Surveillance and the art of software maintenance



At a recent conference there was discussion of the preservation of new media art. One of the panellists, an esteemed curator of new media at an important national museum in Scandinavia, spoke about conservation and the need to preserve old computers and programs and the difficulties of achieving this. Nevertheless, he believed the fundamental project was viable. Someone proposed that an obstacle to preservation was the artist’s carelessness, and this view was shared by several of the panellists. I replied from the floor that much Internet artwork uses events and content from remote websites over which the artist and the artwork have no control. I said that this artwork was inherently unstable and temporary. It was intended to be so, and this was part of its unique quality. It cannot be preserved. (There was no time for examples, but if Wikipedia ever disappears, logo_wiki will disappear also as a live work. This is true, whatever hope might be placed in the success of documentation.)

The museum curator replied that I had decided (I think I quote accurately), “to choose to break cultural laws”. It seemed that I had little reason to complain – which I was not: I intended merely to point out that not everything is bound for the museum.

There is the imbrication of curatorship and surveillance: the former with its documentation, display, and preservation; the latter, with its observation, monitoring, and evidential processes. These have something shared, and this is a programme of the creation and maintenance of forms of order.

This order, in the case of curatorship, is not merely the continuance of the integrity of physical structures. It is also the creation and imposition of cultural order. The point perhaps that the museum curator had implied.

However, the gun that is pointed at your own head may occasionally be turned on those that point it at you. In so doing, it is credible that curatorship should embrace the fugitive and the unstable. A counter-order, if you like. Surveillance too might cease to serve power by inversions that turn the apparatuses of control upside down. Both are strategies at the margin, not a form in dominance. Anti social. Not working.

For software to engage with what is happening now, it needs to be maintained, more urgently perhaps than it needs to be preserved. Data requires updating, page scrapes need to be checked. When you make a machine, you create a machine minder.

The way logo_wiki works is that it has a list of selected ‘Big Brother’ editors and the Internet addresses of their computers. Every networked computer has an address on the network, an IP (Internet Protocol) address. It’s a long number such as this, 134.205.143.0, which happens to be the address of one of the Pentagon’s computers. (You can check this on the DomainTools’ website at http://whois.domaintools.com/). Networked computers are registered at terrestrial addresses. For the Pentagon computer, if you run a check, you will get a result like this:

OrgName: The Pentagon
OrgID: THEPEN
Address: OPN-BM, Pentagon
Address: Rm BE884
City: Washington
StateProv: DC
PostalCode: 20310
Country: US

Most of the Big Brother editors who edit Wikipedia do so anonymously, and if they do so, the Wikipedia website logs their IP addresses, as it does with all anonymous edits, along with a record of the edit. All we need now is to compare Wikipedia’s evidence of IP addresses of anonymous editors with our list of heavy-duty establishment types. And if a match is found, we then have proven a link. And this is what logo_wiki does. It swaps Wikipedia’s logo for the editor’s logo to make the point. And it shows you the edited page. It’s a sort of reverse obscuring. It is a bringing forth of that which is hidden through the agency of identifying images.

It works in real time. It selects recent edits at random. It isn’t a database [1] . If there are no recent edits, logo_wiki cannot show you anything. If Wikipedia disappears, or changes its recording processes, logo_wiki disappears too. It is, if it may put that way, event-dependent artwork.



Footnotes:

[1] There is a database, ‘WikiScanner’, “a software tool written by Cal Tech computation and neural-systems graduate student Virgil Griffith. Griffith's project created a searchable database that ties edits from the popular encyclopedia to organizations, allowing one to see where they originated by cross-referencing edits with information on the owners of the poster's IP addresses.” Jonah Brucker-Cohen, neural.it, 10th May 2008, http://www.neural.it/art/2008/05/logo_wiki_whos_that_wikipedia.phtml.



Wayne Clements



Essays
published on this website are copylefted according to the GNU General Public License.

Part of this essay was originally published as: Clements, W. (2008) Surveillance and The Art of Software Maintenance: Remarks on logo_wiki, in ‘Observatori 2008. After the Future’. Valencia, Observatori.com. 


Home