The Lincoln Humanities Journal Panopticon: Surveillance

Total Page:16

File Type:pdf, Size:1020Kb

The Lincoln Humanities Journal Panopticon: Surveillance LHJ The Lincoln Humanities Journal Fall 2016 | Volume 4 Panopticon: Surveillance, Suspicion, Fear Editor ABBES MAAZAOUI Annual publication of the College of Arts, Humanities and Social Sciences, Lincoln University of Pennsylvania. All rights reserved. ISSN 2474-7726 (print) ISSN 2474-7726 (online) 4 The Lincoln Humanities Journal (LHJ) The Lincoln Humanities Journal, ISSN 2474-7726 (print), ISSN 2474-7726 (online), is an interdisciplinary double blind peer-reviewed journal published once a year by the College of Arts, Humanities and Social Sciences of Lincoln University of Pennsylvania. Its main objective is to promote interdisciplinary studies by providing an intellectual platform for international scholars to exchange ideas and perspectives. Each volume is focused on a pre- selected theme in the fields of arts, humanities, the social sciences, and contemporary culture. Preference is given to topics of general interest that lend themselves to an interdisciplinary approach. Manuscripts should conform to the MLA style. Submissions may be made by e-mail to the editor at [email protected]. The preferred language is English. The journal is published both online and in print, in November-December of each year. Editor ABBES MAAZAOUI Lincoln University Editorial Board J. KENNETH VAN DOVER Lincoln University ERIK LIDDELL Eastern Kentucky University KIRSTEN C. KUNKLE Scholar & Opera Singer HÉDI JAOUAD Skidmore College EZRA S. ENGLING Eastern Kentucky University JEAN LEVASSEUR Bishop’s University, Canada The Lincoln Humanities Journal 5 TABLE OF CONTENTS Introduction 7 ABBES MAAZAOUI PART ONE: SURVEILLANCE: PAST AND PRESENT The Panopticon, the Pinkertons, and the Private Eye 15 J.K. VAN DOVER, Lincoln University of Pennsylvania Paintings as Propaganda: Blending Patriotism with Art 27 ANTONIA DAPENA-TRETTER, The Walt Disney Family Museum PART TWO: SURVEILLANCE, THE MEDIA AND THE TECHNOLOGY OF FEAR The Big Guy with the Remote Control: Person of Interest and Television Preemption Fantasies 47 Zach Mann, University of Southern California Celebrity Sting Operations in India: An Analysis of Technologies of Surveillance in ‘Public Interest’ 59 Neha Khurana, University of Delhi CNN and Al Jazeera, and Their Versions of James Foley Story 73 BINCY ABDUL SAMAD, Bowling Green State University Publicizing Suspicions of Espionage on the News: The Leak of the Felix S. Bloch Case 83 ANN LUPPI VON MEHREN, Drexel University PART THREE: SURVEILLANCE AND RESISTANCE OR WHEN EXTREMES COLLIDE Psychic Surveillance: Punitive Psychiatry in Sokolov’s A School for Fools 97 ANYA L. HAMRICK, New York Institute of Technology 6 Elegy and Resistance: Danez Smith’s Black Movie 109 PIA DEAS, Lincoln University of Pennsylvania Surveillance and the Metropolis: Individuals, Collectivities and Resistance in Delhi/NCR 115 NEHA KHURANA, University of Delhi Of Terror, Fear and Insecurity in the Drama on the Niger Delta: A Critical Evaluation of Esiaba Irobi’s Hangmen Also Die 135 Edward Egbo Imo, University Of Port Harcourt Re-Islamization as a Counter-Panopticon 151 ABEER ALOUSH, University of Pennsylvania PART FOUR: SURVEILLANCE AS A LITERARY GENRE Ethnic Espionage Fiction and Impossible Subjects in Chang-Rae Lee’s Native Speaker 163 Swan Kim, City University of New York University of New York at Bronx Community College BBC’s Orphan Black’s Slow Narrative Reveals a Foucauldian Prison Structure 177 Brandi Bradley, Florida State University Surveillance, Control, and Masculine Identity in George Lamming’s In the Castle of My Skin 189 Adrienne Vivian, Seminole State College ABSTRACTS 197 NOTES ON CONTRIBUTORS 205 SUBMISSION GUIDELINES 208 SUBSCRIPTION 208 INTRODUCTION ABBES MAAZAOUI Since the earliest days of civilization, the practice of surveillance in all its forms (i.e., observing, collecting information, surprising, but also hiding, disguising, deceiving and avoiding danger) has been used by humans as a basic survival strategy to hunt for prey, mainly food and shelter, and avoid becoming a prey to other predators. These strategies are still used, even though today’s techniques may seem more sophisticated, more pervasive and maybe more shocking too. Here are few random headlines: a jealous boyfriend places a GPS device on his suspected girlfriend’s car to trace her where-abouts; a reporter is secretly filmed naked by her stalker in her hotel room1; the giant retailer, Target, uses big data to identify and target pregnant teenagers for pregnancy-related advertising2; SeaWorld Entertainment sends spies posing as radical activists to infiltrate the People for the Ethical Treatment of Animals (PETA), a not-for-profit organization.3 The news is full of such stories, not to mention of course the biggest stories of all: spying, hacking scandals and WikiLeaks. While the full impact of this modern, on-steroids surveillance has yet to be understood, it is already clear that this new world order undermines the boundaries of ethics and morality. Besides the universal loss of both privacy4 and presumption of innocence, it trivializes random acts of suspicion and fear especially against minorities and unwanted individuals or nations. Notwithstanding these ethical issues, the question is whether surveillance can create anything but an illusion of safety. Surveillance World “These days, if you feel like somebody’s watching you, you might be right” (Benny Evangelista ). The practice of surveillance has intensified to such an extent that it no longer sounds paranoid to assert that everyone–individuals, groups, communities, companies, and 1 DailyMail.com “Erin Andrews' $75million 'Peeping Tom' lawsuit heads to court”: 22 February 2016 http://www.dailymail.co.uk/news/article-3458372/Jury-selection-begin-Erin-Andrews-nude-videos- lawsuit.html#ixzz4QqJBGaQs 2 See “Big Data in Private Sector …” p. 1. 3 See “SeaWorld admits it sent spies to infiltrate PETA.” http://www.marketwatch.com/story/seaworld-admits-it- sent-spies-to-infiltrate-peta-2016-02-25/ 4 “Privacy is mostly an illusion. A useful illusion, no question about it, one that allows us to live without being paralyzed by self-consciousness. The illusion of privacy gives us room to be fully human, sharing intimacies and risking mistakes. But all the while, the line between private and public space is as porous as tissue paper.” Von Drehle. 8 Introduction countries–is involved in one way or another, not only as an object of surveillance, but also as an agent of surveillance. To paraphrase an expression coined in the 1980s, we are becoming a ‘surveillance world.’5 It is as if we have reached the golden age of surveillance: anywhere we are and whatever we do, we are subject to being monitored. GPS instruments and cellphones that most of us carry have their own tracking capabilities. Video Cameras are ubiquitous, in high skies, deep seas, and everywhere in between: in stores, gas stations, hotel lobbies, traffic intersections, parks, neighborhoods, and even classrooms. In Britain, it is estimated that a person could be captured on film 300 times a day. Furthermore, most of these video technologies are integrating facial recognition capabilities. Here, in the United States, The Washington Post … says that there are more than 1,500 components [of the US federal government] that do it [collect surveillance]. There are 17 primary agencies in the intelligence community. But that does not even count the 17,000 state and local police institutions, much less what the commercial sector does in terms of collecting information.6 (“Can Security…” 32) Sometimes, we are told about what is going on: “This conversation will be recorded;” “This area is monitored 24/7;” “You have to accept cookies to go to this site.” But more often than not, we do not know who is recording, how the recording will be used, or for how long it will be kept. But something is certain: with a simple click of a mouse, our past in form of electronic record can be accessed anytime, anywhere. The old expression about filing a document as part a person’s permanent record is no longer an abstract notion or a far-fetched idea. It is a reality.7 All this leads us to the concept of Panopticon, the conceptual prison designed by the English philosopher Jeremy Bentham in the late 18th century. It would not be too wild of an idea to think that we live today in a giant digital panopticon. In an article titled “You Are a Suspect,” William Safire writes in The New York Times: Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e- mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend--all these transactions and communications will go into what the Defense Department describes as ‘a virtual, centralized grand database.’ 5 Cf. David Lyon on the notion of “Surveillance Society.” 6 No wonder, surveillance is a $100 billion industry. 7 As Steve Mann writes, “For decades, the notion of a ‘surveillance society’ where every facet of our private life is monitored and recorded has sounded abstract, paranoid or far-fetched to some people. No more!…” (Mann 1998: 140). Abbes Maazaoui 9 To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you-- passport application, driver's license and toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance--and you have the supersnoop's dream: a ‘Total Information Awareness’ about every U.S. citizen. This is not some far-out Orwellian scenario. The Vicious Circle of Fear and Surveillance Obviously, not all forms of surveillance are bad. Surveillance may be used to deter crime, monitor road congestion, or investigate climate change. However, when fear is the main justification for surveillance, it opens up a can of untasteful worms. The logic of fear is predicated on the assumption that the more surveillance one engages in, the safer one becomes.
Recommended publications
  • ANNE MOWBRAY, DUCHESS of YORK: a 15Th-CENTURY CHILD BURIAL from the ABBEY of ST CLARE, in the LONDON BOROUGH of TOWER HAMLETS
    London and Middlesex Archaeological Society Transactions, 67 (2016), 227—60 ANNE MOWBRAY, DUCHESS OF YORK: A 15th-CENTURY CHILD BURIAL FROM THE ABBEY OF ST CLARE, IN THE LONDON BOROUGH OF TOWER HAMLETS Bruce Watson and †William White With contributions by Barney Sloane, Dorothy M Thorn and Geoffrey Wheeler, and drawing on previous research by J P Doncaster, H C Harris, A W Holmes, C R Metcalfe, Rosemary Powers, Martin Rushton, †Brian Spencer and †Roger Warwick SUMMARY FOREWORD Dorothy M Thorn (written 2007) In 1964 during the redevelopment of the site of the church of the Abbey of St Clare in Tower Hamlets, a During the 1960s, my future husband, the masonry vault containing a small anthropomorphic late James Copland Thorn FSA, and I were lead coffin was discovered. The Latin inscription actively involved in London archaeology as attached to the top of the coffin identified its occupant part of Dr Francis Celoria’s digging team.1 as Anne Mowbray, Duchess of York. She was the child Naturally all the members of the group bride of Richard, Duke of York, the younger son of were very interested in such an important Edward IV. Anne died in November 1481, shortly discovery, and when Anne Mowbray was before her ninth birthday. As the opportunity to study identified we were all impressed (possibly scientifically a named individual from the medieval no-one more so than James). When the day period is extremely rare, the London Museum quickly came for Anne Mowbray to be reburied in organised a comprehensive programme of analysis, Westminster Abbey, the BBC wanted to which included the study of Anne’s life, her hair, teeth, interview Celoria, but he could not be found, skeletal remains and the metallurgy of her coffin.
    [Show full text]
  • Case 1:13-Cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15
    Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; NEW YORK CIVIL LIBERTIES UNION; and NEW YORK CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs, v. No. 13-cv-03994 (WHP) JAMES R. CLAPPER, in his official capacity as Director of National Intelligence; KEITH B. ALEXANDER, in his ECF CASE official capacity as Director of the National Security Agency and Chief of the Central Security Service; CHARLES T. HAGEL, in his official capacity as Secretary of Defense; ERIC H. HOLDER, in his official capacity as Attorney General of the United States; and ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. BRIEF AMICI CURIAE OF THE REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS AND 18 NEWS MEDIA ORGANIZATIONS IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Of counsel: Michael D. Steger Bruce D. Brown Counsel of Record Gregg P. Leslie Steger Krane LLP Rob Tricchinelli 1601 Broadway, 12th Floor The Reporters Committee New York, NY 10019 for Freedom of the Press (212) 736-6800 1101 Wilson Blvd., Suite 1100 [email protected] Arlington, VA 22209 (703) 807-2100 Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 2 of 15 TABLE OF CONTENTS TABLE OF AUTHORITIES .......................................................................................................... ii STATEMENT OF INTEREST ....................................................................................................... 1 SUMMARY OF ARGUMENT…………………………………………………………………1 ARGUMENT……………………………………………………………………………………2 I. The integrity of a confidential reporter-source relationship is critical to producing good journalism, and mass telephone call tracking compromises that relationship to the detriment of the public interest……………………………………….2 A There is a long history of journalists breaking significant stories by relying on information from confidential sources…………………………….4 B.
    [Show full text]
  • Breaking the Waves: Voodoo Magic in the Russian Cultural Ecumene
    Breaking the Waves: Voodoo Magic in the Russian Cultural Ecumene Galina Lindquist, University ofStockholm Introduction Globalization has become one of those contested terms that, having originated in the social sciences, seeped out into popular discourse, contributing to the already considerable tool-kit of late modem reflexivity. Like other such terms that have escaped tight disciplinary boundaries-most notably "culture"-"globalization" has been widely and diversely used (some would say misused), questioned, and contested. According to some, the global world carries with it unprecedented possibilities of a better life for all (Gates 1995). Others say that this point of view is itself a stance of cultural imperialism or that it reflects an utter lack of touch with the reality of inequality, dominance, and exploitation (Bauman 1998). But this reality is itself a global condition. Scholars who look for a theoretical compromise offer a minimnalistic understanding of globalization as a recognition of empirical conditions of "complex connectivity:...a dense network of unexpected interconnections and interdependencies" (Tomlinson 1999:2) that have become a feature of life in the world's most distant nooks and crannies. In this paper, I consider an empirical case of such unexpected, and indeed bizarre, interconnectedness. However, I start not from the idea of the "global," but, instead, from the notion of ecumene as proposed by Hannerz (1996). In his usage, adapted from Kroeber (1945), ecumene, "the entire inhabited world as Greeks then understood it," is an area of "connectedness and reachability,...of interactions, exchanges and related developments" (Hannerz 1996:7). In other words, ecumene is the world conceived as a single place, but, significantly, seen from a certain point of view by a situated cultural subject.
    [Show full text]
  • The Sun King and the Merry Monarch
    The Sun King and the Merry 1678 Monarch Explores the religious backdrop to one of the largest threats to England's throne - the Popish Plot. Aggravated by the murder of the magistrate Sir Edmund Berry Godfrey, the Plot reflected religious beliefs and insecurities at the By Calum time. Sir Godfrey was my ancestor (of some 11 generations). A visit to his Johnson grave in Westminster Abbey in 2014 inspired me to explore his role in this religious turmoil which hit hard in 17th Century England... The Clergyman and the King of England Leaving for his morning stroll on the 13th of August 1678, Charles II, King of England and Defender of the Faith heard for the first time of a plot to kill him. This was far from unusual. Indeed, just months earlier, a woman in Newcastle had been subjected to a large investigation after stating, "the King deserves the curse of all good and faithful wives for his bad example”. And yet, when Mr Kirkby (his lab assistant) brought Dr Israel Tonge to him at 8 o’clock that evening, the king listened impatiently before handing the matter over to his first minister…. The Religious Pendulum: Change of Faith in England To truly examine the tumult about to hit England in the 17th Century, it is important that we look first at the Religious scene in Europe some 150 years earlier. In the previous century the Reformation began and Protestantism gathered momentum, fuelled by a desire to reduce the exuberance of the Church in Rome with its elaborate sculptures, paintings and stained-glass windows.
    [Show full text]
  • 5.0-6.0 the Lost Gate Card, Orson Scott 5.8 Danny North Knew From
    5.0-6.0 The Lost Gate Card, Orson Scott 5.8 Danny North knew from early childhood that his family was different, and that he was different from them. While his cousins were learning how to create the things that commoners called fairies, ghosts, golems, trolls, werewolves, and other such miracles that were the heritage of the North family, Danny worried that he would never show a talent, never form an outself. He grew up in the rambling old house, filled with dozens of cousins, and aunts and uncles, all ruled by his father. Their home was isolated in the mountains of western Virginia, far from town, far from schools, far from other people. There are many secrets in the House, and many rules that Danny must follow. There is a secret library with only a few dozen books, and none of them in English — but Danny and his cousins are expected to become fluent in the language of the books. While Danny's cousins are free to create magic whenever they like, they must never do it where outsiders might see. Unfortunately, there are some secrets kept from Danny as well. And that will lead to disaster for the North family. The Gate Thief Card, Orson Scott 5.3 In this sequel to The Lost Gate, bestselling author Orson Scott Card continues his fantastic tale of the Mages of Westil who live in exile on Earth in The Gate Thief, a novel of the Mither Mages. Here on Earth, Danny North is still in high school, yet he holds in his heart and mind all the stolen outselves of thirteen centuries of gatemages.
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • 2013 Summer Reading List
    SUMMER READING LIST 2013 TABLE OF CONTENTS INTRODUCTION 2 MIDDLE SCHOOL Grades 6 and 7 3 Grade 8 11 UPPER SCHOOL General Requirements 16 New International Students 17 Literature and Composition I Required 18 Literature and Composition I Recommended 19 Literature and Composition II Required 26 Literature and Composition II Recommended 26 Grades 11 and 12 Required 35 Literature and Composition III 35 AP English Language 37 The Short Story: Read It and Write It 38 The Tradition of the Novel 38 Found Voices 39 AP English Literature 39 Grades 11 and 12 Recommended 40 Language Books 57 Social Studies Books 60 INTRODUCTION ••••••••••••••••••••••••••••••••••••••••••••••••••••• All students at Dana Hall are required to complete summer reading. The books you read will be used in your English class during the first few weeks of the first trimester. As you read, we urge you to remember that the art of reading is a creative act, a collaboration between reader and writer. Hold a dialogue with these books: question, argue, disagree; underline those passages that exhilarate you as well as those that infuriate you. Keep a notebook to jot down your imme- diate responses to each of these works and write questions that you want to discuss in your English classes. Encourage your family and friends to join you in these reading experiences. A number of the books on this list have been made into movies, many of them wonderful in their own right. Seeing a movie instead of reading the book, however, will not prepare you for your teacher’s assignment related to that book, nor will it replace the unique experience of interacting with a specific text.
    [Show full text]
  • Science Fiction on American Television
    TV Sci-Fi 16 + GUIDE This and other bfi National Library 16 + Guides are available from http://www.bfi.org.uk/16+ TV Sci-Fi CONTENTS Page IMPORTANT NOTE................................................................................................................. 1 ACCESSING RESEARCH MATERIALS.................................................................................. 2 APPROACHES TO RESEARCH, by Samantha Bakhurst ....................................................... 4 INTRODUCTION by Sean Delaney ......................................................................................... 6 AMERICAN TELEVISION........................................................................................................ 8 SCIENCE FICTION ON AMERICAN TELEVISION ................................................................. 9 AUDIENCES AND FANS......................................................................................................... 11 ANDROMEDA ......................................................................................................................... 12 BABYLON 5 ............................................................................................................................ 14 BATTLESTAR GALACTICA................................................................................................... 17 FARSCAPE ............................................................................................................................. 19 THE IRWIN ALLEN QUARTET • VOYAGE TO THE BOTTOM OF THE SEA.....................................................................
    [Show full text]
  • A Royal Tragedy
    William Shakespeare's Richard III A Royal Tragedy Acts Three, Four, and Five Notes Provided by WISDOM Home Schooling's Online Socratic Dialogue Progra Dramatis Personae KING EDWARD IV – The leader of the Yorkists, who beat the Lancastrian king, Henry VI, and took his throne. During the final battle that beat the Lancastrians, King Edward was one of the three men who dishonourably stabbed Lady Anne’s husband when he was already down. Edward used to be a great warrior, but has now become sickly, and is more interested in entertainment and women than in feats of courage. Sons to the King: EDWARD, PRINCE OF WALES – About thirteen years old. King Edward IV and Queen Elizabeth’s older son, and heir to the throne of England. Wise beyond his years, and protective of his brother. RICHARD, DUKE OF YORK – About ten years old. Prince Edward’s younger brother, he is second in line to inherit the throne. Less serious than his brother, he is given to joking around and making fun of adults. Brothers to the King: GEORGE, DUKE OF CLARENCE – Clarence is a conflicted man. During the war between the Yorkists and the Lancastrians, he fought on whichever side seemed to be winning at the time. He was one of the three who stabbed Lady Anne’s husband. Despite his shifting alliances, Clarence nonetheless has a deep love for his wife and children. RICHARD, DUKE OF GLOUCESTER (pronounced “Gloss-ter”), who will one day become KING RICHARD III – Gloucester is a hunchback with a withered arm and a limp.
    [Show full text]
  • New Yorker Launches Online Anonymous Tip System 15 May 2013
    New Yorker launches online anonymous tip system 15 May 2013 will be open-source, and we are very glad to be the first to bring it out into the world, fully implemented." Swartz, an activist who committed suicide in January as he faced a potential prison sentence for breaking into a university research database, developed the system with Kevin Poulsen, a former hacker who is now an editor at Wired magazine. The New Yorker said the system was designed to avoid putting media organizations at the center of investigations of news leaks. "Readers and sources have long sent documents to the magazine and its reporters, from letters of complaint to classified papers," Davidson said. The New Yorker magazine is diplayed in an Upper East Side newstand in New York on October 9, 2012. The "But, over the years, it's also become easier to New Yorker magazine on Wednesday unveiled a new trace the senders... Strongbox addresses that; as online system for anonymous whistleblower tips, based it's set up, even we won't be able to figure out on technology developed by the late Internet activist where files sent to us come from. If anyone asks Aaron Swartz and a former hacker. us, we won't be able to tell them." The system aims to encourage the anonymous submission of newsworthy information, in the The New Yorker magazine on Wednesday manner of WikiLeaks and other Internet sites. unveiled a new online system for anonymous whistleblower tips, based on technology developed The Wall Street Journal set up its own tip system in by the late Internet activist Aaron Swartz and a May 2011 called SafeHouse.
    [Show full text]
  • Bulletin #3. Peeling Back Robert W. Newmann
    Peeling Back RoBeRt W. NeWmanN �NarRatiVe PoRtfOlio by Antonia 1. 1 Dapena-Tretter dRoSte eFfeCT �BULLETIN 3 Peeling Back RoBeRt W. NeWmanN �NarRatiVe PoRtfOlio 3 WaSHingtoN InStaLlation art: 1. 2 COlor ScHoOl SuBtracTive RoOts: The EaRly LaYeRs 24 ARROws 7 ImmaTeRial Embracing the ScUlPtureS: Literal: ADditive CoNCePtUal Layers 15 CONcluSiONs 38 Peeling Back RoBeRt W. NeWmanN �NarRatiVe PoRtfOlio — by Antonia Dapena-Tretter Abstract Unpacking Robert W. Newmann's portfolio requires a layered approach with equal attention paid to biography, aesthetics, and the larger art market of the 1970s to the present. These diverse methodologies intertwine to reveal the artist's surprising rejection of the Washington 1. 3 Color School tradition of ethereal stained canvases in favor of the real space of large-scale installations. Literal layers—taking the form of pigment added to the canvas or inches of substrate sandblasted away— Bulletin 3 separate Newmann's art from that of his teachers and serve as a common thread, tying together enormous shifts in practice and medium. Although each period of the artist's oeuvre reinforces his strong attraction to the experiential, the unexpected challenges of wedding an artwork to the space around it ultimately drove Newmann to accept and embrace the unavoidable nature of the immaterial. Peeling Back Robert W. Newmann — Narrative Portfolio Washington Post critic Paul Richard theorized that 1960s D.C.-based artists such as Kenneth Noland, Thomas Downing, and Gene Davis «worked from a particular sensibility, nourished by the grids and circles of the original L’Enfant plan.»1 If this is taken to be true, the hard- edged lines of the Washington Color School canvases were born from the same inspiration as Robert Newmann’s For Pierre L’Enfant (pic.
    [Show full text]
  • Define the Following Keywords: Proletariat; Bourgeoisie; Peasant; Revolution; Capitalist; Communist;
    History Summer Preparation Task: Part 1: Revolution and Dictatorship: Russia, 1917-1953 LO: To build up knowledge of Marxist ideology To explain the appeal of Marxist ideology and its weaknesses To evaluate the appeal of Marxism in Russia before 1917 1) Knowledge Learn and explain the six stages of Marxist Stage Theory Define the following keywords: Proletariat; Bourgeoisie; Peasant; Revolution; Capitalist; Communist; 2) Explanation Answer the following questions fully /'. LV/7y was Marxism appealing? Who would be attracted to Marxism? //'. What did Marx think about religion and why? iii. What did Marx think about Trade Unions and parliamentary democracy? Why? Is this surprising? 3) Evaluation/ Application (Read and make notes on the Introduction from your course textbook. ppxii-xvi. Practise the following two questions ready for a baseline test lesson 1) i) Why was Marxism increasingly appealing in Russia in the early C20th? (eg. Industrial changes, poor conditions, autocratic government) ii) What limited the appeal of Marxism in Russia in the early C20th? (eg. Extreme ideology - moderate ideology more appealing to some, Russia mainly agricultural still, the Tsar's power.) Lesson 1: Be prepared for i) a knowledge test on Marxist stage theory, ii) To answer the two evaluation questions in full using examples from the Russian context. 4) You are also expected to read at least one 'wider reading' or novel book during the first term. You may wish to start this during the summer. See the list below for some recommended texts. Boris Paternik,
    [Show full text]