advertising
social

For their “Forensic Fantasies” trilogy, KairUs (Linda Kronman and Andreas Zingerle) used data recovered from hard-drives dumped in Agbogbloshie, Ghana to develop works that investigate the issue of data breaches of private information and ask: What happens to our data when we send a computer, an hard disk or any kind of other storage device to the garbage?

An exhibition at BOZAR in Brussels explores the intersection between photography and surveillance. Employing a dynamic range of approaches—from documentary to conceptual practice, from appropriation to street art—these 10 artists provide a satellite-to-street view of the ways in which surveillance culture blurs the boundaries between the private and public realm

Exploitation Forensics is a collection of maps and documents created as a result of investigations conducted in the last few years by the SHARE Lab. The maps will help visitors explore the invisible layers of contemporary technological black boxes and their fractal supply chains, exposing various forms of hidden labour and the exploitation of material resources and data

Creditworthy highlights the leading role that commercial surveillance has played—ahead of state surveillance systems—in monitoring the economic lives of Americans. Lauer charts how credit reporting grew from an industry that relied on personal knowledge of consumers to one that employs sophisticated algorithms to determine a person’s trustworthiness

The objects, books, artifacts, gadgets and artworks offer a contemplation on autonomy as a disappearing modus operandi of political action, while workshops, discussions and demos focus on the devices we use every day: How do they work? What individual data traces do they capture? Where do these go, and what kind of control can one regain?

Annie Machon is an intelligence expert and author who worked for 6 years as an intel­li­gence officer for MI5, the UK domestic counter-intelligence and security agency. Together with her ex-partner, David Shayler, she resigned in the late 1990s to blow the whistle on the spies’ incom­pet­ence and crimes

Two of the presentations i enjoyed covered the representation of intelligence agencies in films and tv fiction, another was about the influence that new forms of surveillance are having on the rise of home-grown (‘home’ being the U.S.A., the symposium was organised by the Institute of North American Studies) white extremist groups. And a fourth talk commented on the delusory quest to control State information

With his public intervention Overexposed, artist Paolo Cirio disseminates unauthorized pictures of high-ranking U.S. intelligence officials throughout major cities. Cirio obtained snapshots of NSA, CIA, and FBI officers through social media hacks. Then, using his HD Stencils graffiti technique, he spray-paints high-resolution reproductions of the misappropriated photos onto public walls

The practice of targeted killing by drones raises many questions: “How many civilians have been killed as collateral damage during these strikes?” “And even if we’re talking about militants, how can the killings be justified when there has been judicial supervision? “If these drones can reach their targets anywhere, then how is the battlefield defined?” “Right now, only 3 countries use drones for targeted killings: the U.S., Israel and the UK. Where will this stop?” “And if these targeted killings are illegal, why does Europe keep silent?”

Christoph Wachter & Mathias Jud have installed WLAN / WiFi mesh network with can antennas on the roofs of the Academy of Arts and the Swiss Embassy, both located in the heart of “NSA’s Secret Spy Hub in Berlin.” The particularity of the network is that it is open and at the disposal of passersby to communicate anonymously and even send messages to operatives of the NSA and GCHQ intelligence who might lurk inside the nearby British Embassy and Embassy of the United States

The exhibition zooms in on the shock and awe of drone warfare, and addresses the ethical and legal ambiguity of drones, mass surveillance and war at a distance. It presents the work of contemporary artists who are critiquing the way in which military technology and networks can obscure, conceal and distance us from the political and social reality of warfare today

The machine prints self destructing documents. The documents merge images and texts extracted from Cold War fictions with excerpts from current secret documents, resulting in an amalgam that blurs the line between present reality and past fiction. A short amount of time after leaving the machine the documents burst into fire and their content is forever erased as the flames consume the paper

Jennifer Lyn Morone has turned herself into a corporation and collection of marketable goods and services. Everything she is biologically and intellectually, everything she does, learns and creates has the potential to be turned into profits. Jennifer Lyn Morone™ Inc is a graduation project in Design Interactions but as Jennifer underlines, this is not a speculative project

Much of Treister’s recent work maps ways that human intelligence and military intelligence currently interact and work on each other. She explores how in a world increasingly determined by pervasive technologies and the demands of the military and security arms of government and state, new relations between the observer and the observed have been established and new subjectivities formed

As one surfs the net, data packets are sent from the user’s computer to the target server. The data packets go on a journey hopping from server to server potentially crossing multiple countries until the packets reach the desired website. In each of the countries that are passed different laws and practices can apply to the data, influencing whether or not authorities can inspect, store or modify that data

Conducted and presented as a scientific experiment TNM challenges the participants to consider the outrageous proposition of algorithmic prejudice. The responses range from fear and outrage to laughter and ridicule, and finally to the alarming realization that we are set on a path towards wide systemic prejudice ironically initiated by its victim, Turing