Surveillance and Art

Essay written for MFA in June 2019 (James Tregaskis all rights reserved)


Introduction
Surveillance has been with us throughout western history. The use of technology opens up opportunities for covert activities. Increasingly sophisticated methodologies are employed with each advance in technology.
In this paper I set out examples of surveillance, contrasting desirable and undesirable outcomes in its use. I present examples of recent and more sophisticated techniques of surveillance to raise the question – is surveillance out-of-control? Evidence suggests that the Internet has accelerated the advancement and aggregation of bad actors in the commercial arena to a toxic extent, a manifestation referred by commentators on surveillance as ‘surveillance capitalism’ . Could it be that the government-initiated high technology surveillance methods used on their populations are a good thing and perhaps necessary for the ultimate survival and benefit of mankind? The resultant asymmetry of power does not only lie in global corporations but is also held by governments. How has the evolution of surveillance and the questions it raised been dealt with by artists and how do they approach the subject?

Privacy Concerns, Tracking, Surveillance of individuals, Public Privacy

As part of our planning for the next Assignment for Computational Arts-based Research, my theme will be Privacy Concerns, Tracking, Surveillance of individuals, Public Privacy.

 

What are the key questions or queries you will address?

How much are we being tracked by government agencies, companies?

How much is revealed already?

“In the wake of the Government’s proposed “Snoopers’ Charter”, ORG asks why intrusive new laws are being suggested, if they are needed at all and what the alternatives are. Some of the UK’s most prominent surveillance experts examine the history of UK surveillance law and the challenges posed by the explosion of digital datasets. Contributors include journalist Duncan Campbell, legal expert Angela Patrick from Justice, Richard Clayton of Cambridge University Computer Labs and Peter Sommer, Visiting Professor at De Montfort University.”

Open Rights Group

Snowden Global surveillance disclosures

What Google has Hidden

Blank Spots on the Map: The Dark Geography of the Pentagon’s Secret World

places-google-earth-wont-let-you-see

Satellite_map_images_with_missing_or_unclear_data

ispy-cia-campaign-steal-apples-secrets

Trevor Paglen

 

Why are you motivated to undertake this project?

This is a concern of mine, for example, even yesterday (14th February) 2018), Amber Rudd announced a new means of tracking citizens in their internet activity.

Google have increased the resolution of the street mapper software. Up until recently, a house might be only a vague blob, until now.

My home address is revealed on my ‘whois’ search on my website. I have to pay the hosting company extra to hide it.

Tracking through cookies – possible eavesdropping of metadata on personal emails, e.g. correspondence appearing on Facebook.

Amber Rudd and her efforts to ‘fight’ terrorism may be circumvented:

https://www.wired.co.uk/article/isis-propaganda-home-office-algorithm-asi

by…

https://www.asidatascience.com/ (recruiting now!)

What theoretical frameworks will you use in your work to guide you?

I will explore the contrast between the uninvited (yet legal) surveillance of my own ‘back yard’ vis a vis my un-noticed intrusion to neighbouring houses Wi-Fi (illegal).

If there is a problem undertaking this option, I will be investigating ‘hidden/secret’ sites in UK and abroad to see how much can be gathered using web tools such as Google maps.

I may only in the end enact the possibility of the latter to avoid problems with the law – however, I will use publicly available data online to show how international companies like Google intrude on our private lives. I will use Actor-Network theory to take us through the players in this scene, illustrating with real life examples.

What theoretical frameworks will you use in the analysis of your project?

I will investigate how much can be found out about me in the public domain online.

I will explore tools for intrusion, legal and illegal. (Kali Linux tools, Aircrack-ng, Reaver, Pixiewps, Wireshark.)

Using Actor network theory to determine who is the victim and who is the perpetrator, are they both?

How will you document your project?

Video capture, demonstration of software intrusion tools using Kali Linux on Raspberry Pi.

How close can I get with Google streetview of private and secret establishments, recording this using Camtasia.

Logging into password protected Wi-Fi in public spaces using open source Linux distro Kali Linux (covertly) via hidden battery powered headless Pi Zero. (possibly will not be available as there may be legal issues here.)

Possible logging of public data traffic and using Wireshark for forensic study.

Timeline for project milestones

Week 1, 2. Further research

Week 3. Artefact 1; covert monitoring of data

Week 4. Google Street view compilation

Budget (if any)

Raspberry Pi 3, Pi Zero (already have these)