Archive Search

  • Face Value -
    ... watch us daily, as we swap goods for labor-power, as we sell commodities and buy resources, as we hawk dues and invest in securities, as we barter mining rights for dumps and pass printed paper for vouchers, tickets, coupons, slips and receipts, ever so...
  • Transitional Spaces -
    ... enters into the motion sensing camera's field of vision. The image becomes more focused as people move closer to the security turnstiles. Continued non-moving presence under the camera's view causes the screen to become increasingly covered with...
  • ... (1994) was a site specific installation in a hotel room, Room 33 Gallery, Regent's Court Hotel, Sydney, Australia. The security viewer was inverted so that visitors could view into the room. A generative text was visible through the eyepiece presented...
  • ... in New Media Art Education (forthcoming), published by Intellect Press. He is the editor of Inter/Actions/ Inter/Sections: Art Education in a Digital Visual Culture (2011), published by NAEA Press, and is currently the Senior Editor of The Journal...
  • ... Group and the Interaction Design Studio at Carnegie Mellon University, and has several years experience in the nonprofit sector. Tad is also a frequent collaborator with the Institute for Applied Autonomy, an award-winning arts collective that exhibits...
  • Crack it !
    ... installed in Hamburg's tube trains. Hacking and the controversies surrounding privacy, the public domain and data security would have been brought closer - metaphorically and literally - to some 800,000 passengers a week. It foresaw the...
  • ... and offers interface to interfere into their logics. While minds of concern :: breaking news was intervening into the security politics of a networked culture, naked bandit/here, not here/white sovereign focuses on the mechanisms of detainment of...
  • ... the first computer programmer (Manovich, 2001:22). She called herself an analyst and metaphysics. obs.: due to security reasons and internal organizatinal rules the camera at the director's office was forbidden and then moved to the bottom...
  • Echelon -
    ... per minute, depending on user interaction). Echelon is the worldwide signals intelligence network run by the US National Security Agency and the UK Government Communications Headquarters in collaboration with Canada, Australia and New Zealand. Echelon...
  • ... of a desire. Our consumption habits, our criminal history, our chronic diseases, even our photographs taken by a security camera - all are stored in bar codes, assimilating them to the physical ID of the DNA. What happens if the DNA merges with...