Surveillance
What has happened in the lecture programme up to this point? We have identified the following: The history of the avant garde and how our current context of globalisation demands different forms of interrogation. The impact Internet technologies are having globally. Some realities and myths of globalisation and the increased governance on Internet technologies. Theoretical model - (Jurgen Habermas and Communicative Action).
In this lecture we are going to examine: Jeremy Bentham’s model of the Panopticon. The Panopticon as a context to analyse the Internet. Michel Foucault and the Panopticon.  The increased surveillance of the public space. The increased surveillance of the virtual space. Webcameras (surveillance, escapism, ‘the real’, informative, voyeuristic, economic). Examples of various creative practitioners and the strategies employed both offline and online to combat  attacks  on civil liberties and critique globalism.
Downer declares Wikipedia 'anti-government' By Steve Larkin ( news .com.au) August 24, 2007 03:41pm Article from: AAP THE online encyclopedia Wikipedia is anti-government, Foreign Affairs Minister Alexander Downer says. "My sort of recollection of Wikipedia sites is they are a bit, sort of, a bit anti-government, they are sort of a bit negative about people in the government," Mr Downer said today.  http://www.news.com.au/story/0,23599,22300570-29277,00.html#
http://www.australianit.news.com.au/story/0,24897,22317999-15306,00.html Tax gets tough on privacy Ben Woodhead |  August 28, 2007   FRAUD detection systems have uncovered a rash of privacy breaches at the Australian Taxation Office as employees flout tough data protection rules despite ongoing monitoring and training. The sweeps of data access logs led to three sackings during the 2007 financial year and another nine staff resigned after the ATO detected unauthorised access to taxpayer records.
Student cracks Government's $84m porn filter Article from: By Nick Higginbottom and Ben Packham August 26, 2007 12:30am A MELBOURNE schoolboy has cracked the Federal Government's new $84 million internet porn filter in minutes. Tom Wood, 16, said it took him just over 30 minutes to bypass the Government's filter, released on Tuesday.  Tom, a year 10 student at a southeast Melbourne private school, showed the  Herald Sun  how to deactivate the filter in a handful of clicks.  http://www.news.com.au/heraldsun/story/0,21985,22304224-662,00.html
Hackers steal data from Monster.com users Article from: Agence France-Presse August 23, 2007 12:00am HACKERS have stolen personal details of hundreds of thousands of users of US jobs website Monster.com, according to internet security firm Symantec.   A total of 1.6 million entries, including information such as names, postal addresses and telephone numbers were stolen, the firm said.   http://www.news.com.au/heraldsun/story/0,21985,22293044-11869,00.html
Hi-tech research outpaces law Bernard Lane |  August 22, 2007   RESEARCHERS riding the wave of hi-tech collaboration may leave lawyers and policymakers in their wake, commentators have warned following what is believed to be the first survey of legal issues raised by e-research. http://www.theaustralian.news.com.au/story/0,24897,22285146-12332,00.html
Uni plagiarists risk degrees Brendan O'Keefe |  August 22, 2007   THE University of New England will consider stripping students of their degrees if they are found to have cheated, following a spate of plagiarism in one of its masters programs. http://www.theaustralian.news.com.au/story/0,25197,22285283-12332,00.html
 
Menwith Hill, Photo: Duncan Campbell   http://cyberdelix.net/parvati/6929.html Echelon Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites.
http://webcam.cityofperth.wa.gov.au/
Image: courtesy University College London Library Jeremy Bentham’s  Panopticon
 
 
 
 
>>   [project proposal] - a live terror service
The panopticon project aims to widen the lens of the electronic eye on the street,  testing the boundaries and invasive nature of surveillance technologies,  questioning if privacy really can exist in the digital age.
 
http://www.efa.org.au/
 
http://www.disinfo.com/site/ http://www.notbored.org/the-scp.html Alternative news organisations and performance groups utilise online spaces and audiences.
Welcome to the Cyber Activists Network - AUSTRALIA Cyber Activism  - What is Cyber Activism?, well it's not being a Hacker or Cracker.  A Hacker  - is someone who maliciously breaks or tampers with things, … merely to disrupt and damage private property . A Cracker  - is someone who employs electronic means … with  intent to breach the security and profit or gain in some way by their actions. A Cyber Activist  -is none of these things previously mentioned. Quite simply a Cyber Activist is merely a description for the method of his/hers form of activism . Through the use of electronic media and communications, Cyber Activists attempt to be heard through e-mails, web sites, data and online communities working cohesively or independently to achieve social change.
Slapper Software , have constructed this web site to facilitate an  Online Cyber Activist's Network , which can greatly assist you in your efforts to bring about  social change . Please visit the Activist's Tools & Download Sections of this web site to learn more about how we can assist you. Internet Resources Activist’s Tools To prepare you better (Cyber Activists), we have provided information about issues such as security, personal privacy and how to automate repetitive tasks…and can greatly improve effectiveness and reduce the amount of time it takes. There are many resources used by a well prepared Cyber Activist, below is a list of these tools and how they can assist you. http://senatorslapper.netfirms.com/tools.htm
Electronic Disturbance Theatre  “ When we do a performance, our performance or our actions are considered symbolic gestures; we are trying to bring attention to a particular event or cause – we are not trying to do any criminal activity”. Conan, N. (2001).  Hacktivism.  The Connection. National Public Radio. Boston July 30.
Chapter 1. Introduction: The Virtual Condition  Chapter 2. Nomadic Power and Cultural Resistance  Chapter 3. Video and Resistance: Against Documentaries  Chapter 4. The Recombinant Theater and the  Performative  Matrix  Chapter 5. Utopian Plagiarism,  Hypertextuality , and Electronic Cultural Production   Chapter 6. Fragments on the Problem of Time   Chapter 7. Paradoxes and Contradictions   This book may be freely pirated and quoted.  The authors and publisher, however, would like to be so informed at the address below. http://www.critical-art.net/books/ted/
Barrack Square * Corner Riverside Drive and Barrack Streets * St Georges Terrace outside London Court * Corner Queen and Wellington Streets * Corner Pier and Murray Streets * Corner Barrack Street and St Georges Terrace * Wellington Square * Corner William and St Georges Terrace * Corner Hay and William Streets * Corner James and Fitzgerald Streets * Corner Murray Street and Victoria Square * Corner Roe and William Streets * Corner Wellington and Pier Streets * Corner Hay and Irwin Streets * Corner Beaufort and James Streets City of Perth  - recently installed surveillance cameras
http://www.landonline.com.au/
www.deportation.com

More Related Content

PPT
LECTURE 6 - Cyberculture
PPT
LECTURE 4 - Cyberculture
PPT
Engineering Social Justice Presentation
PPTX
Public policy and online social networks: The trillion dollar zombie question
PDF
Can Internet technology still revolutionize activism?
LECTURE 6 - Cyberculture
LECTURE 4 - Cyberculture
Engineering Social Justice Presentation
Public policy and online social networks: The trillion dollar zombie question
Can Internet technology still revolutionize activism?

What's hot (20)

PPTX
Group 1 Project
PPTX
Alade
PPT
Civic Technology on the Front Lines
PDF
Big Tech, Privacy, and Power
PDF
Bodies and buildings nyu itp 4 8 2013
PPTX
Ch12.global culture
PPT
The Future of the Internet
DOC
Essay 3 annotated bibliography rough draft 18 july 2012
PPT
10flatteners.20082009
PPT
10flatteners.20082009
PPT
201102 gov 2.0 in australian government
PPTX
History of the Internet
PPT
Polinter11
PPT
Freedom or Control in Virtual Worlds
PPT
DOPA presentation
ODP
Public engagement. Public empowerment.
PDF
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Group 1 Project
Alade
Civic Technology on the Front Lines
Big Tech, Privacy, and Power
Bodies and buildings nyu itp 4 8 2013
Ch12.global culture
The Future of the Internet
Essay 3 annotated bibliography rough draft 18 july 2012
10flatteners.20082009
10flatteners.20082009
201102 gov 2.0 in australian government
History of the Internet
Polinter11
Freedom or Control in Virtual Worlds
DOPA presentation
Public engagement. Public empowerment.
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Ad

Viewers also liked (20)

PPTX
Philosophy and Social Media 1: I Tweet, Therefore I Am
PPT
Web 2.0
PPT
Surveillance And Power
PPT
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
PDF
Protecting Privacy From Aerial Surveillance
PDF
Cyber Surveillance - Honors English 1 Presentation
PPTX
Postmodernism lesson 3
PPTX
Surveillance and privacy panel
PPT
You Are Watched
PPTX
What Is Technocultures
KEY
What's Panopticism? Exploring Digital Cultures
PPT
Prof. Hendrik Speck - Privacy and Social Networks
PPTX
Trust and Reputation on the Social Web
PDF
Selfies, Surveillance and the Voluntary Panopticon
PDF
The digital divide in the post-Snowden era
DOC
9 Punishment HANDOUT
PDF
social networking sites
PPT
Social networking
PPT
Social networking PPT
PDF
Brand New World
Philosophy and Social Media 1: I Tweet, Therefore I Am
Web 2.0
Surveillance And Power
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Protecting Privacy From Aerial Surveillance
Cyber Surveillance - Honors English 1 Presentation
Postmodernism lesson 3
Surveillance and privacy panel
You Are Watched
What Is Technocultures
What's Panopticism? Exploring Digital Cultures
Prof. Hendrik Speck - Privacy and Social Networks
Trust and Reputation on the Social Web
Selfies, Surveillance and the Voluntary Panopticon
The digital divide in the post-Snowden era
9 Punishment HANDOUT
social networking sites
Social networking
Social networking PPT
Brand New World
Ad

Similar to LECTURE 5 - Cyberculture (20)

PDF
A week is a long time in computer ethics
PDF
Cybercrime: An Analysis from Positive Law Perspective
PDF
051309 Federal Interest And Social Security Metanomics Transcript
PPT
Internet Safety
PDF
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
PPTX
'Internet' - lecture for MECO 1002
PPT
Cyberterrorismv1
PDF
Freedom in the Days of the Internet
PPTX
Internet Surveillance
ZIP
Internet Presentation
PPTX
Privacy, social networks and EU policy
PDF
Short and Long of Data Driven Innovation
PDF
Cyber security issues part a
PDF
Essay Writing For Elementary Students. Online assignment writing service.
PPT
Openness and innovation in the information society
PDF
Using Data for Science Journalism
PDF
Using Data for Science Journalism
PPTX
Cyber Terrorism
PPT
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
PDF
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
A week is a long time in computer ethics
Cybercrime: An Analysis from Positive Law Perspective
051309 Federal Interest And Social Security Metanomics Transcript
Internet Safety
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
'Internet' - lecture for MECO 1002
Cyberterrorismv1
Freedom in the Days of the Internet
Internet Surveillance
Internet Presentation
Privacy, social networks and EU policy
Short and Long of Data Driven Innovation
Cyber security issues part a
Essay Writing For Elementary Students. Online assignment writing service.
Openness and innovation in the information society
Using Data for Science Journalism
Using Data for Science Journalism
Cyber Terrorism
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...

More from Kim Flintoff (20)

PPTX
Alternative Approaches to Learning Engagement
PPTX
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
PPTX
Taking Learning Beyond the School Gate
PPTX
UN SDG PRIORITIES IN EDUCATION
PPTX
Learning with Purpose
PPTX
Student-directed engagement in community-linked STEM integration through coll...
PDF
TEDxUWASalon: Symbiosis - Learning with Purpose
PPTX
Schools Innovation Projects
PPTX
Establishing global connections and being a global educator
PPTX
Challenge-based Learning
PPTX
Learners as Creators
PPTX
Designing for Global equality
PPTX
Schools Innovation Projects Initiative
PPTX
Balance of the Planet
PPTX
Learning Futures Network
PPTX
Future Landscapes for Educational Technology
PPTX
Black Swans and the Future of Education
PPTX
Where to from here - GSG closing plenary
PPTX
Transforming learning for relevance and sustainability
PPTX
Schools Innovation Symposium-2018
Alternative Approaches to Learning Engagement
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
Taking Learning Beyond the School Gate
UN SDG PRIORITIES IN EDUCATION
Learning with Purpose
Student-directed engagement in community-linked STEM integration through coll...
TEDxUWASalon: Symbiosis - Learning with Purpose
Schools Innovation Projects
Establishing global connections and being a global educator
Challenge-based Learning
Learners as Creators
Designing for Global equality
Schools Innovation Projects Initiative
Balance of the Planet
Learning Futures Network
Future Landscapes for Educational Technology
Black Swans and the Future of Education
Where to from here - GSG closing plenary
Transforming learning for relevance and sustainability
Schools Innovation Symposium-2018

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
STKI Israel Market Study 2025 version august
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Unlock new opportunities with location data.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPT
Geologic Time for studying geology for geologist
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Chapter 5: Probability Theory and Statistics
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Module 1.ppt Iot fundamentals and Architecture
Benefits of Physical activity for teenagers.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A novel scalable deep ensemble learning framework for big data classification...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
sustainability-14-14877-v2.pddhzftheheeeee
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Five Habits of High-Impact Board Members
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
STKI Israel Market Study 2025 version august
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
DP Operators-handbook-extract for the Mautical Institute
A comparative study of natural language inference in Swahili using monolingua...
Unlock new opportunities with location data.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Geologic Time for studying geology for geologist
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hindi spoken digit analysis for native and non-native speakers
Chapter 5: Probability Theory and Statistics
NewMind AI Weekly Chronicles – August ’25 Week III

LECTURE 5 - Cyberculture

  • 2. What has happened in the lecture programme up to this point? We have identified the following: The history of the avant garde and how our current context of globalisation demands different forms of interrogation. The impact Internet technologies are having globally. Some realities and myths of globalisation and the increased governance on Internet technologies. Theoretical model - (Jurgen Habermas and Communicative Action).
  • 3. In this lecture we are going to examine: Jeremy Bentham’s model of the Panopticon. The Panopticon as a context to analyse the Internet. Michel Foucault and the Panopticon. The increased surveillance of the public space. The increased surveillance of the virtual space. Webcameras (surveillance, escapism, ‘the real’, informative, voyeuristic, economic). Examples of various creative practitioners and the strategies employed both offline and online to combat attacks on civil liberties and critique globalism.
  • 4. Downer declares Wikipedia 'anti-government' By Steve Larkin ( news .com.au) August 24, 2007 03:41pm Article from: AAP THE online encyclopedia Wikipedia is anti-government, Foreign Affairs Minister Alexander Downer says. "My sort of recollection of Wikipedia sites is they are a bit, sort of, a bit anti-government, they are sort of a bit negative about people in the government," Mr Downer said today. http://www.news.com.au/story/0,23599,22300570-29277,00.html#
  • 5. http://www.australianit.news.com.au/story/0,24897,22317999-15306,00.html Tax gets tough on privacy Ben Woodhead | August 28, 2007 FRAUD detection systems have uncovered a rash of privacy breaches at the Australian Taxation Office as employees flout tough data protection rules despite ongoing monitoring and training. The sweeps of data access logs led to three sackings during the 2007 financial year and another nine staff resigned after the ATO detected unauthorised access to taxpayer records.
  • 6. Student cracks Government's $84m porn filter Article from: By Nick Higginbottom and Ben Packham August 26, 2007 12:30am A MELBOURNE schoolboy has cracked the Federal Government's new $84 million internet porn filter in minutes. Tom Wood, 16, said it took him just over 30 minutes to bypass the Government's filter, released on Tuesday. Tom, a year 10 student at a southeast Melbourne private school, showed the Herald Sun how to deactivate the filter in a handful of clicks. http://www.news.com.au/heraldsun/story/0,21985,22304224-662,00.html
  • 7. Hackers steal data from Monster.com users Article from: Agence France-Presse August 23, 2007 12:00am HACKERS have stolen personal details of hundreds of thousands of users of US jobs website Monster.com, according to internet security firm Symantec.   A total of 1.6 million entries, including information such as names, postal addresses and telephone numbers were stolen, the firm said. http://www.news.com.au/heraldsun/story/0,21985,22293044-11869,00.html
  • 8. Hi-tech research outpaces law Bernard Lane | August 22, 2007 RESEARCHERS riding the wave of hi-tech collaboration may leave lawyers and policymakers in their wake, commentators have warned following what is believed to be the first survey of legal issues raised by e-research. http://www.theaustralian.news.com.au/story/0,24897,22285146-12332,00.html
  • 9. Uni plagiarists risk degrees Brendan O'Keefe | August 22, 2007 THE University of New England will consider stripping students of their degrees if they are found to have cheated, following a spate of plagiarism in one of its masters programs. http://www.theaustralian.news.com.au/story/0,25197,22285283-12332,00.html
  • 10.  
  • 11. Menwith Hill, Photo: Duncan Campbell http://cyberdelix.net/parvati/6929.html Echelon Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites.
  • 13. Image: courtesy University College London Library Jeremy Bentham’s Panopticon
  • 14.  
  • 15.  
  • 16.  
  • 17.  
  • 18. >> [project proposal] - a live terror service
  • 19. The panopticon project aims to widen the lens of the electronic eye on the street, testing the boundaries and invasive nature of surveillance technologies, questioning if privacy really can exist in the digital age.
  • 20.  
  • 22.  
  • 24. Welcome to the Cyber Activists Network - AUSTRALIA Cyber Activism - What is Cyber Activism?, well it's not being a Hacker or Cracker. A Hacker - is someone who maliciously breaks or tampers with things, … merely to disrupt and damage private property . A Cracker - is someone who employs electronic means … with intent to breach the security and profit or gain in some way by their actions. A Cyber Activist -is none of these things previously mentioned. Quite simply a Cyber Activist is merely a description for the method of his/hers form of activism . Through the use of electronic media and communications, Cyber Activists attempt to be heard through e-mails, web sites, data and online communities working cohesively or independently to achieve social change.
  • 25. Slapper Software , have constructed this web site to facilitate an Online Cyber Activist's Network , which can greatly assist you in your efforts to bring about social change . Please visit the Activist's Tools & Download Sections of this web site to learn more about how we can assist you. Internet Resources Activist’s Tools To prepare you better (Cyber Activists), we have provided information about issues such as security, personal privacy and how to automate repetitive tasks…and can greatly improve effectiveness and reduce the amount of time it takes. There are many resources used by a well prepared Cyber Activist, below is a list of these tools and how they can assist you. http://senatorslapper.netfirms.com/tools.htm
  • 26. Electronic Disturbance Theatre “ When we do a performance, our performance or our actions are considered symbolic gestures; we are trying to bring attention to a particular event or cause – we are not trying to do any criminal activity”. Conan, N. (2001). Hacktivism. The Connection. National Public Radio. Boston July 30.
  • 27. Chapter 1. Introduction: The Virtual Condition Chapter 2. Nomadic Power and Cultural Resistance Chapter 3. Video and Resistance: Against Documentaries Chapter 4. The Recombinant Theater and the Performative Matrix Chapter 5. Utopian Plagiarism, Hypertextuality , and Electronic Cultural Production Chapter 6. Fragments on the Problem of Time Chapter 7. Paradoxes and Contradictions This book may be freely pirated and quoted. The authors and publisher, however, would like to be so informed at the address below. http://www.critical-art.net/books/ted/
  • 28. Barrack Square * Corner Riverside Drive and Barrack Streets * St Georges Terrace outside London Court * Corner Queen and Wellington Streets * Corner Pier and Murray Streets * Corner Barrack Street and St Georges Terrace * Wellington Square * Corner William and St Georges Terrace * Corner Hay and William Streets * Corner James and Fitzgerald Streets * Corner Murray Street and Victoria Square * Corner Roe and William Streets * Corner Wellington and Pier Streets * Corner Hay and Irwin Streets * Corner Beaufort and James Streets City of Perth - recently installed surveillance cameras