|  
       
       Date: Wed, 
        08 May 2002 17:27:40 +0200 
        From: "knowbotic.research" <krcf@khm.de> 
        Subject: Re: <nettime> PUBLIC DOMAIN SCANNER 
      
       >I've 
        never received an email that has caused me quite so much concern, 
        >indeed, terror. 
       
        Yes, you are potentially right. Each network actor who does not follow 
        the 
        legal guidelines of the political logic of security immediately becomes 
        a 
        focus of concern. 
        If we published the precise vulnerabilities of the public domain in the 
        networks, the 18 U.S.C. 1030 Fraud and Related Activity in Connection 
        with 
        Computers would make us hackers=terrorists. 
        (see http://www.usdoj.gov/criminal/cybercrime/1030_new.html 
        and the new Amendments 
        http://unitedwehack.ath.cx/infoPatriotAct.htm) 
       
        In relation to our project PUBLIC DOMAIN SCANNER, minds of 
        concern::breaking news 
        this means concretely: 
        A) if we used in this Public Domain Scanner the full range of a Security 
        Scanner, i.e. enact also intrusive scans, 
        B) and/or we published the adresses of the scanned servers and their 
        vulnerabilities 
        we would turn immediately illegal. 
        Thats the dilemma: security becomes the leading principle of today's 
        politics; if you dare to go in this political mousetrap (public domain 
        is 
        the zone of instability and contestation, and has nothing to do with the 
        concept of security=regulating disorder by means of appeasement) and 
        discuss, crisscoss, enact publicly/in networks the concept of security, 
        the 
        law forces you immediately to obscure the topic. 
        We had hoped to raise these issues unobscured in an Art museum, but since 
        Art Instutions are unwilling to enter this zone, even or maybe especially 
        not in an 'Art Hacking' show, due to the ubiquitous paranoia and threat 
        of 
        getting sued, - the museum and the curators made it very clear to us that 
        we as artists are 100% alone and private in any legal dispute -, we decided 
        by ourselves to hide parts of the information on the scanner. 
        >, but more importantly, <intently>who</intently> is behind 
        it? 
        The artist group Knowbotic Research, based on vulnerable site 
        194.95.163.253, part of a current show in NY New Museum called 
        OPEN_SOURCE_ART_HACK. (netartcommons.walkerart.org) 
      Lachlan, 
        have a look at Critical Art Ensembles Book4: Digital Resistance: (chapter: 
        2 The Mythology of Terrorism on the Net 
        http://www.critical-art.net) 
        and i hope you will find out who uses tactics of near random paranoia, 
        panic and (virtual) violence in order to define critical people als 
        terrorists. The sovereign imposes an immanent threat on network actors 
        of 
        making them terrorists, or even become himself the cracker (see German 
        interior minister Schily's state actions of cracking websites). 
        We think the only way of escaping this spectacle of paranoia in networks 
        demands new tactics and agencies inside the domain of the public. Such 
        new 
        ways of public acting cannot fall into the trap of the worn dichotomy 
        of 
        private and public but rather open new possibilities of public agency 
        for 
        domains of the commons which include tactics which were seen as 
        inappropriate for the contextualization of the public domain in the 
        modernist sense. Instead of referring only to the concepts of transparency, 
        visibility and manifestation, we suggest to upgrade the public agencies 
        with non-representational activities like encrypting, rendering invisible, 
        disinforming, hiding, fleeting, tunnelling, disturbing, spoofing, and 
        other 
        camouflage tactics. 
        knowbotics/christian 
         
       
       
       
        | 
     
         Location 
          
        On 
        the US legal bug 
         
         7.5.: 
        <nettime> 
        PDS 
         7.5.: 
        Re: <nettime> [L. Brown] 
         7.5.: 
        Re: 
        <nettime> 
        [F. Cramer]  
         8.5.:Re: 
        <nettime> KR 
         8.5.: 
        scan 
        reports  
         9.5.: 
        Server 
        Migration US  
         Port 
        scanning is legal in the US 
         
         10.5.: 
        provider vs kr 
        CRACKED 
        ..Minds of concern::breakingnews...!! 
        May 12,2002 
         
         13.5.:New 
        York Times Article  
         RE2: 
        NYTIMES article 
         
          
        RE2: 
        NYTIMES article 
          
          
        RE:3 
        NYTIMES article: KR 
         15.5.: 
        wired article 
         [ 
        thing] review 
         19.5.: 
        Sonntagszeitung 
          
        13.6.: neural.it 
          
        14.6.:NZZ 
         
           
          
          
        curated by Steve Dietz and Jenny Markatou (?) 
          
          
       
       |