summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--db.json598
1 files changed, 445 insertions, 153 deletions
diff --git a/db.json b/db.json
index 18dc2db..2897f36 100644
--- a/db.json
+++ b/db.json
@@ -10,7 +10,7 @@
"description": "The 'Camera Obscura' is an optical phenomenon that occurs when an image is projected through a small hole on a screen or wall – as a reversed and inverted image on an opposite surface. The term \"camera obscura\" refers to constructions or devices that make use of that principle within a box, tent or room. Allegedly, early occurrences of camera obscura effects inspired paleolithic cave paintings. In the 18th century the technology was first used to convey images of observed subjects in a way that the observer remains invisible to the observed. The Camera Obscura is seen as the forerunner of modern photography and had large influence on Renaissance art. According to the so called Hockney-Falco thesis in art history, advances in realism and accuracy in Western art since the Renaissance period were primarily the result of optical instruments such as the camera obscura.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d0610190-38d4-11e7-9d48-c59d5d130bc6.jpg",
- "caption": "",
+ "caption": "\r\n",
"width": "640",
"height": "328"
},
@@ -21,9 +21,9 @@
}
],
"disabled": false,
- "__index": 0,
+ "__index": 1,
"dateCreated": "Thu, 11 May 2017 11:39:53 GMT",
- "credit": ""
+ "credit": "Unknown\r\n"
},
{
"id": "god-s-all-seeing-eye",
@@ -40,10 +40,15 @@
"height": "300"
},
"disabled": false,
- "__index": 1,
+ "__index": 3,
"dateCreated": "Thu, 11 May 2017 13:12:24 GMT",
- "links": [],
- "credit": ""
+ "links": [
+ {
+ "text": "Wikipedia",
+ "uri": "https://en.wikipedia.org/wiki/Eye_of_Providence#/media/File:QuoModoDeum.gif"
+ }
+ ],
+ "credit": "Woodcut from a book on alchemy showing the \"Eye in the Sky\" precursor to the Eye of Providence. Quo Modo Deum translates as 'This is the way of God' – artist unknown.\r\n"
},
{
"id": "public-health-surveillance",
@@ -52,7 +57,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#Epidemiology #Health #Surveillance #Sickness #Control #Plague #Immunity #Sickness #Disease #Plague #BlackDeath #HIV #Biology #Pharma-Industry\r\n",
- "description": "According to the World Health Organization (WHO), Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as an early warning system for health emergencies and as documentation, which informs the impact of certain medical interventions. Health surveillance uses mortality data as a base for measuring public health, a practice that arose ca. 600 years ago in Europe throughout the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports were and are still used to collect data about HIV and AIDS – for example, population rates, numbers of people living with HIV and numbers of people who receive medical care. There have been various debates on human rights and civil liberty in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination based on sexual orientation.\r\n",
+ "description": "Following the WHO, Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as early warning system for health emergencies and as documentation praxis which informs on the impact of a certain medical intervention. Health surveillance uses mortality data as a base for measuring public health, a praxis that arose ca. 600 years ago in Europe throughout the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports were and are still used to collect data about HIV and AIDS – for example, population rates, numbers of people living with HIV and numbers of people who receive medical care. There have been various debates on human rights and civil liberty in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination of sexual orientation.\r\n\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9c33f610-38d5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -70,9 +75,9 @@
}
],
"disabled": false,
- "__index": 2,
+ "__index": 6,
"dateCreated": "Thu, 11 May 2017 13:22:04 GMT",
- "credit": ""
+ "credit": "Original map by John Snow showing the clusters of cholera cases in the London epidemic of 1854.\r\n"
},
{
"id": "the-field-has-eyes-the-forest-has-ears",
@@ -89,7 +94,7 @@
"height": "410"
},
"disabled": false,
- "__index": 3,
+ "__index": 7,
"dateCreated": "Thu, 11 May 2017 13:51:40 GMT",
"links": [],
"credit": "Unknown engraver (Netherlandish), The Field has Eyes, the Forest has Ears, 1546, woodcut, coloured © Staatliche Museen zu Berlin, Kupferstichkabinett, SMB, Photo: Jörg Anders"
@@ -119,9 +124,9 @@
}
],
"disabled": false,
- "__index": 4,
+ "__index": 8,
"dateCreated": "Thu, 11 May 2017 13:54:19 GMT",
- "credit": "French political cartoon; MS annotations in ink identifying the figures. 1815."
+ "credit": "public domain\r\n"
},
{
"id": "panopticon",
@@ -133,7 +138,7 @@
"description": "The panopticon, designed by Jeremy Bentham in the late 18th century, is a circular architectural draft for an institution with an observation tower in its centre. It’s surrounded by an outer wall that contains cells for occupants. Residing within light-flooded cells, occupants would be distinguishable to an official or guard. Yet, occupants would be invisible to each other, with concrete walls dividing their cells. Due to the bright lighting, occupants would not be able to tell if and when they are being watched. Although usually associated with prisons, panoptic architecture might be used in similar institutions with surveillance needs, such as schools, factories, or hospitals. \r\n",
"image": {
"uri": "https://upload.wikimedia.org/wikipedia/commons/thumb/1/11/Panopticon.jpg/544px-Panopticon.jpg",
- "caption": "Jeremy Bentham, plan of the Panopticon / 1791 / in The works of Jeremy Bentham vol. IV, 172-3 / public domain\r\n",
+ "caption": "\r\n",
"width": "544",
"height": "600"
},
@@ -144,9 +149,9 @@
}
],
"disabled": false,
- "__index": 5,
+ "__index": 9,
"dateCreated": "Thu, 11 May 2017 13:56:03 GMT",
- "credit": ""
+ "credit": "Jeremy Bentham, plan of the Panopticon / 1791 / in The works of Jeremy Bentham vol. IV, 172-3 / public domain"
},
{
"id": "hot-air-balloon-bombing-",
@@ -169,7 +174,7 @@
}
],
"disabled": false,
- "__index": 6,
+ "__index": 10,
"dateCreated": "Thu, 11 May 2017 13:58:11 GMT",
"credit": "Bombing by Balloon, 1848, Source: Prof. Jurij Drushnin, Moscow, Russia"
},
@@ -195,7 +200,7 @@
}
],
"disabled": false,
- "__index": 7,
+ "__index": 11,
"dateCreated": "Thu, 11 May 2017 14:12:33 GMT"
},
{
@@ -220,7 +225,7 @@
}
],
"disabled": false,
- "__index": 8,
+ "__index": 12,
"dateCreated": "Thu, 11 May 2017 14:15:46 GMT"
},
{
@@ -249,7 +254,7 @@
}
],
"disabled": false,
- "__index": 9,
+ "__index": 13,
"dateCreated": "Thu, 11 May 2017 14:19:50 GMT"
},
{
@@ -274,7 +279,7 @@
}
],
"disabled": false,
- "__index": 10,
+ "__index": 14,
"dateCreated": "Thu, 11 May 2017 14:22:47 GMT"
},
{
@@ -299,7 +304,7 @@
}
],
"disabled": false,
- "__index": 11,
+ "__index": 15,
"dateCreated": "Thu, 11 May 2017 14:24:53 GMT"
},
{
@@ -328,7 +333,7 @@
}
],
"disabled": false,
- "__index": 12,
+ "__index": 16,
"dateCreated": "Thu, 11 May 2017 14:27:00 GMT"
},
{
@@ -347,7 +352,7 @@
},
"credit": "",
"disabled": false,
- "__index": 13,
+ "__index": 17,
"dateCreated": "Thu, 11 May 2017 14:29:05 GMT",
"links": []
},
@@ -377,7 +382,7 @@
}
],
"disabled": false,
- "__index": 14,
+ "__index": 18,
"dateCreated": "Thu, 11 May 2017 14:31:55 GMT"
},
{
@@ -394,7 +399,7 @@
"width": "436",
"height": "640"
},
- "credit": "",
+ "credit": "unknown\r\n",
"links": [
{
"text": "IMDb",
@@ -402,7 +407,7 @@
}
],
"disabled": false,
- "__index": 15,
+ "__index": 19,
"dateCreated": "Thu, 11 May 2017 14:34:17 GMT"
},
{
@@ -431,7 +436,7 @@
}
],
"disabled": false,
- "__index": 16,
+ "__index": 20,
"dateCreated": "Thu, 11 May 2017 14:38:32 GMT"
},
{
@@ -456,7 +461,7 @@
}
],
"disabled": false,
- "__index": 17,
+ "__index": 21,
"dateCreated": "Thu, 11 May 2017 14:44:14 GMT"
},
{
@@ -485,7 +490,7 @@
}
],
"disabled": false,
- "__index": 18,
+ "__index": 22,
"dateCreated": "Thu, 11 May 2017 14:46:58 GMT"
},
{
@@ -495,7 +500,7 @@
"medium": "Image",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Spy #World War II #All-Seeing Eye #Aerial Surveillance #Photography #Warfare #Technology\r\n",
- "description": "Originated with Julius Neubronners camera fitted pigeons that became early aerial photography in 1907, the pigeon based espionage was commonly used in World War II by Great Britain, Germany and the US. Later, the CIA used pigeons for top secret reconnaissance missions.\r\n",
+ "description": "Originated by Julius Neubronners in 1907, pigeons outfitted with cameras were instrumental in early aerial photography. Pigeon based espionage was commonly used in World War II by Great Britain, Germany and the US. Later, the CIA used pigeons for top secret reconnaissance missions.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1edb3b10-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -514,7 +519,7 @@
}
],
"disabled": false,
- "__index": 19,
+ "__index": 23,
"dateCreated": "Thu, 11 May 2017 14:58:04 GMT"
},
{
@@ -524,7 +529,7 @@
"medium": "Political Agreement",
"category": "Surveillance",
"keywords": "#Surveillance #Control #Governments #FiveEyes #Big Brother #Espionage #Intelligence #Information #NSA #Politics #Pentagon #Secrets #Secret Service #Signals\r\n",
- "description": "The Five Eyes alliance is a secret surveillance arrangement comprising Australia, Canada, New Zealand, United Kingdom and the United States of America. It originated as early as 1946 with a series of bilateral agreements that became known as the UKUSA agreement with the purpose to share intelligence, primarily signal intelligence (aka SIGINT) between the members. Since the cold war the alliance has been building a global surveillance infrastructure to spy on the world’s communication with an emphasis placed on monitoring the World Wide Web since the US have called out a war on terror in 2001.\r\n",
+ "description": "The Five Eyes alliance is a secret surveillance arrangement comprising Australia, Canada, New Zealand, United Kingdom and the United States of America. It originated as early as 1946 with a series of bilateral agreements that became known as the UKUSA agreement with the goal of sharing intelligence, primarily signal intelligence (aka SIGINT) between the members. Since the Cold War the alliance has been building a global surveillance infrastructure to spy on the world’s communication with an emphasis placed on monitoring the World Wide Web since the US has called out a \"war on terror\" in 2001.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/6d6176f0-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -539,7 +544,7 @@
}
],
"disabled": false,
- "__index": 20,
+ "__index": 24,
"dateCreated": "Thu, 11 May 2017 14:59:45 GMT"
},
{
@@ -549,7 +554,7 @@
"medium": "Program",
"category": "Surveillance",
"keywords": "#Moon #Surveillance #Interception #Signal #Covered Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n",
- "description": "Moonbounce describes the phenomenon that signals emanating the earth would bounce back from the moon to be detected from other locations. The radar-reflective characteristics of the lunar surface were already successfully tested in 1946. One time in surveillance history this came to use was in the US-Air Force led project named FLOWER GARDEN in the early 1960s to monitor and intercept radar signals from the Soviet Union. Several antennas around the US where used for moonbounce – also operated by the CIA and the NSA.\r\n",
+ "description": "Moonbounce describes the phenomenon that man-made signals emanating from Earth would bounced back from the moon and detected from other locations. The radar-reflective characteristics of the lunar surface were already successfully tested since 1946. One time in surveillance history this came to use was in the US-Air Force led project named FLOWER GARDEN in the early 1960s to monitor and intercept radar signals from the Soviet Union. Several antennas around the US were used for moonbounce – also operated by the CIA and the NSA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b0a50210-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -564,7 +569,7 @@
}
],
"disabled": false,
- "__index": 21,
+ "__index": 25,
"dateCreated": "Thu, 11 May 2017 15:01:35 GMT"
},
{
@@ -583,7 +588,7 @@
},
"credit": "First Edition, published 1949, Secker & Warburg \r\n",
"disabled": false,
- "__index": 22,
+ "__index": 26,
"dateCreated": "Thu, 11 May 2017 15:05:14 GMT",
"links": []
},
@@ -594,7 +599,7 @@
"medium": "Photographs",
"category": "Surveillance",
"keywords": "#Photography #Germany #Spy #Ethics #Information #Covered Operation #Secrets #Privacy #Police #Camouflage\r\n",
- "description": "The personnel of the Ministry for State Security of East Germany, commonly known as Stasi, one of the most effective surveillance apparatuses ever, was trained on how to disguise to move unsuspicious in society. The photo shows an instruction seminar on affixing fake facial hair properly – a Stasi’s standard repertoire. Other seminars would train the agents on how to wear wigs or dress as a western tourist. Such seminars were documented for training purposes and made into manuals.\r\n",
+ "description": "The personnel of the Ministry for State Security of East Germany, commonly known as Stasi, one of the most effective surveillance apparatuses ever, was trained on how to disguise themselves to move inconspicuously in society. The photo shows an instruction seminar on affixing fake facial hair properly – a Stasi’s standard practice. Other seminars would train the agents on how to wear wigs or dress as a western tourist. Such seminars were documented for training purposes and made into manuals.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/8b6538c0-365b-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -609,7 +614,7 @@
}
],
"disabled": false,
- "__index": 23,
+ "__index": 27,
"dateCreated": "Thu, 11 May 2017 15:08:41 GMT"
},
{
@@ -619,7 +624,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#Reconnaissance #All-Seeing Eye #Aerial Surveillance #Spy Satellite #Top-Secret #Cold-War #Verticality #Aerial-Photography #NASA #Photography #Geography #Technology\r\n",
- "description": "In the development of early aerial photography and aircraft in the 1950s and 1960s, several large-scale photo calibration targets were installed across the USA. Made of concrete or asphalt covered with black and white paint, they functioned as eye charts for the cameras of spy satellites. Mainly located on non-public, military ground, they are physical artefacts of early aerial surveillance, today to be found virtually on Google Maps.\r\n",
+ "description": "In the development of early aerial photography and aircraft in the 1950s and 1960s, several large-scale photo calibration targets were installed across the USA. Made of concrete or asphalt covered with black and white paint, they functioned as eye charts for the cameras of spy satellites. Mainly located on non-public, military ground, they are physical artefacts of early aerial surveillance, but today can be found virtually on Google Maps.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/790be2d0-365d-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -628,7 +633,7 @@
},
"credit": "Calibration target from the photo resolution range, Edwards Air Force Base; Google Maps\r\n",
"disabled": false,
- "__index": 24,
+ "__index": 28,
"dateCreated": "Thu, 11 May 2017 15:21:39 GMT",
"links": []
},
@@ -639,7 +644,7 @@
"medium": "Film",
"category": "Surveillance",
"keywords": "#Film #Watching #Investigation #Surveillance #Camera #Architecture #Evidence #Photography #Public #Private\r\n",
- "description": "Alfred Hitchcock‘s ‘Rear Window’ tells the story of a car race photographer who is confined to his New York City apartment after suffering an injury. While observing the daily life of his neighbours through the rear window, he suspects a man across the courtyard committed murder to his wife. Bound to his wheelchair, he enlists the help of his fashionable high-society girlfriend and his visiting nurse to investigate.\r\nThe movie addresses issues of the private and public in a tense, urban architecture. While the neighbours are visible to the protagonist, he is not being seen by them until the moment he draws attention to the suspected murderer who then attempts to kill him.\r\n",
+ "description": "Alfred Hitchcock‘s ‘Rear Window’ tells the story of a photojournalist who is confined to his New York City apartment after suffering an injury. While observing the daily life of his neighbours through the rear window, he suspects a man across the courtyard committed murder to his wife. Bound to his wheelchair, he enlists the help of his fashionable high-society girlfriend and his visiting nurse to investigate.\r\nThe movie addresses issues of the private and public in a tense, urban architecture. While the neighbours are visible to the protagonist, he is not being seen by them until the moment he draws attention to the suspected murderer who then attempts to kill him.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f54cd0c0-365d-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -658,7 +663,7 @@
}
],
"disabled": false,
- "__index": 25,
+ "__index": 29,
"dateCreated": "Thu, 11 May 2017 15:25:23 GMT"
},
{
@@ -668,7 +673,7 @@
"medium": "Image",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Cold-War #Espionage #CIA #Bug #Intelligence #Technology #Device\r\n",
- "description": "In the 1960’s the CIA experimented with living cats as eavesdropping devices to spy on America’s cold war rivals. In the operation known as “Acoustic Kitty”, a cat was surgical accommodated with electronic spying equipment: a microphone in the cat’s ear canal, a radio transmitter and an antenna wire along its spine and tail. It was even possible to direct it with ultrasonic sound. The first test to spy on a conversation of two people on a park bench was a failure, as the cat was run over by a taxi almost immediately after released out of the CIA researchers van. The project took 5 years in development and costed $15 million.\r\n",
+ "description": "In the 1960’s the CIA experimented with live cats as eavesdropping devices to spy on America’s cold war rivals. In the operation known as “Acoustic Kitty”, a cat was surgical accommodated with electronic spying equipment: a microphone in the cat’s ear canal, a radio transmitter and an antenna wire along its spine and tail. It was even possible to direct it with ultrasonic sound. The first test to spy on a conversation of two people on a park bench was a failure, as the cat was run over by a taxi almost immediately after released out of the CIA researchers van. The project took 5 years in development and cost $15 million.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/493c6510-365e-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -691,17 +696,17 @@
}
],
"disabled": false,
- "__index": 26,
+ "__index": 30,
"dateCreated": "Thu, 11 May 2017 15:27:58 GMT"
},
{
"id": "corona-first-reconnaissance-satellite-image",
"date": "1960",
- "title": "Corona first Reconnaissance Satellite Image",
+ "title": "Corona First Reconnaissance Satellite Image",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Reconnaissance #All-Seeing Eye #Aerial Surveillance #Spy Satellite #Top-Secret #Cold-War #Photography\r\n",
- "description": "Corona was the codeword of the first successful reconnaissance satellites program led by the CIA from 1959 to 1972. It mission was to gather photographic intelligence, mainly of the Soviet Union. The first photo taken on August 8, 1960 was a grainy image of a Soviet Airfield. Originally classified as top secret, it was declassified in 1995 under an Executive Order signed by President Bill Clinton.\r\n",
+ "description": "Corona was the codeword of the first successful reconnaissance satellites program led by the CIA from 1959 to 1972. Its mission was to gather photographic intelligence, mainly of the Soviet Union. The first photo taken on August 8, 1960 was a grainy image of a Soviet Airfield. Originally classified as top secret, it was declassified in 1995 under an Executive Order signed by President Bill Clinton.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/bdd3a780-365e-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -720,7 +725,7 @@
}
],
"disabled": false,
- "__index": 27,
+ "__index": 31,
"dateCreated": "Thu, 11 May 2017 15:31:46 GMT"
},
{
@@ -730,7 +735,7 @@
"medium": "Document",
"category": "Facial Recognition",
"keywords": "#CIA #Facial Recognition #Biometrics #Classified Information #Computing #Technology\r\n",
- "description": "In 1963 Dr. Woodrow Wilson Bledsoe, a pioneer in artificial intelligence, submitted a facial recognition report to the King-Hurley Research group – a front organization of the CIA – that included systems noting key facial features to identify a faces, for example the width of the mouth or between the eyes. The report constitutes the first known attempt of semi-automated computerized facial recognition.\r\n",
+ "description": "In 1963 Dr. Woodrow Wilson Bledsoe, a pioneer in artificial intelligence, submitted a facial recognition report to the King-Hurley Research group – a front organization of the CIA – that included systems noting key facial features to identify faces, for example the width of the mouth or between the eyes. The report constitutes the first known attempt of semi-automated computerized facial recognition.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1a6e18c0-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -745,7 +750,7 @@
}
],
"disabled": false,
- "__index": 28,
+ "__index": 33,
"dateCreated": "Thu, 11 May 2017 15:47:33 GMT"
},
{
@@ -755,7 +760,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#NSA #Surveillance #Covered Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n",
- "description": "Teufelsberg (literal, english “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was created in the 20 years following Second World War by moving debris from the destroyed City of Berlin. In 1963 the NSA build a permanent listening station atop the mountain to spy on the eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled the US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. The unique history made Teufelsberg a tourist attraction.\r\n",
+ "description": "Teufelsberg (translated as “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was created in the 20 years following World War II by moving debris from the destroyed city of Berlin. In 1963 the NSA built a permanent listening station atop the mountain to spy on the eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled the US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. This unique history makes Teufelsberg a tourist attraction.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/617c4070-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -770,7 +775,7 @@
}
],
"disabled": false,
- "__index": 29,
+ "__index": 34,
"dateCreated": "Thu, 11 May 2017 15:49:16 GMT"
},
{
@@ -795,7 +800,7 @@
}
],
"disabled": false,
- "__index": 30,
+ "__index": 35,
"dateCreated": "Thu, 11 May 2017 15:50:52 GMT"
},
{
@@ -805,7 +810,7 @@
"medium": "Program",
"category": "Surveillance",
"keywords": "#Espionage #Surveillance #Spy Satellite #Top-Secret #Cold-War #Big Brother #Governments #Intelligence #NSA #FiveEyes #Privacy #Snowden #Whistleblowing #Police State #Civil Rights #Interception #Radome #Technology\r\n",
- "description": "ECHELON is the codename given to a secret international electronic eavesdropping network run by the Five Eyes alliance. Created in 1966 its aim was to spy on diplomatic and military communication during the Cold War by intercepting satellites. By the end of the 20th century civil right groups and privacy advocates believe it was the first-ever automated, global, mass surveillance program, spanning much further than intercepting satellites, but literally listening to everybody. It would capture all communication traffic and run it through a content-sensitive dictionaries of keywords or anything intelligence services deem to be “suspicious.”\r\nAlthought the NSA and the GCHQ denied the existence of ECHELON and the European Parliament launched an investigation in 1999, internal reports, disclosed by Edward Snowden confirmed ECHELONS existence.\r\n",
+ "description": "ECHELON is the codename given to a secret international electronic eavesdropping network run by the Five Eyes Alliance. Created in 1966 its aim was to spy on diplomatic and military communication during the Cold War by intercepting satellites. By the end of the 20th century civil right groups and privacy advocates believe it was the first-ever automated, global, mass surveillance program, spanning much further than intercepting satellites, but literally listening to everybody. It would capture all communication traffic and run it through a content-sensitive dictionaries of keywords or anything intelligence services deem to be “suspicious.”\r\nAlthought the NSA and the GCHQ denied the existence of ECHELON, the European Parliament launched an investigation in 1999. Internal reports, disclosed by Edward Snowden confirmed ECHELONS existence.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d9a13d80-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -832,7 +837,7 @@
}
],
"disabled": false,
- "__index": 31,
+ "__index": 36,
"dateCreated": "Thu, 11 May 2017 15:52:41 GMT"
},
{
@@ -842,7 +847,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#Internet #Network #Big Data #Computing #Digital Rights #Metadata #Net Politics\r\n",
- "description": "The origins of the Internet date back to the 1960s when the US-federal government commissioned research to built robust communication via computer networks. It is an interconnected network that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services. The vast majority of today’s computer surveillance involves the monitoring of data and traffic on the Internet.\r\n",
+ "description": "The origins of the Internet date back to the 1960s when the US-federal government commissioned research to develop more robust and efficient communication via computer networks. It is an interconnected network that consists of private, public, academic, business, and government networks from local to a global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services. The vast majority of today’s computer surveillance involves the monitoring of data and traffic on the Internet.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/464a9f80-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -857,7 +862,7 @@
}
],
"disabled": false,
- "__index": 32,
+ "__index": 38,
"dateCreated": "Thu, 11 May 2017 15:55:43 GMT"
},
{
@@ -867,7 +872,7 @@
"medium": "Item",
"category": "Drones",
"keywords": "#CIA #Animal Kingdom #Drone #Bug #Espionage #Robot #UAV #Intelligence #Technology #Device\r\n",
- "description": "In the 1970s the CIA build a prototype for miniaturized UAVs (Unmanned Aerial Vehicles) for collecting intelligence in the form of a dragonfly. The insectothopter, as they called it, was a robotic dragonfly that functioned as a audio bug. It was powered by a motor, propelled by a small amount of gas and guided by a laser beam in the rear of the dragonfly-drone. A watchmaker adapted the UAV to the actual scale size of a real dragonfly. After the insectothopter proved too unstable in crosswinds, the project wasn’t further developed.\r\n",
+ "description": "In the 1970s the CIA built a prototype for miniature UAVs (Unmanned Aerial Vehicles) for collecting intelligence in the form of a dragonfly. The insectothopter, as they called it, was a robotic dragonfly that functioned as a audio bug. It was powered by a motor, propelled by a small amount of gas and guided by a laser beam in the rear of the dragonfly-drone. A watchmaker adapted the UAV to the actual scale size of a real dragonfly. After the insectothopter proved too unstable in crosswinds, the project was abandoned.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/8d80c190-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -886,7 +891,7 @@
}
],
"disabled": false,
- "__index": 33,
+ "__index": 39,
"dateCreated": "Thu, 11 May 2017 15:57:41 GMT"
},
{
@@ -896,7 +901,7 @@
"medium": "Film",
"category": "Surveillance",
"keywords": "#Surveillance #Camera #Drugs #Emotions #Android #Police #Computers #Film\r\n",
- "description": "With the spread of surveillance camera technology in the public space, as well as the rising significance of computers and databases in the late 1960s, more films became concerned with the prospect of living in a world of pervasive surveillance. THX 1138, George Lucas’ remake of his own short “Electronic Labyrinth: THX 1138 4EB” (1967), is one of those early reactions to an increasingly surveilled society. It shows a dystopian future in which total control over society is exercised by computers, surveillance cameras and android police officers. Conformity and homogeneity are basic rule. THX 1138, a factory worker who produces android police officers, is given a glimpse into the other side through his computer matched and thus appointed female roommate, LUH 3417 and her surveillance colleague. \r\n",
+ "description": "With the spread of surveillance camera technology in public spaces, as well as the rising significance of computers and databases in the late 1960s, more films became concerned with the prospect of living in a world of pervasive surveillance. THX 1138, George Lucas’ remake of his own short “Electronic Labyrinth: THX 1138 4EB” (1967), is one of those early reactions to an increasingly surveilled society. It shows a dystopian future in which total control over society is exercised by computers, surveillance cameras, and android police officers. Conformity and homogeneity are a basic rule. THX 1138, a factory worker who produces android police officers, is given a glimpse into the other side through his computer matched and assigned female roommate, LUH 3417 and her surveillance colleague. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e0127390-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -919,7 +924,7 @@
}
],
"disabled": false,
- "__index": 34,
+ "__index": 40,
"dateCreated": "Thu, 11 May 2017 16:00:10 GMT"
},
{
@@ -929,7 +934,7 @@
"medium": "Song",
"category": "Surveillance",
"keywords": "#Surveillance #All-Seeing Eye #Big Brother #Control #Dystopia #Privacy #Totalitarianism #Music\r\n",
- "description": "Stevie Wonders studio album Talking Book, which was released in 1972 includes the song „Big Brother“. The song is a serene composed electro-folk ballad in protest against the Nixon presidency and its surveillance culture. It features the songlines: Your name is big brother / You say that you're watching me on the tele / Seeing me go nowhere / Your name is big brother / You say that you're tired of me protesting / Children dying everyday / My name is nobody / But I can't wait to see your face inside my door ooh\r\n",
+ "description": "Stevie Wonders studio album Talking Book, which was released in 1972 includes the song „Big Brother“. The song is a serene composed electro-folk ballad in protest against the Nixon presidency and its surveillance culture. It features the lyrics: Your name is big brother / You say that you're watching me on the tele / Seeing me go nowhere / Your name is big brother / You say that you're tired of me protesting / Children dying everyday / My name is nobody / But I can't wait to see your face inside my door ooh\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/75d62da0-36e9-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -938,7 +943,7 @@
},
"credit": "Motown Records (needs recheck)",
"disabled": false,
- "__index": 35,
+ "__index": 41,
"dateCreated": "Fri, 12 May 2017 08:05:15 GMT",
"links": []
},
@@ -949,7 +954,7 @@
"medium": "Image",
"category": "Surveillance",
"keywords": "#Verticality #NASA #Photography\r\n",
- "description": "The famous photo taken from the Apollo 17 crew on December 7th, 1972 on their way to the moon is the first image to show the full earth disc. It was taken from a distance of 28,000 miles (45,000 km), and changed the way we look at our planet. It marks the shift of perspective – from horizontal to vertical and entirely – similar to the gods perspective.\r\n",
+ "description": "The famous photo taken from by the Apollo 17 crew on December 7th, 1972 on their way to the moon, is the first image to show the full earth disc. It was taken from a distance of 28,000 miles (45,000 km), and changed the way we look at our planet. It marks the shift of perspective – from horizontal to vertical – similar to the gods perspective.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e772f4c0-36e9-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -964,7 +969,7 @@
}
],
"disabled": false,
- "__index": 36,
+ "__index": 42,
"dateCreated": "Fri, 12 May 2017 08:07:05 GMT"
},
{
@@ -974,26 +979,22 @@
"medium": "Film",
"category": "Surveillance",
"keywords": "#Wire Tapping #Surveillance #Deception #Bugs \r\n",
- "description": "The Conversation assigns its central character a remarkable role. Even though Harry Caul is portrayed as a leading audio surveillance expert, he fails to understand the meaning of his secret recordings and ends up trapped in a net of deception. In the last scene of the film, Caul destroys his apartment in a frustrated and unsuccessful attempt to locate the bug that was planted in his home.\r\nImage:\r\n",
+ "description": "The Conversation assigns its central character a remarkable role. Even though Harry Caul is portrayed as a leading audio surveillance expert, he fails to understand the meaning of his secret recordings and ends up trapped in a net of deception. In the last scene of the film, Caul destroys his apartment in a frustrated and unsuccessful attempt to locate the bug that was planted in his home.\r\n\r\n",
"image": {
- "uri": "https://marsupial.s3.amazonaws.com/armory/42680550-36ea-11e7-a37a-4579121b15f0.jpg",
+ "uri": "https://marsupial.s3.amazonaws.com/armory/1a7bd890-4771-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
- "width": "182",
- "height": "268"
+ "width": "620",
+ "height": "372"
},
- "credit": "",
+ "credit": "Gene Hackman as Harry Caul in The Conversation. Photograph: Allstar/Paramount \r\n",
"links": [
{
- "text": "Wikipedia",
- "uri": "https://en.wikipedia.org/wiki/The_Conversation"
- },
- {
- "text": "IMDb",
- "uri": "http://www.imdb.com/title/tt0071360/"
+ "text": "The Guardian",
+ "uri": " https://www.theguardian.com/film/2017/mar/07/six-surveillance-films-make-trump-paranoid"
}
],
"disabled": false,
- "__index": 37,
+ "__index": 44,
"dateCreated": "Fri, 12 May 2017 08:09:25 GMT"
},
{
@@ -1018,7 +1019,7 @@
}
],
"disabled": false,
- "__index": 39,
+ "__index": 48,
"dateCreated": "Fri, 12 May 2017 08:26:35 GMT"
},
{
@@ -1028,7 +1029,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#Surveillance #Germany #Scent #Stasi #GDR #Identification",
- "description": "The Stasi (Former GDR Ministry of State Security) applied a whole range of methods and means to try to track down suspects within or critics of the East German communist regime. Collecting scent samples was used to try to identify those, for example, who had distributed flyers or who critical graffiti. The samples were stored in an olfactory database\r\n",
+ "description": "The Stasi (Former GDR Ministry of State Security) applied a whole range of methods and means to try to track down suspects or critics of the East German communist regime. Collecting scent samples was used to try to identify those, for example, who had distributed flyers or who critical graffiti. The samples were stored in an olfactory database\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e5779290-36ec-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1043,7 +1044,7 @@
}
],
"disabled": false,
- "__index": 40,
+ "__index": 49,
"dateCreated": "Fri, 12 May 2017 08:28:22 GMT"
},
{
@@ -1072,7 +1073,7 @@
}
],
"disabled": false,
- "__index": 41,
+ "__index": 50,
"dateCreated": "Fri, 12 May 2017 08:30:37 GMT"
},
{
@@ -1101,7 +1102,7 @@
}
],
"disabled": false,
- "__index": 42,
+ "__index": 51,
"dateCreated": "Fri, 12 May 2017 08:33:08 GMT"
},
{
@@ -1111,7 +1112,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#Radio Waves #Weather #Ionosphere #Surveillance #US Air-Force #Radio communications #Conspiracy\r\n",
- "description": "HAARP (High Frequency Active Auroral Research Program) is a former US-military program that focuses on ionospheric research. Its official purpose was to analyze the ionosphere and investigate potentials for developing ionospheric enhancement technology for radio communications and surveillance. HAARP has repeatedly been target of conspiracy theorists, who claim that it was capable of \"weaponizing\" weather, thus triggering natural catastrophes like floods, hurricanes, droughts or earthquakes.\r\n",
+ "description": "HAARP (High Frequency Active Auroral Research Program) is a former US-military program that focuses on ionospheric research. Its official purpose was to analyze the ionosphere and investigate potentials for developing ionospheric enhancement technology for radio communications and surveillance. HAARP has repeatedly been the target of conspiracy theorists, who claim that it was capable of \"weaponizing\" weather, thus triggering natural catastrophes like floods, hurricanes, droughts or earthquakes.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e357f170-36ed-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1126,7 +1127,7 @@
}
],
"disabled": false,
- "__index": 43,
+ "__index": 52,
"dateCreated": "Fri, 12 May 2017 08:35:18 GMT"
},
{
@@ -1136,7 +1137,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#Evidence #Technology #Secrets #Transparency #Disclosure #X-Ray\r\n",
- "description": "In 1996 the human remains of a 1000 year old monk were found inside a Buddha statue when a private collector brought it to restoration in the Netherlands. The monk who lived in the Song Dynasty practised self-mummification to prepare for life after death. His mummy was exhibited and worshipped in a monastery for the first 200 years until being placed inside the statue. It was not until 2015 it underwent a 3-D X-Ray scan to reveal the full skeleton of the monk which organs have been removed and replaced with ancient wads of paper printed with Chinese characters. It is yet unclear how the statue made its way to Europe.\r\n\r\n",
+ "description": "In 1996 the human remains of a 1000 year old monk were found inside a Buddha statue when a private collector brought it for restoration in the Netherlands. The monk who lived in the Song Dynasty practised self-mummification to prepare for life after death. His mummy was exhibited and worshipped in a monastery for the first 200 years until being placed inside the statue. It was not until 2015 when the statue underwent a 3-D X-Ray scan that revealed the full skeleton of the monk which organs have been removed and replaced with ancient wads of paper printed with Chinese characters. It is yet unclear how the statue made its way to Europe.\r\n\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f0641030-36f0-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1151,7 +1152,7 @@
}
],
"disabled": false,
- "__index": 44,
+ "__index": 53,
"dateCreated": "Fri, 12 May 2017 08:57:08 GMT"
},
{
@@ -1161,7 +1162,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#The Internet #Cencorship #Control #Governments #Algorithm #Digital Rights #Net Politics #Freedom #Information #Access \r\n",
- "description": "",
+ "description": "The term Great Firewall of China is the name given to the Chinese government internet censorship and surveillance program. Being a major part of the Golden Shield Project it blocks unwanted data from foreign countries coming into China to gain regulation and control of the Internet. Operated by the government of Mainland China, the idea originated by the former paramount leader of the People’s Republic of China, Deng Xiaoping, who said: ‘If you open the window for fresh air, you have to expect some flies to blow in’. He metaphorically refers to western values, such as democracy of freedom of expression, as ‘flies‘ that are in conflict with the ideologies of the Communist Party. Thus, when the Internet arrived in China in 1994 and Chinese leadership had to open access to to the public, actions had to be undertaken to prevent western values to enter the country.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/82490050-36f1-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1176,7 +1177,7 @@
}
],
"disabled": false,
- "__index": 45,
+ "__index": 54,
"dateCreated": "Fri, 12 May 2017 09:01:04 GMT"
},
{
@@ -1186,7 +1187,7 @@
"medium": "TV Show",
"category": "Surveillance",
"keywords": "#Big Brother #surveillance #CCTV #entertainment #observation \r\n",
- "description": "Big Brother is a reality TV show franchise created by John de Mol. As of 11 November 2016, there have been 387 seasons of Big Brother in over 54 franchise countries and regions. In the show, contestants called \"housemates\" live in a specially-constructed house, isolated from the outside world. Housemates are voted out until only one remains and wins the cash prize. During their stay in the house, contestants are put under permanent observation – they’re continuously monitored by live CCTV cameras as well as personal audio microphones. Taking its name from George Orwell’s Nineteen Eighty-Four, Big Brother evokes surveillance as its central theme while ironically denying the dystopian undertones. \r\n",
+ "description": "Big Brother is a reality TV show franchise created by John de Mol. As of 11 November 2016, there have been 387 seasons of Big Brother in over 54 franchise countries and regions. In the show, contestants called \"housemates\" live in a specially-constructed house, isolated from the outside world. Housemates are voted out until only one remains and wins the cash prize. During their stay in the house, contestants are put under constant observation – they’re continuously monitored by live CCTV cameras as well as personal audio microphones. Taking its name from George Orwell’s Nineteen Eighty-Four, Big Brother evokes surveillance as its central theme while ironically denying the dystopian undertones. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b4db0400-36f1-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1201,7 +1202,7 @@
}
],
"disabled": false,
- "__index": 46,
+ "__index": 56,
"dateCreated": "Fri, 12 May 2017 09:02:52 GMT"
},
{
@@ -1211,7 +1212,7 @@
"medium": "Historic Event",
"category": "Surveillance",
"keywords": "#9/11 #War on Terror #Airplane #CCTV #Attack #War #Morality #Politics #Pentagon #Terrorism\r\n",
- "description": "The CCTV image shows terrorist ringleader Mohamed Atta and Abdulaziz al-Omari passing through security checkpoint at Portland, Maine before flying to Boston, where they hijacked American Airlines Flight 11th that crashed into the North Tower of the World Trade Center on the morning of September 11th 2001.\r\nFollowing the attacks, former US-President George W. Bush declared a „war on terror“ on September 20th 2001 in a speech to the US Congress. Since then, the term is used to describe the international military campaign that was started after the historic attacks.\r\nThe events of 9/11 changed the landscape of surveillance technology significantly.\r\n",
+ "description": "The CCTV image shows terrorist ringleaders Mohamed Atta and Abdulaziz al-Omari passing through security checkpoint at Portland, Maine before flying to Boston, where they hijacked American Airlines Flight 11 that crashed into the North Tower of the World Trade Center on the morning of September 11th 2001.\r\nFollowing the attacks, former US-President George W. Bush declared a „war on terror“ on September 20th 2001 in a speech to the US Congress. Since then, the term is used to describe the international military campaign that was started after the historic attacks.\r\nThe events of 9/11 changed the landscape of surveillance technology significantly.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/67aa2980-36f2-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1230,7 +1231,7 @@
}
],
"disabled": false,
- "__index": 47,
+ "__index": 57,
"dateCreated": "Fri, 12 May 2017 09:07:26 GMT"
},
{
@@ -1259,7 +1260,7 @@
}
],
"disabled": false,
- "__index": 48,
+ "__index": 58,
"dateCreated": "Fri, 12 May 2017 09:13:12 GMT"
},
{
@@ -1269,7 +1270,7 @@
"medium": "Item",
"category": "Drones",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Afghanistan #Arts #Attack #Airplanes #Evidence #US-Army\r\n",
- "description": "Afghanistan has suffered through long decades of war. From conflict with the Soviet Union in the 1980s and civil war to 16 years of US-led NATO combat missions. While war has political, economic and social impacts it is also present in art. In case of Afghan art, in the ancient way of woven rugs that illustrate daily life. While it was Kalashnikovs, tanks and grenades during the Soviet Union conflict, it is drones today that occasionally appear on the rugs since the US started operating them in 2001. The world of ancient art and modern warfare colliding on the so called ‘war rugs’, but thus they also reflect the violent conditions of life under war.\r\n",
+ "description": "Afghanistan has suffered through long decades of war. From conflict with the Soviet Union in the 1980s and civil war to 16 years of US-led NATO combat missions. While war has political, economic and social impacts it is also present in art. In case of Afghan art, it is expressed in the ancient way of woven rugs that illustrate daily life. While it was Kalashnikovs, tanks and grenades during the Soviet Union conflict, it is drones today that occasionally appear on the rugs since the US started operating them in 2001. The world of ancient art and modern warfare collide on the so called ‘war rugs’, but they also reflect the violent conditions of life under war.\r\n",
"image": {
"uri": "http://media.npr.org/assets/img/2015/02/07/warrug1-16c4e0185e8d3183ed29d1b8b3e982dcd9f937ef-s1000-c85.jpg",
"caption": "",
@@ -1288,7 +1289,7 @@
}
],
"disabled": false,
- "__index": 49,
+ "__index": 59,
"dateCreated": "Fri, 12 May 2017 09:29:37 GMT"
},
{
@@ -1298,7 +1299,7 @@
"medium": "Program",
"category": "Surveillance",
"keywords": "#Privacy #Security #TheInternet #Anonymous #Activism #Encryption #Computing #Data #Protection #Digital Rights #Freedom #Net Politics #Technology #Censorship\r\n",
- "description": "Tor (The Onion Routing) is a anonymizing network. Referring to the structure of an onion it is build up in layers: requests don’t go directly to the destination address but travel through a chain of proxy servers. That way the original IP-address and identity is not traceable additional to the fact that all data is encrypted. Tor conceals users information from anyone conducting network surveillance or traffic analyses.\r\nActivist, whistleblowers and journalist around the world depend on Tor for secure, anonymous communication and to circumvent censorship.\r\n",
+ "description": "Tor (The Onion Routing) is a anonymizing network. Referring to the structure of an onion it is build up in layers: requests don’t go directly to the destination address but travel through a chain of proxy servers. That way the original IP-address and identity is not traceable and all data is encrypted. Tor conceals users information from anyone conducting network surveillance or traffic analyses.\r\nActivist, whistleblowers and journalist around the world depend on Tor for secure, anonymous communication and to circumvent censorship.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f7e90360-36f5-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1307,9 +1308,14 @@
},
"credit": "unknown\r\n",
"disabled": false,
- "__index": 50,
+ "__index": 61,
"dateCreated": "Fri, 12 May 2017 09:32:55 GMT",
- "links": []
+ "links": [
+ {
+ "text": "Torproject",
+ "uri": "https://www.torproject.org/"
+ }
+ ]
},
{
"id": "forensic-architecture-drone-strikes",
@@ -1318,7 +1324,7 @@
"medium": "Item",
"category": "Drones",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Classified #Airplanes #Arts #Afghanistan #Architecture #Attack #HumanRights #Morality #Pakistan #Violence #Warfare\r\n",
- "description": "The first known targeted drone assassination outside a war zone by the US took place in Yemen on November 3rd, 2002. Areas most affected by drone warfare are generally outside of effective state control. Therefore non-residents, like journalists are prevented to investigate events and access evidence while media coverage is uneven. The image depicts a visual investigation on the strike path of a drone in Miranshah, north Waziristan on March 2012 by Forensic Architecture. Aiming on focussing on the spatial dimension of drone strikes, they analysed video testimony that was smuggled out of the area, in order to reconstruct the space of the strike and interrogate the event. The white dotted lines show the potential places where people died.\r\n",
+ "description": "The first known targeted drone assassination outside a war zone by the US took place in Yemen on November 3rd, 2002. Areas most affected by drone warfare are generally outside of effective state control. Therefore non-residents like journalists, are prevented from investigating events and access evidence, and media coverage is uneven. The image depicts a visual investigation on the strike path of a drone in Miranshah, north Waziristan on March 2012 by Forensic Architecture. Aiming on focussing on the spatial dimension of drone strikes, they analysed video testimony that was smuggled out of the area, in order to reconstruct the space of the strike and investigate the event. The white dotted lines show the potential places where people died.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/60a9e090-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1333,7 +1339,7 @@
}
],
"disabled": false,
- "__index": 51,
+ "__index": 62,
"dateCreated": "Fri, 12 May 2017 09:36:16 GMT"
},
{
@@ -1343,7 +1349,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#Facebook #Twitter #Yahoo #Privacy #Protection \r\n",
- "description": "Social Network Surveillance means the praxis to create maps based on data from social networking sites such as Facebook and Twitter. These \"maps\" are mined to extract information such as interests, friendships, affiliations, beliefs and activities. US government agencies like the NSA are investing heavily in research involving social network analysis. Some people haved claimed that the use of social networking sites is in itself a form of ‘participatory surveillance’ where users essentially perform surveillance on themselves and others, putting and using personal information on public websites.\r\n",
+ "description": "Social Network Surveillance means the practice of creating maps based on data from social networking sites such as Facebook and Twitter. These \"maps\" are mined to extract information such as interests, friendships, affiliations, beliefs and activities. US government agencies like the NSA are investing heavily in research involving social network analysis. Some people haved claimed that the use of social networking sites is in itself a form of ‘participatory surveillance’ where users essentially perform surveillance on themselves and others, putting and using personal information on public websites.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/c1714490-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1358,7 +1364,7 @@
}
],
"disabled": false,
- "__index": 52,
+ "__index": 63,
"dateCreated": "Fri, 12 May 2017 09:38:37 GMT"
},
{
@@ -1368,7 +1374,7 @@
"medium": "Item",
"category": "Surveillance",
"keywords": "#WikiLeaks #Whistleblower #Classified Information #Covered Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n",
- "description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news-leaks from anonymous sources. It was founded in Iceland in 2006 and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson to the organisation devoted to transparent governments, accessibility to information and protecting whistleblowers. Over the past years WikiLeaks draw a lot of global attention to itself by publishing leaked classified information, for instance on the US-Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012, since then he is a resident in the Ecuadorian Embassy in London, afraid to leave as he fears an extradition to the US by Sweden, where he is accused of sexual assaults. In the US he could face several penalties, including the death sentence, for his work with WikiLeaks. ",
+ "description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news-leaks from anonymous sources. It was founded in Iceland in 2006 and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson of the organisation devoted to bringing transparency to governments, accessibility to information, and protecting whistleblowers. Over the past years WikiLeaks draw a lot of global attention to itself by publishing leaked classified information, for instance on the US-Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012, since then he has been a resident in the Ecuadorian Embassy in London, afraid to leave as he fears an extradition to the US by Sweden, where he is accused of sexual assaults. In the US he could face several penalties, including the death sentence, for his work with WikiLeaks. ",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fec0c370-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1387,7 +1393,7 @@
}
],
"disabled": false,
- "__index": 53,
+ "__index": 64,
"dateCreated": "Fri, 12 May 2017 09:40:35 GMT"
},
{
@@ -1412,7 +1418,7 @@
}
],
"disabled": false,
- "__index": 54,
+ "__index": 65,
"dateCreated": "Fri, 12 May 2017 09:42:38 GMT"
},
{
@@ -1424,10 +1430,10 @@
"keywords": "#Israel #Drones #UAV #Palestine #Simulation #IDF #Suspect \r\n",
"description": "Miki Kratsman’s Targeted Killing examines the term “focused foiling” coined by the IDF (Israel Defense Forces). For this series, Kratsman uses a special lens, which is commonly used by UAV’s. The outcome is an image that appears to be shot seconds before a targeted killing. The photographed characters in this work are Palestinian civilians going about their daily lives. The way they are being photographed echoes the imagery of threatening “suspects”.\r\n",
"image": {
- "uri": "",
+ "uri": "https://marsupial.s3.amazonaws.com/armory/722d9aa0-4795-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
- "width": "",
- "height": ""
+ "width": "946",
+ "height": "630"
},
"credit": "Miki Kratsman\r\n",
"links": [
@@ -1441,7 +1447,7 @@
}
],
"disabled": false,
- "__index": 55,
+ "__index": 67,
"dateCreated": "Fri, 12 May 2017 10:15:01 GMT"
},
{
@@ -1470,7 +1476,7 @@
}
],
"disabled": false,
- "__index": 56,
+ "__index": 68,
"dateCreated": "Fri, 12 May 2017 10:18:28 GMT"
},
{
@@ -1480,7 +1486,7 @@
"medium": "Video",
"category": "Surveillance",
"keywords": "#Iraq #Attack #Leak #Wikileaks #Disclosure #Ethics #US-Army #Airstrike #Violence #Morality #Warfare\r\n",
- "description": "On July 12th 2007 the US Army conducted a series of airstrikes in New Baghdad, Iraq, killing over a dozen civilians, including two war correspondents working for Reuters. The classified video footage of the helicopter gunship was released by WikiLeaks on 5th April 2010 and caused a global discussion on the legality and morality of the attacks.\r\n",
+ "description": "On July 12th 2007 the US Army conducted a series of airstrikes in New Baghdad, Iraq, killing over a dozen civilians, including two war correspondents working for Reuters news agency. The classified video footage of the helicopter gunship was released by WikiLeaks on 5th April 2010 and caused a global discussion on the legality and morality of the attacks.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9a0aff80-36fc-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1495,7 +1501,7 @@
}
],
"disabled": false,
- "__index": 57,
+ "__index": 69,
"dateCreated": "Fri, 12 May 2017 10:20:26 GMT"
},
{
@@ -1505,7 +1511,7 @@
"medium": "Film",
"category": "Drones",
"keywords": "#Surveillance #Drone #UAV #Technology #Camera #Verticality #Control #All-Seeing Eye #Military #Reconnaissance #Remote Sensing #Warfare #Information #Sensor #US-Air Force #Afghanistan #Airstrike #Attack #Morality #Ethics \r\n",
- "description": "Omar Fast’s film ‘5000 Feet is The Best’, addresses politics of visuality and how reality of warfare is perceived when the world is made of fake images and special effects. The title is taken from a former drone operator who is interviewed. He reveals why 5000 feet is the best height for a combat drone to fly, as it means he can make out someones shoes and facial hair.\r\n",
+ "description": "Omar Fast’s film ‘5000 Feet is The Best’, addresses politics of visuality and how the reality of warfare is perceived when the world is made of fake images and special effects. The title is taken from a former drone operator who is interviewed. He reveals why 5000 feet is the best height for a combat drone to fly, as it means he can make out someones shoes and facial hair.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d388dcf0-36fc-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1520,7 +1526,7 @@
}
],
"disabled": false,
- "__index": 58,
+ "__index": 70,
"dateCreated": "Fri, 12 May 2017 10:22:04 GMT"
},
{
@@ -1545,7 +1551,7 @@
}
],
"disabled": false,
- "__index": 59,
+ "__index": 71,
"dateCreated": "Fri, 12 May 2017 10:24:13 GMT"
},
{
@@ -1574,7 +1580,7 @@
}
],
"disabled": false,
- "__index": 60,
+ "__index": 72,
"dateCreated": "Fri, 12 May 2017 10:27:13 GMT"
},
{
@@ -1584,7 +1590,7 @@
"medium": "Image",
"category": "Drones",
"keywords": "#Drones #Airstrike #Attack #Violence #Ethics #Morality #CIA #USA #Pakistan\r\n",
- "description": "On 24th of October 2012 two missiles of a US-Drone hit a village in North Waziristan, Pakistan, and killed a 67-year-old midwife, who was gathering okra with her two grandchildren in a garden. The children were injured and rushed to the hospital. Media reports of that day claimed that militants had been killed, although Rafiq ur Rehman, a Pakistani primary school teacher and father to the family claimed otherwise. He and his children, Zubair, 13, and Nabila, 9 were the first victims of an alleged US-Drone strike to give testimony at the US-Congress. When Zubair plead to the lawmakers, he described the situation in his home: “Now I prefer cloudy days when the drones don’t fly. When the sky brightens and becomes blue, the drones return and so does the fear.“\r\n",
+ "description": "On 24th of October 2012 two missiles of a US-Drone hit a village in North Waziristan, Pakistan, and killed a 67-year-old midwife, who was gathering okra with her two grandchildren in a garden. The children were injured and rushed to the hospital. Media reports of that day claimed that militants had been killed, although Rafiq ur Rehman, a Pakistani primary school teacher and father to the family claimed otherwise. He and his children, Zubair, 13, and Nabila, 9 were the first family members of victims of an alleged US-Drone strike to give testimony at the US-Congress. When Zubair pleaded to the lawmakers, he described the situation in his home: “Now I prefer cloudy days when the drones don’t fly. When the sky brightens and becomes blue, the drones return and so does the fear.“\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f3ea3dd0-36fd-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1599,7 +1605,7 @@
}
],
"disabled": false,
- "__index": 61,
+ "__index": 73,
"dateCreated": "Fri, 12 May 2017 10:29:02 GMT"
},
{
@@ -1609,7 +1615,7 @@
"medium": "Multimedia Art Project",
"category": "Surveillance",
"keywords": "#Accent #Refugees #Migration #Security #Language #Asylum #Deportation #Detention #Arts",
- "description": "In his 2012 work “Conflicted Phonemes”, Lawrence Abu Hamdan deals with controversial usage of language analysis. He held a meeting with a group of 12 Somali refugees who had been subjected to accent analysis by the Dutch immigration authorities and later had their asylum requests rejected. Hamdan aims to show how those tests seek to determine the asylum seekers origins in relatively safe regions in the north of the country. Together with refugees and researchers he developed maps which explore the hybrid nature of accent.\r\n",
+ "description": "In his 2012 work “Conflicted Phonemes”, Lawrence Abu Hamdan deals with controversial usage of speech language analysis. He held a meeting with a group of 12 Somali refugees who had been subjected to accent analysis by the Dutch immigration authorities and later had their asylum requests rejected. Hamdan aims to show how those tests seek to determine if the asylum seekers origins are from relatively safe regions in the north of the country. Together with refugees and researchers he developed maps which explore the hybrid nature of accent.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/17ac7cf0-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1624,7 +1630,7 @@
}
],
"disabled": false,
- "__index": 62,
+ "__index": 74,
"dateCreated": "Fri, 12 May 2017 10:38:19 GMT"
},
{
@@ -1634,7 +1640,7 @@
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Google #Googlemaps #Surveillance #Privacy #Streetart ",
- "description": "The work Street Ghosts is a series of photographs taken from Google Street View and printed at life-size scale. The artist Paolo Cirio later posted the portraits as street art inventions at the same locations where they had been taken. The artwork re-contextualizes readymade online material and documents shifting social norms and policies concerning privacy. Cirio explains how he aimed to expose the specters of Google’s misappropriated data: the bodies of people captured by Google’s Street View cameras, whose ghostly, virtual presence was marked in a Street Art fashion at the spot where they were photographed. The images don’t offer details, but unveil the depicted people’s uncanny presence.\r\n",
+ "description": "The work Street Ghosts is a series of photographs taken from Google Street View and printed at life-size scale. The artist Paolo Cirio later posted the portraits as street art inventions at the same locations where they had been taken. The artwork re-contextualizes readymade online material and documents shifting social norms and policies concerning privacy. Cirio explains how he aimed to expose the specters of Google’s misappropriated data: the bodies of people captured by Google’s Street View cameras, whose ghostly, virtual presence was marked in a street art fashion at the spot where they were photographed. The images don’t offer details, but highlight the depicted people’s uncanny presence.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/5ac882e0-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1653,7 +1659,7 @@
}
],
"disabled": false,
- "__index": 63,
+ "__index": 75,
"dateCreated": "Fri, 12 May 2017 10:40:08 GMT"
},
{
@@ -1663,7 +1669,7 @@
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments #Airstrike #Airplanes #Attack #Camouflage #Counter Surveillance #Control #Ethics #Protection #Reconnaissance #Weapons #Warfare #US-Army #UAV #Survival\r\n",
- "description": "The Drone Survival Guide contains the silhouettes of the most common drone species used today and in the near future. Each indicating nationality and whether they are used as a surveillance platform or for deadly force. All drones are drawn in scale for size indication. From the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39,9 meter in length. The guide is printed on reflective paper, referring to the possibility to hide from a drone camera by using reflective material or a space blanket, when an infrared camera is in use, as it camouflages the heat signature.\r\n",
+ "description": "The Drone Survival Guide contains the silhouettes of the most common drone species used today and in the near future. Nationality and whether they are used as a surveillance platform or for deadly force are indicated. All drones are drawn in scale for size indication. From the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39,9 meter in length. The guide is printed on reflective paper, referring to the possibility to hide from a drone infrared camera by using reflective material or a space blanket, as it camouflages the heat signature.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f267aa90-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1682,7 +1688,7 @@
}
],
"disabled": false,
- "__index": 64,
+ "__index": 76,
"dateCreated": "Fri, 12 May 2017 10:44:51 GMT"
},
{
@@ -1692,7 +1698,7 @@
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments #All-Seeing Eye #Airstrikes #Attack #Violence #Social Media #The Arts #Photography\r\n",
- "description": "Dronestagram posts satellite images of location that have been a target of a drone strike along a short summary to Instagram, Tumblr and Twitter. The far, for many of us foreign places that are affected, are targets of a largely invisible technology – remotely controlled, unmanned, aerial vehicles, loaded with weapons. Using social media to report the strikes, shifts them into more visibility. In James Bridle's words, who is the artist behind the project: “These are just images of foreign landscapes, still; yet we have got better at immediacy and intimacy online: perhaps we can be better at empathy too.” The records of the strikes are mostly drawn from the Bureau of Investigative Journalism, which compiles reports from Pakistan, Yemen and Somalia.\r\n",
+ "description": "Dronestagram posts satellite images of locations that have been a target of a drone strike along with a short summary to Instagram, Tumblr and Twitter. For many of us, foreign places that are affected by these strikes, and are targets of a largely invisible technology (remotely controlled, unmanned, aerial vehicles, loaded with weapons) feels very abstract. Using social media to report the strikes, shifts them into greater visibility and awareness. In James Bridle's words, who is the artist behind the project: “These are just images of foreign landscapes, still; yet we have got better at immediacy and intimacy online: perhaps we can be better at empathy too.” The records of the strikes are mostly drawn from the Bureau of Investigative Journalism, which compiles reports from Pakistan, Yemen and Somalia.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4fb725e0-3700-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1707,7 +1713,7 @@
}
],
"disabled": false,
- "__index": 65,
+ "__index": 77,
"dateCreated": "Fri, 12 May 2017 10:53:48 GMT"
},
{
@@ -1717,7 +1723,7 @@
"medium": "Case ",
"category": "Surveillance",
"keywords": "#NSA #Wikileaks #Snowden #Social Media #PRISM #phones #Surveillance #Counter-Surveillance #Privacy #Internet #Encryption #Hacking Computing #Five Eyes\r\n",
- "description": "Snowden’s leaks have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. They mostly emanated from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. In addition to a trove of US federal documents, Snowden's cache contains thousands of Australian, British and Canadian intelligence files. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The Snowden case lastingly influenced the public awareness and discourse on surveillance today\r\n",
+ "description": "Snowden’s leaks have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. They mostly emanated from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. In addition to a trove of US federal documents, Snowden's cache contains thousands of Australian, British and Canadian intelligence files. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The Snowden case has had a lasting influence on the public awareness and discourse on surveillance today.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/ab337260-3701-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1740,7 +1746,7 @@
}
],
"disabled": false,
- "__index": 66,
+ "__index": 78,
"dateCreated": "Fri, 12 May 2017 10:56:59 GMT"
},
{
@@ -1750,7 +1756,7 @@
"medium": "Program",
"category": "Surveillance",
"keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n",
- "description": "PRISM is a highly-classified program that intend is to grant direct access to internet servers for the NSA to wiretap. Since 2007, it would collect material including individual search history, the content of emails, file transfers and live chats from internet giants like Google, Apple or Facebook. Being part of the Snowden archive, it was the first leak to be published, simultaneously by the Guardian and the Washington Post on June the 7th, 2013 which marked the begin of the Snowden-affair.\r\nThe leaked 41 pages power-point document intended for internal use only, demonstrates information on the extensive surveillance program. Among others it includes the facts that most of the world’s electronic communication passes through the US, which makes monitoring from intelligence analysts possible. The logo chosen represents the mission’s purpose: the prism refracting invisible noise into visible information.\r\n",
+ "description": "PRISM is a highly-classified program intended to grant direct access to internet servers for the NSA to wiretap. Since 2007, it would collect material including individual search history, the contents of emails, file transfers and live chats from internet giants like Google, Apple or Facebook. Being part of the Snowden archive, it was the first leak to be published, simultaneously by the Guardian and the Washington Post on June the 7th, 2013 which marked the begin of the Snowden-affair.\r\nThe leaked 41 pages power-point document intended for internal use only, demonstrates information on the extensive surveillance program. Among others it includes the facts that most of the world’s electronic communication passes through the US, which makes monitoring from intelligence analysts possible. The logo chosen represents the mission’s purpose: the prism refracting invisible noise into visible information.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/0de8eac0-3702-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1765,7 +1771,7 @@
}
],
"disabled": false,
- "__index": 67,
+ "__index": 79,
"dateCreated": "Fri, 12 May 2017 10:59:32 GMT"
},
{
@@ -1775,7 +1781,7 @@
"medium": "Program",
"category": "Surveillance",
"keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n",
- "description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping submarine network structures. These fibre optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication flows through them, in favour of „Mastering the Internet“ – a project by GCHQ. The subsidiary of that project codenamed TEMPORA stores huge volumes of data drawn from fibre-optic cables for up to 30 days. The data then can be sifted through an analysed.\r\n",
+ "description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping into submarine network structures. These fibre optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication flows through them, in favour of „Mastering the Internet“ – a project by GCHQ. The subsidiary of that project codenamed TEMPORA stores huge volumes of data drawn from fibre-optic cables for up to 30 days. The data then can be sifted through and analysed.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4b9d7790-3703-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1798,7 +1804,7 @@
}
],
"disabled": false,
- "__index": 68,
+ "__index": 80,
"dateCreated": "Fri, 12 May 2017 11:08:21 GMT"
},
{
@@ -1823,7 +1829,7 @@
}
],
"disabled": false,
- "__index": 69,
+ "__index": 81,
"dateCreated": "Fri, 12 May 2017 11:11:18 GMT"
},
{
@@ -1833,7 +1839,7 @@
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments\r\n",
- "description": "Drone Shadows is a series of public installation of artist, writer and technologist James Bridle. The 1:1 scale representation of a drone is supposed to shift the invisible drone warfare closer to our reality. The image depicts the shadow of a The General Atomics MQ-9 Reaper drone. It is used as a surveillance and weapons platform and operated by the US, UK, Australia, France, and NASA.\r\n",
+ "description": "Drone Shadows is a series of public installations of artist, writer and technologist James Bridle. The 1:1 scale representation of a drone is supposed to shift the invisible drone warfare closer to our reality. The image depicts the shadow of a The General Atomics MQ-9 Reaper drone. It is used as a surveillance and weapons platform and operated by the US, UK, Australia, France, and NASA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fc519c90-3985-11e7-a9cd-015e907df360.jpg",
"caption": "",
@@ -1852,7 +1858,7 @@
}
],
"disabled": false,
- "__index": 70,
+ "__index": 82,
"dateCreated": "Fri, 12 May 2017 11:13:25 GMT",
"shortDescription": ""
},
@@ -1886,7 +1892,7 @@
}
],
"disabled": false,
- "__index": 71,
+ "__index": 83,
"dateCreated": "Fri, 12 May 2017 13:01:58 GMT"
},
{
@@ -1915,7 +1921,7 @@
}
],
"disabled": false,
- "__index": 72,
+ "__index": 84,
"dateCreated": "Fri, 12 May 2017 13:13:11 GMT"
},
{
@@ -1943,8 +1949,8 @@
"uri": "https://en.wikipedia.org/wiki/Citizenfour"
}
],
- "disabled": false,
- "__index": 73,
+ "disabled": true,
+ "__index": 85,
"dateCreated": "Fri, 12 May 2017 13:18:54 GMT"
},
{
@@ -1969,7 +1975,7 @@
}
],
"disabled": true,
- "__index": 74,
+ "__index": 86,
"dateCreated": "Fri, 12 May 2017 13:31:32 GMT"
},
{
@@ -1994,7 +2000,7 @@
}
],
"disabled": false,
- "__index": 75,
+ "__index": 87,
"dateCreated": "Fri, 12 May 2017 13:33:18 GMT"
},
{
@@ -2019,7 +2025,7 @@
}
],
"disabled": false,
- "__index": 76,
+ "__index": 88,
"dateCreated": "Fri, 12 May 2017 13:43:04 GMT"
},
{
@@ -2029,7 +2035,7 @@
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Surveillance #Interception #Art #Snowden #Activism #Drone #Signal #GCHQ #Israel #Whistleblowing\r\n",
- "description": "Anarchist was the codename given to a classified program intercepting Israeli drone feeds and fighter jets. Ordered by the U.K.’s Government Communications Headquarters (GCHQ) and the National Security Agency (NSA) it was done from an intercepting station on a mountaintop in Cyprus. Snapshots of the live signals were found in the Snowden archive by the investigative journalist and filmmaker Laura Poitras, who was involved in publishing them. She printed the colorful images in bigger scale for them to become abstract artworks with a unique aura, carrying evidence and revelations about drone warfare.\r\n",
+ "description": "Anarchist was the codename given to a classified program intercepting Israeli drone feeds and fighter jets. Ordered by the U.K.’s Government Communications Headquarters (GCHQ) and the American National Security Agency (NSA) it was done from an intercepting station on a mountaintop in Cyprus. Snapshots of the live signals were found in the Snowden archive by the investigative journalist and filmmaker Laura Poitras, who was involved in publishing them. She printed the colorful images in bigger scale for them to become abstract artworks with a unique aura, carrying evidence and revelations about drone warfare.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9ac43730-3719-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2048,7 +2054,7 @@
}
],
"disabled": false,
- "__index": 77,
+ "__index": 89,
"dateCreated": "Fri, 12 May 2017 13:48:12 GMT"
},
{
@@ -2072,8 +2078,8 @@
"uri": "https://ahprojects.com/projects/skylift/"
}
],
- "disabled": false,
- "__index": 78,
+ "disabled": true,
+ "__index": 90,
"dateCreated": "Fri, 12 May 2017 13:50:01 GMT"
},
{
@@ -2083,7 +2089,7 @@
"medium": "Documentary Film",
"category": "Drones",
"keywords": "#drones #warfare #PTSD #ethics #testimony #silence #whistleblowing #trigger",
- "description": "National Bird gives rare insight into the US drone war program by depicting the life and testimony of three whistleblowers who – plagued by guilt over participating in the killing of faceless people in foreign countries – decide to break the silence around that program and their involvement. The film illustrates how drones wreak devastation and redistribute the ethical status quo of modern warfare. It demonstrates that the nature of drone warfare makes some drone operatives trigger-happy, while others end up dehumanised and traumatized.\r\n",
+ "description": "Sonia Kennebeck’s film gives rare insight into the US drone war program – with special focus on it’s largely criticized usage in Afghanistan – by depicting the life and testimony of three whistleblowers who, plagued by guilt over participating in the killing of faceless people, decide to break the silence around the drone program and their involvement. The film illustrates how drones wreak devastation and shake up the status quo of modern warfare in terms of ethics and strategy. It demonstrates how the nature of drone warfare makes some drone operatives trigger-happy, while others end up dehumanised and traumatized.\r\n \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b07d2b80-371a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2102,7 +2108,7 @@
}
],
"disabled": false,
- "__index": 79,
+ "__index": 92,
"dateCreated": "Fri, 12 May 2017 13:56:53 GMT"
},
{
@@ -2112,7 +2118,7 @@
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drones #Fear #Depression #Opera #Uncanniness #Technology #Grace #Generation #Art",
- "description": "Angst (German: “Fear”) is an opera in three acts by the German artist Anne Imhof. Angst II forms the climax and turning point. The work consists of music, text, sculptural elements, actors, animals and controlled drones that fly ominously above the crowd and thus create an overall uncanny atmosphere. Somewhat suspended in time and space, the ‘characters’ of Angst seem kept in a state between boredom and dreaminess. Whether the drones’ function is to surveil the works participants or serve as aesthetic surplus is not revealed. \r\n",
+ "description": "Angst (German: “Fear”) is an opera in three acts by the German artist Anne Imhof. Angst II forms the climax and turning point. The work consists of music, text, sculptural elements, actors, animals and controlled drones that fly ominously above the crowd and thus create an overall uncanny atmosphere. Somewhat suspended in time and space, the ‘characters’ of Angst seem kept in a state between boredom and dreaminess. Whether the drones’ function is to surveil the works participants or serve as an aesthetic element is not revealed. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1a884680-371c-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2131,7 +2137,7 @@
}
],
"disabled": false,
- "__index": 80,
+ "__index": 91,
"dateCreated": "Fri, 12 May 2017 14:05:55 GMT"
},
{
@@ -2141,7 +2147,7 @@
"medium": "Publication",
"category": "Surveillance",
"keywords": "#Whistleblowing #Dissent #CIA #Control #Privacy #Surveillance #Information #Secret Service #Activism #Civil Rights #Classified Information #Covered Operation #Disclosure #Espionage #Intelligence #Secrets #USA",
- "description": "CovertAction Information Bulletin was a leading progressive publication focusing and being critical of US foreign policy, the CIA, NSA, FBI, corporate crime and repression in the US and abroad. It was co-founded in 1978 by former CIA case officer Philip Agee, who became a leading opponent of CIA practices after he left the agency in 1968. The publication which was renamed to CovertAction Quarterly in 1992; it regularly published names of undercover agents and was targeted by Congress who passed the Intelligence Identities Protection Act in 1982, which made the practice of revealing names of agents illegal under US law.\r\nCovertAction Quarterly ceased publishing in 2005, having released a total number of 78 issues.",
+ "description": "CovertAction Information Bulletin was a leading progressive publication focused on being critical of US foreign policy, the CIA, NSA, FBI, corporate crime and repression in the US and abroad. It was co-founded in 1978 by former CIA case officer Philip Agee, who became a leading opponent of CIA practices after he left the agency in 1968. The publication was renamed to CovertAction Quarterly in 1992; it regularly published names of undercover agents and was targeted by Congress who passed the Intelligence Identities Protection Act in 1982, which made the practice of revealing names of agents illegal under US law.\r\nCovertAction Quarterly ceased publishing in 2005, having released a total number of 78 issues.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/dc3c9230-3add-11e7-824a-e3c31e607a7a.jpg",
"caption": "",
@@ -2150,9 +2156,295 @@
},
"credit": "Cover from issue 24, published 1985",
"disabled": false,
- "__index": 38,
+ "__index": 46,
"dateCreated": "Wed, 17 May 2017 08:50:49 GMT",
+ "links": [
+ {
+ "text": "Archive",
+ "uri": "https://archive.org/details/Issue27CovertActionInformationBulletinIssue27ReligiousRight"
+ }
+ ]
+ },
+ {
+ "id": "ancient-surveillance-egypt",
+ "date": "c. 1274 BC",
+ "title": "Ancient Surveillance: Egypt",
+ "medium": "Case",
+ "category": "Surveillance",
+ "keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covered Operations\r\n",
+ "description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest extant intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well documented Battle of Kadesh, that nearly ended as a disaster for the Egyptians, when Shasu spies led the Pharaoh, Ramses II, into a trap. The concept of employing spies, is the first known documentation of an intelligence network in history.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/9db6dfd0-476b-11e7-bfa2-633db9d19e2a.png",
+ "caption": "\r\n",
+ "width": "703",
+ "height": "354"
+ },
+ "credit": "Battle of Kadesh 1274 BC: Two Shasu spies being beaten by Egyptians. Public Domain \r\n",
+ "links": [
+ {
+ "text": "HistoryNet",
+ "uri": "http://www.historynet.com/battle-of-kadesh.htm"
+ }
+ ],
+ "disabled": false,
+ "__index": 0,
+ "dateCreated": "Fri, 02 Jun 2017 08:17:42 GMT"
+ },
+ {
+ "id": "sun-zsu-the-art-of-war",
+ "date": "5th century BC",
+ "title": "Sun Zsu: The Art of War",
+ "medium": "Book",
+ "category": "Surveillance",
+ "keywords": "#Espionage #Surveillance #Spy #Literature #Military #Ancient #Warfare #Intelligence #Information\r\n",
+ "description": "The Art of War is a famous treatise about military strategies and tactics, written by the Chinese general Sun Tzu. The text is composed in 13 chapters each describing one aspect of warfare. In the 13th chapter, solely devoted to the use of intelligence and espionage, he writes: \"Enlightened rulers and good generals who are able to obtain intelligent agents as spies are certain for great achievements.\" Chia Lin, a commentator on the book who lived under the T’ang dynasty said that an army without spies is like a man without ears or eyes. The chapter strongly emphasizes on the importance of spies, which are classified in five types, as intelligent sources and how to manage each of them.\r\nThe book, although written in the 5th century BC, was an inspiration to Mao Zedong and found application also outside the field of warfare.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/eff59a60-476c-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": " ",
+ "width": "1999",
+ "height": "1536"
+ },
+ "credit": "vlasta2, bluefootedbooby on flickr.com",
+ "links": [
+ {
+ "text": "Sun Tzu's Art of War",
+ "uri": "https://suntzusaid.com/book/13"
+ },
+ {
+ "text": "BBC News",
+ "uri": "http://www.bbc.com/news/magazine-24749166"
+ }
+ ],
+ "disabled": false,
+ "__index": 2,
+ "dateCreated": "Fri, 02 Jun 2017 08:25:39 GMT"
+ },
+ {
+ "id": "the-holy-bible-the-12-spies",
+ "date": "1400 BC",
+ "title": "The Holy Bible: The 12 Spies",
+ "medium": "Biblic Story",
+ "category": "Surveillance",
+ "keywords": "#Spy #Religion #Espionage #Geography #Information #Israel #Literature #Reconnaissance #Intelligence #Migration\r\n",
+ "description": "The Old Testament is rich in spy stories. One of the most known ones is the story of the 12 spies in the Book of Deuteronomy. Moses, who is leading the Israelis in search of the Promised land, prepares to move in the land of Canaan following their exodus from ancient Egypt. Therefore he appoints 12 spies, according to the Bible, one of each of the ancestral Israelite tribes, to „bring back a report about the route we are to take and the towns we will come to“. Although the spies brought back a cluster of grapes that took two men to carry, demonstrating the fertility of the new land, 10 of the spies where doubtful of the enterprise after reporting of obstacles. Not believing God could help them, the spies persuaded the Israelis it was impossible to conquer the land, the whole nation was doomed to wander in the desert for 40 years. Only the two remaining spies, Joshua and Caleb, who believed in the Promised Land were allowed to enter it after the time of wandering.\r\nMoses recognized the necessity of espionage and continued using it to much better effect in wars, guide the Israelis to be victorious.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/5912a150-476d-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "1000",
+ "height": "884"
+ },
+ "credit": " Giovanni Lanfranco, Moses and the Messengers from Canaan (1621 – 1624). Oil on canvas. The J. Paul Getty Museum, Los Angeles. Open Content.\r\n",
+ "links": [
+ {
+ "text": "Seattle Pacific University",
+ "uri": "http://blog.spu.edu/lectio/spies-and-lies/"
+ }
+ ],
+ "disabled": false,
+ "__index": 4,
+ "dateCreated": "Fri, 02 Jun 2017 08:29:04 GMT"
+ },
+ {
+ "id": "ancient-surveillance-roman-empire",
+ "date": "753 BC–476 AD",
+ "title": "Ancient Surveillance: Roman Empire",
+ "medium": "Surveillance Concept",
+ "category": "Surveillance",
+ "keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covered Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n",
+ "description": "Throughout the history of the Roman Empire, espionage and surveillance were significant elements of the political apparatus. Spies engaged in both foreign and domestic political operations, assessing the disposition of their enemy but also the loyalty of their own population. Several accounts indicate the presence of a secret police, one of which were the infamous frumentarii around the first century AD. They were supply sergeant who originally purchased and distributed grain to become intelligence agents adding manpower to the vast intelligence network of Ancient Rome. Working closely with the urban police, their duties included investigating, arresting and even political assassination. By the 3rd century the secret police was more and more seen as authoritative force or as an occupational army.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/db6d7300-476d-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "2000",
+ "height": "1103"
+ },
+ "credit": "The Reliefs of Trajan's Column by Conrad Cichorius. Plate number LXXXI: Troops entering camp (Scene CIX); Roman legionaries foraging (Scene CX), 113 d.C.. Public Domain\r\n",
+ "links": [
+ {
+ "text": "HistoryNet",
+ "uri": " http://www.historynet.com/espionage-in-ancient-rome.htm"
+ }
+ ],
+ "disabled": false,
+ "__index": 5,
+ "dateCreated": "Fri, 02 Jun 2017 08:31:44 GMT"
+ },
+ {
+ "id": "cuban-missile-crisis",
+ "date": "1962",
+ "title": "Cuban Missile Crisis",
+ "medium": "Historic Event",
+ "category": "Surveillance",
+ "keywords": "#Evidence #Surveillance #Aerial-Photography #Airstrike #Cold-War #Missile #Governments #Politics #Warfare #Information #Reconnaissance #USA #Photography #Verticality #Weapons\r\n",
+ "description": "The Cuban Missile Crisis was a 13-day-long confrontation between the US and the Soviet Union concerning the American missile deployment in Europe and the Soviet missile deployment in Cuba. The confrontation is considered the closest the Cold War came to escalating into a nuclear war. The 1962 midterm elections were under way in the United States and the White House had denied charges that it was ignoring dangerous Soviet missiles 90 miles from Florida. The United States had sent U-2 surveillance over Cuba, which produced clear aerial images which served as photographic evidence of medium-range (SS-4) and intermediate-range (R-14) ballistic missile facilities. The United States then established a military blockade to prevent further missiles from reaching Cuba. \r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/a44c54d0-476e-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "591",
+ "height": "468"
+ },
+ "credit": "Aerial Photography of Cuba, 1962. Public Domain, Courtesy of CIA\r\n",
+ "links": [
+ {
+ "text": "The Atlantic",
+ "uri": "https://www.theatlantic.com/magazine/archive/2013/01/the-real-cuban-missile-crisis/309190/"
+ }
+ ],
+ "disabled": false,
+ "__index": 32,
+ "dateCreated": "Fri, 02 Jun 2017 08:37:32 GMT"
+ },
+ {
+ "id": "the-watergate-scandal",
+ "date": "1972",
+ "title": "The Watergate Scandal",
+ "medium": "Case",
+ "category": "Surveillance",
+ "keywords": "#Governments #Politics #Scandal #Watergate #Wire Tapping #Surveillance #Bugs \r\n",
+ "description": "Watergate was a major political scandal following a break-in at the Democratic National Committee (DNC) headquarters at the Watergate office complex in Washington, D.C. President Nixon’s administration’s attempted cover-up of its involvement. When the case was discovered and investigated by the U.S. Congress, the Nixon administration’s resistance to its probes led to a constitutional crisis.The term Watergate, by metonymy, has come to encompass an array of clandestine and often illegal activities undertaken by members of the Nixon administration, such as bugging and wiretapping the offices of political opponents and people of whom Nixon or his officials were suspicious. Nixon also ordered investigations of activist groups and political figures, using the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Internal Revenue Service (IRS).\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/b7002a00-4770-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "500",
+ "height": "410"
+ },
+ "credit": "Front Page of The Baltimore Sun from 9th of August, 1974\r\n",
+ "links": [
+ {
+ "text": "HISTORY",
+ "uri": "http://www.history.com/topics/watergate"
+ },
+ {
+ "text": "Wikipedia",
+ "uri": "https://en.wikipedia.org/wiki/Watergate_scandal"
+ }
+ ],
+ "disabled": false,
+ "__index": 43,
+ "dateCreated": "Fri, 02 Jun 2017 08:53:04 GMT"
+ },
+ {
+ "id": "all-the-president-s-men",
+ "date": "1976",
+ "title": "All the President’s Men",
+ "medium": "Film",
+ "category": "Surveillance",
+ "keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covered Operations #Disclosure #Information #USA #US-Election\r\n",
+ "description": "In the run-up to the 1972 elections, Washington Post reporter Bob Woodward covers what seems to be a minor break-in at the Democratic Party National headquarters. He is surprised to find top lawyers already on the defense case, and the discovery of names and addresses of Republican fund organizers on the accused further arouses his suspicions. The editor of the Post is prepared to run with the story and assigns Woodward and Carl Bernstein to it. They find the trail leading higher and higher in the Republican Party, and eventually into the White House itself.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/76bfd750-4771-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "720",
+ "height": "480"
+ },
+ "credit": "Warner Bros. / Getty Images\r\n",
+ "disabled": false,
+ "__index": 45,
+ "dateCreated": "Fri, 02 Jun 2017 08:59:23 GMT",
+ "links": []
+ },
+ {
+ "id": "internet-of-things",
+ "date": "1982",
+ "title": "Internet of Things",
+ "medium": "Case",
+ "category": "Surveillance",
+ "keywords": "#Surveillance #The Internet #Spy #Algorithm #Big Data #Control #Corporation #Data Protection #Dystopia #Governments #Information #Metadata #Network #Public #Private #Paranoia #Privacy #Sensor #Simulation #Technology\r\n",
+ "description": "The Internet of Things describes the interconnectivity of smart devices used in daily life. A modified Coke machine at Carnegie Mellon University became the first Internet connected appliance as early as 1982. It was able to report its inventory and if the beverages were cold. \r\nSince then the landscape of technology changed significantly. Wireless sensors, machine learning, automation and cloud technology are enabling the vision of the Internet of Things. While today’s market of smart devices is striving to make our daily life as efficient as possible, privacy advocates express strong security concern. As these devices are designed like black-boxes, it’s untransparent which data is collected and given away to third parties. From smart home to smart cities – from an security experts standpoint, the IoT enables a sophisticated surveillance network for private corporations and the government. As Silicon Valley critic Evgeny Morozov put it: “Surveillance Marketed As Revolutionary Technology”.",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/a104a710-4772-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "1180",
+ "height": "660"
+ },
+ "credit": "wareable.com\r\n",
+ "links": [
+ {
+ "text": "The Guardian",
+ "uri": "https://www.theguardian.com/commentisfree/2016/feb/09/internet-of-things-smart-devices-spying-surveillance-us-government"
+ }
+ ],
+ "disabled": false,
+ "__index": 47,
+ "dateCreated": "Fri, 02 Jun 2017 09:06:16 GMT"
+ },
+ {
+ "id": "cctv-avoidance-applications",
+ "date": "1998",
+ "title": "CCTV Avoidance Applications",
+ "medium": "App",
+ "category": "Surveillance",
+ "keywords": "#BigBrother #CCTV #Surveillance #Counter-Surveillance #Public #Privacy #Technology #Architecture\r\n",
+ "description": "Already in 1998 volunteers of the New York Civil Liberties Union walked the streets of Manhattan to find 2,397 surveillance cameras recording people in public space. While the number of CCTV cameras highly increased after 9/11, today’s estimation is roughly 17,000 in all over New York City. \r\nTo raise awareness to the prevalence of surveillance and and the threat they pose to our individual freedom, various application offer techniques to avoid being surveilled. Among them is the citizens science project SPOTTERON that is used to track CCTV cameras in vicinity while the data comes from individuals. Apps for detecting hidden cameras for example in hotelrooms, can also be find for both major smartphone platforms in the respective app stores.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/f1df3dc0-4773-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "920",
+ "height": "613"
+ },
+ "credit": "Photo by Amelia Holowaty Krales / The Verge\r\n",
+ "links": [
+ {
+ "text": "• Mediaeater MMXIII •",
+ "uri": "http://www.mediaeater.com/cameras/"
+ },
+ {
+ "text": "Spotteron",
+ "uri": "https://www.spotteron.com/surveillance/info"
+ }
+ ],
+ "disabled": false,
+ "__index": 55,
+ "dateCreated": "Fri, 02 Jun 2017 09:15:04 GMT"
+ },
+ {
+ "id": "code-names",
+ "date": "2001",
+ "title": "Code Names",
+ "medium": "Artwork",
+ "category": "Surveillance",
+ "keywords": "#Arts #Classified Information #Covered Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n",
+ "description": "Code Names is a list of words, phrases, and terms that designate active military programs whose existence or purpose is classified. These include classified exercises and units, intelligence programs, information compartments, and Pentagon “Special Access Programs.”\r\nThe code names are deliberately nonsensical, often droll and sardonic words or short phrases without discernable connection to the programs they designate. For example, “Bacon Ridge” is an NSA installation in Texas, “Fox Acid” an NSA-controlled Internet server designed to inject malware into unsuspecting web browsers, and “Mystic” a program to collect every phone call from the Bahamas.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/677fd9e0-4774-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "",
+ "width": "1000",
+ "height": "590"
+ },
+ "credit": "Trevor Paglen, Code Names (installation view from the Van Abbemuseum), Ongoing list of classified Military and Intelligence programs, 2001 to present, Dimensions variable\r\n",
+ "disabled": false,
+ "__index": 60,
+ "dateCreated": "Fri, 02 Jun 2017 09:18:49 GMT",
"links": []
+ },
+ {
+ "id": "aadhaar-identification-system-",
+ "date": "2009",
+ "title": "AADHAAR Identification System ",
+ "medium": "Program",
+ "category": "Surveillance",
+ "keywords": "#Biometrics #Surveillance #Big Data #Governments #Identification #Civil Rights ",
+ "description": "The Aadhaar identification system in India is the world largest biometric database of citizens. A 12 digit unique-identity number that is based on individual biometric (eg. iris scans, fingerprints) and demographic data is issued to every resident. The system was launched in 2009 and covers at this point (April 30th 2017) nearly 90% of the total population of India.\r\nThe Aadhaar system rises security concern as privacy advocates fear it as a tool of state surveillance that uses the citizens vulnerability by them giving up personal data. Due to the broad use of the identification number it is also possible for private cooperation to exploit peoples data, if for example a purchase is made with it and the company request and pays for further data linked to that number.\r\n",
+ "image": {
+ "uri": "https://marsupial.s3.amazonaws.com/armory/f9283630-4774-11e7-bfa2-633db9d19e2a.jpg",
+ "caption": "https://ichef-1.bbci.co.uk/news/660/cpsprodpb/C7CA/production/_95864115_02.jpg\r\n",
+ "width": "660",
+ "height": "439"
+ },
+ "credit": "Mansi Thapliyal\r\n",
+ "links": [
+ {
+ "text": "BBC News",
+ "uri": "http://www.bbc.co.uk/news/world-asia-india-39769322"
+ },
+ {
+ "text": "The Wire",
+ "uri": "https://thewire.in/118655/hello-aadhaar-goodbye-privacy/"
+ }
+ ],
+ "disabled": false,
+ "__index": 66,
+ "dateCreated": "Fri, 02 Jun 2017 09:23:09 GMT"
}
],
"page": [
@@ -2167,7 +2459,7 @@
{
"id": "privacy-policy",
"title": "Privacy Policy",
- "body": "The <i>Terms of Service</i> of a website is a legal document describing a relationship between a software vendor and the end user. Typically this document is designed to indemnify the company who made the software from what you do with it. It also describes your rights in using the software - and what rights you give up.\r\n\r\nThe website <a href=\"https://tosdr.org/\">TOS;DR</a> was created to keep track of what's hidden in the small print of these legal agreements. For instance, on Youtube, \"Deleted videos are not really deleted.\" Facebook and Google admit to tracking your behavior, even on other websites. Instagram and Netflix waive your right to participating in a class action lawsuit. You cannot delete your Skype account.\r\n\r\nA website is required by law to publish a <i>Privacy Policy</i> if it collects <i>personally identifiable information</i> (PII) which can be used to trace an individual's identity. This information can include your name, email address, telephone number, social security number, date of birth, mother's maiden name, etc. The Privacy Policy should indicate what information is tracked and how it is stored.\r\n\r\nA website's Privacy Policy is intimately tied to its Terms and Conditions. For more information on how these two documents differ, read the article, <a href=\"https://termsfeed.com/blog/privacy-policies-vs-terms-conditions/\">Privacy Policy vs Terms and Conditions</a>.",
+ "body": "<p>The <i>Terms of Service</i> of a website is a legal document describing a relationship between a software vendor and the end user. Typically this document is designed to indemnify the company who made the software from what you do with it. It also describes your rights in using the software - and what rights you give up.</p><p>The website <a href=\"https://tosdr.org/\">TOS;DR</a> was created to keep track of what's hidden in the small print of these legal agreements. For instance, on Youtube, \"Deleted videos are not really deleted.\" Facebook and Google admit to tracking your behavior, even on other websites. Instagram and Netflix waive your right to participating in a class action lawsuit. You cannot delete your Skype account.</p><p>A website is required by law to publish a <i>Privacy Policy</i> if it collects <i>personally identifiable information</i> (PII) which can be used to trace an individual's identity. This information can include your name, email address, telephone number, social security number, date of birth, mother's maiden name, etc. The Privacy Policy should indicate what information is tracked and how it is stored.</p><p>A website's Privacy Policy is intimately tied to its Terms and Conditions. For more information on how these two documents differ, read the article, <a href=\"https://termsfeed.com/blog/privacy-policies-vs-terms-conditions/\">Privacy Policy vs Terms and Conditions</a>.</p>\r\n<hr>\r\n<h1>Privacy Policy</h1><p>Park Avenue Armory is committed to protecting your privacy. You can visit most pages on our site without giving us any information about yourself, but sometimes we do need information to provide services that you request. This policy describes the personal information we collect about you, the security measures we take to protect your information, the ways we use your information, and the limited situations in which we may share your information with third parties. Our policy also describes the choices you can make about how we collect and use your information. We encourage you to read the complete privacy policy; use of the Armory’s family of websites constitutes your acceptance of this policy.</p><h2>Collection of Your Personal Information</h2><h3>A. Information you give us</h3><p>The Armory will often request information that personally identifies you (personal information) or allows us to contact you. Generally, this information is requested when you purchase tickets, make donations, register for email newsletters or alerts, participate in a promotion or an online survey, contact us with a question or suggestion, request postal mailings, or apply for employment. Personal information collected generally includes a home address, email address, phone number, credit card information including expiration date and billing address, and product or genre preferences; it may include other information as needed to provide a specific service you requested or as part of an online survey, promotion, or app. We collect this information when you enter it on Armory websites or provide it voluntarily. You may remain anonymous to us if you choose to pay by cash in person at the Box Office.</p><h3>B. Automatic information</h3><p>When you visit the Armory’s websites, we automatically collect website usage information, as well as information about your computer and Internet connection. This includes your computer&#39;s IP address, the type and version of browser and operating system you use, your Internet domain, and if you visit via a link from another website, the URL of the linking page. This site visitation data is identified only by a unique ID number, and it is not linked with personal information unless you choose to log in. We aggregate this usage information and use it to identify the levels and areas of interest in the Armory and to improve and refine our websites, services, and security. We may perform (or have third parties perform) analyses of visitors&#39; behavior, and may share aggregated, anonymous data with funders, sponsors, or agencies.</p><p>We use cookie technology to gain information that helps us improve the user experience and enhances the functionality of our websites. A cookie is a small amount of data sent by our websites and stored on your computer&#39;s hard drive that our site can read, and which helps us keep track of how you use our websites. Many web browsers automatically accept cookies by default but contain an option for you to disable the cookie acceptance if you prefer. We do not allow unrelated third parties to set cookies via the Armory’s family of websites.</p><p>The Armory uses electronic images known as web beacons to monitor the activity of our email messages. These web beacons allow BAM&#39;s email service provider to obtain information such as the IP address of the computer that opened the email and what links were clicked within the email. With both cookies and web beacon technology, the information that we collect is anonymous and not personally identifiable. </p><p>The Armory uses remarketing with Google Analytics to advertise online. This means that the Armory allows third party vendors to show ads from the Armory on sites across the Internet. The Armory and these third party vendors use first party cookies and third party cookies together to inform, optimize, and serve ads based on a visitor’s past visits to websites.</p><p>We employ third parties to perform functions like sending postal mail and email, removing repetitive information from customer lists, and processing credit card payments. These parties have access to personal information that is necessary to perform their functions, but they are contractually obligated not to use it for other purposes. </p><h2>Security Used to Protect Your Information</h2><p>The Armory employs the latest safeguards and technologies to protect your information:</p><h3>Secure Web Servers</h3><p>The Armory employs secure web servers hosted in a certified data center. A  Network Solutions SSL (Secure Socket Layer) certificate is used for the secure encrypted exchange of data between your web browser and our websites using SSL encryption. Network Solutions Digital Certificates are trusted by over 99% of all browsers, applications, servers, and clients, including: Microsoft® Internet Explorer, Mozilla® Firefox, Google® Chrome, Konqueror (KDE), Opera and Apple® Safari. </p><h3>Firewall</h3><p>The Armory uses redundant, dedicated firewalls that protect both its transactional system and the data passing through it.</p><h2>Use of Your Personal Information<h2>\r\n\r\n<p>We use your personal information for the following purposes:</p>\r\n<li>- To ensure our site is relevant to your needs</li>\r\n<li>- To deliver services such as newsletters</li>\r\n<li>- To help us create and publish content most relevant to you</li>\r\n\r\n<p>The Armory may disclose your personal information if required to do so by law or in the good faith belief that such action is necessary to: (a) conform to the edicts of the law or comply with legal process served on the Armory or the site; (b) protect and defend the rights or property of the Armory and its family of websites; or (c) act in urgent circumstances to protect the personal safety of Armory employees, users of Armory products or services, or members of the public. </p>\r\n<p>In order to help us to better tailor our services and offerings, the Armory collects limited information about patron click-throughs, solely in connection with its e-newsletter and e-mail communications. Like many websites, this website also automatically logs certain aggregate information about visits to our website. This information is used for system administration and for producing usage statistics.</p>\r\n<h2>Control of your Personal Information</h2>\r\n<p>When you register, or otherwise give us personal information, your information will not be shared with third parties without your permission, other than for the limited exceptions already listed. It will only be used for the purposes stated above. The Armory does not rent or sell its email list but may sometimes exchange, rent, or sell names and addresses with other organizations. You may indicate to the Armory at any time whether or not you wish to have the Armory share your name with other organizations.</p>\r\n<h2>Protection of Children&#39;s Personal Information</h2>\r\n<p>This is a general audience site and does not knowingly collect any personal information from children.</p>\r\n<h2>Links and Embedded Content</h2>\r\n<p>Our websites may include links to other websites or embedded content. We do not control the privacy policies of the destination sites. Once you leave our servers or watch a YouTube video (you can see where you are by checking the URL in the location bar on your browser), use of any information you provide is governed by the privacy policy of the operator of the site you are visiting. </p>\r\n<h2>Updating Your Information</h2>\r\n<p>If you would like to update information and preferences in connection with newsletters, mailing lists, and databases, refer to the Armory’s “Contact Us” page. In all instances, you can stop receiving e-newsletters sent by the Armory by clicking on the &quot;Unsubscribe&quot; link at the bottom of each such e-newsletter.</p>\r\n<h2>Changes to this Statement</h2>\r\n<p>The Armory reserves the right to revise this privacy policy from time to time, and by using this website, you are agreeing to the terms of the then-current privacy policy. We encourage you to visit this page periodically to review our current policy.</p>\r\n<h2>Contact Information</h2>\r\n<p>The Armory welcomes your comments regarding this privacy statement, please contact us by email at info@armoryonpark.org or by postal mail:</p>\r\n<p>Park Avenue Armory\r\nAttn: Marketing Department\r\n643 Park Avenue\r\nNew York, NY 10021</p><hr>\r\n\r\n<h1>Terms and Conditions</h1>\r\n<p>Your right to access the content on this website and related products and to use the services provided via this website and related products are subject to the terms and conditions set forth below. Any breach of the terms and conditions set forth below immediately terminates such rights.</p>\r\n<h2>1. Content</h2>\r\n<p>The content provided on this website (collectively, the “Content”) is and remains at all times the property of Park Avenue Armory or its licensors or suppliers. You may download and use the Content for your personal, non-commercial use. You may not resell or commercially exploit the Content, nor may you download or copy Content for the benefit of a third party. Any use of data mining, robots, or similar data gathering and extraction tools is expressly prohibited. You may not frame or utilize framing techniques to enclose any Content without the express written consent of Park Avenue Armory. If you download or print a copy of the Content for personal use, you must retain all copyright and other proprietary notices contained therein.</p>\r\n<h2>2. Ticket Purchases</h2>\r\n<p>The purchase of tickets via this website is subject to our Ticketing Policies. Personal information you submit to us during the purchase of tickets via this website will be treated by Park Avenue Armory in the manner described in our Privacy Policy.</p>\r\n<h2>3. Intellectual Property Rights</h2>\r\n<p>The Content and the selection, compilation, collection, arrangement, and assembly thereof are protected by US and international copyright, trademark, and other laws. Other than as permitted in Section 1 of these terms and conditions, or as permitted by applicable law, you may not copy, reproduce, republish, upload, post, transmit, or distribute Content or other content or information available on or through this website in any way without our prior written permission.</p>\r\n<h2>4. Claims of Copyright Infringement</h2>\r\n<p>The Digital Millennium Copyright Act of 1998 (the “DMCA”) provides recourse for copyright owners who believe that material appearing on the internet infringes their rights under US copyright law. If you believe in good faith that materials hosted by Park Avenue Armory infringe your copyright, you (or your agent) may send us a notice requesting that the material be removed, or access to it blocked. Notices with respect to this website should be sent to info@armoryonpark.org.</p>\r\n<h2>5. Links</h2>\r\n<p>This website contains links to other internet websites, including affiliated websites that may or may not be owned or operated by Park Avenue Armory. The Armory has not reviewed all of the websites that are linked to this website, and has no control over such sites. Park Avenue Armory is not responsible for the content of such websites, any updates or changes to such sites, or the privacy or other practices of such sites, and the fact that the Armory offers such links does not indicate any approval or endorsement of any material contained on any linked site. Park Avenue Armory is providing these links to you only as a convenience. Accordingly, we strongly encourage you to become familiar with the terms of use and practices of any linked site.</p>\r\n<h2>6. Disclaimers</h2>\r\n<p>This website, the materials on this website, and any product or service obtained through this website are provided “as is” and without warranties of any kind, either express or implied. To the fullest extent permissible pursuant to applicable law, Park Avenue Armory and its affiliates , licensors, suppliers, sponsors, and agents disclaim all warranties, express or implied, including, without limitation, implied warranties of title, non-infringement, accuracy, merchantability, and fitness for a particular purpose, and any warranties that may arise from course of dealing , course of performance, or usage of trade. Applicable law may not allow the exclusion of implied warranties, so the above exclusions may not apply to you. </p>\r\n<h2>7. Limitation of Liability</h2>\r\n<p>Neither Park Avenue Armory nor any of its affiliates, licensors, suppliers, or sponsors, nor our directors, officers, employees, consultants, agents, or other representatives, are responsible or liable for any indirect, incidental, consequential, special, exemplary, punitive, or other damages (including limitation, damages for loss of business, loss of data, or lost profits), under any contract, negligence, strict liability, or other theory arising out of or relating in any way to this website and/or materials contained on this website, any linked site or any product or service purchased through this website. Your sole remedy for dissatisfaction with this website, materials, or linked site is to stop using this website, materials, or linked site, as applicable. The sole and exclusive maximum liability to Park Avenue Armory for all damages, loss, and causes of action, whether in contract, tort (including, without limitation, negligence, or otherwise, shall be the total amount paid by you, if any, to access this website. Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you.</p>\r\n<h2>8. Miscellaneous</h2>\r\n<p>This Agreement is governed by and construed in accordance with the laws of the State of New York, United States of America, without regards to its principles of conflicts of law. </p>\r\n<p>If any provision of this Agreement is found to be unlawful, void, or for any reason unenforceable, then that provision shall be deemed severable from this Agreement and shall not affect the validity and enforceability of any remaining provisions. </p>\r\n<p>This is the entire Agreement between us relating to your right to access the content on this website and to use the services provided via this website, and supersedes any and all prior or written or oral agreements between us with respect to such subject matter. No waiver by either party of any breach or default hereunder shall be deemed to be a waiver of any preceding or subsequent breach or default.</p>",
"disabled": false,
"__index": 3,
"dateCreated": "Sat, 13 May 2017 19:50:06 GMT"
@@ -2223,7 +2515,7 @@
"uri": "https://www.youtube.com/watch?v=Szu3aBo8taQ"
},
{
- "text": "Headhouse",
+ "text": "Part 2 Entrance",
"uri": "https://www.youtube.com/watch?v=ErXmu-t6JcE"
}
],