Surveillance and censorship are mutually dependent; they cannot be viewed separately
The book documents creative strategies by artists, fashion designers and other media users to become virtually faceless for aesthetic, fetishist or resistance purposes
The book portrays the routine cruelties of the twenty-first century through a series of detailed non-fictional graphic illustrations. None of these cruelties represent extraordinary violence – they reflect day-to-day implementation of laws and regulations around the globe
For their “Forensic Fantasies” trilogy, KairUs (Linda Kronman and Andreas Zingerle) used data recovered from hard-drives dumped in Agbogbloshie, Ghana to develop works that investigate the issue of data breaches of private information and ask: What happens to our data when we send a computer, an hard disk or any kind of other storage device to the garbage?
An exhibition at BOZAR in Brussels explores the intersection between photography and surveillance. Employing a dynamic range of approaches—from documentary to conceptual practice, from appropriation to street art—these 10 artists provide a satellite-to-street view of the ways in which surveillance culture blurs the boundaries between the private and public realm
Exploitation Forensics is a collection of maps and documents created as a result of investigations conducted in the last few years by the SHARE Lab. The maps will help visitors explore the invisible layers of contemporary technological black boxes and their fractal supply chains, exposing various forms of hidden labour and the exploitation of material resources and data
The conference brought together leading artists and thinkers from the world of art, technology, science and documentary. The food was a bit revolting. Everything else was amazing
Creditworthy highlights the leading role that commercial surveillance has played—ahead of state surveillance systems—in monitoring the economic lives of Americans. Lauer charts how credit reporting grew from an industry that relied on personal knowledge of consumers to one that employs sophisticated algorithms to determine a person’s trustworthiness
Joana is an artist and a researcher whose work critically explores the way post-capitalist narratives affect the alphabetization of machines, humans and ecosystems. Her main research topics include Internet materiality, surveillance, online tracking, critical interfaces and language
By obfuscating the limited number of emotions offered to you by Facebook, this plug-in allows you to fool the platform algorithms, perturb its data collection practices and appear as someone whose feelings are emotionally “balanced”
At a time when the death of privacy is widely proclaimed, historian David Vincent, describes the evolution of the concept and practice of privacy from the Middle Ages to the present controversy over digital communication and state surveillance provoked by the revelations of Edward Snowden
Designers have to start thinking about transparency and accessibility in the design of privacy-sensitive products and services. This book offers the designer guidance, in the form of eight design principles, that help with designing products and services
Everyone knows about cybercrime and how owning networked computers and mobile devices makes you a potential victim of bank fraud, identity theft, extortion, theft of confidential information, etc. Data stored on your computer is never safe and its ghosts can come back and haunt you long after you’ve discarded your electronic device, long after even you’ve erased the data it contained
In a world where scientific rationalism rules, interest is on the rise for alternative forms of relating to the world and to others.
The objects, books, artifacts, gadgets and artworks offer a contemplation on autonomy as a disappearing modus operandi of political action, while workshops, discussions and demos focus on the devices we use every day: How do they work? What individual data traces do they capture? Where do these go, and what kind of control can one regain?
Authors Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage—especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it
Visit the scene of a crime by live webcam or inform the police of an offense. In Sheriff Software, media artist Dries Depoorter allows us to peer over the police’s shoulder – or even play traffic cop ourselves
Annie Machon is an intelligence expert and author who worked for 6 years as an intelligence officer for MI5, the UK domestic counter-intelligence and security agency. Together with her ex-partner, David Shayler, she resigned in the late 1990s to blow the whistle on the spies’ incompetence and crimes
Next week, NOME, one of those too rare galleries exploring art, politics, and technology, is going to open Jacob Appelbaum’s first solo show in Germany. There will be stuffed pandas, portraits of political dissidents and far too many secrets
Drone crews, analysts, intelligence officials and military commanders all speak frankly to the author about how armed drones revolutionized warfare–and the unexpected costs to some of those involved
Two of the presentations i enjoyed covered the representation of intelligence agencies in films and tv fiction, another was about the influence that new forms of surveillance are having on the rise of home-grown (‘home’ being the U.S.A., the symposium was organised by the Institute of North American Studies) white extremist groups. And a fourth talk commented on the delusory quest to control State information
In the wake of the Snowden revelations about the surveillance capabilities of intelligence agencies, this interdisciplinary symposium gathers experts to discuss the place and implications of secrecy in contemporary culture and politics
With his public intervention Overexposed, artist Paolo Cirio disseminates unauthorized pictures of high-ranking U.S. intelligence officials throughout major cities. Cirio obtained snapshots of NSA, CIA, and FBI officers through social media hacks. Then, using his HD Stencils graffiti technique, he spray-paints high-resolution reproductions of the misappropriated photos onto public walls
The practice of targeted killing by drones raises many questions: “How many civilians have been killed as collateral damage during these strikes?” “And even if we’re talking about militants, how can the killings be justified when there has been judicial supervision? “If these drones can reach their targets anywhere, then how is the battlefield defined?” “Right now, only 3 countries use drones for targeted killings: the U.S., Israel and the UK. Where will this stop?” “And if these targeted killings are illegal, why does Europe keep silent?”
Christoph Wachter & Mathias Jud have installed WLAN / WiFi mesh network with can antennas on the roofs of the Academy of Arts and the Swiss Embassy, both located in the heart of “NSA’s Secret Spy Hub in Berlin.” The particularity of the network is that it is open and at the disposal of passersby to communicate anonymously and even send messages to operatives of the NSA and GCHQ intelligence who might lurk inside the nearby British Embassy and Embassy of the United States
The exhibition zooms in on the shock and awe of drone warfare, and addresses the ethical and legal ambiguity of drones, mass surveillance and war at a distance. It presents the work of contemporary artists who are critiquing the way in which military technology and networks can obscure, conceal and distance us from the political and social reality of warfare today
The machine prints self destructing documents. The documents merge images and texts extracted from Cold War fictions with excerpts from current secret documents, resulting in an amalgam that blurs the line between present reality and past fiction. A short amount of time after leaving the machine the documents burst into fire and their content is forever erased as the flames consume the paper
Ghostradio deploys feedback and quantum effects to create random numbers from the boundaries of reality and beyond. Ghostradio publishes the resulting random number datastream for the generation of cryptographic keys. This will release the public from the current state of surveillance
Jennifer Lyn Morone has turned herself into a corporation and collection of marketable goods and services. Everything she is biologically and intellectually, everything she does, learns and creates has the potential to be turned into profits. Jennifer Lyn Morone™ Inc is a graduation project in Design Interactions but as Jennifer underlines, this is not a speculative project
Inspired by the work of J.G. Ballard, our story looks to the bleak, man-made landscapes of the future and asks: What happens when virtual environments become indistinguishable from reality? Will our global culture allow us to choose where to live, and who will stop us? What will we do with knowledge that becomes freely available to all?
Critical Exploits showed how a new generation of artists, designers and engineers are taking a highly critical approach to the development and use of the engineered systems and infrastructures that we increasingly rely on for daily life
Much of Treister’s recent work maps ways that human intelligence and military intelligence currently interact and work on each other. She explores how in a world increasingly determined by pervasive technologies and the demands of the military and security arms of government and state, new relations between the observer and the observed have been established and new subjectivities formed
As one surfs the net, data packets are sent from the user’s computer to the target server. The data packets go on a journey hopping from server to server potentially crossing multiple countries until the packets reach the desired website. In each of the countries that are passed different laws and practices can apply to the data, influencing whether or not authorities can inspect, store or modify that data
Conducted and presented as a scientific experiment TNM challenges the participants to consider the outrageous proposition of algorithmic prejudice. The responses range from fear and outrage to laughter and ridicule, and finally to the alarming realization that we are set on a path towards wide systemic prejudice ironically initiated by its victim, Turing
I knew about Bitcoin, i had heard of the Tor software that enables online anonymity but other than that, i felt that there was precious little i knew about the Deep Web, the vast submersed side of the World Wide Web that countless people are using in perfect anonymity every day to buy goods that neither ebay nor amazon will ever sell you and to exchange services that never appear when you do a google search. The more i looked into online black markets, the more intrigued i was. I thought that the easiest and fastest way to get a better understanding of the issue would be to interview Arthur Heist
The Reposition Matrix is an investigation into the military-industrial production and trading networks of Unmanned Aerial Vehicles (also commonly referred to as Drones). The workshop aims to reterritorialise the drone as a physical, industrially-produced technology of war, and consequently explore how this affects our understanding of the covert drone campaigns in the Middle East
Under the Shadow of the Drone is a life-size depiction of a Reaper drone, one of a number of such weapons in service with US and UK forces. The Reaper is used for surveillance and bombing missions, in the declared war zones of Afghanistan and Iraq, and in the illegal wars of assassination taking place in Pakistan, Yemen and elsewhere. Such wars are made possible by the invisibility of drones to most people
In the context of omnipresent telecommunications surveillance, “The Pirate Cinema” makes visible the invisible activity and geography of peer-to-peer file sharing. The project is presented as a control room that reflects P2P exchanges happening in real time on networks using BitTorrent protocol. The installation produces an improvised and syncopated arrangement of files currently in exchange
Our radio interview will focus on the Critical Engineering Manifesto that Julian wrote a year ago together with Gordan Savičić and Danja Vasiliev. Expect explanations about why Engineering is the most transformative language of our time, questions about how to adopt the critical engineering ethos if you have next to zero technical skills, and details about Julian Oliver’s upcoming projects
Today i’m talking to Tom Keene, an artist whose work investigates technological objects and attempts to understand their agency and how they act as mechanisms of control within contemporary society. Our conversation will focus on topics such as the social impact of the Viterbi algorithm (with a previous explanation on what the algorithm does exactly) and wireless infrastructures, the loss of public space in cities, in particular in London and in the area surrounding the Olympic sites.