diff options
| -rw-r--r-- | db.json | 62 |
1 files changed, 45 insertions, 17 deletions
@@ -553,7 +553,7 @@ "title": "Moonbounce", "medium": "Program", "category": "Surveillance", - "keywords": "#Moon #Surveillance #Interception #Signal #Covered Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n", + "keywords": "#Moon #Surveillance #Interception #Signal #Covert Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n", "description": "Moonbounce describes the phenomenon that man-made signals emanating from Earth would bounced back from the moon and detected from other locations. The radar-reflective characteristics of the lunar surface were already successfully tested since 1946. One time in surveillance history this came to use was in the US-Air Force led project named FLOWER GARDEN in the early 1960s to monitor and intercept radar signals from the Soviet Union. Several antennas around the US were used for moonbounce – also operated by the CIA and the NSA.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/b0a50210-365a-11e7-a37a-4579121b15f0.jpg", @@ -759,7 +759,7 @@ "title": "Teufelsberg (“Devil’s Mountain”), Berlin", "medium": "Item", "category": "Surveillance", - "keywords": "#NSA #Surveillance #Covered Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n", + "keywords": "#NSA #Surveillance #Covert Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n", "description": "Teufelsberg (translated as “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was created in the 20 years following World War II by moving debris from the destroyed city of Berlin. In 1963 the NSA built a permanent listening station atop the mountain to spy on the eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled the US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. This unique history makes Teufelsberg a tourist attraction.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/617c4070-3661-11e7-a37a-4579121b15f0.jpg", @@ -1377,7 +1377,7 @@ "title": "WikiLeaks", "medium": "Item", "category": "Surveillance", - "keywords": "#WikiLeaks #Whistleblower #Classified Information #Covered Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n", + "keywords": "#WikiLeaks #Whistleblower #Classified Information #Covert Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n", "description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news-leaks from anonymous sources. It was founded in Iceland in 2006 and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson of the organisation devoted to bringing transparency to governments, accessibility to information, and protecting whistleblowers. Over the past years WikiLeaks draw a lot of global attention to itself by publishing leaked classified information, for instance on the US-Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012, since then he has been a resident in the Ecuadorian Embassy in London, afraid to leave as he fears an extradition to the US by Sweden, where he is accused of sexual assaults. In the US he could face several penalties, including the death sentence, for his work with WikiLeaks. ", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/fec0c370-36f6-11e7-a37a-4579121b15f0.jpg", @@ -1759,7 +1759,7 @@ "title": "PRISM", "medium": "Program", "category": "Surveillance", - "keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n", + "keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n", "description": "PRISM is a highly-classified program intended to grant direct access to internet servers for the NSA to wiretap. Since 2007, it would collect material including individual search history, the contents of emails, file transfers and live chats from internet giants like Google, Apple or Facebook. Being part of the Snowden archive, it was the first leak to be published, simultaneously by the Guardian and the Washington Post on June the 7th, 2013 which marked the begin of the Snowden-affair.\r\nThe leaked 41 pages power-point document intended for internal use only, demonstrates information on the extensive surveillance program. Among others it includes the facts that most of the world’s electronic communication passes through the US, which makes monitoring from intelligence analysts possible. The logo chosen represents the mission’s purpose: the prism refracting invisible noise into visible information.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/0de8eac0-3702-11e7-a37a-4579121b15f0.jpg", @@ -1784,7 +1784,7 @@ "title": "Undersea Network Surveillance", "medium": "Program", "category": "Surveillance", - "keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n", + "keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n", "description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping into submarine network structures. These fibre optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication flows through them, in favour of „Mastering the Internet“ – a project by GCHQ. The subsidiary of that project codenamed TEMPORA stores huge volumes of data drawn from fibre-optic cables for up to 30 days. The data then can be sifted through and analysed.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/4b9d7790-3703-11e7-a37a-4579121b15f0.jpg", @@ -2175,7 +2175,7 @@ "title": "Ancient Surveillance: Egypt", "medium": "Case", "category": "Surveillance", - "keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covered Operations\r\n", + "keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covert Operations\r\n", "description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest extant intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of the public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well-documented Battle of Kadesh, that nearly ended as a disaster for the Egyptians, when Shasu spies led the Pharaoh, Ramses II, into a trap. The concept of employing spies is the first known documentation of an intelligence network in history.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/9db6dfd0-476b-11e7-bfa2-633db9d19e2a.png", @@ -2195,9 +2195,9 @@ "dateCreated": "Fri, 02 Jun 2017 08:17:42 GMT" }, { - "id": "sun-zsu-the-art-of-war", + "id": "sun-tsu-the-art-of-war", "date": "5th century BC", - "title": "Sun Zsu: The Art of War", + "title": "Sun Tsu: The Art of War", "medium": "Book", "category": "Surveillance", "keywords": "#Espionage #Surveillance #Spy #Literature #Military #Ancient #Warfare #Intelligence #Information\r\n", @@ -2254,7 +2254,7 @@ "title": "Ancient Surveillance: Roman Empire", "medium": "Surveillance Concept", "category": "Surveillance", - "keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covered Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n", + "keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covert Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n", "description": "Throughout the history of the Roman Empire, espionage and surveillance were significant elements of the political apparatus. Spies engaged in both foreign and domestic political operations, assessing the disposition of their enemy but also the loyalty of their own population. Several accounts indicate the presence of a secret police, one of which were the infamous frumentarii around the first century AD. They were supply sergeant who originally purchased and distributed grain to become intelligence agents adding manpower to the vast intelligence network of Ancient Rome. Working closely with the urban police, their duties included investigating, arresting and even political assassination. By the 3rd century the secret police was more and more seen as authoritative force or as an occupational army.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/db6d7300-476d-11e7-bfa2-633db9d19e2a.jpg", @@ -2333,7 +2333,7 @@ "title": "All the President’s Men", "medium": "Film", "category": "Surveillance", - "keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covered Operations #Disclosure #Information #USA #US-Election\r\n", + "keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covert Operations #Disclosure #Information #USA #US-Election\r\n", "description": "In the run-up to the 1972 elections, Washington Post reporter Bob Woodward covers what seems to be a minor break-in at the Democratic Party National headquarters. He is surprised to find top lawyers already on the defense case, and the discovery of names and addresses of Republican fund organizers on the accused further arouses his suspicions. The editor of the Post is prepared to run with the story and assigns Woodward and Carl Bernstein to it. They find the trail leading higher and higher in the Republican Party, and eventually into the White House itself.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/76bfd750-4771-11e7-bfa2-633db9d19e2a.jpg", @@ -2407,7 +2407,7 @@ "title": "Code Names", "medium": "Artwork", "category": "Surveillance", - "keywords": "#Arts #Classified Information #Covered Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n", + "keywords": "#Arts #Classified Information #Covert Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n", "description": "Code Names is a list of words, phrases, and terms that designate active military programs whose existence or purpose is classified. These include classified exercises and units, intelligence programs, information compartments, and Pentagon “Special Access Programs.”\r\nThe code names are deliberately nonsensical, often droll and sardonic words or short phrases without discernable connection to the programs they designate. For example, “Bacon Ridge” is an NSA installation in Texas, “Fox Acid” an NSA-controlled Internet server designed to inject malware into unsuspecting web browsers, and “Mystic” a program to collect every phone call from the Bahamas.\r\n", "image": { "uri": "https://marsupial.s3.amazonaws.com/armory/677fd9e0-4774-11e7-bfa2-633db9d19e2a.jpg", @@ -2487,7 +2487,7 @@ { "id": "find-your-face", "title": "Find Your Face", - "body": "Description of face recognition pipeline coming SOON!", + "body": "The Hansel & Gretel exhibition uses a custom facial recognition system that automatically captures visitors' facial biometrics as they move throughout the Armory. At all times, 5 surveillance cameras stream a 1080 pixel image at 10 frames per second (FPS) to a central image processing server located on site. Every frame from every camera is run through a series of computer vision algorithms that detect faces and convert them into biometric face prints. In less than 1 millisecond, using a minimum of 100 x 100 pixels, any face appearing in any surveillance feed is automatically extracted and stored in a local database as a 128-dimension feature vector.\r\n \r\nThese 128-dimension feature vectors represent what makes each face unique relative to other faces. Previous versions of facial recognition technology from the 1990s and early 2000s based recognition on seeing the face in a more human way, as linear combinations of composite photographs or by comparing the geometry between facial landmarks. Current state-of-the-art facial recognition algorithms, including the code used in the Hansel & Gretel system, make use of deep neural networks that automatically determine which combinations of facial features are the most useful for creating enough separation between between thousands of identities. In a controlled testing environment using frontal-pose images, the accuracy exceeds 99%. \r\n \r\nIn practice however, images captured in any surveillance system will typically be less accurate because of the differences between the pose, lighting, expression, optics and fashion accessories worn for the enrollment and capture photos. This effect is slightly minimized in the Hansel & Gretel facial recognition system because visitors are enrolled and matched on the same day. The accuracy of your matched photo will depend mostly on the equivalence of expression and pose between your submitted photo and your captured photos. According to a theory called the Biometric Zoo, match scores are also dependent on the relative similarity or difference of facial features amongst the enrolled population of faces. As with facial recognition technology and biometric recognition used in law enforcement and national security, no match is ever absolutely certain, but only a probabilistic determination based on the available matches in a database.\r\n \r\nIn the US the average person is caught on camera more than 75 times per day. The fact that our identities are captured, analyzed, and stored is a fact of contemporary life that often goes unnoticed, but what are the implications this has on our society?", "disabled": false, "__index": 7, "dateCreated": "Sat, 20 May 2017 21:50:17 GMT" @@ -2499,6 +2499,22 @@ "disabled": false, "__index": 8, "dateCreated": "Mon, 22 May 2017 09:54:07 GMT" + }, + { + "id": "curatorial-statement", + "title": "Curatorial Statement", + "body": "<i>Hansel & Gretel</i> is the latest work in the complex and exceptionally fruitful collaboration between Pritzker Prize winning Swiss architects Jacques Herzog and Pierre de Meuron (architects for the Armory’s renovation) and the Chinese artist/activist Ai Weiwei. Having worked together for fifteen years in the field of art and architecture, never defining their roles and thus creating unexpected results, they have collaborated on projects such as the \"Bird's Nest\" stadium for the Beijing Olympic Games in 2008 and the 2012 pavilion for the Serpentine Gallery in London. <i>Hansel & Gretel</i> brings together their combined interests in the psychological impact of architecture and the politics of public space; creating a playful, strange and eventually eerie environment with different layers of reality revealed to the visitors first in the Drill Hall and then in the Head House of the Park Armory. \r\n\r\nThe initial impulse for the project was to transform the vast Thompson Drill Hall into a public park, a place of free movement and play, open 24 hours and accessible from street level. <i>Hansel & Gretel</i> is, however, quite the opposite, a dystopian forest of projected light where the floor rises up, as if lifted by an invisible force, and visitors are tracked by infrared cameras and surveyed by overhead drones as they systematically capture the parkgoers' data and movements. Here the breadcrumbs of the famous Hansel and Gretel fairy tale are not eaten by birds but rather digital crumbs are gathered and stored, reminiscent of Ray Bradbury's poignant, 1953 science-fiction novel <i>Fahrenheit 451</i>, where an omniscient state surveils its citizens from the skies. \r\n\r\nEntering from a small street-level doorway on Lexington Avenue through a long darkening tunnel, the visitor experiences both psychological menace and exhilarating wonder upon exiting into the expansive landscape of the dimmed Drill Hall, animated by interactive projections mapping the visitor's every move. Utilizing state-of-the-art surveillance technology, the installation is both an enticingly playful and unnerving experience of what it means to be constantly watched, of public space without anonymity. Only upon leaving the Drill Hall and entering the hallways of the historic Head House, does the visitor discover through a continuation of the installation the extent of what has been seen and captured. An extensive digital library of surveillance histories and technologies is available for further research. \r\n\r\nIn an age of constant scrutiny and data storage beyond the knowledge and control of ordinary citizens, <i>Hansel & Gretel</i> is perhaps less fantastical and more menacing than it may at first appear. \r\n\r\nTom Eccles and Hans Ulrich Obrist, Curators \r\n", + "disabled": false, + "__index": 9, + "dateCreated": "Sat, 03 Jun 2017 19:09:34 GMT" + }, + { + "id": "floor-projections", + "title": "Floor Projections", + "body": "Every movement in the Drill Hall is tracked and recorded from above by a grid of 56 small computers with infrared (IR) cameras, each attached to a projector suspended on a truss system high above the gently sloping floor . To allow for better tracking in low light conditions we installed an array of floodlights which operate in the near infrared spectrum and are thus is invisible to the human eye. Each computer runs a tracking algorithm that compares a preprogrammed image of the floor to the real time camera feed, and subtracts away any redundancy until only the difference features remain. The moving person can thus be isolated, identified, and followed, which triggers a red rectangular outline and grid pattern to appear. \r\n \r\nThe IR image now overlaid with tracking data undergoes a series of visual transformations. The powerful computers are able to make adjustments in cropping, scaling, warping, shifting, rotation, exposure, brightness, and sharpness, all within milliseconds. Only then are the “real time” images sent to the projector. The entirety of the 215 x 145 feet Drill Hall floor is covered by a total projection surface of 12360 x 7850 pixels, with each pixel being approximately ⅕ of an inch. \r\n \r\nThe projections enable visitors to reflect upon the growing web of interconnected devices designed with ever evolving sensing capabilities and make tangible the reality that we leave digital traces almost everywhere.", + "disabled": false, + "__index": 10, + "dateCreated": "Sat, 03 Jun 2017 19:11:30 GMT" } ], "stream": [ @@ -2508,19 +2524,31 @@ "streams": [ { "text": "Entrance", - "uri": "https://www.youtube.com/watch?v=fO_-p8bi_Lk" + "uri": "https://www.youtube.com/watch?v=r72Azq0C0_E" }, { "text": "Tunnel", - "uri": "https://www.youtube.com/watch?v=lDtcQID42Sg" + "uri": "https://www.youtube.com/watch?v=GON5zMPrG4M" }, { "text": "Exit", - "uri": "https://www.youtube.com/watch?v=Szu3aBo8taQ" + "uri": "https://www.youtube.com/watch?v=LeKgQdZLJuQ" + }, + { + "text": "Part 2 Left", + "uri": "https://www.youtube.com/watch?v=E_66XZcernM" + }, + { + "text": "Part 2 Right", + "uri": "https://www.youtube.com/watch?v=Pm6kg0wJws0" + }, + { + "text": "Infrared Cameras", + "uri": "https://www.youtube.com/watch?v=Kvo-_JxCj20" }, { - "text": "Part 2 Entrance", - "uri": "https://www.youtube.com/watch?v=ErXmu-t6JcE" + "text": "Drones", + "uri": "https://www.youtube.com/watch?v=9GLDrLDALoo" } ], "disabled": false, |
