Deep Lab - Art and Hacking in the Post-Snowden Age

Video in TIB AV-Portal: Deep Lab - Art and Hacking in the Post-Snowden Age

Formal Metadata

Deep Lab - Art and Hacking in the Post-Snowden Age
Title of Series
Part Number
Number of Parts
CC Attribution - ShareAlike 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this license.
Release Date
Production Place

Content Metadata

Subject Area
Hacking technology is a right, not a weapon. Because the deep web is largely void of a female presence—save for sexualized images—female hackers must engage with the future, in order to make our presence in history indelible. As a consequence, Deep Lab was founded to examine how privacy, security, surveillance, anonymity, and large-scale data aggregation are problematized in the arts and society. The Deep Lab is an all women research collaborative who are an international group of new-media artists, information designers, data scientists, software engineers, hackers, writers, journalists and theoreticians. Founder Addie Wagenknecht is giving insights in artworks, publications and the angle...
Computer animation Meeting/Interview Lecture/Conference
Context awareness Lecture/Conference Internetworking Video game
Point (geometry) Meeting/Interview Quicksort
Physicalism Disk read-and-write head
Group action Lecture/Conference Figurate number
Collaborationism Medical imaging Complex (psychology) Virtuelles privates Netzwerk Meeting/Interview Hacker (term) Blog Encryption Expert system Control flow Quicksort Social engineering (security)
Mechanism design Data management Meeting/Interview Order (biology)
Area Programmer (hardware) Meeting/Interview Hacker (term) Multiplication sign Moment (mathematics) Right angle Quicksort Mereology Form (programming)
Game controller Implementation Arm Meeting/Interview Term (mathematics) output Black box Event horizon Mathematical optimization Task (computing) Hypothesis
Arithmetic mean Message passing Identifiability Inheritance (object-oriented programming) Internetworking Projective plane Number
Point (geometry) Message passing Group action Inheritance (object-oriented programming) Information Meeting/Interview Internetworking Multiplication sign Projective plane Mereology Number Formal language
Revision control Data mining Group action Arithmetic mean Meeting/Interview Different (Kate Ryan album) Range (statistics) Right angle Bit Spacetime
Latent heat Computer animation Visualization (computer graphics) Ring (mathematics) Regulator gene Information Internetworking Outlier Website Deep Web Rule of inference Numerical taxonomy
Point (geometry) Computer animation Visualization (computer graphics) Internetworking Outlier Projective plane
Mobile Web Information Source code Projective plane Expert system Planning Real-time operating system Cryptography Meeting/Interview Hypermedia Web-Designer Videoconferencing Encryption Quicksort Information security Traffic reporting
Goodness of fit Latent heat Software Mapping Meeting/Interview Internetworking Projective plane Conditional-access module Quicksort Numerical taxonomy
Axiom of choice Presentation of a group Information Variety (linguistics) Decision theory Projective plane Drop (liquid) Process (computing) Personal digital assistant Different (Kate Ryan album) Telecommunication Encryption Videoconferencing Information security
Logical constant Statistics Cellular automaton Tape drive Bit Mereology Computer icon Product (business) Twitter Web 2.0 Facebook Frequency Latent heat Internetworking Computer programming Computer hardware Encryption Ideal (ethics) Spacetime
Trajectory Greatest element Group action Touchscreen Multiplication sign Plotter Set (mathematics) Inequality (mathematics) Perspective (visual) Twitter Type theory Software testing Data conversion Window Metropolitan area network Physical system
Group action Electronic mailing list Bit Mereology Perspective (visual) Graph coloring Field (computer science) Twitter Encryption Right angle Family Computing platform Reading (process) Metropolitan area network Spacetime
Satellite Roundness (object) Key (cryptography) Meeting/Interview Multiplication sign
Computer animation
and do and a
and a
the the the this and in and and what I grew
up with the Internet very much of all the the socially and it's only been more recently that I feel like the
ideas and control the Internet have drastically changed and this awareness of who you are online can be
found out in impact bacterial life
and a lot of people see the Internet as like the last create frontier but that's totally not
true were so depending on sort of corporate infrastructure at this point the the the infrastructure is something that sort of designed to be ignored something that people tend only
noticed 1 8 not working and In some value literal physical is in other kind of more abstract way is there is something about the head the habitus now working
this week I would really like to try to figure out how well that is bad figure out what to do about
it I feel like this is a group of people who might be able to help to that uh high
everyone I'm adding regiment Jillian yachts and we're here to talk about the blog which is a collaborative we I founded in 2013 of
researchers artists writers engineers curators and culture but users who were interested in surveillance social hacking and big data aggregation as lucky enough to be invited thank you and deep was composed of people were both experts in the field of but also in creating avenues so that we as a society can embrace the complexities of encryption and the idea being that uh I personally believe that hacking is deeply stigmatized socially but so we constantly see this image of the hacker as being someone that has a black beyond its breaking into the bank or it's a terrorist and criminal and it's this idea of challenging and and circumventing this image uh 2 people the visible user so that we can openly embrace it in positive ways but these complexity is like PGP uh VPNs boatyard the sort
of thing for I think that there a mechanism of our culture and since the online manifests itself now i a l and this supreme currency is our data and our information so for not fluent in these technologies and these tools in order to communicate and we cannot defend each other the the management things the these are all the
women that are part of the lab at the moment so Gillian myself by burden Allison Birch resigned bake may Varna clear evidence follow homes GEN-LOW Juliet against the Lindsay Howard K. Crawford Mahler and Simone Brown
uh so I'm an artist and it took me quite a long time to be OK with that because there's so many preconceived notions about what an artist can be I'm and more so my friends were hackers and programmers have always called me an artist's but some of my friends the artists have always call me a hacker programmer so I felt like I kind of fell into this gray area between the 2 but this is a piece called asymmetric love which I developed in 2012 has some CCTV cameras are plays with this idea of the ubiquitous surveillance right and this idea especially in Europe or coming from America as an American is something that we constantly uh see everywhere is a chandelier so playing with this very common form as sort of something known as a common of oppression in western society and also really
interested in a tap atypical notions of hacking so social facts gender facts petty taker translate events that never actually happened but rather is the truth of what is happening so a lot of my works deal with contemporary issues of optimization of parenthood is this robotic arm which reacts to a baby crying and the controls the speed of the bassinet based on uh the speed of the child's crying it's about kind of circumnavigating is really monotonous tasks around turning um also this is Q.
hydro it's a it's kind of play in a black box uh the black box is defined as a device which can be viewed in terms of its inputs and outputs without any knowledge of the internal workings and the implementation is completely opaque and so what I really I'm wants to transcribe of trans slates with this thesis is the idea of what a black boxes right so I had these custom PCB designs and Ethernet cables on the front and it's it's very um a static superficial piece but the only person that can really see what is behind it is the person who owns it so in that way it's it's very much like a node to open-source culture and and the ability to hack because that's the way truly own something so you reveal kind of the back door in the workings when you move the piece from the wall so I don't really
know what to call myself and I guess and activist a writer or poet am but mostly what I do is do you know those people that parents mostly that try to sneak like vegetables into the children's food it after creative means for example China but broccoli into chocolate that I do am not literally but in trying to get my message across identify new creative ways to do that and so I work in a number of projects work for the Electronic Frontier Foundation I I help develop our surveillance of Defense Defense project launched last fall I'm and now I'm launching a new project government
censorship which tracks at corporate censorship on the Internet and ultimately and you know I feel like I guess that I don't really know what to call myself and so what I do is add basically trying to find ways to think about the people who unthinkingly use
technology me into that and try to get them to understand the message that many of us are feeling the audience again surveillance against censorship and so on and so forth so to explain my 1st point I'll show a little quick story and I do all the work in the Middle East and a few years ago I was working with a number of activists in a specific country on a campaign against at pornography censorship and now now working in the Middle East against the censorship of pornography is not really a popular thing to do but the activity in the country that is working in we're trying to find creative ways to solve this problem and so we decided to do together was petitioned the government to actually offer home censorship technology for free to parents so that they could filter it whole without having everyone experience that censorship and ultimately was not successful but another government actually ended up picking up the ideas of Jordan did this a couple years ago they offered free technology to parents to censor for their children at home which I don't really have a problem with is 1 that's not the state and and that was actually kind of an effective solution so am another big project at IBM working on like a set a surveillance self-defense and what we were trying to do in developing this was find ways to reach people who are concerned about surveillance at all we wanted to reach your average people out you people who might be concerned with I don't know for example Dick picks and and that's that's what really would be working toward we translated
into I think 6 languages so far and we're still going still developing and then trying to find innovative ways to deliver that information so I was thrilled to become a part of the problem at hand I just met this morning by the way in person for the 1st time that the thrill of the Internet is it not an and when she invited me I think I kind of wheel the little that had to be part of such an incredible group
of women with such a diverse range of skills and interests that with that technologists policy people artists writers but everybody's working toward the same goal and fighting the same fight and unfortunately didn't make the 1st gathering believe it or not there is actually a conflict between that and another really awesome feminist gathering was happening here and I had to choose which is such a wonderful problem to have and but nevertheless I didn't make it and instead this is the poem that contributed to the book that we put out at 2 over the winter and then I'll be joining them in May for the next 1 we so of course I think right like
this is this is an example we talk about hacking we're not just talking about technology right so this is an example of something that I would call a little bit of a hack and this was just something we put together last fall upset about a mean that was going around was actually several years old is you know I'm not a big deal around that but a friend of mine I felt a little on represented by the mean as you can see what an incredible wonderful courageous people but we saw this and said 0 everyone looks kind of male and kind of white and so we created this other means just trying to represent a different group of people and I think when it comes down to it a lot of the problems that were discussing in the technology space this is you know this is exceptional but when you look at corporate technology spaces Corporate Technology spaces are usually about 70 % white 70 % male and that the real problem and so I think that this stuff that we're talking about the stuff that were acting on is toward that issue the so this is an example of
something that someone in the deep Web has been working on follows that i Ringing designers based right now out of the UK of work is really about a data visualization and she's been working specifically on how do you visualize of the Iranian Internet but especially censorship specifically in the country a lot of the information she gathers and aggregates 3 they're speaking with journalists citizens or people within the country and I ran it's interesting because if you're not familiar with how citizenship typically works there is it's somewhat over it so anyone can become a dissident were just a few clicks the Internet censorship is also heavily targeted by meaning that a arena officials tend to develop a really arbitrary rules and regulations are heavily prosecuted so that you never know what you're
doing online the winner will have been impacts as she did this really and uses an interesting kind of taxonomy of the visualization of how the Internet works specifically with users with censorship and um site by a kind of specific examples in around is actually really interesting al and how connects censorship but it's an outlier from the rest of the region the rest of the Middle East and North Africa in
that it censorship is over but it's also almost something laughable in that it's easily circumvented at this point and often over broad and the air sorry the rest of the region such as you know in in Saudi Arabia you have things like chicken breast or breast cancer the censored in an attempt to censor pornography and around an outlier in its sophistication and then I think that will arouse doing is really fascinating that respect trying to bring that to the foreign actually I'll just give a little quick Pitchford talk tomorrow Marcela Madani is giving a fantastic talk about Iranian Internet censorship usual see yes if you're not familiar with this project they do
you recommend checking it out she did a really comprehensive data visualization project which is quite astounding as the next step is
hollow homes is a mobile security expert with the Guardian project she was the lead developer on informer can act which is enabling encryption of media in real time on your mobile device that what's great about this is they can basically be used as a potential evidence or even a trusted source for journalists so for example in Syria recently there a place for much of the mobile video was pretty it um extensively used for documentation of war crimes but it was also heavily used for propaganda as so it would form a can people on the grounds
can basically in crypts at any sort of media to secondary sources and use it as evidence or in a fact-based reporting and what I really like about follows work is a lot of her work is as much about in a plane as it is about protecting the user
and so Ingrid she's OK she had a lot of really good projects and it's very hard for me a pick as she has some really amazing like which analyze the Norstar within it anyway but this is a map she created in 2004 based off of the gchq and how it collaborates with N um submarine cables with specific companies so for this you'll see it's a pot Apollo cable who the owner is Vitaphone and in which companies basically and there's implications for so on Verizon or voted I can see from here but you can read can and she also recently did this project which is called networks
of New York and it's a book which is sort of a taxonomy of infrastructure in Manhattan it helps you navigate visually how the city works so it explains what certain could markings are which atively kind of like encrypted or to be a good place for things like telephones TT by internet markings or even surveillance cams where the place within the city out there is also route on
who's doing a lot of really interesting work as a security researcher she advocates and teachers journalists how to use encryption technologies and for secure communication between themselves and whistleblowers she's also a technical adviser for the crew trip art troupe ripped off to a profit at 100 projects at home consoles and then to he that it is and for the freedom of the foundation so I'm sure most of you are familiar with secure job looking at this audience but nevertheless and in case you weren't I the leaking govern designed originally is dead drop by the Italy and Schwartz and then later picked up by different presentation and then to me what's really important about this is that we have so many it we have a variety of different ways for leaking information that we have all these different platforms and and I think that you know it's a personal decision where 1 chooses to leak you and having a kind of choice is incredible and then having so many diverse people working on this is also incredible yeah and and
so so I will that we were just going 0 now and this is about an older people were known it registered with the leave it up there so if there was a video I have always and birch proprietary
technologies people it's fun if there was a billionaire Alison birch richly recently created a make jammer which is a piece of hardware which creates a frequency to basically Walker smartphones so with similar to bring its use of piece of tape over your uh what he called this icon you can have it can it's about protecting people and come in From cells self-censorship in an age of constant surveillance to use it you basically put your phone next to it creates a frequency automatically and you can speak freely at something Allison said about her work which I think also applies a lot to kind of the overall of precipice of deep lab as of something I would like to read really quickly she said the goal is to focus on the tools that are usable and not geared toward people who have any technological knowledge per say too often the most usual products are the most exploitative and the most secure programs are next to impossible to figure out sense million which you know as you know if you're familiar as encryption like unfortunately still holds true for a lot of the particles and and so forth were working at it so I wrote a piece for the new international a few months ago a new internationalist rather than a few months ago about the colonization of the global Internet by Silicon Valley and the idea behind this was about how so many of the policies that we encounter on the corporate wrapped web that come from specific American ideas about sex and violence and a lot of these ideas specifically are coming from the that again that statistic the 70 % men statistic and and that's why I believe that Facebook's policies for example Muir the same kinds of policies that we see from the Motion Picture
Association of America etc. it might not be over so it might not be intentional and but is any American in the audience knows at our priorities around 2nd islands are a bit fucked up and and so I believe that a part of the reason for these policies is precisely that the demographics that make up Silicon Valley companies now again some of you not may not care about Facebook and Twitter you might have completely rejected those and that's find and that's wonderful ideal but I can't and and so were not me US right now but I still consider it globally the problem is the same technology companies especially the corporate space are dominated by
men and in diverse countries by white man and so some might say that that shouldn't matter but it does matter we all come to our work with a diverse set of ideas shaped by who we are and how we've been raised and what we've been through and its claim to say that women's experiences are different and so that's what I love about the plot I love about these different initiatives that are coming up is the idea that we can re think these ideas take it back to scratch take it back to the bottom and we think through the at the policy and the technology ideas that we've up with or experienced and so the the test a little better on this in his keynote but I think it's important that were at a time for humanity to acknowledge the structural inequalities that have been built up over the last century in favor of these white male voices I think once we have acknowledge that we can see how the system has overlooked much of the population for too long already I don't think that this is just about women as a society we are broken and if we do not welcome more perspectives into the conversation nothing will change what I mean by perspectives is I mean women I mean LGBT I mean women and people and men and everything underneath that are not white let us talk and when we speak listen we can change the trajectory but only if we can look up from the blown out why windows of our screen to listen instead of tweets that we might be getting someone thinks
and so I think we have some time for questions if if there's any from the audience were happy yet so we get any other type of questions joining in the Senate questions the hi that's a really cool group of women you and there how did he find each other in the 1st place the 3 of them so I was approached by some a friend who is also director of
a missing school 11 he runs steel for and the Frank right Studio for Creative Inquiry at Carnegie Mellon and he said I really like what you've been doing with your kind of surveillance art is there something that you could do on as a fellow here that would pertain to this and so I thought about it for a while and I thought you know of equals to bring together kind the strongest most literate women I know in these fields and see what's possible and as that was really the precipice for deep LAV and I brought forward a list of women and there were some suggestions from people were advisors and and then from there we met in the US have been developing history more questions it hello overrunning you with the request of people want to join their families to women coming so certain interesting there is actually quite it and talk about the other day gold that affects the is
actually quite a bit of criticism a few months ago and the lack of trends women the lack of women of color and I think that from my perspective as an individual on and as a part of the collective I felt it was really valid criticism no there haven't been as far as I know people knocking them down the door to join but the criticism which came from a man for all you know whatever disclosure but I still felt that it was really valid and I think that you know we've we've how we have a channel we talk every day and we've talked about being more inclusive work actively trying right now to make this more inclusive to they do think if you look at us we're pretty white group and so for us to stand up here is to way women and go like 0 to many white people in the space this is a problem and and so even though there's no banging on the door just yet we do welcome any suggestions you have any reading and particularly channels of platforms and your connected with Global Voices and a number of other yet potential channels to reach out to women across the world are you like focusing on anything particular and so in a few weeks in New York City were going to be doing a lot of speed workshops for like setting up encryption and getting yourself running
with really basic kind of knowledge of and you know getting Torah on getting OTR I mean getting PGP keys that up just feeling like I think it's important that people feel like they can be proactive and be enabled in that situation as doing that there's been people also reaching out to us who wanting to set up kind satellite communities became mimic around the last time an end is not your both can be around for the the rain yes no more questions can be addressed to you personally of secession wonderful it's given a really really big round of added uh please continue by