My photography on Wikipedia

Originally posted on hachyderm.io, posted here with minor edits.

I release a lot of my photos under the Creative Commons Attribution licence. It’s fun to see which of them have popped up on Wikipedia and other Wikimedia projects, although it doesn’t line up with my favourites among my own photographs.

Wikipedia: Crown Sydney and a few variants in other languages make heavy use of photographs I took of the Crown Sydney construction site, or at least of its surroundings. (Most of them are cropped down to the construction site by the editors.)

Construction at Barangaroo Barangaroo towers Barangaroo construction at sunset

This photograph of the Eastern Suburbs viaduct is used in two articles related to it, Wikipedia: Eastern Suburbs & Illawarra Line and Wikipedia: Eastern Suburbs railway line:

Eastern suburbs rail line, from Sydney Tower

This, cropped and brightened by a Commons editor, is used on the Wikipedia: New South Wales Rural Fire Service article. Not discussed in the article: that truck is delivering Fire Santa, who visits kids at farm gates in the leadup to Christmas.

Fire Santa cometh!

The next two are I think the only two I have inserted myself, and appear in Wikipedia: Raging Waters Sydney. At the time I took them, the only Commons photographs of Raging Waters (then Wet ‘n’ Wild) were during construction, so I took a camera there to photograph the completed rides for Wikipedia. The first of the two also appears in Wikipedia: 2013 in amusement parks.

Tower 1, Wet'n'Wild Sydney: Bomborra and Tantrum Wet'n'Wild Sydney: H2Go Racers

This photograph is used on the Ukrainian language article about Bay Area Rapid Transit (Wikipedia: Метрополітен Затоки Сан-Франциско):

BART arriving

I extensively photographed the University of Sydney jacaranda a few years before it blew over, and this one appears on both the English and German articles about the tree (Wikipedia: Jacaranda, University of Sydney). It’s something of an exception to the “my faves don’t appear on Wikipedia” experience, I do like this series.

Jacaranda carpet, Sydney University

A cropped version of this photograph from a plane is used in both Wikipedia: Sierra Point (Brisbane) and Wikipedia: Dakin Building, neither of which I could have told you anything about when I saw them from a window seat in 2016.

Bay Area from above

Finally, it is honestly quite an honour to have this used in Wikipedia: Sydney Harbour Bridge, in both the English and Spanish articles:

Aboriginal and Australian flags above Sydney Harbour Bridge

Quite a few other photos of mine have been uploaded to Wikimedia Commons, although not used in articles. All of my Creative Commons licenced photography (around 4000 photographs) can be found via this Flickr search.

No more rock stars: how to stop abuse in tech communities

This was co-written with Leigh Honeywell and Valerie Aurora, and was originally published on hypatia.ca. It’s also available en français sur repeindre.info.

Content note for discussion of abuse and sexual violence.

In the last couple of weeks, three respected members of the computer security and privacy tech communities have come forward under their own names to tell their harrowing stories of sexual misconduct, harassment, and abuse committed by Jacob Appelbaum. They acted in solidarity with the first anonymous reporters of Jacob’s abuse. Several organizations have taken steps to protect their members from Appelbaum, including the Tor Project, Debian, and the Noisebridge hackerspace, with other responses in progress.

But Appelbaum isn’t the last – or the only – abuser in any of these communities. Many people are calling for long-term solutions to stop and prevent similar abuse. The authors of this post have recommendations, based on our combined 40+ years of community management experience in the fields of computer security, hackerspaces, free and open source software, and non-profits. In four words, our recommendation is:

No more rock stars.

What do we mean when we say “rock stars?” We like this tweet by Molly Sauter:

Seriously, “rock stars” are arrogant narcissists. Plumbers keep us all from getting cholera. Build functional infrastructure. Be a plumber.

You can take concrete actions to stop rock stars from abusing and destroying your community. But first, here are a few signs that help you identify when you have a rock star instead of a plumber:

A rock star likes to be the center of attention. A rock star spends more time speaking at conferences than on their nominal work. A rock star appears in dozens of magazine profiles – and never, ever tells the journalist to talk to the people actually doing the practical everyday work. A rock star provokes a powerful organization over minor issues until they crack down on the rock star, giving them underdog status. A rock star never says, “I don’t deserve the credit for that, it was all the work of…” A rock star humble-brags about the starry-eyed groupies who want to fuck them. A rock star actually fucks their groupies, and brags about that too. A rock star throws temper tantrums until they get what they want. A rock star demands perfect loyalty from everyone around them, but will throw any “friend” under the bus for the slightest personal advantage. A rock star knows when to turn on the charm and vulnerability and share their deeply personal stories of trauma… and when it’s safe to threaten and intimidate. A rock star wrecks hotel rooms, social movements, and lives.

Why are rock stars so common and successful? There’s something deep inside the human psyche that loves rock stars and narcissists. We easily fall under their spell unless we carefully train ourselves to detect them. Narcissists are skilled at making good first impressions, at masking abusive behavior as merely eccentric or entertaining, at taking credit for others’ work, at fitting our (often inaccurate) stereotypes of leaders as self-centered, self-aggrandizing, and overly confident. We tend to confuse confidence with competence, and narcissists are skilled at acting confident.

Sometimes rock stars get confused with leaders, who are necessary and good. What’s the difference between a rock star and a leader? We like the term “servant-leader” as a reminder that the ultimate purpose of a good leader is to serve the mission of their organization (though this feminist critique of the language around servant-leadership is worth reading). Having personal name recognition and the trust and support of many people is part of being an effective leader. This is different from the kind of uncritical worship that a rock star seeks out and encourages. Leaders push back when the adoration gets too strong and disconnected from achieving the mission (here is a great example from Anil Dash, pushing back after being held up as an example of positive ally for women in tech). Rock stars aren’t happy unless they are surrounded by unthinking adoration.

How do we as a community prevent rock stars?

If rock stars are the problem, and humans are susceptible to rock stars, how do we prevent rock stars from taking over and hijacking our organizations and movements? It turns out that some fairly simple and basic community hygiene is poisonous to rock stars – and makes a more enjoyable, inclusive, and welcoming environment for plumbers.

Our recommendations can be summarized as: decentralizing points of failure, increasing transparency, improving accountability, supporting private and anonymous communication, reducing power differentials, and avoiding situations that make violating boundaries more likely. This is a long blog post, so here is a table of contents for the rest of this post:

Have explicit rules for conduct and enforce them for everyone

Create a strong, specific, enforceable code of conduct for your organization – and enforce it, swiftly and without regard for the status of the accused violator. Rock stars get a kick out of breaking the rules, but leaders know they are also role models, and scrupulously adhere to rules except when there’s no alternative way to achieve the right thing. Rock stars also know that when they publicly break the little rules and no one calls them out on it, they are sending a message that they can also break the big rules and get away with it.

One of the authors of this post believed every first-person allegation of abuse and assault by Jacob Appelbaum – including the anonymous ones – immediately. Why? Among many other signs, she saw him break different, smaller rules in a way that showed his complete and total disregard for other people’s time, work, and feelings – and everyone supported him doing so. For example, she once attended a series of five minute lightning talks at the Noisebridge hackerspace, where speakers sign up in advance. Jacob arrived unannounced and jumped in after the first couple of talks with a forty-five minute long boring rambling slideshow about a recent trip he took. The person running the talks – someone with considerable power and influence in the same community – rolled his eyes but let Jacob talk for nine times the length of other speakers. The message was clear: rules don’t apply to Jacob, and even powerful people were afraid to cross him.

This kind of blatant disregard for the rules and the value of people’s time was so common that people had a name for it: “story time with Jake,” as described in Phoenix’s pseudonymous allegation of sexual harassment. Besides the direct harm, dysfunction, and disrespect this kind of rule-breaking and rudeness causes, when you allow people to get away with it, you’re sending a message that they can get away with outright harassment and assault too.

To solve this, create and adopt a specific, enforceable code of conduct for your community. Select a small expert group of people to enforce it, with provisions for what to do if one of this group is accused of harassment. Set deadlines for responding to complaints. Conduct the majority of discussion about the report in private to avoid re-traumatizing victims. Don’t make exceptions for people who are “too valuable.” If people make the argument that some people are too valuable to censure for violating the code of conduct, remove them from decision-making positions. If you ever find yourself in a situation where you are asking yourself if someone’s benefits outweigh their liabilities, recognize that they’ve already cost the community more than they can ever give to it and get to work on ejecting them quickly.

Start with the assumption that harassment reports are true and investigate them thoroughly

Over more than a decade of studying reports of harassment and assault in tech communities, we’ve noticed a trend: if things have gotten to the point where you’ve heard about an incident, it’s almost always just the tip of the iceberg. People argue a lot about whether to take one person’s word (the alleged victim) over another’s (the alleged harasser), but surprisingly often, this was not the first time the harasser did something harmful and it’s more likely a “one person said, a dozen other people said” situation. Think about it: what are the chances that someone had a perfect record of behavior, right up till the instant they stuck their hand in someone else’s underwear without consent – and that person actually complained about it – AND you heard about it? It’s far more likely that this person has been gradually ramping up their bad behavior for years and you just haven’t heard about it till now.

The vast majority of cases we know about fit one of these two patterns:

  1. A clueless person makes a few innocent, low-level mistakes and actually gets called on one of them fairly quickly. Signs that this is the likely case: the actual incident is extremely easy to explain as a mistake, the accused quickly understands what they did wrong, they appear genuinely, intensely embarrassed, they apologize profusely, and they offer a bunch of ways to make up for their mistake: asking the video of their talk to be taken down, writing a public apology explaining why what they did was harmful, or proposing that they stop attending the event for some period of time.
  2. A person who enjoys trampling on the boundaries of others has been behaving badly for a long time in a variety of ways, but everyone has been too afraid to say anything about it or do anything about other reports. Signs that this is the likely case: the reporter is afraid of retaliation and may try to stay anonymous, other people are afraid to talk about the incident for the same reason, the reported incident may be fairly extreme (e.g., physical assault with no question that consent was violated), many people are not surprised when they hear about it, you quickly gather other reports of harassment or assault of varying levels, the accused has plagiarized or stolen credit or falsified expense reports or done other ethically questionable things, the accused has consolidated a lot of power and attacks anyone who seems to be a challenge to their power, the accused tries to change the subject to their own grievances or suffering, the accused admits they did it but minimizes the incident, or the accused personally attacks the reporter using respectability politics or tone-policing.

In either case, your job is to investigate the long-term behavior of the accused, looking for signs of narcissism and cruelty, big and small. Rock stars leave behind a long trail of nasty emails, stolen credit, rude behavior, and unethical acts big and small. Go look for them.

Make it easy for victims to find and coordinate with each other

Rock stars will often make it difficult for people to talk or communicate without being surveilled or tracked by the rock star or their assistants, because private or anonymous communication allows people to compare their experiences and build effective resistance movements. To fight this, encourage and support private affinity groups for marginalized groups (especially people who identify as women in a way that is significant to them), create formal systems that allow for anonymous or pseudonymous reporting such as an ombudsperson or third-party ethics hotline, support and promote people who are trusted contact points and/or advocates for marginalized groups, and reward people for raising difficult but necessary problems.

Watch for smaller signs of boundary pushing and react strongly

Sometimes rock stars don’t outright break the rules, they just push on boundaries repeatedly, trying to figure out exactly how far they can go and get away with it, or make it so exhausting to have boundaries that people stop defending them. For example, they might take a little too much credit for shared work or other people’s work, constantly bring up the most disturbing but socially acceptable topic of conversation, resist de-escalation of verbal conflict, subtly criticize people, make passive-aggressive comments on the mailing list, leave comments that are almost but not quite against the rules, stand just a little too close to people on purpose, lightly touch people and ignore non-verbal cues to stop (but obey explicit verbal requests… usually), make comments which subtly establish themselves as superior or judges of others, interrupt in meetings, make small verbal put-downs, or physically turn away from people while they are speaking. Rock stars feel entitled to other people’s time, work, and bodies – signs of entitlement to one of these are often signs of entitlement to the others.

Call people out for monopolizing attention and credit

Is there someone in your organization who jumps on every chance to talk to a reporter? Do they attend every conference they can and speak at many of them? Do they brag about their frequent flyer miles or other forms of status? Do they jump on every project that seems likely to be high visibility? Do they “cookie-lick” – claim ownership of projects but fail to do them and prevent others from doing them either? If you see this happening, speak up: say, “Hey, we need to spread out the public recognition for this work among more people. Let’s send Leslie to that conference instead.” Insist that this person credit other folks (by name or anonymously, as possible) prominently and up front in every blog post or magazine article or talk. Establish a rotation for speaking to reporters as a named source. Take away projects from people if they aren’t doing them, no matter how sad or upset it makes them. Insist on distributing high status projects more evenly.

A negative organizational pattern that superficially resembles this kind of call-out can sometimes happen, where people who are jealous of others’ accomplishments and successes may attack effective, non-rock star leaders. Signs of this situation: people who do good, concrete, specific work are being called out for accepting appropriate levels of public recognition and credit by people who themselves don’t follow through on promises, fail at tasks through haplessness or inattention, or communicate ineffectively. Complaints about effective leaders may take the form of “I deserve this award for reasons even though I’ve done relatively little work” instead of “For the good of the organization, we should encourage spreading out the credit among the people who are doing the work – let’s talk about who they are.” People complaining may occasionally make minor verbal slips that reveal their own sense of entitlement to rewards and praise based on potential rather than accomplishments – e.g., referring to “my project” instead of “our project.”

Insist on building a “deep bench” of talent at every level of your organization

Your organization should never have a single irreplaceable person – it should have a deep bench. Sometimes this happens through a misplaced sense of excessive responsibility on the part of a non-abusive leader, but often it happens through deliberate effort from a “rock star.” To prevent this, constantly develop and build up a significant number of leaders at every level of your organization, especially near the top. You can do this by looking for new, less established speakers (keynote speakers in particular) at your events, paying for leadership training, creating official deputies for key positions, encouraging leaders to take ample vacation and not check email (or chat) while they are gone, having at least two people talk to each journalist, conducting yearly succession planning meetings, choosing board members who have strong opinions about this topic and a track record of acting on them, having some level of change or turnover every few years in key leadership positions, documenting and automating key tasks as much as possible, sharing knowledge as much as possible, and creating support structures that allow people from marginalized groups to take on public roles knowing they will have support if they are harassed. And if you need one more reason to encourage vacation, it is often an effective way to uncover financial fraud (one reason why abusive leaders often resist taking vacation – they can’t keep an eye on potential exposure of their misdeeds).

Flatten the organizational hierarchy as much as possible

Total absence of hierarchy is neither possible nor desirable, since “abolishing” a hierarchy simply drives the hierarchy underground and makes it impossible to critique (but see also the anarchist critique of this concept). Keeping the hierarchy explicit and making it as flat and transparent as possible while still reflecting true power relationships is both achievable and desirable. Ways to implement this: have as small a difference as possible in “perks” between levels (e.g., base decisions on flying business class vs. economy on amount of travel and employee needs, rather than position in the organization), give people ways to blow the whistle on people who have power over them (including channels to do this anonymously if necessary), and have transparent criteria for responsibilities and compensation (if applicable) that go with particular positions.

Build in checks for “failing up”

Sometimes, someone gets into a position of power not because they are actually good at their job, but because they turned in a mediocre performance in a field where people tend to choose people with proven mediocre talent over people who haven’t had a chance to demonstrate their talent (or lack thereof). This is called “failing up” and can turn otherwise reasonable people into rock stars as they desperately try to conceal their lack of expertise by attacking any competition and hogging attention. Or sometimes no one wants to take the hit for firing someone who isn’t capable of doing a good job, and they end up getting promoted through sheer tenacity and persistence. The solution is to have concrete criteria for performance, and a process for fairly evaluating a person’s performance and getting them to leave that position if they aren’t doing a good job.

Enforce strict policies around sexual or romantic relationships within power structures

Rock stars love “dating” people they have power over because it makes it easier to abuse or assault them and get away with it. Whenever we hear about an organization that has lots of people dating people in their reporting chain, it raises an automatic red flag for increased likelihood of abuse in that organization. Overall, the approach that has the fewest downsides is to establish a policy that no one can date within their reporting chain or across major differences in power, that romantic relationships need to be disclosed, and that if anyone forms a relationship with someone in the same reporting chain, the participants need to move around the organization until they no longer share a reporting chain. Yes, this means that if the CEO or Executive Director of an organization starts a relationship with anyone else in the organization, at least one of them needs to leave the organization, or take on some form of detached duty for the duration of the CEO/ED’s tenure. When it comes to informal power relationships, such as students dating prominent professors in their fields, they also need to be forbidden or strongly discouraged. These kinds of policies are extremely unattractive to a rock star, because part of the attraction of power for them is wielding it over romantic or sexual prospects.

Avoid organizations becoming too central to people’s lives

Having a reasonable work-life balance isn’t just an ethical imperative for any organization that values social justice, it’s also a safety mechanism so that if someone is forced to leave, needs to leave, or needs to take a step back, they can do so without destroying their entire support system. Rock stars will often insist on subordinates giving 100% of their available energy and time to the “cause” because it isolates them from other support networks and makes them more dependent on the rock star.

Don’t set up your community so that if someone has a breach with your community (e.g., is targeted for sustained harassment that drives them out), they are likely to also lose more than one of: their job, their career, their romantic relationships, their circle of friends, or their political allies. Encouraging and enabling people to have social interaction and support outside your organization or cause will also make it easier to, when necessary, exclude people behaving abusively or not contributing because you won’t need to worry that you’re cutting them off from all meaningful work or human contact.

You should discourage things like: semi-compulsory after hours socialising with colleagues, long work hours, lots of travel, people spending almost all their “intimacy points” or emotional labour on fellow community members, lots of in-group romantic relationships, everyone employs each other, or everyone is on everyone else’s boards. Duplication of effort (e.g., multiple activist orgs in the same area, multiple mailing lists, or whatever) is often seen as a waste, but it can be a powerfully positive force for allowing people some choice of colleagues.

Distribute the “keys to the kingdom”

Signs of a rock star (or occasionally a covert narcissist) may include insisting on being the single point of failure for one or more of: your technical infrastructure (e.g., domain name registration or website), your communication channels, your relationship with your meeting host or landlord, your primary source of funding, your relationship with the cops, etc. This increases the rock star’s power and control over the organization.

To prevent this, identify core resources, make sure two or more people can access/administer all of them, and make sure you have a plan for friendly but sudden, unexplained, or hostile departures of those people. Where possible, spend money (or another resource that your group can collectively offer) rather than relying on a single person’s largesse, specialized skills, or complex network of favours owed. Do things legally where reasonably possible. Try to be independent of any one critical external source of funding or resources. If there’s a particularly strong relationship between one group member and an external funder, advisor, or key organization, institutionalize it: document it, and introduce others into the relationship.

One exception is that it’s normal for contact with the press to be filtered or approved by a single point of contact within the organization (who should have a deputy). However, it should be possible to talk to the press as an individual (i.e., not representing your organization) and anonymously in cases of internal organizational abuse. At the same time, your organization should have a strong whistleblower protection policy – and board members with a strong public commitment and/or a track record of supporting whistleblowers in their own organizations.

Don’t create environments that make boundary violations more likely

Some situations are attractive to rock stars looking to abuse people: sexualized situations, normalization of drinking or taking drugs to the point of being unable to consent or enforce boundaries, or other methods of breaking down or violating physical or emotional boundaries. This can look like: acceptance of sexual jokes at work, frequent sexual liaisons between organization members, mocking people for not being “cool” for objecting to talking about sex at work, framing objection to sexualized situations as being homophobic/anti-polyamorous/anti-kink, open bars with hard alcohol or no limit on drinks, making it acceptable to pressure people to drink more alcohol than they want or violate other personal boundaries (food restrictions, etc.), normalizing taking drugs in ways that make it difficult to stay conscious or defend boundaries, requiring attendance at physically isolated or remote events, having events where it is difficult to communicate with the outside world (no phone service or Internet access), having events where people wear significantly less or no clothing (e.g. pool parties, saunas, hot tubs), or activities that require physical touching (massage, trust falls, ropes courses). It’s a bad sign if anyone objecting to these kinds of activities is criticized for being too uptight, puritanical, from a particular cultural background, etc.

Your organization should completely steer away from group activities which pressure people, implicitly or explicitly, to drink alcohol, take drugs, take off more clothing than is usual for professional settings in the relevant cultures, or touch or be touched. Drunkenness to the point of marked clumsiness, slurred speech, or blacking out should be absolutely unacceptable at the level of organizational culture. Anyone who seems to be unable to care for themselves as the result of alcohol or drug use should be immediately cared for by pre-selected people whose are explicitly charged with preventing this person from being assaulted (especially since they may have been deliberately drugged by someone planning to assault them). For tips on serving alcohol in a way that greatly reduces the chance of assault or abuse, see Kara Sowles’ excellent article on inclusive events. You can also check out the article on inclusive offsites on the Geek Feminism Wiki.

Putting this to work in your community

We waited too long to do something about it.

Odds are, your community already has a “missing stair” or three – even if you’ve just kicked one out. They are harming and damaging your community right now. If you have power or influence or privilege, it’s your ethical responsibility to take personal action to limit the harm that they are causing. This may mean firing or demoting them; it may mean sanctioning or “managing them out.” But if you care about making the world a better place, you must act.

If you don’t have power or influence or privilege, think carefully before taking any action that could harm you more and seriously consider asking other folks with more protection to take action instead. Their response is a powerful litmus test of their values. If no one is willing to take this on for you, your only option may be leaving and finding a different organization or community to join. We have been in this position – of being powerless against rock stars – and it is heartbreaking and devastating to give up on a cause, community, or organization that you care about. We have all mourned the spaces that we have left when they have become unlivable because of abuse. But leaving is still often the right choice when those with power choose not to use it to keep others safe from abuse.

Responses

While we are not asking people to “cosign” this post, we want this to be part of a larger conversation on building abuse-resistant organizations and communities. We invite others to reflect on what we have written here, and to write their own reflections. If you would like us to list your reflection in this post, please leave a comment or email us a link, your name or pseudonym, and any affiliation you wish for us to include, and we will consider listing it. We particularly invite survivors of intimate partner violence in activist communities, survivors of workplace harassment and violence, and people facing intersectional oppressions to participate in the conversation.

2016-06-21: The “new girl” effect by Lex Gill, technology law researcher & activist

2016-06-21: Patching exploitable communities by Tom Lowenthal, security technologist and privacy activist

2016-06-22: Tyranny of Structurelessness? by Gabriella Coleman, anthropologist who has studied hacker communities

We would prefer that people not contact us to disclose their own stories of mistreatment. But know this: we believe you. If you need emotional support, please reach out to people close to you, a counselor in your area, or to the trained folks at RAINN or Crisis Text Line.

Credits

This post was written by Valerie Aurora (@vaurorapub), Mary Gardiner (@me_gardiner), and Leigh Honeywell (@hypatiadotca), with grateful thanks for comments and suggestions from many anonymous reviewers.

Blogging for Geek Feminism, a short history

With yesterday’s release of Spam All the Links, I’ve finished my long awaited project of departing the Geek Feminism blog.

I was involved in the blog on, if not from the first day of its existence, at least from the first week of it. My involvement in the blog was huge, and comprises among other things:

  • over 200 posts to the blog
  • founding and for a long time running the Ask a Geek Feminist, Wednesday Geek Woman and Cookie of the Week series
  • doing a linkspam post by myself multiple times a week for about a year
  • recruiting the initial team of Linkspammers and setting up their manual, mailing list and of course, the script that supports them
  • recruiting several other bloggers, including Tim, Restructure! and Courtney S
  • a bunch of sysadmin of the self-hosted WordPress install (it’s now hosted on WordPress.com)

My leaving the blog is delayed news. I initially told the co-bloggers I was leaving close to a year ago now (mid-August, if I’d waited much longer on writing this I could have posted on the one year anniversary), because my output had dried up. I feel in large part that what happened was that I spent about ten years in geekdom (1999–2009) accumulating about three years of material for the blog, and then I ran out of things to write about there. I also have two more children and one more business than I had when I was first writing for it, and, very crucially, one less unfinished PhD to avoid. But I had a handover todo list to plod my way through, and Spam All the Links was the last item on it!

I remain involved in Geek Feminism as an administrator on the Geek Feminism wiki, on which I had about 25% of total edits last I looked, although the same sense of being a dry well is there too.

The blog was obviously hugely important for me, both as an outlet for that ten years of pent up opinionating and, to my surprise, because I ended up moving into the space professionally. I’m glad I did it.

Today, I would say these are my five favourite posts I made to the blog:

“Girl stuff” in Free Software, August 2009 (original link):

Terri mention[ed] that she had resisted at times working on things perceived as ‘girl stuff’. In Free Software this includes but is not limited to documentation, usability research, community management and (somewhat unusually for wider society) sometimes management in general. The audience immediately hit on it, and it swirled around me all week.

Why we document, August 2009 (original link):

I do not in fact find writing the wiki documentation of incidents in geekdom very satisfying. The comment linked at the beginning of the post compared the descriptions to a rope tying geekdom to the past. Sometimes being known as a wiki editor and pursued around IRC with endless links to yet another anonymous commenter or well-known developer advising women to shut up and take it and write some damned code anyway is like a rope tying me to the bottom of the ocean.

But what makes it worth it for me is that when people are scratching their heads over why women would avoid such a revolutionarily free environment like Free Software development, did maybe something bad actually happen, that women have answers.

(I’d be very interested in other people’s takes on this in 2015, which is a very different landscape in terms of the visibility of geek sexism than 2009 was.)

Why don’t you just hit him?, December 2010 (original link):

This is the kind of advice given by people who don’t actually want to help. Or perhaps don’t know how they can. It’s like if you’re a parent of a bullying victim, and you find yourself repeating “ignore it”, “fight back with fists” or whatever fairly useless advice you yourself were once on the receiving end of. It’s expressing at best helplessness, and at worst victim-blaming. It’s personalising a cultural problem.

You are not helpless in the face of harassment. Call for policies, implement policies, call out harassment when you overhear it, or report it. Stand with people who discuss their experiences publicly.

Anti-pseudonym bingo, July 2011 (original link):

Let’s recap really quickly: wanting to and being able to use your legal name everywhere is associated with privilege. Non-exhaustive list of reasons you might not want to use it on social networks: everyone knows you by a nickname; you want everyone to know you by a nickname; you’re experimenting with changing some aspect of your identity online before you do it elsewhere; online circles are the only place it’s safe to express some aspect of your identity, ever; your legal name marks you as a member of a group disproportionately targeted for harassment; you want to say things or make connections that you don’t want to share with colleagues, family or bosses; you hate your legal name because it is shared with an abusive family member; your legal name doesn’t match your gender identity; you want to participate in a social network as a fictional character; the mere thought of your stalker seeing even your locked down profile makes you sick; you want to create a special-purpose account; you’re an activist wanting to share information but will be in danger if identified; your legal name is imposed by a legal system that doesn’t match your culture… you know, stuff that only affects a really teeny minority numerically, and only a little bit, you know?

But I’m mostly listing it here because I always have fun with the design of my bingo cards. (This was my first time, Sexist joke bingo is better looking.)

I take it we aren’t cute enough for you?, August 2012 (original link):

… why girls? Why do we not have 170 comments on our blog reaching out to women who are frustrated with geekdom? I want to get this out in the open: people love to support geek girls, they are considerably more ambivalent about supporting geek women.

The one I’m still astonished I had time for was transcribing the entire Doubleclicks “Nothing to Prove” video. 2013? I don’t remember having that kind of time in 2013!

Thanks to my many co-bloggers over the five years I was a varyingly active blogger at Geek Feminism. I may be done, at least for a time and perhaps in that format, but here’s to a new generation of geek feminist writers joining the existing one!

Hand holding aloft a cocktail glass
from an image by Susanne Nilsson, CC BY-SA

Image credit: Cheers! by Susanne Nilsson, Creative Commons Attribution-Sharealike. The version used in this post was cropped and colour adjusted by Mary.

Handling harassment incidents swiftly and safely

This article was written by me and originally published on the Ada Initiative’s website. It is republished here according to the terms of its Creative Commons licence.

As anti-harassment policies become more widespread at open technology and culture events, different ways of handling harassment incidents are emerging. We advocate a swift process in which final decisions are made by a small group of empowered decision makers, whose focus is on the safety of the people attending the event.

Open technology and culture communities, which often make decisions in a very public way, can be tempted to also have a very public and very legalistic harassment handling process, a judicial model, but we advocate against this. It prioritises other values, such as transparency and due process, over that of safety. Alternatively, because many members of such communities find ostracism very hurtful and frightening, sometimes they develop a caretaker model, where they give harassers lots of second chances and lots of social coaching, and focus on the potential for a harasser to redeem themselves and re-join the community.

But neither of these models prioritise safety from harassment.

Consider an alternative model: harassment in the workplace. In a well-organised workplace that ensured your freedom from harassment — a situation which we know is also all too rare, but which we can aspire to, especially since our events are workplaces for many of us — an empowered decision maker such as your manager or an HR representative would make a decision based on your report that harassment had occurred and other relevant information as judged by them, and act as required order to keep your workplace safe for you.

A well-organised workplace would not appoint itself your harasser’s anti-harassment coach, have harassment reports heard by a jury of your peers, publish the details of your report widely, have an appeals process several levels deep, or offer fired staff members the opportunity to have their firing reviewed by management after some time has passed.

Like in a well-organised workplace, we advocate a management model of handling harassment complaints to make events safer: reasonably quick and final decisions made by a small group of empowered decision makers, together with communication not aimed at transparency for its own sake, but at giving people the information they need to keep themselves safe.

The management model of harassment handling is that:

  1. you have a public harassment policy that clearly states that harassment is unacceptable, and gives examples of unacceptable behaviour
  2. you have a clear reporting avenue publicised with the policy
  3. you have an empowered decision maker, or a small group of decision makers, who will act on reports
  4. reports of harassment are conveyed to those decision makers when reported
  5. they consider those reports, gather any additional information they need to make a decision — which could include conduct in other venues and other information that a very legalistic model might not allow — and they decide what action would make the event safer
  6. they communicate with people who need to know the outcome (eg, with the harasser if they need to change their behaviour, avoid any people or places, or leave the event; volunteers or security if they need to enforce any boundaries)
  7. they provide enough information to the victim of the harassment, and when needed to other attendees, to let them make well-informed decisions about their own safety

Further reading

Creative Commons License
Handling harassment incidents swiftly and safely
by the Ada Initiative is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at https://adainitiative.org/2014/07/23/handling-harassment-incidents-swiftly-and-safely/.

Is harassment in your community unwelcome? Adopt a Community Anti-Harassment Policy!

This article originally appeared on Geek Feminism.

Last week, the Geek Feminism community announced that we’ve adopted a code of conduct in our community. Our code begins:

The Geek Feminism (GF) community is dedicated to providing a harassment-free experience for everyone, regardless of gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, or religion. We do not tolerate harassment of participants in any form.

This code of conduct applies to all Geek Feminism sponsored spaces, including our blog, mailing lists, and wiki, as well as any other spaces that Geek Feminism hosts, both online and off. Anyone who violates this code of conduct may be sanctioned or expelled from these spaces at the discretion of the Geek Feminism Anti-Abuse Team.

We took quite a long time to do this, after two harassment incidents associated with the Geek Feminism community (albeit, one probably not by people who are actually active in our spaces and who therefore can’t be excluded from them). We’d love it if others learned from our example and adopted a policy within their own communities. To that end, as of today, our Community Anti-Harassment Policy is available for re-use under Creative Commons Zero/public domain and we are beginning to develop associated resources, just as we have done over the past few years for the Conference anti-harassment policy

Here’s what you need:

  1. a policy (remember, ours is available for re-use, either as is, or in a modified form)
  2. a contact point where harassment reports can be received
  3. a group of responders who receive reports and have the power to act on them up to and including excluding harassers from your community

If your community does not have an obvious way to create a group of responders, start discussing how you can create one. In many communities, there is likely to be an existing volunteerocracy at the very least. Can these people reach consensus that your community should be safer from harassment, and that they are unwilling to work with harassers? Simply announcing to people that they must cease a behaviour, or they must leave the community, is in fact very effective as long as there is basic consensus around community norms. For online groups technical structures can help, but social structures are in fact the root of anti-harassment. You don’t need ops or admin power or the crown of the ancient rulers to enforce anti-harassment policies in your community, you need consistent anti-harassment responses by people with social power.

If you don’t know that your community has concensus on being anti-harassment. as a start you can declare your own personal anti-harassment stance, and publicly call for your community to adopt a anti-harassment policy, and a structure that enables the response team to exclude people from the community.

As Geek Feminism shows, activist groups or groups that have advocated for anti-harassment are not safe from internal harassment and still need a policy. And groups with no known harassment incidents are also not safe; it’s quite likely that people in your community have experienced harassment they felt unable to identify or report. Take steps to ensure harassing behaviour becomes known, and that it is known to be unacceptable.

One specific model we encourage you to avoid is the Our community is amazing! So wonderful! We rock! PS no harassment model in which you spend a lot of time affirming your community’s goodness and make a general statement about anti-harassment in passing. We discourage putting this in your anti-harassment policy for these reasons:

  1. you probably do not know the extent of harassment in your community without a policy and a reporting mechanism, and may not rock as much as you think
  2. stating that you are “anti-harassment” without saying what harassment means to you doesn’t give your existing community and potential new members the information they need to find out if their safety needs are a close enough match for your community’s norms

Stating your community’s great work or exemplary behaviour can be really useful for establishing social norms and letting people understand what joining your community means. They form a good basis for specific policies. But don’t make such statements in your anti-harassment policy, make them in a separate document listing your community’s values and goals. And it may be best to say that you aspire or intend to create an amazing space, rather than that you have definitely attained that goal. Statements that you are definitely no questions amazing may be used to silence people with critical feedback and in the end reduce your amazingness.

We also discourage private anti-harassment policies (shared only within a community or within its leadership), for reasons outlined by the Ada Initiative [disclaimer: I co-founded the Ada Initiative].

Do you already have a community anti-harassment policy, or have we convinced you to adopt one? List your community on the Community anti-harassment adoption page! And thank you.

Open thread: never say “fake geek” again!

This article originally appeared on Geek Feminism.

Hello again! Hopefully everyone is enjoying our newly working blog (no one is seeing regular 503 errors right? RIGHT? no seriously, let us know if you are). We’re celebrating with an open thread for comments on any subject fitting our policy!

Feature item for this open thread is Nothing to Prove (subtitled version available in Amara) by geek sister musicians The Doubleclicks. The band talk about the song and video on their blog. Additional images can be submitted on geekgirlvideo.tumblr.com. Transcript at the bottom of this post.

(
{“video_url”: “http://www.youtube.com/watch?v=s4Rjy5yW1gQ”}
)

Various reminders:

  • (Re-)Follow us on Twitter! Our new, working, Twitter handle is @GeekFeminismOrg (follow); we’ve permanently lost access to @geekfeminism.
  • Sharing links: we no longer can access links for linkspams submitted via delicious.com. Currently most of our regular linkspam submitters are signed up to Pinboard.

About open threads: open threads are for comments on any subject at all, including past posts, things we haven’t posted on, what you’ve been thinking or doing, etc as long as it follows our comment policy. We’re always looking for fluffy, fun, silly, cute or beautiful open thread starters, please post links to Pinboard with the “gffun” tag.

Partial transcription of video:

Transcriber’s note: the video clip consists of many short videos of a geek or sometimes two geeks holding up a sign to the camera. for time reasons, I am only transcribing the signs, not giving a description of people’s appearance or their surroundings, other than noting geeks who appear to me to be men. I’m aware that several of them are geek celebrities, but I haven’t looked them up. Signs are in square braces.

[Opening credits: “Nothing to Prove”, a music video by the Doubleclicks.]

I entered this scene through rejection and honesty

[Two people: Hi there! We are geek girls.]
[I started playing DnD in 6th grade. I never stopped.]

Nerds weren’t mean, they were weird and that worked for me

[I learned to read with comic books.]
[I’ve been a gamer since before I can remember.]

After 10 years of teasing when social skills failed me

[I grew my hair out / so I could dress up as Princess Leia.]

Dungeons & Dragons cured all that ailed me

[I played Myst when it was released. I was 11. It was the GREATEST DAY OF MY LIFE!]

We read books, we played games, we made art, we watched Lost

[My Transformers played with my Cabbage Patch Kids.]
[I received my first console when I was nine years old.]

We said things like “D20”, “shipping” and “Mana cost”

[My regular Saturday night “date” was the 5th doctor.]
[Comics taught me women can be beautiful & powerful.]

It felt good to be myself, not being mocked

[Founder and president of my high school Star Trek fan club.]
[I spend HUNDREDS of hours on cosplay.]

Still self-conscious, though, we whispered things about jocks

[Adult and child: I’m raising the next generation of Geek Girls!]
[Accounting associate by day, Elf Ranger by night.]

But one day, you grow up, come into your own

[I was obsessed with Star Trek: The Next Generation and had a super huge crush on Jonathan Frakes. / Now we’re friends. It’s weird.]

Now geek’s not rejection – it’s a label I own

[I write code for particle accelerators.]
[I’m in ur HOUSE OF IDEAS writin ur COMICS.]

Then ignorant haters come to prove me wrong

[Two people: being a geek girl is really awesome / … except when it isn’t.]

Tell me I’m not nerdy enough to belong

[I love video games but BOYS tell me I’m not a REAL GAMER.]

I’ve got nothing to prove

[That look of surprise when I talk about Star Trek? It gets old.]

I’ve got nothing to prove

[Why are you surprised I want to be an ASTRONAUT when I grow up?]

I’ve got nothing to prove

[I’m a SCIENTIST not a secretary.]

(rising music)

[I own a comic + game shop but people just assume I’m humoring my geek husband.]

Fake Geek Girl test – that’s a funny one, go ahead

[People say I only play video games because of my boyfriend but I owned over 200 games before I even met him!]

How many comic books are there I haven’t read?

[I work at a comic book store. Male customers tend to ignore me completely or ask if there is a man around to help them.]

I know it feels good to have a contest you win

[Being ASIAN and a GEEK doesn’t mean I have to like ANIME.]

It would feel even better if I wanted in

[I was told I traded my cleavage for free comics.]

So women aren’t geeks, so is that your conclusion?

[I have to use a gender-neutral pen-name just to be respected.]

That this is some secret club based on exclusion?

[I was told I “sound smart for a girl in a pink skirt.”]

12-year-old dorks would say you’re being selfish

[A con vendor told me that the smaller dice sets were for women to wear and show off (accessories). The regular ones were for men to, you know, play games with.]

And then they’d go write in their journals in Elvish

[Two people: Here’s a message for the haters, elitists and bullies / from us, the geek girls and our friends]

I’ve got nothing to prove

[Man: No one gets to tell you how to be a geek.]

I’ve got nothing to prove

[Man: If someone has to pass a test to hang out with you / YOU’RE the problem. ]

I’ve got nothing to prove

[You think I do this for your approval? Mwa ha ha. / Get over yourself.]

(instrumental)

[Man: There are no fake geeks / … only real jerks.]
[Who died and made you Batman?! Wait. Was it your parents? / In that case I’m very sorry. / Never mind.]
[I don’t need you to tell me how much I like anything.]
[We’ve both been ridiculed for our hobbies. Be supportive. We’re on the same side.]

I’ve got cred but honestly, I shouldn’t need it

[I don’t need to go to a con to be a geek. I am & I haven’t.]

This world needs all kinds of folks to complete it

[Please don’t let my gender turn you into an elitist. We love the same things for the same reasons.]

You’ve got gamers, and artists and comic subscribers

[Don’t tell my daughters that Lego, Robots and Superheroes are for boys.]

Cosplayers, crafters and fan-fiction writers

[Geek equality equals geekuality now!]

You can stop – never say “fake geek” again

[I was a geek before I saw a cult film or played a game. I don’t need your approval in the end.]

Our club needs no bouncers – all who want in get in

[Be respectful and I won’t eat you.]

But go ahead, if you want, to own that role fully

[Men: Staring ≠ respecting. Men are women too!]

I ain’t got nothing to prove to a bully!

[I’m a geek and I’m awesome. / And I don’t need your permission.]

(instrumental)

[DON’T PANIC.]
[Man: Don’t be a dick.]
[I’m older than ‘your Mom’ and I still love MMORPGs!]
[I’m a geek. / Search your heart. You know it to be true.]
[I founded a camp to teach girls how to program.]
[I am a cardboard-flipping card gamer.]
[You can’t take the geek from me.]
[Buuugs!]

I’ve got nothing to prove

[I’m a geek!]
[I am a geek! (and I am good at sports)]
[I’m a geek!]
[I’m a geek]

I’ve got nothing to prove

[I’m a geek!]
[I am a RPG nerd!]
[I am a geek!]
[I’m a geek ♥]

I’ve got nothing to prove

[I’m a geek]
[Man: I will do anything for $5]
[I am a costume geek!]

(instrumental)

[I cosplay for attention. LOL NOT.]
[I’m me. NERD.]
[I’m a geek!]
[I’m a fraking NERD!]
[I’m a cosplayer.]
[(sign held off-screen)]
[I’m a NERD.]
[I am a geek grrl!]
[I am a geek]
[I’m a geek!]
[I am a GEEK]
[I am a GEEK!]
[I am a tabletop geek girl!]
[I’m a / Browncoat / Comic book collator / Convention panelist / Tabletop gamer / Fanfic writer / Geek]
[I solved the [Rubik’s] cube in 36 seconds on TV 30 years ago. Now I publish the card game Fluxx.]
[I just knew that one day Star Trek would be cool. Take that EVERYONE from junior high!]
[I turned nerd watching the 90s Xmen with my Dad.]
[Child and adult,: I am a geek girl in training. I love the Science Channel. / I am a scifi/fantasy book, gadget, games (before kids), science and technology, artsy fartsy geek. aka a general all-purpose geek girl.]
[Trek-obsessed cosplaying grammarian librarian.]
[I got my husband into GAMING.]
[I am a geek!]
[It’s not easy. But I’m a geek.]
[I crochet my own Elder Gods!]
[I have been playing video games for almost 28 years!]
[Two people: Geek friends = great friends!]
[When I ran a two-week line up for the first Star Wars prequel, my homeroom teacher called me an EMBARRASSMENT and said I was ruining my school’s reputation.]
[My Mom let me read her copy of The Jedi Academy trilogy when I was 10!]
[I was born making Vulcan hands.]
[I often contemplate the merits of a Hogwards education.]
[I got my PhD in electrical engineering with a research focus in computational neuroscience.]
[I am a Wizard, Jedi, Scooby, Xman, Baker Street Irregular, Companion, Brownvoat, Starfleet Officer, Dread Pirate, Walker, Wizard, Geek.]
[Ich bin ein Aussenseitern.]
[I’m geeky enough for me.]
[I teach robotics to kids, make my own cosplays, and I work as a professional NPC at my local comic book store. (And I watch lots of geek TV shows.)]
[I was the one who introduced my fiancé to D&D. To me he is the newbie.]
[I was BORN pulling things apart & putting them back together. Now I do science on a boat. #geekforlife]
[Write fanfiction. Do cute and sexy cosplay. BE YOURSELF. Do what you want.]
[Adult and child: I can be a ballerina AND kill cylons! / Why are you surprised I want to be an ASTRONAUT when I grow up?]
[When I was six my family brought me to PAX. I loved it!]
[I said I liked Illusion of Gaia. He asked me how many red jewels the game contained.]
[Chem teacher told me I would never make a good SCIENTIST. I start my PhD in biology in September.]
[Don’t worry if you haven’t read, watched and played everything, given time you will explore!]
[In high school and university guys were shocked that I played video games and read sci-fi/fantasy books.]
[I am a geek! YAY!]

Haters are gonna hate!

[Two people: Geek girls are awesome and we are not going away! / Deal with it.]

(credits roll)

Transcript notes: subtitling used the Amara tool, lyrics are available in the Youtube description for the video. In order to capture the signs towards the end that are only displayed for two frames, I downloaded the video with youtube-dl and stepped through it frame-by-frame using Totem and Máirín Duffy’s instructions for frame stepping.

Open thread: technical difficulties

This article originally appeared on Geek Feminism.

You may have noticed that Geek Feminism has been regularly down this month displaying errors about “503 Service Unavailable”. We sure have. We’re working with our host to try and resolve the issue; hopefully we’re on our way. We wanted to let you know that we have noticed.

Chewed up network cable by Jeremiah Ro, CC BY-SA
by Jeremiah Ro, CC BY-SA

While we’re here, if you’re interested in following our new posts on Twitter, we’ve unfortunately lost access to our former Twitter handle @geekfeminism: you can now follow @GeekFeminismOrg.

Finally, this is itself an open thread for comments on any subject fitting our policy!

About open threads: open threads are for comments on any subject at all, including past posts, things we haven’t posted on, what you’ve been thinking or doing, etc as long as it follows our comment policy. We’re always looking for fluffy, fun, silly, cute or beautiful open thread starters, please post links to Pinboard or Delicious with the “gffun” tag.

Harassment report at your conference: what do you do???

This article was written by me and originally published on the Ada Initiative’s website. It is republished here according to the terms of its Creative Commons licence.

The Ada Initiative’s anti-harassment work and other anti-harassment initiatives have resulted in many conferences adopting anti-harassment policies.

The Ada Initiative are not enforcers of individual conferences’ policies: this is the responsibility of conference staff, and conferences do not usually inform us of reports, nor do we expect them to. Harassment within a community is that community’s responsibility. However, in some cases when Ada Initiative staff have attended a conference, we have been asked to advise conference staff on responses. We’ve learned several useful techniques for making sure that the conference follows through quickly on its commitment to anti-harassment. We’ve drawn our experiences together into a wiki page: Responding to harassment reports.

Our first tip is, of course, to have a policy. Harassment incidents at geek conferences — including open technology and culture conferences — are widespread. If harassment is reported at your conference and you do not have a policy, it is difficult to reach consensus among conference staff that harassment is not welcome, let alone that you should respond to it, or about how you should respond. The result is that people who are worried about harassment, or who have experienced it at your event or other events, will not feel or be safe at your event. Your policy should be in place before your conference. The Ada Initiative and Geek Feminism volunteers have prepared substantial resources on how to put a policy in place.

You should also pre-prepare some emergency contacts, for incidents that you can’t handle. Conference volunteers and staff are rarely able to solely respond to and properly help with physical safety threats, illness or people in crisis. We suggest preparing a handout with contacts for emergency services, venue security, local medical and mental health facilities and crisis hotlines for mental illness, sexual assault, and physical violence. Make this info available in your conference materials so that attendees do not have to come to you, but have copies to hand in case they do.

Having a staff member whose key responsibility is to assist attendees in difficulty (rather than routine conference chores) can assist in a fast response, see the Duty officer wiki page.

Unfortunately, having a policy does not mean harassment won’t occur at your event. Once an incident is reported, you need to respond rapidly to reports. As the wiki page discusses in more detail you should:

  1. get a written report where possible, or have the staff member who received it write down what they were told
  2. have a staff member collate these reports in case of multiple incidents of harassment by one person, so that you can respond to the pattern rather than one instance
  3. have a staff member discuss the incident with the alleged harasser
  4. convene a meeting as soon as reasonably practical to decide on a response
  5. decide on a response and communicate it to the complainant and the harasser as soon as possible
  6. provide the harasser with an avenue of appeal if one is available but insist that they abide by any sanctions in the meantime
  7. communicate the incident and response briefly to the community, either attending the conference or reading your blog etc, to allow them to see that the policy is enforced
  8. remind the attendees and community where the policy is found and invite them to review it

We welcome additional improvements to our detailed guide on how to respond to harassment reports. If you would like to discuss the suggestions, please do so on the wiki’s talk page.

Creative Commons License
Harassment report at your conference: what do you do???
by the Ada Initiative is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at https://adainitiative.org/2012/10/04/harassment-report-at-your-conference-what-do-you-do/.

I take it we aren’t cute enough for you?

This article originally appeared on Geek Feminism.

A few times within the lifetime of this blog, there’s been a major emergency in geekdom: a geek girl has needed a confidence boost.

I hear you cough. Someone just said “geek girl” on Geek Feminism, the home of “ahem, geek women, THANK YOU”?

No really, I mean it, a geek girl. A prepubescent girl has been bullied or heard some gender essentialist crap, and a call to arms goes out. The best known is probably Katie Goldman, the then seven year old whose mother wrote in November 2010 that Katie was being bullied for liking Star Wars, a boy thing:

But a week ago, as we were packing her lunch, Katie said, “My Star Wars water bottle is too small.  It doesn’t hold enough water.  Can I take a different one?”  She searched through the cupboard until she found a pink water bottle and said, “I’ll bring this.”

I was perplexed.  “Katie, that water bottle is no bigger than your Star Wars one.  I think it is actually smaller.”

“It’s fine, I’ll just take it,” she insisted.

I kept pushing the issue, because it didn’t make sense to me.  Suddenly, Katie burst into tears.

She wailed, “The first grade boys are teasing me at lunch because I have a Star Wars water bottle.  They say it’s only for boys.  Every day they make fun of me for drinking out of it.  I want them to stop, so I’ll just bring a pink water bottle.”

Katie’s story went viral including at the official Star Wars blog and a year later CNN reported that at GeekGirlCon when a brigade of Storm Troopers formed an honor guard for Katie, and that there’s an annual Wear Star Wars day as a result.

We had our own smaller burst of geek support on the Geek Feminism blog in May this year, for five year old Maya, who was turning away from her love of cars and robots. 170 comments were left on our blog for Maya, second only to Open Letter to Mark Shuttleworth (200 comments) in our history. In addition, it wasn’t an especially difficult thread to moderate as I recall: a few trolls showed up to tell Maya goodness knows what (sudo make me a sandwich LOL?) but in general people left warm, honest, open stories of their geek life for Maya.

Here’s something I was struck by: when I tweeted about Maya’s post, back in May, I saw replies from men saying that they were crying (with joy, I assume!) about the response to Maya. I have to say I do NOT see a lot of admitted crying about other posts on our blog, no matter how positive or inspirational. (People love the existence of the Wednesday Geek Women posts, but they are consistently our least read and commented on posts.) Or crying about stories that are negative and horrifying either.

It’s going to be hard to stand by a statement that I don’t begrudge Katie and Maya their outpouring of support, but: I don’t begrudge Katie and Maya their outpouring of support. I don’t think they should have less of it.

… but I think geek women and other bullied or oppressed geeks should have more.

Thus I do want to ask why girls? Why do we not have 170 comments on our blog reaching out to women who are frustrated with geekdom? I want to get this out in the open: people love to support geek girls, they are considerably more ambivalent about supporting geek women.

I’ve compared harassment of adults with bullying of children before: they have a lot in common. What they don’t seem to have in common is a universal condemnation from geekdom: bullying children? Totally evil*. Harassing adults? Eh… evil, except you know, he’s such a great guy, and he hasn’t got laid in a while, and (trigger warning for rapist enabling) he does have the best gaming table, so what are you gonna do, huh?

There are a number of reasons, I know, even aside from the (provocative!) title of the blog post. Some of them are more sympathetic than others:

  • Talking to adults about overcoming difficulties is harder. There can’t always be as much optimism or tales of It Gets Better. For some adults, that’s bullshit. (It’s not always true for children either and telling children this can be a disservice too, but it is more culturally comfortable.)
  • Adults are often angry when they’ve been mistreated. In this case, feminists are often angry. It’s harder to engage with angry people. They (we) are less appealing. We may not be grateful for your thoughts. Sometimes we pick them apart publicly if we don’t like them enough. And call you mean names.
  • When a child is bullied by another child, the bad guy is reassuringly definitely not you.
  • Children don’t talk back, or can’t. If an adult says that It Gets Better, the appropriate role for the child is to smile and look grateful. (This is also true of women when listening to men, but generally somewhat less so.)
  • Many of us are more familiar with the experience of being a bullied child than being a harassed or oppressed adult, and can be empathetic more easily.
  • We really really want to believe that things will be basically OK for Katie and Maya, even if they haven’t been for us and people we love.

There’s no easy answer. Many of us are very deeply invested in It Gets Better rhetoric, because the alternative is sure pretty sucky. But at the same time, if you’re doing one thing to stop gendered bullying this year, say, leaving the 170th supportive comment for a five year old girl, while kind, was probably not the single best use of your one thing. Join the fight. Make it better yourself. And, since you aren’t in fact limited to one thing, leave kind or supportive or co-signed righteously angry comments too, while you’re at it, and not only for children.

* At least, in the context of these discussions. I am far from believing that geeks are universally actively working to save children from bullying, nor that they are incapable of perpetrating child abuse.

Online harassment as a daily hazard: when trolls feed themselves

This article originally appeared on Geek Feminism.

Trigger warning for discussion of and graphic examples of threatening online harassment.

Seen s.e. smith’s post on blogging and harassment yet? You’re about to see it everywhere (on the social justice blogs) because it’s very powerful and true:

by the time I’d clocked around 20 threats, and was up to around 30 readers, I’d learned the art of triage. The quick skim to find out if there was any actually personal threatening information, like identifying details, or if it was just your garden variety threat with no teeth behind it. I kept them all in a little file in case I needed them later, and forwarded the worst to the police department, not in the belief they would actually do anything, but in the hopes that information would be there, somewhere, in case it was needed someday.

“I hope you get raped to death with a gorsebush,” one email memorably began. I gave the letter writer some style points for creativity, but quickly deducted them when I noted he’d sent it from his work email, at a progressive organisation. I helpfully forwarded it to his supervisor, since I thought she might be interested to know what he was doing on company time. “Thanks,” she wrote back, and I didn’t hear anything more about it. Several months later I attended a gala event the organisation was participating in and watched him sitting there on stage, confident and smug”¦

I was careful in all the ways they tell you to be, to make it difficult to find my house, for example, and most of the rape threats, and the death threats, the casual verbal abuse from people who disagreed with my stances on subjects like rape being bad and abortion being a personal matter, weren’t really that threatening in that they didn’t pose a personal danger to me, and I was rarely concerned for my safety. That wasn’t the point, though, which is what I told a friend when she got her first rape threat and called me, sobbing. I wished she’d been spared that particular blogging rite of passage, but unfortunately she hadn’t been.

“They want you to shut up,” I explained. “That’s the point of a rape threat. They want to silence you. They want you to shrink down very small inside a box where you think they can’t find you.”

And it works. I see it happening all the time; blogs go dark, or disappear entirely, or stop covering certain subjects. People hop pseudonyms and addresses, trusting that regular readers can find and follow them, trying to stay one step ahead. Very few people openly discuss it because they feel like it’s feeding the trolls, giving them the attention they want. Some prominent bloggers and members of the tech community have been bold enough; Kathy Sierra, for example, spoke out about the threats that made her afraid to leave her own home. She’s not the only blogger who’s been presented not just with vicious, hateful verbal abuse, but very real evidence that people want to physically hurt her, a double-edged silencing tactic, a sustained campaign of terrorism that is, often, highly effective.

[That is a relatively short excerpt, read the whole thing.]

I think it’s time to take a look at the reflexive “don’t feed the trolls” advice, frankly.

It was developed, I think, for Usenet (at least, the earliest known usage of the term ‘troll’ in this sense is from alt.folklore.urban in 1992, which suggests that that formulation probably originates similarly), and was adopted by email lists and blogs in due course. I’ve always been suspicious of it in the case of forums like email lists where messages can’t be recalled: some people implement it as just leaving the troll to continue sending messages into the void – except that it’s not a void. Experienced people may have blocked the troll, inexperienced people are there to be frightened either specifically by the troll or by the apparent unremarkableness of the troll’s behaviour. (This is one of the reasons I am less and less on-board with the free software community’s continued preference for public mailing lists. I like my email client a lot too, but I like spaces where harassment can be removed quickly from all reader’s view more.)

There’s certainly some wisdom in “don’t feed the trolls”. Consider for example Gavin de Becker’s advice in The Gift of Fear: if you, say, return harassing phone calls on the 50th time, you’ve only taught your harasser that they need to call 50 times to get a response. They need to learn that they cannot reach you, that there is nothing they can do to make you reply to them.

So far it seems sensible, but what it doesn’t account for is having multiple harassers, who either may not be aware of each other or who may be actively encouraging each other and coordinating attacks (via hate blogs or forums or the more wildcard ‘lulz’ variants thereof). It’s not so clear there that en masse silence is a useful strategy, it varies by case, and the off-hand use of the “everyone knows that you don’t feed the trolls!” wisdom that was (arguably) effective in the case of lone trolls is in effect a message to people being targeted for harassment by a coordinated group, or who have a number of individual harassers, that no one gives a shit. Don’t talk about it, we don’t care about your problems.

It also means that we are continually surprised by the size and scope of the problem. Death threats? With your address attached? Weekly? This is a problem not only because of the continuing coziness of the “yeah right, never happens to me” crowd, but because we often aren’t sharing information among targets.

It’s not just you.

It’s not just you.

Every single time, there is someone who has been hurt by thinking it’s just them.

I by no means advocate compulsory reporting of harassment, in fact I am very strongly committed to empowering survivors by allowing them a coercion-free space to do whatever the hell they please in terms of reporting or not. But “don’t feed the trolls” isn’t any more coercion-free than “stop hir hurting someone else! report now!” The coercion is this: thirty years of Internet are saying keep this to yourself, damn you (stop hir hurting someone else)!

Thirty years of Internet, per above, don’t have the whole story.

This scale of harassment of bloggers also brings us into a realm where people without the financial resources of celebrities to, eg, pay Gavin de Becker’s people to read their mail for them and alert them only to genuine immediate threats, have to deal with the same scale of harassment. This isn’t totally new to the Internet (being, eg, the family member of someone who has either committed or been the victim of a well-publicised unusual crime, has long attracted the same kind of attacks) but it is hard enough for rich powerful people to protect themselves mentally and physically from this level of hostile attention, let alone people with the typical resources of a social justice blogger (generally relatively privileged yes, able to afford state-of-the-art personal security, no).

On that, I’m honestly not sure what to do except that it scares me. There appears to be no known effective defence against sufficiently many motivated harassers. There doesn’t even appear to be a lot of giving a toss about it.

Update: Hey folks, on reflection I realise that my last paragraph kind of invites advice, but it’s probably safe to assume that if you’ve thought of doing X in response to trolls that so have people like s.e. smith, and either X is in their arsenal, it doesn’t work, or it isn’t reasonably possible for them (that is the cost-benefit trade-offs don’t favour it).

Responses from people with unusual expertise on personal security or on community management and similar areas giving facts advice or facts might be useful, but if your expertise is “average experienced netizen” please step back and give people affected a chance to talk.