summaryrefslogtreecommitdiff
path: root/client/src/lib/db/backupDB.js
diff options
context:
space:
mode:
authorJules Laplace <julescarbon@gmail.com>2017-06-03 14:26:31 -0400
committerJules Laplace <julescarbon@gmail.com>2017-06-03 14:26:31 -0400
commitd5394e9c1a936e8272ed036f259532939d37f44f (patch)
tree428e07f6dcdc198fb4ec999e2e4eb72bceef87ad /client/src/lib/db/backupDB.js
parentce8e9934191119e44d1520e2991439c2d94666ef (diff)
pull db if possible
Diffstat (limited to 'client/src/lib/db/backupDB.js')
-rw-r--r--client/src/lib/db/backupDB.js262
1 files changed, 133 insertions, 129 deletions
diff --git a/client/src/lib/db/backupDB.js b/client/src/lib/db/backupDB.js
index 0ffe5b1..1bb7ac9 100644
--- a/client/src/lib/db/backupDB.js
+++ b/client/src/lib/db/backupDB.js
@@ -32,7 +32,7 @@ export const backupDB = {
"medium": "Religious Idea",
"category": "Surveillance",
"keywords": "#Eye #God #Providence #Guilt #Order #Control #Ethics #Christianity #Judaism #Islam #Bible #education #Skies #Clouds #Manipulation #Illuminati #Kabbalah #Secrecy #Dialectic #Knowledge #Future #Present #Past #Synthesis\r\n",
- "description": "The motif of the divine eye was spread throughout Europe in the wake of the Counter-Reformation; its roots lie in the Antiquity, as well as in Jewish and Christian sources. Augustine described the religious idea of God’s all-seeing eye on the psychological level when he wrote: And from Thee, O lord, unto whose eyes the abyss of man’s conscience is naked, what could be hidden in me though I would not confess it? The psychic aspects of fear, control and education are lanced through the Antique iconography and culminated in the idea of God’s Providence. \r\n",
+ "description": "The motive of the divine eye was spread throughout Europe in the wake of the Counter-Reformation; its roots lie in the Antiquity, as well as in Jewish and Christian sources. Augustine described the religious idea of God’s all-seeing eye on the psychological level when he wrote: And from Thee, O lord, unto whose eyes the abyss of man’s conscience is naked, what could be hidden in me though I would not confess it? The psychic aspects of fear, control and education are lanced through the Antique iconography and culminated in the idea of God’s Providence. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f2d447f0-38d4-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -57,7 +57,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Epidemiology #Health #Surveillance #Sickness #Control #Plague #Immunity #Sickness #Disease #Plague #BlackDeath #HIV #Biology #Pharma-Industry\r\n",
- "description": "Following the WHO, Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as early warning system for health emergencies and as documentation praxis which informs on the impact of a certain medical intervention. Health surveillance uses mortality data as a base for measuring public health, a praxis that arose ca. 600 years ago in Europe throughout the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports were and are still used to collect data about HIV and AIDS – for example, population rates, numbers of people living with HIV and numbers of people who receive medical care. There have been various debates on human rights and civil liberty in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination of sexual orientation.\r\n\r\n",
+ "description": "Following the WHO, Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as early warning system for health emergencies and as documentation praxis which informs on the impact of a certain medical intervention. Health surveillance uses mortality data as a base for measuring public health, a praxis that arose ca. 600 years ago in Europe throughout the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports were and are still used to collect data about HIV and AIDS – for example, population rates, numbers of people living with HIV and numbers of people who receive medical care. There have been various debates on human rights and civil liberty in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination of sexual orientation.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9c33f610-38d5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -66,11 +66,11 @@ export const backupDB = {
},
"links": [
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Public_health_surveillance"
},
{
- "text": "World Health Organization",
+ "text": "link text",
"uri": "http://www.who.int/topics/public_health_surveillance/en/"
}
],
@@ -106,7 +106,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Big Brother #Surveillance #Control #Institution #Interception #Information #Secrets #Deciphering #Espionage #Privacy #Governments #Intelligence #Cryptology\r\n",
- "description": "“Black Chamber” is the name used for secret decoding bureaus established as early as the US postal system. Governmentally operated, the bureau would intercept letters, gather intelligence of political rivals and channel them back into the postal system without further notice. The term has also been used further back in history, most notably the \"Cabinet Noire\" in France operated under Louis XV and the Geheime Kabinettskanzlei (Secret Chancellery) in Austria during the 18th century, and in more modern times the British Room 40 and then Bletchley Park that became home to the greatest codebreakers. After World War I, the US established their first crypto-analytical institute to intercept correspondence of other nations. Operating under a bogus company based in New York City, the US-Black Chamber was a direct predecessor of the National Security Agency (NSA).\r\n",
+ "description": "“Black Chamber” is the name used for secret decipher bureaus established as early as the postal system. Governmentally operated, the bureau would intercept letters, gather intelligence of political rivals and channel them back into the postal system without further notice. The most well-known cases were the Cabinet Noire in France run under Ludwig XIV, the Geheime Kabinettskanzlei (Secret Chancellery) in Vienna, Austria, the British Room 40 and then Bletchley Park that became home to the greatest codebreakers. After World War One, the US established their first crypto-analytical institute to intercept correspondence of other nations. Operating under a bogus company based in New York City, the US-Black Chamber was a direct predecessor of the National Security Agency (NSA).\r\n",
"image": {
"uri": "https://upload.wikimedia.org/wikipedia/commons/7/77/Bodleian_Libraries%2C_Le_cabinet_noir_ou-_les_pantins_du_19eme_si%C3%A8cle.jpg",
"caption": "",
@@ -115,11 +115,11 @@ export const backupDB = {
},
"links": [
{
- "text": "New York Times",
+ "text": "Link text",
"uri": "http://www.nytimes.com/2006/01/13/opinion/back-when-spies-played-by-the-rules.html"
},
{
- "text": "NSA",
+ "text": "Link text",
"uri": "https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/black-chamber.shtml"
}
],
@@ -144,7 +144,7 @@ export const backupDB = {
},
"links": [
{
- "text": "Wikipedia",
+ "text": "Link text ",
"uri": "https://en.wikipedia.org/wiki/Panopticon"
}
],
@@ -160,7 +160,7 @@ export const backupDB = {
"medium": "Image",
"category": "Drones",
"keywords": "#Drones #UAV #Airstrike #Attack #Military #Warfare #Venice #Austria",
- "description": "Arguably, this was the first drone strike in history: On August 22, 1849 Venice was bombarded by unmanned balloons launched by the Austrians who controlled much of Italy at the time. The experimental approach of using hot air balloons, which carried explosives, was a consequence of the actual topography of Venice – since the city was surrounded by water, the Austrian artillery could not intrude. This incidence is the first known use of aerial bombing. \r\n\r\nThe image below illustrates an artistic interpretation of the bombing from a Russian source. \r\n",
+ "description": "Arguably, this was the first drone strike in history: In August 22nd 1849 Venice was bombarded by unmanned balloons launched by the Austrians who controlled much of Italy at the time. The experimental approach of using hot air balloons, which carried ordnance, was a consequence of the actual topography of Venice – since the city was surrounded by water, the Austrian artillery could not intrude. This incidence is the first known use of aerial bombing. \r\n\r\nThe image below illustrates an artistic interpretation of the bombing from a russian source. \r\n",
"image": {
"uri": "http://www.ctie.monash.edu/hargrave/images/balloonbombs1848_500.jpg",
"caption": "",
@@ -169,14 +169,14 @@ export const backupDB = {
},
"links": [
{
- "text": "Monash University",
+ "text": "Link text",
"uri": "http://www.ctie.monash.edu/hargrave/rpav_home.html#Beginnings"
}
],
"disabled": false,
"__index": 10,
"dateCreated": "Thu, 11 May 2017 13:58:11 GMT",
- "credit": "Bombing by Balloon, 1848, Source: Prof. Jurij Drushnin, Moscow, Russia"
+ "credit": " Bombing by Balloon, 1848, Source: Prof. Jurij Drushnin, Moscow, Russia"
},
{
"id": "boston-as-the-eagle-and-the-wild-goose-see-it",
@@ -195,7 +195,7 @@ export const backupDB = {
"credit": "James Wallace Black / 1860 / Public Domain\r\n",
"links": [
{
- "text": "The Metropolitan Museum of Art",
+ "text": "Link text",
"uri": "http://www.metmuseum.org/art/collection/search/283189"
}
],
@@ -220,7 +220,7 @@ export const backupDB = {
"credit": "Samuel Luke Fildes / The Graphic / 1873 via Jennifer Tucker",
"links": [
{
- "text": "the Boston Globe",
+ "text": "link text",
"uri": "https://www.bostonglobe.com/ideas/2014/11/23/facial-recognition-technology-goes-way-back/CkWaxzozvFcveQ7kvdLHGI/story.html"
}
],
@@ -235,7 +235,7 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Biometrics #Prison #Information #Control #Identification #Police\r\n",
- "description": "Fingerprint characteristics were studied as far back as mid-1600s and used as a means of identification by British colonialists in India in the mid 19th century. Several people are credited with classifying the fingerprinting system for means of identification in the criminal sector: Sir Francis Galton, a British anthropologist who published a book on the forensic science of fingerprints and claimed the chance of two people having the same fingerprint was about one to 64 million. Henry Fauld, a Scottish scientist, and Edward Henry, a British police commissioner who developed the Henry Classification System which served to sort fingerprints by their physiological characteristics and was the basis of the modern-day Automated Fingerprint Identification System (AFIS) that was used up until the 1990s. The image indicates the beginnings of fingerprinting, implemented by Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India in 1858 in a contract with a local businessman.\r\n",
+ "description": "Fingerprint characteristics were studied as far back as mid-1600s and used as means of identification by British colonialists in India in the mid 19th century. Several people are credited with classifying the fingerprinting system for means of identification in the criminal sector: Sir Francis Galton, a British anthropologist who published a book on the forensic science of fingerprints and claimed the chance of two people having the same fingerprint was about one to 64 million. Henry Fauld, a scottish scientist, and Edward Henry, a British police commissioner who developed the Henry Classification System which served to sort fingerprints by their physiological characteristics was the basis of the modern-day Automated Fingerprint Identification System (AFIS) that was used up until the 1990s. The image indicates the beginnings of fingerprinting, implemented by Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India in 1858 in a contract with a local businessman.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/cc92b950-3654-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -245,11 +245,11 @@ export const backupDB = {
"credit": " Sir William James Herschel, “The Origin of Finger Printing\" 1916., (Public Domain)\r\n",
"links": [
{
- "text": "Onin.com",
+ "text": "Link text",
"uri": "http://www.onin.com/fp/fphistory.html"
},
{
- "text": "Archive.org",
+ "text": "Link text ",
"uri": "https://archive.org/details/originoffingerpr00hersrich"
}
],
@@ -264,7 +264,7 @@ export const backupDB = {
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Biometrics #Prison #Information #Photography #Police #Identification #Technology\r\n",
- "description": "Bertillonage is a system of measuring and categorizing individuals, also known as anthropometry. It was named after the French criminologist and anthropologist Alphonse Bertillon and used by the Parisian police from 1883 to track and identify criminals. In addition of a frontal and profile portrait photograph (the ‘mug shot‘), the body measurements and feature classifications of the individual were collected on a card. The cards were then systematically filed so they could be easily retrieved. The Bertillonage system was later adopted by police forces in Great Britain, Europe and the Americas until it was replaced by using fingerprints for identification in the early 20th century.\r\n",
+ "description": "Bertillonage is a system of measuring and categorizing individuals, also known as anthropometry. It was named after the French criminologist and anthropologist Alphonse Bertillon and used from the Parisian police from 1883 to track and identify criminals. In addition of a frontal and profile portrait photograph (the ‘mug shot‘), the body measurements and feature classifications of the individual were collected on a card. The cards were then systematically filed so they could be easily retrieved. The Bertillonage system was later adopted by police forces in Great Britain, Europe and the Americas until it was replaced by using fingerprints for identification in the early 20th century.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/38befc10-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -274,7 +274,7 @@ export const backupDB = {
"credit": "Creative Commons CC0 1.0 Universal Public Domain Dedication\r\n",
"links": [
{
- "text": "U.S. National Library of Medicine",
+ "text": "Link text",
"uri": "https://www.nlm.nih.gov/visibleproofs/galleries/biographies/bertillon.html"
}
],
@@ -289,7 +289,7 @@ export const backupDB = {
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Biometrics #Verticality #Photography #All-Seeing Eye\r\n",
- "description": "In 1903, Alphonse Bertillon, who is known to have standardized identification methods for criminals and credited with the invention of the mug-shot, introduced metric photography to investigate crime scenes. He constructed a high tripod about 2 meters tall, with which one could take a vertical perspective photographs of murder victims at the places of their deaths. From this angle, it was possible to provide full photographic evidence. He referred to the bird’s-eye perspective as a “God’s-eye view”. Bertillons metric photography was applied at the criminal department of forensic medicine and anthropology in France. The photo depicts a demonstration with a false corpse.\r\n",
+ "description": "In 1903, Alphonse Bertillon, who is known to have standardized identification methods for criminals and credited with the invention of the mug-shot, introduced metric photography to investigate crime scenes. He constructed an about two meters high tripod, with which one could take a vertical perspective photographs of murder victims at the places of their deaths. This way, it was possible to provide with full photographic evidence. He referred to the bird’s-eye perspective as a “God’s-eye view”. Bertillons metric photography was applied at the criminal department of forensic medicine and anthropology in France. The photo depicts a demonstration with a false corpse.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/81cf0e40-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -299,7 +299,7 @@ export const backupDB = {
"credit": "(1) Rodolphe A Reiss, Demonstration of the Bertillon metric photography system, 1925. © RA Reiss, courtesy of Collection of the Institut de Police Scientifique et de Criminologie de l’Université de Lausanne.\r\n(2) A demonstration of the Bertillon metric photography system, 1908 Credit: Archives de la préfecture de Police \r\n",
"links": [
{
- "text": "Archive.org",
+ "text": "Link text",
"uri": "https://archive.org/details/cu31924096442185"
}
],
@@ -324,11 +324,11 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "IMDb",
+ "text": "Link text",
"uri": "http://www.imdb.com/title/tt0014646/"
},
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Aelita"
}
],
@@ -363,7 +363,7 @@ export const backupDB = {
"medium": "Item / Image",
"category": "Drones",
"keywords": "#Drone #Warfare #Airstrikes #Technology #Airplanes #Attack #UAV #Technology\r\n",
- "description": "Investment into the development of remotely controlled vehicles increased quickly after World War I. Although the DH-82B Queen Bee had many predecessors, it was the first full production, fully-sized, reusable, pilotless aircraft that was used for anti-aircraft gunnery practice. It was designed by engineer Geoffrey Havilland from the British Air Force, who was a passionated amateur entomologist and would call his aircrafts after insects (Tiger Moth, Fox Moth, Mosquito, and Dragonfly). In 1935, a US Navy admiral visited the Royal Air and was given a demonstration of the Queen Bee. Upon his return to the US, he developed a similar system for gunnery training and adopted the name \"drone\", as an homage to the British Queen Bee. Since then the name drone became a designation for remotely flown aircraft systems.\r\n",
+ "description": "Investing into development of remotely controlled vehicles sped after World War I. Although the DH-82B Queen Bee had many predecessors, it was the first full production, fully-sized, reusable, pilotless aircraft that was used for anti-aircraft gunnery practice. It was designed by engineer Geoffrey Havilland from the British Air Force, who was a passionated amateur entomologist and would call his aircrafts after insects (Tiger Moth, Fox Moth, Mosquito, and Dragonfly). In 1935, a US Navy admiral visited the Royal Air and was demonstrated the Queen Bee. Upon his return to the US, he assigned to develop a similar system for gunnery training and adopted the name drone, as an homage to the Queen Bee. Since then the name drone became a designation for remotely flown aircraft systems.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/60afc9b0-3656-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -402,7 +402,7 @@ export const backupDB = {
"credit": "unknown\r\n",
"links": [
{
- "text": "IMDb",
+ "text": "Link text ",
"uri": "http://www.imdb.com/title/tt0025968/"
}
],
@@ -427,11 +427,11 @@ export const backupDB = {
"credit": "Edwin Black in IBM and the Holocaust / 2001\r\n",
"links": [
{
- "text": "Jewish Virtual Library",
+ "text": "Link text",
"uri": "http://www.jewishvirtuallibrary.org/ibm-and-quot-death-s-calculator-quot"
},
{
- "text": "The New York Times",
+ "text": "Link text ",
"uri": "http://www.nytimes.com/books/first/b/black-ibm.html"
}
],
@@ -446,7 +446,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#USA #All-Seeing Eye #Governments\r\n",
- "description": "The all seeing-eye of God famously appears on the reverse of the US one dollar bill. Atop a unfinished thirteen stepped pyramid and surrounded by rays of light, it is part of the symbolism of the Great Seal of the United States. The usage of the eye in the seal dates back as far as 1782. The all-seeing Eye or the Eye of Providence is often interpreted as representing the eye of God keeping a watch over humankind. Often utilized by the Freemasons, the design of the one-dollar bill was subject to several conspiracy theories.\r\nSurrounding the eye and pyramid are the latin phrases “Annuit Cœptis\", meaning \"He approves (or has approved) our undertakings“ and \"Novus Ordo Seclorum,\" meaning \"New Order of the Ages“. In 1957 the phrase „In God We Trust“ was added, which makes the design that is still in use today.\r\nThe image depicts former President Franklin D. Roosevelt approving the design with the condition that the order of the seal should be reversed so the phrase \"of the United States\" would be under the obverse side of the Seal.\r\n",
+ "description": "The all seeing-eye of God famously appears on the reverse of the US one dollar bill. Atop a unfinished thirteen steps pyramid and surrounded by rays of light, it is part of the symbolism of the Great Seal of the United States. The usage of the eye in the seal dates back as far as 1782. The all-seeing Eye or the Eye of Providence is often interpreted as representing the eye of God keeping a watch over humankind. Often utilized by the Freemasons, the design of the one-dollar bill was subject to several conspiracy theories.\r\nSurrounding the eye and pyramid are the latin phrases “Annuit Cœptis\", meaning \"He approves (or has approved) our undertakings“ and \"Novus Ordo Seclorum,\" meaning \"New Order of the Ages“. In 1957 the phrase „In God We Trust“ was added, which makes the design that is still in use today.\r\nThe image depicts former President Franklin D. Roosevelt approving the design with the condition that the order of the seal should be reversed so the phrase \"of the United States\" would be under the obverse side of the Seal.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/305885b0-38c5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -456,7 +456,7 @@ export const backupDB = {
"credit": "public domain, 1935\r\n",
"links": [
{
- "text": "U.S. Currency Education Program",
+ "text": "Link text ",
"uri": "https://www.uscurrency.gov/content/history-american-currency"
}
],
@@ -471,7 +471,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Turing-Machine #Computing #Encryption #Computer-Science #Warfare #Espionage #Codebreaking #Intelligence #Enigma \r\n",
- "description": "A Turing machine is a hypothetical machine thought of by the mathematician Alan Turing in 1936. Despite its simplicity, it can simulate any algorithm. The Turing machine is considered the first mathematical model of computation and therefore also the blueprint for the modern computer. Its prior usage in the time of its development was to break a supposedly unbreakable encryption system called “Enigma”, which the Nazis developed and used during World War II.\r\n",
+ "description": "A Turing machine is a hypothetical machine thought of by the mathematician Alan Turing in 1936. Despite its simplicity, it can simulate any algorithm. The Turing machine is considered as the first mathematical model of computation and therefore also the blueprint for the modern computer. Its prior usage in the time of its development was to break a supposedly unbreakable encryption system called “Enigma”, which the Nazis depevolpped and applied during World War II.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/95eeb300-3658-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -481,11 +481,11 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "The New Yorker",
+ "text": "Link text",
"uri": "http://www.newyorker.com/magazine/2006/02/06/code-breaker"
},
{
- "text": "University of Cambridge",
+ "text": "Link text",
"uri": " https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/turing-machine/one.html"
}
],
@@ -510,11 +510,11 @@ export const backupDB = {
"credit": "AR/BNPS\r\n",
"links": [
{
- "text": "Audubon",
+ "text": "Link text",
"uri": "http://www.audubon.org/news/eyes-sky-short-history-bird-spies"
},
{
- "text": "Royal Pigeon Racing Association",
+ "text": "Link text",
"uri": "http://www.rpra.org/pigeon-history/pigeons-in-war/"
}
],
@@ -539,7 +539,7 @@ export const backupDB = {
"credit": "Cover of the UKUSA Agreement 1946, Public Domain\r\n",
"links": [
{
- "text": "Privacy International",
+ "text": "Link text ",
"uri": "https://www.privacyinternational.org/node/51"
}
],
@@ -553,7 +553,7 @@ export const backupDB = {
"title": "Moonbounce",
"medium": "Program",
"category": "Surveillance",
- "keywords": "#Moon #Surveillance #Interception #Signal #Covered Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n",
+ "keywords": "#Moon #Surveillance #Interception #Signal #Covert Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n",
"description": "Moonbounce describes the phenomenon that man-made signals emanating from Earth would bounced back from the moon and detected from other locations. The radar-reflective characteristics of the lunar surface were already successfully tested since 1946. One time in surveillance history this came to use was in the US-Air Force led project named FLOWER GARDEN in the early 1960s to monitor and intercept radar signals from the Soviet Union. Several antennas around the US were used for moonbounce – also operated by the CIA and the NSA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b0a50210-365a-11e7-a37a-4579121b15f0.jpg",
@@ -564,7 +564,7 @@ export const backupDB = {
"credit": "NASA, 1969\r\n",
"links": [
{
- "text": "The National Security Archive",
+ "text": "Link text ",
"uri": "http://nsarchive.gwu.edu/NSAEBB/NSAEBB479/"
}
],
@@ -609,7 +609,7 @@ export const backupDB = {
"credit": "© Simon Menner and BStU 2017",
"links": [
{
- "text": "Simon Menner",
+ "text": "Link text",
"uri": "https://simonmenner.com/_sites/SurveillanceComplex/StasiImages/_StasiImagesMenue.html#"
}
],
@@ -654,11 +654,11 @@ export const backupDB = {
"credit": "screenshot\r\n",
"links": [
{
- "text": "Academia",
+ "text": "Link text",
"uri": "http://www.academia.edu/305175/Surveillance_and_Ethics_In_Film_Rear_Window_and_The_Conversation"
},
{
- "text": "The Guardian",
+ "text": "Link text",
"uri": "https://www.theguardian.com/film/filmblog/2012/jul/25/my-favourite-hitchcock-rear-window"
}
],
@@ -683,15 +683,15 @@ export const backupDB = {
"credit": "unknown\r\n",
"links": [
{
- "text": "The Guardian",
+ "text": "Link text ",
"uri": "https://www.theguardian.com/world/2001/sep/11/worlddispatch"
},
{
- "text": "NSA Archive",
+ "text": "Link text ",
"uri": "https://nsarchive.wordpress.com/2010/03/05/document-friday-acoustic-kitty/"
},
{
- "text": "NSA Archive",
+ "text": "Link text ",
"uri": "http://nsarchive.gwu.edu/NSAEBB/NSAEBB54/st27.pdf"
}
],
@@ -716,11 +716,11 @@ export const backupDB = {
"credit": "Courtesy: NRO / Public Domain",
"links": [
{
- "text": "National Reconnaissance Office",
+ "text": "Link text",
"uri": "http://www.nro.gov/history/csnr/corona/factsheet.html"
},
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Corona_(satellite)#Declassification"
}
],
@@ -745,7 +745,7 @@ export const backupDB = {
"credit": "public domain / screenshot from document (link below)\r\n",
"links": [
{
- "text": "Archive.org",
+ "text": "Link text",
"uri": "https://archive.org/details/firstfacialrecognitionresearch"
}
],
@@ -759,7 +759,7 @@ export const backupDB = {
"title": "Teufelsberg (“Devil’s Mountain”), Berlin",
"medium": "Item",
"category": "Surveillance",
- "keywords": "#NSA #Surveillance #Covered Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n",
+ "keywords": "#NSA #Surveillance #Covert Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n",
"description": "Teufelsberg (translated as “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was created in the 20 years following World War II by moving debris from the destroyed city of Berlin. In 1963 the NSA built a permanent listening station atop the mountain to spy on the eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled the US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. This unique history makes Teufelsberg a tourist attraction.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/617c4070-3661-11e7-a37a-4579121b15f0.jpg",
@@ -770,7 +770,7 @@ export const backupDB = {
"credit": "US Army Intelligence & Security Command\r\n",
"links": [
{
- "text": "Deutsche Welle",
+ "text": "Link text",
"uri": "http://www.dw.com/en/teufelsberg-mirrors-berlins-dramatic-history/a-17074597"
}
],
@@ -795,7 +795,7 @@ export const backupDB = {
"credit": "unknown\r\n",
"links": [
{
- "text": "The Guardian",
+ "text": "Link text",
"uri": "https://www.theguardian.com/film/2017/mar/10/antonioni-blow-up-50-years-movie-photographer-murder"
}
],
@@ -820,19 +820,19 @@ export const backupDB = {
"credit": "First ECHELON station intercepting Intelsat Atlantic and Indian Ocean area satellites: Bude, Cornwal.",
"links": [
{
- "text": "First Look Media",
+ "text": "Link text",
"uri": "https://firstlook.org/wp-uploads/sites/1/2015/07/rexusa_2569089a-1024x428.jpg"
},
{
- "text": "The Intercept",
+ "text": "Link text",
"uri": "https://theintercept.com/2015/08/03/life-unmasking-british-eavesdroppers/"
},
{
- "text": "European Parliament",
+ "text": "Link text",
"uri": "http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN"
},
{
- "text": "Spiegel",
+ "text": "Link text",
"uri": "http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html"
}
],
@@ -857,7 +857,7 @@ export const backupDB = {
"credit": "The Opte Project, Internet Map 2003, (This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License) © 2014 by LyonLabs, LLC and Barrett Lyon\r\n",
"links": [
{
- "text": "Internet Society ",
+ "text": "Link text",
"uri": "http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#"
}
],
@@ -882,11 +882,11 @@ export const backupDB = {
"credit": "CIA\r\n",
"links": [
{
- "text": "Central Intelligence Agency",
+ "text": "Link text",
"uri": "https://www.cia.gov/library/video-center/video-transcripts/insectothopter-the-bug-carrying-bug.html"
},
{
- "text": "The Atlas",
+ "text": "Link text",
"uri": "http://www.atlasobscura.com/articles/object-of-intrigue-the-cia-s-dragonfly-drone"
}
],
@@ -911,15 +911,15 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "Youtube",
+ "text": "Link text",
"uri": "https://www.youtube.com/watch?v=ihpU1RE_AhA"
},
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/THX_1138"
},
{
- "text": "IMDb",
+ "text": "Link text",
"uri": "http://www.imdb.com/title/tt0066434/"
}
],
@@ -964,7 +964,7 @@ export const backupDB = {
"credit": "NASA / Public Domain, 1972\r\n",
"links": [
{
- "text": "NASA",
+ "text": "Link text",
"uri": "https://earthobservatory.nasa.gov/Features/BlueMarble/BlueMarble_history.php"
}
],
@@ -991,6 +991,10 @@ export const backupDB = {
{
"text": "The Guardian",
"uri": " https://www.theguardian.com/film/2017/mar/07/six-surveillance-films-make-trump-paranoid"
+ },
+ {
+ "text": "IMDB",
+ "uri": "http://www.imdb.com/title/tt0071360/"
}
],
"disabled": false,
@@ -1014,7 +1018,7 @@ export const backupDB = {
"credit": "Copyright 2000-2008 Judas Priest Music Ltd\r\n",
"links": [
{
- "text": "Genius",
+ "text": "Link text ",
"uri": "https://genius.com/Judas-priest-electric-eye-lyrics"
}
],
@@ -1039,7 +1043,7 @@ export const backupDB = {
"credit": "Stasi-Museum, Berlin, ASTAK, eV Photo: John Steer\r\n",
"links": [
{
- "text": "The National Archives",
+ "text": "Link text",
"uri": "http://blog.nationalarchives.gov.uk/blog/looking-back-25-years-berlin-wall-fell/"
}
],
@@ -1064,11 +1068,11 @@ export const backupDB = {
"credit": "AT&T Laboratories Cambridge\r\n",
"links": [
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Eigenface"
},
{
- "text": "UC Santa Barbara",
+ "text": "Link text",
"uri": "https://www.cs.ucsb.edu/~mturk/Papers/mturk-CVPR91.pdf"
}
],
@@ -1122,7 +1126,7 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "Wikipedia",
+ "text": "Link text ",
"uri": "https://en.wikipedia.org/wiki/High_Frequency_Active_Auroral_Research_Program"
}
],
@@ -1147,7 +1151,7 @@ export const backupDB = {
"credit": "Drents Museum\r\n",
"links": [
{
- "text": "CNN ",
+ "text": "Link text",
"uri": "http://edition.cnn.com/2015/02/27/asia/mummified-monk-statue/"
}
],
@@ -1172,7 +1176,7 @@ export const backupDB = {
"credit": "unknown\r\n",
"links": [
{
- "text": "Stanford University",
+ "text": "Link text ",
"uri": "https://cs.stanford.edu/people/eroberts/cs201/projects/2010-11/FreedomOfInformationChina/category/great-firewall-of-china/index.html"
}
],
@@ -1197,7 +1201,7 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Big_Brother_(franchise)"
}
],
@@ -1222,11 +1226,11 @@ export const backupDB = {
"credit": "AP\r\n",
"links": [
{
- "text": "American Civil Liberties Union",
+ "text": "Link text",
"uri": "https://www.aclu.org/timelines/post-911-surveillance"
},
{
- "text": "The Guardian",
+ "text": "Link text",
"uri": "https://www.theguardian.com/world/2001/sep/21/september11.usa13"
}
],
@@ -1251,11 +1255,11 @@ export const backupDB = {
"credit": "Smithsonian Institution, National Air and Space Museum, D.C. Washington (“Do not reproduce without permission”) \r\n",
"links": [
{
- "text": "The Atlantic",
+ "text": "Link text",
"uri": "https://www.theatlantic.com/international/archive/2015/05/america-first-drone-strike-afghanistan/394463/"
},
{
- "text": "National Air and Space Museum",
+ "text": "Link text",
"uri": "https://airandspace.si.edu/collection-objects/general-atomics-aeronautical-systems-inc-mq-1l-predator"
}
],
@@ -1280,11 +1284,11 @@ export const backupDB = {
"credit": "Courtesy of Kevin Sudeith\r\n",
"links": [
{
- "text": "The Atlantic",
+ "text": "Link text",
"uri": "https://www.theatlantic.com/technology/archive/2015/01/drones-are-appearing-on-afghan-rugs/385025/"
},
{
- "text": "Messy Nessy Chic",
+ "text": "Link text",
"uri": "http://www.messynessychic.com/2015/01/29/war-rugs-the-obscure-collectors-market-for-afghan-kitsch/"
}
],
@@ -1334,7 +1338,7 @@ export const backupDB = {
"credit": "Forensic Architecture\r\n",
"links": [
{
- "text": "foresnic Architecture",
+ "text": "Link text",
"uri": "http://www.forensic-architecture.org/case/drone-strikes/"
}
],
@@ -1359,7 +1363,7 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "First Monday",
+ "text": "Link text",
"uri": "http://firstmonday.org/article/view/2142/1949"
}
],
@@ -1373,7 +1377,7 @@ export const backupDB = {
"title": "WikiLeaks",
"medium": "Item",
"category": "Surveillance",
- "keywords": "#WikiLeaks #Whistleblower #Classified Information #Covered Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n",
+ "keywords": "#WikiLeaks #Whistleblower #Classified Information #Covert Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n",
"description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news-leaks from anonymous sources. It was founded in Iceland in 2006 and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson of the organisation devoted to bringing transparency to governments, accessibility to information, and protecting whistleblowers. Over the past years WikiLeaks draw a lot of global attention to itself by publishing leaked classified information, for instance on the US-Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012, since then he has been a resident in the Ecuadorian Embassy in London, afraid to leave as he fears an extradition to the US by Sweden, where he is accused of sexual assaults. In the US he could face several penalties, including the death sentence, for his work with WikiLeaks. ",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fec0c370-36f6-11e7-a37a-4579121b15f0.jpg",
@@ -1413,7 +1417,7 @@ export const backupDB = {
"credit": "KEYHOLE 12-3/IMPROVED CRYSTAL Optical Reconnaissance Satellite Near Scorpio (USA 129), Trevor Paglen, 2007\r\n",
"links": [
{
- "text": "Journal of the New Media Caucus",
+ "text": "Link text",
"uri": "http://median.newmediacaucus.org/art-infrastructures-hardware/i-see-the-moon-the-moon-sees-me-trevor-paglens-satellite-images/"
}
],
@@ -1438,11 +1442,11 @@ export const backupDB = {
"credit": "Miki Kratsman\r\n",
"links": [
{
- "text": "Chelouche Gallery for Contemporary Art",
+ "text": "Link text",
"uri": "http://www.chelouchegallery.com/artistWorks.php?the_group=357&id=49"
},
{
- "text": "Haaratz",
+ "text": "Link text",
"uri": "http://www.haaretz.com/israel-news/taking-a-stand-1.387195"
}
],
@@ -1467,7 +1471,7 @@ export const backupDB = {
"credit": " unknown\r\n",
"links": [
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Chelsea_Manning"
},
{
@@ -1496,7 +1500,7 @@ export const backupDB = {
"credit": "Screenshot / WikiLeaks Website\r\n",
"links": [
{
- "text": "Wikileaks",
+ "text": "Link text",
"uri": "https://collateralmurder.wikileaks.org/"
}
],
@@ -1521,7 +1525,7 @@ export const backupDB = {
"credit": "Omar Fast, Still from ‘5,000 Feet is the Best’\r\n",
"links": [
{
- "text": "The Independent",
+ "text": "Link text",
"uri": "http://www.independent.co.uk/arts-entertainment/art/reviews/visual-art-review-5000-feet-is-the-best-how-truth-and-fiction-became-blurred-8783611.html"
}
],
@@ -1571,11 +1575,11 @@ export const backupDB = {
"credit": "Forensic Architecture Research Agency\r\n",
"links": [
{
- "text": "Forensic Architecture ",
+ "text": "Link text",
"uri": "http://www.forensic-architecture.org/case/left-die-boat/"
},
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/2011_military_intervention_in_Libya"
}
],
@@ -1600,7 +1604,7 @@ export const backupDB = {
"credit": "George Hodan, Public Domain\r\n",
"links": [
{
- "text": "The Guardian",
+ "text": "Link text",
"uri": "https://www.theguardian.com/world/2013/oct/29/pakistan-family-drone-victim-testimony-congress"
}
],
@@ -1625,7 +1629,7 @@ export const backupDB = {
"credit": "Lawrence Abu-Hamdan\r\n",
"links": [
{
- "text": "Lawrence Abu Hamdan ",
+ "text": "Link text",
"uri": "http://lawrenceabuhamdan.com/conflicted-phonemes/"
}
],
@@ -1650,11 +1654,11 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "Huffpost",
+ "text": "Link text",
"uri": "http://www.huffingtonpost.com/2012/10/09/street-ghosts-artist-paolo-cirio_n_1936158.html"
},
{
- "text": "Street Ghosts",
+ "text": "Link text",
"uri": "http://streetghosts.net/"
}
],
@@ -1679,11 +1683,11 @@ export const backupDB = {
"credit": "CC, project by Ruben Pater\r\n",
"links": [
{
- "text": "Untold Stories",
+ "text": "Link text",
"uri": "http://untold-stories.net/?p=Drone-Survival-Guide"
},
{
- "text": "DRONE SURVIVAL GUIDE",
+ "text": "Link text",
"uri": "www.dronesurvivalguide.org"
}
],
@@ -1708,7 +1712,7 @@ export const backupDB = {
"credit": "James Bridle",
"links": [
{
- "text": "Book Two",
+ "text": "Link text",
"uri": "http://booktwo.org/notebook/dronestagram-drones-eye-view/"
}
],
@@ -1733,15 +1737,15 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "The Guardian",
+ "text": "Link text",
"uri": "https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1"
},
{
- "text": "Wikipedia",
+ "text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)"
},
{
- "text": "Mashable",
+ "text": "Link text",
"uri": "http://mashable.com/2014/06/05/edward-snowden-revelations/#kcn4n1Qx7Pqf"
}
],
@@ -1755,7 +1759,7 @@ export const backupDB = {
"title": "PRISM",
"medium": "Program",
"category": "Surveillance",
- "keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n",
+ "keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
"description": "PRISM is a highly-classified program intended to grant direct access to internet servers for the NSA to wiretap. Since 2007, it would collect material including individual search history, the contents of emails, file transfers and live chats from internet giants like Google, Apple or Facebook. Being part of the Snowden archive, it was the first leak to be published, simultaneously by the Guardian and the Washington Post on June the 7th, 2013 which marked the begin of the Snowden-affair.\r\nThe leaked 41 pages power-point document intended for internal use only, demonstrates information on the extensive surveillance program. Among others it includes the facts that most of the world’s electronic communication passes through the US, which makes monitoring from intelligence analysts possible. The logo chosen represents the mission’s purpose: the prism refracting invisible noise into visible information.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/0de8eac0-3702-11e7-a37a-4579121b15f0.jpg",
@@ -1766,7 +1770,7 @@ export const backupDB = {
"credit": "public domain",
"links": [
{
- "text": "The Guardian",
+ "text": "Link text",
"uri": "https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data"
}
],
@@ -1780,7 +1784,7 @@ export const backupDB = {
"title": "Undersea Network Surveillance",
"medium": "Program",
"category": "Surveillance",
- "keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n",
+ "keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
"description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping into submarine network structures. These fibre optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication flows through them, in favour of „Mastering the Internet“ – a project by GCHQ. The subsidiary of that project codenamed TEMPORA stores huge volumes of data drawn from fibre-optic cables for up to 30 days. The data then can be sifted through and analysed.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4b9d7790-3703-11e7-a37a-4579121b15f0.jpg",
@@ -1791,15 +1795,15 @@ export const backupDB = {
"credit": "Submarine internet cables connecting the world, TeleGeography",
"links": [
{
- "text": "The Atlantic",
+ "text": "Link text",
"uri": "https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/"
},
{
- "text": "The Guardian",
+ "text": "Link text",
"uri": "https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa "
},
{
- "text": "The Washington Post",
+ "text": "Link text",
"uri": "http://apps.washingtonpost.com/g/page/business/a-connected-world/305/"
}
],
@@ -1849,11 +1853,11 @@ export const backupDB = {
"credit": "Courtesy Roberta Mataityte / Lighthouse. Photo by James Bridle\r\n",
"links": [
{
- "text": "Book Two",
+ "text": "Link text",
"uri": "http://booktwo.org/notebook/drone-shadows/"
},
{
- "text": "Book Two",
+ "text": "Link text",
"uri": "http://booktwo.org/notebook/drone-shadows-dispositions/"
}
],
@@ -1879,15 +1883,15 @@ export const backupDB = {
"credit": "National Reconnaissance Office, US Government / Public Domain, 2013\r\n",
"links": [
{
- "text": "Forbes",
+ "text": "Link text",
"uri": "https://www.forbes.com/sites/kashmirhill/2013/12/05/u-s-spy-rocket-launching-today-has-octopus-themed-nothing-is-beyond-our-reach-logo-seriously/#4377cb4d6869"
},
{
- "text": "NASA Spaceflight",
+ "text": "Link text",
"uri": "https://www.nasaspaceflight.com/2013/12/atlas-v-launch-nrol-39-vandenberg/"
},
{
- "text": "LeakSource",
+ "text": "Link text",
"uri": "https://leaksource.files.wordpress.com/2013/12/how-the-nrol-39-octopus-logo-was-created.pdf"
}
],
@@ -1912,11 +1916,11 @@ export const backupDB = {
"credit": "Adam Harvey / https://privacygiftshop.com/\r\n",
"links": [
{
- "text": "NO EXISTING LINK",
+ "text": "Link text",
"uri": "https://privacygiftshop.com/"
},
{
- "text": "TimeOut",
+ "text": "Link text",
"uri": "https://www.timeout.com/newyork/shopping/the-privacy-gift-shop"
}
],
@@ -1941,11 +1945,11 @@ export const backupDB = {
"credit": " praxis films, NYC (recheck)\r\n",
"links": [
{
- "text": "citizenfourfilm",
+ "text": "Link Text",
"uri": "https://citizenfourfilm.com/"
},
{
- "text": "Wikipedia",
+ "text": "Link text ",
"uri": "https://en.wikipedia.org/wiki/Citizenfour"
}
],
@@ -1995,7 +1999,7 @@ export const backupDB = {
"credit": "on the image\r\n",
"links": [
{
- "text": "BBC News",
+ "text": "Link text",
"uri": "http://www.bbc.co.uk/news/world-africa-32660135"
}
],
@@ -2020,7 +2024,7 @@ export const backupDB = {
"credit": "The Critical Engineering Working Group, 2015",
"links": [
{
- "text": "THE CRITICAL ENGINEERING",
+ "text": "Link text",
"uri": "https://criticalengineering.org/projects/deep-sweep/"
}
],
@@ -2045,11 +2049,11 @@ export const backupDB = {
"credit": "Laura Poitras (b. 1964), ANARCHIST: Power Spectrum Display of Doppler Tracks from a Satellite (Intercepted May 27, 2009), 2016. Archival pigment print on aluminum, 45 1/4 × 65 in. Courtesy the artist\r\n",
"links": [
{
- "text": "Frieze",
+ "text": "Link text ",
"uri": "https://frieze.com/article/laura-poitras"
},
{
- "text": "The Intercept",
+ "text": "Link text ",
"uri": "https://theintercept.com/2016/01/28/israeli-drone-feeds-hacked-by-british-and-american-intelligence/"
}
],
@@ -2074,7 +2078,7 @@ export const backupDB = {
"credit": "Adam Harvey \r\n",
"links": [
{
- "text": "AhProjects",
+ "text": "Link text",
"uri": "https://ahprojects.com/projects/skylift/"
}
],
@@ -2099,11 +2103,11 @@ export const backupDB = {
"credit": "https://www.theguardian.com/film/2016/apr/17/national-bird-review-us-drones-program-tribeca-film-festival\r\n",
"links": [
{
- "text": "National Bird Film",
+ "text": "Link text",
"uri": "ttp://nationalbirdfilm.com/ "
},
{
- "text": "The New York Times",
+ "text": "Link text ",
"uri": "https://www.nytimes.com/2016/11/11/movies/national-bird-review.html?_r=0"
}
],
@@ -2128,11 +2132,11 @@ export const backupDB = {
"credit": "http://www.artnau.com/2016/11/anne-imhof-angst-ii/\r\n",
"links": [
{
- "text": "Frieze",
+ "text": "Link text",
"uri": "https://frieze.com/media/angst-ii"
},
{
- "text": "Staatliche Museen zu Berlin",
+ "text": "Link text",
"uri": "http://www.smb.museum/en/museums-institutions/hamburger-bahnhof/exhibitions/detail/anne-imhof-angst-ii.html"
}
],
@@ -2171,11 +2175,11 @@ export const backupDB = {
"title": "Ancient Surveillance: Egypt",
"medium": "Case",
"category": "Surveillance",
- "keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covered Operations\r\n",
- "description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest extant intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well documented Battle of Kadesh, that nearly ended as a disaster for the Egyptians, when Shasu spies led the Pharaoh, Ramses II, into a trap. The concept of employing spies, is the first known documentation of an intelligence network in history.\r\n",
+ "keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covert Operations\r\n",
+ "description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest extant intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of the public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well-documented Battle of Kadesh, that nearly ended as a disaster for the Egyptians, when Shasu spies led the Pharaoh, Ramses II, into a trap. The concept of employing spies is the first known documentation of an intelligence network in history.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9db6dfd0-476b-11e7-bfa2-633db9d19e2a.png",
- "caption": "\r\n",
+ "caption": "",
"width": "703",
"height": "354"
},
@@ -2250,7 +2254,7 @@ export const backupDB = {
"title": "Ancient Surveillance: Roman Empire",
"medium": "Surveillance Concept",
"category": "Surveillance",
- "keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covered Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n",
+ "keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covert Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n",
"description": "Throughout the history of the Roman Empire, espionage and surveillance were significant elements of the political apparatus. Spies engaged in both foreign and domestic political operations, assessing the disposition of their enemy but also the loyalty of their own population. Several accounts indicate the presence of a secret police, one of which were the infamous frumentarii around the first century AD. They were supply sergeant who originally purchased and distributed grain to become intelligence agents adding manpower to the vast intelligence network of Ancient Rome. Working closely with the urban police, their duties included investigating, arresting and even political assassination. By the 3rd century the secret police was more and more seen as authoritative force or as an occupational army.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/db6d7300-476d-11e7-bfa2-633db9d19e2a.jpg",
@@ -2329,7 +2333,7 @@ export const backupDB = {
"title": "All the President’s Men",
"medium": "Film",
"category": "Surveillance",
- "keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covered Operations #Disclosure #Information #USA #US-Election\r\n",
+ "keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covert Operations #Disclosure #Information #USA #US-Election\r\n",
"description": "In the run-up to the 1972 elections, Washington Post reporter Bob Woodward covers what seems to be a minor break-in at the Democratic Party National headquarters. He is surprised to find top lawyers already on the defense case, and the discovery of names and addresses of Republican fund organizers on the accused further arouses his suspicions. The editor of the Post is prepared to run with the story and assigns Woodward and Carl Bernstein to it. They find the trail leading higher and higher in the Republican Party, and eventually into the White House itself.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/76bfd750-4771-11e7-bfa2-633db9d19e2a.jpg",
@@ -2403,7 +2407,7 @@ export const backupDB = {
"title": "Code Names",
"medium": "Artwork",
"category": "Surveillance",
- "keywords": "#Arts #Classified Information #Covered Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n",
+ "keywords": "#Arts #Classified Information #Covert Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n",
"description": "Code Names is a list of words, phrases, and terms that designate active military programs whose existence or purpose is classified. These include classified exercises and units, intelligence programs, information compartments, and Pentagon “Special Access Programs.”\r\nThe code names are deliberately nonsensical, often droll and sardonic words or short phrases without discernable connection to the programs they designate. For example, “Bacon Ridge” is an NSA installation in Texas, “Fox Acid” an NSA-controlled Internet server designed to inject malware into unsuspecting web browsers, and “Mystic” a program to collect every phone call from the Bahamas.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/677fd9e0-4774-11e7-bfa2-633db9d19e2a.jpg",
@@ -2451,7 +2455,7 @@ export const backupDB = {
{
"id": "credits",
"title": "Credits",
- "body": "CREDITS GO HERE",
+ "body": "~ Herzog & de Meuron\r\nLuis Gisler\r\n\r\n~ Ai Weiwei Studio\r\nLucas Lai, Jennifer Schmachtenberg\r\nJennifer Ng, Darryl Leung, Hanno Hauenstein, Berit Gilma\r\n\r\n~ Drones provided and operated by\r\nPhotoFlight Aerial Media Services, LLC\r\n\r\n~ interactive playout system\r\niart\r\n\r\n~ Projection equipment\r\nPRG\r\n\r\n~ Sound equipment\r\nSound Associates\r\n\r\n~ Video monitors\r\nNew City Video\r\n\r\n~ Facial Recognition System\r\nAdam Harvey\r\n\r\n~ App Development\r\nJules LaPlace",
"disabled": false,
"__index": 2,
"dateCreated": "Sat, 13 May 2017 19:49:53 GMT"
@@ -2459,7 +2463,7 @@ export const backupDB = {
{
"id": "privacy-policy",
"title": "Privacy Policy",
- "body": "<p>The <i>Terms of Service</i> of a website is a legal document describing a relationship between a software vendor and the end user. Typically this document is designed to indemnify the company who made the software from what you do with it. It also describes your rights in using the software - and what rights you give up.</p><p>The website <a href=\"https://tosdr.org/\">TOS;DR</a> was created to keep track of what's hidden in the small print of these legal agreements. For instance, on Youtube, \"Deleted videos are not really deleted.\" Facebook and Google admit to tracking your behavior, even on other websites. Instagram and Netflix waive your right to participating in a class action lawsuit. You cannot delete your Skype account.</p><p>A website is required by law to publish a <i>Privacy Policy</i> if it collects <i>personally identifiable information</i> (PII) which can be used to trace an individual's identity. This information can include your name, email address, telephone number, social security number, date of birth, mother's maiden name, etc. The Privacy Policy should indicate what information is tracked and how it is stored.</p><p>A website's Privacy Policy is intimately tied to its Terms and Conditions. For more information on how these two documents differ, read the article, <a href=\"https://termsfeed.com/blog/privacy-policies-vs-terms-conditions/\">Privacy Policy vs Terms and Conditions</a>.</p>\r\n<hr><h1>Privacy Policy</h1><p>Park Avenue Armory is committed to protecting your privacy. You can visit most pages on our site without giving us any information about yourself, but sometimes we do need information to provide services that you request. This policy describes the personal information we collect about you, the security measures we take to protect your information, the ways we use your information, and the limited situations in which we may share your information with third parties. Our policy also describes the choices you can make about how we collect and use your information. We encourage you to read the complete privacy policy; use of the Armory’s family of websites constitutes your acceptance of this policy.</p><h2>Collection of Your Personal Information</h2><h3>A. Information you give us</h3><p>The Armory will often request information that personally identifies you (personal information) or allows us to contact you. Generally, this information is requested when you purchase tickets, make donations, register for email newsletters or alerts, participate in a promotion or an online survey, contact us with a question or suggestion, request postal mailings, or apply for employment. Personal information collected generally includes a home address, email address, phone number, credit card information including expiration date and billing address, and product or genre preferences; it may include other information as needed to provide a specific service you requested or as part of an online survey, promotion, or app. We collect this information when you enter it on Armory websites or provide it voluntarily. You may remain anonymous to us if you choose to pay by cash in person at the Box Office.</p><h3>B. Automatic information</h3><p>When you visit the Armory’s websites, we automatically collect website usage information, as well as information about your computer and Internet connection. This includes your computer&#39;s IP address, the type and version of browser and operating system you use, your Internet domain, and if you visit via a link from another website, the URL of the linking page. This site visitation data is identified only by a unique ID number, and it is not linked with personal information unless you choose to log in. We aggregate this usage information and use it to identify the levels and areas of interest in the Armory and to improve and refine our websites, services, and security. We may perform (or have third parties perform) analyses of visitors&#39; behavior, and may share aggregated, anonymous data with funders, sponsors, or agencies.</p><p>We use cookie technology to gain information that helps us improve the user experience and enhances the functionality of our websites. A cookie is a small amount of data sent by our websites and stored on your computer&#39;s hard drive that our site can read, and which helps us keep track of how you use our websites. Many web browsers automatically accept cookies by default but contain an option for you to disable the cookie acceptance if you prefer. We do not allow unrelated third parties to set cookies via the Armory’s family of websites.</p><p>The Armory uses electronic images known as web beacons to monitor the activity of our email messages. These web beacons allow BAM&#39;s email service provider to obtain information such as the IP address of the computer that opened the email and what links were clicked within the email. With both cookies and web beacon technology, the information that we collect is anonymous and not personally identifiable. </p><p>The Armory uses remarketing with Google Analytics to advertise online. This means that the Armory allows third party vendors to show ads from the Armory on sites across the Internet. The Armory and these third party vendors use first party cookies and third party cookies together to inform, optimize, and serve ads based on a visitor’s past visits to websites.</p><p>We employ third parties to perform functions like sending postal mail and email, removing repetitive information from customer lists, and processing credit card payments. These parties have access to personal information that is necessary to perform their functions, but they are contractually obligated not to use it for other purposes. </p><h2>Security Used to Protect Your Information</h2><p>The Armory employs the latest safeguards and technologies to protect your information:</p><h3>Secure Web Servers</h3><p>The Armory employs secure web servers hosted in a certified data center. A  Network Solutions SSL (Secure Socket Layer) certificate is used for the secure encrypted exchange of data between your web browser and our websites using SSL encryption. Network Solutions Digital Certificates are trusted by over 99% of all browsers, applications, servers, and clients, including: Microsoft® Internet Explorer, Mozilla® Firefox, Google® Chrome, Konqueror (KDE), Opera and Apple® Safari. </p><h3>Firewall</h3><p>The Armory uses redundant, dedicated firewalls that protect both its transactional system and the data passing through it.</p><h2>Use of Your Personal Information<h2>\r\n<p>We use your personal information for the following purposes:</p><li>- To ensure our site is relevant to your needs</li>\r\n<li>- To deliver services such as newsletters</li>\r\n<li>- To help us create and publish content most relevant to you</li>\r\n<p>The Armory may disclose your personal information if required to do so by law or in the good faith belief that such action is necessary to: (a) conform to the edicts of the law or comply with legal process served on the Armory or the site; (b) protect and defend the rights or property of the Armory and its family of websites; or (c) act in urgent circumstances to protect the personal safety of Armory employees, users of Armory products or services, or members of the public. </p><p>In order to help us to better tailor our services and offerings, the Armory collects limited information about patron click-throughs, solely in connection with its e-newsletter and e-mail communications. Like many websites, this website also automatically logs certain aggregate information about visits to our website. This information is used for system administration and for producing usage statistics.</p><h2>Control of your Personal Information</h2><p>When you register, or otherwise give us personal information, your information will not be shared with third parties without your permission, other than for the limited exceptions already listed. It will only be used for the purposes stated above. The Armory does not rent or sell its email list but may sometimes exchange, rent, or sell names and addresses with other organizations. You may indicate to the Armory at any time whether or not you wish to have the Armory share your name with other organizations.</p><h2>Protection of Children&#39;s Personal Information</h2><p>This is a general audience site and does not knowingly collect any personal information from children.</p><h2>Links and Embedded Content</h2><p>Our websites may include links to other websites or embedded content. We do not control the privacy policies of the destination sites. Once you leave our servers or watch a YouTube video (you can see where you are by checking the URL in the location bar on your browser), use of any information you provide is governed by the privacy policy of the operator of the site you are visiting. </p><h2>Updating Your Information</h2><p>If you would like to update information and preferences in connection with newsletters, mailing lists, and databases, refer to the Armory’s “Contact Us” page. In all instances, you can stop receiving e-newsletters sent by the Armory by clicking on the &quot;Unsubscribe&quot; link at the bottom of each such e-newsletter.</p><h2>Changes to this Statement</h2><p>The Armory reserves the right to revise this privacy policy from time to time, and by using this website, you are agreeing to the terms of the then-current privacy policy. We encourage you to visit this page periodically to review our current policy.</p><h2>Contact Information</h2><p>The Armory welcomes your comments regarding this privacy statement, please contact us by email at info@armoryonpark.org or by postal mail:</p><p>Park Avenue Armory\r\nAttn: Marketing Department\r\n643 Park Avenue\r\nNew York, NY 10021</p><hr>\r\n<h1>Terms and Conditions</h1><p>Your right to access the content on this website and related products and to use the services provided via this website and related products are subject to the terms and conditions set forth below. Any breach of the terms and conditions set forth below immediately terminates such rights.</p><h2>1. Content</h2><p>The content provided on this website (collectively, the “Content”) is and remains at all times the property of Park Avenue Armory or its licensors or suppliers. You may download and use the Content for your personal, non-commercial use. You may not resell or commercially exploit the Content, nor may you download or copy Content for the benefit of a third party. Any use of data mining, robots, or similar data gathering and extraction tools is expressly prohibited. You may not frame or utilize framing techniques to enclose any Content without the express written consent of Park Avenue Armory. If you download or print a copy of the Content for personal use, you must retain all copyright and other proprietary notices contained therein.</p><h2>2. Ticket Purchases</h2><p>The purchase of tickets via this website is subject to our Ticketing Policies. Personal information you submit to us during the purchase of tickets via this website will be treated by Park Avenue Armory in the manner described in our Privacy Policy.</p><h2>3. Intellectual Property Rights</h2><p>The Content and the selection, compilation, collection, arrangement, and assembly thereof are protected by US and international copyright, trademark, and other laws. Other than as permitted in Section 1 of these terms and conditions, or as permitted by applicable law, you may not copy, reproduce, republish, upload, post, transmit, or distribute Content or other content or information available on or through this website in any way without our prior written permission.</p><h2>4. Claims of Copyright Infringement</h2><p>The Digital Millennium Copyright Act of 1998 (the “DMCA”) provides recourse for copyright owners who believe that material appearing on the internet infringes their rights under US copyright law. If you believe in good faith that materials hosted by Park Avenue Armory infringe your copyright, you (or your agent) may send us a notice requesting that the material be removed, or access to it blocked. Notices with respect to this website should be sent to info@armoryonpark.org.</p><h2>5. Links</h2><p>This website contains links to other internet websites, including affiliated websites that may or may not be owned or operated by Park Avenue Armory. The Armory has not reviewed all of the websites that are linked to this website, and has no control over such sites. Park Avenue Armory is not responsible for the content of such websites, any updates or changes to such sites, or the privacy or other practices of such sites, and the fact that the Armory offers such links does not indicate any approval or endorsement of any material contained on any linked site. Park Avenue Armory is providing these links to you only as a convenience. Accordingly, we strongly encourage you to become familiar with the terms of use and practices of any linked site.</p><h2>6. Disclaimers</h2><p>This website, the materials on this website, and any product or service obtained through this website are provided “as is” and without warranties of any kind, either express or implied. To the fullest extent permissible pursuant to applicable law, Park Avenue Armory and its affiliates , licensors, suppliers, sponsors, and agents disclaim all warranties, express or implied, including, without limitation, implied warranties of title, non-infringement, accuracy, merchantability, and fitness for a particular purpose, and any warranties that may arise from course of dealing , course of performance, or usage of trade. Applicable law may not allow the exclusion of implied warranties, so the above exclusions may not apply to you. </p><h2>7. Limitation of Liability</h2><p>Neither Park Avenue Armory nor any of its affiliates, licensors, suppliers, or sponsors, nor our directors, officers, employees, consultants, agents, or other representatives, are responsible or liable for any indirect, incidental, consequential, special, exemplary, punitive, or other damages (including limitation, damages for loss of business, loss of data, or lost profits), under any contract, negligence, strict liability, or other theory arising out of or relating in any way to this website and/or materials contained on this website, any linked site or any product or service purchased through this website. Your sole remedy for dissatisfaction with this website, materials, or linked site is to stop using this website, materials, or linked site, as applicable. The sole and exclusive maximum liability to Park Avenue Armory for all damages, loss, and causes of action, whether in contract, tort (including, without limitation, negligence, or otherwise, shall be the total amount paid by you, if any, to access this website. Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you.</p><h2>8. Miscellaneous</h2><p>This Agreement is governed by and construed in accordance with the laws of the State of New York, United States of America, without regards to its principles of conflicts of law. </p><p>If any provision of this Agreement is found to be unlawful, void, or for any reason unenforceable, then that provision shall be deemed severable from this Agreement and shall not affect the validity and enforceability of any remaining provisions. </p><p>This is the entire Agreement between us relating to your right to access the content on this website and to use the services provided via this website, and supersedes any and all prior or written or oral agreements between us with respect to such subject matter. No waiver by either party of any breach or default hereunder shall be deemed to be a waiver of any preceding or subsequent breach or default.</p>",
+ "body": "<p>A website is required by law to publish a <i>Privacy Policy</i> if it collects <i>personally identifiable information</i> (PII) which can be used to trace an individual's identity. This information can include your name, email address, telephone number, social security number, date of birth, mother's maiden name, etc. The Privacy Policy should indicate what information is tracked and how it is stored.</p><p>The <i>Terms of Service</i> is a legal document describing a relationship between a software vendor and the end user. Typically this document is designed to indemnify the company who made the software from what you do with it. It also describes your rights in using the software - and what rights you give up.</p><p>The website <a href=\"https://tosdr.org/\">TOS;DR</a> was created to keep track of what's hidden in the small print of these legal agreements. For instance, on Youtube, \"Deleted videos are not really deleted.\" Facebook and Google admit to tracking your behavior, even on other websites. Instagram and Netflix waive your right to participating in a class action lawsuit. You cannot delete your Skype account.</p>\r\n<hr>\r\n<h1>Privacy Policy</h1><p>Park Avenue Armory is committed to protecting your privacy. You can visit most pages on our site without giving us any information about yourself, but sometimes we do need information to provide services that you request. This policy describes the personal information we collect about you, the security measures we take to protect your information, the ways we use your information, and the limited situations in which we may share your information with third parties. Our policy also describes the choices you can make about how we collect and use your information. We encourage you to read the complete privacy policy; use of the Armory’s family of websites constitutes your acceptance of this policy.</p><h2>Collection of Your Personal Information</h2><h3>A. Information you give us</h3><p>The Armory will often request information that personally identifies you (personal information) or allows us to contact you. Generally, this information is requested when you purchase tickets, make donations, register for email newsletters or alerts, participate in a promotion or an online survey, contact us with a question or suggestion, request postal mailings, or apply for employment. Personal information collected generally includes a home address, email address, phone number, credit card information including expiration date and billing address, and product or genre preferences; it may include other information as needed to provide a specific service you requested or as part of an online survey, promotion, or app. We collect this information when you enter it on Armory websites or provide it voluntarily. You may remain anonymous to us if you choose to pay by cash in person at the Box Office.</p><h3>B. Automatic information</h3><p>When you visit the Armory’s websites, we automatically collect website usage information, as well as information about your computer and Internet connection. This includes your computer&#39;s IP address, the type and version of browser and operating system you use, your Internet domain, and if you visit via a link from another website, the URL of the linking page. This site visitation data is identified only by a unique ID number, and it is not linked with personal information unless you choose to log in. We aggregate this usage information and use it to identify the levels and areas of interest in the Armory and to improve and refine our websites, services, and security. We may perform (or have third parties perform) analyses of visitors&#39; behavior, and may share aggregated, anonymous data with funders, sponsors, or agencies.</p><p>We use cookie technology to gain information that helps us improve the user experience and enhances the functionality of our websites. A cookie is a small amount of data sent by our websites and stored on your computer&#39;s hard drive that our site can read, and which helps us keep track of how you use our websites. Many web browsers automatically accept cookies by default but contain an option for you to disable the cookie acceptance if you prefer. We do not allow unrelated third parties to set cookies via the Armory’s family of websites.</p><p>The Armory uses electronic images known as web beacons to monitor the activity of our email messages. These web beacons allow BAM&#39;s email service provider to obtain information such as the IP address of the computer that opened the email and what links were clicked within the email. With both cookies and web beacon technology, the information that we collect is anonymous and not personally identifiable. </p><p>The Armory uses remarketing with Google Analytics to advertise online. This means that the Armory allows third party vendors to show ads from the Armory on sites across the Internet. The Armory and these third party vendors use first party cookies and third party cookies together to inform, optimize, and serve ads based on a visitor’s past visits to websites.</p><p>We employ third parties to perform functions like sending postal mail and email, removing repetitive information from customer lists, and processing credit card payments. These parties have access to personal information that is necessary to perform their functions, but they are contractually obligated not to use it for other purposes. </p><h2>Security Used to Protect Your Information</h2><p>The Armory employs the latest safeguards and technologies to protect your information:</p><h3>Secure Web Servers</h3><p>The Armory employs secure web servers hosted in a certified data center. A  Network Solutions SSL (Secure Socket Layer) certificate is used for the secure encrypted exchange of data between your web browser and our websites using SSL encryption. Network Solutions Digital Certificates are trusted by over 99% of all browsers, applications, servers, and clients, including: Microsoft® Internet Explorer, Mozilla® Firefox, Google® Chrome, Konqueror (KDE), Opera and Apple® Safari. </p><h3>Firewall</h3><p>The Armory uses redundant, dedicated firewalls that protect both its transactional system and the data passing through it.</p><h2>Use of Your Personal Information<h2>\r\n\r\n<p>We use your personal information for the following purposes:</p>\r\n<li>- To ensure our site is relevant to your needs</li>\r\n<li>- To deliver services such as newsletters</li>\r\n<li>- To help us create and publish content most relevant to you</li>\r\n\r\n<p>The Armory may disclose your personal information if required to do so by law or in the good faith belief that such action is necessary to: (a) conform to the edicts of the law or comply with legal process served on the Armory or the site; (b) protect and defend the rights or property of the Armory and its family of websites; or (c) act in urgent circumstances to protect the personal safety of Armory employees, users of Armory products or services, or members of the public. </p>\r\n<p>In order to help us to better tailor our services and offerings, the Armory collects limited information about patron click-throughs, solely in connection with its e-newsletter and e-mail communications. Like many websites, this website also automatically logs certain aggregate information about visits to our website. This information is used for system administration and for producing usage statistics.</p>\r\n<h2>Control of your Personal Information</h2>\r\n<p>When you register, or otherwise give us personal information, your information will not be shared with third parties without your permission, other than for the limited exceptions already listed. It will only be used for the purposes stated above. The Armory does not rent or sell its email list but may sometimes exchange, rent, or sell names and addresses with other organizations. You may indicate to the Armory at any time whether or not you wish to have the Armory share your name with other organizations.</p>\r\n<h2>Protection of Children&#39;s Personal Information</h2>\r\n<p>This is a general audience site and does not knowingly collect any personal information from children.</p>\r\n<h2>Links and Embedded Content</h2>\r\n<p>Our websites may include links to other websites or embedded content. We do not control the privacy policies of the destination sites. Once you leave our servers or watch a YouTube video (you can see where you are by checking the URL in the location bar on your browser), use of any information you provide is governed by the privacy policy of the operator of the site you are visiting. </p>\r\n<h2>Updating Your Information</h2>\r\n<p>If you would like to update information and preferences in connection with newsletters, mailing lists, and databases, refer to the Armory’s “Contact Us” page. In all instances, you can stop receiving e-newsletters sent by the Armory by clicking on the &quot;Unsubscribe&quot; link at the bottom of each such e-newsletter.</p>\r\n<h2>Changes to this Statement</h2>\r\n<p>The Armory reserves the right to revise this privacy policy from time to time, and by using this website, you are agreeing to the terms of the then-current privacy policy. We encourage you to visit this page periodically to review our current policy.</p>\r\n<h2>Contact Information</h2>\r\n<p>The Armory welcomes your comments regarding this privacy statement, please contact us by email at info@armoryonpark.org or by postal mail:</p>\r\n<p>Park Avenue Armory\r\nAttn: Marketing Department\r\n643 Park Avenue\r\nNew York, NY 10021</p><hr>\r\n\r\n<h1>Terms and Conditions</h1>\r\n<p>Your right to access the content on this website and related products and to use the services provided via this website and related products are subject to the terms and conditions set forth below. Any breach of the terms and conditions set forth below immediately terminates such rights.</p>\r\n<h2>1. Content</h2>\r\n<p>The content provided on this website (collectively, the “Content”) is and remains at all times the property of Park Avenue Armory or its licensors or suppliers. You may download and use the Content for your personal, non-commercial use. You may not resell or commercially exploit the Content, nor may you download or copy Content for the benefit of a third party. Any use of data mining, robots, or similar data gathering and extraction tools is expressly prohibited. You may not frame or utilize framing techniques to enclose any Content without the express written consent of Park Avenue Armory. If you download or print a copy of the Content for personal use, you must retain all copyright and other proprietary notices contained therein.</p>\r\n<h2>2. Ticket Purchases</h2>\r\n<p>The purchase of tickets via this website is subject to our Ticketing Policies. Personal information you submit to us during the purchase of tickets via this website will be treated by Park Avenue Armory in the manner described in our Privacy Policy.</p>\r\n<h2>3. Intellectual Property Rights</h2>\r\n<p>The Content and the selection, compilation, collection, arrangement, and assembly thereof are protected by US and international copyright, trademark, and other laws. Other than as permitted in Section 1 of these terms and conditions, or as permitted by applicable law, you may not copy, reproduce, republish, upload, post, transmit, or distribute Content or other content or information available on or through this website in any way without our prior written permission.</p>\r\n<h2>4. Claims of Copyright Infringement</h2>\r\n<p>The Digital Millennium Copyright Act of 1998 (the “DMCA”) provides recourse for copyright owners who believe that material appearing on the internet infringes their rights under US copyright law. If you believe in good faith that materials hosted by Park Avenue Armory infringe your copyright, you (or your agent) may send us a notice requesting that the material be removed, or access to it blocked. Notices with respect to this website should be sent to info@armoryonpark.org.</p>\r\n<h2>5. Links</h2>\r\n<p>This website contains links to other internet websites, including affiliated websites that may or may not be owned or operated by Park Avenue Armory. The Armory has not reviewed all of the websites that are linked to this website, and has no control over such sites. Park Avenue Armory is not responsible for the content of such websites, any updates or changes to such sites, or the privacy or other practices of such sites, and the fact that the Armory offers such links does not indicate any approval or endorsement of any material contained on any linked site. Park Avenue Armory is providing these links to you only as a convenience. Accordingly, we strongly encourage you to become familiar with the terms of use and practices of any linked site.</p>\r\n<h2>6. Disclaimers</h2>\r\n<p>This website, the materials on this website, and any product or service obtained through this website are provided “as is” and without warranties of any kind, either express or implied. To the fullest extent permissible pursuant to applicable law, Park Avenue Armory and its affiliates , licensors, suppliers, sponsors, and agents disclaim all warranties, express or implied, including, without limitation, implied warranties of title, non-infringement, accuracy, merchantability, and fitness for a particular purpose, and any warranties that may arise from course of dealing , course of performance, or usage of trade. Applicable law may not allow the exclusion of implied warranties, so the above exclusions may not apply to you. </p>\r\n<h2>7. Limitation of Liability</h2>\r\n<p>Neither Park Avenue Armory nor any of its affiliates, licensors, suppliers, or sponsors, nor our directors, officers, employees, consultants, agents, or other representatives, are responsible or liable for any indirect, incidental, consequential, special, exemplary, punitive, or other damages (including limitation, damages for loss of business, loss of data, or lost profits), under any contract, negligence, strict liability, or other theory arising out of or relating in any way to this website and/or materials contained on this website, any linked site or any product or service purchased through this website. Your sole remedy for dissatisfaction with this website, materials, or linked site is to stop using this website, materials, or linked site, as applicable. The sole and exclusive maximum liability to Park Avenue Armory for all damages, loss, and causes of action, whether in contract, tort (including, without limitation, negligence, or otherwise, shall be the total amount paid by you, if any, to access this website. Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you.</p>\r\n<h2>8. Miscellaneous</h2>\r\n<p>This Agreement is governed by and construed in accordance with the laws of the State of New York, United States of America, without regards to its principles of conflicts of law. </p>\r\n<p>If any provision of this Agreement is found to be unlawful, void, or for any reason unenforceable, then that provision shall be deemed severable from this Agreement and shall not affect the validity and enforceability of any remaining provisions. </p>\r\n<p>This is the entire Agreement between us relating to your right to access the content on this website and to use the services provided via this website, and supersedes any and all prior or written or oral agreements between us with respect to such subject matter. No waiver by either party of any breach or default hereunder shall be deemed to be a waiver of any preceding or subsequent breach or default.</p>",
"disabled": false,
"__index": 3,
"dateCreated": "Sat, 13 May 2017 19:50:06 GMT"
@@ -2483,7 +2487,7 @@ export const backupDB = {
{
"id": "find-your-face",
"title": "Find Your Face",
- "body": "The Hansel & Gretel exhibition uses a custom facial recognition system that automatically captures visitors’ facial biometrics as they move throughout the Armory. At all times, 5 surveillance cameras stream a 1080p image at 10 FPS to a central image processing server located on site. Every frame from every camera is run through a series of computer vision algorithms that detect faces and convert them into biometric face prints. In less than 1 millisecond, using a minimum of 100x100 pixels, any face appearing in any surveillance feed is automatically extracted and stored in a local database as a 128-dimension feature vector.\r\n\r\nThese 128-dimension feature vectors represent what makes each face unique relative to other faces. Previous versions of facial recognition technology from the 90s and early 2000s based recognition on seeing the face in a more human way, as linear combinations of composite photographs or by comparing the geometry between facial landmarks. Current state-of-the-art facial recognition algorithms, including the code used in the Hansel & Gretel system, make use of deep neural networks that automatically determine which combinations of facial features are the most useful for creating a recognizable amount of separation between between thousands of identities.\r\n\r\nIn a controlled testing environment using frontal-pose images, the accuracy exceeds 99%. In practice however, images captured in any surveillance system will typically be less accurate because of the differences between the pose, lighting, expression, optics and fashion accessories worn for the enrollment and capture photos. This effect is slightly minimized in the Hansel & Gretel facial recognition system because visitors are enrolled and matched on the same day. The accuracy of your matched photo will depend mostly on the equivalence of expression and pose between your submitted photo and your captured photos. According to a theory called the Biometric Zoo, match scores are also dependent on the relative similarity or difference of facial features amongst the enrolled population of faces.\r\n\r\nOur surveillance cameras operate in near darkness, illuminated only by infrared light below the threshold of the human perceptual system. Most of the cameras and equipment that power the system are hidden until second half of the exhibition where visitors can engage with it through the custom Find my Face app on the tablets. This app allows users to submit a selfie and send it to the facial recognition server for analysis. The image with the highest confidence match is returned. The captured surveillance image will appear slightly different than the submitted image because of the infrared illumination. Most notably pupils are darker because they absorb IR light and skin appears lighter because it is more reflective in the IR spectrum. The matched surveillance image is overlaid with text that includes the timestamp when it was captured, the camera ID, and the facial recognition confidence score.",
+ "body": "Description of face recognition pipeline coming SOON!",
"disabled": false,
"__index": 7,
"dateCreated": "Sat, 20 May 2017 21:50:17 GMT"
@@ -2491,7 +2495,7 @@ export const backupDB = {
{
"id": "print",
"title": "Print",
- "body": "Please visit the cashier and request your printed photo.\r\nEach print costs $5.00",
+ "body": "Go to the gift shop to purchase your print.\r\n\r\nEach print costs $10.00",
"disabled": false,
"__index": 8,
"dateCreated": "Mon, 22 May 2017 09:54:07 GMT"
@@ -2507,7 +2511,7 @@ export const backupDB = {
"uri": "https://www.youtube.com/watch?v=fO_-p8bi_Lk"
},
{
- "text": "Hallway",
+ "text": "Tunnel",
"uri": "https://www.youtube.com/watch?v=lDtcQID42Sg"
},
{