extended study sketchbook

69
Extended Study Sketchbook Summester 2 Jamie Drummond

Upload: jamie-drummond

Post on 29-Jul-2016

225 views

Category:

Documents


5 download

DESCRIPTION

 

TRANSCRIPT

Extended Study Sketchbook Summester 2

Jamie Drummond

-Problem: looking back at the last 4 months of your work, what hasn’t gone well and how will you look to resolve it?

• Ivereallystruggledtopindownwhatiwanttodolastsummester.Ivehadafewideasfloatingaboutbutnothingthatreallysolidandexciting.Theideasihavehadhavelackedsomerelevance.Forexam-ple,IneedtomakesureiamCommunicatingsomethingthroughallofmywork.Notsurethatartisticendeavours are enough alone.

• Ineedtositdownwithmultiplepeopleandhaveadiscussionaboutmyworkandhopethatthissparkssomepromisingideasoff.Ifimnotfeelingit,somethingdrasticneedstohappen.Imapprehensivetorehaulthewholeprojectbuttomeitsgettingmoreandmorelikely

-Question:Basedonyourworksofar,whatisanewquestion(orlineofenquiry)tohelpyoutodeepenyour understanding of your topic?

• Howisspaceallocatedforadvertisingthroughoutbristol.Howdoworksofstreetartgetcommisionedand allowed, and how much of bristols street art is technically illegal.

-Outcome:anoutcomeyouwillproducefornextMonday(couldbeoneposter,spreadsforthestartofanewpublication,smallgif,etc.-Opposite

Schedule here

Presentsasortofconflictofinterest,isthisanadvertfromthecompanyoristhisanadvertagainstit.Itcan be considered as both depending on how an audience reacts.

https://vimeo.com/153406984

Iwentaroundthecitycentrehandingoutfliersasanexperiementintograbbingattention.ThemethodseemedinnefectiveatpromotingactionasIonlygotafewresponses,howeverIdidlearnhoweasyitisto

getpeopletotakeaflierfromyou,whilstsomepeoplejuststraightoutignoreyou.

Unfortunatelytheseresponseswerenotintiatedbyhandingoutthefliersbutratherusinganonlineadvert.

History of telecommunication - Wiki.

The history of telecommunication - the transmission of signals over a distance for the purpose of communi-cation - began thousands of years ago with the use of smoke signals and drums in Africa, America and parts of Asia. In the 1790s the first fixed semaphore systems emerged in Europe however it was not until the 1830s that electrical [telecommunication] systems started to appear.

Timeline of communication tools, 2014 update..jpgDistance telecommunications[edit]Visual, auditory and ancillary methods (non-electrical):

Prehistoric: Fires, Beacons, Smoke signals, Communication drums, Horns6th century BCE: Mail5th century BCE: Pigeon post4th century BCE: Hydraulic semaphores15th century CE: Maritime flag semaphores1672: First experimental acoustic (mechanical) telephone1790: Semaphore lines (optical telegraphs)1867: Signal lamps1877: Acoustic phonograph

Basic electrical signals:

1838: Electrical telegraph. See: Telegraph history1858: First trans-Atlantic telegraph cable1876: Telephone. See: Invention of the telephone, History of the telephone, Timeline of the telephone1880: Telephony via lightbeam photophones

Advanced electrical and electronic signals:

1893: Wireless telegraphy1896: Radio. See: History of radio.1914: First North American transcontinental telephone calling1927: Television. See: History of television1927: First commercial radio-telephone service, U.K.–U.S.1930: First experimental videophones1934: First commercial radio-telephone service, U.S.–Japan1936: World’s first public videophone network1946: Limited capacity Mobile Telephone Service for automobiles1956: Transatlantic telephone cable1962: Commercial telecommunications satellite1964: Fiber optical telecommunications1965: First North American public videophone network1969: Computer networking1973: First modern-era mobile (cellular) phone1979: INMARSAT ship-to-shore satellite communications1981: First mobile (cellular) phone network1982: SMTP email1983: Internet. See: History of Internet1998: Mobile satellite hand-held phones2003: VoIP Internet Telephony2013: Google Glass

PublicPostrider(Mailbyhorse)~1700YA FirstprintingPress~480YA(1520AD)

Morsecodeandthefirstlongdistanceelectrictelegraphline~160YAFirstTelephones~120YARadio~100YA Firstpublicvideophonenetwork-80YA1936 DigitalBillboards~40YA FirstMobileNetwork~35YA TheInternet-33YAVoiceoverIP-12YA WithAndroidandIOSSmarthphonesbecomewidspread-8YA Googleglassexperimentalphase-3YASmartphoneswillcontinuetodiversify.Builtinprojectors Augmentedreality3Dscreens 3DPrinterswillbecomecommonplace, prodcuts will be printed at home, instead of delivered PaperthinandflexiblescreensVideo conferencing that negates the need to point the phone InstantaneousTranslation-languagebarrierscoulddissapearTactileultrasounddevices-allowyoutofeelthingsthatarentthreIntegrated Computers - computer screens implanted into the eyes?Braintocomputerinterfacesmayallowtransmitionofinformation ThiscouldleadtoElectronictelepathyOrconnectionwitha“SimulatedReality”or“DigitalExistence”

SmokeSignals+Drums-Prehistoric Symbolicimagery(CavePaintings)~32,000YAPetroglyphs(RockCarvings)~12,000YA Ideograms(AbstractSymbolism)~7000YAMiddleEasternCuneiform+BeginingsofChinese~5000YAFirstformalnonpublicPostService(Eygptian)~4400YACunieformbeganrepresentingsyllablesofspokenlanguage~4000YAPhoenecianAlphabetevolvedfromHeiroglyphs~3000YAGreekAlphabet~2600YA CarrierPidgeon~2000YA

PAST

pRESENT

Future

Spoken language is thought to have evolved ~200,000 - 500,000 years ago

https://vimeo.com/156962648 - animation test

what if tech becomes aware?

what if technology becomes aware?

technological evolution will render our future innovations

unrecognizable to the people of today

http://fontstruct.com/fontstructions/show/1246221/aeleonorae

COMPLIMENTARy

a b c de f g hi j k lm n o pq r s t t u v wxx t z ?

TheQuick

Brown FoxJumpsOverTheLazyLazyDog

@

,

A H O V

A

EL

EO

NO

RA

E

GR

AP

HI

C

CI

PH

ER

B I P W

C J Q X

D K R Y

E L S Z

F M T

G N U

Su

rvei

llan

ce t

ech

no

logi

es h

ave

dan

gero

usl

y o

utp

aced

dem

ocr

atic

res

trai

nts

, mea

nin

g pr

ivac

y is

no

lon

ger

a h

um

an r

igh

t de facto.

Wo

rldw

ide

surv

eilla

nce

sile

ntl

y r

e-en

gin

eers

th

e ba

lan

ce o

f po

wer

in

soci

ety,

po

ten

tial

ly le

avin

g th

e po

pula

tio

n d

efen

cele

ss. E

very

on

e is

wat

ched

, par

ticu

larl

y th

rou

gh d

igit

al

mea

ns,

an

d th

e in

form

atio

n t

hat

is r

etri

eved

is

sto

red

for

inde

fin

ite

peri

ods

. Rea

dy t

o b

e lo

ok

ed

ove

r an

d sc

ruti

niz

ed. N

ot

on

ly d

o t

he

gove

rnm

ents

of

man

y de

velo

ped

cou

ntr

y’s

hav

e ac

cess

to

sh

ared

in

tern

atio

nal

dat

abas

es o

f pe

rso

nal

dat

a, b

ut

that

da

ta is

vu

lner

able

to

th

eft

fro

m h

ack

ers

and

cri

min

als

that

hav

e m

ade

a £

66

billi

on

in

dust

ry o

ut

of

iden

tity

fra

ud.

So

we

mu

st d

evel

op

and

lear

n a

bou

t n

ew

met

ho

ds o

f co

mm

un

icat

ing

secu

rely

an

d to

fu

lly u

nde

rsta

nd

the

impl

icat

ion

s o

f re

leas

ing

ou

r da

ta f

reel

y. T

he

ciph

er

sym

boliz

es t

his

nee

d by

em

plo

yin

g a

mat

eria

l pro

cess

, u

nto

uch

able

to

dig

ital

bu

lk c

olle

ctio

n. U

nfa

mili

ar le

tter

fo

rms

mak

e u

p an

en

cryp

tio

n c

ode

cre

atin

g a

basi

s fo

r th

e po

ssib

ility

of

secu

re c

om

mu

nic

atio

n.

Sim

ult

aneo

usl

y, t

he

prim

itiv

e n

atu

re o

f th

e ci

pher

illu

stra

tes

the

deve

lopm

enta

l dis

pari

ty b

etw

een

th

e pu

blic

co

nce

rn f

or

priv

acy

and

the

rise

of

inte

rnat

ion

al s

urv

eilla

nce

ope

rati

on

s.

PRESENTATION PREP 07/03/2015

FINISHED OUTCOMES: FLIER VIDEO How? Recorded myself Handing out promotional fliers with a call to action Why? Looking at the level of response you get from public interaction compared to oan onlince audience. WEBSITE-How? I Learned how to use photoshop and dreamweaver to create a basic static website and learned how to publish it.Why? Providing a place to communicate myself as a designer and reach an online audience. important to have a go too link for people to access and get a basic idea of you FUTURE OF COMMUNICATION POSTERS How? I illustrated the hypothetical appearance of poential future technologies and how they might be used Why? As a reminder of the things future technologys could bring us, and the fantastic possibilitys that may await. STAMPS + GRAPHIC CYPHER + CODEX POSTERS + FONT How? After scribbling acros a page, i turned some of the shapes into alien/oriental looking letterforms, I then turned these into a font using fontstruct but was much mor e impressed with the rustic style that rubber stamp lettering provides. I used the symbols to create posters that comment on communication privacy in todays world Why? The symbols represent encryption and code, they are used to discuss privacy in my posters but could also be used to communicate any message providing the cipher is made available.

OUTCOMES IN PROGRESS: COLLAGES + MIRRORHow? Using digital and traditional techniques to artwork collagesWhy? similar to my future of communication posters, but they deal with the moral implications of advancing technology ICAN How? I Set up a network of string cans and attempted the creation of a sort of handset, unfortunaely i couldnt get the handset to work too wellWhy? Looking back at historical forms of communication i thought it would be interesting to “modernize” the concept and create a working model branded to seem contemporarty in origin

Cam

era

Cam

era Hood

lense

http://library.college.police.uk/docs/what-works/What-works-briefing-effects-of-CCTV-2013.pdf

GOOGLE PRIVACY CONCERNS Google’s March 1, 2012 privacy change enables the company to share data across a wide variety of services.[1] This includes embedded services in millions of third-party websites using Adsense and Analytics. The policy was widely criticized as creating an environment that discourages Inter-net innovation by making Internet users more fearful online.[2] Google’s CEO Eric Schmidt declared: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place. If you really need that kind of privacy, the reality is that search engines—including Google—do retain this information for some time and it’s important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities On 27 March 2015, the Court of Appeal ruled that British consumers have the right to sue Google in the UK for misuse of private information In April 2011, Google was criticized for not signing onto the Do Not Track feature for Chrome that is being incorporated in most other modern web browsers

FACEBOOK PRIVACY CONCERNSIn 2015, it was reported that a growing number of Facebook users are being wrongfully and inex-plicably suspended from their accounts by Facebook to give up copies of their private identification information. If such information is not given up, users suffer permanent restriction from their ac-counts with no alternative way of retrieving them back. The private identification being summoned by the website from its users include copies of their driver’s license, state-issued ID cards, pass-ports, military cards, photo IDs, etc. anyone could get access to information saved to a Facebook profile, even if the information was not intended to be made public.[4] A “connection” is created when a user clicks a “Like” button for a product or service, either on Facebook itself or an external site. Facebook treats such relationships as public information, and the user’s identity may be displayed on the Facebook page of the prod-uct or service

Instant Personalization was a pilot program which shared Facebook account information with affiliated sites, such as sharing a user’s list of “liked” bands with a music website, so that when the user visits the site, their preferred music plays automatically In August 2007, the code used to generate Facebook’s home and search page as visitors browse the site was accidentally made public.[6][7] A configuration problem on a Facebook server caused the PHP code to be displayed instead of the web page the code should have created, raising concerns about how secure private data on the site was. A visitor to the site copied, published and later removed the code from his web forum, claiming he had been served and threatened with legal notice by Facebook Facebook developed new privacy features to give users some control over information about them that was broadcast by the News Feed.[16] According to subsequent news articles,

IMSI CATCHER AWARE Department of Justice has been working with local police departments across the country to squelch public-records requests on controversial cell-phone surveillance technology. The Wireless Telegraphy Act 2006 section 48 makes it a summary offence for a person to use wireless telegraphy apparatus with intent to obtain or disclose information as to the contents of a message without authorization. See Stones 8.30112P.

The prosecution must prove use, which imputes some form of utilization or employment of the apparatus over and above mere possession. Evidence of switching on or tuning to unauthorized frequencies assists in proving use.

ANALOGUE PRIVACY “It is that the government believes as a matter of principle that every innocent act of communication online must leave a trace for future possible interrogation by the state. No other country in the world feels the need to do this apart from Russia.” The best way to take control over a people and control them utterly is to take a little of their free-dom at a time, to erode rights by a thousand tiny and almost imperceptible reductions. In this way, the people will not see those rights and freedoms being removed until past the point at which these

changes cannot be reversed. The Investigatory powers bill aims to provide a lawful basis for every individuals digital communica-tions, data, and locations history to be saved by the government for possible interogration at a later date. Of course, they have already been doing this. Illegally. This is the digital age. So dont let your privacy become obsolete, just because analogue is.

society is moving towards a state of mass surveillance with severely limited personal, social, politi-cal freedoms, where dissenting individuals or groups will be strategically purged

www.amnesty.org.uk/issues/Mass-surveillance

When all your datawas kept on paperonly you had access.It’s no longer physical.but copied in digital.By the leaders,surveilling the masses.surveilling the masses.private data should not become obsolete just because technology is developing. Beware of the investgatory powers bill. It is violating your human right to privacy.

“STRING AND CAN IS UNTRACEABLE.BIN THE PHONE.”

In the UK there are 653 Government bodies that are able to use sophisticated techniques to highlight individuals of interest and intercept their personal phone calls. This could include targeting fly tippers, drug dealers and other criminal activity but often results in innocent people being bugged because of flaws in the administration.

The Governments of the UK, USA, CAN, NZ, and AUS spy on each other and gather private information from each others citizens. By sharing this information between them they sidestep domestic surveillance laws. So not only is our government eavesdropping on innocent phone calls. So is the rest of the world...

But should you stop using connected technology just to protect your privacy? You could start using a String and Can to communicate with people. But why should you change your behaviour because Intelligence agency’s are doing the wrong thing? Learn more about surveillance. Learn to...

You email a cheeky snap to your lover. It ends up stored on a server in a datacentre. That could be in the UK, but your photo is moved across data centres anyway and those data centres could be located anywhere on earth.

The Governments of the UK, USA, CAN, NZ, and AUS spy on foreign servers and gather private informationfrom each others citizens. By sharing this information between each other they sidestep domestic surveillance laws. So not only does our government have a copy of your picture. So does the rest of the world...

But should you stop using connected technology just to protect your privacy? You could switch back to using Polaroids and store them under lock and key. But why should you change your behaviour because Intelligence agency’s are doing the wrong thing? Learn more about surveillance. Learn to...

“USE A POLAROID. AND OUTSMART SURVEILLANCE.”

RECLAIM YOUR PRIVACY

Cam

era

Cam

era Hood

lense

CCTVSURVEILLANCE

NETWORKSVERSION 1.1 DATX2-52S16 JMD1993

PRINT ON YELLOW. AFIX TO BACKBONE (ALSO YELLOW) SLIDE OVER NETS AND PAGES

CCTVA CRIME

DETERRENTClosed-circuit television is at the frontier of private security solutions and has proliferated through our society creating a $£17 billion market. Its shown to be effective at deterring some forms of criminal activity, with one study showing a 51 percent reduction in crime related to theft. As CCTV has found its way into western culture, the atmosphere in public spaces has changed. Although many us have grown to be familiar with CCTV, There is still a distinctly unwelcome anxiety that is felt when in its presence. This feeling can easily develop into fear when someone is aware they are up to no good, and is the reason why CCTV work so well. The fear alone of being caught or identified is enough to cut theft by half and deter other crime by a small but statistically significant amount. Some systems can be monitored live, but in most cases, recordings are played back to identify crime that already happened. Meaning, the most effective way of using a CCTV system as a crime deterrent is to make it clearly noticeable. Whist remaining obscure enough to sustain the illusion of being watched from uncertain direction

FIX

IN

SID

E C

AM

ER

A

CA

ME

RA

HO

US

ING

LEN

SE

LENSE

PO

LE -

PLA

CE

TH

RO

UG

H H

OLE

S I

N C

AM

ER

A A

ND

BR

AC

KE

T

CU

T IN

SID

E S

OLI

D L

INE

S

AN

D O

UTS

IDE

SH

AP

ES

PR

E F

OLD

DA

SH

ED

LIN

ES

IN

WA

RD

A

SS

EM

BLE

NE

TS A

ND

GLU

E T

AB

S

US

ING

TH

E P

OLE

FIX

CA

ME

RA

TO

BR

AC

KE

T

WIR

E H

OLE

S F

OR

AD

DE

D R

EA

LIS

M

DO

TS A

RE

GU

IDE

S

DU

PLI

CA

TE N

ETS

TA

KE

AD

VA

NTA

GE

OF

TH

E P

ER

CE

PTI

ON

S

SU

RR

OU

ND

ING

SU

RV

EIL

LAN

CE

JAM

IE D

RU

MM

ON

D 2

016

NO

T F

OR

CO

MM

ER

CIA

L U

SE

RO

LL T

HIS

WA

Y >

BO

TTOM

AX

LE - A

TTAC

H TO

BR

AC

KE

T

BR

AC

KE

T - ATTA

CH

TO W

ALL

TUCK UNDER

OV

ER

UN

DE

R

TOP

AX

LE - A

TTAC

H TO

CA

ME

RA