The Trilogy Face-To Facebook, Smiling in the Eternal Party

Total Page:16

File Type:pdf, Size:1020Kb

The Trilogy Face-To Facebook, Smiling in the Eternal Party CORE Metadata, citation and similar papers at core.ac.uk Provided by Sydney eScholarship THE HACKING MONOPOLISM servers. With the money we got we porting all the 250,000 profiles. Users TRILOGY automatically bought Google shares, so trying to contact them ended up at their Alessandro Ludovico, Neural, Bari, we were able to potentially buy Google respective Facebook public profiles. Italy, E-mail: <[email protected]>. via its own advertisements. By Paolo Cirio, Brooklyn, USA, E-mail: establishing this auto-cannibalistic The trilogy <[email protected]>. model, we deconstructed the new We found a significant conceptual hole advertisement mechanisms by rendering in all of these corporate systems and we Abstract them into a surreal click-based economic used it to expose the fragility of their The three artworks of the Hacking Monopolism model. omnipotent commercial and marketing Trilogy are Face to Facebook [1], Amazon Noir [2] In Amazon Noir, Amazon.com's web- strategies. In fact, all these corporations and GWEI-Google Will Eat Itself [3]. These works have much in common in terms of both site was the vulnerable target. We eluded established a monopoly in their methodologies and strategies. They all use custom their copyright protection with a sophis- respective sectors (Google, search programmed software to exploit three of the biggest ticated hack of the ‘Search Inside the online corporations, deploying conceptual hacks engine; Amazon, book selling; that generate unexpected holes in their well-oiled book’ service: by searching the first sen- Facebook, social media), but despite marketing and economic system. All three projects tence of a book we obtained the begin- that, their self-protective strategies are were ‘Media Hack Performances’ that exploited ning of the second sentence, and then by security vulnerabilities of the internet giants' not infallible. And we have been platforms to raise media attention about their abuse reiterating a few thousands searches, we successful in demonstrating this. of power. These performances were staged through obtained the whole text, redistributing it There are other common themes in the the global mass media for millions of spectators worldwide. The processes of the projects are always as pdf file through peer-to-peer net- projects. In all of them we stole data that illustrated diagrams that show the main directions works. is very sensitive for the respective corpo- and processes under which the software has been In Face to Facebook, through special developed to execute the performances. Finally, all rations. With Google it was the "clicks" the installations we exhibited did not use computers custom software, we collected “public on their AdSense Program; with Amazon or networks, focusing more on the display of the profile” data from more than 1,000,000 we started to steal the content of entire processes than on the technologies. Facebook users. Then we studied and books, and with Facebook we stole a customized a face recognition algorithm. Keywords: Face to facebook, Amazon Noir, huge amount of public data profiles. In Google will eat itself, hacking, revelatory diagrams, The algorithm was programmed to all the three projects, the theft is not used big online corporations. ‘group’ the huge amount of faces we to generate money at all, or for personal collected (and their attached data) in a economic advantage, but only to twist Face to Facebook is the third work in a few simple categories (‘climber’, ‘easy the stolen data or knowledge against the series that began with GWEI-Google going’, ‘funny’, ‘mild’, ‘sly’ and ‘smug’ interests of the respective corporations. Will Eat Itself and Amazon Noir (the last - working definitions), with some intui- In GWEI it was the shares obtained two co-authored with Ubermorgen). tive differences, for both male and fe- through the money created by the Ad- In GWEI we wanted to buy Google using male subjects. The software effectively Sense program; in Amazon Noir it was its own money, generated by serving extracted 250,000 faces that were con- the pdf books distributed for free; and in Google AdSense text advertisements nected to the relevant public data in our Face To Facebook it was the collection first on a fake marketing website, and database. We established a dating web- of profiles moved with no prior notice to then on a network of hidden web- site called www.Lovely-Faces.com, im- a dating website. Indeed all the projects, independently Fig. 1. Face to facebook installation at Transmediale festival, Berlin, 2011 claim that some of the corporation’s "crown jewels", including their brand image and marketing approaches, can be hacked, by focusing only on their estab- lished strategies and thinking in a "what if?" fashion. Furthermore, all of the pro- jects were based on a "hacking" idea that, although pursued on a sophisticated level and with custom software, could have been applied by anybody with simi- lar results. This is one of the fundamen- tal values of these projects. Finally, all the installations we exhibited did not use computers or networks. We were trying to be coherent with the projects, but fo- cused more on the display of the pro- cesses than on the technologies. Face-to Facebook, smiling in the eternal party Social networking is naturally addictive. It's about exploring something very familiar that has never been available before: staying in touch with past and present friends and acquaintances in a Please reference as: [Author(s)-of-paper] (2013) [Title-of-paper] in Cleland, K., Fisher, L. & Harley, R. (Eds.) Proceedings of the 19th International Symposium of Electronic Art, ISEA2013, Sydney. http://ses.library.usyd.edu.au/handle/2123/9475 Page numbering begins at 1 at the start of the paper. single, potentially infinite, virtual space. connect to the several hundred people In fact, Facebook’s subliminal mantra The phenomenon challenges us who await them online. seems then to be "be personal, be psychologically, creating situations that The market value of these companies popular, never stop." It has even gone so previously were not possible. Before the is proportional to the number of users far as to make it difficult to notice when rise of social networking, former friends they have. Facebook is valued at around a friend closes their account (you need to and acquaintances would tend to drift 50 billion dollars [5]: it has one billion check the friend’s list to have any idea) away from us and potentially become users [6]. The game can often translate [7]. consigned to our personal histories. into a form of social binging in which The more successful (and crowded) Having a virtual space with (re)active the number of friends a user has is never the party, the more the private funders people constantly updating their enough to satisfy. But what kind of space are happy to put money into it. The price activities is the basic, powerful is Facebook? Facebook is not home - it the guests are unconsciously paying is fascination of the social network. But is way larger and more crowded. And it's that they are giving away their there's another attraction, based on the not the street, because you're supposed to (constantly updating) virtual identity. elusive sport (or perhaps urge) to know everybody in your space. Guests, in fact, organize their own space, position ourselves. The answer to the Facebook is an eternal, illusory party, and therefore their own ‘party’, offering fundamental identity question, "who am under surveillance and recorded for all the party owner (Facebook) a connected, I?" can be given only in relation to the time. Its structure invites you to first heterogeneous group of people who others that we interact with (friends, replicate and then enhance your real share interests. As such they offer what family, work colleagues, and so on). And social structures, replicating your can be termed as “crowd-sourced the answer to this question seems clearer experiences on your own personal targeting” – the indirect identification of after we take a look at our list of social "screen space". people’s targets and desires by the users network friends. In this unending party, you meet and themselves. In fact the spontaneously So an intimate involvement and join old and new friends, acquaintances posted data provides an endless (almost (endless) questioning of our online and relatives. As with most parties, automatic) mutual profiling, enriching identity (often literally juxtaposing with everything is private, or restricted to the and updating the single virtual identities, our physical one) is perpetrated in the invited guests, but has the potential to in a collective self-positioning. But can social network game. But social network become public if accidentally shared. profile data be liberated from platforms are not public organizations Here the guests' activity and interests are Facebook’s inexorable logic? The designed to help support social also recorded through their posts in answer is yes, but it's important to focus problems, rather they support private different formats and media (pictures, on the core of the Facebook profiles and corporations. Their mission is not to help movies, trips, preferences, comments). see how they are recognized as virtual people create better social relationships It's an induced immaterial labour with identities. First, the profiles sublimate or to help them improve their self- instant gratification. Guests produce the owners' (real) social actions and positioning. Their mission is to make content by indirectly answering the references through their virtual money [4]. Economic success for these question "who am I?" and they get new presences. Second, they synthesize their corporations rests on persuading users to friends and feedback in the process. effectiveness in representing real people through a specific element: the profile Fig. 2.
Recommended publications
  • Conspiracy Lecture V2, ROTTERDAM, Curated by Stephen Kovats
    Conspiracy Lecture V2, ROTTERDAM, curated by Stephen Kovats Introduction by Stephen Kovats TANGENT_CONSPIRACY V2_Institute for the Unstable Media 20.00, Friday, December 01, 2006 www.v2.nl Long before a clandestine military-academic collaboration created the 1960's ARPANET the speculative mechanisms of conspiracy theories have fueled global events. The internet and it's growing Web 2.0 counterpart have moved beyond the realm of information exchange and redundancy to become the real-time fora of narrative construction. Fuelling and fanning all forms of popular speculation the net now creates its own post-modern mythologies of world domination, corporate control and government induced fear fetishism. If the net itself is not a conspirative construct designed to control and influence global intellectual expression then, rumour has it, it plays the central role in implying as much. Has the internet now become a self-fullfiling prophecy of its own destructive speculation? V2_, in collaboration with the Media Design group of the Piet Zwart Institute, invites you to join Florian Cramer, Claudia Borges, Hans Bernhard and Alessandro Ludovico in an evening of net-based conspiracy built upon abrasive speculation, conjectural divination and devious webbots. ------------------ Alessandro Ludovico, editor in chief of Neural, has been eavesdropped upon electronically for most of his life due to his hacktivist cultural activities. Promoting cultural resistance to the pervasiveness of markets, he is an active supporter of ideas and practices that challenge the flatness of capitalism through self-organized cooperation and cultural production. Since 2005 he has been collaborating with Ubermorgen and Paolo Cirio in conceptually conspiring against the smartest marketing techniques of major online corporations.
    [Show full text]
  • Leaving Reality Behind Etoy Vs Etoys Com Other Battles to Control Cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See Detail of This Book on Amazon.Com
    Leaving Reality Behind etoy vs eToys com other battles to control cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See detail of this book on Amazon.com Book served by AMAZON NOIR (www.amazon-noir.com) project by: PAOLO CIRIO paolocirio.net UBERMORGEN.COM ubermorgen.com ALESSANDRO LUDOVICO neural.it Page 1 discovering a new toy "The new artist protests, he no longer paints." -Dadaist artist Tristan Tzara, Zh, 1916 On the balmy evening of June 1, 1990, fleets of expensive cars pulled up outside the Zurich Opera House. Stepping out and passing through the pillared porticoes was a Who's Who of Swiss society-the head of state, national sports icons, former ministers and army generals-all of whom had come to celebrate the sixty-fifth birthday of Werner Spross, the owner of a huge horticultural business empire. As one of Zurich's wealthiest and best-connected men, it was perhaps fitting that 650 of his "close friends" had been invited to attend the event, a lavish banquet followed by a performance of Romeo and Juliet. Defiantly greeting the guests were 200 demonstrators standing in the square in front of the opera house. Mostly young, wearing scruffy clothes and sporting punky haircuts, they whistled and booed, angry that the opera house had been sold out, allowing itself for the first time to be taken over by a rich patron. They were also chanting slogans about the inequity of Swiss society and the wealth of Spross's guests. The glittering horde did its very best to ignore the disturbance. The protest had the added significance of being held on the tenth anniversary of the first spark of the city's most explosive youth revolt of recent years, The Movement.
    [Show full text]
  • Art, Capital of the Twenty-First Century Aude Launay
    STATE OF POWER 2019 Art, Capital of the Twenty-First Century Aude Launay Jonas Lund, JLT 1106, 2018. CNC & engraved acrylic. Shielding itself in arcane guise to keep laymen away and, thereby, to shun any possibility of democratic supervision, finance has always created reality out of beliefs and stories, turning appraisal into numbers on which their trades are based. Fluctuations in markets reveal more changes in the minds of traders than actual variations in the companies traded. Being mainly composed of reflexive actions, the markets operate in a vacuum. The high volatility of finance seem to reverberate the ‘nothingness’ on which it relies. It is a world that artists understand well, challenging its power with its very means. What after all is an artwork? In literal terms, it is production time and material turned into an object, a commodity. The commodity’s value is not dependent on its inherent properties, however, but on the narratives attached to it – narratives built from the discourses and actions of collectors, curators, art historians, and so forth. Thus this value is not objectively determined. ‘In short, the value is not in the product but in the network’ argues artist and theorist Hito Steyerl, describing art as ‘a networked, decentralized, widespread system of value’ while comparing it to cryptocurrencies whose value is, as we know, not guaranteed by any central institution and whose state is maintained through distributed consensus.1 As the history of art is rooted in the subjective theory of value – despite a few historical attempts to rationalise the labor of art2 –, so is the act of collecting art objects.
    [Show full text]
  • Hans Bernhard, UBERMORGEN.COM Digital Actionism - Media Hacking (1994–2006)
    Hans Bernhard, UBERMORGEN.COM Digital Actionism - Media Hacking (1994–2006) "Maverick Austrian businessman." CNN Media Hacking Media Hacking is generally described very vaguely as manipulation of media technology. A more specific definition is the massive intrusion into mass media channels with standard technology such as email or mobile communications, mobile phones, etc... Usually these actions are carried out within the legal realm - or at least in the twilight zone of international law. Sometimes laws have to be challenged in order to update/optimize the legal system. We have to judge for ourselves whether its unethical to do so or its totally reasonable to put freedome of speech above an applieable law. With such a cybernetic modus operandi – in the end only courage, intelligence and basic technological know how is necessary – we can achieve enormous reach and frequency in this age of the totally networked space. Popular media hacking projects are the „Toywar“ by etoy and „Vote-auction“ by UBERMORGEN.COM. Important to note: All our projects are non- ideological, non-political. they are pure basic research experiments. Digital Actionism digital actionism describes the intuitive transposition of the principles of actionism into the digital. The created identities – corporate and collective – become the artistic field of expression and extreme forms of aestehtics – for example pure communication. The actions are documented by media coverage, emails and logfiles. The „hanging inside the network“, to be connected to millions and millions of invisible channels, the sensation of beeing a thin membrane within a mass meda storm... thats where it happens. Playground is the body of the „Actionist“ and especially the Head.
    [Show full text]
  • Where Are We Now? Contemporary Art | the Collection & Usher Gallery
    Where are we now? Contemporary Art | The Collection & Usher Gallery Where are we now? 14th September – 12th January 2014 how do we find our way? Starting with a reproduction of the oldest map in our collection (the original is too delicate too have on display ) this show presents historic maps and plans alongside four artists who use as their ma- terials, not paint nor pencil, but modern mapping technology. All four artists utilise these technologies to produce art works that tell us more than the data or information alone. Justin Blinder creates visualisations of the Wi-Fi hotspots in New York, allowing us to see the concentration of wireless Internet access. As this information seems to map the city, it allows us to question if we fully understand the future benefits, or negative aspects of this wireless technology. Paolo Cirio takes images captured on Google Street View of people going about their everyday business, prints them life size and plac- es them back into the locations they were photographed. Making us face the fact that our images are being captured daily without our knowledge. How many clues do you think you left behind today? Brian House takes data from mapping devices and uses them as a base to transform the information into a new format. In these works he has used G.P.S. from a mobile phone and black box re- corders from a crash scene to score musical arrangements. Jon Rafman trawls Google Earth to locate his images, ranging from the whimsical, romantic landscape to the capturing of crimes and everything in between.
    [Show full text]
  • With His Public Intervention Overexposed, Artist Paolo Cirio Disseminates Unauthorized Pictures of High-Ranking U.S
    With his public intervention Overexposed, artist Paolo Cirio disseminates unauthorized pictures of high-ranking U.S. intelligence officials throughout major cities. Cirio obtained snapshots of NSA, CIA, and FBI officers through social media hacks. Then, using his HD Stencils graffiti technique, he spray-paints high-resolution reproductions of the misappropriated photos onto public walls. New modes of circulation, appropriation, contextualization, and technical reproduction of images are integrated into this artwork. The project considers the aftermath of Edward Snowden’s revelations and targets some of the officials responsible for programs of mass surveillance or for misleading the public about them. The dissemination of their candid portraits as graffiti on public walls is a modern commentary on public accountability at a time of greater demand for transparency with regard to the over- classified apparatuses of surveillance that are threatening civil rights worldwide. The officials targeted in the Overexposed series are Keith Alexander (NSA), John Brennan (CIA), Michael Hayden (NSA), Michael Rogers (NSA), James Comey (FBI), James Clapper (NSA), David Petraeus (CIA), Caitlin Hayden (NSC), and Avril Haines (NSA). In this exhibition, NOME presents the nine subjects of the Overexposed series painted on canvas and photographic paper. As a form of creative espionage, and utilizing common search engines, social engineering, as well as hacks on social media, Cirio tracked down photographs and selfies of government officials taken in informal situations. All of the photos were taken by individuals external to the intelligence agencies, by civilians or lower ranking officers. Dolziger st. 31 10247 Berlin | Tuesday - Saturday 2 PM - 6 PM Indeed, the omnipresence of cameras and the constant upload of data onto social media greatly facilitate the covert gathering of intelligence that can potentially be used in a work of art.
    [Show full text]
  • Press Release - 10 Feb
    Press Release - 10 Feb. 2017. Berlin. Paolo Cirio’s artworks on view at Berlin’s photography museums. Paolo Cirio’s artworks will be on view in two upcoming major exhibitions at the C/O Berlin and Museum für Fotografie. Both of his series reflect on surveillance and privacy by combining photography, Internet and street art. Street Ghosts will be installed inside and outside the Museum für Fotografie with four artworks on its facade and entrance. Photos of individuals appropriated from Google Street View are affixed at the exact physical spot from where they were taken on Jebensstraße 2, 10623 Berlin. https://paolocirio.net/work/street-ghosts Overexposed will be presented at the C/O Museum with three framed works painted on photo paper combined with several street art posters. The large installation at Amerika Haus will present unauthorized selfies and photos of Keith Alexander (NSA), John Brennan (CIA), and James Comey (FBI). https://paolocirio.net/work/hd-stencils/overexposed You are invited to Watching You, Watching Me. A Photographic Response to Surveillance at the Museum für Fotografie (February 17 – July 2, 2017) and Watched! Surveillance Art & Photography at C/O Berlin (February 18 – April 23, 2017). http://www.co-berlin.org/watched-surveillance-art-photography-0 http://www.smb.museum/museen-und-einrichtungen/museum-fuer-fotografie/ueber-uns/nachrichten/detail/museum-fuer- fotografie-und-co-berlin-praesentieren-ab-februar-2017-erstmals-drei-inhaltlich-aufeina.html Cirio’s unique photo practice corresponds precisely to the approaches of these two shows that tackle and investigate the social and political trajectories of surveillance in correlation with art photography.
    [Show full text]
  • Overexposed-Project
    Overexposed Profiles and photos of Overexposed artwork series. Research assembled by Paolo Cirio, 2014-2015. http://paolocirio.net/work/hd-stencils/overexposed Keith Alexander Keith seems excited for this selfie taken by Corrie Becker, a mysterious acquaintance of his whom he shares no apparent social connection with. He has his neck tucked into his collar and an awkward smile plastered across his face. He and Corrie appear to be close and intimate, having fun with the selfie. The location where this photo was taken and how these two met each other is unclear. Corrie stated on her Facebook post, “Look who takes a great #Selfie - General Keith Alexander, the Cowboy of the NSA.” The photo was obtained from Facebook via Corrie Becker's account. Dated May 27th, 2014.1 Keith Brian Alexander served as Director of the National Security Agency (NSA) until 2013 and is now a retired four-star general. He was also Chief of the Central Security Service (CHCSS) and Commander of the U.S. Cyber Command. Alexander held key staff assignments as Deputy Director, Operations Officer, and Executive Officer both in Germany and during the Persian Gulf War in Operation Desert Shield and Operation Desert Storm. He also served in Afghanistan on a peacekeeping mission for the Army Deputy Chief of Staff for Intelligence. In Saudi Arabia he presided over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army. Among the units under his command were the military intelligence teams involved in torture and prisoner abuse at Baghdad’s Abu Ghraib prison.2 Two years later, Donald Rumsfeld appointed Alexander director of the NSA.
    [Show full text]
  • Media Monopoly By: Ben H Bagdikian ISBN: 0807061875 See Detail of This Book on Amazon.Com
    The New Media Monopoly By: Ben H Bagdikian ISBN: 0807061875 See detail of this book on Amazon.com Book served by AMAZON NOIR (www.amazon-noir.com) project by: PAOLO CIRIO paolocirio.net UBERMORGEN.COM ubermorgen.com ALESSANDRO LUDOVICO neural.it Page 1 Senator Byron Dorgan, Democrat of North Dakota, had a potential disaster in his district when a freight train carrying anhydrous ammonia derailed, releasing a deadly cloud over the city of Minot. When the emergency alert system failed, the police called the town radio stations, six of which are owned by the corporate giant, Clear Channel. According to news accounts, no one answered the phone at the stations for more than an hour and a half Three hundred people were hospitalized, some partially blinded by the ammonia . Pets and livestock were killed. Anhydrous ammonia is a popular fertilizer that also creates a noxious gas, irritating the respiratory system and burning exposed skin. It fuses clothing to the body and sucks moisture from the eyes. To date, one person has died and 40o have been hospitalized. -HTTP://WWW.UCC.ORG/UCNEWS/MAYO2/TRAIN. HTM Clear Channel is the largest radio chain in the United States. It owns 1,240 radio stations with only Zoo employees. Most of its stations, including the six in Minot, N. Dak., are operated nationwide by remote control with the same prerecorded material.' Page 2 THE NEW MEDIA MONOPOLY The United States, as said so often at home with pride and abroad with envy or hostility, is the richest country in the world. A nation of nineteen thousand cities and towns is spread across an entire continent, with the globe's most diverse population in ethnicity, race, and country of origin.
    [Show full text]
  • Catalog Evidentiary Realism
    INDEX Preface 1 Evidentiary Realism by Paolo Cirio. 3 Comparison of 3 Art Exhibition Visitors’ Profles by Hans Haacke. 15 The Chase Advantage by Hans Haacke. 17 The Location of Power by Lauren van Haaften-Schick. 19 Mary Carter Resorts Study by Mark Lombardi. 31 George W. Bush, Harken Energy, and Jackson Stephens, by Mark Lombardi. 33 Edges of Evidence: Mark Lombardi‘s Drawings by Susette Min. 35 I Thought I was seeing Convicts by Harun Farocki. 45 I Thought I Was Seeing...by Jaroslav Anděl. 47 THE WHITE HOUSE 2002 GREEN WHITE by Jenny Holzer. 57 Can We See Torture? by Joshua Craze. 60 The Video Diaries by Khaled Hafez. 67 The Magma of Reality by Nicola Trezzi. 69 Mengele’s Skull by Thomas Keenan and Eyal Weizman. 75 How to Make a Face Appear: The Case of Mengele’s Skull by Heather Davis. 77 Monsanto Intervention by Kirsten Stolle. 83 Chemical Interventions by Mary Anne Redding. 85 Camoufage by Suzanne Treister. 93 Rendering the Evidence by Giulia Bini. 95 Information of Note by Josh Begley. 101 The Eye of the Law by Nijah Cunningham. 103 The Other Nefertiti by Nora Al-Badri and Jan Nikolai. 111 Conficting Evidence by Susanne Leeb. 113 Seamless Transitions by James Bridle. 121 Infrastructural Violence: The Smooth Spaces of Terror by Susan Schuppli. 123 Reconnaissance by Ingrid Burrington. 131 Crucial Nodes Designed to be Ignored by Aude Launay. 133 A People’s Archive of Sinking and Melting by Amy Balkin. 141 An Archive of Evidence by Blanca de la Torre. 143 Expanding and Remaining by Navine G.
    [Show full text]
  • The Art Career CV
    Paolo Cirio - Conceptual Artist, 1979. Paolo Cirio engages with the legal, economic, and cultural systems of the information society. Art portfolio website: He investigates social fields impacted by the Internet, such as privacy, democracy, semiology, https://PaoloCirio.net finance. He shows his research and intervention-based works through photos, installations, videos, Contacts: and public art. Cirio has exhibited in international museums and has won prestigious awards. His [email protected] artworks have been covered by hundreds of media outlets and he regularly gives public lectures and Skype: paolo_cirio workshops at leading art festivals and universities worldwide. Twitter: @PaoloCirio Art CV with crucial Awards, Solo and Group Exhibitions Paolo Cirio has had solo shows at the Fondazione Modena Arti Visive, 2021; Saint James' Charterhouse, 2021, Capri; PAN Museum, Naples, 2020; Giorgio Persano Gallery, Turin, 2019; Fondazione Sandretto Re Rebaudengo, Turin, 2019; International Kunstverein Luxemburg, 2016; NOME gallery, Berlin, 2019, 2016, 2015; Bellegarde Centre Culturel, Toulouse, 2015; Kasa Gallery, Istanbul, Turkey, 2013; Aksioma Institute for Contemporary Art, Ljubljana, Slovenia, 2013 and 2011. Cirio’s artworks have been presented and exhibited in major art institutions, including Kunsthalle Wien, Vienna, 2020; 10th Göteborg Biennial, Gothenburg, 2019; Fondazione Sandretto Re Rebaudengo, Turin, 2019; National Taiwan Museum of Fine Arts, 2019; Gwangju Biennale, 2018; Strasburg Biennale, 2018; Benaki Museum, Athens, 2018;
    [Show full text]
  • Hacking, Polítiques I Cultura Visual
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Revistes Catalanes amb Accés Obert Número 19 (1) Any 2013 pp. 202-219 ISSN: 1696-8298 www.antropologia.cat From the Deep Web to the City Streets: Hacking, Politics and Visual Culture Des de la Deep Web als carrers: hacking, polítiques i cultura visual REBUT: 17.11.2013 // ACCEPTAT: 21.05.2014 Christina Grammatikopoulou Universitat de Barcelona (UB) Abstract Resum The political protests that have taken over urban Les protestes polítiques que, moltes vegades, space on multiple occasions since 2011 have s'han apoderat de l'espai urbà des de 2011 s'han been connected to parallel actions within virtual vinculat amb accions paral·leles en l'espai space, actions that virtual, accions que van implicar el hacking, el involve hacking, hacktivism and piracy. This hacktivisme i la pirateria. Aquest article explora article explores the role of the Internet in the el paper d'Internet en el desenvolupament del development of the protest movement and the moviment de protesta i la idea de la pirateria idea of hacking as a subversive ideological and com una pràctica subversiva ideològica i cultural practice. Starting with global protests, cultural. Partint de les protestes globals, es we will see how they are both linked to each desenvoluparà com es relacionen entre si i com other, and form part of the culture and politics s’emmarquen dins de la cultura i la política de of the information age. Subsequently, the l'era de la informació. A continuació, l'anàlisi se analysis turns to hacking as a political and centrarà en el hacking com un acte polític i cultural act.
    [Show full text]