Bestand wählen
Merken

Forensic Architecture

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
and
and this this and this and is chief OK so again once again Good morning at everyone we're really sorry for the delay but as you know this is the Chaos Communication Congress chaos is part of the show but in any case where I read a start our 1st speaker for the day this is the talk that I personally very excited about and very interesting in my opinion our our 1st speaker is an architect and he is a professor of spatial and visual cultures and the director of the forensic architecture at Goldsmiths University in London please give a big round of applause to L of times but the have to be my 1st the congress actually and I am sure it's going to bring good luck uh the fact that we had some technical equipped the problem right now I'm running in London something that is better described as a count of forensic agency is a civil society conference again is no better way to explain what kind of forensic saves a certain turning around repurposing of the forensic gaze towards the state then looking at a series of features with security forces or the police are the perpetrator so what I'm gonna show you today but very fast uh 3 cases the first one is the 2nd Germany 3rd 1 in Mexico each 1 involves violence or alleged violence by out by the police in each 1 also involves a different mode of research and now technique but in doing so the first one is the place where I come from um Israel Palestine in the issue is really and the forced eviction of a Bedouin a Bedouin communities that have been living in the north part of that not terrible Negev desert in the south of Israel so for generations now declared by the state but to be legally occupying those places in a subject to continuous raids up by which the police or you don't see the slides was flights slight does not at yeah yeah so 1 2nd and the so alright so I'll I'll tell you a little bit more would put forensic architecture and and the leaders so um basically what we are on the is a group of architects filmmakers some an investigative journalist coders and we join together to but create on a forensic agencies who was a kind of an experiment that was started around 2010 and the because we felt that in both technological and political changes in a bold and demanded the form of of count of forensics that we are at now practicing initially we were working in conflict zones and the 2 words so all starting really in this Millennium in the year 2000 war became an urban phenomenon almost all conflicts that we were looking at took place in cities in n amongst buildings so in a very straightforward way just like a uh a medical doctor a physician can turn into a pathologist we architects we're turning the tools of all trade understanding of building a way of interpreting its materiality its physicality into an every dentary technique so initially what we were doing was a kind of archeology archeology of and the very recent past or archeology of the present and this is a term but utilizes and looking at piles of ruin and of a building that was destroyed in a bomb or in a firefight and trying to read from the disposition of the rubble something about what has taken place within the search but within within and around it so it it was it started as a kind of an archaeological practice but but then then again very often when we start working in conflict zones in the 1st projects we had to wear in Palestine and then in a we were working to uncover a drone warfare in the Pakistan Afghanistan from 2 years to realize very fast so to the this should the representation of the users all this can take 20 minutes to pass them on yeah and because I started to put it on the stick and this and that is you can you connected some to something of this kind of thing here if if this if you can get an image from this and and when things from my website to so so so as I said the 1st level of our work was archaeological material trying to uncover what has taken place with people with but increasingly we realize that we cannot really get to the places where it was most important for us to research so that um the states when they violate human rights or OK if you want to look at thank you very much and both also do 2 things they close the area for and to any investigators the human rights group or anyone that works to collect evidence against them and they limit the ability of the signal to come out of them and this is actually what happened in 2008 2009 does a very a little signal that was coming out of Gaza under attack by Israeli forces and this is what happened when the know that the beginning of the American drone strike campaign the Pakistan Afghanistan thing where effectively limiting it so we what we had to do and this is what you're going to start seeing is to undertake archeology through looking at media and not interpreting really and the kind of flood of social media images that were coming our way of his this how it has few
height how OK so I'm the 1st the 1st example of like to show you these are the work we've done that now with the Palestinian human rights organization in the desert in 2014 and we could not go we ask for permission to go to Gaza time we our access was denied in all we had was about 70 thousand images that we have collected during the day and what we had to do tell a story of 1 day was 1st 2014 out morning to and that to evening in which was that the the most violent and the day where most of the attention of the because you tease with sustained what we didn't have was the metadata on those clips and images because of course they were harvested out of the mainstream of social media and media effectively had to develop a technique
to look at the ball clouds themselves to look at and and compose the architecture of the that of bulk of clones in order to see in collect images that refer to the same explosion and back from there to determine the time and place of each 1 of those bonds so those Paul bomb clouds will foster metadata the complex physical metadata about here is how we geo-locate found that 1 of the images uh that that that that we found 1 of the clips that we found by comparing it to the point on the perspective of the the of the video with with what we see on the on the satellite image and located at the place where the photographer was in by cross-referencing 3 of those of the same cloud we managed to find the precise place where the bombers finally landed so and this is this is effectively a way in which you can reconstruct the metadata money 1st time space location from what we call physical clocks that is to say it on a log things that exist within within the image itself however we can see other things at home this photograph to so if we if we look at 1 of those images and here we have the video captured to share lines in this photograph just a 2nd before closing off the camera and what we need to do is to try to establish the time we can establish the time on that image and we all that form of the cloud is that time we can triangulate on an established the
from the times of other videos and then and then further so effectively by building a 3 D model and running a son simulation on and how we could arrive at a very precise i.e. within 5 minutes margin of error time on that image that and now we know where this image where this video was taken and what time it is taken in there is however another even in the satellite images we obtain this is a kind of a very rare occasion that we saw an actual bond are on the satellite image again this is something the satellite image has the data on any started looking sort of hunting for that long he images from the ground again if we could be looking at what is seen in top view on from a ground view we will be able to to to start establishing a times on this sequence as you see this sequence has metadata but the metadata is wrongly said that at around midnight and so we compose that kind of panorama of of the of the sort of the bump clouds of of the city around and around that time in that we could identify the clouds cloud and this is the cloud in a side view this is you can talk to you and we could find the precise location of precise time and then on by confirming that is actually the same we can move back and corrected digital metadata so this is all techniques of all of actually establishing the very basic foundational stone off of research time states relations between events from here for example we could see in 2 different corners of the of the web we find those images we can verify same camera but seeing the same scratch up all the lands and establish corrected data established at the time difference between them in now here here again the same camera man with the same structure the lands and now we can compose topic timeline of bonds and during the day they in after that Of course this kind of cloud atlases our technique that was used by artists and by amateur metrology all the way from the 19th century on but what we did is creating the kind of archive of clouds but here what you see is that we were able to and convert them to information on the ground and then invert the image moves from clouds to city on what you see here the model is something that we call the architecture Image complex architectural models are the only ways to make sense and to place those multiple images in space time and so that we can navigate rather than adding them we can navigate between 1 image and and the other what you've seen here is that the 1 of the images looking so carefully at the bulk of we start seeing 2 images in the fall we found the craters where they have landed in them and we could about for followers calculate the kind of like the destruction radius there you see now again this whole reflects into to see a bomb onto split-second before it landed ground and killed 16 Palestinians with the entire family and but the lawyers asked for the size of that belong in order to bring in a kind of a supply chain action only it and when we see that on the on for the friend indicator for the friend within the model of the city and actually measure those bonds in very precise with a very small under 10 % margin of error and then go to the catalog and find exactly which form it was landed engine and that would enable activists to go after other manufacture after the policy of of doing that so again Q we are moving with that the model with thermodynamic especially if we look at the way the cloud is changing in order to really realize we looking at the same clout we picking up now images and friends within the city as clouds being the anchors of the reconstruction and and that that project is in fact gone up later to us as evidence was submitted to the ICC to the International Criminal Court and was using various other form of activism on the ground and at a certain extent I might have contributed to a change of policy by the idea of about hundred other it's something that they've been active during the day the point cloud would also something it was very important also like memory anchors have witnesses on the ground remembered and could sequence their movement according to those bond clouds so think about an development element it combines and ties together material evidence media evidence and memory evidence but at the same time
so that I don't even know and basically just improvisational totals for the lecture I
wanted come to show you how before I have here a piece of a recent copy litigation
we've undertaken income hi and you know way together again with with the international we were able to
expose a secret detention center uh in uh rather than by the color on the military data where people around that prisoners of a suspect's of vocal parent prisoners were actually torture and we had access to people in Cameroonian prisons which is very rare occasion we were able to actually absent questions back and forth and reconstruct of the the the architecture and of the present and the conditions of incarceration with what became very important for the questions that we continuously and continuously received for all of those aspects is that they've actually that's seen and being at the beginning we we did not know if this was a correct or model and obviously seeing people being tortured and killed outside of the detention center but at some point they also conference seeing something different about American soldiers of it to where are present on the side not as you know the US has claimed that it has stopped traditional stop involvement in torture but and this is something that we started from very closely beginning to see whether we could find any traces of US soldiers and other European militaries are involved but we think that form of a sort of incarceration people and torture of local around us us the 1st thing that we solve that we know this was on and sometimes traces the left the most kind of some unexpected of places a contract American contract to connect that based on the internet the method that we saw that that was popular public domain we started following on Facebook in seeing some Americans will eventually forgot to disconnect the the location tagging and you know they're kind of like holiday photographs of could be very easy located on all database again we build the model of the base in to confirm precisely where each 1 of the photographs that was taken it we can see that they had access to the entire day again based on what people are executed tortured on architectural and and then check unit and time into this you see that the cite it's actually and construction something that is merely globally seeing was the American soldiers training on the unit vector is doing those atrocities in here and it's almost comical but failed the trained the night-vision equipment by of playing football so they all play football in the darkness of nite vision of and you can see that that the sort of the involvement of these these vary from very direct so that the exposure of the trace norm to promise of a full American at the beginning denial always denial of Internet imagination than our full investigation by by by the US about this from the these allegations of another
important cases that we were involved with recently used
the area to not the case I think no maybe many of you know the the the story of the so good 43
students Mexican students out there but the women forcefully disappeared in Mexico and we were asked by their parents and by other civil society groups true in fact are investigated and each 1 of the biggest controversies in Mexico right now
are still although it's 3 years since the disappearance and students who are involved in very grassroot left-wing
politics entered into a city that was
very much involved in that are not
constrained in where destroyed
by the police the military and and and organized crime what we've done here is not only collect new evidence but look at thousands
and thousands of existing reports
and wanting infected data mined from the word you know hundreds of thousands of documents and the only way to to make sense of them was actually to locate relations between different events in spacetime the relations between all 4 calls photographs movements of
cause and Gunshot started
creating a very different picture than the Mexican government is that she was willing to admit that and that is that I know there was some local on angle global and local sort of organized crime groups
that was in charge of all of the sections of the created a platform in which we placed at every named vector but in spacetime a timeline in all the communications so that we could start seeing relation between evidence also and it's not being a bit of evidence in itself it's not the case in all kinds of other there that matters but actually have patterns
coordinations and patterns of escalation in other things that it actually exposed at what
what about what was going on and we could show really that indirect involvement between 3 different police forces on they tend to the military and organized crime but at the same time the location of all CCTV cameras that were there and removed and in the and somehow the relationship between phone calls and are in that text became the most actually here invocation of command and control II that's the these events lecture coordinated by the police here are we we we are analyzing CCTV cameras in and what they would've seen of course the state it immediately after the event you based on the CCTV camera that exist at the close of available in the city and they said all that and show anything we could show exactly what you would have have shown I did this not at the moment
another element to this these non legal so this is the
platform you can actually go in and
exploit yourself and rather than as sort of like a word with images and and this is a work with data in 1 of the most important
I'm drawing on the face became 1 of the very influential drawing during that time
and in our investigation was a comfortable working drawings we object
that for cells because we had to keep track of where every other agent wars and what was the relationship between them and also that multiple narratives that would also we kind of kept a very very long drawing in the office and plotting the movement of different active up until at some point we realize it's what we would only get working drawings became infected infected image of disappearance because this appearance is not about enforced disappearance of people is not only about grabbing people on killing them in hiding the bodies disappear as useful so that an attack on evidences becomes continuous withdrawal and destruction of evidence the key is the introduction of false narratives and of subterfuge that so that it disappears this exact in narrative form itself isn't on the so so he drawing we could actually kind of like shows how the state narrative here in black and I'm not going to go exactly into what everything means because we lost a lot of time in this presentation but from the so the movement of all of the students according to the state narrative estate activities that still officially holding although it's the county revised about the response to that too too many things but including also our our investigation into now
with the the the the the victims are the survivors of narrative and completely different and starts the the end the city is completely different times and they move through it and and in the divergence between the black and red narrative in fact is the status of the united and disappearance disappearance there is is is it all going crime disappearances as the quality of the narrative attitude under this people just that you can see how the other drawing drawing is
built up with another here on top of the the the purple images are the purple lines are those of the not goes on and on so each 1 of those different story in the
multiple stories of being on the that kind of space of
disappear here you would see the movements of police throughout the city and the unity of that police force is precisely next to the students of all 4 of you and and moving along with the happy fact what we have finally done and this is not
going is the military that from these is built that we knew about we have the of the
image and so this is this is the complete
drawing that we've actually printed in enormous neural in Mexico murals on kind of sides of political pedagogy you can think about the errors as great murals are in Mexico and the US with their narratives about the history of the state and about the struggle of the working classes of the sense we thought that this is a kind of mural of the 20th century about 21st century feel like a kind of a data mural in the complicated to read but it's complication is affecting the image of disappearance means the alignment interactions with it is what makes it so that's based
on the visual show you the the image of the neural in
this phase and it has
become ever since the time of the sides of the
political assembly and political activism or protease for the families and and others in the in the kennel
shows for us to use all of cultural and arts spaces in the context of work index is another problem encountered for antiquarian often are evidence cannot enter the very official spaces of state justice that cannot but it's very rare that 1 can actually take that the state of chose stating legally in its own institutions what we need to establish alternative forms and for us this could be a public spaces exhibitions at suppressing made some of you might know about the work that we've done on and you know on the on terminology for fast some chutes are agent that was suspected to be present in an internet cafe in so during the time of the richest clearly and as showing that he she was very could not have missed the this this event that was presented in document and the comment of offered for us another very interesting for the the fact it was shown there is in fact mobilized so the process including the of federal in a federal jury in the German federal investigation and also in the house and parliamentary investigation that we're different delegations from these from from from this parliamentary procedure we came to the amended to see it and finally get to work that was presented to the 10 and so on and he was forced to look at it and to comment on that point I think I should probably you some time to question I'm the the presentation but I guess this is the nature of this of this event so I'm happy to have entities the chance to presented some some more things for is the fuel and the other varieties of plants and other than all the other questions in there are 4 levels you're in Ireland to side and in London and as dozens and was in the room with someone who has a history the other the so well this is shut down this is a kind of is a complicated at 1st of all we we we face interactions initially not being allowed access to sites and this is very much the question in the West Bank and Gaza our investigators when they land Tel-Aviv airport sometimes interrogated sometimes that turn turn around and say nothing of that is is comparable to what the Israeli state would have done if these were Palestinians trying to to do the same thing so to certain extent and me being uh an Israeli to London privileged by the by the state and the attendees to use those privileges and to undo those privileges to certain extent and you wiII continues the head and interactions from the FBI for example when we did the white phosphorus research on that included work on of their attack in Fallujah year with white phosphorus and we had some of our collaborators in the US is home being rated uh we have uh um you know we can flag being trolled and threatened and any but the heat it's it's it's a kind of a continuous so the dance of us need to kind of protect our staff protected data in attempts to penetrate it attempts to snare so the public domain and that and few very little victories sometimes the world at the time a lot of Norway and they here they have uh well I want I or how they plan of K actually to same question because our aim is to develop new overdenture technique so we kind of never do the same investigation twice so we never use the same methodology is twice and what we do after we develop any software that would put it on on the public domain where we put it is an open source code and uh we or if it is kind of techniques of more architectural editing image race techniques we have academies we teach the active itself to do it so we try whenever we work with partners on the ground to leave capacity behind us and that is also the reason old what enables this to us is that we a sustainable research grants rather than only on commissions also you know I mean if the firm and prosecutor human rights group or any other civil society group would like to as we would and they day they would pay for part of the investigation but a large part of it is actually research grants that translated into open source stuff and then and and you know the investigations of being put in the public domain it kind of when you look at of video so a little bit like cooking programs because they both tell you what we finally tell you exactly how to do it it can take a step by step this is what you do here and there and there and there's it's I don't have the time to go over the years and is in this world where we think the fact that we are now about the 15 architects coders and and and filmmakers and we
our recruiting because we're growing we and I'll I'll stay here for the day so anyone that wants to come and work with us in London all remotely be delighted to speak to you this work we will have and in all the users of the Indian and little performance in in our in our in in in in red is the same as the this is the life that we started doing now all of photogrammetry as 3 D reconstruction from an existing open-source images so imagine you know places serial let's say that there's been photographed all videos for but by many users we were able we are able to reconstruct it you think this is 1 of the techniques we use in order to identify the gas attack 101 in in interior by the regime forces of reconstructing precisely to the millimeter the shape of the crater and when we were able to reconstruct from at the level of explosives etc. The and that they were sitting on that particular rocket and do we don't really work together with companies we try to take existing softwares and kind of like adjust them to our 2 or any but initially what I want to leave you with this is the kind of the question of why architecture why architecture is really important here in this situation a situation when you don't have only like 2 images of prophesy that's a police brutality your an attack on the city etcetera but you have 70 thousand you need to cross reference them and you need to place them within the space the only way to do it is in architecture models architecture is like the optical device that allows us to sync up indicate you know those cameras that are in space and moving in space so that it is really the the kind of the the necessity of work of architects filmmakers and called it is fundamental because of space replaces the kind of modernism ontology as a relation to images want I think that it's in the film that is kind of you know the basic of similar of political cinema the dialectic does if you like your splice film and put it together that makes no sense for us because we need to move within space pick up 1 failed not to cut me never cut the films that we have we just leave them within the model in the full duration but the investigator can move in navigating in space and time between them and as I showed you in the Mexico case you know these are like tens and tens of thousands of data points that create a kind of intersections between data image architecture that with with the story starts to be a of the of the untold to unfold at all so yeah more questions than with the and kernel in here and we can have that in the end of the year and this is a really good question and we do the work to seek out those 70 thousand images from Gaza where it took us years think about it the year we working a year and 1 day and that's about the right kind of ratio in forensic time that we are between operating within it would protect people during the war and during when they will do it will never placed the location of but and months after the conflict and each was deemed um by our partners in Palestine and by partners in and the this is safe to do without going back to its source and then infect asking that we would never do it in real time the Volvo of the use of the of the of the of the of the of the a mirror so we work a lot was Billington many of them in some some of our projects are are together against that our but the difference is not a we we engage more being sort of the big environment and kind of like data analysis from so many sort of data points where architecture architectural models are the kind of the arena that holds and cross reference all those images together the overlapping our work really is kind of image identification what we see where the image is located etc. and so on and on these issues we work with them together but we tend to work more and against States western states militaries and holding them to account we feel it is it is it these techniques are actually much more useful directed that the British American and Israeli military and that we are able also to draw responses that are effective in these fields and I guess that we get a slightly different sort of on the field in which they work the end of the year I was ensured in the wrong was the 1st to thank you and the
and to see the 2
Bit
Selbstrepräsentation
Versionsverwaltung
Gruppenkeim
PASS <Programm>
Baumechanik
Gradient
Zählen
Twitter <Softwareplattform>
Übergang
Unordnung
Visualisierung
Weitverkehrsnetz
Unordnung
Computerforensik
Hacker
DoS-Attacke
ATM
Computersicherheit
Gebäude <Mathematik>
Güte der Anpassung
Reihe
Zeitzone
Rechenschieber
Generator <Informatik>
Forcing
Verschlingung
Rechter Winkel
Einheit <Mathematik>
Zahlenbereich
Elektronischer Fingerabdruck
Projektive Ebene
Aggregatzustand
Normalspannung
Web Site
Subtraktion
EINKAUF <Programm>
Disk-Array
Physikalismus
Mathematisierung
Unrundheit
Term
Datenmissbrauch
Hypermedia
Bildschirmmaske
Datennetz
Bildgebendes Verfahren
Architektur <Informatik>
Videokonferenz
Mereologie
Hypermedia
Wort <Informatik>
Binäre Relation
Computerarchitektur
Streaming <Kommunikationstechnik>
Satellitensystem
Punkt
Selbst organisierendes System
Satellitensystem
Videokonferenz
Spezialrechner
Metadaten
Bildschirmmaske
Rechter Winkel
Digitale Photographie
Perspektive
Hypermedia
Computerarchitektur
URL
Ordnung <Mathematik>
Minkowski-Metrik
Bildgebendes Verfahren
Streuungsdiagramm
Gerade
Klon <Mathematik>
Familie <Mathematik>
Randverteilung
Satellitensystem
Folge <Mathematik>
Total <Mathematik>
Metadaten
Mathematisierung
Gruppenoperation
Polygonnetz
Element <Mathematik>
Komplex <Algebra>
Videokonferenz
Metadaten
Benutzerbeteiligung
Informationsmodellierung
Bildschirmmaske
Dämpfung
Metrologie
Indexberechnung
Datenstruktur
Softwareentwickler
Maßerweiterung
Bildgebendes Verfahren
Minkowski-Metrik
Gammafunktion
Metropolitan area network
Radius
Sichtenkonzept
Relativitätstheorie
Zeitzone
Quick-Sort
Packprogramm
Ereignishorizont
Verkettung <Informatik>
Festspeicher
Hypermedia
Simulation
Projektive Ebene
URL
Computerarchitektur
Information
Ordnung <Mathematik>
Streuungsdiagramm
Aggregatzustand
Fehlermeldung
Facebook
Subtraktion
Wellenpaket
Punkt
Internetworking
Informationsmodellierung
Bildschirmmaske
Einheit <Mathematik>
Digitale Photographie
Vererbungshierarchie
Strebe
Maschinelles Sehen
Public-domain-Software
Konstruktor <Informatik>
Architektur <Informatik>
Datenhaltung
Dämon <Informatik>
Stellenring
Vektorraum
Zeiger <Informatik>
Quick-Sort
Design by Contract
Gefangenendilemma
Zellularer Automat
Konditionszahl
Kantenfärbung
URL
Normalvektor
Ablaufverfolgung
Flächeninhalt
Gruppenkeim
Vererbungshierarchie
t-Test
Benutzerfreundlichkeit
Baumechanik
Gammafunktion
Subtraktion
Stellenring
Architektur <Informatik>
Relativitätstheorie
t-Test
Systemaufruf
Ereignishorizont
Digitale Photographie
Web log
Quellcode
Hypermedia
Gruppenkeim
Digitale Photographie
Wort <Informatik>
URL
Ereignishorizont
Stochastische Abhängigkeit
Verkehrsinformation
Minkowski-Metrik
Bit
Physikalischer Effekt
Selbst organisierendes System
Raum-Zeit
Winkel
Relativitätstheorie
Stellenring
Gruppenkeim
Systemplattform
Vektorraum
Sichtenkonzept
Systemplattform
Quick-Sort
Mustersprache
Punkt
Garbentheorie
Minkowski-Metrik
Subtraktion
Momentenproblem
Systemaufruf
Ereignishorizont
Physikalisches System
Interaktives Fernsehen
Forcing
Adressraum
Mustersprache
Computersicherheit
Gamecontroller
URL
Modelltheorie
Koordinaten
Aggregatzustand
Spannungsmessung <Mechanik>
Punkt
t-Test
Zellularer Automat
Element <Mathematik>
Systemplattform
Office-Paket
Videokonferenz
Bildschirmmaske
Weg <Topologie>
Endogene Variable
Wort <Informatik>
Analytische Fortsetzung
Schlüsselverwaltung
Bildgebendes Verfahren
Aggregatzustand
Divergenz <Vektoranalysis>
Euler-Winkel
Kontextbezogenes System
Term
Forcing
t-Test
Term
Kontextbezogenes System
Raum-Zeit
Gerade
Bildgebendes Verfahren
Eins
Verschlingung
Klasse <Mathematik>
Interaktives Fernsehen
Bildgebendes Verfahren
Fehlermeldung
Computerarchitektur
Architektur <Informatik>
Einheit <Mathematik>
Programm/Quellcode
Dynamisches RAM
Familie <Mathematik>
Reelle Zahl
Phasenumwandlung
Bildgebendes Verfahren
Bit
Punkt
Prozess <Physik>
Natürliche Zahl
Datenanalyse
Versionsverwaltung
Gruppenkeim
Baumechanik
Extrempunkt
Synchronisierung
Raum-Zeit
Kernel <Informatik>
Videokonferenz
Übergang
Internetworking
Fahne <Mathematik>
Meter
Computerforensik
Public-domain-Software
Nichtlinearer Operator
Shape <Informatik>
Systemidentifikation
Ähnlichkeitsgeometrie
Quellcode
Kontextbezogenes System
Dialekt
Ereignishorizont
Algorithmische Programmiersprache
Kollaboration <Informatik>
Datenfeld
Forcing
Automatische Indexierung
Rechter Winkel
Projektive Ebene
URL
Ordnung <Mathematik>
Programmierumgebung
Explosion <Stochastik>
Varietät <Mathematik>
Aggregatzustand
Subtraktion
Web Site
Stab
Interaktives Fernsehen
Kombinatorische Gruppentheorie
Code
Informationsmodellierung
Software
Endogene Variable
Maßerweiterung
Optimierung
Softwareentwickler
Bildgebendes Verfahren
Minkowski-Metrik
Schreib-Lese-Kopf
Videospiel
Ontologie <Wissensverarbeitung>
Zehn
Open Source
Relativitätstheorie
Kanalkapazität
Quick-Sort
Modallogik
Echtzeitsystem
Mereologie
Serielle Schnittstelle
Computerarchitektur
Hypermedia
Systemprogrammierung
Medianwert

Metadaten

Formale Metadaten

Titel Forensic Architecture
Untertitel Forensic Architecture is an independent research agency that undertakes historical and theoretical examinations of the history and present in articulating notions of public truth.
Serientitel 34th Chaos Communication Congress
Autor Weizman, Eyal
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34913
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract In recent years, the group Forensic Architecture began using novel research methods to undertake a series of investigations into human rights abuses. The group uses architecture as an optical device to investigate armed conflicts and environmental destruction, as well as to cross-reference a variety of evidence sources, such as new media, remote sensing, material analysis, witness testimony, and crowd-sourcing. In this talk, Eyal Weizman provides, for the first time, an in-depth introduction to the history, practice, assumptions, potentials, and double binds of this practice.
Schlagwörter Art & Culture

Zugehöriges Material

Folgende Ressource ist Begleitmaterial zum Video
Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback