Unformatted text preview:

PowerPoint Presentationlast timeoutlinesurveillance and artsurveillancepanopticon (1791)Slide 8claude-nicolas ledoux’s salt plant at arc-et-senans (1779)salt plant at arc-et-senans (1779)surveillance as a dream of the 18th enlightenmentwarwick castle oubliettetechnologies of surveillancefrom surveillance to dataveillancewarrantless wiretapspatriot act and post 9/11surveillance model versus capture modelcapture (in comparison with surveillance)taylorism, fordism and grammars of actionprivacy: a definitionprivacy: a culturally specific definitionwhat’s missing from this picture?what are the connections between the public and the private?resistances between private and publiclessig on the merits of inefficiencylessig on inefficiency (continued)gandy on the merits of inefficiencydigital media versus computer sciencelessig on architecturelessig on code and architecturelessig on architecture of privacyarchitectures of privacylessigmonitoring on the webcookiesencyptionsearch/elaboration/data miningsearching on the webagre on “elaboration”“data mining” is one form of “elaboration”goals of data miningtypes of data miningdata mining tasksdata mining taskSlide 45Slide 46Slide 47Slide 48data mining applicationstechnologies and architectures of privacyarchitectures and inefficienciesnext timesurveillancefdm 20c introduction to digital medialecture 04.11.2008warren sack / film & digital media department / university of california, santa cruzlast time•non-linear media–Work that gets done “behind the screen”–Work that gets done “on the screen”–Work that gets done “in front of the screen”outline•surveillance and art•history of and surveillance today•review of the capture model•definition of privacy–private versus public•civil versus economic–capture–efficient connections versus resistances–on the virtue of inefficiencies•lessig on monitoring and search–example: monitoring on the web–example: search on the web•gandy on data miningsurveillance and art•some artists and art groups concerned with surveillance–see the zkm show, [ctrl] space, 2001, curated by thomas y. levin•http://hosting.zkm.de/ctrlspace/e/intro–Rsg•Carnivore: http://r-s-g.org/carnivore/–surveillance camera players•http://www.notbored.org/the-scp.html–institute for applied autonomy•http://www.appliedautonomy.com/isee.html–julia scher•http://mit.edu/vap/workandresearch/workfaculty/work_scher.html–steve mann•http://www.eyetap.org/wearcam/shootingback/–hasan elahi•http://www.trackingtransience.net/surveillance•close watch kept over someone or something•Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchfulpanopticon (1791)panopticon (1791)claude-nicolas ledoux’s salt plant at arc-et-senans (1779)salt plant at arc-et-senans (1779)surveillance as a dream of the 18th enlightenment•Michel Foucault: “I would say that Bentham was the complement of Rousseau. What in fact was the Rousseauist dream that motivated many of the revolutionaries? It was the dream of a transparent society, visible and legible in each of its parts, the dream of there no longer existing any zones of darkness, zones established by the privledges of royal power or the prerogatives of some corporation.”–the eye of power, a conversation with jean-pierre barou and michelle perrotwarwick castle oubliettetechnologies of surveillance•example: viisage & superbowl XXXV–the company: www.viisage.com–the technology: eigenfaces•white.media.mit.edu/vismod/demos/facerec/basic.htmlfrom surveillance to dataveillance•dataveillance/spying–carnivore–echelon–total information awareness agency•now the “terrorism information awareness” project•name change as of may 21, 2003 to mollify congress’ worries about intrusion of the privacy of u.s. citizens•headed by convicted felon (former admiral) john poindexter•http://www.darpa.mil/darpatech2002/presentations/iao_pdf/slides/poindexteriao.pdf–officially ended in september 2003, but see electronic frontier foundation’s update: http://www.eff.org/Privacy/TIA/warrantless wiretaps•Soon after the September 11, 2001 attacks U.S. President George W. Bush issued an executive order that authorized the National Security Agency (NSA) to conduct surveillance of certain telephone calls without obtaining a warrant from the Foreign Intelligence Surveillance Court (FISC) as stipulated by FISA.•In the case ACLU v. NSA, Detroit District Court judge Anna Diggs Taylor ruled on August 17, 2006 that the program is illegal under FISA as well as unconstitutional under the First and Fourth Amendments of the United States Constitution. Her decision is stayed pending appeal. [Wikipedia]•FISA law is under debate and scrutiny in Congress (2007-2008).patriot act and post 9/11•aclu’s analysis–see http://www.aclu.org/SafeandFree/SafeandFree.cfm?ID=11813&c=207•new powers of surveillance, search and seizure•threat to the first, fourth, fifth, sixth, eighth and fourteenth amendments of the U.S. Constitutionsurveillance model versus capture model•surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance•capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time–agre, p. 740lcapture (in comparison with surveillance)•linguistic metaphors (e.g., grammars of action)•instrumentation and reorganization of existing activities•captured activity is assembled from standardized “parts” from an institutional setting•decentralized and hetrogeneous organization•the driving aims are not necessarily political, but philosophical/market driventaylorism, fordism and grammars of action ford assembly line circa 1925privacy: a definition•1.–a. the quality or state of being apart from company or observation–b. SECLUSION: freedom from unauthorized intrusion <one's right to privacy>•2. archaic : a place of seclusion•source: Merriam Webster•Note also etymological similaity between “privacy” and “privation”privacy: a culturally specific definition•Does the U.S. Bill of Rights define an individual’s “right to privacy”?•Not explicitly, but...–inferrably: e.g., Amendment IV: The right of the people to be secure in their persons, houses,


View Full Document

UCSC FDM 20C - Surveillance

Download Surveillance
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Surveillance and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Surveillance 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?