Skip to main content
Log in

What would a feminist open source investigation look like?

  • Original Article
  • Published:
Digital War Aims and scope Submit manuscript

Abstract

Use of publicly available information to offer radical retellings of violence has powerful democratising potential, both in terms of who contributes to open source investigations and whose stories they centre. At a time when trust in government, media institutions and non-government organisations as fact bearers has been eroded, emergent open source methods have become “an alternative set of truth practices” (Weizman in Open Verification, e-flux, 2019). Yet there are few accepted guidelines on what is legally, morally, or ethically permissible in such investigations. A growing question among practitioners using open source techniques in human rights investigations is not “Can we do this?” but “Should we be doing this?” Here, we set out why intersectional feminist thought should be considered when grappling with the radical possibilities and serious ethical challenges of open source investigations. To this end, we offer practical examples of how an investigator might better situate their findings, show their workings, design for ambiguity, practice equity in attribution, and find new ways to care for themselves and others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Notes

  1. A 2018 investigation by Syrian Archive and Knack into the shipment from Europe to Syria of chemicals that can be used to produce chemical weapons resulted in the conviction of three Belgian companies that had violated EU sanctions law as well as an internal audit of the Belgian customs system. In 2019, Syrian Archive alongside TRIAL International and the Open Society Justice Initiative filed criminal complaints with prosecutors in Germany and Belgium to request that they open further investigations into the role of European companies in separate shipments of chemicals to Syria via Switzerland, which at the time had not been subject to EU sanctions. The requests were evidenced by open source information collected by the Syrian Archive. To date, the Syrian Archive has collected 3,578,591 digital records, of which 651,322 it has analysed and 8249 it has verified (J Deutch 2020, personal communication, 4 March; Havlik 2019).

  2. Doxxing is searching for and publishing identifying information about someone, typically with malicious intent to threaten, silence or do real harm (Rahman and Ivens 2020).

  3. For the original source of the definition see ‘Social justice impact of archives: A preliminary investigation’ by Wendy M Duff, Flinn, Karen Emily Suurtamm, David A Wallace (Duff et al. 2013).

  4. For a critique of intersectional feminism see ‘Why I’m giving up on intersectional feminism’ by Gordon (2018).

  5. For more on missing data see the work of the Nigerian-American artist and researcher, Mimi Onuoha. (Onuoha 2018).

  6. In the UK in 2019, on average in journalism women earned 11.2% less than men and held 40% of jobs; in programming and software development female professionals earned 6.8% less than male professionals and held only 12% of jobs; in information technology female professionals earned 7.1% less than male professionals and held 18% of jobs. The same cannot be said for law, another field that open source investigators work in. In 2019, female legal professionals held over half of all jobs yet earned on average 16.8% less than their male peers (Smith 2019).

  7. One of the leaders of the discussion around ‘harm reduction’ has been Alexa Koenig at the Human Rights Center at the University of Berkeley, California.

  8. The Argentine Forensic Anthropology Team notification protocol includes “the compilation, data verification, and review of all case materials prior to scheduling a notification; the completion of an integrated, multidisciplinary identification report in the family’s language; risk assessment of the family receiving a notification, be it health related or threat from other persons; conducting the notification in person with the family; providing psychological and medical support; and explaining the repatriation process, among others”

    (Solís et al. 2016).

References

Download references

Acknowledgements

The article is a direct response to an earlier article by Catherine D’Ignazio titled, “What would feminist data visualization look like?”, which became the book, “Data Feminism”, co-authored with Lauren F. Klein. Some of the structure of the original article by D’Ignazio has been retained. The article also draws on ideas discussed in the book chapter on ‘Ethics in Open Source Investigations’ by Zara Rahman and Gabriela Ivens for, Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability. Special thanks to the generosity of our reviewers (in alphabetical order): Leenah Bassouni, Rebecca Echevarria, Alexa Koenig, Martyna Marciniak and Zara Rahman. Many thanks as well to Piper Haywood for copy editing and reviewing. The article was community reviewed by members of the nascent Feminist Open Source Investigations Group. Thanks to Matthew Battles, Jeff Deutch and Robert Trafford for their insights during the research process.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sophie Dyer.

Appendix

Appendix

A list of the digital guides, protocols and codes of conduct used in the research for this article, including those not given as examples in the main text.

  • Association for Progressive Communications

  • ‘Feminist Principles of The Internet’, 2016

  • feministinternet.org

  • The Argentine Forensic Anthropology Team (Equipo Argentino de Antropología Forense)

  • ‘Identification Notifications and Their Applicability to Families of Missing Migrants’, 2016

  • theforensicbordercoalition.files.wordpress.com/2016/10/aafs-2017-abstract-osorno.pdf

  • Amnesty International, Citizen Evidence Lab

  • ‘Well-being’, n.d.

  • citizenevidence.org/category/method/well-being

  • The Human Rights Center at the University of Berkeley, California

  • ‘International Protocol on Open Source Investigations (Berkeley Protocol)’, forthcoming

  • humanrights.berkeley.edu/programs-projects/tech-human-rights-program/open-source-investigations-protocol

  • Civic Laboratory for Environmental Action Research (also known as CLEAR)

  • ‘Equity in Author Order’, 2016

  • civiclaboratory.nl/2016/05/23/equity-in-author-order

  • ‘Guidelines: Designing Equitable Scientific Tools’, 2017 civiclaboratory.nl/2017/04/26/clear-guidelines-for-designing-equitable-scientific-tools

  • ‘How to Run a Feminist Science Lab Meeting’, 2017

  • civiclaboratory.nl/2017/03/31/how-to-run-a-feminist-science-lab-meeting

  • DART Centre for Journalism and Trauma

  • ‘Handling Traumatic Imagery: Developing a Standard Operating Procedure’, 2017

  • dartcenter.org/resources/handling-traumatic-imagery-developing-standard-operating-procedure

  • Data and Society

  • ‘How to Cite Like a Badass Tech Feminist Scholar of Color’, 2019

  • points.datasociety.net/how-to-cite-like-a-badass-tech-feminist-scholar-of-color-ebc839a3619c

  • Design Justice Network

  • ‘Design Justice Network Principles’, n.d.

  • designjustice.org/read-the-principles

  • The Engine Room

  • ‘Ties That Bind: Organisational Security for Civil Society’, 2018

  • theengineroom.org/civil-society-digital-security-new-research

  • ‘Investigative Web Research’, 2017

  • library.theengineroom.org/investigative-web-research/

  • ‘Technology Tools in Human Rights’, 2017

  • theengineroom.org/wp-content/uploads/2017/01/technology-tools-in-human-rights_high-quality.pdf

  • Eyewitness Media Hub

  • ‘Making Secondary Trauma a Primary Issue: A Study of Eyewitness Media and Vicarious Trauma on the Digital Frontline’, n.d.

  • eyewitnessmediahub.com/research/vicarious-trauma

  • First Draft

  • ‘Journalism and Vicarious Trauma: A Guide for Journalists, Editors and News Organisations’, 2017

  • firstdraftnews.org/wp-content/uploads/2017/04/vicarioustrauma.pdf?x32994

  • Global Open Science Hardware

  • ‘GOSH Manifesto’, n.d.

  • openhardware.science/gosh-manifesto

  • ‘GOSH Code of Conduct, 2017’

  • openhardware.science/gosh-2017/gosh-code-of-conduct

  • International Organization for Migration

  • ‘Fatal Journeys Volume 3 Part 1: Improving Data on Missing Migrants’, 2017

  • publications.iom.int/system/files/pdf/fatal_journeys_volume_3_part_1.pdf

  • OS4HR

  • ‘Digital Accountability Symposium: Whose Stories Get Told, and by Whom? Representativeness in Open Source Human Rights Investigations’, 2019

  • opiniojuris.org/2019/12/19/digital-accountability-symposium-whose-stories-get-told-and-by-whom-representativeness-in-open-source-human-rights-investigations

  • Privacy International

  • ‘Reclaiming Privacy: A Feminist Manifesto’, 2019 privacyinternational.org/news-analysis/2458/reclaiming-privacy-feminist-manifesto

  • ‘From Oppression to Liberation: Reclaiming the Right to Privacy’, 2018 privacyinternational.org/sites/default/files/2018-11/From%20oppression%20to%20liberation-reclaiming%20the%20right%20to%20privacy.pdf

  • Public Lab

  • Public Lab Code of Conduct, 2016

  • publiclab.org/notes/Shannon/07-06-2016/public-lab-code-of-conduct

  • Trans*H4CK

  • Trans*H4CK Code of Conduct, n.d.

  • transhack.org/code-of-conduct

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dyer, S., Ivens, G. What would a feminist open source investigation look like?. Digi War 1, 5–17 (2020). https://doi.org/10.1057/s42984-020-00008-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s42984-020-00008-9

Keywords

Navigation