-->

zaterdag 30 juni 2012

Zinloosgeweld door Politie in Rotterdam

'De dronken Let die in Rotterdam op straat werd geschopt door een politieagente, gedroeg zich niet agressief. Hij stond met z'n armen te zwaaien en kwam niet dreigend over', aldus Nancy Pardo tegen RTV Rijnmond. Pardo was getuige van het schopincident en is de vriendin van Jovanny Dambruck, de man die het voorval filmde. HERE

Legalize this! Dutch party moves for DDoS decriminalization

Dutch opposition party D66 has proposed the legalization of DDoS attacks as a form of protest. Activists would have to warn of their action in advance, giving websites time to prepare for their attack. Kees Verhoeven, the campaign's leader, argues that it is strange that the fundamental right to demonstrate doesn’t extend to the online realm. The coming years would bring more instances of hacktivism, and it would be reasonable to introduce legislation to regulate, not ban it, he says. Verhoeven proposes that DDoS attacks be legalized so long as the protesters say when they will start their action. That way, a website would have time to prepare for the attack, just like an office building has time to get ready for a rally next to it. HERE

I (`.`) Anonymous

I Put A Spell On You - Lip Sync

vrijdag 29 juni 2012

Hgicht

tomorrow at W139 don't miss!

Invisible Forces at Furtherfield Gallery

Invisible Forces at Furtherfield Gallery from Furtherfield on Vimeo.

Proxy Your Way to Online Anonymity - Jack Donovan


Whatever your reason for desiring anonymity, you’ll find it hard to make yourself truly traceless on the web. Even if you refrain from signing in to any services, your IP traffic is logged almost everywhere you go. Even if you’re not worried about Big Brother, this can be disconcerting. Worry not, there’s still one thing you can do to get invisible — put all of your network activity behind a proxy. This masks your IP address using a virtual detour that makes it appear that your connection is originating from somewhere else in the world, like Brazil or China. Here’s how to set yourself up for backdoor browsing.
MORE

Balotelli is partying with his Mother

donderdag 28 juni 2012

New Aethletics

Video Trailer for The Museum of Glitch Aesthetics

It's Cool, I'm Good— trailer

Krištof Kintera: Revolution (HD)

adiZones and Lo-Lifes



This week I attended Regeneration Games, a talk at FreeWord on the branding and aesthetic ideology of Olympic-driven regeneration. Alberto Duman organised the event and presented three 'artifacts' of regeneration: the ArcelorMittal Orbit Tower, a promotional PDF selling the regeneration of Newham to Chinese investors, and 'adiZones'. The author and critic Owen Hatherley was then invited to respond to 'adiZones', a small development project intended on delivering part of the “Olympic Legacy” in the form of better community sports provision.
MUST READ HERE

Anne Turyn - from 'Flashbulb Memories' (1986)

VIA

dinsdag 26 juni 2012

Google simulates the human brain
with 1000 machines, 16000 cores and a love of cats

Google stitched together 1,000 computers totaling 16,000 cores to form a neural network with over 1 billion connections, and sent it to YouTube looking for cats. Unlike the popular human time-sink, this was all in the name of science: specifically, simulating the human brain. The neural machine was presented with 10 million images taken from random videos, and went about teaching itself what our feline friends look like. Unlike similar experiments, where some manual guidance and supervision is involved, Google's pseudo-brain was given no such assistance.
It wasn't just about cats, of course -- the broader aim was to see whether computers can learn face detection without labeled images. After studying the large set of image-data, the cluster revealed that indeed it could, in addition to being able to develop concepts for human body parts and -- of course -- cats. Overall, there was 15.8 percent accuracy in recognizing 20,000 object categories, which the researchers claim is a 70 percent jump over previous studies. Full details of the hows and whys will be presented at a forthcoming conference in Edinburgh. (source)

Our d13


 Due to privacy concerns i had to take the vid down, for now...

maandag 25 juni 2012

zondag 24 juni 2012

vrijdag 22 juni 2012

Central Station (Culture Station) Kassel


The Hauptbahnhof was Kassel's main central station, until all long-distance trains were relocated to the newly built Bahnhof Kassel-Wilhelmshöhe in 1991. Today it is only a local commuter station, and large parts stand empty or are used for new purposes.

The Bahnhof was built between 1851 and 1856 following sketches of Gottlob Engelhard in the style of Romantic Classicism. At the beginning of the 20th century the station was extended, but mostly destroyed again through bombing during WWII. It was reconstructed between 1952 and 1960 under architect Friedrich Bätcher in the style of 1950s, with restoration and integration of some of the old features. In 1953 it was connected to the city center via the newly constructed pedestrian zone, the "Treppenstrasse".

In 1995 the disused railway station was turned into a cultural venue and became known as the KulturBahnhof. It includes the BALi cinemas, Caricatura, a gallery for comic art, the restaurant and club Gleis 1, the gallery Stellwerk, the KAZ (Kassel Architecture Centre) and the Offener Kanal Kassel (an interactive radio station). In 1997 and 2002 the KulturBahnhof was used as a venue for documenta X and 11.

Bing vs. Google - Image Results for "New Aesthetic"

Taken using Firefox Private Browsing and being non-logged in either website, which should neutralize most results personalization. Search results when also using Tor were very similar. source

The 25 Wackiest Art-Themed GIFs, From a Dancing Van Gogh to Dali's Marching Elephant

HERE

Respect My Authoritah!

Cyber War

donderdag 21 juni 2012

The Employees First Effect

M.I.A

Aiight!

Do We Need a New Pottery Barn Rule for Cyberwarfare?

A couple of weeks ago, sources in the White House leaked that the US was behind Stuxnet (to bolster Obama's image as a militarily tough President?). That's the cyberweapon that sabotaged the centrifuges being used by the Iranians in their nuclear program last year.

However, the story doesn't end there. Researchers around the world found that a much more powerful cyberweapon called Flame, uses exactly the same code as Stuxnet. Given the evidence, officials confirmed that Flame is a US cyberweapon. It's a weapons system that functions as both a spy network and carrier battlegroup (it can gather info and stage attacks by other cyberweapons). It's also designed to penetrate even extremely secure networks (government and corporate).

What's the problem? Flame has been set loose. It isn't just on Iranian government networks. It's on the open Internet. It's self-replicating (making copies of itself) and infecting computers and networks around the world. Breaking into corporate and government system of friends and allies. Keylogging (at a minimum, it has the capacity to activate microphones and video cameras attached to the computer) the activities of hapless citizens around the world...

The question now is: now that people are aware of this cyberweapon, who's going to pay for the cleanup? The US essentially "stole" information and illegally violated the computers and networks of countless numbers of people and companies: stealing proprietary info, violating privacy rules, etc.

I can hear the cash registers of countless law suits ringing....

This leads me to an interesting question: Do we need a Pottery Barn Rule for cyberweapons?

First, a little background.

In 2002, to Colin Powell came up with something that Thomas Friedman later called the "Pottery Barn Rule." Powell came up with the rule to counter (unsuccessfully) advisors to the President that claimed invasion of Iraq would be fast, costless, and painless (as in, "they will great us with flowers.."). The Pottery barn rule describe the moral, financial, and security burden incurred with an invasion. In long form, it looks like this:

'You are going to be the proud owner of 25 million people. You will own all their hopes, aspirations, and problems. You'll own it all.'

Later, he added this: "It’s going to suck up a good 40 to 50 percent of the Army for years. And it’s going to take all the oxygen out of the political environment."

Friedman boiled the rule down to this:

"You break it, you own it."

Of course, if we had followed this advice in Iraq and Afghanistan, it would have saved countless lives (both killed and maimed). Less importantly, it would have allowed the US to shave $2 trillion off the last decade's "security" bill, while achieving the same impact (a defunct al Qaeda).

So, in shot, let's make a new rule for cyberweapons that pundits can point to later during a bout of buyer's remorse.

Let's call it The "WR Grace Rule"

It's a rule that WR Grace learned the hard way: through hundreds of thousands of lawsuits to recover damages due to asbestos and other chemical spills that have killed a countless number of people worldwide.

In simple form, it's:

"You contaminate it (a computer or network), you own it."

HERE

26/6 | Me, Myself and I //or// How to make your own new identity – 20:00

With: Heath Bunting at Vondelbunker! HERE

Dss trailer

woensdag 20 juni 2012

Adidas pulls "shackle shoe" design

Adidas has decided not to sell this particular shoe design after a photo of it on their Facebook page generated quite a negative response. VIA

Jan Paweł II - John Paul II Madison Square New York 1979

Julian Assange seeking asylum in Ecuadorian embassy in London


Julian Assange has dramatically sought political asylum at the Ecuadorean embassy in London, days after the supreme court rejected the last of his appeals against extradition to Sweden to face sex crime accusations and after what he called a "declaration of abandonment" by his own government in Australia.

MORE

dinsdag 19 juni 2012

Com´on you reds (2012) Documentation of Performance by Klas Eriksson

At the Bucarest Biennale.

Crovitz: The U.N.'s Internet Power Grab

It's easy to understand why countries like Russia, China and Iran would want to rewire the Internet, cutting off access to their citizens and undermining the idea of a World Wide Web. What's more surprising is that U.S. diplomats are letting authoritarian regimes hijack an obscure U.N. agency to undermine how the Internet works, including for Americans.
MORE

zondag 17 juni 2012

stranger in a strangeland

[Flash 10 is required to watch video]
  Via   <-----------------thanks freedom!

The Karl Marx MasterCard Is Here. It Needs A Tagline.

The German bank Sparkasse Chemnitz recently launched a Karl Marx credit card. The bank let people vote online for 10 different images, and Marx was the "very clear winner," beating out a palace, a castle and a racetrack, among others. Reuters has more on the story. The card, obviously, needs a tagline. Post your suggestions in the comments, or tweet them with the tagline #marxcard. We'll post our favorites here. VIA

zaterdag 16 juni 2012

(GRATI S!)

>>>cONSPIRACy<<<



DOGtimesSs#01 session
16/06/2012 15:30h Start: DOGtimesSummerschool-2012
Location: Amsterdam, Vondelpark under the bridge
http://vondelbunker.nl/lokatie/

Baracka Flacka Flames - I Run The Military [Official Music Video]

My Name Is Janez Janša


Five years ago, three artists legally changed their name to Janez Janša and joined the conservative Slovenian Democratic Party (SDS.) So far, so almost normal. Except that Janez Janša is also he name of the leader of the party and Prime Minister of Slovenia. Suddenly there were more Janez Janšas acting together within the same physical and media space.< br />
Their experience is being turned into the documentary My Name Is Janez Janša in which individuals, artists and academics ponder about the meaning and purpose of one's name from both private and public perspectives.

MORE

vrijdag 15 juni 2012

I Wanna Be Famous (HD)

I found this music video on YouTube that seems very useful to illustrate what is a microfascism. We start from the idea that a microfascism emerges when there is a blocked and repressed desire that is molarized through a codificated flow which investment is totalitarian. When that happens, the creative line of flight that involves desire becomes a line of abolition or a line of death. In the video we have a girl who wants to be famous and whose subjectivity lies encysted in common sense. She is a girl who lives alone in a small apartment, who has no money neither a job, but is noble and with a good personality. While she does not know what to do with her life, she really wants to be famous. The desire that goes through her is encoded by a collective representation that undoubtedly onrushes her imperiously. Such representation has been able to make her believe that being a celebrity is important and that is just enough to have a bit of personality to be famous. While she dumps on herself the use that she makes of common sense, she believes she should be already. However, she feels she should do something to achieve it. Given that such a desire buggers her into a line of death, she decides to kill somebody important to release her onslaught. Her reason tells her that maybe she cannot literally be a star but at least she can be someone important. Her desire is so significant that it extrapolates her beyond all representation: she considers that it should be as simple as committing assassination. She gets to think that maybe the “guy” who governs the country can be useful for this. The irrefutable logic that triangulates her small oedipus makes her go out to the open public, purchase a weapon and stalk the streets with joy. Guitar in hand, she considers indispensable for her act to be of public order, she knows that her mother will be proud to see her on television. No matter the way: with a weapon, a knife, with her mind. It is a question of being famous. At the end, she reverses its collective investment infuriating the masses, while her lynching ensures her to be included on the board of history. VIA

Slavoj Žižek in Conversation with Jonathan Derbyshire at Central Saint Martins

Wine Robot Racket

Death of an invention - John Lichfield

It was France's first glimpse of an online future. But now, 30 years after it was invented, the wired experiment that foreshadowed the World Wide Web is about to lose its connection once and for all.

READ

AERODISNEY (Afrika Pseudobruitismus)

RANGERS & CELTIC - PART 1

donderdag 14 juni 2012

CAT

DjRun



Music and running naturally united.
DjRun plays your own music, picking songs that match your running or walking tempo. It's as simple as hitting play! DjRun Pro can even adapt the playback tempo like a real DJ, following your stride rate! While mainly targeted towards running, DjRun works with all sports that exhibit steady repetitive movement, like walking, hiking, cycling, rope-skipping, rollerskating, rowing, fitness ...
How does it work?

HERE

woensdag 13 juni 2012

DOGtimesSs#01 >>>cONSPIRACy<<< (Grati S!)

Dear Pack,

be most welcome to the first edition of DOGtimes-Summerschool!

With kind regards,
The Other Dogs!

DOGtimesSs#01 session >>>cONSPIRACy<<<

15:30h Start: DOGtimesSummerschool-2012
Location: Amsterdam, Vondelpark under the bridge
http://vondelbunker.nl/lokatie/
15:30h => 16:00
Drinks: white PORT-wine & white grapes
~PLEASE, BRING YOUR OWN GLASSES~
~AND SOME WINE&GRAPES TO SHARE!~

Introduction: DOGtimesSs#01 >>>cONSPIRACy<<<
16:00h
Lecture: Willem Van Weelden at 19.5.on “Laptopradio”
~Smartphone with Flash required~

16:30h
Discussion: collective interests, information and supports

17:00h => 01:00h
Opening: “ONDERTUSSEN”
A two-day DOGTIME exhibition at the Vondelbunker
Location: Amsterdam, Vondelpark8 inside the bridge
http://schijnheilig.org/2012/06/ondertussen/

19:00h => 07:00h
After-party: “La Nuit Blanche”
http://www.nuitblancheamsterdam.nl/

DOGtimesSs#01(gratis!)
June 16th 2012(Opening"ONDERTUSSEN")
session >>>cONSPIRACy<<<(proposal)

DOGtimes$$#02
July 4th 2012(Preview"GRA-S")
session >>>le$$≠MORE<<<(proposal)
DØGtimes$$#03
session >>>le$$≈lesson<<<(proposal)
DΘGtimes$$#04
session >>>FA≥IDUM<<<(proposal)
DOGtımesSs#05
session >>>FA≤IDUM<<<(proposal)
DOGŧimesSs#06
session >>> . . . <<<(proposal)
ĐOGtimesSs#07
session >>> . . . <<<(proposal)

Benderrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr

Teacup Dragon Puppet

dinsdag 12 juni 2012

What Ancient Greeks Can Teach Us about Drones and Cyber-War

When freshmen in my humanities colloquium at Stevens Institute of Technology ask why they have to read stuff by ancient Greeks, I reply that we have much to learn from old guys like Thucydides. In his history of the Peloponnesian War, a clash between the city-states Athens and Sparta, Thucydides recounted a negotiation between Athenians and leaders of Melos, an island kingdom striving to remain neutral. MORE HERE

On the Natural History of Surveillance - Adam Rothstein



Upon hearing the phrase, we may not know exactly what a “cephalic sniffer” is, nor whether it is a real piece of technology. However, as to what such a nefarious device might be able to do, we could surely begin to imagine from the name alone. And as for whether it is technological reality (it is not, being invented by Philip K. Dick in his story Clans of the Alphane Moon), from its “sci-fi” sounding alliteration we might guess correctly that it is purely fantasy.

At least it was fantasy when PKD invented it in 1964....

  HERE