Panopticities

Description (in English)

The video portrays mega-cities through the lenses of unsecured public CCTV and private IP cameras. Networked security cameras offer 24/7 surveillance. Tracking software and the integrated web-server allow processing and streaming as part of the growing amount of connected devices also known as the Internet of Things. These web-servers are often insecure by design, meaning they are not protected by a password or have hard-coded login credentials saved as plain text. By default, the servers stream unencrypted and on publicly-accessible network ports, providing potential risks of being intercepted and allowing unknown third parties unintended access to the set up function of the cameras. Some manufacturers use the same vulnerable settings across their entire camera lineup. “By default, the Network Camera is not password-protected”, or “the default user name is admin” and “the password is 12345” can be read in the camera manuals. Security cameras are supposed to offer security, not provide surveillance footage for anyone to view. Often, camera owners don’t realize that their cameras are accessible on the Internet with default insecure settings, enabling hackers to enslave these cameras into botnets. Malware will use insecure webcams to infect the rest of the network, routers and other devices in the “smart home”, threatening both the reliability of surveillance cameras and also serving as a transmission vector to attack other devices.

Title: Panopticities
Type: Video Installation
Production year: 2018
Running time: looped videos
Dimensions: variable
by KairUs Art+Research (Linda Kronman, Andreas Zingerle)
Locations: Seoul (Republic of Korea), Tokyo (Japan), Bangalore (India), New York City (USA)

Source: http://kairus.org/portfolio/panopticities-2018/

Situation machine vision is used in

Authored by

UUID
0b6ea14b-804c-4bff-a757-b21478b32d92