diff options
| author | Jules Laplace <julescarbon@gmail.com> | 2017-06-01 20:58:36 -0400 |
|---|---|---|
| committer | Jules Laplace <julescarbon@gmail.com> | 2017-06-01 20:58:36 -0400 |
| commit | fb6290173effac7d713718ad5b487a405ae64351 (patch) | |
| tree | 2f28e1a6b7e47e32e29f22ac7a948e00dd9e5da6 /db.json | |
| parent | a5c00c4bb45102b676a6b0435c8b80c6908ecff1 (diff) | |
index
Diffstat (limited to 'db.json')
| -rw-r--r-- | db.json | 250 |
1 files changed, 123 insertions, 127 deletions
@@ -32,7 +32,7 @@ "medium": "Religious Idea", "category": "Surveillance", "keywords": "#Eye #God #Providence #Guilt #Order #Control #Ethics #Christianity #Judaism #Islam #Bible #education #Skies #Clouds #Manipulation #Illuminati #Kabbalah #Secrecy #Dialectic #Knowledge #Future #Present #Past #Synthesis\r\n", - "description": "The motif of the divine eye was spread throughout Europe in the wake of the Counter-Reformation; its roots lie in the Antiquity, as well as in Jewish and Christian sources. Augustine described the religious idea of God’s all-seeing eye on the psychological level when he wrote: And from Thee, O lord, unto whose eyes the abyss of man’s conscience is naked, what could be hidden in me though I would not confess it? The psychic aspects of fear, control and education are lanced through the Antique iconography and culminated in the idea of God’s Providence. \r\n", + "description": "The motive of the divine eye was spread throughout Europe in the wake of the Counter-Reformation; its roots lie in the Antiquity, as well as in Jewish and Christian sources. Augustine described the religious idea of God’s all-seeing eye on the psychological level when he wrote: And from Thee, O lord, unto whose eyes the abyss of man’s conscience is naked, what could be hidden in me though I would not confess it? The psychic aspects of fear, control and education are lanced through the Antique iconography and culminated in the idea of God’s Providence. \r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/f2d447f0-38d4-11e7-9d48-c59d5d130bc6.jpg", "caption": "", @@ -52,7 +52,7 @@ "medium": "Item", "category": "Surveillance", "keywords": "#Epidemiology #Health #Surveillance #Sickness #Control #Plague #Immunity #Sickness #Disease #Plague #BlackDeath #HIV #Biology #Pharma-Industry\r\n", - "description": "According to the World Health Organization (WHO), Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as an early warning system for health emergencies and as documentation, which informs the impact of certain medical interventions. Health surveillance uses mortality data as a base for measuring public health, a practice that arose ca. 600 years ago in Europe throughout the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports were and are still used to collect data about HIV and AIDS – for example, population rates, numbers of people living with HIV and numbers of people who receive medical care. There have been various debates on human rights and civil liberty in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination based on sexual orientation.\r\n", + "description": "Following the WHO, Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as early warning system for health emergencies and as documentation praxis which informs on the impact of a certain medical intervention. Health surveillance uses mortality data as a base for measuring public health, a praxis that arose ca. 600 years ago in Europe throughout the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports were and are still used to collect data about HIV and AIDS – for example, population rates, numbers of people living with HIV and numbers of people who receive medical care. There have been various debates on human rights and civil liberty in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination of sexual orientation.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/9c33f610-38d5-11e7-9d48-c59d5d130bc6.jpg", "caption": "", @@ -61,11 +61,11 @@ }, "links": [ { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/Public_health_surveillance" }, { - "text": "World Health Organization", + "text": "link text", "uri": "http://www.who.int/topics/public_health_surveillance/en/" } ], @@ -101,7 +101,7 @@ "medium": "Item", "category": "Surveillance", "keywords": "#Big Brother #Surveillance #Control #Institution #Interception #Information #Secrets #Deciphering #Espionage #Privacy #Governments #Intelligence #Cryptology\r\n", - "description": "“Black Chamber” is the name used for secret decoding bureaus established as early as the US postal system. Governmentally operated, the bureau would intercept letters, gather intelligence of political rivals and channel them back into the postal system without further notice. The term has also been used further back in history, most notably the \"Cabinet Noire\" in France operated under Louis XV and the Geheime Kabinettskanzlei (Secret Chancellery) in Austria during the 18th century, and in more modern times the British Room 40 and then Bletchley Park that became home to the greatest codebreakers. After World War I, the US established their first crypto-analytical institute to intercept correspondence of other nations. Operating under a bogus company based in New York City, the US-Black Chamber was a direct predecessor of the National Security Agency (NSA).\r\n", + "description": "“Black Chamber” is the name used for secret decipher bureaus established as early as the postal system. Governmentally operated, the bureau would intercept letters, gather intelligence of political rivals and channel them back into the postal system without further notice. The most well-known cases were the Cabinet Noire in France run under Ludwig XIV, the Geheime Kabinettskanzlei (Secret Chancellery) in Vienna, Austria, the British Room 40 and then Bletchley Park that became home to the greatest codebreakers. After World War One, the US established their first crypto-analytical institute to intercept correspondence of other nations. Operating under a bogus company based in New York City, the US-Black Chamber was a direct predecessor of the National Security Agency (NSA).\r\n", "image": { "uri": "https://upload.wikimedia.org/wikipedia/commons/7/77/Bodleian_Libraries%2C_Le_cabinet_noir_ou-_les_pantins_du_19eme_si%C3%A8cle.jpg", "caption": "", @@ -110,11 +110,11 @@ }, "links": [ { - "text": "New York Times", + "text": "Link text", "uri": "http://www.nytimes.com/2006/01/13/opinion/back-when-spies-played-by-the-rules.html" }, { - "text": "NSA", + "text": "Link text", "uri": "https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/black-chamber.shtml" } ], @@ -139,7 +139,7 @@ }, "links": [ { - "text": "Wikipedia", + "text": "Link text ", "uri": "https://en.wikipedia.org/wiki/Panopticon" } ], @@ -155,7 +155,7 @@ "medium": "Image", "category": "Drones", "keywords": "#Drones #UAV #Airstrike #Attack #Military #Warfare #Venice #Austria", - "description": "Arguably, this was the first drone strike in history: On August 22, 1849 Venice was bombarded by unmanned balloons launched by the Austrians who controlled much of Italy at the time. The experimental approach of using hot air balloons, which carried explosives, was a consequence of the actual topography of Venice – since the city was surrounded by water, the Austrian artillery could not intrude. This incidence is the first known use of aerial bombing. \r\n\r\nThe image below illustrates an artistic interpretation of the bombing from a Russian source. \r\n", + "description": "Arguably, this was the first drone strike in history: In August 22nd 1849 Venice was bombarded by unmanned balloons launched by the Austrians who controlled much of Italy at the time. The experimental approach of using hot air balloons, which carried ordnance, was a consequence of the actual topography of Venice – since the city was surrounded by water, the Austrian artillery could not intrude. This incidence is the first known use of aerial bombing. \r\n\r\nThe image below illustrates an artistic interpretation of the bombing from a russian source. \r\n", "image": { "uri": "http://www.ctie.monash.edu/hargrave/images/balloonbombs1848_500.jpg", "caption": "", @@ -164,14 +164,14 @@ }, "links": [ { - "text": "Monash University", + "text": "Link text", "uri": "http://www.ctie.monash.edu/hargrave/rpav_home.html#Beginnings" } ], "disabled": false, "__index": 6, "dateCreated": "Thu, 11 May 2017 13:58:11 GMT", - "credit": "Bombing by Balloon, 1848, Source: Prof. Jurij Drushnin, Moscow, Russia" + "credit": " Bombing by Balloon, 1848, Source: Prof. Jurij Drushnin, Moscow, Russia" }, { "id": "boston-as-the-eagle-and-the-wild-goose-see-it", @@ -190,7 +190,7 @@ "credit": "James Wallace Black / 1860 / Public Domain\r\n", "links": [ { - "text": "The Metropolitan Museum of Art", + "text": "Link text", "uri": "http://www.metmuseum.org/art/collection/search/283189" } ], @@ -215,7 +215,7 @@ "credit": "Samuel Luke Fildes / The Graphic / 1873 via Jennifer Tucker", "links": [ { - "text": "the Boston Globe", + "text": "link text", "uri": "https://www.bostonglobe.com/ideas/2014/11/23/facial-recognition-technology-goes-way-back/CkWaxzozvFcveQ7kvdLHGI/story.html" } ], @@ -230,7 +230,7 @@ "medium": "Image", "category": "Surveillance", "keywords": "#Biometrics #Prison #Information #Control #Identification #Police\r\n", - "description": "Fingerprint characteristics were studied as far back as mid-1600s and used as a means of identification by British colonialists in India in the mid 19th century. Several people are credited with classifying the fingerprinting system for means of identification in the criminal sector: Sir Francis Galton, a British anthropologist who published a book on the forensic science of fingerprints and claimed the chance of two people having the same fingerprint was about one to 64 million. Henry Fauld, a Scottish scientist, and Edward Henry, a British police commissioner who developed the Henry Classification System which served to sort fingerprints by their physiological characteristics and was the basis of the modern-day Automated Fingerprint Identification System (AFIS) that was used up until the 1990s. The image indicates the beginnings of fingerprinting, implemented by Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India in 1858 in a contract with a local businessman.\r\n", + "description": "Fingerprint characteristics were studied as far back as mid-1600s and used as means of identification by British colonialists in India in the mid 19th century. Several people are credited with classifying the fingerprinting system for means of identification in the criminal sector: Sir Francis Galton, a British anthropologist who published a book on the forensic science of fingerprints and claimed the chance of two people having the same fingerprint was about one to 64 million. Henry Fauld, a scottish scientist, and Edward Henry, a British police commissioner who developed the Henry Classification System which served to sort fingerprints by their physiological characteristics was the basis of the modern-day Automated Fingerprint Identification System (AFIS) that was used up until the 1990s. The image indicates the beginnings of fingerprinting, implemented by Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India in 1858 in a contract with a local businessman.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/cc92b950-3654-11e7-a37a-4579121b15f0.jpg", "caption": "", @@ -240,11 +240,11 @@ "credit": " Sir William James Herschel, “The Origin of Finger Printing\" 1916., (Public Domain)\r\n", "links": [ { - "text": "Onin.com", + "text": "Link text", "uri": "http://www.onin.com/fp/fphistory.html" }, { - "text": "Archive.org", + "text": "Link text ", "uri": "https://archive.org/details/originoffingerpr00hersrich" } ], @@ -259,7 +259,7 @@ "medium": "Image", "category": "Facial Recognition", "keywords": "#Facial Recognition #Biometrics #Prison #Information #Photography #Police #Identification #Technology\r\n", - "description": "Bertillonage is a system of measuring and categorizing individuals, also known as anthropometry. It was named after the French criminologist and anthropologist Alphonse Bertillon and used by the Parisian police from 1883 to track and identify criminals. In addition of a frontal and profile portrait photograph (the ‘mug shot‘), the body measurements and feature classifications of the individual were collected on a card. The cards were then systematically filed so they could be easily retrieved. The Bertillonage system was later adopted by police forces in Great Britain, Europe and the Americas until it was replaced by using fingerprints for identification in the early 20th century.\r\n", + "description": "Bertillonage is a system of measuring and categorizing individuals, also known as anthropometry. It was named after the French criminologist and anthropologist Alphonse Bertillon and used from the Parisian police from 1883 to track and identify criminals. In addition of a frontal and profile portrait photograph (the ‘mug shot‘), the body measurements and feature classifications of the individual were collected on a card. The cards were then systematically filed so they could be easily retrieved. The Bertillonage system was later adopted by police forces in Great Britain, Europe and the Americas until it was replaced by using fingerprints for identification in the early 20th century.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/38befc10-3655-11e7-a37a-4579121b15f0.jpg", "caption": "", @@ -269,7 +269,7 @@ "credit": "Creative Commons CC0 1.0 Universal Public Domain Dedication\r\n", "links": [ { - "text": "U.S. National Library of Medicine", + "text": "Link text", "uri": "https://www.nlm.nih.gov/visibleproofs/galleries/biographies/bertillon.html" } ], @@ -284,7 +284,7 @@ "medium": "Image", "category": "Facial Recognition", "keywords": "#Facial Recognition #Biometrics #Verticality #Photography #All-Seeing Eye\r\n", - "description": "In 1903, Alphonse Bertillon, who is known to have standardized identification methods for criminals and credited with the invention of the mug-shot, introduced metric photography to investigate crime scenes. He constructed a high tripod about 2 meters tall, with which one could take a vertical perspective photographs of murder victims at the places of their deaths. From this angle, it was possible to provide full photographic evidence. He referred to the bird’s-eye perspective as a “God’s-eye view”. Bertillons metric photography was applied at the criminal department of forensic medicine and anthropology in France. The photo depicts a demonstration with a false corpse.\r\n", + "description": "In 1903, Alphonse Bertillon, who is known to have standardized identification methods for criminals and credited with the invention of the mug-shot, introduced metric photography to investigate crime scenes. He constructed an about two meters high tripod, with which one could take a vertical perspective photographs of murder victims at the places of their deaths. This way, it was possible to provide with full photographic evidence. He referred to the bird’s-eye perspective as a “God’s-eye view”. Bertillons metric photography was applied at the criminal department of forensic medicine and anthropology in France. The photo depicts a demonstration with a false corpse.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/81cf0e40-3655-11e7-a37a-4579121b15f0.jpg", "caption": "", @@ -294,7 +294,7 @@ "credit": "(1) Rodolphe A Reiss, Demonstration of the Bertillon metric photography system, 1925. © RA Reiss, courtesy of Collection of the Institut de Police Scientifique et de Criminologie de l’Université de Lausanne.\r\n(2) A demonstration of the Bertillon metric photography system, 1908 Credit: Archives de la préfecture de Police \r\n", "links": [ { - "text": "Archive.org", + "text": "Link text", "uri": "https://archive.org/details/cu31924096442185" } ], @@ -319,11 +319,11 @@ "credit": "", "links": [ { - "text": "IMDb", + "text": "Link text", "uri": "http://www.imdb.com/title/tt0014646/" }, { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/Aelita" } ], @@ -358,7 +358,7 @@ "medium": "Item / Image", "category": "Drones", "keywords": "#Drone #Warfare #Airstrikes #Technology #Airplanes #Attack #UAV #Technology\r\n", - "description": "Investment into the development of remotely controlled vehicles increased quickly after World War I. Although the DH-82B Queen Bee had many predecessors, it was the first full production, fully-sized, reusable, pilotless aircraft that was used for anti-aircraft gunnery practice. It was designed by engineer Geoffrey Havilland from the British Air Force, who was a passionated amateur entomologist and would call his aircrafts after insects (Tiger Moth, Fox Moth, Mosquito, and Dragonfly). In 1935, a US Navy admiral visited the Royal Air and was given a demonstration of the Queen Bee. Upon his return to the US, he developed a similar system for gunnery training and adopted the name \"drone\", as an homage to the British Queen Bee. Since then the name drone became a designation for remotely flown aircraft systems.\r\n", + "description": "Investing into development of remotely controlled vehicles sped after World War I. Although the DH-82B Queen Bee had many predecessors, it was the first full production, fully-sized, reusable, pilotless aircraft that was used for anti-aircraft gunnery practice. It was designed by engineer Geoffrey Havilland from the British Air Force, who was a passionated amateur entomologist and would call his aircrafts after insects (Tiger Moth, Fox Moth, Mosquito, and Dragonfly). In 1935, a US Navy admiral visited the Royal Air and was demonstrated the Queen Bee. Upon his return to the US, he assigned to develop a similar system for gunnery training and adopted the name drone, as an homage to the Queen Bee. Since then the name drone became a designation for remotely flown aircraft systems.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/60afc9b0-3656-11e7-a37a-4579121b15f0.jpg", "caption": "", @@ -397,7 +397,7 @@ "credit": "", "links": [ { - "text": "IMDb", + "text": "Link text ", "uri": "http://www.imdb.com/title/tt0025968/" } ], @@ -422,11 +422,11 @@ "credit": "Edwin Black in IBM and the Holocaust / 2001\r\n", "links": [ { - "text": "Jewish Virtual Library", + "text": "Link text", "uri": "http://www.jewishvirtuallibrary.org/ibm-and-quot-death-s-calculator-quot" }, { - "text": "The New York Times", + "text": "Link text ", "uri": "http://www.nytimes.com/books/first/b/black-ibm.html" } ], @@ -441,7 +441,7 @@ "medium": "Item", "category": "Surveillance", "keywords": "#USA #All-Seeing Eye #Governments\r\n", - "description": "The all seeing-eye of God famously appears on the reverse of the US one dollar bill. Atop a unfinished thirteen stepped pyramid and surrounded by rays of light, it is part of the symbolism of the Great Seal of the United States. The usage of the eye in the seal dates back as far as 1782. The all-seeing Eye or the Eye of Providence is often interpreted as representing the eye of God keeping a watch over humankind. Often utilized by the Freemasons, the design of the one-dollar bill was subject to several conspiracy theories.\r\nSurrounding the eye and pyramid are the latin phrases “Annuit Cœptis\", meaning \"He approves (or has approved) our undertakings“ and \"Novus Ordo Seclorum,\" meaning \"New Order of the Ages“. In 1957 the phrase „In God We Trust“ was added, which makes the design that is still in use today.\r\nThe image depicts former President Franklin D. Roosevelt approving the design with the condition that the order of the seal should be reversed so the phrase \"of the United States\" would be under the obverse side of the Seal.\r\n", + "description": "The all seeing-eye of God famously appears on the reverse of the US one dollar bill. Atop a unfinished thirteen steps pyramid and surrounded by rays of light, it is part of the symbolism of the Great Seal of the United States. The usage of the eye in the seal dates back as far as 1782. The all-seeing Eye or the Eye of Providence is often interpreted as representing the eye of God keeping a watch over humankind. Often utilized by the Freemasons, the design of the one-dollar bill was subject to several conspiracy theories.\r\nSurrounding the eye and pyramid are the latin phrases “Annuit Cœptis\", meaning \"He approves (or has approved) our undertakings“ and \"Novus Ordo Seclorum,\" meaning \"New Order of the Ages“. In 1957 the phrase „In God We Trust“ was added, which makes the design that is still in use today.\r\nThe image depicts former President Franklin D. Roosevelt approving the design with the condition that the order of the seal should be reversed so the phrase \"of the United States\" would be under the obverse side of the Seal.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/305885b0-38c5-11e7-9d48-c59d5d130bc6.jpg", "caption": "", @@ -451,7 +451,7 @@ "credit": "public domain, 1935\r\n", "links": [ { - "text": "U.S. Currency Education Program", + "text": "Link text ", "uri": "https://www.uscurrency.gov/content/history-american-currency" } ], @@ -466,7 +466,7 @@ "medium": "Item", "category": "Surveillance", "keywords": "#Turing-Machine #Computing #Encryption #Computer-Science #Warfare #Espionage #Codebreaking #Intelligence #Enigma \r\n", - "description": "A Turing machine is a hypothetical machine thought of by the mathematician Alan Turing in 1936. Despite its simplicity, it can simulate any algorithm. The Turing machine is considered the first mathematical model of computation and therefore also the blueprint for the modern computer. Its prior usage in the time of its development was to break a supposedly unbreakable encryption system called “Enigma”, which the Nazis developed and used during World War II.\r\n", + "description": "A Turing machine is a hypothetical machine thought of by the mathematician Alan Turing in 1936. Despite its simplicity, it can simulate any algorithm. The Turing machine is considered as the first mathematical model of computation and therefore also the blueprint for the modern computer. Its prior usage in the time of its development was to break a supposedly unbreakable encryption system called “Enigma”, which the Nazis depevolpped and applied during World War II.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/95eeb300-3658-11e7-a37a-4579121b15f0.jpg", "caption": "", @@ -476,11 +476,11 @@ "credit": "", "links": [ { - "text": "The New Yorker", + "text": "Link text", "uri": "http://www.newyorker.com/magazine/2006/02/06/code-breaker" }, { - "text": "University of Cambridge", + "text": "Link text", "uri": " https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/turing-machine/one.html" } ], @@ -505,11 +505,11 @@ "credit": "AR/BNPS\r\n", "links": [ { - "text": "Audubon", + "text": "Link text", "uri": "http://www.audubon.org/news/eyes-sky-short-history-bird-spies" }, { - "text": "Royal Pigeon Racing Association", + "text": "Link text", "uri": "http://www.rpra.org/pigeon-history/pigeons-in-war/" } ], @@ -534,7 +534,7 @@ "credit": "Cover of the UKUSA Agreement 1946, Public Domain\r\n", "links": [ { - "text": "Privacy International", + "text": "Link text ", "uri": "https://www.privacyinternational.org/node/51" } ], @@ -559,7 +559,7 @@ "credit": "NASA, 1969\r\n", "links": [ { - "text": "The National Security Archive", + "text": "Link text ", "uri": "http://nsarchive.gwu.edu/NSAEBB/NSAEBB479/" } ], @@ -604,7 +604,7 @@ "credit": "© Simon Menner and BStU 2017", "links": [ { - "text": "Simon Menner", + "text": "Link text", "uri": "https://simonmenner.com/_sites/SurveillanceComplex/StasiImages/_StasiImagesMenue.html#" } ], @@ -649,11 +649,11 @@ "credit": "screenshot\r\n", "links": [ { - "text": "Academia", + "text": "Link text", "uri": "http://www.academia.edu/305175/Surveillance_and_Ethics_In_Film_Rear_Window_and_The_Conversation" }, { - "text": "The Guardian", + "text": "Link text", "uri": "https://www.theguardian.com/film/filmblog/2012/jul/25/my-favourite-hitchcock-rear-window" } ], @@ -678,15 +678,15 @@ "credit": "unknown\r\n", "links": [ { - "text": "The Guardian", + "text": "Link text ", "uri": "https://www.theguardian.com/world/2001/sep/11/worlddispatch" }, { - "text": "NSA Archive", + "text": "Link text ", "uri": "https://nsarchive.wordpress.com/2010/03/05/document-friday-acoustic-kitty/" }, { - "text": "NSA Archive", + "text": "Link text ", "uri": "http://nsarchive.gwu.edu/NSAEBB/NSAEBB54/st27.pdf" } ], @@ -711,11 +711,11 @@ "credit": "Courtesy: NRO / Public Domain", "links": [ { - "text": "National Reconnaissance Office", + "text": "Link text", "uri": "http://www.nro.gov/history/csnr/corona/factsheet.html" }, { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/Corona_(satellite)#Declassification" } ], @@ -740,7 +740,7 @@ "credit": "public domain / screenshot from document (link below)\r\n", "links": [ { - "text": "Archive.org", + "text": "Link text", "uri": "https://archive.org/details/firstfacialrecognitionresearch" } ], @@ -765,7 +765,7 @@ "credit": "US Army Intelligence & Security Command\r\n", "links": [ { - "text": "Deutsche Welle", + "text": "Link text", "uri": "http://www.dw.com/en/teufelsberg-mirrors-berlins-dramatic-history/a-17074597" } ], @@ -790,7 +790,7 @@ "credit": "unknown\r\n", "links": [ { - "text": "The Guardian", + "text": "Link text", "uri": "https://www.theguardian.com/film/2017/mar/10/antonioni-blow-up-50-years-movie-photographer-murder" } ], @@ -815,19 +815,19 @@ "credit": "First ECHELON station intercepting Intelsat Atlantic and Indian Ocean area satellites: Bude, Cornwal.", "links": [ { - "text": "First Look Media", + "text": "Link text", "uri": "https://firstlook.org/wp-uploads/sites/1/2015/07/rexusa_2569089a-1024x428.jpg" }, { - "text": "The Intercept", + "text": "Link text", "uri": "https://theintercept.com/2015/08/03/life-unmasking-british-eavesdroppers/" }, { - "text": "European Parliament", + "text": "Link text", "uri": "http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN" }, { - "text": "Spiegel", + "text": "Link text", "uri": "http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html" } ], @@ -852,7 +852,7 @@ "credit": "The Opte Project, Internet Map 2003, (This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License) © 2014 by LyonLabs, LLC and Barrett Lyon\r\n", "links": [ { - "text": "Internet Society ", + "text": "Link text", "uri": "http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#" } ], @@ -877,11 +877,11 @@ "credit": "CIA\r\n", "links": [ { - "text": "Central Intelligence Agency", + "text": "Link text", "uri": "https://www.cia.gov/library/video-center/video-transcripts/insectothopter-the-bug-carrying-bug.html" }, { - "text": "The Atlas", + "text": "Link text", "uri": "http://www.atlasobscura.com/articles/object-of-intrigue-the-cia-s-dragonfly-drone" } ], @@ -906,15 +906,15 @@ "credit": "", "links": [ { - "text": "Youtube", + "text": "Link text", "uri": "https://www.youtube.com/watch?v=ihpU1RE_AhA" }, { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/THX_1138" }, { - "text": "IMDb", + "text": "Link text", "uri": "http://www.imdb.com/title/tt0066434/" } ], @@ -959,7 +959,7 @@ "credit": "NASA / Public Domain, 1972\r\n", "links": [ { - "text": "NASA", + "text": "Link text", "uri": "https://earthobservatory.nasa.gov/Features/BlueMarble/BlueMarble_history.php" } ], @@ -984,11 +984,11 @@ "credit": "", "links": [ { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/The_Conversation" }, { - "text": "IMDb", + "text": "Link text", "uri": "http://www.imdb.com/title/tt0071360/" } ], @@ -1013,7 +1013,7 @@ "credit": "Copyright 2000-2008 Judas Priest Music Ltd\r\n", "links": [ { - "text": "Genius", + "text": "Link text ", "uri": "https://genius.com/Judas-priest-electric-eye-lyrics" } ], @@ -1038,7 +1038,7 @@ "credit": "Stasi-Museum, Berlin, ASTAK, eV Photo: John Steer\r\n", "links": [ { - "text": "The National Archives", + "text": "Link text", "uri": "http://blog.nationalarchives.gov.uk/blog/looking-back-25-years-berlin-wall-fell/" } ], @@ -1063,11 +1063,11 @@ "credit": "AT&T Laboratories Cambridge\r\n", "links": [ { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/Eigenface" }, { - "text": "UC Santa Barbara", + "text": "Link text", "uri": "https://www.cs.ucsb.edu/~mturk/Papers/mturk-CVPR91.pdf" } ], @@ -1121,7 +1121,7 @@ "credit": "", "links": [ { - "text": "Wikipedia", + "text": "Link text ", "uri": "https://en.wikipedia.org/wiki/High_Frequency_Active_Auroral_Research_Program" } ], @@ -1146,7 +1146,7 @@ "credit": "Drents Museum\r\n", "links": [ { - "text": "CNN ", + "text": "Link text", "uri": "http://edition.cnn.com/2015/02/27/asia/mummified-monk-statue/" } ], @@ -1171,7 +1171,7 @@ "credit": "unknown\r\n", "links": [ { - "text": "Stanford University", + "text": "Link text ", "uri": "https://cs.stanford.edu/people/eroberts/cs201/projects/2010-11/FreedomOfInformationChina/category/great-firewall-of-china/index.html" } ], @@ -1196,7 +1196,7 @@ "credit": "", "links": [ { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/Big_Brother_(franchise)" } ], @@ -1221,11 +1221,11 @@ "credit": "AP\r\n", "links": [ { - "text": "American Civil Liberties Union", + "text": "Link text", "uri": "https://www.aclu.org/timelines/post-911-surveillance" }, { - "text": "The Guardian", + "text": "Link text", "uri": "https://www.theguardian.com/world/2001/sep/21/september11.usa13" } ], @@ -1250,11 +1250,11 @@ "credit": "Smithsonian Institution, National Air and Space Museum, D.C. Washington (“Do not reproduce without permission”) \r\n", "links": [ { - "text": "The Atlantic", + "text": "Link text", "uri": "https://www.theatlantic.com/international/archive/2015/05/america-first-drone-strike-afghanistan/394463/" }, { - "text": "National Air and Space Museum", + "text": "Link text", "uri": "https://airandspace.si.edu/collection-objects/general-atomics-aeronautical-systems-inc-mq-1l-predator" } ], @@ -1279,11 +1279,11 @@ "credit": "Courtesy of Kevin Sudeith\r\n", "links": [ { - "text": "The Atlantic", + "text": "Link text", "uri": "https://www.theatlantic.com/technology/archive/2015/01/drones-are-appearing-on-afghan-rugs/385025/" }, { - "text": "Messy Nessy Chic", + "text": "Link text", "uri": "http://www.messynessychic.com/2015/01/29/war-rugs-the-obscure-collectors-market-for-afghan-kitsch/" } ], @@ -1328,7 +1328,7 @@ "credit": "Forensic Architecture\r\n", "links": [ { - "text": "foresnic Architecture", + "text": "Link text", "uri": "http://www.forensic-architecture.org/case/drone-strikes/" } ], @@ -1353,7 +1353,7 @@ "credit": "", "links": [ { - "text": "First Monday", + "text": "Link text", "uri": "http://firstmonday.org/article/view/2142/1949" } ], @@ -1407,7 +1407,7 @@ "credit": "KEYHOLE 12-3/IMPROVED CRYSTAL Optical Reconnaissance Satellite Near Scorpio (USA 129), Trevor Paglen, 2007\r\n", "links": [ { - "text": "Journal of the New Media Caucus", + "text": "Link text", "uri": "http://median.newmediacaucus.org/art-infrastructures-hardware/i-see-the-moon-the-moon-sees-me-trevor-paglens-satellite-images/" } ], @@ -1432,11 +1432,11 @@ "credit": "Miki Kratsman\r\n", "links": [ { - "text": "Chelouche Gallery for Contemporary Art", + "text": "Link text", "uri": "http://www.chelouchegallery.com/artistWorks.php?the_group=357&id=49" }, { - "text": "Haaratz", + "text": "Link text", "uri": "http://www.haaretz.com/israel-news/taking-a-stand-1.387195" } ], @@ -1461,7 +1461,7 @@ "credit": " unknown\r\n", "links": [ { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/Chelsea_Manning" }, { @@ -1490,7 +1490,7 @@ "credit": "Screenshot / WikiLeaks Website\r\n", "links": [ { - "text": "Wikileaks", + "text": "Link text", "uri": "https://collateralmurder.wikileaks.org/" } ], @@ -1515,7 +1515,7 @@ "credit": "Omar Fast, Still from ‘5,000 Feet is the Best’\r\n", "links": [ { - "text": "The Independent", + "text": "Link text", "uri": "http://www.independent.co.uk/arts-entertainment/art/reviews/visual-art-review-5000-feet-is-the-best-how-truth-and-fiction-became-blurred-8783611.html" } ], @@ -1565,11 +1565,11 @@ "credit": "Forensic Architecture Research Agency\r\n", "links": [ { - "text": "Forensic Architecture ", + "text": "Link text", "uri": "http://www.forensic-architecture.org/case/left-die-boat/" }, { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/2011_military_intervention_in_Libya" } ], @@ -1594,7 +1594,7 @@ "credit": "George Hodan, Public Domain\r\n", "links": [ { - "text": "The Guardian", + "text": "Link text", "uri": "https://www.theguardian.com/world/2013/oct/29/pakistan-family-drone-victim-testimony-congress" } ], @@ -1619,7 +1619,7 @@ "credit": "Lawrence Abu-Hamdan\r\n", "links": [ { - "text": "Lawrence Abu Hamdan ", + "text": "Link text", "uri": "http://lawrenceabuhamdan.com/conflicted-phonemes/" } ], @@ -1644,11 +1644,11 @@ "credit": "", "links": [ { - "text": "Huffpost", + "text": "Link text", "uri": "http://www.huffingtonpost.com/2012/10/09/street-ghosts-artist-paolo-cirio_n_1936158.html" }, { - "text": "Street Ghosts", + "text": "Link text", "uri": "http://streetghosts.net/" } ], @@ -1673,11 +1673,11 @@ "credit": "CC, project by Ruben Pater\r\n", "links": [ { - "text": "Untold Stories", + "text": "Link text", "uri": "http://untold-stories.net/?p=Drone-Survival-Guide" }, { - "text": "DRONE SURVIVAL GUIDE", + "text": "Link text", "uri": "www.dronesurvivalguide.org" } ], @@ -1702,7 +1702,7 @@ "credit": "James Bridle", "links": [ { - "text": "Book Two", + "text": "Link text", "uri": "http://booktwo.org/notebook/dronestagram-drones-eye-view/" } ], @@ -1727,15 +1727,15 @@ "credit": "", "links": [ { - "text": "The Guardian", + "text": "Link text", "uri": "https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1" }, { - "text": "Wikipedia", + "text": "Link text", "uri": "https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)" }, { - "text": "Mashable", + "text": "Link text", "uri": "http://mashable.com/2014/06/05/edward-snowden-revelations/#kcn4n1Qx7Pqf" } ], @@ -1760,7 +1760,7 @@ "credit": "public domain", "links": [ { - "text": "The Guardian", + "text": "Link text", "uri": "https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data" } ], @@ -1785,15 +1785,15 @@ "credit": "Submarine internet cables connecting the world, TeleGeography", "links": [ { - "text": "The Atlantic", + "text": "Link text", "uri": "https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/" }, { - "text": "The Guardian", + "text": "Link text", "uri": "https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa " }, { - "text": "The Washington Post", + "text": "Link text", "uri": "http://apps.washingtonpost.com/g/page/business/a-connected-world/305/" } ], @@ -1843,11 +1843,11 @@ "credit": "Courtesy Roberta Mataityte / Lighthouse. Photo by James Bridle\r\n", "links": [ { - "text": "Book Two", + "text": "Link text", "uri": "http://booktwo.org/notebook/drone-shadows/" }, { - "text": "Book Two", + "text": "Link text", "uri": "http://booktwo.org/notebook/drone-shadows-dispositions/" } ], @@ -1873,15 +1873,15 @@ "credit": "National Reconnaissance Office, US Government / Public Domain, 2013\r\n", "links": [ { - "text": "Forbes", + "text": "Link text", "uri": "https://www.forbes.com/sites/kashmirhill/2013/12/05/u-s-spy-rocket-launching-today-has-octopus-themed-nothing-is-beyond-our-reach-logo-seriously/#4377cb4d6869" }, { - "text": "NASA Spaceflight", + "text": "Link text", "uri": "https://www.nasaspaceflight.com/2013/12/atlas-v-launch-nrol-39-vandenberg/" }, { - "text": "LeakSource", + "text": "Link text", "uri": "https://leaksource.files.wordpress.com/2013/12/how-the-nrol-39-octopus-logo-was-created.pdf" } ], @@ -1906,11 +1906,11 @@ "credit": "Adam Harvey / https://privacygiftshop.com/\r\n", "links": [ { - "text": "NO EXISTING LINK", + "text": "Link text", "uri": "https://privacygiftshop.com/" }, { - "text": "TimeOut", + "text": "Link text", "uri": "https://www.timeout.com/newyork/shopping/the-privacy-gift-shop" } ], @@ -1935,11 +1935,11 @@ "credit": " praxis films, NYC (recheck)\r\n", "links": [ { - "text": "citizenfourfilm", + "text": "Link Text", "uri": "https://citizenfourfilm.com/" }, { - "text": "Wikipedia", + "text": "Link text ", "uri": "https://en.wikipedia.org/wiki/Citizenfour" } ], @@ -1989,7 +1989,7 @@ "credit": "on the image\r\n", "links": [ { - "text": "BBC News", + "text": "Link text", "uri": "http://www.bbc.co.uk/news/world-africa-32660135" } ], @@ -2014,7 +2014,7 @@ "credit": "The Critical Engineering Working Group, 2015", "links": [ { - "text": "THE CRITICAL ENGINEERING", + "text": "Link text", "uri": "https://criticalengineering.org/projects/deep-sweep/" } ], @@ -2039,11 +2039,11 @@ "credit": "Laura Poitras (b. 1964), ANARCHIST: Power Spectrum Display of Doppler Tracks from a Satellite (Intercepted May 27, 2009), 2016. Archival pigment print on aluminum, 45 1/4 × 65 in. Courtesy the artist\r\n", "links": [ { - "text": "Frieze", + "text": "Link text ", "uri": "https://frieze.com/article/laura-poitras" }, { - "text": "The Intercept", + "text": "Link text ", "uri": "https://theintercept.com/2016/01/28/israeli-drone-feeds-hacked-by-british-and-american-intelligence/" } ], @@ -2068,7 +2068,7 @@ "credit": "Adam Harvey \r\n", "links": [ { - "text": "AhProjects", + "text": "Link text", "uri": "https://ahprojects.com/projects/skylift/" } ], @@ -2093,11 +2093,11 @@ "credit": "https://www.theguardian.com/film/2016/apr/17/national-bird-review-us-drones-program-tribeca-film-festival\r\n", "links": [ { - "text": "National Bird Film", + "text": "Link text", "uri": "ttp://nationalbirdfilm.com/ " }, { - "text": "The New York Times", + "text": "Link text ", "uri": "https://www.nytimes.com/2016/11/11/movies/national-bird-review.html?_r=0" } ], @@ -2122,11 +2122,11 @@ "credit": "http://www.artnau.com/2016/11/anne-imhof-angst-ii/\r\n", "links": [ { - "text": "Frieze", + "text": "Link text", "uri": "https://frieze.com/media/angst-ii" }, { - "text": "Staatliche Museen zu Berlin", + "text": "Link text", "uri": "http://www.smb.museum/en/museums-institutions/hamburger-bahnhof/exhibitions/detail/anne-imhof-angst-ii.html" } ], @@ -2167,7 +2167,7 @@ { "id": "privacy-policy", "title": "Privacy Policy", - "body": "The <i>Terms of Service</i> of a website is a legal document describing a relationship between a software vendor and the end user. Typically this document is designed to indemnify the company who made the software from what you do with it. It also describes your rights in using the software - and what rights you give up.\r\n\r\nThe website <a href=\"https://tosdr.org/\">TOS;DR</a> was created to keep track of what's hidden in the small print of these legal agreements. For instance, on Youtube, \"Deleted videos are not really deleted.\" Facebook and Google admit to tracking your behavior, even on other websites. Instagram and Netflix waive your right to participating in a class action lawsuit. You cannot delete your Skype account.\r\n\r\nA website is required by law to publish a <i>Privacy Policy</i> if it collects <i>personally identifiable information</i> (PII) which can be used to trace an individual's identity. This information can include your name, email address, telephone number, social security number, date of birth, mother's maiden name, etc. The Privacy Policy should indicate what information is tracked and how it is stored.\r\n\r\nA website's Privacy Policy is intimately tied to its Terms and Conditions. For more information on how these two documents differ, read the article, <a href=\"https://termsfeed.com/blog/privacy-policies-vs-terms-conditions/\">Privacy Policy vs Terms and Conditions</a>.", + "body": "The <i>Terms of Service</i> of a website is a legal document describing a relationship between a software vendor and the end user. Typically this document is designed to indemnify the company who made the software from what you do with it. It also describes your rights in using the software - and what rights you give up.\r\n\r\nThe website <a href=\"https://tosdr.org/\">TOS;DR</a> was created to keep track of what's hidden in the small print of these legal agreements. For instance, on Youtube, \"Deleted videos are not really deleted.\" Facebook and Google admit to tracking your behavior, even on other websites. Instagram and Netflix waive your right to participating in a class action lawsuit. You cannot delete your Skype account.\r\n\r\nA website is required by law to publish a <i>Privacy Policy</i> if it collects <i>personally identifiable information</i> (PII) which can be used to trace an individual's identity. This information can include your name, email address, telephone number, social security number, date of birth, mother's maiden name, etc. The Privacy Policy should indicate what information is tracked and how it is stored.\r\n\r\nA website's Privacy Policy is intimately tied to its <a href=\"/page/terms\">Terms and Conditions</a>. For more information on how these two documents differ, read the article, <a href=\"https://termsfeed.com/blog/privacy-policies-vs-terms-conditions/\">Privacy Policy vs Terms and Conditions</a>.", "disabled": false, "__index": 3, "dateCreated": "Sat, 13 May 2017 19:50:06 GMT" @@ -2191,7 +2191,7 @@ { "id": "find-your-face", "title": "Find Your Face", - "body": "The Hansel & Gretel exhibition uses a custom facial recognition system that automatically captures visitors’ facial biometrics as they move throughout the Armory. At all times, 5 surveillance cameras stream a 1080p image at 10 FPS to a central image processing server located on site. Every frame from every camera is run through a series of computer vision algorithms that detect faces and convert them into biometric face prints. In less than 1 millisecond, using a minimum of 100x100 pixels, any face appearing in any surveillance feed is automatically extracted and stored in a local database as a 128-dimension feature vector.\r\n\r\nThese 128-dimension feature vectors represent what makes each face unique relative to other faces. Previous versions of facial recognition technology from the 90s and early 2000s based recognition on seeing the face in a more human way, as linear combinations of composite photographs or by comparing the geometry between facial landmarks. Current state-of-the-art facial recognition algorithms, including the code used in the Hansel & Gretel system, make use of deep neural networks that automatically determine which combinations of facial features are the most useful for creating a recognizable amount of separation between between thousands of identities.\r\n\r\nIn a controlled testing environment using frontal-pose images, the accuracy exceeds 99%. In practice however, images captured in any surveillance system will typically be less accurate because of the differences between the pose, lighting, expression, optics and fashion accessories worn for the enrollment and capture photos. This effect is slightly minimized in the Hansel & Gretel facial recognition system because visitors are enrolled and matched on the same day. The accuracy of your matched photo will depend mostly on the equivalence of expression and pose between your submitted photo and your captured photos. According to a theory called the Biometric Zoo, match scores are also dependent on the relative similarity or difference of facial features amongst the enrolled population of faces.\r\n\r\nOur surveillance cameras operate in near darkness, illuminated only by infrared light below the threshold of the human perceptual system. Most of the cameras and equipment that power the system are hidden until second half of the exhibition where visitors can engage with it through the custom Find my Face app on the tablets. This app allows users to submit a selfie and send it to the facial recognition server for analysis. The image with the highest confidence match is returned. The captured surveillance image will appear slightly different than the submitted image because of the infrared illumination. Most notably pupils are darker because they absorb IR light and skin appears lighter because it is more reflective in the IR spectrum. The matched surveillance image is overlaid with text that includes the timestamp when it was captured, the camera ID, and the facial recognition confidence score.", + "body": "Description of face recognition pipeline coming SOON!", "disabled": false, "__index": 7, "dateCreated": "Sat, 20 May 2017 21:50:17 GMT" @@ -2211,20 +2211,16 @@ "title": "Livestream", "streams": [ { - "text": "Entrance", - "uri": "https://www.youtube.com/watch?v=fO_-p8bi_Lk" - }, - { - "text": "Hallway", - "uri": "https://www.youtube.com/watch?v=lDtcQID42Sg" + "text": "CNN", + "uri": "https://www.youtube.com/watch?v=RoD5WWNMsdg" }, { - "text": "Exit", - "uri": "https://www.youtube.com/watch?v=Szu3aBo8taQ" + "text": "NASA", + "uri": "https://www.youtube.com/watch?v=qzMQza8xZCc" }, { - "text": "Headhouse", - "uri": "https://www.youtube.com/watch?v=ErXmu-t6JcE" + "text": "Radio", + "uri": "https://www.youtube.com/watch?v=xrbrQhpvn8E" } ], "disabled": false, |
