PSYCH! Home Page: 

PSYCH! (Home Page)

PSYCH! Process Page: 

PROCESS

PSYCH! Final Live Stream Page: 

FINAL LIVE STREAM: PSYCH!

IN THE END…….

Reflections:

General Learning Points:

Live streaming is really very spontaneous and requires quick thinking and reaction in real time. It exhibits the realness of the situation with the setup and props making it more believable. Audiences are made unintentional voyeurs when they indirectly spy on Clarita’s Facebook information as well as Ling Ern’s camera.

We gave the audience a sense of autonomy when they can contribute to the collect narrative and their decisions make an impact on the live stream. These greatly increase the level of relatedness and involvement of their participation.

However, live streaming also meant that it provides little room for mistakes as these actions cannot be unseen by our viewers. When we faced technical difficulties, we must find ways to react quickly to our live audience.

 

LING ERN POV:

Through playing the role of a victim, I realised the vulnerability of online users and how our traces left behind to serve as baits for hackers to target us. The consequences can be very devastating for the victim and it truly invokes audiences to rethink their own actions. For instance, not clearing your cache or browser history after doing a bank transaction or avoid using  Free Public Wifi often as we are unaware of the origin of the service provided. All these can easily lead to data breaches and theft of confidential information, especially after the talk by Surya Mattu about the WIFI Packet Sniffer.

The devastating consequences in this short role play caution our online audience to take the initiative to protect themselves over the internet, such as reading small print terms and conditions before agreeing to an app that may collect your personal information. We can deny app permissions to access our camera and microphone instead of clicking “ok” right away each time we download a new app. Similar to my reaction in the video when victims are flustered, we do not think rationally and provides our information right away to the other party.

This roleplay also serves as a reminder to our audience to calm down and think through the questions asked first before replying. We can raise awareness about cybersecurity and highlight the possibility that anonymity will prob­a­bly be a lux­ury com­mod­ity one day. It will be lux­ury that one’s own tracks will not be recorded.

 

CLARITA POV:

By putting ourselves into the position of a hacker. We explored the motivation and intention of the hacker and realised how anonymity can encourage people to be bolder in terms of unethical behaviours, especially for monetary gains and voyeurism. The availability and high accessibility of applications in which anonymous people can use to change their identity, for instance, the voice changing app and IP changer hacking code.

Similar to what Sarah Watson mentioned about how we leave traces on the internet very easily making us highly trackable,  these are the kind of loopholes that allow hackers to make use of people’s data and further breach their privacy and take advantage of their personal information. These hackers can then get away easily with the anonymity which explains the increasing number of phone calls we receive nowadays impersonating the police saying that “We have your package at the customs and hence we need your personal information to approve it” or impersonating a company personnel stating that “Congratulations you have won yourself a grand prize and you need to pay this handling fee before getting your item.”

 

 

CONCEPT / IDEA

 

The Internet is a wonderful place. It brings us unlimited connectivity, unlimited history storage, and unlimited sharing of information, amongst many other great advantages, for the good of living beings.

However, we cannot ignore the fact that the Internet, too, allows for unlimited access to all sorts of data, which sparks debate about privacy, access to open-sourced terrorism, and blurs the line between the ethics and responsibility of actions taken over the Internet.

The format of our final project will be a scripted live broadcast (unknown to the audience) that revolves around surveillance and cyber security. We will be using hacking (data transmission) and authenticity over the internet as our main focus in the broadcast. A virtual space creates a social situation without traditional rules of etiquette. The lack of immediate or physical consequences emboldens people to engage in behaviour unlikely seen in real life.

 

Our final project aims to act as a prompt for the audience to analyse / think of these issues deeper, about the existence of these malicious intentions and how they can protect themselves from it, be it by simply covering their cameras on their devices when unused, or being more aware of cyber security and being more responsible for their own privacy over the internet, at the very least.

 

POTENTIAL STORYLINE / CONTENT

Clarita’s Facebook is hacked by a mysterious person. The hacker uses the live stream function on her phone, and proceeds to access Clarita’s friend list, asking viewers to choose someone, which ends up being Ling Ern. The hacker reveals that he/she will prank Ling Ern and shows the process of hacking into Ling Ern’s phone and accessing her phone camera.

Ling Ern, on the other hand, is broadcasted on Clarita’s Facebook live stream without her knowledge. To draw Ling Ern’s attention to her phone, the hacker sent a notification which prompts her to look at her phone, giving the live audience a view of Ling Ern’s face. The hacker proceeds to carry out a couple of pranks (may or may not be decided by audience) that might end up devastating for Ling Ern (like hacking her bank account or something serious).

 

REFERENCES / INSPIRATION

  • The Pirate Cinema (Nicolas Maigret)   

Link: https://vimeo.com/67518774

This work depicts the idea of surveillance and cyber security where everyone viewing the art piece is actually indirectly spying on the activities of the community torrenting different types of videos online. This makes the audience forced/unintentional voyeurs.

 

  • Bold3RRR (Jon Cates)

Link: https://player.vimeo.com/video/49110316

Jon Cates: http://www.saic.edu/profiles/faculty/jon-cates

Website: http://systemsapproach.net/innerindex.html

In this work, Jon Cates shares his work processes on live streaming. This allows the audience to openly view his artistic processes. In our final project, we want this sharing of real-time work processes over the third space to be depicted too.

 

  • Open Source Studio (Randall Packer)

       

 

http://zakros.com/open-source-studio/#way

https://thirdspacenetwork.com/collective-narrative/

Interactive collective narrative where the audience can have the opportunity to decide what happens to target, being involved in constructing this narrative.

Third space and open source network allows us to rethink broadcasting and artist’s studio then and now. We are shifting towards peer-to-peer broadcasted art that creatively joins virtual and physical spaces with technical imagination, conceptual thinking, social sensibilities with live media art made by “artist-broadcasters” exploring a collective approach to Internet streaming.

 

 LING ERN – POV OF VICTIM

  1. Explores the vulnerability of users and factors that lead users to fall prey to hackers:  Through identifying reasons for data breaches, theft of personal information and invasion of privacy.
  2. Invoke audience to rethink about their own actions- whether they take responsible steps to protect themselves on the internet. For instance: Not reading the terms and agreement on social media websites fully and agree to them right away.
  3. Ways in which PDPA (Personal Data Protection Act) play a part in protecting users.
  4. Identify potential dangers of technology and devices nowadays where tracking user’s activity on devices, pictures, messages is prevalent as well as selling information on activities to third parties.
  5. Raise awareness about cyber security and highlight the possibility that anonymity will prob­a­bly be a lux­ury com­mod­ity one day. It will be lux­ury that one’s own tracks will not be recorded.

 

CLARITA – POV OF HACKER

  1. Explores motivation for hackers in terms of: anonymity, fun, monetary gain, power play, voyeurism
  2. Identify the kind of loopholes that allow hackers to make use of people’s accounts online.
  3. Intention of hackers changing their identity (identity transformation) as well as the characteristics of the internet that allows that to do so.
  4. Invoking the audience to think about ethical boundaries when third parties are only accessing data through parameters that are technically allowed by the victims through agreeing to the terms and agreements.
  5. Drawing parallels between hackers going through personal data and companies selling data of their users.

LINK TO PRESENTATION SLIDES:

https://docs.google.com/presentation/d/10yI1oJFNKdUql-KE5xLDQVz-k7jXSSCN9DTlf6wZ1gc/edit?usp=sharing