03.07.2013 Views

Objects in Flux - RMIT Research Repository - RMIT University

Objects in Flux - RMIT Research Repository - RMIT University

Objects in Flux - RMIT Research Repository - RMIT University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.10 Tactics of use<br />

Operat<strong>in</strong>g with<strong>in</strong> a highly controlled environment,<br />

hackers and modders are forced to adopt a<br />

‘tactical’ approach. Where commercial strategies<br />

are capable of produc<strong>in</strong>g, tabulat<strong>in</strong>g and impos<strong>in</strong>g<br />

spaces, ‘tactics’ can only use, manipulate and<br />

divert these spaces. As de Certeau states, tactics<br />

‘rema<strong>in</strong> dependent upon the possibilities offered<br />

by circumstance’ but they ‘do not obey the law<br />

of the place, for they are not def<strong>in</strong>ed or identified<br />

by it’ (1984, p. 29). Like the practice of guerilla<br />

warfare, the tactic resists from with<strong>in</strong>. Unable<br />

to claim a space as their own, the user traverses the consumer environment,<br />

negotiat<strong>in</strong>g their own path through the dom<strong>in</strong>ant logic of<br />

normalized use.<br />

In the text ‘de Certeau and Foucault: Tactics and Strategic Essentialism’,<br />

Claire Colebrook claims that ‘a tactic works metaphorically:<br />

rather than return<strong>in</strong>g the logic to some ground, it th<strong>in</strong>ks the logic from<br />

a different po<strong>in</strong>t of view’ (2001, p. 546). Although the tactic cannot<br />

hope to defeat the system it <strong>in</strong>habits, it is not contiguous with this system.<br />

Through the gap offered by metaphor, the tactic figures the world<br />

differently; it plays the game, but to a different end. Follow<strong>in</strong>g are<br />

four examples that may be regarded as tactical responses to dom<strong>in</strong>ant<br />

models:<br />

• A popular hobbyist t-shirt produced by O’Reilly Media proclaims<br />

‘Void your warranty, violate a user agreement, fry a circuit, blow a<br />

fuse, poke an eye out…’ 15 Here, the dom<strong>in</strong>ant logic that positions<br />

hack<strong>in</strong>g and modd<strong>in</strong>g as dangerous and foolish is turned on its<br />

head: ‘dangerous and foolish’ are claimed as positive traits.<br />

• As football crowds disrupt Cliff W<strong>in</strong>s’s private life, W<strong>in</strong>s’s alter –<br />

ego Maduncle makes a game of the situation, figur<strong>in</strong>g an alternate<br />

world of zombies and heroes. Action that, <strong>in</strong> another light, may be<br />

confrontational becomes playful. 16<br />

• While Apple Inc. regards the redistribution of its repair manuals as<br />

a form of theft, Marion Bates establishes a website that positions<br />

this act as a gift.<br />

•<br />

And, <strong>in</strong> possibly the most dramatic and wide-reach<strong>in</strong>g example,<br />

Stategies of Control and Tactics of Use<br />

[Figure 6-10]<br />

Text from Make magaz<strong>in</strong>e t-shirt,<br />

2010. Image Make Media.<br />

15/ Similar sentiments are preva-<br />

lent <strong>in</strong> onl<strong>in</strong>e discussions where user<br />

signatures <strong>in</strong>clude tagl<strong>in</strong>es such as ‘If<br />

it a<strong>in</strong>’t broke, Mod it till it is’. http://<br />

www.bp6.com/board/viewtopic.<br />

php?t=1471 accessed 15 February<br />

2011.<br />

16/ See Chapter 5: Tell<strong>in</strong>g Stories.<br />

119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!