Austerity Surveillance” in Greece Under the Austerity Regime (2010−2014) Minas Samatas 68-80

Total Page:16

File Type:pdf, Size:1020Kb

Austerity Surveillance” in Greece Under the Austerity Regime (2010−2014) Minas Samatas 68-80 Media and Communication Open Access Journal | ISSN: 2183-2439 Volume 3, Issue 3 (2015) Special Issue Surveillance: Critical Analysis and Current Challenges (Part II) Editors James Schwoch, John Laprise and Ivory Mills Media and Communication, 2015, Volume 3, Issue 3 Special Issue: Surveillance: Critical Analysis and Current Challenges (Part II) Published by Cogitatio Press Rua Fialho de Almeida 14, 2º Esq., 1070-129 Lisbon Portugal Guest Editors James Schwoch, Northwestern University, USA John Laprise, Independent Researcher Ivory Mills, Northwestern University, USA Managing Editor Mr. António Vieira, Cogitatio Press, Portugal Available online at: www.cogitatiopress.com/mediaandcommunication This issue is licensed under a Creative Commons Attribution 4.0 International License (CC BY). Articles may be reproduced provided that credit is given to the original and Media and Communication is acknowledged as the original venue of publication. Table of Contents Article Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance Christopher Parsons 1-11 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir 12-25 Article Attaching Hollywood to a Surveillant Assemblage: Normalizing Discourses of Video Surveillance Randy K Lippert and Jolina Scalia 26-38 Article The New Transparency: Police Violence in the Context of Ubiquitous Surveillance Ben Brucato 39-55 Article First They Came for the Poor: Surveillance of Welfare Recipients as an Uncontested Practice Nathalie Maréchal 56-67 Article “Austerity Surveillance” in Greece under the Austerity Regime (2010−2014) Minas Samatas 68-80 Article Interveillance: A New Culture of Recognition and Mediatization André Jansson 81-90 Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 1-11 Doi: 10.17645/mac.v3i3.263 Article Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance Christopher Parsons Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, M6K 3R8, Canada; E-Mail: [email protected] Submitted: 23 March 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract This article begins by recounting a series of mass surveillance practices conducted by members of the “Five Eyes” spying alliance. While boundary- and intersubjectivity-based theories of privacy register some of the harms linked to such practices I demonstrate how neither are holistically capable of registering these harms. Given these theories’ deficien- cies I argue that critiques of signals intelligence surveillance practices can be better grounded on why the practices in- trude on basic communicative rights, including those related to privacy. The crux of the argument is that pervasive mass surveillance erodes essential boundaries between public and private spheres by compromising populations’ abili- ties to freely communicate with one another and, in the process, erodes the integrity of democratic processes and insti- tutions. Such erosions are captured as privacy violations but, ultimately, are more destructive to the fabric of society than are registered by theories of privacy alone. After demonstrating the value of adopting a communicative rights ap- proach to critique signals intelligence surveillance I conclude by arguing that this approach also lets us clarify the inter- national normative implications of such surveillance, that it provides a novel way of conceptualizing legal harm linked to the surveillance, and that it showcases the overall value of focusing on the implications of interfering with communica- tions first, and as such interferences constituting privacy violations second. Ultimately, by adopting this Habermasian inspired mode of analysis we can develop more holistic ways of conceptualizing harms associated with signals intelli- gence practices than are provided by either boundary- or intersubjective-based theories of privacy. Keywords critical theory; democracy; Habermas; intelligence; national security; privacy; surveillance; telecommunications Issue This article is part of the special issue "Surveillance: Critical Analysis and Current Challenges", edited by James Schwoch (Northwestern University, USA), John Laprise (Independent Researcher) and Ivory Mills (Northwestern University, USA). © 2015 by the author; licensee Cogitatio (Lisbon, Portugal). This article is licensed under a Creative Commons Attribu- tion 4.0 International License (CC BY). 1. Introduction trate, and modify data. Their operations are so deeply integrated with one another’s that it is challenging, if The Snowden revelations have shown the extent to not impossible, to analyze one member without analyz- which American, Australian, British, Canadian, and New ing them all a single group. The breadth of these sig- Zealand signals intelligence agencies operate across nals intelligence agencies’ activities has called into the Internet. These agencies, collectively known as the question whether they are intruding on the privacy of “Five Eyes” (FVEY), have placed deep packet inspection people all over the globe, including the privacy of their equipment throughout telecommunications networks own citizens. around the world to collect metadata and content This article begins by recounting of a series of mass alike. They have engaged in sophisticated signals de- surveillance practices conducted by the FVEY agencies. velopment operations by intruding into non-public These practices reveal the extent of the FVEY agencies’ commercial and government networks to access, exfil- surveillance activities which, in aggregate, exceeds the Media and Communication, 2015, Volume 3, Issue 3, Pages 1-11 1 surveillance capabilities of any particular corporation “non-targeted” persons for extensive amounts of time. or single state. Next, the article engages with how The implications of such surveillance are taken up in boundary- and intersubjectivity-based theories of pri- subsequent sections, when analyzing the effectiveness vacy register harms associated with the FVEY mem- of individual and collective theories of privacy to re- bers’ signals intelligence activities. Whereas boundary- spond to these modes of surveillance, as well as when based theories can account for some of the harms ex- analyzing how a Habermasian critique of surveillance perienced by targeted individuals they are less able to more holistically accounts for harms linked to the register harms associated with the surveillance of glob- aforementioned surveillance practices. al populations. In contrast, theories focused on the in- The FVEY alliance collects communications data tersubjective characteristics of privacy register how from around the world at “Special Source Operations”, capturing the global population’s electronic metadata or SSOs. Some surveillance programs associated with weakens the bonds needed for populations to develop SSOs temporarily store all communications traffic routed the requisite relationships for fostering collective to these locations. These communications are also ana- growth and inclusive lawmaking. However, these inter- lyzed and filtered to pick out information that is ex- subjective theories of privacy are less capable of re- pected to positively contribute to a SIGINT operation. A sponding to individual harms than liberal theories of pri- Canadian program, codenamed EONBLUE, operated at vacy. Ultimately, neither of these approaches to privacy over 200 locations as of November 2010 and was re- are holistically responsive to legally-authorized mass sponsible for such analyses. Other agencies, such as surveillance practices conducted by the FVEY nations. DSD, may also have used the EONBLUE program (CSE, The concluding sections of this article argue that 2010). Similarly, the United States runs deep packet in- privacy ought not to be used as the primary critique of spection surveillance systems that parallel some of the FVEY agencies’ mass surveillance practices given EONBLUE’s capabilities (Gallagher, 2013a; Bamford, the deficiencies associated with liberal and intersubjec- 2008). In the case of the United Kingdom, GCHQ’s TEM- tive privacy theories. Instead, critiques of signals intel- PORA program monitors at least some data traffic pass- ligence surveillance practices can be grounded on why ing into and out of the country (MacAskill, Borger, Hop- these practices erode boundaries between the public kins, Davies, & Ball, 2013). All of these countries share and private spheres, to the effect of eroding the au- data they derive from SSO-located surveillance pro- tonomy that underpins democratic processes and insti- grams in near-real time; no single alliance member can tutions. The erosion of these boundaries may be regis- effectively detect and respond to all of the Internet- tered as privacy harms or—more broadly—as related threats that are directed towards any of these intrusions on communicative and association rights nations, nor can they comprehensively track the activi- that are essential to democratic models of govern- ties of individuals around the world as they use tele- ment. These intrusions are made worse by the secrecy communications systems without the FVEY agencies of the laws and rulings authorizing the FVEY’s surveil- pooling and sharing their collated data. The very capaci- lance practices. The paper ultimately argues that a Ha- ties of the “national” programs operated by each of bermasian grounded critique can identify privacy these member nations
Recommended publications
  • H-Environment Roundtable Reviews
    H-Environment Roundtable Reviews Volume 10, No. 10 (2020) Publication date: October 16, 2020 https://networks.h-net.org/h- Roundtable Review Editor: environment Kara Murphy Schlichting Thomas M. Wickman, Snowshoe Country: An Environmental and Cultural History of Winter in the Early American Northeast (Cambridge and New York: Cambridge University Press, 2018) ISBN: 978-1108426794 Contents Introduction by Kara Murphy Schlichting, Queens College CUNY 2 Comments by Jon T. Coleman, University of Notre Dame 4 Comments by Rachel B. Herrmann, Cardiff University 7 Comments by Andrew Lipman, Barnard College 10 Comments by Molly A. Warsh, University of Pittsburgh 13 Response by Thomas Wickman, Trinity College, Hartford, Connecticut 16 About the Contributors 24 Copyright © 2019 H-Net: Humanities and Social Sciences Online H-Net permits the redistribution and reprinting of this work for nonprofit, educational purposes, with full and accurate attribution to the author, web location, date of publication, H-Environment, and H-Net: Humanities & Social Sciences Online. H-Environment Roundtable Reviews, Vol. 10, No. 5 (2020) 2 Introduction by Kara Murphy Schlichting, Queens College CUNY n North America, winter is on the horizon. In my home of New York City, winter can be blustery and cold. This city is a fair weather metropolis, seasonally I embracing outdoor life in warm weather only. The coming winter of 2020-21, with the ongoing need for social distancing and outdoor congregations due to the COVID-19 pandemic, will likely force a reconsideration of the typical retreat indoors at the arrival of cold. From this vantage point of changing seasons and the need to rethink winter practices, Thomas Wickman’s Snowshoe Country: An Environmental and Cultural History of Winter in the Early American Northeast is an reminder that the interiority of a New York winter is a construct of this community and era.
    [Show full text]
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • The Animated Roots of Wildlife Films: Animals, People
    THE ANIMATED ROOTS OF WILDLIFE FILMS: ANIMALS, PEOPLE, ANIMATION AND THE ORIGIN OF WALT DISNEY’S TRUE-LIFE ADVENTURES by Robert Cruz Jr. A thesis submitted in partial fulfillment of the requirements for the degree of Master of Fine Arts in Science and Natural History Filmmaking MONTANA STATE UNIVERSITY Bozeman, Montana April 2012 ©COPYRIGHT by Robert Cruz Jr. 2012 All Rights Reserved ii APPROVAL of a thesis submitted by Robert Cruz Jr. This thesis has been read by each member of the thesis committee and has been found to be satisfactory regarding content, English usage, format, citation, bibliographic style, and consistency and is ready for submission to The Graduate School. Dennis Aig Approved for the School of Film and Photography Robert Arnold Approved for The Graduate School Dr. Carl A. Fox iii STATEMENT OF PERMISSION TO USE In presenting this thesis in partial fulfillment of the requirements for a master’s degree at Montana State University, I agree that the Library shall make it available to borrowers under rules of the Library. If I have indicated my intention to copyright this thesis by including a copyright notice page, copying is allowable only for scholarly purposes, consistent with “fair use” as prescribed in the U.S. Copyright Law. Requests for permission for extended quotation from or reproduction of this thesis in whole or in parts may be granted only by the copyright holder. Robert Cruz Jr. April 2012 iv TABLE OF CONTENTS 1. INTRODUCTORY QUOTES .....................................................................................1
    [Show full text]
  • 342.721 Preventing Terrorism Or Eliminating Privacy?
    235 Ivana Stepanović MA1 Scientific review paper UDK: 342.721 PREVENTING TERRORISM OR ELIMINATING PRIVACY? RETHINKING MASS SURVEILLANCE AFTER SNOWDEN REVELATIONS Abstract After Edward Snowden’s leaks revealed to the public in June 2013, mass surveillance programs still exist. Considering that these practises restrain the right to privacy, there is a need to rethink the very concept of mass surveillance. The aim of this paper is to analyse this concept, sum up the problems related to its logic and methods, and question its legitimacy. Critical approach to the concept of mass surveillance is necessary on order to create the basis for resolving current issues related to it. My research shows that there are reasons to question legitimacy of mass surveillance as it not only breaches the right to privacy but also ignores the presumption of innocence and there is possibly a substantial lack of oversight by the independent bodies which is necessary to make these practices democratic. Moreover, given that mass surveillance programs were introduced to fight terrorism and crime, it should be assessed how efficient they really are and whether they are worth having considering their drawbacks and potential dangers for the society. Key words: mass surveillance, terrorism, Snowden, privacy. 1. Introduction Information revealed by the former US National Security Agency employee Edward Snowden and published by The Guardian, The New York Times and other media in June 2013 confirmed the existence of surveillance programs conducted by intelligence services such as the US National Security Agency (NSA) and British Government Communications Headqarters (GCHQ). Even though the news about the existence of systems which are monitoring private communications isn’t completely new, and the general public was aware of a global system for the interception of 1 Assistant Researcher, Institute of criminological and sociological research, Belgrade; mail: ivana.
    [Show full text]
  • Thomas Wickman CV
    Thomas Michael Wickman 91 Center Street Department of History Wethersfield, CT 06019 Trinity College 300 Summit Street [email protected] Hartford, CT 06106 Cell: 617.733.1291 Office: 860.297.2393 EDUCATION Harvard University, Cambridge, Massachusetts Ph.D., History of American Civilization, 2012 Dissertation: “Snowshoe Country: Indians, Colonists, and Winter Spaces of Power in the Northeast, 1620-1727” Committee: Joyce Chaplin, David D. Hall, Lawrence Buell Fourth Reader: Lisa Brooks Harvard University, Cambridge, Massachusetts A.M., History, 2009 Harvard College, Cambridge, Massachusetts A.B., History and Literature, 2007, magna cum laude EMPLOYMENT Associate Professor of History and American Studies, Trinity College, Hartford, CT, July 2018 to the present Assistant Professor of History and American Studies, Trinity College, Hartford, CT, July 2012 to June 2018 BOOK Snowshoe Country: An Environmental and Cultural History of Winter in the Early American Northeast (Cambridge: Cambridge University Press, 2018, paperback, 2019). • Reviewed by Katherine Grandjean in The English Historical Review ceaa216 (2020). • Reviewed by Jon T. Coleman, Rachel B. Herrmann, Andrew Lipman, Molly A. Warsh in H-Environment Roundtable Reviews 10:10 (2020). • Reviewed by Andrea Smalley, American Historical Review 125:2 (2020): 643-644. • Reviewed by Ted Steinberg, Early American Literature 55:1 (2020): 269-272. • Featured on Ben Franklin’s World: A Podcast about Early American History, Episode 267, December 3, 2019. • Reviewed by Anya Zilberstein, Journal of Interdisciplinary History 50:3 (2020): 462-3. • Reviewed by Andrew Detch, H-War, October 17, 2019. • Reviewed by Michael Gunther, Journal of American History 106:2 (2019): 428-9. 1 • Reviewed by Claire Campbell, William and Mary Quarterly 76:2 (2019): 355-8.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Citizen Snowden
    International Journal of Communication 11(2017), 843–857 1932–8036/20170005 Citizen Snowden ENGIN ISIN1 Queen Mary University of London, UK EVELYN RUPPERT Goldsmiths University of London, UK What kind of citizenship has Snowden performed? Apparently, it is not American citizenship because American authorities attempted to try him for treason and he became a stateless fugitive. After requesting political asylum in 21 countries, he was eventually granted temporary asylum in Russia. Neither states nor international organizations recognized his act as an act of citizenship. Did Snowden perform a citizenship that is yet to come? Did he perform an international citizenship? The issue of rights usually recognized in the literature on the debate about Snowden’s act concerns its content such as the practices of states spying on their citizens. This article focuses on the act itself as making digital rights claims that do not yet exist in law. We argue that just as Snowden’s act disrupted surveillance practices that evermore traverse national borders, it also called for digital rights and responsibilities that traverse national legal orders. Keywords: citizenship, performativity, international politics, digital rights I believe in the principle declared at Nüremberg in 1945: “Individuals have international duties which transcend the national obligations of obedience. Therefore individual citizens have the duty to violate domestic laws to prevent crimes against peace and humanity from occurring.” —Edward Snowden, Moscow Declaration2 Engin Isin: [email protected] Evelyn Ruppert: [email protected] Date submitted: 2016–03–29 1 We would like to thank two anonymous reviewers for their two rounds of comments that were incredibly helpful for strengthening our argument.
    [Show full text]
  • Stalkerware-Holistic
    The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ronald Deibert JUNE 2017 RESEARCH REPORT #119 A PREDATOR IN YOUR POCKET A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert Research report #119 June 2019 This page is deliberately left blank Copyright © 2019 Citizen Lab, “The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry,” by Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published by the Citizen Lab in 2019. This work can be accessed through https://citizenlab.ca. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 1.0 The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: • give appropriate credit; • indicate whether you made changes; and • use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement.
    [Show full text]
  • Disconnecting the Dots: Anonymity in the Digital Age D Sydney Hanover
    Disconnecting the Dots: Anonymity in the Digital Age d Sydney Hanover Governmental and corporate spying are no longer a surprising facet of everyday life in the digital age. In this paper, I expand upon the implications at stake in debates on autonomy, privacy, and anonymity, and I arrive at a definition of anonymity involving the flow between traits and the inability to connect them based on deliberate non- publication on a structurally social level. I argue that cultivating the space to remain anonymous is useful for distanced association with oneself in the purely private internal sphere, furthering a more fully examined inner association not based on a future already predicted or prematurely acted upon. The privilege of anonymity is a precondition for genuine self-relation. Later, I argue doubly against the “nothing to hide” argument, i.e., if one has nothing to hide, one has nothing to fear. Firstly, the actionability and fabrication of data make it such that it is always at risk of being interpreted as unsafe. Secondly, this argument is predicated on hiddenness as negative, which I answer with an analysis of the functionality of anonymity concerning personal growth. I. Introduction What we search and put on personal devices, who owns that data, and what they do with that information, is at the center of an important debate on privacy containing various opinions on what is being protected and why. This debate is not merely about words and concepts, rather, as exemplified by the extent of corporate and governmental spying in this country, all of us are affected, despite how technologically involved one may be.
    [Show full text]
  • The Production of Agency in Locative Media Art Practice
    Technological University Dublin ARROW@TU Dublin Doctoral Applied Arts 2012-6 The Construction of Locative Situations: the Production of Agency in Locative Media Art Practice Conor McGarrigle Technological University Dublin Follow this and additional works at: https://arrow.tudublin.ie/appadoc Part of the Arts and Humanities Commons Recommended Citation McGarrigle, C. (2012) The Construction of Locative Situations: the Production of Agency in Locative Media Art Practice. Doctoral Thesis. Dublin, Technological University Dublin. doi:10.21427/D7D88Q This Theses, Ph.D is brought to you for free and open access by the Applied Arts at ARROW@TU Dublin. It has been accepted for inclusion in Doctoral by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License The Construction of Locative Situations: the production of agency in Locative Media art practice. Conor McGarrigle, BSc University College Dublin, MA National College of Art & Design Dublin. This Thesis is submitted to the Dublin Institute of Technology in Candidature for the Degree of Doctor of Philosophy Graduate School of Creative Arts and Media & Digital Media Centre June 2012 Supervised by: Dr. James Carswell, Head of Spatial Information Technologies Research, Digital Media Centre DIT. Mr. Martin McCabe, Lecturer School of Media, DIT & Teaching Fellow, GradCAM. Dr. Brian O'Neill, Head School of Media, DIT. Abstract This thesis is a practice led enquiry into Locative Media (LM) which argues that this emergent art practice has played an influential role in the shaping of locative technologies in their progression from new to everyday technologies.
    [Show full text]
  • Against Authority
    AGAINST AUTHORITY Freedom and The Rise of the Surveillance States by John Twelve Hawks for Thomas Pynchon ©2014 by John Twelve Hawks. All Rights Reserved. A LITTLE BOY IN A ROOM OF MIRRORS Both dogs and humans know when we’ve been caged. We sense instinctually when some other person—or an institution—has the power to direct or control our lives. And our first awareness of this reality occurs at an early age. The older kids on the schoolyard are bigger and stronger. They have the power to knock us down and tell us what to do. When I was growing up in the 1950s, I was quite aware of my own powerlessness. I couldn’t tell anyone what to do—not even a first grader. Although my brain was crammed with a great many words, I had a terrible stutter and couldn’t get the words out. Everyone in my elementary school class laughed when I struggled to speak, and sometimes even my teacher had to conceal her smile. By the time I was eight years old, I started to believe that a demon with a perverse sense of humor was in charge of my lips and tongue. On some days, he was a lazy demon, and I could talk on the phone or answer questions in class. Then the demon would get annoyed with me and I would spit and sputter over every word. On Sundays my family attended a Scotch Presbyterian church headed by a conservative pastor who preached about infant damnation. I was confused about the power of baptism, but I definitely understood the concept of hell.
    [Show full text]
  • A Framework for Spatial Interaction in Locative Media
    Proceedings of the 2006 International Conference on New Interfaces for Musical Expression (NIME06), Paris, France A Framework for Spatial Interaction in Locative Media A tau Tanaka Petra Gemeinboeck Sony Computer Science Laboratory Paris Key Centre of Design Computing and Cognition 6 rue Amyot University of Sydney F-75005 Paris FRANCE NSW 2006 AUSTRALIA +33-1-4408-0512 +61-2-9351-3030 [email protected] p [email protected] ABSTRACT mediated and physical spaces [5]. This paper presents the concepts and techniques used in a Related work in the area of mobile music systems can be family of location based multimedia works. The paper has seen in the projects presented at international events like the three main sections: 1.) to describe the architecture of an Mobile Music Workshop series [11]. Recently, new fields of audio-visual hardware/software framework we have creative works known as locative media are gaining interest. developed for the realization of a series of locative media Work in this area is represented in research consortia such as artworks, 2.) to discuss the theoretical and conceptual Open PLAN [8], and in festivals such as PixelAche [13]. One underpinnings motivating the design of the technical of the themes for the 2006 edition of the International framework, and 3.) to elicit from this, fundamental issues Symposium of Electronic Art (ISEA 2006) is the Interactive and questions that can be generalized and applicable to the City [10]. growing practice of locative media. Recent artistic inteventions in the field of locative media include the annotation of the physical with virtual marks or Keywords narratives [14] or the revelation of patterns by tracing the Mobile music, urban fiction, locative media.
    [Show full text]