Border Check, the physical and political realities behind the internet

44k

As one surfs the net, data packets are sent from the user’s computer to the target server. The data packets go on a journey hopping from server to server potentially crossing multiple countries until the packets reach the desired website. In each of the countries that are passed different laws and practices can apply to the data, influencing whether or not authorities can inspect, store or modify that data continue

Google to Sell Users’ Endorsements

A change in its terms of service would let Google include users’ names, photos and comments in ads across the Web.

    



Selling Secrets of Phone Users to Advertisers

Advertisers and tech companies are finding new ways to track us on our smartphones and reach us with individualized ads.

    



The Turing Normalizing Machine. An experiment in machine learning & algorithmic prejudice

87k

Conducted and presented as a scientific experiment TNM challenges the participants to consider the outrageous proposition of algorithmic prejudice. The responses range from fear and outrage to laughter and ridicule, and finally to the alarming realization that we are set on a path towards wide systemic prejudice ironically initiated by its victim, Turing continue

Acxiom Lets Consumers See Data It Collects

Visitors to the site can review many seemingly innocuous facts about themselves, but critics say it provides a sanitized view of the information mining behind data-driven marketing.

    



The Pod Hotel

The Pod, designé par Formwerkz Architectz, est le tout nouvel hôtel capsule de Singapour. Les cabines empilées les unes sur les autres, caractéristique première des hôtels capsules, sont plus spacieuses et offre un peu plus d’intimité. Un très bel hôtel, magnifiquement réalisé, à découvrir en images.

 width=

 width=

 width=

 width=

 width=

 width=

 width=

 width=

 width=

p1
p4
p
p7
p6
p5
p3
p2
p8

Whistle-Blowers in Limbo, Neither Hero Nor Traitor

Edward Snowden and Pfc. Bradley Manning say they obeyed a moral imperative on behalf of the public, but the public is divided on whether that’s a good thing.

    

Analyze Dat: TOR Visualization & online black markets

109k

I knew about Bitcoin, i had heard of the Tor software that enables online anonymity but other than that, i felt that there was precious little i knew about the Deep Web, the vast submersed side of the World Wide Web that countless people are using in perfect anonymity every day to buy goods that neither ebay nor amazon will ever sell you and to exchange services that never appear when you do a google search. The more i looked into online black markets, the more intrigued i was. I thought that the easiest and fastest way to get a better understanding of the issue would be to interview Arthur Heist continue

Google’s PRISM-Driven Doublespeak Needlessly Misleading

Some things are still scared, but your privacy on corporate-owned communications networks is not, and never has been.

PRISM slide crop

This fact of digital life has been evident for years, but the recent revelation that the National Security Agency is working closely with leading tech companies, makes it crystal clear–anything you write, say, record, transfer etc. is subject to inspection by a federal employee tasked with keeping America secure from terror attacks.

Tech companies could stand tall and say yes, we help keep America safe from terror. But they’ve chosen to deny their involvement instead.

This is what The Google has to say for itself:

We have not joined any program that would give the U.S. government—or any other government—direct access to our servers. Indeed, the U.S. government does not have direct access or a “back door” to the information stored in our data centers. We had not heard of a program called PRISM until yesterday.

Thankfully, Foreign Policy breaks down the geek’s coded language for us.

According to Chris Soghoian, a tech expert and privacy researcher at the American Civil Liberties Union, the phrase “direct access” connotes a very specific form of access in the IT-world: unrestricted, unfettered access to information stored on Google servers. In order to run a system such as PRISM, Soghoian explains, such access would not be required, and Google’s denial that it provided “direct access” does not necessarily imply that the company is denying having participated in the program.

A similar logic applies to Google’s denial that it set up a “back door.” According to Soghoian, the phrase “back door” is a term of art that describes a way to access a system that is neither known by the system’s owner nor documented. By denying that it set up a back door, Google is not denying that it worked with the NSA to set up a system through which the agency could access the company’s data.

Yes, the company that vows to “do no evil,” not only engages in domestic spying on its users, it uses doublespeak to cloak its activities and protect its brand value.

As users or consumers of these networks, we have few places to turn. The connected networks we know as the Internet is a classic monopoly, conceived by the military and managed by their corporate contractors. Yet, we think of it as the peoples’ media. Why? Are too bedazzled by the promise of riches to pay attention to the facts? Or just lost in another cute cat video?

For me personally, I return time and again to the importance of media literacy. If we are not able or willing to turn away from the machine, we need to know how to live with it and work with it. And this means knowing what it is, how it works, who owns which piece and so on. Media literacy is also of the essence when flithy-rich corporate entities, and the government, use language to intentionally mislead people.

The post Google’s PRISM-Driven Doublespeak Needlessly Misleading appeared first on AdPulp.

The Reposition Matrix

133k

The Reposition Matrix is an investigation into the military-industrial production and trading networks of Unmanned Aerial Vehicles (also commonly referred to as Drones). The workshop aims to reterritorialise the drone as a physical, industrially-produced technology of war, and consequently explore how this affects our understanding of the covert drone campaigns in the Middle East continue

Under the Shadow of the Drone

196k

Under the Shadow of the Drone is a life-size depiction of a Reaper drone, one of a number of such weapons in service with US and UK forces. The Reaper is used for surveillance and bombing missions, in the declared war zones of Afghanistan and Iraq, and in the illegal wars of assassination taking place in Pakistan, Yemen and elsewhere. Such wars are made possible by the invisibility of drones to most people continue

The Pirate Cinema, A Cinematic Collage Generated by P2P Users

46k

In the context of omnipresent telecommunications surveillance, “The Pirate Cinema” makes visible the invisible activity and geography of peer-to-peer file sharing. The project is presented as a control room that reflects P2P exchanges happening in real time on networks using BitTorrent protocol. The installation produces an improvised and syncopated arrangement of files currently in exchange continue

Balancing Privacy With Open Justice in Britain

It has been a longstanding practice in many European countries for the police to withhold from the media the names of people who have been arrested. Britons are debating the practice.

    

Agreement Reached on British Press Restrictions

Lawmakers on Monday were said to have struck a deal on new regulations for newspapers, potentially one of the strongest peacetime press curbs in three centuries.

No One Was Hurt During The Making Of This Invasive Advertising

Would you stand up for a friend? No, seriously, if a friend called in the middle of the night and needed you to bail them out of a poker game gone wrong, would you rush over there with the ransom money to free your homey?

Carlsberg drinkers would.

Will Burns, CEO of Ideasicle loves the idea.

Carlsberg shattered the cliches while positioning itself as a brand for close (very close) friends. Here’s why I love this reality-prank idea: Carlsberg isn’t flatly claiming their beer is for those times when friends are together. They are demonstrating it.

David Gianatasio of Adweek notes:

The poker prank, while elaborate and invasive, actually seems a tad tame by the genre’s current standards. It’s nowhere near as shocking as last week’s faux elevator strangling for the movie thriller Dead Man Down, or as intricately upsetting as Nivea’s airport ambush in February, which strove to convince people that they were wanted by the law.

Duval Guillaume Modem/Antwerp is the responsible party, or irresponsible party depending on your POV.

Legendary copywriter and author Luke Sullivan, who now teaches advertising at SCAD in Savannah, weighed in on another new “shock and awe’ stunt from Pepsi MAX this morning:

I HATE THESE AD “PRANKS” THAT SCARE THE HELL OUT OF PEOPLE. SHAME ON THE BRANDS AND SHAME ON THE AGENCIES. What agency did this? I’d love to post a note on their site.

Here’s the footage he’s speaking of (btw, the Pepsi MAX looks to be from TBWA\Chiat\Day):

What are you thoughts on this invasive species?

The post No One Was Hurt During The Making Of This Invasive Advertising appeared first on AdPulp.

Harvard Hacked Staff Staff E-Mails

The searches were to root out leaks to the news media in a cheating scandal, and the staff members were not told until months later.

Harvard Hacked Staff E-Mails

The administration searched staff e-mails to try to root out the source of leaks to the news media in a cheating scandal, and the staff members were not told until months later.

#A.I.L / artists in laboratories, episode 16: Julian Oliver

51k

Our radio interview will focus on the Critical Engineering Manifesto that Julian wrote a year ago together with Gordan Savi?i? and Danja Vasiliev. Expect explanations about why Engineering is the most transformative language of our time, questions about how to adopt the critical engineering ethos if you have next to zero technical skills, and details about Julian Oliver’s upcoming projects continue

#A.I.L – artists in laboratories, episode 5

85k

Today i’m talking to Tom Keene, an artist whose work investigates technological objects and attempts to understand their agency and how they act as mechanisms of control within contemporary society. Our conversation will focus on topics such as the social impact of the Viterbi algorithm (with a previous explanation on what the algorithm does exactly) and wireless infrastructures, the loss of public space in cities, in particular in London and in the area surrounding the Olympic sites. continue

My Name Is Janez Janša

79k

The film that inspires you to google your name again….
My name is Janez Janša is a documentary film about names and name changes, focusing on one particular and rather unique name change that took place 5 years ago, when three artists officially changed their names into the name of the Prime Minister of Slovenia, Janez Janša continue