Abandoned NSA Listening Post

While looking at the design for listening posts and surveillance architecture, I came across these abandoned NSA stations in Berlin. This NSA Listening Station of Radar Domes on “The Hill,” was rumored to be a part of the global ECHELON intelligence gathering network. Other rumors include tunnels beneath the spy complex and others suggesting that by 1954, 1,200 calls could be recorded simultaneously, filling up more than 50,000 reel tapes. After the station was closed following the fall of the Berlin Wall, it was left abandoned and the equipment removed, the derelict buildings and radar domes still remained.

The images are quite beautiful and resonate an archaic feeling of the bygone state of monitoring, power and control.

Abandoned NSA Listening Station on Devil’s Mountain, Berlin.& More Surveillance Architecture: An Old Listening Post From The Cold War – Architizer.

Advertisements

Methods of Detection: Electro Active Polymers

Each has a size of 1 cm by 1 cm, and it can rise up by 3 mm when 3 Volts are supplied. The movement of these sheets is controlled by a processor that is connected with the iPhone through the phone’s connector. These EAP sheets only take a minimal amount of energy from the extra battery.

Essentially a visual and movement based alert system which could be adapted to detect invasive signals and let the user know when they are being monitored. This is a similar line of detection to the Electromagentic Field detector I created last year. My task now, is how do I scale this up into the ‘resistance’ archtiecture?

Faceted panel facade used to respond and react to invasive signals

Faceted panel facade used to respond and react to invasive signals

See RFID and Electrmagneticfield reader here:

RFID reader

Space Replay: Echoing listening device

Royal College of Art have created a mysterious floating spherical object that drifts through public spaces recording conversations and plays them back when there’s nobody around. the video is quite haunting in its nature as it meanders through public space, and the reactions of people are quite entertaining! Essentially, a form of hacking public space.

<p><a href=”http://vimeo.com/88992597″>Space Replay floats hauntingly through spaces echoing its surroundings</a> from <a href=”http://vimeo.com/dezeen”>Dezeen</a&gt; on <a href=”https://vimeo.com”>Vimeo</a&gt;.</p>

Surveillance and detection concepts [Additional Post]

Surveillance and detection concepts already in operation, or under development:

  • A group of smaller surveillance drones called NAV (nano air vehicles) or MAV (micro air vehicles) already have been commissioned:  mapleseed drones; sparrow drones by 2015, dragonfly drones to fly in swarms by 2030, and eventually a housefly drone.  And if the reconstruction of nature doesn’t pan out, nature itself can be hijacked using electrical impulses to create cyborg surveillance insects being studied at major universities.
  • Nano sensors for use in agriculture that measure crops and environmental conditions.
  • Bomb-sniffing plants using rewired DNA to detect explosives and biological agents.
  • “Smart Dust” motes that wirelessly transmit data on temperature, light, and movement (this can also be used in currency to track cash).
  • Nano-based RFID barcodes that can be embedded into any material for tracking of all products . . . and people.

 

Hybrid Insect Micro-Electro-Mechanical Systems

Hybrid Insect Micro-Electro-Mechanical Systems is a project of DARPA, a unit of the United States Department of Defense, with the goal of developing tightly coupled machineinsectinterfaces by placing micro-mechanical systems inside the insects during the early stages of metamorphosis. The primary application is surveillance.

Remote controllable insects and their artificial robotic imitations are currently being promoted as covert spies. The development of tiny electronic control systems and miniature cameras has opened up a world of stealthy insect drones capable of slipping unobserved into military command and control centers

DARPA Minds Eye Program

The program’s focus is the development of smart cameras that can actually think for themselves.  These systems will not just watch us but will also be able to analyze visual data-sets and assign significance to that data.  The program’s focus is the development of smart cameras that can actually think for themselves.  These systems will not just watch us but will also be able to analyze visual data-sets and assign significance to that data. via » DARPA Kicks Off Mind’s Eye Program Alex Jones’ Infowars: There’s a war on for your mind!.

 

 

The NSA and Quantum Technology

Quantum computers currently under development could be used to break encryption codes designed to secure protect global medical, banking, business and government records stored online, The machines would be capable of performing several calculations at once, rather than in a single stream.

US spy agency the NSA is working on building a quantum computer it hopes will be able to crack through almost all types of encryption, according to the latest documents leaked by Edward Snowden. The report is based on the documents supplied to the paper by former NSA contractor Snowden, who currently has temporary asylum in Russia. They suggest that the agency carries out research in Faraday cages “to keep delicate quantum computing experiments running” by preventing electromagnetic energy entering or leaving the labs.

If the NSA managed to develop such a machine the agency would be able to break high-bit encryption codes such as the RSA public-key cryptosystem, which is widely used and based on the practical difficulty of factoring the product of two prime numbers. NSA working on building an encryption-busting quantum computer (Wired UK).

 

The D-Wave quantum computer processor is 3,600 times faster than classical computers at some tasks.

QuantumComputer_google

Quantum Storage

In terms of Quantum Storage and Atomic Scale Memory, currently it takes 1million atoms to store a single bit of data. With Quantum storage, it would only take 8 atoms to store a single bit of data the size of an electron only decipherable by a quantum computer…. to my understanding anyway.

 

 

Surveillance state: Concluded video

The ‘so-far’ finished product of surveillance video in the future city. My intention was to  illustrate the convergence of all harvested information from the mesh network into the towers database and analytics program. What I would like to do next is include some of the glitches in the network and how the city workers are attempting to disconnect or protect themselves against the pervasion of the towers surveillance systems.