Flone is a drone (an unmanned aerial vehicle) which uses a smartphone as a flight controller and explores novel ways to "occupy" public space, in particular the air and claim the right to use it before legislation makes it illegal.

flonyimage_large.jpg
Documentation of the production process of Flones. Photo LABoral


Flone. Maiden Flight

0i0iflo9mage_large.jpg
Documentation of the production process of Flones. Photo LABoral

Created by artist and computer engineer Lot Amorós, technical engineer Cristina Navarro, and industrial engineer Alexandre Oliver, Flone turns the mobile phone into a stand-alone flying apparatus which can go up to a height of 20 metres from the ground, come down, rotate and do the usual smartphone tasks, such as taking photographs or video recordings. It can also be remotely controlled by another smartphone with a wifi or 3G connection.

Its objective is to make air space accessible to everyone as a research platform, providing a range of applications for them to operate with a smartphone alone. The combination of its different sensors and telematic connections transform Flone into a multimedia drone, a mobile communication unit that moves around in a new space: the public air.

0loboimfllloage_large.jpg
Documentation of the production process of Flones. Photo LABoral

0i0i0i09flonee.jpg
Documentation of the production process of Flones. Photo LABoral

I briefly interviewed the creators of Flone:

One of the objectives of Flone "is to make air space accessible to everyone as a research platform." So i was wondering if there's any particular legislation about air space (at least in Spain) and if anyone is free to have all kinds of devices fly anywhere into the air to record, photograph, sense, etc.

Flying 300 meters above the ground or close to airports generally requires a permission from the Spanish Aerial Authority (AENA). However, there are no national laws regarding the use of aerial space below 300 meters. In Spain, these laws depends on local governments and currently almost none of them has any law on that regard simply because no one before had ever used space to fly drones or anything of the kind.

We spent a long time asking lawyers and drone pilots about this legal gap but nobody has the right answers. There are many variables to take into consideration: whether you're flying over private or public land, taking images or not, for commercial purposes or not... Anyway, even if we do everything legally, we live in Españistán, a country where politicians and policemen don't respect the law in any sense and where they can punish people without any reason.

In the United States the airspace for private drones will be regulated in 2015. In Europe a common law is coming, but until this date the air is a no man's land.

One year ago, in the exhibition of GuerrillaDrone in the Netherlands I showed the stupid duty process for taking aerial images.

0xcorrespondency-web-1024x743.jpg.pagespeed.ic.Y7_wlkIiM8.jpg
Post Cold War permissions and correspondence with the Ministerie Van Defense of The Netherlands, at the Guerrila Drone Exhibition in MOBIBOM in Groningen, 2012

Right now the law is changing, but one year ago The Netherlands had a very restrictive law dating back to the Cold War, I still have a copy of the law that explicitly says that if anybody publishes an aerial image of The Netherlands without the explicit permission of the Ministry of Defense they will be punished with some months in jail.

How far are you in the development of Flone? Do you still have much to achieve?

Flone can have a lot of capabilities and flying modes. So far we have developed the physical platform, and right now we are developing the software interface, we are focused on the pilot experience, designing a more natural way to interact with a flying machine.

We have already developed a Android app for flying flone without the traditional RadioControl equipment.

0floneprimerplano.jpg
Image courtesy of the artists

0limfloage_large.jpg
Documentation of the production process of Flones. Photo LABoral

0j0jflonefemweb.jpg
Documentation of the production process of Flones. Photo LABoral

What can Flone do so far?

Transform the airspace into an accessible public air.

How are you planning to use the flying smartphones personally? And did you meet with beta testers, members of the public who suggested surprising ways to use Flone?

Each new idea of using flone (or any other drone) is a surprising one, and is also probably totally unprecedented. Anyway we prefer the idea of flone as a shared vehicle instead of a personal one. Private cars have changed the way public space is designed and used. We prefer an ecopolítical idea of a public network of flying devices.

Until now we have already built some airframes for different people, a lot of people contact us asking for information but becoming a drone pilot and becoming beta tester taks time. Next month we will do a drone hackademy in Barcelona and we plan to build 20 flones. With the stable release of the app we expect that a lot of people will get involved.

0demobilbao_preview.jpg
Lot Amorós demonstrating Flone at the Maker Faire in Bilbao. Photo: Cristina Navarro

0volandoflonedevcon2-600x531.jpg
Demo of Flone at the BcnDevCon13, the third edition of the Barcelona Developers Conference,

Did you meet unexpected challenges during the development of the projects? Things that didn't go according to plan, that were more difficult to implement than you thought or that surprised you?

Dealing with time in the milliseconds scale. Motors update their velocity 400 times each second. Debugging this kind of fast robotics requires a lot of experience. It's not about finding the best solution, it's about finding the equilibrium between the fastest and the best.

I have a question just for Lot who worked on Guerrilla Drone: is Flone another form of GD? Maybe one that looks less threatening and that is lighter?

Yes, but was not a direct transformation. The main element of Guerrilla Drone is their microprojector that has the same size of a smartphone. Flone is a kind of democratic version of Guerrilla Drone in the sense of making the technology accessible, but has a different concept.

What's next for Flone?

A webpage with real time flyings of users around the world, smartphone-based glasses for piloting flone by First Person View, autonomous flight plans, gimbal-mirror for video stabilization, improving the failsafe SMS-ing of the position if the flone gets lost, multiple connection with 3G & Wifi, an automatic path calculation for flying swarms... and a parachute.

This are some future developments, but right now, the next for us is: Use it!

We spent the last six months of our lives developing it, so right now the main motivation is exploring the airspace for ourselves.

Thanks Lot, Cristina and Alexandre!

0conexionesescamultiwiiweb.jpg
Image courtesy of the artists

Flone was the winning project of Next Things 2013 - Next Space, the Second Global Art and Technology Challenge, the joint call for ideas by Telefónica I+D, the research, development and innovation company of the Telefónica Group, and LABoral.

Sponsored by:





A couple of weeks ago i spent yet another fruitful afternoon in Brighton for the Critical Exploits. Interrogating Infrastructure event.

1_takk640.jpg
Julian Oliver, No Network, 2013 (a battle tank toy that implements a blanket ban of mobile telephony in its presence)

3trank_640.jpg
Julian Oliver, No Network, 2013

5rafff_640.jpg
Julian Oliver, No Network, 2013

7_tnll640.jpg
Julian Oliver, No Network, 2013

The day was part of The Lighthouse's ongoing exploration of the social and political implications of technological infrastructures. The curatorial research started in 2012 with the exhibition Invisible Fields in Barcelona and continued at The Lighthouse with exhibitions by James Bridle, Mariele Neudecker, Trevor Paglen, etc.) The last event brought together artists and critical engineers Julian Oliver and Danja Vasiliev, critical designer Tobias Revell, and activists from the Open Rights Group for a day of talks and workshops.

Critical Exploits showed how a new generation of artists, designers and engineers are taking a highly critical approach to the development and use of the engineered systems and infrastructures that we increasingly rely on for daily life.

This post is going to focus mostly on Oliver and Vasiliev's presentation which looked at black boxes in the context of infrastructures. The talk is already on youtube but i thought i'd sum up some of the observations that the artists made and add links to the artworks and documents they mentioned while they were in Brighton.


Julian Oliver & Danja Vasiliev's talk at The Lighthouse

Their presentation started with a quote from Bruno Latour. Talking about blackboxing, the sociologist wrote that When a machine runs efficiently, when a matter of fact is settled, one need focus only on its inputs and outputs and not on its internal complexity. Thus, paradoxically, the more science and technology succeed, the more opaque and obscure they become.

Typical modern devices and infrastructures function (and actually also look) like black boxes, they are far more opaque than they are transparent.

If you look at a gramophone, you'll notice that its inner working is displayed externally. An iPod nano is at the other end of the spectrum, it is completely opaque. We can't actually explain what the many parts inside the device do. And maybe even what they do behind out back. As these devices get smaller, we get even less clue about their inner working. We cannot say we know the devices inside our pockets.

Our understanding of internet infrastructure is similarly foggy. Most of the time, our contact with it is clustered around firefox, safari, explorer, etc. Most users cannot see beyond their web browser. And there is indeed much misconception about the internet. Julian Oliver mentioned a quote he heard at the Chaos Communication Congress where someone said that the only people who talk about 'users' are drug dealers and software developers.

Very few people can actually give an intelligible answer to the question "What is a computer network?" Most people have no problem describing how a postcard goes from its sender to recipient but they are at a loss when it comes to explaining how emails are exchanged. In fact, the Oliver and Vasiliev described the Internet as a deeply misunderstood technology upon which we increasingly depend. Even the terminology used makes our understanding literally nebulous. Take the concept of 'the cloud'. A survey showed that the majority of Americans believe that cloud computing was affected by bad weather.

Another interesting fact their talk mentioned is that the net doesn't belong to the people as it is often assumed. If you have a look at the Submarine Cable Map, you quickly realize that most of these cables are privatized.

Vasiliev and Oliver take their distances from a traditional definition that sees engineering as the practical application of science to commerce or industry. Instead, they wrote, together with Gordan Savičić, a critical engineering manifesto which they regard as a frame for applied research and development that positions Engineering, rather than Art or Design, as primary within the creative and critical process.

The rest of their talk illustrates the manifesto using works of critical engineering. I'm going to simply write their titles down and link to the project pages but i'd encourage you to watch the video of the artists/critical engineers talk to get more background and comments on each work.

Gordan Savičić, Packetbrücke (illustrates the 5th point of the CEM). Julian Oliver and Daniil Vasiliev, Newstweek, 2011 (#3). Julian Oliver, No Network. Daniil Vasiliev, Netless. Julian Oliver, Transparency Grenade. Julian Oliver and Daniil Vasiliev, PRISM: The Beacon Frame. Martin Howse, Earthboot computer (illustrates #8). Gordan Savičić, City CPU. Julian Oliver, Border Bumping. Dennis Pual, Nullstecker (relates to #6 in the CEM.)

0icase_sml.jpg
Julian Oliver and Daniil Vasiliev, PRISM: The Beacon Frame, 2013 (a "functional response to the general absence of information as to what NSA PRISM equipment actually looks like")

0j0prism3_sml.jpg
Julian Oliver and Daniil Vasiliev, PRISM: The Beacon Frame, 2013

0i0prism_sml.jpg
Julian Oliver and Daniil Vasiliev, PRISM: The Beacon Frame, 2013

a0citycpu00.jpg
Gordan Savičić, City CPU, 2012

0anullstecker-T.jpg
Dennis Paul, Nullstecker, 2013

Don't miss the video documenting the other talk of the afternoon. Tobias Revell's talk portrayed current practices within critical design and the way the discipline can be used as an antagonist tool for provoking conflicts between set narratives, beliefs and ideologies for awareness, debate and alternate interpretation. The result is a lively and carefully curated inventory of all things Design Interactions at RCA.


Tobias Revell's talk at The Lighthouse

0dronevid-O_13.jpg
The Drone that Filmed the Opening of its own Exhibition: Video still

I don't know why i didn't visit Suzanne Treister 's solo show at Annely Juda in London as soon as it opened. I guess i've been lazy and since the lazy is always rewarded, the show has been extended till 22 January, giving me another chance to see it.

In pure Treister fashion, In The Name Of Art and other recent works unwraps the extremely dense networks that tie together secret detention facilities run by the CIA, government control, mass surveillance technologies, military intelligence and counter-intelligence, drone operations that kill and drone operations that entertain the gallery-going crowd. You want to dismiss it as conspiracy theories but Snowden, Wikileaks, and human rights reports urge you to pay attention. At the risk of making you uncomfortable.

Much of Treister's recent work maps ways that human intelligence and military intelligence currently interact and work on each other. She explores how in a world increasingly determined by pervasive technologies and the demands of the military and security arms of government and state, new relations between the observer and the observed have been established and new subjectivities formed.

The work The Drone that Filmed the Opening of its own Exhibition did exactly what its title says. Treister brought a drone at the opening to film the exhibition and its visitors, highlighting the expanding role of UAVs in both military and civil life. The catalogue-newspaper accompanying the exhibition reminds us that the performance is far from being purely entertaining and anecdotic as military drones have killed between 3,500 and 5,000 people (and not all of them were 'combatants' as we know) since 2002.

1dron0650.jpg
The Drone that Filmed the Opening of its own Exhibition

0adroneP1260211.jpg

0dronevid-O_07.jpg
The Drone that Filmed the Opening of its own Exhibition: Video still

0dronevid_E_02.jpg
The Drone that Filmed the Opening of its own Exhibition: Video still

Camouflage was probably the work that intrigued me the most. Treister sourced documents related to the U.S. Department of Defense's GIG and the NSA's PRISM surveillance programmes. Both programmes are for use in times of war, in crisis and in peace. Treister further obstructed the content of leaked graphics from internal power-point presentations about PRISM by painting patterns over them.

0GIGcamouflage-AV_V1_2007_P29.jpg
Camouflage, 2013

0Ncamouflage-CEJFC_V1_P19.jpg
Camouflage, 2013

0camougNetOpsSV_P3.jpg
Camouflage, 2013

The abstract black shapes of CIA Black Sites are supposed to silhouette secret CIA interrogation centres. The drawings directly reference Malevich's Suprematism compositions to evoke the CIA's support of abstract art in the 1950s while the title of the work alludes to the secret prisons where terrorism suspects are held, interrogated and kept out of the view of the public and the law.

0CIAst0144.jpg
CIA Black Sites #1, 2010

The KGB works in the ART FOR OLIGARCHS series (a series which also includes a stunning STASI Wallpaper that recall the ubiquity of pre-digital surveillance and which i was silly enough not to photograph) points to the overlap between people who were powerful in the security agencies of the USSR and the new turbo-capitalist powerbrokers and the Post-Soviet oligarchy that the Western contemporary art market has become so dependent on.

0ARTforOligarchs-15.jpg
Art for Oligarchs # 15

0ARTforOligarchs-7.jpg
Art for Oligarchs # 7 (study)

0ARTforOligarchs-10.jpg
Art for Oligarchs # 10

0InstAjfa.jpg
Art for Oligarchs. Installation view at Annely Juda Fine Art, London 2013

In each orchis militaris flower, the sepals and side petals are gathered together to form a pointed "helmet" (whence it gets its name). By this point you will probably see evil and machination everywhere, so please do let your imagination run wild.

0aaorchisml.jpg
ORCHIS MILITARIS

emeyefive looks at the life of Stella Rimington, the first head of the British Intelligence agency MI5 whose name was made known to the general public. The name of the director of the agency had so far been regarded as a state secret but an investigative campaign by the New Statesman and The Independent newspaper published photos of her, forcing MI5 to roll out on a new programme of transparency.

0mi5st0169.jpg
emeyefive, 2010

Suzanne Treister, In The Name Of Art and other recent works is open until 22 January 2014 at Annely Juda Fine Art in London. DON'T MISS IT!

Previous post about Treister's work: HEXEN.

0salenttowerLON89234.jpg
Northern Ireland. South Armagh. Golf 40 (salent tower). 2006

I used to go to the Imperial War Museum in London just to watch the hanging planes, the V2, the tanks, etc. The place is under renovation right now and i stopped paying attention to their programme (the war machines are wrapped up somewhere.) Big mistake! A few weeks ago, they've opened Donovan Wylie: Vision as Power, a show that explores the impact of military architecture on the landscape.

Vision as Power brings together five projects from radically different parts of the world but that are interconnected through the surveillance apparatus. Donovan Wylie grew up in Belfast during the Troubles and living under military surveillance has had an undeniable impact on his work.

The Maze was one of Wylie's earliest investigations into the relationship between power, surveillance and control during the Troubles.

Built in 1976 to house terrorist prisoners, the Maze prison segregated men according to their political beliefs and membership of paramilitary organizations.

Wylie started working on the series in 2002, just as the prison had closed under the terms of the Good Friday Agreement and the last inmates had been transferred to other prisons.

0exerviseyardLON58420.jpg
Northern Ireland. The Maze Prison. H-Block 5. Excercise Yard B. 2003

0inertiastage2.jpg
Northern Ireland. The Maze Prison. Inertia Stage 2. 2003

0chapelLON58722.jpg
Northern Ireland. The Maze Prison. Chapel, Phase 3. 2003

0maingatemaze.jpg
Main Gate, North Wall, Maze Prison, Northern Ireland, 2003 © Donovan Wylie/Magnum

0deconstructionprison.jpg
Donovan Wylie, Fence. Deconstruction of Maze Prison. Maze Prison. Northern Ireland, 2009, from the series The Maze. Courtesy of the artist

Wylie then extended his research to the British Watchtowers, the surveillance architecture built at the height of the Troubles, when South Armagh was one of the most heavily militarised areas of Northern Ireland. The British army built a network of watchtowers and observation posts in order to control cross-border smuggling and paramilitary attacks but also to maintain an intimidating presence.

As part of the Northern Ireland Peace Process, the watchtowers were dismantled between 2005 and 2007. As Whyle documented their presence in the surrounding countryside, British troops were deploying to Afghanistan, taking with them elements of the Northern Ireland watchtowers.

The Maze informed the watchtowers, and the watchtowers informed the Afghanistan work. I wanted to show this evolution, the photographer explained in an interview for the British Journal of Photography. When I was making the pictures of the watchtowers, they were coming down [being dismantled] and many of the soldiers working on them were going to Afghanistan. Elements of the structures were being taken to Afghanistan. Modern warfare is very transient, it is built to move, but basically it's the same idea regardless of nationality or politics or whatever - take the high ground and use vision as a method of strength and protection. Ultimately what I think is fascinating is how we use landscape as a tool of war.

0golf20LON89230.jpg
Northern Ireland. South Armagh. Golf 20. 2005

0sangerLON89233.jpg
Northern Ireland. Observational sanger, Cookstown. County Tyrone. 2000

0romeo12Outposts5.jpg
Romeo 12, South Armagh, Northern Ireland, 2005

0crossmaglen townLON89188.jpg
Northern Ireland. South Armagh. Crossmaglen town. Golf 650. 2006

0golf40-northern_20ireland__202006_jpg.jpg
Northern Ireland, 2006. South east view of Golf 40, British Army surveillance post in South Armagh

0golf40abLON89197.jpg
Northern Ireland. South Armagh. Golf 40AB. North east view. 2006

From 2006 to 2011, Canada sent nearly 3,000 military personnel to Afghanistan where military engineers designed a system of outposts throughout Kandahar province. Built on natural promontories and commanding multiple lines of sight, these outposts offer a fascinating parallel with the British Watchtower, as both networks ensured oppression and control in the name of a "war" against terrorists.

_FOB_Masum_Ghar_3_copy_med.jpg
Donovan Wylie, FOB Masum Ghar, Kandahar Province, Afghanistan, 2010, © Donovan Wylie/Magnum Photos

0iPO1masumghar.jpg
OP1. Forward Operating Base, Masum Ghar. Kandahar Province, Afghanistan, 2010 © Donovan Wylie/Magnum

0aOP3masumghar.jpg
OP3. Forward Operating Base, Masum Ghar. Kandahar Province, Afghanistan, 2010 © Donovan Wylie/Magnum

0watchtowercomabtoperatingpostFOLAD3.jpg
Watchtower, Combat Operating Post, Folad, Kandahar Province, Afghanistan, 2011 © Donovan Wylie/Magnum

Another series shown at the IWM explores American defensive structures in Baghdad, Iraq. The Green Zone was the international administrative zone of central Baghdad, controlled by the Coalition forces during the Second Iraq War. Wylie saw similarities in the way people were contained in the Green Zone and how they were imprisoned in the Maze.

0iraqNYC86372.jpg
Iraq. Baghdad, 2008. The "Green Zone"

Wylie's series Arctic closes the exhibition. The white and extreme environment is home to cyber radar stations unmanned and operated electronically to detect any presence seeking out lucrative natural resources along Canada's Arctic frontier made more fragile by global warming and the new routes though the Northwest Passage it enabled. Once again, the only analogy is with dystopian sci-fi. To Wylie, they are a striking example of surveillance attempting to deter future conflict.

0shortrange-canadian_20arctic__202013_jpg.jpg
Canadian Arctic, 2013. LAB 1 Royal Canadian Air Force Short Range Radar installation

Ultimately, the exhibition reminds us that surveillance is not confined to the spaces of military conflict. Surveillance is the default characteristic of our society, as the revelations about the extent of mass online surveillance have recently demosntrated.

Donovan Wylie: Vision as Power is at the Imperial War Museum in London until 21 April 2014.

Top Secret: Images from the Stasi Archives, by Simon Menner.

Available on Amazon UK and soon on Amazon USA.

0aacover0003620.jpg

Publisher Hatje Cantz writes: First publication of pictures from the archives of the Stasi, the East German secret police

Almost 300,000 people worked for the East German secret police, per capita far more than were employed by agencies such as the CIA or the KGB. Not quite fifty years after the Berlin Wall was built, Simon Menner (*1978 in Emmendingen) discovered spectacular photographs in the Stasi archives that document the agency's surveillance work. Formerly secret, highly official photographs show officers and employees putting on professional uniforms, gluing on fake beards, or signaling to each other with their hands. Today, the sight of them is almost ridiculous, although the laughter sticks in the viewer's throat. This publication can be regarded as a visual processing of German history and an examination of current surveillance issues, yet it is extremely amusing at the same time. The fact that the doors of the opposite side--the British or German intelligence services, for example--remained closed to the artist lends the theme an explosive force as well as a tinge of absurdity.

0combatryV9-cqrr.jpg
Close combat. From a manual for different close combat techniques

0mailbox-otdj.jpg
Surveillance of Mailboxes

0shortphoca_thumb_l_menner_09.jpg
Surveillance of the United States Embassy

Simon Menner has one of the most peculiar portfolios i've ever encountered. Snipers hidden among the trees, soldiers posing with corpses, Boobytraps and "Unconventional Warfare Devices and Techniques" from the 1960s, weapons used to murder people, views of WWI from both sides of the conflict, etc. Even the photos of Happy People have been selected for some very dark reason.

For one of his latest photo series, Menner spent 2 years searching through the Stasi archives, the majority of which were opened to the public shortly after the fall of the Berlin Wall.

The Ministerium für Staatssicherheit (Department of State Security) of the former German Democratic Republic was one of the largest surveillance apparatuses in history and its record of citizens' intimate life was thorough and sinister. The story and practices of the Stasi have been fairly well documented. Until this book however, we still lacked a clear visual account of the methods, tactics and props used by the spying agents.

The publication presents a selection of images documenting many of the Stasi operations: the spying accoutrement of Stasi personnel, the techniques employed to shadow or arrest a suspect, the signs used to convey secret messages, the packages sent via mail and confiscated by the secret police, etc.

The most baffling photos were taken during seminars in which Stasi employees learnt the art of disguise.

The props are amateurish, the poses are awkward and the result is grotesque beyond words. Yet, the intentions were serious: repression, control, surveillance.

0imfurV9-idet.jpg
From a seminar on disguises

0cardieyV9-stlw.jpg
The same agent using a different disguise

0_handbuch_fuer_verkleidungsvarianten.jpg
From a handbook of Different Disguises

0moustacheyV9-eeeh.jpg
Documentation of a seminar teaching how to apply artificial facial hair

0touristryV9-dkcw.jpg
Disguising as Western tourist

The award for most disturbing photos go to Polaroids of unmade beds, (Western-made) coffee machines and rows of shoes. The photos were taken by Stasi agents when they secretly searched peoples' houses on the hunt for evidence they might be betraying the communist state. Photos of the rooms and furniture were taken upon arrival and used by the agents to be able afterwards to put everything back as if nothing had been touched.

0polamenner_11.jpg
Secret House Searches

0polaenner_10.jpg
Secret House Searches

The photos below were taken at the birthday party of a high-ranking Stasi official. The party guests were asked to come dressed as members of demographic groups under Stasi surveillance such as athletes, dancers, academics, peace activists, and religious figures.

0geburtstagsfeier_fuer_einen_leitenden_agenten.jpg
Costume party. Guests were dressed up as members of demographic groups -such as clergymen- that the Stasi deemed suspicious

0costumeo-0122-Bild-0015.jpg
Costume Party

Spies of the western Allied Forces photographed Stasi spies and Stasi spies photographed their Western counterparts. "Sometimes they met, both sides were absolutely aware that the other side was there, but nevertheless both sides took photos, showing that both East and West lived in pretty much the same state of mind," the artist explained. So far, however, Menner hasn't been granted access to the correspondent photos from the British or Federal German secret services.

0spies-0987-Bild-0006.jpg
Spies taking pictures of spies

0knight6-galleryV9-gtoj.jpg
Accolade of the Phone Surveillance Unit

I love the necklace, very Tatty Devine!

0phone6-Bild-0014.jpg
Accolade of the Phone Surveillance Unit

0selfieryV9-lnpb.jpg
Stasi spy photographs himself

More images on the photographer's website, in Der Spiegel and Morgen Contemporary.

ebayBCv0.1 Legend.jpg

Most of us don't really know (nor probably care to know) how "the network" functions, what its structure of communication cables and servers looks like or how, more concretely, our private data travel. Roel Roscam Abbing spent a month at Laboral in Gijón to work on Border Check, a software that lays out the physical and political realities behind the internet.

0rtuaynosome3.jpg
Taryn Simon, Transatlantic Submarine Cables Reaching Land. VSNL International, Avon, N.J.

0Submarine_Cable_Map.jpg
Fibre-optic submarine cable system

And i'm sorry to quote him but in this age of reckless online surveillance even Dick Cheney thinks that you never know how much knowledge you're going to need. So maybe a good place to start would be to visualize how our data are moving from place to place (and thus which government can potentially have a look through it) and Border Check enables just that:

As one surfs the net, data packets are sent from the user's computer to the target server. The data packets go on a journey hopping from server to server potentially crossing multiple countries until the packets reach the desired website. In each of the countries that are passed different laws and practices can apply to the data, influencing whether or not authorities can inspect, store or modify that data.

Hi Roel! Border Check (BC) is a browser extension that illustrates the physical and political realities of the internet's infrastructure using free software tools. Why did you think it would be interesting to investigate the travels of data packets?

I stumbled upon this topic when pursuing a personal interest I developed last year as I started with the Networked Media programme at the PZI. I joined this course because my practice has always been engaged with new technologies and the internet. At the same time however, I felt I lacked a lot of knowledge (technical, theoretical) to make statements with and about these media. For one, if someone would have asked me what the internet was, I would not really have had an answer. So one of the first things I started researching while at the PZI was exactly this. What is the internet? It was during the programming courses that I started working with software such as traceroute, which shows you how you connect to servers. Traceroute really fascinated me because suddenly it linked websites to specific machines that could be linked to a company and to a location on the world. This suddenly made the internet very tangible for me.

At the same time while reading up on the history of the internet I realised the difference between how I had previously perceived the internet as a 'cloud', 'wireless', non-physical (which is probably a more common understanding) and the internet as a bunch of physical cables that run through countries and the bottoms of oceans. Tracerouting then became a way to experience this normally invisible infrastructure.

0Dilma.co.br Screenshot.jpg
Dilma screenshot

ebayBCv0.1 Metadata.jpg
Ebay screenshot

Some of the demo you sent me show the data taking a straight line. In other cases, such as for dilma.com.br, the path is more tortuous. How do you explain this? And is every non-straight path accountable for?

The complexity of the paths has a lot to do with the degree of interconnectivity of the networks. Generally, the better the connection between you and the destination server, the smaller the amount of hops on your travel. So if you see a lot of hops and twisting paths, it is probably because there is no direct connection between you and the destination.

The complexity of the paths can also be the result of certain assumptions embedded in the databases used for the visualisation. One of these assumptions has to do with determining where a machine is located in the world. Sometimes the geographical data tied to a machine's IP address reflects where it's owning company is registered, rather than the actual physical location of the machine. So you might get visualisations where you'd see a line travel back and forth between Europe and the US. Rather than actually travelling back and forth the Atlantic, what happens, is that your travel stays in Europe, yet you get on and off networks owned by US and EU companies. Because of this when using BC it's important to click the hops to reveal the machine names, often they contain more hints of where the machines may be actually located.

In this sense BC's visualisations are sometimes a bit more abstract, showing ownership and jurisdiction rather than the physical location.

0laboral_0231.jpg
Installation at Laboral

How does a particular country's laws and practices regarding data affect the path adopted? Do you have examples?

It is not necessarily the case that a state's laws and practices affect the route, rather that the route determines which states's laws and practices one is exposed to.

The internet is routed passively, that is to say, there is no way you can tell your data how it should reach its destination. The internet is designed in such a way that data will always try to find the fastest route available, and that may happen to take your data through countries like the UK that monitor all passing data.

In this sense the route is often more influenced by geography and money. Geography, because some places such as the the UK's West Coast act as a 'funnel' for submarine cables, since they are the first stop for many of those cables when they cross the Atlantic. Money, because richer countries will also have the faster infrastructures and those get a preference when it comes to routing.

Laws and policies can influence where companies set up their offices and data centres though. Facebook for example serves non-US users from Ireland, because of the low taxes it pays there. However, the fact that Facebook is registered in Ireland also means it has to comply with EU privacy laws. A funny example of what that means concretely is a 2011 'meme' that spawned on reddit where European users flooded Facebook with data requests, something that was not possible for American users of Facebook.

What were the most surprising discoveries you made while testing the data travels?

One of the more interesting things I've realised and which is something that I would like to follow up on is how 'historical' the networks actually are. If you compare maps of the submarine cables that make up contemporary intercontinental fibre optic networks with maps of telegraphy networks of the 19th century you will see a lot of similarities.

However, this historical element also became apparent to me using Border Check when for example I found out that much of Latin America is predominantly connected through the Telefonica network. Telefonica is a very large telecommunications company that resulted from the privatisation of Spain's state telecom company.

In this sense one could argue that a lot of Latin American countries are dependent on the telecommunications infrastructure of their former coloniser. This could lead to clashes of interest. In the case of Brazil this has recently become apparent when, in response to NSA spying, Brazillian president Dilma Rousseff announced plans to build a national Brazilian telecommunications infrastructure. There Rousseff wants to ensure that Brazil no longer needs to route via the United States (that is the Telefonica network) and as a consequence be subjected to American monitoring when it connects with the rest of the world.

How do you retrieve the information necessary to map these travels?

While you run Border Check it uses your browser history in order to detect whether you are loading a new website. It then relies on Layer Four Traceroute, which is a tracerouting software, to map the ip addresses of the machines that route your data on it's way to that destination website. Border Check then uses Maxmind's free GeoIP databases to link these adresses to cities, countries and companies. Maxmind to some extent gets this information from repositories of internet registries (organisations that keep track of who registers what website, who owns a certain ip-adress etc). For visualisation Border Check uses Openstreetmap with the leaflet visualisation library.

What's next for BC?

I am really interested in adding more information layers to Border Check that provide some more context on what it could mean when one surfs through a specific country. One of the initiatives I find exciting is www.diriwa.org. It tries to collaboratively map communications and informations rights in the world. I think adding this sort of information will make Border Check much richer. Other than that, releasing updates that would make the software more easy to install and run on different platforms.

Thanks Roel!

Border Check was sponsored by V2_ and developed during a residency at LABoral, within the context of Summer Sessions 2013.

 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10 
sponsored by: