Index of Titles Filed Under 'Surveillance'

PublisherLink Editions2013
“Best of Rhizome 2012” is a selection of texts published on the editorial platform of Rhizome along 2012. Edited by Joanne McNeil, the book is, in the words of Rhizome’s Executive Director Heather Corcoran, “not just a best of Rhizome’s work, but a portrait of the year that we hope will gain significance over time for its contextualization and articulation of artists’ practices. Artists are predictors and barometers of change, and sensitive to their cultural surroundings. From texts on production in the digital age, to the influence of the Occupy Movement, from drones and surveillance, to online vernacular – these ...

Read More

PublisherDarkwallet2015
Decentralised Information Black Market ================================================================== "Darkleaks: Decentralised Cryptographic Information Black Market" Scheme by Peter Todd Code by Amir Taaki *Trustless provably fair information marketplace ############################### # WORK IN PROGRESS # ############################### * Distribute an encrypted file to the world. * Reveal some random section of the contents to prove the legitimacy of its contents using an algorithm for provably fair random selection to all parties. * People bid on the remaining parts. * Leaker redeeming funds automatically releases the ...

Read More

PublisherBook Two2013
Drones – unmanned aerial vehicles – are becoming ubiquitous, yet remain almost invisible. This is a guide to drawing them.

Read More

PublisherRuben Pater2013
TWENTY-FIRST CENTURY BIRDWATCHING Our ancestors could spot natural predators from far by their silhouettes. Are we equally aware of the predators in the present-day? Drones are remote-controlled planes that can be used for anything from surveillance and deadly force, to rescue operations and scientific research. Most drones are used today by military powers for remote-controlled surveillance and attack, and their numbers are growing. The Federal Aviation Administration (FAA) predicted in 2012 that within 20 years there could be as many as 30.000 drones flying over U.S. soil alone. As robotic birds will become commonplace in the near future, we should be prepared to ...

Read More

PublisherFailed Architecture2018
Instagram photos, public transport information, streamed music and Netflix movies seem to appear out of thin air on your phone, don’t they? Well, getting them onto that screen isn’t as light and easy as it feels. There is, in fact, an immense and decidedly heavy infrastructure powering the cloud. More and more architecture is being designed and built to house server space and internet connection hubs. Since these buildings typically use as much energy as a medium-sized city, our digital lives have a direct environmental toll. Minimising this footprint is one of the data centre industry’s main issues. This episode was ...

Read More

ШєƖ⊂σṃє ʈσ ʈңє ďσẘ␤σαď ρα⅁є ғσΓ ʈңє Ĥ∪ṃαи 尺єαďαӸє Ƭƴρє ↁє√єƖσρєď ℁ ραΓʈ ℉ 〞尸Γσ₠§§㏌⅁〞 αиď ʈңє Ᏻ␄ңє ιи§ʈįʈ∪ʈє ⅂į♭ΓαΓƴ’§ 〞єиď(§) θғ Ƭңє ⅂į♭ΓαΓƴ єχңį♭įʈįσи Ƭңє Ĥ∪ṃαи 尺єαďαӸє Ƭƴρє ʪ α ғΓєє ďσẘ␤σαďαӸє αиď є℁ƴ ʈσ ㏌§ʈαƖƖ Ⱪєƴ♭σαΓď ρƖ㎍㏌ ғσΓ ᗰα⊏ ʈңαʈ ㏚σď∪₠§§ ң∪ṃαи-σ␤ƴ ΓєαďαӸє ʈєχʈ ℁ ƴσ∪ ʈƴρє․ ШσΓď§ ẘΓįʈʈєи ʈңʪ ẘαƴ αΓє įƖƖє⅁įӸє ʈσ α∪ʈσṃαʈį⊂ §єαΓ⊂ң ㏚σ₠§§є§ αиď ďαʈα ṃٱи㏌⅁ σρєΓαʈįσ觧․ ␟є įʈ ғσΓ ␙αįʪ˛ ẘє♭ρα⅁є§˛ ғα₠♭σσʞ ρσ§ʈ§˛ єʈ⊂․ ιʈ ʪ ΓєαďαӸє ♭ƴ ң∪ṃαи§ σи αƖṃσ§ʈ αиƴ ďį⅁įʈαƖ ďє√į₠ αиď ρƖαʈғσΓṃ Ƭңє ғįƖє ʪ θρєи Ƨσ∪Γ₠˛ αиď ∪ρďαʈє§ ẘįƖƖ ♭є ρσ§ʈєď ℁ ʈңєƴ σ⊂℆Γ.   ιЍƧƬ尺ΰ⊏ƬιθЍƧཿ ɭ․ ⊂Ɩį⊂ʞ ʈσ ↁσẘ␤σαď αиď §α√єƬңє ☡įρρєď ṃα⊂․θ§ ғιƖє ...

Read More

On YouTube, the Jackson Hole traffic cam broadcasts a live view from a pizzeria at a mundane intersection in Wyoming. In this space of the live-streaming cam, nothing seems to actually happen, but in the flow of sameness, everything happens. Minor events become enormous. And for some reason, tens of thousands of people gather online to watch this particular cam together…

Read More

PublisherEmil Kozole2015
Project Seen is a typeface that is concerned with privacy and the interception of our communications by the NSA. It automatically strikes through so called “spook words” as they are written. Try typing anywhere on this website. “Seen” is a font that has a preloaded set of sensitive “spook words” that the NSA and other agencies are using to scan through our documents. The typeface can be used in any popular software such as Illustrator, Indesign, Word or in a browser. It can be used normally to write text as any other font does, but once one of these trigger words is ...

Read More

PublisherRealeyes2017
Realeyes is a commercial platform that performs real-time measurement of emotional responses to video stimuli through facial recognition AI modeling. Using (with consent, for now) the intake of webcam feeds, the platform records and analyzes the shape of facial responses while a subject watches a video, telling advertisers and marketers how to more effectively reach a consumer’s core sense of decision-making. Founded at Oxford University in 2007, Realeyes shares some traits with the now-famous Cambridge Analytica company, deriving actionable (and expensive) data from the aggregated emotional reactions of thousands of users. This stunningly benign-seeming white paper lays out the psychological ...

Read More

PublisherWilliam Wiebe2018
Published on the occasion of the exhibition Chekhov’s Gun at 062 Gallery. An industrial revolution is a product test that everyone participates in. One’s participation is induced by the diffusion of new technologies, the depth of their adoption and their aggregate influence.1 In a promotional video, the World Economic Forum heralds the fourth industrial revolution as “blurring the lines between the physical, digital, and biological spheres.”2 A visit to Davos truly is not complete without an experience of these new forms of time compression. Try out the seventy-five minute refugee simulation sponsored by Facebook.3 Tell us about your experience having your ...

Read More

PublisherAdam Harvey2016
SKYLIFT is a geolocation emulator that virtually relocates visitors to Julian Assange’s residence at the Ecuadorian Embassy in London. The device was made for !Mediengruppe Bitnik’s Assange room (held at Zoo Galerie) and works by broadcasting WiFi signals that exploit a smartphone’s reliance on using nearby MAC addresses for location services. SKYLIFT works without connecting to any WiFi network. The only requirements are that you have WiFi turned on and location services enabled. There is no IP spoofing, no GPS signal spoofing, no VPN, and no 3rd party app involved. SKYLIFT will adjust your smartphone’s location to 3 Hans Crescent Knightsbridge, London SW1X 0LS (The Ecuadorian Embassy in ...

Read More

PublisherWilliam Wiebe2017
Suprahuman is the product of a collaboration between William Wiebe and Dr. John Santerre, a computer scientist working on the development of scalable machine learning techniques for use on cancer and antimicrobial resistance. In the book, Wiebe and Santerre bring aerial surveillance into conversation with research imagery integral to the evolution of cutting-edge deep neural networks, a juxtaposition that recognizes the persistent links between military power and scientific advancement. This relationship is especially relevant to the funding and development of artificial intelligence, which has largely been underwritten by the Defense Advanced Research Projects Agency. Our work explores the possibilities of a concealment sited ...

Read More

PublisherLink Editions2016
Surveillance, paranoia, invisibility & the internet How did the internet go from the utopian free-for-all, open source heaven, libertarian last frontier to the current state of permanent surveillance, exhibitionism and paranoia? This duplicity is the underlying thread that links the artists, activists, and researchers in The Black Chamber, an exhibition, a symposium, an urban intervention and a publication. Developed through ongoing research on these subjects by internationally renown artist duo Eva & Franco Mattes and researcher and curator Bani Brusadin, The Black Chamber aims at discussing the delicate and often awkward role of art and imagination in the age of mass surveillance, stressing ...

Read More

PublisherMeson Press2015
Be it in the case of opening a website, sending an email, or high-frequency trading, bits and bytes of information have to cross numerous nodes at which micro-decisions are made. These decisions concern the most efficient path through the network, the processing speed, or the priority of incoming data packets. Despite their multifaceted nature, micro-decisions are a dimension of control and surveillance in the twenty-first century that has received little critical attention. They represent the smallest unit and the technical precondition of a contemporary network politics – and of our potential opposition to it. The current debates regarding net neutrality and ...

Read More

PublisherThe New Inquiry2017
Facial recognition technology turns your face into code that can be archived and traded among strange and suspect parties. Its growing sophistication in the hands of law enforcement poses a particular threat to anonymous dissent. Civil rights groups are already forecasting a near future where police use of facial recognition to track protesters will discourage people from hitting the streets. The face is only one of several methods that companies specializing in biometric identification technology are developing at a rapid pace. Because they’re harder to forge than passwords, companies are scooping up our faces, gaits, irises and fingerprints in the name ...

Read More

ZXX
PublisherSang Mun2012
ZXX ver.1.0 www.z-x-x.org ZXX is a disruptive typeface that is unreadable by OCR text scanning software (whether used by a government agency or a lone hacker) — misdirecting information or sometimes not giving any at all. It can be applied to huge amounts of data, or to personal correspondence. I drew six different cuts (Sans, Bold, Camo, False, Noise and Xed) to generate endless permutations, each font designed to thwart machine intelligences in a different way. Developed by Sang Mun www.sang-mun.com The name ZXX comes from the Library of Congress’ Alpha-3 ISO 639-2  — codes for the representation of names of languages. ZXX is used to ...

Read More

Join Our Mailing List