Objects in Flux - RMIT Research Repository - RMIT University
Objects in Flux - RMIT Research Repository - RMIT University
Objects in Flux - RMIT Research Repository - RMIT University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
6.10 Tactics of use<br />
Operat<strong>in</strong>g with<strong>in</strong> a highly controlled environment,<br />
hackers and modders are forced to adopt a<br />
‘tactical’ approach. Where commercial strategies<br />
are capable of produc<strong>in</strong>g, tabulat<strong>in</strong>g and impos<strong>in</strong>g<br />
spaces, ‘tactics’ can only use, manipulate and<br />
divert these spaces. As de Certeau states, tactics<br />
‘rema<strong>in</strong> dependent upon the possibilities offered<br />
by circumstance’ but they ‘do not obey the law<br />
of the place, for they are not def<strong>in</strong>ed or identified<br />
by it’ (1984, p. 29). Like the practice of guerilla<br />
warfare, the tactic resists from with<strong>in</strong>. Unable<br />
to claim a space as their own, the user traverses the consumer environment,<br />
negotiat<strong>in</strong>g their own path through the dom<strong>in</strong>ant logic of<br />
normalized use.<br />
In the text ‘de Certeau and Foucault: Tactics and Strategic Essentialism’,<br />
Claire Colebrook claims that ‘a tactic works metaphorically:<br />
rather than return<strong>in</strong>g the logic to some ground, it th<strong>in</strong>ks the logic from<br />
a different po<strong>in</strong>t of view’ (2001, p. 546). Although the tactic cannot<br />
hope to defeat the system it <strong>in</strong>habits, it is not contiguous with this system.<br />
Through the gap offered by metaphor, the tactic figures the world<br />
differently; it plays the game, but to a different end. Follow<strong>in</strong>g are<br />
four examples that may be regarded as tactical responses to dom<strong>in</strong>ant<br />
models:<br />
• A popular hobbyist t-shirt produced by O’Reilly Media proclaims<br />
‘Void your warranty, violate a user agreement, fry a circuit, blow a<br />
fuse, poke an eye out…’ 15 Here, the dom<strong>in</strong>ant logic that positions<br />
hack<strong>in</strong>g and modd<strong>in</strong>g as dangerous and foolish is turned on its<br />
head: ‘dangerous and foolish’ are claimed as positive traits.<br />
• As football crowds disrupt Cliff W<strong>in</strong>s’s private life, W<strong>in</strong>s’s alter –<br />
ego Maduncle makes a game of the situation, figur<strong>in</strong>g an alternate<br />
world of zombies and heroes. Action that, <strong>in</strong> another light, may be<br />
confrontational becomes playful. 16<br />
• While Apple Inc. regards the redistribution of its repair manuals as<br />
a form of theft, Marion Bates establishes a website that positions<br />
this act as a gift.<br />
•<br />
And, <strong>in</strong> possibly the most dramatic and wide-reach<strong>in</strong>g example,<br />
Stategies of Control and Tactics of Use<br />
[Figure 6-10]<br />
Text from Make magaz<strong>in</strong>e t-shirt,<br />
2010. Image Make Media.<br />
15/ Similar sentiments are preva-<br />
lent <strong>in</strong> onl<strong>in</strong>e discussions where user<br />
signatures <strong>in</strong>clude tagl<strong>in</strong>es such as ‘If<br />
it a<strong>in</strong>’t broke, Mod it till it is’. http://<br />
www.bp6.com/board/viewtopic.<br />
php?t=1471 accessed 15 February<br />
2011.<br />
16/ See Chapter 5: Tell<strong>in</strong>g Stories.<br />
119