extended study sketchbook
DESCRIPTION
ÂTRANSCRIPT
-Problem: looking back at the last 4 months of your work, what hasn’t gone well and how will you look to resolve it?
• Ivereallystruggledtopindownwhatiwanttodolastsummester.Ivehadafewideasfloatingaboutbutnothingthatreallysolidandexciting.Theideasihavehadhavelackedsomerelevance.Forexam-ple,IneedtomakesureiamCommunicatingsomethingthroughallofmywork.Notsurethatartisticendeavours are enough alone.
• Ineedtositdownwithmultiplepeopleandhaveadiscussionaboutmyworkandhopethatthissparkssomepromisingideasoff.Ifimnotfeelingit,somethingdrasticneedstohappen.Imapprehensivetorehaulthewholeprojectbuttomeitsgettingmoreandmorelikely
-Question:Basedonyourworksofar,whatisanewquestion(orlineofenquiry)tohelpyoutodeepenyour understanding of your topic?
• Howisspaceallocatedforadvertisingthroughoutbristol.Howdoworksofstreetartgetcommisionedand allowed, and how much of bristols street art is technically illegal.
-Outcome:anoutcomeyouwillproducefornextMonday(couldbeoneposter,spreadsforthestartofanewpublication,smallgif,etc.-Opposite
Schedule here
Presentsasortofconflictofinterest,isthisanadvertfromthecompanyoristhisanadvertagainstit.Itcan be considered as both depending on how an audience reacts.
https://vimeo.com/153406984
Iwentaroundthecitycentrehandingoutfliersasanexperiementintograbbingattention.ThemethodseemedinnefectiveatpromotingactionasIonlygotafewresponses,howeverIdidlearnhoweasyitisto
getpeopletotakeaflierfromyou,whilstsomepeoplejuststraightoutignoreyou.
History of telecommunication - Wiki.
The history of telecommunication - the transmission of signals over a distance for the purpose of communi-cation - began thousands of years ago with the use of smoke signals and drums in Africa, America and parts of Asia. In the 1790s the first fixed semaphore systems emerged in Europe however it was not until the 1830s that electrical [telecommunication] systems started to appear.
Timeline of communication tools, 2014 update..jpgDistance telecommunications[edit]Visual, auditory and ancillary methods (non-electrical):
Prehistoric: Fires, Beacons, Smoke signals, Communication drums, Horns6th century BCE: Mail5th century BCE: Pigeon post4th century BCE: Hydraulic semaphores15th century CE: Maritime flag semaphores1672: First experimental acoustic (mechanical) telephone1790: Semaphore lines (optical telegraphs)1867: Signal lamps1877: Acoustic phonograph
Basic electrical signals:
1838: Electrical telegraph. See: Telegraph history1858: First trans-Atlantic telegraph cable1876: Telephone. See: Invention of the telephone, History of the telephone, Timeline of the telephone1880: Telephony via lightbeam photophones
Advanced electrical and electronic signals:
1893: Wireless telegraphy1896: Radio. See: History of radio.1914: First North American transcontinental telephone calling1927: Television. See: History of television1927: First commercial radio-telephone service, U.K.–U.S.1930: First experimental videophones1934: First commercial radio-telephone service, U.S.–Japan1936: World’s first public videophone network1946: Limited capacity Mobile Telephone Service for automobiles1956: Transatlantic telephone cable1962: Commercial telecommunications satellite1964: Fiber optical telecommunications1965: First North American public videophone network1969: Computer networking1973: First modern-era mobile (cellular) phone1979: INMARSAT ship-to-shore satellite communications1981: First mobile (cellular) phone network1982: SMTP email1983: Internet. See: History of Internet1998: Mobile satellite hand-held phones2003: VoIP Internet Telephony2013: Google Glass
PublicPostrider(Mailbyhorse)~1700YA FirstprintingPress~480YA(1520AD)
Morsecodeandthefirstlongdistanceelectrictelegraphline~160YAFirstTelephones~120YARadio~100YA Firstpublicvideophonenetwork-80YA1936 DigitalBillboards~40YA FirstMobileNetwork~35YA TheInternet-33YAVoiceoverIP-12YA WithAndroidandIOSSmarthphonesbecomewidspread-8YA Googleglassexperimentalphase-3YASmartphoneswillcontinuetodiversify.Builtinprojectors Augmentedreality3Dscreens 3DPrinterswillbecomecommonplace, prodcuts will be printed at home, instead of delivered PaperthinandflexiblescreensVideo conferencing that negates the need to point the phone InstantaneousTranslation-languagebarrierscoulddissapearTactileultrasounddevices-allowyoutofeelthingsthatarentthreIntegrated Computers - computer screens implanted into the eyes?Braintocomputerinterfacesmayallowtransmitionofinformation ThiscouldleadtoElectronictelepathyOrconnectionwitha“SimulatedReality”or“DigitalExistence”
SmokeSignals+Drums-Prehistoric Symbolicimagery(CavePaintings)~32,000YAPetroglyphs(RockCarvings)~12,000YA Ideograms(AbstractSymbolism)~7000YAMiddleEasternCuneiform+BeginingsofChinese~5000YAFirstformalnonpublicPostService(Eygptian)~4400YACunieformbeganrepresentingsyllablesofspokenlanguage~4000YAPhoenecianAlphabetevolvedfromHeiroglyphs~3000YAGreekAlphabet~2600YA CarrierPidgeon~2000YA
PAST
pRESENT
Future
Spoken language is thought to have evolved ~200,000 - 500,000 years ago
A H O V
A
EL
EO
NO
RA
E
GR
AP
HI
C
CI
PH
ER
B I P W
C J Q X
D K R Y
E L S Z
F M T
G N U
Su
rvei
llan
ce t
ech
no
logi
es h
ave
dan
gero
usl
y o
utp
aced
dem
ocr
atic
res
trai
nts
, mea
nin
g pr
ivac
y is
no
lon
ger
a h
um
an r
igh
t de facto.
Wo
rldw
ide
surv
eilla
nce
sile
ntl
y r
e-en
gin
eers
th
e ba
lan
ce o
f po
wer
in
soci
ety,
po
ten
tial
ly le
avin
g th
e po
pula
tio
n d
efen
cele
ss. E
very
on
e is
wat
ched
, par
ticu
larl
y th
rou
gh d
igit
al
mea
ns,
an
d th
e in
form
atio
n t
hat
is r
etri
eved
is
sto
red
for
inde
fin
ite
peri
ods
. Rea
dy t
o b
e lo
ok
ed
ove
r an
d sc
ruti
niz
ed. N
ot
on
ly d
o t
he
gove
rnm
ents
of
man
y de
velo
ped
cou
ntr
y’s
hav
e ac
cess
to
sh
ared
in
tern
atio
nal
dat
abas
es o
f pe
rso
nal
dat
a, b
ut
that
da
ta is
vu
lner
able
to
th
eft
fro
m h
ack
ers
and
cri
min
als
that
hav
e m
ade
a £
66
billi
on
in
dust
ry o
ut
of
iden
tity
fra
ud.
So
we
mu
st d
evel
op
and
lear
n a
bou
t n
ew
met
ho
ds o
f co
mm
un
icat
ing
secu
rely
an
d to
fu
lly u
nde
rsta
nd
the
impl
icat
ion
s o
f re
leas
ing
ou
r da
ta f
reel
y. T
he
ciph
er
sym
boliz
es t
his
nee
d by
em
plo
yin
g a
mat
eria
l pro
cess
, u
nto
uch
able
to
dig
ital
bu
lk c
olle
ctio
n. U
nfa
mili
ar le
tter
fo
rms
mak
e u
p an
en
cryp
tio
n c
ode
cre
atin
g a
basi
s fo
r th
e po
ssib
ility
of
secu
re c
om
mu
nic
atio
n.
Sim
ult
aneo
usl
y, t
he
prim
itiv
e n
atu
re o
f th
e ci
pher
illu
stra
tes
the
deve
lopm
enta
l dis
pari
ty b
etw
een
th
e pu
blic
co
nce
rn f
or
priv
acy
and
the
rise
of
inte
rnat
ion
al s
urv
eilla
nce
ope
rati
on
s.
PRESENTATION PREP 07/03/2015
FINISHED OUTCOMES: FLIER VIDEO How? Recorded myself Handing out promotional fliers with a call to action Why? Looking at the level of response you get from public interaction compared to oan onlince audience. WEBSITE-How? I Learned how to use photoshop and dreamweaver to create a basic static website and learned how to publish it.Why? Providing a place to communicate myself as a designer and reach an online audience. important to have a go too link for people to access and get a basic idea of you FUTURE OF COMMUNICATION POSTERS How? I illustrated the hypothetical appearance of poential future technologies and how they might be used Why? As a reminder of the things future technologys could bring us, and the fantastic possibilitys that may await. STAMPS + GRAPHIC CYPHER + CODEX POSTERS + FONT How? After scribbling acros a page, i turned some of the shapes into alien/oriental looking letterforms, I then turned these into a font using fontstruct but was much mor e impressed with the rustic style that rubber stamp lettering provides. I used the symbols to create posters that comment on communication privacy in todays world Why? The symbols represent encryption and code, they are used to discuss privacy in my posters but could also be used to communicate any message providing the cipher is made available.
OUTCOMES IN PROGRESS: COLLAGES + MIRRORHow? Using digital and traditional techniques to artwork collagesWhy? similar to my future of communication posters, but they deal with the moral implications of advancing technology ICAN How? I Set up a network of string cans and attempted the creation of a sort of handset, unfortunaely i couldnt get the handset to work too wellWhy? Looking back at historical forms of communication i thought it would be interesting to “modernize” the concept and create a working model branded to seem contemporarty in origin
GOOGLE PRIVACY CONCERNS Google’s March 1, 2012 privacy change enables the company to share data across a wide variety of services.[1] This includes embedded services in millions of third-party websites using Adsense and Analytics. The policy was widely criticized as creating an environment that discourages Inter-net innovation by making Internet users more fearful online.[2] Google’s CEO Eric Schmidt declared: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place. If you really need that kind of privacy, the reality is that search engines—including Google—do retain this information for some time and it’s important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities On 27 March 2015, the Court of Appeal ruled that British consumers have the right to sue Google in the UK for misuse of private information In April 2011, Google was criticized for not signing onto the Do Not Track feature for Chrome that is being incorporated in most other modern web browsers
FACEBOOK PRIVACY CONCERNSIn 2015, it was reported that a growing number of Facebook users are being wrongfully and inex-plicably suspended from their accounts by Facebook to give up copies of their private identification information. If such information is not given up, users suffer permanent restriction from their ac-counts with no alternative way of retrieving them back. The private identification being summoned by the website from its users include copies of their driver’s license, state-issued ID cards, pass-ports, military cards, photo IDs, etc. anyone could get access to information saved to a Facebook profile, even if the information was not intended to be made public.[4] A “connection” is created when a user clicks a “Like” button for a product or service, either on Facebook itself or an external site. Facebook treats such relationships as public information, and the user’s identity may be displayed on the Facebook page of the prod-uct or service
Instant Personalization was a pilot program which shared Facebook account information with affiliated sites, such as sharing a user’s list of “liked” bands with a music website, so that when the user visits the site, their preferred music plays automatically In August 2007, the code used to generate Facebook’s home and search page as visitors browse the site was accidentally made public.[6][7] A configuration problem on a Facebook server caused the PHP code to be displayed instead of the web page the code should have created, raising concerns about how secure private data on the site was. A visitor to the site copied, published and later removed the code from his web forum, claiming he had been served and threatened with legal notice by Facebook Facebook developed new privacy features to give users some control over information about them that was broadcast by the News Feed.[16] According to subsequent news articles,
IMSI CATCHER AWARE Department of Justice has been working with local police departments across the country to squelch public-records requests on controversial cell-phone surveillance technology. The Wireless Telegraphy Act 2006 section 48 makes it a summary offence for a person to use wireless telegraphy apparatus with intent to obtain or disclose information as to the contents of a message without authorization. See Stones 8.30112P.
The prosecution must prove use, which imputes some form of utilization or employment of the apparatus over and above mere possession. Evidence of switching on or tuning to unauthorized frequencies assists in proving use.
ANALOGUE PRIVACY “It is that the government believes as a matter of principle that every innocent act of communication online must leave a trace for future possible interrogation by the state. No other country in the world feels the need to do this apart from Russia.” The best way to take control over a people and control them utterly is to take a little of their free-dom at a time, to erode rights by a thousand tiny and almost imperceptible reductions. In this way, the people will not see those rights and freedoms being removed until past the point at which these
changes cannot be reversed. The Investigatory powers bill aims to provide a lawful basis for every individuals digital communica-tions, data, and locations history to be saved by the government for possible interogration at a later date. Of course, they have already been doing this. Illegally. This is the digital age. So dont let your privacy become obsolete, just because analogue is.
society is moving towards a state of mass surveillance with severely limited personal, social, politi-cal freedoms, where dissenting individuals or groups will be strategically purged
www.amnesty.org.uk/issues/Mass-surveillance
When all your datawas kept on paperonly you had access.It’s no longer physical.but copied in digital.By the leaders,surveilling the masses.surveilling the masses.private data should not become obsolete just because technology is developing. Beware of the investgatory powers bill. It is violating your human right to privacy.
“STRING AND CAN IS UNTRACEABLE.BIN THE PHONE.”
In the UK there are 653 Government bodies that are able to use sophisticated techniques to highlight individuals of interest and intercept their personal phone calls. This could include targeting fly tippers, drug dealers and other criminal activity but often results in innocent people being bugged because of flaws in the administration.
The Governments of the UK, USA, CAN, NZ, and AUS spy on each other and gather private information from each others citizens. By sharing this information between them they sidestep domestic surveillance laws. So not only is our government eavesdropping on innocent phone calls. So is the rest of the world...
But should you stop using connected technology just to protect your privacy? You could start using a String and Can to communicate with people. But why should you change your behaviour because Intelligence agency’s are doing the wrong thing? Learn more about surveillance. Learn to...
You email a cheeky snap to your lover. It ends up stored on a server in a datacentre. That could be in the UK, but your photo is moved across data centres anyway and those data centres could be located anywhere on earth.
The Governments of the UK, USA, CAN, NZ, and AUS spy on foreign servers and gather private informationfrom each others citizens. By sharing this information between each other they sidestep domestic surveillance laws. So not only does our government have a copy of your picture. So does the rest of the world...
But should you stop using connected technology just to protect your privacy? You could switch back to using Polaroids and store them under lock and key. But why should you change your behaviour because Intelligence agency’s are doing the wrong thing? Learn more about surveillance. Learn to...
“USE A POLAROID. AND OUTSMART SURVEILLANCE.”
RECLAIM YOUR PRIVACY
CCTVSURVEILLANCE
NETWORKSVERSION 1.1 DATX2-52S16 JMD1993
PRINT ON YELLOW. AFIX TO BACKBONE (ALSO YELLOW) SLIDE OVER NETS AND PAGES
CCTVA CRIME
DETERRENTClosed-circuit television is at the frontier of private security solutions and has proliferated through our society creating a $£17 billion market. Its shown to be effective at deterring some forms of criminal activity, with one study showing a 51 percent reduction in crime related to theft. As CCTV has found its way into western culture, the atmosphere in public spaces has changed. Although many us have grown to be familiar with CCTV, There is still a distinctly unwelcome anxiety that is felt when in its presence. This feeling can easily develop into fear when someone is aware they are up to no good, and is the reason why CCTV work so well. The fear alone of being caught or identified is enough to cut theft by half and deter other crime by a small but statistically significant amount. Some systems can be monitored live, but in most cases, recordings are played back to identify crime that already happened. Meaning, the most effective way of using a CCTV system as a crime deterrent is to make it clearly noticeable. Whist remaining obscure enough to sustain the illusion of being watched from uncertain direction
FIX
IN
SID
E C
AM
ER
A
CA
ME
RA
HO
US
ING
LEN
SE
LENSE
PO
LE -
PLA
CE
TH
RO
UG
H H
OLE
S I
N C
AM
ER
A A
ND
BR
AC
KE
T
CU
T IN
SID
E S
OLI
D L
INE
S
AN
D O
UTS
IDE
SH
AP
ES
PR
E F
OLD
DA
SH
ED
LIN
ES
IN
WA
RD
A
SS
EM
BLE
NE
TS A
ND
GLU
E T
AB
S
US
ING
TH
E P
OLE
FIX
CA
ME
RA
TO
BR
AC
KE
T
WIR
E H
OLE
S F
OR
AD
DE
D R
EA
LIS
M
DO
TS A
RE
GU
IDE
S
DU
PLI
CA
TE N
ETS
TA
KE
AD
VA
NTA
GE
OF
TH
E P
ER
CE
PTI
ON
S
SU
RR
OU
ND
ING
SU
RV
EIL
LAN
CE
JAM
IE D
RU
MM
ON
D 2
016
NO
T F
OR
CO
MM
ER
CIA
L U
SE
RO
LL T
HIS
WA
Y >
BO
TTOM
AX
LE - A
TTAC
H TO
BR
AC
KE
T
BR
AC
KE
T - ATTA
CH
TO W
ALL
TUCK UNDER
OV
ER
UN
DE
R
TOP
AX
LE - A
TTAC
H TO
CA
ME
RA