Bizarre Cities Tom VII. Summer 2009
Su r v eil l ance
Photo taken in Berlin 2008
The â€žBizarre Citiesâ€œ is a irregularly appearing collaborative art magazine including texts, (visual) poetry and original artworks in a limited edition of 25 copies. This is the 7th edition. So far the following editions have been published.: Bizarre Cities Tom. I - Bizarre Cities - Summer 2000 Bizarre Cities Tom. II - Inner-Space Astronauts - Summer 2002 Bizarre Cities Tom. III - Urban Myths - Spring 2004 Bizarre Cities Tom. IV - Provincial Metropolis(m) - Spring 2005 Bizarre Cities Tom. V - Psychogeography - Spring 2006 Bizarre Cities Tom. VI - Fragile Correspondences - Spring 2008
(In the order of appearance)
JĂśrg Seifert (Annaberg-Buchholz) Guido Vermeulen (Brussels) Valentina Calandrina (Ponte Nossa) Bernd Reichert (Brussels) Keith A. Buchholz (St. Louis) Roland Halbritter (Nuedlingen) David Dellafiora (Geelong) Reid Wood (Oberlin) Peter KĂźstermann (Minden) Miguel Jimenez (Seville) Schoko Casana (Berlin) Chuck Gattuso (Highlands Ranch) Joy Found (Howell) Ed Schenk (Amsterdam) Susanna Lakner (Stuttgart) Sean Burn (Newcastle upon Tyne) Josephine Reichert (London)
Photo taken at Tate Modern in London, art by Dan Perjovschi
Edition of 25 ÂŠ with the artists for the individual artwork ÂŠ Bernd Reichert for the assembling design and layout
Surveillance From Wikipedia, the free encyclopedia Jump to: navigation, search For other uses, see Surveillance (disambiguation).
Surveillance (pronounced /sər’veɪ.əns/ or /sər’veɪləns/) is the monitoring of the behavior, activities, or other changing information, usually of people and often in a surreptitious manner. It most usually refers to observation of individuals or groups by government organizations, but disease surveillance, for example, is monitoring the progress of a disease in a community. The word surveillance comes from the French word for "watching over". The word surveillance may be applied to observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls). It may also refer to simple, relatively no- or low-technology methods such as human intelligence agents and postal interception. Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. With the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of their subjects. However, many civil rights and privacy groups such as the Electronic Frontier Foundation and ACLU have expressed concern that by allowing continual increases in government surveillance of citizens that we will end up in a mass surveillance society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have lead to numerous lawsuits such as Hepting v. AT&T.
PRLog.Org - Global Press Release Distribution
Warnings Issued Over Britain's Surveillance Techniques By Infopackets.com Dated: Feb 12, 2009 According to a recent report from the British House of Lords, Closed Circuit TV (CCTV) cameras and the UK's DNA database -- purported to be the "largest in the world" -- are two examples of "pervasive" threats to privacy in British society. According to a recent report from the British House of Lords, Closed Circuit TV (CCTV) cameras and the UK's DNA database -- purported to be the "largest in the world" -- are two examples of "pervasive" threats to privacy in British society, and may even threaten to undermine democracy. The report warns that pervasive and routine electronic surveillance and the collection and processing of personal information is almost taken for granted. (Source: guardian.co.uk) Although the government calls CCTV and DNA essential to fight crime, privacy advocates say abuses of power mean that even the innocent have a lot to fear. For years, civil liberty advocates have warned about the risks of a surveillance society in which the state acquires ever-greater, often unchecked powers to track people's movements and to retain personal data. The government says the plan is essential in fighting terrorism. CCTV Camera Among Areas Of Most Concern Estimates peg the growing number of CCTV cameras at four million in the UK. Privacy advocates say the UK has the most cameras per capita in the world, but no definitive figures are available. However, a 2004 European Commission found Britain had the highest density of CCTV cameras in Europe. The EU found 40,000 cameras in public areas in 500 British towns and cities compared to fewer than 100 cameras in 15 German cities and no CCTV cameras at all in Denmark. (Source: bbc.co.uk) DNA Sampling Defies Justice According to the BBC, the UK's DNA database is the "largest in the world," with more than 7% of the population having their samples stored, compared with 0.5% in the U.S. (Source: bbc.co.uk) DNA samples and fingerprints can be taken by police in England, Wales and Northern Ireland from anyone arrested on suspicion of a recordable offense. The samples can be held indefinitely, whether people are charged or not. Privacy advocates say that anyone not convicted of a crime should have their DNA removed. A recent ruling in the case of two British men from the European Court of Human Rights concurred. Lord Goodlad, former Tory chief whip and committee chairman, said there could be no justification for the state's obsession with the personal details of its citizens. (Source: guardian.co.uk) The House of Lords' recent report makes more than 40 recommendations in an attempt to protect individual privacy. Missing from the report is any mention of the proposal for the 'super database' proposed by Home Secretary Jacqui Smith and the proposal from Justice Secretary Jack Straw to lower barriers on the widespread sharing of personal data across the public sector. The report, entitled "Surveillance: Citizens and the State" is available from The House of Lords. (Source: parliament.uk) Established in 2001 and read by over 250,000 users world-wide, Infopackets features the latest in headline news based on MS Windows, Internet, and technology trends. Subscription to our website is free. http:// www.infopackets.com/ Category Security, Tags DNA, Report, CCTV Cameras, privacy advocates, personal
Terrorist Surveillance Techniques Indicators Though not exhaustive, the following list suggests possible indicators of terrorist surveillance. Alone, each indicator can result from legitimate recreational or commercial activities or criminal activity not related to terrorism; however, multiple indicators combined with other information can suggest a terrorist threat.
Unusual or prolonged interest in security measures or personnel, entry points and access controls, or perimeter barriers such as fences or walls; unusual behavior such as staring or quickly looking away from personnel or vehicles entering or leaving designated facilities or parking areas; observation of security reaction drills or procedures; increase in anonymous telephone or email threats to facilities in conjunction with suspected surveillance incidents, designed to test threat reaction procedures; unusual behavior suggesting possible use of a hidden camera, such as panning a briefcase over a particular area or constantly adjusting a ball cap or sunglasses; prolonged static surveillance using operatives disguised as panhandlers, demonstrators, shoe shiners, food or flower vendors, news agents, or street sweepers not previously seen in the area; discreet use of still cameras, video recorders, or note taking at non-tourist type locations; use of multiple sets of clothing, identifications, or the use of sketching materials (paper, pencils, etc.); questioning security or facility personnel.
Suggested Protective Measures Though not exhaustive, the following list provides counter measures to terrorist surveillance. Install screening and other barriers around critical components or assets to prevent or limit surveillance. Install outward-facing lighting to impede or deter surveillance of checkpoints and structures. Train security personnel and employees to recognize suspicious activity and potential surveillance. Report to security and law enforcement elicitation of sensitive facility information. Review facility security response measures and requirements for reported surveillance incidents. Employ counter-surveillance teams. Provide video surveillance systems for critical facilities and connect the systems to a central monitoring control room. Review all outstanding maintenance and capital project work that could affect the security of the facility. Ensure all contractors are properly screened and accounted for during the project. Remove all sensitive information, such as building plans, personnel rosters, hazardous chemicals lists, and VIP schedules from public access and the internet. Conduct random security measures to confuse terrorist surveillance. Do not become predictable. Recipients should immediately report suspicious or criminal activities potentially related to terrorism to their local FBI Joint Terrorism Task Force at 414-276-4684.