Search

Search content of the knowledge base.

The search found 19 results in 0.009 seconds.

Search results

  1. Echelon

    This work was made in response to a call by Metamute (London) for Jam Echelon Day 2001. It simply employs all the words stored in the Echelon system in a program that automatically generates texts using whatever dictionary it has available.

    Whenever a user moves their mouse over a text it will automatically re-write itself as a new text. It will then e-mail that text to a random e-mail address (this last e-mailing component of the work is currently disabled, but will be enabled by the artist at the appropriate time - the effect will be to flood the net with echelon sensitive messages at the rate of hundreds per minute, depending on user interaction).

    Echelon is the worldwide signals intelligence network run by the US National Security Agency and the UK Government Communications Headquarters in collaboration with Canada, Australia and New Zealand. Echelon uses large ground-based radio antennae in the United States, Italy, the UK, Turkey, New Zealand, Canada, Australia, and several other countries to intercept satellite transmissions and some surface traffic, as well as employing satellites to tap transmissions between cities.

    Simon Biggs - 21.09.2010 - 11:39

  2. Ubermatic

    Ubermatic

    Scott Rettberg - 19.05.2012 - 19:49

  3. Revelations of Secret Surveillance

    Revelations of Secret Surveillance

    Scott Rettberg - 16.06.2012 - 14:08

  4. Kliniken

    Kliniken

    Scott Rettberg - 03.11.2012 - 13:04

  5. The Wedding Celebration of Gunter and Gwen

    Exploring connections between surveillance and interference in the lives of artists, "The Wedding Celebration of Gunter and Gwen" is a hyperlibretto where the experience of a wedding celebration is created with words, graphic icons, and glockenspiel intermezzi. 

    Artist Statement

    "The Wedding Celebration of Gunter and Gwen" is informed by a strategy of following signs and signifiers that point to ancient systems of control of people's lives. It is a device used by Dan Brown in Angels & Demons and The Da Vinci Code, although actually it was through the performance artist's strategy of looking at hypertextual connections in my own eventful life that "Celebration" took on this aspect. 

    Scott Rettberg - 09.01.2013 - 16:29

  6. Carnivore

    Carnivore is a surveillance tool for data networks. At the heart of the project is CarnivorePE, a software application that listens to all Internet traffic (email, web surfing, etc.) on a specific local network. Next, CarnivorePE serves this data stream over the net to an unlimited number of creative interfaces called "clients." The clients are each designed to animate, diagnose, or interpret the network traffic in various ways.

    Jill Walker Rettberg - 29.08.2013 - 14:04

  7. #PRISOM

    #PRISOM is a Synthetic Reality Game where a player is set loose in a Glass City under infinite surveillance. It is designed to encourage players to ponder the increasing global adoption of PRISM-like surveillance technology. Every one of the “#WhatDoYouDo” scenarios that you’ll encounter when playing the game stem from real-life scenarios, including the ongoing unconstitutional treatment and [in some cases] incarceration of those keen to expose the nature of heavily surveilled and overtly monitored societies

    Andy Campbell - 29.11.2013 - 14:31

  8. ScareMail

    ScareMail is a web browser extension that makes email "scary" in order to disrupt NSA surveillance. Extending Google's Gmail, the work adds to every new email's signature an algorithmically generated narrative containing a collection of probable NSA search terms. This "story" acts as a trap for NSA programs like PRISM and XKeyscore, forcing them to look at nonsense. Each email's story is unique in an attempt to avoid automated filtering by NSA search systems. One of the strategies used by the US National Security Agency's (NSA) email surveillance programs is the detection of predetermined keywords. Large collections of words have thus become codified as something to fear, as an indicator of intent. The result is a governmental surveillance machine run amok, algorithmically collecting and searching our digital communications in a futile effort to predict behaviors based on words in emails. ScareMail proposes to disrupt the NSA's surveillance efforts by making NSA search results useless. Searching is about finding the needles in haystacks.

    Alvaro Seica - 19.06.2014 - 17:25

  9. London CryptoFestival 2013

    Freaked out by spiralling revelations of NSA surveillance? Worried that the spooks have subverted the internet at every level to make it a vast, multi-layered panopticon? Or simply creeped out by the way services like Facebook & Gmail track everything you do so they can profile you for advertising?

    Whatever your paranoia, now is not the time to give up on the internet. It's time for a CryptoFestival! On November 30th we're coming together to build on the success of the CryptoParty movement and to reclaim our right to communicate and experiment on the internet.

    CryptoParties have taught thousands of people the basic ways of protecting themselves and their data from intrusive surveillance. London CryptoFestival will have skill-sharing sessions on how to have private conversations over instant messaging, how to encrypt emails, how to browse anonymously and how to reliably encrypt your hard disk amongst other things. It's peer-against-fear; the self-organised activity of people teaching each other essential privacy skills.

    Hannah Ackermans - 31.12.2015 - 13:57

  10. PRISM Breakup

    On October 4–6, 2013, Eyebeam hosted the first event of its kind, PRISM Breakup, a series of art and technology events dedicated to exploring and providing forms of protection from surveillance. This event came about in part from Eyebeam’s mission to support the work of artists who critically expose technologies and examine their relationship to society, as well as offering continued support to its alumni following their residencies. The gathering brought together a wide spectrum of artists, hackers, academics, activists, security analysts and journalists for a long weekend of meaningful conversation, hands-on workshops, and an art exhibition that was open October 4–12. (Source: http://prismbreakup.org/)

    Hannah Ackermans - 31.12.2015 - 14:10

Pages