thanks, Steffi, for another great poster!
seminars
Drones & Satellite issues (with a bit of Big Data mixed in)
Talking points and links from today’s seminar, in chronological order:
Amazon delivery drones are coming http://wordpress.khm.de/sag/?p=1628
Ostfriesen testen Bierdrohne https://www.youtube.com/watch?v=e2oVw39rk1U
Matrix Sentinel https://www.google.com/search?tbm=isch&q=matrix%20sentinel&tbs=imgo:1
autonome Kampfroboter: “Das Gesicht unserer Gegner von morgen” http://www.faz.net/aktuell/feuilleton/debatten/krieg-mit-drohnen-das-gesicht-unserer-gegner-von-morgen-11897252.html?printPagedArticle=true#pageIndex_2
a science fiction novel in our Semesterapparat: Daniel Suarez, Kill Decision New York, NY: Penguin , 2013 . – 495 S
Rezension von Dietmar Dath dazuin der FAZ vom 21.7.2012: http://www.faz.net/aktuell/feuilleton/buecher/thriller-kill-decision-von-daniel-suarez-wie-technik-die-welt-zum-schlechteren-wendet-11826693.html?printPagedArticle=true#pageIndex_2
Surveillance in Science Fiction. About how most things that were once science fiction are now here and in use. Plus a list of actual surveillance measures deployed right now.
http://rhizome.org/editorial/2012/jun/6/natural-history-surveillance/ linking to:
http://www.technovelgy.com/ct/Science_List_Detail.asp?BT=Surveillance
Martha Rosler quoting from Philip K. Dick: Vulcan’s Hammer http://www.martharosler.net/projects/drone2.html
Anti-drone self-defense
Animals and drones – chimpanzee https://www.youtube.com/watch?v=wPidiiaovL4
Animals attacking drones
“Thank you, animals, for being able to express how we all feel.”
+ another comment below:
“drones shouldnt be considered property, if i destroy them, it is self defense in 100% of cases, as a person with programming knowledge, I know you can program to do literally anything you desire for them to do, and since, by sight i cannot know what they are programmed to do, and yet at sight they may be able to harm me, i have the right to disable them, they are hazardous anima they cannot be of traditional perception of “property” .. when i can see them, they infringe upon me explicitly.”
https://www.youtube.com/watch?v=9F8sPBsR9Lo
These Shotgun Shells Are Made for Shooting Down Drones http://makezine.com/2015/08/19/these-shotgun-shells-are-made-for-shooting-down-drones/
Long-Distance Jammer Is Taking Down Drones http://makezine.com/2015/10/16/research-company-takes-aim-uavs-portable-anti-drone-rifle/
new problems! but what about robot rights? https://www.schneier.com/blog/archives/2015/08/shooting_down_d.html
Drones that shoot back https://www.youtube.com/watch?v=xqHrTtvFFIs
Prototype Quadrotor with Machine Gun! https://www.youtube.com/watch?v=SNPJMk2fgJU
Basically these things exist in reality and have been used in war for quite some time now.
The Intercept – Drone Papers https://theintercept.com/drone-papers
Al-Quaida anti drone instructions: http://hosted.ap.org/specials/interactives/_international/_pdfs/al-qaida-papers-drones.pdf
Eben Moglen: Time To Apply Asimov’s First Law Of Robotics “A robot may not injure a human being or, through inaction, allow a human being to come to harm.” http://www.forbes.com/sites/andygreenberg/2012/06/26/eben-moglen-time-to-apply-the-first-law-of-robotics-to-our-smartphones/
typical news photo 2015 – it’s now OK to photograph someone from above and use that in newspapers
Big Data using Satellite view: skybox startup
“Inside a Startup’s Plan to Turn a Swarm of DIY Satellites Into an All-Seeing Eye” http://www.wired.com/2013/06/startup-skybox/
“Skybox Imaging empowers global businesses to make better decisions with timely, high fidelity imagery and infinite analytics.” http://www.skyboximaging.com/products/analytics
Introducing SkyNode – yes let’s try and order this for seminar use: http://www.skyboximaging.com/products#access
In the end, the aim is to have a live street-view. Example full-HD videos: https://www.youtube.com/watch?v=BsW6IGc4tt0&index=1&list=PLIIuwfzJSzET1C0KDpA5FZrHLlDGfcHr3
conflict in Tripoli https://www.youtube.com/watch?v=OWXN3CXsxTg
The discussion strayed into Big Data territory (even though we try to concentrate on aerial issues), so let’s have this excellent essay as a last point:
James Bridle, booktwo.org: Big Data, No Thanks http://booktwo.org/notebook/big-data-no-thanks/
SAG shared calendar with all seminar events, constantly updated.
We have a shared calendar with all seminar dates. Maintained by Christian and Julia in a collaborative effort, this calendar will always hold the latest info about seminar events, and some more stuff we think is relevant to the group.
You can see the calendar in a web page here.
Another way to access it is to subscribe to it with your favorite calendaring application.
To do that, select and copy this address:
https://kalender.khm.de/public.php/sag/SAG-Public-Events/
Then go to e.g. Calendar.app and choose Calendar -> Subscribe (-> Abonnieren on German systems). Paste the entire address including the https://.
Accept and trust the security certificate, and confirm with your computer password.
Make sure to switch ‘Auto-Update’ on (set it to an hour or so).
The procedure is similar on smart phones and with other calendaring apps. Happy to help if you need setting it up!
Gendered surveillance
When teacher Catharine Higginson, 45, discovered by accident that her husband James, 42, had installed an app on her phone which allows him to track her movements, read her texts and even listen to her conversations she didn’t plan to divorce him as her friends urged, for being creepy and intrusive.
Instead, the mum of three from Dorking, Surrey, says it makes her feel loved and safe
This is beyond creepy (via) . Make sure you get the undertones about the power structures at play here. It reads like an advert for personal tracking apps.
It also completely ignores the huge problem of women being utterly exposed to stalkers through spyware just like the one celebrated in that article. Women (it’s always women) seeking shelter from stalkers now routinely have to go through a digital quarantine, to make sure they’re really safe. See Surveillance Begins at Home and Digital Detox At The Shelter.
Another example why the NSA’s undermining of security standards is so harmful. Everyone’s mobile phones are unsafe by design. All of them have backdoors for law enforcement built in, but it’s impossible to restrict the use of those to only the ‘good guys’. As a result, creeps and criminals exploit them, too. This isn’t just about privacy, it’s about being safe from physical harm. People get killed because of this.
Semesterapparat for Women under Surveillance
Semesterapparat
Women under Surveillance
KHM WS 2014/15
Exposed. voyeurism, surveillance and the camera
These selected essays:
1. Looking Out, Looking In, Voyeurism and its affinities from the beginning of photography, Sandra S. Phillips
3. Voyeurism and Desire, Sandra S. Phillips
4. Celebrity and the Public Gaze, Sandra S. Phillips
5. Surveillance, Sandra S. Phillips
6. Up Periscope! Photography and the surreptitious image
Simon Baker
9. Dare To Be Famous, Self-Exploitation and the Camera, Richard B. Woodward
10. From Observation to Surveillance, Marta Gili
Rosalind Krauss
Essay: Cindy Sherman: Untitled
Especially the first two chapters, about the film stills and the horizontals. All of it is great. Available in the original English and in German.
CTRL [Space]: Rhetorics of Surveillance, from Bentham to Big Brother, Thomas Y. Levin, Ursula Frohne, and Peter Weibel, ed. (Cambridge, MA: MIT Press, 2002)
All the essays are worth a read but start with these two essays:
Victor Burgin, “Jenni’s Room”, 228-235
Peter Weibel, “Pleasure and the Panoptic Principle”, 207-223
Beatriz Colomina: Sexuality & space
Essay by Beatriz Colomina: The Split Wall, Domestic Voyeurism,
p. 72-128
welcome to the Winter Term 2014/15
Introduction to Cyber Security – free online course
Happy to advise if you think this could be something for you…
We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important.
This free online course will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you.
https://www.futurelearn.com/courses/introduction-to-cyber-security