

Kendra Albert is a clinical instructor at the Cyberlaw Clinic where they teach students to practice technology law. They hold a degree from Harvard Law School and serve on the board of ACLU of Massachusetts. They enjoy redistributing money from institutions, working on their solidarity practice and making people in power comfortable. Thank you, Kendra.

Amanda Levendowski is an associate professor at Georgetown Law, where her research and scholarship examine how intellectual property law can be used to creatively address challenging social issues that cross cut privacy and technology. Her recent work has explored non-consensual pornography, biased artificial intelligence, secret surveillance technology, and invasive face recognition.

Thank you both for being here and I will now pass the torch.

Kendra Albert: Awesome. Thank you so much, Gaby. That was an amazing introduction. And I feel really grateful to be here with Amanda and with all of y’all. I am on the unceded lands of the Lenni-Lenape people in Philadelphia, otherwise known as Philadelphia, Pennsylvania.

Amanda and I figured we’d start out by talking a teeny bit about sort of what is trademark and how does it fit into a broader constellation of tech tools, legal and otherwise, that you might use to learn about surveillance that affects your community or that’s happening in your community.

I’m going to turn it over to Amanda, to talk very briefly about what trademark is, because she has that down way better than I do. And then I’m going to talk about a little bit about some of the other tools that you might use. We’ll talk a little bit about why you might use trademark transparency in particular. And then Amanda will start with her very excellent slides.

So Amanda, over to you.

What is trademark?

Amanda Levendowski: So other than that so trademarks are at their core a form of intellectual property that protects a brand. You can think of Coca-Cola as a trademark, you can think of Georgetown University as a trademark, you can think of Harvard University as a trademark.

What trademark does in the context of what we’re going to be talking to you about today is using a tool called the Trademark Electronic Search System, or a TESS just to keep it catchy. And one of the things you can do is search to basically figure out how brands described themselves, to figure out what they’re actually saying when they create a surveillance technology that has a branded image, what do they use to describe its capabilities, its scope, and in some cases, how do they actually market it and advertise it to law enforcement to figure out how it’s going to be deployed in practice?

So that’s what we’re going to be talking about today. This is not how trademarks are traditionally used. This is one of those creative ways to use IP to break the system that Gabriella mentioned in our introduction. But it is a way to creatively uncover how these sort of aliens companies are describing their products in their own way.

How does trademark fit into the broader constellation of tech tools?

Kendra Albert: Thank you so much, Amanda. So I think one thing I want to just start with is to talk about how this fits into kind of our broader constellation of tools that you might use to get information on surveillance.

And I want to start by acknowledging that often the first and best tool to get information on surveillance is talking to the folks who are surveilled, right? About the things that they experience, about the ways in which they have seen things that police or law enforcement or child protective services, or any other sort of institutional actor have sort of found out about them. Because often that’s actually the first invest clue as to what’s going on sort of more broadly behind the scenes.

But let’s say you’ve already done that, what other tools are at your disposal?

So one thing that Amanda will talk about a little bit is procurement processes. So sometimes governments when they’re buying surveillance tools, either off the shelf or sort of asking companies to create them for them, will develop records of either what they’re looking for or what’s actually developed. And you can get those through the sort of lens of looking for procurement stuff. The legal tool you usually use to get that is freedom of information request.

So in the US there’s a Federal Law, which is FOI, the freedom of information act, but each state has its own FOI laws. That can be really useful, especially if what you’re looking for is certain kinds of government information. You can get all kinds of stuff that way.

But FOI laws generally don’t apply to private corporations. So you’re not necessarily going to be able to get ahold of Amazon’s internal information about how ring works using FOI, unless they’ve sort of sold it or given it to a government official and you’re able to kind of navigate the thicket of exemptions, and exceptions, and government delay tactics to sort of get a hold of that.

Other tools that you can use to kind of get access to government information about surveillance include litigation. So if you do sue a government agency over any particular set of practices, when you’re in what’s called discovery, which is sort of a process by which you can request information, you can sometimes get information either through talking to officials on the record, or being able to get documents about sort of different types of surveillance practices. What other methods am I forgetting Amanda?

Amanda Levendowski: There’s two that we’re going to talk about in just a minute, and we’re going to talk about securities and exchange commission filings which is a kind of surprising place. And I’ll explain a little bit more about that in a moment, but just know that they exist and you can find out information about a company’s market practices from those filings.

And the other one is patents, which we will also talk about in more depth than just a moment. But patents are publicly filed. They exist in a publicly searchable database, and there are ways to find otherwise previously unannounced surveillance technologies using patent system practices.

What’s the difference between a patent and a trademark?

Kendra Albert: So maybe you’re going to get to this in the slide. So if so, tell me to hold it and I will. What’s the difference between something in a patent and with a trademark?

Amanda Levendowski: Oh, we will get to it, but I would love to give a little amuse-bouche of what it is. The big difference is trademarks are related to something that is currently being used in commerce, the brand is currently being used on a product or a service, or there’s an intent to use it. You have to have a bonafide intent to use the brand in connection with the thing that you’re saying you’re going to use it for in order to acquire a Trademark Lawfully.

Patents are not a promise to create a product. You could file a patent for something that is technically impossible to create right now, but may exist in the future. You could file a patent defensively to prevent other people from trying to move in on something that you’re not interested in doing, but you also don’t want anyone else doing. You could also file it proactively about something that you may want to develop a long time in the future, depending on a bunch of different factors.

So those are the main differences, is a patent is not a promise to produce a product just to keep it alliterative and a trademark requires you to either be producing or have the intent to produce a product or service with that brand on it.

Kendra Albert: Awesome. So with that, do you want to get into the slides?

Using the Trademark Electronic Search System to Find Surveillance Technologies

Amanda Levendowski: Let’s do it. Okay. So the title of his talk is Fighting Surveillance Tech with Trademark Transparency. I am so grateful to be here. Thank you for that wonderful introduction, Gabriella and Kendra, and it is just an absolute pleasure and I’m so excited to talk about this project with all of you.

And hopefully my goal for the project is that you leave with two things. One, I want you to leave knowing something you didn’t know coming in. And two, I want you to leave feeling confident that you can use the Trademark Electronic Search System to find out something about a surveillance technology. So maybe that’s a really ambitious second goal, but I feel confident that we can do it.

But before we get there, I want to talk about how I came to this project. I came to this project because of Amazon Ring. A couple of almost two years ago now, I went on the Trademark Electronic Search System, I came up in my practice as a Trademark Lawyer when I was working at a private company. And I was curious about sort of the intersection of trademarks and surveillance, because I was like, “Well, you should be able to find out about surveillance technology at…”

Waffles is here… this is Waffles, she’ll be making a guest appearance….

“You should be able to find out about surveillance technologies based on the way companies describe their products.” And so I popped on a test and I looked up surveillance. And it just so happened that Amazon had filed a trademark for a product called Amazon Ring.

This was almost a year before it was publicly exposed that it was being partnered with law enforcement to essentially create a giant surveillance, a civilian surveillance dragnet of these devices, including ones that were sold or not sold, but given to law enforcement to give out to their communities to create a bigger network.

So, in other words, if we had been watching the trademark register more carefully, if we have been using tests more strategically, we could have found out about Amazon Ring a year before it was sort of on the public consciousness radar, and we may have been able to mount more of a defense and a resistance.

So that’s one opportunity that we have by using the Trademark Electronic Search System is finding out about these surveillance technologies before they are already entrenched in our communities.

Using Securities and Exchange Commission Filings to Find Surveillance Technologies

So I mentioned two other places that you can find publicly available information with pretty low friction. You can look through securities and exchange commission filings to find out publicly available information about how Amazon describes its strategic business plans.

However, as you can see, this is pulled from the 2018 acquisition activity filing from their K-filings, and you can see that it doesn’t reveal a lot of specific information about the plans for Ring. It doesn’t tell you that they were going to create, potentially partner with law enforcement with this technology. It doesn’t reveal that it’s going to be used for surveillance in that particular way.

It just talks about how much it costs and why they think that they want to do it, which is to serve customers more effectively. So you can use K filings, but it’s not going to be the most revealing.

Using Patents to Find Surveillance Technologies

Another possibility is patents. This is a form real patent that Amazon filed for generating composite facial images using audio visual recording and communication devices. Essentially this would be technology for again, surveillance.

However, when this was written by the press Amazon’s comment was, “We aren’t producing this product. This is just a patent file, a lot of patents, it’s kind of what we do. So you can’t really take this at face value and say, we’re going to produce a product, ’cause that’s not really how the system works and that’s not how it really how our business operates.”

And while that does sound a little bit like corporate doublespeak, it’s also true. It’s also how it operates in practice. There are a lot of technology companies who have some very sketchy patents, but a lot of those products are never, ever going to come to pass.

That does not mean we should not scrutinize these patents and take them to task for filing in the first place, but it’s not going to be the most revealing source of information because it’s always possible that it is just a perspective patent, not actually a promise to produce the product.

Why is surveillance transparency hard?

So the overview of what we’re going to talk about today is why is surveillance transparency so hard, ’cause it’s pretty hard as a lot of you know from experience, and how Trademark Law can help?

This is definitely not what was intended by the folks who pass the Lanham Act in 1946, but we’re going to take it and give them a new legacy, which is surveillance transparency. So let’s start with why is surveillance transparency is so hard?

I’m about to take you through a journey with the Queens of Obfuscation, who are a bunch of bad-ass scholars who have all the written about reasons surveillance transparency is so darn hard. So we’re going to go with the Queens.

The first queen is Catherine Crump, who’s written about, as Kendra mentioned, problematic procurement practices. I’m just, alliterating all over the place today. One of the challenges is that not every jurisdiction has procurement policies in place.

Procurement policies have basically guidelines for how municipalities and localities can acquire surveillance technology. And in some cases they have requirements that there’d be a public hearing, where civilians could hear about the technology and they can weigh in. There may be requirements about there being a civil liberties oversight board, who brings an opinion about the impact of the technology.

It can take a lot of different forms, but as maybe some of you know, because you’ve never heard of this before, not every jurisdiction has them and not every jurisdiction has them with the same strength.

So that’s one challenge, is while procurement policies can be really valuable in terms of finding out about these surveillance technologies before they’re entrenched, they’re not available everywhere and they’re not available equally.

Our second queen is Elizabeth Joh, who talks about private power. Because as I’m sure a lot of you know, a lot of these law enforcement agencies are not using law enforcement developed surveillance technology in order to use to surveil marginalized communities.

They’re using privately developed technologies by companies like Amazon, like Amazon Ring, in order to exercise their surveillance practices. And because of their private power, that means that a lot of the ways to work transparency that are usually available for government developed products are not available. And that’s one of the things that Elizabeth talks about in her [inaudible 00:18:04] scholarship.

The reason this comes up is because this can get in the way of freedom of information act requests, because our third queen, Hannah Bloch-Wehba, has talked about the flaws with the Freedom of Information Act and local laws in order to find out about these surveillance technologies, because there are lots of ways to obfuscate, and delay, and otherwise be non-responsive, or as Kendra alluded to, exemptions, exceptions, and delays.

What is trade secrecy?

There are also another challenge when it comes to surveillance technologies in particular, and that’s toxic trade secrecy. Trade secrecy is actually the fourth area of intellectual property law, it doesn’t get talked about in the same breath as the others, but it is just as important in the context of surveillance technology and particularly other algorithms because trade secret law is often used to shield those from public scrutiny as Sonia Katyal, our next queen has talked about.

In this context, companies can insulate themselves from disclosure because when you file a freedom of information request, you may not be required to disclose that information as a government agency if the information is protected as a trade secret.

This applies more to algorithms than it does to physical products, but a lot of you mentioned that you’re interested in algorithms generally, and this is one way that you would not be able to find out that information is [inaudible 00:19:22] the Freedom of Information act.

Rebecca Wexler has also written about this in the criminal context, because if there’s contact with the criminal system and an algorithm was involved, trade secrecy can be used to shield that even from a criminal defendant, which is particularly alarming. So all of these queens have addressed the ways in which surveillance transparency is so hard.

How can trademark law help with surveillance transparency?

But luckily I’ll be the next queen, I’ll tell you, there are ways that’s Trademark Law can help. So this is a quote from a case about Trademark Law, and it is unlikely that more than a tiny fraction of the public has any idea what federal registration of a trademark means.

Well, you are now in that tiny fraction of the public, who knows what trademark registration means, or you will by the end of this conversation.

So there are three key disclosures and trademark applications. To back up a little bit in order to acquire a trademark, this is a federal process, you have to fill out a trademark application, submit it to a government agency called the US Patent and Trademark Office, where a trademark examiner will do exactly what the title says, they’re going to examine it. And they’re going to see whether it hits all of the qualifications in order to become an actual federally registered trademark.

Most of the brands that I mentioned earlier are federally registered trademarks. Most of the brands you’re familiar with are also federally registered trademarks. As part of that process in the application, there are key disclosures which are relevant for finding out about a surveillance technology. There are others, but these are the three big ones. And I’ll be honest, they’re the three sexiest ones.

So the first one is a use definition. It doesn’t sound sexy, but I promise it is I’ll deliver. They use designation is what I was saying earlier, that’s the opposite of patents.

In order to get a federal trademark registered, there has to beโ€ฆ The mark either has to be in use, or there has to be bonafide intent to use. In other words, a company couldn’t come back and say after filing a trademark for a dystopian surveillance technology, “Oh, well, we didn’t really mean to do anything with it. We didn’t have any intention of producing the product.”

Because then while you’re in a rock and a hard place, you either lied to the US PTL and made a materialist representation in your trademark application, or you’re lying to the public in a pretty transparently obvious way. You can take your pick, but not either of them are equallyโ€ฆ They’re both bad.

The other possibility is in your goods and services description. And this is what I was alluding to earlier, where how the brands have to describe what the thing that they’re on, actually writing it out. So we will look at some examples later, but just keep in mind that a goods and services description is basically a TLDR of what the thing does. It’s just written out in a fancy way. That’s all it is.

And the third possibility of finding important information about surveillance technology in a trademark application is held in what’s called a specimen. After you file your trademark application, if it’s in use, you have to include a specimen that shows how the mark is being used.

And that includes photographs of a product, that includes the interface of a computer software system, that includes marketing materials, in some cases, that includes a really sensitive information, developer guides as we’ll learn later. And those are all ways to show how the mark is used in commerce. And this is probably the most fruitful way to find out about surveillance technology, because it is often the most revealing and it’s the most straightforward.

What does a trademark application look like?

Now I just gave you a lot of information. We’re going to go through it and it’s going to be easier to understand and practice. But I want to come back briefly to Amazon Ring and show you what it looks like to find out what that goods and services description looked like that revealed, to me at least, that I thought it was going to be used for law enforcement down the line.

So this is a screenshot of the Trademark Electronic Search System, our buddy TESS. And I just searched for the term surveillance in the field goods and services.

This is what a trademark application looks like. I’m going to move. Can you see my mouse on the screen? Great.

So this is in class nine, class nine, which is for computer hardware and software. So there’s international classes that essentially categorize the different ways in which the products are explained. And one of those is saying that this is hardware software, which makes perfect sense. It’s a little bit of both. But I highlighted the part that stood out to me, saying that this is an electronic surveillance device that can be deployed to gather evidence or intelligence.

When you’re talking about a smart commercial doorbell, that’s just generally not how you describe your product in my opinion. I’m not an expert. I’ve never written the goods and services for a commercial doorbell, but I don’t think that if it was just going to be a commercial doorbell, I would describe it with the language evidence or intelligence.

To me as a lawyer those are lawyer words that signaled lawyer things and they specifically signal a particular type of law enforcement surveillance. Because who are the kinds of people that gather evidence? Law enforcement. I mean, other people too, but we’re not all in the law homes.

So in the paper that I wrote, that I accompanied this theory of how we can use trademarks for surveillance transparency, I explored three pretty significant surveillance technologies.

The first is PredPol, which is a predictive policing algorithm. The second is Stingray devices, which are used to intercept cell service, and they’re often used at protests. And the third is Vigilant Solutions, which was used for automated license plate readers.

However, I’m not going to bore you with all three of them. If you want to go read an academic paper about this theory, please be my guest, but we will be adapting it into a more TLDR friendly format as well.

What is PredPol?

I’m going to start with PredPol though, because this is probably the best example from the paper that shows the power of the Trademark Electronic Search System for checks or surveillance transparency.

So dozens of cities had secretly experimented with predictive policing software and public record requests were used to verify some of those departments. So this is a case of working in tandem with freedom of information laws in order to amplify the impact of the surveillance revelations.

So if we go back to TESS, this is the interface for PredPol. You see class nine again, which makes perfect sense. Class nine is very commonly used for surveillance technologies because again, that Is hardware and software.

Class 42 is another class that is commonly used, it’s related to computer and scientific instruments or services. And so you will see those two coming up again and again in your searches. And you may even want to explore within those classes for particular terms to keep a really broad approach to your investigation of these surveillance technologies.

But this doesn’t really tell us anything we didn’t already know, because we did know that PredPol existed. This isn’t like Amazon Ring, where we could have had a headstart on this technology.

So what is so revealing about the PredPol application? Well, I told you that there was a specimen file, that there has to be a specimen filed in connection with the trademark application, either when the mark goes into use, and you can see that there was a statement of use on the same day and they submitted something kind of interesting for their specimen.

This is the third page of their specimen. They decided to share an actual contract with a jurisdiction that had not been publicly disclosed yet. And we know that because that hadn’t been one of the jurisdictions that came up in other journalists searches for municipalities that were using PredPol. That was Red Richmond, California.

And there’s some pretty interesting information in here, how much money it costs and the fact that they’re getting a discount, or in part G that there will be engaged in joint marketing, including but not limited to press conferences and media relations, training materials, marketing, trade shows, et cetera.

And my favorite part, for example, if a chief is required to attend and speak at a conference of police chiefs, to which they are not already traveling, PredPol agrees to reimburse the city for travel expenses if requested.

They also included somebody’s real cell phone number, which I redacted because I’m sure this guy doesn’t know that this is in the trademark filings, but I’m sure he would not be thrilled to find out that his employer included it.

But this is the kind of information that these companies accidentally reveal. I’m not a sports person, let’s be honest this is absolutely an own goal. This did not have to happen. It could have uploaded a ton of different stuff, but they happened to upload this contracts. And it’s particularly rich because well, those joint marketing efforts didn’t work out, because the Richmond police chief said that they were going to discontinue predictive policing software use midway through their term.

So we’ll do I think, are we going to do questions and comments Kendra? Or do we want toโ€ฆ

So we’ll do questions and comments, and I hope that that was enough to give you a little taste of what we’re going to explore today before we turn it over forโ€ฆ I’ll do one live demo, and then we’ll let you go wild and figure out what you can find.

Kendra Albert: Awesome. People should feel free to like unmute and ask questions if they’re comfortable being on the recording, or feel free to either throw them in chat or just message me directly and I will happily read them. But questions, comments, reactions before we sort of dive in.

Amanda Levendowski: We can also just dive. Do you want to dive? Thumbs up if we want to dive? Okay. So let me stop sharing and I’ll show you a live demo to give you a sense of what this will look like.

Kendra Albert: And I think we can keep recording through the live demo and then stop after. Does that sound okay to you, Amanda?

Amanda Levendowski: That sounds good to me.

Kendra Albert: Perfect.

What does the Trademark Electronic Search System (TESS) look like?

Amanda Levendowski: This is what a standard search on the Trademark Electronic Search System, our buddy TESS looks like. We will drop a link in the chat to the US PTO website. So you can go there and go straight to TESS yourself and have it open on your computer. But here is the place to start.

So this is a regular search, this is your basic search. And you can put in the term Amazon Recognition, which is Amazon’s commercial enterprise facial recognition software, which is used by a number of organizations in ways that could identify as sex workers.

So you clicked submit query, just kidding.

Kendra Albert: The problem with live demos always.

Amanda Levendowski: I just did that to make everyone feel great if they had troubles later. This was just normalizing those mistakes and just keeping it iterative. So you submit query.

So this is what an actual page looks like that’s not cropped or a filing like this. It has goods and services descriptions of what Amazon Recognition is, image analysis and identification, animal recognition. We know that that’s not really the concern that we have, it’s the face recognition in particular.

But this gives you a sense in class nine, as we previously discussed, class 42, and it has the holy triumvirate of classes likely to disclose surveillance technology, class 35. And those are again, just ways to chunk out how these brands are describing themselves.

What kinds of categories of goods and services they are associating themselves with. And so they’re telling us through classes nine, 35 and 42, that is as hardware and software, computer and scientific services and entertainment business services, that’s class 35 that are going to be relevant.

So you can continue that information as you go through your searches. And we will remind you of that as well. So now we’re going to leave TESS and go to another service, but you don’t need to know the name of it. It’s called TSDR, that’s the TLDR for the TSDR.

We’re going to wait for that to load.

So now we’re in TSDR and you can look at a lot of that information in just a different way. So what you’ll do is you’ll navigate to the documents tab and you’ll navigate to the specimen, because that’s going to be where you’d find the beefy information. And one of the things Amazon uploaded is the developer guide for Amazon Recognition and they uploaded the entire thing.

So it is completely possible that they could findโ€ฆ Gabrielle was like, “Oh shit.” And it’s terribly true. This is a huge question about whether or not this is something they meant to disclose.

I’m sure it does adequately show the Amazon Recognition mark in association with the relevant goods and services, but did they need to disclose the developer guide in order to get that? No, they did not.

This is another own goal, this didn’t have to happen, but it’s for our benefit that it did. However, now that we’ve done the live demo, you can see the basics of navigating the Trademark Electronic Search System.

This is the kind of thing that you can all go and discover for yourselves. And so maybe we can offer questions again, and then if there are no questions, we will go into breakouts and people can explore the system.

Where do you get started with trademark transparency?

Kendra Albert: So there are two great questions from chat. One is, “What do you do if you don’t even know the name of a thing or what to start even looking for?” So I’ll start with that one.

Amanda Levendowski: That is such a good question. Where to begin when we don’t know what the brand name is. We begin with goods and services, because as you recall, I did not find out about Amazon Ring because I searched for creepy Amazon stuff. Although, could I? Yes.

I did it because I searched for just surveillance in the goods and services. And there are lots of goods and services that may be relevant. I did do some work earlier to see what kinds of goods and services were relevant potentially specifically related to sex workers.

You will be interested to find, I don’t know, maybe you won’t be, but I was interested to find that there happened to be only three trademark applications or registration that used the phrase sex workers.

One is for a denim company, and I have some questions about that. And then one is for a charity and then one of them I already forgot. But they’re not anything related to surveillance.

There is a specific place where you can look for particular phrasings of goods and services descriptions. Are they official phrasings of the US PTO? Basically it’s called the trademark manual of examining procedure. That’s one place where you may find examples.

There’s also the trademark ID manual, which I think I have up, yes. The trademark ID manual, you can also look and see, this is in the Google doc. You can look and see for particular phrases or particular words that might be relevant that have been pre-approved by the US PTO and they are likely to be more commonly used as goods and services descriptions because they’re pre-approved, and that means it’s easier for an examiner to look at them and say, “This makes sense. I’m good to go.”

So you can experiment with this tool as well to come up with goods and services descriptions related to surveillance of a whole variety of communities, individuals, but you may also want to focus on the technology because some of the most dangerous technologies for marginalized communities are face recognition technologies. Those can be particularly invasive, particularly damaging and particularly dangerous.

So looking at face recognition technologies by commercial companies may be another way to find out about the technology without knowing its name. So goods and services is the ticket when we’re talking about finding out about things when we don’t know the name.

Kendra Albert: Okay. Amanda, could I ask you to do me a favor and just do a very brief, the same thing demo, where you searched for goods and services.

Amanda Levendowski: I guess.

Kendra Albert: We can even give you a phrase if you want.

Amanda Levendowski: Oh, I was going to do the only one that came up earlier related toโ€ฆ Well, give me a phrase.

Kendra Albert: Fraud prevention. Ooh.

Amanda Levendowski: Interesting.

Kendra Albert: Fraud prevention, yes.

Amanda Levendowski: So the ones that are crossed out means they’re no longer valid, but that doesn’t mean that the goods and services description they were used for initially that product doesn’t still exist. But forensic analysis of surveillance video for fraud and threat prevention purposes, that’s one. Check marking machines on preventing fraud, and let me just even take this to another level.

We can go back to TESS, and we can go to a structured search. Now we’re elevating, we’re taking it to the next level. Okay, we’re ready for it. Fraud and threat prevention purposes, that’s a phrase from the verbatim one, you change it to goods and services, and then you submit the query.

These are all the technologies that have been registered at the US PTO that use that phrasing in their product. So you may have some false positives that happens occasionally, I did put it in quotes so it should be exact. What you can do is start here and go through these and see if any of them are relevant.

So for example, Stealth Monitoring for some reason it seems like it might be promising. Here you go. They do the forensic analysis of surveillance video for fraud and theft prevention purposes.

So now we know this is a company, Stealth Monitoring, it’s based in Texas, and we actually know a good amount about it. We know a lot about what they say, what they do. Let’s go to TSDR.

I know we’re all waiting with bated breath.

Kendra Albert: I am, I stopped breathing a while ago. I’m very excited.

Amanda Levendowski: What is the specimen going to be? Is it going to be weird? Who knows? Okay. So this is actually a pretty standard specimen, although it could potentially reveal sensitive information.

I haven’t looked through all five pages, as you all know, this isn’t a magic trick. I didn’t like know in advance that Kendra was going to give this one to me.

But this looks like a pretty standard printout of marketing materials that show the Stealth Monitoring mark used in commerce with those goods and services related to forensic analysis of footage from video surveillance to look for fraud and theft.

So that’s how you could reverse engineer finding out about a company or finding out about a product when you’re just operating from using the goods and services.

Kendra Albert: Great. So there are two more questions.

Amanda Levendowski: Great.

Can you search by trademark class or groups of classes?

Kendra Albert: “Can you search by class or groups of classes?”

Amanda Levendowski: You cannot search by groups of classes because the US PTO is pretty old school, but you can search by class and you can also search by goods and services within the class.

As I showed you with the structured search, that next level searching mechanism, you can search by one line being the class, just remember that you have to put two zeros before a one digit number, I don’t know why, but otherwise it won’t work. Two zeros and then class nine and you can search for it.

And then the other thing is you can also search for the goods and services descriptions in that class. So you can search with an and joinder and you will have a more specific search than if you’re just searching in one.

So you could literally just go through and search for all of the surveillance marks in class nine and 42, if that’s what you wanted to do, however, they would have to be two separate searches because you can’t search multiple classes.

What would stop someone from creating a trademark scraper for a particular good and service?

Kendra Albert: And then one last fantastic question, “What would stop someone from creating a scraper that grabbed all of the marks with a particular good and service?”

Amanda Levendowski: Nothing. And indeed, I’m delighted to tell you, thanks for teeing that up, a student at Georgetown and I, Dylan Brown Bramble have actually developed a tool called Trademark Watcher that does exactly that.

It essentially monitors for surveillance related marks that show up on the US PTO’s registered and we’ll send eventually either a tweet or an email digest, we’re still experimenting with what we’re going to do with it. And it will basically give you an update about here’s what’s new in surveillance tech.

So the US PTO’s website is very scrapable is it turns out and we’ve tried to do it so that it would go off late at night and it wouldn’t interrupt any services because there’s another law that we’re not getting into that could potentially be an issue.

So the goal is to basically make this process easier. I think it’s great for everyone who’s in this workshop to learn how to do this for yourself, so that you can experiment and find things that the bot may miss.

But if you’re looking for a new technique to have in your repertoire to keep an eye on surveillance technologies coming down the pipe, this could be a really powerful tool. And also anyone could create a competing or other tool, a complimentary tool.

It’s hard. I didn’t do it Dylan Brown Bramble coded it, but it’s doable. So you could also do this for yourself if you were curious in particular technologies.

Kendra Albert: I swear I actually did not tee that up in advance. That was an actual question from the actual chat. So before we stop recording and we send everyone into sort of doing this for yourself, any last questions? We’ll obviously provide materials related to all of this. So there’s plenty more coming. But any last questions before we stop?

Amanda Levendowski: Okay.

Kendra Albert: Awesome. All right.

Movement Lawyering: Challenging Narratives Around Online Laws Pertaining to Sex Work

Movement Lawyering: Challenging Narratives Around Online Laws Pertaining to Sex Work. The Office of Clinical and Pro Bono Programs, The Cyberlaw clinic and Berkman Klein Center at Harvard University. July, 2020.

(add video and transcript)

What is Movement Lawyering?

Mason: Thank you all for coming. Welcome to day two of our two day series
on Movement Lawyering. Very excited today to have two incredible speakers with us.
First, we have Danielle Blunt who is a professional New York City based Dominatrix, the and Sex Worker Rights Advocate. She has her master’s in public health and researches the intersection of sex work and equitable access to tech. Blunt is one of the co-founders of Hacking//Hustling, a collective of sex workers and accomplices working at the intersection of technology and social justice formed in response to SESTA-FOSTA. Blunt is on the advisory board of Berkman Klein’s initiative for a representative first amendment,
and she enjoys redistributing money from institutions, watching her community thrive, and making men cry.

We also have Kendra Albert, who is a clinical instructor at the Cyberlaw Clinic where they teach students to practice technology law. They hold a degree from Harvard Law School
and serve on the Board of the ACLU of Massachusetts. They enjoy redistributing money from institutions, working on their solidarity practice, and making people in power uncomfortable.

So two amazing speakers. And I’m going to turn it over to Kendra to begin the first part of our discussion

Kendra Albert: Awesome. Thank you, Mason. I’m super excited to be here and be in conversation with Blunt. Building off of Asana and Yumina’s fantastic introduction to movement lawyering yesterday. Blunt and I talked about this a little bit in advance. I think what we’re kind of hoping to talk about is sort of realistically how conversations around movement lawyering style relationships might work in practice. And I’m using the example of some of our work together.

I figured we kind of start with what, I guess, I’ve been jokingly calling our organizing meet Q, which was how Blunt and I became connected and started working together. And then talk a little bit about how we think about our work and some of the stuff that we’ve done together and how that fits into the movement lawyering frame, and how there maybe other frameworks to think about it, and then what lessons we might be able to learn from some of our work together that we’re taking into the future and then maybe helpful to use. That’s my plan. Blunt, anything you want to add to that?

Blunt: No, I’m really excited to chat about this and for the opportunity to reflect this, because from my perspective, it wasn’t so much as an intentionality of seeking out movement lawyers so much as screaming into the void and Kendra responded.

Kendra Albert: Do you want to talk a little bit about that?

What role does social media play in movement work?

Blunt: Yeah. I retweeted it yesterday, but I… Hacking//Hustling was formed in response to SESTA-FOSTA. Melissa Gira Grant and I, and some other comrades put on some immediate harm reduction programming with Eyebeam. Eyebeam is an art and tech organization in Brooklyn that funds some pretty awesome work. They had recently done a panel series on women in tech, and sex work was left out of the conversation, so we invited them to continue the conversation. This was in our programming there, which then turned into the organization that Hacking//Hustling is.

While we were organizing against FOSTA-SESTA, we were met with this sort of deafening silence from the tech community, from tech lawyers, from just about everyone other than sex workers and very few allies. I was researching content moderation and doing as much research as I could because people who I expected to be having these conversations weren’t. I was reading custodians of the internet and saw that Tarleton was giving a talk at, I think, Berkman Klein. And Kendra just happened to be moderating that conversation.

I raised my hand on Twitter and tweeted. I didn’t even tweet at you. It’s just something we were discussing. But I tweeted at Berkman Klein and Tarleton asking about how you can write a book on content moderation and have a whole chapter on section 2-30 and not ever mentioned FOSTA-SESTA. Kendra, do you want to sort of talk a little bit about what your response was?

Kendra Albert: Yeah, sure. I think I asked the question to Tarleton at the session. A little bit of backstory prior to where sort of that moment was that sex worker rights issues were something I’d been sort of paying attention to kind of in the background for a while. I’d read Melissa Gira Grant, Playing the Whore, which is an excellent book for folks who haven’t read it. And sort of have been roughly following some of the aftermath of FOSTA-SESTA and the things that had happened with the organizing before. Mostly, I think through the lens of EFF sort of talking about sex workers and working with sex workers a little bit in their organizing against FOSTA-SESTA. It came time to ask that question, and so I asked the question and I don’t really remember what Tarleton’s response was.

But then afterwards I sort of reached out to Blunt on Twitter and found the thread and was like, “Hey, I hope I asked it okay. I didn’t see you.” There was a longer bit that Blunt had screen-shoted

Blunt: It was very verbose.

Kendra Albert: Yeah. And I don’t think I asked quite that. I think I just literally was like, “So what about FOSTA-SESTA?” Right? But happy to talk more. And so then we ended up, I think, having a phone call where I got to hear more about what Hacking//Hustling had been doing. And I actually had tried to tune into the Ibeam event, but I hadn’t been quite able to hear it.

We started talking about what next steps look liked or felt like for Hacking//Hustling and how maybe I could be useful. And I think one thing to note about those initial conversations is I think I was very much approaching them from a lawyer frame. Not necessarily that I would take Hacking//Hustling on as a client, but my expertise is as a lawyer. What I’m bringing to this is my ability to interpret FOSTA-SESTA. Or my ability to sort of do legal reasoning or whatever. And that wasn’t exactly what you were looking for from me. Can you tell me more, tell us more about that?

Blunt: Sure. Yeah. We’ve been just sort of very frustrated in trying to get a response. And I also want to note that your initial response to me made me very excited to pursue working together, having conversations together, because your response was something like, “Yes, this is really exciting for me. I’ve been really interested in thinking about FOSTA-SESTA but didn’t want to do that without input from sex workers.” And I was like, “Great. Like an ally. Great, amazing.”

And so we sort of took it from there. I think we had a phone conversation and then you invited myself and a few other sex workers to Berkman Klein to have a conversation. And what I also remember about that conversation is that it was a group of folks who have access to those institutional spaces who benefit from the privileges of being employed by, or going to Harvard, sitting in a room listening to three sex workers sort of scream about how horrible this legislation was and what our fears were and what we were experiencing in community.

Reflecting on that, it very much was in alignment with the work that Hacking//Hustling had been doing, where people who have power in institutions give that power to, are being put in a situation where they first have to listen to the communities who are impacted and who they’re purporting to serve.

That meeting to me followed the same sort of way that we planned our initial programming at Hacking//Hustling at Eyebeam, which was the first day was a panel of sex workers talking about their experiences with navigating online spaces, losing access to these online spaces. And then it wasfollowed up by a day of… We actually found T for Tech, a trans led organization providing harm reduction materials who also had sex working teachers to give the harm reduction, digital security trainings, which was actually very cool. Yeah. It was really amazing that our first time… My first time entering the Berkman Klein space was people were really interested in listening before moving into brainstorming solutions.

Kendra Albert: Yeah. And I think one thing to flag there is we also did sort of think about what were the next steps and brainstorm solutions. And there were a couple of different things that came out of even that meeting. I think there were sort of a harm reduction seen on understanding financial systems and how platforms track you, with an eye towards reducing the chances that folks weren’t getting their financial accounts shut down, because that’s something that happens, for folks who aren’t aware, to sex workers all the time. And then also we drafted, actually with the clinics, some clinic students, models that are sent to a platform that sort of deleted your account because there was sexual content on it.

Not that that held any particular legal weight. There’s no legal claim you can bring. But just in terms of having access to a draft or a template letter that’s in lawyer language, that was something we worked on. What I remember about that first meeting is I was really nervous because I was really worried that it wasn’t going to be useful or whatever. And that I went and bought very fancy donuts because-

Blunt: I remember the donuts.

Kendra Albert: I wanted to suggest that y’all were worthy of very fancy donuts, and that my colleagues in the clinic, including Nathan and Adam Nagy and many other wonderful folks helped me carry all the coffee equipment upstairs because I felt very strongly that it should be hospitable. I don’t know. My relationship to my Judaism is questionable at best, but the Jewish mother instinct that like, “I will make sure you get the appropriate fancy food.” Is strong, right?

Kendra Albert: So yeah. And then I think one of the things that we worked on from there actually was something that came to fruition yesterday, which was, as I started prepping for this conversation, because one of the things I also wanted to do was talk a little bit about the legal context of FOSTA, again, because that’s where I kind of felt comfortable. I sort of realized that nobody had really written a ton on it, and it wasn’t really clear what it did.

I sort of did some analysis, but was also like, “This is vastly incomplete.” And we ended up, along with Hacking//Hustling comrade, Lorelei Lee, sort of working with the Cornell Gender Justice clinic to sort of produce this very long form guide. Every time we thought we were done, it grew three sizes, so it’s 87 pages. It’s on [SSRM 00:12:05]. I tweeted it yesterday.

In some ways, it’s not a great example of movement lawyering because it’s not really community. But on the other hand, it is in response to a need that we sort of identified together, which was the lack of ability to really understand what FOSTA was doing and to be able to point people to things.

Blunt: I also want to backtrack just a little bit about framing that as an act of movement lawyering, because it was addressing the needs of the community, I think better preparing other lawyers to have the conversation. It was impossible to find a lawyer after FOSTA-SESTA was signed into law to give a “know your rights” training, because no one knew what the law did or no one understood the law. I think that that did meet a need, as well as while… What I think you’re not giving yourself credit for there is, what we also did was we provided a brief, a little card that could be handed out to street-based workers who were interested in knowing what FOSTA-SESTA was. There was also educational components.

Kendra Albert:That’s fair. Yeah. I do think, in some ways, it was the analysis we needed to do a lot of the community- based work, even if it isn’t directly accessible to community. And I think that’s fair. I’m wondering if we want to talk a little bit about the event, the bigger event that we did and that process, and then maybe we can sort of migrate towards talking a little bit about how we think about movement lawyering as a term or to describe what we’re talking about, or other lessons we’ve learned.

Blunt: Yeah. Something that Hacking//Hustling is interested in is moving these conversations about how sex workers utilize technology and the ways that sex workers are harmed by the same technologies that they need to use to survive and stay in touch with community, make money, and to organize, and to fight legislation like FOSTA-SESTA, and to fight legislation like EARN II. We want to be these conversations primarily by and for community, but something that is also very important to me into the work that Hacking//Hustling does, is that these conversations are also being had at spaces who have institutional power.

Blunt: And I think that people who their MO is already operating within those spaces of institutional power, often overlook how much can come from attaching movement work to a name. There are definitely pros and cons to this, but if my organization collaborates with Berkman Klein or has Berkman Klein’s name on something, which we’ll talk more about later, that then allows the work that we’ve been doing to be seen as the Academy, as worthy of putting two years of resources to you and then collaborating with Cornell to create the legal document that we needed and served a need of the community

Kendra Albert: I note that Tim in the Q&A has been like, “Kendra said they talk about how they screwed up, and I haven’t heard about that yet.” This is perfect. I’m so glad you asked that, Tim, because actually what Blunt just said about not understanding how powerful these institutions are is like conveners and legitimizers of work was something I didn’t understand before I started working with Blunt.

I think when I started working with Blunt, I didn’t really understand why Hacking//Hustling was really so invested in throwing an event at Harvard. And this actually led to a really interesting news communication, which I’m going to talk about for a second, which was I felt really… Even before I started working with Blunt super formerly, I felt strongly about making sure folks got paid. And I feel way more strongly about that now as anyone who is working with me knows, or has worked with me knows.

Kendra Albert: I ran into a lot of barriers around getting Hacking//Hustling folks paid when we were trying to put on an event at Harvard. And it made me really uncomfortable because I felt weird going to Blunt and saying, “I can’t pay you.” Because I understand how important getting money for this kind of work is.

I think basically what I did was stop responding to email for three weeks, out of shame. Finally, I think we finally got on the phone and I was like, “Look, I’ve tried and I just don’t know how to pay you.” Like, “I cannot pay you what this work is worth. Do you want to cancel?” Blunt, do you want to talk about what you said?

Blunt: Yeah. I was trying to parse that because I was like, “Canceling wasn’t on my mind.” First of all, we do this shit for free all the fucking time, and that’s fucked up. But also I want to call out that for the first year, Hacking//Hustling was 100% funded through our main organizers direct labor in the sex trades and through a client donation that went through a 501(c)(3). I frame sort of all of my work as hustling, so when we’re having this conversation about movement lawyering, I’m like, “Oh, like hustling academic institutions to shift their power? I can talk about that.” Since we had that client donation, Hacking//Hustling was able to then… Which we had done with Eyebeam as well, is Eyebeam was able to find X amount of money and where we felt people should be paid more for their labor, we were able to fill in the rest, which is sort of what we also did with the event that we put on with Berkman Klein.

But it wasn’t just the access to the financial resources that Harvard has, which they do have, it was just very difficult to find them for this purpose. We were able to pay people through the work that our main organizers were doing in the sex trades, and we pay people fairly well. I was like, “Don’t worry. We hustle in other spaces too. We’ve got this covered.”

Having this event take place at Harvard is something that would get press coverage in a way that it wouldn’t normally, is something that will bring these ideas and this community’s expertise to people who don’t normally have access to that. There were a few things that came from that. I don’t know if you want to talk about a little bit of the internal process of organizing that and the work with Whose Corner and what came from it.

Kendra Albert: Yeah. I think that through that event, I got introduced to the folks at Whose Corner, anyway, which is a sex worker focused, street sex workers, homeless and drug user focused mutual aid org out in Western Mass. There are some of the stuff where they needed not necessarily legal advice, but sort of counseling that had to do with law stuff.

I ended up working with them on that. And then it turned out that they had this need where what they were looking for was record ceiling for a number of their members who had prior felonies or misdemeanors on their records. And that was the thing where actually I think… This is the point at which I feel I maybe crossed the threshold into movement lawyer, where I was like, “Oh, I could learn how to do that. I can find somebody to do that.” Not that that can’t be that hard because yeah, it’s hard work and it’s real, but the fact that this is not my core area of expertise and the work that I studied in law school, doesn’t mean that that need is not real and it’s not important to folks I’m in community with. If the need is real and the work is important to folks I’m in community with and it’s in my capacity, then that’s a thing that I should be doing.

That project actually got put on hold because of the pandemic, but we were working with them to figure out everything from where can we get a photocopier? When we’re in Holyoke Mass, notarizing all this paperwork, right? That was the thing. And I think that that felt really good because this is a community… Whose Corner Is It Anyway is an amazing group of folks doing really, really fantastic work. I got to know them because Blunt and Red, who organized the Hacking//Hustling event on Thursday, Blunt is probably about to hustle by putting their link in the chat and I’m here for it, said, “We don’t want this to just be sex workers who work primarily online in terms of who has access to the space. And we want to hear different sets of concerns, different folks, different views on sex work and surveillance.” They knew the Whose Corner folks, and Whose Corner folks were able to come because they were paid through the acts of Hacking//Hustling. I think that’s super important.

Blunt: Yeah. I was going to say, and also, I think with the work of Hacking//Hustling is also sort of… It’s bridging gaps between communities and institution, bridging gaps between who is funded for their labor and who is not. Who is speaking on behalf of themselves and who’s speaking… I think there’s a very big difference between inviting me to have this conversation with you, Kendra, or you then telling this as a story, as if I’m not a person who is also involved in this work.

We thought that it was incredibly important to also have the perspective of our incarcerated comrades and had my comrade Red called up Alicia Walker, who I’ll also drop the GoFundMe in the link in a second, who is an incarcerated survivor of gender-based violence, who’s currently locked up in Chicago in the middle of a pandemic. But she was able to call in, and I think that was the most moving part of the conference that we put on. For me, it was hearing the process that Red goes through to… I feel a lot of people just maybe haven’t called folks who are incarcerated. And hearing that process, or not knowing if we would actually be able to get in touch with Lily to hear what she wanted to say and what she wanted to share with folks. And I think that that was my favorite part. And I think broadening the conception of what is technology and how does technology affect and impact people was also a very important part of that project.

Kendra Albert:Yeah. Do we want to talk a little bit about movement lawyering as hustling, which Blunt came up before this call and I love it. I’m going to let her talk about it for a little, and then I can talk about my sort of relation to you and reaction to it.

Blunt:Yeah. When you asked me to have a conversation with you about movement lawyering, I was like, “I don’t know anything about movement lawyering.” I also think that this conversation is interesting because it’s bringing to light a lot of work that we were both doing internally. I didn’t know some of the fears or hesitations that maybe you had that you’re talking about now. Like I said in the beginning, it wasn’t my intention to put on this programming at Harvard when I reached out to you. I was literally screaming into a void. You were one of the only people who responded in a way that made me feel comfortable with engaging with you.

I thought of all of my work as an act of hustling, whether or not it’s directly with my labor in the sex trades. All of my work is currently funded by my direct labor in the sex trades. And this was somethingthat I believe it was… Yumina mentioned on the last call that her work is largely funded through the corporate law that she does. And I’m like, “Oh, I know something about that.” I know something about finding alternate ways of funding work that is traditionally unpaid. And so much of sex worker organizing is unpaid.

My work comes out of a space of harm reduction care coordination, which I frame as hustling fucked up systems that were never meant to make work in the first place for beautiful people that I care deeply about. And trying to bridge that gap of service for sex working people who are trying to access healthcare. And so when it moved into more of a space of tech, I saw gap that needed to be bridged as these spaces with institutional support and power. And so I just truly think of movement lawyering as how can I hustle lawyers and people with access to institutional power to have the conversations that I want them to be having and encourage them to do that.

I just want to note that frame of how you serve, how you get these institutions that were never meant to take care of folks, to take care of folks better, is one that I really love and I think is really beautiful. And I think it also speaks to things that I think about in my work. And I think that’s a point of commonality between us.

Kendra Albert:

Yeah. I think I often make this joke that Blunt taught me how to hustle, and it’s totally true. I know that there are some folks on this call who have benefited from my advice about how to get paid, I don’t know where you are in the [crosstalk 00:27:51]-

Blunt:
I love teaching people how to hustle.

Kendra Albert:

Institutions often make us feel we should be grateful for whatever we get. What I’ve learned from working with Blunt is just like, “No, ask for more.” Right? Often our relationship to asking and sort of pushing is that a lot of us who have had access to these spaces are afraid because maybe our access will get taken away or maybe someone will get annoyed at us. For me, I think what I’ve learned in some of our work together is that pales in comparison to the harms that our people are experiencing. And that the people I care about and who I am in community with are experiencing. And so it’s my fucking job to be able to be like, “Okay, does this make you a little bit uncomfortable when I ask for this thing? I’m sorry.” But actually the people who need it, need it.

I don’t think I had that frame or that understanding before I started doing work in community, because I think that it’s really easy, especially as a lawyer, where you’re kind of role constrained. The whole point of certain forms of lawyering is to sort of put a barrier between you and the client, to separate you from the client in terms of their emotional needs or their material needs. I think Massachusetts maybe just allowed for lawyers to occasionally pay for food for their clients. I have friends who are public defenders and often they can’t actually pay for a sandwich for their client who’s really hungry because that’s a violation of the ethical rules.

That kind of relationality is such a big part of actually working together rather than sort of standing up and telling the trauma story in order to serve some greater political point. And I also think, for me, the other thing I’ll say about it is it’s really changed the way I think about scholarship.

I don’t produce a lot of traditional legal scholarship. It’s just not really my bag. And I think part of that is because obviously I have opinions, and plenty of opinions, on how things should be. But in some ways, many of the subjects I’m most expert on, I’m most interested in doing work for clients or sort of community work because what I think about what should happen, doesn’t feel that meaningful. Right?

I was talking to a staffer, legislative staffer, for a Senator about 2-30 reform. They were like, “What do you think?” And I’m like, “I don’t know how to answer that question.” What I said was the Hacking//Hustling party line from our last press release of like, “Here are the five things that we’re thinking about.” Right? Because Blunt taught me how to hustle, I’m not that much of an idiot.

The relationship of academics and of lawyers of this idea of our personal beliefs are what should inform our work rather than like, “Oh, actually, what are the community of folks that I work with? What I need out of this moment from me.”

Blunt:

Yeah. I’m thinking back to a lot of when there was just infinite programming and infinite bills about 2-30. No one was talking about the communities that would be impacted about it. Everyone was talking about platform liability. And I’m like, “People are literally dying because of this legislation. They need to be at the front and the center of these conversations and not added on as an afterthought.”

If the work isn’t centering the people who are literally feeling it. Platforms are not people, people are people, and we need to listen to humans who are impacted by these policies. And I think there’s this difference. I’m thinking of it of like movement lawyering versus savior fetishism, and how different those power dynamics need to be so that you’re not causing harm by telling someone’s story as if it’s your own, that you as a lawyer then don’t own that story and then build a brand around that.

Kendra Albert:

Yeah. Part of it is also, I think, something Asana said yesterday about who’s the expert, right? Now, having worked with Hacking//Hustling and Blunt for a while, I’m not an expert very much of the stuff we talk about. Yeah, I maybe know more about 2-30 than some of the other folks we talk to, or that are in our conversations, but I, even as a lawyer or as a lawyer have so much to learn about movement work, about organizing, about sex workers, about folks lives and where they’re at and how I can be helpful. I think that’s really humbling, but also I think as someone who likes to learn new things, it’s really just Even since we’ve been in the pandemic, there’s now a group chat that at times has been very active.

And just feeling close to and in community with folks in terms of being like, “Okay, this is who I talk to everyday.” And I think at this point often talk every day. Just thinking about it, Lisa is like, “Oh, this is my movement lawyering work.” And we’re like, “Oh, this is who I talk to, who I work with, who hears me, who watches me drink too much Rose on Zoom and then not finish the book club book, that kind of thing. There’s another thing I screwed up, Tim. I didn’t finish the book club book. To be fair, nobody else did it.

Anyway. Before we sort of open up for questions, because we’re sort of nearing, we’re a little more than halfway through, anything else you want to add? I know we talked a little bit about your view about sort of institution…

Blunt: Yeah, I think one thing that we talk a lot about, and that I think that this conversation help facilitate is that a lawyer who is doing movement work doesn’t necessarily represent the institution that they work for or the beliefs of that institution. I remember having a conversation with you about how important it felt to have a Harvard affiliation of some of the programming that Hacking//Hustling has done. And how that will literally help us get grants to fund the unpaid labor that we’re doing. And you were like, “That happened because I put…” The internal work that a movement lawyer is doing within their institution doesn’t reflect the values or the principles of that institution necessarily.

Berkman Klein or Harvard might be happy to have me on this panel or have Kendra pushed to have this really radical conference and give us space and a little bit of money, but I, as an actively sex working woman, who’s naked on the internet, not going to get a fellowship from Berkman Klein or from other institutions like that. And I think that that’s something that’s become really… Frankie is mad. That’s something that has become more and more apparent to me of what are the ways that my privilege allows me to move in and out of these academic spaces, and how can I create a bridge for other folks to come with me? And then what are the barriers that I may be blind to because of my ability to sort of move through those spaces that actually hinder me from moving forward.

Blunt: What I’m also interested in, or talking about is like Kendra is awesome and a great accomplice, and is consistently inviting me into those spaces in a way that allows me to have these conversations publicly, but also gives me more options in the work that I do and the choices that I make and will ideally, hopefully, eventually end in funding. I can’t overlook that enough of what it looks to be invited into a space which is valuing my expertise and my experience as well as providing me with opportunities to move further into those spaces without that person.

Kendra Albert: Yeah. I think that’s so important because I think that what you don’t want is the movement lawyer to always end up as the gatekeeper who is like, “Oh, you only get access to these spaces through me.” That’s a really shitty dynamic. I will have succeeded when Hacking//Hustling throws a conference at an Ivy league institution and I have literally nothing to do with it. And actually I will have succeeded when we’ve abolished prisons and sex work is decriminalized and lots of other stuff. But in terms of short term movement goals.

Kendra Albert: But yeah. I see Asana threw a question in our chat. I’m going to take that first. And then if they have questions for either of us in the Q&A, we would really love to hear them. Or just topics you’d like us to talk more about. That also works.

Kendra Albert: Someone asks if we could discuss the notion of recruiting and creating more movement lawyers and how you’ve been successful/unsuccessful in doing it.

It’s up with a hard question because I actually don’t think we’ve spent a ton of time. Well, I was going to say and that’s not true. We haven’t necessarily explicitly set it as a goal, but I think I’ve watched Blunt sort of worked with bringing law students into these conversations. I think one tricky thing I will flag and then I’ll let Blunt sort of react as well, is that there are ways in which my positioning at a technology law clinic is really ideal for the work that we’re doing., because that’s consistent often with some of the needs that Hacking//Hustling has in terms of subject matter. But often, folks who go into a technology clinic are not necessarily always the most motivated by social justice or have the background in sex worker issues.

If I worked at a gender justice clinic like the one at Cornell, it might be easier for me to attract students who are really invested in doing work that serve sex workers and sort of ready to do movement lawyering. There are many things I love about my current position, but I definitely don’t feel the majority of students I work with their dream is to become a movement lawyer. Maybe I’m just pushing them a little bit further towards doing public interest work, even if I’m not sort of being like, “Movement lawyering, that’s the paradigm.”

I also think I’m still learning how to do it. There is definitely like, “Oh, you can totally teach while you’re learning things.” But some of the work we do feels really high stakes, and I don’t want to harm people. And I think for me that sometimes I think lets with me to be more cautious about including folks I don’t know super well in it. I’m so grateful for the trust that folks place in me and the conversations that I get to be a part of, and I wouldn’t want to do anything to jeopardize the people who have trusted me in that way.

Blunt: It’s so interesting to me because it’s not like I was intentionally seeking out movement lawyers when Kendra and I began our working relationship. That it wasn’t an intentional process so much as one that evolves, which I think is also a really interesting framework for just being in contact with community, I think is a helpful way to push people and recruit movement lawyers.

I think that the folks, the law students who came to the Hacking//Hustling event that we put on at Harvard, would not have gotten that type of education and heard the expertise of the communities that they may or may not be working with without that.:

The other thing that I think about is also really important is, we’re talking about our relationship of a sex working person and someone who’s working at a tech law clinic. I’m currently shadowbanned online and at constant risk of being de-platformed. And when I think about Kendra and my relationship, I think about, what would have happened if I did not have access to Twitter and I could not have asked that question? It’s something that comes up a lot for me.

I think fighting against bills like the EARN IT Act and fighting against bills like FOSTA-SESTA because not only does it like… These laws have killed people and people have died because of these laws. And they also de-stabilize movement work and de-stabilize our ability to be present online and speak for ourselves. When I think about this, I think it’s all so related to me, of fighting for things that allows me to have the same access to online spaces as my non-sex working peers do, as part of that work. Because if these communities disappear from online, how are you going to get in touch with them? Especially in the middle of the pandemic.

It’s just another layer that invisibilizes and decreases the power of a community when people are banned from these spaces. Yeah, I think it’s just a matter of inviting community in to educate you. And this is also something that I did as my job at Persist Health Project, which serves sex working people in New York state accessing healthcare.

One of my jobs was providing best practice trainings for doctors and med school students. Hacking//Hustling also provides best practice trainings for people in the Academy who are interested in bettering their sex worker competency. Something that came out of that when I was teaching of like taught those classes that all the major New York city teaching hospitals and the med students were like, “This hour and a half is the most that we’ve ever talked about sex in our entire three years of med school so far.” That was a feedback that I found really interesting.

Mason Kortz: Yeah. I was just going to jump in and once again ask, anyone who has questions, please feel free to ask them. First of all, thank you. This has just been really incredible and it’s really inspiring hearing both of you speak every time I interact with you. One question I wanted to dig a little deeper into is, Blunt, you specifically mentioned bringing in different members of the sex working community who have different needs, who are affected in different ways by the same policy changes. And that’s something that as I’ve kind of started to learn about movement lawyering was one of the first things that I really became aware of.

Mason Kortz: Communities that often look or are represented as being monolithic from the outside, once you begin interacting with them, or not, and people have different interests and what may be helpful to one person could be harmful to another. I was just wondering if the two of you could speak a little bit more about navigating that and the experience of making sure that the communities you’re working with are not reduced to those people who have the most access or the most voice.

Blunt: Yeah. The work of Hacking//Hustling is I’m sort of starting to conceptualize it as threefold of tech law policy that affects how we interact with these online spaces, what happens when we lose access to those online spaces, and making sure that we’re providing harm reduction resources for our street working comrades, that we’re also figuring out what the tech needs of folks who are trading sex on the street are, as well as being in touch with our incarcerated comrades.

That’s sort of how I’ve been conceptualizing the work that we’ve been doing. And I’m always interested in also learning more and how to do better and to make sure that I’m not speaking over other people or I’m not providing… The Hacking//Hustling isn’t providing resources to people of what we think people should be learning, but rather what people actually need. And meeting the needs of community by not assuming them.

Kendra Albert: I think that makes a ton of sense. And the thing I want to just add is, Blunt said a lot of nice things about me, which is very kind, but I think one thing that I don’t want to lose track of is how amazing Hacking//Hustling is, and Blunt is specifically, at making sure that we’re not just hearing from the sex workers with the most privilege. One of the terms I learned for the first time at the Hacking//Hustling commuting last November… Oh my God, eternity ago, right? Was the term whorearchy, which was just this idea that within sex work and sex worker, Jason Fields and Blunt, please correct me if I fuck this up. There are inherent hierarchies about how folks interact.

I didn’t know that when I started working with Blunt. To Blunt’s credit, she knew that. She had thought about, how do we bring in different folks? How do we be making sure that Hacking//Hustling isn’t just the folks talking about SESTA-FOSTA online but also serving the needs of street-based sex workers.

I also think how you might show up for folks really does vary based on what their needs are. Obviously. I mean, that sounds obvious when I say it, but just to be very clear. Which is that if Hacking//Hustling might need a bill analysis, that’s something I can do. Some of our street-based comrades might need money. They don’t need legal advice, they just need money so they can pay rent, right?

Blunt: Or a letter from their PO officers so they can come speak at Harvard.

Kendra Albert: Yeah. Being willing to show up in different ways and thinking about… I think if you’d asked me six years ago, I may be like, “Well, maybe I’m a little uncomfortable giving money to these folks I also work with because this is going to reduce me to my money.” And now I’m like, “Oh, I’m sorry.”

Actually, I was being interviewed for something, where it was for a nonprofit. They were like, “We want to be one of the primary places you donate.” And in all seriousness, to this folks of nonprofits, I was like, “Actually, I don’t really give too many nonprofits anymore. Most of my giving is to sex worker mutual aid funds.” They just kind of looked at me and I was like, “Oh, is that not…” And that now just feels like a natural extension of this work, and being in community with folks and showing up for them. And that can mean bill analysis and it can also mean money. That, it feels important to me.

Blunt: I think something that was very interesting about the work that Hacking//Hustling has done is we conduct very casual needs assessments before putting on programming to sort of assess that what we think folks need is accurate. And if it’s not, where do we fill in the gaps? As well as when we were conducting our research on FOSTA-SESTA, which I also want to point out that the only actual research that exists on the impacts of FOSTA-SESTA have been done by sex workers. I think there are two or three reports, one which was done by Hacking//Hustling.

When we did the research on Hacking//Hustling, we distributed it primarily online, so that means that it’s only accessible to folks who have access to the internet. We also partnered with Whose Corner Is It Anyways, the really amazing organization that Kendra was talking about early in Western Mass, to do the survey with their community at one of their meetings.

I learned a lot about that practice because I worked really… We hired and paid Naomi to modify the surveys so that it was both accessible to the community using the language that that community uses. And also we added on 40 questions for them that they were just interested in for grant purposes. We had the questions that were the same so that we would analyze it and then also then just gave them all of the raw data so that they can do whatever the fuck they want with it. That data is theirs to use to hopefully help them get more money and be used for grants.

What’s something that’s so interesting that came out of that is that folks who are working on the street have no fucking idea what FOSTA-SESTA is. What they did say is that they noticed… On their small stroll in Western Mass, they noticed 10 to 15 more street-based workers hanging around and had heard about FOSTA-SESTA from them. I think that it helped contextualize the research in a way that FOSTA- SESTA pushes people into unsafe working conditions, but people who did not have access to those safer working conditions in the first place didn’t know what FOSTA-SESTA was.

What are good resources for sex work 101?

Mason Kortz: We have three questions in the queue. I’m going to read them out loud for people who are watching this after the fact. First one from Rom. Two-part question, how can technologists amplify cause, and what is your favorite resource about sex work 101 for non-sex workers?

Blunt: Sure. I think Melissa Gira Grant’s Playing the Whore is an excellent book, as well as Revolting Prostitutes, are the two books that I would recommend diving into first. I would also suggest following sex workers and sex worker organizations online to see what they’re talking about and being in internet space community with folks. Because I think often our social media followings are so siloed that we don’t see this and don’t see how the communities who are directly impacted are responding. And also because the platform is literally erasing people from it, is also part of the problem. So being intentional about making that you’re seeing community responses too.

Kendra Albert: Can I just add something to that Blunt? Is that okay? I think that one, Rom you asked, how can technologists amplify this cause? And I think there are maybe two things I want to flag. I think one of the lessons I’ve learned as a lawyer in this space is actually letting go of my identity as a lawyer and just being, “What are the other capabilities that I have?” I have a Twitter account with probably mostly followers who are in tech policy. I have access to institutional spaces, right? Literally physical spaces at Harvard in non-pandemic times, and Zoom spaces at Harvard in pandemic times. Or access to other kinds of resources.

One question I would ask first is, how do I let go of my professional identity in doing this work? And just show up as a person who wants to help. And then I think it can be helpful to also, as you sort of get to understand people’s experience better through doing the one-on-one work and through showing up as a person, then think about, okay, how can I show up as a technologist? What’s going on there. That feels like a sort of part of the answer to me as well. Blunt, you want to add anything?

Blunt: No, I’m just echoing that. It’s like when so many sex workers are shadowbanned. Melissa Gira Grant was trying to @ me in something the other day and couldn’t find me because I’m name suggestion banned. She literally couldn’t find my account to tag in a post. And like with the Berkman Klein, I’m not tagged in any of those posts. I’m not sure if it was just for typing my name because people literally couldn’t find my name to add.

I think thinking about how sex workers do not have access to these same tools that people take for granted, both academic power as well as the ability to be seen on social media, is part of that. Someone’s asking a question, which I feel is somewhat related. Can you address how platforms especially payment processors fear of processing money related to sex work affect these direct giving efforts?

I’m going to drop a link right here that we put together on account shutdowns and a harm reduction guide, which I think is interesting and helpful, about understanding internally the way that this oftentimes network shutdown of sex worker, financial processes happen. And right now Hacking//Hustling is conducting research on content moderation in response to the police violence against black folks as well as the intersection between sex worker and activist, because a lot of activism is actually funded by folks direct labor in the sex trade, because it is oftentimes unpaid labor.

One thing that we’re finding in one of the common themes, is how sex workers losing access to financial technologies disrupts movement work. Is one thing that we’re focusing on. And our ability to provide mutual aid to each other, especially in a pandemic where we’re not allowed to just… We’re not as able to just hand people cash, which is how we pay people at the first Hacking//Hustling event. It was just handing people cash before they spoke, which felt very important because sex workers always get paid before rendering a service ideally.

None of us have access to the same financial technologies. It’s really difficult to move money in a community whenever… I’ve lost access to three or four different financial services. And when we were paying folks for the Hacking//Hustling event, it was coming out of my personal account and then being reimbursed. I had to use four different payment processors in order to be able to provide everyone with stipends that… Yeah. I think people just also overlook how impactful it can be to provide someone with money who needs money to give them that money. That is a hugely radical act that is very effective.

Kendra Albert: Yeah. And I think the other thing I’ll say there is my experience of some of this from the Harvard side is the institutions often have no ability to meaningfully assess risks to folks when they’re paying them. The wallet name that you have that you need to get paid under maybe very different than the name you organize under or appear under as a sex worker. And so if you appear at an institution and they need you to be one honorarium, but it has to go to the wallet name rather than the name you work under, even though the name you work under is the name you spoke under, that’s a point of connection between two identities that you may not want to connect it as a sex worker.

Sometimes, as someone who works at the institution, part of my job is trying to navigate that, right? Being like, “Okay…” Blunt, can I talk about the Case Western thing? Okay. We were on a panel together at Case Western and they were like, “Oh, we want to pay you.” Which was great. But then it was like, “Oh, we need you to fill out this W-9 or whatever.” And it’s all this personal information that Blunt didn’t necessarily want to give. What we did was it was like, “Just pay Kendra and Kendra will pass along the money.” Right?

And that works because we have a pretty close relationship where that was something that I think we both thought that was going to work fine in terms of trust. Some institutions would definitely not do that, right?

To your point, to Brianna’s question about sort of the way in which account shutdowns and financial shutdowns affect folks. I think institutions often take for granted access to financial infrastructure, whether it’s certain kinds of bank accounts under whichever name or Venmo or PayPal, or even if it’s stuff like paying folks two months after an event, or reimbursing people. That’s something that institutions often take for granted and people don’t have a lot of space to be like, “This is not cool and this doesn’t work for me.” Yeah.

Blunt: Yeah. No. Truly. Something I think that everyone in academia could learn is to pay people before they render a service. It’s just mind boggling to me that this is not common practice. But asking a marginalized community member for legally revealing information about them without understanding how that could expose them to potential harm, I think it’s something that definitely needs to be considered as well as how quickly are they getting those funds.

Blunt: I will often pay people either before or right after something ends with a direct transfer that lands directly in their accounts so they have access to that money the same day or the next day when it is processed. When I have had to postpone events, I have offered to pay people upfront when the event was supposed to occur in case people were relying on that payment to get through the month.

Kendra Albert: Yeah. I know we’re at 2:00 PM and I see there’s a couple of questions left, but I guess we want to sort of wrap up. Blunt, are there any other thoughts you want to share or things you want to say?

Blunt: I mean, I’m just really excited for the opportunity to have this conversation and sort of reflect on our relationship because I feel we were both doing a lot of invisible work or work that also I wasn’t super aware that I was doing just by it being radical, just asking for access to these spaces. I was just like, “I’m just trying to bridge these gaps.” It’s really interesting to sort of deconstruct the power dynamics in our relationship as well as what we’ve both learned from working with each other. Thank you for taking the time to invite me here to have this conversation.

Kendra Albert: The best way to ever have conversations is by force in front of a whole bunch of Zoom attendees. No. The feeling is so mutual. I hope it’s clear to everyone attending, and I actually say this all the time, how much I’ve learned from working with Blunt and how grateful I am to be in community with her and the many other folks you work with.

Kendra Albert: I think movement lawyering can feel kind of abstract. And I think for me, I guess the takeaway I would just offer is that it felt so natural. Obviously, I’m getting to learn a ton, and obviously if I’m working with sex workers and their lives and livelihoods and community is on the line, they’re calling the shots. Obviously, I need to let go of some of my own ego around this stuff and get over it

I think that in some ways, as Blunt said, movement lawyering is a framework I came to apply after the facts to the things that I was already doing, because they were what felt right at the time and felt responsive to the needs of our relationship and the folks we work with. And so as y’all go out into doing your work, whether it’s movement lawyering or other kinds of movement work, I wish you some of the same ease, I guess, of finding folks who you click with and who you can grow together with. Mason, I know we need to mention our sponsors, so I’ll stop there.

Mason Kortz: Thank you. And again, let me just echo, thank you both of you for giving us so much to think about and to bring back to our work. I want to also just say thank you to Asana and Yumina for their amazing presentation yesterday. I think between the two days we have stuff that we can take back and reflect on and hopefully really improve the way we all do our own tasks.

Apologies to those questions that we didn’t get to. And thank you to all the attendees for coming. And finally, thank you to our sponsors, to the Berkman Klein Center for Internet and Society for providing the infrastructure to have this talk, and to the Office of Clinical and Pro Bono programs for helping us make sure that our panelists get paid.

Thank you all for coming. Welcome to day two of our two day series on movement lawyering. Very excited today to have two incredible speakers with us. First, we have Danielle Blunt, who is a professional New York City based dominatrix and sex worker rights advocate. She has her master’s in public health and researches the intersection of sex work and equitable access to tech.

Legal Literacy Training

https://youtu.be/r05mxhd16NM

Yves, Lorelei Lee, Kendra Albert, and Korica Simon will present on the First Amendment, section 230, Patriot Act, the ways in which fear creates a push for state surveillance and the impact that this has on our community.

DANIELLE BLUNT: Hi, everyone. I am Danielle Blunt. I use she/her pronouns. I’m with Hacking//Hustling, a collective of sex workers and allies working at the intersection of technology and social justice to interrupt state surveillance and violence facilitated by of technology. Do we want to go around and do introductions first?

KENDRA ALBERT: I can go. Hi, everybody. My name is Kendra Albert. I’m an attorney, and obliged to say via that that none of this is legal advice. I work at the Harvard Cyberlaw Clinic as a clinical instructor there, and also do some work with Hacking//Hustling, and my pronouns are they/them. I’m super excited to be here with y’all.

YVES: Hi, I’m Yves. I use she and they pronouns. I’m an organizer with Survived & Punished New York, which is an abolition group. And with Red Canary Song, which is around supporting migrant sex workers.

KORICA SIMON: Hi. I’m Korica Simon. My pronouns are she/her. I’m a law student in third year at Cornell. I got involved with sex worker legal rights when I was in Seattle, and I worked for a nonprofit called Legal Voice. And I also got involved through a clinic at Cornell called the Gender Justice Clinic. So I’m excited to be here today and talk to you all more about the subject.

LORELEI LEE: Hi, everyone. My name’s Lorelei. I’m an activist and I work with Red Canary Song, as well as Hacking//Hustling, and have worked with these folks on issues of surveillance and techโ€‘related violence that’s impacting people in the sex trades for the last few years. So I’m really excited to be in conversation as well!

DANIELLE BLUNT: Awesome. And Yves, do you want to kick it off with a little community report back? That’d be a great place to start.

How does surveillance impact the sex workers?

YVES: Hi. So, yeah! I’m just going to talk about a little bit about how we got here, and then a little bit how it’s affected mainly the sex working community, but also in general.

So what we’re mainly talking about, or what I’ll mainly be talking about, is around contact tracing and public health, like, uses for surveillance. And then also SESTA/FOSTA and the EARN IT bills.

So these have all increased policing, and I don’t just mean the police department, but also through citizen surveillance and deputizing not only just like people, but also deputizing nonpolice department agencies and companies. Right? This includes a lot of different people, and this really like increases the scope of policing and criminalization in a way that it wasn’t previously. And the way that this has happened is, like, structural violence that has led to so much harm to already marginalized and stigmatized communities.

So kind of the reason why this is, like, happening the way that it is is because a lot of the conversation around surveillance, like, belies powerful moralism that resists against evidence and logic. We see this like happening postโ€‘9/11, where you get this idea of like, if you see something, say something. Which sort of creates these hypervigilant crusaders for both antiterrorism but also antiโ€‘trafficking, which is also an issue that is often tied up with sex work.

So when we see this happening โ€‘โ€‘ the surveillance has increased in such a way that we’ve seen this happen before? Like, this predates all of these sorts of things. Right? They’ve used contact tracing before to criminalizeโ€ฆ different marginalized communities and sex working communities for a really long time. With HIV/AIDS we see as an example, right? They ask you, when you get tested for HIV, they’ve also criminalized the spread of HIV period, right? But when you go into a clinic and you are asked, you’re gonna be asked if you test positive, or if you think that you have any STI, right, but especially HIV/AIDS, they’re going to say, who have you had sex with? Like, name those people. In what timeframe did you have sex with those people? We want to contact those people; how do we get in contact with them. Right? Whether that’s from someone directly, or from you yourself when you go in to get tested. They’re getting that information, and the truth is that information doesn’t just stay at the health clinic, doesn’t just stay where you think it stays. Right? That information gets passed on to the police, to these different agencies like CPS, right? And that leads to the criminalization of a lot of people, not just sex working people. Right? Also people who are profiled as sex workers. They use that information to be like, oh, you’re selling sex. So then the cops are going to come knocking on your door. And this similarly happens with COVID, right?

How is contact tracing used to surveil marginalized communities?

So we’re seeing what’s happening with COVID is they’re using contact tracing in a very similar way. And also, if you’ve seen the public rhetoric around this, right, the way public health officials and government officials are talking about it, they say that sex workers are highโ€‘risk people, right, to have COVID. So if you are working in a massage parlor or on the street and you come in to get tested for COVID, they’re going to be like, oh, how did you get contact โ€‘โ€‘ how did you get this? Who were you in contact with? Or if someone you know has got COVID and goes to get tested, they ask who were you in contact with, and you tell them, oh, I went to this massage parlor or met them on the street, that’s a way of criminalization. The truth is they are not just out to treat you, right? They are going to turn over that information to the police. This happens to spread the scope of policing in so many different ways, not just in the sex working community. Right? In a lot of different communities, they use these exact same surveillance techniques. We should think of surveillance as a strategy that exists within the larger frame of policing.
Also contact tracing, like, these different methods of policing are used to marginalize other communities, who are not sex workers but are targeted as if they were anyway? We see this targeting protesters, recently. We see them surveilling a lot of communities in this way. How did you get this? Oh, you were at a protest last week? Who was there? This all happens in the same scope, and in all of these different agencies that have then been deputized. Right.

What happens when you have these situations โ€‘โ€‘ with SESTA and FOSTA and EARN IT, we wouldn’t directly think of them as surveillance? Oh, they’re censoring and taking down these sites; that’s not directly surveillance. But that’s not exactly true. A lot of these bills are also like collecting information, right? Because they’re putting these sorts of laws in place to go against sex trafficking? So they tell you, these are the indicators of sex trafficking, looking for these indicators. But really, those indicators aren’t indicators of sex trafficking most of the time and are also spread out to sex workers and other people and people who are profiled as sex workers. So it’s also a lot of data collection that is happening in order for them to censor, shadowban, and do all of these things anyway. And that data is also being turned over to the police to be used.

But also, we generally see the kind of attack that happens to sex work coming in from all ends. Where like, so SESTA and FOSTA, we saw this. Right? This is just what happened already. People are pushed to work in more dangerous ways because you can’t go on Backpage, you can’t go on Craigslist โ€‘โ€‘

DANIELLE BLUNT: Can I stop you for one sec? That is amazing. Thank you so much for that. I just want to take a moment to ask for definitions on what is contact tracing and just, like, anyone who wants to jump in a oneโ€‘sentence summary of FOSTAโ€‘SESTA and EARN IT, just so folks are on the same page from the forefront.

What is contact tracing?

YVES: Well, I can like expand a little bit on contact tracing, right? So when an epidemic occurs, right, which I brought up HIV/AIDS, how they kind of figure out who might have it so that they can “treat them,” right, in the best case scenario, this information would not be used to police people. Right? But that’s not what happens. But, like, contact tracing is when they try to figure out who has had it, or who gave it to you, and like โ€‘โ€‘ or who you could have possibly given it to, right, in order to stop the spread, so you can get those people into treatment centers or in treatment.

So if I, for example, was to go into a clinic, and I was like, I have chlamydia. Right. And they’re like, okay, so you have chlamydia. Who did you have sex with before this? Who did you have sex with after you thought you might have shown symptoms? And then you like list them off, like, okay, I saw Blunt! I saw Kendra! I saw Lorelei! I saw all of these people! And then they’re like, oh, did that person tell you that they have chlamydia? Did that person tell you that they have HIV/AIDS, da da da da da. We see the criminalization of HIV/AIDS like similarly with the criminalization that’s happened with COVID, where they’re criminalizing directly the spread of COVID and HIV, but also generally, right? They use this information to be like, oh, who did you get this from? And ideally, they wouldn’t police people, but what ends up happening is they ask you all of this information, and then they kind of pick out those indicators to be like, you’re a sex worker. Like, you’re selling sex. Right? So we’re gonna like show up, and we’re going to arrest you. Right.
I hope that that makes sense.

DANIELLE BLUNT: Yeah. And I also think, too, with the protests that are going around, I think that there’s a lot of contact tracing that’s being done with like sting rays and cell phone tracing, which I hope some other folks can talk about in a little bit. And I would just love like a one or twoโ€‘nonsense summary of FOSTAโ€‘SESTA and EARN IT before we go into them in more detail.

KENDRA ALBERT: Um. I will do my best. Lorelei is watching me with an amused look on their face.

What is FOSTA-SESTA?

So, FOSTA and SESTA are laws that were passed in 2013 that greatly increased the incentive โ€‘โ€‘ Fโ€‘Oโ€‘Sโ€‘Tโ€‘A and Sโ€‘Eโ€‘Sโ€‘Tโ€‘A. Thank you, Blunt. That greatly increased the incentive for online service providers, folks like FaceBook or Twitter or Craigslist, to remove any content related to sex work or possibly attributable in any way to sex trafficking or related to sex trafficking. And we can talk a little bit more about how specifically they did that, but that’s like the oneโ€‘line topโ€‘level summary.
EARN IT is a pending bill in front of Congress right now that is meant to do some similar โ€‘โ€‘ basically, engages in some similar legal stuff around child sexual abuse material, making it โ€‘โ€‘ incentivizing companies and online platforms to be more potentially invasive in their searches for child sexual abuse material by creating more liability if they’re found hosting it.
Lorelei, how was that?

LORELEI LEE: Great. I think that was great. It’s very โ€‘โ€‘ I mean, FOSTAโ€‘SESTA has a lot of parts, and so it’sโ€ฆ But I think what you are talking about is the most important part, which is the impact of it and what it incentivizes.
And the one thing I would add about EARN IT is I think what EARN IT will do that is similar to FOSTAโ€‘SESTA is that it will incentivize companies to remove all information related to sexual health and anything that teaches youth about sexuality.

DANIELLE BLUNT: Thank you.

KENDRA ALBERT: Very upbeat.

DANIELLE BLUNT: And โ€‘โ€‘ yeah. (Laughs) We’ll be getting into those a little bit more. I have one more question for Yves: Is turning health info to the police doable via legal loopholes, like HIPAA, or is that happening in the shadows?

KENDRA ALBERT: I can also take that one, if you prefer. So HIPAA โ€‘โ€‘ HIPAA, which is the U.S. health care privacy law, federal health care privacy law, explicitly has a carveโ€‘out for soโ€‘called “covered entities,” health care providers, turning over information to law enforcement. So it specifically says, you don’t need to get consent from people to turn their information over to law enforcement. So HIPAA doesn’t prevent that.

You know, another thing, and actually I think this really ties in really nicely to some of the stuff we want to talk about a little bit, like the Patriot Act, which brought in surveillance powers to the U.S. government, passed in 2001, right after 9/11, is a lot of times even if there isn’t an explicit process for getting a law enforcement agent or even a public health entity to request information, say if they went through appropriate legal process, many โ€‘โ€‘ there are now โ€‘โ€‘ there are often legal regimes that encourage what’s called “information sharing.” Which just basically means, like, that there areโ€ฆ They try to eliminate, like, privacy or other reasons that information might be siloed between different parts of the government or different governments, like federal, state, local. So even if, you know, you don’t have law enforcement knocking on the health providers’ door with a request for information, like a subpoena or whatever, there’s often these efforts to kind of standardize and collect and centralize these forms of information.
Yves, do you have anything โ€‘โ€‘ do you want to add to that? Did that feel like an adequate summary?

YVES: I feel like that was very clear. Yeah.

What is the Patriot Act?

KENDRA ALBERT: So I think โ€‘โ€‘ Blunt, do you mind if I keep going to talk about Patriot Act stuff for a second? So I think that, you know, one of the things that I think is worth noting is you see a couple general trends, in surveillance. And I’ll also let Korica talk more about some particular ways this plays out in particular communities. But just on a super high level. We can see this sort of movement from the Patriot Act to now, where A, we see more requirements around information sharing. One big critique of the U.S. government’sโ€ฆ I hesitate to say intelligenceโ€‘gathering apparatus with a straight face, but! And what I mean by that is the CIA, the NSA, the sort of intelligence agencies, as opposed to more traditional law enforcement agencies like the FBI or police. Was that they were gathering all this data, but they weren’t sharing it in ways that were actionable across multiple agencies. So when the Patriot Act was passed after 9/11, one of the goals was to make it easier for agencies to share information. I think that’s a general trend that’s happened, postโ€‘Patriot Act to the current moment, where we see things like fusion centers and other ways to collect surveillance data from multiple โ€‘โ€‘ and Palantir’s databases, and ICE’s data collectionโ€ฆ Data that’s collected across multiple methods of surveillance and putting it together to gain more information about the lives of individual people.

Obviously, this has dramatic effects on sex working populations, often because, A, often specifically criminalized and overโ€‘surveilled? But also, you know, ifโ€ฆ Often, information that is innocuous, sort of not raising a red flag on its own, when combined with other information can suggest more specifically what kind of activities folks are engaged in or who they’re spending time with.

The other thing I want to highlight about the Patriot Act is surveillance after โ€‘โ€‘ well. Two more things. I’m trying to be brief, but the lawyer thing is everything comes in threes, so I have to have three things I just want to highlight about the Patriot Act. Okay! So number two is that you see these particular surveillance tools be originally deployed for what’s considered very, very important law enforcement activity. So originally, actually, a lot of stuff we talked about in the context of antiterrorism work, and that’s what the Patriot Act was about. But over time, these law enforcement tools get sort of “trickle down,” for lack of a better term, into sort of more dayโ€‘toโ€‘day enforcement activities. So we’ve seen these actually a lot with something called the sneakโ€‘andโ€‘peek warrant. Which that’s actually a term that, at least, Wikipedia tells me, that the FBI coined, not antiโ€‘surveillance activists? It’s kind of funny that the FBI thinks that’s a good description of what this thing is. But basically, traditionally, if someone gets a warrant for searching your property, it’s basically a document where you go before a judge and you say here’s why we want to search, and the judge says, okay. You said where, you said why you’re allowed to. I’m going to sign off on this, and you police can go search that person’s house, for example.

So traditionally, you know, if you’re at the house, and police show up, you can ask them to see the warrant. And say, hey, I want to confirm that this is the warrant that allows you to search my house. What a sneakโ€‘andโ€‘peek warrant does is say โ€‘โ€‘ is actually allows โ€‘โ€‘ this is kind of, it kind of sounds like bullshit, but this is what really happens. Right? Allows the police to set up a ruse? Like, oh, to get you out of the house, go into the house, and sort of search your stuff. And actually, like, one of the contexts in which we’ve seen this really recently, and one of the reasons I connect this back to the Patriot Act, is the surveillance on massage parlors on the Robert Craft case in Florida. Actually what the police did is get a sneakโ€‘andโ€‘peek warrant, claim there was a bomb threat or a suspicious package at a nearby building. All of the folks who worked in the massage parlors were sort of escorted โ€‘โ€‘ had to be away from the building for their own safety, and the police went in and put cameras in.

And we know this because they tried to criminally prosecute Robert Craft, and Robert Craft had enough money and sort of โ€‘โ€‘ to hire a legal team that was able to challenge the validity of the sneakโ€‘andโ€‘peek warrant that they used to surveil the massage parlors and others working there.

So, when those warrants were included in the Patriot Act, there’s nothing in there about human trafficking investigations, let alone the stuff that happened in Florida, which actually โ€‘โ€‘ there’s no human trafficking prosecution coming out of it. Right. From what I read, and others may know better than I do, so I’ll cede whatever claim I have to the truth there, but. It doesn’t look like human trafficking was involved.

So sneakโ€‘andโ€‘peek warrants weren’t written into the law for those sort of investigations, let alone surveillance of prostitution, but these information technologies โ€‘โ€‘ and here, I include technologies in the computer sense but also in the ways governments do surveillance. Once they get written into the law, their use often gets broadly expanded to new populations, new circumstances. It’s sort of like, you might as well use it.

I had a third thing about the Patriot Act. Butโ€ฆ I guess the third thing I’ll say quickly, before I stop, is that I think one thing you’ll see a lot of in discussions about surveillance reform, and especially how it sort of fits into conversations like we might have here about sex work, is sort of an inherent trust that like procedures are going to save people. (chuckles) Which, I’m really skeptical of, just sort of personally? But you know, if you look at sort of what happened, you know, between the Patriot Act and nowโ€ฆ So, there was โ€‘โ€‘ there’s a thing called Section 215 of the Patriot Act, which basically functionally allowed the National Security โ€‘โ€‘ the NSA to search people’s call logs to see who was calling who. And this was a โ€‘โ€‘ there was like a legitimately robust debate about this. But one of the sort of reform methods that was actually put on the table and passed as part of theโ€ฆ USA Freedom Act, in I want to say 2016? Don’t quote me on the date. Was actually, they were like, okay, great. Well, the U.S. government can’t hold this giant database of call data anymore. They can’t see who you called and when. But they can go to the phone company and ask them.

And like, yes, that is better. I’m not gonna โ€‘โ€‘ I would rather they have to go and ask Verizon nicely before they get the call data. But functionally, I’m like, that’s not โ€‘โ€‘ that’s not safety. Right? And I think that, you know, when we see a lot of the surveillance โ€‘โ€‘ some types of surveillance reform activity, especially postโ€‘Patriot Act, we’re not even getting close to back where we were preโ€‘Patriot Act. We’re sort of, like, trying to kind of tinker around the margins, slash maybe add a teeny bit more process. That’s not going to help the folks who are most criminalized and most surveilled.

Anyway. That was a lot from me, so I’m going to stop. Blunt, do you have another question you want to tee up, or folks want to react to any of that?

LORELEI LEE: I have a question, actually. What is a fusion center?

What is a fusion center?

KENDRA ALBERT: Um. Well, so I’m โ€‘โ€‘ I’m gonna do my best. It’s been a little while. But theโ€ฆ Ha. Despite the weird, kind of futuristic name, it’s basically where all the cops get together. So different โ€‘โ€‘ (Laughing) Yeah. Different types of law enforcement often, like, have different beats. So one of the goals of fusion centers is to like combine information and share policing and surveillance information from different law enforcement agencies. So that can be, like, you know the one actually I’m most familiar with is the one outside of San Francisco. And there’s been a lot of โ€‘โ€‘ I don’t to erase โ€‘โ€‘ there’s been a lot of really amazing research and activism against fusion centers. But actually often and primarily by communities of color. But usually, they’re likeโ€ฆ It’s where the San Francisco PD and the Marin County PD, which is the county north of San Francisco, and the BART โ€‘โ€‘ which is the public transit, one of the public transit organizations โ€‘โ€‘ where they cops would all share information and sort of share tips. And they were a result of the sort of, the attempt after 9/11 to deal with this โ€‘โ€‘ what people saw as this problem of all this information being siloed.

DANIELLE BLUNT: Awesome. Thank you so much, Kendra.
Korica, I would love to hear from you if you feel like now’s a good time to chime in.

The history of surveillance in marginalized communities

KORICA SIMON: Yeah. So I can speak a little bit on the history of surveillance. So, as Kendra stated earlier, marginalized communities have historically been affected, have been victims, of government surveillance. And surveillance does have roots in slavery. So in 1713, New York City passed lantern laws. These laws were used to regulate Black and Indian slaves at night. So they โ€‘โ€‘ if you were over the age of 14, you could not appear in the streets without some kind of lighted candle so that the police could identify you.
And we’ve seen like this same thing recently, with NYPD, where they are shining survey lights like floodlights in Black communities. And we saw that increase after they received a lot of criticism over stop and frisk. And people in those neighborhoods were reporting that they could not sleep at night. Like, the lights were just blinding them.
And Simone Browne has written a lot about this subject, and how the ways in which light has been used to surveil people. And I believe they also write about technology, as well, and how we’ve moved to that side of things.

What is COINTELPRO?

So in regards to technology surveillance, one of the most wellโ€‘known abuses of surveillance by the government is COINTELPRO. I think it stands for counterintelligence program. It was basically a series of illegal counterintelligence projects conducted by the FBI aimed at surveilling and discrediting, disrupting, political organizations. So the FBI in particular targeted feminist organizations, communist organizations, and civil rights organizations. And the government’s job was basically to do whatever they could to just like disband them and get rid of them by any means necessary. And they mostly did this through, like, wiretaps, listening in on people’s phone calls, tracking them down, as well as having informants involved as well.

And as a result of this, quite a few people were murdered or put into prison. Some Black members of the Black Panther party are still in prison. Andโ€ฆ Two of the most talked about people who are victims of this are Martin Luther King, Jr., as well as Fred Hampton, who was drugged by an FBI informant and then murdered by Chicago police. But also Angela Davis has been a victim of this as well. And again, we know that these practices are still continuing today. So we kinda got into the protesters and how they’re being surveilled. And I think it came out in 2018, 2019, that Black Lives Matter activists were being watched. Their activity was being watched on the internet. And now we have seen recent reports that protesters today are being watched, as well, either through body cameras, cell site simulators, license plate readers, social media, drones, as well as just cameras in that area that may use facial recognition technology that could help the police identify who the protester is and get access to your social media accounts.

So these are all, like, issues that are happening today as technology increases. We’ve only seen it get worse. And we know that marginalized communities are the most affected by this. If they use this on Black, Native, Latinx, immigrant communities, they’re also going to use this on others as well. Sex workers, and sex workers mostly fall into marginalized communities. So.

I don’t know if I should talk about the third part right now, or if I should wait? ‘Cause it’s a little bit different, butโ€ฆ Okay. I’ll just go ahead. (Laughs)

What is The Third Party Doctrine?

So, kind of transitioning a little bit t. The Third Party Doctrine is a doctrine that comes out of two Supreme Court cases, United States v Miller and Smith v Maryland. And what they state is if you voluntarily give your information to third parties, then you have no reasonable expectation of privacy. So third parties include your phone company, Verizon, Sprint; eโ€‘mail servers, if you use Gmail; internet service providers; as well as banks. And so that means that the government can obtain your information from these companies without having a warrant. So they don’t have to have, like, probable cause that you’re doing something in order to get access to this information.

And the Supreme Court’s logic behind this decision was that, well, if you tell someone something, then you’re giving up your privacy, and like you can’t expect that that will stay private forever. What โ€‘โ€‘ I should also back up and say that these cases were decided in the 70s? So. Not today, where like our whole life is on the internet, and we are constantly giving third parties our information. And actually Justice Sotomayor, she has suggested that she would like the Court to rethink the third party doctrine, because it’s just a completely different time today. A lot of us use our GPS, and we wouldn’t think that โ€‘โ€‘ I don’t know. That they could just share all of our information without us knowing.

And I will say that if you’re ever curious about like how often the government is requesting access to this information, some companies, like Google, I think FaceBook, and Sprint, they do report this. I know Google reports it under transparency reports. And you can see how often the government has asked them โ€‘โ€‘

KORICA SIMON: Oh. Well, hopefully, they’re still doing it, and you can see. I think it’s roughly a hundred thousand people a year. But we don’t know, like, what the result of that is. It’s honestly probably a lot of people who aren’t doing anything at all.

And so we’ve also seen, like, some people starting to move their eโ€‘mail accounts from using Gmail to eโ€‘mail servers that care a little bit more about privacy and that are more willing to fight these requests from the government.

And then I’ll also say the last thing is that the government can also request that these companies, like, not tell you at all that they’ve requested this information. Soโ€ฆ This could be done completely in secret, as well. So.

Privacy from law enforcement and the Fourth Amendment

KENDRA ALBERT: So. I think โ€‘โ€‘ I want to just sort of flag some stuff that Korica said and sort of highlight certain parts of it, and I want to contextualize a little bit of this. I think, you know, often โ€‘โ€‘ we’re sort of talking here about sort of privacy from law enforcement, and the primary source of privacy from law enforcement in the U.S. is the fourth amendment, which is so obvious Korica didn’t say it, but I’m going to say it just in case it isn’t obvious for other folks. And, you knowโ€ฆ Two โ€‘โ€‘ one thing worth noting about the fourth amendment, for like folks who are sort of concerned about where โ€‘โ€‘ about like the relationship between all of these legal doctrines and their actual lives? You know, for many, likeโ€ฆ Often, I want to contextualize for folks that having Fourth Amendment protection, or like saying, oh, the U.S. government violated the Fourth Amendment, only gets you so far. Because if what you want is the government not to have access to that information, the horse has already left the barn, to use the right metaphor. Which is to say that most of the remedies that come from, you know, unconstitutional searches and seizures, or unconstitutional requests for information, just are about not having โ€‘โ€‘ like, that information not being able to be used against you in court. Which is of very limited value if what you’re concerned about is like the safety of yourself or your community, of not getting folks arrested, or if you don’t have questions access to the kinds of representation and resources that would allow you to go through a legal battle and you’re going to plea out the second that you get arrested.

So, you know, I always want to caution any story I tell, or any story we tell, about the importance of constitutional rights in this area with a little sort of real politic about what does it mean, or real talk about what does it mean, to have access to these kinds of rights.

The other thing I want to flag is one โ€‘โ€‘ what Korica said is 100% correct, as a matter of doctrinal law. There is a weird thing that has happened with regards to government access to data, which is a lot of the larger online service providers, and in this I include Google and Twitter, some of the likeโ€ฆ FaceBook, actively will not provide certain types of information absent a, like, appropriate legal process. So it’s actually legally contestable whether the government can get access to your eโ€‘mail that’s stored on a server without a warrant. It has to do something with โ€‘โ€‘ in certain contexts, with how old the eโ€‘mail is, and whether it looks like it’s been abandoned on the server? Is statute that covers that, the electronic communications privacy act, was passed in the 90s, and boy does it read like that! Like, good luck!

Does the government need a warrant to access your e-mail?

But point being, Gmail will require a warrant to get access to your eโ€‘mail content. That’s great, except that, you knowโ€ฆ If your eโ€‘mail content gets turned over and then you then want to challenge it, you’re still in the same place you were previously, which is that the government has access to the eโ€‘mail, and that could mean serious consequences for you independent of whether it’s later admissible in court.

So part of what we’re talking about with legal literacy in this space, what I want to encourage folks to think about is, okay, how do I keep me and my community safe independent of the legal remedies? Because oftentimes, those legal remedies aren’t acceptable to everybody. Just realistically and very obviously. And/or will sort of help you after the fact? Maybe it means you recover money. Or maybe it means the evidence isn’t used against you in court. That doesn’t help very much if what you’re concerned about is the safety of you and your people.

So making sure that, like, we don’t pretend these remedies will make people whole for the harms they experience from surveillance or from the government. But rather that, you know, some of these protective measures that folks can take are about sort of trying to prevent the types of harm that the surveillance might cause in the first place.

Apples one more quick note is that a relatively recent Supreme Court decision has suggested that the government does need a warrant to access your cell phone location. So that was like one little bit of good in a sea of terribleness that is the third party doctrine.

LORELEI LEE: I think โ€‘โ€‘ so I think I’ll respond to a little bit of that to say that Iโ€ฆ you know, I’m thinking about the connections that are between what Yves has been talking about, and then what you folks are talking about, in terms ofโ€ฆ the way that information gets used against you that isn’t really cognizable in the law, but once they have your information and have you on their radar, they use that information to get more information, to follow you, to trace your contacts, and happening in multiple different contexts. Andโ€ฆ Something that I think is really important that people don’t think about all the time is that everyone breaks the law. Andโ€ฆ (Laughs) And it is people who are criminalized. It is โ€‘โ€‘ so, we think of criminalization as being about behavior. But it is really about people in communities.

Because everyone breaks the law, and the only folks who are targeted by police โ€‘โ€‘ and I mean state police, federal police, et cetera โ€‘โ€‘ like, those are the folks who get punished for breaking the law. And that punishment can beโ€ฆ you know, because they have followed you for a certain period of time in order to collect enough information in order to the make something cognizable in the law.

So I’m thinking about how one of the themes of what we’ve been talking about is the deputizing of folks who are not thought of as law enforcement agencies, but whose collection of your information becomes a way of enforcing behavioral norms. And that happening in a way that is โ€‘โ€‘ goes beyond what criminal law can even do. And soโ€ฆ Thinking about sort of the modern history of how this has happened in law that โ€‘โ€‘ in some of the laws that we’ve been talking about, some of the federal laws that we’ve been talking about. So, the Patriot Act, one thing to think about in terms of the Patriot Act is how prior to 9/11, Congress had been considering passing some form of regulation for internet companies and data โ€‘โ€‘ regarding data collection. And Kendra, please jump in if I am messing this up. Or anyone, obviously. (Laughs) Butโ€ฆ When 9/11 happened, that regulation sort of was pushed to the side. And it is during this time period that we have this sort of โ€‘โ€‘ we have the increase in government surveillance, but we also have this sort of recognition by private corporations that data collection is something that can be monetized. And they are unregulated in doing this, and there is this idea that if you have given over your information voluntarily, it belongs to those people, regardless of whether you did it knowingly or not.
So we have this sort of rise of data collection that is a creation of surveillance tools by corporations, and there’s sort of a monetary incentive to keep creating stronger and stronger data collection tools that can be more and more invasive and do this kind of contact tracing that does the thing that Yves has been talking about, that you folks have been talking about, where you don’t โ€‘โ€‘ each piece of information looks innocuous, but when you put it together you have a map of who you are, and that’s especially concerning for sex working people because they identify sex working people based on this collection of seemingly innocuous information. And you have the incentive to create tools that are more and more effective at collecting that information. And then you have the partnership between government and private companies that then allows that information to be used in order to enforce norms that areโ€ฆ expected by the state, that are thought of as beneficial to the state. And, obviously, targeting people in the sex trades at a high rate. And especially people in the sex trades who are parts of โ€‘โ€‘ part of other marginalized communities.

And so FOSTA and EARN IT are just sort ofโ€ฆ I think we talk about FOSTA a lot as though it is a, like, a revolutionary law that was passed, as though it made huge changes in the law. And it, you know, it did make a change to one specific law that I think people thought of as being sort of dramatic. That’s Section 230. However, it is โ€‘โ€‘ it really was just an evolution out of stuff that had already been happening. So FOSTA’s purpose, and EARN IT’s purpose, as well, one of the main purposes of both of these laws is to decrease limits on civil liability for internet companies. And you can think of that as being Congress sort of taking out, taking themselves out, taking their responsibility away from themselves in terms of regulating these companies and putting, deputizing civilians to do that regulating for them, and deputizing corporate โ€‘โ€‘ also deputizing corporations to createโ€ฆ rules and collect data that is thought ofโ€ฆ (Sighs) Or is publicized! As being some, having some impact on trafficking and sexual exploitation and sexual violence? But all of that being simplyโ€ฆ a show. And actually increasing sex workers’ vulnerability to exploitation. And when you decrease our ability to communicate with each other, when you decrease our ability to be visible online, when you decrease our ability to share information, health and safety information, you increase folks’ liability โ€‘โ€‘ sorry, folks’ vulnerability, to violence and exploitation.

And I notice that someone asked earlier whether EARN IT had a piece about not prohibiting sexual health information for use. And it doesn’t, at all. But what it does is increase civil liability so that it incentivizes companies to draw the line further than the law specifies. And that is the same thing that FOSTA does. So, these laws โ€‘โ€‘ because civil liability can be โ€‘โ€‘ right, anybody can sue. You knowโ€ฆ So, think about โ€‘โ€‘ in terms of criminal law enforcement, that โ€‘โ€‘ you need specific resources. Like, the police and the FBI โ€‘โ€‘ policing happens on all of these different levels, state and federal. I mean, they do have โ€‘โ€‘ obviously, this has been, you know, this has been in public conversation for โ€‘โ€‘ especially recently, is how many resources these folks do have. And it is a obscene amount of resources. However! It is still less likely that you will be subject to criminal prosecution than that as a company you will be subject to a lawsuit. And the lawsuits also have a lower requirement in court in order to have liability. Like, civil liability, you have to show less in court than you do to prove criminal liability.

And so when you increase civil liability, you incentivize companies to draw the line much further than the law specifiesโ€ฆ because they want to get rid of even the appearance of liability, and even, you know โ€‘โ€‘ because also, lawsuits are expensive, regardless of whether the claims can be proven or not! So, that’s โ€‘โ€‘ I’ll stop there.

DANIELLE BLUNT: I wanted to make sure that we take a few minutes to sort of talk about what FOSTAโ€‘SESTA and what EARN IT are amending. So Kendra, I would love just like a twoโ€‘minute summary of Section 230, and then Lorelei, if you wanted to sort of continue with what โ€‘โ€‘ like, what EARN IT is, and what EARN IT’s proposing, and why the overโ€‘โ€‘โ€‘ how โ€‘โ€‘ and the ways in which it’s so overly broad that things like queer sex ed could get caught up in it.

KENDRA ALBERT: Yeah. And I think actually I want to sort of tag on to the end of what Lorelei was saying, ’cause I think it ties perfectly into a discussion about Section 230, which is to say the sort of what we lawyers would call “commandeering,” but the use of private companies to do things that the governmentโ€ฆ isn’t sure that it has the political capital or will to push forward? It’s not just because they, like, can make it happen using civil liability. It also is much harder to bring a First Amendment challenge to, like, companies deciding “voluntarily” to overโ€‘enforce their own rules. Which, they’re not bound by the First Amendment. Versus the government making a particular rule, which would be susceptible to a First Amendment challenge.

So I can talk a little bit more about that, but I just want to make that point what Lorelei is saying. Which is delegating these responsibilities to private companies is not just better from, oh, you can kind of throw up your hands and claim no moral responsibility for what happens, but also it limits the ability of individuals what are harmed by these sort of changes to legal regimes to effectively challenge them.

What is section 230 of the Communication Decency Act?

So let me talk about 230, which I think will help us conceptualize the stuff, and then we can jump back to SESTA and FOSTA and EARN IT.

So Section 230 of the Communications Decency Act was passed in 1996โ€ฆ? I’m really bad with years. Anyways! Passed in 1996. And it was originally part of an omnibus antiโ€‘porn bill, that had everything โ€‘โ€‘ that was supposed to restrict minors from seeing porn on the internet. Everybody in the 90s was real worried about porn on the internet. Andโ€ฆ It turned out that most of that bill was unconstitutional. It was struck down by the Supreme Court in a case called ACLU versus Reno. But what was left was this one provision that hadn’t gotten a ton of attention when it passed called Section 230. And what Section 230 does is it says that no online service provider can be held liable for the sort of โ€‘โ€‘ or, to be the publisher of content where someone else, like, sort of spoke it online.

Okay. What the fuck does that mean? So, let’s take a Yelp โ€‘โ€‘ let’s take Yelp, for example. On Yelp, there are Yelp reviews, posted by third parties. So if I post a Yelp review of my local carpet cleaner. Is always use them, because there’s a funny case involving carpet cleaners. Um. Anyway! I post a review, who I have not used. They have cleaned zero of my carpets. I say, these people are scum bags. They ripped me off. They told me it would cost $100 to clean all my carpets, and it cost me 3,000, and I got bedbugs. So that’s inflammatory. They could potentially sue me, because it’s not true and it harms their business.

What Section 230 says is carpet company can come after me, Kendra, for posting that lie, but they can’t sue Yelp. Or if they do, they’re going to lose. Because Yelp has no way of knowing if my claim is true or false.
So that’s the original meaning of Section 230. It’s gotten broadly interpreted, for lots of good reasons.

So right now, there are something like 20 lawsuits against Twitter for facilitating terrorism, all of them thrown outed on Section 230 grounds. The one that is most relevant to our conversation right now is a case out of Massachusetts called Doe v Backpage, which was brought by a number of folks โ€‘โ€‘ survivors of trafficking against Backpage.com, for what they claimed was complicity and sort of knowledge of the ads that were placed on Backpage that they were harmed as a result of. And the first circuit, which is a sort ofโ€ฆ one step below the Supreme Court, in terms of courts, said: That’s all very well and good, but Backpage isn’t the speaker of any of those ads. They didn’t write the ads. They don’t know anything about the ads. We’re throwing out this case. And in the aftermath of that, Congress was like, this shall not stand! And passed FOSTA and SESTA. And I’ll turn it over to Lorelei to talk more about that.

LORELEI LEE: I think I’m curious what the audience’s questions are about FOSTAโ€‘SESTA, because I think there’s been quite a bit of information written about them, about that law, and I wouldn’t want to just talk on and on about it when it’s not focused to what people want to hear. Or should I talk about EARN IT? Or โ€‘โ€‘ I don’t know, someone tell me โ€‘โ€‘

DANIELLE BLUNT: I think we did a summary of FOSTAโ€‘SESTA. I would like another oneโ€‘sentence summary of FOSTAโ€‘SESTA, the impact. And then what the fuck EARN IT is and where it’s at, would be helpful.

LORELEI LEE: Yeah, so we can talk about why Section 230 matters to these laws.

DANIELLE BLUNT: Yeah.

Why is Section 230 important?

LORELEI LEE: So FOSTAโ€‘SESTA does several things, does like six things in federal law, including create a new crime under the Mann Act, which is originally the White Slave Trafficking Act of 1910, and it’s been renamed, but it’s not betterโ€ฆ? (Laughing) Oh, boy. So it creates new crimes. That’s one thing that it does. But it also a changes Section 230 so that it no longer protects against lawsuits under federal law regarding specifically the federal antiโ€‘trafficking law, 1591 โ€‘โ€‘ 18 USC, 1591, in case anyone wants that number. Um. (Laughs)

And so that, what that doesโ€ฆ There โ€‘โ€‘ it’s not clear that Section 230 was actually preventing people from suing companies, specifically Backpage. Backpage was the center of congressional conversations and the center of media attention. Andโ€ฆ The chamber was that Backpage was going unโ€‘โ€‘โ€‘ they were held โ€‘โ€‘ not being able to be held accountable for trafficking that was happening on their website. But actually, the first circuit case was maybeโ€ฆ just didn’t have enough evidence yet to show how actually Backpage could have been held responsible regardless of Section 230, because Backpage was doing things like editing ads and that kind of thing that would have made them liable in a way that’s unlike Yelp.

And soโ€ฆ So, okay. But! People started talking about Section 230 because there was a documentary made about the first circuit case, and it was very wellโ€‘publicized, and that documentary was shown in Congress. And people started talking about Section 230 as though that was the thing preventing lawsuits.
I mean, another important piece to remember about making civil liability the place where we enforce antiโ€‘trafficking law and antiโ€‘exploitation law is that it puts the onus on victims of trafficking and victims of exploitation to bring those lawsuits that are very expensive, that โ€‘โ€‘ lawyers for those claims are inaccessible. You have to spend years talking about your trauma. And! You know, it takes such a long time to get โ€‘โ€‘ if you are going to even get compensation โ€‘โ€‘ and then, at the end, you get monetary compensation if you win your lawsuit. But โ€‘โ€‘ it doesn’t prevent trafficking! And it doesn’t prevent exploitation. And we know that there are other methods of doing that that are much more effective. And many of those methods involve the investment of resources, I think โ€‘โ€‘ I think this is one of the reasons that this is happening, is that many of those solutions involve the investment of resources in marginalized communities. And instead, Congress wants to pass bills that don’t require the redistribution of wealth in this country.

So EARN IT does something similar to Section 230. And the way that FOSTA makes a carveโ€‘out in Section 230 around the federal antiโ€‘trafficking laws, EARN IT makes a carveโ€‘out in Section 230 around the child exploitation laws, specifically child sexual abuse material laws. And, similarly, when Kendra and I did this research, there haven’t โ€‘โ€‘ there hasn’t been a lot of examples of Section 230 preventing those claims being brought. So, again, it feels a little bit more like this is for show than anything else. But we can predict that the impact that EARN IT will have will be very similar to the impact that FOSTA had in terms of the removal of information online and the censoring of people online. And the โ€‘โ€‘ not just the removal of information, but the prohibition on specific people talking.

And we think that, based on our, like, analysis of EARN IT, that that impact will be really on queer youth. So, because that’s a specific community for whom there’s a lot of fear around sexual information being shared, and it’s also a specific community who is seeking that information out! Because, I mean, just being โ€‘โ€‘ having been a queer youth once myself! I know that, like, you just don’t โ€‘โ€‘ you just don’t necessarily have access to folks when you’re a kid who can tell you that you’re okay and you’re normal.

DANIELLE BLUNT: Yeah. Thank you for that, Lorelei. And I wonder, too, if Yves and Korica, if you have anything that you would like to add before we open it up to the Q&A.

YVES: I mean, I think thatโ€ฆ you know, y’all covered it pretty well, right? Like, I think that like everybody covered a lot of stuff. I mean, I’ve been looking at the questions, and I also only really have, like, a little bit to say in terms ofโ€ฆ you know, the way that we see a lot of this happen, right? We’ve obviously talked about criminalization; we’ve talked about censorship, and kind of what happens. But specifically, in talking on this panel around the impact on sex workers and marginalized communities, like the ways that we really see a lot of this happen, and the push for this, right? Like, whenever there’s an increase in surveillance, like that increases the scope, it’s going to increase the scope of policing, and also the general stigmatization. Right?

So we don’t โ€‘โ€‘ like, I think everybody kind of knows that I’m, like, most knowledgeable in terms of the impact on inโ€‘person sex work. But when we also look at the impact these things have on like digital sex work, that has gotten so much more popular during these times, right, we also see that all of these groups, and like โ€‘โ€‘ the groups that are behind these bills to begin with, right? Are pushing for other forms of censorship or limitations being put on not just sex workers, but other marginalized communities, but also, like, you know, we know that these intersect. We know that there are intersections here. Is that, they ask people like credit card companies to not accept payments for sex workers. We’ve seen that happen, right? And like, in terms of like inโ€‘person sex work โ€‘โ€‘ and Lorelei talked about this, right? People get pushed into the most dangerous forms of sex work, making them more vulnerable. In fact, making them more vulnerable to the human trafficking that these people are so against, and make everybody so much more vulnerable to all of these things, which we like kind of talked about. And I think it’s kind of important in talking about the questions that I’m kind of seeing about, you know, what do we do? Because I feel like a part of our conversation kind of scares everybody into being like, oh, my gosh, I should just not use social media! I shouldn’t even text! (Laughs) Which, I don’t want people to think that that is the case? Right? F I think that, like, all of these different encryption methods, and these things, right โ€‘โ€‘ although! Right? I do not think that they’re foolproof, which they’re not! Like, there are still many ways in which the police and like other agencies can get access to this information, one of those ways being like whomever you’re sending the information to, and wherever that information kind of ends up. If you like, you know, sync it to your laptop, sync it to your phone. All of these different ways, right? But these are tools that can protect you.
So I think that if you want to use these encryption methods, these like โ€‘โ€‘ proton mail to encrypt your mail, iPhone messages, that’s a good thing. Take what you have. But know they’re not foolproof.

I also want to talk about โ€‘โ€‘ Kendra kind of talked about this and the reforms and what they look like, and how we think we’ve solved this, or people think they’ve been solving it? Obviously, I came into this conversation, I told everybody I’m an abolitionist. Right? I work with abolitionist groups. I think at the end of the day, surveillance is a strategy that they use in policing, before this technology existed. Before they started doing this stuff, they always surveilled. It’s just an arm of policing. At the end of the day, the problem is policing, policing that has always been used and meant to use to disappear communities. right?
So the bigger fight that we’re fighting is policing. So I don’t want people to think that the fear is, oh, you shouldn’t do anything. The truth is, if you’re a marginalized person, if you’re a sex working person, they are going to want to police you, no matter what, and we’re fighting against that.
(silent applause)

DANIELLE BLUNT: Thank you so much for that. Korica, did you have anything that you wanted to add?

KORICA SIMON: I will say I went to a conference. It was a Law forโ€ฆ Black Lives? I think is what it’s called? And they do things around, like, the law and liberation of Black people. And the speaker talked about how, like, have you ever noticed if you lived in a Black neighborhood, or a person of color, people of color neighborhood, police are everywhere? But if you live in white neighborhoods, police are not there. And it’s not because there is more crime in one area over another. In fact, like, police just make the crime worse. And I thought about that a lot, ’cause I’ve lived in Black neighborhoods. I’ve lived in white neighborhoods. And there is a stark difference. And there is still, like, “crime” happening in the white neighborhood, but nothing โ€‘โ€‘ like, police weren’t there. So I think it is important to think about how policing is the problem.

And then one other thing I forgot to bring up is that before this talk, I was doing like research on what’s been happening lately, ’cause I feel like there’s just always so much happening. And something that I missed was that some police departments at NYPD and Chicago Police Department, they have been putting like adsโ€ฆ sex ads on websites, and people will text that number looking for services. And they will โ€‘โ€‘ the NYPD Police Department will send them a message saying โ€‘โ€‘ I have it pulled up. It’ll say, like, this is the New York Police Department. Your response to an online ad for prostitution has been logged. Offering to pay someone for sexual conduct is a crime and is punishable for up to seven years of incarceration. Andโ€ฆ Yeah!
So, people in that article were talking about how the police have access to their name and their phone number, and they don’t know like what’s gonna happen to them. Like, are they just logged in some database? And I think it’s safe to assume that they probably are logged into some kind of database. And I think, as we think about how โ€‘โ€‘ as yeast said, how sex work is becoming even more digital with the time that we’re in, like the impact of this on sex workers, I’m guessing it’s gonna be really large. So, yeah. I just wanted to bring up that extra way that surveillance is happening.

LORELEI LEE: I actually wanna add one more thing that I intended to say and forgot to say, which is just that in terms of this question of what we do, I do think that one other point to me, like, when they’re passing these laws, something else they’re doing is deputizing us to police ourselves and to chill our own speech and to prevent us from organizing and to prevent us from using any tools at all to communicate with each other and to talk about these issues. So, I don’t know. I do think that theโ€ฆ It is a mistake for us to use this as a reason not toโ€ฆ speak to each other! I mean, that is like really what we’re talking about, when we talk about not using online tools and other electronic tools of communication that areโ€ฆ

DANIELLE BLUNT: Yeah, it’s really interesting, too. And right now, some of Hacking//Hustling’s researchers are wrapping up the survey that we were doing on content moderation and how it impacts sex workers and activists who are talking about Black Lives Matter over the last few months. And like, we’re definitely noticing themes of speech being chilled, just like we did with our research on FOSTAโ€‘SESTA, as well as the impact of, like, platform policing on both social media and financial technologies has just about doubled for people who do both sex work and are vocally protesting or identify as activists. Andโ€ฆ The numbers are justโ€ฆ very intense.

So like, I thinkโ€ฆ Being mindful about how we communicate, rather than not communicating, is a form of harm reduction and community care. And I also see that this โ€‘โ€‘ this panel as a form of harm reduction and community care, and this in partnership with our digital literacy training. Because I do believe that the more that we know, the more we’re able to engage meaningfully when legislation like this comes up. Andโ€ฆ Likeโ€ฆ A lot of these laws aren’t meant to be โ€‘โ€‘ aren’t written to be read by the communities that they impact, and they’re often intentionally written to be unintelligible to the communities that they impact, and think that they can just like get them signed into law without โ€‘โ€‘ without having to check in with the communities that are harmed by this legislation.

So I think that anything that we can do to better understand this and decrease that gap between the people who are writing this legislation, or the, like, tech lawyers who are opposing this legislation, and like bringing in our own lived experiences? Is incredibly important work.

KENDRA ALBERT: I also โ€‘โ€‘ well, I know we want to โ€‘โ€‘ well, I’ll stop. Blunt, you want to do Q&A?

DANIELLE BLUNT: Sure, we can do Q&A. If you had one thing to add, that’s fine.

KENDRA ALBERT: So one thought I had there is, one, it’s totally right? But it can feel like oh, my god, there’s so much? That’s one of the hard things with talking about surveillance. It’s like, yeah! You know, police and law enforcement have so many tools in their law enforcement, andโ€ฆ You know? But at the same time, like, our โ€‘โ€‘ we care for each other by, like, creating space to talk about what makes us feel safer, and how can we make โ€‘โ€‘ take risks that we all agree to be taking? Right? Riskโ€‘aware consensual nonโ€‘encrypted information.

DANIELLE BLUNT: I love that! (Laughing)

KENDRA ALBERT: It rolls just right off the tongue.
But I think I want to highlight what Yves was saying, in terms of the problem is policing? And I think one of the โ€‘โ€‘ and Korica also said the same thing, so, you know. What we’re all saying, in terms of the problem being policing, and the solution not just being like finding more ways to like slightly narrow the surveillance tools? I think one of the real problems around surveillance, sort of surveillance debates generally, and I say this as somebody who comes out of a technology law tradition, is that they are โ€‘โ€‘ the folks who are doing work on like sort of highโ€‘level surveillance tools, like things like the sneakโ€‘andโ€‘peek warrants or Section 215 of the Patriot Act, are often deeply disconnected from the communities who are most likely to be harmed once these surveillance tools are widely used. Right? Like, just like with the technology laws, right, there is this way in which, you know, the conversation around like mass surveillance is up here, and we’re supposed to be afraid of mass surveillance, because mass surveillance means surveillance of white folks like me and not communities of color. Right? But at the same time, like, thatโ€ฆ So much of the rhetoric relies on like the idea that it’s okay to surveil some folks, but it’s not okay to surveil others. And part of how we fight back is by deconstructing the notion that it’s okay to do this โ€‘โ€‘ to use these tools on anybody. That like, you know, it doesn’t โ€‘โ€‘ it’s not actually like, oh, there’s a bad enough set of crimes to make this okay. Right? And that’s part of โ€‘โ€‘ part of it is not getting sucked into the sort of like whirlpool of like, well, you know, is terrorism worse than human trafficking? Well, if terrorism isn’t worse than โ€‘โ€‘ if they’re both equally bad, then we need to have the same tools to prosecute human trafficking as we do to terrorism. And here we are where they’re getting a sneakโ€‘andโ€‘peek warrant to go into a massage parlor in Florida.

And I don’t say that flippantly, because those are real folks’ lives, just like there are real folks’ lives impacted by surveillance of supposed terrorist communities. Looking at all of the mosques in New York and Detroit, where folks were under persistent surveillance after 9/11.

So I think part of what we do is we resist the idea that it’s okay if this happens to other people. Because, you know, that’s howโ€ฆ That’s how the tools get built that will, like, eventually be used against all of us.that was what I wanted to say. I’ll stop there.

DANIELLE BLUNT: Thank you, Kendra. Okay. We’re going to open it up for Q&A. Someone asked if we could touch on the recent encryption legislation and how protected we are using services like Signal, WhatsApp, and Telegram.

KENDRA ALBERT: I can take that, and then if Lorelei and Blunt, if you want to jump in if I screw it up.

So, you know, EARN IT was one of the sort of pieces of legislation that was kind of proposed toโ€ฆ make it sort of โ€‘โ€‘ I don’t want to say “end” encryption, but would have had the practical effect of making encryption, encrypted services more difficult to sort of produce. The other is the LAPD I think laid โ€‘โ€‘ that’s probably not how people have been pronouncing it. But.
(Laughter)
The โ€‘โ€‘ that bill is way worse. I do not think it’s going to pass. It sort of allโ€‘out tries to ban encryption.

EARN IT actually, sort of between the initial proposal and the version of the bill we’re currently on, got much better on encryption? So now it specifically says that, you know, using encryption won’t โ€‘โ€‘ like, isn’t supposed to be able to be used against a service. Like, for purposes of figuring out whether they’re liable for child exploitation material. It’s really โ€‘โ€‘ it turns out that that construction is not just complicated when I say it, but very complicated in the bill, and might do less.
In terms of what the impact is gonna be on like Signal, WhatsApp, and Telegram โ€‘โ€‘ you know, what I’m hearing in this question is sort of endโ€‘toโ€‘end encrypted services, where the service provider doesn’t have access to your communications? You know, I think that it would be unlikely โ€‘โ€‘ if โ€‘โ€‘ if, God forbid, EARN IT as currently existing passes, I think it would be unlikely to sort of result in Signal or WhatsApp going away. In fact, actually, some advocates are currently โ€‘โ€‘ like Miles Nick in particular โ€‘โ€‘ are arguing that the current internet construction earn best of your knowledges encryption? I’m a little more skeptical about that than he is. Happy to sort of โ€‘โ€‘ you know, at me on Twitter if you want to talk about that.

But I don’t โ€‘โ€‘ those services are not going away under the current version of EARN IT. However, the Justice Department has been trying to sort of get back doors into encrypted services for a long time, and they’re not going to stop. So it’s sort of aโ€ฆ nothing to watch for right now, but stay vigilant on that front.

YVES: I just wanted to generally say, right, like I thinkโ€ฆ Like, if the question’s kind of getting at like in your personal life, like, how โ€‘โ€‘ what’s the danger, or like if you’re doing some kind of criminalized work, or something that you are afraid of like the police getting information of, right? Like, it’s not gonna do your harm to use an endโ€‘toโ€‘end encryption service, like iMessage, like WhatsApp, like Signal, like Telegram. Right? But it’s not something that’s gonna protect you wholly? But also should note that, you know, the like the person asking this question is like an organizer or a whore, like, you know. So like, when โ€‘โ€‘ most of the time, when this information gets in the hands of police from like your texts or things like that, it’s not because they’ve like hacked the system. It’s not like something like that. It’s usually because someone you’ve talked to has like the, the police have gotten ahold of them, they’ve given that information to them. And like, the ways like โ€‘โ€‘ I kind of talked about this in the beginning, right? When they deputize civilians, we’re not just generally โ€‘โ€‘ I literally mean there are also people who are just going to be, like, I think that there’s a sex worker at my hotel! Like, da da da da! I think there’s a sex worker in my Uber! Right? And like handing over that information.
So I don’t want people to be like, oh, I’m just like not safe anywhere. Because that’s not really what the scenario looks like in real life, when you’re like on the street and like working. Right? But they’re not, like, fully safe. It’s not like, oh, you can type anything into Signal, and it’s like Gucci.

DANIELLE BLUNT: Right. And I think, too, people can take screenshots. Oftentimes, that’s how information is shared even when you’re using encrypted channels. So I think also just being mindful about what you say, when our saying it to. If you’re using Zoom, knowing that this is going to be a publicโ€‘facing document, and we’re not currently planning any political uprisings in this meeting? So it feels okay and comfortable to be using Zoom as the platform. But likeโ€ฆ Personally, in my work, even if I’m using an encrypted platform, like, I don’t say anything that wouldโ€ฆ like, hold โ€‘โ€‘ I do my best to avoid saying things that would, like, hold up in court as evidence, in the way that I use language.

KENDRA ALBERT: Yeah. I think in the immortal words of Naomi Lauren of Whose can have corner Is It Anyway, people need to learn how to stop talking. Which it turns out is both solid advice, and what my advice is if the police want to talk to you. So, solid on many different front seat.

LORELEI LEE: I think it’s really important โ€‘โ€‘ like, I think several people have said this already, but just to really emphasize that when we’re talking about this stuff, the intention is to haveโ€ฆ you know, informed consent, you know, for lack of a better word, of using these tools. And thatโ€ฆ You know, especially if we’re talking about, we’re talking about sex working people, we’re talking about โ€‘โ€‘ Aaa! Caty Simon! (Laughing) I’m sorry, I had to interrupt myself to get excited that Caty Simon is here. Another expert on all of this stuff.

The thing I was going to say is I do think that sex workers are criminalized folks from many marginalized communities are really good already at risk assessment. Understanding what level of risk you are comfortable with. And using these tools with that in mind. And knowing that nothing โ€‘โ€‘ there are no answers! Right? There’s no, there’s no system except abolition that is going to prevent these kinds of harms from happening. Abolition of actually policing and capitalism, perhaps! So.
Oh, and the thing I was na say, which is maybe not that important, but the question I had for Kendra, is whether you think EARN IT is still part of encryption in terms of best practices and how that might inform future corporations. I’m not sure if that’s too far in the weeds?

KENDRA ALBERT: I think it could be. So one of the things we’ve been saying internal internally about EARN IT, like in Hacking//Hustling, that I want to emphasize here, is the lack of clarity of what the bill is going to do is a feature by the creators, not a problem? It’s not that we’re failing at interpretation? ‘Cause we’re not. You know. But theโ€ฆ You know, I can say all I want what I think EARN IT means with regards to Signal and Telegram, but as Lorelei pointed out one of the things EARN IT does is create this commission that creates best practices, which who the hell knows what’s going to be in there. And it’s really unclear even how the liability bits are going to shake out.

So even with a specific amendment to the current version of EARN IT that’s supposed to protect encrypted services, we don’t really know what’s going to happen. So really good point, Lorelei. Thank you.

DANIELLE BLUNT: “Other than being educated or somehow not using any technology, what can we do?” I feel like we touched on that a little bit, but if anyone wants to give a quick summary.

KENDRA ALBERT: Yeah, I mean, I think just to echo what Lorelei and yeast have already said, right. Engage in thoughtful conversations around how you’re using the technology, and be thoughtful around how you’re using it, when our sharing what with. I think for me โ€‘โ€‘ and actually, maybe this gets to the next question, which is sort of likeโ€ฆ It doesn’t matter if you don’t break the law? Or what โ€‘โ€‘ but I don’t have anything to hide! Right? You know, the way I think about this is that, like, everyone has something that law enforcement could use to, like, make your life miserable. That’s just reality. Some folks have many more things! Like. But everyone has something. And soโ€ฆ Not โ€‘โ€‘ my goal, like our goal I think here is not to sort of suggest like paranoia, they could be listening to everything. Although, you know, yes! I’m not pretty sure that there’s a legal authority to do most things that law enforcement wants to do, and like I’m not under any illusions about that. But so part of how we think about this is, you know, how do we take care of the folks around us and be thoughtful around the risks that we’re taking and make sure that we’re taking risks that are aligned with our values and the things we need to do? Right? And those are gonna look different for everybody. But I welcome thoughts from other folks on the panel, ’cause I think I’ve said enough.

LORELEI LEE: I think I’d like to add something, which is that oftentimes when we talk about this stuff, we talk about it in terms of personal risk as though risk belongs to us alone, when I think it’s really important to recognize the communities that you’re interacting with and the people that you’re interacting with and to understand that even if you feel as though law enforcement won’t do anything to you, you’re not a likely target, it’s highly likely that there are people in your life who are likelier targets, and your refusal to talk to law enforcement, or your care around how you communicate with folks, is protective of the people around you and the people that you care about who you might not even know what their levels of risk are.

And then the other thing I want to add in terms of things to do is that to think about how โ€‘โ€‘ what, what actions you’re capable of to oppose the passage of antiโ€‘encryption laws, to oppose the passage of laws that target sex working people and people of color and people in marginalized communities, and to think about if you feel as though you have a lower level of risk of being targeted by law enforcement, that means that you have a greater capability for maybe going out and protesting! I have to tell you, I know a lot of criminalized people who do not feel safe protesting on the street, do not feel safe talking on unโ€‘encrypted platforms, don’t feel safe talking on panels like this. And if you feel safe doing those things, then it’s your responsibility to do those things. So.

YVES: I mean, I don’t know if you were going to ask the next question, but like Lorelei and Kendra kind of talked about it a bit. I kind of just want to say if someone asks you, or like, it doesn’t matter if you don’t break the law, that’s not really a part of the issue, right? Like, laws, crimes, the things that we define as crimes are entirely arbitrary. Right? So who gets arrested, who gets criminalized, all of these things areโ€ฆ just simply based on who, like, the system is against. Which we know that that means Black, Indigenous, people of color, especially trans people, any gender nonโ€‘con forge โ€‘โ€‘ gender nonconforming people, sex working people, anything that is outside the scope of what white supremacist culture would consider to be a good and appropriate person! Right?

So it’s not really about breaking laws. Or, you shouldn’t be afraid of anything if you haven’t done anything. Because it doesn’t matter. They’re going to criminalize people regardless of that. Right? They’re going to incarcerate people regardless of that. Like, all of these things are a death sentence to marginalized folks, which is why we kind of talk about it in this way. It’s not about, like โ€‘โ€‘ well, I mean, it is about like surveillance is bad? It’s infringing on rights of people, right? But it’s also about the fact that surveillance is just like a tool that is used for policing, for incarceration, in order to just disappear whomever. Right?

So, when talking about that, surveillance is bad for that reason. For the reason, like, I talked about a little bit with contact tracing, right? That, in theory, should be a good thing. Should mean that we are keeping people safe. Should mean that people aren’t getting COVID, or are getting treated for COVID, are getting treated for HIV/AIDS. But we know that in a world where we have policing, that is simply not what happens! Right? It’s not a case of, will they use it? They will. They will use it, they will criminalize it, they will arrest people. So we want to get rid of it. Wholesale.

DANIELLE BLUNT: Yeah. And I think, too, when you talk about contact tracing in that capacity, I can’t help but think about the ways that data is scraped from escort ads to facilitate the deโ€‘platforming across social media and financial technologies of sex workers and other marginalized communities, as well as activists. So I think both on the streets and on the platforms, likeโ€ฆ This is not being used for good? And that it needs to end.

Okay. I’m gonna try and get one or two more questions in. Someone asked, do you think that EARN IT is going to be passed?

(all shrugging)

I think that’s our official comment!

KENDRA ALBERT: Yeah, for anyone that’s not watching the video or is not able to watch the video, there is just a lot of shrugging.

DANIELLE BLUNT: Yeah. But if you keep following Hacking//Hustling, we’ll keep talking about EARN IT and updates when they come, so. If you want to follow @hackinghustling on Twitter, that’s usually where our most up to date shit is.
Someone said, hypothetically, if someone wants to be a lawyer and is studying the LSAT and hoping to apply in the fall, should they not post publicly about these things or attend protests where you could be arrested?

KENDRA ALBERT: I can take that one. So, you can absolutely post publicly about these things. So the thing to worry about here is that theโ€ฆ like, for lawyers, is this thing called character and fitness, which is basically if you want to practice as a lawyer after you go to law school, you have to get admitted to one of the state bars, and state bars have particularly requirements. I actually don’t know a ton about how those interact with, like, a past history of sex work? But the sort of watch word in terms of thinking about character and fitness is honesty, generally speaking. Like, the goal โ€‘โ€‘ folks generally โ€‘โ€‘ pretty much most things are overcomeable through character and fitness, if you explain sort of what happened. So getting arrested at a protest, like, that’s โ€‘โ€‘ you can totally still pass the bar and become a lawyer through that. Absolutely posting publicly about like abolition or sex work or, you know, those kinds of things.

You know, where I would start to sort of think about whether you want to talk to someone who has more experience about this than me is, um, if you have felonies on your word, or if you are sort of worried that you have any behavior that folks might use, might believe makes you less honest. So things like fraud convictions often come up. But I’ll stop there.

DANIELLE BLUNT: Awesome. And then I think this will be our last question, as we’re just at time. Any books recommendations along with Dark Matters: On The Surveillance of Blackness by Simone Browne? So sounds like folks are interested and want to learn more.

KENDRA ALBERT: This isn’t a book, but Alvaro Bedoya recently wrote a piece on The Color of Surveillance. It’s really amazing. So I recommend that.

DANIELLE BLUNT: Will you tweet that out? If folks say things, will you tweet them?

KENDRA ALBERT: Yeah.

KORICA SIMON: I have a few books that I’ve ordered and I need to read, before the summer is over? Black Software: The Internet & Racial Justice, from the Afronet to Black Lives Matter. It’s talking about how technology canโ€ฆ Oh. Digital racial justice activism is the new civil rights movement. There’s Automating Inequality: How Highโ€‘Tech Tools Profile, Police, and Punish the Poor. Have you read that?

KENDRA ALBERT: It’s really good. I really recommend Automating Inequality.

KORICA SIMON: The last one is Race After Technology: Abolitionist Tools for the New Jim Code.

LORELEI LEE: I think I would add The Age of Surveillance Capitalism, which talks a little bit about the history of the development of some of these data collection tools.

DANIELLE BLUNT: Yves, did you have one you were saying or typing?

YVES: I mean, I would recommend there’s The Trials of Nina McCall, which is about sex work surveillance, and I think it’s the decadesโ€‘long government plan to imprison promiscuous women. I would also recommend, if you’re interested in learning more about how public health is weaponized as surveillance against marginalized communities, Dorothy Roberts writes a lot of stuff about this. So, yeah.

DANIELLE BLUNT: And โ€‘โ€‘ that’s a beautiful place to end. Thank you, Lorelei, for sharing that. I feel like โ€‘โ€‘ (Laughs) We’re all โ€‘โ€‘ everyone’s crying. I’m crying. Speaking for everyone. (Laughs) If people want to be found online, or if you want to like lift up the work of the organizations that you work with, can you just shout out the @?

KENDRA ALBERT: @HackinHustling. It’s really great!

YVES: You’re fine. @redcanarysong, and @SurvivePunishNY.

DANIELLE BLUNT: Well, we are slightly overtime. Thank you so much to our panelists, and Cory, our transcriber, for sticking with us. I’m going to stop the livestream now, and stop the recording.

Panelists

Lorelei Lee (they/them)is a sex worker activist, writer, recent law school graduate, and 2020 Justice Catalyst Fellow. Their adult film work has been nominated for multiple AVN awards and won a 2015 XRCO award. Their essays, fiction, and poetry have been published or are forthcoming in The Establishment, Denver Quarterly, $pread Magazine, Salon, Buzzfeed, n+1, WIRED, The Believer, and elsewhere. They are a contributor to the anthologies Coming Out Like a Porn Star, The Feminist Porn Book, Hustling Verse, and others. They were a founding member of Survivors Against SESTA, are a researcher and analyst with Hacking//Hustling, and serve on the steering committee of Red Canary Song.

Yves (they/she) is a queer and disabled Viet cultural worker and sex worker whose organizing home is with Survived & Punished NY, Red Canary Song, and currently FTA4PH. Yves comes from a background in Rhetoric and focuses on the study of collective and public memory and uses it as a framework for their work in art and organizing for prison/police abolition and the decriminalization of sex work.

Kendra Albert (they/them) is a clinical instructor at the Harvard Cyberlaw Clinic at the Berkman Klein Center for Internet and Society, where they teach students how to practice technology law by working with pro bono clients. They also have held an appointment as a lecturer, teaching classroom courses on the First Amendment as well as transgender law. Kendra holds a B.H.A from Carnegie Mellon University and a J.D. from Harvard Law School. They previously served on the board of Double Union, a feminist hackerspace in San Francisco and run a side business teaching people how to use their power to stand in solidarity with those who are marginalized. Kendraโ€™s research interests are broad, spanning constitutional law, queer theory, video games, and computer security. Their work has been published in Logic, WIRED, and the Greenbag, and covered in The New York Times.

Korica Simon (she/her) is a third year law student at Cornell University and a fellow for the Initiative for a Representative First Amendment through Harvardโ€™s Cyberlaw Clinic. This past year, she worked as a graduate teaching assistant for an information science course at Cornell called Information Ethics, Law, and Policy, where she taught a course around the ethics of up and coming technology and engaged with students on how the law should respond to these innovations. In addition, she has had the pleasure of working on sex worker rights issues through an internship at Legal Voice in Seattle and through the Cornell Gender Justice Clinic. After graduation, sheโ€™s hoping to become a privacy lawyer focusing on freedom of expression issues that marginalized communities face in the age of technological surveillance.

EARN IT Act – Harm Reduction Guide

With the EARN IT Act on the horizon we want to build power and community care. We compiled this quick harm reduction guide of things you can do right now to take care of yourselves and each other!

As we organize around our opposition to EARN IT, here are a few things harm reduction tips that you can do right now to stay connected and make sure you donโ€™t lose important information and community.

  1. Remember- We donโ€™t all trade sex under the same circumstances and not all of us have access to the same online tools. Not all of this may be applicable to you or how you work, so please take whatever is useful, ignore the rest and take care of each other!
  2. Social media is not a stable platform for sex workers. We are shadowbanned and loose accounts at a significantly higher rate than our peers. Having multiple ways to stay in touch with clients and community can help in the event of losing an account.
  3. It is important to stay connected! Start collecting e-mail addresses and build a mailing list. Having a list of how to get in touch with clients and community is helpful in case you lose access to your social media accounts.
  4. Back your shit up! Download backups of everything! You can archive your social media posts, google drive docs, website text, and images. Keep multiple backups if you can, including a hard drive.
  5. Direct clients to your e-mail! Ask clients what the best way to stay in touch is. Make sure your favorite clients know how to get in touch with you too!
  6. If your sex work account is deleted it’s not your fault!

Want to know more about why we oppose the EARN IT Act? Click here.

(These harm reduction tips, in response to the EARN IT Act, are visualized below on 7 tiles of light pink, blue and yellow background with the graphic of a web browser and a teal bar on the bottom with a heart on it)

Digital Literacy Training (Part 3) with Olivia McKayla Ross (@cyberdoula) and Ingrid Burrington (@lifewinning)

Platform Surveillance Digital Literacy Training

https://youtu.be/CDulMNrc6ig

INGRID: So today, we were gonna talk about platform surveillance. Andโ€ฆ There’s, in general, what we’re kind of focused on is both ways that platforms surveil and forms of state surveillance that utilize platforms.

So, this is sort of a outline of where we’re going today. First, kind of doing a little bit of clarifying some terms that we’re gonna use. Those two different kind of terms being state surveillance and surveillance capitalism. And then we’ll talk a little bit about mitigation strategies, with both.

What is surveillance capitalism?

So, clarifying some terms. We โ€‘โ€‘ we wanted to kind of make sure we were clear about what we were talking about. So surveillance capitalism is a term used to describe sort of a system of capitalism reliant on the monetization of personal data, generally collected by people doing things online.

What is state surveillance?

State surveillance is a tactic used by governments to intimidate and attack. It can be digital? It can also be IRL. For many years, it was just people following people, or decoding paper messages. It’s more sophisticated now, but it takes many different forms.

And surveillance capitalism kind of emerges in part because of the demands of state surveillance. So in the early 2000s, after 9/11, the existence of a military industrial complex that had funded the development of surveillance technologies was already well established, but was amped up in some ways by the demands of the global war on terror. And there areโ€ฆ you know, deep interconnections between the history of the Silicon Valley and the history of the military industrial complex.

The state will utilize the resources of surveillance capitalism. But we wanted to make it clear, like, surveillance capitalism’s negative impacts and risk to personal safety are not solely confined to state violence. They can perpetuate interpersonal violence; they can, you know, create greater harms for your ability to kind of, like, find a place to live, or change your mobility. And those are โ€‘โ€‘ you know, those two distinctions, we just wanted to kind of clarify as we go into this.

And I feel โ€‘โ€‘ like, part of me wants to believe this is kind of already taken as a given, but it’s good to kind of have it said: Neither surveillance capitalism nor state surveillance exist independent of racism and the legacy of the transatlantic slave trade. Sometimes โ€‘โ€‘ I found when I first started getting into this space, in 2012, 2013, that was kind of an angle that was kind of neglected. But you don’t have an Industrial Revolution without transatlantic slave trade, and you don’t have surveillance without the, you know, need to monitor people who are considered, you know โ€‘โ€‘ property, basically. I would highly recommend Simone Browne’s Dark Matters as an introduction to the role of Blackness in surveillance. But, yeah. Just wanted to raise that up, and be really honest about who is affected by these systems the most.

Andโ€ฆ Also wanted to reiterate something that we said in the first day of this series, which is, nothing is completely secureโ€ฆ and that’s okay. We’re learning how to manage risk instead. Right? The only way to be completely safe on the internet is to not be on the internet. Connection is, you know, involves vulnerability by default. Andโ€ฆ The work that we’re trying to all do is find ways to create space. To mitigate or, like, understand the risks that we’re taking, rather than just assuming everything’s a threat and closing off. Or saying, well, I’m doomed anyway; doesn’t matter.

What is threat modeling?

In the world of security studies and learning about, you know, building a security โ€‘โ€‘ like, a way of thinking about keeping yourself safe, a term that comes from that space is threat modeling. Which is a practice of basically assessing your potential vulnerabilities with regard to surveillance. We’re not going to be doing threat modeling, per se, in this presentation. There are some really great resources out there that exist on how to do that that we can โ€‘โ€‘ we’re happy to point you to. But we wanted to raise it up as something that can help in approaching managing risk and mitigation, because it’s sort of inventorying your own, you know, circumstances and understanding where you are and aren’t at risk, which can make it a little less overwhelming.

All right. So the concept of state surveillance, for this presentation, we’re going to be talking about it on and using platforms, which we talked about yesterday. There’s all kinds of other ways? (Laughs) That, you know โ€‘โ€‘ as I said earlier, that the state can engage in surveillance. We’re, right this second, just gonna focus on platforms. We might be โ€‘โ€‘ if there are questions specifically about nonโ€‘platform things, maybe in the Q&A part, we could talk about those, if there’s time.

What are platforms and why do they matter?

So, platforms are companies. I think we’ve said this a lot over the last three days. And what that generally means is that platforms have to, and will, comply with requests from law enforcement from user data. They don’t have to tell anyone that that happens. They do, some of the companies; some big companies do. These are from โ€‘โ€‘ the one on the top is Twitter’s annual transparency report, and the one below is Facebook’s. And these are just graphs that their โ€‘โ€‘ digitalizations they made about government requests for user data. And โ€‘โ€‘ but again, this is almost a courtesy? This is like something that’s kind of done maybe for the brand, not necessarily because they have any obligation. Butโ€ฆ It’s also just a reminder, like, there’s โ€‘โ€‘ they can’t actually necessarily say no to, like, a warrant. This also applies to internet service providers, like Verizon; mobile data providers; hosting services. Like, companies have to do what the law tells them, and most of the internet is run by companies.

Next slideโ€ฆ So, companies don’t actually โ€‘โ€‘ but governments don’t really always have to ask platforms to share like private data, if there’s sort of enough publicly available material to draw from. The method of using sort of publicly accessible data from, you know, online sources is sometimes called open source investigations, in that the method is reproducible and the data is publicly available. When Backpage still existed, that was more or less how cops would use it to conduct raids. One older example of this is in 2014, the New York Police Department conducted a massive raid on public housing project Harlem to arrest suspected gang members. It was called โ€‘โ€‘ oh, shoot. It had like some terrible name… Operation Crew Cut. That’s what it was called. (Laughs) And much of the evidence used in the raid was culled, basically, from cops lurking on social media, interpreting slang and inside jokes between teenage boys as gang coordination. Some of the young men โ€‘โ€‘ I think they were as young as 16 and as old as 23 โ€‘โ€‘ who were caught in that raid are still serving sentences. Some of them were able to challenge the case and be let out, but they still โ€‘โ€‘ it was a pretty terrible process.

A more recent example of sort of police using publicly available data is this one on the left in June. This woman in this photo was charged with allegedly setting a Philadelphia police vehicle on fire. And the police were able to figure out who she was, based on a tattoo visible in this photo โ€‘โ€‘ which you can’t really see in this image because it’s quite small; I couldn’t get a bigger one. Based on a Tโ€‘shirt she had previously bought from an Etsy store, and previous amateur modeling work on Instagram. So, you know, maybe only a handful of people had bought that one Etsy shirt. And they were ability to kind of figure out and match her to these other images than online out in the public.

What is open source investigation and why does it matter?

I want to note briefly that open source investigation, or digital investigation using publicly available resources, isn’t inherently a bad thing or technique. It’s research. Activists and journalists use it to identify misinformation campaigns and human rights violations when it’s not safe for them to be on the ground. I’ve used it in my own work. But you know, the point is don’t make it easier for the police to do their job.

What is metadata and why does it matter?

The next slideโ€ฆ is another source of information that can be pulled from publicly available sites, besides just sort of reading the material and the images, is metadata. And “metadata” is sort of just a fancy word for data about data. If โ€‘โ€‘ one way that sometimes this gets described is like, if you have like a piece of physical mail, the letter is sort of like the data, but who it’s โ€‘โ€‘ the envelope, so who it’s mailed to, where it was mailed from, things like that, that’s the metadata. That’s the container that has relevant information about the content.

So in an image, it’s encoded into the file with information about the photo. This is some screenshots of a photo of my dog, on my phone. (Laughs) She, she briefly interrupted the session yesterday, so I thought I’d let her be a guest in today’s presentation. And if I scroll down on my phone and look kind of further below in the Android interface, I can see that it has the day and the time that the photo was taken, and then what I’ve blocked out with that big blue square right there is a Google Maps embed that has a map of exactly where I took the picture. You can also see what kind of phone I used to take this picture. You can see where the image is stored in my folder. You can see how big the image file is. These are examples of, like, metadata. That, combined with things like actual information in the data, like the actual information in the image, like a Tโ€‘shirt or a tattoo, all of that is like really useful for law enforcement. And metadata is something that is stored โ€‘โ€‘ if you use like Instagram’s API to access photos, you can get metadata like this from the app.

Is it possible to remove metadata from your phone’s camera?

OLIVIA: So, surveillance capitalism! Really big โ€‘โ€‘ oh, there’s a Q&A. Is it possible to remove metadata from your phone’s camera?

INGRID: So there’s two things that you can do. One is โ€‘โ€‘ I think that you can, in your settings, like you can disable location? Being stored on the photos? Depending, I think, on the make and model. Another thing, if you’re concerned about the โ€‘โ€‘ you know, detailed metadataโ€ฆ you can โ€‘โ€‘ like, taking a screenshot of the image on your phone is not gonna store the location that the screenshot was taken. It’s not gonna store โ€‘โ€‘ like, it might โ€‘โ€‘ I think that the screenshot data might store, like, what kind of device the screenshot was taken on. But given โ€‘โ€‘ but that doesn’t necessarily narrow it down in a world of mostly iPhones and, you know, Samsung devices and Android devices. Like, it could be โ€‘โ€‘ it’s like a bit less granular. Yeah.

OLIVIA: Awesome.

Surveillance Capitalism: How It Works and Why It Matters

So, surveillance capitalism! I don’t know if you guys noticeโ€ฆ I’ve been seeing them a lot more often. But some advertisements in between YouTube videos are just kind of like multiple choice questions? Some of them ask how old you are; some of them might ask if you’ve graduated from school yet; et cetera. So like, in what world is a singleโ€‘question survey a replacement for, say, a 30โ€‘second advertisement for Old Spice deodorant?

Our world! Specifically, our world under surveillance capitalism. So, to go further on Ingrid’s initial definition, surveillance capitalism occurs when our data is the commodity for sale on the market. And usually, almost always created and captured through companies who provide online service โ€‘โ€‘ free online services, like Facebook, Google, YouTube, et cetera.

We can’t really know for sure how much our data is worth? There’s no industry standard. Because, at the end of the day, information that’s valuable for one company could be completely useless for another company. But we do know that Facebook makes about $30 every quarter off of each individual user.

What are data brokers and why do they matter?

But social media sites aren’t the only ones with business models designed around selling information. We also have data brokers. And data brokersโ€ฆ If we go back to the private investigator example that we saw in the state surveillance section, thinking about the tools at their disposal, the level of openness that you have online, they could find out a lot of things about you. Like where you’ve lived, your habits, what you spend money on, who your family members and romantic partners are, your political alignments, your health status, et cetera. That’s like one person.

But imagine that rather than searching through your data and piecing together a story themselves, they actually just had access to a giant vacuum cleaner and were able to hoover up the entire internet instead. That is kind of what a data broker is!

I made up this tiny case study for Exact Data. They’re a data broker, and they’re in Chicago.

And Exact Data has profiles of about 20 โ€‘โ€‘ not twenty. 240 million individuals. And they have about 700 elements associated with each of them. So some of the questions that you could answer, if you looked at a stranger’s profile through Exact Data, would be their name, their address, their ethnicity, their level of education, if they have grandkids or not, if they like woodworking. So it goes from basic data to your interests and what you spend time on.

So, potential for harm. You get lumped in algorithmically with a group or demographic when you would prefer to be anonymous. Your profile may appear in algorithmic recommendations because of traits about yourself you normally keep private. The advertisements you see might be reminders of previous habits that could be triggering to see now. And it’s also a gateway for local authorities to obtain extremely detailed information about you. I don’t know if Ingrid has any other points that might be potential for harm.

How to Mitigate Harm

But, luckily, there are ways to mitigate. Right? You can opt out of this. Even though it’s pretty hard? But if you remember from our first workshop where we talked about how websites collect data from us, we know that it’s captured mostly using scripts: trackers, cookies, et cetera. So you can use a script blocker! Also, reading the terms of service, it will probably mention the type of data an online service collects and what it’s for. They don’t always, but a lot of them do. So if you read it, you’re able to have a bit more agency over when you agree to use that service or not, and you might be able to look for alternatives that have different terms of service.

Privacy laws in the United States are pretty relaxed when it comes to forcing companies to report things. So, one tip is also to try setting your VPN location to a country that has stronger privacy laws. And then you might get a lot more banners about cookies and other trackers that they’re required to tell you if you live somewhere else that’s not here.

You can also contact data brokers and ask to be put on their internal suppression list. And a lot of brokers have forms you can fill out online requesting that. But the only issue is that this is really hard? Because there are a lot of data broker companies, and we don’t actually know how many more there are, because this is an industry that’s pretty unregulated.

Another mitigation strategy is creating, essentially, a digital alter ego that’s difficult to trace to your other online accounts. So if you are behaving in a way that you don’t want to be conflated algorithmically with the rest of your life, you can create separate online profiles using different eโ€‘mail addresses, potentially using them in other places, and just creating as much distance between you and one aspect of your life and you in the other aspect of your life, and compartmentalizing in a way that makes it difficult to connect the two of you.

And then of course you can use encrypted apps that don’t store metadata or actual data. This could include messaging apps, but this could also includeโ€ฆ word processors like CryptPad; it could include video conferencing; it could include a lot of different apps.

So, to wrap everything up: Over the past three daysโ€ฆ

Wrapping Up the Digital Literacy Series

INGRID: So, I guess we wanted to kind of try and provide some wrap up, because we covered a lot of things in three days. And that was, like, a very broad version of a very, like, deep and complicated subject. But we sort of โ€‘โ€‘ you know. We went through, you know, the foundational kind of depths of the internet, how it’s, you know, made, what’s like the actual kind of technical aspects of how it works. The platforms that, you know, are built atop that foundation that extract value out of it. And systems of power that incentivize those platforms to exist and control and govern kind of how some of that value is used โ€‘โ€‘ (Laughs) Or misused.

And I guess across all three of these, I had a couple of, like, kind of bigger questions or things to think about that I wanted to kind of put forward. One is sort of, like, I think in some ways the neoliberal public/private structure of the internet as a โ€‘โ€‘ as an infrastructure that everyone lives withโ€ฆ like, they’re โ€‘โ€‘ like, you โ€‘โ€‘ it’s โ€‘โ€‘ it shapes the way that, like, everything else kind of follows. Right? When aโ€ฆ when something that was originally sort of like a governmentโ€‘built property becomes a commodity that becomes the foundation of how anyone kind of can like live in the world, it creates kind of a lot of these aftereffects.

And I think โ€‘โ€‘ I find internet history always really fascinating, because it’s a reminder that a lot of this is very contingent, and it could have gone different ways. Sometimes, people wanted it to go a different way? And thinking about what it looks like to build different networks, build different services and structures. And, you know, while living within surveillance capitalism. ‘Cause we haven’t built different internets and different structures quite yet. Our surveillance capitalism’s still pretty big. A big part of taking care of one another and ourselves isโ€ฆ taking care with where and how we speak and act online. Which is different from being afraid to say things? And more being kind of competent in where and how you, like, choose to speak, to protect yourself and to protect people you care about.

I thinkโ€ฆ that’s โ€‘โ€‘ yeah, that went by really fast! (Laughs)

BLUNT: We’ll just shower you with questions. (Laughs)

How are companies making money off of data?

I have two questions in the chat. Someone says: How is it exactly that companies make money off of our data? Is it just through ads? Are there other processes?

OLIVIA: So, when it comes to making money off of it, sometimesโ€ฆ let’s say you’re a company that sellsโ€ฆ let’s say you’re a company that sells headphones. And you are tracking data of the people who are using your headphones. They buy them, and then in order to use them, they have to download an app into their phone. Right? Through that app, they might record things like the songs you listen to, what time of day you listen to them, how long you’re using the app, where you are when you’re listening to itโ€ฆ And they might have this, like, select little package of data about you.

Now, they might find that that’s data that, like, a musicโ€ฆ campaign โ€‘โ€‘ the people who like do advertisement for musicians, I guess? I don’t remember what that job’s called. But it’s more like the idea that different companies collect data that’s useful for other companies in their… in their marketing practices, or in their business practices.

So Facebook collects data that a lot of different companies might want for a myriad of reasons, because the amount of data Facebook kind of siphons from people is so large. And so โ€‘โ€‘ yeah, does thatโ€ฆ? Do any of you guys have something to say around that, about other ways that companies might โ€‘โ€‘

INGRID: Yeah. I mean, a lot of it bottoms out in ads and market research.

OLIVIA: Yeah.

INGRID: There โ€‘โ€‘ I mean, another, another place where โ€‘โ€‘ I don’t think, it’s not the most lucrative source of revenue, I think? In so far as, it’s not the biggest buyer? But like, police departments will buy from data brokers. That’s some โ€‘โ€‘ and that’s, there’s no real regulation on whether or when they do that.

So. Like, you know, it’s โ€‘โ€‘ just, information in general is valuable. (Laughs) So, it’s โ€‘โ€‘ it’s not โ€‘โ€‘ like, I think the โ€‘โ€‘ and I mean, ironically, I think what’s kind of so fascinating to me about the model of surveillance capitalism is that, like, ads don’t work. Or like, they kinda work, but like. They don’tโ€ฆ In terms of โ€‘โ€‘ like, in terms of actually proving that, like, after I look at a pair of glasses once, and then I’m followed around on the internet by the same pair of glasses for like two and a half months, likeโ€ฆ The actual success rate that I actually bought the glasses, I don’t think is that high? But there is just enough faith in the idea of it that it continues to make lots and lots of money. It’s like, very speculative.

OLIVIA: I actually saw a article recently that saidโ€ฆ instead of advertising โ€‘โ€‘ like, say like we all paid for, like, an adโ€‘free internet? It would cost about like $35 a month, for each of us. In terms of, like, being able to maintain, like, internet infrastructure and pay for things, without having advertisements.

If you have an alter ego for privacy, how can you ensure it remains separate? Is facial recognition something to worry about?

OLIVIA: “If you have an alter ego account and a personal account, how do you ensure your online accounts stay completely compartmentalized and aren’t associated through your device or IP address, et cetera?” And then they say, “Is there a way to protect your face from being collected on facial recognition if you post pictures on both accounts?”

INGRID: Yeah. So we didn’t โ€‘โ€‘ we didn’t talk about facial recognition. And I โ€‘โ€‘ I kind of โ€‘โ€‘ I kind of falsely assumed that that’s โ€‘โ€‘ it’s been so heavily talked about in the news that maybe it was sort of the thing people were kind of โ€‘โ€‘ not โ€‘โ€‘ but I also didn’t want to overemphasize that as a risk, because there’s so much information beyond a face that can be used when trying to identify people?

In terms of if you’re posting pictures on two different accountsโ€ฆ I don’t โ€‘โ€‘ like โ€‘โ€‘ I mean, if they’re similar photos, I don’t think โ€‘โ€‘ I think the answer is, like, your face will be captured no matter, like, what? That’s sort of a piece of it. I don’t know. Olivia, can you think of any examples of, like, mitigate โ€‘โ€‘ like, mitigation of face recognition, beyond like โ€‘โ€‘ I mean, Dazzle doesn’t really work anymore. But like, in the same way that like people will avoid copyright, like, bots catching them on YouTube, by like changing the cropping, or subtly altering like a video file?

BLUNT: I just dropped a link. Have you seen this? It’s from the Sand Lab in Chicago, called the Fawkes Tool, and it like slightly alters the pixels so that it’s unrecognizable to facial recognition technologies. I’m still sort of looking into it, but I think it’s an interesting thing to think about when we’re thinking about uploading photos to, like, escort ads or something like that.

OLIVIA: I think that’s difficult when it comes to, like, facial recognition, is because depending on like who the other actor is, they have access to like a different level of technology. Like, the consumerโ€‘facing facial recognition software, like the stuff that’s in Instagram face filters, and like the stuff that’s on your Photobooth app on your laptop, it’s really different from the kinds of tools that like, say, the state would have at their disposal.

So it’s kind of like a differentโ€ฆ I don’t know if the word “threat model” is even a good way to phrase it, because we know that like, say, for instance, the New York Police Department definitely has tools that allow them to identify pictures of protesters with just their eyes and their eyebrows.

And so, normallyโ€ฆ if I were talking to someone who uses โ€‘โ€‘ who has, like, two different accounts and is interested in not, like, being connected to both of those accounts because of their bioโ€‘metric data, like their face, I would normally suggest that they like wear a mask that covers their whole face, honestly. Because I don’t really know of a foolproof way to avoid it, digitally, without like actively, like, destroying the file. Like, you’d have to put like an emoji โ€‘โ€‘ like, you’d have to physically โ€‘โ€‘ you’d have to physically cover your face in a way that doesn’tโ€ฆ that’s irreversible for someone else who downloads the photo to do. Because there’s a lot of tricks online when it comes to, like, changing the โ€‘โ€‘ changing the lighting, and like, putting glitter on your face, and doing a lot of different stuff?

And some of those work on consumerโ€‘facing facial recognition technology. But we don’t actually know how โ€‘โ€‘ if that even works at the state level, if that makes sense.

So depending on like, who you’re worried about tracking your accountโ€ฆ you might just want to straight up cover your face, or leave your face out of photos.

What is gait analysis and why is it important?

BLUNT: I wonder, too, do you โ€‘โ€‘ if you could talk a little bit about gait analysis, and how that’s also used? Are you familiar with that?

INGRID: I don’t โ€‘โ€‘ I don’t know enough about gait analysisโ€ฆ

OLIVIA: I know that it exists.

INGRID: Yeah. And I think โ€‘โ€‘ like, it is โ€‘โ€‘ and this is another thing where, in trying to figure out what to talk about for this session, figuring out like what are things that we actually know where the risks are, and what are things thatโ€ฆ may exist, but we, like, can’t necessarily like identify where they are?

OLIVIA: I have heard of resources for people who are interested. Like, for highโ€‘risk people who are worried about being founded via gait analysis? And gait analysis is literally being identified by the way that you walk, and the way that you move. And there are resources of people who, like, teach workshops about like, how to mess with your, like, walk in a way that makes you not recognizable. And how to, like, practice doing that.

BLUNT: It’s fascinating.

Does it matter if you use popular platforms in browsers or apps?

INGRID: “If you use popular platforms like Facebook and Instagram in browsers instead of apps, does that give you a little more control over your data, or does it not really matter?”

I โ€‘โ€‘ so, Olivia and Blunt, if you have other thoughts on this, please jump in. I mean, my position is that it kind of doesn’t matter, in so far as what โ€‘โ€‘ the things that Facebook, like, stores about you are things you do on Facebook. Like, it’s still tied to an account. Unless you’re talking about โ€‘โ€‘ so I don’t think โ€‘โ€‘ so it’s kind of whether it’s, you know โ€‘โ€‘ like, ultimately, like every โ€‘โ€‘ it’s not just likeโ€ฆ you know, passive, kind of, like trackers are happening that you could maybe use a script blocker on, and that’s cool? But things you like, and things you click on, on Facebook in the browser, are still going to be stored in a database as attached to your profile. So it doesn’t necessarily change, I think, the concerns over both of those. But.

BLUNT: I’m not totally โ€‘โ€‘ I have also heard things about having the Facebook app on your phone, that it gives Facebook access to more things. Like, the terms of service are different. I’m not totally sure about it. I don’t have it on my phone.

INGRID: That’s actually โ€‘โ€‘ that’s a good point. I apologize. I guess it also โ€‘โ€‘ it depends on what thing you’re trying โ€‘โ€‘ kind of concerned about. So, one way that โ€‘โ€‘ one thing that Facebook really likes having information on for users, individual users, is who else they might want to be Facebook friends with. Right? The like “People You May Know” feature, I once read, uses up like a very large percentage of, like, the Facebook infrastructure compute. Because connecting people to other people is really, really hard. And once โ€‘โ€‘ and like, the Facebook app being on your phone does give it kind of the opportunity to be opened up to your phone contacts, and places you take your phone. Which can expand, like, the network of people that it thinks might be, like, in your proximity, or in your social network. Because if a phone number in your phone has a Facebook account, maybe they will โ€‘โ€‘ they’ll say, like, oh, you know this person, probably!

In 2017, Kashmir Hill and Surya Mattu did a feature for Gizmodo on how it works, that was inspired by Kashmir getting recommended a friend on Facebook that was a longโ€‘lost relative, from her like father’s previous marriage or something. That there was, like, no way they would have otherwise met. And part of โ€‘โ€‘ so, her interest partly came out of trying to figure out how they could have possibly even made those connections. And Facebook wouldn’t tell them! (Laughs) Because the “People You Know” feature is also a very powerful tool that makes them, like, an app that people want to use, in theory. They also did some followโ€‘up stories about sex workers being, like, outed on their alt apps, on their like alt accounts, because the “People You May Know” feature was recommending friends who knew the sex worker from like other parts of their life the alt account. And there also were examples of, like, therapists and like mental health professionals being recommended people who were clients as Facebook friends. People who met other people in, like, you know, 12โ€‘step meetings being recommended as Facebook friends.

So there is โ€‘โ€‘ in terms of, like, app versus browser, like, Facebook won’t say whether or not some of this stuff goes into the, you know, whether or not information it gathers from mobile devices goes into its “People You May Know” recommendations. But based on examples like this, it seems likely that that plays a role.

So that doesn’t โ€‘โ€‘ I guess, in terms of control over your data, likeโ€ฆ I think I misunderstood the framing of the question, ’cause I guess it’s more โ€‘โ€‘ it gives you slightly more control over what Facebook does and doesn’t know about you. Because if Facebook doesn’t know what you’re doing with and on your phone, that’s probably like not a bad idea.

Did that all make sense, or was thatโ€ฆ? I don’t know.

How secure is Facebook Messenger? How secure is Instagram?

BLUNT: No, I think that made sense. Someone was asking about the Facebook Messenger app. I think the same thing sort of applies to that, ’cause it’s all connected. I don’t know if anyone has anything else to say about that.

INGRID: This is the part where I admit that I’m not on Facebook. So, I’m actually terrible at answering a lot of Facebook questions, because I don’tโ€ฆ

BLUNT: Yeah, I โ€‘โ€‘ I also think, like, Instagram is owned by Facebook, so also having the Instagram app on your phone, I feel like, might also bring up some of the same concerns?

INGRID: Yeah. I think it’s slightly โ€‘โ€‘ from โ€‘โ€‘ like, from what I โ€‘โ€‘ I mean, I do use Instagram, so I can remember that interface slightly better? But… Likeโ€ฆ My experience โ€‘โ€‘ like, so as far as I’ve been able โ€‘โ€‘ like. So like, as my point of comparison, I had sort of a dummy, like, lurker Facebook account, for some research a while ago. And the difference between its attempts to like connect me and suggest follows, versus Instagram’s attempts, were like โ€‘โ€‘ Facebook seemed far more aggressive and given far less information about me was able to draw connections that, like, didn’t make any sense โ€‘โ€‘ that like, were, very accurate. So, I think that’s just a good thing โ€‘โ€‘ like, it’s โ€‘โ€‘ you know. Don’t trust Instagram, because don’t trust Facebook, but. In my experience โ€‘โ€‘ like, I don’t know if it’sโ€ฆ as much a part โ€‘โ€‘ like, it’s not as central to the business model.

BLUNT: Yeah. And I think, too, just speaking from my own personal experience, like when I have had Facebook or Instagram, I use like a tertiary alias and lock the account and don’t use a face photo on the app, just so if it does recommend me to a client they’re much less likely to know that it’s me. And like, that has happened on my Instagram account. So. My personal Instagram account.

What is Palantir and why does it matter?

INGRID: Yeah. There are several followโ€‘ups, but I feel like this question “Can you explain about Palantir?” has been sitting for a while, so I want to make sure it gets answered, and then come back to this a little bit. So โ€‘โ€‘

OLIVIA: I can explain a little bit about Palantir. So, it’s kind of the devil. We have โ€‘โ€‘ I think it’s existed forโ€ฆ since, like, 2014? That might be the wrong โ€‘โ€‘ no, not โ€‘โ€‘ I think it was 2004, actually!

INGRID: Yeah, no, it’s 2004. I just โ€‘โ€‘ I accidentally stumbled into a Wall Street Journal article about them from 2009 yesterday, while researching something else, and died a little? It was like, “This company’s great! I can’t see how anything could be problematic.”

BLUNT: It’s 2003, yeah. 17 years.

OLIVIA: It was started by Peter Thiel, who is a really strong Trump supporter and is linked to this really weird, like, antiโ€‘democracy proโ€‘monarchy movement in Silicon Valley that’s, like, held by a lot of like a weird circle of rich people. And they are kind of the pioneers of predictive policing, and have also assisted ICE with tracking down and deporting immigrants. And they actually recently went public โ€‘โ€‘ hmm?

INGRID: They did? Wow!

OLIVIA: Yeah. They haven’t, like, turned a profit yet, in 17 years. But it was initially funded, if I’m getting this right, I’m pretty sure they were initially funded by like the venture capital arm of the CIA.

INGRID: Okay, they actually, they haven’t gone public yet, but they are planning for an IPOโ€ฆ

OLIVIA: Soon. Is that it?

INGRID: Yeah.

OLIVIA: Okay.

INGRID: Sorry, just โ€‘โ€‘ ’cause they โ€‘โ€‘ so, a thing about this company is that โ€‘โ€‘ like, every two years, there is a flurry of press about them maybe doing an IPO, and then they don’t. Andโ€ฆ So, I mean โ€‘โ€‘ and yeah, sorry. So they were โ€‘โ€‘ their initial funding partially came from Inโ€‘Qโ€‘Tel, which is a capital firm run by the CIA that funds companies that make products that the CIA might need. Which โ€‘โ€‘ so… Keyhole, which was a satellite imagery, like, software company, was initially funded by the CIA. And that company was later acquired by Google and became Google Earth. So just an example of the kind of things that they fund. It’s stuff like that.

OLIVIA: Oh, and to clarify, it’s like a datamining company. So they do the same kind of thing that the case study that I showed earlier does. But they have โ€‘โ€‘ they’re really good at it. And they also create tools and technologies to do more of it.

INGRID: So โ€‘โ€‘ and they’re kind of a good example of the point made at the beginning of this about surveillance capitalism and state surveillance being closely intertwined. Palantir has corporate and government contracts to do datamining services. I think they were working with Nestle for a while, and Cocaโ€‘Cola. They want to be providing as much tools to businesses as they do to ICE. And those, you know, kinds of services are seen as sort of interchangeable. (Laughs)

I mean, the funny thing to me about Palantir, too, is that โ€‘โ€‘ it’s not like they’re โ€‘โ€‘ in some ways, I feel like I’m not even sure it’s that they’re the best at what they do? It’s that they’re the best at getting contracts and making people think they’re cool at what they do?

OLIVIA: They market themselves as like a software company, but they really just have a lot of files.

INGRID: They’re kind of โ€‘โ€‘ somebody in the tech industry once described them to me as like the McKinsey of datamining? That’s a firm that โ€‘โ€‘ they work with lots of governments and corporations that do things that seem to just make everything worse, but they keep making money? (Laughs) Is the best way to describe it!

So I think, in terms of, like, explaining about Palantir, likeโ€ฆ I guess, they are a highโ€‘profile example of the kind of company that is rampant throughout the tech industry. They’ve had the most cartoonish accoutrement in so far as, you know, one of their founders is literally a vampire. And โ€‘โ€‘ you know, they took money from the CIA. And their name comes from a Lord of the Rings, like, magical seeing stone. In some ways, I think that there isโ€ฆ a level โ€‘โ€‘ like. They have โ€‘โ€‘ there have been like documented instances of them doing egregious things, such as working with the City of New Orleans Police Department to develop predictive policing tools without an actual contract, so without any oversight from the City Council, without any oversight from the Mayor’s Office, based on โ€‘โ€‘ and basically through the funding for the project coming through a private foundation. But in terms of, like, you personally in your dayโ€‘toโ€‘day life, should you worry about this specific company any more than you would worry about a specific state agency? I don’t think that’s โ€‘โ€‘ it’s going to depend on your particular risk levels, but… They’re kind of โ€‘โ€‘ they’re a tool of the state, but not necessarily themselves going to, like, come for people.

OLIVIA: Also โ€‘โ€‘

INGRID: Oh, literally a vampire? Peter Thiel is one of those people who believes in getting infusions of young people’s blood to stay healthy and young, so. As far as I’m concerned? A vampire.

What are Thorn and Spotlight?

BLUNT: I also just wanted to talk briefly about Thorn and Spotlight, ’cause I think that โ€‘โ€‘ so, Spotlight is a tool used by Thorn, which I believe Ashton Kutcher is a cofounder of? The mission of Thorn is to, quote, stop human trafficking, and what they do is use their technology to scrape escort ads and create databases of facial recognition built off of those ads. And so I think it’s just interesting to think about the relationship between these tools and how they collaborate with the police and with ICE and in a way that could potentially facilitate the deportation of migrant sex workers, as well.

INGRID: Okay. Sorry, let’s โ€‘โ€‘ (Laughs) Yes. Ashton. Fuck him.

Will deleting the Facebook or Instagram app help?

So, one question hereโ€ฆ “Deleting the Facebook or Insta app won’t help, right, because the info on you has will be been collected?” Not necessarily. I mean, there won’t be any more data collected? And I think โ€‘โ€‘ it’s true that it won’t be erased, unless you delete your account. And like, go through the steps to like actuallyโ€‘actually delete it, because they’ll trick you and be like “Just deactivate it! You can always come back!” Never come backโ€ฆ

But like, yeah. There’s โ€‘โ€‘ if it’s something that, like โ€‘โ€‘ you know. As you continue to live your life and go places, although I guess people aren’t going places right nowโ€ฆ They won’t have any more material. Yeah.

What data points does Facebook have?

BLUNT: Someone asked: “If you have an existing Facebook account that only has civilian photos and you haven’t touched it for four years, it only has those data points, right?” I think that’s a good followโ€‘up to the previous question.

INGRID: Yeah, that’s true. Well โ€‘โ€‘ there’s also people you know who have Facebook accounts? And like, Facebook has this internal mechanism for, like, tracking nonโ€‘Facebook users as, like, air quote, like, “users,” or as like entities that they can serve ads to. And generally, it’s based on, like, those people being, like, tagged in other people’s images, even if they don’t have an account, or if they have a dead account. Like, if somebody โ€‘โ€‘ if you have like a fourโ€‘yearโ€‘old untouched Facebook account, and somebody tags a contemporary photo of you, like, those data points are connected.

So, you know. Whatever other people do that could connect back to that original account, or whatever โ€‘โ€‘ yeah. Whatever followers or friends you have on itโ€ฆ Updates that they produce could kind of be new data points about you.

Can fintech platforms connect your pay app accounts to your social accounts?

“In terms of fintech, how easy is it for companies to link your pay app accounts to social accounts?” Blunt, you might have a more comprehensive answer on this than I will.

BLUNT: Okayโ€ฆ Let me take a look. So, I think that there are, like, databases built off of escort ads that then get shared on the back end to sort of facilitate, like, a networkโ€‘type effect of deโ€‘platforming sex workers. So a lot of people report โ€‘โ€‘ and some of the research that we’re doing sort of confirms this โ€‘โ€‘ that once you experience, like, deโ€‘platforming or shadowbanning on one platform, you’re significantly more likely to experience it or lose access to it on another. So, as like a form of harm reduction and being able to keep access to those financial technologies, I suggest just having like a burner eโ€‘mail account that you only use for that that’s not listed anywhere else publicly, that sounds like vanilla and civilian.

So that way, if they’re, like, running โ€‘โ€‘ if they’re scraping eโ€‘mail addresses from escort ads and then selling that data to facial โ€‘โ€‘ to financial technologies, that your eโ€‘mail won’t be in there. It’s just like adding one layer of protection. It might be connected in some other ways, butโ€ฆ just sort of as a form of harm reduction.

I don’t know if that answeredโ€ฆ that question.

And I’m looking right now for resources that specifically โ€‘โ€‘ resource specifically on protecting community members in regards to ICE centering trans sex workers. I know thatโ€ฆ Red Canary Song does some work around this, specifically with massage parlor workers, and I’m looking up the name of the organization of trans Latinx sex workers in Jackson Heights. So I will drop that link so you can follow their work, as well.

And please feel free to drop any other questions in the chat, even if it wasn’t covered. We’ll see if we can answer them, and this is your time. So, feel free to ask away.

(Silence)

Tech Journals or Websites to Follow

INGRID: “What tech update journals or websites do we follow to stay up to date?” Oh! I want to know more about what other people do, too. I tend to, like โ€‘โ€‘ I tend to follow specific writers, more than specific outlets, partly becauseโ€ฆ like, there are freelancers who kind of go to different places. But also, I kind of value seeing people who, like, have developed expertise in things. Soโ€ฆ Julia Carrie Wong at The Guardian is someone I read a lot. Melissa Gira Grant, at The New Republic. (Laughing) Is not always writing about tech, but is probably one of the smartest and sharpest and most integrityโ€‘filled writers I know.

BLUNT: Definitely one of the first to cover FOSTAโ€‘SESTA, for sure.

INGRID: Yeah. Yeah. Andโ€ฆ I’ve beenโ€ฆ Let’s see. Motherboard, in general, Jason Koebler and Janus Rose, are very wellโ€‘sourced in the industry. So I usually trust things that they cover and find. Caroline Haskins is a young reporter who used to be at Motherboard and is now at BuzzFeed and does excellent work, along with Ryan Mac. And Kashmir Hill, who is now at The New York Times, but has also written for Gizmodo and others. And who elseโ€ฆ Davey Alba is also with The New York Times, and is really great. Those are mine.

BLUNT: I sign up for the โ€‘โ€‘ it’s like, Casey Newton’s daily eโ€‘mail letter? And I just read that to stay up to date on certain news, and then research more. I know that the Internet Freedom Festival also has good updates, and I’m also happy to drop links to other weekly mailing lists that I sign up to, as well.

OLIVIA: Oh, I was muted! Oops. I, I listen to a lot of podcasts. And I know the, like, Mozilla IRL podcast was really good, for me, in terms of like learning more about like the internet, and specifically like surveillance infrastructure. And they have a lot of episodes. So if you’re, like, idling, and you have time to listen rather than reading. They also โ€‘โ€‘ Mozilla also has their transcripts out, which is pretty nice.

Can browser bookmarks be accessed?

INGRID: “Is there any way for bookmarks on my browser to be accessed?” I believe the answer for that is gonna depend on the browser. Because โ€‘โ€‘ or, it can depend on the browser? So, I think in the case of a browser like Chrome, which is owned by Google, if you are like logged into your Google account as part of, like, your browser using, I think all of that information then gets associated with your Google account. So Google will have that data. In terms of access beyond that, I’m not sure.

And then I think for other browsers, I don’t believe that that would be something that’s stored on Firefox. I’m not sure about Microsoft Edge. Olivia, do you have any other thoughts on that one?

OLIVIA: I, I don’t knowโ€ฆ

How secure and safe is Zoom?

INGRID: Talking about safety of Zoom! Okay. Yeah. We talked, we talked a little bit about this yesterday, I think. Zoom is, you know, it’s software that was made for like workplace calls, and is designed for that setting. Which means โ€‘โ€‘ (Laughs) In some ways, like, it is inherently a workplace surveillance tool. It isโ€ฆ relatively, like โ€‘โ€‘ I mean, it’s, it’s not secure in the sense that, like, these โ€‘โ€‘ I mean, first of all, this call, this is being recorded, and can โ€‘โ€‘ you know, Zoom calls can be broadcast to livestream, like this one is. But also, the, you know, communications โ€‘โ€‘ like, the actual calls aren’t, you know, encrypted in any way. Like, they kind of can just be like logged onto if they’re public. There can kind of just be some URL hacking. There are, you know, different settings you can make in terms of letting people in or out of meetings. But at the end of the day, also, Zoom has access to the calls! (Laughs) And how much you trust Zoom with that material is, you know, at your discretion.

Iโ€ฆ (Sighs) I mean, in general, likeโ€ฆ When it comes to, like โ€‘โ€‘ like, Zoom calls are not where I would discuss, like, sensitive topics, or anything I wouldn’t want to have on the record. And that’s generally just the protocol I take with it. And I think โ€‘โ€‘ I mean, that being said, like, yeah. There areโ€ฆ it is in such common use at this point, in terms of like spaces for events, like this one! That I won’t, like, kind of outright boycott it, simply because it’s become such a ubiquitous tool. But I think compartmentalizing what I do and don’t use it for has been helpful.

BLUNT: And so if you’re interested in staying up to date with EARN IT, I would suggest following Hacking//Hustling and Kate Villadano. I can drop their handle. And also, on July 21st, we’ll be hosting with our legal team… a legal seminar, sort of similar to this with space to answer questions, and we’re providing more information as to where EARN IT is and how you can sort of plug in on that.

Is there government regulation surrounding data tracking?

โˆš: “Is there government regulation of data tracking, or not so much?” Not so much! Yes! In the United States, there’s very little regulation.

So, the reason โ€‘โ€‘ or, one of the reasons that if you use a VPN and set it to a place like Switzerland and use it, you get a lot more information about what tracking is happening and you can make requests for data from platforms, is because of a European Union regulation called GDPR, General Data Protection Regulations? Or maybe General Data Privacy Regulations, sorry. And, yeah. The United States does not have an equivalent to that. Some websites โ€‘โ€‘ in some ways, like, because the European Union is such a large market, I have seen some companies kind of just unilaterally become GDPRโ€‘compliant, for like all users, simply because it’s easier than having, like, a GDPR version and a “other places” version. But, you know, when it comes to Facebook orโ€ฆ like, Instagram, or like large platforms, there’s โ€‘โ€‘ like, they don’t โ€‘โ€‘ they don’t really have an incentive to create conditions where they collect less data. So I think there, it’s kind of like, well, sorry. It’s gonna be that way. (Laughs) Yeah.

And it’s not as though โ€‘โ€‘ and I think it is a thing that, like, lawmakers have interest in? But I think part of the challenge isโ€ฆ both, like, these companies are, you know, very wellโ€‘funded and will, like, seek to โ€‘โ€‘ and will like lobby against further regulation? And also like a lot of people in Congress are… old! And bad at computer? Andโ€ฆ don’t necessarily have โ€‘โ€‘ sometimes have trouble, I think, wrapping their heads around some of the concepts underlying this. And, you know, and are not necessarily โ€‘โ€‘ and like, I think the general atmosphere and attitude around, like, free markets solve problems! Kind of further undermines pursuit of regulation.

What exactly contributes to shadowbanning?

“In terms of social media accounts following your activity, based on your research so far for shadowbanning et cetera, who do you follow andโ€ฆ to certain lists?” I think, Blunt, this question might be for you, because of the research.

BLUNT: Yeah. I think it’s less about who you follow, and more about who you interact with. So, like, we’re still analyzing this research, but there seems to be a trend that, like, if โ€‘โ€‘ if you’re shadowbanned, the people that you know are more likely to be shadowbanned, and there might be some relationship between the way that you interact and the platform? But we’re still figuring that out? But just like one thing you can try and โ€‘โ€‘ we talked about this in another one, but having a backup account for promo tweets, so your primary account with the most followers doesn’t exhibit quoteโ€‘unquote “botโ€‘like activity” of automated tweets. And just having, like, casual conversation about cheese, or natureโ€ฆ

(Laughs) We’re not totally sure how it works.

Oh, and also! I believe her name is Amber โ€‘โ€‘ I’m going to drop the link to it. But someone is doing a training on shadowbanning, and it seems like we’re collecting data on like multiple accounts. And it seems like there’s some interesting things to say. So I’m going to go grab a link to that. If you’re interested in learning more on shadowbanning, that’s on the 25th, at like 5:00 p.m. I think. So I’ll drop a link.

And just for the livestream: So, this is with Amberly Rothfield, and it’s called Shadowbanning: Algorithms Explained, on July 25th at 6:00 p.m. Still a few spots left. And it looks like she was pulling data on different accounts and playing with the accounts and analyzing the posts’ interaction and traction. So that should be really interesting, too.

Cool. Thank you so much for all of the amazing questions. I think we’ll give it a few more minutes for any other questions that folks have, or any other resources we can maybe connect people with, and then we’ll log off!

Can you request your information from datamining companies?

BLUNT: Oh. Someone’s asking, can I request my information from datamining companies?

OLIVIA: Yes, you can! Yes, you can. And a lot of themโ€ฆ Let me see if I can find a link? ‘Cause a lot of them have, like, forms, either on their website or available where you can make requests like that. You can request to see it, and I’m pretty sure you can also โ€‘โ€‘ I know you can request that they stop collecting it and that they get rid of your file. But I think you can also request to see it.

BLUNT: I also just dropped a link to this. This is an old tool that I’m not sure if it still works, but it’s Helen Nissenbaum’s AdNauseam, which clicks every single advertisement, as well as tracking and organizing all of the ads targeted at you. It’s really overwhelming to see. I remember looking at it once, and I could track when I was taking what class in school, when I was going through a breakup, just based on my searches and my targeted ads.

Cool. So, is there anything else you want to say before we log off?

INGRID: I mean, thank you all so much for participating. Thank you, again, Cory, for doing the transcription. Andโ€ฆ Yeah! Yeah, this has been really great.