Surveillant Architectures

let's Cryptoparty again

Cryptoparty sticker

Mittwoch, 30. April 2014
ab 18.00 Uhr bis ca. 21.00 Uhr Workshops und freies Rumhängen

Cryptopartys sind eine globale DIY-Initiative zur Emanzipation aus der technologischen Unmündigkeit.

Wir meinen, das Thema der digitalen Rundum-Überwachung sollte gerade auch an der Kunsthochschule für Medien kritisch beleuchtet werden. Deshalb freuen wir uns besonders, bereits die zweite Cryptoparty zu veranstalten.

Wieder geht es um die Rückeroberung der Datenhoheit. In entspannter Atmosphäre wird konkretes Wissen rund um Verschlüsselungstechniken und die digitale Selbstverteidigung vermittelt. Bitte Laptop, Notebook oder Vergleichbares mitbringen, um gleich vor Ort loslegen zu können.

Eine Initiative des Surveillant Architectures Seminars mit Jürgen Fricke.

GLASMOOG, Kunsthochschule für Medien Köln

p.s.
wer sich vorbereiten will oder morgen keine Zeit hat:
(auf deutsch): https://digitalcourage.de/support/digitale-selbstverteidigung
(English): Eff’s Surveillance Self-Defense site: https://ssd.eff.org/

Ich bringe diese hier mit

what surveillance does to you

The effects of surveillance to personal liberty nicely explained: In English und auch auf deutsch.

During the war, Freud lectured on “The Censorship of Dreams” in early December 1915. Around that time, he inserted a new body of text into The Interpretation of Dreams, mapping wartime dream censorship directly onto wartime postal censorship:

Frau Dr. H. von Hug-Hellmuth (1915) has recorded a dream which is perhaps better fitted than any to justify my choice of nomenclature [for censorship]. In this example the dream-distortion adopted the same methods as the postal censorship for expunging passages which were objectionable to it. The postal censorship makes such passages unreadable by blacking them out; the dream censorship replaced them by an incomprehensible mumble.”

A fragment here: A 50-year-old “cultivated and highly esteemed lady” had (in her dream) gone to Garrison Hospital No. 1 saying that she wanted to volunteer for “service” meaning (as was evident to everyone in earshot): “love service” (Liebesdienste). To the sentry she announced, “I and many other women and girls in Vienna are ready to [mumble, mumble].” Yet everyone in the dream understood her. One of the officers: “Suppose, madam, it actually came to…(mumble).” Or later, the dreamer: “It must never happen that an elderly woman…(mumble)…a mere boy. That would be terrible.” As she walked up the staircase she heard an officer comment: “That’s a tremendous decision to make – no matter whether a woman’s young or old! Splendid of her!”

Privacy and Surveillance Conference, UC Berkeley

The conference is hosted by the Data and Democracy Initiative at University of California at Berkeley.  Do let me know if you would like your work included as part of the dialogue.

Event: Pan Optics: Perspectives on Digital Privacy & Surveillance
March 6, 2014 11am-4:30pm
Banatao Auditorium, Sutardja Dai Hall

Presented by CITRIS, CITRIS Data & Democracy Initiative, UC Davis Research Initiative in Digital Cultures

“Recent disclosures about the NSA’s international and domestic surveillance activities have stimulated overdue policy discussions among politicians and outrage among activists. The revelations have also suggested a need to address issues of privacy and surveillance on a broader level across a range of disciplines.

As a pervasive practice employed by governments, corporations, and individuals, routine data collection and ubiquitous camera technology are shifting boundaries and cultural expectations about what should and should not be shared. This symposium will bring together scholars and practitioners from a range of disciplines to discuss privacy protections, surveillance methods, and modes of resistance in a digital age.”

http://democracy.citris-uc.org/

physical and virtual

In the words of Eric Schmidt, executive chairman at Google (paraphrased, I can’t find the original quote):

“Identity will change from something that originates in the physical world and is being projected into the virtual world, to Identity that is created in the virtual and experienced in the physical world.”

Coincidentally, there is this news story about how US officials set up tents in hotel rooms where they fear surveillance. Shielding from video cameras, defeating audio bugs with a white noise generator, and even protecting against electromagnetic snooping. It took some work to find out what they look like from the outside. They appear very physical indeed. A psychoanalytic’s dream.

tenda-gonfiabile-010

tent-ready

http://www.solianiemc.com/

F.tenda-TIS-rm

F.tenda-ingresso-CIMA-apertura

Can we get one please?

what paranoid networking physically looks like (and sounds like)

From a discussion about protecting yourself against most ‘black bag’ and ‘evil maid’ attacks.

put distinctive scratches into all your peripherals, take a photo, and regularly check that the scratches are identical to the photo. This is how weapons inspectors ensure the seals protecting weapons caches have not been tampered with. The seals are scratched in a distinctive way that can’t be forged, then check periodically. Use tamper evident tape on your devices to slow down a burglar that wants to plant a keylogger in your keyboard.

The computer in question is an ‘air gapped’ machine, which means it is not connected to any network. You’d use it for extreme operational security (i.e. working with leaked NSA documents).

If you have a desktop [computer], put super glue in all the USB interfaces so they aren’t functional. Do the same to any interface on the mother boards that could attach removable media. Try to make the case impossible to open (bonus points for encasing it in cement except for the fan, CD tray, cables for keyboard/mouse, power cable and power button).

Turns out that really isolating a computer that you work on is a very hard thing to do. The latest threat seems to be some kind of super-malware that can bridge air gaps by communicating via a computer’s built-in speaker and mic. Allegedly it ‘talks’ at around 18kHz which is a frequency most people cannot hear.

a restaurant’s walk-in freezer is the poor man’s faraday cage

postscript to the Biometrics presentation yesterday

Just a thought, regarding the representative function of portraits. The change is especially visible in ruler’s portraits. Take e.g. the Doge of Venice by Bellini, 1501:

Giovanni_Bellini,_portrait_of_Doge_Leonardo_Loredan

Presumably as with other portraits of this kind, copies were put up in official buildings all around the country. So that the Doge would always be present. This way, one person can be in many places at once. And exercise authority.

Nowadays this, too, has been democraticized. With the automatic synchronization of biometric face databases, we’re all everywhere, anytime. Except that the power relations have changed, too. It’s pictures of those that need to be controlled and disciplined, that are being exchanged.

Those pictures are normally not put up on a wall (except maybe when you’re on the most wanted list). So what is it that happens exactly, when no human is looking at those portraits, but algorithms. What is being done to the representation of you?