Log_File

2002

Date: Wed, 08 May 2002 17:27:40 +0200
From: "knowbotic.research" <info@krcf.zhdk.ch>
Subject: Re: <nettime> PUBLIC DOMAIN SCANNER

>I've never received an email that has caused me quite so much concern,
>indeed, terror.


Yes, you are potentially right. Each network actor who does not follow the
legal guidelines of the political logic of security immediately becomes a
focus of concern.
If we published the precise vulnerabilities of the public domain in the
networks, the 18 U.S.C. 1030 Fraud and Related Activity in Connection with
Computers would make us hackers=terrorists.
(see http://www.usdoj.gov/criminal/cybercrime/1030_new.html
and the new Amendments
./ny//infoPatriotAct.htm)


In relation to our project PUBLIC DOMAIN SCANNER, minds of
concern::breaking news
this means concretely:
A) if we used in this Public Domain Scanner the full range of a Security
Scanner, i.e. enact also intrusive scans,
B) and/or we published the adresses of the scanned servers and their
vulnerabilities
we would turn immediately illegal.
Thats the dilemma: security becomes the leading principle of today's
politics; if you dare to go in this political mousetrap (public domain is
the zone of instability and contestation, and has nothing to do with the
concept of security=regulating disorder by means of appeasement) and
discuss, crisscoss, enact publicly/in networks the concept of security, the
law forces you immediately to obscure the topic.
We had hoped to raise these issues unobscured in an Art museum, but since
Art Instutions are unwilling to enter this zone, even or maybe especially
not in an 'Art Hacking' show, due to the ubiquitous paranoia and threat of
getting sued, - the museum and the curators made it very clear to us that
we as artists are 100% alone and private in any legal dispute -, we decided
by ourselves to hide parts of the information on the scanner.
>, but more importantly, <intently>who</intently> is behind it?
The artist group Knowbotic Research, based on vulnerable site
194.95.163.253, part of a current show in NY New Museum called
OPEN_SOURCE_ART_HACK. (netartcommons.walkerart.org)

Lachlan,
have a look at Critical Art Ensembles Book4: Digital Resistance: (chapter:
2 The Mythology of Terrorism on the Net
http://www.critical-art.net)
and i hope you will find out who uses tactics of near random paranoia,
panic and (virtual) violence in order to define critical people als
terrorists. The sovereign imposes an immanent threat on network actors of
making them terrorists, or even become himself the cracker (see German
interior minister Schily's state actions of cracking websites).
We think the only way of escaping this spectacle of paranoia in networks
demands new tactics and agencies inside the domain of the public. Such new
ways of public acting cannot fall into the trap of the worn dichotomy of
private and public but rather open new possibilities of public agency for
domains of the commons which include tactics which were seen as
inappropriate for the contextualization of the public domain in the
modernist sense. Instead of referring only to the concepts of transparency,
visibility and manifestation, we suggest to upgrade the public agencies
with non-representational activities like encrypting, rendering invisible,
disinforming, hiding, fleeting, tunnelling, disturbing, spoofing, and other
camouflage tactics.
knowbotics/christian




Location
On the US legal bug
7.5.:
<nettime> PDS
7.5.: Re: <nettime> [L. Brown]
7.5.: Re: <nettime> [F. Cramer]
8.5.:Re: <nettime> KR
8.5.: scan reports
9.5.: Server Migration US
Port scanning is legal in the US

10.5.: provider vs kr

CRACKED ..Minds of concern::breakingnews...!!
May 12,2002

13.5.:New York Times Article
RE2: NYTIMES article
RE2: NYTIMES article
RE:3 NYTIMES article: KR
15.5.: wired article
[ thing] review
19.5.: Sonntagszeitung
13.6.: neural.it

14.6.:NZZ



curated by Steve Dietz and Jenny Markatou (?)