Previously: Politics and Practices of Secrecy (part 1).
And this is part 2 of the notes i took during the Politics and Practices of Secrecy symposium which took place at King's College in London last month. My reports do not follow the schedule of the panels, nor do they cover all the talks. I'm just cherry picking the more interesting moments of the day. Part 1 focused on the art projects. This post is less uniform in its theme. Two of the presentations i enjoyed covered the representation of intelligence agencies in films and tv fiction. Another was about the influence that new forms of surveillance are having on the rise of home-grown ('home' being the U.S.A., the symposium was organised by the Institute of North American Studies) white extremist groups. And a fourth talk wondered if transparency could fix our democracy.
Let's start with Timothy Melley, Professor Affiliate of American Studies at Miami University and author of The Covert Sphere. Secrecy, Fiction, and the National Security State and of Empire of Conspiracy. The Culture of Paranoia in Postwar America.
In his talk, 'The Democratic Security State: Operating Between Secrecy and Publicity', Melley listed up a few numbers:
This secret world costs 8 billion dollars per year.
50,000 intelligence reports are written each year. Their volume is so large that most are never read.
The intelligence hides out in the open:
The complexity of this system defies description Lt Gen. (Ret.) John R. Vines
The U.S. covert state is a growing industry. It handles a huge number of secrets all over the country. It relies on democratic structures but acts like a shadow state that has its own territory and laws. It also support some film makers by lending helicopters needed for films that publicize the covert world. The reason for that is that the secret programme needs public approval.
What we know about the CIA comes from leaks but also from fiction. Our screens are awash with what Melley calls 'terror melodrama." One of his presentations slides even listed those films. Covert CIA operations are celebrated in books, films, games, tv series, etc. Earlier this year, the CIA, pleased with the way it is portrayed in "Homeland", invited the show's cast and producers to visit its headquarters in Virginia and have a discussion. Another example is when Michelle Obama presented the 2013 Best Picture award to Ben Affleck's Argo, a film adapted from CIA operative Tony Mendez's book The Master of Disguise and the 2007 Wired article The Great Escape: How the CIA Used a Fake Sci-Fi Flick to Rescue Americans from Tehran.
Keeping with the spy in entertainment theme, Matt Potolsky, Professor of English at University of Utah, looked at the representation of the NSA on tv and in cinema.
Fiction and films are often the only way the public can picture and judge for themselves the activities of intelligence agencies. FBI, KGB, CIA have often been presented in films. How about the NSA? According to Potolsky, the NSA never turned into real fictional tropes.
There have been more recent attempts to depict the activity of the massive NSA:
Mark Fenster, Professor at the Levin College of Law (University of Florida) and author of the book Conspiracy Theories: Secrecy and Power in American Culture. His talk was titled 'Secrecy and the Hypothetical State Archive.'
Fenster started by reminding us of a whistleblower of the early 1970s. Daniel Ellsberg was employed by the RAND Corporation when he not only read classified documents he wasn't supposed to open but also photocopied and released them to The New York Times and other newspapers. The Pentagon Papers, officially titled United States - Vietnam Relations, 1945-1967: A Study Prepared by the Department of Defense, were top-secret documents that charted the US' political-military involvement in Vietnam from 1945 to 1967.
There is now a trust in 'transparency' but, Fenster asks, Can transparency fix our democracy? Obama was elected to end Bush's secrecy. But the secrecy is now as deep as ever. If not deeper.
But Fenster says, information leaks. Sometimes from the top, sometimes from the bottom. Sometimes drop by drop, sometimes it flows.
It is particularly tricky to control State information. If you think about the model of communication Sender-Message-Receiver, the Sender would be the State, the Message is state information and the Receiver is the public.
The state is organizationally complex, it is spatially deployed, it is enclosed in buildings, offices. In truth, it is a mess that is difficult to keep shut.
State information is difficult to perceive clearly, it is a vast amount of information, it is hard to archive and to control its release. Sometimes state information can leak by mistake.
The public is made of individuals and they will have their own interpretation of any information released.
In brief, information cannot be controlled, on any level.
According to Fenster, the revelation of a secret often offers marginal gains. It certainly doesn't lead necessarily to a reformed democracy.
Another talk i found very informative was the one by Hugh Urban, professor of religious studies at Ohio State University and author of The Church of Scientology: A History of a New Religion
His talk, 'The Silent Brotherhood: Secrecy, Violence, and Surveillance from the Brüder Schweigen to the War on Terror' looked at the white males' belief that they are the victims of racial oppression. In their view, white males are persecuted by women, Black people, Muslims, Jews, etc. That's what Urban calls the "white man falling" syndrome.
Brüder Schweigen or Silent Brotherhood, was a white nationalist revolutionary organization active in the United States between September 1983 and December 1984. Its founder Robert Jay Mathews wanted to create an elite vanguard of Aryan warriors to save the white race. The Silent Brotherhood group was responsible for a number of violent crimes: robberies, bombings, murders, counterfeiting operations, etc.
Nowadays, much of the anti-terrorist attention focuses on radical Islam, neglecting home-grown white extremist groups. Figures show that the number of patriot groups in the U.S. is growing very rapidly. The reasons for that are many: bad economic conditions, black president but also the rise of surveillance which augments these people's distrust of the FBI, NSA and other governmental agents.
Urban's conclusions were that:
1. Secrecy is both the explanation and the radical solution for the 'white man falling' syndrome.
2. New forms of surveillance play into, feed and reinforce the narratives of such radical groups.
Politics and Practices of Secrecy was organized by the Institute of North American Studies at King's College London, on 14-15 May, 2015.
Last year, news emerged that Russia's agency responsible for the Kremlin security was buying electric typewriters and "expanding the practice of creating paper documents" in a bid to prevent leaks from computer hardware. A few months later, The Guardian was forced to destroy the computer equipment that stored the NSA files provided by Edward Snowden. Diego Trujillo Pisanty saw reminiscence of the Cold War in these two stories and in other current news related to state espionage.
His This Tape Will Self Destruct machine prints self destructing documents. The documents merge images and texts extracted from Cold War fictions with excerpts from current secret documents. A short amount of time after they've left the machine, these documents burst into fire and their content is gone forever.
What is the paper made of? How come it 'auto-combusts'?
The paper is normal thermal paper used in receipt printers. As the document is printed it is treated with glycerol and a potassium salt. When these two substances mix at the end of the process they react exothermically to produce fire, this reaction ignites the paper and the heat also blackens any unburnt parts of the document as it is printed on thermal paper. The chemistry behind this is actually a common GCSE demonstration so it's nothing too complicated.
i'd also like to understand how the documents are generated. They are "a mixture of images and texts extracted from Cold War fictions paired up with excerpts from current secret documents". Are they generated randomly? do you design them yourself?
I designed (or more accurately curated) the documents myself based on relationships I saw between images and texts. For example one of the documents contains the famous Mission: Impossible (1966) phrase:
"As always, should you or any of your IM force be caught or killed, the Secretary will disavow any knowledge of your actions."
Presented next to an excerpt from an NSA leaked document reading:
Other documents focused more on visual aesthetics of devices and architecture, for example the parallel between the circular composition of the war room in Kubrick's Dr. Strangelove and the GCHQ 'doughnut' building.
Where do these images and texts from Cold War fictions come from? And where do you find the current secret ones?
The images and texts from Cold War fiction come from watching many hours of (usually very bad) Cold War film and television and manually curating extracts that relate to previously revised contemporary secret documents. Most of the extracts come from the early 007 films (Dr. No, You Only Live Twice, Moonraker), the Mission: Impossible 1960s television series, Macgyver as well as other fiction films of the era such as The Conversation and Dr. Strangelove.
I initially intended to work with the original files leaked by Edward Snowden and Chelsea Manning but even after they have been covered in the news it is very hard to find the primary sources for them. The current secret documents I used come from different places, mainly non-government organizations and news agencies. Many came from the Electronic Frontier Foundation and their repository of NSA primary sources (https://www.eff.org/nsa-spying/nsadocs). Some others came from The Guardian and their similar list of U.S. embassy cables summaries (now taken down but formerly http://www.theguardian.com/world/series/us-embassy-cables-the-documents) and The Intercept (https://firstlook.org/theintercept/documents/). Other documents were found throughout the web from all sorts of sources and forums with varying degrees of credibility.
Why did you decide to work with Cold War fictions documents instead of actual CW documents?
I did for a while focus on Cold War declassified documents, for example I did some reading around the STASI archive and even some pre-Cold war sources such as the recently disclosed Manhattan District History (https://www.osti.gov/opennet/manhattan_district.jsp). However most of these documents did not seem as relevant as some of the things discussed in fiction. I think that in the Cold War way of thinking an omniscient machine capable of spying on everyone seemed like a holy grail. This comes across in discussions of satellite imagery and long distance radio networks in many films and television series.
I also find it interesting to think that the rhetoric in these fictions could have done some of the ideological groundwork that led to mass online surveillance. It seems that in many of these franchises (007, Mission: Impossible, Macgyver, etc.) it's fine for the government to spy, impersonate and assassinate local and foreign citizens if they have reason to believe that they are suspicious. The 'good guys' in these series overthrow governments, kill criminals without trial and have no regards for international agreements and human rights, but they do it all for the sake of national security so it becomes justifiable. This is where I see a real link between the fiction and a reality in which citizens are prepared to accept that unregulated surveillance is good because it will stop 'the bad guys'.
Do you see relationship with the 300 Years Time Bomb? because news and secrets are explosive in their own way too..
I see a link in the popular culture that both of these projects take from, I would say that action cinema was very relevant to my generation and that this ends up showing in my work. I also see a relationship in the way I explored the way we assign value to things based on their lifespan. The 300 Year Time Bomb gained historical value by existing 300 years whereas a self destructing document gains value by existing for a very short amount of time, meaning that only a privileged person will be able to read it.
I hadn't actively thought of the secret as explosive but I think it is implicit when I say that "The release of the NSA files will likely be part of this decade's history". I think that Snowden's leaked documents have caused a sort of explosion resulting in an accelerated process of questioning the ethics around online technologies, digital democracies and personal rights online.
Ghostradio, by Pamela Neuwirth, Franz Xaver and Markus Decker, is a physical mechanism that generates random numbers through chance. The works is an intriguing comment on the mass-surveillance of our everyday digital moves:
At the moment, information exchanges on the internet are either in plaintext, or they use, for 'secure' transmission, encryption. For cryptograpic methods to be safe it is essential to create a very good random key. Usually these keys are produced by pseudorandom generators. As they are produced by algorithms, they are not really random, and can be outguessed with the help of powerful computers.
And this is where ghostradio comes in. The device produces real random numbers. Referring to the use of chance in art and to the Second Order cybernetics of Heinz von Förster, Ghostradio deploys feedback and quantum effects to create random numbers from the boundaries of reality and beyond. Ghostradio publishes the resulting random number datastream for the generation of cryptographic keys. This will release the public from the current state of surveillance.
I discovered Ghostradio a few weeks ago in Riga. The installation was part of Fields - patterns of social, scientific, and technological transformations, an
Ghostradio sounded suitably mysterious and dark. So i contacted the artists for a quick Q&A:
What makes the random number produced by the ghostradio more 'real' than the random key usually produced to ensure the safety of cryptographic communication?
The ghostradio randomness is not more real than the randomness calculated in industry made computers. But it is a different approach and the mechanism has a systematic and theoretical complexity but is technically easy to understand. This prevents manipulative elements to be inserted in, so backdoors are unlikely, compared to the calculations of randomness, where someone needs higher math knowledge to understand the mechanisms.
With the ghostradio project we try to discuss this issues of trust, which underlies such security structures, either you believe in the security of a system or not. You, as a untrained person, will never know. We personally rather distrust all public known models of the crypto warfare, than believe in it, and that was the motivation to dig into this field.
Funnily enough, we do see this relationship of trust everywhere in our constructed reality. Maybe today's most prominent religious system is, for instance, the banking sector. This makes us think about dollar note in the movie They Live.
The project description mentions that "we are publishing this random numbers datastream for cryptographic key generation." Where are you publishing it? Can we get access to it?
Yes, we publish each day, as long as a exhibition lasts and therefore the ghostradio mechanism is in service, a 2gb random binary on the web. You can access it via the address http://www.firstfloor.org/ghostradio/web/random.html and each month we do a special signal radio broadcast on air, on the local radio station FRO, and distribute a 2h long random signal of our prototype machines.
Can you describe the exhibition setting? What it is made of and what is the purpose of each part?
ghostradio is a metaphysical geometric setup. We do have a feedback noise signal accelerated to the speed of light. This signal is broadcast over 3 metaphysical antennas,
The light speed and the antennas open a string into the multiverse of our doppelgänger, we know nothing about, the ghost. the thunderstorm generator is a source of uncertainty,
I was interested by the fact that the text that describes the work focuses on the need to protect ourselves from surveillance rather than piracy. Is surveillance the new/another form of piracy?
In the daily communication experience, surveillance interface technologies are invasive. Piracy on the other hand are matters of corporate politics, concerned about their market shares, and so on. In that sense, both terminologies for us are not directly comparable. Although the corporations and the surveillance space serve each other.
In legal terms we do see the mass-surveillance as a criminal constant, that goes along with the constant state of emergency and might be legally for a state within the material law. Otherwise we don't see much difference to the act of piracy.
As supporters of the idea of a open information society we do like the utopia of the free information flow, where all data are save and there's no need to protect them because no one is after them. In that sense the communication is safe but not private, a trustful relationship in a fictional open knowledge-based society.
Check out the ghostradio at the Fields exhibition, produced by RIXC and curated by Raitis Smits, Rasa Smite and Armin Medosch. The show remains open at Arsenals Exhibition Hall of the Latvian National Arts Museum (LNAM) in Riga until August 3, 2014.
Jennifer Lyn Morone has turned herself into a corporation and collection of marketable goods and services. Everything she is biologically and intellectually, everything she does, learns or creates has the potential to be turned into profits. Jennifer Lyn Morone™ Inc is a graduation project in Design Interactions but as Jennifer underlines, this is not a speculative project.
JLM Inc is a new business established to determine the value of an individual. The corporation derives value from three sources and legally protects and bestows rights upon the total output of Jennifer Lyn Morone:
1. Past experiences and present capabilities. These are offered as biological, physical and mental services such as genes, labour, creativity, blood, sweat and tears.
JLM Inc is not only an audacious long term performance, it is also an thought-provoking exploration into personal data exploitation by corporations and governments. The projects is an extreme form of capitalism which might ironically enable an individual to regain some ownership of and power over their own data. Jennifer Lyn Morone Inc is obviously a very personal venture but the designer is also beta testing on herself an app, the Database of ME or DOME, that will ensure that your identity and data can be collected and stored for you and only you.
A few questions (amongst the dozens i wanted to ask) to Jennifer:
Hi Jennifer! I obviously laughed when i read the sentence 'This is not a Speculative Project' in the gallery. So you really managed to become an Incorporated Person? How did you do that? Is this a standard, banal process?
It's nice to know that the sign worked as it was intended. I feel that there's a limit to the impact that speculative work can have as it can't be directly compared to a current reality. This was my way of addressing the audience just to make it clear that the project is real and actively negotiating several problems that we are faced with today and that need to be addressed.
So, yes, I really have become an Incorporated Person. The process has not been standard or banal at all but that's probably because I am not in business school setting up a business to sell something. Rather, I was on a critical design course reappropriating capitalist and corporate strategy to make being a person a business.
In November 2013 I starting looking into the details to incorporate, which seemed deceptively simple: choose the business name; decide what kind legal entity you want your business to be (I became a C-corporation); figure out where to incorporate (I did it in Delaware); find a registered agent; fill out some forms; and then pay. All of this, however, required a significant amount of research for me to even understand what the legal and financial implications of my decisions would be. For example: what being a C-corp versus an S-corp entails, how valuation of companies works, what are the benefits to incorporating in Delaware compared to other States, how shares work and how the price per share is determined (which I find completely illogical).
I used the research, combined it with my intention and fused it into a business plan where I had to define what my mission is, what I stand for, and what my vision is and how I plan to achieve these by being the business (person) I will be. Repurposing the corporate mentality even further required me to stop thinking like an individual about what I want and need but what other people want and what can I offer to meet their needs. This helped me to determine my services.
What I found interesting is that it is quite common for people to incorporate before they even know what they want to do. They can do this because, in Delaware where the majority of major corporations are located, all you need to state in the articles is that "The purpose of the corporation is to engage in any lawful activity for which corporations may be organized under the General Corporation Law of Delaware". This is also the common way of describing what the company will do so as not to limit the ways in which it can make money.
Now that I have incorporated myself, I have legally created another person with my name in the eyes of the law. In the USA my corporate self now has not only the same but even more rights and benefits than I do as an individual. My corporate self takes on any responsibility and I am not liable for its actions or debt, only my initial investments. This is why we see companies able to go bankrupt, get bailouts or get away with ruthlessness without anyone being charged or responsible for what happens.
As the founder of my corporation I turn over my skills, capital, possessions and intellectual property to it and these become its assets and increase its value. My identity (name, appearance and IP addresses) become the brand and are trademarked; my mental abilities (knowledge) as processes and strategies; my physical abilities as equipment; my biological functions as products, my data is the corporations property and the shares are my potential. These all become assets that I can now capitalise on. My debt is turned into the corporations liability, which actually increases the company's value if it were to be sold.
By issuing shares I can raise capital, based purely on my potential success. In exchange the shareholder has partial ownership of my corporation. I wanted to do this to expose that shares in no way reflect the true value of a company, only its perceived value based on popularity and that stock markets are pure gambling.
As the founder I can set the price of the shares extremely low, the usual amount advised in 10,000,000 shares at $0.001 or $0.0001 per share, I opted for the latter. After that I applied for a tax number (EIN), which takes about an hour to receive. Then you have to set up a bank account after which you can buy your shares, usually at least a third of the shares, and reserve about 10-15% for stock equity to pay for any services needed. Then you look at what the corporation's assets are, what's your inventory, and include the work that has gone in so far and put a number to it. A valuation has to be done to then determine what the new price per share will be and this can be done by someone who is an experienced investor or a venture capitalist, but they basically just take that number that you have got and multiply it by 10 and then divide that by the number of shares.
How do you put value on things such as Education RCA and Live and work in Germany? And why is living and working in Germany proportionally more valuable than living and working in France?
Those prices actually have no reflection of how valuable the experiences have been. What the numbers represent are of what my life has cost so far divided up into periods of time based and how much I either earned or what was paid for me to live and learn. These become my base values, the initial investment, on top of which I can begin adding the intangible (knowledge, personality, skills which are very hard to put a price on) I gained from these experiences and tangible assets (possessions/inventory, both internally - i.e. blood and externally - i.e. computer) that I acquired or continually produce. This gives me a starting point to know what my production costs are so I can determine an honest price for my services.
The cost of my education, how much I received after my father passed and how much I earned in France and Germany (to answer your question: France was significantly less since I worked for an ex-partner and didn't receive a salary but also didn't pay rent) I knew already. What I didn't know and never thought to ask before was how much I cost my parents, purely financially, from conception to the age of 18. I asked my mother and she came back to me with this number with inflation figured in. I've since set aside shares for her.
It is an interesting perspective to now have. Often we think about what we don't have or aren't receiving. By calculating how much money has gone into my existence as input I then took a look at what my output has been, what I've actually done with that, and I wasn't terribly impressed. In capitalism individuals are meant to consume as much input as possible, while corporations can't survive unless their output is both useful and greater than their input, which needs to be relevant and not wasteful of time or money.
Could you explain us the purpose of the DOME app? How does it insure that your own information remains your property?
The philosopher John Locke stated that a person's natural and inalienable rights are "life, liberty, and property": that "everyone is entitled to live once they are created", that "everyone is entitled to do anything they want to so long as it doesn't conflict with the first right" and that "everyone is entitled to own all they create or gain so long as it doesn't conflict with the first two rights". Today, I believe that the data a person creates should be considered their property: it has a monetary value in the economic system that our lives are structured around. So I see data as a resource that people create and that is currently being exploited.
Governments were created to protect people and their rights but as we are living in a time of crony capitalism, where economic success is dependent on close relationships between business people and government officials, I think it will be a long time before any policy or solutions will be established. Instead what we are seeing are efforts made to better track and monitor our actions to get a clearer picture of how to better target our consumptive behaviour. This is what I consider data slavery.
Right now, as a hyper-connected network society, each person creates a trail of data that is being used and profited on mostly for advertising purposes. People are now referred to as consumers and statistics and government and Industry pay substantial sums for our information.
So as a form of protest and in an effort to revolt against this, I am using subversive tactics to reclaim what I feel should be a person's rights by incorporating my identity and creating DOME (Database of Me) as a way to take ownership and control of my property. Now that I am a corporation any data that I create that is linked to my name, IP address and appearance is copyrighted or trademarked and therefore subject to litigation if used without my permission...think of how Getty gets the rights to images and if you use it without their permission or having paid you get a fine. So any photo I take, any email I write, any call, text, web search, cctv footage of me that is stored on someone else's, company's or government's sever does not have the right to be there or to be used, sold, leased or traded.
DOME's function, in its simplest form, is an app that acts as a firewall between you and other servers. You use all of the same services, apps and interfaces you do today but you also have your own server and the app operates quietly in the background of any device you use, making two copies of the data you transmit. One hard copy goes to your database, the other is encrypted and goes to its intended destination but can't be used beyond that. In DOME's complete form it is a customisable app that still does what the simpler form does but with its own applications so that a person can communicate, share photos, socialise, navigate, search for information, and record external sensors such as biosignals. So people would need to have their own server or a data locker on a shared server and download the app on their computers and phones.
For the purpose of this project all of my personal data collected with DOME is being displayed on the tracking page. This is to show and make a clear distinction that there are real lives behind the data, which is something that I think is critically missed in this data discussion. Right now there is only a portion of my information compared to what will eventually be there. It will being streamed in real-time to mimic how the NSA, GCHQ, Google, and others view our information now and it is public because I want to draw attention to how exposed we currently are.
I am also using it to measure my "operations" to monitor and track productivity and efficiency in the same way that corporations normally do. Spy software and keyloggers are becoming very commonplace mostly used by companies on their employees, jealous partners to their loved ones and parents to their children.
Currently, I am the first and only beta tester. I am using myself as the case study to capture as much data about myself as possible, store it all in one place to see how much a person can actually generate, and then correlate it to see which combinations are valuable.
Given the growing market for information if people have ownership and control of their data they should be the ones compensated for it, not other companies. So beyond any success with DOME I have the intention to build a Platform, or try to work with others who are heading in this direction as well, as a cooperative Data Broker. People would use DOME and have an overview of their information as a data portfolio from which they could choose, if they want, to send as packaged data sets to the Platform as an investment for a known purpose. The Platform would then combine different people's information, as this increases the value of the data, and then sell it to the approved markets. Those that contribute their information would then get a return on their investment. This is not necessarily the best solution, it is only a fairer alternative to the system that is in place now.
Do you think that an individual has more to lose or more to gain from this extension of capitalism to their own person? Because on the one hand, they regain some power. On the other hand, the idea seems a bit perverse.
What I am doing is quite outside the realm of ordinary behaviour but we are made to behave in what I consider quite a perverse way because of the economic system in place. Which I am in awe of as it is not really what I would have expected after millennia of evolution.
But here we are and it is obvious that Capitalism works best for Capitalists. So, I am experimenting, with myself as the subject, to push the limits to the extreme to provoke change. The way in which I am doing it is merely reflecting how things are and where they seem to be heading. Systems and governments have been adjusted and overthrown before, the problem with this one is that it works too well for the ones running it but not well enough for the rest...and the disparity is growing wider.
Theoretically, I think a person would have more to gain as a corporation as long as capitalism is in place. In practice you might have to ask me that in a year, five or even 10 years time. People change, adapt, and continue to learn throughout their lives which is much more sustainable and scalable than the way companies operate. Together we are very diverse and alone unique because of the experiences we go through which create our most valuable asset, our individual perspectives. We all have assets and potential, but for many only a small percentage is even used and rarely for one's own benefit. If my friends and family became corporations I know exactly who I would use and for what and I know who I would invest in, not only because of what they can do but because of who they are.
If people were to write a business plan like I did they would most likely benefit in some way and definitely gain a greater perspective. But unless they take on the legal and financial implications like I have they won't truly change the way they live and how they engage with others. Technically speaking, all becoming a corporation really comes down to is looking at what you do and what you want to do and applying the same terminology, strategy and framework that corporations use to make money. I think that there will always be perversion as long we need to gain or earn money, or some form of currency, to meet our basic needs.
Could you describe to us the kind of services you are offering for free or those you are offering in exchange of money?
It really depends on who is asking and what they are asking for and is also affected by supply and demand. My services are categorised under mental, physical or biological, under which are combinations of features such as problem solving, compassion, strength, coordination, heat, and bodily functions. So when I offer something for free it's because I produce it anyway and have no use for it myself and there is no demand, so it's waste. If there starts to be a demand then it's no longer waste but a byproduct which I can sell. If there's something that is going to require depleting a resource, which would be measured by time, money and energy spent, in order to do it; such as consoling a friend and trying to help him through his problems for a few hours, then it will either be an exchange or invoiced. For example if this friend who often asks to meet to talk about his relationship problems is also there for me when I need consoling or help then it's an exchange. But if he is never there for me when I need it, then I would send him an invoice.
Another example compared to how we are used to working now would be if a firm or company wants me for some mental services, say creativity and knowledge, then it would be similar to acquiring a consultant, but I would calculate my price based on what the knowledge cost to produce (education and experience) and calculate in my overhead costs, what I lost in time and energy against what I may have gained in value such as enjoyment or if I learned something new. If I there was value I gained I would deduct that from the price.
Oh! i just saw you're offering free urine! Is it ironic or would the urine be of any use to the buyer?
It's both! There's irony in the whole project, I've just dealt with it very pragmatically. We are bound to our bodies, some ways it's an extension of our mind, in other ways it operates without us even having to think about it, in either case you are in it for as long as you live, or as long as it keeps up. It is 100% yours but there are external factors such as laws and taboos that condition you to use your bodies and the valuable things they do in very specific and deemed acceptable ways. Companies on the other hand don't work this way. As I described above in how a waste might turn into a profitable byproduct, it depends on supply and demand.
So if you look at the body as equipment with quite mechanical operations, it produces things like urine systematically. As I am just starting I don't have any customers. So I am copying how businesses give free promotions to attract potential buyers. In my research I came across people that were looking to buy urine for drug tests. There is also the potential to sell to labs of companies that are developing bio-fuel cells to power phones. Who knows who else might want it.
As there's a pretty steady supply, which can be increased to an extent, if there started to be a demand that was more than I could supply then I could increase the price. If the demand is equal to the supply then I would price it based on what I saw people would pay and keep it competitive to bottled synthetic urine, yes there is such a thing. I could also increase my profit margin by only drinking tap water.
So, there's irony on several levels: to illustrate the exploitative aspect of capitalism on resources and what this looks like at the extreme level of and by the individual; the ways in which we are conditioned to use our bodies and what we are 'allowed' to do with them; and the fact that you can potentially sell anything as long as there's a willing buyer.
There is also another level of sincerity, in that the more manual your work is the less you are paid. When times are really tough, women in particular have had to resort to selling their bodies for money, with sex, pulling teeth, hair. I saw many people online looking to sell their kidney to help a friend in financial need. I also went to start a clinical drug trial and found that there are many healthy and educated young people who are now doing this for additional income. In face of an increasingly specialised workforce and automation of manual jobs people have to be resourceful and will have to look at what they have and what they can offer to live from.
Do you have a marketing plan that will ensure that people are eager to get those services and that you will make a profit rapidly?
I do have a marketing strategy as it was part of the business plan. My initial customers or users of my services will be everyone I engage with and know now. For example, if you wanted to interview me after the launch you would have to go through my website, check my calendar and block my time with the type service you want. You can then check my progress with the tracking page to make sure I'm doing what you asked of me. It would probably be an exchange as you are promoting me and helping me reach a wider audience, which would increase the value of me as a company and therefore effect my share price, creating profit for the shareholders.
My website will be monetised on the use and tracking page with banner ads to click on displaying things I own and want to sell, services I'm promoting and other people's services. That will be similar to the way Google AdSense works with affiliate marketing but instead of products and companies it will be with people I know are looking for work or have just done something that's available to the public, such as an exhibition or a book.
I plan to create some revenue also from endorsements to promote events I might attend, clothes I might wear, restaurants I might eat at and products I might use. This is to reflect how celebrities and athletes are used to influence the public and how product placement only happens when it has been paid to be seen. However, as normal people, we actually buy things and become walking billboards if logos or the brand's identity are obvious.
Finally, there is the profitable but time consuming endeavor of pursuing intellectual property infringements. The profit of this will depend on whether my lawyer will charge me fees or if he will take a percentage from cases won.
In the video you present yourself dressed as a businessman. Why not highlight the fact that you're a woman?
This project takes its stance in criticism to the capitalist system of which I can not think of a more iconic image than the man's business suit. When you see a man in a business suit you know his job is to make money. I wanted to highlight that I am reappropriating the Capitalist's role and strategy by embodying this uniform. There is a very schizophrenic nature to this project and through it I must play many different roles and not all of them will fit. The clips in the back are used to represent this and indicate that I am making this role fit me and not the other way around.
I think that it is still obvious in the video that I am a woman. If I had accentuated this fact by dressing up in a female business outfit or a sexy dress then I still would still be playing a role. Actually, over the course of this project so far the fact that I am a woman has already come in the way a few times and with people I considered friends. One wanted to help with contextualising the philosophical nature of the project. Our communications became muddy because he developed feelings, which was uncomfortable to say the least. Then he became greedy after speaking with people about the project and aggressively stated that he deserved a large proportion of shares. And finally, he was dishonest about how he used money I gave him to set up the my server. The second set-back, which was directly because I am a woman, was with a friend that I pitched to as a potential investor, since he's squandering lots of money to build a spaceship so he can go to the moon in a few years. At first he was very interested, up until the point that he realised I was not going to sleep with him.
It looks to me like the project has just begun and you are going to learn and experience a lot in the coming months. Or will JML Inc disappear beyond the graduation show?
Yes, this project has just begun and there is so much work still to be done before launching. Over the summer I will be at Innovation RCA's launchpad where I will have a business mentor and work more on the marketing plan. I will also be holding a crowdfunding campaign for DOME and will soon do a friends and family round of shareholders for JLM Inc.
I am looking forward to many aspects of the project such as exposing the loopholes that big corporations use to their benefit and challenging norms that we are conditioned to. I have already learned many things and gained a greater understanding of our economic system, which brings a clarity to why our society and culture are as they are.
This project has the potential to go on indefinitely as I am using my life as the subject. And just as life goes, it's hard to say what the outcome will be.
Film: director- Ilona Gaynor
A couple of weeks ago i spent yet another fruitful afternoon in Brighton for the Critical Exploits. Interrogating Infrastructure event.
The day was part of The Lighthouse's ongoing exploration of the social and political implications of technological infrastructures. The curatorial research started in 2012 with the exhibition Invisible Fields in Barcelona and continued at The Lighthouse with exhibitions by James Bridle, Mariele Neudecker, Trevor Paglen, etc.) The last event brought together artists and critical engineers Julian Oliver and Danja Vasiliev, critical designer Tobias Revell, and activists from the Open Rights Group for a day of talks and workshops.
Critical Exploits showed how a new generation of artists, designers and engineers are taking a highly critical approach to the development and use of the engineered systems and infrastructures that we increasingly rely on for daily life.
This post is going to focus mostly on Oliver and Vasiliev's presentation which looked at black boxes in the context of infrastructures. The talk is already on youtube but i thought i'd sum up some of the observations that the artists made and add links to the artworks and documents they mentioned while they were in Brighton.
Their presentation started with a quote from Bruno Latour. Talking about blackboxing, the sociologist wrote that When a machine runs efficiently, when a matter of fact is settled, one need focus only on its inputs and outputs and not on its internal complexity. Thus, paradoxically, the more science and technology succeed, the more opaque and obscure they become.
Typical modern devices and infrastructures function (and actually also look) like black boxes, they are far more opaque than they are transparent.
If you look at a gramophone, you'll notice that its inner working is displayed externally. An iPod nano is at the other end of the spectrum, it is completely opaque. We can't actually explain what the many parts inside the device do. And maybe even what they do behind out back. As these devices get smaller, we get even less clue about their inner working. We cannot say we know the devices inside our pockets.
Our understanding of internet infrastructure is similarly foggy. Most of the time, our contact with it is clustered around firefox, safari, explorer, etc. Most users cannot see beyond their web browser. And there is indeed much misconception about the internet. Julian Oliver mentioned a quote he heard at the Chaos Communication Congress where someone said that the only people who talk about 'users' are drug dealers and software developers.
Very few people can actually give an intelligible answer to the question "What is a computer network?" Most people have no problem describing how a postcard goes from its sender to recipient but they are at a loss when it comes to explaining how emails are exchanged. In fact, the Oliver and Vasiliev described the Internet as a deeply misunderstood technology upon which we increasingly depend. Even the terminology used makes our understanding literally nebulous. Take the concept of 'the cloud'. A survey showed that the majority of Americans believe that cloud computing was affected by bad weather.
Another interesting fact their talk mentioned is that the net doesn't belong to the people as it is often assumed. If you have a look at the Submarine Cable Map, you quickly realize that most of these cables are privatized.
Vasiliev and Oliver take their distances from a traditional definition that sees engineering as the practical application of science to commerce or industry. Instead, they wrote, together with Gordan Savičić, a critical engineering manifesto which they regard as a frame for applied research and development that positions Engineering, rather than Art or Design, as primary within the creative and critical process.
The rest of their talk illustrates the manifesto using works of critical engineering. I'm going to simply write their titles down and link to the project pages but i'd encourage you to watch the video of the artists/critical engineers talk to get more background and comments on each work.
Don't miss the video documenting the other talk of the afternoon. Tobias Revell's talk portrayed current practices within critical design and the way the discipline can be used as an antagonist tool for provoking conflicts between set narratives, beliefs and ideologies for awareness, debate and alternate interpretation. The result is a lively and carefully curated inventory of all things Design Interactions at RCA.
I don't know why i didn't visit Suzanne Treister 's solo show at Annely Juda in London as soon as it opened. I guess i've been lazy and since the lazy is always rewarded, the show has been extended till 22 January, giving me another chance to see it.
In pure Treister fashion, In The Name Of Art and other recent works unwraps the extremely dense networks that tie together secret detention facilities run by the CIA, government control, mass surveillance technologies, military intelligence and counter-intelligence, drone operations that kill and drone operations that entertain the gallery-going crowd. You want to dismiss it as conspiracy theories but Snowden, Wikileaks, and human rights reports urge you to pay attention. At the risk of making you uncomfortable.
Much of Treister's recent work maps ways that human intelligence and military intelligence currently interact and work on each other. She explores how in a world increasingly determined by pervasive technologies and the demands of the military and security arms of government and state, new relations between the observer and the observed have been established and new subjectivities formed.
The work The Drone that Filmed the Opening of its own Exhibition did exactly what its title says. Treister brought a drone at the opening to film the exhibition and its visitors, highlighting the expanding role of UAVs in both military and civil life. The catalogue-newspaper accompanying the exhibition reminds us that the performance is far from being purely entertaining and anecdotic as military drones have killed between 3,500 and 5,000 people (and not all of them were 'combatants' as we know) since 2002.
Camouflage was probably the work that intrigued me the most. Treister sourced documents related to the U.S. Department of Defense's GIG and the NSA's PRISM surveillance programmes. Both programmes are for use in times of war, in crisis and in peace. Treister further obstructed the content of leaked graphics from internal power-point presentations about PRISM by painting patterns over them.
The abstract black shapes of CIA Black Sites are supposed to silhouette secret CIA interrogation centres. The drawings directly reference Malevich's Suprematism compositions to evoke the CIA's support of abstract art in the 1950s while the title of the work alludes to the secret prisons where terrorism suspects are held, interrogated and kept out of the view of the public and the law.
The KGB works in the ART FOR OLIGARCHS series (a series which also includes a stunning STASI Wallpaper that recall the ubiquity of pre-digital surveillance and which i was silly enough not to photograph) points to the overlap between people who were powerful in the security agencies of the USSR and the new turbo-capitalist powerbrokers and the Post-Soviet oligarchy that the Western contemporary art market has become so dependent on.
In each orchis militaris flower, the sepals and side petals are gathered together to form a pointed "helmet" (whence it gets its name). By this point you will probably see evil and machination everywhere, so please do let your imagination run wild.
emeyefive looks at the life of Stella Rimington, the first head of the British Intelligence agency MI5 whose name was made known to the general public. The name of the director of the agency had so far been regarded as a state secret but an investigative campaign by the New Statesman and The Independent newspaper published photos of her, forcing MI5 to roll out on a new programme of transparency.
Suzanne Treister, In The Name Of Art and other recent works is open until 22 January 2014 at Annely Juda Fine Art in London. DON'T MISS IT!
Previous post about Treister's work: HEXEN.