1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
|
{
"timeline": [
{
"id": "camera-obscura",
"date": "Prehistoric, Paleolithic Age to Modernity",
"title": "Camera Obscura",
"medium": "Natural Phenomenon & Imagery",
"category": "Surveillance",
"keywords": "#Camera #Verticality #Linearity #Mimicry #Mimesis #Perspective #Reflection #Mirroring #Double #Duplication #Reproduction #Reproductivity #Self-consciousness #Eye #Surveillance #Photography #War #Painting #Police \r\n",
"description": "The 'Camera Obscura' is an optical phenomenon that occurs when an image is projected through a small hole on a screen or wall – as a reversed and inverted image on an opposite surface. The term \"camera obscura\" refers to constructions or devices that make use of that principle within a box, tent or room. Allegedly, early occurrences of camera obscura effects inspired paleolithic cave paintings. In the 18th century, the technology was first used to convey images of observed subjects, such that the observer remains invisible to the observed. The Camera Obscura is seen as a forerunner of modern photography and had a large influence on Renaissance art. According to the so called Hockney-Falco thesis in art history, advances in realism and accuracy in Western art during the Renaissance period were primarily the result of optical instruments such as the camera obscura.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d0610190-38d4-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
"width": "640",
"height": "328"
},
"links": [
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Camera_obscura"
}
],
"disabled": false,
"__index": 1,
"dateCreated": "Thu, 11 May 2017 11:39:53 GMT",
"credit": "Camera Obscura, French Encyclopédie, Denis Diderot, c. 1751-1772"
},
{
"id": "god-s-all-seeing-eye",
"date": "ca. 3rd century BCE to today",
"title": "God’s All-seeing Eye",
"medium": "Religious Idea",
"category": "Surveillance",
"keywords": "#Eye #God #Providence #Guilt #Order #Control #Ethics #Christianity #Judaism #Islam #Bible #education #Skies #Clouds #Manipulation #Illuminati #Kabbalah #Secrecy #Dialectic #Knowledge #Future #Present #Past #Synthesis\r\n",
"description": "The motif of the divine eye was spread throughout Europe in the wake of the Counter-Reformation. Its roots lie in the Antiquity, as well as in Jewish and Christian sources. Augustine described the religious idea of God’s all-seeing eye on a psychological level when he wrote: <i>And from Thee, O lord, unto whose eyes the abyss of man’s conscience is naked, what could be hidden in me though I would not confess it?</i> The psychic aspects of fear, control and education are lanced through the Antique iconography and culminated in the idea of God’s Providence. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f2d447f0-38d4-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
"width": "265",
"height": "300"
},
"disabled": false,
"__index": 3,
"dateCreated": "Thu, 11 May 2017 13:12:24 GMT",
"links": [
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Eye_of_Providence#/media/File:QuoModoDeum.gif"
}
],
"credit": "Woodcut from a book on alchemy showing the \"Eye in the Sky\" precursor to the Eye of Providence. Quo Modo Deum translates as 'This is the way of God' – artist unknown.\r\n"
},
{
"id": "public-health-surveillance",
"date": "14th century–today",
"title": "Public Health Surveillance",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Epidemiology #Health #Surveillance #Sickness #Control #Plague #Immunity #Sickness #Disease #Plague #BlackDeath #HIV #Biology #Pharma-Industry\r\n",
"description": "Following the WHO, Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as an early warning system for health emergencies and as documentation practice which informs of the impact of medical intervention. Health surveillance uses mortality data as a base for measuring public health, a practice that arose ca. 600 years ago in Europe as part of the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports have been used to collect data about HIV and AIDS – for example, population rates, number of people living with HIV and number of people who receive medical care. There have been various debates on human rights and civil liberties in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination based on sexual orientation.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9c33f610-38d5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
"width": "640",
"height": "626"
},
"links": [
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Public_health_surveillance"
},
{
"text": "WHO",
"uri": "http://www.who.int/topics/public_health_surveillance/en/"
}
],
"disabled": false,
"__index": 6,
"dateCreated": "Thu, 11 May 2017 13:22:04 GMT",
"credit": "Original map by John Snow showing the clusters of cholera cases in the London epidemic of 1854.\r\n"
},
{
"id": "the-field-has-eyes-the-forest-has-ears",
"date": "1546",
"title": "The Field has Eyes, the Forest has Ears",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Big Brother #Surveillance #Control #Gaze #Art",
"description": "The Dutch inscription above the main figure refers to an old saying, common in the 15th and 16th century: <i>The Field has Eyes / the Forest has Ears / I want to see, keep silent and hear.</i> It therefore admonishes one to be cautious what one says in public. This woodcut represents an early example on the idea of privacy and the awareness of surveillance.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f9a43fd0-38d5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
"width": "640",
"height": "410"
},
"disabled": false,
"__index": 7,
"dateCreated": "Thu, 11 May 2017 13:51:40 GMT",
"links": [],
"credit": "Unknown engraver (Netherlandish), The Field has Eyes, the Forest has Ears, 1546, woodcut, coloured © Staatliche Museen zu Berlin, Kupferstichkabinett, SMB, Photo: Jörg Anders"
},
{
"id": "black-chamber",
"date": "17th Century",
"title": "Black Chamber",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Big Brother #Surveillance #Control #Institution #Interception #Information #Secrets #Deciphering #Espionage #Privacy #Governments #Intelligence #Cryptology\r\n",
"description": "“Black Chamber” is the name used for secret decipher bureaus established as part of the postal system. Governmentally operated, the bureau would intercept letters, gather intelligence on political rivals and channel them back into the postal system without further notice. The most well-known cases were the Cabinet Noire in France run under Louis XIV, the Geheime Kabinettskanzlei (Secret Chancellery) in Vienna, Austria, and the British Room 40 - later called Bletchley Park, which became home to the greatest codebreakers. After World War One, the US established their first crypto-analytical institute to intercept correspondence of other nations. Operating under a bogus company based in New York City, the US Black Chamber was a direct predecessor of the National Security Agency (NSA).\r\n",
"image": {
"uri": "https://upload.wikimedia.org/wikipedia/commons/7/77/Bodleian_Libraries%2C_Le_cabinet_noir_ou-_les_pantins_du_19eme_si%C3%A8cle.jpg",
"caption": "",
"width": "751",
"height": "1000"
},
"links": [
{
"text": "NY Times",
"uri": "http://www.nytimes.com/2006/01/13/opinion/back-when-spies-played-by-the-rules.html"
},
{
"text": "NSA",
"uri": "https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/black-chamber.shtml"
}
],
"disabled": false,
"__index": 8,
"dateCreated": "Thu, 11 May 2017 13:54:19 GMT",
"credit": "public domain\r\n"
},
{
"id": "panopticon",
"date": "1791",
"title": "Panopticon",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Big Brother #Surveillance #Control #Bentham #Panopticon #Foucault #Prison #Institution #Totalitarianism #Observation\r\n",
"description": "Designed by Jeremy Bentham in the late 18th century, the Panopticon is an architectural draft for a circular institution with an observation tower in its centre. It is surrounded by an outer wall that contains cells for occupants. Residing within light-flooded cells, occupants would be visible to an official or guard, yet they would be invisible to each other, with concrete walls dividing their cells. Due to the bright lighting, occupants would not be able to tell if and when they were being watched. Although usually associated with prisons, panoptic architecture might be used in similar institutions with surveillance needs, such as schools, factories, or hospitals. \r\n",
"image": {
"uri": "https://upload.wikimedia.org/wikipedia/commons/thumb/1/11/Panopticon.jpg/544px-Panopticon.jpg",
"caption": "",
"width": "544",
"height": "600"
},
"links": [
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Panopticon"
}
],
"disabled": false,
"__index": 9,
"dateCreated": "Thu, 11 May 2017 13:56:03 GMT",
"credit": "Jeremy Bentham, plan of the Panopticon / 1791 / in The works of Jeremy Bentham vol. IV, 172-3 / public domain"
},
{
"id": "hot-air-balloon-bombing-",
"date": "1849",
"title": "Hot Air Balloon Bombing ",
"medium": "Image",
"category": "Drones",
"keywords": "#Drones #UAV #Airstrike #Attack #Military #Warfare #Venice #Austria",
"description": "Arguably, this was the first drone strike in history: In August 22nd 1849 Venice was bombarded by unmanned balloons launched by the Austrians, who controlled much of Italy at the time. The experimental approach of using hot air balloons, which carried ordnance, was a consequence of the actual topography of Venice. Since the city was surrounded by water, the Austrian artillery could not intrude. This incident is the first known use of aerial bombing. \r\n\r\nThe image below illustrates an artistic interpretation of the bombing from a Russian source. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/a0e0c8c0-4a4e-11e7-ad41-938ea8af50c1.jpg",
"caption": "",
"width": "500",
"height": "752"
},
"links": [
{
"text": "CTIE History",
"uri": "http://www.ctie.monash.edu/hargrave/rpav_home.html#Beginnings"
}
],
"disabled": false,
"__index": 10,
"dateCreated": "Thu, 11 May 2017 13:58:11 GMT",
"credit": "Bombing by Balloon, 1848. Source: Prof. Jurij Drushnin, Moscow, Russia"
},
{
"id": "boston-as-the-eagle-and-the-wild-goose-see-it",
"date": "1860",
"title": "Boston, as the Eagle and the Wild Goose See It",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Aerial-Photography #Verticality #Photography\r\n",
"description": "The photographer J.W. Black launched his solo career in 1860 with the production of a series of photographs taken from Samuel King's hot-air balloon, the \"Queen of the Air.\" Black's views of Boston were the first aerial photographs taken in the US. Two years earlier, the French photographer Nadar had made history with similar views of Paris.\r\n\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/c505b300-3653-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "530",
"height": "625"
},
"credit": "James Wallace Black / 1860 / Public Domain\r\n",
"links": [
{
"text": "Met Museum",
"uri": "http://www.metmuseum.org/art/collection/search/283189"
}
],
"disabled": false,
"__index": 11,
"dateCreated": "Thu, 11 May 2017 14:12:33 GMT"
},
{
"id": "angel-copier",
"date": "1873",
"title": "Angel Copier",
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Prison #Photography #Biometrics #Photography\r\n",
"description": "In Victorian times, photography was used for the identification of prisoners. It was perceived as a more humane alternative to branding them. Some Victorian police would refer to the camera as ‘angel copier‘. This engraving depicts a prisoner resisting being photographed.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/26cab0e0-3654-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "371",
"height": "226"
},
"credit": "Samuel Luke Fildes / The Graphic / 1873 via Jennifer Tucker",
"links": [
{
"text": "Boston Globe",
"uri": "https://www.bostonglobe.com/ideas/2014/11/23/facial-recognition-technology-goes-way-back/CkWaxzozvFcveQ7kvdLHGI/story.html"
}
],
"disabled": false,
"__index": 12,
"dateCreated": "Thu, 11 May 2017 14:15:46 GMT"
},
{
"id": "fingerprints-for-identification",
"date": "1880s",
"title": "Fingerprints for Identification",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Biometrics #Prison #Information #Control #Identification #Police\r\n",
"description": "Fingerprint characteristics were studied as far back as the mid-1600s and used as means of identification by British colonialists in India in the mid 19th century. Several people are credited with classifying the fingerprinting system for means of identification in the criminal sector. Sir Francis Galton, a British anthropologist, published a book on the forensic science of fingerprints and claimed the chance of two people having the same fingerprint was about one in 64 million. Henry Faulds, a Scottish scientist, hit upon the idea while on an archaeological dig and soon after used it to exonerate one of his staff who was accused of robbery. Edward Henry, a British police commissioner, developed the Henry Classification System, which served to sort fingerprints by their physiological characteristics, and was the basis of the modern-day Automated Fingerprint Identification System (AFIS) which was used up until the 1990s. The image above indicates the beginnings of fingerprinting, implemented in 1858 by Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India, in a contract with a local businessman.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/cc92b950-3654-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "331"
},
"credit": "Sir William James Herschel, “The Origin of Finger Printing\" 1916., (Public Domain)",
"links": [
{
"text": "ONIN",
"uri": "http://www.onin.com/fp/fphistory.html"
},
{
"text": "Archive.org",
"uri": "https://archive.org/details/originoffingerpr00hersrich"
}
],
"disabled": false,
"__index": 13,
"dateCreated": "Thu, 11 May 2017 14:19:50 GMT"
},
{
"id": "bertillonage",
"date": "1880",
"title": "Bertillonage",
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Biometrics #Prison #Information #Photography #Police #Identification #Technology\r\n",
"description": "Bertillonage is a system of measuring and categorizing individuals, also known as anthropometry. It was named after the French criminologist and anthropologist Alphonse Bertillon and used by the Parisian police from 1883 to track and identify criminals. In addition to a frontal and profile portrait photograph (the ‘mug shot‘), the body measurements and feature classifications of the individual were collected on a card. The cards were then systematically filed so they could be easily retrieved. The Bertillonage system was later adopted by police forces in Great Britain, Europe and the Americas until it was replaced by fingerprinting in the early 20th century.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/38befc10-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "638"
},
"credit": "Creative Commons CC0 1.0 Universal Public Domain Dedication\r\n",
"links": [
{
"text": "NIH",
"uri": "https://www.nlm.nih.gov/visibleproofs/galleries/biographies/bertillon.html"
}
],
"disabled": false,
"__index": 14,
"dateCreated": "Thu, 11 May 2017 14:22:47 GMT"
},
{
"id": "metric-photography",
"date": "1908",
"title": "Metric Photography",
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Biometrics #Verticality #Photography #All-Seeing Eye\r\n",
"description": "In 1903, Alphonse Bertillon, who is known to have standardized identification methods for criminals and credited with the invention of the mug shot, introduced metric photography to investigate crime scenes. He constructed a tripod about two meters high, with which one could take vertical perspective photographs of murder victims at the place of their death. Thus it was possible to document the deceased with full photographic evidence. He referred to the overhead perspective as a “God’s-eye view”. Bertillon's metric photography was applied at the criminal department of forensic medicine and anthropology in France. The photo depicts a demonstration with a false corpse.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/81cf0e40-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "473"
},
"credit": "(1) Rodolphe A Reiss, Demonstration of the Bertillon metric photography system, 1925. © RA Reiss, courtesy of Collection of the Institut de Police Scientifique et de Criminologie de l’Université de Lausanne.\r\n(2) A demonstration of the Bertillon metric photography system, 1908 Credit: Archives de la préfecture de Police \r\n",
"links": [
{
"text": "Archive.org",
"uri": "https://archive.org/details/cu31924096442185"
}
],
"disabled": false,
"__index": 15,
"dateCreated": "Thu, 11 May 2017 14:24:53 GMT"
},
{
"id": "aelita-queen-of-mars",
"date": "1924",
"title": "Aelita: Queen of Mars",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Telescope #Television #silent film #totalitarianism #futurism #gaze #observation #radio\r\n",
"description": "Decades before cameras were used for surveillance, the Soviet film <i>Aelita: Queen of Mars</i> was one of the first to depict television as an instrument of those in power to oversee the working class. In the film, a mysterious radio message is beamed around the world; among the engineers who receive it are Los, the film’s hero, and his colleague Spiridonov. Los is an individualistic dreamer. Aelita is the daughter of Tuskub, the ruler of a totalitarian state on Mars. With a telescope, Aelita is watching Los. As if through telepathy, Los becomes obsessed about being watched by her.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/cf791af0-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "375",
"height": "300"
},
"credit": "",
"links": [
{
"text": "IMDB",
"uri": "http://www.imdb.com/title/tt0014646/"
},
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Aelita"
}
],
"disabled": false,
"__index": 16,
"dateCreated": "Thu, 11 May 2017 14:27:00 GMT"
},
{
"id": "the-castle",
"date": "1926",
"title": "The Castle",
"medium": "Novel",
"category": "Surveillance",
"keywords": "#Castle #paranoia #despotism #All-seeing-Eye\r\n",
"description": "Franz Kafka’s <i>The Castle</i> depicts a world dominated by uncertainty: everything is opaque and ambiguous. The protagonist, K., arrives in a village where he might have been summoned to work as a land surveyor. The villagers seem to be expecting and not expecting him at the same time; there seems to be a job – and no job. Governing the village is a castle from which officials give contradicting orders. Even though the castle’s bureaucracy seems arbitrary or incompetent, the inhabitants of the village hold the officials and the castle in the highest esteem, while completely ignoring the reasons behind any of the officials’ decisions. Though Kafka’s novel does not feature any actual surveillance technology – and it is further unclear if the bureaucracy of the officials is actually efficient – the general atmosphere is one of mistrust, paranoia, and despotism that is commonly associated with a surveillance society. \r\n\r\nQuote : “I dream of a grave, deep and narrow, where we could clasp each other in our arms as with clamps, and I would hide my face in you and you would hide your face in me, and nobody would ever see us any more”",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/0fb161e0-3656-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "180",
"height": "281"
},
"credit": "",
"disabled": false,
"__index": 17,
"dateCreated": "Thu, 11 May 2017 14:29:05 GMT",
"links": [
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/The_Castle_(novel)"
}
]
},
{
"id": "queen-bee-and-drone",
"date": "1932",
"title": "Queen Bee and Drone",
"medium": "Item / Image",
"category": "Drones",
"keywords": "#Drone #Warfare #Airstrikes #Technology #Airplanes #Attack #UAV #Technology\r\n",
"description": "Investment into development of remotely controlled vehicles increased after World War I. Although the DH-82B Queen Bee had many predecessors, it was the first full production, fully-sized, reusable, pilotless aircraft that was used for anti-aircraft gunnery practice. It was designed by engineer Geoffrey Havilland from the British Air Force, who was a passionate amateur entomologist and would name his aircraft after insects (Tiger Moth, Fox Moth, Mosquito, and Dragonfly). In 1935, a US Navy admiral visited the Royal Air and observed a demonstration of the Queen Bee. Upon his return to the US, he requested development of a similar system for gunnery training and adopted the name <i>drone</i>, as an homage to the Queen Bee. Since then, the name drone became a designation for remotely flown aircraft systems.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/60afc9b0-3656-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "432"
},
"credit": "Imagecourtesy: A demonstration of the Queen Bee, controlled over a panel from the ground. Royal Air Force\r\n",
"links": [
{
"text": "Vintage Wings",
"uri": "http://www.vintagewings.ca/VintageNews/Stories/tabid/116/articleType/ArticleView/articleId/484/The-Mother-of-All-Drones.aspx"
},
{
"text": "Defense News",
"uri": "http://intercepts.defensenews.com/2013/05/the-origin-of-drone-and-why-it-should-be-ok-to-use/"
}
],
"disabled": false,
"__index": 18,
"dateCreated": "Thu, 11 May 2017 14:31:55 GMT"
},
{
"id": "world-without-a-mask-",
"date": "1934",
"title": "World Without A Mask ",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Television #Surveillance #Misuse #Technology\r\n",
"description": "In the German film production <i>World Without a Mask</i> (1934) an engineer accidentally invents a television apparatus which can see through walls. Soon enough, the criminal underworld wants to profit from this technology.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d076e670-3656-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "436",
"height": "640"
},
"credit": "unknown\r\n",
"links": [
{
"text": "IMDB",
"uri": "http://www.imdb.com/title/tt0025968/"
}
],
"disabled": false,
"__index": 19,
"dateCreated": "Thu, 11 May 2017 14:34:17 GMT"
},
{
"id": "hollerith-punchcards",
"date": "World War II Era, ca. 1934",
"title": "Hollerith Punchcards",
"medium": "Item",
"category": "Surveillance",
"keywords": "#All-Seeing Eye #Punchcard #Big-Data #Surveillance #Germany #Fascism #Computing #World War II #Identification",
"description": "This poster advertised Hollerith punchcard technology from IBM's German subsidiary DEHOMAG (Deutsche Hollerith Maschinen Gesellschaft). The English translation is, <i>See everything with Hollerith punchcards</i>. This early computing system was used by Nazi Germany to track and identify Jews and other minorities and ultimately helped facilitate the Holocaust.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/6b9f0dd0-3657-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "455",
"height": "619"
},
"credit": "Edwin Black in IBM and the Holocaust / 2001\r\n",
"links": [
{
"text": "Jewish Virtual Library",
"uri": "http://www.jewishvirtuallibrary.org/ibm-and-quot-death-s-calculator-quot"
},
{
"text": "NY Times",
"uri": "http://www.nytimes.com/books/first/b/black-ibm.html"
}
],
"disabled": false,
"__index": 20,
"dateCreated": "Thu, 11 May 2017 14:38:32 GMT"
},
{
"id": "u-s-one-dollar-bill",
"date": "1935",
"title": "U.S. One-Dollar Bill",
"medium": "Item",
"category": "Surveillance",
"keywords": "#USA #All-Seeing Eye #Governments\r\n",
"description": "The All-Seeing Eye of God famously appears on the reverse of the US $1 dollar bill. Atop an unfinished thirteen step pyramid and surrounded by rays of light, it is part of the symbolism of the Great Seal of the United States. The usage of the Eye on the seal dates back to 1782. The All-Seeing Eye or the Eye of Providence is often interpreted as representing the eye of God keeping watch over humankind, and was often utilized by the Freemasons. As a result, the design of the one-dollar bill has been subject to several conspiracy theories.\r\n\r\nSurrounding the eye and pyramid are the latin phrases \"Annuit Cœptis\", meaning \"He approves (or has approved) our undertakings\" and \"Novus Ordo Seclorum,\" meaning \"New Order of the Ages\". In 1957 the phrase \"In God We Trust\" was added, which completes the design in use today.\r\n\r\nThe image depicts former President Franklin D. Roosevelt approving the design with the condition that the order of the seal should be reversed so the phrase \"of the United States\" would be under the obverse of the Seal.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/305885b0-38c5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
"width": "640",
"height": "413"
},
"credit": "public domain, 1935\r\n",
"links": [
{
"text": "US Currency.gov",
"uri": "https://www.uscurrency.gov/content/history-american-currency"
}
],
"disabled": false,
"__index": 21,
"dateCreated": "Thu, 11 May 2017 14:44:14 GMT"
},
{
"id": "the-turing-machine-",
"date": "1936",
"title": "The Turing Machine ",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Turing-Machine #Computing #Encryption #Computer-Science #Warfare #Espionage #Codebreaking #Intelligence #Enigma \r\n",
"description": "A Turing machine is a hypothetical machine conceived of by the mathematician Alan Turing in 1936. Despite its simplicity, it can simulate any algorithm. The Turing machine is considered as the first mathematical model of computation and therefore is the blueprint for the modern computer. It was used at the time of its development to break a supposedly unbreakable encryption system called “Enigma”, which the Nazis developed and applied during World War II.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/95eeb300-3658-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "92"
},
"credit": "",
"links": [
{
"text": "New Yorker",
"uri": "http://www.newyorker.com/magazine/2006/02/06/code-breaker"
},
{
"text": "Introduction",
"uri": "https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/turing-machine/one.html"
}
],
"disabled": false,
"__index": 22,
"dateCreated": "Thu, 11 May 2017 14:46:58 GMT"
},
{
"id": "spy-in-the-sky-",
"date": "1936",
"title": "Spy in the Sky ",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Spy #World War II #All-Seeing Eye #Aerial Surveillance #Photography #Warfare #Technology\r\n",
"description": "Originated by Julius Neubronners in 1907, pigeons outfitted with cameras were instrumental in early aerial photography. Pigeon-based espionage was commonly used in World War II by Great Britain, Germany and the US. Later, the CIA used pigeons for top secret reconnaissance missions.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1edb3b10-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "427",
"height": "640"
},
"credit": "AR/BNPS\r\n",
"links": [
{
"text": "Audubon Society",
"uri": "http://www.audubon.org/news/eyes-sky-short-history-bird-spies"
},
{
"text": "Royal Pigeon Racing Assn.",
"uri": "http://www.rpra.org/pigeon-history/pigeons-in-war/"
}
],
"disabled": false,
"__index": 23,
"dateCreated": "Thu, 11 May 2017 14:58:04 GMT"
},
{
"id": "five-eyes",
"date": "1946",
"title": "Five Eyes",
"medium": "Political Agreement",
"category": "Surveillance",
"keywords": "#Surveillance #Control #Governments #FiveEyes #Big Brother #Espionage #Intelligence #Information #NSA #Politics #Pentagon #Secrets #Secret Service #Signals\r\n",
"description": "The Five Eyes alliance is a secret surveillance arrangement comprising Australia, Canada, New Zealand, United Kingdom and the United States of America. It originated as early as 1946 with a series of bilateral agreements that became known as the UKUSA agreement, with the goal of sharing intelligence, primarily signal intelligence (aka SIGINT) between the members. Since the Cold War, the alliance has been building a global surveillance infrastructure to spy on the world’s communications, with an emphasis placed on monitoring the World Wide Web since the US declared its \"war on terror\" in 2001.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/6d6176f0-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "424",
"height": "599"
},
"credit": "Cover of the UKUSA Agreement 1946, Public Domain\r\n",
"links": [
{
"text": "Privacy Intl.",
"uri": "https://www.privacyinternational.org/node/51"
}
],
"disabled": false,
"__index": 24,
"dateCreated": "Thu, 11 May 2017 14:59:45 GMT"
},
{
"id": "moonbounce",
"date": "1946",
"title": "Moonbounce",
"medium": "Program",
"category": "Surveillance",
"keywords": "#Moon #Surveillance #Interception #Signal #Covert Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n",
"description": "Moonbounce describes the phenomenon that man-made signals emanating from Earth would bounce back from the moon and could be detected from other locations. The radar-reflective characteristics of the lunar surface were successfully tested in 1946. This phenomenon was used in the early 1960s in a US Air Force project, codenamed FLOWER GARDEN, to monitor and intercept radar signals from the Soviet Union. Several antennas around the US were used for moonbounce – also operated by the CIA and the NSA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b0a50210-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "637",
"height": "640"
},
"credit": "NASA, 1969\r\n",
"links": [
{
"text": "National Security Archive",
"uri": "http://nsarchive.gwu.edu/NSAEBB/NSAEBB479/"
}
],
"disabled": false,
"__index": 25,
"dateCreated": "Thu, 11 May 2017 15:01:35 GMT"
},
{
"id": "george-orwell-1984-",
"date": "1949",
"title": "George Orwell, “1984”",
"medium": "Book",
"category": "Surveillance",
"keywords": "#Dystopia #Big Brother #All-Seeing Eye #Literature #Control\r\n",
"description": "George Orwell’s <i>Nineteen Eighty-Four</i> is the most well-known cultural expression of fear of surveillance and a powerful metaphor for the totalitarian potentials of any bureaucratic state. Evocations of a menacing “Big Brother” have become commonplace in discussions about surveillance and control, and so have debates about whether or not Orwell was “right” in his predictions as portrayed in the book.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1127e300-365b-11e7-a37a-4579121b15f0.jpg",
"caption": "Quotes: \r\n– “Who controls the past controls the future. Who controls the present controls the past.”\r\n– “The best books... are those that tell you what you know already”\r\n\r\n",
"width": "430",
"height": "640"
},
"credit": "First Edition, published 1949, Secker & Warburg \r\n",
"disabled": false,
"__index": 26,
"dateCreated": "Thu, 11 May 2017 15:05:14 GMT",
"links": []
},
{
"id": "fake-beard-seminars",
"date": "1950–1989",
"title": "Fake Beard Seminars",
"medium": "Photographs",
"category": "Surveillance",
"keywords": "#Photography #Germany #Spy #Ethics #Information #Covered Operation #Secrets #Privacy #Police #Camouflage\r\n",
"description": "The personnel of the Ministry for State Security of East Germany, commonly known as Stasi, one of the most effective surveillance apparatuses ever, was trained on how to disguise themselves to move inconspicuously in society. The photo shows an instruction seminar on affixing fake facial hair properly – a Stasi’s standard practice. Other seminars would train the agents on how to wear wigs or dress as a western tourist. Such seminars were documented for training purposes and made into manuals.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/8b6538c0-365b-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "427"
},
"credit": "© Simon Menner and BStU 2017",
"links": [
{
"text": "Simon Menner",
"uri": "https://simonmenner.com/_sites/SurveillanceComplex/StasiImages/_StasiImagesMenue.html#"
}
],
"disabled": false,
"__index": 27,
"dateCreated": "Thu, 11 May 2017 15:08:41 GMT"
},
{
"id": "calibration-targets-for-spy-satellites",
"date": "1950–60",
"title": "Calibration Targets for Spy Satellites",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Reconnaissance #All-Seeing Eye #Aerial Surveillance #Spy Satellite #Top-Secret #Cold-War #Verticality #Aerial-Photography #NASA #Photography #Geography #Technology\r\n",
"description": "In the development of early aerial photography and aircraft in the 1950s and 1960s, several large-scale photo calibration targets were installed across the USA. Made of concrete or asphalt covered with black and white paint, they functioned as eye charts for the cameras of spy satellites. Mainly located on non-public, military ground, they are physical artefacts of early aerial surveillance, but today can be found virtually on Google Maps.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/790be2d0-365d-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "440"
},
"credit": "Calibration target from the photo resolution range, Edwards Air Force Base; Google Maps\r\n",
"disabled": false,
"__index": 28,
"dateCreated": "Thu, 11 May 2017 15:21:39 GMT",
"links": []
},
{
"id": "rear-window",
"date": "1954",
"title": "Rear Window",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Film #Watching #Investigation #Surveillance #Camera #Architecture #Evidence #Photography #Public #Private\r\n",
"description": "Alfred Hitchcock‘s ‘Rear Window’ tells the story of a photojournalist who is confined to his New York City apartment after suffering an injury. While observing the daily life of his neighbours through the rear window, he suspects that the man across the courtyard murdered his wife. Bound to his wheelchair, he enlists the help of his fashionable high-society girlfriend and his visiting nurse to investigate.\r\n\r\nThe movie addresses issues of the private and public in a tense, urban architecture. While the neighbours are visible to the protagonist, his surveillance goes unseen until the moment he draws attention to the suspected murderer, who then attempts to kill him.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f54cd0c0-365d-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "456",
"height": "456"
},
"credit": "screenshot\r\n",
"links": [
{
"text": "The Guardian",
"uri": "https://www.theguardian.com/film/filmblog/2012/jul/25/my-favourite-hitchcock-rear-window"
}
],
"disabled": false,
"__index": 29,
"dateCreated": "Thu, 11 May 2017 15:25:23 GMT"
},
{
"id": "acoustic-kitty",
"date": "1960s",
"title": "Acoustic Kitty",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Cold-War #Espionage #CIA #Bug #Intelligence #Technology #Device\r\n",
"description": "In the 1960s the CIA experimented with live cats as eavesdropping devices to spy on America’s cold war rivals. In the operation known as “Acoustic Kitty”, a cat was surgical accommodated with electronic spying equipment: a microphone in the cat’s ear canal, a radio transmitter and an antenna wire along its spine and tail. It was even possible to direct it with ultrasonic sound. The first test to spy on a conversation of two people on a park bench was a failure, as the cat was run over by a taxi almost immediately after released out of the CIA researchers van. The project took 5 years in development and cost $15 million.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/493c6510-365e-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "447"
},
"credit": "unknown\r\n",
"links": [
{
"text": "The Guardian",
"uri": "https://www.theguardian.com/world/2001/sep/11/worlddispatch"
},
{
"text": "National Security Archive",
"uri": "https://nsarchive.wordpress.com/2010/03/05/document-friday-acoustic-kitty/"
}
],
"disabled": false,
"__index": 30,
"dateCreated": "Thu, 11 May 2017 15:27:58 GMT"
},
{
"id": "corona-first-reconnaissance-satellite-image",
"date": "1960",
"title": "Corona First Reconnaissance Satellite Image",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Reconnaissance #All-Seeing Eye #Aerial Surveillance #Spy Satellite #Top-Secret #Cold-War #Photography\r\n",
"description": "Corona was the codeword of the first successful reconnaissance satellites program led by the CIA from 1959 to 1972. Its mission was to gather photographic intelligence, mainly of the Soviet Union. The first photo taken on August 8, 1960 was a grainy image of a Soviet Airfield. Originally classified as top secret, it was declassified in 1995 under an Executive Order signed by President Bill Clinton.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/bdd3a780-365e-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "499",
"height": "640"
},
"credit": "Courtesy: NRO / Public Domain",
"links": [
{
"text": "NRO",
"uri": "http://www.nro.gov/history/csnr/corona/factsheet.html"
},
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Corona_(satellite)#Declassification"
}
],
"disabled": false,
"__index": 31,
"dateCreated": "Thu, 11 May 2017 15:31:46 GMT"
},
{
"id": "first-cia-facial-recognition-proposal",
"date": "1963",
"title": "First CIA facial recognition proposal",
"medium": "Document",
"category": "Facial Recognition",
"keywords": "#CIA #Facial Recognition #Biometrics #Classified Information #Computing #Technology\r\n",
"description": "In 1963 Dr. Woodrow Wilson Bledsoe, a pioneer in artificial intelligence, submitted a facial recognition report to the King-Hurley Research group – a front organization of the CIA – that included systems noting key facial features to identify faces, for example the width of the mouth or between the eyes. The report constitutes the first known attempt of semi-automated computerized facial recognition.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1a6e18c0-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "441",
"height": "517"
},
"credit": "",
"links": [
{
"text": "Original Study",
"uri": "https://archive.org/details/firstfacialrecognitionresearch"
}
],
"disabled": false,
"__index": 33,
"dateCreated": "Thu, 11 May 2017 15:47:33 GMT"
},
{
"id": "teufelsberg-devil-s-mountain-berlin",
"date": "1963",
"title": "Teufelsberg (“Devil’s Mountain”), Berlin",
"medium": "Item",
"category": "Surveillance",
"keywords": "#NSA #Surveillance #Covert Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n",
"description": "Teufelsberg (translated as “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was formed in the 20 years following World War II from debris cleared from the destroyed city of Berlin. In 1963 the NSA built a permanent listening station atop the mountain, to spy on its eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. This unique history makes Teufelsberg a tourist attraction.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/617c4070-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "632",
"height": "508"
},
"credit": "US Army Intelligence & Security Command\r\n",
"links": [
{
"text": "Deutsche Welle",
"uri": "http://www.dw.com/en/teufelsberg-mirrors-berlins-dramatic-history/a-17074597"
}
],
"disabled": false,
"__index": 34,
"dateCreated": "Thu, 11 May 2017 15:49:16 GMT"
},
{
"id": "blow-up",
"date": "1966",
"title": "Blow Up",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Espionage #Camera #Film #Evidence #Photography #Arts #Surveillance #Watching #Conspiracy\r\n",
"description": "In the legendary 1960s movie <i>Blow Up</i>, a London fashion photographer unwittingly captures a crime in a park. In the title scene, he blows up the photograph and finds blurry evidence of the murder. When he starts investigating, the camera assumes a leading role in the narrative, addressing issues of reality, illusion and conspiracy.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9ab4b070-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "600",
"height": "411"
},
"credit": "unknown\r\n",
"links": [
{
"text": "The Guardian",
"uri": "https://www.theguardian.com/film/2017/mar/10/antonioni-blow-up-50-years-movie-photographer-murder"
}
],
"disabled": false,
"__index": 35,
"dateCreated": "Thu, 11 May 2017 15:50:52 GMT"
},
{
"id": "echelon",
"date": "1966",
"title": "ECHELON",
"medium": "Program",
"category": "Surveillance",
"keywords": "#Espionage #Surveillance #Spy Satellite #Top-Secret #Cold-War #Big Brother #Governments #Intelligence #NSA #FiveEyes #Privacy #Snowden #Whistleblowing #Police State #Civil Rights #Interception #Radome #Technology\r\n",
"description": "ECHELON is the codename given to a secret international electronic eavesdropping network run by the Five Eyes Alliance. Created in 1966, its aim was to spy on diplomatic and military communication during the Cold War by intercepting satellites. By the end of the 20th century, civil right groups and privacy advocates believe it had become the first-ever automated, global, mass surveillance program, spanning much further than intercepting satellites, but literally listening to everybody. Echelon captured all communication traffic and ran it through content-sensitive dictionaries of keywords - anything intelligence services deem to be “suspicious.”\r\n\r\nAlthough the NSA and the GCHQ denied the existence of ECHELON, the European Parliament launched an investigation in 1999. Internal reports, disclosed by Edward Snowden confirmed ECHELON's existence.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d9a13d80-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "343"
},
"credit": "First ECHELON station intercepting Intelsat Atlantic and Indian Ocean area satellites: Bude, Cornwal.",
"links": [
{
"text": "First Look",
"uri": "https://firstlook.org/wp-uploads/sites/1/2015/07/rexusa_2569089a-1024x428.jpg"
},
{
"text": "The Intercept",
"uri": "https://theintercept.com/2015/08/03/life-unmasking-british-eavesdroppers/"
},
{
"text": "EU Parliament",
"uri": "http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN"
},
{
"text": "Der Spiegel",
"uri": "http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html"
}
],
"disabled": false,
"__index": 36,
"dateCreated": "Thu, 11 May 2017 15:52:41 GMT"
},
{
"id": "the-internet",
"date": "1969",
"title": "The Internet",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Internet #Network #Big Data #Computing #Digital Rights #Metadata #Net Politics\r\n",
"description": "The origins of the Internet date back to the 1960s, when the US federal government commissioned research to develop more robust and efficient communication via computer networks. The Internet is an interconnected network that consists of private, public, academic, business, and government networks from local to a global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services. The vast majority of today’s computer surveillance involves the monitoring of data and traffic on the Internet.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/464a9f80-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "360"
},
"credit": "The Opte Project, Internet Map 2003, (This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License) © 2014 by LyonLabs, LLC and Barrett Lyon\r\n",
"links": [
{
"text": "Internet Society",
"uri": "http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#"
}
],
"disabled": false,
"__index": 38,
"dateCreated": "Thu, 11 May 2017 15:55:43 GMT"
},
{
"id": "insectothopter",
"date": "1970s",
"title": "Insectothopter",
"medium": "Item",
"category": "Drones",
"keywords": "#CIA #Animal Kingdom #Drone #Bug #Espionage #Robot #UAV #Intelligence #Technology #Device\r\n",
"description": "In the 1970s, the CIA built a prototype for miniature UAVs (Unmanned Aerial Vehicles) for collecting intelligence in the form of a dragonfly. The insectothopter, as they called it, was a robotic dragonfly that functioned as a audio bug. It was powered by a motor, propelled by a small amount of gas and guided by a laser beam in the rear of the dragonfly-drone. A watchmaker adapted the UAV to the actual scale size of a real dragonfly. After the insectothopter proved too unstable in crosswinds, the project was abandoned.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/8d80c190-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "426"
},
"credit": "CIA\r\n",
"links": [
{
"text": "CIA",
"uri": "https://www.cia.gov/library/video-center/video-transcripts/insectothopter-the-bug-carrying-bug.html"
},
{
"text": "Atlas Obscura",
"uri": "http://www.atlasobscura.com/articles/object-of-intrigue-the-cia-s-dragonfly-drone"
}
],
"disabled": false,
"__index": 39,
"dateCreated": "Thu, 11 May 2017 15:57:41 GMT"
},
{
"id": "thx-1138",
"date": "1971",
"title": "THX 1138",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Surveillance #Camera #Drugs #Emotions #Android #Police #Computers #Film\r\n",
"description": "With the spread of surveillance camera technology in public spaces, as well as the rising significance of computers and databases in the late 1960s, more films became concerned with the prospect of living in a world of pervasive surveillance. <i>THX 1138</i>, George Lucas’ remake of his short film <i>Electronic Labyrinth: THX 1138 4EB</i> (1967), is one of those early reactions to an increasingly surveilled society. It shows a dystopian future in which total control over society is exercised by computers, surveillance cameras, and android police officers. Conformity and homogeneity are a basic rule. THX 1138 is a factory worker who produces android police officers, is given a glimpse into the other side through his computer matched and assigned female roommate, LUH 3417 and her surveillance colleague.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e0127390-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "287"
},
"credit": "",
"links": [
{
"text": "Original Short",
"uri": "https://www.youtube.com/watch?v=ihpU1RE_AhA"
},
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/THX_1138"
},
{
"text": "IMDB",
"uri": "http://www.imdb.com/title/tt0066434/"
}
],
"disabled": false,
"__index": 40,
"dateCreated": "Thu, 11 May 2017 16:00:10 GMT"
},
{
"id": "stevie-wonder-big-brother",
"date": "1972",
"title": "Stevie Wonder – Big Brother",
"medium": "Song",
"category": "Surveillance",
"keywords": "#Surveillance #All-Seeing Eye #Big Brother #Control #Dystopia #Privacy #Totalitarianism #Music\r\n",
"description": "Stevie Wonder's studio album <i>Talking Book</i>, which was released in 1972, includes the song \"Big Brother\". The song is a serene composed electro-folk ballad in protest against the Nixon presidency and its surveillance culture. It features the lyrics: <i>Your name is big brother / You say that you're watching me on the tele / Seeing me go nowhere / Your name is big brother / You say that you're tired of me protesting / Children dying everyday / My name is nobody / But I can't wait to see your face inside my door ooh</i>\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/75d62da0-36e9-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "640"
},
"credit": "Motown Records / Tamla Records",
"disabled": false,
"__index": 41,
"dateCreated": "Fri, 12 May 2017 08:05:15 GMT",
"links": []
},
{
"id": "blue-marble",
"date": "1972",
"title": "Blue Marble",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Verticality #NASA #Photography\r\n",
"description": "This famous photo taken by the Apollo 17 crew on December 7th, 1972, on their way to the moon, is the first image to show the full disc of the Earth. It was taken from a distance of 28,000 miles (45,000 km), and changed the way we look at our planet. It marks the shift of perspective – from horizontal to vertical – similar to the god's eye perspective.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e772f4c0-36e9-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "639",
"height": "640"
},
"credit": "NASA / Public Domain, 1972\r\n",
"links": [
{
"text": "Earth Observatory",
"uri": "https://earthobservatory.nasa.gov/Features/BlueMarble/BlueMarble_history.php"
}
],
"disabled": false,
"__index": 42,
"dateCreated": "Fri, 12 May 2017 08:07:05 GMT"
},
{
"id": "the-conversation",
"date": "1973",
"title": "The Conversation",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Wire Tapping #Surveillance #Deception #Bugs \r\n",
"description": "<i>The Conversation</i> assigns its central character a remarkable role. Even though Harry Caul is portrayed as a leading audio surveillance expert, he fails to understand the meaning of his secret recordings and ends up trapped in a net of deception. In the final scene of the film, Caul destroys his apartment in a frustrated and unsuccessful attempt to locate the bug that was planted in his home.\r\n\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1a7bd890-4771-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "620",
"height": "372"
},
"credit": "Gene Hackman as Harry Caul in The Conversation. Photograph: Allstar/Paramount \r\n",
"links": [
{
"text": "The Guardian",
"uri": " https://www.theguardian.com/film/2017/mar/07/six-surveillance-films-make-trump-paranoid"
},
{
"text": "IMDB",
"uri": "http://www.imdb.com/title/tt0071360/"
}
],
"disabled": false,
"__index": 44,
"dateCreated": "Fri, 12 May 2017 08:09:25 GMT"
},
{
"id": "judas-priest-electric-eye",
"date": "1982",
"title": "Judas Priest – Electric Eye",
"medium": "Song",
"category": "Surveillance",
"keywords": "#Surveillance #Spy-Satellite #All-Seeing Eye #Big Brother #Control #Dystopia #Privacy #Totalitarianism #Verticality #Music\r\n",
"description": "In 1982, the heavy metal band Judas Priest released their album <i>Screaming for Vengeance<i> which features the song “Electric Eyes”. It is seen as an allusion to George Orwell's mass-surveillance themed <i>1984</i> and the all-seeing eye of a government one can not escape. It particular, the song refers to spy-satellites. An excerpt of the lyrics reads: <i>Up here in space / I'm looking down on you / My lasers trace / Everything you do / You think you've private lives / Think nothing of the kind / There is no true escape / I'm watching all the time.</i>",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b3dc9910-36ec-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "438",
"height": "640"
},
"credit": "Copyright 2000-2008 Judas Priest Music Ltd\r\n",
"links": [
{
"text": "Link text ",
"uri": "https://genius.com/Judas-priest-electric-eye-lyrics"
}
],
"disabled": false,
"__index": 48,
"dateCreated": "Fri, 12 May 2017 08:26:35 GMT"
},
{
"id": "olfactory-surveillance-",
"date": "1985",
"title": "Olfactory Surveillance ",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Surveillance #Germany #Scent #Stasi #GDR #Identification",
"description": "The Stasi (Former GDR Ministry of State Security) applied a whole range of methods and means to try to track down suspects or critics of the East German communist regime. Collecting scent samples was used to try to identify those, for example, who had distributed flyers or made critical graffiti. The samples were stored in an olfactory database.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e5779290-36ec-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "384",
"height": "255"
},
"credit": "Stasi-Museum, Berlin, ASTAK, eV Photo: John Steer\r\n",
"links": [
{
"text": "Link text",
"uri": "http://blog.nationalarchives.gov.uk/blog/looking-back-25-years-berlin-wall-fell/"
}
],
"disabled": false,
"__index": 49,
"dateCreated": "Fri, 12 May 2017 08:28:22 GMT"
},
{
"id": "eigenfaces",
"date": "1987",
"title": "Eigenfaces",
"medium": "Program",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Biometrics #Algorithm #Computing #Identification\r\n",
"description": "Eigenfaces is an automated face recognition system that is based on studies by mathematicians Michael Kirby and Lawrence Sirovich at Brown University and computer scientists Matthew Turk and Alex Pentland at MIT. It utilizes a photographic database to calculate the face’s average proportions. Rather than using specific features (for example the space between the eyes), the linear algebra based system recognizes a new face by its deviation from the average.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/43b27f50-36ed-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "357",
"height": "426"
},
"credit": "AT&T Laboratories Cambridge\r\n",
"links": [
{
"text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Eigenface"
},
{
"text": "Link text",
"uri": "https://www.cs.ucsb.edu/~mturk/Papers/mturk-CVPR91.pdf"
}
],
"disabled": false,
"__index": 50,
"dateCreated": "Fri, 12 May 2017 08:30:37 GMT"
},
{
"id": "charlie",
"date": "1990s",
"title": "Charlie",
"medium": "Item",
"category": "Surveillance",
"keywords": "#CIA #Animal Kingdom #Espionage #Robot #Intelligence #Technology\r\n",
"description": "In the 1990s the CIA’s Directorate of Science and Technology developed a remote spying robot catfish named Charlie. The UUV (Unmanned Underwater Vehicle) fish contained a “pressure hull, ballast system, and communications system in the body and a propulsion system in the tail.“ It was used to collect intelligence and supposedly water samples near suspected chemical and nuclear plants. A problem the CIA was facing with the aquatic robot was its resemblance to a real catfish – “predators would stalk and dine on the spy gadget.“ \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9ca35b70-36ed-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "427"
},
"credit": "CIA\r\n",
"links": [
{
"text": "CIA",
"uri": "https://www.cia.gov/library/video-center/video-transcripts/charlie-cias-robotic-fish.html"
},
{
"text": "SOFREP News",
"uri": "https://sofrep.com/54444/cias-robotic-fish/"
}
],
"disabled": false,
"__index": 51,
"dateCreated": "Fri, 12 May 2017 08:33:08 GMT"
},
{
"id": "haarp",
"date": "1990",
"title": "HAARP",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Radio Waves #Weather #Ionosphere #Surveillance #US Air-Force #Radio communications #Conspiracy\r\n",
"description": "HAARP (High Frequency Active Auroral Research Program) is a former US-military program that focuses on ionospheric research. Its official purpose was to analyze the ionosphere and investigate potentials for developing ionospheric enhancement technology for radio communications and surveillance. HAARP has repeatedly been the target of conspiracy theorists, who claim that it was capable of \"weaponizing\" weather, somehow triggering natural catastrophes like floods, hurricanes, droughts or earthquakes.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e357f170-36ed-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "400",
"height": "266"
},
"credit": "",
"links": [
{
"text": "Link text ",
"uri": "https://en.wikipedia.org/wiki/High_Frequency_Active_Auroral_Research_Program"
}
],
"disabled": false,
"__index": 52,
"dateCreated": "Fri, 12 May 2017 08:35:18 GMT"
},
{
"id": "mummified-monk",
"date": "1996",
"title": "Mummified Monk",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Evidence #Technology #Secrets #Transparency #Disclosure #X-Ray\r\n",
"description": "In 1996 the human remains of a 1000-year-old monk were found inside a Buddha statue, when a private collector brought it for restoration in the Netherlands. The monk, who lived in the Song Dynasty, practiced self-mummification to prepare for life after death. His mummy was exhibited and worshipped in a monastery for 200 years before being placed inside the statue. It was not until 2015, when the statue underwent a 3D X-ray scan that revealed the full skeleton of the monk. Its organs had been removed and replaced with ancient wads of paper printed with Chinese characters. It is yet unclear how the statue made its way to Europe.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f0641030-36f0-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "620",
"height": "387"
},
"credit": "Drents Museum\r\n",
"links": [
{
"text": "Link text",
"uri": "http://edition.cnn.com/2015/02/27/asia/mummified-monk-statue/"
}
],
"disabled": false,
"__index": 53,
"dateCreated": "Fri, 12 May 2017 08:57:08 GMT"
},
{
"id": "the-great-firewall-of-china",
"date": "1997",
"title": "The Great Firewall of China",
"medium": "Item",
"category": "Surveillance",
"keywords": "#The Internet #Cencorship #Control #Governments #Algorithm #Digital Rights #Net Politics #Freedom #Information #Access \r\n",
"description": "The term Great Firewall of China is the name given to the Chinese government internet censorship and surveillance program. Being a major part of the Golden Shield Project, it blocks unwanted data from foreign countries entering China to gain regulation and control of the Internet. Operated by the government of Mainland China, the idea originated by the former paramount leader of the People’s Republic of China, Deng Xiaoping, who said: <i>\"If you open the window for fresh air, you have to expect some flies to blow in.\"</i> He metaphorically refers to western values, such as democracy of freedom of expression, as ‘flies‘ that are in conflict with the ideologies of the Communist Party. Thus, when the Internet arrived in China in 1994 and Chinese leadership had to open access to to the public, actions had to be undertaken to prevent western values from entering the country.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/82490050-36f1-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "500",
"height": "333"
},
"credit": "unknown\r\n",
"links": [
{
"text": "Link text ",
"uri": "https://cs.stanford.edu/people/eroberts/cs201/projects/2010-11/FreedomOfInformationChina/category/great-firewall-of-china/index.html"
}
],
"disabled": false,
"__index": 54,
"dateCreated": "Fri, 12 May 2017 09:01:04 GMT"
},
{
"id": "big-brother-",
"date": "1999–present",
"title": "Big Brother ",
"medium": "TV Show",
"category": "Surveillance",
"keywords": "#Big Brother #surveillance #CCTV #entertainment #observation \r\n",
"description": "Big Brother is a reality TV show franchise created by John de Mol. As of 11 November 2016, there have been 387 seasons of Big Brother in over 54 franchise countries and regions. In the show, contestants called \"housemates\" live in a specially-constructed house, isolated from the outside world. Housemates are voted out until only one remains and wins the cash prize. During their stay in the house, contestants are put under constant observation – they're continuously monitored by live CCTV cameras as well as personal audio microphones. Taking its name from George Orwell’s <i>Nineteen Eighty-Four</i>, Big Brother evokes surveillance as its central theme while ironically denying the dystopian undertones. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b4db0400-36f1-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "238",
"height": "86"
},
"credit": "",
"links": [
{
"text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Big_Brother_(franchise)"
}
],
"disabled": false,
"__index": 56,
"dateCreated": "Fri, 12 May 2017 09:02:52 GMT"
},
{
"id": "9-11-",
"date": "2001",
"title": "9/11 ",
"medium": "Historic Event",
"category": "Surveillance",
"keywords": "#9/11 #War on Terror #Airplane #CCTV #Attack #War #Morality #Politics #Pentagon #Terrorism\r\n",
"description": "This CCTV image shows terrorist ringleaders Mohamed Atta and Abdulaziz al-Omari passing through a security checkpoint in Portland, Maine, before flying to Boston, where they hijacked American Airlines Flight 11 which crashed into the North Tower of the World Trade Center on the morning of September 11th, 2001.\r\n\r\nFollowing the attacks, former US President George W. Bush declared a \"war on terror\" in a speech to the US Congress on September 20th. Since then, the term is used to describe the international military campaign that was started after the historic attacks.\r\n\r\nThe events of 9/11 changed the landscape of surveillance technology significantly.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/67aa2980-36f2-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "634",
"height": "501"
},
"credit": "AP\r\n",
"links": [
{
"text": "Link text",
"uri": "https://www.aclu.org/timelines/post-911-surveillance"
},
{
"text": "Link text",
"uri": "https://www.theguardian.com/world/2001/sep/21/september11.usa13"
}
],
"disabled": false,
"__index": 57,
"dateCreated": "Fri, 12 May 2017 09:07:26 GMT"
},
{
"id": "first-drone-strike-in-war",
"date": "2001",
"title": "First Drone Strike in War",
"medium": "Image",
"category": "Surveillance",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Classified #Airplanes\r\n",
"description": "On 7th of October 2001, the first day of the US-led war in Afghanistan, an armed, CIA-controlled predator drone was following the Taliban leader Mullah Omar in Kandahar. Due to communication problems, the drone, remotely controlled from the agency‘s headquarters in Langley, Virginia, fired a hellfire missile on a truck outside the building with Omar, allegedly killing two of his bodyguards. The Taliban leader escaped during the chaos following the airstrike. This event marks the first time a modern drone killed a human being.\r\nThe General Atomics Aeronautical MQ-1L Predator No. 3034 that executed the mission is on display at the Smithsonian National Air and Space Museum in Washington, D.C.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/5d3d9340-4a13-11e7-a34a-51568e9d74fe.jpg",
"caption": "",
"width": "700",
"height": "437"
},
"credit": "Smithsonian Institution, National Air and Space Museum, D.C. Washington\r\n",
"links": [
{
"text": "Link text",
"uri": "https://www.theatlantic.com/international/archive/2015/05/america-first-drone-strike-afghanistan/394463/"
},
{
"text": "Link text",
"uri": "https://airandspace.si.edu/collection-objects/general-atomics-aeronautical-systems-inc-mq-1l-predator"
}
],
"disabled": false,
"__index": 58,
"dateCreated": "Fri, 12 May 2017 09:13:12 GMT"
},
{
"id": "war-rugs-",
"date": "2001",
"title": "War Rugs ",
"medium": "Item",
"category": "Drones",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Afghanistan #Arts #Attack #Airplanes #Evidence #US-Army\r\n",
"description": "Afghanistan has suffered through many long decades of war, from its conflict with the Soviet Union in the 1980s and the subsequent civil war, to 16 years of US-led NATO combat missions. While war has political, economic and social impacts, it is also present in art. In the case of Afghan art, it is expressed in the ancient form of woven rugs that illustrate daily life. Rugs depicted Kalashnikovs, tanks and grenades during the Soviet Union conflict; drones began appearing on the rugs since the US started operating them in 2001. The world of ancient art and modern warfare collide on the so called ‘war rugs’, but they also reflect the violent conditions of life under war.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b44dc6b0-4a4e-11e7-ad41-938ea8af50c1.jpg",
"caption": "",
"width": "1000",
"height": "604"
},
"credit": "Courtesy of Kevin Sudeith\r\n",
"links": [
{
"text": "The Atlantic",
"uri": "https://www.theatlantic.com/technology/archive/2015/01/drones-are-appearing-on-afghan-rugs/385025/"
},
{
"text": "Messy Nessy",
"uri": "http://www.messynessychic.com/2015/01/29/war-rugs-the-obscure-collectors-market-for-afghan-kitsch/"
}
],
"disabled": false,
"__index": 59,
"dateCreated": "Fri, 12 May 2017 09:29:37 GMT"
},
{
"id": "tor",
"date": "2002",
"title": "Tor",
"medium": "Program",
"category": "Surveillance",
"keywords": "#Privacy #Security #TheInternet #Anonymous #Activism #Encryption #Computing #Data #Protection #Digital Rights #Freedom #Net Politics #Technology #Censorship\r\n",
"description": "Tor (The Onion Router) is a anonymizing network. Inspired by the structure of an onion, it is built up in layers: requests don’t go directly to the destination address but travel through a chain of proxy servers. That way the original IP address and identity is not traceable, and all data is encrypted. Tor conceals users' information from anyone conducting network surveillance or traffic analysis.\r\n\r\nActivists, whistleblowers and journalists around the world depend on Tor for secure, anonymous communication to circumvent censorship.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f7e90360-36f5-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "302"
},
"credit": "unknown\r\n",
"disabled": false,
"__index": 61,
"dateCreated": "Fri, 12 May 2017 09:32:55 GMT",
"links": [
{
"text": "Torproject",
"uri": "https://www.torproject.org/"
}
]
},
{
"id": "forensic-architecture-drone-strikes",
"date": "2002",
"title": "Forensic Architecture: Drone Strikes",
"medium": "Item",
"category": "Drones",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Classified #Airplanes #Arts #Afghanistan #Architecture #Attack #HumanRights #Morality #Pakistan #Violence #Warfare\r\n",
"description": "The first known targeted drone assassination outside a war zone by the US took place in Yemen on November 3rd, 2002. Areas most affected by drone warfare are generally outside effective state control. Therefore non-residents (like journalists) are prevented from investigating events and accessing evidence, and media coverage is uneven. The image depicts a visual investigation on the strike path of a drone in Miranshah, north Waziristan, on March 2012 by Forensic Architecture. Focusing on the spatial dimension of drone strikes, they analyzed video testimony that was smuggled out of the area, in order to reconstruct the space of the strike and investigate the event. The white dotted lines show the potential places where people died.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/60a9e090-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "353"
},
"credit": "Forensic Architecture\r\n",
"links": [
{
"text": "Link text",
"uri": "http://www.forensic-architecture.org/case/drone-strikes/"
}
],
"disabled": false,
"__index": 62,
"dateCreated": "Fri, 12 May 2017 09:36:16 GMT"
},
{
"id": "social-network-surveillance-participatory-surveillance",
"date": "2004",
"title": "Social Network Surveillance / Participatory Surveillance",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Facebook #Twitter #Yahoo #Privacy #Protection \r\n",
"description": "Social Network Surveillance means the practice of creating maps based on data from social networking sites such as Facebook and Twitter. These \"maps\" are mined to extract information such as interests, friendships, affiliations, beliefs and activities. US government agencies like the NSA are investing heavily in research involving social network analysis. Some people have claimed that the use of social networking sites is in itself a form of ‘participatory surveillance’ where users essentially perform surveillance on themselves and others, posting and consuming personal information on public websites.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/c1714490-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "460",
"height": "276"
},
"credit": "",
"links": [
{
"text": "Link text",
"uri": "http://firstmonday.org/article/view/2142/1949"
}
],
"disabled": false,
"__index": 63,
"dateCreated": "Fri, 12 May 2017 09:38:37 GMT"
},
{
"id": "wikileaks",
"date": "2006",
"title": "WikiLeaks",
"medium": "Item",
"category": "Surveillance",
"keywords": "#WikiLeaks #Whistleblower #Classified Information #Covert Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n",
"description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news leaks from anonymous sources. It was founded in 2006 in Iceland and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson of the organization, devoted to bringing transparency to governments, accessibility to information, and protection to whistleblowers. Over the past decade WikiLeaks has drawn global attention to itself by publishing leaked classified information, for instance on the US Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012. Since then, he has been a resident in the Ecuadorian Embassy in London, unwilling to leave as he fears extradition to the US from Sweden, where he is accused of sexual assault. In the US he could face several charges, including the death penalty, for his work with WikiLeaks. ",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fec0c370-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "237",
"height": "547"
},
"credit": "WikiLeaks\r\n",
"links": [
{
"text": "Wikileaks",
"uri": "http://www.wikileaks.org"
},
{
"text": "Telegraph",
"uri": "http://www.telegraph.co.uk/news/worldnews/wikileaks/11681502/Why-is-Julian-Assange-still-inside-the-embassy-of-Ecuador.html"
}
],
"disabled": false,
"__index": 64,
"dateCreated": "Fri, 12 May 2017 09:40:35 GMT"
},
{
"id": "the-other-night-sky",
"date": "2007",
"title": "The Other Night Sky",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Satellite #Photography #Secrets #Arts #Reconnaissance\r\n",
"description": "Since the dawn of history, humans have looked into the sky to make sense of the world. Living in an modern age of total surveillance, the artist Trevor Paglen explores the night sky to reveal what is invisible and deliberately obscure – like secret US military surveillance satellites. In the experimental photography series <i>The Other Night Sky</I> he makes use of data gathered by amateur satellite observers to investigate the moment a surveillance satellite enters the realm of visibility. Paglen then captures it with long exposure time. What appears in the photograph is a fine line in a vast sky which gives evidence of the satellites' existence.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/3f642840-36f7-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "506",
"height": "640"
},
"credit": "KEYHOLE 12-3/IMPROVED CRYSTAL Optical Reconnaissance Satellite Near Scorpio (USA 129), Trevor Paglen, 2007\r\n",
"links": [
{
"text": "Link text",
"uri": "http://median.newmediacaucus.org/art-infrastructures-hardware/i-see-the-moon-the-moon-sees-me-trevor-paglens-satellite-images/"
}
],
"disabled": false,
"__index": 65,
"dateCreated": "Fri, 12 May 2017 09:42:38 GMT"
},
{
"id": "targeted-killing",
"date": "2010",
"title": "Targeted Killing",
"medium": "Photographs",
"category": "Surveillance",
"keywords": "#Israel #Drones #UAV #Palestine #Simulation #IDF #Suspect \r\n",
"description": "Miki Kratsman’s <i>Targeted Killing</i> examines the term “focused foiling”, coined by the Israel Defense Forces (IDF). For this series, Kratsman uses a special lens, which is commonly used by UAV’s. The result is an image that appears to be shot seconds before a targeted killing. The photographed characters in this work are Palestinian civilians going about their daily lives. The way they are being photographed echoes the imagery of threatening “suspects”.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/722d9aa0-4795-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "946",
"height": "630"
},
"credit": "Miki Kratsman\r\n",
"links": [
{
"text": "Link text",
"uri": "http://www.chelouchegallery.com/artistWorks.php?the_group=357&id=49"
},
{
"text": "Link text",
"uri": "http://www.haaretz.com/israel-news/taking-a-stand-1.387195"
}
],
"disabled": false,
"__index": 67,
"dateCreated": "Fri, 12 May 2017 10:15:01 GMT"
},
{
"id": "chelsea-manning-case",
"date": "2010",
"title": "Chelsea Manning Case",
"medium": "Case",
"category": "Surveillance",
"keywords": "#Whistleblower #Governments #Disclosure #WikiLeaks #Leaks #Iraq #Intelligence #Ethics #Prison #Classified Information #Espionage #Politics\r\n",
"description": "The former US Army intelligence analyst Chelsea Manning was convicted of violations of the Espionage Act and other offenses after supposedly leaking 700,000 classified US documents and diplomatic cables to WikiLeaks in 2010. She was sentenced to 35 years in prison, partly in solitary confinement. The outgoing US President Barack Obama commuted her sentence in early 2017.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/457196a0-36fc-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "476"
},
"credit": " unknown\r\n",
"links": [
{
"text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Chelsea_Manning"
},
{
"text": "Image link",
"uri": "https://static01.nyt.com/images/2017/01/18/us/18manning/18manning-superJumbo.jpg"
}
],
"disabled": false,
"__index": 68,
"dateCreated": "Fri, 12 May 2017 10:18:28 GMT"
},
{
"id": "collateral-murder",
"date": "2010",
"title": "Collateral Murder",
"medium": "Video",
"category": "Surveillance",
"keywords": "#Iraq #Attack #Leak #Wikileaks #Disclosure #Ethics #US-Army #Airstrike #Violence #Morality #Warfare\r\n",
"description": "On July 12th, 2007, the US Army conducted a series of airstrikes in the neighborhood of New Baghdad, Iraq, killing over a dozen civilians, including two war correspondents working for the Reuters news agency. Classified video footage from the helicopter gunship was released by WikiLeaks on April 5th, 2010, and caused a global discussion on the legality and morality of these homicides.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9a0aff80-36fc-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "454"
},
"credit": "Screenshot / WikiLeaks Website\r\n",
"links": [
{
"text": "Link text",
"uri": "https://collateralmurder.wikileaks.org/"
}
],
"disabled": false,
"__index": 69,
"dateCreated": "Fri, 12 May 2017 10:20:26 GMT"
},
{
"id": "5000-feet-is-the-best",
"date": "2011",
"title": "5000 Feet is The Best",
"medium": "Film",
"category": "Drones",
"keywords": "#Surveillance #Drone #UAV #Technology #Camera #Verticality #Control #All-Seeing Eye #Military #Reconnaissance #Remote Sensing #Warfare #Information #Sensor #US-Air Force #Afghanistan #Airstrike #Attack #Morality #Ethics \r\n",
"description": "Omar Fast’s film <i>5000 Feet is The Best</i> addresses the politics of visuality and how the reality of warfare is perceived when the world is made of fake images and special effects. The title is taken from a former drone operator who is interviewed. He reveals why 5000 feet is the best height for a combat drone to fly, as it means he can make out someone's shoes and facial hair.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d388dcf0-36fc-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "359"
},
"credit": "Omar Fast, Still from ‘5,000 Feet is the Best’\r\n",
"links": [
{
"text": "Link text",
"uri": "http://www.independent.co.uk/arts-entertainment/art/reviews/visual-art-review-5000-feet-is-the-best-how-truth-and-fiction-became-blurred-8783611.html"
}
],
"disabled": false,
"__index": 70,
"dateCreated": "Fri, 12 May 2017 10:22:04 GMT"
},
{
"id": "the-gorgon-stare",
"date": "2011",
"title": "The Gorgon Stare",
"medium": "Technology",
"category": "Drones",
"keywords": "#Surveillance #Drone #UAV #Technology #Camera #Verticality #Control #All-Seeing Eye #Military #Panopticon #Reconnaissance #Remote Sensing #Warfare #Data #Information #Sensor #US-Air Force\r\n",
"description": "Gorgon Stare is a revolutionary airborne surveillance system made that is mounted on the underside of a drone. Its electro-optical and infrared sensor system includes nine video cameras, which are able to transmit live video images of physical movement across an entire town. While the system can see everything, the adversary on the ground does not know what or who is being looked at.\r\n\r\nIn greek mythology, the Gorgon was a creature whose unblinking eyes turned its beholder into stone.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/205dbf50-36fd-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "430",
"height": "616"
},
"credit": "http://archive.cotsjournalonline.com/articles/view/105574\r\n",
"links": [
{
"text": "Washington Post",
"uri": "http://www.washingtonpost.com/wp-dyn/content/article/2011/01/01/AR2011010102690.html"
}
],
"disabled": false,
"__index": 71,
"dateCreated": "Fri, 12 May 2017 10:24:13 GMT"
},
{
"id": "the-left-to-die-boat",
"date": "2011",
"title": "The Left-to-Die Boat",
"medium": "Art",
"category": "Surveillance",
"keywords": "#Surveillance #Counter-Surveillance #Refugee-Crisis #Europe #Horn of Africa #Mediterranean #Boat #Satellite #NATO #Libya #Navy #Arts\r\n",
"description": "The Oceanography project supported a coalition of NGOs demanding accountability for the deaths of migrants in the central Mediterranean Sea, a region that was tightly monitored with satellites by the NATO-led coalition intervening in Libya. The project’s efforts were focused on what is now known as the “left-to-die boat” case, where 63 migrants lost their lives, drifting for 14 days within the NATO maritime surveillance area. The project team managed to reconstruct precisely how events unfolded and demonstrated how different actors operating in the Mediterranean used complex overlapping jurisdictions at sea to evade their responsibility for rescuing people in distress.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/747bddb0-36fd-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "486"
},
"credit": "Forensic Architecture Research Agency\r\n",
"links": [
{
"text": "Link text",
"uri": "http://www.forensic-architecture.org/case/left-die-boat/"
},
{
"text": "Link text",
"uri": "https://en.wikipedia.org/wiki/2011_military_intervention_in_Libya"
}
],
"disabled": false,
"__index": 72,
"dateCreated": "Fri, 12 May 2017 10:27:13 GMT"
},
{
"id": "afraid-of-blue-skies",
"date": "2012",
"title": "Afraid of Blue Skies",
"medium": "Image",
"category": "Drones",
"keywords": "#Drones #Airstrike #Attack #Violence #Ethics #Morality #CIA #USA #Pakistan\r\n",
"description": "On October 24th, 2012, two missiles of a US drone hit a village in North Waziristan, Pakistan, killing a 67-year-old midwife who was gathering okra in her garden with her two grandchildren. The children were injured and rushed to the hospital. Media reports of that day claimed that militants had been killed, although Rafiq ur Rehman, a Pakistani primary school teacher and father to the family claimed otherwise. He and his children, Zubair, 13, and Nabila, 9, were the first family members of victims of an alleged US Drone strike to give testimony at the US Congress. When Zubair pleaded to the lawmakers, he described the situation in his home: “Now I prefer cloudy days when the drones don’t fly. When the sky brightens and becomes blue, the drones return and so does the fear.“\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f3ea3dd0-36fd-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "424"
},
"credit": "George Hodan, Public Domain\r\n",
"links": [
{
"text": "Link text",
"uri": "https://www.theguardian.com/world/2013/oct/29/pakistan-family-drone-victim-testimony-congress"
}
],
"disabled": false,
"__index": 73,
"dateCreated": "Fri, 12 May 2017 10:29:02 GMT"
},
{
"id": "conflicted-phonemes",
"date": "2012",
"title": "Conflicted Phonemes",
"medium": "Multimedia Art Project",
"category": "Surveillance",
"keywords": "#Accent #Refugees #Migration #Security #Language #Asylum #Deportation #Detention #Arts",
"description": "In his 2012 work <i>Conflicted Phonemes</i>, Lawrence Abu Hamdan dealt with a controversial usage of linguistic analysis. He held a meeting with a group of 12 Somali refugees who had been subjected to accent analysis by the Dutch immigration authorities and later had their asylum requests rejected. Hamdan aims to show how those tests seek to determine if the asylum seekers originate from relatively safe regions in the north of the country. Together with refugees and researchers, he developed maps which explore the hybrid nature of accent.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/17ac7cf0-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "447",
"height": "640"
},
"credit": "Lawrence Abu-Hamdan\r\n",
"links": [
{
"text": "Link text",
"uri": "http://lawrenceabuhamdan.com/conflicted-phonemes/"
}
],
"disabled": false,
"__index": 74,
"dateCreated": "Fri, 12 May 2017 10:38:19 GMT"
},
{
"id": "street-ghosts",
"date": "2012",
"title": "Street Ghosts",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Google #Googlemaps #Surveillance #Privacy #Streetart ",
"description": "The work <i>Street Ghosts</i> is a series of photographs taken from Google Street View and printed at life-size scale. The artist Paolo Cirio later posted the portraits as street art interventions at the same locations where they had been taken. The artwork re-contextualizes readymade online material and documents shifting social norms and policies concerning privacy. Cirio explains how he aimed to expose the specters of Google’s misappropriated data: the bodies of people captured by Google Street View cameras, whose ghostly, virtual presence was marked in a street art fashion at the spot where they were photographed. The images don’t offer details, but highlight the depicted people’s uncanny presence.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/5ac882e0-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "399"
},
"credit": "",
"links": [
{
"text": "Link text",
"uri": "http://www.huffingtonpost.com/2012/10/09/street-ghosts-artist-paolo-cirio_n_1936158.html"
},
{
"text": "Link text",
"uri": "http://streetghosts.net/"
}
],
"disabled": false,
"__index": 75,
"dateCreated": "Fri, 12 May 2017 10:40:08 GMT"
},
{
"id": "drone-survival-guide",
"date": "2012",
"title": "Drone Survival Guide",
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments #Airstrike #Airplanes #Attack #Camouflage #Counter Surveillance #Control #Ethics #Protection #Reconnaissance #Weapons #Warfare #US-Army #UAV #Survival\r\n",
"description": "The <i>Drone Survival Guide</i> contains the silhouettes of the most common drone species used today and in the near future. The chart indicates each drone's nationality, and whether they are used as a surveillance platform or for deadly force. All drones are drawn to scale, from the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39.9 meter in length. The guide is printed on reflective paper, referring to the possibility of hiding from a drone's infrared camera by using reflective material or a space blanket, as it camouflages the heat signature.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f267aa90-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "447"
},
"credit": "CC, project by Ruben Pater\r\n",
"links": [
{
"text": "Link text",
"uri": "http://untold-stories.net/?p=Drone-Survival-Guide"
},
{
"text": "Link text",
"uri": "www.dronesurvivalguide.org"
}
],
"disabled": false,
"__index": 76,
"dateCreated": "Fri, 12 May 2017 10:44:51 GMT"
},
{
"id": "dronestagram",
"date": "2012 - 2015",
"title": "Dronestagram",
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments #All-Seeing Eye #Airstrikes #Attack #Violence #Social Media #The Arts #Photography\r\n",
"description": "Dronestagram posts satellite images of locations that have been a target of a drone strike along with a short summary to Instagram, Tumblr and Twitter. For many of us, these foreign places feel very abstract. Areas affected by these strikes are targets of a largely invisible technology - remotely controlled, unmanned aerial vehicles, loaded with weapons. Using social media to report the strikes, shifts them into greater visibility and awareness. James Bridle, the artist behind the project, writes: “These are just images of foreign landscapes, still; yet we have got better at immediacy and intimacy online: perhaps we can be better at empathy too.” The records of the strikes are mostly drawn from the Bureau of Investigative Journalism, which compiles reports from Pakistan, Afghanistan, Yemen and Somalia.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4fb725e0-3700-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "377"
},
"credit": "James Bridle",
"links": [
{
"text": "Link text",
"uri": "http://booktwo.org/notebook/dronestagram-drones-eye-view/"
}
],
"disabled": false,
"__index": 77,
"dateCreated": "Fri, 12 May 2017 10:53:48 GMT"
},
{
"id": "snowden-case",
"date": "2013",
"title": "Snowden Case",
"medium": "Case ",
"category": "Surveillance",
"keywords": "#NSA #Wikileaks #Snowden #Social Media #PRISM #phones #Surveillance #Counter-Surveillance #Privacy #Internet #Encryption #Hacking Computing #Five Eyes\r\n",
"description": "Edward Snowden’s leaks have shed light on the implications of several secret treaties signed by members of the UK/USA community in their efforts to implement global surveillance. These revelations stem from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. In addition to a trove of US federal documents, Snowden's cache contains thousands of Australian, British and Canadian intelligence files. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The Snowden case has had a lasting influence on public awareness and discourse on surveillance today.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/ab337260-3701-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "360"
},
"credit": "",
"links": [
{
"text": "Link text",
"uri": "https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1"
},
{
"text": "Link text",
"uri": "https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)"
},
{
"text": "Link text",
"uri": "http://mashable.com/2014/06/05/edward-snowden-revelations/#kcn4n1Qx7Pqf"
}
],
"disabled": false,
"__index": 78,
"dateCreated": "Fri, 12 May 2017 10:56:59 GMT"
},
{
"id": "prism",
"date": "2013",
"title": "PRISM",
"medium": "Program",
"category": "Surveillance",
"keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
"description": "PRISM is a highly-classified program intended to grant direct access to internet servers for the NSA to wiretap. Since 2007, it has collected material which includes individual search history, the contents of emails, and file transfers and live chats from internet giants like Google, Apple or Facebook. As part of the Snowden archive, it was the first leak to be published, being announced simultaneously by the Guardian and the Washington Post on June 7th, 2013, marking the begin of the Snowden Affair.\r\n\r\nIntended for internal use only, the leaked 41 page PowerPoint document describes an extensive surveillance program. It reveals that most of the world’s electronic communications pass through the US, which makes monitoring possible by intelligence analysts. The logo above represents the mission’s purpose: the prism refracting invisible noise into visible information.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/0de8eac0-3702-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "460",
"height": "346"
},
"credit": "public domain",
"links": [
{
"text": "Link text",
"uri": "https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data"
}
],
"disabled": false,
"__index": 79,
"dateCreated": "Fri, 12 May 2017 10:59:32 GMT"
},
{
"id": "undersea-network-surveillance",
"date": "2013",
"title": "Undersea Network Surveillance",
"medium": "Program",
"category": "Surveillance",
"keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
"description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping into submarine network structures. These fiber optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication moves through them, in favor of \"Mastering the Internet\" – a project by GCHQ. One subsidiary of that project, codenamed TEMPORA, stores huge volumes of data drawn from fiber optic cables for up to 30 days. The data then can be sifted through and analyzed.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4b9d7790-3703-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "340"
},
"credit": "Submarine internet cables connecting the world, TeleGeography",
"links": [
{
"text": "Link text",
"uri": "https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/"
},
{
"text": "Link text",
"uri": "https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa "
},
{
"text": "Link text",
"uri": "http://apps.washingtonpost.com/g/page/business/a-connected-world/305/"
}
],
"disabled": false,
"__index": 80,
"dateCreated": "Fri, 12 May 2017 11:08:21 GMT"
},
{
"id": "weiweicam",
"date": "2012",
"title": "WeiWeiCam",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Verticality #Arts #Surveillance #Transparency #Activism #Architecture #All-Seeing Eye #CCTV #Public #Privacy #Police State #Internet #Watching\r\n",
"description": "In 2011, Ai Weiwei was arrested and detained for 81 days for \"inciting subversion of state power\" – an ambiguous charge often leveled against citizens who criticize Communist Party rule. One year later, he launched <i>weiweicam.com</i>. At the time, Ai was under house arrest and was continually surveilled by the Chinese government. In a defiant parody, Ai set up cameras in his house and studio and live broadcast footage of his every move on the internet to \"aid\" the government in keeping an eye on him. This self-imposed scrutiny attested to the censorship and repression being inflicted on the artist, yet the revelation was short-lived. The government shut down weiweicam.com after only forty-six hours, but not before over 5.2 million viewers had visited the site.",
"image": {
"uri": "https://d32dm0rphc51dk.cloudfront.net/6OuzSVQP_rGqIh7FeCJ10g/larger.jpg",
"caption": "",
"width": "1024",
"height": "819"
},
"credit": "Weiweicam, 2012, Single Channel. Videostill / Ai Weiwei\r\n",
"links": [
{
"text": "chinedigitaltimes",
"uri": "http://chinadigitaltimes.net/2012/04/ais-weiweicam-forced-offline-after-46-hours/"
}
],
"disabled": false,
"__index": 81,
"dateCreated": "Fri, 12 May 2017 11:11:18 GMT"
},
{
"id": "drone-shadow",
"date": "2013",
"title": "Drone Shadow",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments\r\n",
"description": "<i>Drone Shadows</i> is a series of public installations of artist, writer and technologist James Bridle. The 1:1 scale representation of a drone is supposed to shift the invisible drone warfare closer to our reality. The image depicts the shadow of a General Atomics MQ-9 Reaper drone. It is used as a surveillance and weapons platform and is operated by the US, UK, Australia, France, and NASA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fc519c90-3985-11e7-a9cd-015e907df360.jpg",
"caption": "",
"width": "640",
"height": "426"
},
"credit": "Courtesy Roberta Mataityte / Lighthouse. Photo by James Bridle\r\n",
"links": [
{
"text": "Link text",
"uri": "http://booktwo.org/notebook/drone-shadows/"
},
{
"text": "Link text",
"uri": "http://booktwo.org/notebook/drone-shadows-dispositions/"
}
],
"disabled": false,
"__index": 82,
"dateCreated": "Fri, 12 May 2017 11:13:25 GMT",
"shortDescription": ""
},
{
"id": "nothing-is-beyond-our-reach",
"date": "2013",
"title": "Nothing is Beyond Our Reach",
"medium": "Item",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Governments #Spy Satellite #Espionage #Surveillance #Secrets #NRO #Freedom of Information Act #Reconnaissance #Verticality #USA\r\n",
"description": "When the US National Reconnaissance Office (NRO) launched the classified satellite NROL-39 into space on December 6th, 2013, the logo of the mission received more attention than the mission itself. It depicts an octopus wrapping its arms around the globe accompanied by the slogan: <i>Nothing is beyond our reach</i>. After filing a request about the emblem's origin under the Freedom of Information Act, it came to light that the NRO chose the octopus to represent the mission, as it is a highly intelligent, versatile creature, with arms that can reach even the most delicate corners of the world, leaving no space for enemies of the US to hide.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/23af5950-3713-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "600",
"height": "600"
},
"credit": "National Reconnaissance Office, US Government / Public Domain, 2013\r\n",
"links": [
{
"text": "Link text",
"uri": "https://www.forbes.com/sites/kashmirhill/2013/12/05/u-s-spy-rocket-launching-today-has-octopus-themed-nothing-is-beyond-our-reach-logo-seriously/#4377cb4d6869"
},
{
"text": "Link text",
"uri": "https://www.nasaspaceflight.com/2013/12/atlas-v-launch-nrol-39-vandenberg/"
},
{
"text": "Link text",
"uri": "https://leaksource.files.wordpress.com/2013/12/how-the-nrol-39-octopus-logo-was-created.pdf"
}
],
"disabled": false,
"__index": 83,
"dateCreated": "Fri, 12 May 2017 13:01:58 GMT"
},
{
"id": "stealth-wear",
"date": "2013",
"title": "Stealth Wear",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#counter-surveillance #collection #commerce #burqa #stealth-wear #pop-up-store #surveillance-market #privacy #data #activism\r\n",
"description": "<i>Stealth Wear</i> is a commercially distributed collection of garments developed by the counter-surveillance artist Adam Harvey. The garments are designed to shield against thermal imaging, a surveillance technology widely used by military drones to target people.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b6a74aa0-3714-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "512",
"height": "640"
},
"credit": "Adam Harvey / https://privacygiftshop.com/\r\n",
"links": [
{
"text": "Link text",
"uri": "https://privacygiftshop.com/"
},
{
"text": "Link text",
"uri": "https://www.timeout.com/newyork/shopping/the-privacy-gift-shop"
}
],
"disabled": false,
"__index": 84,
"dateCreated": "Fri, 12 May 2017 13:13:11 GMT"
},
{
"id": "citizenfour",
"date": "2014",
"title": "Citizenfour",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Governments #Whistleblowing #WikiLeaks #Activism #Wiretapping #Classified Information #Disclosure #NSA #Encryption #Surveillance #Hacking #Ethics #Morality #Electronic Warfare #Intelligence #Information #Secrets #Transparency\r\n",
"description": "<i>Citizenfour</i> is a documentary film directed by Laura Poitras about Edward Snowden's disclosure of NSA spying. In early 2013, Poitras was contacted by \"Citizenfour\" – the alias used by Snowden. Poitras herself became a participant in the affair, using her camera to document the situation as it unfolded. She processed her experience in this documentary named after Snowden's pseudonym, which won several awards including the Academy Award for Best Documentary Feature at the 2015 Oscars.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/38b16440-3715-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "436",
"height": "640"
},
"credit": " praxis films, NYC (recheck)\r\n",
"links": [
{
"text": "Link Text",
"uri": "https://citizenfourfilm.com/"
},
{
"text": "Link text ",
"uri": "https://en.wikipedia.org/wiki/Citizenfour"
}
],
"disabled": true,
"__index": 85,
"dateCreated": "Fri, 12 May 2017 13:18:54 GMT"
},
{
"id": "surveillance-camera-with-plinth",
"date": "2015",
"title": "Surveillance Camera with Plinth",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Arts #Activism #Surveillance #Location #Counter-Surveillance #Information #CCTV #All-Seeing Eye #Control #Privacy #Espionage #Ethics #Police\r\n",
"description": "In 2011, Ai Weiwei disappeared for 81 days. Detained by Chinese authorities in a secret prison, the artist was eventually released on bail without explanation. He, his family, and his studio are under constant surveillance – something he addresses frequently in his artworks. Ai has memorialized the CCTV cameras installed by authorities outside his Beijing studio to record his every move; he replicates the cameras as sculpture. Using marble, a medium of monuments and gravestones, he ironically elevates historically-loaded material into the contemporary discourse of privacy and surveillance. Taking the form of the electronic eye as the symbol of modern surveillance, he evokes themes of paranoia, voyeurism and the omnipresent authoritarian police forces.\r\n\r\nAi’s personal response to constant surveillance is to live his life as an open book, endlessly documenting his everyday encounters via social media. If everything is transparent, there is nothing to spy on.",
"image": {
"uri": "http://cfileonline.org/wp-content/uploads/2016/05/7a-surveillance-camera-ai-weiwei-overrated-contemporary-ceramic-art-cfile.jpg",
"caption": "",
"width": "1200",
"height": "1793"
},
"credit": "Marble, 120 x 52 x 52 cm, Haines Gallery, Ai Weiwei, 2015\r\n",
"links": [
{
"text": "Link ",
"uri": "https://creators.vice.com/en_au/article/ai-weiwei-reminds-us-that-surveillance-is-an-international-concern"
}
],
"disabled": true,
"__index": 86,
"dateCreated": "Fri, 12 May 2017 13:31:32 GMT"
},
{
"id": "suitcase-boy",
"date": "2015",
"title": "Suitcase Boy",
"medium": "Event",
"category": "Surveillance",
"keywords": "#Migration #X-Ray #Airport #Border Control #Evidence #Transparency\r\n",
"description": "In 2015, authorities discovered an eight-year-old boy from the Ivory Coast in a suitcase, in an attempt to smuggle him into Europe. Ceuta, the Spanish enclave on the African continent where the boy was found, has proved to be a popular areas for migrants to try to cross into Europe from Africa.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/7c197c70-3717-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "360"
},
"credit": "on the image\r\n",
"links": [
{
"text": "Link text",
"uri": "http://www.bbc.co.uk/news/world-africa-32660135"
}
],
"disabled": false,
"__index": 87,
"dateCreated": "Fri, 12 May 2017 13:33:18 GMT"
},
{
"id": "deep-sweep-",
"date": "2015",
"title": "Deep Sweep ",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Arts #Activism #Signal #Surveillance #Location #Counter-Surveillance #Information #Military #Device #Interception\r\n",
"description": "The Deep Sweep is an aerospace probe scanning the otherwise out-of-reach signal space between land and stratosphere, with special interest placed in UAV drone-to-satellite communication, operating in super-high-frequency in a range of 10GHz to 12GHz. Taking the form of a high-altitude weather balloon, it carries radio frequency equipment and a small computer to study the vast and often secretive world of signals in our skies. Deep Sweep was developed by the Critical Engineering Working Group as a signal-intelligence platform, to be deployed by the public.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e769c1a0-3718-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "480",
"height": "640"
},
"credit": "The Critical Engineering Working Group, 2015",
"links": [
{
"text": "Link text",
"uri": "https://criticalengineering.org/projects/deep-sweep/"
}
],
"disabled": false,
"__index": 88,
"dateCreated": "Fri, 12 May 2017 13:43:04 GMT"
},
{
"id": "anarchist",
"date": "2016",
"title": "Anarchist",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Surveillance #Interception #Art #Snowden #Activism #Drone #Signal #GCHQ #Israel #Whistleblowing\r\n",
"description": "Anarchist was the codename given to a classified program intercepting Israeli drone feeds and fighter jets. Ordered by the UK's Government Communications Headquarters (GCHQ) and the US National Security Agency (NSA), intercepts were conducted from a mountaintop in Cyprus. Snapshots of the live signals were found in the Snowden archive by the investigative journalist and filmmaker Laura Poitras, who was involved in their publication. She printed the colorful images at large scale, creating abstract artworks with a unique aura, carrying evidence and revelations about drone warfare.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9ac43730-3719-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "446"
},
"credit": "Laura Poitras (b. 1964), ANARCHIST: Power Spectrum Display of Doppler Tracks from a Satellite (Intercepted May 27, 2009), 2016. Archival pigment print on aluminum, 45 1/4 × 65 in. Courtesy the artist\r\n",
"links": [
{
"text": "Link text ",
"uri": "https://frieze.com/article/laura-poitras"
},
{
"text": "Link text ",
"uri": "https://theintercept.com/2016/01/28/israeli-drone-feeds-hacked-by-british-and-american-intelligence/"
}
],
"disabled": false,
"__index": 89,
"dateCreated": "Fri, 12 May 2017 13:48:12 GMT"
},
{
"id": "skylift-low-cost-geo-location-decoy",
"date": "2016",
"title": "Skylift: Low-Cost Geo-Location Decoy",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Google #Location #Counter-Surveillance #Relocation #Wifi #Device\r\n",
"description": "SkyLift is a small device designed by the counter-surveillance artist Adam Harvey that exploits a longstanding vulnerability in geolocation positioning using WiFi and unique MAC addresses. Companies like Google and Apple rely on the use of WiFi packets from home routers to estimate a smartphone user's position. Until now, this method has required the use of multiple routers and a complicated, expensive setup. SkyLift reintroduces the concept to a new audience using a low-cost, Arduino-compatible WiFi transceiver to move the user to almost any location in the world.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e2a6ecf0-3719-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "415"
},
"credit": "Adam Harvey \r\n",
"links": [
{
"text": "Link text",
"uri": "https://ahprojects.com/projects/skylift/"
}
],
"disabled": true,
"__index": 90,
"dateCreated": "Fri, 12 May 2017 13:50:01 GMT"
},
{
"id": "national-bird-",
"date": "2016",
"title": "National Bird ",
"medium": "Documentary Film",
"category": "Drones",
"keywords": "#drones #warfare #PTSD #ethics #testimony #silence #whistleblowing #trigger",
"description": "Sonia Kennebeck’s film <i>National Bird</i> gives rare insight into the US drone war program – with special focus on its heavily criticized use in Afghanistan – by depicting the life and testimony of three whistleblowers. Plagued by guilt over their participation in the killing of faceless people, the whistleblowers decided to break the silence around the drone program and their involvement. The film illustrates how drones wreak devastation and disrupt the status quo of modern warfare in terms of ethics and strategy. It demonstrates how the nature of drone warfare makes some drone operatives trigger-happy, while others end up dehumanised and traumatized.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b07d2b80-371a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "384"
},
"credit": "https://www.theguardian.com/film/2016/apr/17/national-bird-review-us-drones-program-tribeca-film-festival\r\n",
"links": [
{
"text": "Link text",
"uri": "ttp://nationalbirdfilm.com/ "
},
{
"text": "Link text ",
"uri": "https://www.nytimes.com/2016/11/11/movies/national-bird-review.html?_r=0"
}
],
"disabled": false,
"__index": 92,
"dateCreated": "Fri, 12 May 2017 13:56:53 GMT"
},
{
"id": "angst-ii",
"date": "2016",
"title": "Angst II",
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drones #Fear #Depression #Opera #Uncanniness #Technology #Grace #Generation #Art",
"description": "<i>Angst</i> (German: “Fear”) is an opera in three acts by the German artist Anne Imhof. Angst II forms the climax and turning point. The work consists of music, text, sculptural elements, actors, animals and controlled drones that fly ominously above the crowd and thus create an overall uncanny atmosphere. Somewhat suspended in time and space, the ‘characters’ of Angst seem kept in a state between boredom and dreaminess. Whether the drones’ function is to surveil the works' participants or serve as an aesthetic element is not revealed.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1a884680-371c-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "427"
},
"credit": "http://www.artnau.com/2016/11/anne-imhof-angst-ii/\r\n",
"links": [
{
"text": "Link text",
"uri": "https://frieze.com/media/angst-ii"
},
{
"text": "Link text",
"uri": "http://www.smb.museum/en/museums-institutions/hamburger-bahnhof/exhibitions/detail/anne-imhof-angst-ii.html"
}
],
"disabled": false,
"__index": 91,
"dateCreated": "Fri, 12 May 2017 14:05:55 GMT"
},
{
"id": "covertaction-information-bulletin",
"date": "1978",
"title": "CovertAction Information Bulletin",
"medium": "Publication",
"category": "Surveillance",
"keywords": "#Whistleblowing #Dissent #CIA #Control #Privacy #Surveillance #Information #Secret Service #Activism #Civil Rights #Classified Information #Covered Operation #Disclosure #Espionage #Intelligence #Secrets #USA",
"description": "<i>CovertAction Information Bulletin</i> was a leading progressive publication focusing on criticism of US foreign policy, the CIA, NSA, FBI, and corporate crime and repression in the US and abroad. It was co-founded in 1978 by former CIA case officer Philip Agee, who became a leading opponent of CIA practices after he left the agency in 1968. The publication was renamed to <i>CovertAction Quarterly</i> in 1992; it regularly published names of undercover agents and was targeted by Congress who passed the Intelligence Identities Protection Act in 1982, which made the practice of revealing names of agents illegal under US law.\r\n\r\nCovertAction Quarterly ceased publishing in 2005, having released a total number of 78 issues.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/dc3c9230-3add-11e7-824a-e3c31e607a7a.jpg",
"caption": "",
"width": "408",
"height": "527"
},
"credit": "Cover from issue 24, published 1985",
"disabled": false,
"__index": 46,
"dateCreated": "Wed, 17 May 2017 08:50:49 GMT",
"links": [
{
"text": "Archive.org",
"uri": "https://archive.org/details/Issue27CovertActionInformationBulletinIssue27ReligiousRight"
}
]
},
{
"id": "ancient-surveillance-egypt",
"date": "c. 1274 BC",
"title": "Ancient Surveillance: Egypt",
"medium": "Case",
"category": "Surveillance",
"keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covert Operations\r\n",
"description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest existing intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of the public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well-documented Battle of Kadesh, which nearly ended as a disaster for the Egyptians when Shasu spies led the Pharaoh, Ramses II, into a trap. This practice of employing spies is the earliest documented intelligence network in history.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9db6dfd0-476b-11e7-bfa2-633db9d19e2a.png",
"caption": "",
"width": "703",
"height": "354"
},
"credit": "Battle of Kadesh 1274 BC: Two Shasu spies being beaten by Egyptians. Public Domain \r\n",
"links": [
{
"text": "HistoryNet",
"uri": "http://www.historynet.com/battle-of-kadesh.htm"
}
],
"disabled": false,
"__index": 0,
"dateCreated": "Fri, 02 Jun 2017 08:17:42 GMT"
},
{
"id": "sun-tzu-the-art-of-war",
"date": "5th century BC",
"title": "Sun Tzu: The Art of War",
"medium": "Book",
"category": "Surveillance",
"keywords": "#Espionage #Surveillance #Spy #Literature #Military #Ancient #Warfare #Intelligence #Information\r\n",
"description": "The Art of War is a famous treatise about military strategies and tactics, written by the Chinese general Sun Tzu. The text is composed in 13 chapters, each describing one aspect of warfare. The 13th chapter is solely devoted to the use of intelligence and espionage. In it, he writes: \"Enlightened rulers and good generals who are able to obtain intelligent agents as spies are certain for great achievements.\" Chia Lin, a commentator on the book who lived under the T'ang dynasty said that an army without spies is like a man without ears or eyes. The chapter strongly emphasizes on the importance of spies, which are classified in five types, as intelligent sources and how to manage each of them.\r\nThe book, although written in the 5th century BC, was an inspiration to Mao Zedong and found application also outside the field of warfare.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/eff59a60-476c-11e7-bfa2-633db9d19e2a.jpg",
"caption": " ",
"width": "1999",
"height": "1536"
},
"credit": "vlasta2, bluefootedbooby on flickr.com",
"links": [
{
"text": "Sun Tzu's Art of War",
"uri": "https://suntzusaid.com/book/13"
},
{
"text": "BBC News",
"uri": "http://www.bbc.com/news/magazine-24749166"
}
],
"disabled": false,
"__index": 2,
"dateCreated": "Fri, 02 Jun 2017 08:25:39 GMT"
},
{
"id": "the-holy-bible-the-12-spies",
"date": "1400 BC",
"title": "The Holy Bible: The 12 Spies",
"medium": "Biblic Story",
"category": "Surveillance",
"keywords": "#Spy #Religion #Espionage #Geography #Information #Israel #Literature #Reconnaissance #Intelligence #Migration\r\n",
"description": "The Old Testament is rich in spy stories. One of the best known is the story of the 12 spies in the Book of Deuteronomy. Moses, who is leading the Israelis in search of the Promised land, prepares to move in the land of Canaan following their exodus from ancient Egypt. Therefore he appoints 12 spies, one from each of the ancestral Israelite tribes, to \"bring back a report about the route we are to take and the towns we will come to.\" Although the spies brought back a cluster of grapes that took two men to carry, demonstrating the fertility of the new land, 10 of the spies where doubtful of the enterprise after reporting of obstacles. Not believing God could help them, the spies persuaded the Israelis that it was impossible to conquer the land, and that the whole nation was doomed to wander in the desert for 40 years. Only the two remaining spies, Joshua and Caleb, who believed in the Promised Land were allowed to enter it after the time of wandering.\r\n\r\nMoses recognized the necessity of espionage and continued using it to much better effect in wars, guiding the Israelis to victory.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/5912a150-476d-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "1000",
"height": "884"
},
"credit": "Giovanni Lanfranco, Moses and the Messengers from Canaan (1621 – 1624). Oil on canvas. The J. Paul Getty Museum, Los Angeles. Open Content.\r\n",
"links": [
{
"text": "Seattle Pacific University",
"uri": "http://blog.spu.edu/lectio/spies-and-lies/"
}
],
"disabled": false,
"__index": 4,
"dateCreated": "Fri, 02 Jun 2017 08:29:04 GMT"
},
{
"id": "ancient-surveillance-roman-empire",
"date": "753 BC–476 AD",
"title": "Ancient Surveillance: Roman Empire",
"medium": "Surveillance Concept",
"category": "Surveillance",
"keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covert Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n",
"description": "Throughout the history of the Roman Empire, espionage and surveillance were significant elements of the political apparatus. Spies engaged in both foreign and domestic political operations, assessing the disposition of their enemy but also the loyalty of their own population. Several accounts indicate the presence of secret police, one of which were the infamous <i>frumentarii</i> around the first century AD. Originally supply sergeants who purchased and distributed grain, they gradually became intelligence agents, adding manpower to the vast intelligence network of Ancient Rome. Working closely with the urban police, their duties included investigating, arresting, and even political assassination. By the 3rd century, the secret police was more and more seen as authoritative force or as an occupational army.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/db6d7300-476d-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "2000",
"height": "1103"
},
"credit": "The Reliefs of Trajan's Column by Conrad Cichorius. Plate number LXXXI: Troops entering camp (Scene CIX); Roman legionaries foraging (Scene CX), 113 d.C.. Public Domain\r\n",
"links": [
{
"text": "HistoryNet",
"uri": " http://www.historynet.com/espionage-in-ancient-rome.htm"
}
],
"disabled": false,
"__index": 5,
"dateCreated": "Fri, 02 Jun 2017 08:31:44 GMT"
},
{
"id": "cuban-missile-crisis",
"date": "1962",
"title": "Cuban Missile Crisis",
"medium": "Historic Event",
"category": "Surveillance",
"keywords": "#Evidence #Surveillance #Aerial-Photography #Airstrike #Cold-War #Missile #Governments #Politics #Warfare #Information #Reconnaissance #USA #Photography #Verticality #Weapons\r\n",
"description": "The Cuban Missile Crisis was a 13-day-long confrontation between the US and the Soviet Union concerning the American missile deployment in Europe and the Soviet missile deployment in Cuba. The confrontation is considered the closest the Cold War came to escalating into a nuclear war. The 1962 midterm elections were under way in the United States, and the White House had denied charges that it was ignoring dangerous Soviet missiles 90 miles from Florida. The United States had sent U-2 surveillance over Cuba, producing clear aerial images which served as photographic evidence of medium-range (SS-4) and intermediate-range (R-14) ballistic missile facilities. The United States then established a military blockade to prevent further missiles from reaching Cuba. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/a44c54d0-476e-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "591",
"height": "468"
},
"credit": "Aerial Photography of Cuba, 1962. Public Domain, Courtesy of CIA\r\n",
"links": [
{
"text": "The Atlantic",
"uri": "https://www.theatlantic.com/magazine/archive/2013/01/the-real-cuban-missile-crisis/309190/"
}
],
"disabled": false,
"__index": 32,
"dateCreated": "Fri, 02 Jun 2017 08:37:32 GMT"
},
{
"id": "the-watergate-scandal",
"date": "1972",
"title": "The Watergate Scandal",
"medium": "Case",
"category": "Surveillance",
"keywords": "#Governments #Politics #Scandal #Watergate #Wire Tapping #Surveillance #Bugs \r\n",
"description": "Watergate was a major political scandal following a break-in at the Democratic National Committee (DNC) headquarters at the Watergate office complex in Washington, D.C. President Nixon’s administration attempted to cover up its involvement. When the case was discovered and investigated by the U.S. Congress, the Nixon administration’s resistance to its probes led to a constitutional crisis.The term Watergate, by metonymy, has come to encompass an array of clandestine and often illegal activities undertaken by members of the Nixon administration, such as bugging and wiretapping the offices of political opponents and people of whom Nixon or his officials were suspicious. Nixon also ordered investigations of activist groups and political figures, using the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Internal Revenue Service (IRS).\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b7002a00-4770-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "500",
"height": "410"
},
"credit": "Front Page of The Baltimore Sun from 9th of August, 1974\r\n",
"links": [
{
"text": "History.com",
"uri": "http://www.history.com/topics/watergate"
},
{
"text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Watergate_scandal"
}
],
"disabled": false,
"__index": 43,
"dateCreated": "Fri, 02 Jun 2017 08:53:04 GMT"
},
{
"id": "all-the-president-s-men",
"date": "1976",
"title": "All the President’s Men",
"medium": "Film",
"category": "Surveillance",
"keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covert Operations #Disclosure #Information #USA #US-Election\r\n",
"description": "In the run-up to the 1972 elections, Washington Post reporter Bob Woodward covers what seems to be a minor break-in at the Democratic Party National headquarters. He is surprised to find top lawyers already on the defense case, and the discovery of names and addresses of Republican fund organizers on the accused further arouses his suspicions. The editor of the Post is prepared to run with the story and assigns Woodward and Carl Bernstein to it. They find the trail leading higher and higher in the Republican Party, and eventually into the White House itself.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/76bfd750-4771-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "720",
"height": "480"
},
"credit": "Warner Bros. / Getty Images\r\n",
"disabled": false,
"__index": 45,
"dateCreated": "Fri, 02 Jun 2017 08:59:23 GMT",
"links": []
},
{
"id": "internet-of-things",
"date": "1982",
"title": "Internet of Things",
"medium": "Case",
"category": "Surveillance",
"keywords": "#Surveillance #The Internet #Spy #Algorithm #Big Data #Control #Corporation #Data Protection #Dystopia #Governments #Information #Metadata #Network #Public #Private #Paranoia #Privacy #Sensor #Simulation #Technology\r\n",
"description": "The Internet of Things describes the interconnectivity of smart devices used in daily life. A modified Coke machine at Carnegie Mellon University became the first Internet-connected appliance as early as 1982. It was able to report its inventory and if the beverages were cold. \r\nSince then, the landscape of technology has changed significantly. Wireless sensors, machine learning, automation and cloud technology are enabling the vision of the Internet of Things. While today’s market of smart devices is striving to make our daily life as efficient as possible, privacy advocates express strong security concerns. As these devices are designed like black-boxes, it's not transparent which data is collected and given away to third parties. From smart home to smart cities – from an security expert's standpoint, the IoT enables a sophisticated surveillance network for private corporations and the government. As Silicon Valley critic Evgeny Morozov put it: “Surveillance Marketed As Revolutionary Technology”.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/a104a710-4772-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "1180",
"height": "660"
},
"credit": "wareable.com\r\n",
"links": [
{
"text": "The Guardian",
"uri": "https://www.theguardian.com/commentisfree/2016/feb/09/internet-of-things-smart-devices-spying-surveillance-us-government"
}
],
"disabled": false,
"__index": 47,
"dateCreated": "Fri, 02 Jun 2017 09:06:16 GMT"
},
{
"id": "cctv-avoidance-applications",
"date": "1998",
"title": "CCTV Avoidance Applications",
"medium": "App",
"category": "Surveillance",
"keywords": "#BigBrother #CCTV #Surveillance #Counter-Surveillance #Public #Privacy #Technology #Architecture\r\n",
"description": "In 1998, volunteers of the New York Civil Liberties Union walked the streets of Manhattan to identify 2,397 surveillance cameras recording people in public space. While the number of CCTV cameras highly increased after 9/11, today’s estimate is roughly 17,000 cameras all over New York City.\r\n\r\nTo raise awareness of the prevalence of surveillance, and the threat it poses to our individual freedom, various applications offer techniques to avoid surveillance. Among them is the citizen science project SPOTTERON that is used to track CCTV cameras in one's vicinity. The data comes from individuals. Apps for detecting hidden cameras, for example in hotel rooms, are also available on both major smartphone platforms in their respective app stores.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f1df3dc0-4773-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "920",
"height": "613"
},
"credit": "Photo by Amelia Holowaty Krales / The Verge\r\n",
"links": [
{
"text": "Mediaeater MMXIII",
"uri": "http://www.mediaeater.com/cameras/"
},
{
"text": "Spotteron",
"uri": "https://www.spotteron.com/surveillance/info"
}
],
"disabled": false,
"__index": 55,
"dateCreated": "Fri, 02 Jun 2017 09:15:04 GMT"
},
{
"id": "code-names-of-the-surveillance-state",
"date": "2014",
"title": "Code Names of the Surveillance State",
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Arts #Classified Information #Covert Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #Top-Secret #USA #War on Terror\r\n",
"description": "Trevor Paglen’s video installation ‘Code Names of the Surveillance State‘ is composed from more than 4000 National Security Agency (NSA) and Government Communications Headquarters (GCHQ) surveillance program 'code names‘ showing the vast extend of the secret surveillance apparatus.\r\nIn Paglen’s words: \"Projected as an endlessly scrolling series of columns, the codenames are deliberately nonsensical, often droll and sardonic words or short phrases without discernible connection to the programs they designate. “Bacon Ridge” is an NSA installation in Texas, “Fox Acid” an NSA-controlled Internet server designed to inject malware into unsuspecting web browsers, and “Mystic” a program to collect every phone call from the Bahamas.\"\r\nFurthermore Paglen projected a version of the video as a site specific installation onto governmental buildings throughout the UK.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e5c897b0-5296-11e7-b60e-4961fe0ea0b5.jpg",
"caption": "",
"width": "640",
"height": "427"
},
"credit": "Installation view at Metro Pictures. Image courtesy of Metro Pictures, New York, 2014\r\n",
"disabled": false,
"__index": 60,
"dateCreated": "Fri, 02 Jun 2017 09:18:49 GMT",
"links": [
{
"text": "Trevor Paglen",
"uri": "http://www.paglen.com/?l=work&s=code_names_of_the_&i=0"
}
]
},
{
"id": "aadhaar-identification-system-",
"date": "2009",
"title": "AADHAAR Identification System ",
"medium": "Program",
"category": "Surveillance",
"keywords": "#Biometrics #Surveillance #Big Data #Governments #Identification #Civil Rights ",
"description": "The Aadhaar identification system in India is the world's largest biometric database of citizens. A 12 digit unique-identity number is based on individual biometrics (iris scans, fingerprints) and demographic data. The system was launched in 2009 and covers nearly 90% of the total population of India as of April 2017.\r\n\r\nThe Aadhaar system raises security concerns as privacy advocates fear it being a tool of state surveillance, due to the mass collection of personal data. Due to the broad use of the identification number, it is also possible for private companies to exploit people's data; for example, if a purchase is made using the ID number, the seller may pay for further data linked to that number.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f9283630-4774-11e7-bfa2-633db9d19e2a.jpg",
"caption": "https://ichef-1.bbci.co.uk/news/660/cpsprodpb/C7CA/production/_95864115_02.jpg\r\n",
"width": "660",
"height": "439"
},
"credit": "Mansi Thapliyal\r\n",
"links": [
{
"text": "BBC News",
"uri": "http://www.bbc.co.uk/news/world-asia-india-39769322"
},
{
"text": "The Wire",
"uri": "https://thewire.in/118655/hello-aadhaar-goodbye-privacy/"
}
],
"disabled": false,
"__index": 66,
"dateCreated": "Fri, 02 Jun 2017 09:23:09 GMT"
}
],
"page": [
{
"id": "credits",
"title": "Credits",
"body": "~ Herzog & de Meuron\r\nJacques Herzog, Pierre de Meuron\r\nLuis Gisler\r\n\r\n~ Ai Weiwei Studio Berlin\r\nAi Weiwei\r\nLucas Lai, Jennifer Schmachtenberg\r\nJennifer Ng, Darryl Leung\r\n\r\n~ iart\r\nInteractive Playout System\r\n\r\n~ PhotoFlight Aerial Media Services, LLC\r\nAutomated Indoor Drone System\r\n\r\n~ Facial Recognition System\r\nAdam Harvey\r\n\r\n~ App Development\r\nJules LaPlace\r\n\r\n~ Virtual Library Research\r\nHanno Hauenstein, Berit Gwendolyn Gilma\r\n\r\n~ PRG\r\nProjection Equipment\r\n\r\n~ Sound Associates\r\nSound Equipment\r\n\r\n~ Video Monitors\r\nNew City Video",
"disabled": false,
"__index": 2,
"dateCreated": "Sat, 13 May 2017 19:49:53 GMT",
"byline": ""
},
{
"id": "privacy-policy",
"title": "Privacy Policy",
"body": "<p>A website is required by law to publish a <i>Privacy Policy</i> if it collects <i>personally identifiable information</i> (PII) which can be used to trace an individual's identity. This information can include your name, email address, telephone number, social security number, date of birth, mother's maiden name, etc. The Privacy Policy should indicate what information is tracked and how it is stored.</p><p>The <i>Terms of Service</i> is a legal document describing a relationship between a software vendor and the end user. Typically this document is designed to indemnify the company who made the software from what you do with it. It also describes your rights in using the software - and what rights you give up.</p><p>The website <a href=\"https://tosdr.org/\">TOS;DR</a> was created to keep track of what's hidden in the small print of these legal agreements. For instance, on Youtube, \"Deleted videos are not really deleted.\" Facebook and Google admit to tracking your behavior, even on other websites. Instagram and Netflix waive your right to participating in a class action lawsuit. You cannot delete your Skype account.</p>\r\n<hr>\r\n<h1>Privacy Policy</h1><p>Park Avenue Armory is committed to protecting your privacy. You can visit most pages on our site without giving us any information about yourself, but sometimes we do need information to provide services that you request. This policy describes the personal information we collect about you, the security measures we take to protect your information, the ways we use your information, and the limited situations in which we may share your information with third parties. Our policy also describes the choices you can make about how we collect and use your information. We encourage you to read the complete privacy policy; use of the Armory’s family of websites constitutes your acceptance of this policy.</p><h2>Collection of Your Personal Information</h2><h3>A. Information you give us</h3><p>The Armory will often request information that personally identifies you (personal information) or allows us to contact you. Generally, this information is requested when you purchase tickets, make donations, register for email newsletters or alerts, participate in a promotion or an online survey, contact us with a question or suggestion, request postal mailings, or apply for employment. Personal information collected generally includes a home address, email address, phone number, credit card information including expiration date and billing address, and product or genre preferences; it may include other information as needed to provide a specific service you requested or as part of an online survey, promotion, or app. We collect this information when you enter it on Armory websites or provide it voluntarily. You may remain anonymous to us if you choose to pay by cash in person at the Box Office.</p><h3>B. Automatic information</h3><p>When you visit the Armory’s websites, we automatically collect website usage information, as well as information about your computer and Internet connection. This includes your computer's IP address, the type and version of browser and operating system you use, your Internet domain, and if you visit via a link from another website, the URL of the linking page. This site visitation data is identified only by a unique ID number, and it is not linked with personal information unless you choose to log in. We aggregate this usage information and use it to identify the levels and areas of interest in the Armory and to improve and refine our websites, services, and security. We may perform (or have third parties perform) analyses of visitors' behavior, and may share aggregated, anonymous data with funders, sponsors, or agencies.</p><p>We use cookie technology to gain information that helps us improve the user experience and enhances the functionality of our websites. A cookie is a small amount of data sent by our websites and stored on your computer's hard drive that our site can read, and which helps us keep track of how you use our websites. Many web browsers automatically accept cookies by default but contain an option for you to disable the cookie acceptance if you prefer. We do not allow unrelated third parties to set cookies via the Armory’s family of websites.</p><p>The Armory uses electronic images known as web beacons to monitor the activity of our email messages. These web beacons allow BAM's email service provider to obtain information such as the IP address of the computer that opened the email and what links were clicked within the email. With both cookies and web beacon technology, the information that we collect is anonymous and not personally identifiable. </p><p>The Armory uses remarketing with Google Analytics to advertise online. This means that the Armory allows third party vendors to show ads from the Armory on sites across the Internet. The Armory and these third party vendors use first party cookies and third party cookies together to inform, optimize, and serve ads based on a visitor’s past visits to websites.</p><p>We employ third parties to perform functions like sending postal mail and email, removing repetitive information from customer lists, and processing credit card payments. These parties have access to personal information that is necessary to perform their functions, but they are contractually obligated not to use it for other purposes. </p><h2>Security Used to Protect Your Information</h2><p>The Armory employs the latest safeguards and technologies to protect your information:</p><h3>Secure Web Servers</h3><p>The Armory employs secure web servers hosted in a certified data center. A Network Solutions SSL (Secure Socket Layer) certificate is used for the secure encrypted exchange of data between your web browser and our websites using SSL encryption. Network Solutions Digital Certificates are trusted by over 99% of all browsers, applications, servers, and clients, including: Microsoft® Internet Explorer, Mozilla® Firefox, Google® Chrome, Konqueror (KDE), Opera and Apple® Safari. </p><h3>Firewall</h3><p>The Armory uses redundant, dedicated firewalls that protect both its transactional system and the data passing through it.</p><h2>Use of Your Personal Information<h2>\r\n\r\n<p>We use your personal information for the following purposes:</p>\r\n<li>- To ensure our site is relevant to your needs</li>\r\n<li>- To deliver services such as newsletters</li>\r\n<li>- To help us create and publish content most relevant to you</li>\r\n\r\n<p>The Armory may disclose your personal information if required to do so by law or in the good faith belief that such action is necessary to: (a) conform to the edicts of the law or comply with legal process served on the Armory or the site; (b) protect and defend the rights or property of the Armory and its family of websites; or (c) act in urgent circumstances to protect the personal safety of Armory employees, users of Armory products or services, or members of the public. </p>\r\n<p>In order to help us to better tailor our services and offerings, the Armory collects limited information about patron click-throughs, solely in connection with its e-newsletter and e-mail communications. Like many websites, this website also automatically logs certain aggregate information about visits to our website. This information is used for system administration and for producing usage statistics.</p>\r\n<h2>Control of your Personal Information</h2>\r\n<p>When you register, or otherwise give us personal information, your information will not be shared with third parties without your permission, other than for the limited exceptions already listed. It will only be used for the purposes stated above. The Armory does not rent or sell its email list but may sometimes exchange, rent, or sell names and addresses with other organizations. You may indicate to the Armory at any time whether or not you wish to have the Armory share your name with other organizations.</p>\r\n<h2>Protection of Children's Personal Information</h2>\r\n<p>This is a general audience site and does not knowingly collect any personal information from children.</p>\r\n<h2>Links and Embedded Content</h2>\r\n<p>Our websites may include links to other websites or embedded content. We do not control the privacy policies of the destination sites. Once you leave our servers or watch a YouTube video (you can see where you are by checking the URL in the location bar on your browser), use of any information you provide is governed by the privacy policy of the operator of the site you are visiting. </p>\r\n<h2>Updating Your Information</h2>\r\n<p>If you would like to update information and preferences in connection with newsletters, mailing lists, and databases, refer to the Armory’s “Contact Us” page. In all instances, you can stop receiving e-newsletters sent by the Armory by clicking on the "Unsubscribe" link at the bottom of each such e-newsletter.</p>\r\n<h2>Changes to this Statement</h2>\r\n<p>The Armory reserves the right to revise this privacy policy from time to time, and by using this website, you are agreeing to the terms of the then-current privacy policy. We encourage you to visit this page periodically to review our current policy.</p>\r\n<h2>Contact Information</h2>\r\n<p>The Armory welcomes your comments regarding this privacy statement, please contact us by email at info@armoryonpark.org or by postal mail:</p>\r\n<p>Park Avenue Armory\r\nAttn: Marketing Department\r\n643 Park Avenue\r\nNew York, NY 10021</p><hr>\r\n\r\n<h1>Terms and Conditions</h1>\r\n<p>Your right to access the content on this website and related products and to use the services provided via this website and related products are subject to the terms and conditions set forth below. Any breach of the terms and conditions set forth below immediately terminates such rights.</p>\r\n<h2>1. Content</h2>\r\n<p>The content provided on this website (collectively, the “Content”) is and remains at all times the property of Park Avenue Armory or its licensors or suppliers. You may download and use the Content for your personal, non-commercial use. You may not resell or commercially exploit the Content, nor may you download or copy Content for the benefit of a third party. Any use of data mining, robots, or similar data gathering and extraction tools is expressly prohibited. You may not frame or utilize framing techniques to enclose any Content without the express written consent of Park Avenue Armory. If you download or print a copy of the Content for personal use, you must retain all copyright and other proprietary notices contained therein.</p>\r\n<h2>2. Ticket Purchases</h2>\r\n<p>The purchase of tickets via this website is subject to our Ticketing Policies. Personal information you submit to us during the purchase of tickets via this website will be treated by Park Avenue Armory in the manner described in our Privacy Policy.</p>\r\n<h2>3. Intellectual Property Rights</h2>\r\n<p>The Content and the selection, compilation, collection, arrangement, and assembly thereof are protected by US and international copyright, trademark, and other laws. Other than as permitted in Section 1 of these terms and conditions, or as permitted by applicable law, you may not copy, reproduce, republish, upload, post, transmit, or distribute Content or other content or information available on or through this website in any way without our prior written permission.</p>\r\n<h2>4. Claims of Copyright Infringement</h2>\r\n<p>The Digital Millennium Copyright Act of 1998 (the “DMCA”) provides recourse for copyright owners who believe that material appearing on the internet infringes their rights under US copyright law. If you believe in good faith that materials hosted by Park Avenue Armory infringe your copyright, you (or your agent) may send us a notice requesting that the material be removed, or access to it blocked. Notices with respect to this website should be sent to info@armoryonpark.org.</p>\r\n<h2>5. Links</h2>\r\n<p>This website contains links to other internet websites, including affiliated websites that may or may not be owned or operated by Park Avenue Armory. The Armory has not reviewed all of the websites that are linked to this website, and has no control over such sites. Park Avenue Armory is not responsible for the content of such websites, any updates or changes to such sites, or the privacy or other practices of such sites, and the fact that the Armory offers such links does not indicate any approval or endorsement of any material contained on any linked site. Park Avenue Armory is providing these links to you only as a convenience. Accordingly, we strongly encourage you to become familiar with the terms of use and practices of any linked site.</p>\r\n<h2>6. Disclaimers</h2>\r\n<p>This website, the materials on this website, and any product or service obtained through this website are provided “as is” and without warranties of any kind, either express or implied. To the fullest extent permissible pursuant to applicable law, Park Avenue Armory and its affiliates , licensors, suppliers, sponsors, and agents disclaim all warranties, express or implied, including, without limitation, implied warranties of title, non-infringement, accuracy, merchantability, and fitness for a particular purpose, and any warranties that may arise from course of dealing , course of performance, or usage of trade. Applicable law may not allow the exclusion of implied warranties, so the above exclusions may not apply to you. </p>\r\n<h2>7. Limitation of Liability</h2>\r\n<p>Neither Park Avenue Armory nor any of its affiliates, licensors, suppliers, or sponsors, nor our directors, officers, employees, consultants, agents, or other representatives, are responsible or liable for any indirect, incidental, consequential, special, exemplary, punitive, or other damages (including limitation, damages for loss of business, loss of data, or lost profits), under any contract, negligence, strict liability, or other theory arising out of or relating in any way to this website and/or materials contained on this website, any linked site or any product or service purchased through this website. Your sole remedy for dissatisfaction with this website, materials, or linked site is to stop using this website, materials, or linked site, as applicable. The sole and exclusive maximum liability to Park Avenue Armory for all damages, loss, and causes of action, whether in contract, tort (including, without limitation, negligence, or otherwise, shall be the total amount paid by you, if any, to access this website. Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you.</p>\r\n<h2>8. Miscellaneous</h2>\r\n<p>This Agreement is governed by and construed in accordance with the laws of the State of New York, United States of America, without regards to its principles of conflicts of law. </p>\r\n<p>If any provision of this Agreement is found to be unlawful, void, or for any reason unenforceable, then that provision shall be deemed severable from this Agreement and shall not affect the validity and enforceability of any remaining provisions. </p>\r\n<p>This is the entire Agreement between us relating to your right to access the content on this website and to use the services provided via this website, and supersedes any and all prior or written or oral agreements between us with respect to such subject matter. No waiver by either party of any breach or default hereunder shall be deemed to be a waiver of any preceding or subsequent breach or default.</p>",
"disabled": false,
"__index": 3,
"dateCreated": "Sat, 13 May 2017 19:50:06 GMT"
},
{
"id": "contact",
"title": "Contact",
"body": "Please send us your comments/questions about the installation, and also any suggestions for additions to our virtual timeline on the History of Surveillance.",
"disabled": false,
"__index": 5,
"dateCreated": "Mon, 15 May 2017 09:43:18 GMT"
},
{
"id": "history-of-surveillance",
"title": "History of Surveillance",
"body": "The history of surveillance cannot be understood as an isolated subject; it is tightly bound to concepts of privacy and identity, and speaks volumes on the influence, limits, and evolution of technology, cryptography, warfare, and power. Practices of surveillance also reach far back in history – from evidence of a “secret service” in ancient Egypt to Biblical stories of secrecy, envy, treason and lust. \r\n\r\nResearch into the subject of surveillance often reveals surreal, even comical cases - like those of people deploying pigeons for espionage purposes. The examples chosen here eventually leads up to the present-day omnipresence of the internet and – within this context – various examples of so-called counter-surveillance.\r\n\r\nThe following timeline collects items that refer to both historical events and technological novelties, as well as cultural and artistic responses to surveillance culture, with emphasis on three main categories: History of Surveillance, Facial Recognition Technology, and Military Drones.\r\n\r\nThis attempt to showcase an overview of surveillance history is regarded as an open platform – entry suggestions can be sent and considered via the <a href=\"/contact\">CONTACT US</a> icon on the homepage.",
"disabled": false,
"__index": 6,
"dateCreated": "Thu, 18 May 2017 00:16:34 GMT"
},
{
"id": "print",
"title": "Print",
"body": "Go to the gift shop to purchase your print.\r\n\r\nEach print costs $10.00",
"disabled": false,
"__index": 8,
"dateCreated": "Mon, 22 May 2017 09:54:07 GMT"
}
],
"essay": [
{
"id": "curatorial-statement",
"title": "Curatorial Statement",
"body": "<i>Hansel & Gretel</i> is the latest work in the complex and exceptionally fruitful collaboration between Pritzker Prize winning Swiss architects Jacques Herzog and Pierre de Meuron (architects for the Armory’s renovation) and the Chinese artist/activist Ai Weiwei. Having worked together for fifteen years in the field of art and architecture, never defining their roles and thus creating unexpected results, they have collaborated on projects such as the \"Bird's Nest\" stadium for the Beijing Olympic Games in 2008 and the 2012 pavilion for the Serpentine Gallery in London. <i>Hansel & Gretel</i> brings together their combined interests in the psychological impact of architecture and the politics of public space; creating a playful, strange and eventually eerie environment with different layers of reality revealed to the visitors first in the Drill Hall and then in the Head House of the Park Armory. \r\n\r\nThe initial impulse for the project was to transform the vast Thompson Drill Hall into a public park, a place of free movement and play, open 24 hours and accessible from street level. <i>Hansel & Gretel</i> is, however, quite the opposite, a dystopian forest of projected light where the floor rises up, as if lifted by an invisible force, and visitors are tracked by infrared cameras and surveyed by overhead drones as they systematically capture the parkgoers' data and movements. Here the breadcrumbs of the famous Hansel and Gretel fairy tale are not eaten by birds but rather digital crumbs are gathered and stored, reminiscent of Ray Bradbury's poignant, 1953 science-fiction novel <i>Fahrenheit 451</i>, where an omniscient state surveils its citizens from the skies. \r\n\r\nEntering from a small street-level doorway on Lexington Avenue through a long darkening tunnel, the visitor experiences both psychological menace and exhilarating wonder upon exiting into the expansive landscape of the dimmed Drill Hall, animated by interactive projections mapping the visitor's every move. Utilizing state-of-the-art surveillance technology, the installation is both an enticingly playful and unnerving experience of what it means to be constantly watched, of public space without anonymity. Only upon leaving the Drill Hall and entering the hallways of the historic Head House, does the visitor discover through a continuation of the installation the extent of what has been seen and captured. An extensive digital library of surveillance histories and technologies is available for further research. \r\n\r\nIn an age of constant scrutiny and data storage beyond the knowledge and control of ordinary citizens, <i>Hansel & Gretel</i> is perhaps less fantastical and more menacing than it may at first appear. ",
"disabled": false,
"__index": 0,
"dateCreated": "Sat, 03 Jun 2017 19:09:34 GMT",
"byline": "Tom Eccles and Hans Ulrich Obrist, Curators"
},
{
"id": "facial-recognition",
"title": "Facial Recognition",
"body": "The Hansel & Gretel installation uses a custom facial recognition system that automatically captures visitors' facial biometrics as they move throughout the Armory. At all times, 5 surveillance cameras stream a 1920 x 1080 pixel image at 10 frames per second (FPS) to a central image processing server located on site. Every frame from every camera is run through a series of computer vision algorithms that detect faces and convert them into biometric face prints. In less than 10 milliseconds, using a minimum of 100 x 100 pixels, any face appearing in any surveillance feed is automatically extracted and stored in a local database as a 128-dimension feature vector.\r\n \r\nThese 128-dimension feature vectors represent what makes each face unique relative to other faces. Previous versions of facial recognition technology from the 1990s and early 2000s based recognition on seeing the face in a more human way, as linear combinations of composite photographs or by directly comparing the geometry between facial landmarks. Current state-of-the-art facial recognition algorithms, including the code used in the Hansel & Gretel system, make use of deep neural networks that automatically determine which combinations of facial features are the most useful for creating enough separation between between thousands of identities, analyzing the face is a more non-human way. In a controlled testing environment using frontal-pose images, the accuracy exceeds 99%.\r\n \r\nIn practice however, images captured in any surveillance system will typically be less accurate because of the differences between the pose, lighting, expression, optics and fashion accessories worn in the enrollment and capture photos. This effect is slightly minimized in the Hansel & Gretel facial recognition system because visitors are enrolled and matched on the same day. The accuracy of your matched photo will depend mostly on the equivalence of expression and pose between your submitted photo and your captured photos. According to a theory called the Biometric Zoo, match scores are also dependent on the relative similarity or difference of facial features amongst the enrolled population of faces. As with facial recognition technology and biometric recognition used in law enforcement and national security, no match is ever absolutely certain, but only a probabilistic determination based on the available matches in a database and the quality of your enrollment photo.",
"disabled": false,
"__index": 2,
"dateCreated": "Sat, 20 May 2017 21:50:17 GMT",
"byline": "Adam Harvey"
},
{
"id": "floor-projections",
"title": "Floor Projections",
"body": "Every movement in the Drill Hall is tracked and recorded from above by a grid of 56 small computers with infrared (IR) cameras, each attached to a projector suspended on a truss system high above the gently sloping floor. To allow for better tracking in low light conditions we installed an array of floodlights which operate in the near infrared spectrum and are thus is invisible to the human eye. Each computer runs a tracking algorithm that compares a preprogrammed image of the floor to the real time camera feed, and subtracts away any redundancy until only the difference features remain. The moving person can thus be isolated, identified, and followed, which triggers a red rectangular outline and grid pattern to appear. \r\n \r\nThe IR image now overlaid with tracking data undergoes a series of visual transformations. The powerful computers are able to make adjustments in cropping, scaling, warping, shifting, rotation, exposure, brightness, and sharpness, all within milliseconds. Only then are the “real time” images sent to the projector. The entirety of the 215 x 145 foot Drill Hall floor is covered by a total projection surface of 12360 x 7850 pixels, with each pixel being approximately ⅕ of an inch.",
"disabled": false,
"__index": 3,
"dateCreated": "Sat, 03 Jun 2017 19:11:30 GMT",
"byline": "iart"
},
{
"id": "drones",
"title": "Drones",
"byline": "PhotoFlight Aerial Media & Easy Aerial",
"body": "The drone technology used in this installation is the result of six months of research and development. While neither autonomous nor indoor drone flying are difficult tasks, combining the two operations with multiple drones simultaneously presented a challenge that very few teams have successfully accomplished.\r\n \r\nFor autonomous flight outdoors, drones use GPS technology to be aware of their point in space. In order for this operation to work indoors, we needed to create a system that allows the drones to understand their location in the environment, and the position of the other drones in the formation. A network of 32 sonar beacons were installed throughout the Drill Hall and special software was developed specifically for this project to provide real time communication between the beacons and the drones, ensuring the drones can successfully follow their individual pre-programmed paths.\r\n \r\nThe drones themselves are most often used for remote autonomous infrastructure inspections and surveillance. They consist of a Flybot - a computer core that takes care of control and communication, and four arms with electric motors and propellers. In this installation, their payloads are thermal cameras that capture the images of people roaming about the space, transmitting live video to screens throughout the Head House.\r\n \r\nWhen flying indoors near the public, nets are usually used to create a barrier between drones and people, mitigating the risk of any injuries resulting from a malfunction. However, using a net for this installation was not an option. A special Drone Safety Suspension System (or DS3), consisting of a pulley and tether system was specifically developed to ensure the safety of visitors. The DS3 was carefully designed and requires each drone to be equipped with its own retractable tether. The end of the tether is attached to a pulley that travels on a steel cable stretched above the floor. If the drone malfunctions, the tether prevents it from falling it onto visitors.",
"disabled": false,
"__index": 4,
"dateCreated": "Sat, 03 Jun 2017 19:49:36 GMT"
},
{
"id": "notes-on-surveillance",
"title": "Notes on Surveillance",
"byline": "Ai Weiwei",
"body": "<h2>To Watch and Be Watched</h2>\r\nSurveillance is the strongest characteristic of contemporary life, affecting everything from the highest levels of politics to the mundane everyday. Through rapid developments of technology, often by governments for scientific or military purposes, surveillance has become increasingly pervasive in society. The gathering of information through observation functions as the most essential and valuable tool of those in power. No one can say they are unfamiliar with this concept because no one in society is immune or exempt. Yet why surveillance exists and how it functions is both familiar and unfamiliar, a physical and virtual language requiring definition.\r\n\r\nFrom early on, the act of surveillance functioned to identify, target, or help draw a conclusion about a subject—whether it be about an individual, a group, a movement, or society at large; it was a way to gather intelligence and come to a rational conclusion about the suspicious, questionable, or unidentified. Surveillance has existed since human intelligence manifested; or, to be clear, since humans understood themselves to be human, coexisting independently and among each other in a group.\r\n\r\n<h2>Game of Cards</h2>\r\nEach player has a set of playing cards which are known only to them. There’s the deck of remaining cards and the cards which have already been revealed. The cards that have been drawn—with their face values exposed—is public knowledge, which is shared fairly and openly.\r\nThe card that will be drawn next represents the present condition, affecting the exposed cards, your own unrevealed cards, as well as the cards remaining in the deck. The cards in the deck are unknown to all and will ultimately determine who wins and who loses.\r\n\r\nA player would only agree to play if they believed that the unknown cards remain that way until openly revealed to all. In reality, those in power, whether it be cultural or political, democratic or authoritarian, hold an advantage. They know the value of the hidden cards.\r\n\r\nThe advantage comes from technological and logistical superiority, supported by special rules and laws. Often, the excuse for this unfair condition is an opaque appeal for greater security against the specter of terrorism. But why do we allow ourselves to play against a stacked deck?\r\n\r\nSociety has accepted the idea that data acquired through surveillance constitutes truth and fact. However, in many cases, the findings of this surveillance - from the cherry picked material presented, what is deleted and what is kept, the digital reconstruction of, and the context in which we see the data - is not in real time but a copy of that time which has been analyzed, interpreted, and then selectively disseminated.\r\n\r\nLike photography, is information gathered from surveillance reality or a (mis)representation of reality? Can the context in which it is made be divorced from the image we see? What of the intention to record in the first place? The public’s reaction is manipulated through means of presenting a doctored reality.\r\n\r\n<h2>A Captivated Audience</h2>\r\nWhen a magician performs on stage, everything has the veneer of perfection; he pulls a rabbit out of a hat or tells you exactly which card you selected in the deck. A miracle has happened right in front of your eyes.\r\n\r\nIn 2011, I was arrested and secretly detained for 81 days. My interrogators brought up fabricated accusations issued in an attempt to dirty my name. I looked them in the eye and asked, “Do you think the people will believe this?” The interrogator replied with confidence that 99% of people will believe them. A fundamental belief of those in power is that the understanding of the masses can be manipulated. That captivated audience, that 99%, will always exist, and that is who the magician performs for.\r\n\r\nSurveillance only works because of the demand for truth. However, this truth is provided by those with the power to conduct surveillance. The ones being watched are subject to the truth. In that case, that power of surveillance only exists when you are a willing participant in the system. The power of the magician comes from the audience’s invitation for them to perform. The audience wants to watch, to see with their own eyes. They don’t even need to be convinced; they are being lied to, but they rapturously applaud. This is our society.\r\n\r\nCard players are different because you are invited to the game. You have to believe in fairness to even play. If the game is an illusion, you’ve already lost. Why waste your time with a game you can never win?\r\n\r\n<h2>Argos</h2>\r\nSurveillance is a constant, unblinking set of eyes watching over us; the Greek myth of Argos Panoptes come to life. From that, a sense of truth is formed. This generates within our minds an understanding of something parallel to truth and reality, which is the power of constant surveillance, that you’re under watch and your actions can be recorded and played back.\r\n\r\nModern surveillance is a game changer because those in power are not only interested in knowing more about you, but also in having the power to make you aware you are being watched at all times, which has two advantages.\r\n\r\nFirst, those in power can exploit the data gathered against a target—often through disclosures of distorted fragments of information—in the name of evidence or truth, transformed into the sharpest weapon. This can be information gathered such as where you have traveled to, who you choose to associate with, or what you have said or done in the most intimate settings.\r\n\r\nIn China, the police will never show the unedited recorded images or video, even though they have the CCTV recordings. Often, the reason given is that a technical error occurred. In the US, cases of police misconduct often go unresolved because body cameras “malfunction” or security footage goes missing. They are able to tell the so-called “true story” while obscuring the full picture. Without providing all of the information, it will always be a one-sided game. The public is misled and exploited through the masquerade of transparency.\r\n\r\nIf arrested in the US, the police will tell you, “You have the right to remain silent and refuse to answer questions. Anything you say may be used against you in a court of law.” With surveillance, there is no declaration of any rights to not be observed, and all materials gathered can be used against you.\r\n\r\nSecond, to announce that a recording or evidence exists, without revealing it, can be damaging. The mere suggestion can imply a more serious situation than what took place in reality.\r\nPeeking into someone’s life without the observed noticing, or even to openly announce this capability, has a powerful psychological effect which changes human behavior. You may or may not be under surveillance and you will never know for certain. This uncertainty not only serves to promote self-editing but can also drive a person mad. It is like living in front of a two-way mirror. We can all see ourselves, but who else is also watching us?\r\n\r\n<h2>To Know the Unknown</h2>\r\nThe more private something becomes, the greater the desire to know more. The level of exposure and public interest to know more are tied; how private it is increases its perceived importance and the sensation surrounding it.\r\n\r\nConsider the case of Michael Flynn, the retired lieutenant general who has refused to testify in the investigation on the Russia-Trump campaign. How much does the US intelligence community already know? The public’s attention has been captured by what did or did not take place. What we do not know constructs the desire to know more. The unknown can be as vast as the universe.\r\n\r\nPerhaps knowing too much puts us in a more difficult position to enjoy, imagine, and dream. When we first saw a footprint on the surface of the moon, a thousand years of poetry about the moon collapsed and no one wrote any new poems about the moon. Knowing more, we ended up with less.\r\n\r\n<h2>Getting Lost</h2>\r\nToday, the individual can no longer get lost. There are new technologies which tell us which roads to take in the most unfamiliar surroundings, that track how many steps we have taken or how many calories our bodies have exhausted, or the present temperature anywhere across the globe, immediately. Those in power can also easily track us. They can check the record of anyone they want using text messages, email, and phone calls to see who you have been in contact with; GPS to track where you have traveled to; or simply bug your home or hotel room to listen in on your most private conversations. They can draw a complete map.\r\n\r\nIn 2015 I discovered hidden listening devices installed in the electrical sockets around my studio-home. Hearing a story about a snake and discovering one under your table are completely different feelings. It’s still alive and you can’t kill it. The authorities begged that I return these to them, hating that they had been exposed.\r\n\r\nThe individual will always be left in a state of confusion because surveillance affects all the traces of our lives. The traces are the marks we have made; these are the choices that identify us as individuals. This includes our language, politics, education, traditions, and who we choose to associate with. The traces are evidence in our art, architecture, literature, poetry, and music. It is in all our activities and we have no other legacy than our traces. All these things that we care deeply about have become data for a superior power to scrutinize without our consent. The saying, “It is none of your business” is now meaningless.\r\n\r\nWe believe that civilization is constantly working towards enlightenment. That knowledge has given us our self-consciousness, influenced what we know as human rights, and given us the understanding of equality. However, this is an old measurement. With new technology, we were promised greater equality, a Utopian future, but new technology has raised more questions than provided answers. We are no longer created equal. We have become creatures guided by unknown forces in ways we don’t understand, and we live with a greater sense of uncertainty because we now doubt the information around us. Your judgement, your ability to discern fact from fiction, is under increasing stress.\r\n\r\nSuddenly, you are standing, helpless, in the middle of nowhere—lost. Your sense of trust is gone. It is gone because we now have different realities and different truths, which often contradict each other. Indeed, we have become lost in an effort to be more clear. We depend so much on virtual reality that reality has become less important; our old understanding—of size, shapes, volume, texture, temperature, sound, lines, and light—remains, but, at the same time, they also exist in virtual reality, which gives us a completely different understanding about our very existence.",
"disabled": true,
"__index": 1,
"dateCreated": "Sat, 03 Jun 2017 20:04:13 GMT"
}
],
"stream": [
{
"id": "livestream",
"title": "Livestream",
"streams": [
{
"text": "Entrance",
"uri": "https://www.youtube.com/watch?v=r72Azq0C0_E"
},
{
"text": "Tunnel",
"uri": "https://www.youtube.com/watch?v=GON5zMPrG4M"
},
{
"text": "Exit",
"uri": "https://www.youtube.com/watch?v=LeKgQdZLJuQ"
},
{
"text": "Part 2 Entrance",
"uri": "https://www.youtube.com/watch?v=E_66XZcernM"
},
{
"text": "Infrared Cameras",
"uri": "https://youtu.be/adIZfkGDXAM"
},
{
"text": "Drones",
"uri": "https://www.youtube.com/watch?v=9GLDrLDALoo"
}
],
"disabled": false,
"__index": 0,
"dateCreated": "Thu, 18 May 2017 17:05:09 GMT",
"body": "As part of the installation we have set up several kinds of surveillance cameras in the Drill Hall of the Park Avenue Armory. Here you can see live streams which feature infrared captures from drones flying overhead inside the Drill Hall to hidden cameras watching visitors enter and exit the installation."
}
],
"drone": [
{
"id": "drone-statistics",
"title": "Drone Statistics",
"intro": "Military use of unmanned aircraft systems has grown by leaps and bounds over the last decade. In 2012, the US Air Force trained more drone pilots than normal pilots; the US Military has over 1,300 drone pilots in active service. Where drones were once used strictly for surveillance, their role has expanded as technology advances and budgets increase. Drones come in all shapes and sizes, from very small spy drones to large weapon-bearing predators. Unencumbered by human cargo, some drones can stay in the air for over six months, observing a target from high in the sky, completely invisible from the ground.",
"strikes": "3,341",
"totalKilled": "6,435-9,309",
"civiliansKilled": "739-1,407",
"childrenKilled": "240-308",
"__index": 0,
"dateCreated": "Thu, 18 May 2017 20:42:04 GMT",
"links": [
{
"text": "How Drones Work (BBC)",
"uri": "http://www.bbc.com/news/world-south-asia-10713898"
},
{
"text": "Unmanned Aircraft Systems (US Department of Defense)",
"uri": "https://www.defense.gov/UAS/"
},
{
"text": "Drones Explained (CNN)",
"uri": "http://edition.cnn.com/2013/02/07/politics/drones-cnn-explains/"
},
{
"text": "US Reveals Death Toll From Airstrikes Outside War Zones (NYTimes)",
"uri": "https://www.nytimes.com/2016/07/02/world/us-reveals-death-toll-from-airstrikes-outside-of-war-zones.html"
},
{
"text": "Drone Strike Statistics Answer Few Questions, and Raise Many",
"uri": "https://www.nytimes.com/2016/07/04/world/middleeast/drone-strike-statistics-answer-few-questions-and-raise-many.html"
}
],
"statisticsByline": "Data collected by the Bureau of Investigative Journalism. The totals represent minimum and maximum casualty levels, based on available reports. The lower bounds tend to represent statistics provided by the US Government, though the Bureau's investigation found these to underestimate the scale of drone warfare.\r\n\r\nSince 2010, the Bureau has made an extensive study of reports of US covert activities in Afghanistan, Pakistan, Yemen and Somalia. For more detailed information on drone use in these countries, investigate the countries below:",
"moreInfo": "More information can be found at the following links:"
}
],
"about": [
{
"id": "about",
"title": "About",
"show": "In a new commission that is both object and environment, Pritzker Prize-winning architects Jacques Herzog and Pierre de Meuron with artist/activist Ai Weiwei explore the meaning of public space in our surveillance-laden world, referencing the story of Hansel and Gretel in which the children lose their way and feel a sense of menace in a space they know and trust. The artists take advantage of the vast openness of the Drill Hall, creating a 21st century public place in which the environment is disconcerting, the entrance is unexpected, and every movement is tracked and surveyed by drones and communicated to an unknown public.\r\n\r\nThe work builds on the artists’ shared practice as designers of form and investigation (the Beijing Olympic Stadium and “quite simply the best summer Serpentine Pavilion ever” according to Time Out London) and their deep interest in the public realm whether through activism or architecture. Ai Weiwei has described their collaborations as follows: “My experience of working with Jacques and Pierre is that we never think separately. It’s like three soldiers in the war—and that’s a good feeling: we have a constant understanding.”\r\n\r\nCurated by Tom Eccles and Hans Ulrich Obrist",
"herzogBio": "Jacques Herzog established Herzog & de Meuron with Pierre de Meuron in Basel in 1978. He studied architecture at the Swiss Federal Institute of Technology Zurich (ETHZ) from 1970 to 1975 with Aldo Rossi and Dolf Schnebli. He was a visiting tutor at Cornell University, USA in 1983. With Pierre de Meuron, he is visiting professor at Harvard University, USA (1989 and since 1994), professor at ETH Zürich since 1999, and co-founder of ETH Studio Basel - Contemporary City Institute since 2002. In 2001, he was awarded the Pritzker Architecture Prize together with Pierre de Meuron.",
"deMeuronBio": "Pierre de Meuron established Herzog & de Meuron with Jacques Herzog in Basel in 1978. Pierre studied architecture at the Swiss Federal Institute of Technology Zurich (ETHZ) from 1970 to 1975 with Aldo Rossi and Dolf Schnebli. With Jacques Herzog, he is visiting professor at Harvard University, USA (1989 and since 1994), professor at ETH Zürich since 1999, and co-founder of ETH Studio Basel - Contemporary City Institute since 2002. In 2001, he was awarded the Pritzker Architecture Prize together with Jacques Herzog.",
"aiWeiWeiBio": "Ai Weiwei (b. Beijing, 1957) is an artist and activist who currently resides and works in both Berlin and Beijing. From architecture to installations, social media to documentaries, Ai uses a wide range of mediums as expressions to set up new possibilities and conditions for his audience to examine society and its values. Recent exhibitions include Law of the Journey at the National Gallery in Prague, Ai Weiwei. Libero at Palazzo Strozzi in Florence, #SafePassage at Foam in Amsterdam, translocation - transformation at 21er Haus Museum of Contemporary Art in Vienna, Andy Warhol | Ai Weiwei at the National Gallery of Victoria in Melbourne, and Ai Weiwei at the Royal Academy of Arts in London.\r\n\r\nAi is the recipient of the Václav Havel Prize for Creative Dissent in 2012 and the Amnesty International Ambassador of Conscience Award in 2015.",
"video": {
"url": "https://www.youtube.com/watch?v=elpAKTauZUw",
"type": "youtube",
"token": "elpAKTauZUw",
"width": "640",
"height": "360",
"title": "Cats Morph into Croissants",
"thumb": "http://i.ytimg.com/vi/elpAKTauZUw/hqdefault.jpg"
},
"__index": 0,
"dateCreated": "Thu, 18 May 2017 20:41:15 GMT"
}
],
"fmf": [
{
"id": "fmf",
"title": "FMF",
"price": "5.00",
"__index": 0,
"dateCreated": "Sat, 17 Jun 2017 08:18:17 GMT",
"printLine1": "Please go to the gift shop to purchase your print.",
"printLine2": "Each print costs $5.00."
}
]
}
|