Institute for Applied Autonomy

Last updated

The Institute for Applied Autonomy was an activist group of anonymous artists known for employing technology in protest. The group focused on dissemination of knowledge, autonomy, and methods of self-determination through artistic expression and application of military-like technology to the topics of Criminal Mischief, decentralized systems and individual autonomy. [1]

Contents

History

The Institute for Applied Autonomy was founded in 1998 as an informal research collective around the central theme of contestational robotics. [2] [3] [4]

Its Mission statement was to "study the forces and structures which affect self-determination and to provide technologies which extend the autonomy of human activists." [5]

Projects

One of its better known initiatives was i-See, a decentralized CCTV map distribution software containing user-generated data including positioning of surveillance cameras in New York City, as well as several other international city centers, in protest of privacy violations on the general public. [6] [7]

In 2003 they took part in the Cartographic Congress organised by the University of Openess in London [8]

Their project TXTMob, a registration system for cell phones to allow protest groups rapid, anonymous communication, [9] was used during the 2004 Republican National Convention. [10] TXTMob allowed users to subscribe to groups of like-minded persons via a web interface. Once subscribed, messages sent to the group would be passed from the web to the group members' cell phones. [11] In February 2008, the New York City Law Department issued a subpoena directed to the programmer of TXTMob, asking him to reveal users of the service and contents of messages sent during the convention. [12]

Other IAA projects included the Graffiti writer and Terminal air.

All IAA artwork has been copylefted, with permission for use as long as it is attributed.[ citation needed ]

Related Research Articles

Decentralization or decentralisation is the process by which the activities of an organization, particularly those regarding planning and decision making, are distributed or delegated away from a central, authoritative location or group.

Closed-circuit television Use of video cameras to transmit a signal to a specific place on a limited set of monitors

Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point (P2P), point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

Surveillance Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Smart mob Digital-communication coordinated group

A smart mob is a group whose coordination and communication abilities have been empowered by digital communication technologies. Smart mobs are particularly known for their ability to mobilize quickly.

Mass surveillance Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA and the FBI, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.

Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probably safe to say that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues, and the sheer volume of communication serve to limit surveillance.

Decentralized computing is the allocation of resources, both hardware and software, to each individual workstation, or office location. In contrast, centralized computing exists when the majority of functions are carried out, or obtained from a remote centralized location. Decentralized computing is a trend in modern-day business environments. This is the opposite of centralized computing, which was prevalent during the early days of computers. A decentralized computer system has many benefits over a conventional centralized network. Desktop computers have advanced so rapidly, that their potential performance far exceeds the requirements of most business applications. This results in most desktop computers remaining idle. A decentralized system can use the potential of these systems to maximize efficiency. However, it is debatable whether these networks increase overall effectiveness.

TXTmob is a service, similar to electronic mailing lists and predecessor to Twitter, that lets users share mobile phone SMS text messages with both friends and total strangers. Users can sign up to send and receive messages to and from various groups, which are organized around a range of different topics.

Anonymous (hacker group) Hacktivist group

Anonymous is a decentralized international activist/hacktivist collective and movement widely known for its various cyberattacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.

Internet censorship circumvention is the use of various methods and tools to bypass internet censorship.

Fight for the Future is a nonprofit advocacy group in the area of digital rights founded in 2011. The group aims to promote causes related to copyright legislation, as well as online privacy and censorship through the use of the Internet.

Mass surveillance in the United States Overview of mass surveillance in the United States of America

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

Mass surveillance in China Network of monitoring systems used by the Chinese government

Mass surveillance in China is the network of monitoring systems used by the Chinese government to monitor Chinese citizens. It is primarily conducted through the government, although non-publicized corporate surveillance in connection with the Chinese government has been speculated to occur. China monitors its citizens through Internet, camera as well as through other digital technologies. It has become increasingly widespread under General Secretary of the Chinese Communist Party Xi Jinping's administration.

The Calyx Institute is a New York based nonprofit formed to make privacy and digital security more accessible. The organization is a 501(c)(3) research and education nonprofit organization founded in 2010 by Nicholas Merrill, Micah Anderson and Kobi Snitz.

Riseup

Riseup is a volunteer-run collective providing secure email, email lists, a VPN service, online chat, and other online services. This organization was launched by activists in Seattle with borrowed equipment and a few users in 1999 or 2000, and quickly grew to millions of accounts.

NSO Group Israeli technology firm

NSO Group Technologies is an Israeli technology firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones. It was founded in 2010 by Niv Karmi, Omri Lavie, and Shalev Hulio. It employed almost 500 people as of 2017, and is based in Herzliya, near Tel Aviv, Israel.

Police surveillance in New York City

The New York City Police Department (NYPD) actively monitors public activity in New York City, New York, United States. Historically, surveillance has been used by the NYPD for a range of purposes, including against crime, counter-terrorism, and also for nefarious or controversial subjects such as monitoring political demonstrations, activities, and protests, and even entire ethnic and religious groups.

References

  1. Cvar, Stacey Recht. (February 9, 2005) The Art of Sedition Archived 2007-08-05 at the Wayback Machine Cincinnati City Beat. Accessed December 14, 2007.
  2. "Interview with the Institute for Applied Autonomy". 27 June 2007.
  3. Leah Lievrouw (6 May 2013). Alternative and Activist New Media. John Wiley & Sons. pp. 48–. ISBN   978-0-7456-5833-9.
  4. Critical Art Ensemble (1 July 2001). Digital resistance: explorations in tactical media. Autonomedia. ISBN   9781570271199.
  5. Denecke, Mathias; Ganzert, Anne; Otto, Isabell; Stock, Robert, eds. (1 February 2016). ReClaiming Participation: Technology - Mediation - Collectivity. transcript Verlag. pp. 272–. ISBN   978-3-8394-2922-8.
  6. Pentland, William. (November 16, 2007) Insecurity Cameras The Nation . Accessed December 14, 2007.
  7. Palmer, Brian (May 3, 2010). "Big Apple Is Watching You: How many surveillance cameras are there in Manhattan". Slate . Retrieved 2017-10-08.
  8. "Minima Cartographia or the Patient Becomes the Agent". 16 July 2003.
  9. Di Justo, Patrick. (September 9, 2004). Protests powered by cellphone The New York Times . Accessed December 14, 2007.
  10. Matt Ratto; Megan Boler (7 February 2014). DIY Citizenship: Critical Making and Social Media. MIT Press. pp. 58–. ISBN   978-0-262-52552-7.
  11. Tapio Häyhtiö (2008). Net Working/Networking: Citizen Initiated Internet Politics. University of Tampere. pp. 94–. ISBN   978-951-44-7464-4.
  12. Moynihan, Colin. (March 30, 2008). City Subpoenas Creator of Text Messaging Code The New York Times . Accessed April 9, 2008.