{"id":15363,"date":"2017-05-04T00:00:00","date_gmt":"2017-05-03T22:00:00","guid":{"rendered":"https:\/\/www.akademie-solitude.de\/the-future-of-living-with-surveillance\/"},"modified":"2020-12-09T12:11:48","modified_gmt":"2020-12-09T11:11:48","slug":"the-future-of-living-with-surveillance","status":"publish","type":"post","link":"https:\/\/www.akademie-solitude.de\/en\/the-future-of-living-with-surveillance\/","title":{"rendered":"The Future of Living With Surveillance"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"project":[451,504,472],"project_type":[725,732],"class_list":["post-15363","post","type-post","status-publish","format-standard","hentry","project-web-residencies","project-calls-2017","project-blowing-the-whistle-questioning-evidence","project_type-formats","project_type-interview"],"acf":{"bgcolor":"","bgcolor_custom":"","custom_color_css_variable":"","content_type":[{"acf_fc_layout":"content_txt","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"txt_cols":"is-1-txtcol","txt":"<strong>Are we already living in surveillance states? Is their a creative side of privacy? And what do artists and WikiLeaks have in common?\r\nAgainst the narratives of Google and Facebook, that privacy doesn\u2019t exist anymore, Adam Harvey believes: privacy is the new trend. Already well-known through his <\/strong><strong>anti-surveillance and <a class=\"external\" href=\"https:\/\/ahprojects.com\/\" target=\"_blank\" rel=\"nofollow noopener\">anti-drone fashion\/camouflage-projects<\/a>, he also made it possible to break geofencing and obscure geolocation metadata with the open source project SkyLift. For <\/strong><strong><a class=\"external\" href=\"http:\/\/webresidencies-solitude-zkm.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Web Residencies<\/a> No. 1, 2017 by Solitude &amp; ZKM curated by Tatiana Bazzichelli on the topic \u00bb<a href=\"https:\/\/www.akademie-solitude.de\/de\/project\/web-residencies\/calls-2017\/blowing-the-whistle-questioning-evidence\/\">Blowing the Whistle, Questioning Evidence<\/a>\u00ab he has now released the third version of the device: R<\/strong><strong>ead an interview with the artist on surveillance, art, and whistleblowing, and learn how to build your own SkyLift for less than $5.<\/strong>\r\n\r\n<strong>Clara Herrmann:<\/strong> What is SkyLift? How did the project start and how does it work?\r\n\r\n<strong>Adam Harvey:<\/strong> SkyLift is a low-cost device for geolocation spoofing. It uses a small WiFi microcontroller (ESP8266) to replay WiFi signals used for geolocation services allowing a smartphone user to virtually appear nearly anywhere in the world. For this residency I\u2019ve released the code and instructions to build your own device at <a class=\"external\" href=\"https:\/\/github.com\/adamhrv\/skylift\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/github.com\/adamhrv\/skylift<\/a>.\r\n\r\nThe first version of SkyLift <a class=\"external\" href=\"https:\/\/ahprojects.com\/notebook\/2016\/skylift-geolocation\/\" target=\"_blank\" rel=\"nofollow noopener\">(V0.1)<\/a> was created in the summer of 2016 in collaboration with <a class=\"external\" href=\"http:\/\/suryamattu.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Surya Mattu<\/a> for <a class=\"external\" href=\"http:\/\/wwwwwwwwwwwwwwwwwwwwww.bitnik.org\/\" target=\"_blank\" rel=\"nofollow noopener\">!Mediengruppe Bitnik\u2019s<\/a> exhibition \u00bbWelcome to Ecuador!\u00ab at <a class=\"external\" href=\"http:\/\/www.zoogalerie.fr\/\" target=\"_blank\" rel=\"nofollow noopener\">Zoo Galerie<\/a> in Nantes. The concept was to virtually relocate visitors inside !Mediengruppe Bitnik\u2019s recreation of Julian Assange\u2019s room in Nantes to his real location at the Ecuadorian Embassy in London. This first prototype used a Raspberry Pi and software called <a class=\"external\" href=\"https:\/\/ahprojects.com\/notebook\/2016\/skylift-geolocation\/www.pseudocode.info\/post\/50127404555\/beacons-beacons-everywhere-using-mdk3-for-ssid\" target=\"_blank\" rel=\"nofollow noopener\">mdk3<\/a> (a beacon frame generator) to emulate the WiFi infrastructure at the Ecuadorian Embassy in London."},{"acf_fc_layout":"content_img","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"img_gallery":false,"img":[24852],"img_gallery_format":""},{"acf_fc_layout":"content_txt","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"txt_cols":"is-1-txtcol","txt":"Functionally, the device worked well. Visitors in Nantes were successfully relocated to Julian Assange\u2019s real residence in London, overpowering their phone\u2019s other geolocation services such as space-based GPS and cellular triangulation."},{"acf_fc_layout":"content_video","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"video_embed":"https:\/\/twitter.com\/wikileaks\/status\/755528093863964672","video":{"video_mp4":null,"video_webm":null}},{"acf_fc_layout":"content_txt","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"txt_cols":"is-1-txtcol","txt":"But the project was difficult to setup and demonstrate. It used one computer for collecting the WiFi data on site at the Embassy in London and another separate computer for rebroadcasting them in Nantes. Both computers needed to be setup with custom software and this required too much time and prior knowledge. Instructions were posted on GitHub to build the device but people reported difficulty with the setup and results. This technical barrier to entry is further supported by the history of WiFi geolocation spoofing, which was first discovered over 9 years ago by <a class=\"external\" href=\"http:\/\/www.ethlife.ethz.ch\/archive_articles\/080417_WiFi_location_spoofing\/index_EN.html\" target=\"_blank\" rel=\"nofollow noopener\">Professor Srdjan Capkun<\/a> at ETH Zurich. In his report, Professor Capkun makes clear that a smartphone\u2019s location can be easily spoofed by forging a router\u2019s MAC address and rebroadcasting its Beacon Frames. Despite their early warning in 2008, this vulnerability still existed in 2012 when Bengt Sj\u00f6len and Gordan Savicic creatively exploited it for their 2012 project <a class=\"external\" href=\"https:\/\/criticalengineering.org\/projects\/packetbridge\/\" target=\"_blank\" rel=\"nofollow noopener\">Packetbridge<\/a>. All three projects (Capkun\u2019s device in 20018, Packetbridge in 2012, and SkyLift V0.1 in 2016) make clear that geolocation spoofing is technically feasible, but still too technically challenging to reach a larger audience.\r\n\r\nFor this web residency with Akademie Schloss Solitude &amp; ZKM, I\u2019m releasing the 3rd version of SkyLift, including the <a class=\"external\" href=\"https:\/\/github.com\/adamhrv\/skylift\/\" target=\"_blank\" rel=\"nofollow noopener\">code and instructions<\/a> for how to build your own device for less than $5.\r\n\r\nCompared to the first version of SkyLift, the main improvements are:\r\n<ul>\r\n \t<li>reduced build cost from $50 to about $5<\/li>\r\n \t<li>reduced setup time for core technology from several hours to about 15 minutes<\/li>\r\n \t<li>improved user operation (simply provide USB power)<\/li>\r\n \t<li>added utility scripts creating custom locations<\/li>\r\n \t<li>isolated technology to a single device<\/li>\r\n \t<li>added optional OLED for display<\/li>\r\n<\/ul>\r\nMost of the improvements over the first version of SkyLift (V0.1), which used a Raspberry Pi computer and external WiFi adapter, can be attributed to the improved accessibility of the ESP8266 firmware that was developed by the Arduino community at large. SkyLift (V0.3) takes advantage of, in particular, one unique feature of the ESP8266 to broadcast a custom Beacon Frame. Broadcasting this packet (an <a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/Beacon_frame\" target=\"_blank\" rel=\"nofollow noopener\">802.11 management frame<\/a> is all that\u2019s needed to exploit WiFi geolocation services.\r\n\r\nAmong the other features released for this web residency are Python scripts to capture WiFi network data using iOS or OSX, format the data for Arduino, and another script to access WiFi data from the Wigle.net API.\r\n\r\nAlthough this release has many improvements there are still several limitations. The two main limitations to consider are that SkyLift does not perform well in busy WiFi environments where there are many active wireless routers, and that you will need to be familiar with Python to run the data utility scripts from the command line. A future version will eventually include browser-based JS utility scripts to format location data."},{"acf_fc_layout":"content_img","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"img_gallery":false,"img":[24854],"img_gallery_format":""},{"acf_fc_layout":"content_txt","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"txt_cols":"is-1-txtcol","txt":"<strong>CH: <\/strong>How did you get involved, and specialized, in topics around privacy and counter-surveillance technologies?\r\n\r\n<strong>AH: <\/strong>I can\u2019t remember exactly how I ended up here, but I believe it is mostly due to my brief experience working as a photographer in NYC between 2004-2008. I think a lot changed for photography during this time. I saw it move swiftly away from its uses for art and documentation towards an increasingly authoritarian, automated, and powerful tool for surveillance and control. Susan Sontag\u2019s writing helped me make sense of this transformation. Ultimately it became clear that there was massive asymmetry emerging between those who have the means to photograph, surveil, and analyze imagery and everyone else who is swept up by this technological transformation. In 2008, when I began studying for my masters at NYU, I realized what I was most interested in was not photography, but in creating new ways of appearing and disappearing. Because I had studied mechanical engineering and physics earlier in my undergraduate studies, I approached privacy and counter-surveillance from a very technical perspective.\r\n<blockquote><span class=\"has-font-maison-neue-extended\" style=\"font-family: 'Maison Neue Extended';\"><strong>\u00bbIn terms of the role of art in my work, I often consider art to function as a space where things can exist but have no place yet. Art can function as place for ideas as impossible as the demilitarized zone between North and South Korea, where peace and neutrality try to exist but have no place yet.\u00ab<\/strong><\/span><\/blockquote>\r\n<strong>CH: <\/strong>You work as visual artist, technologist, and designer \u2013 what is the role of art in your projects? What can art do here?\r\n\r\n<strong>AH:<\/strong> This is a difficult question to answer because art is such a difficult term to define. Or perhaps it\u2019s just difficult to imagine my work within the realm of other people\u2019s definitions of art. Many people don\u2019t consider the work I\u2019m doing as art and this is a great compliment. But this can also be problematic for art commissions, residencies, and exhibitions. In terms of the role of art in my work, I often consider art to function as a space where things can exist but have no place yet. Art can function as place for ideas as impossible as the demilitarized zone between North and South Korea, where peace and neutrality try to exist but have no place yet.\r\n\r\n<strong>CH:<\/strong> Would you consider yourself an activist?\r\n\r\n<strong>AH: <\/strong>No. There are people I admire that do far more for democracy and are more deserving of this label."},{"acf_fc_layout":"content_img","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"img_gallery":false,"img":[24856,24858],"img_gallery_format":""},{"acf_fc_layout":"content_txt","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"txt_cols":"is-1-txtcol","txt":"<strong>CH:<\/strong> In 2013, you launched the <a class=\"external\" href=\"https:\/\/privacygiftshop.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Privacy Gift Shop<\/a> at the New Museum store, featuring a line of products that explore the future of living with surveillance. Will there be a time when there will be more investment in privacy than in surveillance?\r\n\r\n<strong>AH:<\/strong> It\u2019s possible. Although privacy seems quaint and defensive compared to the impressive and offensive capabilities of surveillance. In the early 1900s camouflage faced a similar challenge. At it\u2019s worst Theodore Roosevelt was rumored to have described camouflage as \u00bba form of effeminate cowardice, a mere defensive strategy that all but announced an unmanly desire to hide instead of fight\u00ab (Elias, Ann. Camouflage and its Impact on Australia in WWII: An Art Historian\u2019s Perspective. Salus Journal. Vol 4, No. 1. 2016.). Throughout WWI and WWII the idea that camouflage was somehow unmanly was quickly overshadowed by the catastrophic losses of war. By the end of WWII camouflage had emerged as a sign of intelligence. I think there is a parallel between this story and the challenges that privacy faces today.\r\n\r\n<strong>CH: <\/strong>Your products also include anti drone fashion or camouflage make up. How would you like to change people\u2019s attittude towards their own privacy?\r\n\r\n<strong>AH:<\/strong> I would like to show the creative side of privacy, that it\u2019s not only about hiding. Privacy is also about appearing in new ways which is why the overlap with fashion seems natural.\r\n\r\nThere is a very strong narrative from companies like Google and Facebook that privacy does not exist anymore. Not only is this wrong, it\u2019s beginning to feel as dated and awkward as wearing your trendy wardrobe from a few years ago. Both privacy and countersurveillance, like fashion, are about staying one season ahead of the latest trends. Unfortunately for Facebook and Google, I think the new trend is towards privacy. For fashion this is great news because it opens up many new opportunities for modulating appearance, especially as it relates to computer vision analysis.\r\n<blockquote><strong><span class=\"has-font-maison-neue-extended\" style=\"font-family: 'Maison Neue Extended';\">\u00bbIf you live on Facebook, Twitter, or Instagram then you are 100% living in a surveillance state. If you live in London and spend all your time on Facebook then you are 200% living in a surveillance state.\u00ab<\/span><\/strong><\/blockquote>\r\n<strong>CH: <\/strong>Do we already live in surveillance states?\r\n\r\n<strong>AH: <\/strong>Probably, but it depends where and how you live. If you live on Facebook, Twitter, or Instagram then you are 100% living in a surveillance state. If you live in London and spend all your time on Facebook then you are 200% living in a surveillance state. Elsewhere or offline, the problem is less acute. I understand that telecommunications have changed privacy forever, but there\u2019s a big difference between the attitudes towards privacy in Germany, for example, and in the United States. The lack of regulation on data collection, sharing, and surveillance in the US is astonishingly punitive towards consumers and, ultimately, towards democracy.\r\n\r\n<strong>CH:<\/strong> What was the reaction on your projects by media and also politics so far?\r\n\r\n<strong>AH: <\/strong>It\u2019s interesting that several projects have appeared on both left and right wing news sources. But the most interesting is when projects appear in security reports years after first releasing the project. This makes me realize that despite an initial buzz around the release, a project can have a long and lasting impact on discussions, or implications for security.\r\n\r\n<strong>CH:<\/strong> One of your latest projects, <a class=\"external\" href=\"https:\/\/ahprojects.com\/projects\/hyperface\/\" target=\"_blank\" rel=\"nofollow noopener\">HyperFace<\/a>, that was first presented at <a class=\"external\" href=\"https:\/\/media.ccc.de\/v\/33c3-8238-retail_surveillance_retail_countersurveillance\" target=\"_blank\" rel=\"nofollow noopener\">33c3<\/a> in Hamburg, works with false faces printed on textiles to confuse or distract facial recognition software. How will this project be developed further?\r\n\r\n<strong>AH:<\/strong> My current plans are to release HyperFace as a collection of garments in the fall of 2017. The HyperFace patterns can also be printed as wallpaper and used in more architectural ways. Although there hasn\u2019t been as much interest in this application, I hope to continue experimenting with this idea and to explore the aesthetics of figure and ground relationships in computer vision and architecture."},{"acf_fc_layout":"content_img","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"img_gallery":false,"img":[24860],"img_gallery_format":""},{"acf_fc_layout":"content_txt","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"txt_cols":"is-1-txtcol","txt":"<strong>CH:<\/strong> How do you find inspiration for your work? And what are your next ideas and plans?\r\n\r\n<strong>AH:<\/strong> Only in the most unexpected places. By winter I hope to release a new interactive book about the hidden secrets of low-resolution imagery.\r\n\r\n<strong>CH: <\/strong>With the first SkyLift, users could pretend to be at London\u2019s Ecuadorian Embassy, the home or prison of WikiLeaks boss Julian Assange for the past four years. There is also a controversial debate going on about the practices of the whistleblowing platform. What is your relation to the network\/scene around WikiLeaks and how do you estimate their work?\r\n\r\n<strong>AH:<\/strong> My overall impression is that WikiLeaks has made a positive contribution towards democracy in the United States. It\u2019s true that they present a dilemma between absolute transparency and individual privacy, often sacrificing the latter for the former.\r\n\r\nAlthough several of my projects are about individual privacy which WikiLeaks has at times trampled upon, I still find inspiration in their sustained ability, as a small organization, to stand ground against the powerful organizations and expose important truths that otherwise wouldn\u2019t be known. I think artists face a much less extreme but similar challenge as individuals or collectives, as the underdog, to also stand up and engage with power."},{"acf_fc_layout":"content_img","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"img_gallery":false,"img":[24862],"img_gallery_format":""},{"acf_fc_layout":"content_img","bgcolor":"","bgcolor_custom":"","layout_col_size":8,"img_gallery":false,"img":[24864],"img_gallery_format":""}]},"_links":{"self":[{"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/posts\/15363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/comments?post=15363"}],"version-history":[{"count":0,"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/posts\/15363\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/media?parent=15363"}],"wp:term":[{"taxonomy":"project","embeddable":true,"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/project?post=15363"},{"taxonomy":"project_type","embeddable":true,"href":"https:\/\/www.akademie-solitude.de\/en\/wp-json\/wp\/v2\/project_type?post=15363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}