The Journal of Peer Production - New perspectives on the implications of peer production for social change New perspectives on the implications of peer production for social change
Reviews (Anti-colonial hacking) image

Review A

 Reviewer: Anonymous
 
1. Is the subject matter relevant?
Relevant to what? This is a poorly posed question.

2. Is the treatment of the subject matter intellectually interesting? Are there citations or bodies of literature you think are essential to which the author has not referred?
Yes, it is intellectually interesting, though marginally so. Much of what is said here was already covered in Garrett and Edwards. I am not sure the framework of “anti-colonial hacking” is much different from what they wrote, but the author has interviewed Tim Jenkin and re-covered some of that ground with a somewhat different angle.

Mostly this article simply restates and reframes existing accounts. The author  overstates the originality of his/her contribution (“the untold story…”).

3. Are there any noticeable problems with the author’s means of validating assumptions or making judgments?
The new empirical contribution of the article is another interview with Tim Jenkin, who has already written up his own experience and has been interviewed at length many times before. Apart from that, there’s no attempt to validate claims with anything other than the existing secondary literature – no new archival or interview material. The author does not question Jenkin’s account (but also has no reason to do so).

4. Is the article well written?
No. This article is riddled with typos, misspelled names (Garrets, many others), misspelled or inaccurate titles of books and articles, impossible dates (Frantz Fanon 2011???), and bad grammar. It needs a serious once-over from a better writer, and much better attention to detail.

5. Are there portions of the article that you recommend be shortened, excised or expanded?

Suggestions for improvement:
1) Serious attention to quality of writing and to getting names, dates, titles, and other details correct. (2) Reposition the article as an extension or reframing of existing accounts, rather than an “untold story” with a truly new perspective. Don’t overstate what’s new here. I am not sure this article will warrant publication even after that.

Review B

Reviewer: Anonymous
 
1. Is the subject matter relevant?

2. Is the treatment of the subject matter intellectually interesting? Are there citations or bodies of literature you think are essential to which the author has not referred?
No

3. Are there any noticeable problems with the author’s means of validating assumptions or making judgments?
The article’s subject matter and area of research are very interesting, and as a case study of hacking practices by South African anti-apartheid activists in the 1980s, it is compelling and could certainly contribute meaningfully to new work that considers the history of politicization of hacker communities in the 20th Century, which have focused on hacker networks in the US and Europe. The main problem with the article is in the balance between the scale of the study and the scale of its claims. It acknowledges it is a “case study” of a particular hacker network in S. Africa, but seeks to make claims of anti-colonial hacking globally. And while this is an ambitious and very welcome move, the empirical material that the author brings to his/her argument don’t amount to a persuasive case. It’s unclear what connection this case of anti-colonial hacking and the key values the author delineates — of collectivism, autonomy, the assemblage of a set of technology, literacy and the inclusion of women as key values — has to other  global cases of hacking practiced in widely diverse calls for “anti-colonial” interventions. This might include Anonymous’ global network, hackers in Palestine against Israeli occupation and Latin American indigenous activists, but it might *ALSO* include the digital tactics and hacking practices of ISIS, hackers in China working against Western hegemony, or in North Korea, among other cases. It should be noted that the author does acknowledge that the paper “only focuses on one case study to illustrate the concept of anti-colonial hacking” as a “shortfall” to the paper’s larger claim.  Also, the empirical material presented also seems to fall slightly short of flushing out the author’s larger claims. While the second part of the paper dedicates itself to unpacking 5 key values of anti-colonial hacking that the author delineates — of collectivism, autonomy, the assemblage of a set of technology, literacy and the inclusion of women as key values — not all 5 draw from or are linked to the empirical or historical material presented from the study of Operation Vula. More balance and use of the empirical data/material is needed here to ground the study.

4. Is the article well written?
Yes, generally.

5. Are there portions of the article that you recommend be shortened, excised or expanded?
Aside from the other above mentioned recommendations, more work might be done early on in the paper to frame the dominant narrative and acknowledge cultural histories around Operation Vula. While the author mentions that such work exists and focuses on the biography of the players, little else is referenced about how that group is remembered among South African publics, local or global activists and hackers, etc. We know that they *do* appear to be remembered, in the quote given of Nelson Mandela’s public recognition of the group – but what is remembered of them among other publics, where the participants live now, and what the author how the recent interviews he’d conducted relate to prior reports (and if anything novel or unexpected was actually heard in such interviews), would be key to situate the reader. More work might also be done to connect Operation Vula to other specific cases of networked hacktivism and crytpographers past and present.

Suggestions for improvement:
Overall, a generally stronger use/more balanced use of empirical material collected, stronger framing of Operation Vula against other global cases of past/present networked activism; stronger framing of historical work already done around Operation Vula and how this work contributes; and most importantly, to adjust the scale and level of the claim being made. This case study should aim to unpack the values central to *THIS* particular case of anti-colonial hacking, rather than make claims for all possible global cases of anti-colonial hacking writ large.

Review C

 Reviewer: Anonymous
 
1. Is the subject matter relevant?
Yes, both in respect of the special issue theme and more generally the question of the “peer economy” as brought forward by JOPP

2. Is the treatment of the subject matter intellectually interesting? Are there citations or bodies of literature you think are essential to which the author has not referred?
The subject matter is treated is intellectually interesting, there are some bodies of literature that could be revised, but I made specific suggestions as part of the comments on the text itself.

3. Are there any noticeable problems with the author’s means of validating assumptions or making judgments?
would suggest the authors to give us more “data”, and to further separate what sHe deduces from the data first, and then to relate these analytical insights to the literature. See my comments on the use of Fanon specifically.

4. Is the article well written?
There are a couple of phrases that are not clear for me, but otherwise the text is well organized and fluent.

5. Are there portions of the article that you recommend be shortened, excised or expanded?
Not specifically, I would suggest a longer conclusion, again see my comments in the text itself.

Suggestions for improvement:
I have added all my suggestions as part of the comments in the text. I believe these are substantial but not major changes.  Suggestions are mostly of four kinds:

  • Expand the literature used in the references, in particular the authors who have worked on the relation of communication technologies and social revolution.
  • Reconsider the dichotomy between “Western hacking” and “post-colonial hacking” especially since, as the authors stresses, all the people sHe talked to are white.
  • Provide a section on the way in which an STS perspective brings something necessary to the description of the case study, at this point is not clear, in particular see the comments on the “embedded politics” of communication technology in the case of post-colonial communication networks in South Africa.
  • Check the structure of a number of phrases and the use of some terms, see the comments in the article.