(P3): Advocacy with Groups of Persons and Families

A group of adult citizens engaging in a public conversation at a Santa Cruz library.

Usually it is easier to produce systems change through advocacy with a group that has related advocacy goals. It is easier to destabilize a weak constraint in the system if there are several similar but somewhat different ways for the system to lose control of the destabilized constraint. A standard model of this process might involve eliminating a segregated classroom by arguing that each student in the class has a right to an integrated educational experience and doing this through a group collaboration.

Each student can pursue a separate action to move to an inclusive environment, since the typical reason why a system would segregate a group of students is to reduce the costs of similar supports for these different students. If the system loses even one of these advocacy initiatives, they will have to provide the supports outside the cheap classroom, and they will have to absorb the cost of the hearings that advocacy triggers. So, 6 students can mean 6 hearings, six separate hearing costs (maybe $20,000 each). It is cheaper in the long run to develop a model that provides the supports that would be ordered in a hearing result.

Also, systems have developed methods to isolate single family advocacy efforts by demeaning their competence, educational knowledge, purposes, impact on other students, and so on. These tools are far less usable when there is a group of similar advocacy efforts.

A group with a common purpose forms a temporary complex adaptive system (CAS). This purpose is the governing constraint and frames a set of possibilities that the group will explore as it moves toward a valued outcome in their work.

In addition, a group with a purpose can more easily pursue destabilization of many additional weak constraints that are part of the system. Political activities, public relations, educational initiatives, public policy planning, and many other possibilities for advocacy are much more feasible in a group.

Creative Commons Attribution 4.0 International License

(P3): Advocacy with Individuals and Families

Cartoon of IEPC with school staff explaining the legalese poorly without providing any real information and the parents obviously confused

There is a standard way to advocate on behalf of an individual or that person and the family. The weak constraint in this standard scenario is ordinarily a set of rules regulating the target’s interaction with individuals, commonly described as individual rights. There will be one form or another of negotiation over customized supports for the person, and a set of rules for how supports are developed and implemented. There is typically a complaint system, an appeals system, and a fair hearing system to organize the process of resolving disagreements.

The ordinary reality of negotiation in this kind of weak constraint is that the target tries to manage the negotiation process by discouraging family or individual involvement, making the entire negotiation as complex and intimidating as possible, not providing support to the person or the family about how to use the regulatory framework of the support system, offering an existing support even if it clearly doesn’t provide the customization needed to actually succeed, framing the request for supports as an individual unrealistic demand rather than a system problem, using the argument of policy or practice to claim that the request is invalid, threatening the family or individual with punishment, repeated use of the strategy of denial, followed by pulling back on the denial at every successful advocacy step, and so on, and so on, and so on. All these tactics are designed to restore the constraint to its past usual managed cycle.

When we successfully destabilize this constraint management approach, on the other hand, the system must do things that it ordinarily does not do (our destabilizing of the weak constraint is enabling). This requires the target to commit resources (funding, expertise, staff and administrator time) to non-normal workflow. The target makes a judgement about whether they can contain the destabilized constraint or not. Under the impact of the destabilization, it is this judgment that advocacy tries to manage.

If the destabilization is successful, and the advocated change occurs, the target accommodates the change and remodels the destabilized weak constraint so that it is moved back to a predictable cycle.

To get some of the depth of this advocacy framework, think of the difference between a pick-up game of basketball, baseball, soccer, etc. by a bunch of 10year-old kids. They set all the rules, make all the ethical judgments, preserve competition in a way they believe to be fair. Also, though such a game seems to be a competitive one, it is in fact enabling, since the experience of the game by the participants develops social skills that the participants will use throughout their adolescence and adulthood. In a word, this kind of competition socializes the participants. This is the way that the basic successful advocacy pattern described above works.  At its best, it socializes the target system to be more responsive to the participants.

Now think through what happens to the kid’s “competition” when adults formalize their sports events over time and tie them ultimately to the behavior and constraints in professional sports (without the money). There is no enabling relationship. Every part of professional sports is engaged in a war with no ethics except those imposed from the outside. Money, fame, celebrity, and cult status are the only meaningful goals, none of which are enabling in any human way. While competition does not have to be winner-take-all (WTA), it has largely become that in every arena of adult behavior, far beyond the obvious example of professional sports.

The individual and family form a complex adaptive system, with the purpose of the advocacy forming the governing constraint on the CAS. When a family reaches out to an advocate, they are trying to enlarge the space of possibilities to increase the likelihood of a valued outcome.

Creative Commons Attribution 4.0 International License

(P3): Why you shouldn’t destabilize Strong Constraints

A collapsed bridged over a river in the summer

The effort to destabilize social groups and their relationships is currently everywhere, being used at every level of every human Complex Adaptive System (CAS) of any size. Mutual destabilization has become the way various parts of CAS politically relate to one another at a scale that was ordinarily reserved in the past for plagues, wars, and large-scale natural disasters.

Such destabilization is often justified on the grounds that once the destabilization is successful, a new era of prosperity and social value will automatically blossom. In psychology, this is referred to as magical thinking.

The only way a brittle CAS becomes simpler and more humanly useful (oriented to a valued human purpose) is through a collapse, though the collapse need not be total (apocalyptic). The real problem with using any method of destabilizing the governing constraints in a CAS is that there is no way to predict or control the actual outcome of successful destabilization since the whole point of WTA (winner-take-all) constraints is the way they allow creative exploitation to run wild. The social relationships that enabled successful outcomes will become competitive one person at a time, and there is no way to see how that breakdown will spread and change the CAS. Think of a novel infectious disease and how poorly we predict its spread (say, for example, tick-borne diseases).

There is no automatic rebooting. There is no way of assuring that the “better angels of our nature” will drive the dynamic of recovery, and many reasons to think it won’t be those “angels” that drive the resulting change. Instead, the recovery will reflect the second by second interactions of what remains, not what we think should replace the past system.

It took millennia for humanity to evolve enabling social/physical systems that reflected significant support for the system’s members. It took all this time to build individual social relationships that were oriented toward general social improvement (enabling). These relationships were hard to build and hard to maintain. Destabilizing them (which is the point of the methods described in the last slide and this one) will destroy those enabling weak constraints, and there is no telling what will result.

If you review the links above, you’ll find that all recovery from collapse always takes much, much longer than the collapse itself.

Creative Commons Attribution 4.0 International License

(P3): Destabilizing Strong Constraints

a balloon being pricked by a person's hand and collapsing

I have touched on these ideas earlier, but it is important to reframe them in the context of strong constraints. What follows is a story about how constraints develop and how they are destroyed.

For large CAS (like a state-organized society), the general pattern of strong constraint development can be thought of as starting from an authoritarian control system over subjects (think Egyptian Pharaohs). Over time, social relationships develop that make the CAS more efficient but undermine to totalitarian control that originally unified the state. This process in states used to take centuries to occur. This aspect of system aging has been sped up dramatically in the last couple of centuries.

These social relationships gradually become the central driver of the state society, and they become ensconced in meta-ideas like democracy or community. These relationships are “enabling” constraints because they allow groups of people to network in order to accomplish more complex, sophisticated outcomes.

Once the day to day operations have become more entirely dependent on local social relationships, the CAS is about as stable as it will get, and aging of the CAS will continue. Elites come to see the CAS as not allowing them to exploit it as easily as they once could (this perception has nothing to do with the number of assets they control). Which is to say that the increasing brittleness of the CAS as it ages is viewed as a loss of freedom by the subjects and a loss of power by elites.

In twentieth-century modernism, the idea of macro-change of an entire societal CAS evolved from the modernist belief that social reality was a machine and the arrogance that powerful superior human beings could control anything, reconstructing it to their liking. The early approaches  to manipulating governing constraints (strong constraints) clustered around two approaches:

  • Elites could take control of government power and restructure society to their liking.
  • The society could be entirely dismantled and rebuilt from scratch.

The Soviet system under Stalin is an example of the first, and the Pol Pot regime in Cambodia is an example of the second. Mao tried to blend both methods in his effort to remake China.

None of these approaches worked. They annihilated, each in their own way, the underlying social network of enabling weak constraints in the CAS they attacked and replaced enabling constraints with winner-take-all constraints. The outcomes were appalling.

Today, elites in nation-states and insurgents are once again trying to increase their control. The method they are using might be described as modernist lite. Actors have developed a wide range of destabilizing techniques that can be used to undermine a target and replace enabling constraints with winner-take-all (WTA) constraints.

One technique is to delegitimize the current leader. Any group who can get lots of people out in the streets over a relatively short period of time to call for resignation can likely accomplish that. This technique doesn’t guarantee that the replacement will support the insurgents, or that someone who does support the insurgents and replaces a current leader can change the CAS for the better.

A second technique (with an astounding number of variations) is to disrupt and destroy existing social relationships to undermine the political structure that currently exists for personal or political gain. Examples include:

  • Eliminating tolerance by demonizing cultural, ethnic, religious, and political beliefs.
  • Exaggerating the impact of targeted “enemies” to social order regardless of their actual impact.
  • Making a social difference of any kind illegal in law, culture, or policy.

And so on……

The point of these disruptive actions is to replace enabling relationships with WTA ones. These techniques are political weapons that ignore the reality of the loss of enabling social relationships that took, in some cases, centuries to build, and will revert the target of destabilization to a kind of competitive anarchy in which it is much more difficult to build stabilizing social relationships. Chaotic low-level war results, leading to one or another form of authoritarian control, and a dramatic loss of social, political, economic, and environmental action effectiveness, and personal freedom and choice.

Creative Commons Attribution 4.0 International License

(P3): How An Advocacy/Target System Evolves

The pattern problem: An example becomes a lesson; A lesson becomes a method; A method becomes a practice; A practice becomes a doctrine; A doctrine becomes death.

In 1981, I went to work for Michigan Protection and Advocacy Service as a field advocate in the counties around Michigan’s Thumb. About half of my work involved representing students and their families in special education disputes. Over the next four years, I got to observe first hand how my special education advocacy and the approach of the special education systems in my catchment area evolved. It was quite enlightening.

Initially, school districts viewed special education largely as a new program only partially paid for by the federal mandate (this remains true today). The important aspects of it to the district CAS were how to pay for it and what impact did it have on their previous model of education services. There was, early on, and continuing to this day, a constant source of tension between regular education and special education systems (SPED services receive roughly twice the funding per pupil than regular education receives). Demands by special education students for supports and services that were outside the ken of past education practice were either ignored or denied.

This framework was ripe for effective advocacy. In the first few years of special education advocacy, it was very easy to win programs, supports, and services because the district didn’t really think it had to do anything to win other than obstruct demands. Advocates had time to prepare, to deepen their understanding of the law at both Federal and State levels, and to become adept at using the state and federal rules in the negotiations.

This advantage, like all advantages in the competitive interaction between different CAS, didn’t last.

One set of changes that our effective advocacy triggered was a dramatic increase in the number of students and families that requested advocacy assistance. Since the MPAS budget didn’t increase based on demand, this resulted in less time and resources for pursuing advocacy outcomes. In turn, this made our interventions less effective, overall.

The other set of changes that our effective advocacy triggered was to be taken more seriously by the districts. They began to commit resources to fight our advocacy including, eventually, hiring attorneys on retainer to improve their obstruction.  This also meant that the cases would be more complex (basic failures of civil rights were avoided), requiring more time from advocates and less successful outcomes. The upshot of these various forces (including successful State efforts to eliminate large amounts of state funding for MPAS) was, over time, to dramatically reduce individual special education advocacy by our organization.

Similar shifts in response by the system took place at the State and Federal level. The current state of special education law is an extraordinarily rigid narrowing of the possibilities that seemed just over the horizon in the late ‘70s and early ‘80s. There have been some separate increases in advocacy effectiveness in ways other than the single student advocacy model of the early years, which I will talk about later.

This pattern of initial success followed by a slow steady reduction in advocacy effectiveness and the reduction of civil rights to rigid requirements is so common across all areas of disability rights that I think of it as a standard development pattern in the exercise of advocacy.

Creative Commons Attribution 4.0 International License

Part 3: Advocacy

A poster listing many names of PWD killed by their parents or caregivers; entitled Mourn for the Dead and Fight Like Hell for the Living. From ASAN

Advocacy is the active representation of interests. You can advocate on behalf of another, on behalf of yourself, on behalf of a network, or an entire community. You can work as an individual, in a group, professionally, or as part of a larger movement.

Advocacy is a framework for change, and since change admits of no boundaries, neither does advocacy.  Advocacy is not an end in itself, no matter how necessary or relentless it might seem.

You must embrace a personally and genuinely valued purpose to truly advocate. Otherwise, advocacy becomes just another kind of inauthentic political gaming.

I chose advocacy as the metaphor for changing complex adaptive systems, because most people have some understanding of the concept and because using that concept makes it easier to remember that changing a complex adaptive system (CAS) is for a valued purpose, not simply a logic model for obtaining a grant.

While advocacy can be used by anyone, it is a creature of great diversity. The most basic frame for advocacy is to threaten a target with more change than the target would experience if it accepted your claim for change.  Most basic advocacy negotiation entails this kind of trade-off for the target.

The target of advocacy can be almost any system from an individual to large bureaucracies, local governments, global coalitions. The target you choose is the one you believe can make the community interests you value real.

The trade-offs that frame any advocacy negotiation can also, and usually are, extremely varied and complex, and revolve more around constraints that might be destabilized than, say, for example, the simple cost of the advocacy demand. The cost can always be “managed” but forced change in the basic operating framework of the target is typically viewed by target systems as an existential crisis of some importance, and something to be strongly resisted.

If I tell you that the negotiations in a special education disagreement are mostly around the dimensions of expense and precedent for the school district if they agree to your demands, that doesn’t mean that there aren’t also highly personalized dimensions in every education advocacy process, for example.

These personal issues in what seems to be a procedural or legal negotiation are important to advocates because of how the personal impacts the value of the advocacy outcome. For the target system, there is no more powerful constraint that must be managed than the relationship the system has with individuals to whom it provides services. Systems don’t like customizing anything for anyone who is entitled to disturb their peace.  If you can sustainably change the obligations that any system has to the uniqueness of those it serves, you are creating an entirely different system, and deeply altering the purpose and behavior of that system.

In effect, learning to use, create, exploit, and leverage constraints is the heart of advocacy toward any target system.

While achieving a valued advocacy result requires the use of tools, don’t make the mistake of assuming that the tool is somehow sacred because it helps you to achieve the result you want. There is no holy path to advocacy success. There is only the uncertain struggle to make complex adaptive systems change.

Creative Commons Attribution 4.0 International License

(P2): A Weak Constraint as a Potential Insurgency

A painting of a medieval revolt. Many people and soldiers fighting one another.

Mostly, CAS (Complex Adaptive Systems) view both internally generated and externally driven encounters as disturbances or perturbations. For purposes of understanding how you can advocate for change in a CAS, I prefer to think of these triggers as insurgencies.

An adjacent possible is something you can do readily from where you are right now. Some insurgencies keep resurfacing, an indication of an adjacent possible.

There are always more adjacent possibles than you know. They are often weak constraints, and we tend to pick one, stick with it as our preferred novel change target, and fail to see the other possibilities lurking close by. Our ability to survey the possibilities of the uncertain world around us is encumbered by our automatic focus on the easiest possibility to perceive.

Insurgencies subvert by their mere existence. In fact, a traditional way to turn a weak constraint into an insurgency is to trigger a response from the Target CAS. This is part of the reason why they are so hard to eliminate. Failed insurgencies are typically replaced by changes that will also trigger a new set of possibilities and a new insurgency.

Subversion is always possible. There is no way to build a fortress that is impervious to an insurgency. In fact, I think it is reasonable to describe the ongoing human conflicts in every State in the last 7,000 years as an insurgent struggle for change and freedom against a status quo struggling to increase and preserve control.

So, an insurgency is a kind of constraint, and it can move from a “weak” constraint to a powerful force for change just because the target reacts to its disturbance.

Creative Commons Attribution 4.0 International License

(P2): Weak Signals as Weak Constraints

Drawn picture of black slaves fighting off white slavers trying to recapture them.

  • I think frugality drives innovation, just like other constraints do. One of the only ways to get out of a tight box is to invent your way out.
    -Jeff Bezos
  • The more constraints one imposes, the more one frees one’s self. And the arbitrariness of the constraint serves only to obtain precision of execution.
    -Igor Stravinsky 
  • Problems are hidden opportunities, and constraints can actually boost creativity.
    Martin Villeneuve

So, how do we use weak signals as a basis for changing Complex Adaptive Systems (CAS)? We must look carefully at the weak signal to understand how or if this signal represents a weak constraint, and what the constraint means to the Target CAS.

Earlier I pointed out that weak links buffer the wildness of CAS. This buffering is a form of constraint, and that’s why buffering works. The buffer acts a bit like the banks on a river, constraining the flow of the river without dictating the movement of individual water molecules.

Our usual understanding of system constraints mimics the beliefs of the homeless community and uber-rich communities. Constraints are barriers to the safety or freedom of these communities, and so they are eliminated. Successful elimination of such weak constraints makes those social communities brittle and hyper-responsive to small disturbances.

The image above is a drawing of the effect of the Underground Railroad during and around the Civil War. The Underground Railroad functioned as a weak constraint on the Southern Slave System It was largely ignored when it was small but was attacked (ineffectively) when it expanded and began to operate as a sign of the weakness of that Southern Slave System.

The Underground Railroad was more than a simple barrier. It actively forced the Southern Slave System to respond to it. In the same way, weak constraints do more than provide simple barriers to the system of which they are a part.

Target systems for our advocacy have many weak constraints that are a normal expected part of their day-to-day experience. They are usually ignored or tolerated because the behavior of the weak constraint is a small local cycle that doesn’t threaten the larger system’s normal behaviors. If the weak constraint begins to expand its impact on the larger system, it will trigger a response of some kind from the larger CAS.

In Part Three, I’ll talk more clearly about how we use weak constraints (and sometimes strong constraints) to produce advocated change in CAS.

Creative Commons Attribution 4.0 International License

(P2): Activism as Bricolage

Theatre showing Tosca with a phrase projected onto the screen curtain, 'Power is always temporary'

Bricolage is rightly viewed as one of the “Powers of the Weak”. Elites typically view power as something exerted by a predictable machine of propaganda, sanctions, and punishments, and they view insurgents trying to change this as working to replace their machine of power with some other one.

So, bricolage, used as a tool of subversion, misdirection, or organizing, is hard for elites to see, or target. This is especially true if the bricolage is used to solve a local problem.

The point of using bricolage rather than using the system is to avoid having the problem-solving bricolage subjected to the services logic of the system.  This system services logic includes assumptions of:

  • Spending scarce resources to detect fraud
  • Using “failure demand” as a tool for managing system work rather than actually providing the service
  • After an initial period of seeking out persons eligible for the support, gradually turning the point of the system increasingly toward denial of supports.
  • Etc.

Bricolage allows a more coherent connection between support purpose and behavior. This coherence is lost once the support is subjected to the support logic of the system.

Creative Commons Attribution 4.0 International License

(P2): So What Do We Do with Those Weak Signals

WhatToDoWithWeakSignals

First, we have to actually pay attention to them. Our default is to ignore them as unimportant. That means we have to have a way of making them stand out.  Most importantly, we have to conserve the meaning in the story of any weak signal instead of homogenizing that meaning or averaging it or abstracting it through ordinary statistical analysis. That is one of the strengths of SenseMaker. Its function is, first of all, to make raw weak signals stand out in a number of ways. We need to do the same.

Then, we have to ask ourselves about the value of the narratives we have acquired to support or undermine positive change. This isn’t simple to do. But our first order goal with these signals is to increase the ones that support positive change and decrease the ones that undermine it. Because these are weak signals, it is feasible for us to try out ways to do both of these in time frames that let us change our approach as we learn which weak signals we can effectively increase and decrease, and when we need to look at different initiatives to produce these outcomes.

The reason why this works at all in trying to change a CAS is that the cycle of experiment and evaluation is short. Such an approach respects the dispositional nature of CAS and doesn’t require us to use prediction and mechanical outcomes as the signs of progress.

Creative Commons Attribution 4.0 International License